This should work:
Copy data from SD card to hard drive, format SD card, copy data back to SD card.
-----Original Message----- From: Anne Wilson cannewilson@googlemail.com Sent: October 31, 2009 12:48 PM To: KDE on Fedora discussion fedora-kde@lists.fedoraproject.org Subject: Too secure to be practical!
I don't recall doing it, much less why, but I have an 8GB SD card containing data, but it is LUKS encrypted. I can read it here, on Fedora, but it's not terribly useful, since I can't read it on, for instance, my daughter's Windows system. There must be some way of removing the encryption? Any hints?
Anne
On Saturday 31 October 2009 16:19:32 Patrick Boutilier wrote:
This should work:
Copy data from SD card to hard drive, format SD card, copy data back to SD card.
There's one big problem. Partition managers don't recognise LUKS-encrypted drives, and I very much doubt if format does either. It will have to be a command that partners the encryption command, I guess.
Anne
Anne Wilson wrote:
On Saturday 31 October 2009 16:19:32 Patrick Boutilier wrote:
This should work:
Copy data from SD card to hard drive, format SD card, copy data back to SD card.
There's one big problem. Partition managers don't recognise LUKS-encrypted drives, and I very much doubt if format does either. It will have to be a command that partners the encryption command, I guess.
Shouldn't really matter. Once you have the files copied off just create a brand new partition using fdisk.
Anne
fedora-kde mailing list fedora-kde@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/fedora-kde New to KDE4? - get help from http://userbase.kde.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Anne Wilson wrote:
On Saturday 31 October 2009 16:19:32 Patrick Boutilier wrote:
This should work:
Copy data from SD card to hard drive, format SD card, copy data back to SD card.
There's one big problem. Partition managers don't recognise LUKS-encrypted drives, and I very much doubt if format does either. It will have to be a command that partners the encryption command, I guess.
Anne
Once the partition is decrypted, the block device under /dev/mapper should be readable by a partition manager.
- --Ben
On Sunday 01 November 2009 01:54:42 Ben Boeckel wrote:
Anne Wilson wrote:
On Saturday 31 October 2009 16:19:32 Patrick Boutilier wrote:
This should work:
Copy data from SD card to hard drive, format SD card, copy data back to SD card.
There's one big problem. Partition managers don't recognise LUKS-encrypted drives, and I very much doubt if format does either. It will have to be a command that partners the encryption command, I guess.
Anne
Once the partition is decrypted, the block device under /dev/mapper should be readable by a partition manager.
Well, mounting the device in Dolphin, I can see the data. Oops - now I realise that it was the Windows data partition that I was seeing. There is a second 'Volume' in Dolphin, and clicking on that bounces immediately to 'home' (still in Places). This is the location '/media/-home' which contains only lost+found. Clicking on that brings the message 'Could not enter folder /media/-home/lost+found'. Entering it as root it says that there are 0 items.
Qtparted sees only my hard drive. I think this output from fdisk refers to it, though:
Disk /dev/mmcblk1: 7969 MB, 7969177600 bytes 255 heads, 63 sectors/track, 968 cylinders Units = cylinders of 16065 * 512 = 8225280 bytes Disk identifier: 0x000eb694
Device Boot Start End Blocks Id System /dev/mmcblk1p1 * 1 765 6144831 83 Linux /dev/mmcblk1p2 766 903 1108485 83 Linux /dev/mmcblk1p3 904 968 522112+ 82 Linux swap / Solaris
Disk /dev/dm-0: 1134 MB, 1134560256 bytes 255 heads, 63 sectors/track, 137 cylinders Units = cylinders of 16065 * 512 = 8225280 bytes Disk identifier: 0x00000000
Disk /dev/dm-0 doesn't contain a valid partition table
Fdisk and formatting is one place where I do not experiment :-), too dangerous, so I welcome advice from someone with more experience.
I have used fdisk to prepare an empty disk, but this is definitely beyond my experience level.
Anne
On Sunday 01 November 2009 10:40:29 Anne Wilson wrote:
On Sunday 01 November 2009 01:54:42 Ben Boeckel wrote:
Anne Wilson wrote:
On Saturday 31 October 2009 16:19:32 Patrick Boutilier wrote:
This should work:
Copy data from SD card to hard drive, format SD card, copy data back to SD card.
There's one big problem. Partition managers don't recognise LUKS-encrypted drives, and I very much doubt if format does either. It will have to be a command that partners the encryption command, I guess.
Anne
Once the partition is decrypted, the block device under /dev/mapper should be readable by a partition manager.
Well, mounting the device in Dolphin, I can see the data. Oops - now I realise that it was the Windows data partition that I was seeing. There is a second 'Volume' in Dolphin, and clicking on that bounces immediately to 'home' (still in Places). This is the location '/media/-home' which contains only lost+found. Clicking on that brings the message 'Could not enter folder /media/-home/lost+found'. Entering it as root it says that there are 0 items.
Qtparted sees only my hard drive. I think this output from fdisk refers to it, though:
Disk /dev/mmcblk1: 7969 MB, 7969177600 bytes 255 heads, 63 sectors/track, 968 cylinders Units = cylinders of 16065 * 512 = 8225280 bytes Disk identifier: 0x000eb694
Device Boot Start End Blocks Id System
/dev/mmcblk1p1 * 1 765 6144831 83 Linux /dev/mmcblk1p2 766 903 1108485 83 Linux /dev/mmcblk1p3 904 968 522112+ 82 Linux swap / Solaris
Disk /dev/dm-0: 1134 MB, 1134560256 bytes 255 heads, 63 sectors/track, 137 cylinders Units = cylinders of 16065 * 512 = 8225280 bytes Disk identifier: 0x00000000
Disk /dev/dm-0 doesn't contain a valid partition table
Fdisk and formatting is one place where I do not experiment :-), too dangerous, so I welcome advice from someone with more experience.
I have used fdisk to prepare an empty disk, but this is definitely beyond my experience level.
Between finding an blog on the subject and reading the FM, I've come to the conclusion that the only way to handle this is through cryptsetup - which makes sense. The problem is that as far as I can see you can't get anywhere without knowing either the device name or it's mapping under /dev - and probably both. Based on the information above, I tried
cryptsetup luksDump /dev/mmcblk0 Command failed: /dev/mmcblk0 is not a LUKS partition
I don't know whether /dev/dm-0 is part of this puzzle or not, but that also is identified as not being a LUKS partition. Any ideas on how to proceed?
Anne
On Sun, Nov 1, 2009 at 8:04 AM, Anne Wilson cannewilson@googlemail.com wrote:
Between finding an blog on the subject and reading the FM, I've come to the conclusion that the only way to handle this is through cryptsetup - which makes sense. The problem is that as far as I can see you can't get anywhere without knowing either the device name or it's mapping under /dev - and probably both. Based on the information above, I tried
Unless i completely miss understand the problem, the LUKS creates just another partion, removable with any partition manager. Said manager doesn't need to understand what is in it to remove it. Mount and decrypt the partition, copy the data to hard drive, complete wipe the media card and partiton/format to something that you prefer and copy the data back.
On Tuesday 03 November 2009 01:47:09 Arthur Pemberton wrote:
On Sun, Nov 1, 2009 at 8:04 AM, Anne Wilson cannewilson@googlemail.com
wrote:
Between finding an blog on the subject and reading the FM, I've come to the conclusion that the only way to handle this is through cryptsetup - which makes sense. The problem is that as far as I can see you can't get anywhere without knowing either the device name or it's mapping under /dev - and probably both. Based on the information above, I tried
Unless i completely miss understand the problem, the LUKS creates just another partion, removable with any partition manager. Said manager doesn't need to understand what is in it to remove it. Mount and decrypt the partition, copy the data to hard drive, complete wipe the media card and partiton/format to something that you prefer and copy the data back.
Partition manager appear not to see it
Anne
On 11/03/2009 03:21 PM, Anne Wilson wrote:
On Tuesday 03 November 2009 01:47:09 Arthur Pemberton wrote:
On Sun, Nov 1, 2009 at 8:04 AM, Anne Wilsoncannewilson@googlemail.com
wrote:
Between finding an blog on the subject and reading the FM, I've come to the conclusion that the only way to handle this is through cryptsetup - which makes sense. The problem is that as far as I can see you can't get anywhere without knowing either the device name or it's mapping under /dev - and probably both. Based on the information above, I tried
Unless i completely miss understand the problem, the LUKS creates just another partion, removable with any partition manager. Said manager doesn't need to understand what is in it to remove it. Mount and decrypt the partition, copy the data to hard drive, complete wipe the media card and partiton/format to something that you prefer and copy the data back.
Partition manager appear not to see it
Do you have the data copied off the encrypted partition? If so just create a new partition.
Anne
fedora-kde mailing list fedora-kde@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/fedora-kde New to KDE4? - get help from http://userbase.kde.org
On Tuesday 03 November 2009 19:31:16 Patrick Boutilier wrote:
Unless i completely miss understand the problem, the LUKS creates just another partion, removable with any partition manager. Said manager doesn't need to understand what is in it to remove it. Mount and decrypt the partition, copy the data to hard drive, complete wipe the media card and partiton/format to something that you prefer and copy the data back.
Partition manager appear not to see it
Do you have the data copied off the encrypted partition? If so just create a new partition.
It's a complete 8GB SD stick. I'm trying to wipe it. I do have the data, there's no problem there.
Anne
Anne Wilson wrote:
It's a complete 8GB SD stick. I'm trying to wipe it. I do have the data, there's no problem there.
1. Figure out the correct raw device. It's one of the /dev/sd* devices, but the important question is: which one?! WARNING: Make sure it's the correct one! You don't want to accidentally erase your hard disk!
2. Use dd to copy /dev/zero over the raw device found in 1. That will wipe out the whole drive and get rid of encryption and anything else. It can then be repartitioned and reformatted from scratch. WARNING: Once again: Make sure you don't dd over the wrong drive!!!
Kevin Kofler
On Tue, Nov 3, 2009 at 1:21 PM, Anne Wilson cannewilson@googlemail.com wrote:
On Tuesday 03 November 2009 01:47:09 Arthur Pemberton wrote:
On Sun, Nov 1, 2009 at 8:04 AM, Anne Wilson cannewilson@googlemail.com
wrote:
Between finding an blog on the subject and reading the FM, I've come to the conclusion that the only way to handle this is through cryptsetup - which makes sense. The problem is that as far as I can see you can't get anywhere without knowing either the device name or it's mapping under /dev - and probably both. Based on the information above, I tried
Unless i completely miss understand the problem, the LUKS creates just another partion, removable with any partition manager. Said manager doesn't need to understand what is in it to remove it. Mount and decrypt the partition, copy the data to hard drive, complete wipe the media card and partiton/format to something that you prefer and copy the data back.
Partition manager appear not to see it
'it' here would be /dev/sdX where the media card is linked to right? If so, I'm out of suggestions.
Ie. if `fdisk -l /dev/sdX` or equivalent doesn't show the partition, you should at least be able to create a new one over it.