> On 10/29/23 22:01, Roberto Ragusa wrote: > > The point here is not about getting the passphrase, it is about > getting the real decryption key. > Storing the decryption key in a safe place is a lot better than > relying on things that can break in many ways (luks header overwritten, > broken TPM, new machine, ...). > The real decryption key makes the difference between having data > or losing them; making all recovery strategies impossible is not > a good idea. Nothing is preventing you from backing up the LUKS header (cryptsetup luksHeaderBackup), it's just that it is encrypted and includes whatever keyslots you have, and if they're all removed (or you don't remember the pass phrase for them), it isn't really going to help you decrypt an unlocked volume without a passphrase or any of those other methods. What you're asking is the ability to extract the decryption key of the unlocked LUKS volume without knowing any of the methods used to decrypt it. That would be a huge security hole. -- Jonathan _______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue