Gentoo Archives: gentoo-user

From: "Stefan G. Weichinger" <lists@×××××.at>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure.
Date: Thu, 06 May 2010 18:39:28
Message-Id: 4BE30CB2.4020307@xunil.at
In Reply to: Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure. by Daniel Troeder
1 Am 06.05.2010 18:24, schrieb Daniel Troeder:
2 > On 05/05/2010 10:23 PM, Stefan G. Weichinger wrote:
3 >> Am 05.05.2010 22:17, schrieb Stefan G. Weichinger:
4 >>
5 >>> Remember that I said: "I am not sure which HOWTO I followed" ?
6 >>>
7 >>> What if I didn't use aes-256-ecb?
8 > You don't need to supplay that information to cryptsetup, it can
9 > (should) autodetect it. To see that info for yourself run:
10 > $ cryptsetup luksDump /dev/mapper/VG01-crypthome
11
12 But I always did when I followed your example.
13 Anyway, this part is solved now.
14
15 >> Yep. See pam_mount.conf.xml:
16 >> It's "aes-256-cbc" in my case.
17 >>
18 >> I was now able to luksOpen and I have the decrypted device mounted.
19 > Hooray :)
20
21 Yes :-)
22
23 Currently I run an unencrypted home on another LV.
24
25 >> Nice.
26 >>
27 >> So:
28 >>
29 >> the user-pw didn't change and the keyfile is OK.
30 >>
31 >> So why is pam_mount unable to mount it?
32 >>
33 >> I will now pull another backup and check/add fallback keys ;-)
34 > There are interesting options in the cryptsetup-man page:
35 > luksHeaderBackup and luksHeaderRestore... I think I'll add that to my
36 > backup scripts :)
37
38 Good idea.
39
40 The main question is still unanswered: Why does pam_mount not work
41 anymore with the given device/key ?
42
43 Should I file a bug?
44
45 S

Replies

Subject Author
Re: [gentoo-user] Re: Kernel upgrade and now LUKS failure. "Stefan G. Weichinger" <lists@×××××.at>