This issue is now slowly creeping in to all my machines, not when do-release-upgrade but at regular updates, my machines are all 22.04, started last week when I could not unlock my laptop I thought I must be getting old and doing something wrong with the password, was going crazy, 2 days ago my wife tells me she can't unlock, I maintained she isn't putting the password in correctly, yesterday my daughter tells me she can't unlock and it clicked that this must be an issue with a regular update.
Current kernel is 5.15.0.67, trying to boot from 5.15.0.60 did not help.
To resolve the issue I from livecd i chrooted and added initramfs hook for `/usr/lib/x86_64-linux-gnu/ossl-modules/legacy.so`
On this particular machine the first install was 14.04,
`root@ubuntu:/# cat /var/log/installer/media-info
Ubuntu-GNOME 14.04.5 LTS "Trusty Tahr" - Release amd64 (20160803)`
luks header,
root@ubuntu:/# cryptsetup luksDump /dev/sda3 | grep -Ev $'^\t* *(UUID|Salt|Digest:|[ 0-9a-f]+$)'
LUKS header information for /dev/sda3
This issue is now slowly creeping in to all my machines, not when do-release-upgrade but at regular updates, my machines are all 22.04, started last week when I could not unlock my laptop I thought I must be getting old and doing something wrong with the password, was going crazy, 2 days ago my wife tells me she can't unlock, I maintained she isn't putting the password in correctly, yesterday my daughter tells me she can't unlock and it clicked that this must be an issue with a regular update.
Current kernel is 5.15.0.67, trying to boot from 5.15.0.60 did not help.
To resolve the issue I from livecd i chrooted and added initramfs hook for `/usr/lib/ x86_64- linux-gnu/ ossl-modules/ legacy. so`
On this particular machine the first install was 14.04, installer/ media-info
`root@ubuntu:/# cat /var/log/
Ubuntu-GNOME 14.04.5 LTS "Trusty Tahr" - Release amd64 (20160803)`
luks header,
root@ubuntu:/# cryptsetup luksDump /dev/sda3 | grep -Ev $'^\t* *(UUID| Salt|Digest: |[ 0-9a-f]+$)'
LUKS header information for /dev/sda3
Version: 1
.. .]
Cipher name: aes
Cipher mode: xts-plain64
Hash spec: sha1
Payload offset: 4096
MK bits: 256
MK digest: [...]
MK salt: [...
MK iterations: 52625
Key Slot 0: DISABLED
[...]
[...]
Key Slot 1: ENABLED
Iterations: 2177726
Key material offset: 264
AF stripes: 4000
Key Slot 2: ENABLED
Iterations: 1865792
Key material offset: 520
AF stripes: 4000
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED
This is a huge issue, to let this creep in through regular system updates is bricking the system for many people.