A couple of months back I installed F43 Budgie. During partitioning I apparently checked the encrypt disk option.
After a mishap with my UEFI the TPM was accidently switched off and booting F43 resulted in it asking me the key for the root partition() I most probably did save it somewhere but well, yes…
After re-enabling TPM everything was honkydory again and I can type this message. But it did made me think “what if?” Is the content of the /etc/crypttab any good in a situation when decryption does not work? Can I use the luks- and UUID- stuff to gain access to a partition in case of? In other words should a keep a backup of the crypttab file?
The luks setup will have two methods to unlock the disk, via TPM and using a passphrase.
Without the passphrase I do not think you can manage the luks encryption settings.
For example when a change the luks settings I am asked for the passphrase.
You could try adding a new passphrase in an empty luks slot.
Backing up /etc/crypttab is not going to help IMO if something goes wrong with TPM decryption.
If the set passphrase had been lost, and thus you cannot add another passphrase, as mentioned above, then it might be a good idea to back up any data you consider worth having in case a the need for reinstall would arise.