Which Secure Erase command will clear the HPA and DCO hidden areas? #52
Replies: 3 comments
-
This is a great question! I had to do some research and confirm with our spec representative in order to make sure I can give you an accurate answer. For drives with HPA and DCO here is the interaction with hidden areas when using ATA security erase and Sanitize: ATA Security Erase
Examples:
Sanitize Example: Please be aware that HPA was replaced with AMAC (Accessible Max Address Configuration) in newer ACS specifications and that DCO was made obsolete. ATA Security and Sanitize Example: |
Beta Was this translation helpful? Give feedback.
-
This is great information, thanks for the quick reply in spite of having to research the details, it's much appreciated. Just to confirm, tools like |
Beta Was this translation helpful? Give feedback.
-
Based on my research and conversation with our spec representative, HPA/DCO/AMAC do not need to be disabled/removed for Sanitize or Enhanced ATA security erase to wipe these areas (and normal ATA security erase for AMAC). If it's an HPA or DCO drive, and it only supports normal mode for ATA security erase, then this will be required. Some drives (especially older ones) do not support the enhanced mode for ATA security erase. If you can remove these before the erase, it would make it easier to validate that they were in fact erased no matter which combination of features are in use or are used for the erase. For HPA and AMAC, we have an option in openSeaChest_Configure called
We do not currently have support for DCO options in the tools, but if desired, create a new Github issue and note it as a feature request and we'll look into adding them. DCO has its own similar issues. If a DCO freezelock has been issued, the drive will not process any DCO commands until power cycled (and maybe hardware reset). In this case, I have seen the BIOS from some system OEM's issue a DCO freezelock commands before the OS boots. To get around this you would need to use a non-ATA/AHCI card or adapter that would otherwise work...or use another system. This same freeze-lock issue may also happen with ATA security. In this case, openSeaChest is able to detect the freezelock and report it. Windows will issue an ATA security freeze lock as soon as a drive is attached on a native ATA interface...using a SAS HBA or USB bridge, this doesn't happen (but it is possible any of these could choose to issue this command, but I have not experienced this myself). The exception to this rule is booting into Windows PE/Recovery environment, this does not happen unless the freeze lock was issued by the BIOS. In this case, Windows will only allow an erase to be started with a specific password. More details about this here. Note that this only affects ATA busses. This is not a problem in ATA over SCSI or USB/external adapters. |
Beta Was this translation helpful? Give feedback.
-
Firstly, thanks for a great set of tools. As someone who securely wipes hard drives as a part-time job, I've been looking for a replacement to perform Secure Erase on ATA hard drives ever since
hdparm
stopped being maintained on Cygwin, so it's good to finally have something.Looking at the Erase binary, I see the following:
As far as I can make out, both of these commands wipe only user-accessible areas, which generally wouldn't include hidden areas like the HPA and the DCO.
Do any of these commands wipe these hidden areas in spite of what their documentation seems to say? If not, is there a command in the suite that does?
Beta Was this translation helpful? Give feedback.
All reactions