我遇到了很大的麻烦。我有 ubuntu 14.04(标准安装,带全盘加密 - luks)。昨天我暂停了我的笔记本电脑,几个小时后我的笔记本电脑就没电了。
当我打开笔记本电脑时,luks 中的密码不起作用。我 100% 确定这个密码是正确的,并且我的系统语言环境良好。我也在另一个 ubuntu(live cd 版本 14.04)中检查了这个密码,我遇到了同样的问题(此密码短语没有可用的密钥)。
我的控制台上收到此消息:此密码短语没有可用的密钥。我不知道
这是来自我电脑的一些日志:cryptsetup 修复日志非常奇怪,因为在我看来一切都正常。我如何才能证明例如 header 已损坏或 keyslot 已损坏?该怎么办。我丢失了所有数据吗?请帮帮我。
freeman@freeman:~$ sudo cryptsetup -v luksDump /dev/sda5
LUKS header information for /dev/sda5
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha1
Payload offset: 4096
MK bits: 512
MK digest: 60 88 7c 28 18 69 31 42 ce 4d 64 a0 20 9f f1 95 fb 03 e6 9b
MK salt: 26 e8 60 b4 55 7b bd c6 8a 0c 2c 23 a3 9a 38 b2
cd 5a 77 7e 45 ba 68 e1 ae 52 ce 8c f9 e9 70 8c
MK iterations: 35250
UUID: d7431ab7-c761-4e7f-a1b9-5d7bc77f20cd
Key Slot 0: ENABLED
Iterations: 140968
Salt: 3b 86 ac 53 70 70 1e 84 06 fc 7f 9b 16 bc ac 14
c0 6a 7f a6 18 10 3c 81 a7 9d d4 95 4d 3f 2a f8
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
Command successful.
----------------------------------------------------------------------------------------
freeman@freeman:~$ sudo cryptsetup luksOpen /dev/sda5 aaa
Enter passphrase for /dev/sda5:
No key available with this passphrase.
----------------------------------------------------------------------------------------
# cryptsetup 1.4.3 processing "cryptsetup luksOpen /dev/sda5 test231 --debug"
# Running command luksOpen.
# Locking memory.
# Allocating crypt device /dev/sda5 context.
# Trying to open and read device /dev/sda5.
# Initialising device-mapper backend, UDEV is enabled.
# Detected dm-crypt version 1.12.1, dm-ioctl version 4.25.0.
# Trying to load LUKS1 crypt type from device /dev/sda5.
# Crypto backend (gcrypt 1.5.0) initialized.
# Reading LUKS header of size 1024 from device /dev/sda5
# Timeout set to 0 miliseconds.
# Password retry count set to 3.
# Password verification disabled.
# Iteration time set to 1000 miliseconds.
# Activating volume test231 [keyslot -1] using [none] passphrase.
# dm status test231 OF [16384] (*1)
# Interactive passphrase entry requested.
Enter passphrase for /dev/sda5:
# Trying to open key slot 0 [ACTIVE_LAST].
# Reading key slot 0 area.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-7649
# Udev cookie 0xd4de08b (semid 2818048) created
# Udev cookie 0xd4de08b (semid 2818048) incremented to 1
# Udev cookie 0xd4de08b (semid 2818048) incremented to 2
# Udev cookie 0xd4de08b (semid 2818048) assigned to CREATE task(0) with flags > > DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe)
# dm create temporary-cryptsetup-7649 CRYPT-TEMP-temporary-cryptsetup-7649 OF [16384] (*1)
# dm reload temporary-cryptsetup-7649 OFRW [16384] (*1)
# dm resume temporary-cryptsetup-7649 OFRW [16384] (*1)
# temporary-cryptsetup-7649: Stacking NODE_ADD (252,0) 0:6 0660 [verify_udev]
# temporary-cryptsetup-7649: Stacking NODE_READ_AHEAD 256 (flags=1)
# Udev cookie 0xd4de08b (semid 2818048) decremented to 1
# Udev cookie 0xd4de08b (semid 2818048) waiting for zero
# Udev cookie 0xd4de08b (semid 2818048) destroyed
# temporary-cryptsetup-7649: Processing NODE_ADD (252,0) 0:6 0660 [verify_udev]
# temporary-cryptsetup-7649: Processing NODE_READ_AHEAD 256 (flags=1)
# temporary-cryptsetup-7649 (252:0): read ahead is 256 # temporary-cryptsetup-7649 (252:0): Setting read ahead to 256
# Udev cookie 0xd4dcce0 (semid 2850816) created
# Udev cookie 0xd4dcce0 (semid 2850816) incremented to 1# Udev cookie 0xd4dcce0 (semid 2850816) incremented to 2
# Udev cookie 0xd4dcce0 (semid 2850816) assigned to REMOVE task(2) with flags (0x0)
# dm remove temporary-cryptsetup-7649 OFT [16384] (*1)
# temporary-cryptsetup-7649: Stacking NODE_DEL [verify_udev]
# Udev cookie 0xd4dcce0 (semid 2850816) decremented to 1
# Udev cookie 0xd4dcce0 (semid 2850816) waiting for zero
# Udev cookie 0xd4dcce0 (semid 2850816) destroyed
# temporary-cryptsetup-7649: Processing NODE_DEL [verify_udev]
# Trying to open key slot 1 [INACTIVE].
# Trying to open key slot 2 [INACTIVE].
# Trying to open key slot 3 [INACTIVE].
# Trying to open key slot 4 [INACTIVE].
# Trying to open key slot 5 [INACTIVE].
# Trying to open key slot 6 [INACTIVE].
# Trying to open key slot 7 [INACTIVE].
No key available with this passphrase.
# Interactive passphrase entry requested.
ubuntu@ubuntu:~$ sudo cryptsetup repair /dev/sda5 --debug
# cryptsetup 1.6.1 processing "cryptsetup repair /dev/sda5 --debug"
# Running command repair.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating crypt device /dev/sda5 context.
# Trying to open and read device /dev/sda5.
# Initialising device-mapper backend library.
# Trying to load LUKS1 crypt type from device /dev/sda5.
# Crypto backend (gcrypt 1.5.3) initialized.
# Reading LUKS header of size 1024 from device /dev/sda5
# Key length 64, device size 499615744 sectors, header size 4036 sectors. No known problems detected for LUKS header.
# Releasing crypt device /dev/sda5 context.
# Releasing device-mapper backend.
# Unlocking memory. Command successful.