Am 15.02.2012 18:25, schrieb Jan Engelhardt:
Dec 25 08:09:54 sysiphus login[3411]: (mount.c:267): Mount info:
globalconf, user=mdomann<volume fstype="crypto_LUKS" server="(null)"
path="/dev/sda3" mountpoint="/home" cipher="(null)" fskeypath="(null)"
fskeycipher="(null)" fskeyhash="(null)" options="fsck" /> fstab=0 ssh=0
Dec 25 08:09:56 sysiphus login[3411]: (mount.c:586): ehd_keydec_run:
Unknown digest
What were the luksFormat commands/parameters you used to create this
volume?
If you do not remember, using luksDump can provide an approximation.
root@sysiphus:/home/mdomann# cryptsetup luksDump /dev/sdb2
LUKS header information for /dev/sdb2
Version: 1
Cipher name: aes
Cipher mode: cbc-essiv:sha256
Hash spec: sha1
Payload offset: 2056
MK bits: 256
MK digest: 93 c6 8e 50 b3 a0 8a 5b 33 fe 82 46 e8 2c 46 16 1f 62 e6 14
MK salt: 0f 07 cb 5b 8c df 48 90 ad 4f 7b 8f 66 c0 c7 cb
01 b1 fb b9 9d 56 b7 ac 39 c1 ca f7 62 95 50 32
MK iterations: 32125
UUID: 8fe4ba10-c4b9-4448-b3c9-ed835f45377e
Key Slot 0: ENABLED
Iterations: 128975
Salt: 91 8e 68 d1 11 53 5b f7 36 a9 a0 ca c9 6b 47 0e
86 32 36 99 f3 06 93 09 40 8d 80 aa 36 f2 01 15
Key material offset: 8
AF stripes: 4000
Key Slot 1: ENABLED
Iterations: 131302
Salt: 93 05 53 11 df 0b 62 0f 7b 41 4e a9 1f c5 10 d2
a8 15 96 cf 7a aa 79 29 8c d8 bc 58 91 f8 a4 c1
Key material offset: 264
AF stripes: 4000
Key Slot 2: ENABLED
Iterations: 130680
Salt: 90 d9 b6 f4 89 48 d6 11 a3 54 2f 16 ae b1 3f 39
86 6f 45 cb 13 21 9f 5a 66 a7 cf c6 3f c2 dd 20
Key material offset: 520
AF stripes: 4000
Key Slot 3: ENABLED
Iterations: 145489
Salt: 3b 34 41 da eb 4f e6 87 80 62 5c 40 8c 05 40 be
d9 fa 9d 16 29 1e 7b a4 9a d5 8a d6 21 f8 71 3a
Key material offset: 776
AF stripes: 4000
hope it helps.
micha
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org