Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Documentation: Sata and SAS SSD support #272

Open
fthobe opened this issue Aug 19, 2024 · 1 comment
Open

Documentation: Sata and SAS SSD support #272

fthobe opened this issue Aug 19, 2024 · 1 comment

Comments

@fthobe
Copy link
Contributor

fthobe commented Aug 19, 2024

Issue

The current documentation does not outline the state of features regarding the process of sanitising SSDs (neither SAS / SCSI nor Sata). Information is scattered across multiple issues leaving a lot of unclarity.

Therefor I pose following questions to later on produce a merge request against the current documentation and where necessary and (if desired) evaluate the sponsoring for the closing eventual gaps in functionality by our organisation.

  1. Can SSDs currently be wiped with the same degree of security as rotating disks?
  2. If not, what are the information lacking?
  3. Plenty of manufacturers offer Linux Tools for sanitisation of SSDs, are those currently utilized?
  4. Should manufacturer tools be implemented if the are provided in a Linux version?
  5. If manufacturer tools should not be implemented what is the reasoning behind it?

Background

SSDs have been a dramatically growing segment within the storage technology space posing new challenges to the sanitisation of storage media when reaching end of life events. Particular challenges are caused by the fact that control over data allocation on the disk is left to intransparent controllers and / or firmwares. Some manufacturers do provide sanitisation tools for linux, while others do not.

By 2022 the situation was following:

Manufacturer Marketshare Wipe Tool
Samsung 53.60% Samsung DC Toolkit 2.1
Intel 15.20% Solidigm™ Storage Tool
Western Digital / Sandisk 7.30% N/A (supports SAS / SCSI format unit command)
SK Hynix 8.60% Unconfirmed for Linux
Kioxia 7.10% Unconfirmed for Linux
Micron 5.60% Unconfirmed for Linux
Kingston 0.20% Unconfirmed for Linux
Others 2.40% N/A

The increase of usage of directly PCI attached storage technologies such as NVME and the growing market share of large size SSD s make lack of documentation and control over sanitisation an ever increasing vector of attack for data theft. Many companies rely therefor on physical destruction (eg shredding) to avoid missuse, but plenty are not sufficiently informed about the neccessaty to approach data sanitisation differently on solid state disks.

Notes

This issue has been crossposted to nwipe.

@PartialVolume
Copy link
Owner

Anybody that would like to add to this discussion, please can you comment on the nwipe issue linked below, so we can keep the comments in the same thread. Thanks.

martijnvanbrummelen/nwipe#587

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants