ecryptfs team mailing list archive
-
ecryptfs team
-
Mailing list archive
-
Message #01099
[Bug 383059] Re: mount -t ecryptfs for extern discovery fails
I have a broken Jaunty system with home-directory separately, located on
/dev/sda3. All data in the standard-folder "/var/lib/ecryptfs/laura-bnb"
no more available - only the passphrase has been recorded (to paper).
Starting a Jaunty live-cd, and on desktop using a terminal. First I
mount the brocken system typing:
sudo mount -t auto /dev/sda3 /mnt followed by
sudo mount -t ecryptfs /mnt/home/laura-bnb/.Private /mnt/home/laura-bnb
The next input requieres to insert the "passphrase" followed by the
recommendable values. Resulting allways as read above!
Where the command "ecryptfs-add-passphrase --fnek" to use??
:-( laura
--
mount -t ecryptfs for extern discovery fails
https://bugs.launchpad.net/bugs/383059
You received this bug notification because you are a member of eCryptfs,
which is subscribed to ecryptfs-utils in ubuntu.
Status in “ecryptfs-utils” source package in Ubuntu: New
Bug description:
Binary package hint: ecryptfs-utils
- ecryptfs-utils_73-0ubuntu6 with Jaunty
- ecryptfs-utils_75-0ubuntu1 with Karmic
Trying to discover data from a crashed system with encrypted home-directory, it is recommended to use:
sudo mount -t ecryptfs /home/<username>/.Private /home/<username>
But after inserting the passphrase and answering the shown options, the volume is mounted to the given mount-point - but the name of files - and volumes are still encrypted, The content is partly readable.
It seem to me. the following is running wrong -> On a healthy system you will find inside /etc/mtab:
"ecryptfs_sig=14140887552e0bec,ecryptfs_fnek_sig=de5d090606c60111,ecryptfs_cipher=aes,ecryptfs_key_bytes=16", with different _sig values
but on a broken system after using above command both values are the same
"ecryptfs_sig=14140887552e0bec,ecryptfs_fnek_sig=14140887552e0bec,ecryptfs_cipher=aes,ecryptfs_key_bytes=16", independent of choosing (y/ n) for plaintext as well for foldername decryption (y/n).
These have been testet and verifyed with Jaunty and Karmic - both the same results.
Follow ups
References