特殊:Badtitle/NS100:EncryptedFilesystem:修订间差异
小 New page: {{From|https://help.ubuntu.com/community/EncryptedFilesystem}} {{Languages|php5}} == Encrypted Root and Swap with LUKS (on Ubuntu 6.06) == by Mikhail Lukyanchenko <[email protected]> I... |
小无编辑摘要 |
||
第34行: | 第34行: | ||
/dev/hda1 /boot 100 MB ext3 | /dev/hda1 /boot 100 MB ext3 | ||
/dev/hda2 / 512 MB ext3 | /dev/hda2 / 512 MB ext3 | ||
</nowiki></ | </nowiki></pre> | ||
Mark that 512 MB is really the shortest size you can set for a server type of installation. A complete Ubuntu installation requires at least 2.4 GB. Make your choice now. In addition, create one more space to hold your future encrypted root, so as the following: | Mark that 512 MB is really the shortest size you can set for a server type of installation. A complete Ubuntu installation requires at least 2.4 GB. Make your choice now. In addition, create one more space to hold your future encrypted root, so as the following: | ||
第40行: | 第40行: | ||
<pre><nowiki> | <pre><nowiki> | ||
/dev/hda3 future / 10GB | /dev/hda3 future / 10GB | ||
</nowiki></ | </nowiki></pre> | ||
Set this partition in the installer option for filesystem as "do not use the partition". Just ignore the alert about not having a swap partition and keep walking. | Set this partition in the installer option for filesystem as "do not use the partition". Just ignore the alert about not having a swap partition and keep walking. | ||
第54行: | 第54行: | ||
<pre><nowiki> | <pre><nowiki> | ||
cryptsetup hashalot initramfs-tools | cryptsetup hashalot initramfs-tools | ||
</nowiki></ | </nowiki></pre> | ||
=== Setting up mkinitramfs === | === Setting up mkinitramfs === | ||
第62行: | 第62行: | ||
<pre><nowiki> | <pre><nowiki> | ||
ramdisk = /usr/sbin/mkinitramfs | ramdisk = /usr/sbin/mkinitramfs | ||
</nowiki></ | </nowiki></pre> | ||
Edit <code><nowiki>/etc/mkinitramfs/modules</nowiki></code> (note, this and other files move to <code><nowiki>/etc/initramfs-tools</nowiki></code> in Edgy). Add folowing lines: | Edit <code><nowiki>/etc/mkinitramfs/modules</nowiki></code> (note, this and other files move to <code><nowiki>/etc/initramfs-tools</nowiki></code> in Edgy). Add folowing lines: | ||
第71行: | 第71行: | ||
sha256 | sha256 | ||
aes_i586 | aes_i586 | ||
</nowiki></ | </nowiki></pre> | ||
Create file <code><nowiki>/etc/mkinitramfs/hooks/cryptoroot</nowiki></code>: | Create file <code><nowiki>/etc/mkinitramfs/hooks/cryptoroot</nowiki></code>: | ||
第103行: | 第103行: | ||
copy_exec /usr/bin/chvt /bin | copy_exec /usr/bin/chvt /bin | ||
copy_exec /sbin/cryptsetup /sbin | copy_exec /sbin/cryptsetup /sbin | ||
</nowiki></ | </nowiki></pre> | ||
If you use Ubuntu 6.10, you have to add the following line to the above script (at the end): | If you use Ubuntu 6.10, you have to add the following line to the above script (at the end): | ||
<pre><nowiki> | <pre><nowiki> | ||
copy_exec /sbin/vol_id /sbin | copy_exec /sbin/vol_id /sbin | ||
</nowiki></ | </nowiki></pre> | ||
Create file <code><nowiki>/etc/mkinitramfs/scripts/local-top/cryptoroot</nowiki></code>: | Create file <code><nowiki>/etc/mkinitramfs/scripts/local-top/cryptoroot</nowiki></code>: | ||
第142行: | 第142行: | ||
sleep 1 | sleep 1 | ||
fi | fi | ||
</nowiki></ | </nowiki></pre> | ||
If you use Ubuntu 6.10, add the following line directly below "/sbin/cryptsetup luksOpen /dev/hda3 cryptoroot": | If you use Ubuntu 6.10, add the following line directly below "/sbin/cryptsetup luksOpen /dev/hda3 cryptoroot": | ||
<pre><nowiki> | <pre><nowiki> | ||
ln -s ../../mapper/cryptoroot /dev/disk/by-uuid/`vol_id -u /dev/mapper/cryptoroot` | ln -s ../../mapper/cryptoroot /dev/disk/by-uuid/`vol_id -u /dev/mapper/cryptoroot` | ||
</nowiki></ | </nowiki></pre> | ||
Also, if you use Ubuntu 6.10, replace the following line: | Also, if you use Ubuntu 6.10, replace the following line: | ||
<pre><nowiki> | <pre><nowiki> | ||
/bin/loadkeys /etc/console/boottime.kmap.gz | /bin/loadkeys /etc/console/boottime.kmap.gz | ||
</nowiki></ | </nowiki></pre> | ||
with the following line: | with the following line: | ||
<pre><nowiki> | <pre><nowiki> | ||
/bin/loadkeys /etc/console-setup/boottime.kmap.gz | /bin/loadkeys /etc/console-setup/boottime.kmap.gz | ||
</nowiki></ | </nowiki></pre> | ||
Make created files executable: | Make created files executable: | ||
第163行: | 第163行: | ||
$ sudo chmod +x /etc/mkinitramfs/hooks/cryptoroot | $ sudo chmod +x /etc/mkinitramfs/hooks/cryptoroot | ||
$ sudo chmod +x /etc/mkinitramfs/scripts/local-top/cryptoroot | $ sudo chmod +x /etc/mkinitramfs/scripts/local-top/cryptoroot | ||
</nowiki></ | </nowiki></pre> | ||
Update initrd image: | Update initrd image: | ||
<pre><nowiki> | <pre><nowiki> | ||
$ sudo update-initramfs -u ALL | $ sudo update-initramfs -u ALL | ||
</nowiki></ | </nowiki></pre> | ||
=== Creating the encrypted system === | === Creating the encrypted system === | ||
第179行: | 第179行: | ||
$ sudo modprobe aes_i586 | $ sudo modprobe aes_i586 | ||
$ sudo luksformat -t ext3 /dev/hda3 | $ sudo luksformat -t ext3 /dev/hda3 | ||
</nowiki></ | </nowiki></pre> | ||
The following dialog should look like this: | The following dialog should look like this: | ||
第200行: | 第200行: | ||
mke2fs 1.38 (30-Jun-2005) | mke2fs 1.38 (30-Jun-2005) | ||
..... | ..... | ||
</nowiki></ | </nowiki></pre> | ||
Your encrypted partition is now created and formated. It's time to populate it: | Your encrypted partition is now created and formated. It's time to populate it: | ||
第210行: | 第210行: | ||
$ sudo cp -avx / /mnt/target | $ sudo cp -avx / /mnt/target | ||
$ sudo chown -R $(whoami):$(whoami) /mnt/target/home/$(whoami) | $ sudo chown -R $(whoami):$(whoami) /mnt/target/home/$(whoami) | ||
</nowiki></ | </nowiki></pre> | ||
The copy process should take about two minutes for a server profile (depends on your hardware). | The copy process should take about two minutes for a server profile (depends on your hardware). | ||
第219行: | 第219行: | ||
<pre><nowiki> | <pre><nowiki> | ||
/dev/hda2 / ext3 defaults,errors=remount-ro 0 1 | /dev/hda2 / ext3 defaults,errors=remount-ro 0 1 | ||
</nowiki></ | </nowiki></pre> | ||
Replace with | Replace with | ||
<pre><nowiki> | <pre><nowiki> | ||
/dev/mapper/cryptoroot / ext3 defaults,errors=remount-ro 0 1 | /dev/mapper/cryptoroot / ext3 defaults,errors=remount-ro 0 1 | ||
</nowiki></ | </nowiki></pre> | ||
If you use Ubuntu 6.10, your fstab won't use /dev/* anymore, but instead UUIDs. Therefore, you need to find out the UUID by using the following command: | If you use Ubuntu 6.10, your fstab won't use /dev/* anymore, but instead UUIDs. Therefore, you need to find out the UUID by using the following command: | ||
<pre><nowiki> | <pre><nowiki> | ||
$ sudo vol_id -u /dev/mapper/cryptoroot | $ sudo vol_id -u /dev/mapper/cryptoroot | ||
</nowiki></ | </nowiki></pre> | ||
Instead of the "/dev/mapper/cryptoroot", you enter the UUID - hence the line in your <code><nowiki>/mnt/target/etc/fstab</nowiki></code> will look similar to this one: | Instead of the "/dev/mapper/cryptoroot", you enter the UUID - hence the line in your <code><nowiki>/mnt/target/etc/fstab</nowiki></code> will look similar to this one: | ||
<pre><nowiki> | <pre><nowiki> | ||
UUID=25e3f85a-3488-d58e-9372-f31a45789035 / ext3 defaults,errors=remount-ro 0 1 | UUID=25e3f85a-3488-d58e-9372-f31a45789035 / ext3 defaults,errors=remount-ro 0 1 | ||
</nowiki></ | </nowiki></pre> | ||
=== Configuring Grub === | === Configuring Grub === | ||
第245行: | 第245行: | ||
savedefault | savedefault | ||
boot | boot | ||
</nowiki></ | </nowiki></pre> | ||
Again, if you use Ubuntu 6.10, you'll have to replace <code><nowiki>root=/dev/mapper/cryptoroot</nowiki></code> by your UUID - i.e. sth. similar to <code><nowiki>root=UUID=25e3f85a-3488-d58e-9372-f31a45789035</nowiki></code> (of course, YOUR ID will be different!). | Again, if you use Ubuntu 6.10, you'll have to replace <code><nowiki>root=/dev/mapper/cryptoroot</nowiki></code> by your UUID - i.e. sth. similar to <code><nowiki>root=UUID=25e3f85a-3488-d58e-9372-f31a45789035</nowiki></code> (of course, YOUR ID will be different!). | ||
第251行: | 第251行: | ||
<pre><nowiki> | <pre><nowiki> | ||
$ uname -r | $ uname -r | ||
</nowiki></ | </nowiki></pre> | ||
=== Rebooting and testing configuration === | === Rebooting and testing configuration === | ||
第258行: | 第258行: | ||
<pre><nowiki> | <pre><nowiki> | ||
$ sudo reboot | $ sudo reboot | ||
</nowiki></ | </nowiki></pre> | ||
Now, after all your BIOS mumbo-jumbo, you should look very carefully and when you see following prompt: | Now, after all your BIOS mumbo-jumbo, you should look very carefully and when you see following prompt: | ||
第267行: | 第267行: | ||
GRUB Loading, please wait... | GRUB Loading, please wait... | ||
Press `ESC` to enter the menu | Press `ESC` to enter the menu | ||
</nowiki></ | </nowiki></pre> | ||
Press ESC and select last option, namely "Cryptotest" | Press ESC and select last option, namely "Cryptotest" | ||
第276行: | 第276行: | ||
<pre><nowiki> | <pre><nowiki> | ||
Enter LUKS passphrase: | Enter LUKS passphrase: | ||
</nowiki></ | </nowiki></pre> | ||
Go on! Enter it. Now you have booted from crypted partition. | Go on! Enter it. Now you have booted from crypted partition. | ||
第289行: | 第289行: | ||
<pre><nowiki> | <pre><nowiki> | ||
cryptoswap /dev/hda2 /dev/urandom swap | cryptoswap /dev/hda2 /dev/urandom swap | ||
</nowiki></ | </nowiki></pre> | ||
Edit <code><nowiki>/etc/fstab</nowiki></code>. Add following line: | Edit <code><nowiki>/etc/fstab</nowiki></code>. Add following line: | ||
<pre><nowiki> | <pre><nowiki> | ||
/dev/mapper/cryptoswap none swap sw 0 0 | /dev/mapper/cryptoswap none swap sw 0 0 | ||
</nowiki></ | </nowiki></pre> | ||
Now, you need to destroy your filesystem on <code><nowiki>/dev/hda2</nowiki></code> (if you don't destroy it explicitely, the safety check of the following command will refuse to create your "cryptoswap" on it): | Now, you need to destroy your filesystem on <code><nowiki>/dev/hda2</nowiki></code> (if you don't destroy it explicitely, the safety check of the following command will refuse to create your "cryptoswap" on it): | ||
<pre><nowiki> | <pre><nowiki> | ||
$ sudo dd if=/dev/urandom of=/dev/hda2 count=100 | $ sudo dd if=/dev/urandom of=/dev/hda2 count=100 | ||
</nowiki></ | </nowiki></pre> | ||
Finally, create the swap and activate it: | Finally, create the swap and activate it: | ||
第305行: | 第305行: | ||
$ sudo invoke-rc.d cryptdisks restart | $ sudo invoke-rc.d cryptdisks restart | ||
$ sudo swapon /dev/mapper/cryptoswap | $ sudo swapon /dev/mapper/cryptoswap | ||
</nowiki></ | </nowiki></pre> | ||
=== Finishing === | === Finishing === | ||
第313行: | 第313行: | ||
<pre><nowiki> | <pre><nowiki> | ||
# kopt=root=/dev/hda2 ro | # kopt=root=/dev/hda2 ro | ||
</nowiki></ | </nowiki></pre> | ||
Change this to | Change this to | ||
<pre><nowiki> | <pre><nowiki> | ||
# kopt=root=/dev/mapper/cryptoroot ro | # kopt=root=/dev/mapper/cryptoroot ro | ||
</nowiki></ | </nowiki></pre> | ||
Run | Run | ||
<pre><nowiki> | <pre><nowiki> | ||
$ sudo update-grub | $ sudo update-grub | ||
</nowiki></ | </nowiki></pre> | ||
Now you have an operational server profile with encrypted root and swap. If what you need is a desktop profile (i.e. a complete graphical environment like Gnome or KDE and lots of applications), you can install it now with the single command: | Now you have an operational server profile with encrypted root and swap. If what you need is a desktop profile (i.e. a complete graphical environment like Gnome or KDE and lots of applications), you can install it now with the single command: | ||
<pre><nowiki> | <pre><nowiki> | ||
$ sudo apt-get install ubuntu-desktop | $ sudo apt-get install ubuntu-desktop | ||
</nowiki></ | </nowiki></pre> | ||
Replace <code><nowiki>ubuntu-desktop</nowiki></code> with <code><nowiki>kubuntu-desktop</nowiki></code>, or <code><nowiki>xubuntu-desktop</nowiki></code>, or <code><nowiki>edubuntu-desktop</nowiki></code> according to your needs. | Replace <code><nowiki>ubuntu-desktop</nowiki></code> with <code><nowiki>kubuntu-desktop</nowiki></code>, or <code><nowiki>xubuntu-desktop</nowiki></code>, or <code><nowiki>edubuntu-desktop</nowiki></code> according to your needs. |
2007年5月13日 (日) 12:44的版本
文章出处: |
{{#if: | {{{2}}} | https://help.ubuntu.com/community/EncryptedFilesystem }} |
点击翻译: |
English {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/af | • {{#if: php5|Afrikaans| [[::EncryptedFilesystem/af|Afrikaans]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ar | • {{#if: php5|العربية| [[::EncryptedFilesystem/ar|العربية]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/az | • {{#if: php5|azərbaycanca| [[::EncryptedFilesystem/az|azərbaycanca]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/bcc | • {{#if: php5|جهلسری بلوچی| [[::EncryptedFilesystem/bcc|جهلسری بلوچی]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/bg | • {{#if: php5|български| [[::EncryptedFilesystem/bg|български]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/br | • {{#if: php5|brezhoneg| [[::EncryptedFilesystem/br|brezhoneg]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ca | • {{#if: php5|català| [[::EncryptedFilesystem/ca|català]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/cs | • {{#if: php5|čeština| [[::EncryptedFilesystem/cs|čeština]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/de | • {{#if: php5|Deutsch| [[::EncryptedFilesystem/de|Deutsch]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/el | • {{#if: php5|Ελληνικά| [[::EncryptedFilesystem/el|Ελληνικά]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/es | • {{#if: php5|español| [[::EncryptedFilesystem/es|español]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/fa | • {{#if: php5|فارسی| [[::EncryptedFilesystem/fa|فارسی]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/fi | • {{#if: php5|suomi| [[::EncryptedFilesystem/fi|suomi]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/fr | • {{#if: php5|français| [[::EncryptedFilesystem/fr|français]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/gu | • {{#if: php5|ગુજરાતી| [[::EncryptedFilesystem/gu|ગુજરાતી]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/he | • {{#if: php5|עברית| [[::EncryptedFilesystem/he|עברית]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/hu | • {{#if: php5|magyar| [[::EncryptedFilesystem/hu|magyar]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/id | • {{#if: php5|Bahasa Indonesia| [[::EncryptedFilesystem/id|Bahasa Indonesia]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/it | • {{#if: php5|italiano| [[::EncryptedFilesystem/it|italiano]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ja | • {{#if: php5|日本語| [[::EncryptedFilesystem/ja|日本語]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ko | • {{#if: php5|한국어| [[::EncryptedFilesystem/ko|한국어]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ksh | • {{#if: php5|Ripoarisch| [[::EncryptedFilesystem/ksh|Ripoarisch]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/mr | • {{#if: php5|मराठी| [[::EncryptedFilesystem/mr|मराठी]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ms | • {{#if: php5|Bahasa Melayu| [[::EncryptedFilesystem/ms|Bahasa Melayu]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/nl | • {{#if: php5|Nederlands| [[::EncryptedFilesystem/nl|Nederlands]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/no | • {{#if: php5|norsk| [[::EncryptedFilesystem/no|norsk]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/oc | • {{#if: php5|occitan| [[::EncryptedFilesystem/oc|occitan]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/pl | • {{#if: php5|polski| [[::EncryptedFilesystem/pl|polski]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/pt | • {{#if: php5|português| [[::EncryptedFilesystem/pt|português]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ro | • {{#if: php5|română| [[::EncryptedFilesystem/ro|română]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/ru | • {{#if: php5|русский| [[::EncryptedFilesystem/ru|русский]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/si | • {{#if: php5|සිංහල| [[::EncryptedFilesystem/si|සිංහල]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/sq | • {{#if: php5|shqip| [[::EncryptedFilesystem/sq|shqip]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/sr | • {{#if: php5|српски / srpski| [[::EncryptedFilesystem/sr|српски / srpski]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/sv | • {{#if: php5|svenska| [[::EncryptedFilesystem/sv|svenska]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/th | • {{#if: php5|ไทย| [[::EncryptedFilesystem/th|ไทย]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/tr | • {{#if: php5|Türkçe| [[::EncryptedFilesystem/tr|Türkçe]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/vi | • {{#if: php5|Tiếng Việt| [[::EncryptedFilesystem/vi|Tiếng Việt]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/yue | • {{#if: php5|粵語| [[::EncryptedFilesystem/yue|粵語]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/zh | • {{#if: php5|中文| [[::EncryptedFilesystem/zh|中文]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/zh-hans | • {{#if: php5|中文(简体)| [[::EncryptedFilesystem/zh-hans|中文(简体)]]}}|}} {{#ifexist: {{#if: php5 | php5 | {{#if: | :}}EncryptedFilesystem}}/zh-hant | • {{#if: php5|中文(繁體)| [[::EncryptedFilesystem/zh-hant|中文(繁體)]]}}|}} |
{{#ifeq:php5|:EncryptedFilesystem|请不要直接编辑翻译本页,本页将定期与来源同步。}} |
{{#ifexist: :EncryptedFilesystem/zh | | {{#ifexist: EncryptedFilesystem/zh | | {{#ifeq: {{#titleparts:EncryptedFilesystem|1|-1|}} | zh | | }} }} }} {{#ifeq: {{#titleparts:EncryptedFilesystem|1|-1|}} | zh | | }}
Encrypted Root and Swap with LUKS (on Ubuntu 6.06)
by Mikhail Lukyanchenko <[email protected]>
Info: another, more detailed and explanatory guide is here: https://help.ubuntu.com/community/EncryptedFilesystemHowto
Introduction
This is the way I got Ubuntu 6.06 (Dapper Drake) with fully encrypted file system: root (/) and swap. Since Ubuntu installer does not support yet this option, this process concerns, first, installing Ubuntu on a temporary partition and then, inside that installation, preparing all the encrypted partitions for the OS. The old root which I used in the beginning is turned into a swap partition.
Notes
In this tutorial we assume that:
- old (unencrypted) and the new (encrypted) swap is in the partition '/dev/hda2'
- new home (encrypted) is in the partition '/dev/hda3'
replace '/dev/hda2' with your real swap partition and '/dev/hda3' with an empty partition that will become your new encrypted home partition.
Warnings
Encrypting a partition is a destructive operation; then, your new root partition (/dev/hda3) must be empty, because all data on it will be erased.
Also be warned, that this HOWTO is at beta state. I would not recommend to use it on production system. But it would be greatly appreciated if you test it and send me some feedback.
Ubuntu installation
Note that you should install a server profile at this step even if you need a desktop profile at the end. The switch between the two profiles will be realized later on.
Install Ubuntu with the following initial partitioning scheme:
/dev/hda1 /boot 100 MB ext3 /dev/hda2 / 512 MB ext3
Mark that 512 MB is really the shortest size you can set for a server type of installation. A complete Ubuntu installation requires at least 2.4 GB. Make your choice now. In addition, create one more space to hold your future encrypted root, so as the following:
/dev/hda3 future / 10GB
Set this partition in the installer option for filesystem as "do not use the partition". Just ignore the alert about not having a swap partition and keep walking.
Cryptography software installation
Enable the Universe repository. See here
After adding the universe repository, don't forget to update so the packages below will be available:
Use any method to install the following packages:
cryptsetup hashalot initramfs-tools
Setting up mkinitramfs
Edit /etc/kernel-img.conf
. Add the following line:
ramdisk = /usr/sbin/mkinitramfs
Edit /etc/mkinitramfs/modules
(note, this and other files move to /etc/initramfs-tools
in Edgy). Add folowing lines:
dm_mod dm_crypt sha256 aes_i586
Create file /etc/mkinitramfs/hooks/cryptoroot
:
#!/bin/sh PREREQ="" prereqs() { echo "$PREREQ" } case $1 in prereqs) prereqs exit 0 ;; esac if [ ! -x /sbin/cryptsetup ]; then exit 0 fi . /usr/share/initramfs-tools/hook-functions mkdir ${DESTDIR}/etc/console cp /etc/console/boottime.kmap.gz ${DESTDIR}/etc/console copy_exec /bin/loadkeys /bin copy_exec /usr/bin/chvt /bin copy_exec /sbin/cryptsetup /sbin
If you use Ubuntu 6.10, you have to add the following line to the above script (at the end):
copy_exec /sbin/vol_id /sbin
Create file /etc/mkinitramfs/scripts/local-top/cryptoroot
:
#!/bin/sh PREREQ="udev" prereqs() { echo "$PREREQ" } case $1 in # get pre-requisites prereqs) prereqs exit 0 ;; esac /bin/loadkeys /etc/console/boottime.kmap.gz modprobe -Qb dm_crypt modprobe -Qb aes_i586 modprobe -Qb sha256 if grep -q splash /proc/cmdline; then /bin/chvt 1 fi /sbin/cryptsetup luksOpen /dev/hda3 cryptoroot if grep -q splash /proc/cmdline; then /sbin/usplash -c & sleep 1 fi
If you use Ubuntu 6.10, add the following line directly below "/sbin/cryptsetup luksOpen /dev/hda3 cryptoroot":
ln -s ../../mapper/cryptoroot /dev/disk/by-uuid/`vol_id -u /dev/mapper/cryptoroot`
Also, if you use Ubuntu 6.10, replace the following line:
/bin/loadkeys /etc/console/boottime.kmap.gz
with the following line:
/bin/loadkeys /etc/console-setup/boottime.kmap.gz
Make created files executable:
$ sudo chmod +x /etc/mkinitramfs/hooks/cryptoroot $ sudo chmod +x /etc/mkinitramfs/scripts/local-top/cryptoroot
Update initrd image:
$ sudo update-initramfs -u ALL
Creating the encrypted system
Now it is time to create the cryptography devices.
$ sudo modprobe dm_crypt $ sudo modprobe sha256 $ sudo modprobe aes_i586 $ sudo luksformat -t ext3 /dev/hda3
The following dialog should look like this:
Creating encrypted device on /dev/hda3... WARNING! ======== This will owerwrite data on /dev/hda3 irrevocably. Are you sure? (Type uppercase yes): YES Enter LUKS passphrase: Verify passphrase: Command successful. Please enter your passphrase again to verify it Enter LUKS passphrase: key slot 0 unlocked. Command successful. mke2fs 1.38 (30-Jun-2005) .....
Your encrypted partition is now created and formated. It's time to populate it:
$ sudo cryptsetup luksOpen /dev/hda3 cryptoroot $ sudo mkdir /mnt/target $ sudo mount /dev/mapper/cryptoroot /mnt/target $ sudo cp -avx / /mnt/target $ sudo chown -R $(whoami):$(whoami) /mnt/target/home/$(whoami)
The copy process should take about two minutes for a server profile (depends on your hardware).
Then you need to correct /mnt/target/etc/fstab
.
Find
/dev/hda2 / ext3 defaults,errors=remount-ro 0 1
Replace with
/dev/mapper/cryptoroot / ext3 defaults,errors=remount-ro 0 1
If you use Ubuntu 6.10, your fstab won't use /dev/* anymore, but instead UUIDs. Therefore, you need to find out the UUID by using the following command:
$ sudo vol_id -u /dev/mapper/cryptoroot
Instead of the "/dev/mapper/cryptoroot", you enter the UUID - hence the line in your /mnt/target/etc/fstab
will look similar to this one:
UUID=25e3f85a-3488-d58e-9372-f31a45789035 / ext3 defaults,errors=remount-ro 0 1
Configuring Grub
Edit /boot/grub/menu.lst
. Add following after the line containing
<pre><nowiki> title Cryptotest root (hd0,0) kernel /vmlinuz-<your kernel version here> root=/dev/mapper/cryptoroot ro initrd /initrd.img-<your kernel version here> savedefault boot
Again, if you use Ubuntu 6.10, you'll have to replace root=/dev/mapper/cryptoroot
by your UUID - i.e. sth. similar to root=UUID=25e3f85a-3488-d58e-9372-f31a45789035
(of course, YOUR ID will be different!).
You may find your kernel version by running:
$ uname -r
Rebooting and testing configuration
As simple as it should be:
$ sudo reboot
Now, after all your BIOS mumbo-jumbo, you should look very carefully and when you see following prompt:
GRUB Loading stage 1.5. GRUB Loading, please wait... Press `ESC` to enter the menu
Press ESC and select last option, namely "Cryptotest"
Now you will see lots of kernel debugging info, since we didn't add quiet
option to kernel options. It's ok.
At some point you will see the promt:
Enter LUKS passphrase:
Go on! Enter it. Now you have booted from crypted partition.
If something goes Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
Cryptoswap
Let's enable swap partition.
Edit /etc/crypttab
:
cryptoswap /dev/hda2 /dev/urandom swap
Edit /etc/fstab
. Add following line:
/dev/mapper/cryptoswap none swap sw 0 0
Now, you need to destroy your filesystem on /dev/hda2
(if you don't destroy it explicitely, the safety check of the following command will refuse to create your "cryptoswap" on it):
$ sudo dd if=/dev/urandom of=/dev/hda2 count=100
Finally, create the swap and activate it:
$ sudo invoke-rc.d cryptdisks restart $ sudo swapon /dev/mapper/cryptoswap
Finishing
Edit /boot/grub/menu.lst
and remove lines, you previously added after the line containing
In the same file find line containing <pre><nowiki> # kopt=root=/dev/hda2 ro
Change this to
# kopt=root=/dev/mapper/cryptoroot ro
Run
$ sudo update-grub
Now you have an operational server profile with encrypted root and swap. If what you need is a desktop profile (i.e. a complete graphical environment like Gnome or KDE and lots of applications), you can install it now with the single command:
$ sudo apt-get install ubuntu-desktop
Replace ubuntu-desktop
with kubuntu-desktop
, or xubuntu-desktop
, or edubuntu-desktop
according to your needs.
That's all. Finished.