<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=3900&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=3900</link>
		<description><![CDATA[The most recent posts in [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x.]]></description>
		<lastBuildDate>Mon, 11 Jan 2021 13:05:59 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=26738#p26738</link>
			<description><![CDATA[<div class="quotebox"><blockquote><div><p>The install is not Full Disk Encryption (FDE). Only one partition is encrypted. The disk has an extended partition which indicates that it uses DOS partitioning scheme.<br />/dev/sda is the boot disk.<br />/dev/sda1 is the unencrypted /boot partition.<br />/dev/sda2 is the extended partition. Required on DOS partitioned disk in order to have more than four (4) partitions.<br />/dev/sda5 is the OS partition with swap on LVM on luks encryption.<br />In this case the OS partition contains swap and the root (/) tree excluding /boot, all on top of LVM. Which in turn is on top of luks encryption.<br />The Debian Installation (di) uses that method as the default installation method using encrypted storage. It is arguably not the best method but it makes things easy for beginners.</p><p>GRUB requires access to /boot, in this case /boot is not on an encrypted device, therefore, the cryptdevice definition on the /etc/defautl/grub GRUB_CMDLINE_LINUX=&quot;cryptdevice=&lt;crypto device&gt;:&lt;mapper name&gt;&quot; line entry should not be there. Additionally, the initramfs option is not needed in /etc/crypttab, though it does not hurt.</p></div></blockquote></div><p>Thank you for clarification, you are right about that. I forgot that this is an accual state and used laymans term. Thou in Devuan installer i belive there is explicitly said about using &#039;full disk encryption&#039; to describe the default LUKS crypt partitioning scheme. Maybe the description should be improved.</p><p>As for the problem, I moved all my systems to Chimaera and so far it&#039;s gone.<br />Thanks everybody for help.</p>]]></description>
			<author><![CDATA[dummy@example.com (uther)]]></author>
			<pubDate>Mon, 11 Jan 2021 13:05:59 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=26738#p26738</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25848#p25848</link>
			<description><![CDATA[<p>I made an incorrect assumption that the host&#039;s <span class="bbc">/boot</span> was on a <span class="bbc">cryptdevice</span>, which lead us down the wrong path. Sorry about that. I should have initially asked for the contents of the configuration files you supplied.</p><p>The install is <strong>not</strong> Full Disk Encryption (FDE). Only one partition is encrypted. The disk has an extended partition which indicates that it uses DOS partitioning scheme.<br /><span class="bbc">/dev/sda</span> is the <span class="bbc">boot disk</span>.<br /><span class="bbc">/dev/sda1</span> is the <strong>unencrypted</strong> <span class="bbc">/boot</span> partition.<br /><span class="bbc">/dev/sda2</span> is the extended partition. Required on DOS partitioned disk in order to have more than four (4) partitions.<br />/dev/sda5 is the OS partition with swap on LVM on luks encryption.<br /> In this case the OS partition contains swap and the root (/) tree excluding /boot, all on top of LVM. Which in turn is on top of luks encryption.<br />The Debian Installation (di) uses that method as the default installation method using encrypted storage. It is arguably not the best method but it makes things easy for beginners.</p><p>GRUB requires access to /boot, in this case /boot is <strong>not</strong> on an encrypted device, therefore, the <span class="bbc">cryptdevice</span> definition on the <span class="bbc">/etc/defautl/grub</span> <span class="bbc">GRUB_CMDLINE_LINUX=&quot;cryptdevice=&lt;crypto device&gt;:&lt;mapper name&gt;&quot;</span> line entry should not be there. Additionally, the <span class="bbc">initramfs</span> option is not needed in <span class="bbc">/etc/crypttab</span>, though it does not hurt.</p><p>Change the grub and crypttab files.<br />/etc/default/grub</p><div class="codebox"><pre><code>GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=`lsb_release -i -s 2&gt; /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT=&quot;&quot;
GRUB_CMDLINE_LINUX=&quot;&quot;
GRUB_ENABLE_CRYPTODISK=y</code></pre></div><p>/etc/crypttab</p><div class="codebox"><pre><code>sda5_crypt UUID=&lt;UUID&gt; none luks,initramfs</code></pre></div><p>Run:<br /><span class="bbc">update-initramfs -u -k all</span> to update the /boot/initrd.img.xxxxx images.<br />and<br /><span class="bbc">update-grub</span> to update /boot/grub/grub.cfg.</p><p>After, reboot and test boot up with the 4.19.x and then the 5.8.x kernels. The results should be the same as before: boot okay with 4.19.x kernel and <br />password error with 5.8.x kernel.</p><div class="codebox"><pre><code>cryptsetup: ERROR: sda5_crypt: cryptsetup failed, bad password or options?</code></pre></div><p>In this case the problem is just that: bad password or options.</p><p>Bad password: this can be either user error or keyboard configuration miss-match during boot.<br />An easy test is to boot up using the 4.19.x kernel and add a key to the luks on /dev/sda5. luks can have up to eigth (8) keys.<br />Reference: man cryptsetup<br />To add a key enter the following command after full boot up with the 4.19.x kernel<br /><span class="bbc">cryptesetup luksAddKey /dev/sda5</span> use &quot;1234&quot; ad the key. This is for testing, you can change it later.<br />Reference: man cryptsetup<br />Reboot using the 5.8.x kernel and try the 1234 password. If this works the it a keyboard configuration issue.</p><p>Let me know the results.</p>]]></description>
			<author><![CDATA[dummy@example.com (stevendemetrius)]]></author>
			<pubDate>Sun, 15 Nov 2020 01:30:12 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25848#p25848</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25844#p25844</link>
			<description><![CDATA[<p>machine #1 <span class="bbc">sda1_crypt UUID=xxx none luks</span><br />machine #2 <span class="bbc">sda1_crypt UUID=xxx none luks,discard</span><br />machine #3 <span class="bbc">sda5_crypt UUID=xxx none luks,discard</span></p><p>Above refers to 3 different machines which I wrote about earlier. The problematic one is the third one (#3). I might wrote it badly, sorry for that.</p><p>Thing is I <strong>can</strong> boot the system - but only with the older kernel like <span class="bbc">4.19.0-12-amd64</span>.</p><p>Here are all requested dumps from problematic machine. Please bear in mind that this is fresh OOTB install before any configuration and optimisation.</p><p>cat /etc/default/grub</p><div class="codebox"><pre class="vscroll"><code># If you change this file, run &#039;update-grub&#039; afterwards to update
# /boot/grub/grub.cfg.
# For full documentation of the options in this file, see:
#   info -f grub -n &#039;Simple configuration&#039;

GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=`lsb_release -i -s 2&gt; /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT=&quot;&quot;
GRUB_CMDLINE_LINUX=&quot;cryptdevice=UUID=123456789:sda5_crypt&quot;
GRUB_ENABLE_CRYPTODISK=y

# Uncomment to enable BadRAM filtering, modify to suit your needs
# This works with Linux (no patch required) and with any kernel that obtains
# the memory map information from GRUB (GNU Mach, kernel of FreeBSD ...)
#GRUB_BADRAM=&quot;0x01234567,0xfefefefe,0x89abcdef,0xefefefef&quot;

# Uncomment to disable graphical terminal (grub-pc only)
#GRUB_TERMINAL=console

# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command `vbeinfo&#039;
#GRUB_GFXMODE=640x480

# Uncomment if you don&#039;t want GRUB to pass &quot;root=UUID=xxx&quot; parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true

# Uncomment to disable generation of recovery mode menu entries
#GRUB_DISABLE_RECOVERY=&quot;true&quot;

# Uncomment to get a beep at grub start
#GRUB_INIT_TUNE=&quot;480 440 1&quot;</code></pre></div><p>cat /etc/fstab</p><div class="codebox"><pre><code># /etc/fstab: static file system information.
#
# Use &#039;blkid&#039; to print the universally unique identifier for a
# device; this may be used with UUID= as a more robust way to name devices
# that works even if disks are added and removed. See fstab(5).
#
# &lt;file system&gt;			&lt;mount point&gt;   &lt;type&gt;  &lt;options&gt;		&lt;dump&gt;  &lt;pass&gt;
/dev/mapper/dux--vg-root	/               ext4    errors=remount-ro	0       1
# /boot was on /dev/sda1 during installation
UUID=987654321			/boot           ext2    defaults		0       2
/dev/mapper/dux--vg-home	/home           ext4    defaults	        0       2
/dev/mapper/dux--vg-tmp		/tmp            ext4    defaults	        0       2
/dev/mapper/dux--vg-var		/var            ext4    defaults	        0       2
/dev/mapper/dux--vg-swap_1	none            swap    sw      	        0       0</code></pre></div><p>cat /etc/crypttab</p><div class="codebox"><pre><code>sda5_crypt UUID=123456789 none luks,initramfs</code></pre></div><p>lsblk -f -o +size</p><div class="codebox"><pre><code>NAME                 FSTYPE      LABEL     UUID            FSAVAIL FSUSE% MOUNTPOINT             SIZE
sda                                                                                            931.5G
├─sda1               ext2                  987654321	   178M    19%    /boot                  243M
├─sda2                                                                                             1K
└─sda5               crypto_LUKS           123456789	                                       931.3G
  └─sda5_crypt                                                                                 931.3G
    ├─user--vg-root                                            18G    16% /                     23.3G
    ├─user--vg-var                                            8.3G     3% /var                   9.3G
    ├─user--vg-swap_1                                                     [SWAP]                 3.2G
    ├─user--vg-tmp                                            1.7G     0% /tmp                   1.9G
    └─user--vg-home                                         833.8G     0% /home                893.6G</code></pre></div><p>fdisk -l </p><div class="codebox"><pre class="vscroll"><code>Disk /dev/sda: 931.5 GiB, 1000204886016 bytes, 1953525168 sectors
Disk model: Samsung SSD 860 
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: dos
Disk identifier: 0x--------------

Device     Boot  Start        End    Sectors   Size Id Type
/dev/sda1  *      2048     499711     497664   243M 83 Linux
/dev/sda2       501758 1953523711 1953021954 931.3G  5 Extended
/dev/sda5       501760 1953523711 1953021952 931.3G 83 Linux

Disk /dev/mapper/sda5_crypt: 931.3 GiB, 999930462208 bytes, 1952989184 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

Disk /dev/mapper/user--vg-root: 23.3 GiB, 24998051840 bytes, 48824320 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

Disk /dev/mapper/user--vg-var: 9.3 GiB, 9999220736 bytes, 19529728 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

Disk /dev/mapper/user--vg-swap_1: 3.2 GiB, 3418357760 bytes, 6676480 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

Disk /dev/mapper/user--vg-tmp: 1.9 GiB, 1996488704 bytes, 3899392 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes

Disk /dev/mapper/user--vg-home: 893.6 GiB, 959480594432 bytes, 1873985536 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (uther)]]></author>
			<pubDate>Sat, 14 Nov 2020 18:35:55 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25844#p25844</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25843#p25843</link>
			<description><![CDATA[<p>For clarification<br />/dev/sda - first disk<br />/dev/sdb - second disk<br />/dev/sda1 - first partition on first disk<br />/dev/sdb2 - second partition on second disk<br />/dev/sdc5 - fifth partition on third disk</p><p>The configuration of <span class="bbc">/etc/crypttab</span> does not seem correct. It has two entries for mapper device <span class="bbc">sda1_crypt</span>, there should only be one per device. Second the <span class="bbc">initramfs</span> option is missing from each entry. You can ignore the <span class="bbc">discard</span> option it is not relevant for boot up. Look at the man page for crypttab for details: <span class="bbc">man crypttab</span>. The initramfs option is needed to unlock and process the device during boot up: see the man page for details.</p><p>E.g., <span class="bbc">sda1_crypt UUID=xxx none luks,initramfs</span></p><p>Adding the <span class="bbc">initramfs</span> option to <span class="bbc">/etc/crypttab</span> entries, requires running <span class="bbc">update-initramfs</span> for the device to be added to the <span class="bbc">/boot/initrd.img-x.x.x.x.x</span> which is used during boot.</p><p>The<span class="bbc"> /etc/crypttab</span> also shows that there are more than one <span class="bbc">cryptdevices</span>. The <span class="bbc">cryptdevcie</span> entry in <span class="bbc">/etc/default/grub</span> with the UUID must be the UUID of the device that contains&#160; <span class="bbc">/boot</span>. The /boot may be on its own partition. I&#039;m guessing <span class="bbc">/boot</span> on <span class="bbc">sda1_crypt</span> and the <span class="bbc">root (/)</span> is on <span class="bbc">sda5_cryp</span>t. If I&#039;m right the <span class="bbc">cryptdevice</span> for GRUB is the UUID of <span class="bbc">sda1_crypt</span>.</p><p>In order to eliminate the guess-working can you please provide the output information form the following commands, you can remove sensitive information such as exact UUID, etc.</p><div class="codebox"><pre><code>cat /etc/default/grub
cat /etc/fstab
cat /etc/crypttab
lsblk -f -o +size
fdisk -l</code></pre></div><p>Since you cannot boot into the system you can use the Devuan live-CD/DVD/USB or mount the disk in another system to get the information.<br />Advice: before running any command you are give by others, always look at the command&#039;s man page and check the options to see what should happen.</p>]]></description>
			<author><![CDATA[dummy@example.com (stevendemetrius)]]></author>
			<pubDate>Sat, 14 Nov 2020 17:44:40 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25843#p25843</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25840#p25840</link>
			<description><![CDATA[<p>I&#039;ve added the following to the grub config file with the proper drive UUID and updated the grub. Still without the effect.</p><div class="codebox"><pre><code>GRUB_ENABLE_CRYPTODISK=y
GRUB_CMDLINE_LINUX=&quot;cryptdevice=&lt;crypto device&gt;:&lt;mapper name&gt;&quot;</code></pre></div><p>After disabling <span class="bbc">quiet</span> boot option I&#039;m getting the following just before passphrase request:</p><div class="codebox"><pre><code>Begin: Mounting root filesystem ... Begin: Running /scripts/local-top ...  Volume group &quot;user--vg&quot; not found
 Cannot process volume group user--vg
 Volume group &quot;user--vg&quot; not found
 Cannot process volume group user--vg</code></pre></div><p>After typing passphrase:</p><div class="codebox"><pre><code>cryptsetup: ERROR: sda5_crypt: cryptsetup failed, bad password or options?</code></pre></div><p>With the <span class="bbc">4.19.0-12-amd64</span> kernel I&#039;m getting the same message as above but the crypt is openning without a problem.<br />After checking - the same message about not founding volume group is present on all machines mentioned in my last post.</p><p>The sda5 have DOS partition table.<br />As for the device number - that&#039;s the number given during guided partitioning, so I didn&#039;t change that. There are no other drives in the system.<br />During boot there is this however:<br /><span class="bbc">[] sda: sda1 sda2 &lt; sda5 &gt;</span><br />But there is no sign of sda3 and sda4.</p><p>Thanks for the tip about swap! Here I have one question - will changing swap entry in fstab automatically free the diskspace that the swap is using right now?</p><p>I don&#039;t know if this is relevant but it looks like Beowulf is using &#039;discard&#039; option in crypttab as a default now:<br />machine #1 <span class="bbc">sda1_crypt UUID=xxx none luks</span><br />machine #2 <span class="bbc">sda1_crypt UUID=xxx none luks,discard</span><br />machine #3 <span class="bbc">sda5_crypt UUID=xxx none luks,discard</span></p>]]></description>
			<author><![CDATA[dummy@example.com (uther)]]></author>
			<pubDate>Sat, 14 Nov 2020 14:18:42 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25840#p25840</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25837#p25837</link>
			<description><![CDATA[<p>You are welcome.</p><p>There seems to be two entries missing from <span class="bbc">/etc/default/grub</span>:</p><div class="codebox"><pre><code>GRUB_ENABLE_CRYPTODISK=y
GRUB_CMDLINE_LINUX=&quot;cryptdevice=&lt;crypto device&gt;:&lt;mapper name&gt;&quot;</code></pre></div><p><span class="bbc">GRUB_ENABLE_CRYPTODISK=y</span><br />Reference: info grub<br />&quot;If set to &#039;y&#039;, &#039;grub-mkconfig&#039; and &#039;grub-install&#039; will check for encrypted disks and generate additional commands needed to access<br />them during boot.&#160; Note that in this case unattended boot is not possible because GRUB will wait for passphrase to unlock encrypted container.&quot;</p><p>and</p><p><span class="bbc">GRUB_CMDLINE_LINUX=&quot;cryptdevice=&lt;crypto device&gt;:&lt;mapper name&gt;&quot;</span><br />E.g.,<br /><span class="bbc">GRUB_CMDLINE_LINUX=&quot;cryptdevice=UUID=f1ad0cb32e8c-e494-43ab-a574-b9f1ba0e-43ab-a574:sda1_crypt&quot;</span><br />You may not need this line if there is only one cryptdevice. However, the addition of one or more cryptdevices may cause GRUB to try to unlock the incorrect cryptdevice. I recommend adding it anyway to be explicit and to avoid &quot;head scratching&quot; later if you add one or more cryptdevices.</p><p>Suggest removing &quot;quiet&quot; form the Linux command line so that you can see what is going on during the boot process. This may give some additional clues as to what is happening or not happening.</p><p><span class="bbc">/etc/default/grub</span>:</p><div class="codebox"><pre><code>-- GRUB_CMDLINE_LINUX_DEFAULT=&quot;quiet&quot;
++ GRUB_CMDLINE_LINUX_DEFAULT=&quot;&quot;</code></pre></div><p>So your <span class="bbc">/etc/default/grub</span> file will look similar to this:</p><div class="codebox"><pre><code>GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=`lsb_release -i -s 2&gt; /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT=&quot;&quot;
GRUB_CMDLINE_LINUX=&quot;cryptdevice=UUID=f1ad0cb32e8c-e494-43ab-a574-b9f1ba0e-43ab-a574:sda5_crypt&quot;
GRUB_ENABLE_CRYPTODISK=y</code></pre></div><p>The blkid command can be used get the UUID: <span class="bbc">blkid /dev/sda5</span></p><p>I&#039;ve seen claims that GRUB has added luks2 support and that a patch has been available since January, however, I can not verify this. According to GNU GRUB Bugs #55093 support for luk2 is expected to appear in release 2.06. Reference: <a href="https://savannah.gnu.org/bugs/?55093" rel="nofollow">https://savannah.gnu.org/bugs/?55093</a>.&#160; If it works great! I&#039;m using the same version of GRUB as you are, so I&#039;ll try it myself. <img src="https://dev1galaxy.org/img/smilies/smile.png" width="15" height="15" alt="smile" /></p><p>One more thing. This shows that partition sda5 is being used for the entire OS. What are sda1-4 being used for? Is sda using DOS or GPT disk partitioning? GRUB requires a &quot;BIOS boot&quot; partition on GPT while it does not on DOS type disks.</p><div class="quotebox"><blockquote><div><p>─sda5&#160; &#160;<br /> └─sda5_crypt&#160; <br />&#160; &#160;├─user--vg-root<br />&#160; &#160;├─user--vg-var<br />&#160; &#160;├─user--vg-swap_1<br />&#160; &#160;├─user--vg-tmp<br />&#160; &#160;└─user--vg-home</p></div></blockquote></div><p>Suggestion: put swap in it own partition or drive. This has many advantages such as excluding swap form backup jobs, more flexibility regarding swap manipulation, and more. If hibernation is not a requirement then a swap partition or drive can be encrypted with a random encryption key. Just add the appropriate line to the /etc/crypttab and /etc/fstab files, the partition or drive must not contain a filesystem.</p><p>E.g.<span class="bbc">/etc/fstab</span> entry</p><div class="codebox"><pre><code># Swap filesystem luks2 random, was on /dev/sda3
/dev/mapper/luks2-swap none    swap sw 0 0</code></pre></div><p>E.g. <span class="bbc">/etc/crypttab</span> entry</p><div class="codebox"><pre><code># Random key encrypted partition
luks2-swap /dev/sda3 /dev/urandom cipher=aes-xts-plain64,size=256,swap,discard</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (stevendemetrius)]]></author>
			<pubDate>Sat, 14 Nov 2020 04:49:50 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25837#p25837</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25833#p25833</link>
			<description><![CDATA[<p><strong>xinomilo</strong> - I have <span class="bbc">cryptsetup-initramfs</span> installed</p><p><strong>stevendemeritus</strong> - thanks for detailed response</p><p>I run <span class="bbc">update-grub</span> every time after updating the kernel just to be sure anyway, so we can rule that one out.<br />And after running the above plus <span class="bbc">update-initramfs -u -k all</span> there are no error messages during boot - its just like before.</p><p>I&#039;m using guided partitioning with LUKScrypt and LVM during OS installation.<br />The partitioning is as follows:</p><div class="codebox"><pre><code>─sda5   
 └─sda5_crypt  
   ├─user--vg-root
   ├─user--vg-var
   ├─user--vg-swap_1
   ├─user--vg-tmp
   └─user--vg-home</code></pre></div><p>As for GRUB the installed version is <span class="bbc">2.02+dfsg1-20+deb10u2</span></p><p><span class="bbc">/etc/default/grub</span> looks pretty normal, considering that the OS is freshly reinstalled:</p><div class="codebox"><pre><code>GRUB_DEFAULT=0
GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR=`lsb_release -i -s 2&gt; /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT=&quot;quiet&quot;
GRUB_CMDLINE_LINUX=&quot;&quot;</code></pre></div><p>Same goes for the <span class="bbc">/etc/initramfs-tools/*</span></p><p>After further investigation with <span class="bbc">cryptsetup luksDump /dev/...</span> it looks like this might be luks version issue.</p><p>For further explanation - I have 3 machines with Beowulf:</p><p>#1 new desktop - grub 2.02+dfsg1-20+deb10u2, luks1, kernel 5.8 - works (upgraded from ASCII)<br />#2 new laptop - grub 2.02+dfsg1-20+deb10u2, luks2 + kernel 5.8 - wasn&#039;t working but works after reinstall<br />#3 old laptop - grub 2.02+dfsg1-20+deb10u2, luks2 + kernel 5.8 - doesn&#039;t work before and after reinstall</p><p>Both #2 #3 laptops have Devuan installed from the same iso image and the issue with encryption was present only on them.<br />#3 is an old Core2Duo.<br />All 3 machines have proper linux-headers package installed.</p><p>You said that the current GRUB cannot decrypt luks2, but on laptop #2 listed above it seems to be working, or am I missing something (aside from hardware)?</p><p>Thanks again,<br />uther</p>]]></description>
			<author><![CDATA[dummy@example.com (uther)]]></author>
			<pubDate>Fri, 13 Nov 2020 21:31:40 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25833#p25833</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25697#p25697</link>
			<description><![CDATA[<p>make sure you have cryptesetup-initramfs package installed. that usually does the above suggestion automatically..</p>]]></description>
			<author><![CDATA[dummy@example.com (xinomilo)]]></author>
			<pubDate>Thu, 05 Nov 2020 21:05:27 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25697#p25697</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25575#p25575</link>
			<description><![CDATA[<p>Form the information you provided, the only thing that is different is installation of a new kernel, there maybe something missing from the initrd.img.x.x.x.x generated for that specific kernel.</p><p>The related initrd.img.x.x.x.x is automatically generated and updated for a new kernel, when the kernel is installed, and is configured based on the relevant configuration files: GRUB and initramfs configuration files. If these configuration files have been modified then the boot process will be affected. The update can be done manually with <span class="bbc">update-grub</span> and/or <span class="bbc">update-initramfs</span>, (<span class="bbc">update-grub</span> normally calls <span class="bbc">update-initramfs</span>).</p><p>The initrd.img.x.x.x.x files for each installed kernel are located under <span class="bbc">/boot/</span>, which must be accessible to GRUB at boot, i.e., if GRUB can not access <span class="bbc"> /boot</span> then the system will not boot. The filesystem hosting <span class="bbc">/boot</span> must be available and readable by GRUB at boot. <br />E.g.,<br /><span class="bbc">ls -1 /boot/<br />config-5.5.0-0.bpo.2-amd64<br />config-5.7.0-0.bpo.2-amd64<br />config-5.8.0-1-amd64<br />efi<br />grub<br />initrd.img-5.5.0-0.bpo.2-amd64<br />initrd.img-5.7.0-0.bpo.2-amd64<br />initrd.img-5.8.0-1-amd64<br />System.map-5.5.0-0.bpo.2-amd64<br />System.map-5.7.0-0.bpo.2-amd64<br />System.map-5.8.0-1-amd64<br />vmlinuz-5.5.0-0.bpo.2-amd64<br />vmlinuz-5.7.0-0.bpo.2-amd64<br />vmlinuz-5.8.0-1-amd64</span></p><p>The files under <span class="bbc">/boot/grub/</span> are automatically generated and modified every time <span class="bbc">update-grub</span> is run, and their manual modification is not recommended. </p><p>To modify GRUB modify either <span class="bbc">/etc/default/grub</span> and/or the files under <span class="bbc">/etc/grub.d/</span> and then run <span class="bbc">update-grub</span>, which will generate/modify the files under <span class="bbc">/boot/grub</span><br />Similarly with initramfs, after modifying file under <span class="bbc">/etc/initramfs-tools/</span>, run <span class="bbc">update-initramfs</span> to make the changes take effect.</p><p>I suggest doing the following, running all commands as the root user:<br />1. Run <br /><span class="bbc">update-grub</span><br />2. Reboot and check the outcome. Note all messages and address any errors, warnings, etc.</p><p>If the above does not work... <br />1. Run&#160; <br /><span class="bbc">update-initramfs -u -k all</span><br />-u: update initrd.img.x.x.x.x<br />-k all: update all initrd.img.x.x.x.x<br />2. Reboot and check the outcome. Note all messages and address any errors, warnings, etc.</p><p>If it still does not work...<br />1 Edit the default grub file comparing it with a know-good file.<br /><span class="bbc">nano /etc/default/grub</span><br />2. Reboot and check the outcome. Note all messages and address any errors, warnings, etc.</p><p>If it still does not work...<br />Check the files under <span class="bbc">/etc/initramfs-tools/</span><br />2. Reboot and check the outcome. Note all messages and address any errors, warnings, etc.</p><p>If it still does not work post the content of the <span class="bbc">/etc/default/grub</span> and <span class="bbc">/etc/initramfs-tools/</span> here and state exactly what you did and the results as well as a relevant log entries.</p><p>Note: currently the are two versions of&#160; luks for cryptsetup: luks1 and luks2. The current stable version of GRUB does not have full support for luks2, therefore, it will not decrypt luks2.</p><p>FYI: I have been using ZFS on luks1 to boot, which requires the installation of the related kernel header files to generate the needed ZFS modules for incorporation into the related initrd.img.x.x.x.x.</p><p>Host build suggestion: you can modulize your host&#039;s OS and data to minimize data loss and ease repairs, backup, restores, etc., by using separate partitions or drives/disks.<br />Example 1.<br />/dev/sda<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; sda1&#160; # boot filesystem: only used to boot the host<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; sda2&#160; # root filesystem: only used to run the host<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; sda3&#160; # users&#039; home filesystem; only used to store users&#039; configuration and data<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; sda4&#160; # swap space: only used by the running kernel</p><p>Example 2. This can be done for physical machines (PMs) but is better suited for virtual machines (VMs).<br />/dev/sda<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; sda1&#160; # boot<br />/dev/sdb<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160;sdb1&#160; # root filesystem<br />/dev/sdc<br />&#160; &#160; &#160; &#160; &#160; &#160; sdc1&#160; # users&#039; home filesystem<br />/dev/sdd<br />&#160; &#160; &#160; &#160; &#160; &#160; sdd1 # swap space.</p><p>You can mix and match examples 1 and 2 to suite your needs.</p>]]></description>
			<author><![CDATA[dummy@example.com (stevendemetrius)]]></author>
			<pubDate>Sat, 31 Oct 2020 15:30:42 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25575#p25575</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25571#p25571</link>
			<description><![CDATA[<p>Hello, thanks for responses.<br />Yes, FDE means Full Disk Encryption. After upgrading the kernel I cannot open the cryptsetup during boot. The only message is as if I made a typo during typing passphrase, but when I&#039;m trying to boot with older kernel the passphrase works.<br />I&#039;ve managed to resolve this issue on one machine with wiping the drive and reinstallation but that&#039;s overkill.</p>]]></description>
			<author><![CDATA[dummy@example.com (uther)]]></author>
			<pubDate>Sat, 31 Oct 2020 10:32:57 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25571#p25571</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25545#p25545</link>
			<description><![CDATA[<p>I have got 4 PC with encrypted LVMs/unencrypted boot running under Beowulf on 5.8 kernel with no issues. They are automatically decrypted during boot based on keys from USB sticks.</p><p>rolfie</p>]]></description>
			<author><![CDATA[dummy@example.com (rolfie)]]></author>
			<pubDate>Fri, 30 Oct 2020 17:35:04 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25545#p25545</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25541#p25541</link>
			<description><![CDATA[<p>At a guess FDE stands for Full Disk Encryption. Which seems to match his description.</p><p>But we still need more details to have any chance of solving the problem.</p><p>Chris</p>]]></description>
			<author><![CDATA[dummy@example.com (chris2be8)]]></author>
			<pubDate>Fri, 30 Oct 2020 17:26:10 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25541#p25541</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25522#p25522</link>
			<description><![CDATA[<p>Please clarify and provide more details on what is happening. What is FDE? What exactly can&#039;t you open anymore? When is this happening,&#160; what is being displayed, what are you typing, and what is the response shown? Is the problem happening during boot, at what stage, or after boot?</p>]]></description>
			<author><![CDATA[dummy@example.com (stevendemetrius)]]></author>
			<pubDate>Fri, 30 Oct 2020 02:42:29 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25522#p25522</guid>
		</item>
		<item>
			<title><![CDATA[[SOLVED] LUKS crypt fail to open on recent kernel 5.8.x]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=25474#p25474</link>
			<description><![CDATA[<p>I have FDE made with guided partitioning during install and after upgrading kernel to 5.8.0 I can&#039;t open it anymore. I&#039;m getting standard response as if I made a typo. However I can open the crypt with older kernels like 4.19.x.</p><p>The issue is present on two different hardware configs. I&#039;m using vanilla Beowulf installs and the 5.8.0 kernel is installed from backports.<br />This wasn&#039;t happening on 5.7.x IIRC.</p>]]></description>
			<author><![CDATA[dummy@example.com (uther)]]></author>
			<pubDate>Mon, 26 Oct 2020 22:01:43 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=25474#p25474</guid>
		</item>
	</channel>
</rss>
