Re: help

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Felix,

don't loose all hope yet!

On 02/25/2016 04:08 PM, Felix Wagner wrote:
So i thought well It didn't work so lets try again:

cryptsetup-reencrypt -v -c
aes-xts-plain64 /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
Reencryption will change: volume key, set cipher to aes-xts-plain64.
Enter passphrase for key slot 0:
Key slot 0 unlocked.
LUKS header
backup of device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
created.

^^^^^^^^
First of all, you actually may have the LUKS header backup! The cryptsetup-reencrypt created one for you automatically. Look for LUKS-foobar.org file in the directory where you initiated the cryptsetup-reencrypt.

If... (well rather big fat _IF_ because this is really important) the reencryption didn't write any data yet you may restore your LUKS header using the .org backup created by cryptsetup-reencrypt.

But again _don't_ do the header recovery unless you're 100% sure that reencryption didn't write (aka already reencrypted) any ciphertext sectors! So, what's in your reencrypt log file (look for LUKS-foobar.log in same directory where is also the header backup)?

Regards
Ondra
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux