LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-27-2019, 07:33 PM   #1
Alinda
LQ Newbie
 
Registered: Aug 2019
Posts: 2

Rep: Reputation: Disabled
Removing Luks Encryption from SSD


I had opt in the complete disk encryption when I was installing Ubuntu 18.04 and my password is not being accepted when I boot my system. However, I can access the encrypted drive and open it (using cryptsetup luksOpen) when I boot with Ubuntu stick. My questions are:

1. How can fully remove the encryption on that drive so that next time that I boot my system it goes directly to the OS that I had installed previously?

2. Are there any risk of loosing my data if I perform 1? If this is the case, how can make a backup of the encrypted drive so that I can recover it later.

Thanks
 
Old 08-28-2019, 04:22 PM   #2
tyler2016
Member
 
Registered: Sep 2018
Distribution: Debian, CentOS, FreeBSD
Posts: 243

Rep: Reputation: Disabled
What error messages are you getting when it doesn't accept it? Have you asked this question on the Ubuntu forums? This sounds like it could be an XY problem. The link in my signature explains the XY problem.

1. You don't. You backup, reformat, and restore.

2. As much risk as there is in losing your dump files. Make a backup of them. You have to dump the filesystems, repartition the disk, format the partitions/LVM volumes, restore the dumps, update your boot loader config, and update /etc/fstab.

This will help you with the backup and restore part: https://tylersguides.com/guides/how-...t4-filesystem/ - Just do a full dump and full restore.
 
Old 08-28-2019, 06:31 PM   #3
syg00
LQ Veteran
 
Registered: Aug 2003
Location: Australia
Distribution: Lots ...
Posts: 21,153

Rep: Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125Reputation: 4125
Any backup is better than no backup, but dump-restore ?. Phew .. haven't seen anyone suggesting that in a long time.
For a one-off full filesystem event like this I prefer something like fsarchiver - that gives you a checksummed backup for a bit more "comfort factor".
 
Old 08-29-2019, 07:00 AM   #4
tyler2016
Member
 
Registered: Sep 2018
Distribution: Debian, CentOS, FreeBSD
Posts: 243

Rep: Reputation: Disabled
Quote:
Originally Posted by syg00 View Post
Any backup is better than no backup, but dump-restore ?. Phew .. haven't seen anyone suggesting that in a long time.
For a one-off full filesystem event like this I prefer something like fsarchiver - that gives you a checksummed backup for a bit more "comfort factor".
I have used dump and restore quite a bit in a production environment for similar scenarios. I had to move a bunch of VMs to their own hardware due to some initial confusion about licensing. In another situation I used them to move an old system to new hardware. Dump and restore are always in the repos, can read and write using stdin and stdout, and are easy to use when all you are doing is full dump and restore. You could always use your package manager to checksum the bulk of your files and manually checksum any data files.
 
Old 08-31-2019, 02:45 AM   #5
zeebra
Senior Member
 
Registered: Dec 2011
Distribution: Slackware
Posts: 1,834
Blog Entries: 17

Rep: Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643
Quote:
Originally Posted by Alinda View Post
I had opt in the complete disk encryption when I was installing Ubuntu 18.04 and my password is not being accepted when I boot my system. However, I can access the encrypted drive and open it (using cryptsetup luksOpen) when I boot with Ubuntu stick. My questions are:

1. How can fully remove the encryption on that drive so that next time that I boot my system it goes directly to the OS that I had installed previously?

2. Are there any risk of loosing my data if I perform 1? If this is the case, how can make a backup of the encrypted drive so that I can recover it later.

Thanks
Well, your question should be, why is that happening. And I think the reason is due to some keyboard setup. Clearly you know the password and it works, it just doesn't work on boot (due to keyboard setting?).

Do you have any data there aside from system data?
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] How to install Debian 9 with full encryption with LUKS on an SSD? linustalman Linux - Hardware 11 08-08-2018 07:23 AM
How to have luks encryption with keyfile OR passphrase (efi full disk encryption including boot)? byroncollege Linux - Security 2 03-30-2017 07:45 AM
How can I use trim with luks+lvm on ssd? pengStudent Slackware 5 05-16-2013 11:15 AM
luks encryption on ssd deNiro Slackware 6 07-15-2011 11:42 AM
LUKS on RAID or RAID on LUKS? retch Linux - Server 3 05-05-2010 01:57 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:46 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration