<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DOD Erase pattern on Alpha VMS in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576518#M69514</link>
    <description>Ian,&lt;BR /&gt;&lt;BR /&gt;  I haven't got the VAX example to work, but I could send you the source for the Alpha version of the loadable system service. Interesting example - the LINK options file contains more lines than the MACRO32 code!&lt;BR /&gt;&lt;BR /&gt;  Send me mail if you're interested.&lt;BR /&gt;&lt;BR /&gt;(on the other hand, some judicious PATCHing of the exec image, or run time memory might be quicker and simpler)</description>
    <pubDate>Tue, 05 Jul 2005 19:50:09 GMT</pubDate>
    <dc:creator>John Gillings</dc:creator>
    <dc:date>2005-07-05T19:50:09Z</dc:date>
    <item>
      <title>DOD Erase pattern on Alpha VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576517#M69513</link>
      <description>On VAX VMS in SYS$EXAMPES:DOD_ERAPAT.MAR is example code to modify the erase pattern used by INIT/ERASE and DEL/ERASE to the DOD one. Has anyone got this to work on VMS Alpha (V7.3-1 ideally)?&lt;BR /&gt;</description>
      <pubDate>Tue, 05 Jul 2005 13:43:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576517#M69513</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2005-07-05T13:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: DOD Erase pattern on Alpha VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576518#M69514</link>
      <description>Ian,&lt;BR /&gt;&lt;BR /&gt;  I haven't got the VAX example to work, but I could send you the source for the Alpha version of the loadable system service. Interesting example - the LINK options file contains more lines than the MACRO32 code!&lt;BR /&gt;&lt;BR /&gt;  Send me mail if you're interested.&lt;BR /&gt;&lt;BR /&gt;(on the other hand, some judicious PATCHing of the exec image, or run time memory might be quicker and simpler)</description>
      <pubDate>Tue, 05 Jul 2005 19:50:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576518#M69514</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2005-07-05T19:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: DOD Erase pattern on Alpha VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576519#M69515</link>
      <description>Try looking at analyze/media/exercise</description>
      <pubDate>Wed, 06 Jul 2005 12:58:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576519#M69515</guid>
      <dc:creator>Cass Witkowski</dc:creator>
      <dc:date>2005-07-06T12:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: DOD Erase pattern on Alpha VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576520#M69516</link>
      <description>John, I will be in touch. I know what you mean about the link options file having recently done a loadable execlet myself.&lt;BR /&gt;&lt;BR /&gt;Cass - ANALYZE/MEDIA/EXERCISE=FULL&lt;BR /&gt;looks to me like it does the correct thing i.e.  writes all 0, all 1 and a worse case pattern (whatever that is) - this sounds similar to the three passes of the DOD_ERAPAT code (based on a quick review of the code anyway).&lt;BR /&gt;&lt;BR /&gt;For future reference see&lt;BR /&gt;&lt;A href="http://h71000.www7.hp.com/doc/73final/documentation/pdf/OVMS_BAD_BLK_UTIL.pdf" target="_blank"&gt;http://h71000.www7.hp.com/doc/73final/documentation/pdf/OVMS_BAD_BLK_UTIL.pdf&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Jul 2005 15:07:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576520#M69516</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2005-07-06T15:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: DOD Erase pattern on Alpha VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576521#M69517</link>
      <description>You can also specify a pattern and if need be run this multiple times to meet higher security requirements.&lt;BR /&gt;&lt;BR /&gt;Does anyone know if this exercise existing bad blocks or all areas on the disks that data could be written to?</description>
      <pubDate>Wed, 06 Jul 2005 15:21:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576521#M69517</guid>
      <dc:creator>Cass Witkowski</dc:creator>
      <dc:date>2005-07-06T15:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: DOD Erase pattern on Alpha VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576522#M69518</link>
      <description>Cass,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;Does anyone know if this exercise &lt;BR /&gt;&amp;gt;existing bad blocks or all areas &lt;BR /&gt;&amp;gt;on the disks that data could be &lt;BR /&gt;&amp;gt;written to? &lt;BR /&gt;&lt;BR /&gt;  That depends on "who" deals with the bad blocks. Some controllers handle so the quarrantined blocks are inaccessible from the operating system. In those cases ANALYZE/MEDIA can't touch them.&lt;BR /&gt;&lt;BR /&gt;  If the bad blocks are dealt with by the operating system, when detected they are allocated to the system file BADBLK.SYS. Since they're allocated, they can't be used by other files, but they're still accessible. ANALYZE/MEDIA could exercise them (that's assuming it doesn't have special case code to skip that file).&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Jul 2005 17:57:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576522#M69518</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2005-07-06T17:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: DOD Erase pattern on Alpha VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576523#M69519</link>
      <description>Please be aware that DOD-class erasure is an interesting problem in not only what you write BUT also the level to which you have to certify the erasure.  I'm at a Navy site so I have run afoul of this exact problem.&lt;BR /&gt;&lt;BR /&gt;If you are merely erasing a disk that will stay in the machine and your site security policy allows it, you are actually not required to erase anything.  Just set the volume to high-watermarking.  (You DO need to control who has LOG_IO and PHY_IO.)&lt;BR /&gt;&lt;BR /&gt;If you are erasing a disk that is to be removed from the machine, if it is UNCLASS, you still don't need to do anything except a simple erasure.  Only if your machine is classified SBU / FOUO or higher do you need to worry about true erasure.  &lt;BR /&gt;&lt;BR /&gt;In THAT case, unless you have submitted the erasure program to one of the certification agencies, it is not a "legal" erasure anyway.  Unless you have a certified program, the ONLY legal methods of erasing a removed disk are to destroy it.  We have a stockroom full of disks waiting for the arrival of a degausser that works through metal disk shells.  If that doesn't show up soon, our eventual alternative will be a 16-pound sledgehammer and we'll probably give everyone three hits for a dollar.&lt;BR /&gt;&lt;BR /&gt;Of course, if you are replacing a disk 'cause it failed, your ONLY recourses are degaussers and sledgehammers.  We had to get a special clause in our service contract to allow for destruction of disks because our nearest parts depot won't certify that they degaussed the disk.  If you were working on DOD machines, you know you ain't finished 'til the paper work is done, and if you can't get it certified as erased, it ain't erased.&lt;BR /&gt;&lt;BR /&gt;Now, as to what it actually takes.... The old method of writing all 1, all 0, alternating 1/0 and then 0/1 ... all fail if you have a disk that uses RLL2 encoding schemes.  (RLL = run length limited, a form of compression.)  These days, RLL or RLL2 is pretty common.  Higher versions are also possible.  Writing a pattern of all 1 or all 0 just sets or clears about 1 byte.  Someone could then run a diagnostic read to see the remaining data anyway.  If you are using RLL2 encoded disks, you need to write buffers full of patterns such as&lt;BR /&gt;&lt;BR /&gt;0x924964  or  0x6DB6DB&lt;BR /&gt;&lt;BR /&gt;which are non-repeating bit streams just long enough to thwart the encoding and compression scheme.  You could also try to generate a buffer of random bytes using a random number generator, which will also defeat RLL encoders.&lt;BR /&gt;&lt;BR /&gt;But like I said, this all depends on whether you need the erasure certified.  If you do, you need to get the erase program certified.  Otherwise it will not count.&lt;BR /&gt;</description>
      <pubDate>Mon, 18 Jul 2005 09:21:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/dod-erase-pattern-on-alpha-vms/m-p/3576523#M69519</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2005-07-18T09:21:44Z</dc:date>
    </item>
  </channel>
</rss>

