mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-27 06:47:17 -05:00
Minor cleanup and clarification
This commit is contained in:
parent
1b5ea5fd08
commit
2f51f414a3
@ -9,15 +9,14 @@ redirect_from:
|
|||||||
Custom Installation
|
Custom Installation
|
||||||
===================
|
===================
|
||||||
|
|
||||||
In the present context, "custom installation" refers to things like manual
|
In the present context, "custom installation" refers to things like manual partitioning, setting up LVM and RAID, and manual LUKS encryption configuration.
|
||||||
partitioning, setting up LVM and RAID, and manual LUKS encryption configuration.
|
|
||||||
|
|
||||||
|
|
||||||
## Qubes 4.0
|
## Qubes 4.0
|
||||||
|
|
||||||
### Installer Defaults
|
### Installer Defaults
|
||||||
|
|
||||||
For reference, these are the typical defaults for a single disk:
|
For reference, these are the typical defaults for a single disk with legacy boot:
|
||||||
|
|
||||||
~~~
|
~~~
|
||||||
Mount Point: /boot
|
Mount Point: /boot
|
||||||
@ -34,7 +33,7 @@ File System: ext4
|
|||||||
Name: root
|
Name: root
|
||||||
|
|
||||||
Mount Point: (none)
|
Mount Point: (none)
|
||||||
Desired Capacity: 15.37 GiB
|
Desired Capacity: 10 GiB
|
||||||
Device Type: LVM
|
Device Type: LVM
|
||||||
Volume Group: qubes_dom0
|
Volume Group: qubes_dom0
|
||||||
File System: swap
|
File System: swap
|
||||||
@ -65,9 +64,8 @@ Order Action Type Device Mount po
|
|||||||
|
|
||||||
### Typical Partition Schemes
|
### Typical Partition Schemes
|
||||||
|
|
||||||
If you want your partition/LVM scheme to look like the Qubes default but
|
If you want your partition/LVM scheme to look like the Qubes default but with a few tweaks, follow this example.
|
||||||
with a few tweaks, follow these examples. With a single disk, the result
|
With a single disk, the result should look something like this:
|
||||||
should look something like this:
|
|
||||||
|
|
||||||
~~~
|
~~~
|
||||||
NAME SIZE TYPE MOUNTPOINT
|
NAME SIZE TYPE MOUNTPOINT
|
||||||
@ -108,7 +106,7 @@ This means that, by default, Qubes inherits these upstream defaults:
|
|||||||
- `/dev/urandom`
|
- `/dev/urandom`
|
||||||
- probably an `iter-time` of one second
|
- probably an `iter-time` of one second
|
||||||
|
|
||||||
If, instead, you'd like to use AES-256, SHA-512, `/dev/random`, and a longer `iter-time`, you can configure encryption manually by following the instructions below.
|
If, instead, you'd like to use AES-256, SHA-512, `/dev/random`, and a longer `iter-time`, for example, you can configure encryption manually by following the instructions below.
|
||||||
|
|
||||||
|
|
||||||
### Example: Custom LUKS Configuration
|
### Example: Custom LUKS Configuration
|
||||||
@ -119,20 +117,14 @@ Boot into the Qubes installer, then press `ctrl`+`alt`+`F2` to get a virtual con
|
|||||||
|
|
||||||
# dd if=/dev/zero of=/dev/sda bs=1M status=progress && sync
|
# dd if=/dev/zero of=/dev/sda bs=1M status=progress && sync
|
||||||
|
|
||||||
2. Create partiions:
|
2. Create partitions:
|
||||||
|
|
||||||
# fdisk /dev/sda
|
# fdisk /dev/sda
|
||||||
n
|
|
||||||
p
|
Follow the steps to create two partitions:
|
||||||
1
|
|
||||||
+1G
|
- ~500MiB-1GiB for `/boot`
|
||||||
a
|
- The rest for `/` (might want to leave some for overprovisioning if it's an SSD)
|
||||||
n
|
|
||||||
p
|
|
||||||
2
|
|
||||||
(your choice; might want to leave overprovisioning space on an SSD)
|
|
||||||
p (check and confirm that everything makes sense)
|
|
||||||
w
|
|
||||||
|
|
||||||
4. Create LUKS encrypted volume:
|
4. Create LUKS encrypted volume:
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user