Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bridge type PLX (Oxford Semiconductor) #129

Open
cangeles opened this issue Jan 6, 2022 · 63 comments
Open

bridge type PLX (Oxford Semiconductor) #129

cangeles opened this issue Jan 6, 2022 · 63 comments

Comments

@cangeles
Copy link

cangeles commented Jan 6, 2022

I have a WD Duo with two 2TB drives that I configured as RAID 1, naively believing that if something happened to one of the drives that I would be able to recover my data. Well, the device died and I have two mirrored drives that I can't access. I found your tool and found that I have the PLX controller. Would you be able to assist with a decryptor? I ran the dumpkeysector option and saved it to a file. I also ran the dumplast option and have that output saved to a file. Both are included in the attached zip file.

What other information would you need to develop something?

sda.zip

@cangeles
Copy link
Author

cangeles commented Jan 6, 2022

I saw in another post the you requested the person to run dumpfirst so I included it in the attached zip file.

Also, here is the output of dumpkeysector if you need it for any reason.

$ sudo ./reallymine dumpkeysector /dev/sda sda-dumpkeysector.bin
sector at 0x105ED363400
bridge type PLX (Oxford Semiconductor)

sda-dumpfirst.zip

@themaddoctor
Copy link

I wonder if something is wrong with your keyblock. It looks suspicious. Can you dump these two sectors?
3907029888 and 3907029896

@themaddoctor
Copy link

sudo dd if=/dev/sda count=1 skip=3907029888 of=3907029888.bin
sudo dd if=/dev/sda count=1 skip=3907029896 of=3907029896.bin

@cangeles
Copy link
Author

cangeles commented Jan 6, 2022

Both report zero bytes

I have the drive connected as a physical drve to a Linux guest in VMware. fdisk -l list the /dev/sda but dd gives this message:

dd: /dev/sda: cannot skip: Invalid argument

@cangeles
Copy link
Author

cangeles commented Jan 6, 2022

$ sudo fdisk -l
Disk /dev/sda: 1.84 TiB, 2000398934016 bytes, 3907029168 sectors
Disk model: VMware Virtual S
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

@themaddoctor
Copy link

Can you attach it to a true linux machine?

@themaddoctor
Copy link

Or dump more of the end of the disk?
Adjust the numbers until your dump is about 4MB.

@themaddoctor
Copy link

BTW, using the keyblock that you posted does not give the correct key needed to decrypt the start-of-disk sample you also posted.

@cangeles
Copy link
Author

cangeles commented Jan 6, 2022

Alright. I'm setting up a physical Linux system. I may try the dumpkeysector again on the physical system. Does this look correct to dump the last 4MB? 4MB is 8000 sectors so I subtracted that from the fdisk sector count.

sudo dd if=/dev/sda skip=3907021896 of=last4MB.bin

@themaddoctor
Copy link

Are you still using the WD enclosure or bridge card? You need to use SATA or a generic enclosure.

@cangeles
Copy link
Author

cangeles commented Jan 6, 2022

The WD enclosure died so I've been putting one of the hard drives in a Startech dock and connecting it via USB.

@cangeles
Copy link
Author

cangeles commented Jan 6, 2022

I was going to use a spare Intel NUC that I have that way. I'll open it up and connect it with the spare SATA port it has.

@themaddoctor
Copy link

The dock should work fine. Yes on
sudo dd if=/dev/sda skip=3907021896 of=last4MB.bin

@cangeles
Copy link
Author

cangeles commented Jan 7, 2022

Here's the last 4MB of the drive, well, 8K sectors. I'm running dumpkeysector on this physical Linux system again, just in case. It took a few days on the Linux VM though.

Also, I noticed that the two sectors you asked me to dump go beyond the sector count of the drive. Are there two other sectors you would like me to dump?

last4MB.zip

@themaddoctor
Copy link

The last 4MB contains only zeroes.

It took so long because it kept looking, even when it should have stopped.

Please look at the bridge card and verify the chip number.

@cangeles
Copy link
Author

cangeles commented Jan 7, 2022

Alright, I'll take a look at it tonight. I'll post again tomorrow. Thanks!

@cangeles
Copy link
Author

I have the Duo taken apart but I'm not sure which chip has the information you need? I've attached the pictures of the front and back.

PXL_20220110_204349964
PXL_20220110_203354766

@themaddoctor
Copy link

That's what I was afraid of. You have the JMS561 chip, which we do not yet understand.
It might be that the key is stored on one of the EPROM chips. If you have the ability to remove and read a chip, then you should start with U1, which seems to be directly connected to the JMS561.
Another option is that the key is stored in a service-area module on the disk itself. Then you would use a tool called HDDSupertool
(http://www.hddsuperclone.com/sitev1/).
If you can read the chip or dump the modules, I would be happy to look at them.

@themaddoctor
Copy link

BTW, the reason the program ran so long and told you that you had a PLX chip is that it kept going until it found a 4-character string ("SinE") that it recognized. That string was present in your data only by accident.

@cangeles
Copy link
Author

Is the free version enough or should I purchase the temporary license of the Pro version?

@themaddoctor
Copy link

I've only ever used the free one.

@cangeles
Copy link
Author

I'm looking through the user manual but I'm not sure what command to run? I see the various scripts and hddmenu. Use hddmenu, VSC, 6) WD royl (Marvel) dump all modules? Also, I see a few warnings that commands may not work on USB drives so I should connect the drive to the open SATA port on the NUC?

@themaddoctor
Copy link

Yes.

@cangeles
Copy link
Author

I received an error dumping all modules VSC, option 6. The output is below as well as the output for Identify device and Smart info.

Thank you!

VSC menu
q) Quit
p) Previous menu
h) Toggle script help
1) WD dump mod 42 (older Caviar drives)
2) WD royl (Marvel) dump mod 02
3) WD royl (Marvel) dump mod 32
4) WD royl (Marvel) patch mod 02 (slow fix)
5) WD royl (Marvel) patch mod 32 (slow fix additional)
6) WD royl (Marvel) dump all modules
7) WD royl (Marvel) dump selected module
8) WD royl (Marvel) read rom
9) WD royl (Marvel) check rom file
10) WD royl (Marvel) write rom (dangerous)
11) WD royl (Marvel) write module (dangerous)
Enter your choice:
> 6
6
identify
Model: WDC WD20EFRX-68EUZN0
Serial: WD-WCC4M6TDKL93
enable vsc
Command failed!
sense_key=0x5 asc=0x24 ascq=0x0
error=0x0 count=0x0 lba=0x0 device=0x0 status=0x0 altstatus=0x0
command_status= 0x0
data_transferred= 0x0


Device information menu
q) Quit
p) Previous menu
h) Toggle script help
1) Identify device
2) Smart info
Enter your choice:
> 1
1
Raw buffer:
0: 7a 42 ff 3f 37 c8 10 00 00 00 00 00 3f 00 00 00    zB.?7.......?...
10: 00 00 00 00 20 20 20 20 57 20 2d 44 43 57 34 43    ....    W -DCW4C
20: 36 4d 44 54 4c 4b 33 39 00 00 00 00 00 00 32 38    6MDTLK39......28
30: 30 2e 41 30 32 38 44 57 20 43 44 57 30 32 46 45    0.A028DW CDW02FE
40: 58 52 36 2d 45 38 5a 55 30 4e 20 20 20 20 20 20    XR6-E8ZU0N      
50: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 10 80                  ..
60: 00 40 00 2f 01 40 00 00 00 00 07 00 ff 3f 10 00    .@./.@.......?..
70: 3f 00 10 fc fb 00 00 01 ff ff ff 0f 00 00 07 00    ?...............
80: 03 00 78 00 78 00 78 00 78 00 00 00 00 00 00 00    ..x.x.x.x.......
90: 00 00 00 00 00 00 1f 00 0e 9f 06 00 4c 00 44 00    ............L.D.
a0: fe 03 00 00 6b 74 61 7d 33 67 69 74 41 bc 23 67    ....kta}3gitA.#g
b0: 7f 40 89 00 89 00 00 00 fe ff 00 00 00 00 08 00    .@..............
c0: 00 00 00 00 a0 86 01 00 b0 88 e0 e8 00 00 00 00    ................
d0: 00 00 00 00 03 60 00 00 01 50 e2 4e 9b 0d d3 ef    .....`...P.N....
e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 40    ...............@
f0: 1c 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00    .@..............
100: 21 00 00 04 01 00 00 00 00 00 00 00 00 00 00 00    !...............
110: 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00    ................
120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
190: 00 00 00 00 00 00 00 00 00 00 00 00 3d 70 00 00    ............=p..
1a0: 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00    ...@............
1b0: 00 00 18 15 00 00 00 00 00 00 00 00 3e 10 00 00    ............>...
1c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
1d0: 00 00 00 00 01 00 00 10 00 00 00 00 00 00 00 00    ................
1e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00    ................
1f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a5 86    ................
Model= WDC WD20EFRX-68EUZN0                    
Serial=      WD-WCC4M6TDKL93
Firmware revision= 82.00A82
supports 48 bit commands = 1
total addressable sectors= 3907029168
words per logical sector= 0
Size in bytes= 2000398934016
Size in MiB= 1907729
logical sectors per physical sector(2^x)= 3
enhanced_security_erase_supported= 1
security_count_expired= 0
security_frozen= 0
security_locked= 0
security_enabled= 0
security_supported= 1
error_recovery_control= 1
long_sector_access =0
drive look ahead supported= 1
drive look ahead status= 1
write_uncorrectable supported= 1
 
Device information menu
q) Quit
p) Previous menu
h) Toggle script help
1) Identify device
2) Smart info
Enter your choice:
> 2
2
Smart structure version= 16
ID#   FLAG  VALUE WORST THRESH   RAW DATA          ATTRIBUTE NAME
  1  0x002f  200   200    51   0x00000000000000   Read Error Rate
  3  0x0027  173   172    21   0x000000000010e5   Spin-Up Time
  4  0x0032   36    36     0   0x0000000000fdab   Start/Stop Count
  5  0x0033  200   200   140   0x00000000000000   Reallocated Sectors Count
  7  0x002e  200   200     0   0x00000000000000   Seek Error Rate
  9  0x0032   95    95     0   0x00000000000fd4   Power-On Hours Count
 10  0x0032  100   100     0   0x00000000000000   Spin Retry Count
 11  0x0032  100   100     0   0x00000000000000   Calibration Retries
 12  0x0032   36    36     0   0x0000000000fda9   Power Cycle Count
192  0x0032  183   183     0   0x00000000003374   Power-Off Retract Cycles
193  0x0032  182   182     0   0x0000000000d516   Load/Unload Cycles
194  0x0022  117    89     0   0x0000000000001e   Temperature
196  0x0032  200   200     0   0x00000000000000   Reallocation Events
197  0x0032  200   200     0   0x00000000000000   Current Pending Sectors
198  0x0030  100   253     0   0x00000000000000   Off-line Uncorrectable
199  0x0032  200   200     0   0x00000000000000   UDMA CRC Error Rate
200  0x0008  200   200     0   0x00000000000000   Write Error Rate

@themaddoctor
Copy link

Sorry. I don't know.

@themaddoctor
Copy link

This page suggests that if you replace the bridge card with an identical one, then the disks are decrypted like they were with the original card. That could mean that the key is stored in the modules somewhere. It could also mean that you could get your data back if you can buy a replacement card.

https://forum.hddguru.com/viewtopic.php?f=1&t=36609&sid=086cee23d2cfee3a654ec5b9eeb638be&start=20

@themaddoctor
Copy link

Can you try talking to the creator of HDDSupertool about the error? I am very curious to know where that key is kept. Not only will that information help you, but someone comes along with a WD Duo every few months with the same problem.

@pillepalle1
Copy link

I have the same issue and also a platine with the JMS561.

Connecting the drive directly to my native Linux gives me

$ lsblk
NAME        MAJ:MIN RM   SIZE RO TYPE  MOUNTPOINTS
sda           8:0    0   5.5T  0 disk  
nvme0n1     259:0    0 238.5G  0 disk  
├─nvme0n1p1 259:1    0   512M  0 part  /efi
├─nvme0n1p2 259:2    0    50G  0 part  /
└─nvme0n1p3 259:3    0   188G  0 part  
  └─home    254:0    0   188G  0 crypt /home

which surprises me, because I know there should be multiple partitions.

