`cryptsetup luksOpen ` fails to set up the specified name mapping
HardenedArray has a helpful archlinux-installation guide at Efficient Encrypted UEFI-Booting Arch Installation.
However, I encountered difficulty early in the installation process -- specifically, at the point of opening my LUKS partition.
The command cryptsetup -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
completes without error, but after I enter the command cryptsetup luksOpen /dev/sda3 tsundoku
, /dev/mapper/tsundoku does not become available.
ls /dev/mapper
lists /dev/mapper/control alone, and not also /dev/mapper/tsundoku as I would expect.
The following error message appears upon cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
:
"Trying to read ... LUKS2 header at offset .... LUKS header read failed (-22). Command failed with code -1 (wrong or missing parameters)."
Could anyone offer any hints at to the cause of this error? My attempts at online research to this point haven't been fruitful.
Thanks much
--- EDIT ---
I've asked this question for help to achieve any of three goals: (1) to install arch-linux (in any manner) on a 6ish-year-old x86-64 Intel Core i5 2.50GHz ASUS; (2) more specifically, to install arch-linux securely with an encrypted partition; (3) to learn why, despite my expectations, cryptsetup luksOpen /dev/sda3 tsundoku
does not create a tsundoku mapping entry in the path /dev/mapper.
I'm a newcomer to arch-linux, so although I'd prefer installing the OS with encryption, I'd settle for installing it in any way.
I haven't had much luck following the installation instructions in the official arch wiki in the past, so upon seeing HardenedArray's clearly delineated installation guide, I thought I'd give it a go -- worst case scenario being that I might encounter a problem like the one described above, whereby I might learn something new.
As for the issue, here are some more details:
As per HardenedArray's guide: I gdisk /dev/sda
and create the following partitions:
- /dev/sda1, default, 100M, EF00
- /dev/sda2, default, 250M, 8300
- /dev/sda3, default, default, 8300
Then I do the following:
mkfs.vfat -F 32 /dev/sda1
mkfs.ext2 /dev/sda2
At this point, I attempt to initialize a LUKS partition and set up a mapping.
> cryptsetup --verbose -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
Command successful
> cryptsetup -v isLuks /dev/sda3
Command successful
> ls /dev/mapper
control
> cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
cryptsetup 2.0.0. processing "cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug"
Running command open.
Locking memory.
...
Trying to load any crypt type from device /dev/sda3.
Crypto backend ... initialized ...
Detected kernel Linux 4.14.9-1-ARCH x86_64.
...
Reading LUKS header of size 1024 from device /dev/sda3.
...
Activating volume tsundoku using token -1.
STDIN descriptor passphrase entry requested.
Activating volume tsundoku [keyslot -1] using passphrase.
...
Detected dm-ioctl version 4.37.0.
Device-mapper backend running with UDEV support enabled.
dm status tsundoku [ opencount flush ] [...] (...)
Trying to open key slot 0 [ACTIVE_LAST].
Reading key slot 0 area.
Using userspace crypto wrapper to access keyslot area.
Trying to open key slot 1 [INACTIVE].
# key slots 2-7 are also [INACTIVE]
Releasing crypt device /dev/sda3 context.
Releasing device-mapper backend.
Unlocking memory.
Command failed with code -2 (no permission or bad passphrase).
> ls /dev/mapper
control
> cryptsetup luksDump /dev/sda3
LUKS header information for /dev/sda3
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha512
...
UUID: 56d8...
Key Slot 0: ENABLED
...
Key Slot 1: DISABLED
# Key Slots 2-7 are also DISABLED
Are the steps I've listed above inaccurate in any way? Perhaps there were alternatives I should have taken instead or intervening actions that I missed?
If not, is the command cryptsetup luksOpen /dev/sd{a} {volume}
supposed to create a volume mapping in the path /dev/mapper?
If so, do the details I've added above allow anyone to ascertain why the path /dev/sda3/tsundoku does not appear on my machine? And if not, is there any additional information that I could add to make the problem clearer?
Thanks much.
arch-linux system-installation luks cryptsetup
bumped to the homepage by Community♦ 9 mins ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
add a comment |
HardenedArray has a helpful archlinux-installation guide at Efficient Encrypted UEFI-Booting Arch Installation.
However, I encountered difficulty early in the installation process -- specifically, at the point of opening my LUKS partition.
The command cryptsetup -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
completes without error, but after I enter the command cryptsetup luksOpen /dev/sda3 tsundoku
, /dev/mapper/tsundoku does not become available.
ls /dev/mapper
lists /dev/mapper/control alone, and not also /dev/mapper/tsundoku as I would expect.
The following error message appears upon cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
:
"Trying to read ... LUKS2 header at offset .... LUKS header read failed (-22). Command failed with code -1 (wrong or missing parameters)."
Could anyone offer any hints at to the cause of this error? My attempts at online research to this point haven't been fruitful.
Thanks much
--- EDIT ---
I've asked this question for help to achieve any of three goals: (1) to install arch-linux (in any manner) on a 6ish-year-old x86-64 Intel Core i5 2.50GHz ASUS; (2) more specifically, to install arch-linux securely with an encrypted partition; (3) to learn why, despite my expectations, cryptsetup luksOpen /dev/sda3 tsundoku
does not create a tsundoku mapping entry in the path /dev/mapper.
I'm a newcomer to arch-linux, so although I'd prefer installing the OS with encryption, I'd settle for installing it in any way.
I haven't had much luck following the installation instructions in the official arch wiki in the past, so upon seeing HardenedArray's clearly delineated installation guide, I thought I'd give it a go -- worst case scenario being that I might encounter a problem like the one described above, whereby I might learn something new.
As for the issue, here are some more details:
As per HardenedArray's guide: I gdisk /dev/sda
and create the following partitions:
- /dev/sda1, default, 100M, EF00
- /dev/sda2, default, 250M, 8300
- /dev/sda3, default, default, 8300
Then I do the following:
mkfs.vfat -F 32 /dev/sda1
mkfs.ext2 /dev/sda2
At this point, I attempt to initialize a LUKS partition and set up a mapping.
> cryptsetup --verbose -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
Command successful
> cryptsetup -v isLuks /dev/sda3
Command successful
> ls /dev/mapper
control
> cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
cryptsetup 2.0.0. processing "cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug"
Running command open.
Locking memory.
...
Trying to load any crypt type from device /dev/sda3.
Crypto backend ... initialized ...
Detected kernel Linux 4.14.9-1-ARCH x86_64.
...
Reading LUKS header of size 1024 from device /dev/sda3.
...
Activating volume tsundoku using token -1.
STDIN descriptor passphrase entry requested.
Activating volume tsundoku [keyslot -1] using passphrase.
...
Detected dm-ioctl version 4.37.0.
Device-mapper backend running with UDEV support enabled.
dm status tsundoku [ opencount flush ] [...] (...)
Trying to open key slot 0 [ACTIVE_LAST].
Reading key slot 0 area.
Using userspace crypto wrapper to access keyslot area.
Trying to open key slot 1 [INACTIVE].
# key slots 2-7 are also [INACTIVE]
Releasing crypt device /dev/sda3 context.
Releasing device-mapper backend.
Unlocking memory.
Command failed with code -2 (no permission or bad passphrase).
> ls /dev/mapper
control
> cryptsetup luksDump /dev/sda3
LUKS header information for /dev/sda3
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha512
...
UUID: 56d8...
Key Slot 0: ENABLED
...
Key Slot 1: DISABLED
# Key Slots 2-7 are also DISABLED
Are the steps I've listed above inaccurate in any way? Perhaps there were alternatives I should have taken instead or intervening actions that I missed?
If not, is the command cryptsetup luksOpen /dev/sd{a} {volume}
supposed to create a volume mapping in the path /dev/mapper?
If so, do the details I've added above allow anyone to ascertain why the path /dev/sda3/tsundoku does not appear on my machine? And if not, is there any additional information that I could add to make the problem clearer?
Thanks much.
arch-linux system-installation luks cryptsetup
bumped to the homepage by Community♦ 9 mins ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
1
This is why you should use the community documentation, not random blog wiki.archlinux.org/index.php/Dm-crypt/…:
– jasonwryan
Jan 14 '18 at 23:53
What is the exit code ofluksFormat
? What is the output ofcryptsetup luksDump /dev/sda3
?
– Hauke Laging
Jan 14 '18 at 23:57
@HaukeLaging The exit code ofluksFormat
is 0. The output ofcryptsetup luksDump /dev/sda3
states that Key Slot 0 is ENABLED but Key Slots 1-7 are DISABLED.
– Polytope
Jan 16 '18 at 1:55
Any "dangerous" characters in the passphrase (from the keyboard layout perspective)? Does it work withfoofoofoo
or a keyfile instead?
– Hauke Laging
Jan 16 '18 at 8:18
add a comment |
HardenedArray has a helpful archlinux-installation guide at Efficient Encrypted UEFI-Booting Arch Installation.
However, I encountered difficulty early in the installation process -- specifically, at the point of opening my LUKS partition.
The command cryptsetup -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
completes without error, but after I enter the command cryptsetup luksOpen /dev/sda3 tsundoku
, /dev/mapper/tsundoku does not become available.
ls /dev/mapper
lists /dev/mapper/control alone, and not also /dev/mapper/tsundoku as I would expect.
The following error message appears upon cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
:
"Trying to read ... LUKS2 header at offset .... LUKS header read failed (-22). Command failed with code -1 (wrong or missing parameters)."
Could anyone offer any hints at to the cause of this error? My attempts at online research to this point haven't been fruitful.
Thanks much
--- EDIT ---
I've asked this question for help to achieve any of three goals: (1) to install arch-linux (in any manner) on a 6ish-year-old x86-64 Intel Core i5 2.50GHz ASUS; (2) more specifically, to install arch-linux securely with an encrypted partition; (3) to learn why, despite my expectations, cryptsetup luksOpen /dev/sda3 tsundoku
does not create a tsundoku mapping entry in the path /dev/mapper.
I'm a newcomer to arch-linux, so although I'd prefer installing the OS with encryption, I'd settle for installing it in any way.
I haven't had much luck following the installation instructions in the official arch wiki in the past, so upon seeing HardenedArray's clearly delineated installation guide, I thought I'd give it a go -- worst case scenario being that I might encounter a problem like the one described above, whereby I might learn something new.
As for the issue, here are some more details:
As per HardenedArray's guide: I gdisk /dev/sda
and create the following partitions:
- /dev/sda1, default, 100M, EF00
- /dev/sda2, default, 250M, 8300
- /dev/sda3, default, default, 8300
Then I do the following:
mkfs.vfat -F 32 /dev/sda1
mkfs.ext2 /dev/sda2
At this point, I attempt to initialize a LUKS partition and set up a mapping.
> cryptsetup --verbose -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
Command successful
> cryptsetup -v isLuks /dev/sda3
Command successful
> ls /dev/mapper
control
> cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
cryptsetup 2.0.0. processing "cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug"
Running command open.
Locking memory.
...
Trying to load any crypt type from device /dev/sda3.
Crypto backend ... initialized ...
Detected kernel Linux 4.14.9-1-ARCH x86_64.
...
Reading LUKS header of size 1024 from device /dev/sda3.
...
Activating volume tsundoku using token -1.
STDIN descriptor passphrase entry requested.
Activating volume tsundoku [keyslot -1] using passphrase.
...
Detected dm-ioctl version 4.37.0.
Device-mapper backend running with UDEV support enabled.
dm status tsundoku [ opencount flush ] [...] (...)
Trying to open key slot 0 [ACTIVE_LAST].
Reading key slot 0 area.
Using userspace crypto wrapper to access keyslot area.
Trying to open key slot 1 [INACTIVE].
# key slots 2-7 are also [INACTIVE]
Releasing crypt device /dev/sda3 context.
Releasing device-mapper backend.
Unlocking memory.
Command failed with code -2 (no permission or bad passphrase).
> ls /dev/mapper
control
> cryptsetup luksDump /dev/sda3
LUKS header information for /dev/sda3
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha512
...
UUID: 56d8...
Key Slot 0: ENABLED
...
Key Slot 1: DISABLED
# Key Slots 2-7 are also DISABLED
Are the steps I've listed above inaccurate in any way? Perhaps there were alternatives I should have taken instead or intervening actions that I missed?
If not, is the command cryptsetup luksOpen /dev/sd{a} {volume}
supposed to create a volume mapping in the path /dev/mapper?
If so, do the details I've added above allow anyone to ascertain why the path /dev/sda3/tsundoku does not appear on my machine? And if not, is there any additional information that I could add to make the problem clearer?
Thanks much.
arch-linux system-installation luks cryptsetup
HardenedArray has a helpful archlinux-installation guide at Efficient Encrypted UEFI-Booting Arch Installation.
However, I encountered difficulty early in the installation process -- specifically, at the point of opening my LUKS partition.
The command cryptsetup -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
completes without error, but after I enter the command cryptsetup luksOpen /dev/sda3 tsundoku
, /dev/mapper/tsundoku does not become available.
ls /dev/mapper
lists /dev/mapper/control alone, and not also /dev/mapper/tsundoku as I would expect.
The following error message appears upon cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
:
"Trying to read ... LUKS2 header at offset .... LUKS header read failed (-22). Command failed with code -1 (wrong or missing parameters)."
Could anyone offer any hints at to the cause of this error? My attempts at online research to this point haven't been fruitful.
Thanks much
--- EDIT ---
I've asked this question for help to achieve any of three goals: (1) to install arch-linux (in any manner) on a 6ish-year-old x86-64 Intel Core i5 2.50GHz ASUS; (2) more specifically, to install arch-linux securely with an encrypted partition; (3) to learn why, despite my expectations, cryptsetup luksOpen /dev/sda3 tsundoku
does not create a tsundoku mapping entry in the path /dev/mapper.
I'm a newcomer to arch-linux, so although I'd prefer installing the OS with encryption, I'd settle for installing it in any way.
I haven't had much luck following the installation instructions in the official arch wiki in the past, so upon seeing HardenedArray's clearly delineated installation guide, I thought I'd give it a go -- worst case scenario being that I might encounter a problem like the one described above, whereby I might learn something new.
As for the issue, here are some more details:
As per HardenedArray's guide: I gdisk /dev/sda
and create the following partitions:
- /dev/sda1, default, 100M, EF00
- /dev/sda2, default, 250M, 8300
- /dev/sda3, default, default, 8300
Then I do the following:
mkfs.vfat -F 32 /dev/sda1
mkfs.ext2 /dev/sda2
At this point, I attempt to initialize a LUKS partition and set up a mapping.
> cryptsetup --verbose -c aes-xts-plain64 -h sha512 -s 512 --use-random luksFormat /dev/sda3
Command successful
> cryptsetup -v isLuks /dev/sda3
Command successful
> ls /dev/mapper
control
> cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug
cryptsetup 2.0.0. processing "cryptsetup luksOpen /dev/sda3 tsundoku --verbose --debug"
Running command open.
Locking memory.
...
Trying to load any crypt type from device /dev/sda3.
Crypto backend ... initialized ...
Detected kernel Linux 4.14.9-1-ARCH x86_64.
...
Reading LUKS header of size 1024 from device /dev/sda3.
...
Activating volume tsundoku using token -1.
STDIN descriptor passphrase entry requested.
Activating volume tsundoku [keyslot -1] using passphrase.
...
Detected dm-ioctl version 4.37.0.
Device-mapper backend running with UDEV support enabled.
dm status tsundoku [ opencount flush ] [...] (...)
Trying to open key slot 0 [ACTIVE_LAST].
Reading key slot 0 area.
Using userspace crypto wrapper to access keyslot area.
Trying to open key slot 1 [INACTIVE].
# key slots 2-7 are also [INACTIVE]
Releasing crypt device /dev/sda3 context.
Releasing device-mapper backend.
Unlocking memory.
Command failed with code -2 (no permission or bad passphrase).
> ls /dev/mapper
control
> cryptsetup luksDump /dev/sda3
LUKS header information for /dev/sda3
Version: 1
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha512
...
UUID: 56d8...
Key Slot 0: ENABLED
...
Key Slot 1: DISABLED
# Key Slots 2-7 are also DISABLED
Are the steps I've listed above inaccurate in any way? Perhaps there were alternatives I should have taken instead or intervening actions that I missed?
If not, is the command cryptsetup luksOpen /dev/sd{a} {volume}
supposed to create a volume mapping in the path /dev/mapper?
If so, do the details I've added above allow anyone to ascertain why the path /dev/sda3/tsundoku does not appear on my machine? And if not, is there any additional information that I could add to make the problem clearer?
Thanks much.
arch-linux system-installation luks cryptsetup
arch-linux system-installation luks cryptsetup
edited Jan 16 '18 at 3:06
Polytope
asked Jan 14 '18 at 23:25
PolytopePolytope
1613
1613
bumped to the homepage by Community♦ 9 mins ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
bumped to the homepage by Community♦ 9 mins ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
1
This is why you should use the community documentation, not random blog wiki.archlinux.org/index.php/Dm-crypt/…:
– jasonwryan
Jan 14 '18 at 23:53
What is the exit code ofluksFormat
? What is the output ofcryptsetup luksDump /dev/sda3
?
– Hauke Laging
Jan 14 '18 at 23:57
@HaukeLaging The exit code ofluksFormat
is 0. The output ofcryptsetup luksDump /dev/sda3
states that Key Slot 0 is ENABLED but Key Slots 1-7 are DISABLED.
– Polytope
Jan 16 '18 at 1:55
Any "dangerous" characters in the passphrase (from the keyboard layout perspective)? Does it work withfoofoofoo
or a keyfile instead?
– Hauke Laging
Jan 16 '18 at 8:18
add a comment |
1
This is why you should use the community documentation, not random blog wiki.archlinux.org/index.php/Dm-crypt/…:
– jasonwryan
Jan 14 '18 at 23:53
What is the exit code ofluksFormat
? What is the output ofcryptsetup luksDump /dev/sda3
?
– Hauke Laging
Jan 14 '18 at 23:57
@HaukeLaging The exit code ofluksFormat
is 0. The output ofcryptsetup luksDump /dev/sda3
states that Key Slot 0 is ENABLED but Key Slots 1-7 are DISABLED.
– Polytope
Jan 16 '18 at 1:55
Any "dangerous" characters in the passphrase (from the keyboard layout perspective)? Does it work withfoofoofoo
or a keyfile instead?
– Hauke Laging
Jan 16 '18 at 8:18
1
1
This is why you should use the community documentation, not random blog wiki.archlinux.org/index.php/Dm-crypt/…:
– jasonwryan
Jan 14 '18 at 23:53
This is why you should use the community documentation, not random blog wiki.archlinux.org/index.php/Dm-crypt/…:
– jasonwryan
Jan 14 '18 at 23:53
What is the exit code of
luksFormat
? What is the output of cryptsetup luksDump /dev/sda3
?– Hauke Laging
Jan 14 '18 at 23:57
What is the exit code of
luksFormat
? What is the output of cryptsetup luksDump /dev/sda3
?– Hauke Laging
Jan 14 '18 at 23:57
@HaukeLaging The exit code of
luksFormat
is 0. The output of cryptsetup luksDump /dev/sda3
states that Key Slot 0 is ENABLED but Key Slots 1-7 are DISABLED.– Polytope
Jan 16 '18 at 1:55
@HaukeLaging The exit code of
luksFormat
is 0. The output of cryptsetup luksDump /dev/sda3
states that Key Slot 0 is ENABLED but Key Slots 1-7 are DISABLED.– Polytope
Jan 16 '18 at 1:55
Any "dangerous" characters in the passphrase (from the keyboard layout perspective)? Does it work with
foofoofoo
or a keyfile instead?– Hauke Laging
Jan 16 '18 at 8:18
Any "dangerous" characters in the passphrase (from the keyboard layout perspective)? Does it work with
foofoofoo
or a keyfile instead?– Hauke Laging
Jan 16 '18 at 8:18
add a comment |
1 Answer
1
active
oldest
votes
You're using the wrong command instead use the following command until you complete install and boot into your new Arch OS:
# cryptsetup --type luks open /dev/sdaX plain1 #change **plain1** to your map location
After you boot into your new OS then you can use the other one. Don't forget DuckDuckGo, Qwant, Google and so on are your friends. Carry on from there, good luck.
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "106"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f417135%2fcryptsetup-luksopen-device-name-fails-to-set-up-the-specified-name-mapping%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
You're using the wrong command instead use the following command until you complete install and boot into your new Arch OS:
# cryptsetup --type luks open /dev/sdaX plain1 #change **plain1** to your map location
After you boot into your new OS then you can use the other one. Don't forget DuckDuckGo, Qwant, Google and so on are your friends. Carry on from there, good luck.
add a comment |
You're using the wrong command instead use the following command until you complete install and boot into your new Arch OS:
# cryptsetup --type luks open /dev/sdaX plain1 #change **plain1** to your map location
After you boot into your new OS then you can use the other one. Don't forget DuckDuckGo, Qwant, Google and so on are your friends. Carry on from there, good luck.
add a comment |
You're using the wrong command instead use the following command until you complete install and boot into your new Arch OS:
# cryptsetup --type luks open /dev/sdaX plain1 #change **plain1** to your map location
After you boot into your new OS then you can use the other one. Don't forget DuckDuckGo, Qwant, Google and so on are your friends. Carry on from there, good luck.
You're using the wrong command instead use the following command until you complete install and boot into your new Arch OS:
# cryptsetup --type luks open /dev/sdaX plain1 #change **plain1** to your map location
After you boot into your new OS then you can use the other one. Don't forget DuckDuckGo, Qwant, Google and so on are your friends. Carry on from there, good luck.
edited Mar 15 '18 at 6:45
yeti
2,39611224
2,39611224
answered Mar 15 '18 at 4:43
gettywiggettywig
11
11
add a comment |
add a comment |
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Some of your past answers have not been well-received, and you're in danger of being blocked from answering.
Please pay close attention to the following guidance:
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f417135%2fcryptsetup-luksopen-device-name-fails-to-set-up-the-specified-name-mapping%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
This is why you should use the community documentation, not random blog wiki.archlinux.org/index.php/Dm-crypt/…:
– jasonwryan
Jan 14 '18 at 23:53
What is the exit code of
luksFormat
? What is the output ofcryptsetup luksDump /dev/sda3
?– Hauke Laging
Jan 14 '18 at 23:57
@HaukeLaging The exit code of
luksFormat
is 0. The output ofcryptsetup luksDump /dev/sda3
states that Key Slot 0 is ENABLED but Key Slots 1-7 are DISABLED.– Polytope
Jan 16 '18 at 1:55
Any "dangerous" characters in the passphrase (from the keyboard layout perspective)? Does it work with
foofoofoo
or a keyfile instead?– Hauke Laging
Jan 16 '18 at 8:18