[pkg-cryptsetup-devel] Bug#541835: Bug#541835: cryptsetup: unclear kernel requirements

Jonas Meurer jonas at freesources.org
Sun Aug 16 21:10:58 UTC 2009


hey,

On 16/08/2009 Celejar wrote:
> ~# cryptsetup luksDump /dev/hda4
> 
> LUKS header information for /dev/hda4
> 
> Version:       	1
> Cipher name:   	aes
> Cipher mode:   	cbc-essiv:sha256

so you at least need aes, cbc and sha256 kernel modules.

> > # dmsetup targets
> > # lsmod
> > # cat /proc/crypto

the output of these commands would only be interesting when running the
kernel that causes cryptsetup to fail.

> Note: these are from a kernel that handles the LUKS volume successfully
> (2.6.31-rc6 from mainline git repo).  Getting the output from one of my
> non-working kernels would be more difficult, since the entire system
> (except /boot) is on LVM on top of the LUKS volume, and my kernels'
> fail during the initrds' (made by initramfs-tools) attempts to unlock
> the LUKS volume.  I have tried to explore the problem using the
> 'break=mount' kernel parameter, but even after manually modprobing the
> aes, cbc, blkcipher, dm-crypt modules, the kernel can't unlock the
> volume.

all of the above programs (cryptsetup, dmsetup, lsmod and cat) should be
available within the initramfs, so executing them from the emergency
shell shouldn't be a problem. you could pipe them into some file on
/boot after mounting it.

greetings,
 jonas
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-cryptsetup-devel/attachments/20090816/7d50a9de/attachment.pgp>


More information about the pkg-cryptsetup-devel mailing list