Sorry, but the standard clearly states that if the password does not match the password perviously saved by the device the device shall abort the command.



Regards,
Steve Livaccari

Hard Drive Engineering
IBM Global Procurement
Internet:  [EMAIL PROTECTED]
Phone (919) 543.7393



Joseph Chen - SISA <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]

05/17/2005 02:27 PM

To
Thomas Jansen <[EMAIL PROTECTED]>, [email protected]
cc
Subject
RE: [t13] Back to the main problem. Please read





This message is from the T13 list server.


My understanding on the spec is one can do Security Erase without password.

Regards,
Joseph

-----Original Message-----
From: Thomas Jansen [mailto:[EMAIL PROTECTED]
Sent: Tuesday, May 17, 2005 9:50 AM
To: [email protected]
Subject: Re: [t13] Back to the main problem. Please read

This message is from the T13 list server.


Curtis Stevens wrote:

>This message is from the T13 list server.
>
>
>Pat
>
>                 Currently the ATA through SCSI community is not affected because
>there is no real translation from SCSI to ATA security.  This could be an
>issue in the future when ATA pass-though is implemented.
>
>                 I think that we should also note that the drive need not be
>returned.  Security Erase is used to clear the password along with the
data.
>This does give the user a way to retrieve the drive if it gets passworded.
>
>  
>
Not as far as I understand the standard. The drive will only accept the
Security Erase command when either the master or user password is supplied.
In case of a virus both passwords will be set to random. This was the
original question I asked.... :-)

Sincerely,
Thomas

Reply via email to