Secure Erase a Crucial M4 SSD

Secure Erase a Crucial M4 SSD

Secure Erase a Crucial M4 SSD

The next suggestion was to throw away half of the broken chips at home, and the other half at work. But I *know* someone will suggest eating the refuse, then “depositing” the processed output in multiple lavatories along the eastern seaboard. Me, I think that’s a bit over the top.

Back To Work

Icing on the tree

Icing on the tree

This morning, I’m back at work. The roads were in okay shape, but there’s still a bit of ice hanging about, a tenth of an inch or less on trees and such.

*      *      *

Once again, I’m happy to relay that DoD reported no US Military casualties during the last week. Ciao!

 

Dead Drive

Dead Intel 320 Series SSD

Dead Intel 320 Series SSD

This SSD wouldn’t keep recognizing its own existence for long enough to even run the SMART tools against it. I ordered a Samsung 840 Pro yesterday, it arrived this morning.

I’ve installed (k)Ubuntu on it, updating now. In a bit I’ll strip the chips off that board, and crush them – that’s the only way to securely destroy data on an SSD.

Today: More house cleaning. Ciao!

Nearly So

Paul guessed that the pictured object was a vertical file holder. Ye..ess, depending on what you’re filing. What I’m filing with it:

Cutting board holder

Cutting board holder

Pushed back to the edge of the counter, the holder keeps the boards from using too much counterspace, while still easily available for use. I made these two boards to replace two bamboo boards that cracked. We’ve also moved our two large boards (including the one made by Marcia’s dad many moons ago) up off the counter and above the fridge. We don’t need those too often.

We hope y’all had a nice holiday (if you celebrate). I’m celebrating by taking the upcoming week mostly off – I’ve got a couple of work tasks during the time, but only a couple at this time. The balance of the time is taken with house cleaning and other indoor chores. For example, I’m pivoting my *NIX system over to the Illumos-backed OpenIndiana distribution. I’ll have some Linux running as virtual machines, but this Solaris fork is going to be an interesting and useful platform for me. Today I’m migrating data onto it from backup disks.

*      *      *

I’m happy to relay that DoD reported no US Military casualties during the last week. That’s definitely something to be thankful for! Ciao!

 

What is it?

What is it?

What is it?

What is it? What would *you* use it for? No, NOT for skinning a cat… It’s almost certainly more boring than you can imagine.

Now, here’s Lexi, curled up on as much girly afghan as she can find:

Lexi on the girly afghan

Lexi on the girly afghan

And for Jen, who hasn’t seen Lexi in a while:

Lexi in a winter jacket

Lexi in a winter jacket

This mutt LOVES crawling up inside our coats when the weather starts getting cold!

Week Off – Objective Completed

Well, I got a fair bit done, and some reading, and learned a bit about Puppet, too! I also got the fence sealed:

Left Side

Left Side

Right side

Right side

They’re coated in Olympic Maximum stain/sealer, “Natural Cedar Tone.” From this vantage, it looks a bit like spray-on suntan, but I’m sure it’ll weather in well. I’ll probably recoat in the spring.

There’s more of course. I finished reading The Hydrogen Sonata. I wish Banks were with us still – there are plenty more tales in Culture Space. I also got through John Arundel’s Puppet 3 Beginner’s Guide. I’ve been wanting to get into Configuration Management for a long time, and haven’t had the cycles to address the issue. Very cool stuff. Overall, a good week. I’ll be doing another one, starting next Saturday, after a “3-on, 1-off, 1-on” work week. Then it’s the death-march to the end of the year, with a brand new project and short timeline deliverables attendant thereupon.

*      *      *

Our condolences to the family and friends of Staff Sgt. Alex A. Viola, 29, of Keller, Texas, who died Nov. 17, in Kandahar, Afghanistan, of wounds suffered when his unit was attacked with an improvised explosive device while on dismounted patrol.

 

 

Holiday Week

I’m burning off a couple of weeks of leave between now and the end of the year. As usual in such times, I start one of those weeks off with a stint of physical labor to kick off the front end.  Yup, it’s time to finish up the fence. Last month I did the left fence sections. Yesterday, I started by cutting the fence sections away from the posts, and setting them aside nearby:

Starting more fence work - fence sections set aside to left

Starting more fence work

The two free-standing posts are problematic. One of them has a 45° twist in it, the other has a serious lean. So they’re coming out. How difficult that’s going to be is a crap shoot. Doing fence sections at the bottom of the yard a few years ago, I had rotting posts set into concrete, and it was a long painful process clearing out the debris. These two? No concrete at all. A bit of waggling, then I screwed a crossbar to each and lifted them clear of the ground:

Post removed in a single lift

Post removed in a single lift

That was followed by stringing a mason’s line from the two end posts, measuring to the place on the line where each new post goes, and using a plumb bob to locate the center of the new holes in the ground. A long, slightly exhausting stint with the post hole digger (pictured above) netted me two 14″ diameter holes, each 42 inches deep. I poured a couple of inches of crusher rock in the bottom of each hole for drainage, and placed, measured, cut, and replaced the posts. After plumbing and securing the posts, more rock went in to secure the bottoms of the posts, then a sack of mixed concrete each for longer term stability:

Posts in place, with concrete.

Posts in place, with concrete.

By this time, the light was starting to fade, but I got all of the 2×4 rails (aka stringers) installed before the day was gone, and then moved the old fence sections back roughly into place and screwed them in to close off the yard for the night.

This morning, after shopping, I hauled the compressor out, and attached all of the pickets. I then marked and cut the arches in the three sections:

Right front fence section nearly done

Right front fence section nearly done

What’s left is to pressure wash the old front facing components, let everything dry for a couple of weeks, then apply a cedar natural tone stain/sealer. But the difficult parts of this job are now done.

*      *      *

Our condolences to the family and friends of Staff Sgt. Richard L. Vazquez, 28, of Seguin, Texas, who died Nov. 13, in Kandahar, Afghanistan, of wounds suffered when his unit was attacked with an improvised explosive device while on dismounted patrol in Panjwai, Afghanistan.

Choresday

That’s my new name for the `day formerly known as Sunday`. Today was full of shopping, laundry, car washing and paint maintenance, coffee roasting, and computer rebuilding.

Only the latter was really interesting. I had a new motherboard/CPU/RAM combo, courtesy of work, to be able to do more VM work here at home. Now the processor is faster and hyperthreaded, and the RAM is faster, and more (32G). I took advantage of the rebuild occasion to remove the old Linux MD device, and installed the ZFSonLinux module and tools. Now my data store is a ZFS raidz1 pool, built from three 1TB drives. Snapshots are better and easier, etc, etc. This makes me very happy.

Moving lots of data at once appears to make ZFSonLinux a little unhappy … freezing the system unhappy. More to explore there.

*      *      *

Our condolences to the family, friends, and unit of Sgt. 1st Class Forrest W. Robertson, 35, of Westmoreland, Kansas, who died Nov. 3, in Pul-E-Alam, Afghanistan, of wounds sustained when enemy forces attacked his unit with small arms fire.

Six Days of LISA ’13

Howdy. My name’s Brian, and I’m a tired SysAdmin…

So, six days of tutorials and talks at the USENIX LISA ’13 conference are done. And it was good. My behind is, however, glad to be shut of those hotel conference chairs.

Sunday, 3 November

Sunday’s full day tutorial was called Securing Linux Servers, and was taught by Rik Farrow, a talented bloke who does security for a living, and is Editor of the USENIX ;login: magazine on the side. We covered the goals of running systems (access to properly executing services) and the attacks that accessibility (physical, network) enable. As always, the more you know, the more frightening running systems connected to networks becomes. We explicitly deconstructed several public exploits of high-value targets, and discussed mitigations that might have made them less likely. User account minimization and root account lockdowns through effective use of the `sudo` command were prominently featured. Proactive patching is highly recommended, too! Passwords, password security, hashing algorithms, and helping users select strong passwords that can be remembered also were a prime topic. Things that Rik wished were better documented online are PAM (Pluggable Authentication Modules) and simple, accessible starter documentation for SELinux.

Monday, 4 November

Hands-on Security for Systems Administrators was the full-day tutorial I attended on Monday. It was taught by Branson Matheson, a consultant and computer security wonk. Branson is an extremely energetic and engaging trainer who held my attention the whole day. We looked at security from the perspective of (informally, in the class) auditing our physical, social, and network vulnerabilities. In the context of the latter, we used a customized virtual build of Kali Linux , a Debian-based pen testing distro. I learned a lot of stuff, and for those things that I “knew”, the refresher was welcome and timely.

Tuesday, 5 November

Tuesday, I took two half-day tutorials.

The first was presented by Ted Ts’o, of Linux kernel and filesystem fame. Our tutorial topic was “Recovering from Linux Hard Drive Disasters.” We spent a couple of hours covering disk drive fundamentals and Linux file systems. The final hour was given over to the stated topic of recovering from assorted disk-based catastrophes. My take-away from this tutorial was two-fold. I think the presentation be better named “Disks, Linux Filesystems, and Disk Disaster Recovery,” which would be more reflective of the distribution of the material. Additionally, it’s worth stating that any single disk disaster is generally mitigated by multi-disk configurations (mirroring, RAID), and accidental data loss is often best covered by frequently taken and tested backups.

The second tutorial I attended, on Tuesday afternoon, was on the topic of “Disaster Recovery Plans: Design, Implementation and Maintenance Using the ITIL Framework.” Seems a bit dry, eh? A bit … boring? Not at all! Jeanne Schock brought the subject material to life, walking us through setting goals and running a project to effectively plan for Disaster Recovery. IMO, it’s documentation, planning, and process that turns the craft of System Administration into a true profession, and these sorts of activities are crucial. Jeanne’s presentation style and methods of engaging the audience are superb. This was my personal favorite of all the tutorials I attended. But … Thanks, Jeanne, for making more work for me!

Wednesday, 6 November

Whew. I was starting to reach brain-full state as the fourth day of tutorials began. I got to spend a full day with Ted Ts’o this time, and it was an excellent full day of training on Linux Performance Tuning. Some stuff I knew, since I’ve been doing this for a while. But the methods that Ted discussed for triaging system and software behaviour, then using the resulting data to prioritize diagnostic activities was very useful. This is a recurring topic at LISA ’13 – go for the low-hanging fruit and obvious stuff: check for CPU, disk, and network bottlenecks with quick commands before delving into one path more deeply. The seemingly obvious culprit may be a red herring. I plan on using the slide deck to construct a performance triage TWiki page at work.

I was in this tutorial when Bruce Schneier spoke (via Skype!) on “Surveillance, the NSA, and Everything.” Bummer.

This was also my last day of Tutorials. In the evening I attended the annual LOPSA meeting. Lots of interesting stuff there, follow the link to learn more about this useful and supportive organization. Yep, I’m a member.

Thursday, 7 November

Yay, today started with track problems on Metro, and an extra 45 minutes standing cheek-to-jowl with a bunch of random folks on a Red Line train.

This was a Technical Sessions and Invited Talks day for me. In the morning, Brendan Gregg presented Blazing Performance with Flame Graphs. Here’s a useful summary on Brendan’s blog. This was followed in the morning by Jon Masters of Red Hat talking about Hyperscale Computing with ARM Servers (which looks to be a cool and not unlikely path), and Ben Rockwood of Joyent discussing Lean Operations. Ben has strong opinions on the profession, and I always learn something from him.

In the afternoon, Brendan Gregg was in front of me again, pitching systems performance issues (and his new book of the same name). I continue to find Brendan’s presentation style a bit over the top, but his technical chops and writing skills are excellent. This was followed by Branson Matheson (who was training me earlier in the week) on the subject of “Hacking your Mind and Emotions” – much about social engineering. Sigh, too easy to do. But Branson is so enthusiastic and excited about his work  that … well, that’s alright, then, eh?

The late afternoon pair of talks were on Enterprise Architecture Beyond the Perimeter (presented by a pair of talented Google Engineers), and Drifting into Fragility, by Matt Provost of Weta Digital. The former was all about authentication and authorization without the classical corporate perimeter – no firewall or VPN between clients and resources. Is it a legitimate client machine, properly secured and patched? With a properly authenticated user? Good, we’re cool. How much secured, authenticated, patched is required is dependent on the resource to be accessed. This seems a bit like a Google-scale problem… The latter talk, on fragility, was a poignant reminder of unintended dependencies and consequences in complex systems and network.

The conference reception was on Thursday evening, but I took a pass, headed home, and went to bed early. I was getting pretty tired by this time.

Friday, 8 November

My early morning session had George Wilson of Delphix talking about ZFS for Everyone, followed by Mark Cavage of Joyent discussing Manta Storage System Internals. I use ZFS, so the first talk held particular interest for me, especially the information about how the disparate ZFS implementations are working to prevent fragmentation by utilizing Feature Flags. OpenZFS.org was also discussed. I didn’t know much about Manta except that it exists, but I know a bit more now, and … it’s cool. I don’t have a use, today, but it’s definitely cool.

The late morning session I attended was a two-fer on the topic of Macs at Google. They have tens of thousands of Macs, and the effective image, deployment, and patching management was the first topic of the day, presented by Clay Caviness and Edward Eigerman. Some interesting tools and possibilities, but scale far beyond my needs. The second talk, by Greg Castle, on Hardening Macs, was pertinent and useful for me.

After lunch, the two talks I attended were on “Managing Access using SSH Keys” by the original author of SSH, Tatu Ylönen, and “Secure Linux Containers” by Dan Walsh of Red Hat (and SELinux fame). Tatu pretty much read text-dense slides aloud to us, and confirmed that managing SSH key proliferation and dependency paths is hard. Secure Linux Containers remind me strongly of sparse Solaris Zones, so that’s how I’m fitting them into my mental framework. Dan also talked to us about Docker … a container framework that Red Hat is “merging” (?) with Secure Linux Containers … and said we (sysadmins) wouldn’t like Docker at all. Mmmmmm.

The closing Plenary session, at about an hour and 45 minutes, was a caffeine-fueled odyssey by Todd Underwood, a Google Site Reliability Manager, on the topic of PostOps: A Non-Surgical Tale of Software, Fragility, and Reliability. Todd’s a fun, if hyper, speaker. He’s motivated and knows his stuff. But like some others in the audience, what happens at the scale of a GOOG-size organization may not apply so cleanly in the SMB space. The fact is that DevOps and NoOps may not work so well for us … though certainly the principles of coordinated work and automation strongly apply.

Brian’s Summary

At any given time, for every room I sat in, for every speaker or trainer I listened to, there were three other things that I would have also learned much from. This was my path through LISA ’13. There are many like it, but this one is mine. This conference was a net win for me in many ways – I learned a lot, I ran across some old friends (Hi, Heather and Marc), made some new ones, and had a good time.

The folks I can recommend without reservation that you take a class from, or attend a talk that they’re presenting: Jeanne Schock, Branson Matheson, Rik Farrow, and Ted Ts’o. These are the four people I learned the most from in the course of six days, and you’d learn from them, too!

My hat’s off to the fine staff at USENIX, who worked their asses off to make the conference work. Kudos!