Open l3iggs opened 1 year ago
Great question.
I'm struggling a bit along the same lines with an Intel 905p SSD. If I figure it out, I'll post something here.
Meanwhile, take a look at Intel's Memory and Storage Tool.
Linux, macOS, Windows: Intel Memory and Storage Tool
Windows only: Intel Memory and Storage Tool GUI
sudo intelmas start -intelssd -psidrevert ${PSID}
Error: Unsupported Operating System. This feature is only supported on Windows.
Charming.
For some additional non-Intel perspective...
I also have some Seagate enterprise hard drives that work with sedutil. I managed to lock one at some point, but the PSID unlock wasn't working...
I used sedutil-cli
to dump that alternate code, an MSID, via
sudo sedutil-cli --printDefaultPassword /dev/sda
Then I used hdparm commands to unlock the drive with that password.
MSID="$(sudo sedutil-cli --printDefaultPassword /dev/sda)"
sudo hdparm --user-master m --security-unlock "${MSID}" /dev/sda
In my case, going back and forth between Windows and Linux, there seem to be at least two distinct levels of operation in play, two different APIs. One level seems to support self-encrypted storage devices, where the keys never leave the low-level device's embedded controller. Another approach is more general, operating via the host device -- your computer, in particular for BIOS-mediated Secure Boot... in which case, it's likely the host CPU that's performing the bit manipulation crypto of the data stream.
My Seagate self-encrypting drives have the PSID printed on the disk label, and it's not otherwise exposed to the host; I don't think you're going to retrieve it from sedutil-cli
... But my Intel SSDs don't have the PSID printed on them anywhere, and yes, sedutil-cli
reports these Intel devices as TCG/Opal NO
, not compliant.
I recently recovered two Intel SSDs from an e-waste bin (they were in old Lenovo T440p laptops). They seem to be ATA password locked and since I don't know anything about the person who used them or put them into the bin, I'll never learn the origional password. I don't care about the data on them. I think it would be nice if I could use them them (keeping them out of the e-waste stream for a few more years)
Should I expect sedutil to be able to PSID revert these? (hint it can't). If sedutil isn't the right thing to make these usable, is there any other tool out there anyone could recommend (an old version of sedutil or its parent projects maybe)?
Any attemps with sedtul look like this (nothing works because sedutil thinks they're not OPAL ready):
hdparm info is like this
Thanks!