How to manage disk encryption passphrases and key slots

Now, when you do a cryptsetup luksDump /dev/sdaX, you will see that you now have two key slots (key slot 0 and key slot 1) in ENABLED status.

luks_05
Two active key slots

With a backup passphrase in place, it is now save to delete the first key that you wanted to delete. And you delete a key, that is, disable a key slot, by typing cryptsetup luksKillSlot /dev/sdaX Y. In this command, “Y” is the key slot that you want to disable. In this particular case, the command will be cryptsetup luksKillSlot /dev/sda7 0 because we are attempting to delete the passphrase stored in the first key slot (key slot 0).

luks_06
Deleting a passphrase

If you do another cryptsetup luksDump /dev/sdaX, you will see that the first key slot, key slot 0, is in DISABLED status.

luks_07
Key dump

Now that you have just one active passphrase, you may want to create another one as a backup, and you can create one in any of the available key slots, including the one you just disabled.

I hope the information presented here has given you some insight into disk encryption passphrase management. This is introductory information. There are more advanced key management tasks that I will address in a future post. Corrections and questions are welcome.

Related Posts

Using GNOME Boxes to create and access local virtual systems on GNOME 3.14 GNOME Boxes is a native GNOME 3 application for accessing remote machines and local virtual systems, primarily using the libvirt technology. Consider ...
Manual disk partitioning guide for Linux Mint Debian The latest ISO installation images for Linux Mint Debian, the line of Linux Mint based on Debian, were made available for download a few days ago. Whi...
How to add an entry for a Linux distribution in Windows’ boot menu Dual-booting any version of Microsoft's Windows operating system with a Linux or BSD desktop or server distribution is a very common practice. For fir...
How to install Oracle JRE on Fedora 20 and use alternatives to switch between it and OpenJ... All the Java components installed on Fedora (20) are provided by OpenJDK (Open Java Development Kit), a Free Software implementation of Java SE (Stand...
How to dual-boot Windows 7 and Chakra Linux Archimedes, with shared NTFS partition at the ... The first article on dual-booting Windows 7 and Chakra Linux, involved Chakra Edn, the edition of Chakra with BURG as the boot loader (see How to dual...
Install the latest and greatest Cinnamon desktop on Ubuntu 12.04 Ubuntu 12.04 LTS, code-named Precise Pangolin, is the latest release of the popular Linux distribution. It was made available for the public just a fe...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


3 Comments

  1. Opensuse also supports disk encryption (and LVM) natively in its GUI install program.

  2. Pingback: Manage your disk encryption passphrases « 0ddn1x: tricks with *nix

  3. Pingback: Links 8/10/2010: Linux Tablet Price Goes Down Under $200, Fedora 14 Beta Preview | Techrights

Leave a Comment

Your email address will not be published. Required fields are marked *

*