mk-digest and mk-sault DAMAGE

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello everyone.

Something has damaged mk-digest and mk-salt info on my LUKS partition's
header... I DO know the LUKS-passphrase (which is used to decrypt the
master key which then decrypts the bulk-data) and according to luksDump
the Key slot 0 seem aslo be alive...

Is there any opportunity to retrieve the encrypted data from that
partition? You can see below that Key Slot 0 Salt seems to be normal,
but MK digest and MK salt is overwritten with zeros somewhere
somehow..................

LUKS header information for /dev/sda4
 
Version:        1
Cipher name:    blowfish
Cipher mode:    cbc-plain
Hash spec:      sha1
Payload offset: 3528
MK bits:        448
MK digest:      40 0b 00 00 00 00 24 01 00 00 00 00 00 00 00 00 00 00 00 00
MK salt:        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01
                00 00 12 01 c3 00 80 00 9b 1e 81 be 4c 75 2a fb
MK iterations:  10
UUID:           74db9b4c-f4a4-49fa-8ef2-8b2d1df525eb
 
Key Slot 0: ENABLED
        Iterations:             215014
        Salt:                   68 b5 3a 6d a7 ec 96 18 1d 05 da 2f a5
4f 96 5e
                                3a fa 80 3b d5 20 cb 1b d3 63 dd c0 f2
18 38 0f
        Key material offset:    8
        AF stripes:             4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux