Update content/posts/linux/Setting up DM-Integrity/index.md

Co-authored-by: Ganwtrs <morga.nwinters-99@aliasvault.net>
Signed-off-by: Purpleseaotter <github.bronco733@passinbox.com>
This commit is contained in:
Purpleseaotter 2025-12-17 10:33:27 +01:00 committed by GitHub
parent d92c15d5e4
commit e72204dd0f
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -33,7 +33,7 @@ cryptsetup luksFormat --type luks2 /dev/sdX --integrity hmac-sha256 --sector-siz
We are setting a sane default of using hmac-sha256 for the integrity checking. Alternatively, if you have very weak hardware that would struggle with hmac-sha256, you can also use crc32c. However, this is non cryptographic and likely significantly weaker. We are setting a sane default of using hmac-sha256 for the integrity checking. Alternatively, if you have very weak hardware that would struggle with hmac-sha256, you can also use crc32c. However, this is non cryptographic and likely significantly weaker.
When pacstrapping the system make sure you add in the cryptsetup package to install LUKS and by extension dm-integrity. The following command is a minimal base install example of what that would look like: When pacstrapping the system, make sure you add in the cryptsetup package to install LUKS (and by extension, dm-integrity). The following command is a minimal base install example of what that would look like:
```bash ```bash
pacstrap /mnt base linux linux-firmware sudo efibootmgr nano cryptsetup pacstrap /mnt base linux linux-firmware sudo efibootmgr nano cryptsetup