-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RESCUE64-1.20.0, Intel 7600p NVMe, Failed Provisioning, PSIDrevert also failed #54
Comments
@youk you probably post this answer meant to post this answer for a different issue. Because the above answer has nothing to do with the question of this post. |
Well, yeah. It was a glitch at my side. Sorry. |
This is extremely weird. It won't be possible on a properly secured system since this image is unsigned. |
I actually boot RESCUE64-1.20.0.img using Ventoy. Ventoy itself could boot with secureboot enabled. Then I select the Rescue image and somehow it could boot. Not sure how Ventoy could manage booting an unsigned image. Sorry I didn't update the issue. After many trials to provision my NVMe. I also tried to flash the RESCUE image alone on the USB. With that indeed, secure boot has to be disabled, to be able to boot. |
Aah, Ventoy.. It's a great tool for quickly booting live ISOs, but as concerns bootloading a supposedly secured system.. The way it circumvents Secure Boot (yes, it circumvents it) is a big security hole. |
Can Ventoy automatically chainload RESCUE64-1.20.0.img, thereby solving the secure boot issue with SEDutil? |
I am not that familiar with Ventoy internals, but I doubt that. Each kind of bootable image needs specific support in Ventoy. Even if Ventoy could chainload it, it would only help to circumvent SecureBoot. There's a large discussion regarding SecureBoot in Ventoy – Ventoy should only allow the execution of Secure Boot signed executables when Secure Boot is enabled. |
No Ventoy tampers too much with any OS boot process. while it is based off of grub2 it is so far separated it's loading is effectively not the same as a grub2 |
Can you please hint if
sedutil-cli
is really working? There is not a lot of documentation on the web. I've read carefully and followed the Drive-Trust-Alliance/sedutil guide Encrypting your drive to the letter. There are very little documentation on the web. The few I found just echo the DTA's guide mentioned.Ultimately, I would like to know what is the reason of the failure to provision an OPAL 2.0 NVMe? Because it seems like a lots of people are having similar issue and there is no clear answer.
Test made on 2023-08-08, hardware:
SSDPEKKF512G8
: Intel Pro 7600p Series 512GB TLC PCI Express 3.1 x4 NVMe (AES-256) M.2 2280The problem
Any
sedutil-cli
to write on the drive failed withIn March 2022, A user having similar hardware and same troubles than what I am having opened an issue #40 in which a solution was suggested using
This command doesn't work on my drive. Here is the output I got. The same output is return whether the PSID is correct or intentionally fake (hoping to see
NOT_AUTHORIZED
response). Nothing happened to the drive. It could boot normallysedutil-cli --scan
sedutil-cli --query /dev/nvme0
Testing the PBA with linuxpba
The text was updated successfully, but these errors were encountered: