Difference between revisions of "Encrypted funtoo on linode"

From Funtoo
Jump to navigation Jump to search
Line 42: Line 42:
<console>
<console>
# ##i##sgdisk --zap-all /dev/sda ↵
# ##i##sgdisk --zap-all /dev/sda ↵
# ##i##sgdisk --zap-all /dev/sdb ↵


Creating new GPT entries.
Creating new GPT entries.
Line 53: Line 54:
<br />
<br />
<console>
<console>
# ##i##fdisk /dev/sda
# ##i##fdisk /dev/sda
</console>
</console>


Line 65: Line 66:
Command (m for help): ##i##o ↵
Command (m for help): ##i##o ↵
</console>
</console>
'''Create Partition 1 (boot):'''
<console>
Command (m for help): ##i##n ↵
Partition type (default p): ##i##p ↵
Partition number (1-4, default 1): ##i##1 ↵
First sector: ##i##↵
Last sector: ##i##+100M ↵
</console>
'''Create Partition 2 (root):'''
<console>
Command (m for help): ##i##n ↵
Partition type (default p): ##i##p ↵
Partition number (2-4, default 2): ##i##2 ↵
First sector: ##i##↵
Last sector: ##i##↵
Command (m for help): ##i## w ↵
Command (m for help): ##i## q ↵
</console>
<console>
# ##i##fdisk /dev/sdb ↵
Command (m for help): ##i##n ↵
Partition type (default p): ##i##p ↵
Partition number (1-4, default 1): ##i##1 ↵
First sector: ##i##↵
Last sector: ##i##↵
Command (m for help): ##i## w ↵
Command (m for help): ##i## q ↵
</console>
<big>'''Encrypting Partitions ( root /dev/sda2 and swap /dev/sdb1 )'''</big>
<console>
# ##i##cryptsetup --cipher aes-xts-plain64 --hash sha512 --key-size 256 luksFormat /dev/sda2
# ##i##cryptsetup --cipher aes-xts-plain64 --hash sha512 --key-size 256 luksFormat /dev/sdb1
</console>
<br />
<big>Initializing Encrypted Partitions</big>'''Bold text'''
<br />
<console>
# ##i##cryptsetup luksOpen /dev/sda2 cryptroot
# ##i##cryptsetup luksOpen /dev/sdb1 cryptswap
</console>
<br />
'''Creating Logical Volumes'''<big>Big text</big>
<br />
<console>
# ##i##pvcreate /dev/mapper/cryptroot
# ##i##vgcreate data /dev/mapper/cryptroot
# ##i##lvcreate -l 100%FREE -nroot data
</console>
<br />
<console>
# ##i##pvcreate /dev/mapper/cryptswap
# ##i##vgcreate cswap /dev/mapper/cryptswap
# ##i##lvcreate -l 100%FREE -nswap cswap
</console>
'''Creating FileSystems'''<big>Big text</big>
<br />

Revision as of 02:34, November 17, 2016

This howto describes how to setup a complete Funtoo Encrypted Install ( Root File System and SWAP ) using LUKS and LVM on LINODE VPS

   Note

Use Funtoo Installation Guide for reference.


   Important

This howto is a compilation of steps. If you find any discrepancy blame pfctl on #Funtoo @ Freenode.
Work smarter not Harder.

Setting Linode

  • From Linode Manager create a new Linode. Under the Disks section of the Linode Dashboard, click on "Create a new Disk:"


New_Disk

  • Label your new disk image and choose an appropriate size. Here we will create "two disks" the first for root partition and another for swap. Set appropriate size for each one.


Edit_Disk

  • Select the Create a New Configuration Profile option. Assign a label, and select your disk images under Block Device Assignment.

Config_Profile
Click on Save Changes once your profile is complete.


  • Return to the Linode DashBoard, and select the Rescue tab. From there, click the Reboot Into Rescue Mode button. Your Linode will now boot into the Finnix recovery image. Use the Lish shell to access your Linode.
  • Run the following set of commands to create a root password and enable SSH server:


root # passwd ↵
root # service ssh start ↵
   {{{title}}}
{{{body}}}


Prepare Hard Disk and Partitions


root # sgdisk --zap-all /dev/sda ↵
root # sgdisk --zap-all /dev/sdb ↵

Creating new GPT entries.
GPT data structures destroyed! You may now partition the disk using fdisk or
other utilities.


Now we will use fdisk to create the MBR partition table and partitions:


root # fdisk /dev/sda ↵


Within fdisk, follow these steps:

Empty the partition table:

Command (m for help): o ↵

Create Partition 1 (boot):

Command (m for help): n ↵
Partition type (default p): p ↵
Partition number (1-4, default 1): 1 ↵
First sector: 
Last sector: +100M ↵

Create Partition 2 (root):

Command (m for help): n ↵
Partition type (default p): p ↵
Partition number (2-4, default 2): 2 ↵
First sector: 
Last sector: 
Command (m for help):  w ↵
Command (m for help):  q ↵
root # fdisk /dev/sdb ↵

Command (m for help): n ↵
Partition type (default p): p ↵
Partition number (1-4, default 1): 1 ↵
First sector: 
Last sector: 
Command (m for help):  w ↵
Command (m for help):  q ↵

Encrypting Partitions ( root /dev/sda2 and swap /dev/sdb1 )

root # cryptsetup --cipher aes-xts-plain64 --hash sha512 --key-size 256 luksFormat /dev/sda2
root # cryptsetup --cipher aes-xts-plain64 --hash sha512 --key-size 256 luksFormat /dev/sdb1


Initializing Encrypted PartitionsBold text


root # cryptsetup luksOpen /dev/sda2 cryptroot
root # cryptsetup luksOpen /dev/sdb1 cryptswap


Creating Logical VolumesBig text


root # pvcreate /dev/mapper/cryptroot
root # vgcreate data /dev/mapper/cryptroot
root # lvcreate -l 100%FREE -nroot data


root # pvcreate /dev/mapper/cryptswap
root # vgcreate cswap /dev/mapper/cryptswap
root # lvcreate -l 100%FREE -nswap cswap

Creating FileSystemsBig text