diff --git a/content/password.md b/content/password.md index 0a8f5c61e0..51a356071e 100644 --- a/content/password.md +++ b/content/password.md @@ -30,7 +30,7 @@ First, bring up the systemd-boot menu by holding down SPACE or ![systemd-boot](/images/password/systemd-boot.png) -Once the recovery operating system boots, close out of the installation window or choose **“try demo mode”** (be sure not to choose any install or repair options, as this could result in data loss). +Once the live disk boots move to a new workspace, to do this on Ubuntu use the Activities button in the top left and on Pop!\_OS use the Workspaces button in the top left (be sure not to choose any install or repair options in the installer window, as this could result in data loss). ### Ubuntu @@ -38,7 +38,7 @@ If you are using Ubuntu we can boot from a live disk and [here](/articles/live-d #### Mounting the Installed OS -Press /+T to open a terminal, and type in these commands: +On Pop!\_OS press +T or on Ubuntu press +Alt+T to open a terminal, and type in these commands: ```bash lsblk @@ -104,23 +104,23 @@ Full Disk Encryption supports up to 8 total pass-phrases to unlock the encryptio First let's list the partitions of all of the installed drives: -``` -lsblk -f +```bash +lsblk -o name,mountpoints ``` The output may be different based on the drive setup and partition table. You can see the root partition at mountpoint '/'. From there we can use that output to run this command: -``` +```bash sudo cryptsetup luksDump /dev/sda3 ``` -Replacing '/dev/sda3' with the location of the root partition on your system. With the output of this command we can see the seven extra slots that we have for passwords to decrypt the drive. On a normal install Slots 1-7 are the open, with Slot 0 as the initial pass-phrase. +Replacing '/dev/sda3' with the location of the root partition on your system. With the output of this command we can see the seven extra slots that we have for passwords to decrypt the drive. On a normal install Slot 0 is the initial passphrase and you can add up to 6 more for a total of 7. #### Set Extra Password Following the partition scheme from the previous command we can form the next command to add a new key to the open Key Slot: -``` +```bash sudo cryptsetup luksAddKey /dev/sda3 ``` @@ -130,7 +130,7 @@ This command will require the current encryption password before new password ca Let's run this command again to confirm that the additional pass-phrase is set: -``` +```bash sudo cryptsetup luksDump /dev/sda3 ```