cryptsetup - canīt open luks parittion - "no key available with this passphrase"
hi,
i have strange problems with luks since my last reboot of my Gentoo Linux (64 bit) box. the md*-devices have strange names (for example md125 - before it was md3). the luks header of "md125" (raid 10 - 1,5 tb) is still there but i canīt open the luks-partition. The message is "No key available with this passphrase". the filesystem off the encrypted luks partition is ext4. I am absolutely sure that the passphrase is valid! I hope someone have some suggestions for me. all my data is stored on this raid 10. some debug output: --------- cryptsetup luksOpen /dev/md6 storage --debug # cryptsetup 1.1.2 processing "cryptsetup luksOpen /dev/md6 storage --debug" # Locking memory. # Allocating crypt device /dev/md6 context. # Trying to open and read device /dev/md6. # Initialising device-mapper backend, UDEV is enabled. # Detected dm-crypt target of version 1.7.0. # Timeout set to 0 miliseconds. # Password retry count set to 3. # Iteration time set to 1000 miliseconds. # Password verification disabled. # Trying to load LUKS1 crypt type from device /dev/md6. # Initializing crypto backend (using secure memory). # Reading LUKS header of size 1024 from device /dev/md6 # Activating volume storage [keyslot -1] using [none] passphrase. # dm status storage OF [16384] Enter passphrase for /dev/md6: # Trying to open key slot 0 [3]. # Reading key slot 0 area. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-22803 # Udev cookie 0xd4d9fbd (semid 2850817) created # Udev cookie 0xd4d9fbd (semid 2850817) incremented # Udev cookie 0xd4d9fbd (semid 2850817) incremented # Udev cookie 0xd4d9fbd (semid 2850817) assigned to dm_task type 0 with flags 0xe # dm create temporary-cryptsetup-22803 CRYPT-TEMP-temporary-cryptsetup-22803 OF [16384] # temporary-cryptsetup-22803: Stacking NODE_ADD (252,0) 0:0 0600 # dm reload temporary-cryptsetup-22803 OF [16384] # dm resume temporary-cryptsetup-22803 OF [16384] # temporary-cryptsetup-22803: Stacking NODE_READ_AHEAD 4096 (flags=1) # Udev cookie 0xd4d9fbd (semid 2850817) decremented # Udev cookie 0xd4d9fbd (semid 2850817): Waiting for zero # Udev cookie 0xd4d9fbd (semid 2850817) destroyed # temporary-cryptsetup-22803: read ahead is 256 # temporary-cryptsetup-22803: Setting read ahead to 4096 # Udev cookie 0xd4da76b (semid 2883585) created # Udev cookie 0xd4da76b (semid 2883585) incremented # Udev cookie 0xd4da76b (semid 2883585) incremented # Udev cookie 0xd4da76b (semid 2883585) assigned to dm_task type 2 with flags 0x0 # dm remove temporary-cryptsetup-22803 OF [16384] # temporary-cryptsetup-22803: Stacking NODE_DEL (replaces other stacked ops) # Udev cookie 0xd4da76b (semid 2883585) decremented # Udev cookie 0xd4da76b (semid 2883585): Waiting for zero # Udev cookie 0xd4da76b (semid 2883585) destroyed # Trying to open key slot 1 [1]. # Trying to open key slot 2 [1]. # Trying to open key slot 3 [1]. # Trying to open key slot 4 [1]. # Trying to open key slot 5 [1]. # Trying to open key slot 6 [1]. # Trying to open key slot 7 [1]. No key available with this passphrase. ------------ this is also strange, ... if i create the raid 0 with the other drives of the raid 1 with metadata 0.9 then one time i get 64k chunks and the other time 512k chunks. Luks header is still there but the valid passphrase is not accepted... thanks in advance |
Hi ts0,
Has your problem resolved? I encountered the same issue and now I could not load my data. |
All times are GMT -5. The time now is 08:53 AM. |