From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1O9ZYI-0004sN-7B for garchives@archives.gentoo.org; Wed, 05 May 2010 08:01:54 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 42666E0878; Wed, 5 May 2010 08:00:50 +0000 (UTC) Received: from mx01.admin-box.com (mx01.admin-box.com [78.47.249.108]) by pigeon.gentoo.org (Postfix) with ESMTP id E27B5E0878 for ; Wed, 5 May 2010 08:00:49 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mx01.admin-box.com (Postfix) with ESMTP id 4BAB531F02A3 for ; Wed, 5 May 2010 10:00:48 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at mx01.admin-box.com Received: from mx01.admin-box.com ([127.0.0.1]) by localhost (mx01.admin-box.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q40qFNem5D9U for ; Wed, 5 May 2010 10:00:43 +0200 (CEST) Received: from maya.local (e178060154.adsl.alicedsl.de [85.178.60.154]) (Authenticated sender: daniel@troeder.de) by mx01.admin-box.com (Postfix) with ESMTPSA id 36D9631F02A1 for ; Wed, 5 May 2010 10:00:43 +0200 (CEST) Message-ID: <4BE125AB.1030105@admin-box.com> Date: Wed, 05 May 2010 10:00:43 +0200 From: Daniel Troeder User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.9) Gecko/20100411 Thunderbird/3.0.4 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure. References: <4BDFF195.9070404@xunil.at> <4BE05BA3.1000509@xunil.at> <4BE07570.7020305@xunil.at> <4BE090A5.9080804@admin-box.com> <4BE0F71D.7080907@xunil.at> In-Reply-To: <4BE0F71D.7080907@xunil.at> X-Enigmail-Version: 1.0.1 OpenPGP: id=BB9D4887; url=http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="------------enig67FD119AE60E7318350F53F9" X-Archives-Salt: 0ef027a9-90dd-499c-b823-f63eff18bd0d X-Archives-Hash: 19252f847522d2cb9cb6ea57206aae87 This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig67FD119AE60E7318350F53F9 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/05/2010 06:42 AM, Stefan G. Weichinger wrote: > Am 04.05.2010 23:24, schrieb Daniel Troeder: >=20 >> I'm using sys-fs/cryptsetup-1.1.1_rc1 since 02.05.2010 and didn't have= >> any issues. >> Please decrypt your partition from the command line, so we can see if = it >> is a cryptsetup/luks/kernel problem or a pam_mount problem. >> >> Cmdline should something like: >> $ sudo cryptsetup -d /etc/security/verysekrit.key luksOpen >> /dev/mapper/VG01-crypthome myhome >> Which should create /dev/mapper/myhome. >=20 > My user sgw is currently not allowed to sudo this (should it be? it > never was). >=20 > And for root it says "Kein Schl=C3=BCssel mit diesem Passsatz verf=C3=BC= gbar." > (german) which should be "No key available with this passphrase." in > english. That is a message from cryptsetup. As you are using openssl to get the key, I think the problem might be there. I followed the guide you linked here (website is down, but google-cache works: http://webcache.googleusercontent.com/search?q=3Dcache:7eaSac72CoIJ:home.= coming.dk/index.php/2009/05/20/encrypted_home_partition_using_luks_pam_+e= ncrypted_home_partition_using_luks_pam&cd=3D2&hl=3Dde&ct=3Dclnk&gl=3Dde&c= lient=3Dfirefox-a) and it works for me (kernel is 2.6.33-zen2): lvcreate -n crypttest -L 100M vg0 KEY=3D`tr -cd [:graph:] < /dev/urandom | head -c 79` echo $KEY | openssl aes-256-ecb > verysekrit.key openssl aes-256-ecb -d -in verysekrit.key # (aha :) openssl aes-256-ecb -d -in verysekrit.key | cryptsetup -v --cipher aes-cbc-plain --key-size 256 luksFormat /dev/vg0/crypttest openssl aes-256-ecb -d -in verysekrit.key | cryptsetup luksOpen /dev/vg0/crypttest decryptedtest cryptsetup luksClose crypttest # (i couldn't close it... don't know why...) The key that cryptsetup is given to decrypt the partition is created by openssl from the file. Please check the output of $ openssl aes-256-ecb -d -in verysekrit.key under both kernel - it should be identical. BTW: You'll get your error message if you run: $ echo notmykey | cryptsetup luksOpen /dev/vg0/crypttest decryptedtes Bye, Daniel --=20 PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=3D0xBB9D4887&op=3Dg= et # gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887 --------------enig67FD119AE60E7318350F53F9 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkvhJasACgkQg3+4tbudSIdyGQCeIX6/xalgKcjpp+LAKkc60VKY d5oAnjTFFCLqoMhfdqRHPuVDXZciVcu+ =8VRQ -----END PGP SIGNATURE----- --------------enig67FD119AE60E7318350F53F9--