You are not logged in.
Pages: 1
I had a 256G SSD (/dev/sda) and a 1T HDD (/dev/sdb) on my laptop, and created a LVM on LUKS2 configuration is as follows (this is from my installation log):
$ sudo lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
sda 8:0 0 238.5G 0 disk
├─sda1 8:1 0 512M 0 part /boot
└─sda2 8:2 0 238G 0 part
└─pvg 254:0 0 238G 0 crypt
├─pvg-rootfs 254:1 0 25G 0 lvm /
├─pvg-swap 254:2 0 8G 0 lvm [SWAP]
└─pvg-home 254:3 0 205G 0 lvm /home
sdb 8:16 0 931.5G 0 disk
├─sdb1 8:17 0 867G 0 part
| └─svg // manually added, this group disappered now
| └─svg-data
| └─svg-misc
└─sdb2 8:18 0 64.5G 0 part
$ sudo vgs
VG #PV #LV #SN Attr VSize VFree
pvg 1 3 0 wz--n- <237.96g 0
svg 1 2 0 wz--n- 866.98g 0
$ sudo lvs
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert
home pvg -wi-ao---- <204.96g
rootfs pvg -wi-ao---- 25.00g
swap pvg -wi-ao---- 8.00g
data svg -wi-a----- 49.98g
misc svg -wi-ao---- 817.00g
Everything works well until I was trying to replace my 256G SSD (/dev/sda) with a new 1T SSD and do a fresh install on the new SSD.
After I replaced the old SSD with the new one and pluged in a usb installation stick I found the usb stick wasn't working, I couldn't boot from the system on the usb stick.
So I changed back to the old SSD, but then I found I could't boot from the system on the old SSD (boot entry disappered on grub menu).
Later I got a working usb arch installation stick and repaired the bootloader on /dev/sda1, successfully booted from the system on the old SSD, but only to found that I couldn't open /dev/sdb1 (lvm on luks too) any more (/dev/sdb2 is not on lvm on luks and works well).
I'm wondering if the partition header is corrupted. If it's not, how can I fix it? Can anyone help me?
commands output:
$ sudo cryptsetup open /dev/sdb1 cryptdata
Device /dev/sdb1 is not a valid LUKS device.
$ sudo lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
sda 8:0 0 238.5G 0 disk
├─sda1 8:1 0 512M 0 part /boot
└─sda2 8:2 0 238G 0 part
└─pvg 254:0 0 238G 0 crypt
├─pvg-rootfs 254:1 0 25G 0 lvm /
├─pvg-swap 254:2 0 8G 0 lvm [SWAP]
└─pvg-home 254:3 0 205G 0 lvm /home
sdb 8:16 0 931.5G 0 disk
├─sdb1 8:17 0 867G 0 part
└─sdb2 8:18 0 64.5G 0 part
$ sudo blkid
/dev/mapper/pvg-rootfs: UUID="f2b1adc5-d68c-4eeb-b49c-5b3213a4fc56" BLOCK_SIZE="4096" TYPE="ext4"
/dev/sdb2: UUID="8b47ef85-ff41-4c55-8bcd-549ea0516425" BLOCK_SIZE="4096" TYPE="ext4" PARTLABEL="Backup" PARTUUID="4bf3b97c-7d91-4f72-a44b-4000e67604cf"
/dev/sdb1: UUID="75c70b14-da57-43de-9f01-f2479abaaaf2" TYPE="crypto_LUKS" PTUUID="275899f6-73f5-4882-9556-a6e8d46219f4" PTTYPE="gpt" PARTLABEL="Data" PARTUUID="59a26ca8-f6bf-4847-ad84-806cf56239c8"
/dev/mapper/pvg-swap: UUID="11b8766a-82b7-4513-bde0-ea9e18dd9220" TYPE="swap"
/dev/mapper/pvg: UUID="RG0H0t-VPF9-N1fw-4VJq-t2cZ-3hPx-kMWQCG" TYPE="LVM2_member"
/dev/sda2: UUID="7f1eac93-56fd-4d96-a021-486737c85b53" TYPE="crypto_LUKS" PARTLABEL="crypt" PARTUUID="72326dfb-63d8-4db4-a9d5-2b93edd98b10"
/dev/sda1: UUID="CE6E-C744" BLOCK_SIZE="512" TYPE="vfat" PARTLABEL="boot" PARTUUID="11b174fe-c107-4b34-956f-3474a3aaae9b"
/dev/mapper/pvg-home: UUID="98e190ff-2410-4764-a88e-a34311384c25" BLOCK_SIZE="4096" TYPE="ext4"
$ sudo vgs
VG #PV #LV #SN Attr VSize VFree
pvg 1 3 0 wz--n- <237.96g 0
$ sudo lvs
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert
home pvg -wi-ao---- <204.96g
rootfs pvg -wi-ao---- 25.00g
swap pvg -wi-ao---- 8.00g
This is the cryptsetup output:
$ sudo cryptsetup --debug luksDump /dev/sdb1
# cryptsetup 2.6.1 processing "cryptsetup --debug luksDump /dev/sdb1"
# Verifying parameters for command luksDump.
# Running command luksDump.
# Installing SIGINT/SIGTERM handler.
# Unblocking interruption on signal.
# Allocating context for crypt device /dev/sdb1.
# Trying to open and read device /dev/sdb1 with direct-io.
# Initialising device-mapper backend library.
# Trying to load any crypt type from device /dev/sdb1.
# Crypto backend (OpenSSL 3.0.8 7 Feb 2023 [default][legacy]) initialized in cryptsetup library version 2.6.1.
# Detected kernel Linux 6.2.7-arch1-1 x86_64.
# Loading LUKS2 header (repair disabled).
# Acquiring read lock for device /dev/sdb1.
# Opening lock resource file /run/cryptsetup/L_8:17
# Verifying lock handle for /dev/sdb1.
# Device /dev/sdb1 READ lock taken.
# Trying to read primary LUKS2 header at offset 0x0.
# Opening locked device /dev/sdb1
# Verifying locked device handle (bdev)
# LUKS2 header version 2 of size 16384 bytes, checksum sha256.
# Checksum:0200eeffffff01000000ffff5f6c000000000000000000000000000000000000 (on-disk)
# Checksum:2ba4f6dad20efbcd4e970ee3cd2583aab93d2a0e93e1f12ba4bbe2b23798560b (in-memory)
# LUKS2 header checksum error (offset 0).
# Trying to read secondary LUKS2 header at offset 0x4000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x8000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x10000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x20000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x40000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x80000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x100000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x200000.
# Reusing open ro fd on device /dev/sdb1
# Trying to read secondary LUKS2 header at offset 0x400000.
# Reusing open ro fd on device /dev/sdb1
# LUKS2 header read failed (-22).
# Device /dev/sdb1 READ lock released.
Device /dev/sdb1 is not a valid LUKS device.
# Releasing crypt device /dev/sdb1 context.
# Releasing device-mapper backend.
# Closing read only fd for /dev/sdb1.
Command failed with code -1 (wrong or missing parameters).
hexdump of the partition header:
$ sudo dd if=/dev/sdb1 count=20 | hexdump -C
00000000 4c 55 4b 53 ba be 00 02 00 00 00 00 00 00 40 00 |LUKS..........@.|
00000010 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00000040 00 00 00 00 00 00 00 00 73 68 61 32 35 36 00 00 |........sha256..|
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000060 00 00 00 00 00 00 00 00 60 8d 03 db 43 f1 95 83 |........`...C...|
00000070 ac e0 d2 3f 38 00 08 9d 8c d9 d0 ac 44 b2 ac 75 |...?8.......D..u|
00000080 85 1e 03 dc 4e 6b fd a5 5c c6 8b e2 77 7b 00 eb |....Nk..\...w{..|
00000090 66 dc 81 7d 29 05 f1 86 9d a2 86 3c f8 06 f7 0a |f..})......<....|
000000a0 af d7 68 72 29 2f a9 c8 37 35 63 37 30 62 31 34 |..hr)/..75c70b14|
000000b0 2d 64 61 35 37 2d 34 33 64 65 2d 39 66 30 31 2d |-da57-43de-9f01-|
000000c0 66 32 34 37 39 61 62 61 61 61 66 32 00 00 00 00 |f2479abaaaf2....|
000000d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
000001c0 02 00 ee ff ff ff 01 00 00 00 ff ff 5f 6c 00 00 |............_l..|
000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
00000200 45 46 49 20 50 41 52 54 00 00 01 00 5c 00 00 00 |EFI PART....\...|
00000210 f8 cc 25 6c 00 00 00 00 01 00 00 00 00 00 00 00 |..%l............|
00000220 ff ff 5f 6c 00 00 00 00 22 00 00 00 00 00 00 00 |.._l....".......|
00000230 de ff 5f 6c 00 00 00 00 f6 99 58 27 f5 73 82 48 |.._l......X'.s.H|
00000240 95 56 a6 e8 d4 62 19 f4 02 00 00 00 00 00 00 00 |.V...b..........|
00000250 80 00 00 00 80 00 00 00 51 35 36 04 00 00 00 00 |........Q56.....|
00000260 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00000400 28 73 2a c1 1f f8 d2 11 ba 4b 00 a0 c9 3e c9 3b |(s*......K...>.;|
00000410 26 28 7a 8e 60 01 4a 48 ab 9b 4d 6b d5 39 be 42 |&(z.`.JH..Mk.9.B|
00000420 00 08 00 00 00 00 00 00 ff 0f 10 00 00 00 00 00 |................|
00000430 00 00 00 00 00 00 00 00 62 00 6f 00 6f 00 74 00 |........b.o.o.t.|
00000440 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00000480 cb 7c 7d ca ed 63 53 4c 86 1c 17 42 53 60 59 cc |.|}..cSL...BS`Y.|
00000490 8a c9 6e 67 cf 13 3b 4a a2 ab 5f 73 2c c4 e1 66 |..ng..;J.._s,..f|
000004a0 00 10 10 00 00 00 00 00 ff f7 5f 6c 00 00 00 00 |.........._l....|
000004b0 00 00 00 00 00 00 00 00 63 00 72 00 79 00 70 00 |........c.r.y.p.|
000004c0 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |t...............|
000004d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00002800
Last edited by zeta0307 (2023-04-02 03:43:52)
Offline
That looks like a LUKS2 header but the primary header JSON metadata is missing
00000000 4c 55 4b 53 ba be 00 02 00 00 00 00 00 00 40 00 |LUKS..........@.|
00000010 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00000040 00 00 00 00 00 00 00 00 73 68 61 32 35 36 00 00 |........sha256..|
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000060 00 00 00 00 00 00 00 00 fa a2 5a 53 37 ef 2c 7b |..........ZS7.,{|
00000070 d8 3e 37 ad bb e8 55 e6 88 8a 69 33 7d a5 a3 2e |.>7...U...i3}...|
00000080 7f 83 f6 d5 b4 d1 74 b1 a2 96 66 40 02 77 d5 c1 |......t...f@.w..|
00000090 1d f7 16 61 3f 4f b3 4b 61 93 93 dd f4 1b 8e 49 |...a?O.Ka......I|
000000a0 c8 5e cd 5e 6f c3 bb e3 32 38 38 66 30 39 63 65 |.^.^o...288f09ce|
000000b0 2d 32 33 37 61 2d 34 37 36 36 2d 61 37 37 63 2d |-237a-4766-a77c-|
000000c0 37 35 31 36 39 39 36 65 32 39 66 63 00 00 00 00 |7516996e29fc....|
000000d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
000001c0 9c 06 36 93 a7 bc 1c 27 ae ce 45 d9 63 35 b4 19 |..6....'..E.c5..|
000001d0 de 7b 5f 1d 28 b1 60 14 14 ac c5 13 fd ef 61 4b |.{_.(.`.......aK|
000001e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00001000 7b 22 6b 65 79 73 6c 6f 74 73 22 3a 7b 22 30 22 |{"keyslots":{"0"|
00001010 3a 7b 22 74 79 70 65 22 3a 22 6c 75 6b 73 32 22 |:{"type":"luks2"|
00001020 2c 22 6b 65 79 5f 73 69 7a 65 22 3a 36 34 2c 22 |,"key_size":64,"|
[...]
instead there is crap that should not be there (b.o.o.t c.r.y.p.t)
is the secondary header still around? starts at offset 0x4000, not covered by your hexdump
00004000 53 4b 55 4c ba be 00 02 00 00 00 00 00 00 40 00 |SKUL..........@.|
00004010 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 |................|
00004020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00004040 00 00 00 00 00 00 00 00 73 68 61 32 35 36 00 00 |........sha256..|
00004050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00004060 00 00 00 00 00 00 00 00 b2 f3 4f db b6 6b b3 e4 |..........O..k..|
00004070 e6 12 75 3f 67 e3 c0 f5 e8 8d 90 e9 6a 56 d7 08 |..u?g.......jV..|
00004080 cf 4b 8e 7e 45 ff 99 b5 05 b4 16 d3 14 bc 52 50 |.K.~E.........RP|
00004090 d8 05 aa ca c7 9a f1 ec e1 1e e5 e6 31 8e 80 43 |............1..C|
000040a0 30 6c 3c 32 82 37 9a 03 32 38 38 66 30 39 63 65 |0l<2.7..288f09ce|
000040b0 2d 32 33 37 61 2d 34 37 36 36 2d 61 37 37 63 2d |-237a-4766-a77c-|
000040c0 37 35 31 36 39 39 36 65 32 39 66 63 00 00 00 00 |7516996e29fc....|
000040d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00004100 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 |......@.........|
00004110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
000041c0 15 63 f3 49 d6 7d 79 48 42 9f 28 12 33 1d 46 38 |.c.I.}yHB.(.3.F8|
000041d0 53 a6 ae ec 06 0e b2 21 82 39 c0 c1 6b dc 38 91 |S......!.9..k.8.|
000041e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00005000 7b 22 6b 65 79 73 6c 6f 74 73 22 3a 7b 22 30 22 |{"keyslots":{"0"|
00005010 3a 7b 22 74 79 70 65 22 3a 22 6c 75 6b 73 32 22 |:{"type":"luks2"|
00005020 2c 22 6b 65 79 5f 73 69 7a 65 22 3a 36 34 2c 22 |,"key_size":64,"|
...
Finally there is key material (only one copy) which is ~250KB of random data per keyslot starting at offset 0x8000 (more specifically, offset and size as stated in the JSON header - which can differ from default after luksChangeKey etc.)
000052f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00008000 3d 57 8c a8 a3 60 90 1e 13 ac 37 6e 11 97 0c e2 |=W...`....7n....|
00008010 ac b1 28 1f 05 56 34 2a 83 90 36 4c c2 bf 78 c4 |..(..V4*..6L..x.|
00008020 97 78 bc 98 c8 fa a1 35 b8 ec 48 d3 e5 9b bd 78 |.x.....5..H....x|
... ~250KB of random data follows ...
You need an intact header (primary or secondary) as well as intact key material.
There is 'cryptsetup repair' and here an example how to use it: https://unix.stackexchange.com/question … 071#706071
But your case looks more severe so it might not help.
Last edited by frostschutz (2023-04-01 19:03:09)
Offline
I tried the method you linked, unfortunately it didn't work, 'cryptsetup repair' says isn't a valid LUKS device. There is JSON metadata at the secondary header, but magic byte signatures are missing. Key material seems also be there.
I've upload first 16M data of /dev/sdb1 to: https://filetransfer.io/data-package/ub8cVHmI#link.
$ sudo hexdump -s 0x0000 -n 0x8200 -C /dev/sdb1
00000000 4c 55 4b 53 ba be 00 02 00 00 00 00 00 00 40 00 |LUKS..........@.|
00000010 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00000040 00 00 00 00 00 00 00 00 73 68 61 32 35 36 00 00 |........sha256..|
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000060 00 00 00 00 00 00 00 00 60 8d 03 db 43 f1 95 83 |........`...C...|
00000070 ac e0 d2 3f 38 00 08 9d 8c d9 d0 ac 44 b2 ac 75 |...?8.......D..u|
00000080 85 1e 03 dc 4e 6b fd a5 5c c6 8b e2 77 7b 00 eb |....Nk..\...w{..|
00000090 66 dc 81 7d 29 05 f1 86 9d a2 86 3c f8 06 f7 0a |f..})......<....|
000000a0 af d7 68 72 29 2f a9 c8 37 35 63 37 30 62 31 34 |..hr)/..75c70b14|
000000b0 2d 64 61 35 37 2d 34 33 64 65 2d 39 66 30 31 2d |-da57-43de-9f01-|
000000c0 66 32 34 37 39 61 62 61 61 61 66 32 00 00 00 00 |f2479abaaaf2....|
000000d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
000001c0 02 00 ee ff ff ff 01 00 00 00 ff ff 5f 6c 00 00 |............_l..|
000001d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
000001f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 aa |..............U.|
00000200 45 46 49 20 50 41 52 54 00 00 01 00 5c 00 00 00 |EFI PART....\...|
00000210 f8 cc 25 6c 00 00 00 00 01 00 00 00 00 00 00 00 |..%l............|
00000220 ff ff 5f 6c 00 00 00 00 22 00 00 00 00 00 00 00 |.._l....".......|
00000230 de ff 5f 6c 00 00 00 00 f6 99 58 27 f5 73 82 48 |.._l......X'.s.H|
00000240 95 56 a6 e8 d4 62 19 f4 02 00 00 00 00 00 00 00 |.V...b..........|
00000250 80 00 00 00 80 00 00 00 51 35 36 04 00 00 00 00 |........Q56.....|
00000260 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00000400 28 73 2a c1 1f f8 d2 11 ba 4b 00 a0 c9 3e c9 3b |(s*......K...>.;|
00000410 26 28 7a 8e 60 01 4a 48 ab 9b 4d 6b d5 39 be 42 |&(z.`.JH..Mk.9.B|
00000420 00 08 00 00 00 00 00 00 ff 0f 10 00 00 00 00 00 |................|
00000430 00 00 00 00 00 00 00 00 62 00 6f 00 6f 00 74 00 |........b.o.o.t.|
00000440 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00000480 cb 7c 7d ca ed 63 53 4c 86 1c 17 42 53 60 59 cc |.|}..cSL...BS`Y.|
00000490 8a c9 6e 67 cf 13 3b 4a a2 ab 5f 73 2c c4 e1 66 |..ng..;J.._s,..f|
000004a0 00 10 10 00 00 00 00 00 ff f7 5f 6c 00 00 00 00 |.........._l....|
000004b0 00 00 00 00 00 00 00 00 63 00 72 00 79 00 70 00 |........c.r.y.p.|
000004c0 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |t...............|
000004d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00005000 7b 22 6b 65 79 73 6c 6f 74 73 22 3a 7b 22 30 22 |{"keyslots":{"0"|
00005010 3a 7b 22 74 79 70 65 22 3a 22 6c 75 6b 73 32 22 |:{"type":"luks2"|
00005020 2c 22 6b 65 79 5f 73 69 7a 65 22 3a 36 34 2c 22 |,"key_size":64,"|
00005030 61 66 22 3a 7b 22 74 79 70 65 22 3a 22 6c 75 6b |af":{"type":"luk|
00005040 73 31 22 2c 22 73 74 72 69 70 65 73 22 3a 34 30 |s1","stripes":40|
00005050 30 30 2c 22 68 61 73 68 22 3a 22 73 68 61 32 35 |00,"hash":"sha25|
00005060 36 22 7d 2c 22 61 72 65 61 22 3a 7b 22 74 79 70 |6"},"area":{"typ|
00005070 65 22 3a 22 72 61 77 22 2c 22 6f 66 66 73 65 74 |e":"raw","offset|
00005080 22 3a 22 33 32 37 36 38 22 2c 22 73 69 7a 65 22 |":"32768","size"|
00005090 3a 22 32 35 38 30 34 38 22 2c 22 65 6e 63 72 79 |:"258048","encry|
000050a0 70 74 69 6f 6e 22 3a 22 61 65 73 2d 78 74 73 2d |ption":"aes-xts-|
000050b0 70 6c 61 69 6e 36 34 22 2c 22 6b 65 79 5f 73 69 |plain64","key_si|
000050c0 7a 65 22 3a 36 34 7d 2c 22 6b 64 66 22 3a 7b 22 |ze":64},"kdf":{"|
000050d0 74 79 70 65 22 3a 22 61 72 67 6f 6e 32 69 22 2c |type":"argon2i",|
000050e0 22 74 69 6d 65 22 3a 36 2c 22 6d 65 6d 6f 72 79 |"time":6,"memory|
000050f0 22 3a 31 30 34 38 35 37 36 2c 22 63 70 75 73 22 |":1048576,"cpus"|
00005100 3a 34 2c 22 73 61 6c 74 22 3a 22 4d 5a 58 62 64 |:4,"salt":"MZXbd|
00005110 38 38 61 47 67 6e 61 37 59 31 63 66 54 45 68 4d |88aGgna7Y1cfTEhM|
00005120 68 69 66 38 59 4b 71 77 72 7a 4d 62 42 4b 4d 54 |hif8YKqwrzMbBKMT|
00005130 38 4e 31 39 46 41 3d 22 7d 7d 7d 2c 22 74 6f 6b |8N19FA="}}},"tok|
00005140 65 6e 73 22 3a 7b 7d 2c 22 73 65 67 6d 65 6e 74 |ens":{},"segment|
00005150 73 22 3a 7b 22 30 22 3a 7b 22 74 79 70 65 22 3a |s":{"0":{"type":|
00005160 22 63 72 79 70 74 22 2c 22 6f 66 66 73 65 74 22 |"crypt","offset"|
00005170 3a 22 31 36 37 37 37 32 31 36 22 2c 22 73 69 7a |:"16777216","siz|
00005180 65 22 3a 22 64 79 6e 61 6d 69 63 22 2c 22 69 76 |e":"dynamic","iv|
00005190 5f 74 77 65 61 6b 22 3a 22 30 22 2c 22 65 6e 63 |_tweak":"0","enc|
000051a0 72 79 70 74 69 6f 6e 22 3a 22 61 65 73 2d 78 74 |ryption":"aes-xt|
000051b0 73 2d 70 6c 61 69 6e 36 34 22 2c 22 73 65 63 74 |s-plain64","sect|
000051c0 6f 72 5f 73 69 7a 65 22 3a 35 31 32 7d 7d 2c 22 |or_size":512}},"|
000051d0 64 69 67 65 73 74 73 22 3a 7b 22 30 22 3a 7b 22 |digests":{"0":{"|
000051e0 74 79 70 65 22 3a 22 70 62 6b 64 66 32 22 2c 22 |type":"pbkdf2","|
000051f0 6b 65 79 73 6c 6f 74 73 22 3a 5b 22 30 22 5d 2c |keyslots":["0"],|
00005200 22 73 65 67 6d 65 6e 74 73 22 3a 5b 22 30 22 5d |"segments":["0"]|
00005210 2c 22 68 61 73 68 22 3a 22 73 68 61 32 35 36 22 |,"hash":"sha256"|
00005220 2c 22 69 74 65 72 61 74 69 6f 6e 73 22 3a 31 33 |,"iterations":13|
00005230 30 39 34 31 2c 22 73 61 6c 74 22 3a 22 66 45 73 |0941,"salt":"fEs|
00005240 61 6b 34 4f 53 4f 35 45 67 5a 2b 71 45 66 33 50 |ak4OSO5EgZ+qEf3P|
00005250 39 6a 42 56 38 7a 64 73 46 4c 71 2b 55 33 2f 4a |9jBV8zdsFLq+U3/J|
00005260 51 35 55 72 50 47 53 6b 3d 22 2c 22 64 69 67 65 |Q5UrPGSk=","dige|
00005270 73 74 22 3a 22 33 37 2b 4b 57 69 74 47 59 53 75 |st":"37+KWitGYSu|
00005280 6d 70 67 41 49 62 78 48 71 79 72 39 55 61 36 39 |mpgAIbxHqyr9Ua69|
00005290 66 78 48 31 31 68 41 51 33 4a 56 36 50 76 66 30 |fxH11hAQ3JV6Pvf0|
000052a0 3d 22 7d 7d 2c 22 63 6f 6e 66 69 67 22 3a 7b 22 |="}},"config":{"|
000052b0 6a 73 6f 6e 5f 73 69 7a 65 22 3a 22 31 32 32 38 |json_size":"1228|
000052c0 38 22 2c 22 6b 65 79 73 6c 6f 74 73 5f 73 69 7a |8","keyslots_siz|
000052d0 65 22 3a 22 31 36 37 34 34 34 34 38 22 7d 7d 00 |e":"16744448"}}.|
000052e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
00008000 4e 7c 93 ee 78 24 fb 13 2d 7a a9 00 d3 98 c1 51 |N|..x$..-z.....Q|
00008010 b0 d5 aa ca c2 6e 9a 16 e5 20 d3 6e a9 1a 65 4a |.....n... .n..eJ|
00008020 f5 df 3b 31 08 c8 0d 71 76 93 b8 dd c3 0f 7f 7c |..;1...qv......||
00008030 95 e6 ca d2 e2 8f cd 7e 59 b8 be d7 36 dc 98 24 |.......~Y...6..$|
00008040 7d c0 fb e5 30 34 d9 a6 ad 15 fe 48 76 7c 77 46 |}...04.....Hv|wF|
00008050 26 8e 8b e8 68 05 7f d9 fb 3a 64 9f b4 99 ba 0d |&...h....:d.....|
00008060 59 3f 0f aa d9 1c a2 99 d1 e7 8a b1 b6 e2 f6 41 |Y?.............A|
00008070 f4 9e 11 61 45 be b4 89 2d 7e 05 6f 1a d7 a7 50 |...aE...-~.o...P|
00008080 10 60 3b 98 1c 4c 2f 4e b4 2d a2 50 ca 7a a2 99 |.`;..L/N.-.P.z..|
00008090 50 c6 08 e5 ca f1 28 12 19 af 45 79 aa 87 f2 29 |P.....(...Ey...)|
000080a0 2e 46 81 64 35 8d 23 bb e5 2c be 85 f4 67 2e 12 |.F.d5.#..,...g..|
000080b0 20 33 0c e5 aa b4 ac a5 02 99 ff 28 17 f5 3e c9 | 3.........(..>.|
000080c0 b8 e2 5c a3 cf ff db 2d 2d 72 87 89 79 55 d9 91 |..\....--r..yU..|
000080d0 0c 27 1e c5 ba 60 7e 19 af a9 c9 ab 0b 65 a8 a8 |.'...`~......e..|
000080e0 a6 48 41 ed 19 62 9b ce 32 fa bc 24 84 c9 9c 7d |.HA..b..2..$...}|
000080f0 2b 3d b4 52 a3 b3 cc f6 4c 5c 77 10 a4 ef d5 70 |+=.R....L\w....p|
00008100 5f 39 36 c0 5a f6 9d 6e f4 ee 3a 92 75 d8 31 44 |_96.Z..n..:.u.1D|
00008110 4d 2e b4 3d 2c a0 fa 38 5c a8 ba 22 14 cd 20 64 |M..=,..8\..".. d|
00008120 01 fa 91 a1 f7 54 c0 99 53 1c c8 9e 73 3c 4a 4a |.....T..S...s<JJ|
00008130 f9 ac 08 fc 99 bd 96 ef cd 1e 2d d6 b3 c7 d5 d8 |..........-.....|
00008140 85 78 b1 a9 4e 9c ea 44 ef 45 1c 33 ac 37 69 75 |.x..N..D.E.3.7iu|
00008150 71 f4 31 31 a7 c4 8c 3a b1 1d 40 d0 65 23 76 89 |q.11...:..@.e#v.|
00008160 52 b0 8d 75 dd 4d e9 2a d1 e7 8b 0e 84 dc 78 e6 |R..u.M.*......x.|
00008170 44 e5 1e d8 02 e1 f6 17 87 56 f7 d5 be 7c 70 3b |D........V...|p;|
00008180 8a 56 3b f6 37 43 bf 91 b1 08 61 92 93 6a b0 0f |.V;.7C....a..j..|
00008190 4b 01 f8 7b 5d f0 43 39 06 02 8b 78 0a c3 ce 09 |K..{].C9...x....|
000081a0 93 07 bb 8c a9 f2 8c 6e de e7 e2 a7 c9 0a c6 48 |.......n.......H|
000081b0 33 51 09 75 92 f6 5e b6 d4 2b b4 18 1d 9d 1c 5d |3Q.u..^..+.....]|
000081c0 8f 7f c8 5c 97 82 af 40 5f 8f 03 04 e6 34 57 bf |...\...@_....4W.|
000081d0 66 5c 8b e2 f4 75 9a d5 70 c5 4b d1 7f 79 18 89 |f\...u..p.K..y..|
000081e0 dd 61 a2 3f 7d c9 15 cc 90 7c 48 d8 03 fc dc 9e |.a.?}....|H.....|
000081f0 26 95 e6 c2 4e 88 9f b2 3a 06 31 6f bf 51 1b bd |&...N...:.1o.Q..|
00008200
Offline
try it read-only ... https://filetransfer.io/data-package/3gvdgvRj#link
method when recovering a few magic bytes isn't enough: https://unix.stackexchange.com/a/741850/30851
Last edited by frostschutz (2023-04-04 01:00:18)
Offline
YES IT WORKS!! I've successfully open the LUKS device. I have many important files on this device, MANY MANY MANY THANKS TO YOU!!
Offline
Pages: 1