You are not logged in.
Hi there!
Since my last system-update my /home-Partition wouldn't be mounted at normal boot time so I've to do an 'cryptsetup open UUID=xxxxx-xxxx-xxxx-xxx-xxx crypthome'.
When I leave the emergency-shell after typing in my password for /home the system boots normaly.
I don't know why I've to open my /home-Partition manually. Does anyone have an idea?
My setup is this:
- /etc/fstab
# /dev/mapper/cryptroot
UUID=371853a1-e151-4860-sdfsf-dgdgdfg456456 / ext4 rw,relatime,data=ordered 0 1
# /dev/mapper/crypthome
UUID=b408e8e4-c932-4939-8a73-khlkg456456t /home ext4 rw,relatime,data=ordered 0 2
# /dev/nvme0n1p6
UUID=15FE-F049 /boot vfat rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=ascii,shortname=mixed,utf8,errors=remount-ro 0 2
# /dev/nvme0n1p7
UUID=4e4db615-e525-4ba0-034hnneo3 none swap defaults 0 0
- lsblk -f:
NAME FSTYPE FSVER LABEL UUID FSAVAIL FSUSE% MOUNTPOINTS
nvme0n1
├─nvme0n1p1 ntfs Wiederherstellung 6EF29540F2950E09
├─nvme0n1p2 vfat FAT32 F895-B8F8
├─nvme0n1p3
├─nvme0n1p4 ntfs 68ACB558ACB5sdf35
├─nvme0n1p5 ntfs B48AA7488Aasdasd234
├─nvme0n1p6 ntfs 203A1B163A1asd23
├─nvme0n1p7 vfat FAT32 15FE-F049 80M 59% /boot
├─nvme0n1p8 swap 1 4e4db615-e525-4ba0-8f5d-adsads243 [SWAP]
├─nvme0n1p9 crypto_LUKS 2 f31d7262-b1c4-42e0-85ec-9d1f5f73c027
│ └─cryptroot ext4 1.0 371853a1-e151-4860-sdfsf-dgdgdfg456456 67,9G 26% /
└─nvme0n1p10 crypto_LUKS 2 7d10a58b-4cf3-44d3-8e0a-39c396c15657h
└─crypthome ext4 1.0 b408e8e4-c932-4939-8a73-khlkg456456t 379,7G 53% /home
Hope you can help me.
Thanks
Last edited by fluffy-bunny (2022-12-20 20:23:33)
Offline
What's in /etc/crypttab?
Offline
Please edit your post to use [ code ] [ /code ] tags as it makes input/output much easier to read.
How are you booting? How are you decrypting home?
CLI Paste | How To Ask Questions
Arch Linux | x86_64 | GPT | EFI boot | refind | stub loader | systemd | LVM2 on LUKS
Lenovo x270 | Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz | Intel Wireless 8265/8275 | US keyboard w/ Euro | 512G NVMe INTEL SSDPEKKF512G7L
Offline
What's in /etc/crypttab?
The content of my '/etc/crypttab' is this:
# Configuration for encrypted block devices.
# See crypttab(5) for details.
# NOTE: Do not list your root (/) partition here, it must be set up
# beforehand by the initramfs (/etc/mkinitcpio.conf).
# <name> <device> <password> <options>
# home UUID=b8ad5c18-f445-495d-9095-c9ec4f9d2f37 /etc/mypassword1
# data1 /dev/sda3 /etc/mypassword2
# data2 /dev/sda5 /etc/cryptfs.key
# swap /dev/sdx4 /dev/urandom swap,cipher=aes-cbc-essiv:sha256,size=256
# vol /dev/sdb7 none
I think, my last update changed it but I'm not sure how I can see this!?
Offline
ok, so where are you expecting the container to be decrypted?
/etc/crypttab will not be overwritten automatically unless you haven't modified it at all. A .pacnew file would be created instead.
Offline
So probably you want to add home to crypttab so that it gets decrypted on boot? Right now you don't seem to have any mechanism for decrypting it?
If you configured crypttab before, pacman would not replace the file without telling you and likely wouldn't replace it at all. Look in /var/log/pacman.log for messages concerning .pacnew and/or .pacsave files. If you used something other than pacman to update, of course, that might affect what was done. pacmatic would ask you what to do, but I don't know about unofficial wrappers.
Edit: Should refresh before posting ....
Last edited by cfr (2022-12-20 23:23:41)
CLI Paste | How To Ask Questions
Arch Linux | x86_64 | GPT | EFI boot | refind | stub loader | systemd | LVM2 on LUKS
Lenovo x270 | Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz | Intel Wireless 8265/8275 | US keyboard w/ Euro | 512G NVMe INTEL SSDPEKKF512G7L
Offline
ok, so where are you expecting the container to be decrypted?
/etc/crypttab will not be overwritten automatically unless you haven't modified it at all. A .pacnew file would be created instead.
Thanks for your fast reply and help. I found 'my problem'. I think after my last update I've overwritten my '/etc/crypttab'. Now I added this to my '/etc/crypttab' and it works fine :
home UUID=7d10a58b-4cf3-44d3-8e0a-39c396c15657h cipher=aes-xts-plain64,size=512
Offline