Hi,

... I wish ...
Quote:
... probably because it's encrypted.
Check that your encryption keys are still in /boot (pendrive).
Go back over those instructions again - see what needs to be different in grub etc to decrypt then mount the partitions.
|
The Grub config files in my /boot partition (the flash pen) are exactly the same as before.
So nothing changed there ...
The kernel parameters for the boot support the same encryption layer (mapper) as before.
Also I think (I must check this one as i am not sure) that Luks uses symmetric encryption, hence no keys are necessary.
A menu.lst file looks like the following:
## Part of Grub File
###Encrypted Root###
title OpenSuSE 10.3 - Encrypted
root (hd2,0)
kernel /vmlinuz-2.6.22.17-0.1-default root=/dev/mapper/root luks_root=/dev/sdb3 luks_swap=/dev/sdb1 luks_home=/dev/sdb2 luks="root swap home"
vga=0x317 resume=/dev/sdb1 pci=nommconf splash=silent showopts
initrd /initrd-2.6.22.17-0.1-default
## Part of Grub file
the decives.map file also looks correct:
(hd0) /dev/sda
(hd1) /dev/sdb
(hd2) /dev/sdc
Using fdisk after booting with either Knopix or the OpenSuSE 64bit rescue mode this is confirmed, usb flash is /dev/sdc first disk is /dev/sda ... / is on partition /dev/sdb3 adn so on.
So apparently all should work from the start ...
[/QUOTE]
[edit]Ahhh... I note that there is no text on that page... so you're going to have to spell it out: which method did you use to encrypt the partitions?
Of course, it is possible that the tech guys damaged your encryption.[/QUOTE]
I used the Luks file system type of encryption for the partitions.
hummm try again:
http://en.opensuse.org/Encrypted_Root_File_System
It is the usual great opensuse.org site.
I also suspect that tech support damaged the disks .. althouhg that also seems remote ... they "had" to reinstalls the other crappy os ... even if I insisted that was not necessary ... tehy could test the hardware booting from a CD ....
Oh boy! sometimes I forgot that not everyone uses Linux
Regards,
Pedro