-
Is there any chance that there's a way to make it so busybox/dropbear and yubikey-luks can play nice together? I had my system set up so it would allow an ssh sign into the luks encrypted disk. Once I…
-
Manual partition, encrypt root partition without separate /boot partition, grub attempts to decrypt the cryptouuid, but fails claiming device doesn't exist? learning the actual UUID including the hyph…
-
### Describe the bug
#### Context
I have the following hierarchy of block devices.
In particular, `nvme0n1p2` is a LUKS-encrypted partition (`cryptoroot`), which constitutes an LVM physical volum…
-
**Is your feature request related to a problem? Please describe.**
After certain dom0 updates it becomes necessary to reseal the TPM DUK (e.g. new kernel, so boot option list changed). The following …
-
It found out the password using just the luks header.
Using:
"sudo dd if=/dev/sda5 of=/tmp/luks-header bs=1M count=10"
"bruteforce-luks -t 4 -l x -m x -b "abcde123" /tmp/luks-header"
password fou…
-
I get the error "Invalid or unsupported LUKS cipher mode" when running mode 14600 on a LUKS with the following properties:
Version: 1
Cipher name: aes
Cipher mode: cbc
Hash spec: …
-
### Description of issue/question
I am using a ODroid HC2 with a LUKS encrypted disk and NFS mountpoints for several shares.
The NFS mountpoints are being created under `/export` and uses a bin…
-
My system's storage is configured as dm-raid on LVM on LUKS. Each of my physical disks contains a LUKS partition whose plaintext is an LVM PV. All of these PVs are collected into a single VG, and then…
-
```
Dec 04 20:51:18 thinkpad systemd-cryptsetup[1588]: Cannot use device /dev/nvme0n1p2 which is in use (already mapped or mounted).
Dec 04 20:51:18 thinkpad systemd-cryptsetup[1588]: Failed to acti…
-
I did my first try with linux-tkg on debian testing. The resulting packages are linux-image-6.6.18-tkg-eevdf_6.6.18-1_amd64.deb and linux-headers-6.6.18-tkg-eevdf_6.6.18-1_amd64.deb
But I can not …
mabod updated
7 months ago