updated index

hslick-master
shmalebx9 2023-03-20 21:19:05 -06:00
parent faf17b0381
commit b393e1154e
2 changed files with 4 additions and 21 deletions

View File

@ -87,7 +87,7 @@ You can obtain the UUID from `blkid` or simply use the linux block device name `
lsblk -o 'PATH,LABEL,UUID' # to get UUID lsblk -o 'PATH,LABEL,UUID' # to get UUID
sudo vim /etc/crypttab sudo vim /etc/crypttab
> boot_crypt UUID=YOUR_UUID /etc/keys/boot.key luks,discard,key-slot=1 > boot_crypt UUID=YOUR_UUID /etc/keys/boot.key luks,key-slot=1
``` ```
**Step 3:** **Step 3:**
Add the crypt device to your fstab. Add the crypt device to your fstab.

View File

@ -26,14 +26,7 @@ Refer to the following pages:
Encrypted (LUKS/dm-crypt) installations Encrypted (LUKS/dm-crypt) installations
======================================= =======================================
You should install with unencrypted `/boot` partition, but everything else A better solution for encryption would be a Linux payload in flash, handling the
encrypted. The GRUB payload has LUKSv1 support and (buggy) LUKSv2 support.
There used to be guides for encrypted `/boot` on libreboot.org, but it's not
really viable to do that anymore (with GRUB), due to buggy/incomplete LUKS
support in GRUB.
A better solution for that would be a Linux payload in flash, handling the
encryption, at least if you want to use Linux, because then it'll have encryption, at least if you want to use Linux, because then it'll have
perfect LUKS support. perfect LUKS support.
@ -43,18 +36,8 @@ logic in it that will try to automatically use whatever you have installed,
by switching to it. In this way, most installations Just Work, so long as by switching to it. In this way, most installations Just Work, so long as
the `/boot` partition is accessible. the `/boot` partition is accessible.
If you do want encrypted /boot in your distro, please ensure that you have Full encryption for basic LUKS2 is supported in libreboot.
downgraded to LUKSv1, and generic advice for booting is this (press C to See [the guide](encryption.md) for more detail.
access a GRUB terminal, when you're in the GRUB payload):
```
set root=`lvm/bla-bla`
linux /vmlinuz root=/dev/mapper/bla-bla cryptdevice=/dev/mapper/bla-bla:root
initrd /initrd.img
boot
```
Adapt according to your configuration.
Rebooting system in case of freeze Rebooting system in case of freeze
=================================== ===================================