Ubuntu 18.04 - cryptsetup fails to recognize passphrase, unlocking from Live USB works












3














I recently bought a Ubuntu Edition Dell XPS 13 9370. The machine comes without full disk encryption enabled out of the box, but offers to create a recovery USB drive, when booted from that Ubuntu can be installed with LUKS encryption.



However, after installing my passphrase is never recognized, I always get "cryptsetup failed, bad password or options?"




  • The culprit can't be keyboard layouts, the passphrase abcd does not work either.

  • The encryption itself seems to be configured correctly - when I boot from the live USB system and launch the "Disks" utility I can successfully unlock the drive with my chosen password (again, I tried abcd, so it can't be a layout problem)


Did anybody else see this problem? Any suggestions how to fix it? Thanks!










share|improve this question



























    3














    I recently bought a Ubuntu Edition Dell XPS 13 9370. The machine comes without full disk encryption enabled out of the box, but offers to create a recovery USB drive, when booted from that Ubuntu can be installed with LUKS encryption.



    However, after installing my passphrase is never recognized, I always get "cryptsetup failed, bad password or options?"




    • The culprit can't be keyboard layouts, the passphrase abcd does not work either.

    • The encryption itself seems to be configured correctly - when I boot from the live USB system and launch the "Disks" utility I can successfully unlock the drive with my chosen password (again, I tried abcd, so it can't be a layout problem)


    Did anybody else see this problem? Any suggestions how to fix it? Thanks!










    share|improve this question

























      3












      3








      3


      1





      I recently bought a Ubuntu Edition Dell XPS 13 9370. The machine comes without full disk encryption enabled out of the box, but offers to create a recovery USB drive, when booted from that Ubuntu can be installed with LUKS encryption.



      However, after installing my passphrase is never recognized, I always get "cryptsetup failed, bad password or options?"




      • The culprit can't be keyboard layouts, the passphrase abcd does not work either.

      • The encryption itself seems to be configured correctly - when I boot from the live USB system and launch the "Disks" utility I can successfully unlock the drive with my chosen password (again, I tried abcd, so it can't be a layout problem)


      Did anybody else see this problem? Any suggestions how to fix it? Thanks!










      share|improve this question













      I recently bought a Ubuntu Edition Dell XPS 13 9370. The machine comes without full disk encryption enabled out of the box, but offers to create a recovery USB drive, when booted from that Ubuntu can be installed with LUKS encryption.



      However, after installing my passphrase is never recognized, I always get "cryptsetup failed, bad password or options?"




      • The culprit can't be keyboard layouts, the passphrase abcd does not work either.

      • The encryption itself seems to be configured correctly - when I boot from the live USB system and launch the "Disks" utility I can successfully unlock the drive with my chosen password (again, I tried abcd, so it can't be a layout problem)


      Did anybody else see this problem? Any suggestions how to fix it? Thanks!







      18.04 encryption luks xps cryptsetup






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Oct 25 at 19:00









      TheDeadSerious

      1162




      1162






















          1 Answer
          1






          active

          oldest

          votes


















          0
















          Here are some suggestions.




          • Switch to the command-line by hitting F1 or Alt-Tab, type the password again, and check for any errors. If you find the error, try searching for it.


          • When you wait few minutes, you should be shown initramfs/BusyBox console screen. Using the command-line, you should check the syntax of your kernel arguments by typing the following command:



            cat /proc/cmdline


            Especially check (as suggested by BusyBox):




            • The value of root, whether it points to the right device.

            • If rootdelay is set, maybe you need to increase the system wait?






          If above won't help, consider the following commands:





          • cryptsetup --debug luksOpen /dev/XXX mapper-name to decrypt manually (see this how-to).



            Note: To make sure you're using the right device, run dumpe2fs /dev/XXX (e.g. sda1 or nvme0n1p3) in initramfs/BusyBox console, then make sure it reports as crypto_LUKS.



            Note: If luksOpen fails, try the older syntax: cryptsetup --debug luksOpen /dev/XXX ubuntu.




          • cryptsetup --debug luksDump /dev/XXX to dump LUKS header information from the device.



            Note: In case of corruption of on-disk metadata, use cryptsetup repair <device> command.




          • On Please unlock disk XXX_crypt screen, note your device name and using above luksDump method, confirm that Ubuntu asks you to decrypt the right device as the order (disk number) potentially can change (BIOS boot changes?). In that case, Ubuntu likely will use the last known device (cached, /etc/lvm/[backup|archive]/?) location when it won't be able to connect to lvmetad service.



            For example, I was asked to type a passphrase for nvme1n1p3_crypt (Windows NTFS partition) instead of nvme0n1p3 (crypto_LUKS partition).




          Further suggested commands:





          • Run lvm lvs or lvm vgscan and check for any errors (it identifies each disk with a UUID).



            See also: Ubuntu won't boot because of lvmetad & Failed to connect to lvmetad - Stuck on boot.



          • cat /proc/modules to check for missing modules (load it by modprobe).



          When finish, type reboot to restart.





          If you did an upgrade recently, test your previous kernel (hold Shift during boot, and select Advanced options), and select the version which you'd like to test.





          Other related resources:




          • How can one unlock a fully encrypted Ubuntu 11.10 system over SSH at boot?

          • Ephemeral error message: "cryptsetup: unknown fstype, bad password or options?"


          • lvm2 bug in Ubuntu 18.04: lvm2-activation-generator crashed with SIGSEGV.



            Similar older bug: error unlocking / decrypting LUKS volume at boot.



          • UEFI Introduction & How do I install Ubuntu alongside a pre-installed Windows with UEFI?







          share|improve this answer























            Your Answer








            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "89"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });














            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1087230%2fubuntu-18-04-cryptsetup-fails-to-recognize-passphrase-unlocking-from-live-usb%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0
















            Here are some suggestions.




            • Switch to the command-line by hitting F1 or Alt-Tab, type the password again, and check for any errors. If you find the error, try searching for it.


            • When you wait few minutes, you should be shown initramfs/BusyBox console screen. Using the command-line, you should check the syntax of your kernel arguments by typing the following command:



              cat /proc/cmdline


              Especially check (as suggested by BusyBox):




              • The value of root, whether it points to the right device.

              • If rootdelay is set, maybe you need to increase the system wait?






            If above won't help, consider the following commands:





            • cryptsetup --debug luksOpen /dev/XXX mapper-name to decrypt manually (see this how-to).



              Note: To make sure you're using the right device, run dumpe2fs /dev/XXX (e.g. sda1 or nvme0n1p3) in initramfs/BusyBox console, then make sure it reports as crypto_LUKS.



              Note: If luksOpen fails, try the older syntax: cryptsetup --debug luksOpen /dev/XXX ubuntu.




            • cryptsetup --debug luksDump /dev/XXX to dump LUKS header information from the device.



              Note: In case of corruption of on-disk metadata, use cryptsetup repair <device> command.




            • On Please unlock disk XXX_crypt screen, note your device name and using above luksDump method, confirm that Ubuntu asks you to decrypt the right device as the order (disk number) potentially can change (BIOS boot changes?). In that case, Ubuntu likely will use the last known device (cached, /etc/lvm/[backup|archive]/?) location when it won't be able to connect to lvmetad service.



              For example, I was asked to type a passphrase for nvme1n1p3_crypt (Windows NTFS partition) instead of nvme0n1p3 (crypto_LUKS partition).




            Further suggested commands:





            • Run lvm lvs or lvm vgscan and check for any errors (it identifies each disk with a UUID).



              See also: Ubuntu won't boot because of lvmetad & Failed to connect to lvmetad - Stuck on boot.



            • cat /proc/modules to check for missing modules (load it by modprobe).



            When finish, type reboot to restart.





            If you did an upgrade recently, test your previous kernel (hold Shift during boot, and select Advanced options), and select the version which you'd like to test.





            Other related resources:




            • How can one unlock a fully encrypted Ubuntu 11.10 system over SSH at boot?

            • Ephemeral error message: "cryptsetup: unknown fstype, bad password or options?"


            • lvm2 bug in Ubuntu 18.04: lvm2-activation-generator crashed with SIGSEGV.



              Similar older bug: error unlocking / decrypting LUKS volume at boot.



            • UEFI Introduction & How do I install Ubuntu alongside a pre-installed Windows with UEFI?







            share|improve this answer




























              0
















              Here are some suggestions.




              • Switch to the command-line by hitting F1 or Alt-Tab, type the password again, and check for any errors. If you find the error, try searching for it.


              • When you wait few minutes, you should be shown initramfs/BusyBox console screen. Using the command-line, you should check the syntax of your kernel arguments by typing the following command:



                cat /proc/cmdline


                Especially check (as suggested by BusyBox):




                • The value of root, whether it points to the right device.

