From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from nm3-vm4.bullet.mail.sg3.yahoo.com (nm3-vm4.bullet.mail.sg3.yahoo.com [106.10.148.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Fri, 19 Aug 2016 13:45:25 +0200 (CEST) Date: Fri, 19 Aug 2016 11:45:21 +0000 (UTC) From: Saibal Kumar Adhya Reply-To: Saibal Kumar Adhya Message-ID: <830443834.15018837.1471607121907.JavaMail.yahoo@mail.yahoo.com> In-Reply-To: <874579112.14972576.1471597033535.JavaMail.yahoo@mail.yahoo.com> References: <874579112.14972576.1471597033535.JavaMail.yahoo.ref@mail.yahoo.com> <874579112.14972576.1471597033535.JavaMail.yahoo@mail.yahoo.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_15018836_1839990318.1471607121901" Subject: Re: [dm-crypt] LUKS encrypted hard disk crashed. Recovery question List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "dm-crypt@saout.de" ------=_Part_15018836_1839990318.1471607121901 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable [saibal] Thanks a lot Michael.=C2=A0 > If you are able to somehow gain access to the key slots in the LUKS > header, it should be possible to decrypt the (stored) payload data, to > the extent that the data recovery agency was able to recover the data. > What they were not able to recover will decrypt to nonsense. =C2=A0 [saibal] I have couple of following question.=C2=A01) Is there a way to kno= w, if the key slot area in the LUKS header has been recovered or not? How t= o recover the entire partition from there? 2) This question is for my information. As I understand, LUKS header and "k= ey-slot" are very very critical. So, if any of these sectors get damaged th= en the entire partition is un-usable. Is there a backup copy of LUKS header= and key slots, kept within the partition itself? Thanks in advance. --Regards~Saibal Saibal Kumar AdhyaDebian user and Linux enthusiast. > > --=C2=A0 > Michael Kj?rling ?=C2=A0https://michael.kjorling.se=C2=A0?=C2=A0michael@k= jorling.se > =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0?People who think = they know everything really annoy > =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0those of us who kn= ow we don?t.? (Bjarne Stroustrup) =20 On Friday, August 19, 2016 2:27 PM, Saibal Kumar Adhya wrote: =20 Dear experts,=C2=A0 =C2=A0I had a 500GB hard disk which was encrypted usin= g the following specification. type: =C2=A0 =C2=A0LUKS1cipher: =C2=A0aes-xts-plain64keysize: 512 bitsdevic= e: =C2=A0/dev/sda5offset: =C2=A04096 sectorssize: =C2=A0 =C2=A0999708672 se= ctorsmode: =C2=A0 =C2=A0read/write Pass phrase is known. Unfortunately, the hard disk crashed sometime back. It is a hardware fault.= There was no backup. A data recovery agency managed to recover 50% of the sectors. However it is= unable to recover any data as the original disk was encrypted. So now trying to figure out how to de-crypt and recover some of the data? I'll be extremely grateful if you can provide some answer. Thanks in advanc= e. --Regards~Saibal Saibal Kumar AdhyaDebian user and Linux enthusiast.=C2=A0 =C2=A0 ------=_Part_15018836_1839990318.1471607121901 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
[saibal] Thanks a lot Michae= l. 

<= /span>
= > If you are able to somehow gain access= to the key slots in the LUKS
> header, it should be possible to decrypt the (s= tored) payload data, to
> the extent that the data recovery agency was able to = recover the data.
> What they were not able to recover will decrypt to nonsense= .
 
= [saibal] I have couple of following questio= n.
 
1) Is there a way to know, if the key slot area= in the LUKS header has been recovered or not? How to recover the entire pa= rtition from there?

2) This question is for my info= rmation. As I understand, LUKS header and "key-slot" are very very critical= . So, if any of these sectors get damaged then the entire partition is un-u= sable. Is there a backup copy of LUKS header and key slots, kept within the= partition itself?

Thanks in advance.

--
Regards
~Saibal

Saibal Kumar Adhya
Debian user and Linux enthusiast.
<= div dir=3D"ltr" id=3D"yui_3_16_0_ym19_1_1471589350772_105665">
>
> -- > Michael Kj= ?rling ? https://michael.kjorling.se michael@kjorling.se
>    =            ?People who think they know every= thing really annoy
>                tho= se of us who know we don?t.? (Bjarne Stroustrup)<= div dir=3D"ltr" id=3D"yui_3_16_0_ym19_1_1471589350772_105665">



= On Friday, August 19, 2016 2:27 PM, Saibal Kumar Adhya <saibalka@yahoo.= co.in> wrote:


=
Dear experts,
   I had a 500GB hard disk which was e= ncrypted using the following specification.

type:    LUKS1
cipher:  aes-xts-= plain64
keysize: 512 bits
device:  /dev/sda5
offset:  4096 sectors
size:    9997086= 72 sectors
mode:    read/write

Pass phrase is= known.

Unfortunately, the hard disk crashed sometime back. = It is a hardware fault. There was no backup.

A data recovery= agency managed to recover 50% of the sectors. However it is unable to reco= ver any data as the original disk was encrypted.

So now t= rying to figure out how to de-crypt and recover some of the data?

=
I'll be extremely grateful if you can provide some answer. Thanks in = advance.

--
Regards
~Saibal

Saibal = Kumar Adhya
Debian user and Linux enthusiast.
 


 


<= /div>
------=_Part_15018836_1839990318.1471607121901--