README.md: update
This commit is contained in:
		
							parent
							
								
									8db2fb1ef7
								
							
						
					
					
						commit
						3125d960d5
					
				
					 1 changed files with 8 additions and 11 deletions
				
			
		
							
								
								
									
										19
									
								
								README.md
									
										
									
									
									
								
							
							
						
						
									
										19
									
								
								README.md
									
										
									
									
									
								
							| 
						 | 
					@ -53,13 +53,7 @@ All configurable files have been whitelisted and moved to /cfg.
 | 
				
			||||||
- add admin LUKS key via [public key](https://blog.g3rt.nl/luks-smartcard-or-token.html)
 | 
					- add admin LUKS key via [public key](https://blog.g3rt.nl/luks-smartcard-or-token.html)
 | 
				
			||||||
- sssd
 | 
					- sssd
 | 
				
			||||||
- support more clevis pins and mixed pins
 | 
					- support more clevis pins and mixed pins
 | 
				
			||||||
- firmware update
 | 
					 | 
				
			||||||
- option to always clean data disk on boot
 | 
					- option to always clean data disk on boot
 | 
				
			||||||
- instead of gpg use:
 | 
					 | 
				
			||||||
```bash
 | 
					 | 
				
			||||||
$ openssl dgst -sha256 -sign ../DB.key -out sha512sum.txt.sig sha512sum.txt
 | 
					 | 
				
			||||||
$ openssl dgst -sha256 -verify  <(openssl x509 -in ../DB.crt -pubkey -noout) -signature sha512sum.txt.sig sha512sum.txt
 | 
					 | 
				
			||||||
```
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Complete / What works already?
 | 
					## Complete / What works already?
 | 
				
			||||||
- boot from single efi binary
 | 
					- boot from single efi binary
 | 
				
			||||||
| 
						 | 
					@ -70,6 +64,7 @@ $ openssl dgst -sha256 -verify  <(openssl x509 -in ../DB.crt -pubkey -noout) -si
 | 
				
			||||||
- /home /cfg and /var on single data partition
 | 
					- /home /cfg and /var on single data partition
 | 
				
			||||||
- Secure Boot
 | 
					- Secure Boot
 | 
				
			||||||
- selinux
 | 
					- selinux
 | 
				
			||||||
 | 
					- firmware update (works, but needs a secure boot signed fwup*.efi)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Known Failures
 | 
					## Known Failures
 | 
				
			||||||
- no kernel command line on DELL ( you need a newer systemd https://github.com/systemd/systemd/pull/10001 )
 | 
					- no kernel command line on DELL ( you need a newer systemd https://github.com/systemd/systemd/pull/10001 )
 | 
				
			||||||
| 
						 | 
					@ -171,7 +166,9 @@ If you cannot:
 | 
				
			||||||
- use the option ```--crypttpm2```, if you have a TPM2 chip
 | 
					- use the option ```--crypttpm2```, if you have a TPM2 chip
 | 
				
			||||||
- use the option ```--crypt``` otherwise
 | 
					- use the option ```--crypt``` otherwise
 | 
				
			||||||
 | 
					
 | 
				
			||||||
```$ sudo clonedisk <options> <usb stick device> <harddisk device>```
 | 
					```bash
 | 
				
			||||||
 | 
					$ sudo fedorabook-clonedisk <options> <usb stick device> <harddisk device>
 | 
				
			||||||
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### Post
 | 
					### Post
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -182,15 +179,15 @@ The first boot takes longer as the system tries to bind the LUKS to the TPM2 on
 | 
				
			||||||
It also populates ```/var``` with the missing directories.
 | 
					It also populates ```/var``` with the missing directories.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
You can always clear the data partition via:
 | 
					You can always clear the data partition via:
 | 
				
			||||||
```
 | 
					```bash
 | 
				
			||||||
# wipefs --all --force /dev/<disk partition 5>
 | 
					# wipefs --all --force /dev/<disk partition 5>
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
and then either make a xfs
 | 
					and then either make a xfs
 | 
				
			||||||
```
 | 
					```bash
 | 
				
			||||||
# mkfs.xfs -L data /dev/<disk partition 5>
 | 
					# mkfs.xfs -L data /dev/<disk partition 5>
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
or LUKS
 | 
					or LUKS
 | 
				
			||||||
```
 | 
					```bash
 | 
				
			||||||
# echo -n "zero key" | cryptsetup luksFormat --type luks2 /dev/<disk partition 4> /dev/stdin
 | 
					# echo -n "zero key" | cryptsetup luksFormat --type luks2 /dev/<disk partition 4> /dev/stdin
 | 
				
			||||||
# echo -n "zero key" | cryptsetup luksFormat --type luks2 /dev/<disk partition 5> /dev/stdin
 | 
					# echo -n "zero key" | cryptsetup luksFormat --type luks2 /dev/<disk partition 5> /dev/stdin
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
| 
						 | 
					@ -211,7 +208,7 @@ The initial password is ```zero key```.
 | 
				
			||||||
## Updating
 | 
					## Updating
 | 
				
			||||||
 | 
					
 | 
				
			||||||
```bash
 | 
					```bash
 | 
				
			||||||
# systemd-inhibit update <UPDATE-URL>
 | 
					# systemd-inhibit fedorabook-update <UPDATE-URL>
 | 
				
			||||||
```
 | 
					```
 | 
				
			||||||
 | 
					
 | 
				
			||||||
## Secure Boot
 | 
					## Secure Boot
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue