Skip to main content
Improved code formatting
Source Link
marcelm
  • 2.8k
  • 1
  • 16
  • 16

Output of lsblklsblk:

and output of blkidblkid:   

blkid

and output of cryptsetup luksDump /dev/nvme1n1:

LUKS header information

Version: 2

Epoch: 5

Metadata area: 16384 [bytes]

Keyslots area: 16744448 [bytes]

UUID: cbdd1cfe-91d3-4771-a8ef-f4db3febacb0

Label: (no label)

Subsystem: (no subsystem)

Flags: (no flags)

Datacryptsetup segments:

0:luksDump crypt/dev/nvme1n1:

`offsetLUKS header information Version: 2 Epoch: 5 Metadata area: 16384 [bytes] Keyslots area: 16744448 [bytes] UUID: cbdd1cfe-91d3-4771-a8ef-f4db3febacb0 Label: (no label) Subsystem: (no subsystem) Flags:  (no flags) Data segments: 0: crypt offset: 16777216 [bytes]`[bytes] `length length: (whole device)` `cipher cipher: aes-xts-plain64`plain64 `sector sector: 512 [bytes]`[bytes] 

Keyslots:

0: luks2

`Key Keyslots:   0: luks2  Key:  512 bits`bits `Priority Priority: normal`normal `Cipher Cipher: aes-xts-plain64`plain64 `Cipher  Cipher key: 512 bits`bits `PBKDF PBKDF: argon2id`argon2id `Time  Time cost: 8`8 `Memory Memory: 1048576`1048576 `Threads Threads: 4` 4 `Salt Salt: 8e 31 db 5e c1 36 79 f4 13 5d 8e aa 8b cd 75 f5   52 ed ac 81 7b cd 27 e9 f4 da 05 97 4b da 7d 00`00  AF stripes: 4000  AF hash: sha256  Area offset:290816 [bytes]  Area length:258048 [bytes]  Digest ID: 0 

Tokens:

Digests:

0: pbkdf2

`HashTokens: Digests: 0: pbkdf2  Hash:  sha256  Iterations: 166970  Salt: 6f aa 5d 52 7d aa 51 65 2b f4 19 89 b6 dc 3c 63   d0 c5 a0 92 a8 5f 8f 92 37 4a f4 b3 a2 f9 2c c7  Digest: d6 1a 7f 0c 5c d3 1e 1e d2 97 b8 65 64 13 46 43   10 d8 f5 94 44 a8 ae b2 eb cb 6a 9f 4a c0 45 df`df 

Output of lsblk:

and output of blkid:  blkid

and output of cryptsetup luksDump /dev/nvme1n1:

LUKS header information

Version: 2

Epoch: 5

Metadata area: 16384 [bytes]

Keyslots area: 16744448 [bytes]

UUID: cbdd1cfe-91d3-4771-a8ef-f4db3febacb0

Label: (no label)

Subsystem: (no subsystem)

Flags: (no flags)

Data segments:

0: crypt

`offset: 16777216 [bytes]` `length: (whole device)` `cipher: aes-xts-plain64` `sector: 512 [bytes]` 

Keyslots:

0: luks2

`Key: 512 bits` `Priority: normal` `Cipher: aes-xts-plain64` `Cipher key: 512 bits` `PBKDF: argon2id` `Time cost: 8` `Memory: 1048576` `Threads: 4`  `Salt: 8e 31 db 5e c1 36 79 f4 13 5d 8e aa 8b cd 75 f5 52 ed ac 81 7b cd 27 e9 f4 da 05 97 4b da 7d 00` AF stripes: 4000 AF hash: sha256 Area offset:290816 [bytes] Area length:258048 [bytes] Digest ID: 0 

Tokens:

Digests:

0: pbkdf2

`Hash: sha256 Iterations: 166970 Salt: 6f aa 5d 52 7d aa 51 65 2b f4 19 89 b6 dc 3c 63 d0 c5 a0 92 a8 5f 8f 92 37 4a f4 b3 a2 f9 2c c7 Digest: d6 1a 7f 0c 5c d3 1e 1e d2 97 b8 65 64 13 46 43 10 d8 f5 94 44 a8 ae b2 eb cb 6a 9f 4a c0 45 df` 

Output of lsblk:

and output of blkid: 

blkid

and output of cryptsetup luksDump /dev/nvme1n1:

LUKS header information Version: 2 Epoch: 5 Metadata area: 16384 [bytes] Keyslots area: 16744448 [bytes] UUID: cbdd1cfe-91d3-4771-a8ef-f4db3febacb0 Label: (no label) Subsystem: (no subsystem) Flags:  (no flags) Data segments: 0: crypt offset: 16777216 [bytes]  length: (whole device)  cipher: aes-xts-plain64  sector: 512 [bytes]  Keyslots:   0: luks2  Key:  512 bits  Priority: normal  Cipher: aes-xts-plain64   Cipher key: 512 bits  PBKDF: argon2id   Time cost: 8  Memory: 1048576  Threads: 4  Salt: 8e 31 db 5e c1 36 79 f4 13 5d 8e aa 8b cd 75 f5   52 ed ac 81 7b cd 27 e9 f4 da 05 97 4b da 7d 00  AF stripes: 4000  AF hash: sha256  Area offset:290816 [bytes]  Area length:258048 [bytes]  Digest ID: 0 Tokens: Digests: 0: pbkdf2  Hash:  sha256  Iterations: 166970  Salt: 6f aa 5d 52 7d aa 51 65 2b f4 19 89 b6 dc 3c 63   d0 c5 a0 92 a8 5f 8f 92 37 4a f4 b3 a2 f9 2c c7  Digest: d6 1a 7f 0c 5c d3 1e 1e d2 97 b8 65 64 13 46 43   10 d8 f5 94 44 a8 ae b2 eb cb 6a 9f 4a c0 45 df 
Became Hot Network Question
added 206 characters in body
Source Link

In my laptop I have two LUKS encrypted-encrypted SSDs, in my laptop: one is the system SSD (nvme0n1nvme0n1), where thewhich contains my Home folder is with ecryptfs encrypted with eCryptfs, another oneand the other is a Data SSD (nvme1n1nvme1n1), which is purelyfully LUKS encrypted-encrypted. Both SSDs haveshare the same passwordpassphrase. My OSoperating system is LMDE6LMDE 6. 

After somea recent update, I couldn't enterwas unable to access my system, probably because of some failed initramfs update, it said all the time. The error message displayed was: "cryptsetup failed, bad password or options"options," which I suspect was caused by a failed initramfs update. I'veTo resolve the issue, I booted from a live system and with the help of, using chroot I've, I added a new passphrase to the system SSD and could then enter, which allowed me to regain access to my system again.

ThenHowever, I made a terriblecritical mistake: since. Since the system SSD hasnow had a new passphrase, I've changedI proceeded to change the passphrase on the Data SSD passphrase accordingly via Gnome-Disks, when Disks while the Data SSD was mounted. But after the rebootAfter rebooting, I couldn't access mywas unable to unlock the Data SSD. It keeps saying all the timeThe error message now says: "Error unlocking /dev/nvme1n1: Failed to activate device: Incorrect passphrase"passphrase. But" I'm 100% sure that I enterabsolutely certain the passphrase I’m entering is correct password. 

Unfortunately, I don't have a header backup of the Data SSD. What can I do now? The header. It seems to bethe header is intact, my guess isand I suspect the issue might be that the keyslot got damaged during the passphrase change viathrough Gnome-Disks Disks. I leave here

I’ve attached some outputs offrom the Data SSD (nvme1n1)for further analysis. What steps can I take to recover access to the Data SSD?

Output of lsblk:

In my laptop I have two LUKS encrypted SSDs, one is system SSD (nvme0n1), where the Home folder is with ecryptfs encrypted, another one is Data SSD (nvme1n1), which is purely LUKS encrypted. Both SSDs have the same password. My OS is LMDE6. After some update, I couldn't enter my system, probably because of some failed initramfs update, it said all the time "cryptsetup failed, bad password or options". I've booted a live system and with the help of chroot I've added a new passphrase to the system SSD and could then enter my system again.

Then I made a terrible mistake: since the system SSD has a new passphrase, I've changed the Data SSD passphrase accordingly via Gnome-Disks, when the Data SSD was mounted. But after the reboot, I couldn't access my Data SSD. It keeps saying all the time "Error unlocking /dev/nvme1n1: Failed to activate device: Incorrect passphrase". But I'm 100% sure that I enter the correct password. Unfortunately, I don't have a header backup of the Data SSD. What can I do now? The header seems to be intact, my guess is the keyslot got damaged during passphrase change via Gnome-Disks. I leave here some outputs of the Data SSD (nvme1n1). Output of lsblk:

I have two LUKS-encrypted SSDs in my laptop: one is the system SSD (nvme0n1), which contains my Home folder encrypted with eCryptfs, and the other is a Data SSD (nvme1n1), which is fully LUKS-encrypted. Both SSDs share the same passphrase. My operating system is LMDE 6. 

After a recent update, I was unable to access my system. The error message displayed was: "cryptsetup failed, bad password or options," which I suspect was caused by a failed initramfs update. To resolve the issue, I booted from a live system and, using chroot, I added a new passphrase to the system SSD, which allowed me to regain access to my system.

However, I made a critical mistake. Since the system SSD now had a new passphrase, I proceeded to change the passphrase on the Data SSD via Gnome Disks while the Data SSD was mounted. After rebooting, I was unable to unlock the Data SSD. The error message now says: "Error unlocking /dev/nvme1n1: Failed to activate device: Incorrect passphrase." I'm absolutely certain the passphrase I’m entering is correct. 

Unfortunately, I don't have a backup of the Data SSD header. It seems the header is intact, and I suspect the issue might be that the keyslot got damaged during the passphrase change through Gnome Disks.

I’ve attached some outputs from the Data SSD for further analysis. What steps can I take to recover access to the Data SSD?

Output of lsblk:

Source Link

LUKS keyslot damaged?

In my laptop I have two LUKS encrypted SSDs, one is system SSD (nvme0n1), where the Home folder is with ecryptfs encrypted, another one is Data SSD (nvme1n1), which is purely LUKS encrypted. Both SSDs have the same password. My OS is LMDE6. After some update, I couldn't enter my system, probably because of some failed initramfs update, it said all the time "cryptsetup failed, bad password or options". I've booted a live system and with the help of chroot I've added a new passphrase to the system SSD and could then enter my system again.

Then I made a terrible mistake: since the system SSD has a new passphrase, I've changed the Data SSD passphrase accordingly via Gnome-Disks, when the Data SSD was mounted. But after the reboot, I couldn't access my Data SSD. It keeps saying all the time "Error unlocking /dev/nvme1n1: Failed to activate device: Incorrect passphrase". But I'm 100% sure that I enter the correct password. Unfortunately, I don't have a header backup of the Data SSD. What can I do now? The header seems to be intact, my guess is the keyslot got damaged during passphrase change via Gnome-Disks. I leave here some outputs of the Data SSD (nvme1n1). Output of lsblk:

lsblk

and output of blkid: blkid

and output of cryptsetup luksDump /dev/nvme1n1:

LUKS header information

Version: 2

Epoch: 5

Metadata area: 16384 [bytes]

Keyslots area: 16744448 [bytes]

UUID: cbdd1cfe-91d3-4771-a8ef-f4db3febacb0

Label: (no label)

Subsystem: (no subsystem)

Flags: (no flags)

Data segments:

0: crypt

`offset: 16777216 [bytes]` `length: (whole device)` `cipher: aes-xts-plain64` `sector: 512 [bytes]` 

Keyslots:

0: luks2

`Key: 512 bits` `Priority: normal` `Cipher: aes-xts-plain64` `Cipher key: 512 bits` `PBKDF: argon2id` `Time cost: 8` `Memory: 1048576` `Threads: 4` `Salt: 8e 31 db 5e c1 36 79 f4 13 5d 8e aa 8b cd 75 f5 52 ed ac 81 7b cd 27 e9 f4 da 05 97 4b da 7d 00` AF stripes: 4000 AF hash: sha256 Area offset:290816 [bytes] Area length:258048 [bytes] Digest ID: 0 

Tokens:

Digests:

0: pbkdf2

`Hash: sha256 Iterations: 166970 Salt: 6f aa 5d 52 7d aa 51 65 2b f4 19 89 b6 dc 3c 63 d0 c5 a0 92 a8 5f 8f 92 37 4a f4 b3 a2 f9 2c c7 Digest: d6 1a 7f 0c 5c d3 1e 1e d2 97 b8 65 64 13 46 43 10 d8 f5 94 44 a8 ae b2 eb cb 6a 9f 4a c0 45 df`