Update content/posts/linux/Setting up DM-Integrity/index.md

Co-authored-by: Ganwtrs <morga.nwinters-99@aliasvault.net>
Signed-off-by: Purpleseaotter <github.bronco733@passinbox.com>
This commit is contained in:
Purpleseaotter 2025-12-17 10:33:14 +01:00 committed by GitHub
parent 4efaccbcc6
commit d92c15d5e4
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -31,7 +31,7 @@ When you're setting up your Arch Linux machine and you want to make use of dm-in
cryptsetup luksFormat --type luks2 /dev/sdX --integrity hmac-sha256 --sector-size 4096 cryptsetup luksFormat --type luks2 /dev/sdX --integrity hmac-sha256 --sector-size 4096
``` ```
We are setting a sane default of using hmac-sha256 for the integrity checking. Alternatively if you have very weak hardware that would struggle with hmac-sha256, you can also use crc32c. However this is non cryptographic and probably significantly weaker. We are setting a sane default of using hmac-sha256 for the integrity checking. Alternatively, if you have very weak hardware that would struggle with hmac-sha256, you can also use crc32c. However, this is non cryptographic and likely significantly weaker.
When pacstrapping the system make sure you add in the cryptsetup package to install LUKS and by extension dm-integrity. The following command is a minimal base install example of what that would look like: When pacstrapping the system make sure you add in the cryptsetup package to install LUKS and by extension dm-integrity. The following command is a minimal base install example of what that would look like: