((( this is a reply to an older email because I think it's more relevant than
older emails )))

On Sat, Jun 22, 2024 at 12:35:56PM -0300, Crystal Kolipe wrote:
> On Sat, Jun 22, 2024 at 03:02:29PM +0000, Anon Loli wrote:
> > On Sat, Jun 22, 2024 at 11:51:53AM -0300, Crystal Kolipe wrote:
> > > On Sat, Jun 22, 2024 at 01:02:04PM +0000, Anon Loli wrote:
> > > > Hello list
> > > > So I was trying to resolve the problem that I just submitted with the
> > > > Installer, and I was putting a fresh install75 on my USB, the problem 
> > > > is that
> > > > last DD/flash my USB was on sd2, and in meanwhile I attached my VERY 
> > > > IMPORTANT
> > > > external drive to my computer which became sd2 with crypto volume 
> > > > attached as
> > > > sd3, so it was mounted.
> > > 
> > > There is a difference between the crypto volume being _attached_ and a
> > > partition on it being _mounted_.
> > > 
> > > In your case the crypto volume contained within sd2 was attached as sd3.
> > > 
> > > But quite possibly none of the partitions on sd3 was mounted on /mnt.
> > > 
> > > Now you have overwritten the beginning of sd2, which is where the 
> > > encryption
> > > keys are stored.
> > > 
> > > But since it was hopefully already attached a copy of these keys will be 
> > > in
> > > RAM, despite the fact that you have trashed the on-disk copy.
> > > 
> > > So don't reset the machine now, because that copy would be lost.
> > > 
> > > What happens if you do:
> > > 
> > > # mount -oro /dev/sd3X /mnt
> > > 
> > > Replacing X with the partition that you actually had on the external disk,
> > > (probably a or d).
> > > 
> > > Are you able to see anything that was on the disk?
> > > 
> > > If so, let us know and don't do anything else that might crash the 
> > > machine.
> > > 
> > 
> > I sent a reply with some more info, do you still want me to proceed with
> > `mount -oro`?
> 
> No, the partition is already mounted.
> 
> I'm assuming that you only had this one partition on the encrypted volume sd3,
> and that it started at or near the beginning of the disk.  In the unlikely
> event that you had multiple partitions on it, the second and subsequent ones
> might still be mountable and intact.
> 
> In the more likely case that it was one large partition at the beginning, then
> the first ~70 Mb of sd3 have also been lost, because that data was backed by
> the first ~70 Mb of sd2 that you overwrote.
> 
> The one glimmer of hope that you have is that you are almost certainly still
> reading the data on the rest of sd3, (past the first ~70 Mb), correctly
> decrypted, because the key is in RAM, (but overwritten on the disk).
> 
> If the data was genuinely valuable as you describe, you might want to attach
> a new storage volume that is at least as big as sd3, and write an image of sd3
> to that volume whilst you still can, (because once you reset the machine or
> detach the sd3 volume the key will be lost).
> 
> In theory most of your data would be recoverable from that image, but it would
> require a lot of work and knowledge of ffs filesystem layout.
> 
> If you do make an image of the disk, you could try searching it for ASCII
> strings and if you found any then it would confirm that the encrypted data was
> correctly decrypted at the time of copying.
> 
> Oh, and in the future it's much easier to make backups than to go through this
> nightmare of data recovery.
> 

Okay, I now have a fresh big chunky encrypted drive on another machine and can
transfer the image/files from the corrupted sd3i to it, but when I tried to run
`dd if=/dev/sd3i | ssh destination "dd of=/mnt/somewhere/ssdimage bs=1m"
or even to a regular file on the same machine, I got this:
"dd: /dev/sd3i: Device busy"

What does this mean? Did I lose the key from RAM or something else? Did I lose
my data forever? :(

Reply via email to