Provided by: openseachest_24.08.1-1_amd64 

NAME
openSeaChest_Security - manual page for openSeaChest_Security
==========================================================================================
DESCRIPTION
==========================================================================================
openSeaChest_Security - openSeaChest drive utilities - NVMe Enabled Copyright (c) 2014-2024
Seagate Technology LLC and/or its Affiliates, All Rights Reserved openSeaChest_Security Version:
3.4.1-8_0_1 X86_64 Build Date: Sep 19 2024 Today: 20240925T133707 User: current user
========================================================================================== Usage =====
openSeaChest_Security [-d <sg_device>] {arguments} {options}
Examples ========
openSeaChest_Security --scan openSeaChest_Security -d /dev/sg<#> -i openSeaChest_Security -d
/dev/sg<#> --SATInfo openSeaChest_Security -d /dev/sg<#> --llInfo openSeaChest_Security -d
/dev/sg<#> --ataSecurityInfo openSeaChest_Security -d /dev/sg<#> --ataSecureErase enhanced
openSeaChest_Security -d /dev/sg<#> --ataSecureErase enhanced --ataSecPassword
AutoATAWindowsString12345678901 --ataSecPassType user openSeaChest_Security -d /dev/sg<#>
--disableATASecPW --ataSecPassword AutoATAWindowsString12345678901 --ataSecPassType user
Return codes ============
Generic/Common exit codes 0 = No Error Found 1 = Error in command line options 2 = Invalid Device
Handle or Missing Device Handle 3 = Operation Failure 4 = Operation not supported 5 = Operation
Aborted 6 = File Path Not Found 7 = Cannot Open File 8 = File Already Exists 9 = Need Elevated
Privileges ---openSeaChest_Security specific exit codes--- 32 = Zero Validation Failure Anything
else = unknown error
Utility Options ===============
--csmiIgnorePort (Obsolete)
This option is obsolete and will be removed in future versions.
--csmiUsePort (Obsolete)
This option is obsolete and will be removed in future versions.
--csmiVerbose (Obsolete)
This option is obsolete and will be removed in future versions.
--echoCommandLine
Echo the command line entered into the utility on the screen.
--enableLegacyUSBPassthrough
Only use this option on old USB or IEEE1394 (Firewire) products that do not otherwise work with
the tool. This option will enable a trial and error method that attempts sending various ATA
Identify commands through vendor specific means. Because of this, certain products that may
respond in unintended ways since they may interpret these commands differently than the bridge
chip the command was designed for.
--forceATA
Using this option will force the current drive to be treated as a ATA drive. Only ATA commands
will be used to talk to the drive.
--forceATADMA
(SATA Only)
Using this option will force the tool to issue SAT commands to ATA device using the protocol set
to DMA whenever possible (on DMA commands). This option can be combined with --forceATA
--forceATAPIO
(SATA Only)
Using this option will force the tool to issue PIO commands to ATA device when possible. This
option can be combined with --forceATA
--forceATAUDMA
(SATA Only)
Using this option will force the tool to issue SAT commands to ATA device using the protocol set
to UDMA whenever possible (on DMA commands). This option can be combined with --forceATA
--forceSCSI
Using this option will force the current drive to be treated as a SCSI drive. Only SCSI commands
will be used to talk to the drive.
-h, --help
Show utility options and example usage (this output you see now) Please report bugs/suggestions to
seaboard@seagate.com. Include the output of --version information in the email.
--license
Display the Seagate End User License Agreement (EULA).
--modelMatch [model Number]
Use this option to run on all drives matching the provided model number. This option will provide
a closest match although an exact match is preferred. Ex: ST500 will match ST500LM0001
--noBanner
Use this option to suppress the text banner that displays each time openSeaChest is run.
--onlyFW [firmware revision]
Use this option to run on all drives matching the provided firmware revision. This option will
only do an exact match.
--onlySeagate
Use this option to match only Seagate drives for the options provided
-q, --quiet
Run openSeaChest_Security in quiet mode. This is the same as -v 0 or --verbose 0
-v [0-4], --verbose [0 | 1 | 2 | 3 | 4]
Show verbose information. Verbosity levels are: 0 - quiet 1 - default 2 - command descriptions 3 -
command descriptions and values 4 - command descriptions, values, and data buffers Example: -v 3
or --verbose 3
-V, --version
Show openSeaChest_Security version and copyright information & exit
Utility arguments =================
-d, --device [deviceHandle | all]
Use this option with most commands to specify the device handle on which to perform an operation.
Example: /dev/sg<#> CSMI device handles can be specified as <error<#><#><#>> To run across all
devices detected in the system, use the "all" argument instead of a device handle. Example: -d
all NOTE: The "all" argument is handled by running the
specified options on each drive detected in the
OS sequentially. For parallel operations, please use a script opening a separate instance for each
device handle.
--displayLBA [LBA]
This option will read and display the contents of the specified LBA to the screen. The display
format is hexadecimal with an ASCII translation on the side (when available).
-F, --scanFlags [option list]
Use this option to control the output from scan with the options listed below. Multiple options
can be combined.
ata - show only ATA (SATA) devices
usb - show only USB devices scsi - show only SCSI (SAS) devices nvme - show only NVMe devices
interfaceATA - show devices on an ATA interface interfaceUSB - show devices on a USB interface
interfaceSCSI - show devices on a SCSI or SAS interface interfaceNVME = show devices on an NVMe
interface sd - show sd device handles sgtosd - show the sd and sg device handle mapping ignoreCSMI
- do not scan for any CSMI devices allowDuplicates - allow drives with both CSMI and PD handles
to show up multiple times in the list
-i, --deviceInfo
Show information and features for the storage device
--llInfo
Dump low-level information about the device to assist with debugging.
-s, --scan
Scan the system and list all storage devices with logical /dev/sg<#> assignments. Shows model,
serial and firmware numbers. If your device is not listed on a scan immediately after booting,
then wait 10 seconds and run it again.
-S, --Scan
This option is the same as --scan or -s, however it will also perform a low level rescan to pick
up other devices. This low level rescan may wake devices from low power states and may cause the
OS to re-enumerate them. Use this option when a device is plugged in and not discovered in a
normal scan. NOTE: A low-level rescan may not be available on all interfaces or all OSs. The
low-level rescan is not guaranteed to find additional devices in the system when the device is
unable to come to a ready state.
--SATInfo
Displays SATA device information on any interface using both SCSI Inquiry / VPD / Log reported
data (translated according to SAT) and the ATA Identify / Log reported data.
--testUnitReady
Issues a SCSI Test Unit Ready command and displays the status. If the drive is not ready, the
sense key, asc, ascq, and fru will be displayed and a human readable translation from the SPC spec
will be displayed if one is available.
--fastDiscovery
Use this option
to issue a fast scan on the specified drive.
--zeroVerify [full | quick]
Use this option to verify drive content, whether it's set to zero or not. This operation will
read user accessible address and validate if content at that address is zero or not. Validation
modes:
full - Complete drive will be scanned for verification. quick - 0.1% of total capacity will be
scanned for ID and OD validation along with
2 random addresses from 10000 equal size sections each.
SATA Only: ========= --ataSATsecurityProtocol [enable | disable] (SATA only)
This option can be used to force enable or disable using the ATA security protocol as specified in
the SAT specification. By default, the tool will use this method when it is supported to allow
the SATL to understand and manage the security commands being performed and prevent other issues.
--ataSecFreeze
(SATA only)
This option will send the ATA security freezelock command to a device. This command prevents all
other ATA security commands from being processed until the next reset or power cycle.
--ataSecPassword ["ASCII password" | SeaChest | empty]
(SATA only)
Use this option to specify a password to use with an ATA security operation. If specifying a
password with spaces, quotes must be used. If SeaChest is given, the default SeaChest password
will be used. If empty is given, an empty password will be used. Examples:
"This is a valid password" ThisIsAlsoValid "This password uses \"quotes\" "This password is
\/\/eird"
--ataSecPassType [user | master]
(SATA only)
Use this option to specify if the password being given with the --ataSecPassword option is a user
or a master password. If this option is not provided, user is assumed.
--ataSecPWMod [byteswapped | zeropad | spacepad | fpad | leftAlign | rightAlign | uppercase | lowercase |
invertcase] (SATA Only)
Use this option to have the utility make modifications to the ATA security password to attempt
other various ways it may be sent by a system bios. These are not guaranteed to work, but may help
unlock a drive that was locked by a BIOS that encoded the password in a unique way. This option
can be presented multiple times to select multiple modificaitons. EX: --ataSecPWMod byteswapped
--ataSecPWMod invertcase
byteswapped - byteswaps the password. EX: blah -> lbha zeropad - zero pads the password if less
than 32 characters spacepad - space pads the password if less than 32 characters fpad - pads the
passwords with Fh (all 1's) if less than 32characters leftAlign - left aligns the password in the
buffer rightAlign - right aligns the password in the buffer uppercase - sends the password as all
uppercase lowercase - sends the password as all lowercase invertcase - switches uppercase for
lower, and lowercase for upper
--ataSecurityInfo
(SATA only)
This option shows information about the ATA security feature on ATA devices. It will show the
security state and flags related to the state, Master password capability & ID, time to perform a
secure erase, whether user data is encrypted, and whether sanitize can override ATA security to
repurpose a drive.
--disableATASecPW
(SATA Only)
Use this option to disable an ATA security password. If the drive is in high security mode,
either user or master password may be provided. In maximum security mode only the user password
can be provided to unlock and disable the ATA security password. The master may only be used to
erase the drive in maximum security mode. Use the --ataSecPassword option to provide the password
to use and --ataSecPassType to specify whether it is the user or master password. If a drive lost
power during an ATA Security Erase in openSeaChest_Security, then providing --ataSecPassword
SeaChest will use the default SeaChest password used during the erase.
To disable a password set by a BIOS, the BIOS must have set the
password in ASCII. A BIOS may choose to hash or modify the password typed in the configuration
however it chooses and this utility has no idea how to match what the BIOS has done so it may not
always work to remove a password set by something other than this utility.
--unlockATASec
(SATA only)
Use this option along with the --ataSecPassword option and --ataSecPassType option to unlock a
drive with the provided password. If the drive is in maximum security mode, only the user
password may be used to unlock the device.
Data Destructive Commands (Seagate only) ========================================
SATA Only: ========= --ataSecureErase [normal | enhanced] (SATA only) (Clear | Purge)
Use "normal" to start a standard ATA security erase (Clear) or "enhanced" to start an enhanced ATA
security erase (Purge).
ATA Security Erase takes a very long time to complete at approximately three (3) hours per
Tera-byte (HDD). Some Seagate SED models will perform a quick cryptographic erase in enhanced mode
and the time for completion is reported as 2 minutes by the drive, but will take only seconds.
This industry standard command begins by locking the drive with a temporary password which is
cleared at the end of the erasure. Do not run this command unless you have ample time to allow it
to run through to the end. If the procedure is interrupted prior to completion, then the drive
will remain in a locked state and you must manually restart from the beginning again. The tool
will attempt to automatically clear the password that was set upon failure. The default password
used by the tool is "SeaChest", plain ASCII letters without the quotes
* normal writes binary zeros (0) or ones (1) to all user data areas.
* enhanced will fill all user data areas and reallocated user data with a vendor specific pattern.
Some Seagate Instant Secure Erase will perform a cryptographic erase instead of an overwrite.
openSeaChest_Security - openSeaChest drive utilities - NVMe Enabled Copyright (c) 2014-2024
Seagate Technology LLC and/or its Affiliates, All Rights Reserved openSeaChest_Security Version:
3.4.1-8_0_1 X86_64 Build Date: Sep 19 2024 Today: 20240925T133707 User: current user
========================================================================================== Version Info
for openSeaChest_Security:
Utility Version: 3.4.1 opensea-common Version: 4.1.0 opensea-transport Version: 8.0.1
opensea-operations Version: 8.0.2 Build Date: Sep 19 2024 Compiled Architecture: X86_64 Detected
Endianness: Little Endian Compiler Used: GCC Compiler Version: 11.4.0 Operating System Type: Linux
Operating System Version: 5.15.153-1 Operating System Name: Ubuntu 22.04.4 LTS
SEE ALSO
The full documentation for openSeaChest_Security is maintained as a Texinfo manual. If the info and
openSeaChest_Security programs are properly installed at your site, the command
info openSeaChest_Security
should give you access to the complete manual.
openSeaChest_Security =======================... September 2024 OPENSEACHEST_SECURITY(1)