On Wed, 26 Sep 2012 08:41:00 +0200 Sebastian Dransfeld <s...@tango.flipp.net>
said:

> On 09/25/2012 06:01 PM, rustyBSD wrote:
> > Le 25/09/2012 15:57, Sebastian Dransfeld a écrit :
> >> Something like this (untested!!).
> > Hi,
> > I use malloc() because OpenBSD's secure rm
> > uses malloc too.
> >
> > I'm not sure mmap() is good, but I'll read some
> > documentation.
> >
> > In all cases, your patch doesn't work, as
> > eina_file_map_all() give a read access. So
> > we can't write randomized data to the file
> > (PROT_READ).
> 
> True, Didn't check that.
> 
> I checked the openbsd source, and they limit the size of the malloc and 
> do several passes if the whole file size can't be malloc'ed.
> 
> And I think mmap is fine:
> http://en.wikipedia.org/wiki/C_dynamic_memory_allocation#OpenBSD.27s_malloc

and that's what i did. a fixed buffer of 64kb is malloced - and random filled
or 0xff filled as per before - but just written 64k at a time. and yes - it
handles the tail that may not be a full 64k too.

here's the question... this is pretty lame security-wise. shouldn't we be
military/cia/nsa spec and overwrite it at least 7 times? :) oh and this will
probably/possible get screwed by logging fs's or flash media that may shuffle
the blocks around on write :) ie it wont help.

anyway... why not do it 7 times and then we can say "not even the cia can get
your warez after this!" :)

-- 
------------- Codito, ergo sum - "I code, therefore I am" --------------
The Rasterman (Carsten Haitzler)    ras...@rasterman.com


------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://ad.doubleclick.net/clk;258768047;13503038;j?
http://info.appdynamics.com/FreeJavaPerformanceDownload.html
_______________________________________________
enlightenment-devel mailing list
enlightenment-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel

Reply via email to