Export to GitHub

blogfranz - LuksRecover.wiki


Introduction

How to recover your Ubuntu 10.04 (and possibly earlier) if you are using LUKS encryption based on http://www.ubuntugeek.com/rescue-an-encrypted-luks-lvm-volume.html

Steps

```

apt-get install lvm2 cryptsetup

modprobe dm-crypt

Reading all physical volumes. This may take a while...

vgchange -ay

root@ubuntu:~# cryptsetup luksOpen /dev/sda5 crypt Enter passphrase for /dev/sda5: Key slot 0 unlocked.

vgscan --mknodes

Reading all physical volumes. This may take a while... Found volume group "franzmd-e6400" using metadata type lvm2

vgchange -ay

2 logical volume(s) in volume group "franzmd-e6400" now active

mount /dev/mapper/franzmd--e6400-root /mnt/crypto

chroot /mnt/crypto/

mount -t proc proc /proc

Do your stuff

umount /proc

exit

root@ubuntu:/# cryptsetup status crypt1 /dev/mapper/crypt1 is inactive.

```

apt-get install lvm2 cryptsetup

modprobe dm-crypt

Reading all physical volumes. This may take a while...

vgchange -ay

root@ubuntu:~# cryptsetup luksOpen /dev/sda5 crypt Enter passphrase for /dev/sda5: Key slot 0 unlocked.

vgscan --mknodes

Reading all physical volumes. This may take a while... Found volume group "franzmd-e6400" using metadata type lvm2

vgchange -ay

2 logical volume(s) in volume group "franzmd-e6400" now active

mount /dev/mapper/franzmd--e6400-root /mnt/crypto

chroot /mnt/crypto/

mount -t proc proc /proc

Do your stuff

umount /proc

exit

root@ubuntu:/# cryptsetup status crypt1 /dev/mapper/crypt1 is inactive.

}}}```