

Sudo apt-get install -reinstall linux-image-3.X.Y-ZZ-generic Just in case you have kernel troubles (chrooted and /boot mounted): uname -r Remember that above instructions may delete your data, so be careful and make BACKUP, BEFORE proceeding that.

It worked for me, however there is chance that doing above step by step may not work for you.īefore I've figured out the update-initramfs method I was reinstalling kernel few times also was modifying grub. Update your initramfs to avoid errors like "cryptsetup: evms_activate is not available": sudo -i Get your root partition UUID: sudo blkid /dev/sda3ĭelete or comment out overlayfs and tmpfs lines.Īdd line replacing with blkid result: UUID= / ext4 errors=remount-ro 0 1 You may want to create swap before your partition instead of moving your /dev/sda3.Ĭreate a new swap filesystem on your swap partition: sudo mkswap /dev/sda2 If you have 500GB+ HDD be prepared for few hours waiting. For me it took 30min on 120GB partition and SSD drive. Note: Moving your /dev/sda3 left may take long. Release crypt partition: sudo cryptsetup luksClose /dev/sda5ĭelete your LUKS partition (both extended and logical). When it's done you can mount your non-encrpyted partition to see if it's OK: sudo mount /dev/sda3 /mntĪfter that unmount your partition: sudo umount /dev/sda3 Configuring the new root filesystem and partitions You should see output in your dd terminal each 2s. Replace with your process ID: watch kill -USR1 Open different terminal window and get the PID: pgrep -l '^dd$' | awk '' If you don't like above 'while method', you can use watch. This will ping each second dd process with USR1 signal and dd results status: while sudo kill -USR $pid do sleep 1 done Mount your partition: sudo cryptsetup luksOpen /dev/sda5 crypt1Ĭopy your source data to destination partition and save dd PID to pid variable: sudo dd if=/dev/ubuntu-vg/root of=/dev/sda3 bs=1M & pid=$! I've used Ubuntu 13.10 32bit desktop ISO. dev/sda2 - my newly created swap partitionĬopying data from encrypted root filesystemīoot from a live CD. dev/sda3 - clean non-encrypted EXT4 partition NOTE: Whenever I say, I mean /dev/sda1 - boot partition Migrating FDE installation to unencrypted partition Bear in mind that I am not Linux specialist, so it may be not the best solution. The data would still be encrypted although the encryption would be useless since the key can be trivially guessed.īelow it's my solution that worked. However, this does not disable the encryption. Maybe you can go further and supress to (now useless) passphrase prompt. Then decrypting only requires to press Enter. PS: Chances are that you can change the encryption passphrase, possibly to an empty string. For a new users, this is the quickest and safest option. If possible, it's best to avoid this time consuming and error-prone procedure. Finally, make sure that the new file system is properly recognized by the boot loader and mount -a before rebooting. Then, remove the encrypted container, and recreate the file system without encryption. You'd have to move the whole file system (or all files) to another partition (with enough free space) or external HDD.

With some knowledge about how Linux systems work, it can be done. There is no simple method or tool to undo this. (There's more than one way to do this, but I'll keep the answer general.) The encryption is handled by an extra software layer between the file system and the physical hard drive, not the file system itself. on the text console before the login screen is displayed), this indicates that a full disk encryption method was used. If Ubuntu asks for an encryption passphrase during boot (i.e.
