UBUNTU 20.04LTS LUKS PASSPHRASE FAIL
UBUNTU 20.04 LTS (FULL DISC ENCRYPTION) INITIAL SITUATION:
Upon rebooting my 20.04 LTS the LUKS passphrase was not accepted, with these messages.
- reboot ….
 
- please unlock disc sda3_crypt
 
- 3x cryptsetup failed, bad password or options ?
 
- volume group “vgubuntu” not found
 
- cannot proceed volume group vgubuntu
 
- done.
 
- …
 
- missing modules (cat proc modules: ls /dev)
 
- ALERT!  /dev/mapper/vgunbuntu-root does not exist
 
- Dropping to shell
 
- BusyBox V1.30.1 (Ubuntu 1:1.30.1-4 ubuntu6.4) builtin shell (ash)
 
- (initramfs)_
 
"I only ever added one LUKS password and have never modified any LUKS settings.
Unfortunately I didn’t complete the planned backup in prep of Ubuntu 22.04 LTS upgrade.
I’m reading the following, but I’m still not confident about the GRUB, BUSYBOX, LUKS and INITRAMFS commands."
https://help.ubuntu.com/community/ManualFullSystemEncryption/Troubleshooing
sda3_crypt: cryptsetup failed after 20.04 to 22.04 upgrade
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1979159
UBUNTU 22.04 USB LIVE SYSTEM COMMAND RESULTS
ON UBUNTU 20.04 LUKS FULL ENCRYPTED DRIVE:
-lsblk -> sda has
- sda1 8:1 0 512M 0 part -  sda2 8:2 0 732M 0 part - sda3 8:3 0 231.7G 0 part
 
- gparted → ‘/dev/sda1 ! EFI SYSTEM PARTITION  fat32 512.00MB   boot,esp
 
- 
      ‘/dev/sda2                         ext4  732.00MB 209.70MB 522/30MB
 
- 
      ‘/dev/sda3                   [Encrypted]  231.67GiB 231.67GiB 0.00B
 
- disks  → Samsung SSD 850 EVO 250GB, disk is OK, GUID Partition Table
 
- 
  ‘/dev/sda1 EFI system 537MB
 
- 
   ‘/dev/sda2  Ext4 ver 1.0 -not mounted, Linux Filesystem
 
- 
   ‘/dev/sda3  LUKS Encryption ver 2 – Locked, Linux Filesystem       
 
- fdisk -l shows same info as disks program
 
- cryptsetup -v open --type=luks2 /dev/sda3 ghs, No usable token is available.
 
- cryptsetup luksDump /dev/sda3
 
LUKS header information
- Version:        2
 
- Epoch:          3
 
- Metadata area:  16384 [bytes]
 
- Keyslots area:  16744448 [bytes]
 
- UUID:           51459cec-1774-491a-a8b2-0c4c88351cc1
 
- Label:          (no label)
 
- Subsystem:      (no subsystem)
 
- Flags:          (no flags)
 
- 
 - Data segments:
 
- 
0: crypt
 
- 
  offset: 16777216 [bytes]
 
- 
  length: (whole device)
 
- 
  cipher: aes-xts-plain64
 
- 
  sector: 512 [bytes]
 
- 
 - Keyslots:
 
- 
0: luks2
 
- 
  Key:        512 bits
 
- 
  Priority:   normal
 
- 
  Cipher:     aes-xts-plain64
 
- 
  Cipher key: 512 bits
 
- 
  PBKDF:      argon2i
 
- 
  Time cost:  6
 
- 
  Memory:     1048576
 
- 
  Threads:    4
 
- 
  Salt:       5a 7c 75 fb 9f 9d f0 c0 2d 77 d2 cc d5 20 3f cc 
 
- 
              88 35 0b f9 63 5c a9 8a 39 44 08 4b e1 aa e3 d2 
 
- 
  AF stripes: 4000
 
- 
  AF hash:    sha256
 
- 
  Area offset:32768 [bytes]
 
- 
  Area length:258048 [bytes]
 
- 
  Digest ID:  0
 
- Tokens:
 
- Digests:
 
- 
0: pbkdf2
 
- 
  Hash:       sha256
 
- 
  Iterations: 131863
 
- 
  Salt:       28 00 57 e8 a6 5c d9 ba 29 5a 65 17 5b 0b 6e 59 
 
- 
              2a 60 fe 07 21 c5 41 79 34 a2 79 ae 84 d9 1e 27 
 
- 
  Digest:     f9 14 4d 3c 31 80 44 29 f3 bb e1 74 90 84 7f 9d 
 
- 
              72 44 fe 8d 38 1f 03 b8 a3 e2 e9 b8 15 40 a3 a8 "
 
- 
 - 
 
QUESTIONS:
What are the methods and commands to mount an encrypted disc on an Ubuntu 22.04 USB Live USB system ?
 
Is there any luksDump information that might indicate a hardware or software problem ?
 
Is it possible that the LUKS password was changed or LUKS system files modified before I rebooted  ?  (I understand this would require sudo priviledges)
 
Is there any discernable changes on modified LUKS system files that are checkable for changes before I reboot ?
 
How can you tell if the LUKS passphrases have changed ?
                        ----====----