|
|
Subscribe / Log in / New account

Security

Brief items

Cleaning up your disks

Simson Garfinkel has written another story on the interesting things he has found on used disk drives; this one appears in CSO magazine. He looked at some 150 drives, and found that only 10% of them had been sanitized.

One of the drives once lived in an ATM. It contained a year's worth of financial transactions--including account numbers and withdrawal amounts--from a organization that had a legal requirement to not divulge such information. Two other drives contained more than 5,000 credit card numbers--it looked as if one had been inside a cash register. Another had e-mail and personal financial records of a 45-year-old fellow in Georgia. The man is divorced, paying child support and dating a woman he met in Savannah. And, oh yeah, he's really into pornography.

In general, one need not think to long before realizing that letting an unsanitized disk out of your possession is not a particularly good idea. One might well wonder, however, what the best method is for cleaning up a disk. There are a few different options available. Note that running fdisk or mkfs is not an option, however; those utilities leave most of the information on the disk intact.

The safest way, perhaps, is to encrypt the contents of your disks from the beginning. Such disks should be safe even if they leave your possession in an unexpected, undesired way. Most Linux distributions do not come with easy disk encryption options now, but that is likely to change within the next year or so. The inclusion of the crypto-API code in the 2.6 kernel, combined with the block encryption capabilities being patched into the device mapper code, should make this capability widely available.

The GNU shred utility is part of the "coreutils" package. It can be used to overwrite the contents of a single file or an entire device. The single file mode can be tripped up by things like journaling filesystems and should not be relied upon for too much security. When shred is applied to an entire block device, however, it should be effective.

Lacking a tool like shred, one could always overwrite a device with a command like:

    dd if=/dev/urandom of=/dev/disk-to-wipe

The truly paranoid among us will want to run that command more than once.

Another option is the standalone disk wiper, which boots from a diskette or CD to do its cleanup work. This sort of utility is useful when an entire computer is being surplussed, and the person doing the cleanup does not, necessarily, know how to log into and clean the system. Besides, wiping the root disk on a running system can be a difficult operation to complete. A couple of offerings in this area are autoclave and Secure Harddisk Eraser. Both of these are compact Linux systems which boot in a standalone mode and trash the disk. Autoclave goes to some lengths to ensure that the user knows what is about to happen; Secure Harddisk Eraser, instead, simply waits a minute and goes to work.

The final option is the physical destruction of the disk drive. Modern drives can be surprisingly hard to destroy, however.

The one course which is not an option is getting rid of drives without cleaning them up first. It has become clear to a lot of people that used drives can be gold mines of information which should not be disclosed. If you throw away a loaded disk, chances are good that somebody else will go digging through it.

Comments (27 posted)

New vulnerabilities

ecartis: several vulnerabilities

Package(s):ecartis CVE #(s):CAN-2003-0781 CAN-2003-0782
Created:March 24, 2004 Updated:March 24, 2004
Description: The ecartis mailing list manager (version 1.0) suffers from an input validation vulnerability which can result in the disclosure of list passwords. Ecartis also has several buffer overflow vulnerabilities. See this advisory for more information.
Alerts:
Debian DSA-467-1 ecartis 2004-03-23

Comments (none posted)

httpd - vulnerabilities fixed in Apache HTTP Server v2.0.49

Package(s):httpd CVE #(s):CAN-2004-0174 CAN-2003-0020 CAN-2004-0113
Created:March 23, 2004 Updated:March 30, 2004
Description: The Apache Software Foundation and the Apache HTTP Server Project have announced the release of version 2.0.49 of the Apache HTTP Server ("Apache"). More on the vulnerabilities fixed in this release can be found in this announcement.
Alerts:
Trustix TSLSA-2004-0017 apache 2004-03-30

Comments (none posted)

Resources

Rootkit Hunter 1.0.0

Rootkit Hunter 1.0.0 has been released; this package will scan a system for signs of compromise. The release contains a long list of "supported" malware that Rootkit Hunter can detect; that list does not include the Adore rootkit discussed here last week, however.

Full Story (comments: 1)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2004, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds