Hi all, I got a mdadm raid5 layer over 6 disks, the raid failed, but i manage to get it back up. But now it seems that the luks header is corrupt. It doesn't except my passwords anymore... Enter passphrase for /dev/md3: No key available with this passphrase. luksDump still reports the info though... cryptsetup luksDump /dev/md3 LUKS header information for /dev/md3 Version: 1 Cipher name: aes Cipher mode: cbc-essiv:sha256 Hash spec: sha1 Payload offset: 1032 MK bits: 128 MK digest: a1 1f b8 22 77 a9 de 2e 19 81 12 54 88 28 e4 0d 0d 39 42 40 MK salt: 11 2f 27 30 a3 f1 33 6f 3b 5b b3 7c c1 55 a2 af f7 1c 81 ad 19 fd d2 75 93 c3 b9 aa 6e a4 15 0a MK iterations: 10 UUID: 75e65cb7-0444-4df7-a8f8-0677b6b277ba Key Slot 0: ENABLED Iterations: 116904 Salt: 45 f5 3b 7c 20 ea 09 b8 fa be 60 db 49 5f 4b e0 6c 42 20 44 f1 e4 03 7a 4c 32 60 40 c4 54 37 4e Key material offset: 8 AF stripes: 4000 I'm clueless on how to fix this.... And there is alot of personal data missing now... Can anyone point me in the right direction on fixing the luks header, or helping me out another way. Thanks in advance. Rgds, Rene _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt