Topic: Install Full disk encryption (including /boot ) Luks1 T440P Libreboot
Hi all . I would like to share my experience of installing Hyperbola on T440P Libreboot 2023 https://mirror.cyberbits.eu/libreboot/s … 0625/roms/ with Full disk encryption (including /boot) /libreboot/stable/20230625/roms/
I know that this image contains blobs and I do not understand and do not share the philosophy of Libreboot)) Why introduce blobs to increase the amount of hardware .. the meaning of the project is lost ..
This example uses luksFormat --type luks1 /dev/sdb1 . Don't use Luks1 it is not safe, use Luks2+argon2id today!
Since version 2.4.0 (released August 18, 2021), cryptsetup uses Argon2id by default. You can read why in detail in this article.
https://mjg59.dreamwidth.org/66429.html
My example is just a test installation, I wanted to understand whether it would work or not.
It seems to me that a more promising test is installing Full disk encryption (including /boot) on this T400 laptop with a 4-core processor
https://thonkpeasant.xyz/guides/other/quad.html
Booting ISO from USB
root@hyperiso # cd /usr/share/kbd/consolefonts
root@hyperiso # setfonts sun12X22.psfu.gz
Now the font size is normal, you can move on))
# lsblk
# dd if=/dev/urandom of=/dev/sdb bs=1M status=progress
# cfdisk /dev/sdb
( select dos > new > enter > primary > write > yes > quit )
now we have sdb1
Connect internet
# ip -c a
# rc-service dhcpcd start
# ip link set enp0s35 up
# dhcpcd enp0s35
Cryptsetup
# pacman -Syy cryptsetup
# rc-update add lvm boot
# rc-update add dmcrypt boot
# modprobe dm-mod
Create the Luks partititon. Use a more reliable option (this is just an example)
# cryptsetup -v --cipher serpent-xts-plain64 --key-size 512 --hash whirlpool --iter-time 500 --use-random --verify-passphrase luksFormat --type luks1 /dev/sdb1
Existing 'crypto_LUKS' superblock signature (offset:0 bytes) on device...
Existing 'crypto_LUKS' superblock signature (offset:16... bytes) on device...
Key slot 0 created
Command successuful
Create the volume group and logical volumes
# cryptsetup open /dev/sdb1 lvm
# pvcreate /dev/mapper/lvm
# pvs
(check)
# vgcreate matrix /dev/mapper/lvm
# vgs
(check)
# lvcreate -l +100%FREE matrix -n rootvol
# lvs
(check)
# mkfs.ext4 /dev/mapper/matrix-rootvol
# mount /dev/matrix/rootvol /mnt
Create the /boot and /home directories
# mkdir -p /mnt/home
# mkdir -p /mnt/boot
Install the base system
# pacstrap /mnt
Generate an Fstab
# genfstab -U -p /mnt >> /mnt/etc/fstab
# cat /mnt/etc/fstab
(check)
Chroot
# arch-chroot /mnt
Setting up clock...
Setting up time zone..
Setting up the consolefont ...
Setting up Kernel Modules
# nano /etc/mkinitcpio.conf
MODULES=i915
HOOKS="base udev autodetect modconf block keyboard keymap consolefont encrypt lvm2 filesystems fsck shutdown"
Update Kernel
# mkinitcpio -p linux-libre-lts
==>ERROR Hook 'encrypt'...
==>WARNING missing isci..
OK,
# pacman -S cryptsetup
# pacman -S core/isci-lts-firmware
# mkinitcpio -p linux-libre-lts
Setting up hostname
# echo " hyperbola" > /etc/hostname
# nano /etc/hosts
127.0.0.1 localhost.localdomain localhost hyperbola
::1 localhost.localdomain localhost hyperbola
Set the root password
# passwd
****************************
****************************
Installing Grub
# pacman -S grub
# nano /etc/default/grub
GRUB_CMDLINE_LINUX="cryptdevice=/dev/sdb1:lvm"
GRUB_ENABLE_CRYPTODISK=y
# grub-install /dev/sdb
Generate grub.cfg
# grub-mkconfig -o /boot/grub/grub.cfg
Unmount all partition and reboot
# exit
# umount -R /mnt
# lvchange -an /dev/matrix/rootvol
# cryptsetup close lvm
# openrc-shutdown -p now
Everything works, there is an inconvenience, if you have two SSDs, you need to enter your SSD number manually each time (for example, you press 3), after that the system boots and you need to enter the password twice, in the wiki https://wiki.parabola. nu/Installing_Parabola_on_Libreboot_with_full_disk_encryption_(including_/boot) there is an explanation of how to change this.