On 05/05/2010 10:23 PM, Stefan G. Weichinger wrote:
> Am 05.05.2010 22:17, schrieb Stefan G. Weichinger:
> 
>> Remember that I said: "I am not sure which HOWTO I followed" ?
>>
>> What if I didn't use aes-256-ecb?
You don't need to supplay that information to cryptsetup, it can
(should) autodetect it. To see that info for yourself run:
$ cryptsetup luksDump /dev/mapper/VG01-crypthome

> Yep. See pam_mount.conf.xml:
> It's "aes-256-cbc" in my case.
> 
> I was now able to luksOpen and I have the decrypted device mounted.
Hooray :)


> Nice.
> 
> So:
> 
> the user-pw didn't change and the keyfile is OK.
> 
> So why is pam_mount unable to mount it?
> 
> I will now pull another backup and check/add fallback keys ;-)
There are interesting options in the cryptsetup-man page:
luksHeaderBackup and luksHeaderRestore... I think I'll add that to my
backup scripts :)


Bye,
Daniel


-- 
PGP key @ http://pgpkeys.pca.dfn.de/pks/lookup?search=0xBB9D4887&op=get
# gpg --recv-keys --keyserver hkp://subkeys.pgp.net 0xBB9D4887

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to