EDITED to reflect wanchai's comments and additions
Dealing with encryption and LVM from a live cd.
This is more for future refrence, I know I will have to deal with these disks from a live cd sometime. I currently have an encrypted file system that uses lvm. I have no idea how to work with these partitions! Right now I'm booted into a live cd, the file system was encrypted via luks (alternate install cd) I'm using twofish encryption.
Okay this was easier than I thought it was going to be, man pages are great.
/dev/sda1 is my /boot
/dev/sda2 is my crypto partition
Code:sudo apt-get install cryptsetup # Installs the tools we need to deal with encrypted partitions sudo modprobe dm-crypt # Inserts a module we need sudo cryptsetup luksOpen /dev/sda2 cheer # Unlocks the partition sda2 and names it cheer Enter LUKS passphrase: key slot 0 unlocked. Command successful. # # Now that we have unlocked the encryption, it's just dealing with the lvm # # sudo apt-get install lvm2 # installs the tools we need sudo modprobe dm-mod # inserts a module we need sudo vgscan # Scans for all volume groups Reading all physical volumes. This may take a while... Found volume group "Ubuntu" using metadata type lvm2 sudo vgchange -a y Ubuntu # this made the VG Ubuntu active, if you don't give it a volume group as an argument it'll make them all active sudo lvscan # This command lists the logical volumes and their /dev path ACTIVE '/dev/Ubuntu/Root' [15.00 GB] inherit ACTIVE '/dev/Ubuntu/swap' [1.00 GB] inherit ACTIVE '/dev/Ubuntu/home' [215.89 GB] inherit # # Now I mount them to do whatever it is I need to do, if you wanted to run a fsck on them you obviously wouldn't mount them. # sudo mkdir /media/root; sudo mkdir /media/home sudo mount /dev/Ubuntu/Root /media/root; sudo mount /dev/Ubuntu/home /media/home # # Now to reverse the process and unmount everything # sudo umount /media/root; sudo umount /media/home sudo rmdir /media/root; sudo rmdir /media/home sudo vgchange -a n Ubuntu sudo cryptsetup luksClose cheer



Adv Reply




Bookmarks