Red Hat Training
A Red Hat training course is available for Red Hat Enterprise Linux
14.12.2. Deleting Storage Volumes
vol-deletecommand deletes a given volume. The command requires a specific
--pool pool-or-uuidwhich is the name or UUID of the storage pool the volume is in. The
vol-name-or-key-or-pathoption specifies the name or key or path of the volume to delete.
vol-wipecommand wipes a volume, to ensure data previously on the volume is not accessible to future reads. The command requires a
--pool pool-or-uuid, which is the name or UUID of the storage pool the volume is in. The vol-name-or-key-or-path contains the name or key or path of the volume to wipe. Note it is possible to choose different wiping algorithms instead of the default (where every sector of the storage volume is written with value "0"). To specify a wiping algorithm, use the
--algorithmoption with one of the following supported algorithm types:
- 1-pass all zeroes
- 4-pass NNSA Policy Letter NAP-14.1-C (XVI-8) for sanitizing removable and non-removable hard disks: random x2, 0x00, verify.
- 4-pass DoD 5220.22-M section 8-306 procedure for sanitizing removable and non-removable rigid disks: random, 0x00, 0xff, verify.
- 9-pass method recommended by the German Center of Security in Information Technologies (http://www.bsi.bund.de): 0xff, 0xfe, 0xfd, 0xfb, 0xf7, 0xef, 0xdf, 0xbf, 0x7f.
- The canonical 35-pass sequence described in Gutmann’s paper.
- 7-pass method described by Bruce Schneier in "Applied Cryptography" (1996): 0x00, 0xff, random x5.
- Roy Pfitzner’s 7-random-pass method: random x7
- Roy Pfitzner’s 33-random-pass method: random x33.
- 1-pass pattern: random.
The version of the scrub binary installed on the host will limit the algorithms that are available.