Bug ID 1149066
Summary cannot open encrypted volume with genereted service
Classification openSUSE
Product openSUSE Tumbleweed
Version Current
Hardware Other
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Basesystem
Assignee bnc-team-screening@forge.provo.novell.com
Reporter msuchanek@suse.com
QA Contact qa-bugs@suse.de
Found By ---
Blocker ---

# cryptsetup status usb
/dev/mapper/usb is inactive.
# cryptsetup open --key-file /etc/usbkey
/dev/disk/by-uuid/98b904aa-5b37-476e-a690-5c73cc93a5b7 usb
# cryptsetup status usb
/dev/mapper/usb is active.
  type:    LUKS1
  cipher:  aes-xts-plain64
  keysize: 512 bits
  key location: dm-crypt
  device:  /dev/sda
  sector size:  512
  offset:  4096 sectors
  size:    30027776 sectors
  mode:    read/write
# cryptsetup close usb
# systemctl daemon-reload
# systemctl start systemd-cryptsetup@cr_usb.service 
Please enter passphrase for disk Cruzer_Fit (cr_usb): ^C
# cat /etc/crypttab 
cr_mmcblk0p3  UUID=c0587206-aaa9-4e93-98be-d7ee30d6b12c
cr_usb  UUID=98b904aa-5b37-476e-a690-5c73cc93a5b7 /etc/usbkey nofail

       Each line is in the form

           name encrypted-device password options

       The third field specifies the encryption password. If the field is not
present or the password is set to "none" or "-", the
       password has to be manually entered during system boot. Otherwise, the
field is interpreted as an absolute path to a file
       containing the encryption password.


You are receiving this mail because: