DM-Crypt Archive on lore.kernel.org
 help / color / mirror / Atom feed
* [dm-crypt] cryptsetup bug
@ 2010-07-11 22:39 divyashree kumar
  2010-07-13  8:25 ` morphium
  2010-07-13 11:09 ` Arno Wagner
  0 siblings, 2 replies; 9+ messages in thread
From: divyashree kumar @ 2010-07-11 22:39 UTC (permalink / raw)
  To: christophe; +Cc: clemens

[-- Attachment #1: Type: text/plain, Size: 2552 bytes --]

Sir ,


        I am Priyadarshee  Divyashree Kumar from Odisha , India . I am in a
serious trouble . My brother is a Judicial Magistrate in the court and he is
provided with a HCL laptop from the court with preinstalled customized RHEL5
client . He just asked me to install some player so that he can listen some
musics or watch some videos . I just installed VLC,MPLAYER,XINE and MIRO ,
but while installing I used external repositories from rpmforge, pbone and
epel . All gone successfull .


     The laptop has 160 GB harddrive and among which 128 GB are LVM and is
LUKS encrypted which is his  home directory containing various legal
documents from courts and the cases and a lot . After some hours of ,when I
turn on the laptop , it gives an error as

     starting disc encryption , command failed : Error opening device ;no
> such file or directory ;
>
and it asks for entering the passphrase again and again 3 times even with
providing with correct passwords .

I just googled and try with a live CD , but no result , the result returned
a follows :

#cryptsetup -v luksDump /dev/mapper/homevg-homevol

LUKS header information for /dev/mapper/homevg-homevol
>
> Version: 1
> Cipher name: aes
> Cipher mode: cbc-essiv:sha256
> Hash spec: sha1
> Payload offset: 1032
> MK bits: 128
> MK digest: 2a 77 66 d8 24 23 36 b1 c3 91 6d 0d 9d 1e ff 19 3f fe 16 67
> MK salt: de 14 b0 ac 51 18 3c c0 97 77 40 31 38 07 fe f4
> 28 43 06 a9 a2 98 22 6c 67 fc af 71 fd 76 4d f9
> MK iterations: 10
> UUID: c0be1231-cf29-48ac-8cba-1bf98b180051
>
> Key Slot 0: ENABLED
> Iterations: 181173
> Salt: f7 4a 8b 83 5f d4 ed e2 7f 42 42 38 eb bc 46 d2
> fd b1 7c c5 83 f0 3e 34 83 0f ff 0f 32 95 54 17
> Key material offset: 8
> AF stripes: 4000
> Key Slot 1: DISABLED
> Key Slot 2: DISABLED
> Key Slot 3: DISABLED
> Key Slot 4: DISABLED
> Key Slot 5: DISABLED
> Key Slot 6: DISABLED
> Key Slot 7: DISABLED
>

And with looksOpen ,

# cryptsetup luksOpen /dev/mapper/homevg-homevol home
> Enter LUKS passphrase for /dev/mapper/homevg-homevol:
> Enter LUKS passphrase for /dev/mapper/homevg-homevol:
> Enter LUKS passphrase for /dev/mapper/homevg-homevol:
> Command failed: No key available with this passphrase.
>


I am trying since last 10-12 hrs wihout a single hope , but as it contains
last 5 months of courtwork , I am completely out of mind what to do ,how to
do , how to recover the home ?

I dont know if this is a bug or anything , but I have to return his laptop
as it was .


Kindly ,any help will be thankful .

Sincerely..
Priyadarshee Divyashree Kumar

[-- Attachment #2: Type: text/html, Size: 3633 bytes --]

^ permalink raw reply	[flat|nested] 9+ messages in thread
* [dm-crypt] Cryptsetup bug
@ 2016-12-29 17:53 Hunter DeMeyer
  2016-12-29 23:13 ` Michael Kjörling
                   ` (2 more replies)
  0 siblings, 3 replies; 9+ messages in thread
From: Hunter DeMeyer @ 2016-12-29 17:53 UTC (permalink / raw)
  To: dm-crypt


[-- Attachment #1.1: Type: text/plain, Size: 153 bytes --]

I believe that under certain circumstances cryptsetup will encrypt more
than one partion on a drive. I have attached the process that produced this
bug.

[-- Attachment #1.2: Type: text/html, Size: 273 bytes --]

[-- Attachment #2: cryptsetup_bug --]
[-- Type: application/octet-stream, Size: 3635 bytes --]

[root@arch mnt]# ls
boot  efi
[root@arch mnt]# gdisk /dev/sdb
GPT fdisk (gdisk) version 1.0.1

Partition table scan:
  MBR: protective
  BSD: not present
  APM: not present
  GPT: present

Found valid GPT with protective MBR; using GPT.

Command (? for help): n
Partition number (1-128, default 1): 
First sector (34-30662622, default = 2048) or {+-}size{KMGTP}: 
Last sector (2048-30662622, default = 30662622) or {+-}size{KMGTP}: +512M
Current type is 'Linux filesystem'
Hex code or GUID (L to show codes, Enter = 8300): ef00
Changed type of partition to 'EFI System'

Command (? for help): n
Partition number (2-128, default 2): 
First sector (34-30662622, default = 1050624) or {+-}size{KMGTP}: 
Last sector (1050624-30662622, default = 30662622) or {+-}size{KMGTP}: +1024M
Current type is 'Linux filesystem'
Hex code or GUID (L to show codes, Enter = 8300): 
Changed type of partition to 'Linux filesystem'

Command (? for help): w

Final checks complete. About to write GPT data. THIS WILL OVERWRITE EXISTING
PARTITIONS!!

Do you want to proceed? (Y/N): y
OK; writing new GUID partition table (GPT) to /dev/sdb.
The operation has completed successfully.
[root@arch mnt]# cryptsetup --debug --cipher serpent-cbc-essiv:sha256 --hash tiger2 luksFormat /dev/sdb2
# cryptsetup 1.7.3 processing "cryptsetup --debug --cipher serpent-cbc-essiv:sha256 --hash tiger2 luksFormat /dev/sdb2"
# Running command luksFormat.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.

WARNING!
========
This will overwrite data on /dev/sdb2 irrevocably.

Are you sure? (Type uppercase yes): YES
# Allocating crypt device /dev/sdb2 context.
# Trying to open and read device /dev/sdb2 with direct-io.
# Initialising device-mapper backend library.
# Timeout set to 0 miliseconds.
# Iteration time set to 2000 milliseconds.
# Interactive passphrase entry requested.
Enter passphrase: 
Verify passphrase: 
# Formatting device /dev/sdb2 as type LUKS1.
# Crypto backend (gcrypt 1.7.5) initialized in cryptsetup library version 1.7.3.
# Detected kernel Linux 4.8.13-1-ARCH x86_64.
# Topology: IO (512/0), offset = 0; Required alignment is 1048576 bytes.
# Checking if cipher serpent-cbc-essiv:sha256 is usable.
# Using userspace crypto wrapper to access keyslot area.
# Generating LUKS header version 1 using hash tiger2, serpent, cbc-essiv:sha256, MK 32 bytes
# KDF pbkdf2, hash tiger2: 942964 iterations per second (256-bits key).
# Data offset 4096, UUID 8f6b6ff5-2f49-4edf-a35b-0e8df82e1e44, digest iterations 230000
# Updating LUKS header of size 1024 on device /dev/sdb2
# Key length 32, device size 2097152 sectors, header size 2050 sectors.
# Reading LUKS header of size 1024 from device /dev/sdb2
# Key length 32, device size 2097152 sectors, header size 2050 sectors.
# Adding new keyslot -1 using volume key.
# Calculating data for key slot 0
# KDF pbkdf2, hash tiger2: 963764 iterations per second (256-bits key).
# Key slot 0 use 1882351 password iterations.
# Using hash tiger2 for AF in key slot 0, 4000 stripes
# Updating key slot 0 [0x1000] area.
# Using userspace crypto wrapper to access keyslot area.
# Key slot 0 was enabled in LUKS header.
# Updating LUKS header of size 1024 on device /dev/sdb2
# Key length 32, device size 2097152 sectors, header size 2050 sectors.
# Reading LUKS header of size 1024 from device /dev/sdb2
# Key length 32, device size 2097152 sectors, header size 2050 sectors.
# Releasing crypt device /dev/sdb2 context.
# Releasing device-mapper backend.
# Unlocking memory.
Command successful.
[root@arch mnt]# mount /dev/sdb1 efi
mount: unknown filesystem type 'crypto_LUKS'

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2016-12-30 11:45 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-07-11 22:39 [dm-crypt] cryptsetup bug divyashree kumar
2010-07-13  8:25 ` morphium
2010-07-13 11:09 ` Arno Wagner
  -- strict thread matches above, loose matches on Subject: below --
2016-12-29 17:53 [dm-crypt] Cryptsetup bug Hunter DeMeyer
2016-12-29 23:13 ` Michael Kjörling
2016-12-29 23:16 ` Arno Wagner
2016-12-30  2:18 ` Milan Broz
2016-12-30  2:46   ` Hunter DeMeyer
2016-12-30 11:45     ` Sven Eschenberg

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox