<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: INIT/ERASE in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035065#M24239</link>
    <description>If you're even asking the question, erase (zeros or otherwise) and then slag the disk.  Disks just aren't worth all that much on the used market, and certainly aren't worth the hassle.&lt;BR /&gt;&lt;BR /&gt;On OpenVMS, you can load a pattern erasure via the $erapat mechanisms.  The default is all zeros, but you can select a DoD pattern by loading an $erapat -- and the source code of one version is provided with various OpenVMS distributions.&lt;BR /&gt;&lt;BR /&gt;For some existing discussions of disk data remanence and secure disk data erasure, start at:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/wizard/wiz_4598.html" target="_blank"&gt;http://h71000.www7.hp.com/wizard/wiz_4598.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;There's also a discussion of BAD (and low-level SCSI operations) over in the ATW area, at:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/wizard/wiz_6926.html" target="_blank"&gt;http://h71000.www7.hp.com/wizard/wiz_6926.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The attached text is from the OpenVMS FAQ at &lt;A href="http://www.hoffmanlabs.com/vmsfaq/" target="_blank"&gt;www.hoffmanlabs.com/vmsfaq/&lt;/A&gt; ...   Other discussions are available, and can be reviewed by you or your site information security folks.&lt;BR /&gt;&lt;BR /&gt;Stephen Hoffman&lt;BR /&gt;HoffmanLabs&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;--&lt;BR /&gt;&lt;BR /&gt;        5.42.6  How to perform a DoD security disk erasure?&lt;BR /&gt;&lt;BR /&gt;                   Sometimes refered to as disk, tape, or media&lt;BR /&gt;                   declassification, as formatting, as pattern erasure,&lt;BR /&gt;                   or occasionally by the generic reference of data&lt;BR /&gt;                   remanence. Various references to the US Deparment of&lt;BR /&gt;                   Defence (DoD) or NCSC "Rainbow Books" documentation are&lt;BR /&gt;                   also seen in this context.&lt;BR /&gt;&lt;BR /&gt;                   While this erasure task might initially appear quite&lt;BR /&gt;                   easy, basic characteristics of the storage media and&lt;BR /&gt;                   of the device error recovery and bad block handling&lt;BR /&gt;                   can make this effort far more difficult than it might&lt;BR /&gt;                   initially appear.&lt;BR /&gt;&lt;BR /&gt;                   Obviously, data security and sensitivity, the costs&lt;BR /&gt;                   of exposure, applicable legal or administrative&lt;BR /&gt;                   requirements (DoD, HIPPA or otherwise), and the&lt;BR /&gt;                   intrinsic value of the data involved are all central&lt;BR /&gt;                   factors in this discussion and in the decision of the&lt;BR /&gt;                   appropriate resolution, as is the value of the storage&lt;BR /&gt;                   hardware involved.&lt;BR /&gt;&lt;BR /&gt;                   With data of greater value or with data exposure&lt;BR /&gt;                   (sometimes far) more costly than the residual value&lt;BR /&gt;                   of the disk storage involved, the physical destruction&lt;BR /&gt;                   of the platters may well be the most expedient,&lt;BR /&gt;                   economical, and appropriate approach. The unintended&lt;BR /&gt;                   exposure of a bad block containing customer healthcare&lt;BR /&gt;                   data or of credit card numbers can quite be costly,&lt;BR /&gt;                   of course, both in terms of the direct loss, and the&lt;BR /&gt;                   longer-term and indirect costs of such exposures.&lt;BR /&gt;&lt;BR /&gt;                   Other potential options include the Freeware RZDISK&lt;BR /&gt;                   package, the OpenVMS INITIALIZE/ERASE command (and&lt;BR /&gt;                   potentially in conjunction with the $erapat system&lt;BR /&gt;                   service) and OpenVMS Ask The Wizard (ATW) topics&lt;BR /&gt;                   including (841), (3926), (4286), (4598), and (7320).&lt;BR /&gt;                   For additional information on sys$erapat, see the&lt;BR /&gt;                   OpenVMS Programming Concepts manual and the OpenVMS&lt;BR /&gt;                   VAX examples module SYS$EXAMPLES:DOD_ERAPAT.MAR. Some&lt;BR /&gt;                   disk controllers and even a few disks contain support&lt;BR /&gt;                   for data erasure. Some DSSI Disk ISEs, for instance.&lt;BR /&gt;&lt;BR /&gt;                   For the prevention of casual disk data exposures,&lt;BR /&gt;                   a generic INITIALIZE/ERASE operation is probably&lt;BR /&gt;                   sufficient. This is not completely reliable,&lt;BR /&gt;                   particularly if the data is valuable, or if legal,&lt;BR /&gt;                   administrative or contractual restrictions are&lt;BR /&gt;                   stringent-there may well be revectored blocks that&lt;BR /&gt;                   are not overwritten or not completely overwritten by&lt;BR /&gt;                   this erasure, as discussed above, and these blocks can&lt;BR /&gt;                   obviously contain at least part of most any data that&lt;BR /&gt;                   was stored on the disk - but this basic disk overwrite&lt;BR /&gt;                   operation is likely sufficient to prevent the typical&lt;BR /&gt;                   information disclosures.&lt;BR /&gt;&lt;BR /&gt;                   You will want to consult with your site security&lt;BR /&gt;                   officer, your corporate security or legal office, with&lt;BR /&gt;                   HP Services or your prefered service organization,&lt;BR /&gt;                   or with a firm that specializes in erasure or data&lt;BR /&gt;                   declassification tasks. HP Services does traditionally&lt;BR /&gt;                   offer a secure disk declassification service.&lt;BR /&gt;</description>
    <pubDate>Tue, 20 Mar 2007 14:00:55 GMT</pubDate>
    <dc:creator>Hoff</dc:creator>
    <dc:date>2007-03-20T14:00:55Z</dc:date>
    <item>
      <title>INIT/ERASE</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035063#M24237</link>
      <description>I have some disk I need to destro data on.&lt;BR /&gt;I was thinking of booting from the OpenVMS CD and using INIT/ERASE ...Run it 7 times on each disk. After a few days ...Finished.&lt;BR /&gt;&lt;BR /&gt;On my PC I have data shredders that conform to US DOD 7 pass erase standards etc etc ...&lt;BR /&gt;&lt;BR /&gt;What does INIT/ERASE overwrite the disk with ?&lt;BR /&gt;Is it random 1's and 0's ?&lt;BR /&gt;&lt;BR /&gt;The best solution I suppose is to send the disk to a disk destruction company.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Mar 2007 10:51:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035063#M24237</guid>
      <dc:creator>Kevin Raven (UK)</dc:creator>
      <dc:date>2007-03-20T10:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: INIT/ERASE</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035064#M24238</link>
      <description>BAD LIVES&lt;BR /&gt;&lt;BR /&gt;If you were around when PDPs roamed the datacenter and spent your nights running BAD from bootable tapes.&lt;BR /&gt;&lt;BR /&gt;$ ANALYZE/MEDIA/EXERCISE=FULL (/pattern=) &lt;BR /&gt;&lt;BR /&gt;I can point you at the utility, you need to review if this meets your requirements, possibily with an auditor or security person.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/doc/73final/documentation/pdf/OVMS_BAD_BLK_UTIL.pdf" target="_blank"&gt;http://h71000.www7.hp.com/doc/73final/documentation/pdf/OVMS_BAD_BLK_UTIL.pdf&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Andy Bustamante</description>
      <pubDate>Tue, 20 Mar 2007 13:34:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035064#M24238</guid>
      <dc:creator>Andy Bustamante</dc:creator>
      <dc:date>2007-03-20T13:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: INIT/ERASE</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035065#M24239</link>
