Hi everyone!
Is there a way of forcing systemd not to mount an encrypted partition when booting the system? I have one encrypted partition (on LVM) on my laptop, which I do not want to have mounted automatically. I'm mounting it only when I need it with a simple script.
With F15, masking the cryptsetup@luks*.service file worked. (The password prompt appeared and disappeared in a second, which didn't mind.) But this no longer works with F16. So, is there a way? Is this behavior intended, or is it a regression?
my kernel options: ro root=/dev/mapper/vg_nb-lv_root rd_LVM_LV=vg_nb/lv_root rd_NO_LUKS rd_NO_MD rd_NO_DM
Jan
Hi everyone!
Is there a way of forcing systemd not to mount an encrypted partition when booting the system? I have one encrypted partition (on LVM) on my laptop, which I do not want to have mounted automatically. I'm mounting it only when I need it with a simple script.
With F15, masking the cryptsetup@luks*.service file worked. (The password prompt appeared and disappeared in a second, which didn't mind.) But this no longer works with F16. So, is there a way? Is this behavior intended, or is it a regression?
my kernel options: ro root=/dev/mapper/vg_nb-lv_root rd_LVM_LV=vg_nb/lv_root rd_NO_LUKS rd_NO_MD rd_NO_DM
Jan
You want to use "rd.luks.uuid" kernel option. See "man dracut.kernel".
my kernel options: ro root=/dev/mapper/vg_nb-lv_root rd_LVM_LV=vg_nb/lv_root rd_NO_LUKS rd_NO_MD rd_NO_DM
You want to use "rd.luks.uuid" kernel option. See "man dracut.kernel".
rd_NO_LUKS (or rd.luks=0) disables LUKS detection entirely. I believe this is not about initrd...
Jan
my kernel options: ro root=/dev/mapper/vg_nb-lv_root rd_LVM_LV=vg_nb/lv_root rd_NO_LUKS rd_NO_MD rd_NO_DM
You want to use "rd.luks.uuid" kernel option. See "man dracut.kernel".
rd_NO_LUKS (or rd.luks=0) disables LUKS detection entirely. I believe this is not about initrd...
Jan
Sorry, I don't understand you. Your request was "don't mount a specific encrypted volume during boot", right? Then use "rd.luks.uuid=UUID" kernel options to specify *all other* encrypted partitions you want to mount. Those not specified won't be mounted (and you won't be asked for their password). See man page.
my kernel options: ro root=/dev/mapper/vg_nb-lv_root rd_LVM_LV=vg_nb/lv_root rd_NO_LUKS rd_NO_MD rd_NO_DM
You want to use "rd.luks.uuid" kernel option. See "man dracut.kernel".
rd_NO_LUKS (or rd.luks=0) disables LUKS detection entirely. I believe this is not about initrd...
Sorry, I don't understand you. Your request was "don't mount a specific encrypted volume during boot", right?
Actually no. ;-) The question was, if I can force systemd not to mount an encrypted partition. I do not have any other encrypted partitions, so rd.luks=0 is fine.
However, I already found a resolution. "noauto" was missing in /etc/crypttab from some reason. My fault that I haven't double checked. Now it works like a charm.
Thank you Kamil for your answers. :-)
Jan