Eu tenho um problema muito grande. Eu tenho o Ubuntu 14.04 (instalação padrão com ecryption de disco completo - luks). Ontem suspendi meu laptop e depois de algumas horas meu laptop foi descarregado.
Quando liguei meu laptop, minha senha não funcionou. Tenho 100% de certeza de que essa senha está correta e a localidade do meu sistema está boa. Eu verifiquei também esta senha no outro Ubuntu (live cd versão 14.04) e eu tive o mesmo problema (nenhuma chave disponível com esta senha).
Recebi esta mensagem no meu console: nenhuma chave disponível com esta frase secreta. Eu não sei
Estes são alguns registros do meu computador: Logs de reparação cryptsetup é muito estranho porque IMHO está tudo bem. Como posso obter provas de que, por exemplo, o cabeçalho está quebrado ou o slot de chaves está quebrado? o que fazer. Eu perdi todos os meus dados? Por favor me ajude.
freeman@freeman:~$ sudo cryptsetup -v luksDump /dev/sda5
LUKS header information for /dev/sda5
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha1
Payload offset: 4096
MK bits: 512
MK digest: 60 88 7c 28 18 69 31 42 ce 4d 64 a0 20 9f f1 95 fb 03 e6 9b
MK salt: 26 e8 60 b4 55 7b bd c6 8a 0c 2c 23 a3 9a 38 b2
cd 5a 77 7e 45 ba 68 e1 ae 52 ce 8c f9 e9 70 8c
MK iterations: 35250
UUID: d7431ab7-c761-4e7f-a1b9-5d7bc77f20cd
Key Slot 0: ENABLED
Iterations: 140968
Salt: 3b 86 ac 53 70 70 1e 84 06 fc 7f 9b 16 bc ac 14
c0 6a 7f a6 18 10 3c 81 a7 9d d4 95 4d 3f 2a f8
Key material offset: 8
AF stripes: 4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
Command successful.
----------------------------------------------------------------------------------------
freeman@freeman:~$ sudo cryptsetup luksOpen /dev/sda5 aaa
Enter passphrase for /dev/sda5:
No key available with this passphrase.
----------------------------------------------------------------------------------------
# cryptsetup 1.4.3 processing "cryptsetup luksOpen /dev/sda5 test231 --debug"
# Running command luksOpen.
# Locking memory.
# Allocating crypt device /dev/sda5 context.
# Trying to open and read device /dev/sda5.
# Initialising device-mapper backend, UDEV is enabled.
# Detected dm-crypt version 1.12.1, dm-ioctl version 4.25.0.
# Trying to load LUKS1 crypt type from device /dev/sda5.
# Crypto backend (gcrypt 1.5.0) initialized.
# Reading LUKS header of size 1024 from device /dev/sda5
# Timeout set to 0 miliseconds.
# Password retry count set to 3.
# Password verification disabled.
# Iteration time set to 1000 miliseconds.
# Activating volume test231 [keyslot -1] using [none] passphrase.
# dm status test231 OF [16384] (*1)
# Interactive passphrase entry requested.
Enter passphrase for /dev/sda5:
# Trying to open key slot 0 [ACTIVE_LAST].
# Reading key slot 0 area.
# DM-UUID is CRYPT-TEMP-temporary-cryptsetup-7649
# Udev cookie 0xd4de08b (semid 2818048) created
# Udev cookie 0xd4de08b (semid 2818048) incremented to 1
# Udev cookie 0xd4de08b (semid 2818048) incremented to 2
# Udev cookie 0xd4de08b (semid 2818048) assigned to CREATE task(0) with flags > > DISABLE_SUBSYSTEM_RULES DISABLE_DISK_RULES DISABLE_OTHER_RULES (0xe)
# dm create temporary-cryptsetup-7649 CRYPT-TEMP-temporary-cryptsetup-7649 OF [16384] (*1)
# dm reload temporary-cryptsetup-7649 OFRW [16384] (*1)
# dm resume temporary-cryptsetup-7649 OFRW [16384] (*1)
# temporary-cryptsetup-7649: Stacking NODE_ADD (252,0) 0:6 0660 [verify_udev]
# temporary-cryptsetup-7649: Stacking NODE_READ_AHEAD 256 (flags=1)
# Udev cookie 0xd4de08b (semid 2818048) decremented to 1
# Udev cookie 0xd4de08b (semid 2818048) waiting for zero
# Udev cookie 0xd4de08b (semid 2818048) destroyed
# temporary-cryptsetup-7649: Processing NODE_ADD (252,0) 0:6 0660 [verify_udev]
# temporary-cryptsetup-7649: Processing NODE_READ_AHEAD 256 (flags=1)
# temporary-cryptsetup-7649 (252:0): read ahead is 256 # temporary-cryptsetup-7649 (252:0): Setting read ahead to 256
# Udev cookie 0xd4dcce0 (semid 2850816) created
# Udev cookie 0xd4dcce0 (semid 2850816) incremented to 1# Udev cookie 0xd4dcce0 (semid 2850816) incremented to 2
# Udev cookie 0xd4dcce0 (semid 2850816) assigned to REMOVE task(2) with flags (0x0)
# dm remove temporary-cryptsetup-7649 OFT [16384] (*1)
# temporary-cryptsetup-7649: Stacking NODE_DEL [verify_udev]
# Udev cookie 0xd4dcce0 (semid 2850816) decremented to 1
# Udev cookie 0xd4dcce0 (semid 2850816) waiting for zero
# Udev cookie 0xd4dcce0 (semid 2850816) destroyed
# temporary-cryptsetup-7649: Processing NODE_DEL [verify_udev]
# Trying to open key slot 1 [INACTIVE].
# Trying to open key slot 2 [INACTIVE].
# Trying to open key slot 3 [INACTIVE].
# Trying to open key slot 4 [INACTIVE].
# Trying to open key slot 5 [INACTIVE].
# Trying to open key slot 6 [INACTIVE].
# Trying to open key slot 7 [INACTIVE].
No key available with this passphrase.
# Interactive passphrase entry requested.
ubuntu@ubuntu:~$ sudo cryptsetup repair /dev/sda5 --debug
# cryptsetup 1.6.1 processing "cryptsetup repair /dev/sda5 --debug"
# Running command repair.
# Locking memory.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating crypt device /dev/sda5 context.
# Trying to open and read device /dev/sda5.
# Initialising device-mapper backend library.
# Trying to load LUKS1 crypt type from device /dev/sda5.
# Crypto backend (gcrypt 1.5.3) initialized.
# Reading LUKS header of size 1024 from device /dev/sda5
# Key length 64, device size 499615744 sectors, header size 4036 sectors. No known problems detected for LUKS header.
# Releasing crypt device /dev/sda5 context.
# Releasing device-mapper backend.
# Unlocking memory. Command successful.