From owner-freebsd-geom@freebsd.org Mon Aug 19 01:55:17 2019 Return-Path: Delivered-To: freebsd-geom@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 05F46D5EED for ; Mon, 19 Aug 2019 01:55:17 +0000 (UTC) (envelope-from coco@executive-computing.de) Received: from mail.moehre.org (mail.moehre.org [195.96.35.7]) by mx1.freebsd.org (Postfix) with ESMTP id 46BcSg6Pwsz4C3s for ; Mon, 19 Aug 2019 01:55:15 +0000 (UTC) (envelope-from coco@executive-computing.de) Received: from mail.moehre.org (unknown [195.96.35.7]) by mail.moehre.org (Postfix) with ESMTP id 05433385B4 for ; Mon, 19 Aug 2019 03:55:14 +0200 (CEST) X-Spam-Flag: NO X-Spam-Score: -100.941 X-Spam-Level: X-Spam-Status: No, score=-100.941 tagged_above=-999 required=5 tests=[ALL_TRUSTED=-1, AWL=0.059, USER_IN_WHITELIST=-100] autolearn=disabled Received: from mail.moehre.org ([195.96.35.7]) by mail.moehre.org (mail.moehre.org [195.96.35.7]) (amavisd-new, port 10024) with ESMTP id uz0sG7Dt14bY for ; Mon, 19 Aug 2019 03:55:12 +0200 (CEST) Received: from localhost (p5B2F1337.dip0.t-ipconnect.de [91.47.19.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: coco@executive-computing.de) by mail.moehre.org (Postfix) with ESMTPSA id 976E1385AD for ; Mon, 19 Aug 2019 03:55:12 +0200 (CEST) Date: Mon, 19 Aug 2019 03:55:09 +0200 From: Marco Steinbach To: freebsd-geom@freebsd.org Subject: Re: 11.3: GELI attach: Wrong key despite correct passphrase Message-ID: <20190819035509.00007d37@executive-computing.de> In-Reply-To: References: <20190818154602.00003fa8@executive-computing.de> <96f3e2f5-ab4c-19c9-2f68-e42bb0e8aab4@cyberleo.net> <20190818210531.00006ffa@executive-computing.de> X-Mailer: Claws Mail 3.14.1 (GTK+ 2.24.31; x86_64-w64-mingw32) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 46BcSg6Pwsz4C3s X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of coco@executive-computing.de designates 195.96.35.7 as permitted sender) smtp.mailfrom=coco@executive-computing.de X-Spamd-Result: default: False [-6.41 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-geom@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[executive-computing.de]; NEURAL_HAM_SHORT(-0.99)[-0.992,0]; IP_SCORE(-3.22)[ip: (-8.47), ipnet: 195.96.32.0/19(-4.24), asn: 8354(-3.39), country: DE(-0.01)]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8354, ipnet:195.96.32.0/19, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[55.19.47.91.khpj7ygk5idzvmvt5x4ziurxhy.zen.dq.spamhaus.net : 127.0.0.10] X-BeenThere: freebsd-geom@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: GEOM-specific discussions and implementations List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Aug 2019 01:55:17 -0000 On Mon, 19 Aug 2019 06:27:34 +0800 Ben Woods wrote: > On Mon, 19 Aug 2019 at 3:05 am, Marco Steinbach > wrote: >=20 > > On Sun, 18 Aug 2019 10:20:51 -0500 > > CyberLeo Kitsana wrote: > > =20 > > > On 8/18/19 8:46 AM, Marco Steinbach wrote: =20 > > > > Hi. > > > > > > > > I have two bootable SSDs, both installed using a GELI encrypted > > > > root on ZFS. =20 > > > > > > > > > =20 > > > > I've then imported the bootpool from da0, and mounted it, so I > > > > can try using the key in boot/ > > > > > > > > root@bsdbuch:~ # geli attach > > > > -k /bootpool/boot/ada0p5.eli /dev/da0p5 Enter passphrase: > > > > geli: Wrong key for da0p5. =20 > > > > > > Did you intend on combining both a keyfile AND a passphrase here? > > > If not, include the -p option to instruct geli to avoid asking > > > for a passphrase to mix in. > > > > > > It might also help to include the output of 'geli dump' for both > > > of the affected providers. You can obscure the 'Salt' and 'Master > > > Key' portions if you so desire. > > > =20 > > > > I think there's a misunderstanding. > > > > I merely want to attach the GELI created by the 11.1 installer to a > > newly installed 11.3 system. > > > > MfG CoCo =20 >=20 >=20 > Indeed, but what secrets do you need to provide to decrypt the geli > providers (passphrase, passfile, keyfile)? The command above will use > both a keyfile and prompt for a passphrase - was this your intention? >=20 > The =E2=80=9Cattach=E2=80=9D section of this manpage has more details if = required: >=20 > https://man.freebsd.org/geli >=20 What secrets do I need to provide, if I installed a root on ZFS on top of GELI using the FreeBSD installer (no manual intervention, really just what the installer offered) on the 11.1-RELEASE memstick, if I want to attach that provider to an 11.3-RELEASE system ? As I wrote, I have two SSDs both installed using the FreeBSD installer using root on ZFS on top of GELI. One was installed using the 11.1-RELEASE memstick, the other was installed using the 11.3-RELEASE memstick. I can attach the 11.3-RELEASE from the 11.1-RELEASE (just doing 'geli attach /dev/da0p5), but not vice versa. Both use the same passphrase, and both boot using this same passphrase. Since GELI on the 11.3-RELEASE system told me 'geli: wrong key for da0p5' when trying to attach the 11.1-RELEASE GELI provider, I tried using the keyfile generated by the 11.1-RELEASE installer in conjunction with the passphrase. That also failed. MfG CoCo