-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fail to unlock LUKS by password #202
Comments
In your boot parameters you specify crypt device name But your root is Try to change root to |
Also why there are so many password retries for |
Sorry about the confusion, I was hiding the real name of the root volume. The scheme is an LVM on LUKS and the parameter real value is
That is reason of my question. I was writing the right password. I tried many times and always giving me this. Furthermore, I'm able to boot through another efi binary that has been bundled with the mkinitcpio, so the partition and the password are ok. If we need to debug this, is there any way of testing the booster decryption separately? Maybe a simple small program to open it using the luks go module? I've enable the debug mode and no other messages appear during the unlocking attempts. |
LVM-on-LUKS is supported by booster. So it should be fine. The best way to start debugging is to enable debug logs with |
It is a weird issue. If the password failed due to some missing modules, then an error message would be printed. But here we have no any messages. Are you sure you type the correct password for I would start with trying the latest changes from Line 363 in d8348d2
Also, do you use any non-standard cyphers/hash functions for your LUKS partition? Do you remember how did you format it? |
I believe you need to use
Correct, both derivation functions are supported. If the problem was related to a missing algorithm it would print an error message. Could you please provide the luks partition info with |
I didn't remember that command, I suppose that I used that.
Sure, this is the whole output of the command, omitting salts, digests and UUID.
EDIT: I also realised that I had |
I'm having the same problem, with LUKS2 (also converted from LUKS1) on LVM and ext4 as root filesystem. The password is good as i can boot with mkinitcpio image. |
After checking debug messages i got the unknown digest error : whirlpool. I forgot the other install was using sha-3, as the ciphers were the same. However the error message should give the unknown cipher/digest error by default, without adding the debug kernel parameter, as i was getting the same Anyway, i guess i'll have to wait until support is added, as per this issue. |
@deathtrip I just added |
After trying the new release, i still can't unlock the volume with my password. Except now i don't get any unknown digest error warnings. The install without whirlpool works fine. So now i'm not sure if it's the hash or something else. |
I am also running into this. I cannot open a LUKS2 device that was converted from LUKS1. As described in this issue, the password always seems wrong even though it is definitely correct. Prior to the conversion, booster worked fine. Additionally, I have other machines which use a freshly installed LUKS2 (instead of a converted one) where Booster also works fine. I suppose |
I debugged this further and this seems to be a bug in luks.go. See: anatol/luks.go#11 |
LUKS1 was limited to a 20 byte digest length. With LUKS2 this limitation was lifted. However, it seems that for LUKS volumes which were converted from LUKS1 to LUKS2, the digest length it still 20 bytes. This commit proposes using the length of the expected digest to determine the digit length in use. For this purpose, it only compares the first n bytes of the generated digest with the expected digest. This fixes compatibility of luks.go with volumes converted from LUKS1. Fixes: anatol#11 See also: anatol/booster#202
LUKS1 was limited to a 20 byte digest length. With LUKS2 this limitation was lifted. However, it seems that for LUKS volumes which were converted from LUKS1 to LUKS2, the digest length it still 20 bytes. This commit proposes using the length of the expected digest to determine the digit length in use. For this purpose, it only compares the first n bytes of the generated digest with the expected digest. This fixes compatibility of luks.go with volumes converted from LUKS1. Fixes: anatol#11 See also: anatol/booster#202
I also only had problems on a device converted from LUKS1 to LUKS2. |
LUKS1 was limited to a 20 byte digest length. With LUKS2 this limitation was lifted. However, it seems that for LUKS volumes which were converted from LUKS1 to LUKS2, the digest length it still 20 bytes. This commit proposes using the length of the expected digest to determine the digit length in use. For this purpose, it only compares the first n bytes of the generated digest with the expected digest. This fixes compatibility of luks.go with volumes converted from LUKS1. Fixes: #11 See also: anatol/booster#202
I'm booting Arch with a booster UKI bundled with
sbctl
(maybe this is causing the issue?) and have LVM on LUKS for root partition. Booster is asking for the passphrase but no matter what it always fails.My password does not have any special character but I enabled vconsole anyway to see if it was a problem with the keymap, but the same. I've also tried to add a very simple password entry but it also fails. The LUKS partition is ok because I'm currently able to boot through a dracut image. I don't know if booster works on my machine bundling the image with a bootloader because I have an encrypted boot and it's a bit more complicated to configure anything that is not an UKI.
This is the current config:
EDIT: commands to generate the image:
and the content of
/etc/kernel/cmdline
which is sourced bysbctl
:The text was updated successfully, but these errors were encountered: