Bug #409
Updated by Daniel Curtis over 10 years ago
I've encountered a problem where I have lost my USB booloader used to boot into my primary OS; which consists of two LUKS encrypted partitions, one for / and one for /home. Not only were the partitions encrypted, but also the user folders via ecryptfs. Luckily, I was not ultra-paranoid and only used a passphrase with LUKS and not a passphrase/keyfile combination. To begin I booted into a live ubuntu environment and dropped into a root shell: <pre> sudo su </pre> h2. Open and mount the LUKS containers * First open up the LUKS encrypted partitions: <pre> cryptsetup luksOpen /dev/sda5 root cryptsetup luksOpen /dev/sda6 home </pre> * Next, mount the mapped partitions: <pre> mount /dev/mapper/root /mnt mount /dev/mapper/home /mnt/home </pre> * Mount the device, process, and system mountpoints: <pre> mount --bind /dev /mnt/dev mount --bind /sys /mnt/sys mount --bind /proc /mnt/proc </pre> h2. Resources * http://citizen428.net/blog/2011/10/17/fixing-grub-on-a-luks-encrypted-disk * https://help.ubuntu.com/12.04/serverguide/ecryptfs.html * https://help.ubuntu.com/community/EncryptedPrivateDirectory