Re: LVM encryption and new volume group

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Sun, Mar 8, 2015 at 5:36 AM, Tim <lists@xxxxxxxx> wrote:
> I'm sorry, but grep -i crypt /var/log/anaconda/anaconda.program.log
> returns nothing. But I have got an entry in /etc/crypttab.

OK ignore what I wrote about crypttab and pointing to a file. Robert's
message is essentially correct.

It looks like the cryptesetup command gets stripped out of the
anaconda.program.log, probably because it contains the user passphrase
in it. This is the basic command used in RHEL 7 documentation [1]
which you can adapt for either a whole disk or partition thereof
rather than an LV.
cryptsetup --verbose --verify-passphrase luksFormat
Just use the same passphrase you're using for the other drive. Note
that the actual key is different for the two LUKS volumes, so you
should back up both of those LUKS headers (with cryptsetup), one isn't
enough even though the passphrases are the same. (The DEK used to
actually encrypt your data is randomly chosen)

You'll need to make the following modifications:

/etc/fstab mount options for LUKS encrypted volumes includes
x-systemd.device-timeout=0 which means it'll wait indefinitely for
this fs volume to appear.

/etc/crypttab just mimic what's already there for the existing LUKS
volume, but of course use the correct UUIDs supplied by blkid.

/etc/default/grub needs an additional rd.luks.uuid= to make systemd
aware to expect it early boot, for example [2].  If you look in the
existing /etc/default/grub you'll see something like:
GRUB_CMDLINE_LINUX="rd.luks.uuid=luks-bbf5ebbd-d3f8-425e-9fc4-c48abd23bd8e....
So just add, anywhere in there, another rd.luks.uuid=luks-<uuid>
including the uuid for the new luks volume. And then:
grub2-mkconfig -o /boot/grub2/grub.cfg  ##assumes a BIOS system
which then creates a new grub.cfg with that addition.

That should be it. Definitely don't confuse UUIDs. The LUKS volume has
a UUID, and the filesystem on that LUKS volume has its own UUID.
They're not the same thing.


[1]
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Encryption.html

[2]
[    0.471569] localhost.localdomain systemd[1]: Expecting device
dev-disk-by\x2duuid-cd8dda17\x2d82d2\x2d48d0\x2da1b4\x2d2e68c16a7cc4.device...
[    0.471584] localhost.localdomain systemd[1]: Expecting device
dev-mapper-luks\x2dcd8dda17\x2d82d2\x2d48d0\x2da1b4\x2d2e68c16a7cc4.device...
[    3.255684] localhost.localdomain systemd[1]: Starting Cryptography
Setup for luks-cd8dda17-82d2-48d0-a1b4-2e68c16a7cc4...
[    9.309257] localhost.localdomain systemd-cryptsetup[264]: Set
cipher aes, mode xts-plain64, key size 512 bits for device
/dev/disk/by-uuid/cd8dda17-82d2-48d0-a1b4-2e68c16a7cc4.
[   12.024581] localhost.localdomain systemd[1]: Found device
/dev/mapper/luks-cd8dda17-82d2-48d0-a1b4-2e68c16a7cc4.
[   12.025339] localhost.localdomain systemd[1]: Started Cryptography
Setup for luks-cd8dda17-82d2-48d0-a1b4-2e68c16a7cc4.
[   12.226048] localhost.localdomain kernel: btrfs: device label
centos devid 1 transid 39
/dev/mapper/luks-cd8dda17-82d2-48d0-a1b4-2e68c16a7cc4
[   13.701094] localhost.localdomain systemd[1]: Found device
/dev/mapper/luks-cd8dda17-82d2-48d0-a1b4-2e68c16a7cc4.
[   13.727673] localhost.localdomain kernel: btrfs: device label
centos devid 1 transid 39
/dev/mapper/luks-cd8dda17-82d2-48d0-a1b4-2e68c16a7cc4

-- 
Chris Murphy
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux