All of lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] Filling a disk with random data - question
@ 2014-03-17 18:55 Cpp
  2014-03-17 23:17 ` .. ink ..
  2014-03-18  2:33 ` Arno Wagner
  0 siblings, 2 replies; 8+ messages in thread
From: Cpp @ 2014-03-17 18:55 UTC (permalink / raw)
  To: dm-crypt

Hello,

I noticed a lot of online articles recommend to overwrite your hard
disk with random data before creating an encryption volume on it.
Normally this is done by:

# dd if=/dev/urandom of=/dev/sda bs=4096

This will of course take a while, and there is also the badblocks
alternative. However recently I've seen another approach that uses an
encrypted (non-luks) container that is later filled with blank data.
It's said that this approach is much faster than the urandom method
above. I haven't used this yet, so I hope I got the command line
right:

# cryptsetup -c aes-xts-plain64 -h sha512 -s 512 -d /dev/urandom open
/dev/sda --type plain cryptroot
# dd if=/dev/zero of=/dev/mapper/cryptroot bs=4096

My question is are there any serious drawbacks of using this method in
place of the urandom one?


Best regards!

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2014-04-10 16:09 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-03-17 18:55 [dm-crypt] Filling a disk with random data - question Cpp
2014-03-17 23:17 ` .. ink ..
2014-03-18  2:33 ` Arno Wagner
2014-03-18 22:20   ` Robert Nichols
2014-03-18 23:41     ` [dm-crypt] Filling a disk with random data - use a hige bs= to speed it up Chris Drake
2014-04-10 15:15   ` [dm-crypt] Filling a disk with random data - question Arno Wagner
2014-04-10 15:50     ` .. ink ..
2014-04-10 16:09       ` Arno Wagner

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.