home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!usc!rpi!think.com!barmar
- From: barmar@think.com (Barry Margolin)
- Newsgroups: comp.unix.wizards
- Subject: Re: /bin/rm security issue(s)
- Date: 10 Sep 1992 05:25:43 GMT
- Organization: Thinking Machines Corporation, Cambridge MA, USA
- Lines: 44
- Message-ID: <18mm8nINNfmc@early-bird.think.com>
- References: <1992Sep10.015705.7210@morwyn.uucp>
- NNTP-Posting-Host: gandalf.think.com
-
- In article <1992Sep10.015705.7210@morwyn.uucp> forrie@morwyn.uucp (Forrie Aldrich) writes:
- >However: I'm concerned about being able really _eradicate_ a file,
- >for various reasons including security.
- >
- >Does anyone have a program that will do this? A friend suggested that
- >I get a program that will open the file and write 'zeros' or something
- >to the end of it and then close it. _Then_ /bin/rm the file.
-
- I don't know whether Unix guarantees that writing to a file will overwrite
- the existing blocks rather than allocate new blocks and free the old ones.
- However, I believe most existing Unix implementations will do what you
- expect.
-
- >I could see adding this 'feature' to /bin/rm or perhaps writing a
- >program called /bin/rrm (_really-remove_) to do this. Hmmm... I wonder
- >how government contracts manage this issue...
-
- This won't help in the case of files deleted in other ways, e.g. by mv(1),
- or by applications that call unlink(2). Perhaps you should replace
- unlink(2) in libc with one that really eradicates (if you have dynamic
- libraries, this change will affect all dynamically-linked programs).
-
- I don't think this is a problem for government contracts. The Orange Book
- only requires that newly-created files not contain data from old files,
- which Unix implements. Anyone who can access the raw disk is effectively
- bypassing the system security. On Unix, if you can do this it generally
- means that you also have access to replace or patch /bin/rrm so that it
- doesn't really eradicate, either. In general, I think that a contract that
- required this kind of security would probably not be met by Unix. On the
- other hand, Multics deletes files similarly to Unix, and that wasn't an
- obstacle to getting a B2 rating.
-
- The only government requirement for really eradicating data comes into play
- when disks or tapes are being thrown out. If the media ever contained data
- above a particular security classification, it has to be thoroughly wiped;
- this generally involves writing lots of 1's, 0's, and random patterns over
- it several times, then degaussing it. At some really high levels, you have
- to grind it up into a fine powder, and then incinerate it; but first you
- have to erase it as described above!
- --
- Barry Margolin
- System Manager, Thinking Machines Corp.
-
- barmar@think.com {uunet,harvard}!think!barmar
-