Minor cleanup and clarification

This commit is contained in:
Andrew David Wong 2019-01-14 00:14:00 -06:00
parent 1b5ea5fd08
commit 2f51f414a3
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17

View File

@ -9,15 +9,14 @@ redirect_from:
Custom Installation Custom Installation
=================== ===================
In the present context, "custom installation" refers to things like manual In the present context, "custom installation" refers to things like manual partitioning, setting up LVM and RAID, and manual LUKS encryption configuration.
partitioning, setting up LVM and RAID, and manual LUKS encryption configuration.
## Qubes 4.0 ## Qubes 4.0
### Installer Defaults ### Installer Defaults
For reference, these are the typical defaults for a single disk: For reference, these are the typical defaults for a single disk with legacy boot:
~~~ ~~~
Mount Point: /boot Mount Point: /boot
@ -34,7 +33,7 @@ File System: ext4
Name: root Name: root
Mount Point: (none) Mount Point: (none)
Desired Capacity: 15.37 GiB Desired Capacity: 10 GiB
Device Type: LVM Device Type: LVM
Volume Group: qubes_dom0 Volume Group: qubes_dom0
File System: swap File System: swap
@ -65,9 +64,8 @@ Order Action Type Device Mount po
### Typical Partition Schemes ### Typical Partition Schemes
If you want your partition/LVM scheme to look like the Qubes default but If you want your partition/LVM scheme to look like the Qubes default but with a few tweaks, follow this example.
with a few tweaks, follow these examples. With a single disk, the result With a single disk, the result should look something like this:
should look something like this:
~~~ ~~~
NAME SIZE TYPE MOUNTPOINT NAME SIZE TYPE MOUNTPOINT
@ -108,7 +106,7 @@ This means that, by default, Qubes inherits these upstream defaults:
- `/dev/urandom` - `/dev/urandom`
- probably an `iter-time` of one second - probably an `iter-time` of one second
If, instead, you'd like to use AES-256, SHA-512, `/dev/random`, and a longer `iter-time`, you can configure encryption manually by following the instructions below. If, instead, you'd like to use AES-256, SHA-512, `/dev/random`, and a longer `iter-time`, for example, you can configure encryption manually by following the instructions below.
### Example: Custom LUKS Configuration ### Example: Custom LUKS Configuration
@ -119,20 +117,14 @@ Boot into the Qubes installer, then press `ctrl`+`alt`+`F2` to get a virtual con
# dd if=/dev/zero of=/dev/sda bs=1M status=progress && sync # dd if=/dev/zero of=/dev/sda bs=1M status=progress && sync
2. Create partiions: 2. Create partitions:
# fdisk /dev/sda # fdisk /dev/sda
n
p Follow the steps to create two partitions:
1
+1G - ~500MiB-1GiB for `/boot`
a - The rest for `/` (might want to leave some for overprovisioning if it's an SSD)
n
p
2
(your choice; might want to leave overprovisioning space on an SSD)
p (check and confirm that everything makes sense)
w
4. Create LUKS encrypted volume: 4. Create LUKS encrypted volume: