All of lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] help
@ 2016-01-10 17:07 Eugen Rogoza
  0 siblings, 0 replies; 14+ messages in thread
From: Eugen Rogoza @ 2016-01-10 17:07 UTC (permalink / raw)
  To: dm-crypt



^ permalink raw reply	[flat|nested] 14+ messages in thread
* [dm-crypt] help
@ 2016-02-25 15:08 Felix Wagner
  2016-02-25 16:18 ` Ondrej Kozina
  2016-02-25 16:37 ` Milan Broz
  0 siblings, 2 replies; 14+ messages in thread
From: Felix Wagner @ 2016-02-25 15:08 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 2614 bytes --]

Hello,

I tried to reencrypt my device today and was way too eager to do it
without reading everything. Heres what I did:

'cryptsetup-reencrypt -v -c aes-xts-plain64 -s
512 /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
Reencryption will change: volume key, set cipher to aes-xts-plain64.
Enter passphrase for key slot 0:
Key slot 0 unlocked.
LUKS header backup of
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7 created.
Data offset for detached LUKS header must be either 0 or higher than
header size (4036 sectors). Creation of LUKS backup headers failed.

So i thought well It didn't work so lets try again:

cryptsetup-reencrypt -v -c
aes-xts-plain64 /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
Reencryption will change: volume key, set cipher to aes-xts-plain64.
Enter passphrase for key slot 0:
Key slot 0 unlocked.
LUKS header
backup of device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
created.
New LUKS header for
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7 created.
Activated keyslot 0. 
Marking LUKS
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7 unusable.
Activating temporary device using old LUKS header.
Key slot 0 unlocked.
Cannot get info about
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7.
Activation of temporary devices failed.

Now it says that the device is not a luks device anymore. I do not have
a header backup (I'm an idiot) what I do have is the luksDump
information and I have not rebooted my system:

LUKS header information
for /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7

Version:       	1
Cipher name:   	aes
Cipher mode:   	cbc-essiv:sha256
Hash spec:     	sha1
Payload offset:	2056
MK bits:       	256
MK digest:     	1f 82 26 80 f4 41 4f b7 17 ed 45 b0 fc f7 f9 cc
4f ee c8 7a MK salt:       	a6 cb ed 6a 5c db 46 6a 87 a1 cb 5f
62 14 8b ea 50 a0 c9 0e 93 68 56 e3 be 4f 59 a1 7b a9 84 dd 
MK iterations: 	47000
UUID:          	2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7

Key Slot 0: ENABLED
	Iterations:         	188266
	Salt:               	a8 b6 30 8c 6a 8c f9 98 3f 1d 1d 1d
1c 22 87 b8 d1 ba 09 e5 63 06 e0 aa 1c fd d0 f9 d7 f7 3c 9c 
	Key material offset:	8
	AF stripes:            	4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED

Now can I recreate the header so I can move my data before trying to
reencrypt again?

Please Help me and any Help is appreciated!

Sincerely
Felix the Idiot

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 473 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread
* [dm-crypt] help
@ 2016-02-25 14:50 Felix Wagner
  0 siblings, 0 replies; 14+ messages in thread
From: Felix Wagner @ 2016-02-25 14:50 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 2614 bytes --]

Hello,

I tried to reencrypt my device today and was way too eager to do it
without reading everything. Heres what I did:

'cryptsetup-reencrypt -v -c aes-xts-plain64 -s
512 /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
Reencryption will change: volume key, set cipher to aes-xts-plain64.
Enter passphrase for key slot 0:
Key slot 0 unlocked.
LUKS header backup of
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7 created.
Data offset for detached LUKS header must be either 0 or higher than
header size (4036 sectors). Creation of LUKS backup headers failed.

So i thought well It didn't work so lets try again:

cryptsetup-reencrypt -v -c
aes-xts-plain64 /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
Reencryption will change: volume key, set cipher to aes-xts-plain64.
Enter passphrase for key slot 0:
Key slot 0 unlocked.
LUKS header
backup of device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
created.
New LUKS header for
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7 created.
Activated keyslot 0. 
Marking LUKS
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7 unusable.
Activating temporary device using old LUKS header.
Key slot 0 unlocked.
Cannot get info about
device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7.
Activation of temporary devices failed.

Now it says that the device is not a luks device anymore. I do not have
a header backup (I'm an idiot) what I do have is the luksDump
information and I have not rebooted my system:

LUKS header information
for /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7

Version:       	1
Cipher name:   	aes
Cipher mode:   	cbc-essiv:sha256
Hash spec:     	sha1
Payload offset:	2056
MK bits:       	256
MK digest:     	1f 82 26 80 f4 41 4f b7 17 ed 45 b0 fc f7 f9 cc
4f ee c8 7a MK salt:       	a6 cb ed 6a 5c db 46 6a 87 a1 cb 5f
62 14 8b ea 50 a0 c9 0e 93 68 56 e3 be 4f 59 a1 7b a9 84 dd 
MK iterations: 	47000
UUID:          	2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7

Key Slot 0: ENABLED
	Iterations:         	188266
	Salt:               	a8 b6 30 8c 6a 8c f9 98 3f 1d 1d 1d
1c 22 87 b8 d1 ba 09 e5 63 06 e0 aa 1c fd d0 f9 d7 f7 3c 9c 
	Key material offset:	8
	AF stripes:            	4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED

Now can I recreate the header so I can move my data before trying to
reencrypt again?

Please Help me and any Help is appreciated!

Sincerely
Felix the Idiot

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 473 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread
* [dm-crypt] Help
@ 2012-04-20 15:58 Simon Bing
  2012-04-22  8:59 ` Arno Wagner
  0 siblings, 1 reply; 14+ messages in thread
From: Simon Bing @ 2012-04-20 15:58 UTC (permalink / raw)
  To: dm-crypt

[-- Attachment #1: Type: text/plain, Size: 525 bytes --]

I used cryptsetup to perform the following function

cryptsetup -y --cipher aes-xts-plain --key-size 512 luksFormat /dev/sdb1

An error occured saying it couldnt be performed which i pretty much ignored
and just thought i won't bother.  I did note that it mentioned about kernel
compatability though.  The drive appears to be encrypted and wont accept
the passphrase set.  This has just under 1.5 tb of information i can't
afford to loose.  Do you have any solutions, i have looked online but am
absolutely stuck

Cheers

Si

[-- Attachment #2: Type: text/html, Size: 600 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2016-02-25 17:58 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-01-10 17:07 [dm-crypt] help Eugen Rogoza
  -- strict thread matches above, loose matches on Subject: below --
2016-02-25 15:08 Felix Wagner
2016-02-25 16:18 ` Ondrej Kozina
2016-02-25 17:25   ` Ondrej Kozina
2016-02-25 16:37 ` Milan Broz
2016-02-25 17:05   ` Felix Wagner
2016-02-25 17:20     ` Milan Broz
2016-02-25 17:35       ` Felix Wagner
2016-02-25 17:49       ` Felix Wagner
2016-02-25 17:55         ` Milan Broz
2016-02-25 17:58           ` Felix Wagner
2016-02-25 14:50 Felix Wagner
2012-04-20 15:58 [dm-crypt] Help Simon Bing
2012-04-22  8:59 ` Arno Wagner

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.