I’m starting wonder if there is some sort of drive encryption going on here…
I don’t know if this means anything or applies to your drive, or even that you are somehow using this feature:
I was reading about their encryption stuff as well and saw something about “instantaneous erase”
4.6 Cryptographic erase
A significant feature of SEDs is the ability to perform a cryptographic erase. This involves the host telling the drive to change the data
encryption key for a particular band. Once changed, the data is no longer recoverable since it was written with one key and will be
read using a different key. Since the drive overwrites the old key with the new one, and kee ps no history of key changes, the user
data can never be recovered. This is tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or
redispositioned.
Have you used Seagate’s SeaChest before? You might be able to gather more information about the drives and their status from Seagate’s own tool.
i have not used any Seagate software on these drives - i essentially left the drives in the NAS system all this time - with the exception of removing 1 of the drives to try and read through ubuntu
I meant as in your familiarity of using the software. You might be able to gather more information about the drives by using SeaChest, either in a live Ubuntu session or downloading and extract it to a temporary working directory while still in SCALE.
Only to gather information. Not to make any changes.
Im not familiar with it at all - and im not sure how I would go about loading it into SCALE
It’s a .zip
file that contains the entire suite of prebuilt libraries and executables for Windows and Linux.
As the root/admin user, you can make a temporary directory to work inside:
mkdir /seagate
cd /seagate
Then use wget
to retrieve the file:
wget https://www.seagate.com/content/dam/seagate/migrated-assets/old-support-files/seachest/SeaChestUtilities.zip
Then use 7z to extract the archive:
7z x SeaChestUtilities.zip
Then navigate to to the folder that contains the binaries:
cd SeaChestUtilities/SeaChestUtilities/Linux/Non-RAID/x86_64
Then make the binaries executable:
chmod +x *
Then use a particular binary in this form:
./SeaChest_Info --scan
Retrieve info about a particular drive (“sg0”):
./SeaChest_Security -d /dev/sg0 --ataSecurityInfo
./SeaChest_Security -d /dev/sg0 --tcgInfo
I’m just giving examples. You need to be 100% sure you’re not doing any destructive or modification commands. You want to only stick with “info” or “query” commands.
Would this require me to remove and plug the harddrives into my working PC?
I am honestly not entirely confident about this, but I am willing to try if guided with some help.
On another note - couple days before my NAS crashed i was messing with trying to create a VM - there were some issues then - and thats when i went into the BIOS to edit some settings such as IOMMU, APS modes, CPU phase controls, C1E, and some power saving controls like “AMD Cool’n’quiet” - However, i didnt get anywhere, and i just left them. I continued to use the NAS for file copy after - as my recap goes. Copying to Android - then NAS restarted when using media encoder
Plug harddrives into my working windows PC to do this?
Since SCALE is based on Debian, the command-line tools should be able to work in SCALE.
I guess my question is - if i were using the Shell to do thse commands - would creating those diretories overwrite any of the information on the drives right now? where would it be downloading the files to? where is the directory being created
It would be on the OS’s (SCALE’s) root filesystem, which is on your boot-pool.
It’s like how NVIDIA’s Windows installer creates a temporary directory called “NVIDIA” in the root of the C:\ drive.
Nothing is touching the Seagate drives. The only time they are involved is when you run a command against them, such as:
./SeaChest_Security -d /dev/sg0 --tcgInfo
I will try this shortly - thanks
I would need 7z on scale as well? NVM managed to just unzip
kind of lost from this point on tho
Should be preinstalled already. You could also do unzip SeaChestUtilities.zip
.
root@truenas[...aChestUtilities/Linux/Non-RAID/x86_64]# ./SeaChest_Info --scan
==========================================================================================
SeaChest_Info - Seagate drive utilities - NVMe Enabled
Copyright (c) 2014-2024 Seagate Technology LLC and/or its Affiliates, All Rights Reserved
SeaChest_Info Version: 2.7.0-8_0_1 X86_64
Build Date: Sep 26 2024
Today: 20250224T151850 User: root
==========================================================================================
Vendor Handle Model Number Serial Number FwRev
ATA /dev/sg0 Patriot P220 128GB P220NIBB2406062815 HT3618C1
ATA /dev/sg1 ST12000NM0127 ZJV4YHA1 G006
ATA /dev/sg2 ST12000NM0127 ZJV59MC0 G006
root@truenas[...aChestUtilities/Linux/Non-RAID/x86_64]# ./SeaChest_Security -d /dev/sg1 --ataSecurityInfo
==========================================================================================
SeaChest_Security - Seagate drive utilities - NVMe Enabled
Copyright (c) 2014-2024 Seagate Technology LLC and/or its Affiliates, All Rights Reserved
SeaChest_Security Version: 3.4.1-8_0_1 X86_64
Build Date: Sep 26 2024
Today: 20250224T152004 User: root
==========================================================================================
/dev/sg1 - ST12000NM0127 - ZJV4YHA1 - G006 - ATA
====ATA Security Information====
Security State: 2
Enabled: False
Locked: False
Frozen: True
Password Attempts Exceeded: False
Master Password Capability: High
Master Password Identifier: 65533
Enhanced Erase Time Estimate: 2 minutes
Security Erase Time Estimate: 17 hours 48 minutes
All user data is encrypted: True
Restricted Sanitize Overrides ATA Security: False
SAT security protocol supported: False
is this the bad part?
root@truenas[...aChestUtilities/Linux/Non-RAID/x86_64]# ./SeaChest_Security -d /dev/sg2 --ataSecurityInfo
==========================================================================================
SeaChest_Security - Seagate drive utilities - NVMe Enabled
Copyright (c) 2014-2024 Seagate Technology LLC and/or its Affiliates, All Rights Reserved
SeaChest_Security Version: 3.4.1-8_0_1 X86_64
Build Date: Sep 26 2024
Today: 20250224T152140 User: root
==========================================================================================
/dev/sg2 - ST12000NM0127 - ZJV59MC0 - G006 - ATA
====ATA Security Information====
Security State: 2
Enabled: False
Locked: False
Frozen: True
Password Attempts Exceeded: False
Master Password Capability: High
Master Password Identifier: 65533
Enhanced Erase Time Estimate: 2 minutes
Security Erase Time Estimate: 17 hours 28 minutes
All user data is encrypted: True
Restricted Sanitize Overrides ATA Security: False
SAT security protocol supported: False