Diskussion:Install-Party/Linux Mint Debian Edition: Unterschied zwischen den Versionen

Aus Wiki StuRa HTW Dresden
Zur Navigation springen Zur Suche springen
Zeile 434: Zeile 434:
     -O canmount=off \
     -O canmount=off \
     -O mountpoint=/boot -R /mnt \
     -O mountpoint=/boot -R /mnt \
     bpool \
     bpool mirror \
     ${DISK1}-part3 \
     ${DISK1}-part3 \
     ${DISK2}-part3
     ${DISK2}-part3


-->
-->
 
<!--
: <code></code>
: <code></code>
<pre>
<pre>
Zeile 467: Zeile 463:
<pre>
<pre>
</pre>
</pre>
-->

Version vom 29. Mai 2024, 01:50 Uhr

Installation mit Verschlüsselung

Fail!
LMDE 3 meets https://gitlab.com/pepa65/lmdescrypt/raw/master/lmdescrypt ?

(default) disk layout

Calamares meets Btrfs

(nach der manuellen Partitionierung und) Angabe beim Programm für die Installation

cat /etc/fstab
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a device; this may
# be used with UUID= as a more robust way to name devices that works even if
# disks are added and removed. See fstab(5).
#
# <file system>             <mount point>  <type>  <options>  <dump>  <pass>
UUID=8f303b38-b7e7-4781-aa8e-f1559b5504d2 /boot          ext4    defaults,noatime 0 2
UUID=33436381-7031-48be-8785-a48061fcabd7 /              btrfs   subvol=@,defaults,noatime,space_cache,autodefrag 0 1
UUID=33436381-7031-48be-8785-a48061fcabd7 /home          btrfs   subvol=@home,defaults,noatime,space_cache,autodefrag 0 2
UUID=641494b3-d3a2-4c57-b022-cba4d00603f5 swap           swap    defaults,noatime 0 2
cat /etc/default/grub

GRUB_CMDLINE_LINUX_DEFAULT="quiet resume=UUID=641494b3-d3a2-4c57-b022-cba4d00603f5"

cat /etc/crypttab
# /etc/crypttab: mappings for encrypted partitions.
#
# Each mapped device will be created in /dev/mapper, so your /etc/fstab
# should use the /dev/mapper/<name> paths for encrypted devices.
#
# See crypttab(5) for the supported syntax.
#
# NOTE: Do not list your root (/) partition here, it must be set up
#       beforehand by the initramfs (/etc/mkinitcpio.conf). The same applies
#       to encrypted swap, which should be set up with mkinitcpio-openswap
#       for resume support.
#
# <name>               <device>                         <password> <options>

btrfs meets luks

cat /etc/fstab
####vb
/dev/sda1               /boot   btrfs   defaults,errors=remount-ro      0    1
/dev/mapper/vg-lv--swap none    swap    sw                              0    0
/dev/mapper/vg-lv--root /       btrfs   defaults,errors=remount-ro      0    1
/dev/mapper/vg-lv--home /home   btrfs   defaults,compress=lzo           0    1
####ve
# UNCONFIGURED FSTAB FOR BASE SYSTEM
proc    /proc   proc    defaults        0       0
cat /etc/crypttab
####vb
k-ot    UUID=8765dcba-ab12-cd34-ef56-123456abcdef       none    luks
####ve

https://www.howtoforge.com/a-beginners-guide-to-btrfs

cat /etc/default/grub

####vb
#GRUB_CMDLINE_LINUX_DEFAULT="quiet splash"
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash kopt=root=/dev/mapper/vg-lv--root"
####ve

sbin fehlt beim PATH

dpkg -i linux-UFRII-drv-v500-de/64-bit_Driver/Debian/cnrdrvcups-ufr2-uk_5.00-1_amd64.deb

Beachten Sie: PATH von root sollte normalerweise /usr/local/sbin, /usr/sbin und /sbin enthalten
export PATH=$PATH:/usr/local/sbin:/usr/sbin:/sbin

LMDE 4 mit verschlüsselten Massenspeicher und btrfs subvolumes (möglichst noch als mirror von 2 Geräten für Massenspeicher)

LMDE 6 "anderes Dateisystem"

Vorkenntnisse vor LMDE 6

website:members/PaulRiegel/os/lmde/installation-lmde-3-mit-verschluesslung

Untersuchung Installation LMDE 6

standardmäßige Installation mit Verschlüsselung ext4 LMDE 6
nach dem Neustart in die Installation
cat /etc/crypttab
# <target name>	<source device>		<key file>	<options>
lvmlmde   UUID=3c96337f-bb08-4f9d-ba25-fe5d23afd680   none   luks,discard,tries=3
cat /etc/fstab
#### Static Filesystem Table File
proc	/proc	proc	defaults	0	0
# /dev/mapper/lvmlmde-root
UUID=ba9df8e4-a4fb-42f6-b3ef-682d8c3edd95 /  ext4 defaults 0 1
# /dev/mapper/lvmlmde-swap
UUID=9e412642-d11a-40f2-9c59-03f9a51f5e28 none   swap sw 0 0
# /dev/sda2
UUID=22a7ba7f-0999-43d8-90f2-34c85af6f167 /boot  ext4 defaults 0 1
# /dev/sda1
UUID=C002-8E9D /boot/efi  vfat defaults 0 1
cat /etc/default/grub.d/61_live-installer.cfg
#! /bin/sh
set -e

GRUB_CMDLINE_LINUX="cryptdevice=UUID=3c96337f-bb08-4f9d-ba25-fe5d23afd680:lvmlmde root=/dev/mapper/lvmlmde-root resume=/dev/mapper/lvmlmde-swap"
standardmäßige Installation ohne Verschlüsselung btrfs LMDE 6
während der Installation
mount
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=3743316k,nr_inodes=935829,mode=755,inode64)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,nodev,noexec,relatime,size=757356k,mode=755,inode64)
/dev/sdb1 on /run/live/medium type iso9660 (ro,noatime,nojoliet,check=s,map=n,blocksize=2048,iocharset=utf8)
/dev/loop0 on /run/live/rootfs/filesystem.squashfs type squashfs (ro,noatime,errors=continue)
tmpfs on /run/live/overlay type tmpfs (rw,noatime,mode=755,inode64)
overlay on / type overlay (rw,noatime,lowerdir=/run/live/rootfs/filesystem.squashfs/,upperdir=/run/live/overlay/rw,workdir=/run/live/overlay/work,redirect_dir=on)
tmpfs on /usr/lib/live/mount type tmpfs (rw,nosuid,nodev,noexec,relatime,size=757356k,mode=755,inode64)
/dev/sdb1 on /usr/lib/live/mount/medium type iso9660 (ro,noatime,nojoliet,check=s,map=n,blocksize=2048,iocharset=utf8)
/dev/loop0 on /usr/lib/live/mount/rootfs/filesystem.squashfs type squashfs (ro,noatime,errors=continue)
tmpfs on /usr/lib/live/mount/overlay type tmpfs (rw,noatime,mode=755,inode64)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,inode64)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k,inode64)
cgroup2 on /sys/fs/cgroup type cgroup2 (rw,nosuid,nodev,noexec,relatime,nsdelegate,memory_recursiveprot)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime,mode=700)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=29,pgrp=1,timeout=0,minproto=5,maxproto=5,direct,pipe_ino=12771)
mqueue on /dev/mqueue type mqueue (rw,nosuid,nodev,noexec,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,nosuid,nodev,noexec,relatime)
tracefs on /sys/kernel/tracing type tracefs (rw,nosuid,nodev,noexec,relatime)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime,pagesize=2M)
configfs on /sys/kernel/config type configfs (rw,nosuid,nodev,noexec,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,nosuid,nodev,noexec,relatime)
ramfs on /run/credentials/systemd-sysusers.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-tmpfiles-setup-dev.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
ramfs on /run/credentials/systemd-sysctl.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
tmpfs on /tmp type tmpfs (rw,nosuid,nodev,relatime,inode64)
ramfs on /run/credentials/systemd-tmpfiles-setup.service type ramfs (ro,nosuid,nodev,noexec,relatime,mode=700)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime)
tmpfs on /run/user/1000 type tmpfs (rw,nosuid,nodev,relatime,size=757356k,nr_inodes=189339,mode=700,uid=1000,gid=1000,inode64)
gvfsd-fuse on /run/user/1000/gvfs type fuse.gvfsd-fuse (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
portal on /run/user/1000/doc type fuse.portal (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
/dev/loop0 on /source type squashfs (ro,relatime,errors=continue)
/dev/sda3 on /target type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=256,subvol=/@)
/dev/sda3 on /target/home type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=257,subvol=/@home)
/dev/sda2 on /target/boot type btrfs (rw,relatime,ssd,space_cache=v2,subvolid=5,subvol=/)
nach dem Neustart in die Installation
cat /etc/crypttab
# <target name>	<source device>		<key file>	<options>
cat /etc/fstab
#### Static Filesystem Table File
proc	/proc	proc	defaults	0	0
# /dev/sda3
UUID=b84bec73-29b9-4e62-a830-5069650680af	/	btrfs	defaults,subvol=@	00
UUID=b84bec73-29b9-4e62-a830-5069650680af	/home	btrfs	defaults,subvol=@home	0	0
# /dev/sda2
UUID=dea84151-1736-439a-8127-a45f2a7feb75	/boot	btrfs	defaults	0	0
# /dev/sda1
UUID=FDD2-C26F	/boot/efi	vfat	defaults	0	1
cat /etc/default/grub.d/61_live-installer.cfg

Erarbeitung Verschlüsslung und btrfs

https://forums.linuxmint.com/viewtopic.php?t=100659

meets

https://linuxmint.com/rel_faye.php

sudo live-installer-expert-mode

/target ist die das gewünschte Ziel! Alles Nachfolgende wird aber noch mit /mnt/target angegeben.

sudo mkdir /mnt/target
sudo mount -o subvol=@ /dev/mapper/lvmlmde-root /mnt/target
sudo mkdir /mnt/target/home
sudo mount -o subvol=home /dev/mapper/lvmlmde-root /mnt/target/home
sudo rsync -avz /run/live/medium/casper/filesystem.squashfs/ /mnt/target/

/dev/loop0

sudo mkdir /mnt/target/dev
sudo mount --bind /dev /mnt/target/dev
sudo mkdir /dev/pts /mnt/target/dev/pts
sudo mount --bind /dev/pts /mnt/target/dev/pts
sudo mkdir /mnt/target/dev/shm
sudo mount --bind /dev/shm /mnt/target/dev/shm
sudo mkdir /mnt/target/proc
sudo mount --bind /proc /mnt/target/proc
sudo mkdir /mnt/target/sys
sudo mount --bind /sys /mnt/target/sys
sudo mkdir /mnt/target/tmp
sudo mount --bind /tmp /mnt/target/tmp
sudo mkdir /mnt/target/
cp -f /etc/resolv.conf /mnt/target/etc/resolv.conf
chroot /mnt/target

Installation Debian

und dann Wechsel zu LMDE

https://forums.linuxmint.com/viewtopic.php?t=404823

(bevorzugte) Verwendung von zram aktivieren

Bei einer standardmäßigen Installation (ohne Verschlüsselung) mit btrfs wird anscheinend keine Partition (und keine Datei) für SWAP erstellt. (Gut! Stattdessen kann - zeitgemäßer - zram verwendet werden.)

apt install zram-tools
systemctl status zramswap.service
systemctl is-enabled zramswap.service
enabled
systemctl is-active zramswap.service
active

LMDE 6 meets ZFS

in der Verwaltung vom Gerät wikipedia:de:Unified Extensible Firmware Interface#Secure Boot deaktivieren

wegen der nachträglichen Installation ist der Schlüssel für das Modul für den Kernel für ZFS nicht valide, weswegen das Modul nicht benutzt werden kann
sudo modprobe zfs
modprobe: ERROR: could not insert 'zfs': Key was rejected by service

mit dem Internet verbinden


whoami
mint
uname -a
Linux mint 6.1.0-12-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.52-1 (2023-09-07) x86_64 GNU/Linux
apt update
sudo apt -y install ssh
sudo systemctl status ssh

Ersetzen vom nicht gesetzen Passwort

passwd
ip a

ssh mint@321.321.321.321

sudo nano /etc/apt/sources.list
#/etc/apt/sources.list
deb http://deb.debian.org/debian bookworm main contrib non-free-firmware
apt update
gsettings set org.gnome.desktop.media-handling automount false
apt -y install debootstrap gdisk zfsutils-linux
ls -la /dev/disk/by-id/
total 0
lrwxrwxrwx 1 root root   9 May 28 23:25 ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R -> ../../sda
lrwxrwxrwx 1 root root   9 May 28 23:25 ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M -> ../../sdb
lrwxrwxrwx 1 root root   9 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0 -> ../../sdc
lrwxrwxrwx 1 root root  10 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0-part1 -> ../../sdc1
lrwxrwxrwx 1 root root  10 May 28 23:25 usb-Kingston_DataTraveler_3.0_4CEDFB74A418B320F9950BCC-0:0-part2 -> ../../sdc2
lrwxrwxrwx 1 root root   9 May 28 23:25 wwn-0x5002538d41306eb7 -> ../../sdb
lrwxrwxrwx 1 root root   9 May 28 23:25 wwn-0x5002538d702e43f9 -> ../../sda


DISK1=/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R
DISK2=/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M
swapoff -a
cat /proc/mdstat

Personalities : 
unused devices: <none>


sudo wipefs -a $DISK1
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
/dev/disk/by-id/ata-Samsung_SSD_750_EVO_500GB_S363NWAH718728R: calling ioctl to re-read partition table: Success
sudo wipefs -a $DISK2
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x00000200 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 8 bytes were erased at offset 0x7470c05e00 (gpt): 45 46 49 20 50 41 52 54
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: 2 bytes were erased at offset 0x000001fe (PMBR): 55 aa
/dev/disk/by-id/ata-Samsung_SSD_850_EVO_M.2_500GB_S33DNX0H809148M: calling ioctl to re-read partition table: Success