![]() ![]() ![]() Now lets open the container so we can start using the newly created /dev/mapper/lvm device cryptsetup luksOpen /dev/vda2 lvm Next step is to create the encryption il lb e using aes-xts-plain64 with 512 bits cryptsetup -c aes-xts-plain -y -s 512 luksFormat /dev/vda2Īs yt viewer brought to my attention that it might be better to actually use as it also works better with filesystems > 2TB cryptsetup -c aes-xts-plain64 -y -s 512 luksFormat /dev/vda2 You can use the following command to find out the throughput of various ciphers cryptsetup benchmark Modprobing dm-crypt which is used to encrypt our disks modprobe dm-crypt Update the system clock timedatectl set-ntp true In most cases this will be dhclient eth0 dhclient enp1s0 Verify that uefi has been loaded properly ls /sys/firmware/efi/efivarsĬonnect to the internet - most cases you will get an ip via dhcp so lets use dhclient to get an ip. Load your keyboard layout ( i ll be picking the german keyboard layout de-latin1 the default is us layout) loadkeys de-latin1 You will end up with a prompt as the root user You can use the tool dd to flash the image to your bootable usb media, plugin the media and run sudo dmesgĭmesg will tell you the device name of the usb stick you just inserted use the sdX in combination with dd to create a bootable image dd if=/path/to/arch.iso of=/dev/sdX If not you can also use gpg gpg -keyserver-options auto-key-retrieve -verify archlinux-2020.05.01-x86_64.iso.sig Gpg: Korrekte Signatur von "Pierre Schmitz " Gpg: Hinweis: Die "trustdb" ist nicht schreibbar You can grab the latest archlinux iso from ĭownload the iso and the matching signature to verify, if you are doing this from a arch you can use: pacman-key -v archlinux-2020.05.01-x86_64.iso.sig The following video shows the whole installation below the video you’ll find the transcript ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |