This message is from the T13 list server.

On the other hand,

a) Before SECURITY ERASE UNIT is allowed to be executed,
      the drive must successfully execute an SECURITY ERASE PREPARE cmd

b) and before SECURITY ERASE PREPARE can be executed, the
      drive must be unlocked

c) therefore,  SECURITY ERASE UNIT must have been unlocked with a password.

----------------
The state diagram (ata7: clause 4.7.4) does have some significant omissions
      * it does not show the SECURITY ERASE PREPARE command
            (except in text for Transition SEC5b:SEC1
      * it does not show the differences between HIGH and MAX levels
      * it does not show SRST and DEVICE RESET interactions

That should be corrected - - with a similar degree of detail as
the SET MAX feature set was recently updated by Phoenix Technologies.
--------------

Thank You !!!
-----------------------------------------------------------------
Jim Hatfield
Seagate Technology LLC
   e-mail:  [EMAIL PROTECTED]
   s-mail:  389 Disc Drive;  Longmont, CO 80503 USA
   voice:  720-684-2120
   fax....:  720-684-2711
==========================================


                                                                           
             "Mark Overby"                                                 
             <[EMAIL PROTECTED]                                             
             om>                                                        To 
             No Phone Info             "Steve Livaccari"                   
             Available                 <[EMAIL PROTECTED]>, "Joseph Chen 
                                       - SISA" <[EMAIL PROTECTED]>    
                                                                        cc 
             05/17/2005 01:36          <[email protected]>,                    
             PM                        <[EMAIL PROTECTED]>, "Thomas      
                                       Jansen" <[EMAIL PROTECTED]>        
                                                                   Subject 
                                       RE: [t13] Back to the main problem. 
                                       Please read                         
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           




I see what Steve is saying.

6.44.8 (first paragraph) indicates that a password is required to execute
SECURITY ERASE UNIT in any condition.
4.7 (third paragraph) indicates the behavior of SECURITY ERASE UNIT when
the security level is set to high or maximum. (Basically security is
enabled by specifying a user password on a SECURITY SET PASSWORD command)

I would state that the state machine text in 4.7 could use a little touch
up to indicate the transitions on SECURITY ERASE UNIT from the locked
condition only happen when a password is successfully presented. Also, the
text on transitioning from the unlocked to locked state needs to be
clarified as well.

I'll make a note to write up a proposal when I get done with some of my
others.

 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Steve
 Livaccari
 Sent: Tuesday, May 17, 2005 11:41 AM
 To: Joseph Chen - SISA
 Cc: [email protected]; [EMAIL PROTECTED]; Thomas Jansen
 Subject: RE: [t13] Back to the main problem. Please read


 Sorry, but the standard clearly states that if the password does not match
 the password perviously saved by the device the device shall abort the
 command.



 Regards,
 Steve Livaccari

 Hard Drive Engineering
 IBM Global Procurement
 Internet:  [EMAIL PROTECTED]
 Phone (919) 543.7393

                                                                           
 Joseph Chen - SISA                                                        
 <[EMAIL PROTECTED]>                                                  
 Sent by: [EMAIL PROTECTED]                                              
                                                                        To 
                                              Thomas Jansen                
 05/17/2005 02:27 PM                          <[EMAIL PROTECTED]>,        
                                              [email protected]                
                                                                        cc 
                                                                           
                                                                   Subject 
                                              RE: [t13] Back to the main   
                                              problem. Please read         
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           





 This message is from the T13 list server.


 My understanding on the spec is one can do Security Erase without
 password.

 Regards,
 Joseph

 -----Original Message-----
 From: Thomas Jansen [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, May 17, 2005 9:50 AM
 To: [email protected]
 Subject: Re: [t13] Back to the main problem. Please read

 This message is from the T13 list server.


 Curtis Stevens wrote:

 >This message is from the T13 list server.
 >
 >
 >Pat
 >
 >                 Currently the ATA through SCSI community is not affected
 because
 >there is no real translation from SCSI to ATA security.  This could be an
 >issue in the future when ATA pass-though is implemented.
 >
 >                 I think that we should also note that the drive need not
 be
 >returned.  Security Erase is used to clear the password along with the
 data.
 >This does give the user a way to retrieve the drive if it gets
 passworded.
 >
 >
 >
 Not as far as I understand the standard. The drive will only accept the
 Security Erase command when either the master or user password is
 supplied.
 In case of a virus both passwords will be set to random. This was the
 original question I asked.... :-)

 Sincerely,
 Thomas


Reply via email to