mirror of
https://github.com/kevinveenbirkenbach/hetzner-arch-luks.git
synced 2024-11-27 19:51:03 +01:00
341 lines
7.0 KiB
Markdown
341 lines
7.0 KiB
Markdown
# Arch Linux with LUKS and btrfs on a Hetzner server
|
|
|
|
## Software
|
|
This guide shows how to set up the following software composition:
|
|
* [Arch Linux](https://www.archlinux.de/)
|
|
* [btrfs](https://en.wikipedia.org/wiki/Btrfs)
|
|
* [LUKS](https://wiki.archlinux.org/index.php/Dm-crypt)
|
|
|
|
## Requirements
|
|
Written for a [Dedicated](https://de.wikipedia.org/wiki/Server#Dedizierte_Server) [Hetzner](https://www.hetzner.com/) server with the following hardware specifications:
|
|
```
|
|
CPU1: Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz (Cores 8)
|
|
Memory: 15973 MB
|
|
Disk /dev/sda: 3000 GB (=> 2794 GiB)
|
|
Disk /dev/sdb: 3000 GB (=> 2794 GiB)
|
|
Total capacity 5589 GiB with 2 Disks
|
|
```
|
|
|
|
## Legend
|
|
The following symbols show in which environment the code is executed:
|
|
* :computer: Client
|
|
* :ambulance: [Hetzner Rescue System](https://wiki.hetzner.de/index.php/Hetzner_Rescue-System/en)
|
|
* :ghost: Chroot from Rescue System into Arch
|
|
* :minidisc: Arch OS
|
|
|
|
## Guide
|
|
### 1. Configure and Install Image
|
|
#### 1.1 Login to Hetzner Rescue System
|
|
:computer: :
|
|
```bash
|
|
ssh root@your_server_ip
|
|
```
|
|
#### 1.2 Create the /autosetup
|
|
|
|
:ambulance: :
|
|
|
|
```bash
|
|
nano /autosetup
|
|
```
|
|
|
|
Save the following content into this file:
|
|
|
|
```
|
|
## Hetzner Online GmbH - installimage - config
|
|
|
|
DRIVE1 /dev/sda
|
|
DRIVE2 /dev/sdb
|
|
|
|
## SOFTWARE RAID:
|
|
## activate software RAID? < 0 | 1 >
|
|
SWRAID 1
|
|
|
|
## Choose the level for the software RAID < 0 | 1 | 10 >
|
|
SWRAIDLEVEL 1
|
|
|
|
## BOOTLOADER:
|
|
BOOTLOADER grub
|
|
|
|
## HOSTNAME:
|
|
HOSTNAME hetzner-arch-luks
|
|
#Adapt the hostname to your needs
|
|
|
|
## PARTITIONS / FILESYSTEMS:
|
|
PART /boot btrfs 512M
|
|
PART lvm vg0 all
|
|
LV vg0 swap swap swap 8G
|
|
LV vg0 root / btrfs 10G
|
|
|
|
## OPERATING SYSTEM IMAGE:
|
|
IMAGE /root/.oldroot/nfs/install/../images/archlinux-latest-64-minimal.tar.gz
|
|
```
|
|
#### 1.3 Install Image
|
|
:ambulance: :
|
|
```bash
|
|
installimage
|
|
```
|
|
#### 1.4 Restart
|
|
:ambulance: :
|
|
```bash
|
|
reboot
|
|
```
|
|
|
|
### 2. Setup System
|
|
#### 2.1 Login to server
|
|
:computer: :
|
|
```bash
|
|
ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip
|
|
ssh root@your_server_ip
|
|
```
|
|
#### 2.2 Update the system
|
|
:minidisc: :
|
|
```bash
|
|
pacman -Syyu
|
|
```
|
|
#### 2.3 Install administration tools:
|
|
:minidisc: :
|
|
```bash
|
|
pacman -S nano
|
|
```
|
|
|
|
### 3. Prepare System for Unlocking via SSH
|
|
#### 3.1 Install software
|
|
:minidisc: :
|
|
```bash
|
|
pacman -S busybox mkinitcpio-dropbear mkinitcpio-utils mkinitcpio-netconf
|
|
```
|
|
#### 3.2 Copy authorized keys to dropbear
|
|
:minidisc: :
|
|
```bash
|
|
cp -v ~/.ssh/authorized_keys /etc/dropbear/root_key
|
|
```
|
|
|
|
```bash
|
|
chmod 700 ~/.ssh
|
|
chmod 600 ~/.ssh/authorized_keys
|
|
systemctl enable sshd
|
|
```
|
|
|
|
#### 3.3 Regenerate OpenSSH keys
|
|
:minidisc: :
|
|
```bash
|
|
rm /etc/ssh/ssh_host_*
|
|
ssh-keygen -A -m PEM
|
|
```
|
|
#### 3.4 Import SSH-keys to dropbear
|
|
:minidisc: :
|
|
```bash
|
|
dropbearconvert openssh dropbear /etc/ssh/ssh_host_rsa_key /etc/dropbear/dropbear_rsa_host_key
|
|
```
|
|
|
|
#### 3.5 Modify /etc/mkinitcpio.conf
|
|
:minidisc: :
|
|
```bash
|
|
nano /etc/mkinitcpio.conf
|
|
```
|
|
##### Replace
|
|
**Old:**
|
|
```
|
|
HOOKS=(base udev autodetect modconf block mdadm_udev lvm2 filesystems keyboard fsck)
|
|
```
|
|
**New:**
|
|
```
|
|
HOOKS=(base udev autodetect modconf block mdadm_udev lvm2 netconf dropbear encryptssh filesystems keyboard fsck)
|
|
```
|
|
|
|
### 4. Activate Encryption
|
|
#### 4.1 Activate Rescue System
|
|
Activate the rescue system https://robot.your-server.de/server
|
|
#### 4.2 Reboot
|
|
:minidisc: :
|
|
```bash
|
|
reboot
|
|
```
|
|
#### 4.3 Login to the rescue system
|
|
:computer: :
|
|
```bash
|
|
ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip
|
|
ssh root@your_server_ip
|
|
```
|
|
|
|
#### 4.4 Mount the "system"
|
|
:ambulance: :
|
|
```bash
|
|
vgscan -v
|
|
vgchange -a y
|
|
mount /dev/mapper/vg0-root /mnt
|
|
```
|
|
|
|
#### 4.5 Copy "system"
|
|
:ambulance: :
|
|
```bash
|
|
echo 0 >/proc/sys/dev/raid/speed_limit_max
|
|
mkdir /oldroot
|
|
cp -va /mnt/. /oldroot/.
|
|
echo 200000 >/proc/sys/dev/raid/speed_limit_max
|
|
```
|
|
#### 4.6 Unmount the "system"
|
|
:ambulance: :
|
|
```bash
|
|
umount /mnt
|
|
```
|
|
|
|
#### 4.7 Delete decrypted LVM-Volume-Group
|
|
:ambulance: :
|
|
```bash
|
|
vgremove vg0
|
|
```
|
|
|
|
#### 4.8 Check drive state
|
|
:ambulance: :
|
|
```bash
|
|
cat /proc/mdstat
|
|
```
|
|
#### 4.9 Encrypt MD1 by executing
|
|
:ambulance: :
|
|
```bash
|
|
cryptsetup --cipher aes-xts-plain64 --key-size 256 --hash sha256 --iter-time=10000 luksFormat /dev/md1
|
|
cryptsetup luksOpen /dev/md1 cryptroot
|
|
pvcreate /dev/mapper/cryptroot
|
|
vgcreate vg0 /dev/mapper/cryptroot
|
|
lvcreate -n swap -L8G vg0
|
|
lvcreate -n root -L10G vg0
|
|
mkfs.btrfs /dev/vg0/root
|
|
mkswap /dev/vg0/swap
|
|
```
|
|
|
|
#### 4.10 Mount encrypted
|
|
:ambulance: :
|
|
```bash
|
|
mount /dev/vg0/root /mnt
|
|
```
|
|
|
|
#### 4.12 Copy "system"
|
|
:ambulance: :
|
|
```bash
|
|
echo 0 >/proc/sys/dev/raid/speed_limit_max
|
|
cp -av /oldroot/. /mnt/.
|
|
echo 200000 >/proc/sys/dev/raid/speed_limit_max
|
|
```
|
|
|
|
#### 4.13 Integrate Finale Installation
|
|
:ambulance: :
|
|
```bash
|
|
mount /dev/md0 /mnt/boot
|
|
mount --bind /dev /mnt/dev
|
|
mount --bind /sys /mnt/sys
|
|
mount --bind /proc /mnt/proc
|
|
chroot /mnt
|
|
```
|
|
|
|
#### 4.14
|
|
:ghost: :
|
|
```bash
|
|
echo "cryptroot /dev/md1 none luks" >> /etc/crypttab
|
|
```
|
|
|
|
#### 4.15 Create an initial ramdisk
|
|
:ghost: :
|
|
```bash
|
|
mkinitcpio -p linux
|
|
```
|
|
|
|
### 5 Grub
|
|
#### 5.1 Install Grub
|
|
:ghost: :
|
|
```bash
|
|
pacman -S grub
|
|
```
|
|
#### 5.2 Configure /etc/default/grub
|
|
|
|
:ghost: :
|
|
|
|
```bash
|
|
nano /etc/default/grub
|
|
```
|
|
|
|
Change the following parameters:
|
|
```bash
|
|
GRUB_CMDLINE_LINUX="cryptdevice=/dev/md1:cryptroot ip=dhcp"
|
|
GRUB_ENABLE_CRYPTODISK=y
|
|
```
|
|
:information_source: Further [information](https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Configuring_GRUB).
|
|
#### 5.3 Make and Install on Hard-drives
|
|
:ghost: :
|
|
```bash
|
|
grub-mkconfig -o /boot/grub/grub.cfg
|
|
grub-install /dev/sda
|
|
grub-install /dev/sdb
|
|
```
|
|
|
|
#### 5.4 Restart System
|
|
:ghost: :ambulance: :
|
|
```bash
|
|
exit
|
|
umount /mnt/boot /mnt/proc /mnt/sys /mnt/dev
|
|
umount /mnt
|
|
sync
|
|
reboot
|
|
```
|
|
### 6. Encryption Procedure
|
|
#### 6.1 Decrypt server
|
|
:computer: :
|
|
```bash
|
|
ssh -o UserKnownHostsFile=/dev/null root@your_server_ip
|
|
cryptroot-unlock
|
|
exit
|
|
```
|
|
#### 6.2 Login to server
|
|
:computer: :
|
|
```bash
|
|
ssh-keygen -f "$HOME/.ssh/known_hosts" -R your_server_ip
|
|
ssh root@your_server_ip
|
|
```
|
|
|
|
#### 7. Expand filesystem
|
|
:computer: :
|
|
```bash
|
|
lvresize -l +100%FREE /dev/vg0/root
|
|
btrfs filesystem resize max /
|
|
```
|
|
|
|
## 8. Debugging
|
|
### 8.1 Login to System from Rescue System
|
|
:ambulance: :
|
|
```bash
|
|
cryptsetup luksOpen /dev/md1 cryptroot
|
|
mount /dev/vg0/root /mnt
|
|
mount /dev/md0 /mnt/boot
|
|
mount --bind /dev /mnt/dev
|
|
mount --bind /sys /mnt/sys
|
|
mount --bind /proc /mnt/proc
|
|
chroot /mnt
|
|
```
|
|
### 8.2 Logout from chroot environment
|
|
:ghost: :ambulance: :
|
|
```bash
|
|
exit
|
|
umount /mnt/boot /mnt/proc /mnt/sys /mnt/dev
|
|
umount /mnt
|
|
sync
|
|
reboot
|
|
```
|
|
|
|
### 8.3 Regenerate GRUB and Arch
|
|
:ghost: :
|
|
```bash
|
|
mkinitcpio -p linux
|
|
grub-mkconfig -o /boot/grub/grub.cfg
|
|
grub-install /dev/sda
|
|
grub-install /dev/sdb
|
|
```
|
|
|
|
## Sources
|
|
The code is adapted from the following guides:
|
|
|
|
* http://daemons-point.com/blog/2019/10/20/hetzner-verschluesselt/
|
|
* https://www.howtoforge.com/using-the-btrfs-filesystem-with-raid1-with-ubuntu-12.10-on-a-hetzner-server
|
|
* https://code.trafficking.agency/arch-linux-remote-unlock-root-volume-with-mdraid-and-dmcrypt.html
|
|
* https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Remote_unlocking_(hooks:_netconf,_dropbear,_tinyssh,_ppp)
|
|
* https://gist.github.com/pezz/5310082
|