* [dm-crypt] can't open luks device after raid 5 rebuild
@ 2012-04-08 13:04 artificial11000
2012-04-08 15:47 ` Arno Wagner
0 siblings, 1 reply; 12+ messages in thread
From: artificial11000 @ 2012-04-08 13:04 UTC (permalink / raw)
To: dm-crypt
Hi guys,
after my encrypted RAID 5 was degraded and rebuilt, I can't open it anymore.
cryptsetup luksOpen /dev/md127 archiv
Geben Sie den Passsatz für /dev/md127 ein:
Kein Schlüssel mit diesem Passsatz verfügbar.
It says that the provided password doesn't match any of the stored keys.
Here's the output of luksDump:
cryptsetup luksDump /dev/md127
LUKS header information for /dev/md127
Version: 1
Cipher name: aes
Cipher mode: xts-plain
Hash spec: sha1
Payload offset: 4040
MK bits: 512
MK digest: 53 24 e5 1d 68 3e f1 5f 96 56 06 23 85 4a b6 89 07 de
52 1d
MK salt: 5b 2e 4b 48 d8 2f 91 52 90 79 3b 6e 73 13 52 f1
8f 9e 35 50 8e 25 9e 92 22 52 48 26 44 d7 bd 6c
MK iterations: 10
UUID: 3fbd3c47-8dc3-4541-8960-00c0a80c8ae9
Key Slot 0: ENABLED
Iterations: 363564
Salt: 32 db 41 40 56 fe 6f a9 c7 e4 c4 5f a0 4c 52 db
8e df 07 8c 9b 32 86 e6 ac 0c 8a e6 c4 69
31 0f
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
Can anyone help me?
Regards
artificial
^ permalink raw reply [flat|nested] 12+ messages in thread* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 13:04 [dm-crypt] can't open luks device after raid 5 rebuild artificial11000 @ 2012-04-08 15:47 ` Arno Wagner 2012-04-08 16:23 ` artificial11000 0 siblings, 1 reply; 12+ messages in thread From: Arno Wagner @ 2012-04-08 15:47 UTC (permalink / raw) To: dm-crypt Hi, a RAID degradation and successful rebuild does not have this effect. Did you do something else? Or did you do a manual (forced) rebuild? What exactly did happen to the RAID and what did you do to fix it? The symptoms you see are typical for a damaged key-slot. The header resides in a single sector and is not affected. If so, a header backup is possibly the only thing that will help you, see the FAQ for details. Arno On Sun, Apr 08, 2012 at 03:04:47PM +0200, artificial11000 wrote: > Hi guys, > > after my encrypted RAID 5 was degraded and rebuilt, I can't open it anymore. > > cryptsetup luksOpen /dev/md127 archiv > Geben Sie den Passsatz f?r /dev/md127 ein: > Kein Schl?ssel mit diesem Passsatz verf?gbar. > > It says that the provided password doesn't match any of the stored keys. > > Here's the output of luksDump: > > cryptsetup luksDump /dev/md127 > LUKS header information for /dev/md127 > > Version: 1 > Cipher name: aes > Cipher mode: xts-plain > Hash spec: sha1 > Payload offset: 4040 > MK bits: 512 > MK digest: 53 24 e5 1d 68 3e f1 5f 96 56 06 23 85 4a b6 89 > 07 de 52 1d > MK salt: 5b 2e 4b 48 d8 2f 91 52 90 79 3b 6e 73 13 52 f1 > 8f 9e 35 50 8e 25 9e 92 22 52 48 26 44 d7 bd 6c > MK iterations: 10 > UUID: 3fbd3c47-8dc3-4541-8960-00c0a80c8ae9 > > Key Slot 0: ENABLED > Iterations: 363564 > Salt: 32 db 41 40 56 fe 6f a9 c7 e4 c4 5f a0 4c 52 db > 8e df 07 8c 9b 32 86 e6 ac 0c 8a e6 c4 > 69 31 0f > Key material offset: 8 > AF stripes: 4000 > Key Slot 1: DISABLED > Key Slot 2: DISABLED > Key Slot 3: DISABLED > Key Slot 4: DISABLED > Key Slot 5: DISABLED > Key Slot 6: DISABLED > Key Slot 7: DISABLED > > > Can anyone help me? > > Regards > artificial > _______________________________________________ > dm-crypt mailing list > dm-crypt@saout.de > http://www.saout.de/mailman/listinfo/dm-crypt > -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision. -- Bertrand Russell ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 15:47 ` Arno Wagner @ 2012-04-08 16:23 ` artificial11000 2012-04-08 16:33 ` Ingo Schmitt ` (2 more replies) 0 siblings, 3 replies; 12+ messages in thread From: artificial11000 @ 2012-04-08 16:23 UTC (permalink / raw) To: dm-crypt Hi, as I noticed that I can't access the device, I recreated the raid manually. mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd Could this damage the key-slot? Are the metadata of the RAID relevant to this? I read that old versions of mdadm created RAIDs with metadata=0.90 and the newer versions with metadata=1.20. artificial On 04/08/2012 05:47 PM, Arno Wagner wrote: > Hi, > > a RAID degradation and successful rebuild does not have this > effect. Did you do something else? Or did you do a manual (forced) > rebuild? What exactly did happen to the RAID and what did you > do to fix it? > > The symptoms you see are typical for a damaged key-slot. The > header resides in a single sector and is not affected. > If so, a header backup is possibly the only thing that will > help you, see the FAQ for details. > > Arno > > On Sun, Apr 08, 2012 at 03:04:47PM +0200, artificial11000 wrote: >> Hi guys, >> >> after my encrypted RAID 5 was degraded and rebuilt, I can't open it anymore. >> >> cryptsetup luksOpen /dev/md127 archiv >> Geben Sie den Passsatz f?r /dev/md127 ein: >> Kein Schl?ssel mit diesem Passsatz verf?gbar. >> >> It says that the provided password doesn't match any of the stored keys. >> >> Here's the output of luksDump: >> >> cryptsetup luksDump /dev/md127 >> LUKS header information for /dev/md127 >> >> Version: 1 >> Cipher name: aes >> Cipher mode: xts-plain >> Hash spec: sha1 >> Payload offset: 4040 >> MK bits: 512 >> MK digest: 53 24 e5 1d 68 3e f1 5f 96 56 06 23 85 4a b6 89 >> 07 de 52 1d >> MK salt: 5b 2e 4b 48 d8 2f 91 52 90 79 3b 6e 73 13 52 f1 >> 8f 9e 35 50 8e 25 9e 92 22 52 48 26 44 d7 bd 6c >> MK iterations: 10 >> UUID: 3fbd3c47-8dc3-4541-8960-00c0a80c8ae9 >> >> Key Slot 0: ENABLED >> Iterations: 363564 >> Salt: 32 db 41 40 56 fe 6f a9 c7 e4 c4 5f a0 4c 52 db >> 8e df 07 8c 9b 32 86 e6 ac 0c 8a e6 c4 >> 69 31 0f >> Key material offset: 8 >> AF stripes: 4000 >> Key Slot 1: DISABLED >> Key Slot 2: DISABLED >> Key Slot 3: DISABLED >> Key Slot 4: DISABLED >> Key Slot 5: DISABLED >> Key Slot 6: DISABLED >> Key Slot 7: DISABLED >> >> >> Can anyone help me? >> >> Regards >> artificial >> _______________________________________________ >> dm-crypt mailing list >> dm-crypt@saout.de >> http://www.saout.de/mailman/listinfo/dm-crypt >> > ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 16:23 ` artificial11000 @ 2012-04-08 16:33 ` Ingo Schmitt 2012-04-08 17:09 ` Heinz Diehl 2012-04-08 20:35 ` Arno Wagner 2 siblings, 0 replies; 12+ messages in thread From: Ingo Schmitt @ 2012-04-08 16:33 UTC (permalink / raw) To: artificial11000; +Cc: dm-crypt Hi Artificial, On 04/08/12 18:23, artificial11000 wrote: > as I noticed that I can't access the device, I recreated the raid manually. > mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd You created a new raid that way. > Could this damage the key-slot? Yes and all the data on the drives too. > Are the metadata of the RAID relevant to this? > I read that old versions of mdadm created RAIDs with metadata=0.90 and > the newer versions with metadata=1.20. > > artificial > > On 04/08/2012 05:47 PM, Arno Wagner wrote: >> Hi, >> >> a RAID degradation and successful rebuild does not have this >> effect. Did you do something else? Or did you do a manual (forced) >> rebuild? What exactly did happen to the RAID and what did you >> do to fix it? >> >> The symptoms you see are typical for a damaged key-slot. The >> header resides in a single sector and is not affected. >> If so, a header backup is possibly the only thing that will >> help you, see the FAQ for details. >> >> Arno >> >> On Sun, Apr 08, 2012 at 03:04:47PM +0200, artificial11000 wrote: >>> Hi guys, >>> >>> after my encrypted RAID 5 was degraded and rebuilt, I can't open it >>> anymore. >>> >>> cryptsetup luksOpen /dev/md127 archiv >>> Geben Sie den Passsatz f?r /dev/md127 ein: >>> Kein Schl?ssel mit diesem Passsatz verf?gbar. >>> >>> It says that the provided password doesn't match any of the stored keys. >>> >>> Here's the output of luksDump: >>> >>> cryptsetup luksDump /dev/md127 >>> LUKS header information for /dev/md127 >>> >>> Version: 1 >>> Cipher name: aes >>> Cipher mode: xts-plain >>> Hash spec: sha1 >>> Payload offset: 4040 >>> MK bits: 512 >>> MK digest: 53 24 e5 1d 68 3e f1 5f 96 56 06 23 85 4a b6 89 >>> 07 de 52 1d >>> MK salt: 5b 2e 4b 48 d8 2f 91 52 90 79 3b 6e 73 13 52 f1 >>> 8f 9e 35 50 8e 25 9e 92 22 52 48 26 44 d7 bd 6c >>> MK iterations: 10 >>> UUID: 3fbd3c47-8dc3-4541-8960-00c0a80c8ae9 >>> >>> Key Slot 0: ENABLED >>> Iterations: 363564 >>> Salt: 32 db 41 40 56 fe 6f a9 c7 e4 c4 5f a0 >>> 4c 52 db >>> 8e df 07 8c 9b 32 86 e6 ac 0c 8a e6 c4 >>> 69 31 0f >>> Key material offset: 8 >>> AF stripes: 4000 >>> Key Slot 1: DISABLED >>> Key Slot 2: DISABLED >>> Key Slot 3: DISABLED >>> Key Slot 4: DISABLED >>> Key Slot 5: DISABLED >>> Key Slot 6: DISABLED >>> Key Slot 7: DISABLED >>> >>> >>> Can anyone help me? >>> >>> Regards >>> artificial >>> _______________________________________________ >>> dm-crypt mailing list >>> dm-crypt@saout.de >>> http://www.saout.de/mailman/listinfo/dm-crypt >>> >> > _______________________________________________ > dm-crypt mailing list > dm-crypt@saout.de > http://www.saout.de/mailman/listinfo/dm-crypt ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 16:23 ` artificial11000 2012-04-08 16:33 ` Ingo Schmitt @ 2012-04-08 17:09 ` Heinz Diehl 2012-04-08 20:07 ` Salatiel Filho 2012-04-08 20:22 ` Arno Wagner 2012-04-08 20:35 ` Arno Wagner 2 siblings, 2 replies; 12+ messages in thread From: Heinz Diehl @ 2012-04-08 17:09 UTC (permalink / raw) To: dm-crypt On 08.04.2012, artificial11000 wrote: > mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd --------- Seems your data is gone, forever. You created a new raid manually, which means that you deleted all your previous data. You have a backup, do you? ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 17:09 ` Heinz Diehl @ 2012-04-08 20:07 ` Salatiel Filho 2012-04-08 20:28 ` Arno Wagner 2012-04-08 20:22 ` Arno Wagner 1 sibling, 1 reply; 12+ messages in thread From: Salatiel Filho @ 2012-04-08 20:07 UTC (permalink / raw) To: dm-crypt On Sun, Apr 8, 2012 at 14:09, Heinz Diehl <htd@fancy-poultry.org> wrote: > On 08.04.2012, artificial11000 wrote: > >> mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd > --------- > > Seems your data is gone, forever. You created a new raid manually, > which means that you deleted all your previous data. > > You have a backup, do you? > > _______________________________________________ > dm-crypt mailing list > dm-crypt@saout.de > http://www.saout.de/mailman/listinfo/dm-crypt I disagree. I got some missing superblock sometime in the past while assembling the array. Recreated it using mdadm -C with the same parameters for the raid-level and raid-devices and it did not touch my encrypted data. I was able to mount just fine after that. I always thought that mdadm would touch only their own superblock when creating. Though at that time i had a degraded array and my array is built on partitions , not the whole disk. []'s Salatiel ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 20:07 ` Salatiel Filho @ 2012-04-08 20:28 ` Arno Wagner 0 siblings, 0 replies; 12+ messages in thread From: Arno Wagner @ 2012-04-08 20:28 UTC (permalink / raw) To: dm-crypt On Sun, Apr 08, 2012 at 05:07:28PM -0300, Salatiel Filho wrote: > On Sun, Apr 8, 2012 at 14:09, Heinz Diehl <htd@fancy-poultry.org> wrote: > > On 08.04.2012, artificial11000 wrote: > > > >> ?mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd > > ? ? ? ? --------- > > > > Seems your data is gone, forever. You created a new raid manually, > > which means that you deleted all your previous data. > > > > You have a backup, do you? > > > > _______________________________________________ > > dm-crypt mailing list > > dm-crypt@saout.de > > http://www.saout.de/mailman/listinfo/dm-crypt > > I disagree. I got some missing superblock sometime in the past while > assembling the array. Recreated it using mdadm -C with the same > parameters for the raid-level and raid-devices and it did not touch my > encrypted data. I was able to mount just fine after that. I always > thought that mdadm would touch only their own superblock when > creating. No, it recreates the parity stripes. It has to, otherwise RAID consistency checks would fail. If, for any reason, drive/device order or stripe size is diferent, this will scramble your data. The data is still there unless you write to the array, see my other answer. It also overwrites the RAID superblocks. If everything is the same, the original data will be there though, because the new parity stripes are exactly at the same positions on the same disks as the old ones and created from the same non-parity stripes. > Though at that time i had a degraded array and my array is > built on partitions , not the whole disk. On a degraded array, you should always only (re-)add the missing device or a replacement. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision. -- Bertrand Russell ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 17:09 ` Heinz Diehl 2012-04-08 20:07 ` Salatiel Filho @ 2012-04-08 20:22 ` Arno Wagner 1 sibling, 0 replies; 12+ messages in thread From: Arno Wagner @ 2012-04-08 20:22 UTC (permalink / raw) To: dm-crypt On Sun, Apr 08, 2012 at 07:09:30PM +0200, Heinz Diehl wrote: > On 08.04.2012, artificial11000 wrote: > > > mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd > --------- > > Seems your data is gone, forever. You created a new raid manually, > which means that you deleted all your previous data. Not quite. The LUKS header is still there, obviously. What happens when you create a RAID5 array out of components of another RAID5 array is the following: They get put into some order and, in a fashion rotating by stripe-size, one drive gets overwritten with the parity of the others. If everything, includiong the drive order is the same as in the original artray, everything will be fine. Otherwise, if the stripe size is correct, you will not actually lose any data, as only one drive was overwritten per stripe and the original RAID5 data is tolerant against one device loss (or loss of one stripe per stripe-set). The array still assembles incorrectly and you will _not_ be able to re-create the original data without major effort. It should be possible though, but it involves figuring out the current and the old stripe order and then manually rebuilding the old array out of the old stripes still there. This is made trickier because the old RAID superblocks are also gone. I think could do this, but I would expect several days of coding and I would need the password (otherwise it is impossible to verify correct stripe order and size) and complete drive images of all drives. (And, sorry, my rates are likely way above what the data is worth to you...) Some RAID recovery software may also be able to help, but as the data is encrypted, I doubt it, as with encrypted data, it is not possible to detect whether the assembly order is right. This would require a specialized LUKS-aware RAID recovery tool. > You have a backup, do you? That would be the next question. The proble is not (only) that you hosed the LUKS header, but the complete data area. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision. -- Bertrand Russell ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 16:23 ` artificial11000 2012-04-08 16:33 ` Ingo Schmitt 2012-04-08 17:09 ` Heinz Diehl @ 2012-04-08 20:35 ` Arno Wagner 2012-04-08 20:43 ` artificial11000 2 siblings, 1 reply; 12+ messages in thread From: Arno Wagner @ 2012-04-08 20:35 UTC (permalink / raw) To: dm-crypt On Sun, Apr 08, 2012 at 06:23:22PM +0200, artificial11000 wrote: > Hi, > > as I noticed that I can't access the device, I recreated the raid manually. > mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd > > Could this damage the key-slot? > Are the metadata of the RAID relevant to this? > I read that old versions of mdadm created RAIDs with metadata=0.90 > and the newer versions with metadata=1.20. This may be an additional problem or the only problem. Metadata 0.90 is at the end of the device. Metadata 1.20 is 4k from the start of the device. The other versions are in still other places. (I have no idea what messed up process created these thorougly insane changes.) So, yes, 4k offset is right in the first key-stripe. If so, then your data is pemanently gone unless you have a header-backup. In this case it is also possible that the array actually assembled right and the problem is _only_ the new raid metadata block. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision. -- Bertrand Russell ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 20:35 ` Arno Wagner @ 2012-04-08 20:43 ` artificial11000 2012-04-08 23:22 ` Arno Wagner 0 siblings, 1 reply; 12+ messages in thread From: artificial11000 @ 2012-04-08 20:43 UTC (permalink / raw) To: dm-crypt Hi guys, thanks for your effort. Meanwhile I had to start over and format the whole device. I have a backup. Allthough it is not really up to date, I can work with it. Thanks again artificial On 04/08/2012 10:35 PM, Arno Wagner wrote: > On Sun, Apr 08, 2012 at 06:23:22PM +0200, artificial11000 wrote: >> Hi, >> >> as I noticed that I can't access the device, I recreated the raid manually. >> mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd >> >> Could this damage the key-slot? >> Are the metadata of the RAID relevant to this? >> I read that old versions of mdadm created RAIDs with metadata=0.90 >> and the newer versions with metadata=1.20. > > This may be an additional problem or the only problem. Metadata 0.90 > is at the end of the device. Metadata 1.20 is 4k from the start of > the device. The other versions are in still other places. > (I have no idea what messed up process created these thorougly > insane changes.) > > So, yes, 4k offset is right in the first key-stripe. If so, > then your data is pemanently gone unless you have a header-backup. > In this case it is also possible that the array actually assembled > right and the problem is _only_ the new raid metadata block. > > Arno > ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [dm-crypt] can't open luks device after raid 5 rebuild 2012-04-08 20:43 ` artificial11000 @ 2012-04-08 23:22 ` Arno Wagner 0 siblings, 0 replies; 12+ messages in thread From: Arno Wagner @ 2012-04-08 23:22 UTC (permalink / raw) To: dm-crypt On Sun, Apr 08, 2012 at 10:43:34PM +0200, artificial11000 wrote: > Hi guys, > > thanks for your effort. No problem. > Meanwhile I had to start over and format the whole device. > I have a backup. Allthough it is not really up to date, I can work with it. Good. So you already did something very right. Arno > Thanks again > > artificial > > On 04/08/2012 10:35 PM, Arno Wagner wrote: > >On Sun, Apr 08, 2012 at 06:23:22PM +0200, artificial11000 wrote: > >>Hi, > >> > >>as I noticed that I can't access the device, I recreated the raid manually. > >> mdadm --create --level=5 -n 3 /dev/md127 /dev/sdb /dev/sdc /dev/sdd > >> > >>Could this damage the key-slot? > >>Are the metadata of the RAID relevant to this? > >>I read that old versions of mdadm created RAIDs with metadata=0.90 > >>and the newer versions with metadata=1.20. > > > >This may be an additional problem or the only problem. Metadata 0.90 > >is at the end of the device. Metadata 1.20 is 4k from the start of > >the device. The other versions are in still other places. > >(I have no idea what messed up process created these thorougly > >insane changes.) > > > >So, yes, 4k offset is right in the first key-stripe. If so, > >then your data is pemanently gone unless you have a header-backup. > >In this case it is also possible that the array actually assembled > >right and the problem is _only_ the new raid metadata block. > > > >Arno > > > _______________________________________________ > dm-crypt mailing list > dm-crypt@saout.de > http://www.saout.de/mailman/listinfo/dm-crypt > -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@wagner.name GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision. -- Bertrand Russell ^ permalink raw reply [flat|nested] 12+ messages in thread
* [dm-crypt] can't open luks device after raid 5 rebuild
@ 2012-04-07 15:54 artificial11000
0 siblings, 0 replies; 12+ messages in thread
From: artificial11000 @ 2012-04-07 15:54 UTC (permalink / raw)
To: dm-crypt
Hi guys,
after my encrypted RAID 5 was degraded and rebuilt, I can't open it anymore.
cryptsetup luksOpen /dev/md127 archiv
Geben Sie den Passsatz für /dev/md127 ein:
Kein Schlüssel mit diesem Passsatz verfügbar.
It says that the provided password doesn't match any of the stored keys.
Here's the output of luksDump:
cryptsetup luksDump /dev/md127
LUKS header information for /dev/md127
Version: 1
Cipher name: aes
Cipher mode: xts-plain
Hash spec: sha1
Payload offset: 4040
MK bits: 512
MK digest: 53 24 e5 1d 68 3e f1 5f 96 56 06 23 85 4a b6 89 07 de 52 1d
MK salt: 5b 2e 4b 48 d8 2f 91 52 90 79 3b 6e 73 13 52 f1
8f 9e 35 50 8e 25 9e 92 22 52 48 26 44 d7 bd 6c
MK iterations: 10
UUID: 3fbd3c47-8dc3-4541-8960-00c0a80c8ae9
Key Slot 0: ENABLED
Iterations: 363564
Salt: 32 db 41 40 56 fe 6f a9 c7 e4 c4 5f a0 4c 52 db
8e df 07 8c 9b 32 86 e6 ac 0c 8a e6 c4 69 31 0f
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
Can anyone help me?
Regards
artificial
^ permalink raw reply [flat|nested] 12+ messages in threadend of thread, other threads:[~2012-04-08 23:22 UTC | newest] Thread overview: 12+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2012-04-08 13:04 [dm-crypt] can't open luks device after raid 5 rebuild artificial11000 2012-04-08 15:47 ` Arno Wagner 2012-04-08 16:23 ` artificial11000 2012-04-08 16:33 ` Ingo Schmitt 2012-04-08 17:09 ` Heinz Diehl 2012-04-08 20:07 ` Salatiel Filho 2012-04-08 20:28 ` Arno Wagner 2012-04-08 20:22 ` Arno Wagner 2012-04-08 20:35 ` Arno Wagner 2012-04-08 20:43 ` artificial11000 2012-04-08 23:22 ` Arno Wagner -- strict thread matches above, loose matches on Subject: below -- 2012-04-07 15:54 artificial11000
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox