From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from plane.gmane.org (plane.gmane.org [80.91.229.3]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Wed, 4 Feb 2015 13:50:09 +0100 (CET) Received: from list by plane.gmane.org with local (Exim 4.69) (envelope-from ) id 1YIzAd-0002t2-8P for dm-crypt@saout.de; Wed, 04 Feb 2015 13:35:03 +0100 Received: from ip4d151e07.dynamic.kabel-deutschland.de ([77.21.30.7]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Wed, 04 Feb 2015 13:35:03 +0100 Received: from for-gmane by ip4d151e07.dynamic.kabel-deutschland.de with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Wed, 04 Feb 2015 13:35:03 +0100 From: "U.Mutlu" Date: Wed, 04 Feb 2015 13:33:15 +0100 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-15; format=flowed Content-Transfer-Encoding: 7bit Subject: [dm-crypt] plain: opening with a wrong password List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de Hi, what happens if an encrypted filesystem (plain, no LUKS) next time is opened accidently with a wrong password, and new data written to it? Will the filesystem then become damaged/unusable? I didn't try this out, but I know the create/open command accepts any password for an already existing encrypted filesystem since no metadata is stored with such a "plain" volume, right?