With password, how to find the passphrase for a full disk encryption after a clone The 2019...

Why couldn't they take pictures of a closer black hole?

Button changing its text & action. Good or terrible?

Loose spokes after only a few rides

Why didn't the Event Horizon Telescope team mention Sagittarius A*?

Why are there uneven bright areas in this photo of black hole?

Output the Arecibo Message

If a sorcerer casts the Banishment spell on a PC while in Avernus, does the PC return to their home plane?

Old scifi movie from the 50s or 60s with men in solid red uniforms who interrogate a spy from the past

APIPA and LAN Broadcast Domain

What could be the right powersource for 15 seconds lifespan disposable giant chainsaw?

Pokemon Turn Based battle (Python)

What is the most efficient way to store a numeric range?

Why doesn't UInt have a toDouble()?

Worn-tile Scrabble

I am an eight letter word. What am I?

Match Roman Numerals

For what reasons would an animal species NOT cross a *horizontal* land bridge?

Correct punctuation for showing a character's confusion

What is the meaning of Triage in Cybersec world?

How much of the clove should I use when using big garlic heads?

A word that means fill it to the required quantity

If I score a critical hit on an 18 or higher, what are my chances of getting a critical hit if I roll 3d20?

Why doesn't shell automatically fix "useless use of cat"?

What is this business jet?



With password, how to find the passphrase for a full disk encryption after a clone



The 2019 Stack Overflow Developer Survey Results Are In12.04 home encrypted and I have written down encryption passphrase. How to reset login password?Preseed Ubuntu installation with full disk encryptionHow can I use ldap authentication with full disk encryption?Full Disk Encryption Passphrase at Boot: Keyboard not workingFull disk encryption without enabiling LVMHow do I change full disk encryption passwordLUKS full disk encryption - autostartHow to setup a second harddrive with full disk encryptionFull Disk Encryption and Custom Partitioning on Ubuntu 18.04Booting from GRUB after installing Lubuntu with full-disk encryption





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}







1
















  1. I first installed Xubuntu 18.04 with full disk encryption with the
    default option; I remember the password, but lost the passphrase
    accidently.

  2. I cloned my original disk with clonezilla to a new disk;


Now I want to recover the passphrase for the new disk, and would like to know if it is possible?










share|improve this question









New contributor




sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 3





    No! it's not...

    – George Udosen
    12 hours ago






  • 1





    If you know parts or the structure of the passphrase or you have a weak passphrase, you can try JtR with luks2john. If not, the data is lost.

    – RoVo
    12 hours ago








  • 1





    this is why encryption is like playing with fire. people need to stop looking at it like a fun toy. it should be hidden in the ubuntu install options. 99% of end-users don't need it and a lot of new users end up with these sorts of problems.

    – tatsu
    12 hours ago








  • 1





    @tatsu no, encryption is very important to avoid data loss. But people need to start doing backups of important data. Unless you do backups, you WILL loose data - with or without encryption.

    – vidarlo
    12 hours ago











  • fair enough. I just think so many problems arise for new users out of os-level encryption that simply can't happen when you haven't ticked that option durring install. people see that option there and think "oh cool, a neat trick that's completely hands-off and encapsulated" ...it's not hands off. you have to know what you're doing.

    – tatsu
    12 hours ago


















1
















  1. I first installed Xubuntu 18.04 with full disk encryption with the
    default option; I remember the password, but lost the passphrase
    accidently.

  2. I cloned my original disk with clonezilla to a new disk;


Now I want to recover the passphrase for the new disk, and would like to know if it is possible?










share|improve this question









New contributor




sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 3





    No! it's not...

    – George Udosen
    12 hours ago






  • 1





    If you know parts or the structure of the passphrase or you have a weak passphrase, you can try JtR with luks2john. If not, the data is lost.

    – RoVo
    12 hours ago








  • 1





    this is why encryption is like playing with fire. people need to stop looking at it like a fun toy. it should be hidden in the ubuntu install options. 99% of end-users don't need it and a lot of new users end up with these sorts of problems.

    – tatsu
    12 hours ago








  • 1





    @tatsu no, encryption is very important to avoid data loss. But people need to start doing backups of important data. Unless you do backups, you WILL loose data - with or without encryption.

    – vidarlo
    12 hours ago











  • fair enough. I just think so many problems arise for new users out of os-level encryption that simply can't happen when you haven't ticked that option durring install. people see that option there and think "oh cool, a neat trick that's completely hands-off and encapsulated" ...it's not hands off. you have to know what you're doing.

    – tatsu
    12 hours ago














1












1








1









  1. I first installed Xubuntu 18.04 with full disk encryption with the
    default option; I remember the password, but lost the passphrase
    accidently.

  2. I cloned my original disk with clonezilla to a new disk;


Now I want to recover the passphrase for the new disk, and would like to know if it is possible?










share|improve this question









New contributor




sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.













  1. I first installed Xubuntu 18.04 with full disk encryption with the
    default option; I remember the password, but lost the passphrase
    accidently.

  2. I cloned my original disk with clonezilla to a new disk;


Now I want to recover the passphrase for the new disk, and would like to know if it is possible?







xubuntu encryption






share|improve this question









New contributor




sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited 3 mins ago







sierxue













New contributor




sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked 12 hours ago









sierxuesierxue

82




82




New contributor




sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






sierxue is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.








  • 3





    No! it's not...

    – George Udosen
    12 hours ago






  • 1





    If you know parts or the structure of the passphrase or you have a weak passphrase, you can try JtR with luks2john. If not, the data is lost.

    – RoVo
    12 hours ago








  • 1





    this is why encryption is like playing with fire. people need to stop looking at it like a fun toy. it should be hidden in the ubuntu install options. 99% of end-users don't need it and a lot of new users end up with these sorts of problems.

    – tatsu
    12 hours ago








  • 1





    @tatsu no, encryption is very important to avoid data loss. But people need to start doing backups of important data. Unless you do backups, you WILL loose data - with or without encryption.

    – vidarlo
    12 hours ago











  • fair enough. I just think so many problems arise for new users out of os-level encryption that simply can't happen when you haven't ticked that option durring install. people see that option there and think "oh cool, a neat trick that's completely hands-off and encapsulated" ...it's not hands off. you have to know what you're doing.

    – tatsu
    12 hours ago














  • 3





    No! it's not...

    – George Udosen
    12 hours ago






  • 1





    If you know parts or the structure of the passphrase or you have a weak passphrase, you can try JtR with luks2john. If not, the data is lost.

    – RoVo
    12 hours ago








  • 1





    this is why encryption is like playing with fire. people need to stop looking at it like a fun toy. it should be hidden in the ubuntu install options. 99% of end-users don't need it and a lot of new users end up with these sorts of problems.

    – tatsu
    12 hours ago








  • 1





    @tatsu no, encryption is very important to avoid data loss. But people need to start doing backups of important data. Unless you do backups, you WILL loose data - with or without encryption.

    – vidarlo
    12 hours ago











  • fair enough. I just think so many problems arise for new users out of os-level encryption that simply can't happen when you haven't ticked that option durring install. people see that option there and think "oh cool, a neat trick that's completely hands-off and encapsulated" ...it's not hands off. you have to know what you're doing.

    – tatsu
    12 hours ago








3




3





No! it's not...

– George Udosen
12 hours ago





No! it's not...

– George Udosen
12 hours ago




1




1





If you know parts or the structure of the passphrase or you have a weak passphrase, you can try JtR with luks2john. If not, the data is lost.

– RoVo
12 hours ago







If you know parts or the structure of the passphrase or you have a weak passphrase, you can try JtR with luks2john. If not, the data is lost.

– RoVo
12 hours ago






1




1





this is why encryption is like playing with fire. people need to stop looking at it like a fun toy. it should be hidden in the ubuntu install options. 99% of end-users don't need it and a lot of new users end up with these sorts of problems.

– tatsu
12 hours ago







this is why encryption is like playing with fire. people need to stop looking at it like a fun toy. it should be hidden in the ubuntu install options. 99% of end-users don't need it and a lot of new users end up with these sorts of problems.

– tatsu
12 hours ago






1




1





@tatsu no, encryption is very important to avoid data loss. But people need to start doing backups of important data. Unless you do backups, you WILL loose data - with or without encryption.

– vidarlo
12 hours ago





@tatsu no, encryption is very important to avoid data loss. But people need to start doing backups of important data. Unless you do backups, you WILL loose data - with or without encryption.

– vidarlo
12 hours ago













fair enough. I just think so many problems arise for new users out of os-level encryption that simply can't happen when you haven't ticked that option durring install. people see that option there and think "oh cool, a neat trick that's completely hands-off and encapsulated" ...it's not hands off. you have to know what you're doing.

– tatsu
12 hours ago





fair enough. I just think so many problems arise for new users out of os-level encryption that simply can't happen when you haven't ticked that option durring install. people see that option there and think "oh cool, a neat trick that's completely hands-off and encapsulated" ...it's not hands off. you have to know what you're doing.

– tatsu
12 hours ago










1 Answer
1






active

oldest

votes


















2














The canonical answer whether this is possible is: NO, it's not possible.



And this is by design. This situation being easily solvable would defeat the purpose of encrypting itself.



Think of it this way : it isn't much of a safety net, if anyone can circumvent it.



Captain Hindsight would like to add that in the future you should make sure to keep the password and the passphrase in several places if memory cannot be trusted (and it probably shouldn't). Also backups backups backups! Always make backups!






share|improve this answer


























  • Please, use proper formatting of capital letters. BTW, I appreciate your answer.

    – Olimjon
    11 hours ago











  • I know, I noticed your edits right after i finished editing and I added them back in. and thank you.

    – tatsu
    11 hours ago














Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});






sierxue is a new contributor. Be nice, and check out our Code of Conduct.










draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1132974%2fwith-password-how-to-find-the-passphrase-for-a-full-disk-encryption-after-a-clo%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









2














The canonical answer whether this is possible is: NO, it's not possible.



And this is by design. This situation being easily solvable would defeat the purpose of encrypting itself.



Think of it this way : it isn't much of a safety net, if anyone can circumvent it.



Captain Hindsight would like to add that in the future you should make sure to keep the password and the passphrase in several places if memory cannot be trusted (and it probably shouldn't). Also backups backups backups! Always make backups!






share|improve this answer


























  • Please, use proper formatting of capital letters. BTW, I appreciate your answer.

    – Olimjon
    11 hours ago











  • I know, I noticed your edits right after i finished editing and I added them back in. and thank you.

    – tatsu
    11 hours ago


















2














The canonical answer whether this is possible is: NO, it's not possible.



And this is by design. This situation being easily solvable would defeat the purpose of encrypting itself.



Think of it this way : it isn't much of a safety net, if anyone can circumvent it.



Captain Hindsight would like to add that in the future you should make sure to keep the password and the passphrase in several places if memory cannot be trusted (and it probably shouldn't). Also backups backups backups! Always make backups!






share|improve this answer


























  • Please, use proper formatting of capital letters. BTW, I appreciate your answer.

    – Olimjon
    11 hours ago











  • I know, I noticed your edits right after i finished editing and I added them back in. and thank you.

    – tatsu
    11 hours ago
















2












2








2







The canonical answer whether this is possible is: NO, it's not possible.



And this is by design. This situation being easily solvable would defeat the purpose of encrypting itself.



Think of it this way : it isn't much of a safety net, if anyone can circumvent it.



Captain Hindsight would like to add that in the future you should make sure to keep the password and the passphrase in several places if memory cannot be trusted (and it probably shouldn't). Also backups backups backups! Always make backups!






share|improve this answer















The canonical answer whether this is possible is: NO, it's not possible.



And this is by design. This situation being easily solvable would defeat the purpose of encrypting itself.



Think of it this way : it isn't much of a safety net, if anyone can circumvent it.



Captain Hindsight would like to add that in the future you should make sure to keep the password and the passphrase in several places if memory cannot be trusted (and it probably shouldn't). Also backups backups backups! Always make backups!







share|improve this answer














share|improve this answer



share|improve this answer








edited 11 hours ago

























answered 11 hours ago









tatsutatsu

653734




653734













  • Please, use proper formatting of capital letters. BTW, I appreciate your answer.

    – Olimjon
    11 hours ago











  • I know, I noticed your edits right after i finished editing and I added them back in. and thank you.

    – tatsu
    11 hours ago





















  • Please, use proper formatting of capital letters. BTW, I appreciate your answer.

    – Olimjon
    11 hours ago











  • I know, I noticed your edits right after i finished editing and I added them back in. and thank you.

    – tatsu
    11 hours ago



















Please, use proper formatting of capital letters. BTW, I appreciate your answer.

– Olimjon
11 hours ago





Please, use proper formatting of capital letters. BTW, I appreciate your answer.

– Olimjon
11 hours ago













I know, I noticed your edits right after i finished editing and I added them back in. and thank you.

– tatsu
11 hours ago







I know, I noticed your edits right after i finished editing and I added them back in. and thank you.

– tatsu
11 hours ago












sierxue is a new contributor. Be nice, and check out our Code of Conduct.










draft saved

draft discarded


















sierxue is a new contributor. Be nice, and check out our Code of Conduct.













sierxue is a new contributor. Be nice, and check out our Code of Conduct.












sierxue is a new contributor. Be nice, and check out our Code of Conduct.
















Thanks for contributing an answer to Ask Ubuntu!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1132974%2fwith-password-how-to-find-the-passphrase-for-a-full-disk-encryption-after-a-clo%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Why do type traits not work with types in namespace scope?What are POD types in C++?Why can templates only be...

Will tsunami waves travel forever if there was no land?Why do tsunami waves begin with the water flowing away...

Should I use Docker or LXD?How to cache (more) data on SSD/RAM to avoid spin up?Unable to get Windows File...