[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2007-01-03 Thread james hughes
On Jan 2, 2007, at 6:48 AM, Darren Reed wrote: > Darren J Moffat wrote: > >> ... >> Of course. I didn't mention it because I thought it was obvious >> but this would NOT break the COW or the transactional integrity of >> ZFS. >> >> One of the possible ways that the "to be bleached" blocks ar

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-22 Thread Darren Reed
Darren J Moffat wrote: > One other area where is is useful is when you are in a jurisdiction > where a court order may require you to produce your encryption keys - > yes such jurisdictions exist and I don't want to debate the "human > rights" angle or social engineering aspects of this just st

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-21 Thread Darren J Moffat
One other area where is is useful is when you are in a jurisdiction where a court order may require you to produce your encryption keys - yes such jurisdictions exist and I don't want to debate the "human rights" angle or social engineering aspects of this just state that it exists. For such e

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-21 Thread Darren J Moffat
Nicolas Williams wrote: > James makes a good argument that this scheme won't suffice for customers > who need that level of assurance. I'm inclined to agree. For customers > who don't need that level of assurance then encryption ought to suffice. Has anyone other than me actually read the curren

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-21 Thread Darren J Moffat
Frank Hofmann wrote: > And this kind of "deep bleaching" would also break if you use snapshots > - how do you reliably bleach if you need to keep the all of the old data > around ? You only could do so once the last snapshot is gone. Kind of > defeating the idea - automatic but delayed indefinit

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-21 Thread Darren J Moffat
Pawel Jakub Dawidek wrote: > I like the idea, I really do, but it will be s expensive because of > ZFS' COW model. Not only file removal or truncation will call bleaching, > but every single file system modification... Heh, well, if privacy of > your data is important enough, you probably don't

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-21 Thread Nicolas Williams
On Thu, Dec 21, 2006 at 03:47:07PM +, Darren J Moffat wrote: > Nicolas Williams wrote: > >James makes a good argument that this scheme won't suffice for customers > >who need that level of assurance. I'm inclined to agree. For customers > >who don't need that level of assurance then encryptio

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-21 Thread Nicolas Williams
On Thu, Dec 21, 2006 at 03:31:59PM +, Darren J Moffat wrote: > Pawel Jakub Dawidek wrote: > >I like the idea, I really do, but it will be s expensive because of > >ZFS' COW model. Not only file removal or truncation will call bleaching, > >but every single file system modification... Heh, w

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-20 Thread Pawel Jakub Dawidek
On Tue, Dec 19, 2006 at 02:04:37PM +, Darren J Moffat wrote: > In case it wasn't clear I am NOT proposing a UI like this: > > $ zfs bleach ~/Documents/company-finance.odp > > Instead ~/Documents or ~ would be a ZFS file system with a policy set > something like this: > > # zfs set erase=fil

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-20 Thread Frank Hofmann
On Wed, 20 Dec 2006, Pawel Jakub Dawidek wrote: > On Tue, Dec 19, 2006 at 02:04:37PM +, Darren J Moffat wrote: >> In case it wasn't clear I am NOT proposing a UI like this: >> >> $ zfs bleach ~/Documents/company-finance.odp >> >> Instead ~/Documents or ~ would be a ZFS file system with a polic

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-20 Thread James Carlson
Pawel Jakub Dawidek writes: > > The goal is the same as the goal for things like compression in ZFS, no > > application change it is "free" for the applications. > > I like the idea, I really do, but it will be s expensive because of > ZFS' COW model. Not only file removal or truncation will

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Nicolas Williams
On Tue, Dec 19, 2006 at 03:09:03PM -0500, Jeffrey Hutzelman wrote: > > > On Tuesday, December 19, 2006 01:54:56 PM + Darren J Moffat > wrote: > > >While I think having this in the VOP/FOP layer is interesting it isn't > >the problem I was trying to solve and to be completely honest I'm rea

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Darren J Moffat
Nicolas Williams wrote: > On Tue, Dec 19, 2006 at 02:04:37PM +, Darren J Moffat wrote: >> In case it wasn't clear I am NOT proposing a UI like this: >> >> $ zfs bleach ~/Documents/company-finance.odp >> >> Instead ~/Documents or ~ would be a ZFS file system with a policy set >> something like

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Jeffrey Hutzelman
On Tuesday, December 19, 2006 01:54:56 PM + Darren J Moffat wrote: > While I think having this in the VOP/FOP layer is interesting it isn't > the problem I was trying to solve and to be completely honest I'm really > not interested in solving this outside of ZFS - why make it easy for > pe

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Darren J Moffat
In case it wasn't clear I am NOT proposing a UI like this: $ zfs bleach ~/Documents/company-finance.odp Instead ~/Documents or ~ would be a ZFS file system with a policy set something like this: # zfs set erase=file:zero Or maybe more like this: # zfs create -o erase=file -o erasemethod=zero

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Darren J Moffat
Jeffrey Hutzelman wrote: > > > On Monday, December 18, 2006 05:51:14 PM -0600 Nicolas Williams > wrote: > >> On Mon, Dec 18, 2006 at 06:46:09PM -0500, Jeffrey Hutzelman wrote: >>> >>> >>> On Monday, December 18, 2006 05:16:28 PM -0600 Nicolas Williams >>> wrote: >>> >>> > Or an iovec-style sp

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Darren J Moffat
Nicolas Williams wrote: > On Mon, Dec 18, 2006 at 05:44:08PM -0500, Jeffrey Hutzelman wrote: >> On Monday, December 18, 2006 11:32:37 AM -0600 Nicolas Williams >> wrote: >>> I'd say go for both, (a) and (b). Of course, (b) may not be easy to >>> implement. >> Another option would be to warn

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Nicolas Williams
On Tue, Dec 19, 2006 at 04:37:36PM +, Darren J Moffat wrote: > I think you are saying it should have INHERITY set to YES and EDIT set > to NO. We don't currently have any properties like that but crypto will > need this as well - for a very similar reason with clones. What I mean is that if

[zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-19 Thread Nicolas Williams
On Tue, Dec 19, 2006 at 02:04:37PM +, Darren J Moffat wrote: > In case it wasn't clear I am NOT proposing a UI like this: > > $ zfs bleach ~/Documents/company-finance.odp > > Instead ~/Documents or ~ would be a ZFS file system with a policy set > something like this: > > # zfs set erase=fil

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Jeffrey Hutzelman
On Monday, December 18, 2006 05:51:14 PM -0600 Nicolas Williams wrote: > On Mon, Dec 18, 2006 at 06:46:09PM -0500, Jeffrey Hutzelman wrote: >> >> >> On Monday, December 18, 2006 05:16:28 PM -0600 Nicolas Williams >> wrote: >> >> > Or an iovec-style specification. But really, how often will o

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Jeffrey Hutzelman
On Monday, December 18, 2006 05:16:28 PM -0600 Nicolas Williams wrote: > Or an iovec-style specification. But really, how often will one prefer > this to truncate-and-bleach? Also, the to-be-bleached octet ranges may > not be meaningful in snapshots/clones. Hmmm. That convinces me: > trunc

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Nicolas Williams
On Mon, Dec 18, 2006 at 06:46:09PM -0500, Jeffrey Hutzelman wrote: > > > On Monday, December 18, 2006 05:16:28 PM -0600 Nicolas Williams > wrote: > > >Or an iovec-style specification. But really, how often will one prefer > >this to truncate-and-bleach? Also, the to-be-bleached octet ranges

Mailing list issues (Re: [zfs-discuss] Re: [security-discuss] Thoughts on ZFS Secure Delete - without using Crypto)

2006-12-18 Thread Nicolas Williams
On Mon, Dec 18, 2006 at 05:16:28PM -0600, Nicolas Williams wrote: > On Mon, Dec 18, 2006 at 05:44:08PM -0500, Jeffrey Hutzelman wrote: BTW, Jeff's posts to zfs-discuss are being rejected with this message: You are not allowed to post to this mailing list, and your message has been automatic

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Jeffrey Hutzelman
On Monday, December 18, 2006 11:32:37 AM -0600 Nicolas Williams wrote: > IMO: > > > - The hardest problem in the case of bleaching individual files or >datasets is dealing with snapshots/clones: > > - blocks not shared with parent/child snapshots can be bleached with > little tr

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Nicolas Williams
On Mon, Dec 18, 2006 at 05:44:08PM -0500, Jeffrey Hutzelman wrote: > On Monday, December 18, 2006 11:32:37 AM -0600 Nicolas Williams > wrote: > > I'd say go for both, (a) and (b). Of course, (b) may not be easy to > > implement. > > Another option would be to warn the user and set a flag on

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Darren J Moffat
[ This is for discussion, it doesn't mean I'm actively working on this functionality at this time or that I might do so in the future. ] When we get crypto support one way to do "secure delete" is to destroy the key. This is usually a much simpler and faster task than erasing and overwriting

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Nicolas Williams
On Mon, Dec 18, 2006 at 11:32:37AM -0600, Nicolas Williams wrote: >The new system call should either appear to truncate the file or to >overwrite it with zeros. The latter would allow for bleaching some >byte ranges, rather than the whole file (ZFS complexity: first COW >the non-bl

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread Nicolas Williams
IMO: - The hardest problem in the case of bleaching individual files or datasets is dealing with snapshots/clones: - blocks not shared with parent/child snapshots can be bleached with little trouble, of course. - But what about shared blocks? IMO we have two options:

[security-discuss] Thoughts on ZFS Secure Delete - without using Crypto

2006-12-18 Thread James Dickens
On 12/18/06, Darren J Moffat wrote: > > [ This is for discussion, it doesn't mean I'm actively working on this >functionality at this time or that I might do so in the future. ] > > When we get crypto support one way to do "secure delete" is to destroy > the key. This is usually a much simple