[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: HD Protect Passwords
- To: ttrottier@shl.com (TROTTIER Tom)
- Subject: Re: HD Protect Passwords
- From: Tim Tyhurst <tim@excelsior.com>
- Date: Thu, 20 Nov 1997 12:57:29 -0500 (EST)
- Cc: thinkpad@cs.utk.edu
- Comment: to {un}subscribe, send mail to thinkpad-REQUEST@cs.utk.edu
- In-Reply-To: <c=US%a=MCI%p=SHL%l=SHL/CANW001/002A30A4@ottmsooc02.ooc.shl.com> from "TROTTIER, Tom" at Nov 20, 97 10:59:35 am
> Does this apply only to original drives, or also to installed Toshiba,
> etc. drives? How does IBM do it?
A quick glance at the technical specs for the IBM drives (see
www.storage.ibm.com/techsup.htm) suggests that this functionality is
implemented at the IDE command level. Among commands like "Read Buffer",
"Seek" and "Writer Buffer" are "Set Password", "Disable Password" and
"Unlock". This suggests that a brute-force password guesser would
have to be working at the device driver level (or maybe even lower, right
at the IDE controller level).
I have no idea whether or not these password commands are an industry
standard; I would guess so, but that's just that: a guess.
The effectiveness of a brute force attack could be blunted a little if
the device inserts an artificial delay when responding to failed unlock
requests. I have no idea if this technique is implemented in the IBM
drives, though.
--
Tim Tyhurst tim@excelsior.com