Guide to install Arch Linux with LUKS encryption on an hetzner server
Go to file
2020-04-17 15:54:14 +02:00
README.md In between commit 2020-04-17 15:54:14 +02:00

Arch Linux with LUKS and btrfs on a hetzner server (DRAFT)

This guide should show you how to set up an System with the following specifications on an hetzner server:

  • Arch Linux
  • btrfs
  • LUKS
  • mdraid
  • dmcrypt

It adapts the following instruction:

Guide

Preparing the Filesystems

# stop syncronisation before
# partition the discs
parted /dev/sda --align=opt --script mklabel gpt mkpart primary 0% 1GiB mkpart primary 1GiB 100%
parted /dev/sdb --align=opt --script mklabel gpt mkpart primary 0% 1GiB mkpart primary 1GiB 100%
# Modified because of https://askubuntu.com/questions/84538/trouble-creating-3tb-ext4-partition-due-to-msdos-partition-table-imposed-error
#reboot
# creating the filesystems, actually only /dev/sda1 is needed
mkfs.ext4 -L boot /dev/sda1
mkfs.ext4 -L boot /dev/sdb1

# creating the raid
mdadm --create --verbose --level=10 --metadata=1.2 --chunk=512 --raid-devices=2 --layout=f2 /dev/md0 /dev/sda2 /dev/sdb2

# and creating the dmcrypt "container"
cryptsetup -y -v luksFormat /dev/md0
cryptsetup luksOpen /dev/md0 root

# finally create the root filesystem
mkfs.ext4 -v -L root -m 0.01 -b 4096 -E stride=128,stripe-width=256 /dev/mapper/root

Preparing for Arch

mkdir /arch
cd /arch
# download arch bootstrap disc, please choose the correct version
curl -O http://archlinux.mirrors.ovh.net/archlinux/iso/2020.04.01/archlinux-bootstrap-2020.04.01-x86_64.tar.gz
tar xvfz archlinux-bootstrap-2020.04.01-x86_64.tar.gz

Edit /arch/root.x86_64/etc/pacman.d/mirrorlist and choose a mirror

nano /arch/root.x86_64/etc/pacman.d/mirrorlist

https://gist.github.com/neonb88/5ba848f1aef21ab67c7a4ff28e6d2ea3 Just comment CheckSpace in /arch/root.x86_64/etc/pacman.conf Chroot into the bootstrap environment

/arch/root.x86_64/bin/arch-chroot /arch/root.x86_64/

More preparations

# mount the soon-to-be root-volume
mount /dev/mapper/root /mnt/

# and boot-volume
mkdir /mnt/boot
mount /dev/sda1 /mnt/boot
#https://unix.stackexchange.com/questions/490418/i-cant-make-a-grub-config
#mount --bind /proc /mnt/proc
#mount --bind /dev /mnt/dev
#mount --bind /sys /mnt/sys
#mount --bind /run /mnt/run

# initialize the pacman keychain this takes a long time do something from a second terminal, like dd if=/dev/sda of=/dev/tty7
pacman-key --init
## check out which of the following orders make sense
pacman-key --populate archlinux
pacman-key --refresh-keys

Finally, bootstrap Arch onto the root-volume...

pacstrap /mnt base base-devel intel-ucode

And bootstrap mdadmin.conf (md configuration) and fstab

pacman -Syyu mdadm # Added druing writing of instruction
mdadm --detail --scan >> /etc/mdadm.conf
genfstab -p /mnt > /mnt/etc/fstab

Chroot into the new Arch installation

arch-chroot /mnt/

Setup hostname and locales

echo test > /etc/hostname

echo LANG=en_US.UTF-8 > /etc/locale.conf
echo LC_COLLATE=C >> /etc/locale.conf
echo LANGUAGE=en_US >> /etc/locale.conf

ln -sf /usr/share/zoneinfo/Europe/Berlin /etc/localtime

Edit locale.gen according to your locale, don't forget en_US.UTF-8 or else some applications might complain.

pacman-key --populate archlinux
pacman -Syyu nano
nano /etc/locale.gen

locale-gen

Setup early ssh with tinyssh and netconf

# some dependencies
# exit?
# dmraid here?
pacman -S sudo mkinitcpio mkinitcpio-nfs-utils tinyssh mkinitcpio-netconf mkinitcpio-tinyssh mkinitcpio-utils #ucspi-tcp
cd /tmp

Install mkinitcpio-netconf skipped because its in pacman. Install ucspi-tcp

curl -O https://aur.archlinux.org/cgit/aur.git/snapshot/ucspi-tcp.tar.gz
tar xf ucspi-tcp.tar.gz
chown -R nobody:nobody ucspi-tcp
cd ucspi-tcp
sudo -u nobody makepkg

pacman -U ucspi-tcp-0.88-8-x86_64.pkg.tar.xz

cd ..

Skipped nstall mkinitcpio-tinyssh skipped because its in pacman. Skipped nstall mkinitcpio-utils skipped because its in pacman.

Edit /etc/mkinitcpio.conf and add mdadm_udev netconf tinyssh encryptssh before filesystems should look something like this

HOOKS="base udev autodetect modconf block mdadm_udev netconf tinyssh encryptssh filesystems keyboard fsck"

Rebuild the initramfs

pacman -S linux
mkinitcpio -p linux

Install and configure GRUB

#exit?
pacman -S grub

Edit /etc/default/grub and tell the Kernel about the cryptdevice and the mdraid, and netconf that we want dhcp

GRUB_CMDLINE_LINUX="cryptdevice=/dev/md0:root ip=dhcp md=0,/dev/sda2,/dev/sdb2"

Generate the grub config

grub-mkconfig -o /boot/grub/grub.cfg

Install Grub to /dev/sda

grub-install /dev/sda

Guide

1. Configure and Install Image

1.1

Login to Hetzner Rescue System

ssh root@your_server_ip

1.2

Create the autosetup by executing

nano /autosetup

and saving the following content into this file:

##  Hetzner Online GmbH - installimage - config

DRIVE1 /dev/sda
DRIVE2 /dev/sdb

##  SOFTWARE RAID:
## activate software RAID?  < 0 | 1 >
SWRAID 1

## Choose the level for the software RAID < 0 | 1 | 10 >
SWRAIDLEVEL 1

##  BOOTLOADER:
BOOTLOADER grub

##  HOSTNAME:
HOSTNAME hetzner-arch-luks
#Adapt the hostname to your needs

##  PARTITIONS / FILESYSTEMS:
PART /boot  btrfs     512M
PART lvm    vg0       all
LV vg0   swap   swap     swap         8G
LV vg0   root   /        btrfs        10G

##  OPERATING SYSTEM IMAGE:
IMAGE /root/.oldroot/nfs/install/../images/archlinux-latest-64-minimal.tar.gz

1.3

Afterwards install the image by executing the following command:

installimage

1.4

When the setup finished restart the server via

reboot

2. Setup System

2.1

Login to your server:

ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip #revokes old ssh_host
ssh root@your_server_ip

2.2

Update the system:

pacman -Syyu

2.3

Install basic administration software:

pacman -Syyu nano

3. Prepare System for Unlocking via SSH

3.1 Execute the following script

# Install software
pacman -Syyu busybox mkinitcpio-dropbear mkinitcpio-utils mkinitcpio-netconf
#Copy ssh-key
cp -v ~/.ssh/authorized_keys /etc/dropbear/root_key

3.2

Replace the following line in /etc/mkinitcpio.conf

HOOKS=(base udev autodetect modconf block mdadm_udev lvm2 filesystems keyboard fsck)

with

HOOKS=(netconf dropbear encryptssh base udev autodetect modconf block mdadm_udev lvm2 filesystems keyboard fsck)

4. Activate Encryption

4.1

Activate the rescue system https://robot.your-server.de/server

4.2

Afterwards reboot the system by entering:

reboot

4.3

Login to the rescue system:

ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip #revokes old ssh_host
ssh root@your_server_ip

4.4

Mount the "system" by:

vgscan -v
vgchange -a y
mount /dev/mapper/vg0-root /mnt

4.5

Copy "system":

# Resync unterbrechen
echo 0 >/proc/sys/dev/raid/speed_limit_max
mkdir /oldroot
cp -va /mnt/. /oldroot/.
# Resync fortsetzen
echo 200000 >/proc/sys/dev/raid/speed_limit_max

4.6

Unmount the "system" by:

umount /mnt

4.7

Delete unencrypted LVM-Volume-Group by executing:

vgremove vg0

4.8

Check drive state:

cat /proc/mdstat

4.9

Encrypt MD1 by executing:

cryptsetup --cipher aes-xts-plain64 --key-size 256 --hash sha256 --iter-time=10000 luksFormat /dev/md1
cryptsetup luksOpen /dev/md1 cryptroot
pvcreate /dev/mapper/cryptroot
vgcreate vg0 /dev/mapper/cryptroot
lvcreate -n swap -L8G vg0
lvcreate -n root -L10G vg0
mkfs.btrfs /dev/vg0/root
mkswap /dev/vg0/swap

4.10

Mount encrypted :

mount /dev/vg0/root /mnt

4.12

Copy "system":

# Resync unterbrechen
echo 0 >/proc/sys/dev/raid/speed_limit_max
cp -av /oldroot/. /mnt/.
# Resync fortsetzen
echo 200000 >/proc/sys/dev/raid/speed_limit_max

4.13

Integrate finale installation:

mount /dev/md0 /mnt/boot
mount --bind /dev /mnt/dev
mount --bind /sys /mnt/sys
mount --bind /proc /mnt/proc
chroot /mnt

4.14

echo "cryptroot /dev/md1 none luks" >> /etc/crypttab

I think here the mess starts....

4.15

rewrite initramfs ?assume this should be right???

mkinitcpio
mkinitcpio -p linux

Missing initramfs neu schreiben GRUB neu schreiben

ssh-keygen -b 4096 -t rsa -m PEM -f /etc/ssh/ssh_host_rsa_key dropbearconvert openssh dropbear /etc/ssh/ssh_host_rsa_key /etc/dropbear/dropbear_rsa_host_key

from point 4 on I have questions: https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#chkboot

check this one also out:

https://gist.github.com/HardenedArray/31915e3d73a4ae45adc0efa9ba458b07

https://code.trafficking.agency/arch-linux-remote-unlock-root-volume-with-mdraid-and-dmcrypt.html

4.15

exit
umount /mnt/boot /mnt/proc /mnt/sys /mnt/dev
umount /mnt
sync

#Neustart
reboot


Sources

The code is adapted from the following guides: