secure-delete * package name in debian (sdmem: secure-delete memory)
Patrick:
time sudo sdmem -v
Wipe mode is secure (38 special passes)
Using /dev/urandom for random input.
real 1m40.819s
user 0m0.072s
sys 0m0.163s
Patrick:
time sudo sdmem -l -l -v
Wipe mode is insecure (one pass with 0x00)
real 0m0.503s
user 0m0.008s
sys 0m0.089s
Happen to me, i opened xfce-terminal and start moving it right and left until the screen freezed permanently (play for less than 3 minutes with anything like browse some stuff and open close terminal…).
1 Like
Huge progress has been made.
Implemented by dracut module cold-boot-attack-defense
(by security-misc ).
Will in near future be available for Kicksecure hosts. Should be easy to port to other Linux distributions.
See design documentation, review welcome:
More documentation, call for testers coming in near future.
1 Like
Future design (additional kexec based RAM wipe) has been elaborated:
https://www.kicksecure.com/wiki/Dev/RAM_Wipe#Future_Design
I’ll try to assign this task to implement also the future design to a contractor. Hopefully there will be a good news soon.
Patrick
January 9, 2023, 12:03pm
49
Patrick
February 6, 2023, 7:24pm
51
This was implemented.
ram-wipe wipes the RAM twice during poweroff/reboot.
1. RAM Wipe Pass 1/2: During poweroff/reboot.
2. RAM Wipe Pass 2/2: It kexec’s into a new kernel for the purpose of overwriting the first kernel’s memory and performs a second ram wipe pass.
A dedicated user documentation wiki page has been created:
Patrick
February 8, 2023, 11:38am
52
If the following feature request gets implemented in memtest86+ that might result in a major security improvement for ram-wipe:
opened 11:37AM - 08 Feb 23 UTC
[`ram-wipe`](https://www.kicksecure.com/wiki/Ram-wipe) ([source code](https://gi… thub.com/Kicksecure/ram-wipe)) ([design](https://www.kicksecure.com/wiki/Dev/RAM_Wipe)) is a software package that attempts to mitigate the threat of [cold boot attacks](https://en.wikipedia.org/wiki/Cold_boot_attack) as recently been developed (now primarily maintained by me).
`ram-wipe` is currently based on `dracut` and `sdmem`. `dracut` seems very suitable for this task. In essence, `ram-wipe` drops back to initrd ("exitrd") at shutdown when all devices are already unmounted very late in the shutdown process, uses `sdmem` to overwrite all RAM, then `kexec`'s into a new (the same) kernel and does another pass of RAM wipe (to wipe the ram of the previous kernel). However, `sdmem` seems [unmaintained upstream](https://github.com/cryptisk-grs/thc-secure-delete/issues/3#issuecomment-520754476) and [has other issues](https://www.kicksecure.com/wiki/Ram-wipe#ram-wipe_Known_Issues).
Research by [Tails](https://tails.boum.org/) seems to indicate that `memtest86+` is very suitable for wiping RAM at shutdown in principle. Much better than `sdmem`. See Tails blueprint [Erase memory: the memtest86+ way](https://gitlab.tails.boum.org/tails/blueprints/-/wikis/more_efficient_memory_wipe/memtest86plus).
What would be need to be done at the memtest86+ side:
* Support by memtest86+ to be booted using `kexec`.
* Accept kernel command line parameters such as:
* `wiperamaction`:
* Overwrite all RAM once with zeros.
* The action to perform after wiping the RAM.
* `wiperamaction="poweroff"`
* `wiperamaction="reboot"`
* `wiperamaction="halt"`
* Show a simple progress meter / messages for user.
Such a feature might be appreciated by both [Kicksecure](https://www.kicksecure.com) and Tails, which are derivatives of Debian Linux as well as other users who discussed, requested a wipe RAM at shutdown feature all over the internet over the years. (Note, that I cannot speak on behalf of Tails.)
Would you be interested to add a feature to memtest86+ to accommodate this use case or accept a patch?