Outils pour utilisateurs

Outils du site


tech:notes_luks_cryptsetup

Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentesRévision précédente
tech:notes_luks_cryptsetup [2025/04/18 09:53] Jean-Baptistetech:notes_luks_cryptsetup [2025/04/18 09:57] (Version actuelle) Jean-Baptiste
Ligne 1: Ligne 1:
-{{tag>Brouillon}}+<!DOCTYPE markdown> 
 +{{tag>Brouillon Crypt FS}}
  
-Notes luks cryptsetup+Notes luks cryptsetup
  
 Voir aussi : Voir aussi :
Ligne 10: Ligne 11:
 Add a new passphrase Add a new passphrase
  
-<code bash>+~~~bash
 cryptsetup luksAddKey /dev/nvme0n1p3 cryptsetup luksAddKey /dev/nvme0n1p3
-</code>+~~~
  
-<code bash>+~~~bash
 cryptsetup luksDump /dev/sda2 cryptsetup luksDump /dev/sda2
-</code>+~~~
  
-== Upgrade your LUKS key derivation function+## Upgrade your LUKS key derivation function
  
 Source :  Source : 
-* [[https://mjg59.dreamwidth.org/66429.html|upgrade your LUKS key derivation function]] +* [Upgrade your LUKS key derivation function](https://mjg59.dreamwidth.org/66429.html) 
-  ** https://nantes.indymedia.org/posts/87395/une-lettre-divan-enferme-a-la-prison-de-villepinte-perquisitions-et-disques-durs-dechiffres/+    * https://nantes.indymedia.org/posts/87395/une-lettre-divan-enferme-a-la-prison-de-villepinte-perquisitions-et-disques-durs-dechiffres/
  
-<code bash>+~~~bash
 lsblk lsblk
 sudo cryptsetup luksHeaderBackup /dev/whatever --header-backup-file /tmp/luksheader sudo cryptsetup luksHeaderBackup /dev/whatever --header-backup-file /tmp/luksheader
-</code>+~~~
  
 Copy that to a USB stick or something. If something goes wrong here you'll be able to boot a live image and run Copy that to a USB stick or something. If something goes wrong here you'll be able to boot a live image and run
-<code bash>+~~~bash
 sudo cryptsetup luksHeaderRestore /dev/whatever --header-backup-file luksheader sudo cryptsetup luksHeaderRestore /dev/whatever --header-backup-file luksheader
-</code>+~~~
  
 to restore it. to restore it.
Ligne 39: Ligne 40:
  
 Next, run Next, run
-<code bash>+~~~bash
 sudo cryptsetup luksDump /dev/whatever sudo cryptsetup luksDump /dev/whatever
-</code>+~~~
 and look for the Version: line. If it's version 1, you need to update the header to LUKS2. Run and look for the Version: line. If it's version 1, you need to update the header to LUKS2. Run
-<code bash>+~~~bash
 sudo cryptsetup convert /dev/whatever --type luks2 sudo cryptsetup convert /dev/whatever --type luks2
-</code>+~~~
 and follow the prompts. Make sure your system still boots, and if not go back and restore the backup of your header. Assuming everything is ok at this point, run and follow the prompts. Make sure your system still boots, and if not go back and restore the backup of your header. Assuming everything is ok at this point, run
-<code bash>+~~~bash
 sudo cryptsetup luksDump /dev/whatever sudo cryptsetup luksDump /dev/whatever
-</code>+~~~
 again and look for the PBKDF: line in each keyslot (pay attention only to the keyslots, ignore any references to pbkdf2 that come after the Digests: line). If the PBKDF is either **pbkdf2** or **argon2i** you should convert to **argon2id**. Run the following: again and look for the PBKDF: line in each keyslot (pay attention only to the keyslots, ignore any references to pbkdf2 that come after the Digests: line). If the PBKDF is either **pbkdf2** or **argon2i** you should convert to **argon2id**. Run the following:
-<code bash>+~~~bash
 sudo cryptsetup luksConvertKey /dev/whatever --pbkdf argon2id sudo cryptsetup luksConvertKey /dev/whatever --pbkdf argon2id
-</code>+~~~
 and follow the prompts. If you have multiple passwords associated with your drive you'll have multiple keyslots, and you'll need to repeat this for each password. and follow the prompts. If you have multiple passwords associated with your drive you'll have multiple keyslots, and you'll need to repeat this for each password.
  
tech/notes_luks_cryptsetup.1744962816.txt.gz · Dernière modification : de Jean-Baptiste

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki