-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to ensure high PRNG quality? #596
Comments
I think it would be a useful addition. I had thought about doing something like that in the past, just for development purposes a means to verify the quality of the prng would make it very useful for me personally. If DBAN had something like that, then maybe they wouldn't have realised a broken prng. For those that don't know, the last DBAN release in 2015 has a bug where if you set a certain prng via a command line option it will say it's writing a prng but in fact is writing un-initialised memory to the disc! So I'm all for this feature. |
Sounds great! I will look for a way to implement it. Some question we have to discuss maybe.
|
Initially I thought an additional verification method in pass.c. then thought maybe as a method as you could then run on a disc that has already been prng wiped. Maybe both! However for simplicity, to start with just create as a method and then once it's working nicely we will look at having a switch in the command line options and GUI to enable PRNG entropy analysis if final pass is PRNG. However, like I said it's probably best to keep it to a method to start with. Please create a new feature branch rather than add it to any existing PRs.
I would have thought the overall quality of the block device. I'm assuming in both cases you do read every block, however, the analysis is running incrementally block by block for the overall analysis, as opposed to restarting the analysis from scratch for every block. |
@Knogle Can I ask is the PRNG Stream the latest updated and modern way of erasing? I've not read the latest NIST info, but know it was quite stale with aged info for a long time. In the recent past I have usually used DoD Short 3 pass with 100% verify. I try to use just one best over-all "Method" for all my wiping/erasing tasks. The DoD Short is just been a good mix between a good wipe option and time to execute and complete. I'd like to have Nwipe "Default" to that method, or PRNG Stream/Verified of Nwipe first execution. I'm not sure if that is possible, as I am not sure if @martijnvanbrummelen is selecting the most common method for EU and not USA or how the default method is decided. For myself, I just want the best "Umbrella Wipe Option" which would take into three main factors:
The most stringent companies I have worked for are oil & gas and pharmacuetical companies and they usually required the above listed criteria. The "Certificate" with the Bar Code is the most critical for me though as often it is needed for Risk Assessments, Audits, HIPPA Compliance, and the companies often have them stored in a Repository. Personally, I think it is all overkill, but possibly a neccessary evil. I mean, we get the PC's, format the hdd's, image them, encrypt them, reimage device and reassign to a new user if required here the hdd gets re-encrypted, then if they get turned in for EOL/Recycle we wipe them yet again. All that, to say this: |
Ahoy,
I've been thinking about the overall quality of PRNGs (Pseudorandom Number Generators) and their importance. The initial entropy verification process only gives an indication of the quality of the overall data stream, but it doesn't fully guarantee it.
I’m considering adding another wipe option called something like PRNG Stream (Verified) or something similar. There could be use cases where this would be important for NIST SP 800-22 or BSI compliance, especially in scenarios where secure data erasure is critical.
The idea would be to write random data, run the verification pass, and then, as a final step before blanking, run the NIST Suite with a 0.1 ratio on the block device itself. Based on my tests, this would take about 60 seconds for a 16TB drive, but it would provide a high-quality and accredited report for NIST SP 800-22 compliance in data erasure.
I think this approach could be valuable, especially in Germany, where there may be cases that require this level of certified data erasure. What do you think? This could be an interesting option for environments where compliance is a top priority. Similar paid tools like from blancco offer such things.
Looking forward to your feedback!
The text was updated successfully, but these errors were encountered: