On 2016-11-26 19:12, Chan Ju Ping wrote:
On Saturday, November 26, 2016 2:58:05 PM CST Carlos E. R. wrote:
I routinely remove plymouth from all my systems, so yes, it is safe. It may be inconvenient, perhaps ugly to some people (no graphical boot).
If you do not enter the password for some reason at boot, the system may prompt for it later. This is happening to you.
Thanks for the confirmation. That worked out well!
I had to enter my luks passphrase twice to unlock the two hard-drives, while it only had to be entered correctly once for the Plymouth interface, though entering it incorrectly in Plymouth would also mean re-entering the passphrases twice.
There is a trick for that. In the first encrypted partition, create a random file, and add it as a key to the second one. Then configure /etc/cryptotab to use that file to open the second partition, instead of prompting for the password (that it is still valid). The sequence then would be that the system prompts for the password to the first partition, which is then opened. Then the system uses the key file to open the second partition, automatically. I have notes on the exact procedure somewhere, but the above might be enough of a hint to guide you. If not, I'll search for my notes. -- Cheers / Saludos, Carlos E. R. (from 13.1 x86_64 "Bottle" at Telcontar)