Quantcast
Viewing all articles
Browse latest Browse all 3474

How to get rid of encrypted LVM from a disk?

Hello community!
I've tried to install Debian13 [Testing] using LiveDebian distribution.
In the middle of Manual partitioning management I did some major mistake which is not clear for myself what it was.
Perhaps I did LVM encryption on the LVM encrypted volume or something like that.
Have tried to remove those encrypted volumes and partitions from within the debian-installer but failed with info that 'partition is encrypted and mounted'.
Rebooted the machine with stable DebianLive [12].
Istalled and run GParted. It shows that all LVM volumes are locked.
So there's no chance to safely remove LVM ecrypted volumes from within GParted even with deactivated Volume Group:

Code:

#### lvm vgchange -a n 'vg_ssd'Logical volume vg_ssd/lv_swap in use. Can't deactivate volume group "vg_ssd" with 1 open logical volume(s).###
Neither could it be removed or owerwritten forcing removal.
My second attempt was to use help from https://www.reddit.com/r/Kalilinux/comm ... ?rdt=36009
I got stuck on the initial step of decrypt the LVM:

Code:

###user@debian:~$ sudo cryptsetup luksOpen /dev/vg_ssd/lv_swap lv_swapEnter passphrase for /dev/vg_ssd/lv_swap: No key available with this passphrase.###
It showed that my password is not valid. I used it from key-validator. So it is valid for sure.
I have followed advice to check if key is present for LVM to be decrypted from https://stackoverflow.com/questions/659 ... -with-luks

Code:

###user@debian:~$ sudo cryptsetup luksDump /dev/vg_ssd/lv_swap -vLUKS header informationVersion:       2Epoch:         3Metadata area: 16384 [bytes]Keyslots area: 16744448 [bytes]UUID:          30b6ea7a-e040-4d22-a6c4-fb0cb9ddff95Label:         (no label)Subsystem:     (no subsystem)Flags:       (no flags)Data segments:  0: cryptoffset: 16777216 [bytes]length: (whole device)cipher: aes-xts-plain64sector: 512 [bytes]Keyslots:  0: luks2Key:        512 bitsPriority:   normalCipher:     aes-xts-plain64Cipher key: 512 bitsPBKDF:      argon2idTime cost:  8Memory:     1048576Threads:    4Salt:       2b 87 e7 11 a5 82 84 6d a5 ed 65 a7 28 e8 7f af             ee 42 a1 b4 aa 6d fb 58 29 fa 77 62 a2 13 17 aa AF stripes: 4000AF hash:    sha256Area offset:32768 [bytes]Area length:258048 [bytes]Digest ID:  0Tokens:Digests:  0: pbkdf2Hash:       sha256Iterations: 114573Salt:       e2 01 00 0e 3a b2 8a 8e fe f8 91 bd 15 7c e8 aa             d7 be a0 5a b9 e5 ad 0a fe 06 d1 c4 7e 3b e6 69 Digest:     1f 6b 92 4e b5 8b 46 b6 be 86 dd c3 dd b2 d1 58             77 ee f2 74 67 a8 3a c4 61 a3 bd b7 a0 91 f1 4e Command successful.###
It seems that key is present and not lost.
How should I get rid of that LVM from both SSD and HDD? No data save is required as I have full backup.
More details of my file system is here: https://paste.debian.net/1347863/
Testing the passphrase doesn't solve the issue:
https://paste.debian.net/1347867/

Statistics: Posted by nikobit — 2025-02-01 11:57 — Replies 3 — Views 111



Viewing all articles
Browse latest Browse all 3474

Trending Articles