From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.saout.de ([127.0.0.1]) by localhost (mail.saout.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id isyXWeKd4KiZ for ; Fri, 22 Nov 2013 12:11:57 +0100 (CET) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by mail.saout.de (Postfix) with ESMTP for ; Fri, 22 Nov 2013 12:11:56 +0100 (CET) Message-ID: <528F330C.7090407@redhat.com> Date: Fri, 22 Nov 2013 11:33:48 +0100 From: Ondrej Kozina MIME-Version: 1.0 References: <528F152D.5090205@riseup.net> In-Reply-To: <528F152D.5090205@riseup.net> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [dm-crypt] re-format existing luks partition List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "shmick@riseup.net" , dm-crypt@saout.de On 11/22/2013 09:26 AM, shmick@riseup.net wrote: > can i re-format an existing luks partition (as the same /dev/sda[x] and > simply re-copy an fsarchive operating system backup straight to it > without anything further required ? There's an offline cryptsetup-reencrypt tool in cryptsetup 1.5.0 and later. It's really offline so the device needs to umnouted before reencrypting. Also you should consider shrinking the filesystem residing on the luks device (and after that also the device) before actual reencryption. It makes reencryption sector-by-sector no matter if it is used by filessytem or not. Also there are some fixes ready for reencryption tool on the way so you may be also interested waiting for 1.6.3 release in coming weeks. Regards Ondrej