Re: Debian 7.10 random key swap Device /dev/sda2 is not a valid LUKS device.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 04/05/2016 10:38 PM, Milan Broz wrote:
On 04/06/2016 06:25 AM, David Christensen wrote:
LUKS device cannot be used with random volume key, so I guess you use
just plain device without header. (So obviously header backup fails because
there is no header.)

Thank you for the information.



You can verify it by checking entry in /etc/crypttab - no luks keyword:

# grep sda2 /etc/fstab
/dev/mapper/sda2_crypt                    none                    swap

or running "cryptsetup status sda2_crypt" over unlocked device
(type is LUKS1 for LUKS devices)

# cryptsetup status sda2_crypt
/dev/mapper/sda2_crypt is active and is in use.
  type:    PLAIN
  cipher:  aes-xts-plain64
  keysize: 256 bits
  device:  /dev/sda2
  offset:  0 sectors
  size:    976896 sectors
  mode:    read/write


So, what I'm seeing is expected and correct, because a random-key encrypted swap uses dm-crypt on the raw partition, there is no LUKS container, and therefore no LUKS header to back up (?).


David

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux