Author Topic: ATA password manager on non-supported motherboard?  (Read 1556 times)

0 Members and 1 Guest are viewing this topic.

Offline hap2001Topic starter

  • Regular Contributor
  • *
  • Posts: 115
  • Country: us
ATA password manager on non-supported motherboard?
« on: July 10, 2024, 01:42:32 pm »
Hi, I've searched a lot and did find several project that add Security Extension to BIOS by modding the ROM binary, but I don't want that approach(too dangerous, and it cannot even set a new password).
Is there any minimal boot-able image that can just lock/unlock drives by ATA password, and then hand over booting to the main OS? Thanks.
 

Offline Halcyon

  • Global Moderator
  • *****
  • Posts: 5870
  • Country: au
Re: ATA password manager on non-supported motherboard?
« Reply #1 on: July 11, 2024, 09:30:01 am »
By the sounds of it, this is some kind of old or obscure system? ATA passwords have been a standard part of most BIOS's for quite a while.

That being said, what's your objective? Is the main point to secure the data on the drive? If so, ATA passwords are terrible and easily crackable/bypassed (for the most part).

You might want to look at something like full disk encryption offered by TrueCrypt/VeraCrypt instead. It doesn't need any BIOS support.
 
The following users thanked this post: hap2001

Online magic

  • Super Contributor
  • ***
  • Posts: 7050
  • Country: pl
Re: ATA password manager on non-supported motherboard?
« Reply #2 on: July 11, 2024, 10:04:59 am »
HDD passwords are meaningful on self-encrypting disks, this is rare on spinning rust but more common on SSDs. On non-encrypted disks data recovery services can bypass the password.

I seem to recall that there was some software for unlocking disks at boot time, intended for BIOSes with missing or limited password support (for example, not working with passwords longer than 10 characters) but I don't remember what it was.

The important part is unlocking the disk. Setting the password can be done separately under a normal OS, you don't need BIOS support for that.
 
The following users thanked this post: hap2001

Offline hap2001Topic starter

  • Regular Contributor
  • *
  • Posts: 115
  • Country: us
Re: ATA password manager on non-supported motherboard?
« Reply #3 on: July 11, 2024, 11:41:14 pm »
Thank you guys.
By the sounds of it, this is some kind of old or obscure system? ATA passwords have been a standard part of most BIOS's for quite a while.

That being said, what's your objective? Is the main point to secure the data on the drive? If so, ATA passwords are terrible and easily crackable/bypassed (for the most part).

You might want to look at something like full disk encryption offered by TrueCrypt/VeraCrypt instead. It doesn't need any BIOS support.
Most consumer level desktop don't support that, although most business laptops do. Things between would have mixed luck.
I use Linux now and I tried the standard LUKS, but it's not as easy to use as a ATA password.
HDD passwords are meaningful on self-encrypting disks, this is rare on spinning rust but more common on SSDs. On non-encrypted disks data recovery services can bypass the password.

I seem to recall that there was some software for unlocking disks at boot time, intended for BIOSes with missing or limited password support (for example, not working with passwords longer than 10 characters) but I don't remember what it was.

The important part is unlocking the disk. Setting the password can be done separately under a normal OS, you don't need BIOS support for that.
I'm aware even SED are not as secure as software solutions, but that's enough for me.
Yes but it would be nice to be able to set it without booting.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf