Author

Topic: OS X Recovery Keys (Read 948 times)

hero member
Activity: 518
Merit: 500
December 29, 2013, 12:36:05 AM
#14
OK thanks. I've not used filevault yet. Might give it a spin. Does it slow the system down much? My MacBook is ageing (2010 model), saving up for a Darth Vadar model in 2014.

If you get a new Mac that comes with a SSD, the decryption is hardware accelerated.  I have filevault enabled on my haswell macbook air and the disk I/O is lightning fast.

Yeah sounds like an SSD is a must. Thanks. Not sure my "give it a spin" is appropriate in that case though Smiley
legendary
Activity: 1176
Merit: 1020
December 29, 2013, 12:32:46 AM
#13
OK thanks. I've not used filevault yet. Might give it a spin. Does it slow the system down much? My MacBook is ageing (2010 model), saving up for a Darth Vadar model in 2014.

If you get a new Mac that comes with a SSD, the decryption is hardware accelerated.  I have filevault enabled on my haswell macbook air and the disk I/O is lightning fast.
legendary
Activity: 2912
Merit: 1060
December 29, 2013, 12:12:21 AM
#12
Oh you guys use a password not the tpm
hero member
Activity: 518
Merit: 500
December 28, 2013, 11:29:43 PM
#11
+1 to the above.

Glad my bitlocker does just that. You guys don't get a recovery key??

When you encrypt the boot drive with filevault, you are provided with a recovery key.  I wrote mine down.  As far as other encrypted volumes go, including time machine backups, you are not provided with a recovery key as far as I can tell.

I really meant if you can see the keys, what's to stop someone stealing your Mac and grabbing them all?

You need to enter you credentials before the key(s) was displayed.

OK thanks. I've not used filevault yet. Might give it a spin. Does it slow the system down much? My MacBook is ageing (2010 model), saving up for a Darth Vadar model in 2014.
legendary
Activity: 1176
Merit: 1020
December 28, 2013, 09:29:07 PM
#10
+1 to the above.

Glad my bitlocker does just that. You guys don't get a recovery key??

When you encrypt the boot drive with filevault, you are provided with a recovery key.  I wrote mine down.  As far as other encrypted volumes go, including time machine backups, you are not provided with a recovery key as far as I can tell.

I really meant if you can see the keys, what's to stop someone stealing your Mac and grabbing them all?

You need to enter you credentials before the key(s) was displayed.
member
Activity: 80
Merit: 10
December 28, 2013, 04:11:40 PM
#9
I really meant if you can see the keys, what's to stop someone stealing your Mac and grabbing them all?

If someone steals your Mac and it's powered on and unlocked, then you've already lost all your data. If it's not, then those keys won't be accessible without first booting up, which requires the passphrase to decrypt the key.
legendary
Activity: 2912
Merit: 1060
December 28, 2013, 10:08:49 AM
#8
Glad my bitlocker does just that. You guys don't get a recovery key??
hero member
Activity: 518
Merit: 500
December 28, 2013, 05:27:25 AM
#7

I wish people would just post a quick answer, rather than a link which may or may not be useful.
newbie
Activity: 7
Merit: 0
December 28, 2013, 04:42:51 AM
#6
It may be easier to disable filevault and then re-enable it. Once re-encrpyted, the master (backup) recovery key pops up in an alert box, which you can take a note of.

member
Activity: 70
Merit: 10
hero member
Activity: 518
Merit: 500
December 28, 2013, 03:57:18 AM
#4
It's a fundamental security weakness that us humans can only read plain text.  I would only be revealing it to myself in a secure environment.  Anyway, I've found some of what I was looking for.

Here is the option, as part of the "fdesetup" command.

 -outputplist
             Outputs the recovery key and additional system information to stdout in a plist dictionary.  If
             the recovery key changes, a Change key will be set and the EnableDate will contain the date of
             the change.   This should not be used when using the deferred mode.

Now my next question: where would that plist directory reside?

I really meant if you can see the keys, what's to stop someone stealing your Mac and grabbing them all?
legendary
Activity: 1176
Merit: 1020
December 28, 2013, 03:53:24 AM
#3
It's a fundamental security weakness that us humans can only read plain text.  I would only be revealing it to myself in a secure environment.  Anyway, I've found some of what I was looking for.

Here is the option, as part of the "fdesetup" command.

 -outputplist
             Outputs the recovery key and additional system information to stdout in a plist dictionary.  If
             the recovery key changes, a Change key will be set and the EnableDate will contain the date of
             the change.   This should not be used when using the deferred mode.

Now my next question: where would that plist directory reside?
hero member
Activity: 518
Merit: 500
December 28, 2013, 03:37:24 AM
#2

I know this is a little bit off topic -

Does anyone know how make os x display the recovery key (really just the direct encryption key) for an encrypted drive?  I've been going though a process of doubling down on all of my security procedures.  One result is going to be a bunch of encrypted drives, and I will be greater risk of data loss if all else stays the same.

First I would like to make os x show me in - plain text - each of the keys.  Then would like to have a way to test out each of those keys and prove to myself they are capable of decrypting the drive.

Does anyone know some terminal commands that would work?  Google is not being my friend.

Thanks

Wouldn't be very secure if it just showed the keys in plain text would it ....
legendary
Activity: 1176
Merit: 1020
December 28, 2013, 03:22:11 AM
#1

I know this is a little bit off topic -

Does anyone know how make os x display the recovery key (really just the direct encryption key) for an encrypted drive?  I've been going though a process of doubling down on all of my security procedures.  One result is going to be a bunch of encrypted drives, and I will be greater risk of data loss if all else stays the same.

First I would like to make os x show me in - plain text - each of the keys.  Then would like to have a way to test out each of those keys and prove to myself they are capable of decrypting the drive.

Does anyone know some terminal commands that would work?  Google is not being my friend.

Thanks
Jump to: