Announcement

Collapse
No announcement yet.

How to install dislocker?

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    How to install dislocker?

    I want to access my external hardrive locked with bitlocker in linux.I downloaded dislocker but cant manage to install it.I tried following the readme but couldnot install it.I dont understand the method.I am absolutely new to linux.I managed to install aptitude but cant understand what to do next.

    sudo apt-get install aptitude


    #2
    Links to what instructions you are following, as well as links to what/where you downloaded things from might be helpful

    Comment


      #3
      Originally posted by claydoh View Post
      Links to what instructions you are following, as well as links to what/where you downloaded things from might be helpful
      Download Link:http://www.hsc.fr/ressources/outils/dislocker/

      The install manual is inside the zip file which I am quoting below:

      INTRODUCTION
      `------------


      This file describes how to install dislocker onto your machine.






      REQUIREMENTS
      `------------


      You need:
      - Headers for FUSE;
      - Headers for PolarSSL;
      - A partition encrypted with BitLocker, from Windows Vista, 7 or 8.


      For Debian-like:
      aptitude install libfuse-dev libpolarssl-dev
      For Fedora-like:
      yum install fuse-devel polarssl-devel
      For OSX: Follow the instructions in the next section.


      Of course, you also need a compiler like gcc or clang, and make.


      Note that the code expects FUSE 2.6.






      INSTALLING
      `----------


      First thing to do is to cd into the src/ directory. Then, each OS type has its
      own section below, beware to follow yours:


      . If you are on MacOSX, just install Homebrew (http://brew.sh/) and run the
      following command:
      $ brew install dislocker.rb
      This will install dislocker.


      . If you're on FreeBSD, run the following commands for installing the required
      libraries:
      $ pkg install polarssl gmake fusefs-libs
      Then follow the instructions below (next point) by replacing `make' with
      `gmake':


      . If you aren't on MacOSX...
      If you already have installed the dependencies (see REQUIREMENTS section above),
      you just have to type `make' to generate the library and binaries, then
      `make install' as super-user to install these library and binaries on the
      filesystem.


      Note that the `-Werror' flag on the `WFLAGS' line in the Makefile may break the
      compilation, so you can remove it, but it is at your own risks.


      The binary will be installed into `/usr/bin/' by default, edit the INSTALL_PATH
      variable (into the Makefile) to change that before the `make install` command.
      Same thing goes for the library except the variable name in the Makefile is
      LIBRARY_PATH, which is `/usr/lib/' by default (or `/usr/lib64/' if it exists).


      Once installed, see dislocker(1) for details on how to use it.






      UNINSTALLING
      `------------


      I'm sure you don't want to do that. But if you're really forced by someone, just
      type `make uninstall` as super-user.






      PORTABILITY
      `-----------


      Globally, this was successfuly tested on Linux x86/x86_64, MacOSX and FreeBSD.
      It won't work on Windows and may not work on other BSDs.


      For MacOSX, it has been tested against OSXFUSE 2.3.8 and 2.3.9.


      For users of a gcc version < 4.3, you'll need to tweak the Makefile a little by
      removing `-Werror' from the WFLAGS variable.




      Whether it works or not, feel free to send comments and feedbacks to
      <dislocker __AT__ hsc __DOT__ fr>.






      NOTE
      `----


      Four binaries are built when compiling dislocker as described in the INSTALLING
      section:
      - One for disecting a .bek file and printing information about it
      dislocker-bek
      - Another one for printing information about a BitLocker-encrypted volume
      dislocker-metadata
      - A third one for decrypting a BitLocker encrypted partition into a flat file
      formatted as an NTFS partition you can mount
      dislocker-file
      - A last one, which is the one you're using when calling `dislocker',
      dynamically decrypts a BitLocker encrypted partition using FUSE
      dislocker-fuse




      You can build each one independently providing it as the makefile target. For
      instance, if you want to compile dislocker-fuse only, you'd simply run:
      make dislocker-fuse
      To install this binary only, you would then run the following command:
      make install BINS=dislocker-fuse

      Comment


        #4
        You can use muon to install the packages it mentions for Debian-like distributions. You don't need aptitude, you can use regular apt-get instead.


        Install libfuse-dev libpolarssl-dev, and build-essential (this gives you the gcc compiler and other tools needed to compile things)

        Browse to the folder with the code using Dolphin
        Hit the f4 key, which will open a terminal in the current folder you are in

        type:
        make
        Some stuff happens
        If there are no errors, w00t w00t!!

        if there are errors, post them here, there may be other dependencies not mentioned on the text file, there almost always are but not to worry. Easy, but perhaps tedious to track down what else you need.

        Once you have no errors type:
        sudo make install.
        More stuff happens as it install the files to the system
        Done. Then you have to figure out how to use it
        Last edited by claydoh; Mar 23, 2015, 06:05 PM.

        Comment


          #5
          Originally posted by dave7899 View Post
          I want to access my external hardrive locked with bitlocker
          How did you configure BitLocker to manage keys? To decrypt the data you'll need the FVEK (full volume encryption key). The FVEK is always encrypted. You'll need the VMK (volume master key) to decrypt it. The VMK is encrypted with one or more "protectors"; usually, this is stored in the TPM (trusted platform module), on a USB drive, or in your head (that is, a PIN or password).

          When you boot Linux, you won't be able to read the VMK protector from the TPM, if that's what you're using. You'll need the recovery password -- this is a secondary protector for the VMK and will decrypt it, which in turn permits decrypting the FVEK. Did you write it down or store it in a file somewhere when you initially configured BitLocker on the volume?

          Comment


            #6
            Originally posted by SteveRiley View Post
            How did you configure BitLocker to manage keys? To decrypt the data you'll need the FVEK (full volume encryption key). The FVEK is always encrypted. You'll need the VMK (volume master key) to decrypt it. The VMK is encrypted with one or more "protectors"; usually, this is stored in the TPM (trusted platform module), on a USB drive, or in your head (that is, a PIN or password).

            When you boot Linux, you won't be able to read the VMK protector from the TPM, if that's what you're using. You'll need the recovery password -- this is a secondary protector for the VMK and will decrypt it, which in turn permits decrypting the FVEK. Did you write it down or store it in a file somewhere when you initially configured BitLocker on the volume?
            Umm....I was hoping to unlock it with my password like in windows.Is that possible?

            Comment


              #7
              Originally posted by dave7899 View Post
              Umm....I was hoping to unlock it with my password like in windows.Is that possible?
              The password you type when you log into Windows has no relationship whatsoever to BitLocker.

              When you enabled BitLocker on Windows, you would have been prompted for a couple things:
              • which kind of key protector to use: TPM, TPM + startup key (USB), TPM + PIN, TPM + PIN + startup key, startup key alone, or password alone
              • to write down, print, or otherwise save the recovery password (not the same thing as key protector password) displayed in a dialog box during BitLocker configuration

              If your key protector is TPM, TPM + startup key (USB), TPM + PIN, or TPM + PIN + startup key, and you don't have a record of the recovery password, then you will not be able to access the BitLocker volume from Linux. Only the installed copy of Windows can unseal the TPM to obtain the protector to decrypt the VMK.

              If your key protector is a startup key alone or password alone, Dislocker can use that to decrypt the VMK.

              If you do have the recovery password available, Dislocker can also use that to decrypt the VMK.

              Comment


                #8
                How can I make it mount on system restart? I don't want it to be one time mount until system shutdown.

                Comment

                Working...
                X