You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
warn "Test opening "$LUKS" LUKS encrypted drive content with current Recovery Disk Key passphrase..."
310
+
warn "Testing opening "$LUKS" LUKS encrypted drive content with the current Disk Recovery Key passphrase..."
311
311
cryptsetup open $LUKStest --key-file /tmp/luks_current_Disk_Recovery_Key_passphrase
312
312
fi
313
313
#Validate past cryptsetup-reencrypt attempts
314
314
if [ $?-eq 0 ];then
315
315
whiptail --title 'Invalid Actual LUKS Disk Recovery Key passphrase?' --msgbox \
316
-
"If you previously changed it and do not remember it, you will have to\n reinstall OS from a an external drive.\n\nTo do so, place ISO file and its signature file on root of external drive,\n and select Options-> Boot from USB \n\nHit Enter to retry." 30 60
316
+
"If you previously changed it and do not remember it, you will have to\n reinstall the OS from a an external drive.\n\nTo do so, place the ISO file and its signature file on root of an\n external drive, and select Options-> Boot from USB \n\nHit Enter to retry." 30 60
if [ -z"$luks_current_Disk_Recovery_Key_passphrase" ];then
343
347
#if no external provisioning provides current Disk Recovery Key passphrase
344
-
whiptail --title 'Reencrypt LUKS disk encrypted container ?' \
345
-
--msgbox "This will replace the encrypted container content and its Disk Recovery Key.\n\nThe passphrase associated with this key will be asked from the user in the\nfollowing conditions:\n 1-Every boot if no Disk unlock key was added to the TPM\n 2-If the TPM fails (Hardware failure)\n 3-If the firmware has been tampered with/upgraded/modified by the user\n\nThis process requires you to type the current Disk Recovery Key passphrase\nand will delete TPM Disk unlock key slot if set up by setting a default boot\n LUKS header (slot 1) if present.\n\nAt the next prompt, you may be asked to select which file corresponds to\nthe LUKS device container.\n\nHit Enter to continue." 0 80
346
-
echo -e "\nEnter current Disk Recovery Key passphrase (Configured at OS installation or by OEM):"
--msgbox "This will replace the encrypted container content and its Disk Recovery Key.\n\nThe passphrase associated with this key will be asked from the user under\nthe following conditions:\n 1-Every boot if no Disk Unlock Key was added to the TPM\n 2-If the TPM fails (hardware failure)\n 3-If the firmware has been tampered with/upgraded/modified by the user\n\nThis process requires you to type the current Disk Recovery Key passphrase\nand will delete the TPM Disk Unlock Key slot, if set up, by setting a default\n boot LUKS key slot (1) if present.\n\nAt the next prompt, you may be asked to select which file corresponds to\nthe LUKS device container.\n\nHit Enter to continue." 0 80
350
+
echo -e "\nEnter the current Disk Recovery Key passphrase:"
whiptail --title 'Invalid Actual LUKS Disk Recovery Key passphrase?' --msgbox \
359
-
"If you previously changed it and do not remember it, you will have to\n reinstall OS from a an external drive.\n\nTo do so, place ISO file and its signature file on root of external drive,\n and select Options-> Boot from USB \n\nHit Enter to retry." 30 60
363
+
"If you previously changed it and do not remember it, you will have to\n reinstall the OS from a an external drive.\n\nTo do so, place the ISO file and its signature file on root of an\n external drive, and select Options-> Boot from USB \n\nHit Enter to retry." 30 60
#unsetting luks_current_Disk_Recovery_Key_passphrase so we prompt for it again Disk Recovery Key passphrase prompt on next round
362
366
unset luks_current_Disk_Recovery_Key_passphrase
@@ -383,37 +387,37 @@ luks_change_passphrase()
383
387
#if actual or new Disk Recovery Key is not provisioned by oem-provisioning file
384
388
if [ -z"$luks_current_Disk_Recovery_Key_passphrase" ] || [ -z"$luks_new_Disk_Recovery_Key_passphrase" ];then
385
389
whiptail --title 'Changing LUKS Disk Recovery Key passphrase' --msgbox \
386
-
"Please enter current Disk Recovery Key passphrase (slot 0).\nThen choose a strong passphrase of your own.\n\n**DICEWARE passphrase methodology is STRONGLY ADVISED.**\n\nHit Enter to continue" 30 60
390
+
"Please enter the current Disk Recovery Key passphrase (slot 0).\nThen choose a strong passphrase of your own.\n\n**DICEWARE passphrase methodology is STRONGLY ADVISED.**\n\nHit Enter to continue" 30 60
387
391
if [ -z"$luks_new_Disk_Recovery_Key_passphrase" ];then
388
-
echo -e "\nEnter desired replacement for actual Disk Recovery Key passphrase (At least 8 characters long):"
392
+
echo -e "\nEnter your desired replacement for the actual Disk Recovery Key passphrase (At least 8 characters long):"
389
393
while [[ ${#luks_new_Disk_Recovery_Key_passphrase}-lt 8 ]];do
390
-
{
391
-
read -r luks_new_Disk_Recovery_Key_passphrase
392
-
};done
394
+
{
395
+
read -r luks_new_Disk_Recovery_Key_passphrase
396
+
};done
393
397
fi
394
398
if [ -z"$luks_current_Disk_Recovery_Key_passphrase" ];then
395
-
echo -e "\nEnter current Disk Recovery Key passphrase (Configured at OS installation or by OEM):"
399
+
echo -e "\nEnter the current Disk Recovery Key passphrase (Configured at OS installation or by OEM):"
"The LUKS Disk Recovery Key passphrase was provided to you by the OEM over\n secure communication channel.\n\nIf you previously changed it and do not remember it,\n you will have to reinstall OS from a USB drive.\nTo do so, put OS ISO file and it's signature file on root of USB drive,\n And select Boot from USB\n\nHit Enter to continue." 30 60
420
+
"The LUKS Disk Recovery Key passphrase was provided to you by the OEM over\n a secure communication channel.\n\nIf you previously changed it and do not remember it,\n you will have to reinstall the OS from a USB drive.\nTo do so, put OS ISO file and it's signature file on root of a USB drive,\n and select Boot from USB\n\nHit Enter to continue." 30 60
417
421
unset luks_current_Disk_Recovery_Key_passphrase
418
422
unset luks_new_Disk_Recovery_Key_passphrase
419
423
#remove "known good" selected LUKS container so that next pass asks again user to select LUKS container.
0 commit comments