Guide to install Arch Linux with LUKS encryption on an hetzner server
Go to file
2020-10-15 13:56:40 +02:00
README.md Removed 2020-10-15 13:56:40 +02:00

Arch Linux with LUKS and btrfs on a Hetzner server

Software

This guide shows how to set up the following software composition:

Requirements

Written for a Dedicated Hetzner server with the following hardware specifications:

CPU1: Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz (Cores 8)
Memory:  15973 MB
Disk /dev/sda: 3000 GB (=> 2794 GiB)
Disk /dev/sdb: 3000 GB (=> 2794 GiB)
Total capacity 5589 GiB with 2 Disks

Legend

The following symbols show in which environment the code is executed:

Guide

1. Configure and Install Image

1.1 Login to Hetzner Rescue System

💻 :

ssh root@your_server_ip

1.2 Create the /autosetup

🚑 :

nano /autosetup

Save the following content into this file:

##  Hetzner Online GmbH - installimage - config

DRIVE1 /dev/sda
DRIVE2 /dev/sdb

##  SOFTWARE RAID:
## activate software RAID?  < 0 | 1 >
SWRAID 1

## Choose the level for the software RAID < 0 | 1 | 10 >
SWRAIDLEVEL 1

##  BOOTLOADER:
BOOTLOADER grub

##  HOSTNAME:
HOSTNAME hetzner-arch-luks
#Adapt the hostname to your needs

##  PARTITIONS / FILESYSTEMS:
PART /boot  btrfs     512M
PART lvm    vg0       all
LV vg0   swap   swap     swap         8G
LV vg0   root   /        btrfs        10G

##  OPERATING SYSTEM IMAGE:
IMAGE /root/.oldroot/nfs/install/../images/archlinux-latest-64-minimal.tar.gz

1.3 Install Image

🚑 :

installimage

1.4 Restart

🚑 :

reboot

2. Setup System

2.1 Login to server

💻 :

ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip
ssh root@your_server_ip

2.2 Update the system

💽 :

pacman -Syyu

2.3 Install administration tools:

💽 :

pacman -S nano

3. Prepare System for Unlocking via SSH

3.1 Install software

💽 :

pacman -S busybox mkinitcpio-dropbear mkinitcpio-utils mkinitcpio-netconf

3.2 Copy authorized keys to dropbear

💽 :

cp -v ~/.ssh/authorized_keys /etc/dropbear/root_key
chmod 700 ~/.ssh
chmod 600 ~/.ssh/authorized_keys
systemctl enable sshd

3.3 Regenerate OpenSSH keys

💽 :

rm /etc/ssh/ssh_host_*
ssh-keygen -A -m PEM

3.4 Import SSH-keys to dropbear

💽 :

dropbearconvert openssh dropbear /etc/ssh/ssh_host_rsa_key /etc/dropbear/dropbear_rsa_host_key

3.5 Modify /etc/mkinitcpio.conf

💽 :

nano /etc/mkinitcpio.conf
Replace

Old:

HOOKS=(base udev autodetect modconf block mdadm_udev lvm2 filesystems keyboard fsck)

New:

HOOKS=(base udev autodetect modconf block mdadm_udev lvm2 netconf dropbear encryptssh filesystems keyboard fsck)

4. Activate Encryption

4.1 Activate Rescue System

Activate the rescue system https://robot.your-server.de/server

4.2 Reboot

💽 :

reboot

4.3 Login to the rescue system

💻 :

ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip
ssh root@your_server_ip

4.4 Mount the "system"

🚑 :

vgscan -v
vgchange -a y
mount /dev/mapper/vg0-root /mnt

4.5 Copy "system"

🚑 :

echo 0 >/proc/sys/dev/raid/speed_limit_max
mkdir /oldroot
cp -va /mnt/. /oldroot/.
echo 200000 >/proc/sys/dev/raid/speed_limit_max

4.6 Unmount the "system"

🚑 :

umount /mnt

4.7 Delete decrypted LVM-Volume-Group

🚑 :

vgremove vg0

4.8 Check drive state

🚑 :

cat /proc/mdstat

4.9 Encrypt MD1 by executing

🚑 :

cryptsetup --cipher aes-xts-plain64 --key-size 256 --hash sha256 --iter-time=10000 luksFormat /dev/md1
cryptsetup luksOpen /dev/md1 cryptroot
pvcreate /dev/mapper/cryptroot
vgcreate vg0 /dev/mapper/cryptroot
lvcreate -n swap -L8G vg0
lvcreate -n root -L10G vg0
mkfs.btrfs /dev/vg0/root
mkswap /dev/vg0/swap

4.10 Mount encrypted

🚑 :

mount /dev/vg0/root /mnt

4.12 Copy "system"

🚑 :

echo 0 >/proc/sys/dev/raid/speed_limit_max
cp -av /oldroot/. /mnt/.
echo 200000 >/proc/sys/dev/raid/speed_limit_max

4.13 Integrate Finale Installation

🚑 :

mount /dev/md0 /mnt/boot
mount --bind /dev /mnt/dev
mount --bind /sys /mnt/sys
mount --bind /proc /mnt/proc
chroot /mnt

4.14

👻 :

echo "cryptroot /dev/md1 none luks" >> /etc/crypttab

4.15 Create an initial ramdisk

👻 :

mkinitcpio -p linux

5 Grub

5.1 Install Grub

👻 :

pacman -S grub

5.2 Configure /etc/default/grub

👻 :

nano /etc/default/grub

Change the following parameters:

GRUB_CMDLINE_LINUX="cryptdevice=/dev/md1:cryptroot ip=dhcp"
GRUB_ENABLE_CRYPTODISK=y

Further information.

5.3 Make and Install on Hard-drives

👻 :

grub-mkconfig -o /boot/grub/grub.cfg
grub-install /dev/sda
grub-install /dev/sdb

5.4 Restart System

👻 🚑 :

exit
umount /mnt/boot /mnt/proc /mnt/sys /mnt/dev
umount /mnt
sync
reboot

6. Encryption Procedure

6.1 Decrypt server

💻 :

ssh  -o UserKnownHostsFile=/dev/null root@your_server_ip
cryptroot-unlock
exit

6.2 Login to server

💻 :

ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip
ssh root@your_server_ip

7. Expand filesystem

💻 :

lvresize -l +100%FREE /dev/vg0/root
btrfs filesystem resize max /

8. Debugging

8.1 Login to System from Rescue System

🚑 :

cryptsetup luksOpen /dev/md1 cryptroot
mount /dev/vg0/root /mnt
mount /dev/md0 /mnt/boot
mount --bind /dev /mnt/dev
mount --bind /sys /mnt/sys
mount --bind /proc /mnt/proc
chroot /mnt

8.2 Logout from chroot environment

👻 🚑 :

exit
umount /mnt/boot /mnt/proc /mnt/sys /mnt/dev
umount /mnt
sync
reboot

8.3 Regenerate GRUB and Arch

👻 :

mkinitcpio -p linux
grub-mkconfig -o /boot/grub/grub.cfg
grub-install /dev/sda
grub-install /dev/sdb

Sources

The code is adapted from the following guides: