From aad8f5208d92e70044b6f1d31d07485fc23de8f4 Mon Sep 17 00:00:00 2001
From: Deven Blake ~ Return to the rest of the site
-This information is not authoritative, nor from a place of deep knowledge.
-
-To format a partition for LUKS, use
-To open a LUKS partition, use
-To mount an opened LUKS partition, use
-To close an open LUKS partition,
-To make the LUKS partition openable via keyfile, first make a keyfile ( SSH keys are typically stored in Typically, the public key's filename will be suffixed with You can generate an SSH key with
-Microsoft GitHub documentation suggests a user create a key with cryptography
-updated 2021-11-09
-
-LUKS partitioning
-Sources
-
-
-lsblk
to determine the physical block device location for that partition and run cryptsetup luksFormat [partition]
.
-The passphrase used can be changed or removed after creation.
-cryptsetup luksOpen [partition] [name]
.
-This name is the name the decrypted block device location will take in /dev/mapper/
.
-Before the decrypted block device has a filesystem it'll just be cleared space - use mkfs.[filesystem] /dev/mapper/[name]
.
-mount(8)
as normal, just with the decrypted block device location.
-umount(8)
it if it's open and cryptsetup luksClose [name]
.
-dd if=/dev/urandom of=/root/keyfile bs=1024 count=4
seems to work), and optionally make it readable by root only (chmod 0400 [keyfile]
).
-Then add the keyfile to the partition's LUKS header with cryptsetup luksAddKey [physical partition block device] [keyfile]
.
-SSH keys
-Sources
-
-
-$HOME/.ssh
..pub
, while the private key will not.ssh-keygen(1)
. Currently the preferred implementation is openssh-keygen
, part of the OpenSSH suite.ssh-keygen -t ed25519 -C "[e-mail address]"
.
-This generates an Ed25519 SSH key with an e-mail address in the key comment.
-
See fstab(5).
postmarketOS requires that the localmount
OpenRC service be enabled for the system to read fstab(5)
.
@@ -91,25 +93,6 @@ Complex Makefiles may not be useable in both.
It's custom for Linux systems to have make(1)
as GNU Make and bmake(1)
as BSD Make, and BSD-based systems to have make(1)
as BSD Make and gmake(1)
as GNU Make.
See cryptography#LUKS partitioning for how to make a LUKS partition.
-
-e2fsprogs
is needed for the dm_mod
kernel module used for LUKS partition decryption.
-
-On most OpenRC-initialized distributions, the cryptsetup-openrc
package provides a dmcrypt
service for OpenRC.
-Make sure that service is added to runlevel boot.
-
-Configure /etc/conf.d/dmcrypt
, and accordingly fstab.
-dmcrypt
will need the UUID of the physical block device while fstab (if being configured with UUIDs will need the UUID of the decrypted block device in the device mapper.
-
In the context of POSIX and UNIX-like systems, an "on-line" manual is a manual that is accessible via the computer system it documents.
@@ -124,7 +107,7 @@ Alpine by default uses mandoc
.
less(1)
is more(1)
; more or less.
Use mkfs(8)
for creating filesystems and mount(8)
for mounting partitions' filesystems.
+To format a partition for LUKS, use lsblk
to determine the physical block device location for that partition and run cryptsetup luksFormat [partition]
.
+The passphrase used can be changed or removed after creation.
+
+To open a LUKS partition, use cryptsetup luksOpen [partition] [name]
.
+This name is the name the decrypted block device location will take in /dev/mapper/
.
+Before the decrypted block device has a filesystem it'll just be cleared space - use mkfs.[filesystem] /dev/mapper/[name]
.
+
+To mount an opened LUKS partition, use mount(8)
as normal, just with the decrypted block device location.
+
+To close an open LUKS partition, umount(8)
it if it's open and cryptsetup luksClose [name]
.
+
+To make the LUKS partition openable via keyfile, first make a keyfile (dd if=/dev/urandom of=/root/keyfile bs=1024 count=4
seems to work), and optionally make it readable by root only (chmod 0400 [keyfile]
).
+Then add the keyfile to the partition's LUKS header with cryptsetup luksAddKey [physical partition block device] [keyfile]
.
+
See cryptography#LUKS partitioning for how to make a LUKS partition.
+
+e2fsprogs
is needed for the dm_mod
kernel module used for LUKS partition decryption.
+
+On most OpenRC-initialized distributions, the cryptsetup-openrc
package provides a dmcrypt
service for OpenRC.
+Make sure that service is added to runlevel boot.
+
+Configure /etc/conf.d/dmcrypt
, and accordingly fstab.
+dmcrypt
will need the UUID of the physical block device while fstab (if being configured with UUIDs will need the UUID of the decrypted block device in the device mapper.
+
@@ -172,6 +199,20 @@ On a live system you can then rc-service networkmanager restart
to
Much of this can be configured in the ACPI settings in your login manager, provided you have one running that can do this.
Check out tlp
for Thinkpads and some other Lenovo devices.
SSH keys are typically stored in $HOME/.ssh
.
Typically, the public key's filename will be suffixed with .pub
, while the private key will not.
You can generate an SSH key with ssh-keygen(1)
. Currently the preferred implementation is openssh-keygen
, part of the OpenSSH suite.
+Microsoft GitHub documentation suggests a user create a key with ssh-keygen -t ed25519 -C "[e-mail address]"
.
+This generates an Ed25519 SSH key with an e-mail address in the key comment.
+
top(1)
comes with busybox, otherwise use htop
.
rtkit
installed and running through your initia