On Fri, Jan 25, 2013 at 07:57:59PM +0000, Sebastian wrote: > Arno Wagner <arno@...> writes: > > > That is far too low. Your key-slot has been compromised. > > Have a look specifically at offset 0x10000, the problem seems > > to be only in the 512 bytes starting there. > > > > You can use option -v to get a hex-dump of that sector. > > Well, it could have come to my mind to look at this address... > > Offset 0x10000: > > 0000000 gpt LUKS�� ext4dev extended linux-swap(v1) linux-swap(new) > linux-swap(v0) linux-swap(old) hfs hfs+ ReIsEr4 LABELONE LVM2 _BHRfS_M > - The file system is damaged linux-swap ufs create new %1 file system udevsettle > udevsettle --timeout= udevadm settle --timeout= set partition type on %1 new > partition type: %1 using libparted shrink file system grow file system resize > file system delete partition Unable to find mount point ====================== > libparted : ^(/[^ ]+) create empty partition path: %1 calW Urks. Looks like a fragment from a menu or script? > How on earth did that end up here and what could have caused it? No idea. > After this it looks perfectly random again... As expected. The entropy-test is pretty sensitive. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@xxxxxxxxxxx GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718 ---- One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision. -- Bertrand Russell _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt