Re: Decrypting a drive; says a correct password is "incorrect"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jan 10, 2017 at 09:47:30 CET, K Mmmm wrote:
> Thanks for your help, Bob. I have run the keyslot checker, and there
> appears to be damage.
> 
> I read in many places that this means the data is simply
> irrecoverable. But I don't understand how that could be so. Assuming I
> know my password, couldn't I theoretically brute-force each of these
> areas where entropy is low?  

Yes, you could in theory. In your case, this seems to be 8kB missing. 
Brute-forcing 8kB is infeasible in this universe, not enough 
matter, energy and remaining lifetime of the universe, regardles
of whether it goes into heat-death or collapse. 

So in thery, yes, in practice no. 

> Is it because there are likely to be
> other areas with low entropy that are not detected by the checker?
> Would changing the sector size help? Or, is my understanding of hard
> disks just so bare, that I fail to realize how difficult this would
> be?  If nobody answers, I'll assume it's hopeless, as based on the
> following output, this is what my inclination is to believe. If
> someone has a "wild idea" (the possibility of recovering the key from
> RAM is long gone), then I am certainly willing to try it -- even if it
> takes a decade or so to unlock. It's a crypto wallet with just enough
> to pay off my first year of medical school loans...

Sorry, if this is all you have, then there is no possibility
to recover it. The key-slots are designed to make recovery even 
on slight damage infeasible, it is an anti-forensic measure.
It works against you here. 

Regards,
Arno


 
> root@pony:/home/m/cryptsetup-master/misc/keyslot_checker#
> ./chk_luks_keyslots /dev/sdb5
> 
> parameters (commandline and LUKS header):
>   sector size: 512
>   threshold:   0.900000
> 
> - processing keyslot 0:  start: 0x001000   end: 0x03f800
>   low entropy at: 0x005000    entropy: 0.000000
>   low entropy at: 0x005200    entropy: 0.000000
>   low entropy at: 0x005400    entropy: 0.000000
>   low entropy at: 0x005600    entropy: 0.000000
>   low entropy at: 0x005800    entropy: 0.000000
>   low entropy at: 0x005a00    entropy: 0.000000
>   low entropy at: 0x005c00    entropy: 0.000000
>   low entropy at: 0x005e00    entropy: 0.000000
>   low entropy at: 0x038000    entropy: 0.000000
>   low entropy at: 0x038200    entropy: 0.000000
>   low entropy at: 0x038400    entropy: 0.000000
>   low entropy at: 0x038600    entropy: 0.000000
>   low entropy at: 0x038800    entropy: 0.000000
>   low entropy at: 0x038a00    entropy: 0.000000
>   low entropy at: 0x038c00    entropy: 0.000000
>   low entropy at: 0x038e00    entropy: 0.000000
> - processing keyslot 1:  keyslot not in use
> - processing keyslot 2:  keyslot not in use
> - processing keyslot 3:  keyslot not in use
> - processing keyslot 4:  keyslot not in use
> - processing keyslot 5:  keyslot not in use
> - processing keyslot 6:  keyslot not in use
> - processing keyslot 7:  keyslot not in use
> 
> An example of one of these points with low entropy, using verbose output:
> 
>   low entropy at: 0x038600    entropy: 0.000000
>   Binary dump:
>   0x038600  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038610  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038620  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038630  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038640  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038650  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038660  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038670  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038680  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038690  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0386a0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0386b0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0386c0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0386d0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0386e0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0386f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038700  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038710  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038720  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038730  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038740  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038750  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038760  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038770  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038780  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x038790  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0387a0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0387b0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0387c0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0387d0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0387e0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
>   0x0387f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> 
> 
> 
> On Wed, Jan 4, 2017 at 9:34 PM, K Mmmm <1800ponysauce@xxxxxxxxx> wrote:
> > Hello everyone..
> >
> > About 6 months ago one of my encrypted drives crashed during a brief data
> > transfer I was doing. Because it was just a transfer, I did not have the
> > keys backed up for this particular hard drive. I do not have another backup
> > copy of the data contained in this drive. However it is extremely important
> > to my livelihood. This listserv is really my last hope.
> >
> > Using a platter switch, I was able to copy most of the data to a new hard
> > disk. Fortunately, there does appear to be a valid version of a LUKS header
> > still intact. However, the password I was using isn't working. It does use
> > some special characters, but even the alternates for those characters on
> > other locales aren't working. I guess I am first wondering if it is possible
> > the LUKS header has changed somehow? If so, can I use the existing data on
> > the drive to help me in a keysearch? Surely, some part of this header must
> > be relevant to me, even if it is different? ... Is it definitely possible
> > for it to have changed?  ... Or could it be something else, e.g. could a
> > change in blocksize during the platter switch between hard drives have
> > changed the key? The original hard drive originated from a ~2011 laptop
> > running Ubuntu 14~. Most of my password guesses were from Ubuntu 16.
> >
> > If you would like more information (the actual header, partition layout,
> > etc.), see this thread:
> >
> > https://ubuntuforums.org/showthread.php?t=2346612
> >
> > I think the partition layout might be relevant, as there is only a 2 space
> > between the EXT and Linux partitions.
> >
> > At this point I am trying to gather as many ideas as possible. If there is
> > something crazy you've thought of which could be possible, but have never
> > seen yet, please suggest it and I will most likely try to investigate it.
> > This data is extremely important for my livelihood.
> >
> > Another thread:
> > http://askubuntu.com/questions/848429/why-cant-i-unlock-an-image-recovery-of-my-encrypted-disk-despite-using-the-cor
> >
> > Even something as simple as being able to programatically change locales
> > without having to log-in and out could help a lot. The update-locale command
> > does not work without loging in and out... A script like that, or just
> > something a little less brute-force than brute-force-luks (which I've
> > tried), would be very useful.
> >
> > Currently booting from an Ubuntu 14 live disk. hoping it could be a
> > locale/OS-version problem since the password did use special characters and
> > I may have changed the locale to Portuguese/Brazilian... although it's
> > unlikely.
> >
> > Thanks,
> > Steve
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> http://www.saout.de/mailman/listinfo/dm-crypt

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@xxxxxxxxxxx
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux