Re: Decrypting a drive; says a correct password is "incorrect"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Sven,

no problem, I was so tired that I had to look 3 times,
hence the correct result (I think) ;-)

Regards,
Arno

On Tue, Jan 10, 2017 at 11:23:41 CET, Sven Eschenberg wrote:
> Hi Arno,
> 
> You are right, the first block of zeros with 200 bytes length should
> have told me already. Seems I was still a little sleepy ;-).
> 
> Regards
> 
> -Sven
> 
> Am 10.01.2017 um 10:22 schrieb Arno Wagner:
> >On Tue, Jan 10, 2017 at 10:06:34 CET, Sven Eschenberg wrote:
> >>Hi there,
> >>
> >>Oversimplified: Your known and correct password is used to convert
> >>the on disk keyslot data to generate the actual drive key. Now, if
> >>you had the masterkey at hand, you'd have no problems decrypting the
> >>drive, if you had a header backup that is still functional, you
> >>could retrieve the key with the correct password aswell.
> >>
> >>If your keyslot is damaged, your password is of no particular use.
> >>it does not really matter if you'd try to bruteforce the masterkey,
> >>or bruteforce the keyslot material.
> >>
> >>Assuming they keyslot is mostly intact a brute on the damaged parts
> >>could be an interesting option (say you had some bit flips and know
> >>their positions).
> >>
> >>But looking at the output, my feeling is there would be no gain in
> >>comparison to bruteforcing the masterkey itself.
> >
> >Actually, brute-forcing the holes in the keyslot, which seems to
> >be about 8kB, is massively harder than brute-forcing a 256 bit key.
> >That 256bit key may just withing reach if you put all matter and
> >energy of the universe on it and give it a few hundred billion years.
> >
> >Regards,
> >Arno
> >
> >
> >
> >
> >>Regards
> >>
> >>-Sven
> >>
> >>
> >>Am 10.01.2017 um 09:47 schrieb K Mmmm:
> >>>Thanks for your help, Bob. I have run the keyslot checker, and there
> >>>appears to be damage.
> >>>
> >>>I read in many places that this means the data is simply
> >>>irrecoverable. But I don't understand how that could be so. Assuming I
> >>>know my password, couldn't I theoretically brute-force each of these
> >>>areas where entropy is low?  Is it because there are likely to be
> >>>other areas with low entropy that are not detected by the checker?
> >>>Would changing the sector size help? Or, is my understanding of hard
> >>>disks just so bare, that I fail to realize how difficult this would
> >>>be?  If nobody answers, I'll assume it's hopeless, as based on the
> >>>following output, this is what my inclination is to believe. If
> >>>someone has a "wild idea" (the possibility of recovering the key from
> >>>RAM is long gone), then I am certainly willing to try it -- even if it
> >>>takes a decade or so to unlock. It's a crypto wallet with just enough
> >>>to pay off my first year of medical school loans...
> >>>
> >>>root@pony:/home/m/cryptsetup-master/misc/keyslot_checker#
> >>>./chk_luks_keyslots /dev/sdb5
> >>>
> >>>parameters (commandline and LUKS header):
> >>> sector size: 512
> >>> threshold:   0.900000
> >>>
> >>>- processing keyslot 0:  start: 0x001000   end: 0x03f800
> >>> low entropy at: 0x005000    entropy: 0.000000
> >>> low entropy at: 0x005200    entropy: 0.000000
> >>> low entropy at: 0x005400    entropy: 0.000000
> >>> low entropy at: 0x005600    entropy: 0.000000
> >>> low entropy at: 0x005800    entropy: 0.000000
> >>> low entropy at: 0x005a00    entropy: 0.000000
> >>> low entropy at: 0x005c00    entropy: 0.000000
> >>> low entropy at: 0x005e00    entropy: 0.000000
> >>> low entropy at: 0x038000    entropy: 0.000000
> >>> low entropy at: 0x038200    entropy: 0.000000
> >>> low entropy at: 0x038400    entropy: 0.000000
> >>> low entropy at: 0x038600    entropy: 0.000000
> >>> low entropy at: 0x038800    entropy: 0.000000
> >>> low entropy at: 0x038a00    entropy: 0.000000
> >>> low entropy at: 0x038c00    entropy: 0.000000
> >>> low entropy at: 0x038e00    entropy: 0.000000
> >>>- processing keyslot 1:  keyslot not in use
> >>>- processing keyslot 2:  keyslot not in use
> >>>- processing keyslot 3:  keyslot not in use
> >>>- processing keyslot 4:  keyslot not in use
> >>>- processing keyslot 5:  keyslot not in use
> >>>- processing keyslot 6:  keyslot not in use
> >>>- processing keyslot 7:  keyslot not in use
> >>>
> >>>An example of one of these points with low entropy, using verbose output:
> >>>
> >>> low entropy at: 0x038600    entropy: 0.000000
> >>> Binary dump:
> >>> 0x038600  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038610  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038620  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038630  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038640  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038650  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038660  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038670  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038680  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038690  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0386a0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0386b0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0386c0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0386d0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0386e0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0386f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038700  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038710  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038720  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038730  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038740  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038750  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038760  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038770  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038780  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x038790  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0387a0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0387b0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0387c0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0387d0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0387e0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>> 0x0387f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
> >>>
> >>>
> >>>
> >>>On Wed, Jan 4, 2017 at 9:34 PM, K Mmmm <1800ponysauce@xxxxxxxxx> wrote:
> >>>>Hello everyone..
> >>>>
> >>>>About 6 months ago one of my encrypted drives crashed during a brief data
> >>>>transfer I was doing. Because it was just a transfer, I did not have the
> >>>>keys backed up for this particular hard drive. I do not have another backup
> >>>>copy of the data contained in this drive. However it is extremely important
> >>>>to my livelihood. This listserv is really my last hope.
> >>>>
> >>>>Using a platter switch, I was able to copy most of the data to a new hard
> >>>>disk. Fortunately, there does appear to be a valid version of a LUKS header
> >>>>still intact. However, the password I was using isn't working. It does use
> >>>>some special characters, but even the alternates for those characters on
> >>>>other locales aren't working. I guess I am first wondering if it is possible
> >>>>the LUKS header has changed somehow? If so, can I use the existing data on
> >>>>the drive to help me in a keysearch? Surely, some part of this header must
> >>>>be relevant to me, even if it is different? ... Is it definitely possible
> >>>>for it to have changed?  ... Or could it be something else, e.g. could a
> >>>>change in blocksize during the platter switch between hard drives have
> >>>>changed the key? The original hard drive originated from a ~2011 laptop
> >>>>running Ubuntu 14~. Most of my password guesses were from Ubuntu 16.
> >>>>
> >>>>If you would like more information (the actual header, partition layout,
> >>>>etc.), see this thread:
> >>>>
> >>>>https://ubuntuforums.org/showthread.php?t=2346612
> >>>>
> >>>>I think the partition layout might be relevant, as there is only a 2 space
> >>>>between the EXT and Linux partitions.
> >>>>
> >>>>At this point I am trying to gather as many ideas as possible. If there is
> >>>>something crazy you've thought of which could be possible, but have never
> >>>>seen yet, please suggest it and I will most likely try to investigate it.
> >>>>This data is extremely important for my livelihood.
> >>>>
> >>>>Another thread:
> >>>>http://askubuntu.com/questions/848429/why-cant-i-unlock-an-image-recovery-of-my-encrypted-disk-despite-using-the-cor
> >>>>
> >>>>Even something as simple as being able to programatically change locales
> >>>>without having to log-in and out could help a lot. The update-locale command
> >>>>does not work without loging in and out... A script like that, or just
> >>>>something a little less brute-force than brute-force-luks (which I've
> >>>>tried), would be very useful.
> >>>>
> >>>>Currently booting from an Ubuntu 14 live disk. hoping it could be a
> >>>>locale/OS-version problem since the password did use special characters and
> >>>>I may have changed the locale to Portuguese/Brazilian... although it's
> >>>>unlikely.
> >>>>
> >>>>Thanks,
> >>>>Steve
> >>>_______________________________________________
> >>>dm-crypt mailing list
> >>>dm-crypt@xxxxxxxx
> >>>http://www.saout.de/mailman/listinfo/dm-crypt
> >>>
> >>_______________________________________________
> >>dm-crypt mailing list
> >>dm-crypt@xxxxxxxx
> >>http://www.saout.de/mailman/listinfo/dm-crypt
> >
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> http://www.saout.de/mailman/listinfo/dm-crypt

-- 
Arno Wagner,     Dr. sc. techn., Dipl. Inform.,    Email: arno@xxxxxxxxxxx
GnuPG: ID: CB5D9718  FP: 12D6 C03B 1B30 33BB 13CF  B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato

If it's in the news, don't worry about it.  The very definition of 
"news" is "something that hardly ever happens." -- Bruce Schneier
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux