Difference between revisions of "Encrypted Root"

From Funtoo
Jump to: navigation, search
(Basic system setup)
(Removed the section adding cloudflare dns servers to /etc/resolve.conf, as the guide now tell the user to copy over /etc/resolve.conf from hostsystem, before doing the chroot, just like the officiel install guide.)
 
(30 intermediate revisions by 7 users not shown)
Line 1: Line 1:
This howto describes how to setup a swapless encrypted root partition without llvm.
+
This howto describes how to setup LVM, swap, and root with dmcrypt LUKS. It is a standalone installation walk through, based on the official installations finished product.  boot is not encrypted.
 +
 
 +
{{warning|You may try this installation method at your own risk! Please note: this guide is outside of the official installation documentation and cannot be supported. If you choose to use this, we assume you know what you are doing and you are on your own.}}
  
 
== Prepare the hard drive and partitions ==
 
== Prepare the hard drive and partitions ==
*List the device to be partitioned, mine is on /dev/sdc
+
*Before you begin, make sure you are partitioning the correct drive. For the rest of this tutorial, we will be using /dev/sdX as a placeholder.
 
{{console|body=
 
{{console|body=
###i## lsblk -o name,size,label,partlabel
+
###i## lsblk
 +
NAME          MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT
 +
sda            8:0    0  1.8T  0 disk
 +
├─sda1          8:1    0  512M  0 part
 +
├─sda2          8:2    0    8G  0 part [SWAP]
 +
└─sda3          8:3    0  1.8T  0 part
 +
  ├─main-root 254:0    0  500G  0 lvm  /
 +
  └─main-data 254:1    0  1.3T  0 lvm  /home
 
}}
 
}}
  
 
==Partition==
 
==Partition==
 +
 +
=== MBR [BIOS] Partitioning ===
 +
 +
{{Note|Use this method if you are booting using your BIOS, and if your Funtoo LiveCD initial boot menu was light blue. If you're going to use the UEFI/GPT disk format, then please proceed to the next section.}}
 +
 
{{console|body=
 
{{console|body=
###i## cgdisk /dev/sdc}}
+
###i## fdisk /dev/sdX
 +
}}
  
delete everything.
+
Within {{c|fdisk}}, follow these steps:
 +
 
 +
'''Empty the partition table''':
  
 
{{console|body=
 
{{console|body=
Command: ##i## new ↵
+
Command (m for help): ##i##o
First sector: ##i##↵
 
Last sector: ##i##+1M ↵
 
Hex Code: ##i##EF02 ↵
 
Enter name: ##i##BIOS Boot
 
 
}}
 
}}
  
scroll down to large chunk of free space:
+
'''Create boot partition''':
 +
 
 
{{console|body=
 
{{console|body=
Command: ##i##new
+
Command (m for help): ##i##n ↵
 +
Partition type (default p): ##i##↵
 +
Partition number (1-4, default 1): ##i##↵
 
First sector: ##i##↵
 
First sector: ##i##↵
 
Last sector: ##i##+128M ↵
 
Last sector: ##i##+128M ↵
Hex Code: ##i##EF00 ↵
 
Enter name: ##i##BOOT ↵
 
 
}}
 
}}
  
scroll down to large chunk of free space:
+
'''Create partition which will be encrypted with LUKS''':
 +
 
 
{{console|body=
 
{{console|body=
Command: ##i##new
+
Command (m for help): ##i##n ↵
 +
Partition type (default p): ##i##↵
 +
Partition number (2-4, default 2): ##i##↵
 
First sector: ##i##↵
 
First sector: ##i##↵
 
Last sector: ##i##↵
 
Last sector: ##i##↵
Hex Code: ##i## 8304 ↵
 
Enter name: ##i##FUNTOO ↵
 
 
}}
 
}}
 +
 +
'''Verify the partition table''':
  
 
{{console|body=
 
{{console|body=
 +
Command (m for help): ##i##p
  
                              Disk Drive: /dev/sdc
+
Disk /dev/sdX: 298.1 GiB, 320072933376 bytes, 625142448 sectors
                            Size: 62333952, 29.7 GiB
+
Units: sectors of 1 * 512 = 512 bytes
 +
Sector size (logical/physical): 512 bytes / 512 bytes
 +
I/O size (minimum/optimal): 512 bytes / 512 bytes
 +
Disklabel type: dos
 +
Disk identifier: 0x82abc9a6
  
Part. #     Size        Partition Type            Partition Name
+
Device    Boot     Start      End   Blocks Id System
----------------------------------------------------------------
+
/dev/sdX1          2048   264191   131072  83 Linux
            1007.0 KiB  free space
+
/dev/sdX2        4458496 625142447 312439128  83 Linux
   1        1024.0 KiB BIOS boot partition   BIOS Boot
 
  2        256.0 MiB  EFI System               BOOT
 
   3        29.5 GiB   Linux x86-64 root (/)    FUNTOO
 
 
}}
 
}}
  
 +
'''Write the partition table to disk''':
 +
 +
{{console|body=Command (m for help): ##i##w}}
 +
 +
Your new MBR partition table will now be written to your system disk.
 +
 +
=== UEFI Partitioning ===
 +
 +
{{Note|Use this method if you are interested in booting using UEFI, and if your Funtoo LiveCD initial boot menu was black and white, or the system booted without a boot menu. If it was light blue, this method will not work. Instead, use the instructions in the previous section then skip this section, or reboot LiveCD in UEFI mode first.}}
 +
 +
{{console|body=###i## gdisk /dev/sdX}}
 +
 +
Within {{c|gdisk}}, follow these steps:
 +
 +
'''Empty the partition table''':
 
{{console|body=
 
{{console|body=
Command: ##i##write
+
Command: ##i##o
Command: ##i##quit
+
This option deletes all partitions and creates a new protective MBR.
 +
Proceed? (Y/N): ##i##y
 
}}
 
}}
  
== Encrypt the drive ==
+
'''Create boot partition''':
 +
 
 
{{console|body=
 
{{console|body=
# ##i##cryptsetup luksFormat /dev/sdc3
+
Command: ##i##n ↵
 +
Partition Number: ##i##1 ↵
 +
First sector: ##i##↵
 +
Last sector: ##i##+128M ↵
 +
Hex Code: ##i##EF00 ↵
 
}}
 
}}
*enter your password
 
  
== Initialize the volume ==
+
'''Create partition which will be encrypted with LUKS''':
Initialize the volume:
+
 
 
{{console|body=
 
{{console|body=
# ##i##cryptsetup luksOpen /dev/sdc3 dmcrypt_root
+
Command: ##i##n ↵
 +
Partition Number: ##i##2 ↵
 +
First sector: ##i##↵
 +
Last sector: ##i##↵##!i## (for rest of disk)
 +
Hex Code: ##i##
 
}}
 
}}
  
=== Create your filesystem ===
+
'''(Optional) Create disk labels''':
 
{{console|body=
 
{{console|body=
###i## mkfs.vfat -F 32 /dev/sdc2
+
Command: ##i##c ↵
###i## fatlabel /dev/sdc2 "BOOT"
+
Partition Number: ##i##1
# ##i##mkfs.ext4 /dev/mapper/dmcrypt_root
+
Enter name: ##i##BOOT
 +
Command: ##i##c ↵
 +
Partition Number: ##i##2
 +
Enter name: ##i##ROOT
 
}}
 
}}
  
=== Basic system setup ===
+
'''Write Partition Table To Disk''':
 +
 
 
{{console|body=
 
{{console|body=
# ##i##mkdir /mnt/funtoo
+
Command: ##i##w ↵
# ##i##mount /dev/mapper/dmcrypt_root /mnt/funtoo
+
Do you want to proceed? (Y/N): ##i##Y ↵
# ##i##mkdir  /mnt/funtoo/boot
 
# ##i##mount /dev/sdc2 /mnt/funtoo/boot
 
 
}}
 
}}
 +
The partition table will now be written to the disk and {{c|gdisk}} will close.
 +
 +
==Create and mount filesystems.==
 +
'''Create /boot filesystem '''
 +
====For BIOS systems====
 +
{{console|body=# ##i##mkfs.ext2 /dev/sdX1}}
 +
 +
====For UEFI systems====
 +
{{console|body=# ##i##mkfs.vfat -F 32 /dev/sdX1}}
  
==Get Funtoo Gnome==
+
'''Create LUKS encrypted volume'''
You can pull your [[Subarches]] gnome tarball if you wish:
+
{{Note| Cryptsetup now defaults to LUKS2, which is unsupported by stable versions of grub. This is why we are not encrypting /boot.}}
 +
{{Warning| The debian-sources kernel in current stage3 tarballs does not allow for passwords in excess of 63 characters.}}
  
 
{{console|body=
 
{{console|body=
###i## cd /mnt/funtoo
+
# ##i##cryptsetup luksFormat /dev/sdX2
###i## wget https://build.funtoo.org/1.4-release-std/x86-64bit/generic_64/gnome-latest.tar.xz
 
###i## tar --numeric-owner --xattrs --xattrs-include='*' -xpf *gnome* && rm -f *gnome*
 
 
}}
 
}}
  
==Load Funtoo==
+
'''Open newly created LUKS volume'''
*expand your run tmpfs to be half of your ram:
+
{{console|body=# ##i##cryptsetup open --type luks2 /dev/sdX2 root}}
 +
 
 +
'''Create LVM volumes for / and swap'''
 +
{{console|body=# ##i##pvcreate /dev/mapper/root}}
 +
{{console|body=# ##i##vgcreate vg /dev/mapper/root}}
 +
{{Note|Replace "16G" with the amount of swap you would like to make available.}}
 +
{{console|body=# ##i##lvcreate -L16G --name swap vg}}
 +
{{console|body=# ##i##lvcreate -l 100%FREE --name root vg}}
 +
{{Note|The "-l 100%FREE" option above will use the remainder of the disk for your root partition. If you would prefer to create separate for /home or /var (for example), you can instead continue to use the "-LXXG" option for fixed sizes.}}
 +
 
 +
'''Create filesystems on LVM volumes'''
 +
{{console|body=# ##i##mkswap /dev/mapper/vg-swap}}
 +
{{console|body=# ##i##mkfs.ext4 /dev/mapper/vg-root}}
 +
 
 +
'''Create directories for chroot'''
 +
{{console|body=# ##i##mkdir -p /mnt/funtoo}}
 +
 
 +
==Mount filesystems==
 +
{{console|body=# ##i##mount /dev/mapper/vg-root /mnt/funtoo}}
 +
{{console|body=# ##i##mkdir /mnt/funtoo/boot}}
 +
{{console|body=# ##i##mount /dev/sdX1 /mnt/funtoo/boot}}
 +
{{console|body=# ##i##mkdir /mnt/funtoo/proc}}
 +
{{console|body=# ##i##mount -t proc none /mnt/funtoo/proc}}
 +
{{console|body=# ##i##mkdir /mnt/funtoo/dev}}
 +
{{console|body=# ##i##mount --rbind /dev /mnt/funtoo/dev}}
 +
{{console|body=# ##i##mkdir /mnt/funtoo/sys}}
 +
{{console|body=# ##i##mount --rbind /sys /mnt/funtoo/sys}}
 +
 
 +
==Set the date==
 +
{{Note|See the official Funtoo docs on [https://www.funtoo.org/Install/Setting_the_Date setting the date].}}
 +
 
 +
==Install the Funtoo starge tarball of your choice==
 +
{{Note|These instructions will be using the ''intel-haswell'' minimal stage3. You should adjust them accordingly}}
 +
 
 +
{{console|body=# ##i##cd /mnt/funtoo}}
 +
{{console|body=# ##i##wget https://build.funtoo.org/1.4-release-std/x86-64bit/intel64-haswell/2021-03-10/stage3-intel64-haswell-1.4-release-std-2021-03-10.tar.xz}}
 +
{{console|body=# ##i##tar --numeric-owner --xattrs --xattrs-include='*' -xpf stage3-intel64-haswell-1.4-release-std-2021-03-10.tar.xz && rm -f stage3-intel64-haswell-1.4-release-std-2021-03-10.tar.xz}}
 +
 
 +
==Chroot into your new system==
 
{{console|body=
 
{{console|body=
###i## mount -t tmpfs tmpfs /run
+
# ##i##cp /etc/resolv.conf /mnt/funtoo/etc/
}}
+
# ##i##env -i HOME=/root TERM=$TERM $(which chroot) /mnt/funtoo bash -l}}
 +
 
 +
==Configure your system==
 +
'''Set a new root password'''
 +
{{console|body=# ##i##passwd}}
  
*mount up:
+
'''Set hostname'''
{{console|body=
+
{{console|body=# ##i##echo 'hostname="yourdesiredhostname"' > /etc/conf.d/hostname}}
###i## cd /mnt/funtoo && mount -t proc none proc
 
mount --rbind /sys sys
 
mount --rbind /dev dev
 
mount --rbind /run run
 
}}
 
  
*chroot in:
+
'''Set your timezone'''
{{console|body=
+
{{console|body=# ##i##ln -sf /usr/share/zoneinfo/YOUR/TIMEZONE /etc/localtime}}
###i## cd /mnt/funtoo && env -i HOME=/root TERM=$TERM chroot . bash -l
 
}}
 
  
*Set yo password:
+
'''Note your filesystem information'''
*set yo hostname:
+
{{console|body=# ##i##blkid}}
*set cloudflare dns resolution for installing:
 
*Set yo time zone:
 
 
{{console|body=
 
{{console|body=
###i## passwd
+
/dev/sdX1: UUID="6453-0C55" TYPE="vfat" PARTLABEL="efi" PARTUUID="4e195c4b-f88c-4205-b9df-79a879704b2f"
###i## echo 'hostname="crypto"' > /etc/conf.d/hostname
+
/dev/sdX2: UUID="aafe709b-82e7-448f-a2cb-36adc3787dc3" TYPE="crypto_LUKS" PARTLABEL="system" PARTUUID="93d0cf9b-0b95-4d8b-919f-48cd1774996f"
###i## echo "nameserver 1.1.1.1" > /etc/resolv.conf
+
/dev/mapper/root: UUID="hvz79n-I2VE-nR1c-0hDQ-PVkR-3GRb-rnuJ9C" TYPE="LVM2_member"
###i## ln -sf /usr/share/zoneinfo/America/Detroit /etc/localtime
+
/dev/mapper/vg-swap: UUID="a9188bc3-7def-422b-990d-9de431825779" TYPE="swap"
}}
+
/dev/mapper/vg-root: UUID="2eaf45e6-d33b-4155-b4ca-63a2fdbfb896" TYPE="ext4"}}
  
*Deploy your fstab:
+
'''Configure /etc/fstab'''
{{console|body=
+
{{Note|The UUID parameter is set to the UUID of your boot partition as found from the blkid command above.}}
###i## cat > /etc/fstab << "EOF"
+
{{console|body=# ##i##cat > /etc/fstab << 'EOF'
LABEL=BOOT /boot vfat noauto,noatime 1 2
+
UUID=6453-0C55 /boot vfat noauto,noatime 1 2
 
/dev/mapper/vg-swap none swap sw 0 0
 
/dev/mapper/vg-swap none swap sw 0 0
 
/dev/mapper/vg-root / ext4 noatime,nodiratime,defaults 0 1
 
/dev/mapper/vg-root / ext4 noatime,nodiratime,defaults 0 1
tmpfs /run tmpfs rw,nodev,nosuid 0 0
+
EOF}}
EOF
+
 
}}
+
'''Create /etc/crypttab'''
 +
{{Note|The UUID parameter is set to the UUID of /dev/sdX2 as found from the blkid command above.}}
 +
{{console|body=# ##i##echo "root UUID=aafe709b-82e7-448f-a2cb-36adc3787dc3 none luks,discard" >> /etc/crypttab}}
 +
 
 +
'''Create /etc/dmtab'''
 +
{{console|body=# ##i##dmsetup table >> /etc/dmtab}}
  
*compile in ram:
+
==Portage==
{{console|body=
+
'''Download the portage tree'''
###i## echo 'PORTAGE_TMPDIR="/run"' > /etc/portage/make.conf
+
{{console|body=# ##i##ego sync}}
}}
 
  
*Deploy your ego profile:
+
'''Change your ego profile to include encrypted root support'''
{{console|body=
+
{{console|body=# ##i##epro mix-in encrypted-root}}
###i## ego profile mix-in encrypted-root
 
}}
 
  
*Deploy your package.use file:
+
'''Edit package USE-flags'''
{{console|body=
+
{{console|body=# ##i##cat > /etc/portage/package.use <<'EOF'
###i## cat > /etc/portage/package.use << "EOF"
+
*/* device-mapper lvm luks
sys-kernel/debian-sources lvm luks
 
sys-kernel/debian-sources-lts lvm luks
 
sys-boot/grub device-mapper
 
sys-fs/lvm2 static-libs
 
sys-kernel/genkernel cryptsetup
 
dev-libs/openssl static-libs
 
dev-libs/json-c static-libs
 
app-crypt/argon2 static-libs
 
dev-libs/popt static-libs
 
sys-fs/cryptsetup static
 
dev-libs/libgpg-error static-libs
 
 
sys-kernel/linux-firmware initramfs
 
sys-kernel/linux-firmware initramfs
EOF
+
sys-fs/cryptsetup -dynamic
}}
+
EOF}}
  
*merge stuff:
+
'''Install necessary packages'''
{{console|body=
+
{{console|body=# ##i##emerge grub haveged intel-microcode linux-firmware cryptsetup lvm2 genkernel iucode_tool}}
###i## ego sync && emerge grub haveged intel-microcode linux-firmware eix cryptsetup lvm2 debian-sources debian-sources-lts && emerge -vuND @world
 
}}
 
  
*add required services:
+
'''Configure services to start at boot'''
{{console|body=
+
{{console|body=# ##i##rc-update add device-mapper sysinit}}
###i## rc-update add device-mapper sysinit
+
{{console|body=# ##i##rc-update add dmcrypt sysinit}}
###i## rc-update add dmcrypt sysinit
+
{{console|body=# ##i##rc-update add lvmetad sysinit}}
###i## rc-update add lvm sysinit
+
{{console|body=# ##i##rc-update add haveged default}}
}}
+
{{console|body=# ##i##rc-update add busybox-ntpd default}}
  
== Bootloader Configuration ==
+
==Install a bootloader==
=== /etc/boot.conf ===
+
'''Configure /etc/boot.conf'''
 
+
{{Note|The UUID parameter is set to the UUID of /dev/sdX2 as found from the blkid command above.}}
<pre>
+
{{console|body=# ##i##cat > /etc/boot.conf <<'EOF'
 
boot {
 
boot {
  generate grub
+
    generate grub
  default "Funtoo Linux"
+
    default "Funtoo Linux"
  timeout 3
+
    timeout 3
 
}
 
}
 
"Funtoo Linux" {
 
"Funtoo Linux" {
kernel kernel[-v]
+
    kernel kernel[-v]
initrd initramfs[-v]
+
    initrd initramfs[-v]
  params += cryptdevice=PARTLABEL=FUNTOO luks root=PARTLABEL=FUNTOO  rootfstype=auto
+
    params += crypt_root=UUID=aafe709b-82e7-448f-a2cb-36adc3787dc3 dolvm real_root=/dev/mapper/vg-root ro rootfstype=ext4 resume=swap:/dev/mapper/vg-swap quiet
 
}
 
}
</pre>
+
EOF}}
  
Now, run <code>ego boot update</code> to write the configuration files to <code>/boot/grub/grub.cfg</code>
+
'''Install GRUB'''
 +
====For BIOS systems====
 +
{{console|body=# ##i##grub-install --target=i386-pc --no-floppy /dev/sdX}}
 +
{{console|body=# ##i##ego boot update}}
  
=== Another Example ===
+
====For UEFI systems====
Configure the bootloader as described above, with correct kernel and initramfs images names. An example for grub2. You will be editing <code>/etc/boot.conf</code>:
+
{{console|body=# ##i##mount -o remount,rw /sys/firmware/efi/efivars}}
 +
{{Note|For 32 bit systems, the following command should be changed to:
 +
{{console|body=# ##i##grub-install --target=i386-efi --efi-directory=/boot --bootloader-id="Funtoo Linux" --recheck /dev/sdX}}}}
 +
{{console|body=# ##i##grub-install --target=x86_64-efi --efi-directory=/boot --bootloader-id="Funtoo Linux" --recheck /dev/sdX}}
 +
{{console|body=# ##i##ego boot update}}
  
<pre>
+
'''Patch genkernel to include LUKS2 support'''
boot {
+
{{console|body=# ##i##sed '/MODULES_CRYPT/ s/\"$/ af_alg algif_skcipher\"/' -i /usr/share/genkernel/arch/$(arch)/modules_load}}
  generate grub
 
  default "Funtoo Linux"
 
  timeout 3
 
}
 
"Funtoo Linux" {
 
kernel kernel[-v]
 
initrd initramfs[-v]
 
  params += crypt_root=PARTLABEL=FUNTOO dolvm real_root=/dev/mapper/vg-root  rootfstype=ext4
 
</pre>
 
  
== GRUB ==
+
'''Generate a new initramfs'''
*Install grub in legacy mode:
+
{{console|body=# ##i##genkernel --clean --luks --lvm --disklabel --ramdisk-modules --fullname=$(ls /boot/initramfs-* {{!}} tail -c +17) initramfs}}
{{console|body=
 
###i## grub-install --target=i386-pc /dev/sdc
 
###i## ego boot update}}
 
  
=== EFI from Legacy ===
+
==Finishing installation==
*manually make efi directory:
+
From this point, you should be able to finish following the [https://www.funtoo.org/Install/Network official Funtoo Linux install instructions]
*remount /dev/sdc2 to /boot/efi:
 
*install efi images:
 
{{console|body=
 
###i## mkdir /boot/efi
 
###i## mount /dev/sdc2 /boot/efi
 
###i## grub-install --target=x86_64-efi /boot/efi
 
}}
 
=== EFI from EFI ===
 
  
{{console|body=
+
==Managing your LUKS volume==
###i##mount -o remount,rw /sys/firmware/efi/efivars
+
'''Change your LUKs-encrypted drive's passphrase'''
###i##grub-install --target=x86_64-efi --efi-directory=/boot --bootloader-id="Funtoo Linux [GRUB]" --recheck /dev/sda
 
###i##ego boot update
 
}}
 
 
 
== Final steps ==
 
exit chroot, unmount everything, close encrypted drive and reboot
 
{{console|body=
 
###i## exit
 
###i## swapon
 
NAME          TYPE      SIZE USED PRIO
 
/home/swapfile file        4G  2M  -2
 
/dev/dm-1      partition  2G  0B  -3
 
###i## swapoff /dev/dm-1
 
###i## cd ..
 
# ##i##umount -l -v /mnt/funtoo/{dev, proc, home, usr/portage, boot}
 
###i## umount -lR funtoo
 
# ##i##vgchange -a n
 
# ##i##cryptsetup luksClose dmcrypt_root
 
}}
 
After reboot you will get the following:
 
<console>
 
>>> better-initramfs started. Kernel version 2.6.35-gentoo-r10
 
>>> Create all the symlinks to /bin/busybox.
 
>>> Initiating /dev/dir
 
>>> Getting LVM volumes up (if any)
 
Reding all physical volumes. This make take awhile...
 
No volume group found
 
No volume group found
 
>>> Opening encrypted partition and mapping to /dev/mapper/dmcrypt_root
 
Enter passphrase fore /dev/sda2:
 
</console>
 
Type your password
 
 
 
<console>
 
>>> Again, getting LVM volumes up (if any, after map dmcrypt).
 
  Reading all physical volumes.  This may take a while...
 
  Found volume group "vg" using metadata type lvm2
 
  4 logical volume(s) in volume group "vg" now active
 
>>> Mounting rootfs to /newroot
 
>>> Umounting /sys and /proc.
 
>>> Switching root to /newroot and executing /sbin/init.
 
INIT: version 2.88 booting
 
Loading /libexec/rc/console/keymap
 
  OpenRC 0.6.1 is starting up Funtoo Linux (x86_64)
 
...boot messages omitted for clarity
 
 
 
orion login: oleg
 
Password:
 
Last login: Thu Oct 14 20:49:21 EEST 2010 on tty1
 
oleg@orion ~ %
 
</console>
 
 
 
==management==
 
=== Change your LUKs-encrypted drive's passphrase ===
 
 
You may want to change your encrypted volume’s passphrase or password from time to time. To do so, run the following commands in the console as root:
 
You may want to change your encrypted volume’s passphrase or password from time to time. To do so, run the following commands in the console as root:
  
 
{{console|body=
 
{{console|body=
# ##i##cryptsetup luksChangeKey /dev/sda3
+
# ##i##cryptsetup luksChangeKey /dev/sdx3
 
}}
 
}}
  
 
You'll be prompted to enter in the existing passphrase first, then to enter in your new passphrase.
 
You'll be prompted to enter in the existing passphrase first, then to enter in your new passphrase.
 
You will not be asked to confirm your new passphrase, so be careful when running this operation.
 
You will not be asked to confirm your new passphrase, so be careful when running this operation.
 
  
 
== Additional links and information ==
 
== Additional links and information ==
 +
* [https://www.freedesktop.org/software/systemd/man/crypttab.html crypttab]
 
* [[gentoo-wiki:Root filesystem over LVM2, DM-Crypt and RAID|Root filesystem over LVM2, DM-Crypt, and RAID]]
 
* [[gentoo-wiki:Root filesystem over LVM2, DM-Crypt and RAID|Root filesystem over LVM2, DM-Crypt, and RAID]]
 
* [http://wiki.archlinux.org/index.php/System_Encryption_with_LUKS_for_dm-crypt System Encryption with LUKS for dm-crypt]
 
* [http://wiki.archlinux.org/index.php/System_Encryption_with_LUKS_for_dm-crypt System Encryption with LUKS for dm-crypt]

Latest revision as of 12:10, May 30, 2021

This howto describes how to setup LVM, swap, and root with dmcrypt LUKS. It is a standalone installation walk through, based on the official installations finished product. boot is not encrypted.

   Warning

You may try this installation method at your own risk! Please note: this guide is outside of the official installation documentation and cannot be supported. If you choose to use this, we assume you know what you are doing and you are on your own.

Prepare the hard drive and partitions

  • Before you begin, make sure you are partitioning the correct drive. For the rest of this tutorial, we will be using /dev/sdX as a placeholder.
root # lsblk
NAME          MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT
sda             8:0    0  1.8T  0 disk 
├─sda1          8:1    0  512M  0 part 
├─sda2          8:2    0    8G  0 part [SWAP]
└─sda3          8:3    0  1.8T  0 part 
  ├─main-root 254:0    0  500G  0 lvm  /
  └─main-data 254:1    0  1.3T  0 lvm  /home

Partition

MBR [BIOS] Partitioning

   Note

Use this method if you are booting using your BIOS, and if your Funtoo LiveCD initial boot menu was light blue. If you're going to use the UEFI/GPT disk format, then please proceed to the next section.

root # fdisk /dev/sdX

Within fdisk, follow these steps:

Empty the partition table:

Command (m for help): o ↵

Create boot partition:

Command (m for help): n ↵
Partition type (default p): 
Partition number (1-4, default 1): 
First sector: 
Last sector: +128M ↵

Create partition which will be encrypted with LUKS:

Command (m for help): n ↵
Partition type (default p): 
Partition number (2-4, default 2): 
First sector: 
Last sector: 

Verify the partition table:

Command (m for help): p

Disk /dev/sdX: 298.1 GiB, 320072933376 bytes, 625142448 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: dos
Disk identifier: 0x82abc9a6

Device    Boot     Start       End    Blocks  Id System
/dev/sdX1           2048    264191    131072  83 Linux
/dev/sdX2        4458496 625142447 312439128  83 Linux

Write the partition table to disk:

Command (m for help): w

Your new MBR partition table will now be written to your system disk.

UEFI Partitioning

   Note

Use this method if you are interested in booting using UEFI, and if your Funtoo LiveCD initial boot menu was black and white, or the system booted without a boot menu. If it was light blue, this method will not work. Instead, use the instructions in the previous section then skip this section, or reboot LiveCD in UEFI mode first.

root # gdisk /dev/sdX

Within gdisk, follow these steps:

Empty the partition table:

Command: o ↵
This option deletes all partitions and creates a new protective MBR.
Proceed? (Y/N): y ↵

Create boot partition:

Command: n ↵
Partition Number: 1 ↵
First sector: 
Last sector: +128M ↵
Hex Code: EF00 ↵

Create partition which will be encrypted with LUKS:

Command: n ↵
Partition Number: 2 ↵
First sector: 
Last sector:  (for rest of disk)
Hex Code: 

(Optional) Create disk labels:

Command: c ↵
Partition Number: 1
Enter name: BOOT 
Command: c ↵
Partition Number: 2
Enter name: ROOT

Write Partition Table To Disk:

Command: w ↵
Do you want to proceed? (Y/N): Y ↵

The partition table will now be written to the disk and gdisk will close.

Create and mount filesystems.

Create /boot filesystem

For BIOS systems

root # mkfs.ext2 /dev/sdX1

For UEFI systems

root # mkfs.vfat -F 32 /dev/sdX1

Create LUKS encrypted volume

   Note
Cryptsetup now defaults to LUKS2, which is unsupported by stable versions of grub. This is why we are not encrypting /boot.
   Warning
The debian-sources kernel in current stage3 tarballs does not allow for passwords in excess of 63 characters.
root # cryptsetup luksFormat /dev/sdX2

Open newly created LUKS volume

root # cryptsetup open --type luks2 /dev/sdX2 root

Create LVM volumes for / and swap

root # pvcreate /dev/mapper/root
root # vgcreate vg /dev/mapper/root
   Note

Replace "16G" with the amount of swap you would like to make available.

root # lvcreate -L16G --name swap vg
root # lvcreate -l 100%FREE --name root vg
   Note

The "-l 100%FREE" option above will use the remainder of the disk for your root partition. If you would prefer to create separate for /home or /var (for example), you can instead continue to use the "-LXXG" option for fixed sizes.

Create filesystems on LVM volumes

root # mkswap /dev/mapper/vg-swap
root # mkfs.ext4 /dev/mapper/vg-root

Create directories for chroot

root # mkdir -p /mnt/funtoo

Mount filesystems

root # mount /dev/mapper/vg-root /mnt/funtoo
root # mkdir /mnt/funtoo/boot
root # mount /dev/sdX1 /mnt/funtoo/boot
root # mkdir /mnt/funtoo/proc
root # mount -t proc none /mnt/funtoo/proc
root # mkdir /mnt/funtoo/dev
root # mount --rbind /dev /mnt/funtoo/dev
root # mkdir /mnt/funtoo/sys
root # mount --rbind /sys /mnt/funtoo/sys

Set the date

   Note

See the official Funtoo docs on setting the date.

Install the Funtoo starge tarball of your choice

   Note

These instructions will be using the intel-haswell minimal stage3. You should adjust them accordingly

root # cd /mnt/funtoo
root # wget https://build.funtoo.org/1.4-release-std/x86-64bit/intel64-haswell/2021-03-10/stage3-intel64-haswell-1.4-release-std-2021-03-10.tar.xz
root # tar --numeric-owner --xattrs --xattrs-include='*' -xpf stage3-intel64-haswell-1.4-release-std-2021-03-10.tar.xz && rm -f stage3-intel64-haswell-1.4-release-std-2021-03-10.tar.xz

Chroot into your new system

root # cp /etc/resolv.conf /mnt/funtoo/etc/
root # env -i HOME=/root TERM=$TERM $(which chroot) /mnt/funtoo bash -l

Configure your system

Set a new root password

root # passwd

Set hostname

root # echo 'hostname="yourdesiredhostname"' > /etc/conf.d/hostname

Set your timezone

root # ln -sf /usr/share/zoneinfo/YOUR/TIMEZONE /etc/localtime

Note your filesystem information

root # blkid
/dev/sdX1: UUID="6453-0C55" TYPE="vfat" PARTLABEL="efi" PARTUUID="4e195c4b-f88c-4205-b9df-79a879704b2f"
/dev/sdX2: UUID="aafe709b-82e7-448f-a2cb-36adc3787dc3" TYPE="crypto_LUKS" PARTLABEL="system" PARTUUID="93d0cf9b-0b95-4d8b-919f-48cd1774996f"
/dev/mapper/root: UUID="hvz79n-I2VE-nR1c-0hDQ-PVkR-3GRb-rnuJ9C" TYPE="LVM2_member"
/dev/mapper/vg-swap: UUID="a9188bc3-7def-422b-990d-9de431825779" TYPE="swap"
/dev/mapper/vg-root: UUID="2eaf45e6-d33b-4155-b4ca-63a2fdbfb896" TYPE="ext4"

Configure /etc/fstab

   Note

The UUID parameter is set to the UUID of your boot partition as found from the blkid command above.

root # cat > /etc/fstab << 'EOF'
UUID=6453-0C55 /boot vfat noauto,noatime 1 2
/dev/mapper/vg-swap none swap sw 0 0
/dev/mapper/vg-root / ext4 noatime,nodiratime,defaults 0 1
EOF

Create /etc/crypttab

   Note

The UUID parameter is set to the UUID of /dev/sdX2 as found from the blkid command above.

root # echo "root UUID=aafe709b-82e7-448f-a2cb-36adc3787dc3 none luks,discard" >> /etc/crypttab

Create /etc/dmtab

root # dmsetup table >> /etc/dmtab

Portage

Download the portage tree

root # ego sync

Change your ego profile to include encrypted root support

root # epro mix-in encrypted-root

Edit package USE-flags

root # cat > /etc/portage/package.use <<'EOF'
*/* device-mapper lvm luks
sys-kernel/linux-firmware initramfs
sys-fs/cryptsetup -dynamic
EOF

Install necessary packages

root # emerge grub haveged intel-microcode linux-firmware cryptsetup lvm2 genkernel iucode_tool

Configure services to start at boot

root # rc-update add device-mapper sysinit
root # rc-update add dmcrypt sysinit
root # rc-update add lvmetad sysinit
root # rc-update add haveged default
root # rc-update add busybox-ntpd default

Install a bootloader

Configure /etc/boot.conf

   Note

The UUID parameter is set to the UUID of /dev/sdX2 as found from the blkid command above.

root # cat > /etc/boot.conf <<'EOF'
boot {
    generate grub
    default "Funtoo Linux"
    timeout 3
}
"Funtoo Linux" {
    kernel kernel[-v]
    initrd initramfs[-v]
    params += crypt_root=UUID=aafe709b-82e7-448f-a2cb-36adc3787dc3 dolvm real_root=/dev/mapper/vg-root ro rootfstype=ext4 resume=swap:/dev/mapper/vg-swap quiet
}
EOF

Install GRUB

For BIOS systems

root # grub-install --target=i386-pc --no-floppy /dev/sdX
root # ego boot update

For UEFI systems

root # mount -o remount,rw /sys/firmware/efi/efivars
   Note

For 32 bit systems, the following command should be changed to:

root # grub-install --target=i386-efi --efi-directory=/boot --bootloader-id="Funtoo Linux" --recheck /dev/sdX
root # grub-install --target=x86_64-efi --efi-directory=/boot --bootloader-id="Funtoo Linux" --recheck /dev/sdX
root # ego boot update

Patch genkernel to include LUKS2 support

root # sed '/MODULES_CRYPT/ s/\"$/ af_alg algif_skcipher\"/' -i /usr/share/genkernel/arch/$(arch)/modules_load

Generate a new initramfs

root # genkernel --clean --luks --lvm --disklabel --ramdisk-modules --fullname=$(ls /boot/initramfs-* | tail -c +17) initramfs

Finishing installation

From this point, you should be able to finish following the official Funtoo Linux install instructions

Managing your LUKS volume

Change your LUKs-encrypted drive's passphrase You may want to change your encrypted volume’s passphrase or password from time to time. To do so, run the following commands in the console as root:

root # cryptsetup luksChangeKey /dev/sdx3

You'll be prompted to enter in the existing passphrase first, then to enter in your new passphrase. You will not be asked to confirm your new passphrase, so be careful when running this operation.

Additional links and information