View previous topic :: View next topic |
Author |
Message |
nihilo Apprentice
Joined: 05 Nov 2002 Posts: 168 Location: berkeley, ca, usa
|
Posted: Mon Dec 16, 2002 2:20 am Post subject: secure delete with ext3?? |
|
|
I just emerged secure-delete, and it notes after installation that:
* sfill and srm are useless on journalling filesystems, such as reiserfs or XFS.
I assume that this holds true for ext3 as well. Is there a utility for secure deletion of files with a journaling filesystem (ext3)?? I know about zeroing with dd, but I don't think that is totally secure. An application that makes multiple passes, etc., would be really handy.
thanks... |
|
Back to top |
|
|
Carlos Guru
Joined: 07 Aug 2002 Posts: 458 Location: Providence, RI
|
Posted: Mon Dec 16, 2002 3:14 am Post subject: |
|
|
To quote this file, "one can easily upgrade an Ext2 filesystem to Ext3, and vice versa", so if you don't find anything else you can always disable journaling, delete what you need to do, and turn it back on. I realize that that's not an optimal solution; just a thought. _________________ Man must shape his tools lest they shape him. |
|
Back to top |
|
|
rtn Guru
Joined: 15 Nov 2002 Posts: 427
|
Posted: Mon Dec 16, 2002 4:34 pm Post subject: Re: secure delete with ext3?? |
|
|
nihilo wrote: | I assume that this holds true for ext3 as well. Is there a utility for secure deletion of files with a journaling filesystem (ext3)?? I know about zeroing with dd, but I don't think that is totally secure. An application that makes multiple passes, etc., would be really handy.
|
I used to use pgp when I needed secure delete, you might want to check
into that. I do not believe, however, that gpg included that funcationality.
(which is unfortunate.) I'm not 100% certain, however, if it's as secure
under ext3 either.
From the pgp command line guide:
Code: |
Wiping your disk
After PGP produces a ciphertext file for you, you can request PGP to
automatically overwrite and delete the plaintext file, leaving no trace of
plaintext on the disk. Use the w when a plaintext file contains sensitive
information; it prevents someone from recovering the file with a disk block
scanning utility.
Use the w option when you encrypt and sign a message:
pgp -ew <message.txt> <recipients_userid>
This instructs PGP to create a ciphertext file message.pgp, and to destroy the plaintext file message.txt.
Note that this option will not wipe out any fragments of plaintext that your
word processor might have created on the disk while you were editing the
message before running PGP. Most word processors create backup files,
scratch files, or both.
PGP overwrites the file 26 times.
|
--rtn |
|
Back to top |
|
|
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|