      <description>If you're even asking the question, erase (zeros or otherwise) and then slag the disk.  Disks just aren't worth all that much on the used market, and certainly aren't worth the hassle.&lt;BR /&gt;&lt;BR /&gt;On OpenVMS, you can load a pattern erasure via the $erapat mechanisms.  The default is all zeros, but you can select a DoD pattern by loading an $erapat -- and the source code of one version is provided with various OpenVMS distributions.&lt;BR /&gt;&lt;BR /&gt;For some existing discussions of disk data remanence and secure disk data erasure, start at:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/wizard/wiz_4598.html" target="_blank"&gt;http://h71000.www7.hp.com/wizard/wiz_4598.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;There's also a discussion of BAD (and low-level SCSI operations) over in the ATW area, at:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/wizard/wiz_6926.html" target="_blank"&gt;http://h71000.www7.hp.com/wizard/wiz_6926.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The attached text is from the OpenVMS FAQ at &lt;A href="http://www.hoffmanlabs.com/vmsfaq/" target="_blank"&gt;www.hoffmanlabs.com/vmsfaq/&lt;/A&gt; ...   Other discussions are available, and can be reviewed by you or your site information security folks.&lt;BR /&gt;&lt;BR /&gt;Stephen Hoffman&lt;BR /&gt;HoffmanLabs&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;--&lt;BR /&gt;&lt;BR /&gt;        5.42.6  How to perform a DoD security disk erasure?&lt;BR /&gt;&lt;BR /&gt;                   Sometimes refered to as disk, tape, or media&lt;BR /&gt;                   declassification, as formatting, as pattern erasure,&lt;BR /&gt;                   or occasionally by the generic reference of data&lt;BR /&gt;                   remanence. Various references to the US Deparment of&lt;BR /&gt;                   Defence (DoD) or NCSC "Rainbow Books" documentation are&lt;BR /&gt;                   also seen in this context.&lt;BR /&gt;&lt;BR /&gt;                   While this erasure task might initially appear quite&lt;BR /&gt;                   easy, basic characteristics of the storage media and&lt;BR /&gt;                   of the device error recovery and bad block handling&lt;BR /&gt;                   can make this effort far more difficult than it might&lt;BR /&gt;                   initially appear.&lt;BR /&gt;&lt;BR /&gt;                   Obviously, data security and sensitivity, the costs&lt;BR /&gt;                   of exposure, applicable legal or administrative&lt;BR /&gt;                   requirements (DoD, HIPPA or otherwise), and the&lt;BR /&gt;                   intrinsic value of the data involved are all central&lt;BR /&gt;                   factors in this discussion and in the decision of the&lt;BR /&gt;                   appropriate resolution, as is the value of the storage&lt;BR /&gt;                   hardware involved.&lt;BR /&gt;&lt;BR /&gt;                   With data of greater value or with data exposure&lt;BR /&gt;                   (sometimes far) more costly than the residual value&lt;BR /&gt;                   of the disk storage involved, the physical destruction&lt;BR /&gt;                   of the platters may well be the most expedient,&lt;BR /&gt;                   economical, and appropriate approach. The unintended&lt;BR /&gt;                   exposure of a bad block containing customer healthcare&lt;BR /&gt;                   data or of credit card numbers can quite be costly,&lt;BR /&gt;                   of course, both in terms of the direct loss, and the&lt;BR /&gt;                   longer-term and indirect costs of such exposures.&lt;BR /&gt;&lt;BR /&gt;                   Other potential options include the Freeware RZDISK&lt;BR /&gt;                   package, the OpenVMS INITIALIZE/ERASE command (and&lt;BR /&gt;                   potentially in conjunction with the $erapat system&lt;BR /&gt;                   service) and OpenVMS Ask The Wizard (ATW) topics&lt;BR /&gt;                   including (841), (3926), (4286), (4598), and (7320).&lt;BR /&gt;                   For additional information on sys$erapat, see the&lt;BR /&gt;                   OpenVMS Programming Concepts manual and the OpenVMS&lt;BR /&gt;                   VAX examples module SYS$EXAMPLES:DOD_ERAPAT.MAR. Some&lt;BR /&gt;                   disk controllers and even a few disks contain support&lt;BR /&gt;                   for data erasure. Some DSSI Disk ISEs, for instance.&lt;BR /&gt;&lt;BR /&gt;                   For the prevention of casual disk data exposures,&lt;BR /&gt;                   a generic INITIALIZE/ERASE operation is probably&lt;BR /&gt;                   sufficient. This is not completely reliable,&lt;BR /&gt;                   particularly if the data is valuable, or if legal,&lt;BR /&gt;                   administrative or contractual restrictions are&lt;BR /&gt;                   stringent-there may well be revectored blocks that&lt;BR /&gt;                   are not overwritten or not completely overwritten by&lt;BR /&gt;                   this erasure, as discussed above, and these blocks can&lt;BR /&gt;                   obviously contain at least part of most any data that&lt;BR /&gt;                   was stored on the disk - but this basic disk overwrite&lt;BR /&gt;                   operation is likely sufficient to prevent the typical&lt;BR /&gt;                   information disclosures.&lt;BR /&gt;&lt;BR /&gt;                   You will want to consult with your site security&lt;BR /&gt;                   officer, your corporate security or legal office, with&lt;BR /&gt;                   HP Services or your prefered service organization,&lt;BR /&gt;                   or with a firm that specializes in erasure or data&lt;BR /&gt;                   declassification tasks. HP Services does traditionally&lt;BR /&gt;                   offer a secure disk declassification service.&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Mar 2007 14:00:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035065#M24239</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2007-03-20T14:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: INIT/ERASE</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035066#M24240</link>
      <description>Kevin,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;using INIT/ERASE ...Run it 7 times on each&lt;BR /&gt;&amp;gt;disk. After a few days ...Finished.&lt;BR /&gt;&lt;BR /&gt;  INIT/ERASE writes zeros (it has to so it can be used to init volumes to be put into a shadow set). That probably won't satisfy serious data erasure standards. It's fairly easy and fast to write a program which does block LOG_IO in a spiral write to hit every allocatable block on the disk with whatever you like. Even faster if you do multiple asynch streams. BUT you won't necessarily nuke ALL the data on the disk. There may be meta data, or replaced bad blocks, which the truly paranoid might consider a potential risk (of course if you actually WANT to recover the data, you often can't get it from a perfectly good disk, even without erasure attempts!)&lt;BR /&gt;&lt;BR /&gt;&amp;gt;The best solution I suppose is to send &lt;BR /&gt;&amp;gt;the disk to a disk destruction company&lt;BR /&gt;&lt;BR /&gt;  How much does it cost? What about the risk of diversion? How do you know they don't just on sell them?&lt;BR /&gt;&lt;BR /&gt;Might be simpler and cheaper just to bring a hammer to work so you and your colleagues to vent their cumulative frustrations against computers (you might even be able to charge a fee for the privilege ;-)</description>
      <pubDate>Tue, 20 Mar 2007 23:12:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035066#M24240</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2007-03-20T23:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: INIT/ERASE</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035067#M24241</link>
      <description>It's still best to do some kind of data overwrite before physically damaging the drives.  While there might be great personal satisfaction in taking a sledge hammer to a drive(a la TK50 Field Modification ECO, VAX Magic circa 1988?), simply whacking the drives doesn't guarantee that some clever person won't be able to examine fragments of a platter with the right kind of device to extract meaningful bits.  A proper destruction will destroy the actual media substrate so there is actually nothing recognizable left.&lt;BR /&gt;&lt;BR /&gt;Robert</description>
      <pubDate>Wed, 21 Mar 2007 08:50:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035067#M24241</guid>
      <dc:creator>Robert_Boyd</dc:creator>
      <dc:date>2007-03-21T08:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: INIT/ERASE</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035068#M24242</link>
      <description>Thanks everyone for the responses.&lt;BR /&gt;I have found a company that minces disc drives into dust. Our Audit department will verify their validity as a trusted company.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Cheers&lt;BR /&gt;Kevin&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Mar 2007 09:22:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/init-erase/m-p/5035068#M24242</guid>
      <dc:creator>Kevin Raven (UK)</dc:creator>
      <dc:date>2007-03-21T09:22:08Z</dc:date>
    </item>
  </channel>
</rss>

