corrupt luks header on crypted raid5 :(

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all,

I got a mdadm raid5 layer over 6 disks, the raid failed, but i manage to get it back up.
But now it seems that the luks header is corrupt. 

It doesn't except my passwords anymore...

Enter passphrase for /dev/md3:
No key available with this passphrase.

luksDump still reports the info though...

cryptsetup luksDump /dev/md3
LUKS header information for /dev/md3

Version:        1
Cipher name:    aes
Cipher mode:    cbc-essiv:sha256
Hash spec:      sha1
Payload offset: 1032
MK bits:        128
MK digest:      a1 1f b8 22 77 a9 de 2e 19 81 12 54 88 28 e4 0d 0d 39 42 40
MK salt:        11 2f 27 30 a3 f1 33 6f 3b 5b b3 7c c1 55 a2 af
                f7 1c 81 ad 19 fd d2 75 93 c3 b9 aa 6e a4 15 0a
MK iterations:  10
UUID:           75e65cb7-0444-4df7-a8f8-0677b6b277ba

Key Slot 0: ENABLED
        Iterations:             116904
        Salt:                   45 f5 3b 7c 20 ea 09 b8 fa be 60 db 49 5f 4b e0
                                6c 42 20 44 f1 e4 03 7a 4c 32 60 40 c4 54 37 4e
        Key material offset:    8
        AF stripes:             4000

I'm clueless on how to fix this.... And there is alot of personal data missing now... 

Can anyone point me in the right direction on fixing the luks header, or helping me out another way.
Thanks in advance.

Rgds,

Rene

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux