From e2ec802119d31bfcc9b84b00dfcb709fb6a9a6bb Mon Sep 17 00:00:00 2001 From: "Kevin Veen-Birkenbach [aka. Frantz]" Date: Fri, 17 Apr 2020 21:02:07 +0200 Subject: [PATCH] Implemented legend --- README.md | 56 +++++++++++++++++++++++++++++++++++++++++++++---------- 1 file changed, 46 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index 3b36d97..dc09509 100644 --- a/README.md +++ b/README.md @@ -4,23 +4,31 @@ This guide should show you how to set up an System with the following specificat * btrfs * LUKS +## Legend +The following symbols show you where to execute the code: +* :computer: Client +* :ambulance: Rescue System +* :ghost: Chroot from Rescue System into Arch +* :minidisc: Arch Os + ## Guide ### 1. Configure and Install Image #### 1.1 Login to Hetzner Rescue System +:computer: : ```bash ssh root@your_server_ip ``` #### 1.2 Create the /autosetup -Execute +:ambulance: : ```bash nano /autosetup ``` -and save the following content into this file: +Save the following content into this file: -```bash +``` ## Hetzner Online GmbH - installimage - config DRIVE1 /dev/sda @@ -50,38 +58,47 @@ LV vg0 root / btrfs 10G IMAGE /root/.oldroot/nfs/install/../images/archlinux-latest-64-minimal.tar.gz ``` #### 1.3 Install Image - +:ambulance: : ```bash installimage ``` #### 1.4 Restart +:ambulance: : ```bash reboot ``` ### 2. Setup System #### 2.1 Login to server - +:computer: : ```bash ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip ssh root@your_server_ip ``` #### 2.2 Update the system +:minidisc: : ```bash pacman -Syyu ``` #### 2.3 Install administration tools: +:minidisc: : ```bash pacman -S nano ``` ### 3. Prepare System for Unlocking via SSH #### 3.1 Execute the following script +:minidisc: : ```bash pacman -S busybox mkinitcpio-dropbear mkinitcpio-utils mkinitcpio-netconf cp -v ~/.ssh/authorized_keys /etc/dropbear/root_key ``` -#### 3.2 Replace line in **/etc/mkinitcpio.conf** +#### 3.2 Modify /etc/mkinitcpio.conf +:minidisc: : +```bash +nano /etc/mkinitcpio.conf +``` +##### Replace Old: ``` HOOKS=(base udev autodetect modconf block mdadm_udev lvm2 filesystems keyboard fsck) @@ -97,19 +114,22 @@ Neu: BUSYBOX=y
http://daemons-point.com/blog/2019/10/20/hetzner-verschluesselt/#etcinitramfs-toolsinitramfsconf-anpassen ### 4. Activate Encryption -#### 4.1 +#### 4.1 Activate Rescue System Activate the rescue system https://robot.your-server.de/server #### 4.2 Reboot +:minidisc: : ```bash reboot ``` #### 4.3 Login to the rescue system +:computer: : ```bash ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip ssh root@your_server_ip ``` #### 4.4 Mount the "system" +:ambulance: : ```bash vgscan -v vgchange -a y @@ -117,6 +137,7 @@ mount /dev/mapper/vg0-root /mnt ``` #### 4.5 Copy "system" +:ambulance: : ```bash echo 0 >/proc/sys/dev/raid/speed_limit_max mkdir /oldroot @@ -124,22 +145,24 @@ cp -va /mnt/. /oldroot/. echo 200000 >/proc/sys/dev/raid/speed_limit_max ``` #### 4.6 Unmount the "system" - +:ambulance: : ```bash umount /mnt ``` #### 4.7 Delete decrypted LVM-Volume-Group +:ambulance: : ```bash vgremove vg0 ``` #### 4.8 Check drive state - +:ambulance: : ```bash cat /proc/mdstat ``` #### 4.9 Encrypt MD1 by executing +:ambulance: : ```bash cryptsetup --cipher aes-xts-plain64 --key-size 256 --hash sha256 --iter-time=10000 luksFormat /dev/md1 cryptsetup luksOpen /dev/md1 cryptroot @@ -152,11 +175,13 @@ mkswap /dev/vg0/swap ``` #### 4.10 Mount encrypted +:ambulance: : ```bash mount /dev/vg0/root /mnt ``` #### 4.12 Copy "system" +:ambulance: : ```bash # Resync unterbrechen echo 0 >/proc/sys/dev/raid/speed_limit_max @@ -166,6 +191,7 @@ echo 200000 >/proc/sys/dev/raid/speed_limit_max ``` #### 4.13 Integrate Finale Installation +:ambulance: : ```bash mount /dev/md0 /mnt/boot mount --bind /dev /mnt/dev @@ -175,27 +201,34 @@ chroot /mnt ``` #### 4.14 +:ghost: : ```bash echo "cryptroot /dev/md1 none luks" >> /etc/crypttab ``` + #### 4.15 Create an initial ramdisk +:ghost: : ```bash mkinitcpio -p linux ``` ### 5 Grub #### 5.1 Install Grub +:ghost: : ```bash pacman -S grub ``` #### 5.2 Configure /etc/default/grub +:ghost: : > :warning: I'm not shure if the following is correct. Please check out this [link](https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Remote_unlocking_(hooks:_netconf,_dropbear,_tinyssh,_ppp)) . I appreciate feedback :two_hearts: Edit /etc/default/grub and tell the Kernel about the cryptdevice and the mdraid, and netconf that we want dhcp: + ```bash GRUB_CMDLINE_LINUX="cryptdevice=/dev/md0:root ip=dhcp" ``` #### 5.3 Make and Install on Hard-drives +:ghost: : ```bash grub-mkconfig -o /boot/grub/grub.cfg grub-install /dev/sda @@ -203,28 +236,31 @@ grub-install /dev/sdb ``` #### 5.4 Restart System +:ghost: :ambulance: : ```bash exit umount /mnt/boot /mnt/proc /mnt/sys /mnt/dev umount /mnt sync -#Neustart reboot ``` ### 6. Encryption Procedure #### 6.1 Decrypt server +:computer: : ```bash ssh -o UserKnownHostsFile=/dev/null root@your_server_ip cryptroot-unlock exit ``` #### 6.2 Login to server +:computer: : ```bash ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip ssh root@your_server_ip ``` ## 7.1. Debugging ### 7.2 Login to System from Rescue System +:ambulance: : ```bash cryptsetup luksOpen /dev/md1 cryptroot mount /dev/vg0/root /mnt