Yes using dd and cryptsetup. The wiki has an explanation of why you might not want to do that, in addition to outlining the steps. But if you want to here are the steps. cryptsetup luksDump $DEVICE Find the payload number dd if=$DEVICE of=luks_header_bakup count=$PAYLOAD To restore them just reverse if and of in dd dd if=$luks_header_backup of=$DEVICE count=$PAYLOAD -MJ Jacques-Olivier KAPPS wrote: > <quote who="Heinz Diehl"> >> On 27.08.2009, Jacques-Olivier KAPPS wrote: >> >>> Now I can map the device with luksOpen, but the volume itself is >>> unrecognized. >> Maybe the underlying filesystem got corrupted. >> >>> I certainly can open the device with luksOpen because I choosed the same >>> password in the installation process, but my guess is that the ubuntu >>> installer erased and replaced the luks headers of my partition by new >>> ones, what do you think? >> That would explain the whole situation. When the partition gets prepared >> via LUKS/dmcrypt, the filesystem is gone, and you'll have to format again. >> >>> Do you have any advice? >> Recreate the partition by using the latest backup. You have one, right? >> >> _______________________________________________ >> dm-crypt mailing list >> dm-crypt@xxxxxxxx >> http://www.saout.de/mailman/listinfo/dm-crypt >> > > I do have partial backups, it's better than nothing! > > Okay my partition is just garbage now. So I am asking myself, is that > possible to backup those critical headers/master key of my new formated > partition? > > Regards, > > J.O. > > _______________________________________________ > dm-crypt mailing list > dm-crypt@xxxxxxxx > http://www.saout.de/mailman/listinfo/dm-crypt > _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt