Since Truecrypt mounts volumes when it decrypts them, it can be a little confusing how to run an fsck (file system check) on them, since you shouldn't run fsck on a mounted filesystem. The solution is to not mount it when you decrypt it, by passing the "--filesystem=none" argument. So if you normally use this command to decrypt the volume:
sudo truecrypt -p secretpassword -k "" --protect-hidden=no /path/to/disk /media/secretspystuffYou would instead use this command to decrypt it without mounting:
sudo truecrypt -p secretpassword -k "" --protect-hidden=no /path/to/disk --filesystem=noneTo see where the raw volume is, simply run:
truecrypt -lAnd you will get output similar to this:
1: /path/to/disk /dev/mapper/truecrypt1Now you can run fsck on that how you normally would:
sudo fsck -f /dev/mapper/truecrypt1Once you are done, you can dismount it with:
sudo truecrypt -d /path/to/diskor this (which will dismount ALL truecrypt drives):
sudo truecrypt -d Easy peasy.
Thanks. This saved me after accidentally switching off my HDD while mounted!
ReplyDeleteTrueCrypt was the most well known encryption programming. The sudden desert of the open source extend left numerous hypotheses and even prompted numerous paranoid ideas. Official Truecrypt site began diverting to SourceForge page.
ReplyDeleteInformation still valid also for veracrypt. Great article.
ReplyDeleteThank you.
Works also for realcrypt. Thanks.
ReplyDeleteyou da man
ReplyDelete