-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to unlock veracrypt encrypted partition using a keyfile #1191
Comments
One more thing. I can unlock the VeraCrypt partition using the TrueCrypt/VeraCrypt support built into cryptsetup. |
I can also confirm this to be the case. If I try to unlock my drive, I'm using a hidden volume and here is what it shows:
|
I remember going through the code trying to find the culprit, but I had to stop to attend to other matters. However, I have a hunch about what may be causing this issue: The use of key files in VeraCrypt differs from how they are used in LUKS. Namely, in LUKS a key file can be used as an alternative to a passphrase, while in VeraCrypt a passphrase is also required when using a key file; Even when the passphrase is empty, it's still considered a passphrase. I remember seeing code in the DBUS API that handles VeraCrypt in the proper manner, but I could not find the complementary code in the client-side tools. |
TrueCrypt/VeraCrypt support was never added to |
As suggested by #894 I created /etc/udisks2/tcrypt.conf (which is an empty file).
udiskie correctly prompts to unlock the device. When I try to unlock it with either udiskie or udisksctl I get this:
I can unlock the device on Windows. I've also compared the SHA256 of the keyfile on Windows and Linux and they match.
The text was updated successfully, but these errors were encountered: