Do the sedutil-cli revert commands also reset the given SID?











up vote
1
down vote

favorite












In sedutil-cli a



sedutil-cli --PSIDrevert <password> <device>


"Reset the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password" By which I assume it returns all the SIDs to the MSID (manufacturer default, queryable from interface), and creates a new DEK if the locking system was in use. That's the easy one.



My question is do the other revert commands return the given pasword to the MSID? For example:



sedutil-cli --reverttper <password> <device>


Says it 'Reset(s) the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password' Does this revert the LockingSP and AdminSP SIDs back to MSID as well, or do they keep their present values. Similarly does:



sedutil-cli --revertLockingSP <password> <device>


just deactivate the locking system (and cryptographically wipe any locked data), or does it wipe the SID/password for the locking SP as well? These would make the jargon make more sense (reverting a system to it's starting state) but that doesn't make it true. Being able to return to a wiped unlocked state with one or two steps given the password would greatly simplify re-provisioning.










share|improve this question






















  • Additionally github.com/Drive-Trust-Alliance/sedutil/wiki/Remove-OPAL gives a procedure for removing opal by doing a no-erase revert of the locking SP followed by a reverttper. and says "When this is finished the drive will be in a non-opal managed state." That seems to be evidence in favor of this being true. I'm still trying to procure a spare drive to test with.
    – davolfman
    Nov 27 at 17:42















up vote
1
down vote

favorite












In sedutil-cli a



sedutil-cli --PSIDrevert <password> <device>


"Reset the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password" By which I assume it returns all the SIDs to the MSID (manufacturer default, queryable from interface), and creates a new DEK if the locking system was in use. That's the easy one.



My question is do the other revert commands return the given pasword to the MSID? For example:



sedutil-cli --reverttper <password> <device>


Says it 'Reset(s) the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password' Does this revert the LockingSP and AdminSP SIDs back to MSID as well, or do they keep their present values. Similarly does:



sedutil-cli --revertLockingSP <password> <device>


just deactivate the locking system (and cryptographically wipe any locked data), or does it wipe the SID/password for the locking SP as well? These would make the jargon make more sense (reverting a system to it's starting state) but that doesn't make it true. Being able to return to a wiped unlocked state with one or two steps given the password would greatly simplify re-provisioning.










share|improve this question






















  • Additionally github.com/Drive-Trust-Alliance/sedutil/wiki/Remove-OPAL gives a procedure for removing opal by doing a no-erase revert of the locking SP followed by a reverttper. and says "When this is finished the drive will be in a non-opal managed state." That seems to be evidence in favor of this being true. I'm still trying to procure a spare drive to test with.
    – davolfman
    Nov 27 at 17:42













up vote
1
down vote

favorite









up vote
1
down vote

favorite











In sedutil-cli a



sedutil-cli --PSIDrevert <password> <device>


"Reset the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password" By which I assume it returns all the SIDs to the MSID (manufacturer default, queryable from interface), and creates a new DEK if the locking system was in use. That's the easy one.



My question is do the other revert commands return the given pasword to the MSID? For example:



sedutil-cli --reverttper <password> <device>


Says it 'Reset(s) the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password' Does this revert the LockingSP and AdminSP SIDs back to MSID as well, or do they keep their present values. Similarly does:



sedutil-cli --revertLockingSP <password> <device>


just deactivate the locking system (and cryptographically wipe any locked data), or does it wipe the SID/password for the locking SP as well? These would make the jargon make more sense (reverting a system to it's starting state) but that doesn't make it true. Being able to return to a wiped unlocked state with one or two steps given the password would greatly simplify re-provisioning.










share|improve this question













In sedutil-cli a



sedutil-cli --PSIDrevert <password> <device>


"Reset the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password" By which I assume it returns all the SIDs to the MSID (manufacturer default, queryable from interface), and creates a new DEK if the locking system was in use. That's the easy one.



My question is do the other revert commands return the given pasword to the MSID? For example:



sedutil-cli --reverttper <password> <device>


Says it 'Reset(s) the device to it’s factory defaults using the SID password. If the locking SP is active this command ERASES ALL DATA, requires the SID password' Does this revert the LockingSP and AdminSP SIDs back to MSID as well, or do they keep their present values. Similarly does:



sedutil-cli --revertLockingSP <password> <device>


just deactivate the locking system (and cryptographically wipe any locked data), or does it wipe the SID/password for the locking SP as well? These would make the jargon make more sense (reverting a system to it's starting state) but that doesn't make it true. Being able to return to a wiped unlocked state with one or two steps given the password would greatly simplify re-provisioning.







linux opal






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 27 at 0:55









davolfman

61




61












  • Additionally github.com/Drive-Trust-Alliance/sedutil/wiki/Remove-OPAL gives a procedure for removing opal by doing a no-erase revert of the locking SP followed by a reverttper. and says "When this is finished the drive will be in a non-opal managed state." That seems to be evidence in favor of this being true. I'm still trying to procure a spare drive to test with.
    – davolfman
    Nov 27 at 17:42


















  • Additionally github.com/Drive-Trust-Alliance/sedutil/wiki/Remove-OPAL gives a procedure for removing opal by doing a no-erase revert of the locking SP followed by a reverttper. and says "When this is finished the drive will be in a non-opal managed state." That seems to be evidence in favor of this being true. I'm still trying to procure a spare drive to test with.
    – davolfman
    Nov 27 at 17:42
















Additionally github.com/Drive-Trust-Alliance/sedutil/wiki/Remove-OPAL gives a procedure for removing opal by doing a no-erase revert of the locking SP followed by a reverttper. and says "When this is finished the drive will be in a non-opal managed state." That seems to be evidence in favor of this being true. I'm still trying to procure a spare drive to test with.
– davolfman
Nov 27 at 17:42




Additionally github.com/Drive-Trust-Alliance/sedutil/wiki/Remove-OPAL gives a procedure for removing opal by doing a no-erase revert of the locking SP followed by a reverttper. and says "When this is finished the drive will be in a non-opal managed state." That seems to be evidence in favor of this being true. I'm still trying to procure a spare drive to test with.
– davolfman
Nov 27 at 17:42










1 Answer
1






active

oldest

votes

















up vote
0
down vote













By experimentation if I use an installer as a live system and run:



sedutil-cli --revertnoerase oldpassword /dev/sda
sedutil-cli --reverttper oldpassword /dev/sda


It puts the drive into a state where I can run



sedutil-cli --initialsetup newpassword /dev/sda


Since initialsetup wasn't given the old password, the only way this would work is if the SIDs had been reset to the MSID that it could pull from the interface.



However, when running:



sedutil-cli --revertnoerase newpassword /dev/sda
sedutil-cli --activateLockingSP oldpassword /dev/sda
sedutil-cli --activateLockingSP newpassword /dev/sda


Only the second activation works. So --revertnoerase keeps the LockingSP SID and just deactivates it, only working if you know the existing password instead of setting a new one.



So, on a system where the AdminSP SID is known, but the drive is too deeply embedded to get easy physical access, the drive can be reverted using the password.






share|improve this answer





















    Your Answer








    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "3"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });














    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1378602%2fdo-the-sedutil-cli-revert-commands-also-reset-the-given-sid%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes








    up vote
    0
    down vote













    By experimentation if I use an installer as a live system and run:



    sedutil-cli --revertnoerase oldpassword /dev/sda
    sedutil-cli --reverttper oldpassword /dev/sda


    It puts the drive into a state where I can run



    sedutil-cli --initialsetup newpassword /dev/sda


    Since initialsetup wasn't given the old password, the only way this would work is if the SIDs had been reset to the MSID that it could pull from the interface.



    However, when running:



    sedutil-cli --revertnoerase newpassword /dev/sda
    sedutil-cli --activateLockingSP oldpassword /dev/sda
    sedutil-cli --activateLockingSP newpassword /dev/sda


    Only the second activation works. So --revertnoerase keeps the LockingSP SID and just deactivates it, only working if you know the existing password instead of setting a new one.



    So, on a system where the AdminSP SID is known, but the drive is too deeply embedded to get easy physical access, the drive can be reverted using the password.






    share|improve this answer

























      up vote
      0
      down vote













      By experimentation if I use an installer as a live system and run:



      sedutil-cli --revertnoerase oldpassword /dev/sda
      sedutil-cli --reverttper oldpassword /dev/sda


      It puts the drive into a state where I can run



      sedutil-cli --initialsetup newpassword /dev/sda


      Since initialsetup wasn't given the old password, the only way this would work is if the SIDs had been reset to the MSID that it could pull from the interface.



      However, when running:



      sedutil-cli --revertnoerase newpassword /dev/sda
      sedutil-cli --activateLockingSP oldpassword /dev/sda
      sedutil-cli --activateLockingSP newpassword /dev/sda


      Only the second activation works. So --revertnoerase keeps the LockingSP SID and just deactivates it, only working if you know the existing password instead of setting a new one.



      So, on a system where the AdminSP SID is known, but the drive is too deeply embedded to get easy physical access, the drive can be reverted using the password.






      share|improve this answer























        up vote
        0
        down vote










        up vote
        0
        down vote









        By experimentation if I use an installer as a live system and run:



        sedutil-cli --revertnoerase oldpassword /dev/sda
        sedutil-cli --reverttper oldpassword /dev/sda


        It puts the drive into a state where I can run



        sedutil-cli --initialsetup newpassword /dev/sda


        Since initialsetup wasn't given the old password, the only way this would work is if the SIDs had been reset to the MSID that it could pull from the interface.



        However, when running:



        sedutil-cli --revertnoerase newpassword /dev/sda
        sedutil-cli --activateLockingSP oldpassword /dev/sda
        sedutil-cli --activateLockingSP newpassword /dev/sda


        Only the second activation works. So --revertnoerase keeps the LockingSP SID and just deactivates it, only working if you know the existing password instead of setting a new one.



        So, on a system where the AdminSP SID is known, but the drive is too deeply embedded to get easy physical access, the drive can be reverted using the password.






        share|improve this answer












        By experimentation if I use an installer as a live system and run:



        sedutil-cli --revertnoerase oldpassword /dev/sda
        sedutil-cli --reverttper oldpassword /dev/sda


        It puts the drive into a state where I can run



        sedutil-cli --initialsetup newpassword /dev/sda


        Since initialsetup wasn't given the old password, the only way this would work is if the SIDs had been reset to the MSID that it could pull from the interface.



        However, when running:



        sedutil-cli --revertnoerase newpassword /dev/sda
        sedutil-cli --activateLockingSP oldpassword /dev/sda
        sedutil-cli --activateLockingSP newpassword /dev/sda


        Only the second activation works. So --revertnoerase keeps the LockingSP SID and just deactivates it, only working if you know the existing password instead of setting a new one.



        So, on a system where the AdminSP SID is known, but the drive is too deeply embedded to get easy physical access, the drive can be reverted using the password.







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Nov 28 at 18:14









        davolfman

        61




        61






























            draft saved

            draft discarded




















































            Thanks for contributing an answer to Super User!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.





            Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


            Please pay close attention to the following guidance:


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1378602%2fdo-the-sedutil-cli-revert-commands-also-reset-the-given-sid%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            "Incorrect syntax near the keyword 'ON'. (on update cascade, on delete cascade,)

            Alcedinidae

            Origin of the phrase “under your belt”?