CANNOT EFS DECRYPT AFTER A GHOST RESTORE

C

Cipix

Hello.

Please help.

I accidentally cracked my windows that was on C:

I had previously encrypted files on D:.

Now I restored C: using symantec ghost but I find out that I cannot
decrypt any files, it says "access denied"

It is true that the backup of C: was made before encrypting files on D:

but the credentials are the same. How can I decrypt now ?

thank u.
 
S

Steven L Umbach

The problem is that you need your EFS private key to decrypt the files and
that was destroyed when you restored the Ghost image. Most likely you will
never be able to access those files again unless you had previously created
a backup of your EFS private key to a password protected .pfx file stored
somewhere that you can import or if you have a copy of your user profile
from a point in time after you started using EFS. You EFS private key is
stored in your user profile in the username\application
data\Microsoft\crypto folders. If none of the above is possible you could
try using a file recovery program to see if you can find that folder on your
system drive [probably very unlikely with an image restore] or use it to
check your D drive for deleted clear text copies of your encrypted files if
any exist which could be temporary files so if you are desperate for the
files try recovering anything to see on the D drive to see if any have data
you need. --- Steve

http://support.microsoft.com/default.aspx?scid=kb;EN-US;223316 --- EFS
best practices
http://www.snapfiles.com/Shareware/system/swdatarecovery.html ---
shareware data recovery tools
http://www.snapfiles.com/Freeware/system/fwdatarecovery.html --- freeware
data recovery tools
 
C

Cipix

Hey Steve.

So do I look for a .pfx and need to know my password ?

But... what's the logic of this EFS? Why is the KEY not stored on the
very same drive where the encrypted files are... ?

Im losing hope :(


The problem is that you need your EFS private key to decrypt the files and
that was destroyed when you restored the Ghost image. Most likely you will
never be able to access those files again unless you had previously created
a backup of your EFS private key to a password protected .pfx file stored
somewhere that you can import or if you have a copy of your user profile
from a point in time after you started using EFS. You EFS private key is
stored in your user profile in the username\application
data\Microsoft\crypto folders. If none of the above is possible you could
try using a file recovery program to see if you can find that folder on your
system drive [probably very unlikely with an image restore] or use it to
check your D drive for deleted clear text copies of your encrypted files if
any exist which could be temporary files so if you are desperate for the
files try recovering anything to see on the D drive to see if any have data
you need. --- Steve

http://support.microsoft.com/default.aspx?scid=kb;EN-US;223316 --- EFS
best practices
http://www.snapfiles.com/Shareware/system/swdatarecovery.html ---
shareware data recovery tools
http://www.snapfiles.com/Freeware/system/fwdatarecovery.html --- freeware
data recovery tools

Cipix said:
Hello.

Please help.

I accidentally cracked my windows that was on C:

I had previously encrypted files on D:.

Now I restored C: using symantec ghost but I find out that I cannot
decrypt any files, it says "access denied"

It is true that the backup of C: was made before encrypting files on D:

but the credentials are the same. How can I decrypt now ?

thank u.
 
S

Steven L Umbach

There would not be a .pfx file unless you took the effort to create one at
some point in time by exporting your EFS private key at which time you would
have been prompted to create a password to protect it. The key is stored in
the user profile probably because of performance and security reasons and it
is tied to user's SID. Generally files in a user's profile are only
available to the user which would prevent another user from accessing or
deleting the file. Sorry to hear about your problem. --- Steve


Cipix said:
Hey Steve.

So do I look for a .pfx and need to know my password ?

But... what's the logic of this EFS? Why is the KEY not stored on the
very same drive where the encrypted files are... ?

Im losing hope :(


The problem is that you need your EFS private key to decrypt the files
and
that was destroyed when you restored the Ghost image. Most likely you
will
never be able to access those files again unless you had previously
created
a backup of your EFS private key to a password protected .pfx file stored
somewhere that you can import or if you have a copy of your user profile
from a point in time after you started using EFS. You EFS private key is
stored in your user profile in the username\application
data\Microsoft\crypto folders. If none of the above is possible you could
try using a file recovery program to see if you can find that folder on
your
system drive [probably very unlikely with an image restore] or use it to
check your D drive for deleted clear text copies of your encrypted files
if
any exist which could be temporary files so if you are desperate for the
files try recovering anything to see on the D drive to see if any have
data
you need. --- Steve

http://support.microsoft.com/default.aspx?scid=kb;EN-US;223316 --- EFS
best practices
http://www.snapfiles.com/Shareware/system/swdatarecovery.html ---
shareware data recovery tools
http://www.snapfiles.com/Freeware/system/fwdatarecovery.html ---
freeware
data recovery tools

Cipix said:
Hello.

Please help.

I accidentally cracked my windows that was on C:

I had previously encrypted files on D:.

Now I restored C: using symantec ghost but I find out that I cannot
decrypt any files, it says "access denied"

It is true that the backup of C: was made before encrypting files on D:

but the credentials are the same. How can I decrypt now ?

thank u.
 
S

Shenan Stanley

Cipix said:
Hey Steve.

So do I look for a .pfx and need to know my password ?

But... what's the logic of this EFS? Why is the KEY not stored on
the very same drive where the encrypted files are... ?

Im losing hope :(

You destroyed the partition that held the encrypted key information.
You did not follow the best practices of EFS.
You have more than likely lost your data.

In the future - follow best practices and backup your key.

Best practices for the Encrypting File System
http://support.microsoft.com/kb/223316/

How to back up the recovery agent Encrypting File System (EFS) private key
in Windows Server 2003, in Windows 2000, and in Windows XP
http://support.microsoft.com/kb/241201

Using Efsinfo.exe to determine information about encrypted files
http://support.microsoft.com/kb/243026/
 
M

Mike Fields

Shenan Stanley said:
You destroyed the partition that held the encrypted key information.
You did not follow the best practices of EFS.
You have more than likely lost your data.

In the future - follow best practices and backup your key.

Best practices for the Encrypting File System
http://support.microsoft.com/kb/223316/

How to back up the recovery agent Encrypting File System (EFS) private
key
in Windows Server 2003, in Windows 2000, and in Windows XP
http://support.microsoft.com/kb/241201

Using Efsinfo.exe to determine information about encrypted files
http://support.microsoft.com/kb/243026/

OK, I am confused now -- if he had a ghost image of
the C drive he restored, why is not all of the information
that was there restored again ?? The only time I have
ever run into an issue where restoring the partition did
not have all the information was when it was one of those
stupid applications that stored a secret "key" of some
sort OUTSIDE of the partition on the disk. A ghost
image restore of the C drive should be indistinguishable
from the original. I could see it if only certain files were
saved but not when the drive was imaged (and the OP
said it was a ghost image).

mikey
 
S

Shenan Stanley

Cipix said:
I accidentally cracked my windows that was on C:

I had previously encrypted files on D:.

Now I restored C: using symantec ghost but I find out that I cannot
decrypt any files, it says "access denied"

It is true that the backup of C: was made before encrypting files
The problem is that you need your EFS private key to decrypt the
files and that was destroyed when you restored the Ghost image.
Most likely you will never be able to access those files again
unless you had previously created a backup of your EFS private key
to a password protected .pfx file stored somewhere that you can
import or if you have a copy of your user profile from a point in
time after you started using EFS. You EFS private key is stored in
your user profile in the username\application data\Microsoft\crypto
folders. If none of the above is possible you could try using a
file recovery program to see if you can find that folder on your
system drive [probably very unlikely with an image restore] or use
it to check your D drive for deleted clear text copies of your
encrypted files if any exist which could be temporary files so if
you are desperate for the files try recovering anything to see on
the D drive to see if any have data you need. --- Steve
http://support.microsoft.com/default.aspx?scid=kb;EN-US;223316 --- EFS
best practices
http://www.snapfiles.com/Shareware/system/swdatarecovery.html ---
shareware data recovery tools
http://www.snapfiles.com/Freeware/system/fwdatarecovery.html ---
freeware data recovery tools
So do I look for a .pfx and need to know my password ?

But... what's the logic of this EFS? Why is the KEY not stored on
the very same drive where the encrypted files are... ?

Im losing hope :(

Shenan Stanley wrote
You destroyed the partition that held the encrypted key
information. You did not follow the best practices of EFS.
You have more than likely lost your data.

In the future - follow best practices and backup your key.

Best practices for the Encrypting File System
http://support.microsoft.com/kb/223316/

How to back up the recovery agent Encrypting File System (EFS)
private key
in Windows Server 2003, in Windows 2000, and in Windows XP
http://support.microsoft.com/kb/241201

Using Efsinfo.exe to determine information about encrypted files
http://support.microsoft.com/kb/243026/

Mike said:
OK, I am confused now -- if he had a ghost image of
the C drive he restored, why is not all of the information
that was there restored again ?? The only time I have
ever run into an issue where restoring the partition did
not have all the information was when it was one of those
stupid applications that stored a secret "key" of some
sort OUTSIDE of the partition on the disk. A ghost
image restore of the C drive should be indistinguishable
from the original. I could see it if only certain files were
saved but not when the drive was imaged (and the OP
said it was a ghost image).

Yes.
You should read more carefully though.
The entire thread (at least this strand) is now above..
Notice in the original post - the OP made it clear...

--------
"Now I restored C: using symantec ghost but I find out that I cannot
decrypt any files, it says "access denied"

It is true that the backup of C: was made before encrypting files
on D: "
--------

So - they made a ghost image - but like most who think they will use that
method of backup - they did not do it frequently enough. The last image
they obviously had was some time before they started using EFS to encrypt
their files - thus no encryption information (keys/etc) were ever stored on
the ghost image they had and restored with.

Put more simply.. It's like making a backup of your entire system in
January (and never again), using the computer daily - adding and removing
files, receiving and sending email, etc - and then in August your hard drive
dies - but you restore your January backup.. Nothing you did from the time
you took that backup until August is there - nor should you expect it to be.
 
M

Mike Fields

Shenan Stanley said:
Cipix said:
I accidentally cracked my windows that was on C:

I had previously encrypted files on D:.

Now I restored C: using symantec ghost but I find out that I cannot
decrypt any files, it says "access denied"

It is true that the backup of C: was made before encrypting files
The problem is that you need your EFS private key to decrypt the
files and that was destroyed when you restored the Ghost image.
Most likely you will never be able to access those files again
unless you had previously created a backup of your EFS private key
to a password protected .pfx file stored somewhere that you can
import or if you have a copy of your user profile from a point in
time after you started using EFS. You EFS private key is stored in
your user profile in the username\application data\Microsoft\crypto
folders. If none of the above is possible you could try using a
file recovery program to see if you can find that folder on your
system drive [probably very unlikely with an image restore] or use
it to check your D drive for deleted clear text copies of your
encrypted files if any exist which could be temporary files so if
you are desperate for the files try recovering anything to see on
the D drive to see if any have data you need. --- Steve
http://support.microsoft.com/default.aspx?scid=kb;EN-US;223316 ---
EFS best practices
http://www.snapfiles.com/Shareware/system/swdatarecovery.html ---
shareware data recovery tools
http://www.snapfiles.com/Freeware/system/fwdatarecovery.html ---
freeware data recovery tools
So do I look for a .pfx and need to know my password ?

But... what's the logic of this EFS? Why is the KEY not stored on
the very same drive where the encrypted files are... ?

Im losing hope :(

Shenan Stanley wrote
You destroyed the partition that held the encrypted key
information. You did not follow the best practices of EFS.
You have more than likely lost your data.

In the future - follow best practices and backup your key.

Best practices for the Encrypting File System
http://support.microsoft.com/kb/223316/

How to back up the recovery agent Encrypting File System (EFS)
private key
in Windows Server 2003, in Windows 2000, and in Windows XP
http://support.microsoft.com/kb/241201

Using Efsinfo.exe to determine information about encrypted files
http://support.microsoft.com/kb/243026/

Mike said:
OK, I am confused now -- if he had a ghost image of
the C drive he restored, why is not all of the information
that was there restored again ?? The only time I have
ever run into an issue where restoring the partition did
not have all the information was when it was one of those
stupid applications that stored a secret "key" of some
sort OUTSIDE of the partition on the disk. A ghost
image restore of the C drive should be indistinguishable
from the original. I could see it if only certain files were
saved but not when the drive was imaged (and the OP
said it was a ghost image).

Yes.
You should read more carefully though.
The entire thread (at least this strand) is now above..
Notice in the original post - the OP made it clear...

--------
"Now I restored C: using symantec ghost but I find out that I cannot
decrypt any files, it says "access denied"

It is true that the backup of C: was made before encrypting files
on D: "
--------

So - they made a ghost image - but like most who think they will use
that method of backup - they did not do it frequently enough. The
last image they obviously had was some time before they started using
EFS to encrypt their files - thus no encryption information (keys/etc)
were ever stored on the ghost image they had and restored with.

Put more simply.. It's like making a backup of your entire system in
January (and never again), using the computer daily - adding and
removing files, receiving and sending email, etc - and then in August
your hard drive dies - but you restore your January backup.. Nothing
you did from the time you took that backup until August is there - nor
should you expect it to be.
Ah yes, I had misread the line that said "It is true that the
backup of C: was made before encrypting files on D:" --
I had assumed from the initial read that the image was
AFTER the files had been encrypted (or at least the
keys set up). My bad -- I feel better now - I was afraid
somehow people were saying the keys were outside the
disk image. You are right - a backup from January is
not good for restoring files from April ... ;-)
Thanks for the clarification.

mikey
 
C

Cipix

Thank U all for the answers.

I have one more question.

I exported the key in a .pfx file, I followed all the procedures on
http://support.microsoft.com/kb/241201

but

1. I cannot find any "file recovery" in the intendet purposes column,
only "encrypting file system" (as it says in the procedure)

2. after I changed my windows password, the key was not in the
certificates anymore, I had to reinport it. Of course, I found out that
the key was not there after some time ....

3. all the programs that were installed in this time between <changing
the password> and <reinporting the key> became inaccessible. I had to
re-export the key and re-inport it. So that I had two keys. Something
is "fishy" around here.

4. I the end I had some files that worked with the 1rst exported key
and some files that worked with the 2nd reexported-reinported key.

5. Now I unencrypted all and not changing my password again :))
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top