All of lore.kernel.org
 help / color / mirror / Atom feed
From: Milan Broz <gmazyland@gmail.com>
To: James Pacey Bennett <jbennett@maxwell.syr.edu>
Cc: "dm-crypt@saout.de" <dm-crypt@saout.de>
Subject: Re: [dm-crypt] Trying to mount pre-Luks encrypted external disks, suse 12.3
Date: Thu, 18 Jul 2013 08:24:13 +0200	[thread overview]
Message-ID: <51E78A0D.5090707@gmail.com> (raw)
In-Reply-To: <9A629FEC462BD94990DA2D70E6C94E8B193B3283@SUEX10-mbx-01.ad.syr.edu>

Sorry for top posting, but please first read section 7.6 of FAQ
losetup->cryptsetup guide or https://lkml.org/lkml/2012/11/2/162
it should help you :)

I am almost sure the options you used are not valid (ESSIV was never
used in cryptloop etc). You have to specify options explicitly.
As mentioned in document, options cannot be detected automatically.

If you cannot find solution, please post _exact_ losetup parameters
you are using and exact losetup (util-linux) version from working system
(very important because Suse added some patches).

Milan



On 18.7.2013 1:41, James Pacey Bennett wrote:
> I have several external backup disks encrypted before Luks appeared.  After
> update from 12.1 to 12.3, losetup is gone and I haven't been able to
> mount the encrypted disks.
>
> linux-p22i /root# uname -r
> 3.7.10-1.16-desktop
>
> linux-p22i /root# lsmod | grep crypt
> cryptoloop             12715  0
> loop                   27944  1 cryptoloop
> dm_crypt               22845  2
> dm_mod                 92315  4 dm_crypt
>
> linux-p22i /root# lsblk -f -l /dev/sdi1
> NAME FSTYPE LABEL UUID MOUNTPOINT
> sdi1
>
> ***/dev/sdi1 was previously under 12.1 mounted using losetup***
>
> ***Because the partition isn't a Luks partition, I can't***
> linux-p22i /root# cryptsetup luksOpen /dev/sdi1 back5
> Device /dev/sdi1 is not a valid LUKS device.
>
> So I try a 'legacy' approach per the cryptosetup wiki:
>
> linux-p22i /root# cryptsetup create back5 /dev/sdi1
> Enter passphrase:
> (which I did; just got newline)
>
> linux-p22i /root# cryptsetup status back5
> /dev/mapper/back5 is active.
>    type:    PLAIN
>    cipher:  aes-cbc-essiv:sha256
>    keysize: 256 bits
>    device:  /dev/sdi1
>    offset:  0 sectors
>    size:    976768002 sectors
>    mode:    read/write
>
> ***which seems correct to me***
>
> linux-p22i /root# l /dev/mapper/
> back5@                                              cr_ata-WDC_WD1002FAEX-00Z3A0_WD-WCATRC268610-part1@
> control%                                            main@
>
> Now. How do I or what do I mount?  I can't use /dev/mapper directly.
> I have no success trying to mkfs /dev/back5.
>
> This must be a common problem but I don't find
> it addressed in the opensuse forums.
>
> Help!
> jim bennett
>
>
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt
>

      parent reply	other threads:[~2013-07-18  6:24 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-07-17 23:41 [dm-crypt] Trying to mount pre-Luks encrypted external disks, suse 12.3 James Pacey Bennett
2013-07-18  5:55 ` .. ink ..
2013-07-18  6:24 ` Milan Broz [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=51E78A0D.5090707@gmail.com \
    --to=gmazyland@gmail.com \
    --cc=dm-crypt@saout.de \
    --cc=jbennett@maxwell.syr.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.