UBUNTU 20.04LTS LUKS PASSPHRASE FAIL
UBUNTU 20.04 LTS (FULL DISC ENCRYPTION) INITIAL SITUATION:
Upon rebooting my 20.04 LTS the LUKS passphrase was not accepted, with these messages.
- reboot ….
- please unlock disc sda3_crypt
- 3x cryptsetup failed, bad password or options ?
- volume group “vgubuntu” not found
- cannot proceed volume group vgubuntu
- done.
- …
- missing modules (cat proc modules: ls /dev)
- ALERT! /dev/mapper/vgunbuntu-root does not exist
- Dropping to shell
- BusyBox V1.30.1 (Ubuntu 1:1.30.1-4 ubuntu6.4) builtin shell (ash)
- (initramfs)_
"I only ever added one LUKS password and have never modified any LUKS settings.
Unfortunately I didn’t complete the planned backup in prep of Ubuntu 22.04 LTS upgrade.
I’m reading the following, but I’m still not confident about the GRUB, BUSYBOX, LUKS and INITRAMFS commands."
https://help.ubuntu.com/community/ManualFullSystemEncryption/Troubleshooing
sda3_crypt: cryptsetup failed after 20.04 to 22.04 upgrade
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/1979159
UBUNTU 22.04 USB LIVE SYSTEM COMMAND RESULTS
ON UBUNTU 20.04 LUKS FULL ENCRYPTED DRIVE:
-lsblk -> sda has
- sda1 8:1 0 512M 0 part - sda2 8:2 0 732M 0 part - sda3 8:3 0 231.7G 0 part
- gparted → ‘/dev/sda1 ! EFI SYSTEM PARTITION fat32 512.00MB boot,esp
-
‘/dev/sda2 ext4 732.00MB 209.70MB 522/30MB
-
‘/dev/sda3 [Encrypted] 231.67GiB 231.67GiB 0.00B
- disks → Samsung SSD 850 EVO 250GB, disk is OK, GUID Partition Table
-
‘/dev/sda1 EFI system 537MB
-
‘/dev/sda2 Ext4 ver 1.0 -not mounted, Linux Filesystem
-
‘/dev/sda3 LUKS Encryption ver 2 – Locked, Linux Filesystem
- fdisk -l shows same info as disks program
- cryptsetup -v open --type=luks2 /dev/sda3 ghs, No usable token is available.
- cryptsetup luksDump /dev/sda3
LUKS header information
- Version: 2
- Epoch: 3
- Metadata area: 16384 [bytes]
- Keyslots area: 16744448 [bytes]
- UUID: 51459cec-1774-491a-a8b2-0c4c88351cc1
- Label: (no label)
- Subsystem: (no subsystem)
- Flags: (no flags)
-
- Data segments:
-
0: crypt
-
offset: 16777216 [bytes]
-
length: (whole device)
-
cipher: aes-xts-plain64
-
sector: 512 [bytes]
-
- Keyslots:
-
0: luks2
-
Key: 512 bits
-
Priority: normal
-
Cipher: aes-xts-plain64
-
Cipher key: 512 bits
-
PBKDF: argon2i
-
Time cost: 6
-
Memory: 1048576
-
Threads: 4
-
Salt: 5a 7c 75 fb 9f 9d f0 c0 2d 77 d2 cc d5 20 3f cc
-
88 35 0b f9 63 5c a9 8a 39 44 08 4b e1 aa e3 d2
-
AF stripes: 4000
-
AF hash: sha256
-
Area offset:32768 [bytes]
-
Area length:258048 [bytes]
-
Digest ID: 0
- Tokens:
- Digests:
-
0: pbkdf2
-
Hash: sha256
-
Iterations: 131863
-
Salt: 28 00 57 e8 a6 5c d9 ba 29 5a 65 17 5b 0b 6e 59
-
2a 60 fe 07 21 c5 41 79 34 a2 79 ae 84 d9 1e 27
-
Digest: f9 14 4d 3c 31 80 44 29 f3 bb e1 74 90 84 7f 9d
-
72 44 fe 8d 38 1f 03 b8 a3 e2 e9 b8 15 40 a3 a8 "
-
-
QUESTIONS:
What are the methods and commands to mount an encrypted disc on an Ubuntu 22.04 USB Live USB system ?
Is there any luksDump information that might indicate a hardware or software problem ?
Is it possible that the LUKS password was changed or LUKS system files modified before I rebooted ? (I understand this would require sudo priviledges)
Is there any discernable changes on modified LUKS system files that are checkable for changes before I reboot ?
How can you tell if the LUKS passphrases have changed ?
----====----