Luks-暂停后密码不匹配

Luks-暂停后密码不匹配

我遇到了很大的麻烦。我有 ubuntu 14.04(标准安装,带全盘加密 - luks)。昨天我暂停了我的笔记本电脑,几个小时后我的笔记本电脑就没电了。

当我打开笔记本电脑时,luks 中的密码不起作用。我 100% 确定这个密码是正确的,并且我的系统语言环境良好。我也在另一个 ubuntu(live cd 版本 14.04)中检查了这个密码,我遇到了同样的问题(此密码短语没有可用的密钥)。

我的控制台上收到此消息:此密码短语没有可用的密钥。我不知道

这是来自我电脑的一些日志:cryptsetup 修复日志非常奇怪,因为在我看来一切都正常。我如何才能证明例如 header 已损坏或 keyslot 已损坏?该怎么办。我丢失了所有数据吗?请帮帮我。

freeman@freeman:~$ sudo cryptsetup -v luksDump /dev/sda5
LUKS header information for /dev/sda5

Version:        1
Cipher name:    aes
Cipher mode:    xts-plain64
Hash spec:      sha1
Payload offset: 4096
MK bits:        512
MK digest:      60 88 7c 28 18 69 31 42 ce 4d 64 a0 20 9f f1 95 fb 03 e6 9b 
MK salt:        26 e8 60 b4 55 7b bd c6 8a 0c 2c 23 a3 9a 38 b2 
                cd 5a 77 7e 45 ba 68 e1 ae 52 ce 8c f9 e9 70 8c 
MK iterations:  35250
UUID:           d7431ab7-c761-4e7f-a1b9-5d7bc77f20cd

Key Slot 0: ENABLED
         Iterations:             140968
        Salt:                   3b 86 ac 53 70 70 1e 84 06 fc 7f 9b 16 bc ac 14 
                                 c0 6a 7f a6 18 10 3c 81 a7 9d d4 95 4d 3f 2a f8 
        Key material offset:    8
         AF stripes:             4000
 Key Slot 1: DISABLED
 Key Slot 2: DISABLED
 Key Slot 3: DISABLED
 Key Slot 4: DISABLED
 Key Slot 5: DISABLED
 Key Slot 6: DISABLED
 Key Slot 7: DISABLED
 Command successful.

----------------------------------------------------------------------------------------

 freeman@freeman:~$ sudo cryptsetup luksOpen  /dev/sda5 aaa
 Enter passphrase for /dev/sda5: 
 No key available with this passphrase.
----------------------------------------------------------------------------------------

 # cryptsetup 1.4.3 processing "cryptsetup luksOpen /dev/sda5 test231 --debug"
 # Running command luksOpen.
 # Locking memory.
 # Allocating crypt device /dev/sda5 context.
 # Trying to open and read device /dev/sda5.
 # Initialising device-mapper backend, UDEV is enabled.
 # Detected dm-crypt version 1.12.1, dm-ioctl version 4.25.0.
 # Trying to load LUKS1 crypt type from device /dev/sda5.
 # Crypto backend (gcrypt 1.5.0) initialized.
 # Reading LUKS header of size 1024 from device /dev/sda5
 # Timeout set to 0 miliseconds.
 # Password retry count set to 3.
 # Password verification disabled.
 # Iteration time set to 1000 miliseconds.
 # Activating volume test231 [keyslot -1] using [none] passphrase.
 # dm status test231  OF   [16384] (*1)
 # Interactive passphrase entry requested.
 Enter passphrase for /dev/sda5: 
 # Trying to open key slot 0 [ACTIVE_LAST].
 # Reading key slot 0 area.
 # DM-UUID is CRYPT-TEMP-temporary-cryptsetup-7649
 # Udev cookie 0xd4de08b (semid 2818048) created
 # Udev cookie 0xd4de08b (semid 2818048) incremented to 1
 # Udev cookie 0xd4de08b (semid 2818048) incremented to 2
 # Udev cookie 0xd4de08b (semid 2818048) assigned to CREATE task(0) with flags > > DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe)
 # dm create temporary-cryptsetup-7649 CRYPT-TEMP-temporary-cryptsetup-7649 OF   [16384] (*1)
 # dm reload temporary-cryptsetup-7649  OFRW    [16384] (*1)
 # dm resume temporary-cryptsetup-7649  OFRW    [16384] (*1)
 # temporary-cryptsetup-7649: Stacking NODE_ADD (252,0) 0:6 0660 [verify_udev]
 # temporary-cryptsetup-7649: Stacking NODE_READ_AHEAD 256 (flags=1)
 # Udev cookie 0xd4de08b (semid 2818048) decremented to 1
 # Udev cookie 0xd4de08b (semid 2818048) waiting for zero
 # Udev cookie 0xd4de08b (semid 2818048) destroyed
 # temporary-cryptsetup-7649: Processing NODE_ADD (252,0) 0:6 0660 [verify_udev]
 # temporary-cryptsetup-7649: Processing NODE_READ_AHEAD 256 (flags=1)
 # temporary-cryptsetup-7649 (252:0): read ahead is 256 # temporary-cryptsetup-7649 (252:0): Setting read ahead to 256

 # Udev cookie 0xd4dcce0 (semid 2850816) created
 # Udev cookie 0xd4dcce0 (semid 2850816) incremented to 1# Udev cookie 0xd4dcce0 (semid 2850816) incremented to 2
 # Udev cookie 0xd4dcce0 (semid 2850816) assigned to REMOVE task(2) with flags (0x0)
 # dm remove temporary-cryptsetup-7649  OFT    [16384] (*1)
 # temporary-cryptsetup-7649: Stacking NODE_DEL [verify_udev]
 # Udev cookie 0xd4dcce0 (semid 2850816) decremented to 1
 # Udev cookie 0xd4dcce0 (semid 2850816) waiting for zero
 # Udev cookie 0xd4dcce0 (semid 2850816) destroyed
 # temporary-cryptsetup-7649: Processing NODE_DEL [verify_udev]
 # Trying to open key slot 1 [INACTIVE].
 # Trying to open key slot 2 [INACTIVE].
 # Trying to open key slot 3 [INACTIVE].
 # Trying to open key slot 4 [INACTIVE].
 # Trying to open key slot 5 [INACTIVE].
 # Trying to open key slot 6 [INACTIVE].
 # Trying to open key slot 7 [INACTIVE].
 No key available with this passphrase.
 # Interactive passphrase entry requested.
 ubuntu@ubuntu:~$ sudo cryptsetup repair  /dev/sda5 --debug
 # cryptsetup 1.6.1 processing "cryptsetup repair /dev/sda5 --debug"
 # Running command repair.
 # Locking memory.
 # Installing SIGINT/SIGTERM handler.
 # Unblocking interruption on signal.
 # Allocating crypt device /dev/sda5 context.
 # Trying to open and read device /dev/sda5.
 # Initialising device-mapper backend library.
 # Trying to load LUKS1 crypt type from device /dev/sda5.
 # Crypto backend (gcrypt 1.5.3) initialized.
 # Reading LUKS header of size 1024 from device /dev/sda5
 # Key length 64, device size 499615744 sectors, header size 4036 sectors. No known problems detected for LUKS header.
 # Releasing crypt device /dev/sda5 context.
 # Releasing device-mapper backend.
 # Unlocking memory. Command successful.

相关内容