* [dm-crypt] LUKS Header crruption
[not found] <1590255742.9.1564314256863.JavaMail.gkos@xpska>
@ 2019-07-28 11:57 ` Konstantin V. Gavrilenko
2019-07-28 21:00 ` Arno Wagner
0 siblings, 1 reply; 7+ messages in thread
From: Konstantin V. Gavrilenko @ 2019-07-28 11:57 UTC (permalink / raw)
To: dm-crypt
Hi List,
as a result of executing a command from the history, after a reboot, when the disk letters were changed, I have accidentally overwritten the LUKS header with the raid superblock one :(
Now I can not open the cryptodisk with the "luksOpen" as it states the "No key available with this passphrase."
However, when I run "luksDump" the header information is available
# cryptsetup luksDump /dev/sdd1
LUKS header information for /dev/sdd1
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha256
Payload offset: 4096
MK bits: 256
MK digest: a6 a6 de 04 5a 19 9f 97 54 a9 79 bf f8 c1 37 89 69 44 34 76
MK salt: 7a 0b 8e cc 68 06 35 ec 09 fc 5e f9 90 e3 c9 ef
8b 11 96 10 4c 25 ab 89 a1 48 df fe 6a 88 20 96
MK iterations: 232809
UUID: 0f91c412-6f6a-405d-8040-5cc17ad17b47
Key Slot 0: ENABLED
Iterations: 3724958
Salt: c4 52 ac 04 59 8a d1 4f 7a 3c 5d e8 d3 50 1a c4
11 20 0b 66 66 81 78 09 9f 7a f4 c1 dc 80 d4 40
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
The RAID superblock that was written by mdadm is default, version 1.2 that is located 4K from the beginning of the device.
Providing that I have no backup of the original header and I know wht was written, is there a way to restore the header and get the data?
Konstantin
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [dm-crypt] LUKS Header crruption
2019-07-28 11:57 ` [dm-crypt] LUKS Header crruption Konstantin V. Gavrilenko
@ 2019-07-28 21:00 ` Arno Wagner
2019-07-29 7:25 ` Uwe Menges
0 siblings, 1 reply; 7+ messages in thread
From: Arno Wagner @ 2019-07-28 21:00 UTC (permalink / raw)
To: dm-crypt
Hi Konstantin,
sorry, you data is gone. You overwrote the start of the first
key-slot and there is no way to recover from that without backup.
One of the reasons why I think RAID superblocks at the start of the
device (and even more so at 4kB offset) are messed up and a sign
of clueless designers.
Regards,
Arno
On Sun, Jul 28, 2019 at 13:57:50 CEST, Konstantin V. Gavrilenko wrote:
> Hi List,
>
> as a result of executing a command from the history, after a reboot, when
> the disk letters were changed, I have accidentally overwritten the LUKS
> header with the raid superblock one :(
>
> Now I can not open the cryptodisk with the "luksOpen" as it states the "No
> key available with this passphrase."
>
>
> However, when I run "luksDump" the header information is available
>
> # cryptsetup luksDump /dev/sdd1
> LUKS header information for /dev/sdd1
>
> Version: 1
> Cipher name: aes
> Cipher mode: xts-plain64
> Hash spec: sha256
> Payload offset: 4096
> MK bits: 256
> MK digest: a6 a6 de 04 5a 19 9f 97 54 a9 79 bf f8 c1 37 89 69 44 34 76
> MK salt: 7a 0b 8e cc 68 06 35 ec 09 fc 5e f9 90 e3 c9 ef
> 8b 11 96 10 4c 25 ab 89 a1 48 df fe 6a 88 20 96
> MK iterations: 232809
> UUID: 0f91c412-6f6a-405d-8040-5cc17ad17b47
>
> Key Slot 0: ENABLED
> Iterations: 3724958
> Salt: c4 52 ac 04 59 8a d1 4f 7a 3c 5d e8 d3 50 1a c4
> 11 20 0b 66 66 81 78 09 9f 7a f4 c1 dc 80 d4 40
> Key material offset: 8
> AF stripes: 4000
> Key Slot 1: DISABLED
> Key Slot 2: DISABLED
> Key Slot 3: DISABLED
> Key Slot 4: DISABLED
> Key Slot 5: DISABLED
> Key Slot 6: DISABLED
> Key Slot 7: DISABLED
>
>
>
> The RAID superblock that was written by mdadm is default, version 1.2 that
> is located 4K from the beginning of the device.
>
>
> Providing that I have no backup of the original header and I know wht was
> written, is there a way to restore the header and get the data?
>
>
> Konstantin
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> https://www.saout.de/mailman/listinfo/dm-crypt
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato
If it's in the news, don't worry about it. The very definition of
"news" is "something that hardly ever happens." -- Bruce Schneier
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [dm-crypt] LUKS Header crruption
2019-07-28 21:00 ` Arno Wagner
@ 2019-07-29 7:25 ` Uwe Menges
2019-07-29 9:28 ` Arno Wagner
0 siblings, 1 reply; 7+ messages in thread
From: Uwe Menges @ 2019-07-29 7:25 UTC (permalink / raw)
To: dm-crypt
On 7/28/19 11:00 PM, Arno Wagner wrote:
> One of the reasons why I think RAID superblocks at the start of the
> device (and even more so at 4kB offset) are messed up and a sign
> of clueless designers.
Depending on the md metadata version, it's either at the start, at the
end, or 4k from start - each with its own drawbacks. The metadata needs
to reside somewhere, quite the same as with LUKS, or filesystem
metadata. If you have a hint on how to get around that, please tell.. :)
Yours, Uwe
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [dm-crypt] LUKS Header crruption
2019-07-29 7:25 ` Uwe Menges
@ 2019-07-29 9:28 ` Arno Wagner
0 siblings, 0 replies; 7+ messages in thread
From: Arno Wagner @ 2019-07-29 9:28 UTC (permalink / raw)
To: dm-crypt
On Mon, Jul 29, 2019 at 09:25:15 CEST, Uwe Menges wrote:
> On 7/28/19 11:00 PM, Arno Wagner wrote:
> > One of the reasons why I think RAID superblocks at the start of the
> > device (and even more so at 4kB offset) are messed up and a sign
> > of clueless designers.
>
> Depending on the md metadata version, it's either at the start, at the
> end, or 4k from start - each with its own drawbacks. The metadata needs
> to reside somewhere, quite the same as with LUKS, or filesystem
> metadata. If you have a hint on how to get around that, please tell.. :)
Maybe read what I wrote, because you seem to not have done so?
And yes, I am aware of the different problems.
Regards,
Arno
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato
If it's in the news, don't worry about it. The very definition of
"news" is "something that hardly ever happens." -- Bruce Schneier
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [dm-crypt] LUKS Header crruption
[not found] <1313728220.30.1564401565268.JavaMail.gkos@xpska>
@ 2019-07-29 12:08 ` Konstantin V. Gavrilenko
2019-07-29 13:56 ` Robert Nichols
0 siblings, 1 reply; 7+ messages in thread
From: Konstantin V. Gavrilenko @ 2019-07-29 12:08 UTC (permalink / raw)
To: dm-crypt
Thanks Arno, thought so :(
Its a real pity that metadata is not redundant in luks v1.
Regards,
Konstantin
----- Original Message -----
From: "Arno Wagner" <arno@wagner.name>
To: dm-crypt@saout.de
Sent: Sunday, 28 July, 2019 11:00:49 PM
Subject: Re: [dm-crypt] LUKS Header crruption
Hi Konstantin,
sorry, you data is gone. You overwrote the start of the first
key-slot and there is no way to recover from that without backup.
One of the reasons why I think RAID superblocks at the start of the
device (and even more so at 4kB offset) are messed up and a sign
of clueless designers.
Regards,
Arno
On Sun, Jul 28, 2019 at 13:57:50 CEST, Konstantin V. Gavrilenko wrote:
> Hi List,
>
> as a result of executing a command from the history, after a reboot, when
> the disk letters were changed, I have accidentally overwritten the LUKS
> header with the raid superblock one :(
>
> Now I can not open the cryptodisk with the "luksOpen" as it states the "No
> key available with this passphrase."
>
>
> However, when I run "luksDump" the header information is available
>
> # cryptsetup luksDump /dev/sdd1
> LUKS header information for /dev/sdd1
>
> Version: 1
> Cipher name: aes
> Cipher mode: xts-plain64
> Hash spec: sha256
> Payload offset: 4096
> MK bits: 256
> MK digest: a6 a6 de 04 5a 19 9f 97 54 a9 79 bf f8 c1 37 89 69 44 34 76
> MK salt: 7a 0b 8e cc 68 06 35 ec 09 fc 5e f9 90 e3 c9 ef
> 8b 11 96 10 4c 25 ab 89 a1 48 df fe 6a 88 20 96
> MK iterations: 232809
> UUID: 0f91c412-6f6a-405d-8040-5cc17ad17b47
>
> Key Slot 0: ENABLED
> Iterations: 3724958
> Salt: c4 52 ac 04 59 8a d1 4f 7a 3c 5d e8 d3 50 1a c4
> 11 20 0b 66 66 81 78 09 9f 7a f4 c1 dc 80 d4 40
> Key material offset: 8
> AF stripes: 4000
> Key Slot 1: DISABLED
> Key Slot 2: DISABLED
> Key Slot 3: DISABLED
> Key Slot 4: DISABLED
> Key Slot 5: DISABLED
> Key Slot 6: DISABLED
> Key Slot 7: DISABLED
>
>
>
> The RAID superblock that was written by mdadm is default, version 1.2 that
> is located 4K from the beginning of the device.
>
>
> Providing that I have no backup of the original header and I know wht was
> written, is there a way to restore the header and get the data?
>
>
> Konstantin
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> https://www.saout.de/mailman/listinfo/dm-crypt
--
Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name
GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718
----
A good decision is based on knowledge and not on numbers. -- Plato
If it's in the news, don't worry about it. The very definition of
"news" is "something that hardly ever happens." -- Bruce Schneier
_______________________________________________
dm-crypt mailing list
dm-crypt@saout.de
https://www.saout.de/mailman/listinfo/dm-crypt
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [dm-crypt] LUKS Header crruption
2019-07-29 12:08 ` Konstantin V. Gavrilenko
@ 2019-07-29 13:56 ` Robert Nichols
2019-07-29 14:33 ` Milan Broz
0 siblings, 1 reply; 7+ messages in thread
From: Robert Nichols @ 2019-07-29 13:56 UTC (permalink / raw)
To: dm-crypt
The key material is quite deliberately made just the opposite of redundant. It is artificially inflated (typically 4000X) to occupy a larger area of the disk, and in such a manner that successfully erasing any portion of that area makes the key unrecoverable.
--
Bob Nichols "NOSPAM" is really part of my email address.
Do NOT delete it.
On 7/29/19 7:08 AM, Konstantin V. Gavrilenko wrote:
> Thanks Arno, thought so :(
> Its a real pity that metadata is not redundant in luks v1.
>
> Regards,
> Konstantin
>
>
>
> ----- Original Message -----
> From: "Arno Wagner" <arno@wagner.name>
> To: dm-crypt@saout.de
> Sent: Sunday, 28 July, 2019 11:00:49 PM
> Subject: Re: [dm-crypt] LUKS Header crruption
>
> Hi Konstantin,
>
> sorry, you data is gone. You overwrote the start of the first
> key-slot and there is no way to recover from that without backup.
>
> One of the reasons why I think RAID superblocks at the start of the
> device (and even more so at 4kB offset) are messed up and a sign
> of clueless designers.
>
> Regards,
> Arno
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [dm-crypt] LUKS Header crruption
2019-07-29 13:56 ` Robert Nichols
@ 2019-07-29 14:33 ` Milan Broz
0 siblings, 0 replies; 7+ messages in thread
From: Milan Broz @ 2019-07-29 14:33 UTC (permalink / raw)
To: dm-crypt
On 29/07/2019 15:56, Robert Nichols wrote:
> The key material is quite deliberately made just the opposite of
> redundant. It is artificially inflated (typically 4000X) to occupy a
> larger area of the disk, and in such a manner that successfully
> erasing any portion of that area makes the key unrecoverable.
Exactly. And this part is not changed even in LUKS2
(only metadata is stored twice).
For LUKS2, we just store keyslots content in area with higher offset,
seems that data corruption (caused by overwriting by random too-clever
software) is not so common here (like for the keyslot 0 in LUKS1).
Solution is to backup LUKS header.
Milan
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2019-07-29 14:33 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <1590255742.9.1564314256863.JavaMail.gkos@xpska>
2019-07-28 11:57 ` [dm-crypt] LUKS Header crruption Konstantin V. Gavrilenko
2019-07-28 21:00 ` Arno Wagner
2019-07-29 7:25 ` Uwe Menges
2019-07-29 9:28 ` Arno Wagner
[not found] <1313728220.30.1564401565268.JavaMail.gkos@xpska>
2019-07-29 12:08 ` Konstantin V. Gavrilenko
2019-07-29 13:56 ` Robert Nichols
2019-07-29 14:33 ` Milan Broz
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox