top | item 10650177

dd – Destroyer of Disks (2008)

82 points| opensourcedude | 10 years ago |noah.org | reply

58 comments

order
[+] DanBC|10 years ago|reply
About drive wiping: You're probably better off using the ATA Secure Erase command, which is very quick and does the entire disc. dd and other tools risk not doing blocks marked as bad, for example.

He's right that a single overwrite of zero is probably good enough to make sure that data is gone, but it's probably not enough to persuade other people that it's gone. A few passes of pseudo random data is probably better if you need to persuade other people that the data has gone.

But if it's really important drive wiping is what you do to protect the drives until you get a change to grind them.

[+] pkaye|10 years ago|reply
There is also a cryptographic erase option on secure erase if the drive supports it. It is nearly instantaneous and you can follow up with other slower methods if desired.

Also for SSDs, using the secure erase method is important because of overprovisioning and garbage collection. If that is not available, on most SSD algorithms, doing two full pass writes (with random sector data if drive supported compression) will get you close to wiping out all contents as possible.

[+] baldfat|10 years ago|reply
This is what I am doing currently

# openssl enc -aes-256-ctr -pass pass:"$(dd if=/dev/urandom bs=128 count=1 2>/dev/null | base64)" -nosalt </dev/zero \ | pv -bartpes <DISK_SIZE> | dd bs=64K of=/dev/sd"X"

To randomize the drive/partition using a randomly-seeded AES cipher from OpenSSL (displaying the optional progress meter with pv): https://wiki.archlinux.org/index.php/Securely_wipe_disk/Tips...

Then I take out the drill press and make a bunch of holes.

[+] drzaiusapelord|10 years ago|reply
>but it's probably not enough to persuade other people that it's gone.

I believe there is a long standing bounty for anyone who can retrieve useful data from a drive that had been zero'd once. No one has been able to thus far.

A lot of the disk wiping "culture" stems from a much earlier time when disk technology was less reliable, especially in regards to writes. Dan Gutmann himself says that the Gutmann method is long antiquated and only worked with MFM/RLL encoded disks from the 80s and early 90s.

Perhaps instead of humoring these people, we should be educating them. A zero'd out disk is a wiped disk until someone proves otherwise.

[+] Karunamon|10 years ago|reply
This may be my paranoia talking, but is there a way short of an examination with a scanning electron microscope to ensure that the erase command is actually doing what it's supposed to do?

Not so much that the drive manufacturers are engaging in malfeasance (though that's certainly not off the table), but that it's not unheard of for certain agencies in certain governments to crock low level system components (intercepting them in shipping and so forth) so they work against the user.

..or just plain ignorance. A study indicates that back in 2011, half of the major drive vendors weren't doing the erase correctly. https://www.usenix.org/legacy/events/fast11/tech/full_papers...

[+] amelius|10 years ago|reply
> Unfortunately, there is no command-line option to have `dd` print progress

How difficult could it be to write a dd command from scratch that does include progress-reporting? I mean, dd is simply reading blocks of data from one file descriptor and writing them to another.

[+] itchyouch|10 years ago|reply
`pv` (pipeviewer) is usually very useful for tracking progress.

dd if=/dev/zero count=10 bs=1M | pv > file.bin

The other way to see progress on `dd` is to issue a signal 3 (USR1, iirc) to the dd process. kill -3 <dd pid>

[+] dmytrish|10 years ago|reply
Actually, you can send signal USR1 to a GNU `dd` process to see the progress:

    $ pgrep dd
    22230
    $ kill -USR1 22230
- and `dd` prints its progress.
[+] rca|10 years ago|reply
the dd on my machine (from the gnu coreutils 8.24) does just that with the 'status=progress' option.

dd if=/dev/zero of=/dev/null status=progress 4814691328 bytes (4,8 GB) copied, 4,000000 s, 1,2 GB

It's only the size copied and the speed but it's usually enough.

[+] BuildTheRobots|10 years ago|reply
I tend to run `watch kill -USR1 $(pidof dd)` in a second terminal. Watch executes your command repeatidly (by default every two seconds) so you then get regular dd status updates.
[+] vog|10 years ago|reply
Does the third command really work as intended?

    sudo cat ubuntu-14.04-desktop-amd64.dmg >> /dev/sda1
I believe this will attempt to write data after the of the the block device, which almost by defintion will fail.

However, I often do the following, which works pretty well:

    sudo cat ubuntu-14.04-desktop-amd64.dmg > /dev/sda1
[+] cnvogel|10 years ago|reply
'>>' will cause O_APPEND to be specified as flags when opening "/dev/sda". I'm pretty sure this flag is ignored on block devices as it's obviously useless.

    fd = open("/dev/sda", O_WRONLY|O_CREAT|O_NOCTTY|O_APPEND, 0644);
    pos = lseek(fd, 0, SEEK_CUR);
    -> pos = 0
http://hastebin.com/abuhiwivoz.pl

    # tmp  sudo ./open_sda
    Current position after open: 0
    Current position after seek to end: 128035676160
[+] acranox|10 years ago|reply
The redirection will happen in your shell, but the command will be called inside the shell invoked by sudo. So that won't work either unless you have write privs to the block device, but if that were the case, you probably didn't need sudo to read the dmg file. So this will likely fail for a reason other than the one you pointed out.
[+] Sir_Cmpwn|10 years ago|reply
Better:

    cat ubuntu-14.04-desktop-amd64.dmg | sudo tee /dev/sda1
[+] orik|10 years ago|reply
if you used cat, could potentially something escape and run in your userspace?
[+] nailer|10 years ago|reply
It's actually 'copy and convert' but 'cc' was taken.
[+] rsync|10 years ago|reply
You can 'dd' from Unix to the cloud ... well, some clouds ...

  pg_dump -U postgres db | ssh [email protected] "dd of=db_dump"

  mysqldump -u mysql db | ssh [email protected] "dd of=db_dump"
... although these days, now that we support attic and borg[1], nobody does things like this anymore.

[1] http://www.rsync.net/products/attic.html

[+] kazinator|10 years ago|reply
That has only one minor advantage compared to:

  mysqldump -u mysql db | ssh [email protected] "cat > db_dump"
Namely, the syntax is one character shorter. (But only because I used whitespace around >).

With dd, you can control the transfer units (the size of the read and write system calls which are performed) whereas cat chooses its own buffering. However, this doesn't matter on regular files and block devices. The transfer sizes only matter on raw devices where the block size must be observed. E.g. traditional tape devices on Unix where if you do a short read, or oversized write, you get truncation.

[+] SeldomSoup|10 years ago|reply
> If you want to erase a drive fast then use the following command (where sdXXX is the device to erase):

    dd if=/dev/zero of=/dev/sdXXX bs=1048576
Question: is there a disadvantage to using a higher blocksize? Is the read/write speed of the device the only real limit?
[+] opejn|10 years ago|reply
> is there a disadvantage to using a higher blocksize?

Maybe, depending on the details. Imagine reading 4 GB from one disk then writing it all to another, all at 1 MB/sec. If your block size is 4 GB, It'll take 4000 seconds to read, then another 4000 seconds to write... and will also use 4 GB of memory.

If your block size is 1 MB instead, then the system has the opportunity to run things in parallel, so it'll take 4001 seconds, because every read beyond the first happens at the same time as a write.

And if your block size is 1 byte, then in theory the transfer would take almost exactly 4000 seconds... except that now the system is running in circles ferrying a single byte at a time, so your throughput drops to something much less than 1 MB/sec.

In practice, a 1 MB block size works fine on modern systems, and there's not much to be gained by fine-tuning.

[+] rdc12|10 years ago|reply
It is worth noteting that the shred program mentioned is more or less useless on modern filesystems for a variety of reasons, the man-page has a list that it will fail to work correctly on (btrfs, ext3, NFS).

It may well be that the only usable filesystem for it, is FAT32 (and possibly NTFS, not sure on that thou).

[+] esaym|10 years ago|reply
This usually messes stuff up pretty good:

  perl -e '$file = '/dev/sda';\
  $s = -s $file;\
  $i = $s/2;\
  while(--$i > 0){\
    $r = int rand($s);\
    system("dd if=/dev/urandom of=$file skip=$r count=1");\
  }'
[+] cmurf|10 years ago|reply
The "Unable to install GRUB" recommended fix to remove the GPT is wrong. The proper thing to do is create a 1MiB partition, BIOSBoot partition type (gdisk internal code 0xEF02), and then grub-install will find it and install core.img there automatically.
[+] x0|10 years ago|reply
I prefer `pv` (pipe viewer) for watching dd's progress

http://linux.die.net/man/1/pv

[+] feld|10 years ago|reply
CTRL+T on BSD platforms works brilliantly. I will never understand why Linux refuses to adopt CTRL+T (SIGINFO)
[+] shin_lao|10 years ago|reply
The point of using random instead of zero is that it's harder to see which parts have been overwritten and which parts haven't been.
[+] pflanze|10 years ago|reply
Also, some (flash) drives are compressing data on the fly. Writing zeroes to such a drive might just not actually write anything at all to the flash cells except for some run length descriptors (numbers).

Since the worry seems to be speed, here's a tool I wrote to get random bytes about as fast as drives can accept (well, at least spinning disk drives, there might be some flash drives that are faster):

https://github.com/pflanze/fastrandom

I'm expecting you to figure out where this tool goes wrong and produces predictable bytes yourself. Also, please tell me if you do :)

Anyway, even if it isn't secure, it will be enough to foil compression algorithms.

[+] lucaspiller|10 years ago|reply
On the other hand that makes it indestingishable from encrypted data. What is worse?

"Give us the encryption keys" "It's not encrypted, I used /dev/urandom" vs "Yes, I wiped it"

[+] DanBC|10 years ago|reply
You're supposed to overwrite the entire disc.

And random data is very easy to see.

The people who propose using multiple overwrites are clear that they're talking about making it harder to recover bits. (They're wrong, but it's what they say.)

[+] BCM43|10 years ago|reply
When is that useful?
[+] fiatjaf|10 years ago|reply
I don't believe this is the actual name. Are you serious?