TJ,

It's an important distinction that the original bug submitter's keyfiles
are listed as being located on /etc, whereas yours are on an external
USB device.  If your keys aren't on the root device, then yes,
decrypting the devices is not going to work reliably at boot because
there's no way for the cryptdisks-udev job to know it's supposed to wait
for this other device to be mounted.

You can customize /etc/init/cryptdisks-enable.conf for your environment
by editing its start line to:

  start on stopped udevtrigger and mounted
MOUNTPOINT=/mountpoint/for/my/keys

to ensure the cryptsetup upstart job doesn't run before the USB disk is
mounted.  However, I know of no general fix for this that's going to
work with an event-driven boot because the start condition will be
different for each user.

Daniel, unless your key files are actually symlinked to some other
partition, this also doesn't address the problem you were seeing, so it
would be helpful to have a mountall log from your system as well.

-- 
lucid: Failure to bring up cryptsetup devices by key files (when not using 
"splash")
https://bugs.launchpad.net/bugs/532898
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to