I have two LUKS-encrypted SSDs in my laptop: one is the system SSD (nvme0n1), which contains my Home folder encrypted with eCryptfs, and the other is a Data SSD (nvme1n1), which is fully LUKS-encrypted. Both SSDs share the same passphrase. My operating system is LMDE 6.
After a recent update, I was unable to access my system. The error message displayed was: "cryptsetup failed, bad password or options," which I suspect was caused by a failed initramfs update. To resolve the issue, I booted from a live system and, using chroot, I added a new passphrase to the system SSD, which allowed me to regain access to my system.
However, I made a critical mistake. Since the system SSD now had a new passphrase, I proceeded to change the passphrase on the Data SSD via Gnome Disks while the Data SSD was mounted. After rebooting, I was unable to unlock the Data SSD. The error message now says: "Error unlocking /dev/nvme1n1: Failed to activate device: Incorrect passphrase." I'm absolutely certain the passphrase I’m entering is correct.
Unfortunately, I don't have a backup of the Data SSD header. It seems the header is intact, and I suspect the issue might be that the keyslot got damaged during the passphrase change through Gnome Disks.
I’ve attached some outputs from the Data SSD for further analysis. What steps can I take to recover access to the Data SSD?
Output of lsblk:
and output of blkid:
and output of cryptsetup luksDump /dev/nvme1n1:
LUKS header information Version: 2 Epoch: 5 Metadata area: 16384 [bytes] Keyslots area: 16744448 [bytes] UUID: cbdd1cfe-91d3-4771-a8ef-f4db3febacb0 Label: (no label) Subsystem: (no subsystem) Flags: (no flags) Data segments: 0: crypt offset: 16777216 [bytes] length: (whole device) cipher: aes-xts-plain64 sector: 512 [bytes] Keyslots: 0: luks2 Key: 512 bits Priority: normal Cipher: aes-xts-plain64 Cipher key: 512 bits PBKDF: argon2id Time cost: 8 Memory: 1048576 Threads: 4 Salt: 8e 31 db 5e c1 36 79 f4 13 5d 8e aa 8b cd 75 f5 52 ed ac 81 7b cd 27 e9 f4 da 05 97 4b da 7d 00 AF stripes: 4000 AF hash: sha256 Area offset:290816 [bytes] Area length:258048 [bytes] Digest ID: 0 Tokens: Digests: 0: pbkdf2 Hash: sha256 Iterations: 166970 Salt: 6f aa 5d 52 7d aa 51 65 2b f4 19 89 b6 dc 3c 63 d0 c5 a0 92 a8 5f 8f 92 37 4a f4 b3 a2 f9 2c c7 Digest: d6 1a 7f 0c 5c d3 1e 1e d2 97 b8 65 64 13 46 43 10 d8 f5 94 44 a8 ae b2 eb cb 6a 9f 4a c0 45 df 
