MAAS should use secure disk erase, when possible

Bug #1507724 reported by Dustin Kirkland 
10
This bug affects 2 people
Affects Status Importance Assigned to Milestone
MAAS
Fix Released
Wishlist
Blake Rouse

Bug Description

Recently, MAAS added a feature to securely wipe disks in between provisioning runs, to secure user data from one machine usage to another. This was, roughly speaking, the feature request in Bug #1308194.

The current implementation actually rewrites all of the data using either dd or shred (I'm not sure which, honestly).

In any case, it's incredibly slow, especially on very large hard drives.

Many new drives, especially SSDs, have a feature colloquially known as "Secure Disk Erase". In short, all data is encrypted on the drive itself by the disk controller with a key that never leaves the firmware of the device. That key can be erased (or, in fact, rekeyed) very efficiently, and render all of the data on the device unreadable, more efficiently than dd or shred.

For more information, see:

https://ata.wiki.kernel.org/index.php/ATA_Secure_Erase

MAAS should, opportunistically, use this erase procedure whenever possible.

Cheers,
Dustin

Revision history for this message
Dustin Kirkland  (kirkland) wrote :

All the magic is in hdparm!

Changed in maas:
assignee: nobody → Blake Rouse (blake-rouse)
importance: Undecided → Wishlist
status: New → Triaged
milestone: none → 1.9.0
Revision history for this message
Christian Reis (kiko) wrote :

See also bug 1507745

Changed in maas:
milestone: 1.9.0 → 2.0.0
Changed in maas:
milestone: 2.0.0 → 2.1.0
Changed in maas:
status: Triaged → Fix Committed
Changed in maas:
milestone: 2.0.1 → 2.1.0
Changed in maas:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.