                • If rootdelay is set, maybe you need to increase the system wait?






              If above won't help, consider the following commands:





              • cryptsetup --debug luksOpen /dev/XXX mapper-name to decrypt manually (see this how-to).



                Note: To make sure you're using the right device, run dumpe2fs /dev/XXX (e.g. sda1 or nvme0n1p3) in initramfs/BusyBox console, then make sure it reports as crypto_LUKS.



                Note: If luksOpen fails, try the older syntax: cryptsetup --debug luksOpen /dev/XXX ubuntu.




              • cryptsetup --debug luksDump /dev/XXX to dump LUKS header information from the device.



                Note: In case of corruption of on-disk metadata, use cryptsetup repair <device> command.




              • On Please unlock disk XXX_crypt screen, note your device name and using above luksDump method, confirm that Ubuntu asks you to decrypt the right device as the order (disk number) potentially can change (BIOS boot changes?). In that case, Ubuntu likely will use the last known device (cached, /etc/lvm/[backup|archive]/?) location when it won't be able to connect to lvmetad service.



                For example, I was asked to type a passphrase for nvme1n1p3_crypt (Windows NTFS partition) instead of nvme0n1p3 (crypto_LUKS partition).




              Further suggested commands:





              • Run lvm lvs or lvm vgscan and check for any errors (it identifies each disk with a UUID).



                See also: Ubuntu won't boot because of lvmetad & Failed to connect to lvmetad - Stuck on boot.



              • cat /proc/modules to check for missing modules (load it by modprobe).



              When finish, type reboot to restart.





              If you did an upgrade recently, test your previous kernel (hold Shift during boot, and select Advanced options), and select the version which you'd like to test.





              Other related resources:




              • How can one unlock a fully encrypted Ubuntu 11.10 system over SSH at boot?

              • Ephemeral error message: "cryptsetup: unknown fstype, bad password or options?"


              • lvm2 bug in Ubuntu 18.04: lvm2-activation-generator crashed with SIGSEGV.



                Similar older bug: error unlocking / decrypting LUKS volume at boot.



              • UEFI Introduction & How do I install Ubuntu alongside a pre-installed Windows with UEFI?







              share|improve this answer


























                0












                0








                0








                Here are some suggestions.




                • Switch to the command-line by hitting F1 or Alt-Tab, type the password again, and check for any errors. If you find the error, try searching for it.


                • When you wait few minutes, you should be shown initramfs/BusyBox console screen. Using the command-line, you should check the syntax of your kernel arguments by typing the following command:



                  cat /proc/cmdline


                  Especially check (as suggested by BusyBox):




                  • The value of root, whether it points to the right device.

                  • If rootdelay is set, maybe you need to increase the system wait?






                If above won't help, consider the following commands:





                • cryptsetup --debug luksOpen /dev/XXX mapper-name to decrypt manually (see this how-to).



                  Note: To make sure you're using the right device, run dumpe2fs /dev/XXX (e.g. sda1 or nvme0n1p3) in initramfs/BusyBox console, then make sure it reports as crypto_LUKS.



                  Note: If luksOpen fails, try the older syntax: cryptsetup --debug luksOpen /dev/XXX ubuntu.




                • cryptsetup --debug luksDump /dev/XXX to dump LUKS header information from the device.



                  Note: In case of corruption of on-disk metadata, use cryptsetup repair <device> command.




                • On Please unlock disk XXX_crypt screen, note your device name and using above luksDump method, confirm that Ubuntu asks you to decrypt the right device as the order (disk number) potentially can change (BIOS boot changes?). In that case, Ubuntu likely will use the last known device (cached, /etc/lvm/[backup|archive]/?) location when it won't be able to connect to lvmetad service.



                  For example, I was asked to type a passphrase for nvme1n1p3_crypt (Windows NTFS partition) instead of nvme0n1p3 (crypto_LUKS partition).




                Further suggested commands:





                • Run lvm lvs or lvm vgscan and check for any errors (it identifies each disk with a UUID).



                  See also: Ubuntu won't boot because of lvmetad & Failed to connect to lvmetad - Stuck on boot.



                • cat /proc/modules to check for missing modules (load it by modprobe).



                When finish, type reboot to restart.





                If you did an upgrade recently, test your previous kernel (hold Shift during boot, and select Advanced options), and select the version which you'd like to test.





                Other related resources:




                • How can one unlock a fully encrypted Ubuntu 11.10 system over SSH at boot?

                • Ephemeral error message: "cryptsetup: unknown fstype, bad password or options?"


                • lvm2 bug in Ubuntu 18.04: lvm2-activation-generator crashed with SIGSEGV.



                  Similar older bug: error unlocking / decrypting LUKS volume at boot.



                • UEFI Introduction & How do I install Ubuntu alongside a pre-installed Windows with UEFI?







                share|improve this answer
















                Here are some suggestions.




                • Switch to the command-line by hitting F1 or Alt-Tab, type the password again, and check for any errors. If you find the error, try searching for it.


                • When you wait few minutes, you should be shown initramfs/BusyBox console screen. Using the command-line, you should check the syntax of your kernel arguments by typing the following command:



                  cat /proc/cmdline


                  Especially check (as suggested by BusyBox):




                  • The value of root, whether it points to the right device.

                  • If rootdelay is set, maybe you need to increase the system wait?






                If above won't help, consider the following commands:





                • cryptsetup --debug luksOpen /dev/XXX mapper-name to decrypt manually (see this how-to).



                  Note: To make sure you're using the right device, run dumpe2fs /dev/XXX (e.g. sda1 or nvme0n1p3) in initramfs/BusyBox console, then make sure it reports as crypto_LUKS.



                  Note: If luksOpen fails, try the older syntax: cryptsetup --debug luksOpen /dev/XXX ubuntu.




                • cryptsetup --debug luksDump /dev/XXX to dump LUKS header information from the device.



                  Note: In case of corruption of on-disk metadata, use cryptsetup repair <device> command.




                • On Please unlock disk XXX_crypt screen, note your device name and using above luksDump method, confirm that Ubuntu asks you to decrypt the right device as the order (disk number) potentially can change (BIOS boot changes?). In that case, Ubuntu likely will use the last known device (cached, /etc/lvm/[backup|archive]/?) location when it won't be able to connect to lvmetad service.



                  For example, I was asked to type a passphrase for nvme1n1p3_crypt (Windows NTFS partition) instead of nvme0n1p3 (crypto_LUKS partition).




                Further suggested commands:





                • Run lvm lvs or lvm vgscan and check for any errors (it identifies each disk with a UUID).



                  See also: Ubuntu won't boot because of lvmetad & Failed to connect to lvmetad - Stuck on boot.



                • cat /proc/modules to check for missing modules (load it by modprobe).



                When finish, type reboot to restart.





                If you did an upgrade recently, test your previous kernel (hold Shift during boot, and select Advanced options), and select the version which you'd like to test.





                Other related resources:




                • How can one unlock a fully encrypted Ubuntu 11.10 system over SSH at boot?

                • Ephemeral error message: "cryptsetup: unknown fstype, bad password or options?"


                • lvm2 bug in Ubuntu 18.04: lvm2-activation-generator crashed with SIGSEGV.



                  Similar older bug: error unlocking / decrypting LUKS volume at boot.



                • UEFI Introduction & How do I install Ubuntu alongside a pre-installed Windows with UEFI?








                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited Dec 8 at 23:48

























                answered Dec 8 at 18:53









                kenorb

                4,27913749




                4,27913749






























                    draft saved

                    draft discarded




















































                    Thanks for contributing an answer to Ask Ubuntu!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.





                    Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                    Please pay close attention to the following guidance:


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1087230%2fubuntu-18-04-cryptsetup-fails-to-recognize-passphrase-unlocking-from-live-usb%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    flock() on closed filehandle LOCK_FILE at /usr/bin/apt-mirror

                    Mangá

                     ⁒  ․,‪⁊‑⁙ ⁖, ⁇‒※‌, †,⁖‗‌⁝    ‾‸⁘,‖⁔⁣,⁂‾
”‑,‥–,‬ ,⁀‹⁋‴⁑ ‒ ,‴⁋”‼ ⁨,‷⁔„ ‰′,‐‚ ‥‡‎“‷⁃⁨⁅⁣,⁔
⁇‘⁔⁡⁏⁌⁡‿‶‏⁨ ⁣⁕⁖⁨⁩⁥‽⁀  ‴‬⁜‟ ⁃‣‧⁕‮ …‍⁨‴ ⁩,⁚⁖‫ ,‵ ⁀,‮⁝‣‣ ⁑  ⁂– ․, ‾‽ ‏⁁“⁗‸ ‾… ‹‡⁌⁎‸‘ ‡⁏⁌‪ ‵⁛ ‎⁨ ―⁦⁤⁄⁕