[dm-crypt] passphrase and key non available

bugreport32 bugreport32 at free.fr
Sun Jul 3 15:08:14 CEST 2011


Hi,

On Gnu/Linux Wheezy updated, cryptsetup/luks doesn't want anymore to unlock the key in the slot 0 (no other key ready) on my external hard disk (sata2usb, one partition formatted in ext4).
The key in the slot 0 has nevertheless already very well been unlocked.luksDump is ok. I don't use crypttab. I've checked so many times my passphrase.
I've tested in another external drive, on another computer, via live cds, on another usb port, with different wires, but, nothing :'-(

Greetings
Jean-sébastien



-- Package-specific info:
-- /proc/cmdline
BOOT_IMAGE=/boot/vmlinuz-2.6.39-2-686-pae root=UUID=0d760753-22ea-
4f11-88c6-21fe540d0510 ro quiet

-- /etc/crypttab
# <target name> <source device>         <key file>      <options>

-- /etc/fstab
# /etc/fstab: static file system information.
#
# <file system> <mount point>   <type>  <options>       <dump>  <pass>
proc            /proc           proc    defaults        0       0
# /dev/hda2       /               ext3    errors=remount-ro,data=ordered 0
1
UUID=0d760753-22ea-4f11-88c6-21fe540d0510       /               ext3   
errors
=remount-ro,data=ordered 0       1
# /dev/hdb1       /home           ext3    defaults,data=ordered        0
2
UUID=b93bd0fb-8e57-453e-b5c7-0ffc882174f3       /home           ext3
defaults,data=ordered        0       2
# /dev/hda1       none            swap    sw              0       0
UUID=859565a4-a581-4985-b314-d561d61175df       none            swap    sw
0       0
# /dev/hdd1     /mnt/EncoreUn   ext3
auto,nouser,async,dev,rw,exec,data=ordered      0       3
UUID=0794f2f8-444a-4fce-8fc4-a5c75645fea4       /mnt/EncoreUn   ext3
auto,nouser,async,dev,rw,exec,data=ordered      0       3
# /dev/hda3     /mnt/Emballage  ext3
auto,nouser,async,dev,rw,exec,data=ordered      0       4
UUID=0fe276fc-f357-4d18-bfcc-bc85e18aa05a       /mnt/Emballage  ext3
auto,nouser,async,dev,rw,exec,data=ordered      0       4
# /dev/hdc        /media/cdrom0   udf,iso9660 user,noauto     0       0
# /dev/cdrom1        /media/cdrom0   udf,iso9660 user,noauto     0       0
# /dev/fd0        /media/floppy0  auto    rw,user,noauto  0       0

-- lsmod
Module                  Size  Used by
snd_hrtimer            12540  1
binfmt_misc            12778  1
fuse                   55666  2
ipt_LOG                12533  2
nf_conntrack_ipv4      13649  2
nf_defrag_ipv4         12443  1 nf_conntrack_ipv4
xt_state               12455  2
nf_conntrack           42465  2 nf_conntrack_ipv4,xt_state
iptable_filter         12488  1
ip_tables              16998  1 iptable_filter
x_tables               17969  4 ipt_LOG,xt_state,iptable_filter,ip_tables
loop                   17777  0
dm_crypt               17809  0
dm_mod                 56401  1 dm_crypt
radeon                712176  2
snd_azt3328            17641  6
gameport               13332  2 snd_azt3328
ttm                    46736  1 radeon
snd_ac97_codec         83732  1 snd_azt3328
ac97_bus               12462  1 snd_ac97_codec
snd_pcm_oss            35864  0
snd_mixer_oss          17649  3 snd_pcm_oss
snd_pcm                52731  4 snd_azt3328,snd_ac97_codec,snd_pcm_oss
drm_kms_helper         26550  1 radeon
snd_page_alloc         12841  1 snd_pcm
snd_opl3_lib           13141  1 snd_azt3328
snd_hwdep              12906  1 snd_opl3_lib
snd_mpu401_uart        13299  1 snd_azt3328
psmouse                45863  0
snd_seq_midi           12744  0
drm                   129190  4 radeon,ttm,drm_kms_helper
snd_rawmidi            22407  2 snd_mpu401_uart,snd_seq_midi
snd_seq_midi_event     13124  1 snd_seq_midi
i2c_i801               12670  0
snd_seq                39172  3 snd_seq_midi,snd_seq_midi_event
i2c_algo_bit           12706  1 radeon
i2c_core               19022  5
radeon,drm_kms_helper,drm,i2c_i801,i2c_algo_bit
evdev                  13084  11
serio_raw              12758  0
pcspkr                 12515  0
parport_pc             21895  0
snd_timer              22171  5
snd_hrtimer,snd_azt3328,snd_pcm,snd_opl3_lib,snd_seq
snd_seq_device         12995  4
snd_opl3_lib,snd_seq_midi,snd_rawmidi,snd_seq
snd                    38189  20
snd_azt3328,snd_ac97_codec,snd_pcm_oss,snd_mixer_oss,snd_pcm,snd_opl3_lib,snd_hwdep,snd_mpu401_uart,snd_rawmidi,snd_seq,snd_timer,snd_seq_device
soundcore              12878  3 snd
power_supply           13283  1 radeon
rng_core               12550  0
parport                27018  1 parport_pc
shpchp                 26653  0
pci_hotplug            26303  1 shpchp
button                 12783  0
processor              26983  0
ext3                  102125  4
jbd                    40818  1 ext3
mbcache                12810  1 ext3
sg                     21385  0
usb_storage            34951  0
usbhid                 35206  0
hid                    59841  1 usbhid
uas                    12975  0
sr_mod                 17418  0
sd_mod                 35060  8
cdrom                  34631  1 sr_mod
crc_t10dif             12332  1 sd_mod
ata_generic            12439  0
uhci_hcd               21850  0
ata_piix               21079  5
libata                132100  2 ata_generic,ata_piix
firewire_ohci          26332  0
ehci_hcd               34885  0
via_rhine              22182  0
fan                    12594  0
firewire_core          42365  1 firewire_ohci
scsi_mod              134453  6 sg,usb_storage,uas,sr_mod,sd_mod,libata
thermal                13058  0
usbcore                99225  6 usb_storage,usbhid,uas,uhci_hcd,ehci_hcd
mii                    12595  1 via_rhine
crc_itu_t              12331  1 firewire_core
thermal_sys            17667  3 processor,fan,thermal



-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.39-2-686-pae (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages cryptsetup depends on:
ii  debconf [debconf-2.0]        1.5.39      Debian configuration
management sy
ii  dmsetup                      2:1.02.63-3 The Linux Kernel Device
Mapper use
ii  libc6                        2.13-7      Embedded GNU C Library:
Shared lib
ii  libcryptsetup1               2:1.3.0-3   libcryptsetup shared library
ii  libpopt0                     1.16-1      lib for parsing cmdline
parameters

cryptsetup recommends no packages.

Versions of packages cryptsetup suggests:
ii  busybox                       1:1.18.4-2 Tiny utilities for small
and embed
ii  dosfstools                    3.0.9-1    utilities for making and
checking
ii  initramfs-tools [linux-initra 0.99       tools for generating an
initramfs
ii  liblocale-gettext-perl        1.05-6+b1  Using libc functions for
internati
ii  udev                          171-1      /dev/ and hotplug
management daemo

-- debconf information:
  cryptsetup/prerm_active_mappings: true

*** /home/korsaire/Desktop/luks--debug.txt
# cryptsetup 1.3.0 processing "cryptsetup -v --debug luksOpen /dev/sdh1
SataExterne2048G"
# Running command luksOpen.
# Locking memory.
# Allocating crypt device /dev/sdh1 context.
# Trying to open and read device /dev/sdh1.
# Initialising device-mapper backend, UDEV is enabled.
# Detected dm-crypt version 1.10.0, dm-ioctl version 4.20.0.
# Trying to load LUKS1 crypt type from device /dev/sdh1.
# Initialising gcrypt crypto backend.
# Reading LUKS header of size 1024 from device /dev/sdh1
# Timeout set to 0 miliseconds.
# Password retry count set to 3.
# Iteration time set to 1000 miliseconds.
# Activating volume SataExterne2048G [keyslot -1] using [none] passphrase.
# dm status SataExterne2048G  OF   [16384]
# Interactive passphrase entry requested.
# Trying to open key slot 0 [ACTIVE_LAST].
# Reading key slot 0 area.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-4839
# Udev cookie 0xd4d075e (semid 65536) created
# Udev cookie 0xd4d075e (semid 65536) incremented
# Udev cookie 0xd4d075e (semid 65536) incremented
# Udev cookie 0xd4d075e (semid 65536) assigned to dm_task type 0 with
flags 0xe
# dm create temporary-cryptsetup-4839
CRYPT-TEMP-temporary-cryptsetup-4839 OF
[16384]
# dm reload temporary-cryptsetup-4839  OFW    [16384]
# dm resume temporary-cryptsetup-4839  OFW    [16384]
# temporary-cryptsetup-4839: Stacking NODE_ADD (254,0) 0:6 0660
# temporary-cryptsetup-4839: Stacking NODE_READ_AHEAD 256 (flags=1)
# Udev cookie 0xd4d075e (semid 65536) decremented
# Udev cookie 0xd4d075e (semid 65536): Waiting for zero
# Udev cookie 0xd4d075e (semid 65536) destroyed
# temporary-cryptsetup-4839: read ahead is 256
# temporary-cryptsetup-4839: Setting read ahead to 256
# Udev cookie 0xd4de203 (semid 98304) created
# Udev cookie 0xd4de203 (semid 98304) incremented
# Udev cookie 0xd4de203 (semid 98304) incremented
# Udev cookie 0xd4de203 (semid 98304) assigned to dm_task type 2 with
flags 0x0
# dm remove temporary-cryptsetup-4839  OF   [16384]
# temporary-cryptsetup-4839: Stacking NODE_DEL (replaces other stacked ops)
# Udev cookie 0xd4de203 (semid 98304) decremented
# Udev cookie 0xd4de203 (semid 98304): Waiting for zero
# Udev cookie 0xd4de203 (semid 98304) destroyed
# Trying to open key slot 1 [INACTIVE].
# Trying to open key slot 2 [INACTIVE].
# Trying to open key slot 3 [INACTIVE].
# Trying to open key slot 4 [INACTIVE].
# Trying to open key slot 5 [INACTIVE].
# Trying to open key slot 6 [INACTIVE].
# Trying to open key slot 7 [INACTIVE].
# Interactive passphrase entry requested.
# Trying to open key slot 0 [ACTIVE_LAST].
# Reading key slot 0 area.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-4839
# Udev cookie 0xd4d62e6 (semid 131072) created
# Udev cookie 0xd4d62e6 (semid 131072) incremented
# Udev cookie 0xd4d62e6 (semid 131072) incremented
# Udev cookie 0xd4d62e6 (semid 131072) assigned to dm_task type 0 with flags
0xe
# dm create temporary-cryptsetup-4839
CRYPT-TEMP-temporary-cryptsetup-4839 OF
[16384]
# dm reload temporary-cryptsetup-4839  OFW    [16384]
# dm resume temporary-cryptsetup-4839  OFW    [16384]
# temporary-cryptsetup-4839: Stacking NODE_ADD (254,0) 0:6 0660
# temporary-cryptsetup-4839: Stacking NODE_READ_AHEAD 256 (flags=1)
# Udev cookie 0xd4d62e6 (semid 131072) decremented
# Udev cookie 0xd4d62e6 (semid 131072): Waiting for zero
# Udev cookie 0xd4d62e6 (semid 131072) destroyed
# temporary-cryptsetup-4839: read ahead is 256
# temporary-cryptsetup-4839: Setting read ahead to 256
# Udev cookie 0xd4d7db3 (semid 163840) created
# Udev cookie 0xd4d7db3 (semid 163840) incremented
# Udev cookie 0xd4d7db3 (semid 163840) incremented
# Udev cookie 0xd4d7db3 (semid 163840) assigned to dm_task type 2 with flags
0x0
# dm remove temporary-cryptsetup-4839  OF   [16384]
# temporary-cryptsetup-4839: Stacking NODE_DEL (replaces other stacked ops)
# Udev cookie 0xd4d7db3 (semid 163840) decremented
# Udev cookie 0xd4d7db3 (semid 163840): Waiting for zero
# Udev cookie 0xd4d7db3 (semid 163840) destroyed
# Trying to open key slot 1 [INACTIVE].
# Trying to open key slot 2 [INACTIVE].
# Trying to open key slot 3 [INACTIVE].
# Trying to open key slot 4 [INACTIVE].
# Trying to open key slot 5 [INACTIVE].
# Trying to open key slot 6 [INACTIVE].
# Trying to open key slot 7 [INACTIVE].
# Interactive passphrase entry requested.
# Trying to open key slot 0 [ACTIVE_LAST].
# Reading key slot 0 area.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-4839
# Udev cookie 0xd4d83e6 (semid 196608) created
# Udev cookie 0xd4d83e6 (semid 196608) incremented
# Udev cookie 0xd4d83e6 (semid 196608) incremented
# Udev cookie 0xd4d83e6 (semid 196608) assigned to dm_task type 0 with flags
0xe
# dm create temporary-cryptsetup-4839
CRYPT-TEMP-temporary-cryptsetup-4839 OF
[16384]
# dm reload temporary-cryptsetup-4839  OFW    [16384]
# dm resume temporary-cryptsetup-4839  OFW    [16384]
# temporary-cryptsetup-4839: Stacking NODE_ADD (254,0) 0:6 0660
# temporary-cryptsetup-4839: Stacking NODE_READ_AHEAD 256 (flags=1)
# Udev cookie 0xd4d83e6 (semid 196608) decremented
# Udev cookie 0xd4d83e6 (semid 196608): Waiting for zero
# Udev cookie 0xd4d83e6 (semid 196608) destroyed
# temporary-cryptsetup-4839: read ahead is 256
# temporary-cryptsetup-4839: Setting read ahead to 256
# Udev cookie 0xd4d4a59 (semid 229376) created
# Udev cookie 0xd4d4a59 (semid 229376) incremented
# Udev cookie 0xd4d4a59 (semid 229376) incremented
# Udev cookie 0xd4d4a59 (semid 229376) assigned to dm_task type 2 with flags
0x0
# dm remove temporary-cryptsetup-4839  OF   [16384]
# temporary-cryptsetup-4839: Stacking NODE_DEL (replaces other stacked ops)
# Udev cookie 0xd4d4a59 (semid 229376) decremented
# Udev cookie 0xd4d4a59 (semid 229376): Waiting for zero
# Udev cookie 0xd4d4a59 (semid 229376) destroyed
# Trying to open key slot 1 [INACTIVE].
# Trying to open key slot 2 [INACTIVE].
# Trying to open key slot 3 [INACTIVE].
# Trying to open key slot 4 [INACTIVE].
# Trying to open key slot 5 [INACTIVE].
# Trying to open key slot 6 [INACTIVE].
# Trying to open key slot 7 [INACTIVE].
# Releasing crypt device /dev/sdh1 context.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.saout.de/pipermail/dm-crypt/attachments/20110703/0ced4216/attachment.html>


More information about the dm-crypt mailing list