[Bug 2037574] Re: encrypted zfs partition not mountable from live session using recovery key

Tim Andersson 2037574 at bugs.launchpad.net
Mon Oct 2 09:46:19 UTC 2023


I understand that perhaps this would work, but is that really the point
of the recovery key? If we're using the recovery key post-install on the
same installed system, manually unmounting /target etc, is that
reflective of the situations the recovery key is supposed to be used in?

I don't have a problem with the process you suggest but in terms of
tests for the isotracker, they should be reflective of user experience.
It's my assumption, and I may be wrong, but would a user not use the
recovery key to recover a drive they no longer have access too by usual
methods (on the originally installed system)? Is there a use case in
which a user would have access to the original system, but not to the
encrypted zfs data?

We can also include both steps in the isotracker tests - unmount and
remount from the installed system, then boot into it with an iso and
mount the data in a live session.

If I'm wrong in my assumptions, please do tell me :)

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to ubiquity in Ubuntu.
https://bugs.launchpad.net/bugs/2037574

Title:
  encrypted zfs partition not mountable from live session using recovery
  key

Status in ubiquity package in Ubuntu:
  New
Status in ubiquity source package in Mantic:
  New

Bug description:
  I did an install in a VM with zfs+encryption, and I enabled the
  recovery key option in the install process.

  I then booted into a live session using the same storage and attempted to mount the storage using steps from the following:
  https://radagast.ca/linux/mounting-ubuntu-encrypted-zfs.html

  It works just fine (the cryptsetup command specifically) using the
  passphrase from the install process. However, the cryptsetup command
  does NOT work when using the recovery key chosen in the install
  process.

  I copied the recovery key down at install time, and wrote the key to a
  file in the live session. I then passed it to the cryptsetup command
  using --key-file and --master-key-file command line options (with
  /path/to/recovery.key). Neither options worked. The disk is only
  mountable using the passphrase.

  I may be using the recovery key incorrectly, but if that is the case,
  there is a lack of documentation surrounding this part of the install
  process.

  ProblemType: Bug
  DistroRelease: Ubuntu 23.10
  Package: ubiquity (not installed)
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: zfs
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 17:44:13 2023
  InstallCmdLine: BOOT_IMAGE=/casper/vmlinuz file=/cdrom/preseed/ubuntu.seed maybe-ubiquity quiet splash ---
  InstallationDate: Installed on 2023-09-27 (0 days ago)
  InstallationMedia: Ubuntu Legacy 23.10 "Mantic Minotaur" - Beta amd64 (20230925)
  SourcePackage: ubiquity
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2037574/+subscriptions




More information about the foundations-bugs mailing list