Removing system encryption
Okay, I'm writing this prior to install, I'll update it after and make it pretty.
- an encrypted root filesystem or other filesystem you cannot umount while booted into your operating system
- enough drive space somewhere to store a backup
- a few hours
step 1: boot into a live environment
Download and burn the latest archlive cd, stick it in, reboot your system and boot to cd
step 2: identify and mount your partitions
TODO: enter lvm command to activate volume groups/lvs. TODO: enter cryptsetup commands to unencrypt drive
note about different setups
I'm using a setup that looks like this:
Disregard the grey stuff, it only adds a frame of reference. The green partitons are the ones we're going to be modifying. you should make sure any green text matches your system's setup. the yellow parition is the one we're going to be using as storage space. you should feel free to change this at will.
on my system, I have myvg contains lvs called cryptroot and crtpyswap. they are located at /dev/mapper/myvg_cryptroot and /dev/mapper/myvg_cryptswap. Upon boot, luks is used along with a few crypttab entries to create /dev/mapper/root and /dev/mapper/swap. I won't be unencrypting my swap as part of this guide, as undoing the swap encryption doesn't require any complex backup or restoration.
Your setup WILL be different. different filesystems require different tools to effectively backup and restore their data. Most of you will not be using LVM and can ignore that part. XFS requires xfs_copy to ensure an effective backup and restore. DD is insufficient. you can use DD with ext2,3,and 4. (Someone please comment on jfs, reiserfs and reiser4fs)