Skip to main content
Question Protected by dr_
hexdumps
Source Link
outtaluk
  • 51
  • 1
  • 3
New Info
Source Link
outtaluk
  • 51
  • 1
  • 3

EDIT: This forum post suggests a link between Samsung SSDs, and a discard flag in crypttab causing corruption: https://bbs.archlinux.org/viewtopic.php?pid=1846810#p1846810

Three of my LUKS partitions were on a Samsung EVO SSD. I can't confirm I wasn't using a discard flag in my crypttab.

EDIT: This forum post suggests a link between Samsung SSDs, and a discard flag in crypttab causing corruption: https://bbs.archlinux.org/viewtopic.php?pid=1846810#p1846810

Three of my LUKS partitions were on a Samsung EVO SSD. I can't confirm I wasn't using a discard flag in my crypttab.

More Commands
Source Link
outtaluk
  • 51
  • 1
  • 3
$ sudo cryptsetup -v isLuks /dev/sdb1
Command successful.
$ sudo cryptsetup luksDump /dev/sdb1
LUKS header information for /dev/sdb1

Version:        1
Cipher name:    aes
Cipher mode:    xts-plain64
Hash spec:      sha512
Payload offset: 4096
MK bits:        512
MK digest:      08 ca 09 9f c3 b0 cf cf bc 36 97 52 2c 03 4d c3 1e 0b fe c9 
MK salt:        4b 76 75 23 1e d5 7a ad 18 bc 37 e4 42 55 51 a3 
                7a ef e1 f2 c4 dc d0 fe 71 27 f1 64 d7 b6 1c ba 
MK iterations:  732500
UUID:           89e80b59-cb5a-42c8-8001-ecf92206aca6

Key Slot 0: ENABLED
    Iterations:             5878300
    Salt:                   59 3e cb 7f 11 c8 93 db 1e 62 0c 98 d1 c6 6e fc 
                            ea 65 f2 6d ff a7 20 c2 48 69 d2 2a 5b 76 07 2e 
    Key material offset:    8
    AF stripes:             4000
Key Slot 1: ENABLED
    Iterations:             2400937
    Salt:                   18 26 74 ce 42 57 cc e8 82 f5 23 ef 65 1d a0 67 
                            65 52 c2 3e 3f 2c d0 9f 00 88 e2 6d 7c 14 e6 fa 
    Key material offset:    512
    AF stripes:             4000
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
$ sudo cryptsetup -v isLuks /dev/sdb1
Command successful.
$ sudo cryptsetup luksDump /dev/sdb1
LUKS header information for /dev/sdb1

Version:        1
Cipher name:    aes
Cipher mode:    xts-plain64
Hash spec:      sha512
Payload offset: 4096
MK bits:        512
MK digest:      08 ca 09 9f c3 b0 cf cf bc 36 97 52 2c 03 4d c3 1e 0b fe c9 
MK salt:        4b 76 75 23 1e d5 7a ad 18 bc 37 e4 42 55 51 a3 
                7a ef e1 f2 c4 dc d0 fe 71 27 f1 64 d7 b6 1c ba 
MK iterations:  732500
UUID:           89e80b59-cb5a-42c8-8001-ecf92206aca6

Key Slot 0: ENABLED
    Iterations:             5878300
    Salt:                   59 3e cb 7f 11 c8 93 db 1e 62 0c 98 d1 c6 6e fc 
                            ea 65 f2 6d ff a7 20 c2 48 69 d2 2a 5b 76 07 2e 
    Key material offset:    8
    AF stripes:             4000
Key Slot 1: ENABLED
    Iterations:             2400937
    Salt:                   18 26 74 ce 42 57 cc e8 82 f5 23 ef 65 1d a0 67 
                            65 52 c2 3e 3f 2c d0 9f 00 88 e2 6d 7c 14 e6 fa 
    Key material offset:    512
    AF stripes:             4000
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
added 42 characters in body
Source Link
outtaluk
  • 51
  • 1
  • 3
Loading
Added commands
Source Link
outtaluk
  • 51
  • 1
  • 3
Loading
Post Migrated Here from serverfault.com (revisions)
Source Link
outtaluk
outtaluk
Loading