Prompted for LUKS password twice on boot despite separate, unencrypted boot partition?
Key Details
My GPT layout drive has the following partition layout:
/dev/sda---|
|sda1 - Windows Recovery Partition
|sda2 - EFI Partition (Shared, Windows and Linux)
|sda3 - Windows Primary Partition
|sda4 - LUKS encrypted LVM partition
--------| /dev/mapper/volume-group-root: Linux root "/"
--------| /dev/mapper/volume-group-swap_1: Linux swap
Current Problem:
On boot, GRUB immediately prompts for the "master key". Entering the LUKS password allows the GRUB boot menu to open.
After selecting the linux OS to boot, another password prompt appears to unlock the LVM partition.
The second prompt makes sense - but why does that first one appear?
The Usual Answer
GRUB needs to decrypt the drive to read the boot files
This would make sense, but my GRUB installation should be sharing the unencrypted EFI partition with Windows. There are definitely boot files there anyway...
The steps I followed:
sudo mount /dev/mapper/volume-group-root /mnt
sudo mount /dev/sda1 /mnt/boot/efi
for i in /dev /dev/pts /proc /sys /run; do sudo mount -B $i /mnt$i; done
sudo chroot /mnt
grub-install /dev/sda
update-grub
Unfortunately the problem persists. Any thoughts or troubleshooting advice appreciated.
N.B - I suspect that grub placed the files in the EFI partition, but is incorrectly configured such that it tries to look in the wrong place on boot? Both the Windows and Linux OSes boot fine though. Not sure how to investigate this.
Further Information
- The current EFI partition is not inside the encrypted LVM. (Apologies if my diagram is unclear, advice welcome on how to make it clearer!)
- You answer suggests I need a /boot partition and a seperate EFI partition (I think), the trouble I am having is that various internet sources suggest that only one EFI partition is needed:
This table states /boot or EFI
This answers states /boot/efi is a convention and not necessary
and finally, this source states that I can get linux to share the Windows EFI partition without any issues, which is my aim here.
Maybe this is all fstab/other config related rather than partition issues?
boot dual-boot grub2 partitioning encryption
add a comment |
Key Details
My GPT layout drive has the following partition layout:
/dev/sda---|
|sda1 - Windows Recovery Partition
|sda2 - EFI Partition (Shared, Windows and Linux)
|sda3 - Windows Primary Partition
|sda4 - LUKS encrypted LVM partition
--------| /dev/mapper/volume-group-root: Linux root "/"
--------| /dev/mapper/volume-group-swap_1: Linux swap
Current Problem:
On boot, GRUB immediately prompts for the "master key". Entering the LUKS password allows the GRUB boot menu to open.
After selecting the linux OS to boot, another password prompt appears to unlock the LVM partition.
The second prompt makes sense - but why does that first one appear?
The Usual Answer
GRUB needs to decrypt the drive to read the boot files
This would make sense, but my GRUB installation should be sharing the unencrypted EFI partition with Windows. There are definitely boot files there anyway...
The steps I followed:
sudo mount /dev/mapper/volume-group-root /mnt
sudo mount /dev/sda1 /mnt/boot/efi
for i in /dev /dev/pts /proc /sys /run; do sudo mount -B $i /mnt$i; done
sudo chroot /mnt
grub-install /dev/sda
update-grub
Unfortunately the problem persists. Any thoughts or troubleshooting advice appreciated.
N.B - I suspect that grub placed the files in the EFI partition, but is incorrectly configured such that it tries to look in the wrong place on boot? Both the Windows and Linux OSes boot fine though. Not sure how to investigate this.
Further Information
- The current EFI partition is not inside the encrypted LVM. (Apologies if my diagram is unclear, advice welcome on how to make it clearer!)
- You answer suggests I need a /boot partition and a seperate EFI partition (I think), the trouble I am having is that various internet sources suggest that only one EFI partition is needed:
This table states /boot or EFI
This answers states /boot/efi is a convention and not necessary
and finally, this source states that I can get linux to share the Windows EFI partition without any issues, which is my aim here.
Maybe this is all fstab/other config related rather than partition issues?
boot dual-boot grub2 partitioning encryption
add a comment |
Key Details
My GPT layout drive has the following partition layout:
/dev/sda---|
|sda1 - Windows Recovery Partition
|sda2 - EFI Partition (Shared, Windows and Linux)
|sda3 - Windows Primary Partition
|sda4 - LUKS encrypted LVM partition
--------| /dev/mapper/volume-group-root: Linux root "/"
--------| /dev/mapper/volume-group-swap_1: Linux swap
Current Problem:
On boot, GRUB immediately prompts for the "master key". Entering the LUKS password allows the GRUB boot menu to open.
After selecting the linux OS to boot, another password prompt appears to unlock the LVM partition.
The second prompt makes sense - but why does that first one appear?
The Usual Answer
GRUB needs to decrypt the drive to read the boot files
This would make sense, but my GRUB installation should be sharing the unencrypted EFI partition with Windows. There are definitely boot files there anyway...
The steps I followed:
sudo mount /dev/mapper/volume-group-root /mnt
sudo mount /dev/sda1 /mnt/boot/efi
for i in /dev /dev/pts /proc /sys /run; do sudo mount -B $i /mnt$i; done
sudo chroot /mnt
grub-install /dev/sda
update-grub
Unfortunately the problem persists. Any thoughts or troubleshooting advice appreciated.
N.B - I suspect that grub placed the files in the EFI partition, but is incorrectly configured such that it tries to look in the wrong place on boot? Both the Windows and Linux OSes boot fine though. Not sure how to investigate this.
Further Information
- The current EFI partition is not inside the encrypted LVM. (Apologies if my diagram is unclear, advice welcome on how to make it clearer!)
- You answer suggests I need a /boot partition and a seperate EFI partition (I think), the trouble I am having is that various internet sources suggest that only one EFI partition is needed:
This table states /boot or EFI
This answers states /boot/efi is a convention and not necessary
and finally, this source states that I can get linux to share the Windows EFI partition without any issues, which is my aim here.
Maybe this is all fstab/other config related rather than partition issues?
boot dual-boot grub2 partitioning encryption
Key Details
My GPT layout drive has the following partition layout:
/dev/sda---|
|sda1 - Windows Recovery Partition
|sda2 - EFI Partition (Shared, Windows and Linux)
|sda3 - Windows Primary Partition
|sda4 - LUKS encrypted LVM partition
--------| /dev/mapper/volume-group-root: Linux root "/"
--------| /dev/mapper/volume-group-swap_1: Linux swap
Current Problem:
On boot, GRUB immediately prompts for the "master key". Entering the LUKS password allows the GRUB boot menu to open.
After selecting the linux OS to boot, another password prompt appears to unlock the LVM partition.
The second prompt makes sense - but why does that first one appear?
The Usual Answer
GRUB needs to decrypt the drive to read the boot files
This would make sense, but my GRUB installation should be sharing the unencrypted EFI partition with Windows. There are definitely boot files there anyway...
The steps I followed:
sudo mount /dev/mapper/volume-group-root /mnt
sudo mount /dev/sda1 /mnt/boot/efi
for i in /dev /dev/pts /proc /sys /run; do sudo mount -B $i /mnt$i; done
sudo chroot /mnt
grub-install /dev/sda
update-grub
Unfortunately the problem persists. Any thoughts or troubleshooting advice appreciated.
N.B - I suspect that grub placed the files in the EFI partition, but is incorrectly configured such that it tries to look in the wrong place on boot? Both the Windows and Linux OSes boot fine though. Not sure how to investigate this.
Further Information
- The current EFI partition is not inside the encrypted LVM. (Apologies if my diagram is unclear, advice welcome on how to make it clearer!)
- You answer suggests I need a /boot partition and a seperate EFI partition (I think), the trouble I am having is that various internet sources suggest that only one EFI partition is needed:
This table states /boot or EFI
This answers states /boot/efi is a convention and not necessary
and finally, this source states that I can get linux to share the Windows EFI partition without any issues, which is my aim here.
Maybe this is all fstab/other config related rather than partition issues?
boot dual-boot grub2 partitioning encryption
boot dual-boot grub2 partitioning encryption
edited Jan 2 at 20:08
Sam3000
asked Jan 2 at 1:52
Sam3000Sam3000
1014
1014
add a comment |
add a comment |
1 Answer
1
active
oldest
votes
Something is off in your configuration. There should be a /boot
partition that is outside the encrypted LVM partition. This partition is separate from the EFI parition. In fact, the EFI partition gets mounted at /boot/efi
. The unencrypted /boot
partition is what contains the initrd (initial RAM disk, a temporary root filesystem used at boot time) that houses everything needed for system decryption. The initrd, not GRUB, is what typically runs at boot time to ask you for your password and then unlocks everything in one go so you can load and run the installed system.
You will need to create a new unencrypted partition and move /boot
there. Then you'll need update your /etc/fstab
. If you don't have a /etc/crypttab
file, you need to make one that decrypts /dev/sda4
(the UUID is typically used in this file). Then run:
sudo update-initramfs; sudo update-grub
to rebuild all of your boot files.
You can create /boot
on /dev/sda
or you can use another device (even a USB stick partition) if you like. Format your new /boot
partition using ext[2,3,4] (use ext2 if you're putting it on a USB). The Ubuntu installer uses ext2 for the /boot
partition.
Further explanation
In your further information, the table you reference is addressing Arch Linux with which I have used very little and am much less familiar. As for the second link to the mount point for the EFI partition, sticking with convention will make it easier in the long run in case you need to troubleshoot or you're setting up a system that someone else may manage. I've never tried mounting the EFI partition anywhere else, but if it works for you, go for it. If that path is hardcoded in any application that needs to access the partition, it could prove problematic.
Yes, if you already have an EFI partition, Windows and Ubuntu can happily share the same EFI partition, but the initrd files to decrypt and boot into Ubuntu are not saved on the EFI partition (/boot/efi
on a standard installation). They are saved in /boot
. I'm curious to know how you performed the installation as Ubuntu doesn't handle an encrypted /boot
partition well. At any rate, using the graphical installer and opting for FDE results in the following partition structure:
sda
├─sda1 boot partition on /boot
├─sda2 EFI partition on /boot/efi
└─sda5 LUKS encrypted partition
└─LVM PV
├─root Logical Volume on /
└─swap Logical Volume as swap
Perhaps Ubuntu will one day better support /boot
encryption, but if you want to get by with a single password in the meantime, you're probably just going to have to create an unencrypted partition for /boot
, separate and distinct from your EFI partition. There is justifiable concern about an unencrypted /boot
partition which is why I mention the possibility of using a USB stick (separate device) to house your /boot
partition.
Further investigation (This is most likely what you are looking for)
So I did a little digging, and it looks like others have set up systems without the /boot
partition, though it was required during initial system installation. Take a look at the bottom of this article that describes a setup similar to what you say you're running. In it the author presents a fix for the second password prompt. Basically, the author walks you through creating a key file, adding it to your LUKS partition, and then tweaking the initrd file to use the key file where the system is asking you for the password the second time.
Thanks very much for taking the time to write this, I'll see what I can figure out with it later today!
– Sam3000
Jan 2 at 6:50
an edit and an upvote! ;-)
– Fabby
Jan 2 at 17:08
Okay, I've had time to go through this now, I really appreciate your help. I'm still very confused however, and have added further information to my question if you have a moment to take a look. :)
– Sam3000
Jan 2 at 20:09
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1106136%2fprompted-for-luks-password-twice-on-boot-despite-separate-unencrypted-boot-part%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
Something is off in your configuration. There should be a /boot
partition that is outside the encrypted LVM partition. This partition is separate from the EFI parition. In fact, the EFI partition gets mounted at /boot/efi
. The unencrypted /boot
partition is what contains the initrd (initial RAM disk, a temporary root filesystem used at boot time) that houses everything needed for system decryption. The initrd, not GRUB, is what typically runs at boot time to ask you for your password and then unlocks everything in one go so you can load and run the installed system.
You will need to create a new unencrypted partition and move /boot
there. Then you'll need update your /etc/fstab
. If you don't have a /etc/crypttab
file, you need to make one that decrypts /dev/sda4
(the UUID is typically used in this file). Then run:
sudo update-initramfs; sudo update-grub
to rebuild all of your boot files.
You can create /boot
on /dev/sda
or you can use another device (even a USB stick partition) if you like. Format your new /boot
partition using ext[2,3,4] (use ext2 if you're putting it on a USB). The Ubuntu installer uses ext2 for the /boot
partition.
Further explanation
In your further information, the table you reference is addressing Arch Linux with which I have used very little and am much less familiar. As for the second link to the mount point for the EFI partition, sticking with convention will make it easier in the long run in case you need to troubleshoot or you're setting up a system that someone else may manage. I've never tried mounting the EFI partition anywhere else, but if it works for you, go for it. If that path is hardcoded in any application that needs to access the partition, it could prove problematic.
Yes, if you already have an EFI partition, Windows and Ubuntu can happily share the same EFI partition, but the initrd files to decrypt and boot into Ubuntu are not saved on the EFI partition (/boot/efi
on a standard installation). They are saved in /boot
. I'm curious to know how you performed the installation as Ubuntu doesn't handle an encrypted /boot
partition well. At any rate, using the graphical installer and opting for FDE results in the following partition structure:
sda
├─sda1 boot partition on /boot
├─sda2 EFI partition on /boot/efi
└─sda5 LUKS encrypted partition
└─LVM PV
├─root Logical Volume on /
└─swap Logical Volume as swap
Perhaps Ubuntu will one day better support /boot
encryption, but if you want to get by with a single password in the meantime, you're probably just going to have to create an unencrypted partition for /boot
, separate and distinct from your EFI partition. There is justifiable concern about an unencrypted /boot
partition which is why I mention the possibility of using a USB stick (separate device) to house your /boot
partition.
Further investigation (This is most likely what you are looking for)
So I did a little digging, and it looks like others have set up systems without the /boot
partition, though it was required during initial system installation. Take a look at the bottom of this article that describes a setup similar to what you say you're running. In it the author presents a fix for the second password prompt. Basically, the author walks you through creating a key file, adding it to your LUKS partition, and then tweaking the initrd file to use the key file where the system is asking you for the password the second time.
Thanks very much for taking the time to write this, I'll see what I can figure out with it later today!
– Sam3000
Jan 2 at 6:50
an edit and an upvote! ;-)
– Fabby
Jan 2 at 17:08
Okay, I've had time to go through this now, I really appreciate your help. I'm still very confused however, and have added further information to my question if you have a moment to take a look. :)
– Sam3000
Jan 2 at 20:09
add a comment |
Something is off in your configuration. There should be a /boot
partition that is outside the encrypted LVM partition. This partition is separate from the EFI parition. In fact, the EFI partition gets mounted at /boot/efi
. The unencrypted /boot
partition is what contains the initrd (initial RAM disk, a temporary root filesystem used at boot time) that houses everything needed for system decryption. The initrd, not GRUB, is what typically runs at boot time to ask you for your password and then unlocks everything in one go so you can load and run the installed system.
You will need to create a new unencrypted partition and move /boot
there. Then you'll need update your /etc/fstab
. If you don't have a /etc/crypttab
file, you need to make one that decrypts /dev/sda4
(the UUID is typically used in this file). Then run:
sudo update-initramfs; sudo update-grub
to rebuild all of your boot files.
You can create /boot
on /dev/sda
or you can use another device (even a USB stick partition) if you like. Format your new /boot
partition using ext[2,3,4] (use ext2 if you're putting it on a USB). The Ubuntu installer uses ext2 for the /boot
partition.
Further explanation
In your further information, the table you reference is addressing Arch Linux with which I have used very little and am much less familiar. As for the second link to the mount point for the EFI partition, sticking with convention will make it easier in the long run in case you need to troubleshoot or you're setting up a system that someone else may manage. I've never tried mounting the EFI partition anywhere else, but if it works for you, go for it. If that path is hardcoded in any application that needs to access the partition, it could prove problematic.
Yes, if you already have an EFI partition, Windows and Ubuntu can happily share the same EFI partition, but the initrd files to decrypt and boot into Ubuntu are not saved on the EFI partition (/boot/efi
on a standard installation). They are saved in /boot
. I'm curious to know how you performed the installation as Ubuntu doesn't handle an encrypted /boot
partition well. At any rate, using the graphical installer and opting for FDE results in the following partition structure:
sda
├─sda1 boot partition on /boot
├─sda2 EFI partition on /boot/efi
└─sda5 LUKS encrypted partition
└─LVM PV
├─root Logical Volume on /
└─swap Logical Volume as swap
Perhaps Ubuntu will one day better support /boot
encryption, but if you want to get by with a single password in the meantime, you're probably just going to have to create an unencrypted partition for /boot
, separate and distinct from your EFI partition. There is justifiable concern about an unencrypted /boot
partition which is why I mention the possibility of using a USB stick (separate device) to house your /boot
partition.
Further investigation (This is most likely what you are looking for)
So I did a little digging, and it looks like others have set up systems without the /boot
partition, though it was required during initial system installation. Take a look at the bottom of this article that describes a setup similar to what you say you're running. In it the author presents a fix for the second password prompt. Basically, the author walks you through creating a key file, adding it to your LUKS partition, and then tweaking the initrd file to use the key file where the system is asking you for the password the second time.
Thanks very much for taking the time to write this, I'll see what I can figure out with it later today!
– Sam3000
Jan 2 at 6:50
an edit and an upvote! ;-)
– Fabby
Jan 2 at 17:08
Okay, I've had time to go through this now, I really appreciate your help. I'm still very confused however, and have added further information to my question if you have a moment to take a look. :)
– Sam3000
Jan 2 at 20:09
add a comment |
Something is off in your configuration. There should be a /boot
partition that is outside the encrypted LVM partition. This partition is separate from the EFI parition. In fact, the EFI partition gets mounted at /boot/efi
. The unencrypted /boot
partition is what contains the initrd (initial RAM disk, a temporary root filesystem used at boot time) that houses everything needed for system decryption. The initrd, not GRUB, is what typically runs at boot time to ask you for your password and then unlocks everything in one go so you can load and run the installed system.
You will need to create a new unencrypted partition and move /boot
there. Then you'll need update your /etc/fstab
. If you don't have a /etc/crypttab
file, you need to make one that decrypts /dev/sda4
(the UUID is typically used in this file). Then run:
sudo update-initramfs; sudo update-grub
to rebuild all of your boot files.
You can create /boot
on /dev/sda
or you can use another device (even a USB stick partition) if you like. Format your new /boot
partition using ext[2,3,4] (use ext2 if you're putting it on a USB). The Ubuntu installer uses ext2 for the /boot
partition.
Further explanation
In your further information, the table you reference is addressing Arch Linux with which I have used very little and am much less familiar. As for the second link to the mount point for the EFI partition, sticking with convention will make it easier in the long run in case you need to troubleshoot or you're setting up a system that someone else may manage. I've never tried mounting the EFI partition anywhere else, but if it works for you, go for it. If that path is hardcoded in any application that needs to access the partition, it could prove problematic.
Yes, if you already have an EFI partition, Windows and Ubuntu can happily share the same EFI partition, but the initrd files to decrypt and boot into Ubuntu are not saved on the EFI partition (/boot/efi
on a standard installation). They are saved in /boot
. I'm curious to know how you performed the installation as Ubuntu doesn't handle an encrypted /boot
partition well. At any rate, using the graphical installer and opting for FDE results in the following partition structure:
sda
├─sda1 boot partition on /boot
├─sda2 EFI partition on /boot/efi
└─sda5 LUKS encrypted partition
└─LVM PV
├─root Logical Volume on /
└─swap Logical Volume as swap
Perhaps Ubuntu will one day better support /boot
encryption, but if you want to get by with a single password in the meantime, you're probably just going to have to create an unencrypted partition for /boot
, separate and distinct from your EFI partition. There is justifiable concern about an unencrypted /boot
partition which is why I mention the possibility of using a USB stick (separate device) to house your /boot
partition.
Further investigation (This is most likely what you are looking for)
So I did a little digging, and it looks like others have set up systems without the /boot
partition, though it was required during initial system installation. Take a look at the bottom of this article that describes a setup similar to what you say you're running. In it the author presents a fix for the second password prompt. Basically, the author walks you through creating a key file, adding it to your LUKS partition, and then tweaking the initrd file to use the key file where the system is asking you for the password the second time.
Something is off in your configuration. There should be a /boot
partition that is outside the encrypted LVM partition. This partition is separate from the EFI parition. In fact, the EFI partition gets mounted at /boot/efi
. The unencrypted /boot
partition is what contains the initrd (initial RAM disk, a temporary root filesystem used at boot time) that houses everything needed for system decryption. The initrd, not GRUB, is what typically runs at boot time to ask you for your password and then unlocks everything in one go so you can load and run the installed system.
You will need to create a new unencrypted partition and move /boot
there. Then you'll need update your /etc/fstab
. If you don't have a /etc/crypttab
file, you need to make one that decrypts /dev/sda4
(the UUID is typically used in this file). Then run:
sudo update-initramfs; sudo update-grub
to rebuild all of your boot files.
You can create /boot
on /dev/sda
or you can use another device (even a USB stick partition) if you like. Format your new /boot
partition using ext[2,3,4] (use ext2 if you're putting it on a USB). The Ubuntu installer uses ext2 for the /boot
partition.
Further explanation
In your further information, the table you reference is addressing Arch Linux with which I have used very little and am much less familiar. As for the second link to the mount point for the EFI partition, sticking with convention will make it easier in the long run in case you need to troubleshoot or you're setting up a system that someone else may manage. I've never tried mounting the EFI partition anywhere else, but if it works for you, go for it. If that path is hardcoded in any application that needs to access the partition, it could prove problematic.
Yes, if you already have an EFI partition, Windows and Ubuntu can happily share the same EFI partition, but the initrd files to decrypt and boot into Ubuntu are not saved on the EFI partition (/boot/efi
on a standard installation). They are saved in /boot
. I'm curious to know how you performed the installation as Ubuntu doesn't handle an encrypted /boot
partition well. At any rate, using the graphical installer and opting for FDE results in the following partition structure:
sda
├─sda1 boot partition on /boot
├─sda2 EFI partition on /boot/efi
└─sda5 LUKS encrypted partition
└─LVM PV
├─root Logical Volume on /
└─swap Logical Volume as swap
Perhaps Ubuntu will one day better support /boot
encryption, but if you want to get by with a single password in the meantime, you're probably just going to have to create an unencrypted partition for /boot
, separate and distinct from your EFI partition. There is justifiable concern about an unencrypted /boot
partition which is why I mention the possibility of using a USB stick (separate device) to house your /boot
partition.
Further investigation (This is most likely what you are looking for)
So I did a little digging, and it looks like others have set up systems without the /boot
partition, though it was required during initial system installation. Take a look at the bottom of this article that describes a setup similar to what you say you're running. In it the author presents a fix for the second password prompt. Basically, the author walks you through creating a key file, adding it to your LUKS partition, and then tweaking the initrd file to use the key file where the system is asking you for the password the second time.
edited Jan 3 at 9:08
answered Jan 2 at 2:10
b_laoshib_laoshi
2,577928
2,577928
Thanks very much for taking the time to write this, I'll see what I can figure out with it later today!
– Sam3000
Jan 2 at 6:50
an edit and an upvote! ;-)
– Fabby
Jan 2 at 17:08
Okay, I've had time to go through this now, I really appreciate your help. I'm still very confused however, and have added further information to my question if you have a moment to take a look. :)
– Sam3000
Jan 2 at 20:09
add a comment |
Thanks very much for taking the time to write this, I'll see what I can figure out with it later today!
– Sam3000
Jan 2 at 6:50
an edit and an upvote! ;-)
– Fabby
Jan 2 at 17:08
Okay, I've had time to go through this now, I really appreciate your help. I'm still very confused however, and have added further information to my question if you have a moment to take a look. :)
– Sam3000
Jan 2 at 20:09
Thanks very much for taking the time to write this, I'll see what I can figure out with it later today!
– Sam3000
Jan 2 at 6:50
Thanks very much for taking the time to write this, I'll see what I can figure out with it later today!
– Sam3000
Jan 2 at 6:50
an edit and an upvote! ;-)
– Fabby
Jan 2 at 17:08
an edit and an upvote! ;-)
– Fabby
Jan 2 at 17:08
Okay, I've had time to go through this now, I really appreciate your help. I'm still very confused however, and have added further information to my question if you have a moment to take a look. :)
– Sam3000
Jan 2 at 20:09
Okay, I've had time to go through this now, I really appreciate your help. I'm still very confused however, and have added further information to my question if you have a moment to take a look. :)
– Sam3000
Jan 2 at 20:09
add a comment |
Thanks for contributing an answer to Ask Ubuntu!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1106136%2fprompted-for-luks-password-twice-on-boot-despite-separate-unencrypted-boot-part%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown