-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backup restore finishes with error: failed to decrypt [...]: b'scrypt: Passphrase is incorrect
#4493
Comments
I've reproduced the problem already, looking for solution. |
Thankyou, if i can help in any way, ill be there.
…On Sat, Nov 10, 2018, 5:22 PM Marek Marczykowski-Górecki < ***@***.***> wrote:
I've reproduced the problem already, looking for solution.
—
You are receiving this because you modified the open/close state.
Reply to this email directly, view it on GitHub
<#4493 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AXUmK_oST329LIHtWKsgzkXKZv_W5QPNks5utv0qgaJpZM4YU3nd>
.
|
Does it happen also with backups created on earlier release (4.0, not 4.0.1-rc1)? |
I didnt try that. Ill try it when i get home and get back to you immediatly.
…On Sat, Nov 10, 2018, 5:25 PM Marek Marczykowski-Górecki < ***@***.***> wrote:
Does it happen also with backups created on earlier release (4.0, not
4.0.1-rc1)?
—
You are receiving this because you modified the open/close state.
Reply to this email directly, view it on GitHub
<#4493 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AXUmK9pBmpx2Kmt7MS9A8WeoPdShMA2Kks5utv36gaJpZM4YU3nd>
.
|
No need, it's the backup code broken, not the restore one. |
Okay, should i try to reverse it or will it compremise security?
…On Sat, Nov 10, 2018, 5:48 PM Marek Marczykowski-Górecki < ***@***.***> wrote:
No need, it's the backup code broken, not the restore one.
Specifically, this change broke it: ***@***.***
#diff-d5cd0937e32eff778591ab56cd19526eR260
<QubesOS/qubes-core-admin@4e49b95#diff-d5cd0937e32eff778591ab56cd19526eR260>
—
You are receiving this because you modified the open/close state.
Reply to this email directly, view it on GitHub
<#4493 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AXUmK-AwvYOLrFn10bTkUWPjaLAYzpBxks5utwNGgaJpZM4YU3nd>
.
|
This is because assert statement gets optimised out when Python is run with -O flag. This was pointed out to me by audience at PyWaw 76.
Restore old code for calculating subdir within the archive. The new one had two problems: - set '/' for empty input subdir - which caused qubes.xml.000 to be named '/qubes.xml.000' (and then converted to '../../qubes.xml.000'); among other things, this results in the wrong path used for encryption passphrase - resolved symlinks, which breaks calculating path for any symlinks within VM's directory (symlinks there should be treated as normal files to be sure that actual content is included in the backup) This partially reverts 4e49b95. Fixes QubesOS/qubes-issues#4493
Restore old code for calculating subdir within the archive. The new one had two problems: - set '/' for empty input subdir - which caused qubes.xml.000 to be named '/qubes.xml.000' (and then converted to '../../qubes.xml.000'); among other things, this results in the wrong path used for encryption passphrase - resolved symlinks, which breaks calculating path for any symlinks within VM's directory (symlinks there should be treated as normal files to be sure that actual content is included in the backup) This partially reverts 4e49b95. Fixes QubesOS/qubes-issues#4493
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
Is there any way to Backup without using the Tool in Qubes3 it was easy but on 4.1 it seams impossible? I just wont to migrate to a New Hardware but every Restore fails ... and i dont think it will be fixed in near Future |
I dont observed any System Crash.. so i dont thinks That it is a ram problem. Its more likely a Problem of amd ryzen series 1 ? |
I have been able to drill down this problem to scrypt not working properly on my AMD Ryzen 7 1700 Eight-Core Processor.
|
Hmm scrypt recently released v.1.3.2, with a zillion changes since v.1.3.1 from 3 years ago. If there's some hardware incompatibility maybe the new version fixed it along the way? |
Possible - but I forgot to mention in my previous post that I have not been able to reproduce the issue with various other (Non-QubesOS) XEN kernels I have tried on the same hardware. It might be a problem in one of the kernel modules or the specific combination of kernel parameters used in QubesOS. |
That smells like either:
|
Memory corruption is unlikely; the machine has 2x16GB, and I have reproduced the problem with every permutation of 1- and 2- RAM sticks across both RAM slots on the mainboard. I have also repeatedly executed the latest memtest86+. |
Can you reproduce this problem without Xen using the Qubes-provided scrypt and Linux kernel? Qubes should boot without Xen, but no VMs will start. |
I don't have Qubes installed on that computer at the moment, I can try that out when I have some time... What do I need to do to boot without Xen? |
|
Can you give some instruction how to repace it ? That would be nice 🥹 Maybe an Backup Option without any encrypt would be nice for such Problems.. |
|
@joetretter I think you found a genuine bug in Xen, then. Please report this to xen-devel@lists.xenproject.org. |
Thanks Works Great |
From above closed issue that included 4.2 in affected: add Ryzen 9 to affected hardware - this does seem to be AMD specific, so is different from the original issue in 2018. The very odd thing is, I know I tested this in 4.2.0-rc1 and there was no problem. I was having problems writing USB storage and so did quite a bit of testing. Going back, I have a full backup from early October that is ~80GB compressed that verifies OK, while one a week later after doing an upgrade fails with "scrypt:Input is not valid scrypt-encrypted block" maybe half way through. Not sure what versions were then. Now a backup of a fresh 4.2.0 instal reliably fails quickly, so it looks like quite a recent regression. Add that to the sudden appearance of app qube kernel panics in 6.1.62 and stable 4.2.0 is looking bad. |
@joetretter Does the test suite pass in a Qubes VM? If so, the problem is specific to Xen paravirtualization. |
The test is not passing in a Qubes-VM either. I am in contact with the XEN folks and they asked me to try with the latest microcode. I have spent about three days and I'm afraid I am not able to get the latest microcode working in Qubes, I can't seem to figure out the right way to make it known to the kernel. As it's been released in parallel to my testing, I have upgraded to 4.2 in the hope that the latest firmware would be included or the problem be solved. Unfortunately it isn't. Can the Qubes project get the latest AMD firmware into 4.2, or can you point me to a resource how I can get it working? I am running Manjaro (archlinux) on the same machine and there I have the latest firmware (see attachments) |
@joetretter do you have most recent dracut package installed (version 059-5) in dom0? |
Yes, I have dracut 059-5.fc37 |
@joetretter You’ll need to get a firmware update from your hardware vendor. R4.2 has support for applying such updates, so long as the vendor makes them available via fwupd. @marmarek I’m starting to wonder if we should offer late loading of firmware on AMD systems too, so long as we can find the firmware somewhere. AMD doesn’t test it on most client parts so it isn’t great, but on systems like what @joetretter has it might be the difference between being able to use Qubes OS and not being able to. |
I just wanted to note that on my intel Thinkpad P52 with the release version of R4.2 and kernel latest, I also have that most recent version of dracut. However, no microcode is being loaded (according to xen dmesg and Linux dmesg). I've even performed a sudo dracut --regenerate-all --force and rebooted with no change. B |
It gets loaded only if there is a newer version available. Most likely your firmware already loads latest version (as it should!) so OS doesn't need to load any updates. |
Qubes OS version:
R4.0.1-RC1
Affected component(s):
Qubes Backup manager
Steps to reproduce the behavior:
6 Check encrypted backup box
Expected behavior:
Restore selected backup
Actual behavior:
Display's message: failed to decrypt var/tmp/{the file name}/qubes.xml.000.enc: b'scrypt: Passphrase is incorrect\n'
General notes:
I've used R4.0.1-RC1 for a few day's now and i have not encountered a problem up till now. I tried every option that's available:
At line 134 in file /usr/lib/python3.5/site-packages/qubesadmin/backup/core3.py:
vm.label = vm.properties.pop('label')
try:
vm.label = self.labels[vm.label]
except KeyError:
pass
This also didn't work.
Afterwards i re-installed Qubes 4.0 and retried the steps and it worked the first try. So the problem is in R4.0.1-RC1. I also tried to re-install R4.0.1-RC1 and tried it again but with no luck.
Thanks in advance for the help!
Related issues:
#3321
#3219
The text was updated successfully, but these errors were encountered: