Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

chizad posted:

I'm also running BitLocker on my laptop, but I'm not sure how much of a drop in performance that would account for.

This pretty much explains those numbers. Software encryption is a massive I/O hog. While the impact might not be felt as much using a SSD over a HDD, side by side benchmarks generally see a huge hit in I/O performance with it turned on. Over time on a crappy SSD to boot, you get sad, sad numbers like those. I'm not sure if the free space is encrypted with Bitlocker (might) but if that drive is sitting at 100% used internally, even the best garbage collection on the planet won't save it at that point.

Adbot
ADBOT LOVES YOU

Factory Factory
Mar 19, 2010

This is what
Arcane Velocity was like.
Bullshit. I ran TrueCrypt FDE on a 64GB Kingston V100 with an AMD E350 APU - hardly beefy in any sense - and I still only had a 20% drop in sequential I/O and no drop in random I/O. That drive is seeing well over an 80% drop in sequential, over 90% in 512K random, and 75% in 4K random for writes.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Factory Factory posted:

Bullshit. I ran TrueCrypt FDE on a 64GB Kingston V100 with an AMD E350 APU - hardly beefy in any sense - and I still only had a 20% drop in sequential I/O and no drop in random I/O. That drive is seeing well over an 80% drop in sequential, over 90% in 512K random, and 75% in 4K random for writes.

Yea but we aren't talking about a installed it one day and ran benchmark right after on a modern SSD with TRIM. We are talking about long term performance degradation with ancient GC and no TRIM support.

EDIT: Decided to play around with this. Not sure if I should have picked the fastest SSD in the box or the worst to show some examples of before/after with TrueCrypt and BitLocker... but I settled in on a SSD 520.

TC AES was pretty painful, going to redo some stuff when I have enough time to blow, but read speeds dropped from ~480 to 330MB/s and write speeds down from ~300MB/s to about 8MB/s. Not sure if it was the SF processor needing some settling action after the new full partition dropped in place but it was making GBS threads itself. Mind you this is on a DX79SI Intel board with an Intel 3960X EE processor and 64GB of RAM, so this isn't an underpowered system in the slightest.

Want to see how much software encryption destroys SSD performance?





dietcokefiend fucked around with this message at 20:12 on Mar 12, 2012

Clanpot Shake
Aug 10, 2006
shake shake!

Does anyone know how to force a drive to be a certain drive letter? I encrypted my program files drive, which was formerly E:\ but will now come up as something else when truecrypt mounts it. It's mounted as a system favorite, so it mounts before windows loads.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Clanpot Shake posted:

Does anyone know how to force a drive to be a certain drive letter? I encrypted my program files drive, which was formerly E:\ but will now come up as something else when truecrypt mounts it. It's mounted as a system favorite, so it mounts before windows loads.

Once windows loads you should be able to go into computer management and change the drive letter and that should stick. Does the letter at least stay consistent or does it bounce around each time depending on what else is plugged into the system?

Clanpot Shake
Aug 10, 2006
shake shake!

dietcokefiend posted:

Once windows loads you should be able to go into computer management and change the drive letter and that should stick. Does the letter at least stay consistent or does it bounce around each time depending on what else is plugged into the system?
I'll give that a go when I get home from work. How does windows disk manager work? By SATA connection, or drive serial? I might shuffle things around in my case and it'd help to know.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Clanpot Shake posted:

I'll give that a go when I get home from work. How does windows disk manager work? By SATA connection, or drive serial? I might shuffle things around in my case and it'd help to know.

I've always seen it give priority by SATA/SAS connection although things as retarded as thumbdrives or USB card readers connected on boot can screw that up.

Clanpot Shake
Aug 10, 2006
shake shake!

dietcokefiend posted:

Want to see how much software encryption destroys SSD performance?
Does TrueCrypt normally destroy performance like this? I was under the impression modern chips could do encryption via hardware. What's the takeaway on encrypting SSDs?

evil_bunnY
Apr 2, 2003

If you need FDE buy a self-encrypting drive.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Clanpot Shake posted:

Does TrueCrypt normally destroy performance like this? I was under the impression modern chips could do encryption via hardware. What's the takeaway on encrypting SSDs?

The takeaway is only use the drive's built-in FDE encryption. Many SSDs can handle this internally with zero performance impact. The downside is you generally need to turn on a BIOS password to enable it on a consumer platform, and you are limited on password length. I think a Dell XPS 9000 I tried it on once limited you to like 5-6 characters. SandForce models and others literally don't care if you enable it or not, since they are using it internally regardless. One has a user-set key, the other just uses a default key. Swapping them out makes the controller work no harder or less. The primary difference is when the controller knows what is going on, it can still pass TRIM, leave open space for GC, and not have to worry about encrypting the unused NAND needlessly.

The problem like I mentioned before is when done through software if you do FDE (using entire drive surface) you leave the controller zero room besides what little over-provisioning the drive had from the factory. It can barely do GC, and TRIM is meaningless at that point. I suppose if you only did like 80% of the drive surface the performance would be better, but it would still be a massive letdown if you purchased a brand new SSD and installed software encryption.

The only car analogy I could come up with would be like buying a brand new M5 and removing the tires :v:

evil_bunnY posted:

If you need FDE buy a self-encrypting drive.

Pretty much. Lots of consumer models support it already (any SandForce drive, Intel 320, list goes on)

Clanpot Shake
Aug 10, 2006
shake shake!

I've got an Intel 510. Is this limited to the 8 character BIOS password, and is there a guide I can read about setting it up?

Using the built in FDE is all well and good, but I need my Program Files drive to mount also before windows even starts. I don't know of a way to do this without using TrueCrypt.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Clanpot Shake posted:

I've got an Intel 510. Is this limited to the 8 character BIOS password, and is there a guide I can read about setting it up?

Using the built in FDE is all well and good, but I need my Program Files drive to mount also before windows even starts. I don't know of a way to do this without using TrueCrypt.

Hardware FDE does it at BIOS load... so well before the system even cares about loading Windows at that point. TrueCrypt has a bootloader as well, that does it right after the BIOS loads and before Windows starts to load.

Now the sad news is the Intel SSD 510 doesn't support hardware encryption. The Mavell controller inside of it doesnt have that feature. :(

Clanpot Shake
Aug 10, 2006
shake shake!

Welp. I'll give this TC setup a go for a while and see how it goes. Thanks for the help.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Clanpot Shake posted:

Welp. I'll give this TC setup a go for a while and see how it goes. Thanks for the help.

Do you have Windows 7 Ultimate by chance? Bitlocker will offer much nicer speeds.

Clanpot Shake
Aug 10, 2006
shake shake!

dietcokefiend posted:

Do you have Windows 7 Ultimate by chance? Bitlocker will offer much nicer speeds.
I do, but that still doesn't solve the problem of mounting my secondary drive before loading windows (unless bootlocker can do that too). When TC decrypts a drive the last step is to remove the TC bootloader.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Clanpot Shake posted:

I do, but that still doesn't solve the problem of mounting my secondary drive before loading windows (unless bootlocker can do that too). When TC decrypts a drive the last step is to remove the TC bootloader.

EDIT: Just looked at the wording, and it says it will automatically unlock the secondary drive at windows login. So for that you might be screwed. Are the programs seperate from the files you need to encrypt? IE make two partitions... one for the software, one for the sensitive data?

dietcokefiend fucked around with this message at 21:13 on Mar 12, 2012

Clanpot Shake
Aug 10, 2006
shake shake!

dietcokefiend posted:

EDIT: Just looked at the wording, and it says it will automatically unlock the secondary drive at windows login. So for that you might be screwed. Are the programs seperate from the files you need to encrypt? IE make two partitions... one for the software, one for the sensitive data?
The drive contains my user profile (My Documents, Downloads, etc.) as well as most installed programs, like Firefox. I consider all that saved form information (CC number, for example) sensitive data, so I'd like the whole thing encrypted.

evil_bunnY
Apr 2, 2003

Clanpot Shake posted:

The drive contains my user profile (My Documents, Downloads, etc.) as well as most installed programs, like Firefox. I consider all that saved form information (CC number, for example) sensitive data, so I'd like the whole thing encrypted.
That's all stored in user directories.

chizad
Jul 9, 2001

'Cus we find ourselves in the same old mess
Singin' drunken lullabies

dietcokefiend posted:

EDIT: Decided to play around with this. Not sure if I should have picked the fastest SSD in the box or the worst to show some examples of before/after with TrueCrypt and BitLocker... but I settled in on a SSD 520.

Want to see how much software encryption destroys SSD performance?







I did a quick before/after test with BitLocker on a system identical to mine. It looks like the performance hit from BitLocker (especially writes) on this particular drive is absolutely brutal.

Clean Windows Install, BitLocker Off

Sequential Read/Write: 197.0 / 157.6
512K Read/Write: 162.7 / 56.53
4K Read/Write: 16.15 / 5.77
4K QD=32 Read/Write: 20.97 / 3.073


Clean Windows Install, BitLocker On

Sequential Read/Write: 155.8 / 16.78
512K Read/Write: 132.3 / 3.368
4K Read/Write: 12.61 / 2.572
4K QD=32 Read/Write: 18.95 / 0.406

evil_bunnY posted:

If you need FDE buy a self-encrypting drive.

Since I'm in the IT department a self-encrypting drive wouldn't be a big deal for my usage and wouldn't cause too many headaches for my coworkers if something happens and they need data from my machine. But I cringe at the support nightmare that would ensue if we deployed drives with hardware FDE to all of our users that handle sensitive data instead of BitLocker. We've got it set up so that any system we enable BitLocker on automatically backs up the recovery information to Active Directory so we can get to it at a moment's notice.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

chizad posted:

I did a quick before/after test with BitLocker on a system identical to mine. It looks like the performance hit from BitLocker (especially writes) on this particular drive is absolutely brutal.

Clean Windows Install, BitLocker Off

Sequential Read/Write: 197.0 / 157.6
512K Read/Write: 162.7 / 56.53
4K Read/Write: 16.15 / 5.77
4K QD=32 Read/Write: 20.97 / 3.073


Clean Windows Install, BitLocker On

Sequential Read/Write: 155.8 / 16.78
512K Read/Write: 132.3 / 3.368
4K Read/Write: 12.61 / 2.572
4K QD=32 Read/Write: 18.95 / 0.406


Since I'm in the IT department a self-encrypting drive wouldn't be a big deal for my usage and wouldn't cause too many headaches for my coworkers if something happens and they need data from my machine. But I cringe at the support nightmare that would ensue if we deployed drives with hardware FDE to all of our users that handle sensitive data instead of BitLocker. We've got it set up so that any system we enable BitLocker on automatically backs up the recovery information to Active Directory so we can get to it at a moment's notice.

Yea anyone who thinks software encryption doesn't affect performance is kidding themselves or is just oblivious to the differences. My example was one of the fastest consumer models on the fastest consumer hardware platform.

People constantly look at CPU overhead and sequential encode/decode performance instead of standard disk benchmarks when looking at disk/file encryption packages.

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

How does that compare to filesystem encryption in Linux? Speed-wise, that is.

I checked the box 'encrypt my system' in lubuntu, I have to enter a password when I boot to read the drive.

Factory Factory
Mar 19, 2010

This is what
Arcane Velocity was like.
Oh, I bet I know what the software FDE difference is that let me have good performance: fill the free space of the drive with a random-data junk file, then delete it to force a TRIM across the free space. That will re-sync the controller's idea of what's unallocated with the OS's.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Factory Factory posted:

Oh, I bet I know what the software FDE difference is that let me have good performance: fill the free space of the drive with a random-data junk file, then delete it to force a TRIM across the free space. That will re-sync the controller's idea of what's unallocated with the OS's.

Not sure I understand how that would work. FDE by definition spans the entire volume. The entire thing is random data, junk data if you will if you dont have the key. The drive never sees empty space unless you are working with an unencrypted drive and just encrypting individual files. The controller always sees filled sectors, not 0's or unused space, but randomized data since it would otherwise give away "real" important information versus "junk" free space.

A TRIM command would never pass, since the controller and software encryption are working on multiple levels. Those sectors would still have randomized data in them to prevent brute forcing real files versus blank space.

EDIT: I wonder if BitLocker works a bit different. I don't think BitLocker encrypts all the free area and allows TRIM stuff to work. TrueCrypt though would really need 20% or so leftover on the SSD unused so GC can still cope.

dietcokefiend fucked around with this message at 02:38 on Mar 13, 2012

Reith
Jul 23, 2007
I've been experiencing a lot of freezes lately with my 180 GB Force GT. It's not a BSOD, but the OS gradually gets less responsive until it completely locks up. It seems to happen whenever I do something that involves a lot of writing to the disk (downloading in uTorrent, running a VM, sometimes playing a game in Steam).

I read up on the Corsair forums and there's a few other people experiencing issues but I can't seem to find a reliable fix. I tried the Intel RST drivers, tried some registry hacks, etc, etc but nothing's working. Some people mentioned that it's just a problem with the Sandforce controller and other drives experience the same issues. Is it possible a firmware update will fix this?

I don't want to go back to my old, slow HDD but it looks like I might not have a choice for now. :(

redeyes
Sep 14, 2002

by Fluffdaddy

Reith posted:

I've been experiencing a lot of freezes lately with my 180 GB Force GT. It's not a BSOD, but the OS gradually gets less responsive until it completely locks up. It seems to happen whenever I do something that involves a lot of writing to the disk (downloading in uTorrent, running a VM, sometimes playing a game in Steam).

I read up on the Corsair forums and there's a few other people experiencing issues but I can't seem to find a reliable fix. I tried the Intel RST drivers, tried some registry hacks, etc, etc but nothing's working. Some people mentioned that it's just a problem with the Sandforce controller and other drives experience the same issues. Is it possible a firmware update will fix this?

I don't want to go back to my old, slow HDD but it looks like I might not have a choice for now. :(

You can backup and do a secure erase. Restore from backup, see if it works. SSDs should work exactly like normal HDs, if not RMA.

Reith
Jul 23, 2007

redeyes posted:

You can backup and do a secure erase. Restore from backup, see if it works. SSDs should work exactly like normal HDs, if not RMA.
Yeah, I think I might just RMA at this point.

I should probably note that I had it for ~2 months and as far as I can tell it worked fine up until a few days ago.

redeyes
Sep 14, 2002

by Fluffdaddy

Reith posted:

Yeah, I think I might just RMA at this point.

I should probably note that I had it for ~2 months and as far as I can tell it worked fine up until a few days ago.

Yeah probably a good bet. On the other hand, sometimes sandforce controllers can be recovered by secure erasing. I've seen in happen twice. I think it may have to do with failing flash but can't be sure.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

Reith posted:

I've been experiencing a lot of freezes lately with my 180 GB Force GT. It's not a BSOD, but the OS gradually gets less responsive until it completely locks up. It seems to happen whenever I do something that involves a lot of writing to the disk (downloading in uTorrent, running a VM, sometimes playing a game in Steam).

I read up on the Corsair forums and there's a few other people experiencing issues but I can't seem to find a reliable fix. I tried the Intel RST drivers, tried some registry hacks, etc, etc but nothing's working. Some people mentioned that it's just a problem with the Sandforce controller and other drives experience the same issues. Is it possible a firmware update will fix this?

I don't want to go back to my old, slow HDD but it looks like I might not have a choice for now. :(

What firmware is currently installed? If its not the newest you have pre-massive bug fix firmware. One that causes tons of blue screen issues.

Reith
Jul 23, 2007

dietcokefiend posted:

What firmware is currently installed? If its not the newest you have pre-massive bug fix firmware. One that causes tons of blue screen issues.
It shipped with 1.3.3, which is still the newest available.

Zhentar
Sep 28, 2003

Brilliant Master Genius

redeyes posted:

Yeah probably a good bet. On the other hand, sometimes sandforce controllers can be recovered by secure erasing. I've seen in happen twice. I think it may have to do with failing flash but can't be sure.

I've had a failing drive fixed by a secure erase, personally. Basically, a significant portion of SSD failures stem from firmware issues; doing a secure erase is equivalent to a format & reinstall of your OS. Whatever bad state the firmware was struggling to deal with gets wiped clean and it starts working fine again.

Reith
Jul 23, 2007
I'm willing to give that a try (and probably should anyway before I resort to an RMA) but I have no idea how. What's the best way to make an image of the drive and then do a secure erase?

Double Punctuation
Dec 30, 2009

Ships were made for sinking;
Whiskey made for drinking;
If we were made of cellophane
We'd all get stinking drunk much faster!
Just a note about the Intel Rapid Storage Technology:

I installed the drivers on my system in preparation of getting a new SSD. Everything went fine... until I tried connecting an eSATA device. Everything looked fine at first, and the drive performed fine, but the event log soon got filled with error messages from the Intel storage driver about a failed parity check. (I am not using RAID. :iiam:)

These messages are followed shortly by the computer completely freezing, with the fan running on high. I assumed this was a faulty drive, but some quick searching shows other people having a multitude of issues with the Intel drivers and eSATA devices.

In short, if you use an eSATA drive and don't need hardware RAID, I recommend foregoing installing the RST drivers. You'll probably have all the features you need from the default AHCI controller.

chizad
Jul 9, 2001

'Cus we find ourselves in the same old mess
Singin' drunken lullabies

dietcokefiend posted:

EDIT: I wonder if BitLocker works a bit different. I don't think BitLocker encrypts all the free area and allows TRIM stuff to work. TrueCrypt though would really need 20% or so leftover on the SSD unused so GC can still cope.

According to this post from the Building Windows 7 blog:

Technet posted:

Is Bitlocker’s encryption process optimized to work on SSDs?
Yes, on NTFS. When Bitlocker is first configured on a partition, the entire partition is read, encrypted and written back out. As this is done, the NTFS file system will issue Trim commands to help the SSD optimize its behavior.
We do encourage users concerned about their data privacy and protection to enable Bitlocker on their drives, including SSDs.

The way I'm understanding this, on a drive that supports TRIM there shouldn't be much difference between performance before and after enabling BitLocker.

mAlfunkti0n
May 19, 2004
Fallen Rib
Every one of our laptops we image that have SSDs are Bitlocker encrypted and have had zero issues with GC.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

chizad posted:

According to this post from the Building Windows 7 blog:


The way I'm understanding this, on a drive that supports TRIM there shouldn't be much difference between performance before and after enabling BitLocker.

Reading that I am really thinking that Bitlocker encrypts individual files on the fly and not the free space. Basically the volume is like any other NTFS volume, but instead of everything being a jumbled mess, it is orgranized encrypted files. That way the SSD still can manage free space versus file, whereas in the TrueCrypt FDE method it wouldn't.

sleepy gary
Jan 11, 2006

dietcokefiend posted:

Reading that I am really thinking that Bitlocker encrypts individual files on the fly and not the free space. Basically the volume is like any other NTFS volume, but instead of everything being a jumbled mess, it is orgranized encrypted files. That way the SSD still can manage free space versus file, whereas in the TrueCrypt FDE method it wouldn't.

an SSD does not know what is a deleted file in NTFS or any filesystem; it's the operating system's job to tell it (this is why the OS needs TRIM support). With TrueCrypt FDE and an OS with TRIM support, you can achieve the same results as far as I know.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

DNova posted:

an SSD does not know what is a deleted file in NTFS or any filesystem; it's the operating system's job to tell it (this is why the OS needs TRIM support). With TrueCrypt FDE and an OS with TRIM support, you can achieve the same results as far as I know.

With TrueCrypt though, if it doesn't maintain active randomized data structure across the entire disk surface, you could in theory start narrowing down what is real information versus no data. Plausible deniability and all that good stuff would go out the window with X amount of information sitting there. By definition there would never be TRIM commands since you would have a ton of unused space on the drive and someone could tell how much or how little information was present.

sleepy gary
Jan 11, 2006

dietcokefiend posted:

With TrueCrypt though, if it doesn't maintain active randomized data structure across the entire disk surface, you could in theory start narrowing down what is real information versus no data. Plausible deniability and all that good stuff would go out the window with X amount of information sitting there. By definition there would never be TRIM commands since you would have a ton of unused space on the drive and someone could tell how much or how little information was present.

No, you can already do this with TrueCrypt. It's in their documentation. If an attacker has access to the volume over time it is definitely possible to narrow down what areas are changing files and what areas remain static.

I really don't know how this meshes with TRIM though and the more I think about it the more I think it's not possible to work properly.

dietcokefiend
Apr 28, 2004
HEY ILL HAV 2 TXT U L8TR I JUST DROVE IN 2 A DAYCARE AND SCRATCHED MY RAZR

DNova posted:

No, you can already do this with TrueCrypt. It's in their documentation. If an attacker has access to the volume over time it is definitely possible to narrow down what areas are changing files and what areas remain static.

I really don't know how this meshes with TRIM though and the more I think about it the more I think it's not possible to work properly.

Well it wouldn't be ruling it out over time to see what stuff is real versus just free space. On a SSD a TRIM command puts the NAND back into a unused state. It would be clearly visible as a "nothing stored here, move on" deal.

The only method that doesn't put any load constraint on a SSD at this point in time is hardware FDE built into the drive. I wonder if the next evolution might be 1MB or whatever of free space on the SSD for a TrueCrypt/etc bootloader and the rest handled through the controller's encryption. That way you can use longer stronger passwords and bypass consumer BIOS lovely 5-6 character limit that some have in place.

Adbot
ADBOT LOVES YOU

dud root
Mar 30, 2008
Got a question about a 32Gb thumb stick- it kinda belongs here being flash. Keep getting CRC errors writing to the drive about 1/2 the time. (TeraCopy compares source & destination CRCs)

Any tools to check the disk for bad/expired flash sectors? I tried chkdsk with /r (locate bad sectors) and it didnt help

  • Locked thread