wipe(1)


NAME

   wipe - securely erase files from magnetic media

SYNOPSIS

   wipe [options] path1 path2 ... pathn

CURRENT-VERSION

   This  manual  page  describes  version 0.22 of wipe , released November
   2010.

DESCRIPTION

   Recovery of supposedly erased data from magnetic media is  easier  than
   what  many  people  would  like to believe. A technique called Magnetic
   Force Microscopy (MFM) allows any moderately funded opponent to recover
   the  last  two or three layers of data written to disk; wipe repeatedly
   overwrites special patterns to the files to  be  destroyed,  using  the
   fsync()  call  and/or  the  O_SYNC  bit to force disk access. In normal
   mode, 34 patterns are used (of which 8 are random). These patterns were
   recommended      in      an      article     from     Peter     Gutmann
   (pgut001@cs.auckland.ac.nz) entitled  "Secure  Deletion  of  Data  from
   Magnetic  and  Solid-State  Memory".  The  normal  mode takes 35 passes
   (0-34). A quick mode allows you  to  use  only  4  passes  with  random
   patterns, which is of course much less secure.

NOTE ABOUT JOURNALING FILESYSTEMS AND SOME RECOMMENDATIONS (JUNE 2004)

   Journaling filesystems (such as Ext3 or ReiserFS) are now being used by
   default by most Linux distributions.  No secure deletion  program  that
   does  filesystem-level  calls  can  sanitize files on such filesystems,
   because sensitive data and metadata can  be  written  to  the  journal,
   which  cannot  be readily accessed.  Per-file secure deletion is better
   implemented in the operating system.

   Encrypting a whole partition with cryptoloop,  for  example,  does  not
   help  very  much  either,  since  there  is  a  single  key for all the
   partition.

   Therefore wipe is best used to sanitize a harddisk before giving it  to
   untrusted parties (i.e. sending your laptop for repair, or selling your
   disk).  Wiping size issues have been hopefully fixed (I  apologize  for
   the long delay).

   Be  aware that harddisks are quite intelligent beasts those days.  They
   transparently remap defective blocks.  This means  that  the  disk  can
   keep   an  albeit  corrupted  (maybe  slightly)  but  inaccessible  and
   unerasable copy of some of your data.  Modern disks are  said  to  have
   about  100%  transparent  remapping  capacity.   You can have a look at
   recent discussions on Slashdot.

   I hereby speculate that harddisks can use the spare remapping  area  to
   secretly  make  copies of your data.  Rising totalitarianism makes this
   almost a certitude.  It is  quite  straightforward  to  implement  some
   simple  filtering schemes that would copy potentially interesting data.
   Better, a harddisk can probably detect  that  a  given  file  is  being
   wiped,  and  silently  make  a copy of it, while wiping the original as
   instructed.

   Recovering such data is  probably  easily  done  with  secret  IDE/SCSI
   commands.   My  guess  is  that  there  are agreements between harddisk
   manufacturers  and  government  agencies.   Well-funded  mafia  hackers
   should then be able to find those secret commands too.

   Don't trust your harddisk.  Encrypt all your data.

   Of  course  this shifts the trust to the computing system, the CPU, and
   so on.  I guess there are also "traps" in the  CPU  and,  in  fact,  in
   every  sufficiently  advanced  mass-marketed chip.  Wealthy nations can
   find those.  Therefore these are mainly used for criminal investigation
   and "control of public dissent".

   People  should  better  think  of their computing devices as facilities
   lended by the DHS.

IMPORTANT WARNING -- READ CAREFULLY

   The author, the maintainers or the contributors of this package can NOT
   be  held  responsible  in any way if wipe destroys something you didn't
   want it to destroy.  Let's make this very clear. I want you  to  assume
   that  this  is  a  nasty program that will wipe out parts of your files
   that you didn't want it to wipe. So whatever happens after  you  launch
   wipe  is  your entire responsibility.  In particular, no one guarantees
   that wipe will conform to the specifications given in this manual page.

   Similarly, we cannot guarantee that wipe will actually erase  data,  or
   that  wiped  data  is not recoverable by advanced means.  So if nasties
   get your secrets because you sold a wiped harddisk to someone you don't
   know, well, too bad for you.

   The  best  way  to  sanitize  a  storage  medium  is  to  subject it to
   temperatures exceeding 1500K.  As a cheap alternative,  you  might  use
   wipe  at  your  own  risk. Be aware that it is very difficult to assess
   whether running wipe on a given  file  will  actually  wipe  it  --  it
   depends  on  an awful lot of factors, such as : the type of file system
   the file resides on (in  particular,  whether  the  file  system  is  a
   journaling  one or not), the type of storage medium used, and the least
   significant bit of the phase of the moon.

   Wiping over NFS or over a journalling filesystem (ReiserFS  etc.)  will
   most probably not work.

   Therefore   I   strongly   recommend  to  call  wipe  directly  on  the
   corresponding block device with the appropriate options.  However  THIS
   IS  AN  EXTREMELY DANGEROUS THING TO DO.  Be sure to be sober. Give the
   right options. In particular : don't wipe a whole  harddisk  (eg.  wipe
   -kD  /dev/hda  is bad) since this will destroy your master boot record.
   Bad idea. Prefer wiping partitions (eg. wipe -kD  /dev/hda2)  is  good,
   provided, of course, that you have backed up all necessary data.

COMMAND-LINE OPTIONS

   -f (force; disable confirmation query)
        By  default  wipe will ask for confirmation, indicating the number
        of regular and special files  and  directories  specified  on  the
        command  line.  You  must  type  "yes"  for confirmation, "no" for
        rejection. You can disable the  confirmation  query  with  the  -f
        (force) option.

   -r (recurse into subdirectories)
        Will  allow  the  removal  of  the entire directory tree. Symbolic
        links are not followed.

   -c (chmod if necessary)
        If a file or directory to be wiped has no write  permissions  set,
        will do a chmod to set the permission.

   -i (informational, verbose mode)
        This  enables  reporting to stdout. By default all data is written
        to stderr.

   -s (silent mode)
        All messages, except the confirmation prompt and  error  messages,
        are suppressed.

   -q (quick wipe)
        If  this option is used, wipe will only make (by default) 4 passes
        on each file, writing random data. See option -Q

   -Q <number-of-passes>
        Sets the number of passes for quick wiping.  Default  is  4.  This
        option requires -q.

   -a (abort on error)
        The  program  will  exit with EXIT_FAILURE if a non-fatal error is
        encountered.

   -R (set random device OR random seed command)

        With this option which requires an argument  you  can  specify  an
        alternate  /dev/random  device, or a command who's standard output
        will be hashed using MD5-hashed. The distinction can be made using
        the -S option.

   -S (random seed method)

        This option takes a single-character argument, which specifies how
        the random device/random seed argument is to be used. The  default
        random device is /dev/random. It can be set using the -R option.

   The possible single-character arguments are:
   r    If   you   want   the  argument  to  be  treated  like  a  regular
        file/character device. This will work with /dev/random, and  might
        also work with FIFOs and the like.
   c    If  you  want the argument to be executed as a command. The output
        from the command will be hashed using MD5 to provide the  required
        seed. See the WIPE_SEEDPIPE environment variable for more info.
   p    If you want wipe to get its seed by hashing environment variables,
        the current date and time, its process id. etc. (the random device
        argument  will  not  be  used). This is of course the least secure
        setting.

   -M (select pseudo-random number generator algorythm)

   During the random passes, wipe  overwrites  the  target  files  with  a
   stream of binary data, created by the following choice of algorythms:
   l    will use (depending on your system) your libc's random() or rand()
        pseudorandom generator. Note that on most  systems,  rand()  is  a
        linear  congruential  generator, which is awfully weak. The choice
        is made at compile-time  with  the  HAVE_RANDOM  define  (see  the
        Makefile).
   a    will  use  the Arcfour stream cipher as a PRNG. Arcfour happens to
        be compatible with the well-known  RC4  cipher.  This  means  that
        under  the  same key, Arcfour generates exactly the same stream as
        RC4...
   r    will use the fresh RC6 algorythm as a PRNG; RC6 is keyed with  the
        128-bit seed, and then a null block is repeatedly encrypted to get
        the pseudo-random stream.  I guess this sould be quite secure.  Of
        course  RC6  with  20 rounds is slower than random(); the compile-
        time option WEAK_RC6 allows you to use a 4-round version  of  RC6,
        which  is  faster.  In  order  to be able to use RC6, wipe must be
        compiled with ENABLE_RC6 defined; see the  Makefile  for  warnings
        about patent issues.

        In  all  cases  the PRNG is seeded with the data gathered from the
        random device (see -R and -S options).

   -l <length>
        As there can be some problems in determining the actual size of  a
        block  device  (as some devices do not even have fixed sizes, such
        as floppy disks or tapes), you might need to specify the  size  of
        the device by hand; <length> is the device capacity expressed as a
        number of bytes. You can use K (Kilo) to specify multiplication by
        1024,  M  (Mega) to specify multiplication by 1048576, G (Giga) to
        specify multiplication by 1073741824  and  b  (block)  to  specify
        multiplication by 512. Thus

        1024 = 2b = 1K

                            20K33 = 20480+33 = 20513

                            114M32K = 114*1024*1024+32*1024.

   -o <offset>
        This  allows you to specify an offset inside the file or device to
        be wiped. The syntax of <offset> is the same as for the -l option.

   -e   Use exact file size: do not round up file size  to  wipe  possible
        remaining junk on the last block.

   -Z   Don't  try to wipe file sizes by repeatedly halving the file size.
        Note that this is only attempted on regular files so there  is  no
        use if you use wipe for cleaning a block or special device.

   -X <number>
        Skip  a given number of passes.  This is useful to continue wiping
        from a given point when you have been wiping, say,  a  large  disk
        and had to interrupt the operation.  Used with -x.

   -x <pass1>,...,<pass35>
        Specify  the  pass order.  When wipe is interrupted, it will print
        the current randomly selected pass order permutation and the  pass
        number as appropriate -x and -X arguments.

   -F   Don't  try  to wipe file names. Normally, wipe tries to cover file
        names by renaming them; this does NOT guarantee that the  physical
        location holding the old file name gets overwritten.  Furthermore,
        after renaming a file, the only way to make  sure  that  the  name
        change is physically carried out is to call sync (), which flushes
        out ALL the disk caches of  the  system,  whereas  for  ading  and
        writing  one can use the O_SYNC bit to get synchronous I/O for one
        file. As sync () is very slow, calling sync () after every  rename
        () makes filename wiping extremely slow.

   -k   Keep  files:  do  not  unlink  the  files  after  they  have  been
        overwritten. Useful if you want to wipe a  device,  while  keeping
        the device special file. This implies -F.

   -D   Dereference symlinks: by default, wipe will never follow symlinks.
        If you specify -D however, wipe will consent to,  well,  wipe  the
        targets  of  any  symlinks you might happen to name on the command
        line.  You can't specify both -D and -r (recursive) options, first
        because  of  possible  cycles  in  the  symlink-enhanced directory
        graph, I'd have to  keep  track  of  visited  files  to  guarantee
        termination,  which,  you'll  easily  admit,  is a pain in C, and,
        second, for fear of having  a  (surprise!!)  block  device  buried
        somewhere unexpected.

   -v   Show version information and quit.

   -h   Display help.

EXAMPLES

   wipe -rcf /home/berke/plaintext/
        Wipe  every  file  and  every  directory  (option -r) listed under
        /home/berke/plaintext/, including /home/berke/plaintext/.

        Regular files will be wiped with 34 passes and  their  sizes  will
        then  be halved a random number of times. Special files (character
        and block devices, FIFOs...)   will  not.  All  directory  entries
        (files,  special  files  and directories) will be renamed 10 times
        and then unlinked. Things with inappropriate permissions  will  be
        chmod()'ed  (option  -c).   All  of  this will happen without user
        confirmation (option -f).

   wipe -kq /dev/hda3
        Assuming /dev/hda3 is the block device corresponding to the  third
        partition  of  the  master  drive on the primary IDE interface, it
        will be wiped in quick mode (option  -q)  i.e.  with  four  random
        passes.   The  inode  won't  be  renamed  or unlinked (option -k).
        Before starting, it will ask you to type ``yes''.

   wipe -kqD /dev/floppy
        Since wipe never follows symlinks unless explicitly told to do so,
        if  you  want to wipe /dev/floppy which happens to be a symlink to
        /dev/fd0u1440 you will have  to  specify  the  -D  option.  Before
        starting, it will ask you to type ``yes''.

   wipe -rfi >wipe.log /var/log/*
        Here,  wipe  will recursively (option -r) destroy everything under
        /var/log, excepting /var/log.  It  will  not  attempt  to  chmod()
        things.  It  will however be verbose (option -i). It won't ask you
        to type ``yes'' because of the -f option.

   wipe -kq -l 1440K /dev/fd0
        Due to various idiosyncracies of the operating  system,  it's  not
        always  easy  to  obtain  the number of bytes a given device might
        contain (in fact, that quantity can be variable). This is why  you
        sometimes need to tell wipe the amount of bytes to destroy. That's
        what the -l option is for. Plus,  you  can  use  b,K,M  and  G  as
        multipliers,  respectively  for  2^9 (512), 2^10 (1024 or a Kilo),
        2^20 (a Mega) and 2^30 (a Giga) bytes.  You can even combine  more
        than one multiplier !! So that 1M416K = 1474560 bytes.

BUGS/LIMITATIONS

   Wipe  should  work  on harddisks and floppy disks; however the internal
   cache of some harddisks might prevent the necessary writes to  be  done
   to  the  magnetic  surface. It would be funny to use it over NFS. Under
   CFS (Cryptographic File System) the fsync() call has  no  effect;  wipe
   has  not  much  use  under  it  anyway  -  use  wipe  directly  on  the
   corresponding encrypted files. Also, under Linux, when using  a  device
   mounted thru a loopback device, synchronous I/O does not get propagated
   cleanly.

   For wiping floppy disks, at least under Linux, there is no way, besides
   obscure  floppy-driver  specific ioctl's to determine the block size of
   the disk. In particular, the BLKGETSIZE ioctl is not implemented in the
   floppy  driver.  So,  for wiping floppies, you must specify the size of
   the floppy disk using the -l option,  as  in  the  last  example.  This
   option  is  normally not needed for other fixed block devices, like IDE
   and SCSI devices.

   File name wiping is implemented since version 0.12. I  don't  know  how
   efficient  it  is.  It  first changes the name of the file to a random-
   generated name of same length, calls sync (), then changes the name  to
   a random-generated name of maximal length.

   File  size  wiping  is implemented by repeatedly truncating the file to
   half of its size, until it becomes empty; sync  ()  is  called  between
   such operations.

   Note that it is still not possible to file creation date and permission
   bits portably. A wipe utility working at the block device  level  could
   be written using the ext2fs library.

AUTHOR AND LICENCE

   Wipe  was  written  by Berke Durak (to find my email address, just type
   echo berke1ouvaton2org|tr 12 @.  in a shell).

   Wipe is released  under  the  conditions  of  the  GNU  General  Public
   License.

FILES

   /dev/random  is  used  by  default  to  seed  the  pseudo-random number
   generators.

ENVIRONMENT VARIABLES

   WIPE_SEEDPIPE If set, wipe will execute the  command  specified  in  it
   (using  popen()),  and  will  hash  the  command's  output with the MD5
   message-digest algorythm to get  a  128-bit  seed  for  its  PRNG.  For
   example,  on  systems lacking a /dev/random device, this variable might
   be set in  /etc/profile  to  a  shell  script  which  contains  various
   commands   such   as  ls,  ps,  who,  last,  etc.  and  which  are  run
   asynchronously in order  to  get  an  output  as  less  predictable  as
   possible.

SEE ALSO

   open(2), fsync(2), sync(8), bdflush(2), update(8), random(3)





Opportunity


Personal Opportunity - Free software gives you access to billions of dollars of software at no cost. Use this software for your business, personal use or to develop a profitable skill. Access to source code provides access to a level of capabilities/information that companies protect though copyrights. Open source is a core component of the Internet and it is available to you. Leverage the billions of dollars in resources and capabilities to build a career, establish a business or change the world. The potential is endless for those who understand the opportunity.

Business Opportunity - Goldman Sachs, IBM and countless large corporations are leveraging open source to reduce costs, develop products and increase their bottom lines. Learn what these companies know about open source and how open source can give you the advantage.





Free Software


Free Software provides computer programs and capabilities at no cost but more importantly, it provides the freedom to run, edit, contribute to, and share the software. The importance of free software is a matter of access, not price. Software at no cost is a benefit but ownership rights to the software and source code is far more significant.


Free Office Software - The Libre Office suite provides top desktop productivity tools for free. This includes, a word processor, spreadsheet, presentation engine, drawing and flowcharting, database and math applications. Libre Office is available for Linux or Windows.





Free Books


The Free Books Library is a collection of thousands of the most popular public domain books in an online readable format. The collection includes great classical literature and more recent works where the U.S. copyright has expired. These books are yours to read and use without restrictions.


Source Code - Want to change a program or know how it works? Open Source provides the source code for its programs so that anyone can use, modify or learn how to write those programs themselves. Visit the GNU source code repositories to download the source.





Education


Study at Harvard, Stanford or MIT - Open edX provides free online courses from Harvard, MIT, Columbia, UC Berkeley and other top Universities. Hundreds of courses for almost all major subjects and course levels. Open edx also offers some paid courses and selected certifications.


Linux Manual Pages - A man or manual page is a form of software documentation found on Linux/Unix operating systems. Topics covered include computer programs (including library and system calls), formal standards and conventions, and even abstract concepts.