Project

General

Profile

Bug #409

Updated by Daniel Curtis almost 10 years ago

I've encountered a problem where I have lost my USB booloader used to boot into my primary OS; which consists of two LUKS encrypted partitions, one for / and one for /home. Not only were the partitions encrypted, but also the user folders via ecryptfs. Luckily, I was not ultra-paranoid and only used a passphrase with LUKS and not a passphrase/keyfile combination. To begin I booted into a live ubuntu environment and dropped into a root shell: 
 <pre> 
 sudo su 
 </pre> 

 h2. Open and mount the LUKS containers 

 * First open up the LUKS encrypted partitions: 
 <pre> 
 cryptsetup luksOpen /dev/sda5 root 
 cryptsetup luksOpen /dev/sda6 home 
 </pre> 

 * Next, mount the mapped partitions: 
 <pre> 
 mount /dev/mapper/root /mnt 
 mount /dev/mapper/home /mnt/home 
 </pre> 

 * Mount the device, process, and system mountpoints: 
 <pre> 
 mount --bind /dev /mnt/dev 
 mount --bind /sys /mnt/sys 
 mount --bind /proc /mnt/proc 
 </pre> 

 h2. Resources 

 * http://citizen428.net/blog/2011/10/17/fixing-grub-on-a-luks-encrypted-disk 
 * https://help.ubuntu.com/12.04/serverguide/ecryptfs.html 
 * https://help.ubuntu.com/community/EncryptedPrivateDirectory

Back