Re: Newbie question --key-file

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Oct 26, 2012 at 06:37:10PM +0200, Milan Broz wrote:
> > [Li, David] Can you explain a little here why key slot wasn't used?
> > Why did the luksDump or the blkid result seem to be normal? 
> 
> I think there are just missing internal kernel modules.
> 
> Cryptsetup internally first generates master key, then writes visible header and then
> enables keyslot - and for keyslot write it requires kernel crypto modules.
> If last step fails, you end up with LUKS header without any slot enabled.

Maybe use the kernel crypto modules needed later in some
dummy operation early on?

That way you could terminate with error before the header gets
written.

Arno


 
> (The error reporting here is not optimal, still thinking how to get
> exact infmation from kernel.
> Anyway there is:
> "Check that kernel supports aes-cbc-essiv:sha256 cipher (check syslog for more info)."
> 
> Did you check syslog?
> 
> According to /proc/crypto, you have no aes module, no cbc, no sha256...
> 
> Milan
> 
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@xxxxxxxx
> http://www.saout.de/mailman/listinfo/dm-crypt
> 

-- 
Arno Wagner,    Dr. sc. techn., Dipl. Inform.,   Email: arno@xxxxxxxxxxx 
GnuPG:  ID: 1E25338F  FP: 0C30 5782 9D93 F785 E79C  0296 797F 6B50 1E25 338F
----
One of the painful things about our time is that those who feel certainty 
are stupid, and those with any imagination and understanding are filled 
with doubt and indecision. -- Bertrand Russell 
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux