2020-04-16 20:14:12 +02:00
|
|
|
# Arch Linux with LUKS and btrfs on a hetzner server (DRAFT)
|
2020-04-15 12:32:29 +02:00
|
|
|
This guide should show you how to set up an System with the following specifications on an hetzner server:
|
|
|
|
* Arch Linux
|
|
|
|
* btrfs
|
|
|
|
* LUKS
|
2020-04-17 15:07:00 +02:00
|
|
|
* mdraid
|
|
|
|
* dmcrypt
|
2020-04-15 12:32:29 +02:00
|
|
|
|
2020-04-17 15:07:00 +02:00
|
|
|
It adapts the following instruction:
|
|
|
|
* https://code.trafficking.agency/arch-linux-remote-unlock-root-volume-with-mdraid-and-dmcrypt.html
|
|
|
|
## Guide
|
|
|
|
### Preparing the Filesystems
|
|
|
|
```bash
|
|
|
|
# stop syncronisation before
|
|
|
|
# partition the discs
|
2020-04-17 15:54:14 +02:00
|
|
|
parted /dev/sda --align=opt --script mklabel gpt mkpart primary 0% 1GiB mkpart primary 1GiB 100%
|
|
|
|
parted /dev/sdb --align=opt --script mklabel gpt mkpart primary 0% 1GiB mkpart primary 1GiB 100%
|
2020-04-17 15:07:00 +02:00
|
|
|
# Modified because of https://askubuntu.com/questions/84538/trouble-creating-3tb-ext4-partition-due-to-msdos-partition-table-imposed-error
|
|
|
|
#reboot
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
```bash
|
|
|
|
# creating the filesystems, actually only /dev/sda1 is needed
|
|
|
|
mkfs.ext4 -L boot /dev/sda1
|
|
|
|
mkfs.ext4 -L boot /dev/sdb1
|
|
|
|
|
|
|
|
# creating the raid
|
|
|
|
mdadm --create --verbose --level=10 --metadata=1.2 --chunk=512 --raid-devices=2 --layout=f2 /dev/md0 /dev/sda2 /dev/sdb2
|
|
|
|
|
|
|
|
# and creating the dmcrypt "container"
|
|
|
|
cryptsetup -y -v luksFormat /dev/md0
|
|
|
|
cryptsetup luksOpen /dev/md0 root
|
|
|
|
|
|
|
|
# finally create the root filesystem
|
|
|
|
mkfs.ext4 -v -L root -m 0.01 -b 4096 -E stride=128,stripe-width=256 /dev/mapper/root
|
|
|
|
```
|
|
|
|
### Preparing for Arch
|
|
|
|
```bash
|
|
|
|
mkdir /arch
|
|
|
|
cd /arch
|
|
|
|
# download arch bootstrap disc, please choose the correct version
|
|
|
|
curl -O http://archlinux.mirrors.ovh.net/archlinux/iso/2020.04.01/archlinux-bootstrap-2020.04.01-x86_64.tar.gz
|
|
|
|
tar xvfz archlinux-bootstrap-2020.04.01-x86_64.tar.gz
|
|
|
|
```
|
|
|
|
|
|
|
|
Edit /arch/root.x86_64/etc/pacman.d/mirrorlist and choose a mirror
|
|
|
|
```bash
|
|
|
|
nano /arch/root.x86_64/etc/pacman.d/mirrorlist
|
|
|
|
```
|
|
|
|
https://gist.github.com/neonb88/5ba848f1aef21ab67c7a4ff28e6d2ea3
|
2020-04-17 15:54:14 +02:00
|
|
|
Just comment CheckSpace in /arch/root.x86_64/etc/pacman.conf
|
2020-04-17 15:07:00 +02:00
|
|
|
Chroot into the bootstrap environment
|
|
|
|
```bash
|
|
|
|
/arch/root.x86_64/bin/arch-chroot /arch/root.x86_64/
|
|
|
|
```
|
|
|
|
### More preparations
|
|
|
|
|
|
|
|
```bash
|
|
|
|
# mount the soon-to-be root-volume
|
|
|
|
mount /dev/mapper/root /mnt/
|
|
|
|
|
|
|
|
# and boot-volume
|
|
|
|
mkdir /mnt/boot
|
|
|
|
mount /dev/sda1 /mnt/boot
|
|
|
|
#https://unix.stackexchange.com/questions/490418/i-cant-make-a-grub-config
|
2020-04-17 15:54:14 +02:00
|
|
|
#mount --bind /proc /mnt/proc
|
|
|
|
#mount --bind /dev /mnt/dev
|
|
|
|
#mount --bind /sys /mnt/sys
|
|
|
|
#mount --bind /run /mnt/run
|
2020-04-17 15:07:00 +02:00
|
|
|
|
|
|
|
# initialize the pacman keychain this takes a long time do something from a second terminal, like dd if=/dev/sda of=/dev/tty7
|
|
|
|
pacman-key --init
|
|
|
|
## check out which of the following orders make sense
|
|
|
|
pacman-key --populate archlinux
|
2020-04-17 15:54:14 +02:00
|
|
|
pacman-key --refresh-keys
|
2020-04-17 15:07:00 +02:00
|
|
|
```
|
|
|
|
Finally, bootstrap Arch onto the root-volume...
|
|
|
|
```bash
|
|
|
|
pacstrap /mnt base base-devel intel-ucode
|
|
|
|
```
|
|
|
|
|
|
|
|
And bootstrap mdadmin.conf (md configuration) and fstab
|
|
|
|
```bash
|
|
|
|
pacman -Syyu mdadm # Added druing writing of instruction
|
|
|
|
mdadm --detail --scan >> /etc/mdadm.conf
|
|
|
|
genfstab -p /mnt > /mnt/etc/fstab
|
|
|
|
```
|
|
|
|
|
|
|
|
Chroot into the new Arch installation
|
|
|
|
```bash
|
|
|
|
arch-chroot /mnt/
|
|
|
|
```
|
|
|
|
|
|
|
|
Setup hostname and locales
|
|
|
|
```bash
|
|
|
|
echo test > /etc/hostname
|
|
|
|
|
|
|
|
echo LANG=en_US.UTF-8 > /etc/locale.conf
|
|
|
|
echo LC_COLLATE=C >> /etc/locale.conf
|
|
|
|
echo LANGUAGE=en_US >> /etc/locale.conf
|
|
|
|
|
|
|
|
ln -sf /usr/share/zoneinfo/Europe/Berlin /etc/localtime
|
|
|
|
```
|
|
|
|
|
|
|
|
Edit locale.gen according to your locale, don't forget en_US.UTF-8 or else some applications might complain.
|
|
|
|
```bash
|
|
|
|
pacman-key --populate archlinux
|
|
|
|
pacman -Syyu nano
|
|
|
|
nano /etc/locale.gen
|
|
|
|
|
|
|
|
locale-gen
|
|
|
|
```
|
|
|
|
### Setup early ssh with tinyssh and netconf
|
|
|
|
```bash
|
|
|
|
# some dependencies
|
2020-04-17 15:54:14 +02:00
|
|
|
# exit?
|
2020-04-17 15:07:00 +02:00
|
|
|
# dmraid here?
|
|
|
|
pacman -S sudo mkinitcpio mkinitcpio-nfs-utils tinyssh mkinitcpio-netconf mkinitcpio-tinyssh mkinitcpio-utils #ucspi-tcp
|
|
|
|
cd /tmp
|
|
|
|
```
|
|
|
|
Install mkinitcpio-netconf skipped because its in pacman.
|
|
|
|
Install ucspi-tcp
|
|
|
|
```bash
|
|
|
|
curl -O https://aur.archlinux.org/cgit/aur.git/snapshot/ucspi-tcp.tar.gz
|
|
|
|
tar xf ucspi-tcp.tar.gz
|
|
|
|
chown -R nobody:nobody ucspi-tcp
|
|
|
|
cd ucspi-tcp
|
|
|
|
sudo -u nobody makepkg
|
|
|
|
|
|
|
|
pacman -U ucspi-tcp-0.88-8-x86_64.pkg.tar.xz
|
|
|
|
|
|
|
|
cd ..
|
|
|
|
```
|
|
|
|
Skipped nstall mkinitcpio-tinyssh skipped because its in pacman.
|
|
|
|
Skipped nstall mkinitcpio-utils skipped because its in pacman.
|
|
|
|
|
|
|
|
Edit /etc/mkinitcpio.conf and add ***mdadm_udev netconf tinyssh encryptssh*** before filesystems should look something like this
|
|
|
|
```bash
|
|
|
|
HOOKS="base udev autodetect modconf block mdadm_udev netconf tinyssh encryptssh filesystems keyboard fsck"
|
|
|
|
```
|
|
|
|
Rebuild the initramfs
|
|
|
|
```bash
|
|
|
|
pacman -S linux
|
|
|
|
mkinitcpio -p linux
|
|
|
|
```
|
|
|
|
|
|
|
|
### Install and configure GRUB
|
|
|
|
```bash
|
|
|
|
#exit?
|
|
|
|
pacman -S grub
|
|
|
|
```
|
|
|
|
Edit /etc/default/grub and tell the Kernel about the cryptdevice and the mdraid, and netconf that we want dhcp
|
|
|
|
```bash
|
|
|
|
GRUB_CMDLINE_LINUX="cryptdevice=/dev/md0:root ip=dhcp md=0,/dev/sda2,/dev/sdb2"
|
|
|
|
```
|
|
|
|
|
|
|
|
Generate the grub config
|
|
|
|
```bash
|
|
|
|
grub-mkconfig -o /boot/grub/grub.cfg
|
|
|
|
```
|
|
|
|
|
|
|
|
Install Grub to /dev/sda
|
|
|
|
```bash
|
|
|
|
grub-install /dev/sda
|
|
|
|
```
|
2020-04-15 12:32:29 +02:00
|
|
|
## Guide
|
2020-04-15 13:40:10 +02:00
|
|
|
### 1. Configure and Install Image
|
|
|
|
#### 1.1
|
|
|
|
Login to Hetzner Rescue System
|
|
|
|
```bash
|
|
|
|
ssh root@your_server_ip
|
|
|
|
```
|
|
|
|
#### 1.2
|
|
|
|
Create the autosetup by executing
|
|
|
|
|
|
|
|
```bash
|
|
|
|
nano /autosetup
|
|
|
|
```
|
|
|
|
|
|
|
|
and saving the following content into this file:
|
2020-04-15 12:32:29 +02:00
|
|
|
|
|
|
|
```bash
|
|
|
|
## Hetzner Online GmbH - installimage - config
|
|
|
|
|
|
|
|
DRIVE1 /dev/sda
|
|
|
|
DRIVE2 /dev/sdb
|
|
|
|
|
|
|
|
## SOFTWARE RAID:
|
|
|
|
## activate software RAID? < 0 | 1 >
|
|
|
|
SWRAID 1
|
|
|
|
|
|
|
|
## Choose the level for the software RAID < 0 | 1 | 10 >
|
|
|
|
SWRAIDLEVEL 1
|
|
|
|
|
|
|
|
## BOOTLOADER:
|
|
|
|
BOOTLOADER grub
|
|
|
|
|
|
|
|
## HOSTNAME:
|
|
|
|
HOSTNAME hetzner-arch-luks
|
|
|
|
#Adapt the hostname to your needs
|
|
|
|
|
|
|
|
## PARTITIONS / FILESYSTEMS:
|
|
|
|
PART /boot btrfs 512M
|
|
|
|
PART lvm vg0 all
|
|
|
|
LV vg0 swap swap swap 8G
|
|
|
|
LV vg0 root / btrfs 10G
|
|
|
|
|
|
|
|
## OPERATING SYSTEM IMAGE:
|
|
|
|
IMAGE /root/.oldroot/nfs/install/../images/archlinux-latest-64-minimal.tar.gz
|
|
|
|
```
|
2020-04-15 13:40:10 +02:00
|
|
|
#### 1.3
|
|
|
|
Afterwards install the image by executing the following command:
|
|
|
|
|
|
|
|
```bash
|
|
|
|
installimage
|
|
|
|
```
|
|
|
|
#### 1.4
|
|
|
|
When the setup finished restart the server via
|
|
|
|
```bash
|
|
|
|
reboot
|
|
|
|
```
|
|
|
|
|
|
|
|
### 2. Setup System
|
|
|
|
#### 2.1
|
|
|
|
Login to your server:
|
2020-04-16 20:14:12 +02:00
|
|
|
|
2020-04-15 13:40:10 +02:00
|
|
|
```bash
|
2020-04-16 20:14:12 +02:00
|
|
|
ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip #revokes old ssh_host
|
2020-04-15 13:40:10 +02:00
|
|
|
ssh root@your_server_ip
|
|
|
|
```
|
2020-04-16 20:14:12 +02:00
|
|
|
#### 2.2
|
2020-04-15 13:40:10 +02:00
|
|
|
Update the system:
|
|
|
|
```bash
|
|
|
|
pacman -Syyu
|
|
|
|
```
|
2020-04-16 20:14:12 +02:00
|
|
|
#### 2.3
|
2020-04-15 13:40:10 +02:00
|
|
|
Install basic administration software:
|
|
|
|
```bash
|
|
|
|
pacman -Syyu nano
|
|
|
|
```
|
|
|
|
|
|
|
|
#### 3. Prepare System for Unlocking via SSH
|
|
|
|
#### 3.1 Execute the following script
|
|
|
|
```bash
|
|
|
|
# Install software
|
2020-04-16 22:34:01 +02:00
|
|
|
pacman -Syyu busybox mkinitcpio-dropbear mkinitcpio-utils mkinitcpio-netconf
|
2020-04-15 13:40:10 +02:00
|
|
|
#Copy ssh-key
|
2020-04-16 22:34:01 +02:00
|
|
|
cp -v ~/.ssh/authorized_keys /etc/dropbear/root_key
|
2020-04-15 13:40:10 +02:00
|
|
|
```
|
2020-04-16 20:14:12 +02:00
|
|
|
#### 3.2
|
|
|
|
Replace the following line in **/etc/mkinitcpio.conf**
|
|
|
|
```
|
|
|
|
HOOKS=(base udev autodetect modconf block mdadm_udev lvm2 filesystems keyboard fsck)
|
|
|
|
```
|
|
|
|
with
|
|
|
|
```
|
2020-04-16 22:34:01 +02:00
|
|
|
HOOKS=(netconf dropbear encryptssh base udev autodetect modconf block mdadm_udev lvm2 filesystems keyboard fsck)
|
2020-04-16 20:14:12 +02:00
|
|
|
```
|
|
|
|
|
|
|
|
### 4. Activate Encryption
|
|
|
|
#### 4.1
|
|
|
|
Activate the rescue system https://robot.your-server.de/server
|
|
|
|
#### 4.2
|
|
|
|
Afterwards reboot the system by entering:
|
|
|
|
|
|
|
|
```bash
|
|
|
|
reboot
|
|
|
|
```
|
|
|
|
#### 4.3
|
|
|
|
Login to the rescue system:
|
|
|
|
```bash
|
|
|
|
ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip #revokes old ssh_host
|
|
|
|
ssh root@your_server_ip
|
|
|
|
```
|
2020-04-15 13:40:10 +02:00
|
|
|
|
2020-04-16 20:14:12 +02:00
|
|
|
#### 4.4
|
|
|
|
Mount the "system" by:
|
|
|
|
```bash
|
|
|
|
vgscan -v
|
|
|
|
vgchange -a y
|
|
|
|
mount /dev/mapper/vg0-root /mnt
|
|
|
|
```
|
|
|
|
#### 4.5
|
|
|
|
Copy "system":
|
|
|
|
```bash
|
|
|
|
# Resync unterbrechen
|
|
|
|
echo 0 >/proc/sys/dev/raid/speed_limit_max
|
|
|
|
mkdir /oldroot
|
2020-04-16 22:34:01 +02:00
|
|
|
cp -va /mnt/. /oldroot/.
|
2020-04-16 20:14:12 +02:00
|
|
|
# Resync fortsetzen
|
|
|
|
echo 200000 >/proc/sys/dev/raid/speed_limit_max
|
|
|
|
```
|
|
|
|
#### 4.6
|
|
|
|
Unmount the "system" by:
|
|
|
|
```bash
|
|
|
|
umount /mnt
|
|
|
|
```
|
2020-04-15 13:40:10 +02:00
|
|
|
|
2020-04-16 20:14:12 +02:00
|
|
|
#### 4.7
|
|
|
|
Delete unencrypted LVM-Volume-Group by executing:
|
|
|
|
```bash
|
2020-04-16 20:27:35 +02:00
|
|
|
vgremove vg0
|
2020-04-16 20:14:12 +02:00
|
|
|
```
|
|
|
|
|
|
|
|
#### 4.8
|
2020-04-16 22:34:01 +02:00
|
|
|
Check drive state:
|
2020-04-16 20:14:12 +02:00
|
|
|
```bash
|
|
|
|
cat /proc/mdstat
|
|
|
|
```
|
|
|
|
#### 4.9
|
|
|
|
Encrypt MD1 by executing:
|
|
|
|
```bash
|
|
|
|
cryptsetup --cipher aes-xts-plain64 --key-size 256 --hash sha256 --iter-time=10000 luksFormat /dev/md1
|
2020-04-16 22:34:01 +02:00
|
|
|
cryptsetup luksOpen /dev/md1 cryptroot
|
2020-04-16 20:14:12 +02:00
|
|
|
pvcreate /dev/mapper/cryptroot
|
|
|
|
vgcreate vg0 /dev/mapper/cryptroot
|
|
|
|
lvcreate -n swap -L8G vg0
|
|
|
|
lvcreate -n root -L10G vg0
|
|
|
|
mkfs.btrfs /dev/vg0/root
|
|
|
|
mkswap /dev/vg0/swap
|
|
|
|
```
|
|
|
|
|
|
|
|
#### 4.10
|
|
|
|
Mount encrypted :
|
|
|
|
```bash
|
|
|
|
mount /dev/vg0/root /mnt
|
|
|
|
```
|
|
|
|
|
|
|
|
#### 4.12
|
|
|
|
Copy "system":
|
|
|
|
```bash
|
|
|
|
# Resync unterbrechen
|
|
|
|
echo 0 >/proc/sys/dev/raid/speed_limit_max
|
2020-04-16 22:34:01 +02:00
|
|
|
cp -av /oldroot/. /mnt/.
|
2020-04-16 20:14:12 +02:00
|
|
|
# Resync fortsetzen
|
|
|
|
echo 200000 >/proc/sys/dev/raid/speed_limit_max
|
|
|
|
```
|
|
|
|
|
|
|
|
#### 4.13
|
|
|
|
Integrate finale installation:
|
|
|
|
```bash
|
|
|
|
mount /dev/md0 /mnt/boot
|
|
|
|
mount --bind /dev /mnt/dev
|
|
|
|
mount --bind /sys /mnt/sys
|
|
|
|
mount --bind /proc /mnt/proc
|
|
|
|
chroot /mnt
|
|
|
|
```
|
|
|
|
|
|
|
|
#### 4.14
|
|
|
|
```bash
|
|
|
|
echo "cryptroot /dev/md1 none luks" >> /etc/crypttab
|
|
|
|
```
|
2020-04-16 22:34:01 +02:00
|
|
|
|
|
|
|
# I think here the mess starts....
|
|
|
|
#### 4.15
|
|
|
|
rewrite initramfs ***?assume this should be right???***
|
|
|
|
```bash
|
|
|
|
mkinitcpio
|
2020-04-16 22:48:59 +02:00
|
|
|
mkinitcpio -p linux
|
2020-04-16 22:34:01 +02:00
|
|
|
```
|
2020-04-16 20:14:12 +02:00
|
|
|
Missing **initramfs neu schreiben** **GRUB neu schreiben**
|
|
|
|
|
2020-04-16 22:34:01 +02:00
|
|
|
ssh-keygen -b 4096 -t rsa -m PEM -f /etc/ssh/ssh_host_rsa_key
|
|
|
|
dropbearconvert openssh dropbear /etc/ssh/ssh_host_rsa_key /etc/dropbear/dropbear_rsa_host_key
|
|
|
|
* https://github.com/random-archer/mkinitcpio-systemd-tool/issues/21
|
|
|
|
* https://github.com/random-archer/mkinitcpio-systemd-tool/issues/17
|
|
|
|
* https://bbs.archlinux.org/viewtopic.php?id=250512
|
|
|
|
|
|
|
|
from point 4 on I have questions:
|
|
|
|
https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#chkboot
|
|
|
|
|
2020-04-16 22:48:59 +02:00
|
|
|
check this one also out:
|
|
|
|
* https://blog.simonszu.de/set-up-luks-on-a-physical-hetzner-server-with-debian/ -> specially the part about dropbear configuration and ssh keys
|
|
|
|
|
2020-04-17 11:35:01 +02:00
|
|
|
https://gist.github.com/HardenedArray/31915e3d73a4ae45adc0efa9ba458b07
|
|
|
|
|
|
|
|
https://code.trafficking.agency/arch-linux-remote-unlock-root-volume-with-mdraid-and-dmcrypt.html
|
|
|
|
|
2020-04-16 20:14:12 +02:00
|
|
|
#### 4.15
|
|
|
|
```bash
|
|
|
|
exit
|
|
|
|
umount /mnt/boot /mnt/proc /mnt/sys /mnt/dev
|
|
|
|
umount /mnt
|
|
|
|
sync
|
|
|
|
|
|
|
|
#Neustart
|
|
|
|
reboot
|
|
|
|
|
|
|
|
|
|
|
|
```
|
2020-04-15 12:32:29 +02:00
|
|
|
|
|
|
|
## Sources
|
|
|
|
The code is adapted from the following guides:
|
|
|
|
|
|
|
|
* http://daemons-point.com/blog/2019/10/20/hetzner-verschluesselt/
|
|
|
|
* https://www.howtoforge.com/using-the-btrfs-filesystem-with-raid1-with-ubuntu-12.10-on-a-hetzner-server
|
2020-04-16 20:14:12 +02:00
|
|
|
* https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Remote_unlocking_(hooks:_netconf,_dropbear,_tinyssh,_ppp)
|