-
Notifications
You must be signed in to change notification settings - Fork 240
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove OPAL (--revertnoerase) Fails #304
Comments
I'm definitely not capable of gleaning much from the verbose debug output but I'll make some suggestions based on what I've seen in testing with some other drives. (The only SED Samsung drive I have is an M.2 NVME 970 EVO, and I've not yet spent any time testing sedutil against it as it's the main drive in my primary Win10 PC. There's support for windows_nvme in the @lukefor and @ChubbyAnt forks that I'm building into my working codebase but I haven't tested it beyond --scan/--query). When you say that you "have it encrypted with sedutil 1.15.1 since a few years now" - are you 100% sure that you encrypted it with the stock sedutil 1.15.1 which you downloaded in pre-compiled form from this site? Or is there any chance you used an older binary or one that came as part of a Linux distro? Not saying that's the problem, just verifying that we're troubleshooting the same understood and bounded problem. Second: If you can't unlock the drive to be able to write to it, then I'm not surprised that you can't do the --revertnoerase. Your --query output shows the drive as Locked: Y. Could you please try to use the same sedutil-cli binary on the RESCUE64 image to perform the command Third: If you really really want to change NOW to a newer "more better" version of sedutil, I would suggest that you back up the contents of that drive to something else, and then use the PSID unlock function. Sedutil-cli has one, and the Samsung Magician software has an equivalent implementation (as do SeaTools for Seagate SEDs, and Micron Storage Executive for Micron/Crucial drives). NOTE that the PSID unlock is also known as "crypto erase" as it WILL wipe out 100% of the data on the disk. This is a Feature Not A Bug but please back up your data first. The good news is that the PSID is designed that way because it should always be possible to get a drive usable again, if there is no other way to decrypt/unlock/recover. While testing some things I've been using PSID unlock 3-4 times per day lately.... Good Luck Have Fun. |
Thanks @oom-is for your time.
The solution can be found here: ChubbyAnt#4 (comment) Issue can be closed if the Documentation / Wiki is updated. |
Hi,
I use a Samsung Samsung SSD 850 EVO 500GB (EMT02B6Q) as my only system drive and have it encrypted with sedutil 1.15.1 since a few years now. Today I wanted to remove OPAL in order to switch to a more recent version (https://github.com/ladar/sedutil or https://github.com/ChubbyAnt/sedutil) of sedutil. Looking at the wiki I found the "Remove OPAL" section which instructs you to run
sedutil-cli --revertnoerase {Admin1Password} {drive}
.Thus i bootet the RESCUE64.img and ran the command which FAILED:
In order to track the issue down I ran the command again with the highest verbosity:
And I did a query of the drive afterwards:
Please help me out if I do something wrong or update the source if its a real BUG.
Thanks and let me know if further testing is needed.
The text was updated successfully, but these errors were encountered: