From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from sonic313-10.consmr.mail.ne1.yahoo.com (sonic313-10.consmr.mail.ne1.yahoo.com [66.163.185.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Fri, 27 Dec 2019 03:49:39 +0100 (CET) Date: Fri, 27 Dec 2019 02:49:37 +0000 (UTC) From: H McCurdy Message-ID: <165266115.3972883.1577414977282@mail.yahoo.com> In-Reply-To: <602982770.3673432.1577414693717@mail.yahoo.com> References: <602982770.3673432.1577414693717@mail.yahoo.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_3972882_682768141.1577414977280" Subject: Re: [dm-crypt] Can't decrypt LUKS partition List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de, "robert.wender@tutanota.de" ------=_Part_3972882_682768141.1577414977280 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Robert,This might help. How to crack encrypted disk (crypto-LUKS) in an efficient way? |=20 |=20 |=20 | | | | | |=20 | |=20 How to crack encrypted disk (crypto-LUKS) in an efficient way? I had a disk encrypted by crypto-LUKS but forgotten password. I read a ques= tion posted here. LUKS HDD Encryptio... | | | On Thursday, December 26, 2019, 9:44:53 PM EST, H McCurdy wrote: =20 =20 Robert, I had a situation where I remembered almost all but two characters of my pa= ssphrase and I was able to use cracker software to brute force the missing = characters.=C2=A0 I don't remember which software I used but two characters= doesn't offer a lot of entropy.=C2=A0 If you can identify which positions = in the passphrase string might be German characters, you might be able to s= etup a brute force cracking template. This only makes sense if you otherwise have almost all of the correct passp= hrase. On Thursday, December 26, 2019, 4:24:55 PM EST, robert.wender@tutanota.= de wrote: =20 =20 Hello, I'm suddenly unable to decrypt my Linux Mint partition, SSD. I get this err= or message: "Enter passphrase for /dev/nvme0n1p3: No key available with this passphrase." It was encrypted at install (entire drive). I'm using only this drive, and only Linux Mint, nothing else. I didn't do a= ny updates, I didn't even install anything before it stopped working (worke= d for about half a year). I don't have any backup. What I did do is clean my keyboard. I use German layout, and there's _under= scores_ in my password. But I tested everything I could think of I tested all my keys a lot of times, it's always correct, wrote my password= the way I always did, I wrote it assuming US layout, wrote it using a diff= erent keyboard, tried decrypting using Linux Mint live CD, Fedora live CD, = tried all the German keyboard layouts, some English ones. cryptsetup luksDump /dev/nvme0n1p3: https://pastebin.com/9arD2wVs I don't know much about that, does it look fine? I also searched the hexdump for words and used the Key-Slot Checker, seems = fine. Should I just continue testing all existing layouts? Or does something look= strange/does someone have an idea what to try? Regards, Robert _______________________________________________ dm-crypt mailing list dm-crypt@saout.de https://www.saout.de/mailman/listinfo/dm-crypt =20 ------=_Part_3972882_682768141.1577414977280 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Robert,
This might help.




=20
=20
On Thursday, December 26, 2019, 9:44:53 PM EST, H McCur= dy <hmccurdy@yahoo.com> wrote:


Robert,

I = had a situation where I remembered almost all but two characters of my pass= phrase and I was able to use cracker software to brute force the missing ch= aracters.  I don't remember which software I used but two characters d= oesn't offer a lot of entropy.  If you can identify which positions in= the passphrase string might be German characters, you might be able to set= up a brute force cracking template.

This only makes sense= if you otherwise have almost all of the correct passphrase.
=
=20
=20
On Thursday, December 26, 2019, 4:24:55 PM EST, robert.= wender@tutanota.de <robert.wender@tutanota.de> wrote:


=20 =20 =20
Hello,

I'm suddenly unable to decrypt my = Linux Mint partition, SSD. I get this error message:

"Enter passphrase for /dev/nvme0n1p3:
No key available= with this passphrase."

It was encrypted at i= nstall (entire drive).
I'm using only this drive, and only Li= nux Mint, nothing else. I didn't do any updates, I didn't even install anyt= hing before it stopped working (worked for about half a year).
I don't have any backup.
What I did do is clean my keyboard= . I use German layout, and there's _underscores_ in my password. But I test= ed everything I could think of
I tested all my keys a lot of = times, it's always correct, wrote my password the way I always did, I wrote= it assuming US layout, wrote it using a different keyboard, tried decrypti= ng using Linux Mint live CD, Fedora live CD, tried all the German keyboard = layouts, some English ones.

cryptsetup luksDum= p /dev/nvme0n1p3:
https://pastebin.com/9arD2wVs
I don't know much about that, does it look fine?
I al= so searched the hexdump for words and used the Key-Slot Checker, seems fine= .
Should I just continue testing all existing layouts? Or doe= s something look strange/does someone have an idea what to try?

Regards,
Robert
_______________________________________________
dm-crypt mailing l= ist
dm-crypt@saout.de
https://www.saout.de/mailman/listinfo/dm-c= rypt
------=_Part_3972882_682768141.1577414977280--