Package: cryptsetup Version: 2:1.3.0-3 Severity: important Hi,
On Wheezy updated, cryptsetup/luks doesn't want to unlock the key in the slot 0 (no other key ready) on my external hard disk (sata2usb , one partition format ted in ext4). The key in the slot 0 has nevertheless already very well been unlocked. Greetings Jean-sébastien -- Package-specific info: -- /proc/cmdline BOOT_IMAGE=/boot/vmlinuz-2.6.39-2-686-pae root=UUID=0d760753-22ea- 4f11-88c6-21fe540d0510 ro quiet -- /etc/crypttab # <target name> <source device> <key file> <options> -- /etc/fstab # /etc/fstab: static file system information. # # <file system> <mount point> <type> <options> <dump> <pass> proc /proc proc defaults 0 0 # /dev/hda2 / ext3 errors=remount-ro,data=ordered 0 1 UUID=0d760753-22ea-4f11-88c6-21fe540d0510 / ext3 errors =remount-ro,data=ordered 0 1 # /dev/hdb1 /home ext3 defaults,data=ordered 0 2 UUID=b93bd0fb-8e57-453e-b5c7-0ffc882174f3 /home ext3 defaults,data=ordered 0 2 # /dev/hda1 none swap sw 0 0 UUID=859565a4-a581-4985-b314-d561d61175df none swap sw 0 0 # /dev/hdd1 /mnt/EncoreUn ext3 auto,nouser,async,dev,rw,exec,data=ordered 0 3 UUID=0794f2f8-444a-4fce-8fc4-a5c75645fea4 /mnt/EncoreUn ext3 auto,nouser,async,dev,rw,exec,data=ordered 0 3 # /dev/hda3 /mnt/Emballage ext3 auto,nouser,async,dev,rw,exec,data=ordered 0 4 UUID=0fe276fc-f357-4d18-bfcc-bc85e18aa05a /mnt/Emballage ext3 auto,nouser,async,dev,rw,exec,data=ordered 0 4 # /dev/hdc /media/cdrom0 udf,iso9660 user,noauto 0 0 # /dev/cdrom1 /media/cdrom0 udf,iso9660 user,noauto 0 0 # /dev/fd0 /media/floppy0 auto rw,user,noauto 0 0 -- lsmod Module Size Used by snd_hrtimer 12540 1 binfmt_misc 12778 1 fuse 55666 2 ipt_LOG 12533 2 nf_conntrack_ipv4 13649 2 nf_defrag_ipv4 12443 1 nf_conntrack_ipv4 xt_state 12455 2 nf_conntrack 42465 2 nf_conntrack_ipv4,xt_state iptable_filter 12488 1 ip_tables 16998 1 iptable_filter x_tables 17969 4 ipt_LOG,xt_state,iptable_filter,ip_tables loop 17777 0 dm_crypt 17809 0 dm_mod 56401 1 dm_crypt radeon 712176 2 snd_azt3328 17641 6 gameport 13332 2 snd_azt3328 ttm 46736 1 radeon snd_ac97_codec 83732 1 snd_azt3328 ac97_bus 12462 1 snd_ac97_codec snd_pcm_oss 35864 0 snd_mixer_oss 17649 3 snd_pcm_oss snd_pcm 52731 4 snd_azt3328,snd_ac97_codec,snd_pcm_oss drm_kms_helper 26550 1 radeon snd_page_alloc 12841 1 snd_pcm snd_opl3_lib 13141 1 snd_azt3328 snd_hwdep 12906 1 snd_opl3_lib snd_mpu401_uart 13299 1 snd_azt3328 psmouse 45863 0 snd_seq_midi 12744 0 drm 129190 4 radeon,ttm,drm_kms_helper snd_rawmidi 22407 2 snd_mpu401_uart,snd_seq_midi snd_seq_midi_event 13124 1 snd_seq_midi i2c_i801 12670 0 snd_seq 39172 3 snd_seq_midi,snd_seq_midi_event i2c_algo_bit 12706 1 radeon i2c_core 19022 5 radeon,drm_kms_helper,drm,i2c_i801,i2c_algo_bit evdev 13084 11 serio_raw 12758 0 pcspkr 12515 0 parport_pc 21895 0 snd_timer 22171 5 snd_hrtimer,snd_azt3328,snd_pcm,snd_opl3_lib,snd_seq snd_seq_device 12995 4 snd_opl3_lib,snd_seq_midi,snd_rawmidi,snd_seq snd 38189 20 snd_azt3328,snd_ac97_codec,snd_pcm_oss,snd_mixer_oss,snd_pcm,snd_opl3_lib,snd_hwdep,snd_mpu401_uart,snd_rawmidi,snd_seq,snd_timer,snd_seq_device soundcore 12878 3 snd power_supply 13283 1 radeon rng_core 12550 0 parport 27018 1 parport_pc shpchp 26653 0 pci_hotplug 26303 1 shpchp button 12783 0 processor 26983 0 ext3 102125 4 jbd 40818 1 ext3 mbcache 12810 1 ext3 sg 21385 0 usb_storage 34951 0 usbhid 35206 0 hid 59841 1 usbhid uas 12975 0 sr_mod 17418 0 sd_mod 35060 8 cdrom 34631 1 sr_mod crc_t10dif 12332 1 sd_mod ata_generic 12439 0 uhci_hcd 21850 0 ata_piix 21079 5 libata 132100 2 ata_generic,ata_piix firewire_ohci 26332 0 ehci_hcd 34885 0 via_rhine 22182 0 fan 12594 0 firewire_core 42365 1 firewire_ohci scsi_mod 134453 6 sg,usb_storage,uas,sr_mod,sd_mod,libata thermal 13058 0 usbcore 99225 6 usb_storage,usbhid,uas,uhci_hcd,ehci_hcd mii 12595 1 via_rhine crc_itu_t 12331 1 firewire_core thermal_sys 17667 3 processor,fan,thermal -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.39-2-686-pae (SMP w/2 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages cryptsetup depends on: ii debconf [debconf-2.0] 1.5.39 Debian configuration management sy ii dmsetup 2:1.02.63-3 The Linux Kernel Device Mapper use ii libc6 2.13-7 Embedded GNU C Library: Shared lib ii libcryptsetup1 2:1.3.0-3 libcryptsetup shared library ii libpopt0 1.16-1 lib for parsing cmdline parameters cryptsetup recommends no packages. Versions of packages cryptsetup suggests: ii busybox 1:1.18.4-2 Tiny utilities for small and embed ii dosfstools 3.0.9-1 utilities for making and checking ii initramfs-tools [linux-initra 0.99 tools for generating an initramfs ii liblocale-gettext-perl 1.05-6+b1 Using libc functions for internati ii udev 171-1 /dev/ and hotplug management daemo -- debconf information: cryptsetup/prerm_active_mappings: true *** /home/korsaire/Desktop/luks--debug.txt # cryptsetup 1.3.0 processing "cryptsetup -v --debug luksOpen /dev/sdh1 SataExterne2048G" # Running command luksOpen. # Locking memory. # Allocating crypt device /dev/sdh1 context. # Trying to open and read device /dev/sdh1. # Initialising device-mapper backend, UDEV is enabled. # Detected dm-crypt version 1.10.0, dm-ioctl version 4.20.0. # Trying to load LUKS1 crypt type from device /dev/sdh1. # Initialising gcrypt crypto backend. # Reading LUKS header of size 1024 from device /dev/sdh1 # Timeout set to 0 miliseconds. # Password retry count set to 3. # Iteration time set to 1000 miliseconds. # Activating volume SataExterne2048G [keyslot -1] using [none] passphrase. # dm status SataExterne2048G OF [16384] # Interactive passphrase entry requested. # Trying to open key slot 0 [ACTIVE_LAST]. # Reading key slot 0 area. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-4839 # Udev cookie 0xd4d075e (semid 65536) created # Udev cookie 0xd4d075e (semid 65536) incremented # Udev cookie 0xd4d075e (semid 65536) incremented # Udev cookie 0xd4d075e (semid 65536) assigned to dm_task type 0 with flags 0xe # dm create temporary-cryptsetup-4839 CRYPT-TEMP-temporary-cryptsetup-4839 OF [16384] # dm reload temporary-cryptsetup-4839 OFW [16384] # dm resume temporary-cryptsetup-4839 OFW [16384] # temporary-cryptsetup-4839: Stacking NODE_ADD (254,0) 0:6 0660 # temporary-cryptsetup-4839: Stacking NODE_READ_AHEAD 256 (flags=1) # Udev cookie 0xd4d075e (semid 65536) decremented # Udev cookie 0xd4d075e (semid 65536): Waiting for zero # Udev cookie 0xd4d075e (semid 65536) destroyed # temporary-cryptsetup-4839: read ahead is 256 # temporary-cryptsetup-4839: Setting read ahead to 256 # Udev cookie 0xd4de203 (semid 98304) created # Udev cookie 0xd4de203 (semid 98304) incremented # Udev cookie 0xd4de203 (semid 98304) incremented # Udev cookie 0xd4de203 (semid 98304) assigned to dm_task type 2 with flags 0x0 # dm remove temporary-cryptsetup-4839 OF [16384] # temporary-cryptsetup-4839: Stacking NODE_DEL (replaces other stacked ops) # Udev cookie 0xd4de203 (semid 98304) decremented # Udev cookie 0xd4de203 (semid 98304): Waiting for zero # Udev cookie 0xd4de203 (semid 98304) destroyed # Trying to open key slot 1 [INACTIVE]. # Trying to open key slot 2 [INACTIVE]. # Trying to open key slot 3 [INACTIVE]. # Trying to open key slot 4 [INACTIVE]. # Trying to open key slot 5 [INACTIVE]. # Trying to open key slot 6 [INACTIVE]. # Trying to open key slot 7 [INACTIVE]. # Interactive passphrase entry requested. # Trying to open key slot 0 [ACTIVE_LAST]. # Reading key slot 0 area. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-4839 # Udev cookie 0xd4d62e6 (semid 131072) created # Udev cookie 0xd4d62e6 (semid 131072) incremented # Udev cookie 0xd4d62e6 (semid 131072) incremented # Udev cookie 0xd4d62e6 (semid 131072) assigned to dm_task type 0 with flags 0xe # dm create temporary-cryptsetup-4839 CRYPT-TEMP-temporary-cryptsetup-4839 OF [16384] # dm reload temporary-cryptsetup-4839 OFW [16384] # dm resume temporary-cryptsetup-4839 OFW [16384] # temporary-cryptsetup-4839: Stacking NODE_ADD (254,0) 0:6 0660 # temporary-cryptsetup-4839: Stacking NODE_READ_AHEAD 256 (flags=1) # Udev cookie 0xd4d62e6 (semid 131072) decremented # Udev cookie 0xd4d62e6 (semid 131072): Waiting for zero # Udev cookie 0xd4d62e6 (semid 131072) destroyed # temporary-cryptsetup-4839: read ahead is 256 # temporary-cryptsetup-4839: Setting read ahead to 256 # Udev cookie 0xd4d7db3 (semid 163840) created # Udev cookie 0xd4d7db3 (semid 163840) incremented # Udev cookie 0xd4d7db3 (semid 163840) incremented # Udev cookie 0xd4d7db3 (semid 163840) assigned to dm_task type 2 with flags 0x0 # dm remove temporary-cryptsetup-4839 OF [16384] # temporary-cryptsetup-4839: Stacking NODE_DEL (replaces other stacked ops) # Udev cookie 0xd4d7db3 (semid 163840) decremented # Udev cookie 0xd4d7db3 (semid 163840): Waiting for zero # Udev cookie 0xd4d7db3 (semid 163840) destroyed # Trying to open key slot 1 [INACTIVE]. # Trying to open key slot 2 [INACTIVE]. # Trying to open key slot 3 [INACTIVE]. # Trying to open key slot 4 [INACTIVE]. # Trying to open key slot 5 [INACTIVE]. # Trying to open key slot 6 [INACTIVE]. # Trying to open key slot 7 [INACTIVE]. # Interactive passphrase entry requested. # Trying to open key slot 0 [ACTIVE_LAST]. # Reading key slot 0 area. # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-4839 # Udev cookie 0xd4d83e6 (semid 196608) created # Udev cookie 0xd4d83e6 (semid 196608) incremented # Udev cookie 0xd4d83e6 (semid 196608) incremented # Udev cookie 0xd4d83e6 (semid 196608) assigned to dm_task type 0 with flags 0xe # dm create temporary-cryptsetup-4839 CRYPT-TEMP-temporary-cryptsetup-4839 OF [16384] # dm reload temporary-cryptsetup-4839 OFW [16384] # dm resume temporary-cryptsetup-4839 OFW [16384] # temporary-cryptsetup-4839: Stacking NODE_ADD (254,0) 0:6 0660 # temporary-cryptsetup-4839: Stacking NODE_READ_AHEAD 256 (flags=1) # Udev cookie 0xd4d83e6 (semid 196608) decremented # Udev cookie 0xd4d83e6 (semid 196608): Waiting for zero # Udev cookie 0xd4d83e6 (semid 196608) destroyed # temporary-cryptsetup-4839: read ahead is 256 # temporary-cryptsetup-4839: Setting read ahead to 256 # Udev cookie 0xd4d4a59 (semid 229376) created # Udev cookie 0xd4d4a59 (semid 229376) incremented # Udev cookie 0xd4d4a59 (semid 229376) incremented # Udev cookie 0xd4d4a59 (semid 229376) assigned to dm_task type 2 with flags 0x0 # dm remove temporary-cryptsetup-4839 OF [16384] # temporary-cryptsetup-4839: Stacking NODE_DEL (replaces other stacked ops) # Udev cookie 0xd4d4a59 (semid 229376) decremented # Udev cookie 0xd4d4a59 (semid 229376): Waiting for zero # Udev cookie 0xd4d4a59 (semid 229376) destroyed # Trying to open key slot 1 [INACTIVE]. # Trying to open key slot 2 [INACTIVE]. # Trying to open key slot 3 [INACTIVE]. # Trying to open key slot 4 [INACTIVE]. # Trying to open key slot 5 [INACTIVE]. # Trying to open key slot 6 [INACTIVE]. # Trying to open key slot 7 [INACTIVE]. # Releasing crypt device /dev/sdh1 context. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org