Re: help

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

thanks for your replies. Yea, any of those files DO NOT exist anywhere
on my fs (I checked with find). I think the process didn't really
start.

How do I continue then?



On Thu, 25 Feb 2016 17:37:22 +0100
Milan Broz <gmazyland@xxxxxxxxx> wrote:

> On 02/25/2016 04:08 PM, Felix Wagner wrote:
> > Hello,
> > 
> > I tried to reencrypt my device today and was way too eager to do it
> > without reading everything. Heres what I did:
> > 
> > 'cryptsetup-reencrypt -v -c aes-xts-plain64 -s
> > 512 /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
> > Reencryption will change: volume key, set cipher to aes-xts-plain64.
> > Enter passphrase for key slot 0:
> > Key slot 0 unlocked.
> > LUKS header backup of
> > device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
> > created. Data offset for detached LUKS header must be either 0 or
> > higher than header size (4036 sectors). Creation of LUKS backup
> > headers failed.
> > 
> > So i thought well It didn't work so lets try again:
> > 
> > cryptsetup-reencrypt -v -c
> > aes-xts-plain64 /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
> > Reencryption will change: volume key, set cipher to aes-xts-plain64.
> > Enter passphrase for key slot 0:
> > Key slot 0 unlocked.
> > LUKS header
> > backup of
> > device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
> > created. New LUKS header for
> > device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
> > created. Activated keyslot 0. 
> > Marking LUKS
> > device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7
> > unusable. Activating temporary device using old LUKS header.
> > Key slot 0 unlocked.
> > Cannot get info about
> > device /dev/disk/by-uuid/2ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7.
> > Activation of temporary devices failed.
> > 
> > Now it says that the device is not a luks device anymore. I do not
> > have a header backup (I'm an idiot) what I do have is the luksDump
> > information and I have not rebooted my system:  
> 
> Do you have these files still in current directory?
> 
> LUKS-ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7.log
> LUKS-ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7.new
> LUKS-ea1bb9e-a4a0-48c8-bc67-a694fa6c8cf7.org
> 
> If so, save them. *.log is reencryption log. If you run reencrypt
> in directory with these files, reencryption will resume.
> 
> If it did not started yet, *.org is header backup and you can
> use it to restore old device state.
> 
> (If reencryption already started some part of device is already
> reencrypted so you have to finish that operation.)
> 
> Please can you paste here content of the *.log file?
> (It is text file containing reencryption context.)
> 
> (In theory, if reencryption did not really started yet the initial
> header is still on-device, just with different magic string, so
> recovery could be still possible just with simple on-disk edit.)
> 
> Milan

Attachment: pgpDqH_8X0hMz.pgp
Description: OpenPGP digital signature

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux