<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ziproot</id>
	<title>Alpine Linux - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ziproot"/>
	<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/wiki/Special:Contributions/Ziproot"/>
	<updated>2026-05-01T17:17:46Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23433</id>
		<title>UEFI Secure Boot</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23433"/>
		<updated>2023-05-14T22:01:57Z</updated>

		<summary type="html">&lt;p&gt;Ziproot: /* Enrolling UEFI keys */ Make command in newly created note note one line&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mounting ESP ==&lt;br /&gt;
&lt;br /&gt;
Prepare mount point for UEFI partition (ESP) at {{path|/boot/efi}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# install -d -m 000 /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
Add the following line to {{path|/etc/fstab}}:&lt;br /&gt;
&lt;br /&gt;
{{Cat|/etc/fstab|...&lt;br /&gt;
UUID{{=}}&amp;lt;first-partition-uuid&amp;gt;  /boot/efi  vfat  rw,noatime,fmask{{=}}0022,dmask{{=}}0022,codepage{{=}}437,iocharset{{=}}ascii,shortname{{=}}mixed,utf8,errors{{=}}remount-ro 0 2}}&lt;br /&gt;
&lt;br /&gt;
Mount it:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mount /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
== Generating own UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|efi-mkkeys}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
Before creating new keys and modifying EFI variables, it is advisable to backup the current variables, so that they may be restored in case of error:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mkdir -p /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; cd /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; for i in PK KEK db dbx; do efi-readvar -v $i -o $i.esl; done }}&lt;br /&gt;
&lt;br /&gt;
Generate your self-signed PK, KEK and db key, including .esl and .auth files:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efi-mkkeys -s &amp;quot;Your Name&amp;quot; -o /etc/uefi-keys}}&lt;br /&gt;
&lt;br /&gt;
Now you can uninstall {{pkg|efi-mkkeys}} if you want:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk del efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
== Generating Unified Kernel Image ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|secureboot-hook}} and {{pkg|efibootmgr}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add secureboot-hook efibootmgr}}&lt;br /&gt;
&lt;br /&gt;
Adjust parameter &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt; in {{path|/etc/kernel-hooks.d/secureboot.conf}}. It should &#039;&#039;&#039;not&#039;&#039;&#039; contain an &amp;lt;code&amp;gt;initrd=&amp;lt;/code&amp;gt; parameter! Example of a valid &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;cmdline=&amp;quot;root=UUID=&amp;lt;uuid-of-your-root-fs&amp;gt; modules=ext4&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run kernel hooks:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk fix kernel-hooks}}&lt;br /&gt;
&lt;br /&gt;
Disable {{pkg|mkinitfs}} trigger:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# echo &#039;disable_trigger{{=}}yes&#039; &amp;gt;&amp;gt; /etc/mkinitfs/mkinitfs.conf}}&lt;br /&gt;
&lt;br /&gt;
Add boot entry:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efibootmgr --disk &amp;lt;dev&amp;gt; --part 1 --create --label &#039;Alpine Linux&#039; --load /Alpine/linux-lts.efi --verbose}}&lt;br /&gt;
&lt;br /&gt;
Note: This procedure only needs to be done once; after that the Unified Kernel Image will be generated automatically every time the kernel is upgraded.&lt;br /&gt;
&lt;br /&gt;
== Enrolling UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Copy all *.esl, *.auth files from {{path|/etc/uefi-keys}} to a FAT formatted file system (you can use EFI system partition).&lt;br /&gt;
&lt;br /&gt;
Launch firmware setup utility and enrol db, KEK and PK certificates (in this order!). Firmwares have various different interfaces; the following steps for ThinkPad T14s are just an example.&lt;br /&gt;
&lt;br /&gt;
# Reboot system and enter ThinkPad Setup (F1).&lt;br /&gt;
# Go to &#039;&#039;&#039;Security&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Secure Boot&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Reset to Setup Mode&#039;&#039;&#039;&lt;br /&gt;
# Go to &#039;&#039;&#039;Key Management&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Authorized Signature Database (DB)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll DB&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;db.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete DB&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Key Exchange Key (KEK)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll KEK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;KEK.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete KEK&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Platform Key (PK)&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Enroll PK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;PK.auth&#039;&#039;&#039; (this MUST be the last!)&lt;br /&gt;
# Go to top, &#039;&#039;&#039;Restart&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Exit Saving Changes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Some devices, such as HP Pavilion laptops, cannot enroll keys through the interface. Instead, you must follow the following steps (steps 1-5 and 9-12 may vary depending on the computer, they are for HP Pavilion laptops as an example):&lt;br /&gt;
# Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Disabled&#039;&#039;&#039;&lt;br /&gt;
# Select &#039;&#039;&#039;Clear All Secure Boot Keys&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
# Reboot system and enter Alpine Linux&lt;br /&gt;
# Enable the [[Repositories|Community Repository]]&lt;br /&gt;
# Run the following commands: &lt;br /&gt;
{{cmd|# apk update&lt;br /&gt;
&amp;amp;#35; apk add sbctl&lt;br /&gt;
&amp;amp;#35; sbctl create-keys&lt;br /&gt;
&amp;amp;#35; sbctl sign /boot/efi/Alpine/linux-lts.efi&lt;br /&gt;
&amp;amp;#35; sbctl enroll-keys -m  }}&lt;br /&gt;
# &amp;lt;li value=&amp;quot;9&amp;quot;&amp;gt; Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
&lt;br /&gt;
Note: If you needed to use sbctl, you will have to run &amp;lt;code&amp;gt;sbctl sign /boot/efi/Alpine/linux-lts.efi&amp;lt;/code&amp;gt; every time you upgrade the kernel. You should &#039;&#039;&#039;not&#039;&#039;&#039; need to disable secure boot, so long as you sign the new Unified Kernel Image before you reboot.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki%27s_EFI_Install_Guide/Configuring_Secure_Boot Sakaki&#039;s EFI Install Guide/Configuring Secure Boot - Gentoo Wiki]&lt;br /&gt;
* [https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot Unified Extensible Firmware Interface/Secure Boot - ArchWiki]&lt;br /&gt;
* [https://github.com/jirutka/efi-mkuki efi-mkuki: EFI Unified Kernel Image Maker] (used by the {{pkg|secureboot-hook}} package)&lt;br /&gt;
&lt;br /&gt;
[[Category:Booting]]&lt;/div&gt;</summary>
		<author><name>Ziproot</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23432</id>
		<title>UEFI Secure Boot</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23432"/>
		<updated>2023-05-14T22:00:05Z</updated>

		<summary type="html">&lt;p&gt;Ziproot: /* Enrolling UEFI keys */ Add note about running a command to re-sign the Unified Kernel Image after upgrade if sbctl was used to enroll the keys&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mounting ESP ==&lt;br /&gt;
&lt;br /&gt;
Prepare mount point for UEFI partition (ESP) at {{path|/boot/efi}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# install -d -m 000 /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
Add the following line to {{path|/etc/fstab}}:&lt;br /&gt;
&lt;br /&gt;
{{Cat|/etc/fstab|...&lt;br /&gt;
UUID{{=}}&amp;lt;first-partition-uuid&amp;gt;  /boot/efi  vfat  rw,noatime,fmask{{=}}0022,dmask{{=}}0022,codepage{{=}}437,iocharset{{=}}ascii,shortname{{=}}mixed,utf8,errors{{=}}remount-ro 0 2}}&lt;br /&gt;
&lt;br /&gt;
Mount it:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mount /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
== Generating own UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|efi-mkkeys}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
Before creating new keys and modifying EFI variables, it is advisable to backup the current variables, so that they may be restored in case of error:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mkdir -p /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; cd /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; for i in PK KEK db dbx; do efi-readvar -v $i -o $i.esl; done }}&lt;br /&gt;
&lt;br /&gt;
Generate your self-signed PK, KEK and db key, including .esl and .auth files:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efi-mkkeys -s &amp;quot;Your Name&amp;quot; -o /etc/uefi-keys}}&lt;br /&gt;
&lt;br /&gt;
Now you can uninstall {{pkg|efi-mkkeys}} if you want:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk del efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
== Generating Unified Kernel Image ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|secureboot-hook}} and {{pkg|efibootmgr}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add secureboot-hook efibootmgr}}&lt;br /&gt;
&lt;br /&gt;
Adjust parameter &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt; in {{path|/etc/kernel-hooks.d/secureboot.conf}}. It should &#039;&#039;&#039;not&#039;&#039;&#039; contain an &amp;lt;code&amp;gt;initrd=&amp;lt;/code&amp;gt; parameter! Example of a valid &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;cmdline=&amp;quot;root=UUID=&amp;lt;uuid-of-your-root-fs&amp;gt; modules=ext4&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run kernel hooks:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk fix kernel-hooks}}&lt;br /&gt;
&lt;br /&gt;
Disable {{pkg|mkinitfs}} trigger:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# echo &#039;disable_trigger{{=}}yes&#039; &amp;gt;&amp;gt; /etc/mkinitfs/mkinitfs.conf}}&lt;br /&gt;
&lt;br /&gt;
Add boot entry:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efibootmgr --disk &amp;lt;dev&amp;gt; --part 1 --create --label &#039;Alpine Linux&#039; --load /Alpine/linux-lts.efi --verbose}}&lt;br /&gt;
&lt;br /&gt;
Note: This procedure only needs to be done once; after that the Unified Kernel Image will be generated automatically every time the kernel is upgraded.&lt;br /&gt;
&lt;br /&gt;
== Enrolling UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Copy all *.esl, *.auth files from {{path|/etc/uefi-keys}} to a FAT formatted file system (you can use EFI system partition).&lt;br /&gt;
&lt;br /&gt;
Launch firmware setup utility and enrol db, KEK and PK certificates (in this order!). Firmwares have various different interfaces; the following steps for ThinkPad T14s are just an example.&lt;br /&gt;
&lt;br /&gt;
# Reboot system and enter ThinkPad Setup (F1).&lt;br /&gt;
# Go to &#039;&#039;&#039;Security&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Secure Boot&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Reset to Setup Mode&#039;&#039;&#039;&lt;br /&gt;
# Go to &#039;&#039;&#039;Key Management&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Authorized Signature Database (DB)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll DB&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;db.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete DB&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Key Exchange Key (KEK)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll KEK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;KEK.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete KEK&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Platform Key (PK)&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Enroll PK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;PK.auth&#039;&#039;&#039; (this MUST be the last!)&lt;br /&gt;
# Go to top, &#039;&#039;&#039;Restart&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Exit Saving Changes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Some devices, such as HP Pavilion laptops, cannot enroll keys through the interface. Instead, you must follow the following steps (steps 1-5 and 9-12 may vary depending on the computer, they are for HP Pavilion laptops as an example):&lt;br /&gt;
# Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Disabled&#039;&#039;&#039;&lt;br /&gt;
# Select &#039;&#039;&#039;Clear All Secure Boot Keys&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
# Reboot system and enter Alpine Linux&lt;br /&gt;
# Enable the [[Repositories|Community Repository]]&lt;br /&gt;
# Run the following commands: &lt;br /&gt;
{{cmd|# apk update&lt;br /&gt;
&amp;amp;#35; apk add sbctl&lt;br /&gt;
&amp;amp;#35; sbctl create-keys&lt;br /&gt;
&amp;amp;#35; sbctl sign /boot/efi/Alpine/linux-lts.efi&lt;br /&gt;
&amp;amp;#35; sbctl enroll-keys -m  }}&lt;br /&gt;
# &amp;lt;li value=&amp;quot;9&amp;quot;&amp;gt; Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
&lt;br /&gt;
Note: If you needed to use sbctl, you will have to run {{cmd|# sbctl sign /boot/efi/Alpine/linux-lts.efi}} every time you upgrade the kernel. You should &#039;&#039;&#039;not&#039;&#039;&#039; need to disable secure boot, so long as you sign the new Unified Kernel Image before you reboot.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki%27s_EFI_Install_Guide/Configuring_Secure_Boot Sakaki&#039;s EFI Install Guide/Configuring Secure Boot - Gentoo Wiki]&lt;br /&gt;
* [https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot Unified Extensible Firmware Interface/Secure Boot - ArchWiki]&lt;br /&gt;
* [https://github.com/jirutka/efi-mkuki efi-mkuki: EFI Unified Kernel Image Maker] (used by the {{pkg|secureboot-hook}} package)&lt;br /&gt;
&lt;br /&gt;
[[Category:Booting]]&lt;/div&gt;</summary>
		<author><name>Ziproot</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23424</id>
		<title>UEFI Secure Boot</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23424"/>
		<updated>2023-05-14T15:18:47Z</updated>

		<summary type="html">&lt;p&gt;Ziproot: /* Enrolling UEFI keys */ Correct case in path&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mounting ESP ==&lt;br /&gt;
&lt;br /&gt;
Prepare mount point for UEFI partition (ESP) at {{path|/boot/efi}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# install -d -m 000 /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
Add the following line to {{path|/etc/fstab}}:&lt;br /&gt;
&lt;br /&gt;
{{Cat|/etc/fstab|...&lt;br /&gt;
UUID{{=}}&amp;lt;first-partition-uuid&amp;gt;  /boot/efi  vfat  rw,noatime,fmask{{=}}0022,dmask{{=}}0022,codepage{{=}}437,iocharset{{=}}ascii,shortname{{=}}mixed,utf8,errors{{=}}remount-ro 0 2}}&lt;br /&gt;
&lt;br /&gt;
Mount it:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mount /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
== Generating own UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|efi-mkkeys}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
Before creating new keys and modifying EFI variables, it is advisable to backup the current variables, so that they may be restored in case of error:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mkdir -p /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; cd /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; for i in PK KEK db dbx; do efi-readvar -v $i -o $i.esl; done }}&lt;br /&gt;
&lt;br /&gt;
Generate your self-signed PK, KEK and db key, including .esl and .auth files:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efi-mkkeys -s &amp;quot;Your Name&amp;quot; -o /etc/uefi-keys}}&lt;br /&gt;
&lt;br /&gt;
Now you can uninstall {{pkg|efi-mkkeys}} if you want:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk del efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
== Generating Unified Kernel Image ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|secureboot-hook}} and {{pkg|efibootmgr}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add secureboot-hook efibootmgr}}&lt;br /&gt;
&lt;br /&gt;
Adjust parameter &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt; in {{path|/etc/kernel-hooks.d/secureboot.conf}}. It should &#039;&#039;&#039;not&#039;&#039;&#039; contain an &amp;lt;code&amp;gt;initrd=&amp;lt;/code&amp;gt; parameter! Example of a valid &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;cmdline=&amp;quot;root=UUID=&amp;lt;uuid-of-your-root-fs&amp;gt; modules=ext4&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run kernel hooks:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk fix kernel-hooks}}&lt;br /&gt;
&lt;br /&gt;
Disable {{pkg|mkinitfs}} trigger:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# echo &#039;disable_trigger{{=}}yes&#039; &amp;gt;&amp;gt; /etc/mkinitfs/mkinitfs.conf}}&lt;br /&gt;
&lt;br /&gt;
Add boot entry:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efibootmgr --disk &amp;lt;dev&amp;gt; --part 1 --create --label &#039;Alpine Linux&#039; --load /Alpine/linux-lts.efi --verbose}}&lt;br /&gt;
&lt;br /&gt;
Note: This procedure only needs to be done once; after that the Unified Kernel Image will be generated automatically every time the kernel is upgraded.&lt;br /&gt;
&lt;br /&gt;
== Enrolling UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Copy all *.esl, *.auth files from {{path|/etc/uefi-keys}} to a FAT formatted file system (you can use EFI system partition).&lt;br /&gt;
&lt;br /&gt;
Launch firmware setup utility and enrol db, KEK and PK certificates (in this order!). Firmwares have various different interfaces; the following steps for ThinkPad T14s are just an example.&lt;br /&gt;
&lt;br /&gt;
# Reboot system and enter ThinkPad Setup (F1).&lt;br /&gt;
# Go to &#039;&#039;&#039;Security&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Secure Boot&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Reset to Setup Mode&#039;&#039;&#039;&lt;br /&gt;
# Go to &#039;&#039;&#039;Key Management&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Authorized Signature Database (DB)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll DB&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;db.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete DB&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Key Exchange Key (KEK)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll KEK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;KEK.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete KEK&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Platform Key (PK)&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Enroll PK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;PK.auth&#039;&#039;&#039; (this MUST be the last!)&lt;br /&gt;
# Go to top, &#039;&#039;&#039;Restart&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Exit Saving Changes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Some devices, such as HP Pavilion laptops, cannot enroll keys through the interface. Instead, you must follow the following steps (steps 1-5 and 9-12 may vary depending on the computer, they are for HP Pavilion laptops as an example):&lt;br /&gt;
# Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Disabled&#039;&#039;&#039;&lt;br /&gt;
# Select &#039;&#039;&#039;Clear All Secure Boot Keys&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
# Reboot system and enter Alpine Linux&lt;br /&gt;
# Enable the [[Repositories|Community Repository]]&lt;br /&gt;
# Run the following commands: &lt;br /&gt;
{{cmd|# apk update&lt;br /&gt;
&amp;amp;#35; apk add sbctl&lt;br /&gt;
&amp;amp;#35; sbctl create-keys&lt;br /&gt;
&amp;amp;#35; sbctl sign /boot/efi/Alpine/linux-lts.efi&lt;br /&gt;
&amp;amp;#35; sbctl enroll-keys -m  }}&lt;br /&gt;
# &amp;lt;li value=&amp;quot;9&amp;quot;&amp;gt; Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki%27s_EFI_Install_Guide/Configuring_Secure_Boot Sakaki&#039;s EFI Install Guide/Configuring Secure Boot - Gentoo Wiki]&lt;br /&gt;
* [https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot Unified Extensible Firmware Interface/Secure Boot - ArchWiki]&lt;br /&gt;
* [https://github.com/jirutka/efi-mkuki efi-mkuki: EFI Unified Kernel Image Maker] (used by the {{pkg|secureboot-hook}} package)&lt;br /&gt;
&lt;br /&gt;
[[Category:Booting]]&lt;/div&gt;</summary>
		<author><name>Ziproot</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23423</id>
		<title>UEFI Secure Boot</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23423"/>
		<updated>2023-05-14T15:16:20Z</updated>

		<summary type="html">&lt;p&gt;Ziproot: /* Enrolling UEFI keys */ Fix minor typo in sbctl command to create keys&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mounting ESP ==&lt;br /&gt;
&lt;br /&gt;
Prepare mount point for UEFI partition (ESP) at {{path|/boot/efi}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# install -d -m 000 /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
Add the following line to {{path|/etc/fstab}}:&lt;br /&gt;
&lt;br /&gt;
{{Cat|/etc/fstab|...&lt;br /&gt;
UUID{{=}}&amp;lt;first-partition-uuid&amp;gt;  /boot/efi  vfat  rw,noatime,fmask{{=}}0022,dmask{{=}}0022,codepage{{=}}437,iocharset{{=}}ascii,shortname{{=}}mixed,utf8,errors{{=}}remount-ro 0 2}}&lt;br /&gt;
&lt;br /&gt;
Mount it:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mount /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
== Generating own UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|efi-mkkeys}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
Before creating new keys and modifying EFI variables, it is advisable to backup the current variables, so that they may be restored in case of error:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mkdir -p /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; cd /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; for i in PK KEK db dbx; do efi-readvar -v $i -o $i.esl; done }}&lt;br /&gt;
&lt;br /&gt;
Generate your self-signed PK, KEK and db key, including .esl and .auth files:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efi-mkkeys -s &amp;quot;Your Name&amp;quot; -o /etc/uefi-keys}}&lt;br /&gt;
&lt;br /&gt;
Now you can uninstall {{pkg|efi-mkkeys}} if you want:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk del efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
== Generating Unified Kernel Image ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|secureboot-hook}} and {{pkg|efibootmgr}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add secureboot-hook efibootmgr}}&lt;br /&gt;
&lt;br /&gt;
Adjust parameter &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt; in {{path|/etc/kernel-hooks.d/secureboot.conf}}. It should &#039;&#039;&#039;not&#039;&#039;&#039; contain an &amp;lt;code&amp;gt;initrd=&amp;lt;/code&amp;gt; parameter! Example of a valid &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;cmdline=&amp;quot;root=UUID=&amp;lt;uuid-of-your-root-fs&amp;gt; modules=ext4&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run kernel hooks:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk fix kernel-hooks}}&lt;br /&gt;
&lt;br /&gt;
Disable {{pkg|mkinitfs}} trigger:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# echo &#039;disable_trigger{{=}}yes&#039; &amp;gt;&amp;gt; /etc/mkinitfs/mkinitfs.conf}}&lt;br /&gt;
&lt;br /&gt;
Add boot entry:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efibootmgr --disk &amp;lt;dev&amp;gt; --part 1 --create --label &#039;Alpine Linux&#039; --load /Alpine/linux-lts.efi --verbose}}&lt;br /&gt;
&lt;br /&gt;
Note: This procedure only needs to be done once; after that the Unified Kernel Image will be generated automatically every time the kernel is upgraded.&lt;br /&gt;
&lt;br /&gt;
== Enrolling UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Copy all *.esl, *.auth files from {{path|/etc/uefi-keys}} to a FAT formatted file system (you can use EFI system partition).&lt;br /&gt;
&lt;br /&gt;
Launch firmware setup utility and enrol db, KEK and PK certificates (in this order!). Firmwares have various different interfaces; the following steps for ThinkPad T14s are just an example.&lt;br /&gt;
&lt;br /&gt;
# Reboot system and enter ThinkPad Setup (F1).&lt;br /&gt;
# Go to &#039;&#039;&#039;Security&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Secure Boot&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Reset to Setup Mode&#039;&#039;&#039;&lt;br /&gt;
# Go to &#039;&#039;&#039;Key Management&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Authorized Signature Database (DB)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll DB&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;db.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete DB&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Key Exchange Key (KEK)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll KEK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;KEK.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete KEK&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Platform Key (PK)&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Enroll PK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;PK.auth&#039;&#039;&#039; (this MUST be the last!)&lt;br /&gt;
# Go to top, &#039;&#039;&#039;Restart&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Exit Saving Changes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Some devices, such as HP Pavilion laptops, cannot enroll keys through the interface. Instead, you must follow the following steps (steps 1-5 and 9-12 may vary depending on the computer, they are for HP Pavilion laptops as an example):&lt;br /&gt;
# Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Disabled&#039;&#039;&#039;&lt;br /&gt;
# Select &#039;&#039;&#039;Clear All Secure Boot Keys&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
# Reboot system and enter Alpine Linux&lt;br /&gt;
# Enable the [[Repositories|Community Repository]]&lt;br /&gt;
# Run the following commands: &lt;br /&gt;
{{cmd|# apk update&lt;br /&gt;
&amp;amp;#35; apk add sbctl&lt;br /&gt;
&amp;amp;#35; sbctl create-keys&lt;br /&gt;
&amp;amp;#35; sbctl sign /boot/efi/alpine/linux-lts.efi&lt;br /&gt;
&amp;amp;#35; sbctl enroll-keys -m  }}&lt;br /&gt;
# &amp;lt;li value=&amp;quot;9&amp;quot;&amp;gt; Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki%27s_EFI_Install_Guide/Configuring_Secure_Boot Sakaki&#039;s EFI Install Guide/Configuring Secure Boot - Gentoo Wiki]&lt;br /&gt;
* [https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot Unified Extensible Firmware Interface/Secure Boot - ArchWiki]&lt;br /&gt;
* [https://github.com/jirutka/efi-mkuki efi-mkuki: EFI Unified Kernel Image Maker] (used by the {{pkg|secureboot-hook}} package)&lt;br /&gt;
&lt;br /&gt;
[[Category:Booting]]&lt;/div&gt;</summary>
		<author><name>Ziproot</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23422</id>
		<title>UEFI Secure Boot</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=UEFI_Secure_Boot&amp;diff=23422"/>
		<updated>2023-05-14T15:14:44Z</updated>

		<summary type="html">&lt;p&gt;Ziproot: /* Enrolling UEFI keys */ Add instructions for computers like HP Pavilion laptops that cannot enroll keys through interface&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Mounting ESP ==&lt;br /&gt;
&lt;br /&gt;
Prepare mount point for UEFI partition (ESP) at {{path|/boot/efi}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# install -d -m 000 /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
Add the following line to {{path|/etc/fstab}}:&lt;br /&gt;
&lt;br /&gt;
{{Cat|/etc/fstab|...&lt;br /&gt;
UUID{{=}}&amp;lt;first-partition-uuid&amp;gt;  /boot/efi  vfat  rw,noatime,fmask{{=}}0022,dmask{{=}}0022,codepage{{=}}437,iocharset{{=}}ascii,shortname{{=}}mixed,utf8,errors{{=}}remount-ro 0 2}}&lt;br /&gt;
&lt;br /&gt;
Mount it:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mount /boot/efi}}&lt;br /&gt;
&lt;br /&gt;
== Generating own UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|efi-mkkeys}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
Before creating new keys and modifying EFI variables, it is advisable to backup the current variables, so that they may be restored in case of error:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# mkdir -p /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; cd /etc/uefi-keys/vendor&lt;br /&gt;
&amp;amp;#35; for i in PK KEK db dbx; do efi-readvar -v $i -o $i.esl; done }}&lt;br /&gt;
&lt;br /&gt;
Generate your self-signed PK, KEK and db key, including .esl and .auth files:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efi-mkkeys -s &amp;quot;Your Name&amp;quot; -o /etc/uefi-keys}}&lt;br /&gt;
&lt;br /&gt;
Now you can uninstall {{pkg|efi-mkkeys}} if you want:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk del efi-mkkeys}}&lt;br /&gt;
&lt;br /&gt;
== Generating Unified Kernel Image ==&lt;br /&gt;
&lt;br /&gt;
Install package {{pkg|secureboot-hook}} and {{pkg|efibootmgr}}:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk add secureboot-hook efibootmgr}}&lt;br /&gt;
&lt;br /&gt;
Adjust parameter &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt; in {{path|/etc/kernel-hooks.d/secureboot.conf}}. It should &#039;&#039;&#039;not&#039;&#039;&#039; contain an &amp;lt;code&amp;gt;initrd=&amp;lt;/code&amp;gt; parameter! Example of a valid &amp;lt;code&amp;gt;cmdline&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;cmdline=&amp;quot;root=UUID=&amp;lt;uuid-of-your-root-fs&amp;gt; modules=ext4&amp;quot;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Run kernel hooks:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# apk fix kernel-hooks}}&lt;br /&gt;
&lt;br /&gt;
Disable {{pkg|mkinitfs}} trigger:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# echo &#039;disable_trigger{{=}}yes&#039; &amp;gt;&amp;gt; /etc/mkinitfs/mkinitfs.conf}}&lt;br /&gt;
&lt;br /&gt;
Add boot entry:&lt;br /&gt;
&lt;br /&gt;
{{cmd|# efibootmgr --disk &amp;lt;dev&amp;gt; --part 1 --create --label &#039;Alpine Linux&#039; --load /Alpine/linux-lts.efi --verbose}}&lt;br /&gt;
&lt;br /&gt;
Note: This procedure only needs to be done once; after that the Unified Kernel Image will be generated automatically every time the kernel is upgraded.&lt;br /&gt;
&lt;br /&gt;
== Enrolling UEFI keys ==&lt;br /&gt;
&lt;br /&gt;
Copy all *.esl, *.auth files from {{path|/etc/uefi-keys}} to a FAT formatted file system (you can use EFI system partition).&lt;br /&gt;
&lt;br /&gt;
Launch firmware setup utility and enrol db, KEK and PK certificates (in this order!). Firmwares have various different interfaces; the following steps for ThinkPad T14s are just an example.&lt;br /&gt;
&lt;br /&gt;
# Reboot system and enter ThinkPad Setup (F1).&lt;br /&gt;
# Go to &#039;&#039;&#039;Security&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Secure Boot&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Reset to Setup Mode&#039;&#039;&#039;&lt;br /&gt;
# Go to &#039;&#039;&#039;Key Management&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Authorized Signature Database (DB)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll DB&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;db.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete DB&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Key Exchange Key (KEK)&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Enroll KEK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;KEK.auth&#039;&#039;&#039;&lt;br /&gt;
#* &#039;&#039;&#039;Delete KEK&#039;&#039;&#039; &amp;gt; delete Microsoft certificates (optional)&lt;br /&gt;
# &#039;&#039;&#039;Platform Key (PK)&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Enroll PK&#039;&#039;&#039; &amp;gt; select your Flash Drive &amp;gt; select &#039;&#039;&#039;PK.auth&#039;&#039;&#039; (this MUST be the last!)&lt;br /&gt;
# Go to top, &#039;&#039;&#039;Restart&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Exit Saving Changes&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Some devices, such as HP Pavilion laptops, cannot enroll keys through the interface. Instead, you must follow the following steps (steps 1-5 and 9-12 may vary depending on the computer, they are for HP Pavilion laptops as an example):&lt;br /&gt;
# Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Disabled&#039;&#039;&#039;&lt;br /&gt;
# Select &#039;&#039;&#039;Clear All Secure Boot Keys&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
# Reboot system and enter Alpine Linux&lt;br /&gt;
# Enable the [[Repositories|Community Repository]]&lt;br /&gt;
# Run the following commands: &lt;br /&gt;
{{cmd|# apk update&lt;br /&gt;
&amp;amp;#35; apk add sbctl&lt;br /&gt;
&amp;amp;#35; sbctl create keys&lt;br /&gt;
&amp;amp;#35; sbctl sign /boot/efi/alpine/linux-lts.efi&lt;br /&gt;
&amp;amp;#35; sbctl enroll-keys -m  }}&lt;br /&gt;
# &amp;lt;li value=&amp;quot;9&amp;quot;&amp;gt; Reboot system and enter HP Bios Setup Utility (F10).&lt;br /&gt;
# Go to &#039;&#039;&#039;System Configuration&#039;&#039;&#039;&lt;br /&gt;
# Change &#039;&#039;&#039;Secure Boot&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039;&lt;br /&gt;
# Press F10 to save settings&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki%27s_EFI_Install_Guide/Configuring_Secure_Boot Sakaki&#039;s EFI Install Guide/Configuring Secure Boot - Gentoo Wiki]&lt;br /&gt;
* [https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot Unified Extensible Firmware Interface/Secure Boot - ArchWiki]&lt;br /&gt;
* [https://github.com/jirutka/efi-mkuki efi-mkuki: EFI Unified Kernel Image Maker] (used by the {{pkg|secureboot-hook}} package)&lt;br /&gt;
&lt;br /&gt;
[[Category:Booting]]&lt;/div&gt;</summary>
		<author><name>Ziproot</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Wi-Fi&amp;diff=23421</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Wi-Fi&amp;diff=23421"/>
		<updated>2023-05-13T20:11:43Z</updated>

		<summary type="html">&lt;p&gt;Ziproot: /* Prerequisites */ Add note that installing the linux-firmware package tends to produce errors on data disk or diskless modes and to switch to system disk mode.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page describes how to set up a wireless network connection with WPA encryption.&lt;br /&gt;
&lt;br /&gt;
Choose a wireless daemon between {{Pkg|iwd}} and {{Pkg|wpa_supplicant}}&lt;br /&gt;
&lt;br /&gt;
== Prerequisites ==&lt;br /&gt;
&lt;br /&gt;
Working wireless drivers &lt;br /&gt;
{{Note|in most cases installing {{Pkg|linux-firmware}} should get you the required drivers. Installation of this package can produce errors on diskless or data disk modes. If such errors occur, switch to system disk mode.}}&lt;br /&gt;
&lt;br /&gt;
If you are using a &#039;&#039;&#039;Broadcom chipset&#039;&#039;&#039;, see the [[#Broadcom_Wi-Fi_Chipset_Users|Broadcom Wi-Fi section]].)&lt;br /&gt;
&lt;br /&gt;
== iwd ==&lt;br /&gt;
&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] (iNet wireless daemon) is a wireless daemon written by Intel and aiming at replacing {{Pkg|wpa_supplicant}}. The core goal of the project is to optimize resource utilization by not depending on any external libraries and instead utilizing features provided by the Linux Kernel to the maximum extent possible.&lt;br /&gt;
&lt;br /&gt;
{{Pkg|iwd}} is supported since [https://alpinelinux.org/posts/Alpine-3.10.0-released.html Alpine Linux 3.10].&lt;br /&gt;
&lt;br /&gt;
To get started, install {{Pkg|iwd}}:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|apk add iwd}}&lt;br /&gt;
&lt;br /&gt;
To do anything with iwd, it has to be running:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|rc-service iwd start}}&lt;br /&gt;
&lt;br /&gt;
If it was not running, running &amp;lt;code&amp;gt;iwctl ..&amp;lt;/code&amp;gt; commands will print&lt;br /&gt;
&lt;br /&gt;
 The name net.connman.iwd was not provided by any .service files  &lt;br /&gt;
 Failed to retrieve IWD dbus objects, quitting...&lt;br /&gt;
&lt;br /&gt;
and running just &amp;lt;code&amp;gt;iwctl&amp;lt;/code&amp;gt; will say it is waiting for IWD to start.&lt;br /&gt;
&lt;br /&gt;
List your available wifi device(s) (you probably have &#039;&#039;wlan0&#039;&#039;):&lt;br /&gt;
&lt;br /&gt;
{{Cmd|iwctl device list}}&lt;br /&gt;
&lt;br /&gt;
If you don&#039;t know the SSID of your network you can run a scan and retrieve a list of all the detected networks:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|iwctl station wlan0 scan &amp;amp;&amp;amp; iwctl station wlp8s0 get-networks}}&lt;br /&gt;
&lt;br /&gt;
To connect to a network:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|iwctl station wlan0 connect &amp;lt;SSID&amp;gt;}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Note|iwd automatically stores network passphrases in the /var/lib/iwd directory and uses them to auto-connect in the future. If you run diskless Alpine, make sure to include this directory to the apkovl and commit:&lt;br /&gt;
{{Cmd|lbu add /var/lib/iwd &amp;amp;&amp;amp; lbu commit -d}}}}&lt;br /&gt;
&lt;br /&gt;
{{Note|Since version 1.10, iwd supports IPv6, but it is disabled by default. To enable it, add the following to the configuration file:&lt;br /&gt;
{{Cat|/etc/iwd/main.conf|&amp;lt;nowiki&amp;gt;[Network]&lt;br /&gt;
EnableIPv6=true&amp;lt;/nowiki&amp;gt;}}}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, configure {{Pkg|iwd}} and its dependency {{Pkg|dbus}} to start automatically on boot:&lt;br /&gt;
{{Cmd|rc-update add iwd boot &amp;amp;&amp;amp; rc-update add dbus boot}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Add a entry for the desired interface (e.g. {{Path|wlan0}}):&lt;br /&gt;
{{Cat|/etc/network/interfaces|auto wlan0&lt;br /&gt;
iface wlan0 inet dhcp}}&lt;br /&gt;
&lt;br /&gt;
{{Note|You could instead use the iwd&#039;s built-in network configuration by setting {{Path|&amp;lt;nowiki&amp;gt;EnableNetworkConfiguration=true&amp;lt;/nowiki&amp;gt;}} in {{Path|/etc/iwd/main.conf}}}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Manually restart &#039;&#039;&#039;networking&#039;&#039;&#039;:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|rc-service networking restart}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Your wifi interface should now be up and have a dedicated IP adress:&lt;br /&gt;
{{Cmd|ip a show wlan0}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Useful link: [https://wiki.archlinux.org/title/Iwd#Enable_built-in_network_configuration Archlinux wiki page] if you need more specific configuration.&lt;br /&gt;
&lt;br /&gt;
== wpa_supplicant  ==&lt;br /&gt;
&lt;br /&gt;
To get started install {{Pkg|wpa_supplicant}}&lt;br /&gt;
&lt;br /&gt;
{{Cmd|apk add wpa_supplicant}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To list your available network interfaces:&lt;br /&gt;
{{Note|if you don&#039;t see any wireless interfaces (e.g. {{Path|wlan0}}), you probably need to load and/or install drivers/firmware.}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Cmd|ip link}}&lt;br /&gt;
or&lt;br /&gt;
{{Cmd|ip a}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Bring up the desired interface:&lt;br /&gt;
{{Cmd|ip link set wlan0 up}}&lt;br /&gt;
&lt;br /&gt;
{{Note|If this errors with &amp;lt;code&amp;gt;ioctl 0x8914 failed: No error information&amp;lt;/code&amp;gt;, that&#039;s &amp;lt;code&amp;gt;busybox ip&amp;lt;/code&amp;gt;&#039;s way of saying your wireless radio is rfkill&#039;d. See the [[#Rfkill|Rfkill section]] for information on how to unblock your wireless radio.}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Use this command to add your Wi-Fi network to wpa_supplicant:&lt;br /&gt;
{{Cmd|wpa_passphrase &#039;ExampleWifiSSID&#039; &#039;ExampleWifiPassword&#039; &amp;gt; /etc/wpa_supplicant/wpa_supplicant.conf}}&lt;br /&gt;
&#039;&#039;(Access point not broadcasting its SSID requires additional line &amp;lt;code&amp;gt;scan_ssid=1&amp;lt;/code&amp;gt; in the file &amp;lt;code&amp;gt;wpa_supplicant.conf&amp;lt;/code&amp;gt;)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
{{Note|the Wi-Fi SSID and password are case sensitive and the single quote before and after the SSID and password need to be there}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Start wpa_supplicant in the foreground to make sure the connection succeeds.&lt;br /&gt;
{{Cmd|wpa_supplicant -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If all is well, run it as a daemon in the background by setting the {{Path|-B}} option.&lt;br /&gt;
{{Cmd|wpa_supplicant -B -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Configure the interface with an IP address.&lt;br /&gt;
{{Cmd|udhcpc -i wlan0}}&lt;br /&gt;
&lt;br /&gt;
Sanity check: the interface should have a {{Path|inet}} address.&lt;br /&gt;
{{Cmd|ip addr show wlan0}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Automatic Configuration on System Boot  ===&lt;br /&gt;
&lt;br /&gt;
Add a entry for the desired interface (e.g. {{Path|wlan0}}):&lt;br /&gt;
{{Cat|/etc/network/interfaces|auto wlan0&lt;br /&gt;
iface wlan0 inet dhcp}}&lt;br /&gt;
&lt;br /&gt;
{{Note|Dont remove or comment out the &#039;&#039;&#039;auto lo&#039;&#039;&#039; entry}}&lt;br /&gt;
&lt;br /&gt;
Sanity check: Make sure {{Path|/etc/wpa_supplicant/wpa_supplicant.conf}} is the correct configuration for the wireless access point you want to connect to.&lt;br /&gt;
&lt;br /&gt;
Bring the interface down.&lt;br /&gt;
&lt;br /&gt;
{{Cmd|ip link set wlan0 down}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Manually restart (or &#039;&#039;&#039;start&#039;&#039;&#039;) &#039;&#039;&#039;networking&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
{{Cmd|/etc/init.d/networking --quiet restart &amp;amp;}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If all is well (feel free to confirm with the sanity checks), &lt;br /&gt;
&lt;br /&gt;
Configure wpa_supplicant to start automatically on boot:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|# rc-update add wpa_supplicant boot}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also make sure &#039;&#039;&#039;networking&#039;&#039;&#039; is set to automatically start on boot:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|# rc-update add networking boot}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Optional security precaution:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
By default {{Pkg|wpa_supplicant}} will store your Wi-Fi password in plain text:&lt;br /&gt;
&lt;br /&gt;
{{Cat|(Example) /etc/wpa_supplicant/wpa_supplicant.conf|&amp;lt;nowiki&amp;gt;network={&lt;br /&gt;
    ssid=&amp;quot;&amp;lt;YourSSIDShouldBeHere&amp;gt;&amp;quot;&lt;br /&gt;
        #psk=&amp;quot;&amp;lt;YourPasswordShouldBeHereInPlainText&amp;gt;&amp;quot;&lt;br /&gt;
    psk=&amp;lt;RandomLettersAndNumbersShouldBeHere&amp;gt;&lt;br /&gt;
}&amp;lt;/nowiki&amp;gt;}}&lt;br /&gt;
&lt;br /&gt;
this is not necessary and {{Pkg|wpa_supplicant}} should funtion just fine without it, if you dont want your stored password in plain text just delete the line with &amp;lt;code&amp;gt;#psk=&amp;quot;&amp;lt;YourPasswordShouldBeHereInPlainText&amp;gt;&amp;quot;&amp;lt;/code&amp;gt; on it.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Launching udhcpc through wpa_cli actions ==&lt;br /&gt;
&lt;br /&gt;
{{Todo|Figure out if theses two sections are different or connected to one another}}&lt;br /&gt;
&lt;br /&gt;
With the above configuration, udhcpc will only run once at boot.&lt;br /&gt;
If the Wifi isn&#039;t available then, or the network changes in between, it needs to be notified.&lt;br /&gt;
This is done through the wpa_cli action script in /etc/wpa_supplicant/wpa_cli.sh&lt;br /&gt;
&lt;br /&gt;
== Automatic Reconnection when WIFI signal is lost  ==&lt;br /&gt;
To enable automatic reconnection when wifi signal is lost add these to config:&lt;br /&gt;
&lt;br /&gt;
{{Cat|/etc/wpa_supplicant/wpa_supplicant.conf|&amp;lt;nowiki&amp;gt;ap_scan=1&lt;br /&gt;
autoscan=periodic:10&lt;br /&gt;
disable_scan_offload=1&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Cmd|rc-update add wpa_cli boot}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting ==&lt;br /&gt;
&lt;br /&gt;
==== Broadcom Wi-Fi Chipset Users  ====&lt;br /&gt;
&lt;br /&gt;
The Broadcom chipset is quite popular among older computers. The b43 driver is included in the linux-lts or linux-edge kernel packages. However, you might need to compile the firmware manually for this chipset as it is not included in linux-firmware for some cargs. &lt;br /&gt;
&lt;br /&gt;
You can check if you have a Broadcom chipset by using lspci:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|lspci -nn -d 14e4:}}&lt;br /&gt;
&lt;br /&gt;
Now we need fwcutter:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|apk add b43-fwcutter}}&lt;br /&gt;
&lt;br /&gt;
Now we have everything to download the proprietary driver and extract the firmware from it:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
export FIRMWARE_INSTALL_DIR=&amp;quot;/lib/firmware&amp;quot;&lt;br /&gt;
wget http://www.lwfinger.com/b43-firmware/broadcom-wl-5.100.138.tar.bz&lt;br /&gt;
tar xjf broadcom-wl-5.100.138.tar.bz2&lt;br /&gt;
sudo b43-fwcutter -w &amp;quot;$FIRMWARE_INSTALL_DIR&amp;quot; broadcom-wl-5.100.138/linux/wl_apsta.o&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
More information can be found [http://linuxwireless.sipsolutions.net/en/users/Drivers/b43/#Other_distributions_not_mentioned_above here].&lt;br /&gt;
&lt;br /&gt;
Now you need to use modprobe so the device will show up:&lt;br /&gt;
&lt;br /&gt;
{{Cmd|modprobe b43}}&lt;br /&gt;
&lt;br /&gt;
Now continue with the normal instructions. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Rfkill ====&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;See Also: [https://wiki.archlinux.org/title/Network_configuration/Wireless#Rfkill_caveat Network configuration/Wireless#Rfkill caveat - ArchLinux Wiki]&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Many laptops have a hardware button (or switch) to turn off wireless card, however, the card can also be blocked by kernel. This can be changed using rfkill. To show the current of your Wi-Fi: &lt;br /&gt;
&lt;br /&gt;
{{Cat|(example) $ rfkill list|0: phy0: wlan&lt;br /&gt;
    Soft blocked: no&lt;br /&gt;
    Hard blocked: no}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If the card is hard-blocked, use the hardware button or switch to unblock it. If the card is not hard-blocked but soft-blocked, use the following command: &lt;br /&gt;
&lt;br /&gt;
{{Cmd|# rfkill unblock wifi}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
&lt;br /&gt;
* [[Installation#Post-Install|Post Install]]&lt;br /&gt;
* [[Alpine setup scripts]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Networking]]&lt;/div&gt;</summary>
		<author><name>Ziproot</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Installation&amp;diff=23420</id>
		<title>Installation</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Installation&amp;diff=23420"/>
		<updated>2023-05-13T19:49:56Z</updated>

		<summary type="html">&lt;p&gt;Ziproot: Add link to official guide; add warning that this guide is unofficial&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[Image:hdd_mount.png|left|link=]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This page explains the basics to get started. But before actually installing, it can also help to skim through the [[Alpine_Linux:FAQ| Frequenty Asked Questions (FAQ)]]. &lt;br /&gt;
&lt;br /&gt;
NOTE: This is guide is unofficial. Refer to the official installation guide at [https://docs.alpinelinux.org/user-handbook/0.1a/index.html docs.alpinelinux.org].&lt;br /&gt;
&lt;br /&gt;
{{Tip|This is a wiki!&lt;br /&gt;
If something isn&#039;t correct (anymore), or still incomplete, you will have to try figuring it out, or ask for the correct solution in the [https://alpinelinux.org/community/ community].&lt;br /&gt;
&lt;br /&gt;
And then carefully edit the wiki page.&lt;br /&gt;
&lt;br /&gt;
Just as those before you did it for you.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Minimal Hardware Requirements ==&lt;br /&gt;
&lt;br /&gt;
* At least 100 MB of RAM. [A graphical desktop system may require up to 1 GB minimum.]&lt;br /&gt;
* At least 0-700 MB space on a writable storage device. [Only required in &amp;quot;sys&amp;quot; or &amp;quot;data&amp;quot; mode installations (explained below). It is optional in &amp;quot;diskless&amp;quot; mode, where it may be used to save newer data and configurations states of a running system.]&lt;br /&gt;
&lt;br /&gt;
For more information please check [[Requirements]]&lt;br /&gt;
&lt;br /&gt;
== Installation Overview ==&lt;br /&gt;
&lt;br /&gt;
=== The general course of action ===&lt;br /&gt;
{{Note|For single-board-computer (SBC) architectures which can not boot .iso images, see [[Alpine_on_ARM|Alpine on ARM]] for peculiarities.}}&lt;br /&gt;
&lt;br /&gt;
As usual, starting an installation procedure requires some basic steps (additional details for all the steps follow [[Installation#Basic Installation Step Details|below]]):&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Downloading and verifying the proper [https://alpinelinux.org/downloads/ stable-release ISO installation image-file] for the computer&#039;s architecture, and the corresponding &amp;lt;code&amp;gt;sha256&amp;lt;/code&amp;gt; (checksum) and &amp;lt;code&amp;gt;GPG&amp;lt;/code&amp;gt; (signature) files. &lt;br /&gt;
# Either burning the ISO image-file onto a blank CD/DVD/Blu-ray disk with disk burning software, or flashing the installation image onto a bootable storage device (USB-device, CF-/MMC-/SD-card, floppy, ...).&lt;br /&gt;
# Optional boot media customization, e.g. to do the install on a headless system. With alpine, this may be done by first booting the install media either on some computer with keyboard and monitor attached or in a virtual machine, then doing an intermediate &amp;quot;diskless&amp;quot; setup of the boot media (see below), i.e. configuring the network and a ssh server and using &amp;lt;code&amp;gt;[[Alpine_local_backup|lbu commit]]&amp;lt;/code&amp;gt; to save the customized setup in an apkovl file on the boot media (if it is writable, otherwise on a separate storage media).&lt;br /&gt;
# Booting the target computer from the prepared disk or storage device.&lt;br /&gt;
&lt;br /&gt;
The boot process of the alpine installation image first copies the entire operating system into the RAM memory, and then already starts a complete Alpine Linux system from there. It will initially only provide a basic command line environment that does not depend on reading from any (possibly slow) initial boot media, anymore.&lt;br /&gt;
&lt;br /&gt;
Local log-in is possible as the user &amp;lt;code&amp;gt;root&amp;lt;/code&amp;gt;. Initially, the root user has no password.&lt;br /&gt;
&lt;br /&gt;
At the command prompt, an interactive script named &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; is available to configure and install the initial Alpine Linux system.&lt;br /&gt;
&lt;br /&gt;
The question-and-answer dialog of &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; takes care of the base configuration and allows to configure the system to&amp;lt;/br&amp;gt;&lt;br /&gt;
boot into one of three different &#039;&#039;&#039;Alpine Linux disk modes&#039;&#039;&#039;: &#039;&#039;&#039;&amp;quot;diskless&amp;quot;&#039;&#039;&#039;, &#039;&#039;&#039;&amp;quot;data&amp;quot;&#039;&#039;&#039;, or &#039;&#039;&#039;&amp;quot;sys&amp;quot;&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
These modes are explained in more detail in the following subsections.&lt;br /&gt;
&lt;br /&gt;
{{Note|It can be helpful to know that it is possible to first only complete a base configuration of the initial &amp;quot;diskless&amp;quot; installation system in order to to prepare the system. For example, to download and install some specific driver or software tool. And then use more specific [[Alpine_setup_scripts|setup-scripts]] afterwards, to proceed with the final installation. The base configuration of the &amp;quot;diskless&amp;quot; system may be completed by running &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; and answering &amp;quot;none&amp;quot; when asked for the disk to use, and where to store configs, as well as for the location for the package cache.&lt;br /&gt;
&lt;br /&gt;
Examples of preparation options:&lt;br /&gt;
&lt;br /&gt;
* Preparing a custom partitioning or filesystem scheme that avoids to use and/or overwrite an entire disk ([[Installation#Custom_partitioning_of_the_harddisk|details below]]).&lt;br /&gt;
* Installing something that may be missing in the live system to configure the hardware, e.g. by using the alpine package manager &amp;lt;code&amp;gt;[[Alpine_Package_Keeper|apk]]&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Examples of proceeding options:&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-lbu|setup-lbu]]&amp;lt;/code&amp;gt; to configure a &amp;quot;local backup&amp;quot; location for the diskless system, and &amp;lt;code&amp;gt;[[Alpine_local_backup|lbu commit]]&amp;lt;/code&amp;gt; to then save the local configuration state.&lt;br /&gt;
* &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-apkcache|setup-apkcache]]&amp;lt;/code&amp;gt; to configure a local package cache storage location.&lt;br /&gt;
* &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-disk|setup-disk]]&amp;lt;/code&amp;gt; to add a &amp;quot;data&amp;quot; mode partition, or do a classic full install of the &amp;quot;diskless&amp;quot; system onto a &amp;quot;sys&amp;quot; disk or partition.&lt;br /&gt;
&lt;br /&gt;
There are many more [[Alpine_setup_scripts|setup-scripts]] available. All these tools may also be run later to adjust specific configurations. For example, to set up a graphical environment as covered under [[Installation#Post-Installation|Post-Installation]] below.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Diskless Mode&#039;&#039;&#039;=== &lt;br /&gt;
This means the entire operating system with all applications are first loaded into RAM and then only run from there. This is the method already used to boot the .iso installation images, however &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; can also configure the installed system to continue to boot like this if &amp;quot;disk=none&amp;quot; is specified. The mode is extremely fast and can save on unnecessary disk spin-ups, power, and wear. It is similar to what other linux distributions may call a &amp;quot;frugal&amp;quot; install or boot into with a &amp;quot;toram&amp;quot; option. &lt;br /&gt;
&lt;br /&gt;
Custom configurations and package installations may optionally still be preserved or &amp;quot;persist&amp;quot; across reboots by using the Alpine local backup tool &amp;lt;code&amp;gt;[[Alpine_local_backup|lbu]]&amp;lt;/code&amp;gt;. It enables committing and reverting system states by using .apkovl files that are saved to writable storage and loaded when booting. If additional or updated packages have been added to the system, these may also be made available for automatic (re)installation during the boot phase without any (re)downloading, by enabling a [[Alpine_Package_Keeper#Local_Cache|local package cache]] on the writable storage.&lt;br /&gt;
&lt;br /&gt;
[[https://gitlab.alpinelinux.org/alpine/alpine-conf/-/issues/10473 FIXME-1]: Storing local configs and the package cache on an &#039;&#039;internal&#039;&#039; disk still requires [[Alpine_local_backup#Saving_and_loading_ISO_image_customizations|some manual steps]] to have the partition listed, i.e. making a /etc/fstab entry, mountpoint, and mount, *before* running setup-alpine. The linked workaround also still requires to commit these configurations to disk manually before rebooting.]&lt;br /&gt;
&lt;br /&gt;
If a writable partition is available, &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; can be told to store the configs and the package cache on that writable partition. (Later, another directory on that same partition or another available partition may also be mounted as /home, or for example, for selected important applications to keep their run-time and user data on it.)&lt;br /&gt;
&lt;br /&gt;
The boot device of the newly configured local &amp;quot;diskless&amp;quot; system may remain the initial (and possibly read-only) installation media. But it is also possible to copy the boot system to a partition (e.g. /dev/sdXY) with &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-bootable|setup-bootable]]&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;Data Disk Mode&#039;&#039;&#039;=== &lt;br /&gt;
This mode also runs from system RAM, thus it enjoys the same accelerated operation speed as &amp;quot;diskless&amp;quot; mode. However, swap storage and the entire {{Path|/var}} directory tree get mounted from a persistent storage device (two newly created partitions). The directory {{Path|/var}} holds e.g. all log files, mailspools, databases, etc., as well as &amp;lt;code&amp;gt;[[Alpine_local_backup|lbu]]&amp;lt;/code&amp;gt; backup commits and the package cache. This mode is useful for having RAM accelerated servers with variable amounts of user-data that exceed the available RAM size. It enables the entire current system state (not just the boot state) to survive a system crash in accordance with the particular filesystem guarantees. &lt;br /&gt;
&lt;br /&gt;
[[https://gitlab.alpinelinux.org/alpine/alpine-conf/-/issues/10474 FIXME-2]]: Setup-alpine will create the data partition and mount it as /var, but can not yet configure lbu storage settings automatically. It is currently necessary to select &amp;quot;none&amp;quot; at the &#039;where to store configs&#039; prompt (the new data partition is not listed) and configure lbu manually, i.e. after running &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; and before rebooting:&lt;br /&gt;
&lt;br /&gt;
# Identify the created data partition, e.g. &amp;lt;code&amp;gt;/dev/sd&#039;&#039;XY&#039;&#039;&amp;lt;/code&amp;gt;, and its filesystemtype, e.g. using &amp;lt;code&amp;gt;&#039;&#039;lsblk&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
# Manually edit the lbu backups location in &amp;lt;code&amp;gt;/etc/lbu/lbu.conf&amp;lt;/code&amp;gt; and configure &amp;lt;code&amp;gt;LBU_MEDIA=sd&#039;&#039;XY&#039;&#039;&amp;lt;/code&amp;gt; (according to previous findings).&lt;br /&gt;
# Save the configuration on that partition for the next boot with &amp;lt;code&amp;gt;lbu commit&amp;lt;/code&amp;gt;.&lt;br /&gt;
# If (a new) partition fails to get mounted, execute: &amp;lt;code&amp;gt;mkdir /media/&#039;&#039;sdXY&#039;&#039; ; echo &amp;quot;/dev/sd&#039;&#039;XY&#039;&#039; /media/sd&#039;&#039;XY&#039;&#039; &#039;&#039;fstype&#039;&#039; noauto,rw 0 0&amp;quot; &amp;gt;&amp;gt; /etc/fstab&amp;lt;/code&amp;gt;, and try &amp;lt;code&amp;gt;lbu commit&amp;lt;/code&amp;gt; again.&lt;br /&gt;
&lt;br /&gt;
In data disk mode, the boot device may also remain the initial (and possibly read-only) installation media, or be copied to a partition (e.g. /dev/sdXY) with &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-bootable|setup-bootable]]&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;System Disk Mode&#039;&#039;&#039;=== &lt;br /&gt;
This is a traditional hard-disk install.&lt;br /&gt;
&lt;br /&gt;
If this mode is selected, the &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; script creates three partitions on the selected storage device, {{Path|/boot}}, {{Path|swap}} and {{Path|/}} (the filesystem root). This mode may, for example, be used for generic [[:Category:Desktop|desktop]] and development machines.&lt;br /&gt;
&lt;br /&gt;
For custom partitioning, see [[Setting up disks manually]].&lt;br /&gt;
&lt;br /&gt;
To install along side another operating systems, see [[Dualbooting]].&lt;br /&gt;
&lt;br /&gt;
== Basic Installation Step Details ==&lt;br /&gt;
&lt;br /&gt;
{{Expand|  }}&lt;br /&gt;
&lt;br /&gt;
This &amp;quot;Additional Details&amp;quot; section needs to be consolidated with the work at &#039;&#039;&#039;[https://docs.alpinelinux.org https://docs.alpinelinux.org] (not finished)&#039;&#039;&#039; &lt;br /&gt;
(Restructuring things there, moving and linking from here or there?). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Verifying the downloaded image-file ===&lt;br /&gt;
&lt;br /&gt;
{|  class=&amp;quot;wikitable&amp;quot; style=&amp;quot;width:95%; align=center&amp;quot;&lt;br /&gt;
|+ Commands to verify the checksum and GPG signature of a downloaded image-file on different systems.&lt;br /&gt;
|-&lt;br /&gt;
! width=100px |  OS type&lt;br /&gt;
!  &amp;lt;code&amp;gt;SHA256&amp;lt;/code&amp;gt; check !! &amp;lt;code&amp;gt;SHA256&amp;lt;/code&amp;gt; calculation (to be compared manually) !! &amp;lt;code&amp;gt;GPG&amp;lt;/code&amp;gt; signature verification&lt;br /&gt;
|-&lt;br /&gt;
! Linux&lt;br /&gt;
| &amp;lt;code&amp;gt;sha256sum -c alpine-*.iso.sha256&amp;lt;/code&amp;gt; ||        || &amp;lt;code&amp;gt;curl https://alpinelinux.org/keys/ncopa.asc &amp;amp;#124; gpg --import ;&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt; gpg --verify alpine-&amp;lt;version&amp;gt;.iso.asc alpine-&amp;lt;version&amp;gt;.iso&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! MACOS  &lt;br /&gt;
| - ? -  || &amp;lt;code&amp;gt;shasum -a 256 alpine-*.iso&amp;lt;/code&amp;gt; || - ? -&lt;br /&gt;
|-&lt;br /&gt;
! OpenBSD  &lt;br /&gt;
| &amp;lt;code&amp;gt;sha256 -C alpine-*.sha256 alpine-*.iso&amp;lt;/code&amp;gt; ||        || &amp;lt;code&amp;gt;doas pkg_add gnupg;&lt;br /&gt;
ftp -o - https://alpinelinux.org/keys/ncopa.asc &amp;amp;#124; gpg --import ;&lt;br /&gt;
gpg --verify alpine-&amp;lt;version&amp;gt;.iso.asc alpine-&amp;lt;version&amp;gt;.iso&amp;lt;/code&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! FreeBSD  &lt;br /&gt;
| - ? - || &amp;lt;code&amp;gt;/usr/local/bin/shasum -a 256 alpine-*.iso&amp;lt;/code&amp;gt; || - ? -&lt;br /&gt;
|-&lt;br /&gt;
! NetBSD  &lt;br /&gt;
| - ? - || &amp;lt;code&amp;gt;/usr/local/bin/shasum -a 256 alpine-*.iso&amp;lt;/code&amp;gt; || - ? -&lt;br /&gt;
|-&lt;br /&gt;
! Windows (PowerShell installed)&lt;br /&gt;
|                 - ? -             || &amp;lt;code&amp;gt;Get-FileHash .\alpine-&amp;lt;image-version&amp;gt;.iso -Algorithm SHA256&amp;lt;/code&amp;gt; || - ? -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Flashing (direct data writing) the installation image-file onto a device or media  ===&lt;br /&gt;
&lt;br /&gt;
==== Unix/Linux ====&lt;br /&gt;
&lt;br /&gt;
Under Unix (and thus Linux), &amp;quot;everything is a file&amp;quot; and the data in the image-file can be written to a device or media with the &amp;lt;code&amp;gt;dd&amp;lt;/code&amp;gt; command. Afterward, executing the &amp;lt;code&amp;gt;eject&amp;lt;/code&amp;gt; command removes the target device from the system and ensures the write cache is completely flushed.&lt;br /&gt;
&lt;br /&gt;
 dd if=&amp;lt;iso-file-to-read-in&amp;gt; of=&amp;lt;target-device-node-to-write-out-to&amp;gt; bs=4M oflag=sync status=progress; eject &amp;lt;target-device-node-to-write-to&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Be careful to correctly identify the target device as any data on it &#039;&#039;&#039;will&#039;&#039;&#039; be lost! All connected &amp;quot;bulk storage devices&amp;quot; can be listed with &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;lsblk&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;blkid&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
 # lsblk&lt;br /&gt;
 NAME            MAJ:MIN RM   SIZE RO TYPE  MOUNTPOINT&lt;br /&gt;
 sdX               0:0    0  64,0G  0 disk  &lt;br /&gt;
 ├─sdX1            0:1    0     2G  0 part  &lt;br /&gt;
 └─sdX2            0:2    0    30G  0 part  /mnt/sdX2&lt;br /&gt;
 &lt;br /&gt;
 # blkid&lt;br /&gt;
 /dev/sdX1: LABEL=&amp;quot;some&amp;quot; UUID=&amp;quot;...&amp;quot; TYPE=&amp;quot;vfat&amp;quot;&lt;br /&gt;
 /dev/sdX2: LABEL=&amp;quot;other&amp;quot; UUID=&amp;quot;...&amp;quot; TYPE=&amp;quot;ext4&amp;quot;&lt;br /&gt;
&lt;br /&gt;
For example, if /dev/sdX is the desired target device, first make sure you un-mount all mounted partitions of the target device. For example sdX1 and sdX2:&lt;br /&gt;
&lt;br /&gt;
 umount  /dev/sdX1  /dev/sdX2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For &amp;lt;code&amp;gt;dd&amp;lt;/code&amp;gt;&#039;s output-file (&amp;lt;code&amp;gt;of=&amp;lt;/code&amp;gt;), however, do &#039;&#039;&#039;not&#039;&#039;&#039; specify a partition number. For example, write to sdX, &#039;&#039;&#039;not&#039;&#039;&#039; sdX1:&lt;br /&gt;
&lt;br /&gt;
Warning: &#039;&#039;&#039;This will overwrite the target device /dev/sdX&#039;&#039;&#039;, so before executing, make sure you have a backup of the data if you can&#039;t afford to lose it.&lt;br /&gt;
&lt;br /&gt;
 dd if=~/Downloads/alpine-standard-3.00.0-x86_64.iso of=/dev/sdX bs=4M oflag=sync status=progress; eject /dev/sdX&lt;br /&gt;
&lt;br /&gt;
==== Windows ====&lt;br /&gt;
&lt;br /&gt;
For example, there is the [https://rufus.ie/ Rufus] program. Rufus will enable you to create bootable USB flash drives under Windows. &lt;br /&gt;
&lt;br /&gt;
Rufus has been tested and works for Alpine Linux 3.12.x with the following settings:&lt;br /&gt;
* &#039;&#039;&#039;Partition scheme&#039;&#039;&#039;: &amp;lt;code&amp;gt;MBR&amp;lt;/code&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Target system&#039;&#039;&#039;: &amp;lt;code&amp;gt;BIOS or UEFI&amp;lt;/code&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;File system&#039;&#039;&#039;: &amp;lt;code&amp;gt;FAT32&amp;lt;/code&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Cluster size&#039;&#039;&#039;: &amp;lt;code&amp;gt;4096 bytes (default)&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===  Verifying the written installation media ===&lt;br /&gt;
&lt;br /&gt;
After detaching and re-attaching the device, a bit-wise comparison can verify the data written to the device (instead of just data buffered in RAM). If the comparison terminates with an end-of-file error on the .iso file side, all the contents from the image have been written (and re-read) successfully:&lt;br /&gt;
&lt;br /&gt;
 # cmp ~/Downloads/alpine-standard-3.00.0-x86_64.iso /dev/sdX&lt;br /&gt;
 cmp: EOF on alpine-standard-3.00.0-x86_64.iso&lt;br /&gt;
&lt;br /&gt;
=== Booting from external devices ===&lt;br /&gt;
&lt;br /&gt;
Insert the boot media to a proper drive or port of the computer and turn the machine on, or restart it, if already running.&lt;br /&gt;
&lt;br /&gt;
If the computer does not automatically boot from the desired device, one needs to bring up the boot menu and choose the media to boot from. Depending on the computer, the menu may be accessed by repeatedly pressing a key quickly when booting starts. Some computers require that you press the button &#039;&#039;before&#039;&#039; starting the computer and hold it down while the computer boots. Typical keys are:  `F9`-`F12`, sometimes `F7` or `F8`. If these don&#039;t bring up the boot menu, it may be necessary to enter the BIOS configuration and adjust the boot settings, for which typical keys are: `Del.` `F1` `F2` `F6` or `Esc.`&lt;br /&gt;
&lt;br /&gt;
=== Custom partitioning of the harddisk ===&lt;br /&gt;
&lt;br /&gt;
It is possible to specify configurations for RAID, encryption, LVM, etc. as well as manual partitioning.&lt;br /&gt;
&lt;br /&gt;
For &amp;quot;diskless&amp;quot; or &amp;quot;data disk&amp;quot; mode installs, manual partitioning may be needed to prepare the harddisk for committing local backups of the system state with &amp;lt;code&amp;gt;[[Alpine_local_backup|lbu commit]]&amp;lt;/code&amp;gt;, to have a place for a package cache, or to use it for a /var mount. &lt;br /&gt;
&lt;br /&gt;
For a &amp;quot;sys&amp;quot; install, custom partitioning is needed only if the desired scheme differs from overwriting an entire disk, or using the default set of a /boot, swap and root partition on the disk.&lt;br /&gt;
&lt;br /&gt;
See [[Setting up disks manually]] for the alpine options for RAID, encryption, LVM, etc. and manual partitioning.&lt;br /&gt;
&lt;br /&gt;
=== Questions asked by &amp;lt;code&amp;gt;setup-alpine&amp;lt;/code&amp;gt; ===&lt;br /&gt;
[[File:Installation-alpine-alpine-setup-3-setup-scripts.png|350px|thumb|right|Example &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; session]]&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; script offers the following configuration options:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Keyboard Layout&#039;&#039;&#039; (Local keyboard language and usage mode, e.g. &#039;&#039;us&#039;&#039; and variant of &#039;&#039;us-nodeadkeys&#039;&#039;.)&lt;br /&gt;
* &#039;&#039;&#039;Hostname&#039;&#039;&#039; (The name for the computer.)&lt;br /&gt;
* &#039;&#039;&#039;Network&#039;&#039;&#039; (For example, automatic IP address discovery with the &amp;quot;DHCP&amp;quot; protocol.)&lt;br /&gt;
* &#039;&#039;&#039;DNS Servers&#039;&#039;&#039; (Domain Name Servers to query. For privacy reasons it is NOT recommended to route every local request to servers like google&#039;s &amp;lt;s&amp;gt;8.8.8.8&amp;lt;/s&amp;gt; .)&lt;br /&gt;
* &#039;&#039;&#039;Timezone&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Proxy&#039;&#039;&#039; (Proxy server to use for accessing the web. Use &amp;quot;none&amp;quot; for direct connections to the internet.)&lt;br /&gt;
* &#039;&#039;&#039;Mirror&#039;&#039;&#039; (From where to download packages. Choose the organization you trust giving your usage patterns to.)&lt;br /&gt;
* &#039;&#039;&#039;SSH&#039;&#039;&#039; (Secure SHell remote access server. &amp;quot;Openssh&amp;quot; is part of the default install image. Use &amp;quot;none&amp;quot; to disable remote login, e.g. on laptops.)&lt;br /&gt;
* &#039;&#039;&#039;NTP&#039;&#039;&#039; (Network Time Protocol client used for keeping the system clock in sync with a time server. Package &amp;quot;chrony&amp;quot; is part of the default install image.)&lt;br /&gt;
* &#039;&#039;&#039;Disk Mode&#039;&#039;&#039; (Select between diskless (disk=&amp;quot;none&amp;quot;), &amp;quot;data&amp;quot; or &amp;quot;sys&amp;quot;, as described above.) &lt;br /&gt;
  {{Warning|The data on a chosen device will be overwritten!}}&lt;br /&gt;
&lt;br /&gt;
=== Preparing for the first boot ===&lt;br /&gt;
&lt;br /&gt;
If &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-alpine|setup-alpine]]&amp;lt;/code&amp;gt; has finished configuring the &amp;quot;sys&amp;quot; disk mode, the system should be ready to reboot right away (see next subsection).&lt;br /&gt;
&lt;br /&gt;
If the new local system was configured to run in &amp;quot;diskless&amp;quot; or &amp;quot;data&amp;quot; mode, and you do not want keep booting from the initial (and possibly read-only) installation media, the boot system needs to be copied to another device or partition.&lt;br /&gt;
&lt;br /&gt;
The target partition may be identified using &amp;lt;code&amp;gt;&amp;lt;nowiki&amp;gt;lsblk&amp;lt;/nowiki&amp;gt;&amp;lt;/code&amp;gt; (after installing it with &amp;lt;code&amp;gt;apk add lsblk&amp;lt;/code&amp;gt;) and/or &amp;lt;code&amp;gt;blkid&amp;lt;/code&amp;gt;, similar to previously identifying the initial installation media device.&lt;br /&gt;
&lt;br /&gt;
The procedure to copy the boot system is explained at &amp;lt;code&amp;gt;[[Alpine_setup_scripts#setup-bootable|setup-bootable]]&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Once everything is in place, save your customized configuration with &amp;lt;code&amp;gt;lbu commit&amp;lt;/code&amp;gt; before rebooting.&lt;br /&gt;
&lt;br /&gt;
=== Rebooting and testing the new system ===&lt;br /&gt;
&lt;br /&gt;
First, remove the initial installation media from the boot drive, or detach it from the port it&#039;s connected to.&lt;br /&gt;
&lt;br /&gt;
The system may now be power-cycled or rebooted to confirm everything is working correctly.&lt;br /&gt;
&lt;br /&gt;
The relevant commands for this are &amp;lt;code&amp;gt;poweroff&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;reboot&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Completing the installation ===&lt;br /&gt;
&lt;br /&gt;
The installation script installs only the base operating system. &#039;&#039;&#039;No&#039;&#039;&#039; applications e.g. web server, mail server, desktop environment, or web browser are installed, and &amp;lt;code&amp;gt;root&amp;lt;/code&amp;gt; is the only user.&lt;br /&gt;
&lt;br /&gt;
Please look under [[Installation#Post-Installation|Post-Installation]] below, for some common things to do after installation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Further Installation Instructions =&lt;br /&gt;
&lt;br /&gt;
{{Note| Specific topics should be kept on separate, individually manageable topic-pages and only get listed with a direct reference (link) on this general page.}}&lt;br /&gt;
&lt;br /&gt;
=== Installation ===&lt;br /&gt;
&lt;br /&gt;
* [[Kernels]] &#039;&#039;(kernel selection, e.g. for VMs or RPi)&#039;&#039;&lt;br /&gt;
* [[How to make a custom ISO image with mkimage]] &#039;&#039;(installation media with its own configuration)&#039;&#039;&lt;br /&gt;
* [[Directly booting an ISO file]] &#039;&#039;(without flashing it to a disk or device)&#039;&#039;&lt;br /&gt;
* [[Dualbooting|Dual/multi-boot install to HDD partition]]&lt;br /&gt;
* [[Netboot Alpine Linux using iPXE]]&lt;br /&gt;
Also see other [[:Category:Installation|Installation Category]] pages.&lt;br /&gt;
&lt;br /&gt;
=== Post-Installation ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- COMMENT FOR EDITORS&lt;br /&gt;
&lt;br /&gt;
If you edit Post-Install,&lt;br /&gt;
&lt;br /&gt;
  * Consider that there are already [[Tutorials_and_Howtos#Post-Install]], [[Developer_Documentation#Package_management]] and the Handbook, please work towards reducing duplication and providing an overview, and maintaining topic details of considerable size on their own pages.&lt;br /&gt;
  * Here, only the most relevant jumping off points are listed, not exact list duplicates!!!&lt;br /&gt;
  * Keep short-list of links here, as overview to more detailed topic specific pages.&lt;br /&gt;
  * Don&#039;t aggregate different topics at yet another place.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[Setting up a new user]] &#039;&#039;(to allow remote, console, or graphical logins)&#039;&#039;&lt;br /&gt;
* [[Tutorials_and_Howtos#Networking_2|Setting up Networking]] &#039;&#039;(including non-standard configurations)&#039;&#039;&lt;br /&gt;
* [[Alpine_Package_Keeper|Package Management (apk)]] &#039;&#039;(how to search/add/del packages etc.)&#039;&#039;&lt;br /&gt;
** [[Alpine_Package_Keeper#Upgrade_a_Running_System|Upgrading Alpine]] &#039;&#039;(checking for and installing updates)&#039;&#039;&lt;br /&gt;
** [[Repositories#Managing_repositories|Enable the community repository]] &#039;&#039;(access to additional packages)&#039;&#039;&lt;br /&gt;
* [[Alpine_Linux:FAQ#Why_don.27t_I_have_man_pages_or_where_is_the_.27man.27_command.3F|man command/man pages]]&lt;br /&gt;
* [[Change default shell]]&lt;br /&gt;
* [[Running glibc programs]] &#039;&#039;(installation and development)&#039;&#039;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Alpine_local_backup|Local backup utility &amp;lt;code&amp;gt;lbu&amp;lt;/code&amp;gt;]] &#039;&#039;(persisting RAM system configurations)&#039;&#039;&lt;br /&gt;
** [[Back Up a Flash Memory Installation]] &#039;&#039;(&amp;quot;diskless mode&amp;quot; systems)&#039;&#039;&lt;br /&gt;
** [[Manually_editing_a_existing_apkovl]] &#039;&#039;(the stored custom configs)&#039;&#039;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[OpenRC|Init System (OpenRC)]] &#039;&#039;(configure a service to automatically boot at next reboot)&#039;&#039;&lt;br /&gt;
** [[Writing Init Scripts]]&lt;br /&gt;
** [[Multiple Instances of Services]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Alpine setup scripts#setup-xorg-base|&amp;lt;code&amp;gt;setup-xorg-base&amp;lt;/code&amp;gt;]] &#039;&#039;(setup graphical base environment)&#039;&#039;&lt;br /&gt;
** [[Tutorials_and_Howtos#Desktop|Desktop Environments]]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Hosting services on Alpine]] &#039;&#039;(links to several mail/web/ssh server setup pages)&#039;&#039;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[How to get regular stuff working]] &#039;&#039;(things one may miss in a too lightweight installation )&#039;&#039;&lt;br /&gt;
* Running applications and services in their own [[Firejail Security Sandbox]]&lt;br /&gt;
&lt;br /&gt;
=== Broader Usage Guides ===&lt;br /&gt;
&lt;br /&gt;
* See: [[Tutorials and Howtos]]&lt;br /&gt;
&lt;br /&gt;
= General Documentation =&lt;br /&gt;
&lt;br /&gt;
{{Tip| Alpine Linux packages stay close to the upstream design. Therefore, all upstream documentation about configuring a software package, as well as good configuration guides from other distributions that stay close to upstream, e.g. those in the [https://wiki.archlinux.org/ ArchWiki], are to a large degree, also applicable to configuring the software on Alpine Linux, thus can be very useful.}}&lt;br /&gt;
&lt;br /&gt;
* [[Alpine_Linux:FAQ|FAQs]]&lt;br /&gt;
* [[Alpine_Linux:Contribute|How to Contribute]]&lt;br /&gt;
* [[:Category_talk:Developer_Documentation|Developer Documentation]]&lt;br /&gt;
* [[Alpine_Linux:Wiki_etiquette|Wiki etiquette]] &#039;&#039;(to collaborate on this documentation)&#039;&#039;&lt;br /&gt;
* [[Comparison with other distros]] &#039;&#039;(how common things are done on Alpine)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[Category:Installation]]&lt;/div&gt;</summary>
		<author><name>Ziproot</name></author>
	</entry>
</feed>