All of lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] (no subject)
@ 2017-04-29 17:48 Hammad Siddiqi
  2017-04-29 18:30 ` Arno Wagner
  2017-04-29 19:19 ` Hammad Siddiqi
  0 siblings, 2 replies; 34+ messages in thread
From: Hammad Siddiqi @ 2017-04-29 17:48 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 4232 bytes --]

Hi,No key available with this passphrase.

one of our host, running centos 7.1, crashed today with a kernel panic on
qemu-kvm process. the VM disks were stored on encrypted volume, which
became locked after reboot. the cryptseup luksOpen  command throws "No Key
available with this passphrase". The encrypted volume has a 512 bit key
without any password. we also backup our key and both backup and key
residing on server are same. We have tried to by pass current OS by booting
up using live CD of Centos 7.1, Linux Mint 17, Ubuntu 17.04 with different
versions of kernel and crypt setup. this did not succeed. we believe the
key is correct but the Encrypted volume is not accepting it. Can you please
help us on this. Please let me know if you need something else as well

* command used: cryptsetup luksOpen --key-file /etc/luks.key
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d raid10-2hs-island
* Host Kernel Version: 3.10.0-229.el7.x86_64
* Host Cryptsetup version: 1.6.6

**output of cryptsetup luksOpen**

 **cryptsetup luksOpen --key-file /etc/luks.key
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d raid10-2hs-island
--verbose --debug**
```
# cryptsetup 1.7.2 processing "cryptsetup luksOpen --key-file /etc/luks.key
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d raid10-2hs-island
--verbose --debug"
# Running command open.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating crypt device
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d context.
# Trying to open and read device
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d with direct-io.
# Initialising device-mapper backend library.
# Trying to load LUKS1 crypt type from device
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d.
# Crypto backend (gcrypt 1.5.3) initialized in cryptsetup library version
1.7.2.
# Detected kernel Linux 3.10.0-229.el7.x86_64 x86_64.
# Reading LUKS header of size 1024 from device
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d
# Key length 64, device size 15622799360 sectors, header size 4036 sectors.
# Timeout set to 0 miliseconds.
# Password retry count set to 3.
# Password verification disabled.
# Iteration time set to 2000 miliseconds.
# Password retry count set to 1.
# Activating volume raid10-2hs-island [keyslot -1] using keyfile
/etc/luks.key.
# dm version   [ opencount flush ]   [16384] (*1)
# dm versions   [ opencount flush ]   [16384] (*1)
# Detected dm-crypt version 1.13.0, dm-ioctl version 4.29.0.
# Device-mapper backend running with UDEV support enabled.
# dm status raid10-2hs-island  [ opencount flush ]   [16384] (*1)
# File descriptor passphrase entry requested.
# Trying to open key slot 0 [ACTIVE_LAST].
# Reading key slot 0 area.
# Using userspace crypto wrapper to access keyslot area.
# Trying to open key slot 1 [INACTIVE].
# Trying to open key slot 2 [INACTIVE].
# Trying to open key slot 3 [INACTIVE].
# Trying to open key slot 4 [INACTIVE].
# Trying to open key slot 5 [INACTIVE].
# Trying to open key slot 6 [INACTIVE].
# Trying to open key slot 7 [INACTIVE].
No key available with this passphrase.
# Releasing crypt device
/dev/disk/by-uuid/92de4358-d815-496a-8a58-60e55346161d context.
# Releasing device-mapper backend.
# Unlocking memory.
Command failed with code 1: Operation not permitted
```

**cryptsetup luksDump:**

```
cryptsetup -v luksDump /dev/sdb
LUKS header information for /dev/sdb

Version:        1
Cipher name:    aes
Cipher mode:    xts-plain64
Hash spec:      sha1
Payload offset: 4096
MK bits:        512
MK digest:      XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
MK salt:        XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
                XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
MK iterations:  36750
UUID:           #############################

Key Slot 0: ENABLED
        Iterations:             141435
        Salt:
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
        Key material offset:    8
        AF stripes:             4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
Command successful.
```

[-- Attachment #2: Type: text/html, Size: 5325 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2016-06-18 21:40 RAS RAS
  2016-06-20  7:52 ` Milan Broz
  0 siblings, 1 reply; 34+ messages in thread
From: RAS RAS @ 2016-06-18 21:40 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 131 bytes --]

 Why there is no sha 256 for cryptsetup-master-16fab74ab1b2a4b95f4fc449c18d3b89c59a3429.zip 


Best regards,
RAS RAS
ras-os@mail.ru

[-- Attachment #2: Type: text/html, Size: 173 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2015-05-04 14:50 janemba
  2015-05-04 16:41 ` Arno Wagner
  0 siblings, 1 reply; 34+ messages in thread
From: janemba @ 2015-05-04 14:50 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 1074 bytes --]

Hi,

I have an issue with LUKS. I have a new external hard drive with the
following characteristics :

Host scsi11: usb-storage
Vendor: Seagate (2TB)
Product: Expansion
Serial Number: xxx
Protocol: Transparent SCSI
Transport: Bulk
Quirks: SANE_SENSE

Also I have cryptsetup install on my box with version 1.4.3 and kernel
3.14.5. I can't update cryptsetup on this box as I ciphered the hard drive
with this version and I'm afraid to not be able to deciphered the hard
drive if cryptsetup version change.

Moreover, I'm using the external hard drive only with this box. This mean I
setup nad I use cryptsetup on my external hard drive only with the box
above.

My issue is each time I open the device I got the following error :
"No key available with this passphrase."

I open it like below :
 $ cryptsetup luksOpen  /dev/sdb1 safehd

But sometimes it works so this is not a password issue. Also, I setup again
the hard drive by zeroing the whole device and I got the exact same issue.

Do you know whats going ?

Please let me know if you want further information.

Thanks

[-- Attachment #2: Type: text/html, Size: 1437 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2014-02-07 13:51 Redwood Hyd
  0 siblings, 0 replies; 34+ messages in thread
From: Redwood Hyd @ 2014-02-07 13:51 UTC (permalink / raw)
  To: dm-crypt

Hi All ,

I did an experimental kernel change in linux/drivers/md/dm-crypt.c for
improving crypto HW performance.
Here is brief of it
static void crypt_io_hints(struct dm_target *ti,
                            struct queue_limits *limits)
{
  limits->physical_block_size = 32768;
  blk_limits_io_min(limits, 32768);
  blk_limits_io_opt(limits, 32768);
}

It works (passed iozone -a,  robocopy from samba client) and doubled
performance of dm-crypt WRITES !

Problem -
After above change cryptsetup luks format started failing disk
validations so additionally in
Cryptsetup-1.1.3  I  did  following changes to pass disk validation:
========================================================
/* Change-1 to overcome validation failure from dm-table.c that
"adding target device  caused an alignment inconsistency"  */
#define LUKS_STRIPES increased from  4000 to 524288

/* Change-2 to overcome validation failure in dm-table.c
"device-mapper: table: 253:1 start=8 not aligned to h/w logical block
size 32768 of dm-0" */
#define LUKS_ALIGN_KEYSLOTS  increased from  4096 to 32768

/* Change-3 Additionally did following change */
#define DEFAULT_ALIGNMENT    increased from  4096 to 32768

Question - Can someone recommend any later  version of cryptsetup
package where I don't need to change
                 cryptsetup and luks format can still pass
validate_hardware_logical_block_alignment() in dm-table.c  for 32k
encrypt block device ?

Performance related changes are experimental - If someone can suggest
things around this I will post my results to forum.

Regards and Thanks in advance
Redwood hyd

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2013-03-17 21:30 .. ink ..
  0 siblings, 0 replies; 34+ messages in thread
From: .. ink .. @ 2013-03-17 21:30 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 1993 bytes --]

A user of cryptsetup(through zuluCrypt) asked me a question i can not
answer and asking it here.

In his system,"cryptsetup benchmark" gives the following results:

[root@sheep 13] ~ > cryptsetup benchmark
# Tests are approximate using memory only (no storage IO).
PBKDF2-sha1       341333 iterations per second
PBKDF2-sha256     193607 iterations per second
PBKDF2-sha512      64125 iterations per second
PBKDF2-ripemd160  303758 iterations per second
PBKDF2-whirlpool   64125 iterations per second
#  Algorithm | Key |  Encryption |  Decryption
     aes-cbc   128b   183,6 MiB/s   215,4 MiB/s
 serpent-cbc   128b    68,0 MiB/s    68,9 MiB/s
 twofish-cbc   128b   167,7 MiB/s   177,5 MiB/s
     aes-cbc   256b   142,3 MiB/s   161,5 MiB/s
 serpent-cbc   256b    69,7 MiB/s    67,0 MiB/s
 twofish-cbc   256b   170,1 MiB/s   177,8 MiB/s
     aes-xts   256b   201,2 MiB/s   205,6 MiB/s
 serpent-xts   256b    69,7 MiB/s    67,6 MiB/s
 twofish-xts   256b   180,5 MiB/s   175,6 MiB/s
     aes-xts   512b   147,0 MiB/s   152,5 MiB/s
 serpent-xts   512b    70,5 MiB/s    67,8 MiB/s
 twofish-xts   512b   182,0 MiB/s   176,0 MiB/s

The system is decent enought.

The write speed he is getting though through the mapper is unusually
slow,the test is below:


[root@sheep 8] ~ > dd if=/dev/zero of=test.img bs=70M count=1
1+0 Datensätze ein
1+0 Datensätze aus
73400320 Bytes (73 MB) kopiert, 2,58497 s, 28,4 MB/s

[17.03.2013 21:50 Uhr]
[root@sheep 9] ~ > cryptsetup create test test.img
Passsatz eingeben:

[17.03.2013 21:51 Uhr]
[root@sheep 10] ~ > dd if=/dev/zero of=/dev/mapper/test bs=10M count=1
1+0 Datensätze ein
1+0 Datensätze aus
10485760 Bytes (10 MB) kopiert, 67,2014 s, 156 kB/s

[17.03.2013 21:52 Uhr]
[root@sheep 11] ~ > cryptsetup remove test

As the test show,He is getting 156kB/s when using dd over the encryption
mapper verses 28MB/s when using dd straight.

Where is the wrong in his system? version of cryptsetup used is 1.6.0

[-- Attachment #2: Type: text/html, Size: 2201 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2012-12-29 22:22 .. ink ..
  2012-12-29 22:46 ` Milan Broz
  0 siblings, 1 reply; 34+ messages in thread
From: .. ink .. @ 2012-12-29 22:22 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 117 bytes --]

test with 1.6.0.-rc1

crypt_init_by_name doesnt seem to work when the second argument is a mapper
to a lcrypt volume

[-- Attachment #2: Type: text/html, Size: 152 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2012-10-10 21:11 ffrizzy
  0 siblings, 0 replies; 34+ messages in thread
From: ffrizzy @ 2012-10-10 21:11 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 152 bytes --]

Hi

I have no interest in your mails - I do not know why you send me your mails.
And i demand that you delete my address from you correspondence
Thanks

[-- Attachment #2: Type: text/html, Size: 210 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2012-10-10 21:09 ffrizzy
  2012-10-10 23:13 ` Claudio Moretti
  0 siblings, 1 reply; 34+ messages in thread
From: ffrizzy @ 2012-10-10 21:09 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 37 bytes --]

GET ME OUT OF YOUR LOSTS
ASAP
THANKS

[-- Attachment #2: Type: text/html, Size: 68 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2012-10-09  6:24 ffrizzy
  0 siblings, 0 replies; 34+ messages in thread
From: ffrizzy @ 2012-10-09  6:24 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 105 bytes --]

I di dnot ask to subscribe
I have nothongto do with you
TAKE MY ADRESSDOWN !
DO NOT SWEND ME ANYTHING !!

[-- Attachment #2: Type: text/html, Size: 160 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2012-10-09  6:21 ffrizzy
  0 siblings, 0 replies; 34+ messages in thread
From: ffrizzy @ 2012-10-09  6:21 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 55 bytes --]

get me out of your list
di not send me anything
thanks

[-- Attachment #2: Type: text/html, Size: 86 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2012-09-04  1:20 Anil
  2012-09-04  1:29 ` Arno Wagner
  0 siblings, 1 reply; 34+ messages in thread
From: Anil @ 2012-09-04  1:20 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 285 bytes --]

Newbie here. I need to use dm-crypt with aes-xts. How is dm-crypt called? Is it possible to encrypt data while being saved on the fly?
Will there be file filters to encrypt/decrypt while saving and opening the file?
Is aes-xts provided elsewhere as a plugin? or is it part of dmcrypt?

[-- Attachment #2: Type: text/html, Size: 466 bytes --]

^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2011-09-18 10:58 Ingo Schmitt
  0 siblings, 0 replies; 34+ messages in thread
From: Ingo Schmitt @ 2011-09-18 10:58 UTC (permalink / raw)
  To: dm-crypt



^ permalink raw reply	[flat|nested] 34+ messages in thread
* [dm-crypt] (no subject)
@ 2011-03-09  2:04 Rookcifer
  0 siblings, 0 replies; 34+ messages in thread
From: Rookcifer @ 2011-03-09  2:04 UTC (permalink / raw)
  To: dm-crypt


-- 
--Waiting on ECC

^ permalink raw reply	[flat|nested] 34+ messages in thread

end of thread, other threads:[~2017-05-02 20:49 UTC | newest]

Thread overview: 34+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-04-29 17:48 [dm-crypt] (no subject) Hammad Siddiqi
2017-04-29 18:30 ` Arno Wagner
2017-04-29 19:19 ` Hammad Siddiqi
2017-05-01 17:37   ` Hammad Siddiqi
2017-05-01 18:45     ` Michael Kjörling
2017-05-01 21:01       ` Arno Wagner
2017-05-02  0:29         ` Diagon
2017-05-02 20:49           ` Arno Wagner
  -- strict thread matches above, loose matches on Subject: below --
2016-06-18 21:40 RAS RAS
2016-06-20  7:52 ` Milan Broz
     [not found]   ` <1466423154.44272313@f313.i.mail.ru>
2016-06-20 12:02     ` Milan Broz
2015-05-04 14:50 janemba
2015-05-04 16:41 ` Arno Wagner
2014-02-07 13:51 Redwood Hyd
2013-03-17 21:30 .. ink ..
2012-12-29 22:22 .. ink ..
2012-12-29 22:46 ` Milan Broz
2012-12-29 23:15   ` .. ink ..
2012-12-29 23:39     ` Milan Broz
2012-12-29 23:53       ` .. ink ..
2012-12-30  7:12       ` .. ink ..
2012-12-30  9:05         ` Milan Broz
2012-12-30  9:19           ` .. ink ..
2012-12-30 10:51             ` Milan Broz
2012-12-30 11:49               ` .. ink ..
2012-10-10 21:11 ffrizzy
2012-10-10 21:09 ffrizzy
2012-10-10 23:13 ` Claudio Moretti
2012-10-09  6:24 ffrizzy
2012-10-09  6:21 ffrizzy
2012-09-04  1:20 Anil
2012-09-04  1:29 ` Arno Wagner
2011-09-18 10:58 Ingo Schmitt
2011-03-09  2:04 Rookcifer

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.