The output of hddsupertools looks disheartening as well

VSC menu
q) Quit
p) Previous menu
h) Toggle script help
1) WD dump mod 42 (older Caviar drives)
2) WD royl (Marvel) dump mod 02
3) WD royl (Marvel) dump mod 32
4) WD royl (Marvel) patch mod 02 (slow fix)
5) WD royl (Marvel) patch mod 32 (slow fix additional)
6) WD royl (Marvel) dump all modules
7) WD royl (Marvel) dump selected module
8) WD royl (Marvel) read rom
9) WD royl (Marvel) check rom file
10) WD royl (Marvel) write rom (dangerous)
11) WD royl (Marvel) write module (dangerous)
Enter your choice:
> 6
6
identify
Command failed!
sense_key=0x5 asc=0x24 ascq=0x0
error=0x0 count=0x0 lba=0x0 device=0x0 status=0x0 altstatus=0x0
command_status= 0x0
data_transferred= 0x200

Device information menu
q) Quit
p) Previous menu
h) Toggle script help
1) Identify device
2) Smart info
Enter your choice:
> 1
1
Command failed!
sense_key=0x5 asc=0x24 ascq=0x0
error=0x0 count=0x0 lba=0x0 device=0x0 status=0x0 altstatus=0x0
command_status= 0x0
data_transferred= 0x200

Device information menu
q) Quit
p) Previous menu
h) Toggle script help
1) Identify device
2) Smart info
Enter your choice:
> 2
2
Command failed!
sense_key=0x5 asc=0x24 ascq=0x0
error=0x0 count=0x0 lba=0x0 device=0x0 status=0x0 altstatus=0x0
command_status= 0x0
data_transferred= 0x200

I am able to retrieve data like so

sudo dd if=/dev/sda of=wdtest.dmp bs=128M count=1

but it appears to just be a huge blob nonsensical data.

image

@themaddoctor
Copy link

I'm afraid I can't be of much help at this point.
Your only hope is if the disk was partitioned with a nonstandard block size (some are this way).
If you dump sector 0 and post it, that will tell me if it is really encrypted etc.

sudo dd if=/dev/sda count=1 | hexdump -C

@WebStyles
Copy link

I have the same device: MyBook 1112 (0XUF943SE) with a 2 TB drive.

I have been scanning the raw blocks looking for 'SInE' and so far have found 11 different ones.

Strange thing happened with my drive. It was encrypted, I plugged it in, inserted the password, and the drive only decrypted the file structure but not the actual files (except for about 20 of them). So now it thinks it's unlocked, I can see all the folders and the files, but I can't open anything.

This was all on a macintosh computer.

I've attached photo of the board + all the 'SInE' instances I've found so far. I started scanning backwards, from the end first, so image 0 is the last one.

Any help on how I can go about to decrypt my files will be greatly appreciated.

Drive still works so I can extract more info if anyone is interested.
0
1
2
3
4
5
6
7
8
9
11
linuxData
WesternDigitalBoard

@themaddoctor
Copy link

That doesn't make any sense. The disk is either completely encrypted or completely open. You probably have an issue with user permissions.

@WebStyles
Copy link

I know it makes little sense, but it's not a permissions issue. I have read/write permissions on all the files that don't open... It gets even weirder when you take into account that only a bunch of files (less than 20) still open but all the others (thousands of photos, videos, work files, etc) don't open. Here's the message I get when trying to open anything:

Screenshot 2023-09-07 at 18 59 32

@WebStyles
Copy link

According to everything I have read about these drives, and the fact that the KEK is supposed to be somewhere on the raw drive starting with 'SInE', and the fact that so fat I have found 29 different locations with 'SInE' on the drive (and still counting, since so far I have only scanned 5% of it), I'm thinking maybe, for some strange reason there are multiple KEK instances and the drive somehow used the wrong one to decrypt the files... Is that even possible?

@WebStyles
Copy link

Screenshot 2023-09-07 at 19 08 01

@WebStyles
Copy link

Here's an example of what a simple .txt file that was on the drive looks like now.

Screenshot 2023-09-07 at 19 13 08

@themaddoctor
Copy link

The SInE instances that you showed do not look like keyblocks, because the SInE marker is not at a block boundary. There may be other information stored on the disk that is related to the bridge card, for example the WD software that you used to set or enter a password.

Everything is read through the bridge card, which means everything goes through the PLX chip. So, it would be expected that everything is encrypted or everything is not. The only other explanation I can think of is that you have an intermittent error. What happens if you try to read the same file a thousand times? Is the result exactly equal? What if you dump a big chunk of the disk and examine the result; can you see readable data in it?

@WebStyles
Copy link

The software used to encrypt the device was the original WD_Utilities app that came with it. I don't think it was on the drive, at least I cannot see it in the directory structure. I am using iBored on a macintosh to read those raw blocks. Also, the drive is connected to the original board.

I'm not sure what happens if I try to read a file 1000 times, because I haven't tried that, but I have, however, tried to read the data multiple times in various different computers and systems along the last 8 or 9 months, since it developed this issue.

The sg_raw command I used to read the first blocks shows that the returned byte3 means locked state according to the 'got HW crypto? On the (in)security of a Self-Encrypting Drive series' PDF by Gunnar Alendal (00 == no password set, 01 == locked, 02 == unlocked, 06 == locked out ), so my drive thinks it has no password set. Could it be possible that byte3 somehow got switched to 00 due to an error, but the password is actually set? I could (possibly) try to write over byte3 and set it as 01.
I can't find any explanation for why some of the files are good and all the others are not, but, if I had to guess, by looking at the files and their names, it seems 'something' got interrupted in the process of removing/changing the encryption, since the folder that contains the most unencrypted files is called 101, which would make it top of the list in alphabetical order. The files inside, however, seem to have been accessed/changed in the order they were once placed on the drive...

How would I go about extracting the KEK from the chip? If I could manage to grab that I could try decrypting one of the files manually.

Thanks for your answers and your patience.

@themaddoctor
Copy link

In normal use, encryption is never removed or changed. When you change the password, all that changes is the wrapped version of the KEK that is stored. In other words, the password is used only to read the KEK, and the KEK is constant. [There is a "quick-erase" feature that replaces the KEK so that all previous data is lost because the old KEK is lost.]

If you want to find the KEK, it is either stored on disk in a region blocked by the bridge card or in an EEPROM. If it is the former, then you can find it by removing the disk from the WD enclosure, removing the bridge card, and connecting the drive to the computer with a generic enclosure or directly to the motherboard with an SATA cable. Search the last few megabytes of the drive for another SInE block.

@WebStyles
Copy link

Thank you very much!
I really appreciate your answers and effort.
I'll try that. I'm, quite honestly, just fishing here for things I can try because I would really like to recover some of the files. I'll let you know how it goes.

Just another quick question before I try getting the KEK through a generic enclosure: The PDF I mentioned above says the KEK is normally 256 bits (32 bytes), but the result from the sg_raw output I posted above says the length of the KEK is 20 (bytes?)....
I'm asking because if I find the SInE block, I'm not really sure exactly how to extract the proper length. The app I'm using (iBored) has an option to write block to file, but the minimum block size it outputs is is 512 (see image below please).
Screenshot 2023-09-08 at 01 31 13

@themaddoctor
Copy link

themaddoctor commented Sep 8, 2023

I don't know what iBored is, and I don't want to know.

Sorry, I meant to say DEK in the above.

The DEK (disk key) is stored in a block whose length is 256 bytes. The DEK is encrypted with the KEK (key-encryption key). The KEK and DEK are both 16 or 32 bytes, but you can't find them exposed on the disk. You have to find the 256-byte block that starts with SInE on a sector boundary. A sector is a 512-byte block.

This is what a keyblock looks like:

00000000  53 49 6e 45 01 00 00 00  02 00 64 01 b6 f8 84 00  |SInE......d.....|
00000010  01 00 00 00 f5 ac 78 09  56 cb a1 48 7e 92 f7 43  |......x.V..H~..C|
00000020  98 47 b1 2b 37 dd 2b 57  7c c8 37 4f 4b b5 40 f4  |.G.+7.+W|.7OK.@.|
00000030  f2 c2 ea eb ba 7c 54 7e  58 a7 ff c9 3f fc 0b 55  |.....|T~X...?..U|
00000040  0f 81 66 cf 1a d8 85 74  11 9e 57 52 b0 83 06 0d  |..f....t..WR....|
00000050  8f cd 11 f3 ff ff ff ff  ff ff ff ff ff ff ff ff  |................|
00000060  ff ff ff ff ff ff ff ff  ff ff ff ff ff ff ff ff  |................|

@WebStyles
Copy link

Strange, when connected to a generic enclosure, I can't find a single SInE block. Scanned the entire drive.

@themaddoctor
Copy link

Then your keyblock is probably on the EEPROM.

In a generic enclosure, the drive should behave as if unpartitioned and unformatted. If you look at the first few sectors, you should see gibberish. The last few sectors should have mostly zeroes.

@WebStyles
Copy link

Yes, it does not show the partitions when in a generic enclosure.
When in the WD encolure with the board connected it shows the 2 partitions, But the first one never mounts, can't be scanned, and shows no info. I'm thinking maybe my issue is that first partition being damaged in some way (?). I also read recently that with these older drives, one of the 'common' issue with reading the data (on macintosh) is incompatibility of the software with OS X Catalina (which just happens to be my OS). Strange thing is I used the drive many many times on this same system before it all went wrong.

I suppose my next step will be to explore ways to read the KEK from the EEPROM...

@themaddoctor
Copy link

Look here: themaddoctor/linux-mybook-tools#89
There is a guy who knows how to read EEPROMs. Maybe he will tell you.

@WebStyles
Copy link

Thank you. His very first post is interesting, since I have the exact same 2TB green drive. I'm thinking maybe if I initialize the entire drive, I can grab the blobs from the exact same locations as he posted. (I have a dd backup of the partition that has all my files).

@WebStyles
Copy link

This may be a stupid question, but are the KEKs all the same (when the WD model and drive are the same?)... I mean, will me KEK be exactly the same as his? have you seen this happen on other drives or are they all unique?

@themaddoctor
Copy link

If you did not set a password, then the KEK is always the same.
If you set a password, then it is different.

@WebStyles
Copy link

Sorry, I meant to say DEK.... As I understand it, I can generate the KEK like this:

Password to KEK = (salt+Password) => (sha256 x 1000)

Salt = "WDC"

Algorithm 1 KEK generation from password ”abc123”:

Counter = 0
KEK = ”WDC.abc123”
while counter < 1000 do
KEK = SHA256(KEK)
counter += 1
end while

@themaddoctor
Copy link

DEK stays the same.

@WebStyles
Copy link

So let's say, if I put a brand new, completely zeroed out hard drive in the WD enclosure and format it, the WD Utilities software will extract the DEK from the EEPROM and place it on the last blocks of the file?

@themaddoctor
Copy link

It depends. Some put the encrypted DEK on the last few sectors of the hard drive, and some do not. Most with the PLX chip do not. If it does, it is stored where you cannot see it until you remove the disk and put it into a generic enclosure.

From what you have said earlier, your disk does not store the DEK on the disk, only in the EEPROM. I do not know how to extract anything from the EEPROM, but the guy at the END of the thread I pointed you to knows how to do it. He did not tell me how.

@WebStyles
Copy link

Yeah, I read the thread, he said it was a custom tool but didn't want to disclose it here....

I'll have to look elsewhere, surely someone out there knows how to do it.

@WebStyles
Copy link

My question earlier, related to if the DEK is always the same, was about the original one (as it is in the EEPROM). Did all the chips come with the same one: Meaning, if I can get someone else with the same model as me to extract their DEK, would it work do decrypt my drive?

@themaddoctor
Copy link

Absolutely not.

@WebStyles
Copy link

Thanks for the answer. I sure hope you're right.
In fact, those were my first thoughts, since I can see the entire directory structure and all filenames and folders are correct... I even tried finding all previous versions of WD Utilities, and read what OS each one was compatible with at the time.. But no luck in recovering anything. Unfortunately I didn't save all the old versions of WD Utilities, and I can't seem to find the page where I downloaded them from at the time.

Ironically, one of the things I had on the hard drive was precisely the original WD Utilities.

This is truly a strange issue, since a handful of files were still good (very few) and all the others were (are) corrupt.

What is strange though is that one day the drive was fine, the next it wasn't, and there was no change in system or WD Utilities or even adding/removing apps or updates in between, just a power failure.

I will experiment with installing an older version of Mac OS on an external drive and booting from there to see if it makes any difference.

@WebStyles
Copy link

The drive was originally bought when I had a 2010 iMac (running Mavericks), then eventually used on a macbook Air (also 2010), and then on my current machine which is a Retina 5k late 2015 iMac, running Catalina.

It worked without issues for almost 11 years.

@WebStyles
Copy link

HFS+

@WebStyles
Copy link

Thanks. I just registered at macrumours, found your username, but ca't send pm for some reason... Only options I get are to 'ignore' or 'unfollow' (the button 'start a conversation' is missing)

versions of WD Utilities I have are:
2_0_5_18
2_0_0_23
2_1_1_127

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants