LVM on LUKS: Difference between revisions
Clandmeter (talk | contribs) |
(Fixed some errors, made the page easier to read, fleshed out GPT/UEFI instructions, added more sources for further reading.) |
||
Line 1: | Line 1: | ||
= Introduction = | = Introduction = | ||
This documentation describes how to set up Alpine Linux | This documentation describes how to set up Alpine Linux on a fully encrypted disk (apart from the bootloader's partition). We will have an LVM container installed inside an encrypted partition. To encrypt the partition containing the LVM volume group, dm-crypt (which is managed by the <code>cryptsetup</code> command) and its LUKS subsystem is used. | ||
Note that | Note that your <code>/boot/</code> partition must be non-encrypted to work with Syslinux. When using GRUB2 it is possible to boot from an encrypted partition to provide a layer of protection from [https://en.wikipedia.org/wiki/Evil_maid_attack Evil Maid attacks], but Syslinux doesn't support this. | ||
== | == Storage Device Name == | ||
The following documentation uses the <code> | To find your storage device's name, you could either install <code>util-linux</code> (<code>apk add util-linux</code>) and find your device using the <code>lspci</code> command, or you could make an educated guess by using BusyBox's <code>blkid</code> and <code>df</code> commands, and running <code>ls /dev/sd*</code> if you are installing to a USB, SATA or SCSI device, <code>ls /dev/fd*</code> for floppy disks and <code>ls /dev/hd*</code> for IDE (PATA) devices. | ||
The following documentation uses the <code>/dev/sda</code> device as installation destination. If your environment uses a different device name for your storage device, use the corresponding device names in the examples. | |||
= Setting up Alpine Linux Using LVM on Top of a LUKS Partition = | = Setting up Alpine Linux Using LVM on Top of a LUKS Partition = | ||
Line 17: | Line 19: | ||
Before you begin to install Alpine Linux, prepare the temporary environment: | Before you begin to install Alpine Linux, prepare the temporary environment: | ||
Boot the latest Alpine Linux Installation CD. At the login prompt, use the <code>root</code> user without a password to log in. Now we will follow the [[Setup-alpine]] script and make our changes along the way. | |||
Run the scripts in this order: | |||
<pre># setup-keymap | |||
# setup-hostname | |||
# setup-interfaces | |||
# rc-service networking start</pre> | |||
< | If you are configuring static networking (you didn't configure any interfaces to use DHCP), run <code>setup-dns</code>. | ||
<pre># passwd | |||
# setup-timezone | |||
# rc-update add networking boot | |||
# rc-update add urandom boot | |||
# rc-update add acpid default | |||
# rc-service acpid start</pre> | |||
Edit your {{Path|/etc/hosts}} to look like this, replacing <hostname> with your hostname and <domain> with your TLD (if you don't have a TLD, use 'localdomain': | |||
{{Tip|The default text editor in BusyBox is <code>vi</code> (pronounced ''vee-eye'').}} | |||
{{Cat|/etc/hosts|127.0.0.1 <hostname> <hostname>.<domain> localhost localhost.localdomain | |||
::1 <hostname> <hostname>.<domain> localhost localhost.localdomain}} | |||
<pre># setup-apkrepos | |||
# apk update | |||
# setup-sshd | |||
# setup-ntp</pre> | |||
Now we will deviate from the install script. | |||
Install the following packages required to set up LVM and LUKS: | |||
< | {{Note|The <code>parted</code> partition editor is needed for advanced partitioning and GPT disklabels. BusyBox <code>fdisk</code> is a very stripped-down version with minimal functionality}} | ||
<pre># apk add lvm2 cryptsetup e2fsprogs parted</pre> | |||
< | Optionally, if you want to overwrite your storage with random data first, install <code>haveged</code>, which is a random number generator based on hardware events and has a higher throughput than <code>/dev/urandom</code>: | ||
<pre># apk add haveged | |||
# rc-service haveged start</pre> | |||
== Creating the Partition Layout == | |||
=== BIOS/MBR with DOS disklabel === | |||
< | We will be partitioning the storage device with a non-encrypted <code>/boot</code> partition for use with the Syslinux bootloader. Syslinux is meant for use with legacy BIOS and the MSDOS MBR partition table. Syslinux does support GPT partition tables but GRUB2 is the better option for UEFI. | ||
</ | |||
<pre>+---------------------------+------------------------+-----------------------+ | |||
| Partition name | Partition purpose | Filesystem type | | |||
+---------------------------+------------------------+-----------------------+ | |||
| /dev/sda1 | Boot partition | ext4 | | |||
| /dev/sda2 | LUKS container | LUKS | | |||
| |-> /dev/mapper/lvmcrypt | LVM container | LVM | | |||
| |-> /dev/vg01/root | Root partition | ext4 | | |||
| |-> /dev/vg01/swap | Swap partition | swap | | |||
+---------------------------+------------------------+-----------------------+</pre> | |||
{{Warning|This will delete your previous partitioning table and make your data very hard to recover. If you want to dual boot, stop here and ask an expert.}} | |||
Create an approx. 100MB partition to boot off, then assign the rest of the space to your LUKS partition. | |||
<pre># parted -a optimal | |||
(parted) mklabel msdos | |||
(parted) mkpart primary ext4 0% 100M | |||
(parted) name 1 boot | |||
(parted) set 1 boot on | |||
(parted) mkpart primary ext4 100M 100% | |||
(parted) name 2 crypto-luks</pre> | |||
To view your partition table, type <code>print</code> while still in <code>parted</code>. Your results should look something like this: | |||
<pre>(parted) print | |||
Model: ATA TOSHIBA ******** (scsi) | |||
Disk /dev/sda: 1000GB | |||
Sector size (logical/physical): 512B/4096B | |||
Partition Table: msdos | |||
Disk Flags: | |||
Number Start End Size Type File system Flags | |||
1 1049kB 99.6MB 98.6MB primary ext4 boot | |||
2 99.6MB 1000GB 1000GB primary ext4</pre> | |||
=== UEFI with GPT disklabel === | |||
We will be encrypting the whole disk but the EFI system partition mounted at <code>/boot/efi</code>. This means that GRUB2 will decrypt the LUKS volume and load the kernel from there, preventing someone with physical access to your computer from maliciously installing a rootkit (or bootkit) in your boot partition while your computer is not already unlocked. The partitioning scheme will look like this: | |||
<pre>+---------------------------+------------------------+-----------------------+ | |||
| Partition name | Partition purpose | Filesystem type | | |||
+---------------------------+------------------------+-----------------------+ | |||
| /dev/sda1 | EFI system partition | fat32 | | |||
| /dev/sda2 | LUKS container | LUKS | | |||
| |-> /dev/mapper/lvmcrypt | LVM container | LVM | | |||
| |-> /dev/vg01/root | Root partition | ext4 | | |||
| |-> /dev/vg01/boot | Boot partition | ext4 | | |||
| |-> /dev/vg01/swap | Swap partition | swap | | |||
+---------------------------+------------------------+-----------------------+</pre> | |||
{{Warning|This will delete your previous partitioning table and make your data very hard to recover. If you want to dual boot, stop here and ask an expert.}} | |||
Create an approx. 200MB EFI system partition, then assign the rest of the space to your LUKS partition. | |||
<pre> | <pre># parted -a optimal | ||
(parted) mklabel gpt | |||
(parted) mkpart primary fat32 0% 200M | |||
(parted) name 1 esp | |||
</pre> | (parted) set 1 esp on | ||
(parted) mkpart primary ext4 200M 100% | |||
(parted) name 2 crypto-luks</pre> | |||
== Optional: Overwrite LUKS Partition with Random Data == | |||
This should be done if your hard drive wasn't encrypted previously. It helps purge old, non-encrypted data and makes it harder for an attacker to work out how much data you have on your drive if they have access to the encrypted contents. | |||
< | We will be using <code>haveged</code> as it is considerably faster than <code>/dev/urandom</code> when generating pseudo-random numbers (it's almost as high as <code>/dev/zero</code> in throughput), and is (supposedly) very close to truly random. | ||
<pre># haveged -n 0 | dd of=/dev/sda2</pre> | |||
== Encrypting the LVM Physical Volume Partition == | == Encrypting the LVM Physical Volume Partition == | ||
To encrypt the partition which will later contain the LVM PV | To encrypt the partition which will later contain the LVM PV, you could either use the default settings (aes-xts-plain64 cipher with 256-bit key and Argon2 hashing with iter-time 2000ms), or you could use these settings which have added security with the trade-off being a non-noticeable decrease in performance in modern computers: | ||
Default settings: | |||
<pre># cryptsetup | <pre># cryptsetup luksFormat /dev/sda2</pre> | ||
Optimized for security: | |||
<pre># cryptsetup -v -c serpent-xts-plain64 -s 512 --hash whirlpool --iter-time 5000 --use-random luksFormat /dev/ | <pre># cryptsetup -v -c serpent-xts-plain64 -s 512 --hash whirlpool --iter-time 5000 --use-random luksFormat /dev/sda2</pre> | ||
== Creating the Logical Volumes and File Systems == | == Creating the Logical Volumes and File Systems == | ||
Line 115: | Line 151: | ||
Open the LUKS partition: | Open the LUKS partition: | ||
<pre># cryptsetup | <pre># cryptsetup luksOpen /dev/sda2 lvmcrypt</pre> | ||
Create the PV on <code> | Create the PV on <code>lvmcrypt</code>: | ||
<pre># pvcreate /dev/mapper/lvmcrypt</pre> | <pre># pvcreate /dev/mapper/lvmcrypt</pre> | ||
Line 125: | Line 161: | ||
<pre># vgcreate vg0 /dev/mapper/lvmcrypt</pre> | <pre># vgcreate vg0 /dev/mapper/lvmcrypt</pre> | ||
=== LV Creation fro BIOS/MBR === | |||
This will create a 2GB swap partition and a root partition which takes up the rest of the space. This setup is for those who do not need to use the hibernate/suspend to disk state. If you do need to suspend to disk, create a swap partition slightly larger than the size of your RAM (change the size after <code># lvcreate -L</code>). | |||
<pre># lvcreate -L 2G vg0 -n swap | |||
# lvcreate -l 100%FREE vg0 -n root</pre> | |||
The LVs created in the previous steps are automatically marked active. To verify, enter: | |||
<pre># lvscan</pre> | |||
<pre># lvcreate -L | === LV Creation for UEFI/GPT === | ||
This will create a 2GB swap partition, a 2GB boot partition and a root partition which takes up the rest of the space. This setup is for those who do not need to use the hibernate/suspend to disk state. If you do need to suspend to disk, create a swap partition slightly larger than the size of your RAM (change the size after <code># lvcreate -L</code>). | |||
<pre># lvcreate -L 2G vg0 -n swap | |||
# lvcreate -L 2G vg0 -n boot | |||
# lvcreate -l 100%FREE vg0 -n root</pre> | |||
The LVs created in the previous steps are automatically marked active. To verify, enter: | The LVs created in the previous steps are automatically marked active. To verify, enter: | ||
Line 141: | Line 184: | ||
<pre># lvscan</pre> | <pre># lvscan</pre> | ||
Format the <code>root</code> | == Creating and Mounting the File Systems == | ||
Format the <code>root</code> and <code>boot</code> LVs using the ext4 file system: | |||
<pre># mkfs.ext4 /dev/vg0/root</pre> | <pre># mkfs.ext4 /dev/vg0/root</pre> | ||
Format the swap LV: | Format the swap LV: | ||
<pre># mkswap /dev/vg0/swap</pre> | <pre># mkswap /dev/vg0/swap</pre> | ||
Before you can install Alpine Linux, you must mount the partitions and LVs. Mount the root LV to the <code>/mnt/</code> directory: | Before you can install Alpine Linux, you must mount the partitions and LVs. Mount the root LV to the <code>/mnt/</code> directory: | ||
Line 157: | Line 198: | ||
<pre># mount -t ext4 /dev/vg0/root /mnt/</pre> | <pre># mount -t ext4 /dev/vg0/root /mnt/</pre> | ||
Next format your boot partition, create a mount point and mount it: | |||
* If you're using BIOS and MBR: | |||
<pre># mkfs.ext4 /dev/sda1 | |||
# mkdir -v /mnt/boot | |||
# mount -t ext4 /dev/sda1 /mnt/boot</pre> | |||
* If you're using UEFI and GPT: | |||
<pre># apk add dosfstools | |||
# mkfs.fat -F32 /dev/sda1 | |||
# mkfs.ext4 /dev/vg01/boot | |||
# mkdir -v /mnt/boot | |||
# mount -t ext4 /dev/vg0/boot /mnt/boot | |||
# mkdir -v /mnt/boot/efi | |||
# mount -t ext4 /dev/sda1 /mnt/boot/efi</pre> | |||
Lastly, activate your swap partition: | |||
<pre># swapon /dev/vg0/swap</pre> | |||
== Installing Alpine Linux == | == Installing Alpine Linux == | ||
In this step you will install Alpine Linux in the <code>/mnt/</code> directory, which contains the mounted file system structure: | In this step you will install Alpine Linux in the <code>/mnt/</code> directory, which contains the mounted file system structure: | ||
<pre># setup-disk -m sys /mnt/</pre> | <pre># setup-disk -m sys /mnt/</pre> | ||
The installer downloads the latest packages to install the base installation. Additionally, the installer automatically creates the entries for the mount points in | The installer downloads the latest packages to install the base installation. Additionally, the installer automatically creates the entries for the mount points in {{Path|/etc/fstab}} file, which is currently mounted in the <code>/mnt/</code> directory. | ||
{{Note|The automatic writing of the master boot record (MBR) fails in this step. You will write the MBR later manually to the disk.}} | {{Note|The automatic writing of the master boot record (MBR) fails in this step. You will write the MBR later manually to the disk.}} | ||
To enable the operating system to decrypt the PV at boot time, create the | To get the UUID of your storage device into a file for later use, use this command: | ||
<pre># blkid -s UUID -o value /dev/sda2 > ~/uuid</pre> | |||
To enable the operating system to decrypt the PV at boot time, create the {{Path|/mnt/etc/crypttab}} file. Enter the following line into the file to decrypt the <code>/dev/sda2</code> partition using the <code>luks</code> module and map it to the <code>lvmcrypt</code> name: | |||
<pre>lvmcrypt UUID=<UUID> none luks</pre> | |||
< | {{Tip|To easily read the UUID into this file so you don't have to type it manually, open it in <code>vi</code>, then type <code>:r ~/uuid</code> to load the UUID onto a new line.}} | ||
The swap LV is not automatically added to the <code>fstab</code> file. To add it manually, add the following line to the | The swap LV is not automatically added to the <code>fstab</code> file. To add it manually, add the following line to the {{Path|/mnt/etc/fstab}} file: | ||
<pre>/dev/vg0/swap swap swap defaults 0 0</pre> | <pre>/dev/vg0/swap swap swap defaults 0 0</pre> | ||
Edit the | Edit the {{Path|/mnt/etc/mkinitfs/mkinitfs.conf}} file and append the <code>cryptsetup</code> module to the <code>features</code> parameter: | ||
<pre>features=" | <pre>features="... cryptsetup"</pre> | ||
{{Note|Alpine Linux uses the <code>en-us</code> keyboard mapping by default when prompting for the password to decrypt the partition at boot time. If you changed the keyboard mapping in the temporary environment and want to use it at the boot password prompt, be sure to also add the <code>keymap</code> feature to the list above.}} | {{Note|Alpine Linux uses the <code>en-us</code> keyboard mapping by default when prompting for the password to decrypt the partition at boot time. If you changed the keyboard mapping in the temporary environment and want to use it at the boot password prompt, be sure to also add the <code>keymap</code> feature to the list above.}} | ||
Line 192: | Line 257: | ||
== Installing a bootloader == | == Installing a bootloader == | ||
=== Syslinux === | === Syslinux with BIOS === | ||
Install the Syslinux package: | Install the Syslinux package: | ||
Line 209: | Line 263: | ||
<pre># apk add syslinux</pre> | <pre># apk add syslinux</pre> | ||
Edit | Edit {{Path|/mnt/etc/update-extlinux.conf}} and append the following kernel options to the <code>default_kernel_opts</code> parameter, replacing <UUID> with the UUID of <code>/dev/sda2</code>: | ||
<pre>default_kernel_opts="... < | <pre>default_kernel_opts="... cryptroot=UUID=<UUID> cryptdm=lvmcrypt"</pre> | ||
The <code>cryptroot</code> parameter sets the name of the device that contains the root file system, and the <code>cryptdm</code> parameter sets the name of the mapping previously set in <code>crypttab</code>. | |||
Because the <code>update-extlinux</code> utility | Because the <code>update-extlinux</code> utility operates only on the <code>/boot/</code> directory, temporarily change the root to the <code>/mnt/</code> directory and update the boot loader configuration: | ||
<pre> | <pre># chroot /mnt/ | ||
# chroot /mnt/ | |||
# update-extlinux | # update-extlinux | ||
# exit | # exit</pre> | ||
</pre> | |||
: | : If an error occurs in the <code>update-extlinux</code> command you can most likely ignore it. | ||
Write the MBR to the <code>/dev/ | Write the MBR to the <code>/dev/sda</code> device: | ||
<pre># dd bs=440 count=1 conv=notrunc if=/mnt/usr/share/syslinux/mbr.bin of=/dev/vda</pre> | <pre># dd bs=440 count=1 conv=notrunc if=/mnt/usr/share/syslinux/mbr.bin of=/dev/vda</pre> | ||
=== Grub | === Grub with UEFI === | ||
Install <code>GRUB2</code> for EFI and (optionally) remove syslinux: | |||
<pre> | <pre># apk add grub grub-efi efibootmgr | ||
apk del syslinux</pre> | |||
# | |||
</pre> | |||
Edit | Edit {{Path|/mnt/etc/default/grub}} and add the following kernel options to the <code>GRUB_CMDLINE_LINUX_DEFAULT</code> parameter, replacing <UUID> with the UUID of the encrypted partition (in this case, <code>/dev/sda2</code>: | ||
<pre>cryptroot= | <pre>cryptroot=UUID=<UUID> cryptdm=lvmcrypt</pre> | ||
The <code>cryptroot</code> parameter sets the name of the device that contains the root file system. The <code>cryptdm</code> parameter sets the name of the mapping previously set in the <code>crypttab</code> file. | The <code>cryptroot</code> parameter sets the name of the device that contains the root file system. The <code>cryptdm</code> parameter sets the name of the mapping previously set in the <code>crypttab</code> file. | ||
Line 253: | Line 296: | ||
Mount the required filesystems for the Grub EFI installer to the installation: | Mount the required filesystems for the Grub EFI installer to the installation: | ||
<pre> | <pre># mount -t proc /proc /mnt/proc | ||
# mount -t proc /proc /mnt/proc | |||
# mount --rbind /dev /mnt/dev | # mount --rbind /dev /mnt/dev | ||
# mount --make-rslave /mnt/dev | # mount --make-rslave /mnt/dev</pre> | ||
</pre> | |||
Then chroot in and use <code>grub-install</code> to install Grub. | Then chroot in and use <code>grub-install</code> to install Grub. | ||
<pre> | <pre># chroot /mnt | ||
# | # source /etc/profile | ||
# (chroot) | # export PS1="(chroot) $PS1" | ||
# (chroot) grub-install --target=x86_64-efi --efi-directory=/boot | # (chroot) grub-install --target=x86_64-efi --efi-directory=/boot/efi | ||
# (chroot) grub-mkconfig -o /boot/grub/grub.cfg | # (chroot) grub-mkconfig -o /boot/grub/grub.cfg | ||
# (chroot) exit | # (chroot) exit</pre> | ||
</pre> | |||
== Unmounting the Volumes and Partitions == | == Unmounting the Volumes and Partitions == | ||
Unmount the <code>/mnt/</code> partitions and reboot: | |||
<pre> | <pre># cd | ||
# umount /mnt/ | # umount -ql /mnt/dev | ||
# umount /mnt | # umount -R /mnt | ||
# reboot</pre> | |||
= Troubleshooting = | = Troubleshooting = | ||
Line 304: | Line 326: | ||
Reboot and do the steps in [[#Preparing_the_Temporary_Installation_Environment|Prepare the temporary installation environment]] again. | Reboot and do the steps in [[#Preparing_the_Temporary_Installation_Environment|Prepare the temporary installation environment]] again. | ||
Setup the LUKS partition and activate the LVs: | |||
<pre># vgchange - | <pre># cryptsetup luksOpen /dev/sda2 | ||
# vgchange -ay</pre> | |||
[[# | [[#Creating_and_Mounting_the_File Systems|Mount the file systems]] | ||
Verify that you run the steps described in the [[#Installing_Alpine_Linux|Installing Alpine Linux]] section correctly. Update the configuration if necessary. | Verify that you run the steps described in the [[#Installing_Alpine_Linux|Installing Alpine Linux]] section correctly. Update the configuration if necessary, unmount the partitions, then reboot. | ||
[ | == System can't find boot device == | ||
This can be because you are using a GPT partition table on a motherboard that runs BIOS instead of UEFI, or you are running an MSDOS/MBR/Syslinux install without enabling legacy boot mode in the UEFI settings. | |||
== Secure boot == | |||
If secure boot complains of an unsigned bootloader, you can either disable it or adapt [https://wiki.archlinux.org/index.php/Secure_Boot this] guide to sign GRUB. If you're using Syslinux, then secure boot should be automatically disabled when you enable legacy boot mode. | |||
= Hardening = | = Hardening = | ||
Line 319: | Line 348: | ||
* Disable DMA in the BIOS and set the password for the BIOS according to Wikipedia.[https://en.wikipedia.org/wiki/DMA_attack] | * Disable DMA in the BIOS and set the password for the BIOS according to Wikipedia.[https://en.wikipedia.org/wiki/DMA_attack] | ||
* Blacklist kernel modules that use DMA and any unused expansion modules (FireWire, CardBus, ExpressCard, Thunderbolt, USB 3.0, PCI Express and hotplug modules) that use DMA. | * Blacklist kernel modules that use DMA and any unused expansion modules (FireWire, CardBus, ExpressCard, Thunderbolt, USB 3.0, PCI Express and hotplug modules) that use DMA. | ||
= See also = | |||
*[[Bootloaders]] | |||
*[[Alpine setup scripts]] | |||
*[[Installing on GPT LVM]] | |||
*[[Setting up LVM on GPT-labeled disks]] | |||
*[[Setting up disks manually]] | |||
*https://wiki.gentoo.org/wiki/Syslinux | |||
*https://wiki.gentoo.org/wiki/GRUB2 | |||
*https://wiki.archlinux.org/index.php/Syslinux | |||
*https://wiki.archlinux.org/index.php/GRUB | |||
*https://wiki.gentoo.org/wiki/Sakaki's_EFI_Install_Guide | |||
[[Category:Storage]] | [[Category:Storage]] | ||
[[Category:Security]] | [[Category:Security]] |
Revision as of 04:54, 22 August 2019
Introduction
This documentation describes how to set up Alpine Linux on a fully encrypted disk (apart from the bootloader's partition). We will have an LVM container installed inside an encrypted partition. To encrypt the partition containing the LVM volume group, dm-crypt (which is managed by the cryptsetup
command) and its LUKS subsystem is used.
Note that your /boot/
partition must be non-encrypted to work with Syslinux. When using GRUB2 it is possible to boot from an encrypted partition to provide a layer of protection from Evil Maid attacks, but Syslinux doesn't support this.
Storage Device Name
To find your storage device's name, you could either install util-linux
(apk add util-linux
) and find your device using the lspci
command, or you could make an educated guess by using BusyBox's blkid
and df
commands, and running ls /dev/sd*
if you are installing to a USB, SATA or SCSI device, ls /dev/fd*
for floppy disks and ls /dev/hd*
for IDE (PATA) devices.
The following documentation uses the /dev/sda
device as installation destination. If your environment uses a different device name for your storage device, use the corresponding device names in the examples.
Setting up Alpine Linux Using LVM on Top of a LUKS Partition
To install Alpine Linux in logical volumes running on top of a LUKS encrypted partition, you cannot use the official installation procedure. The installation requires several manual steps you must run in the Alpine Linux Live CD environment.
Preparing the Temporary Installation Environment
Before you begin to install Alpine Linux, prepare the temporary environment:
Boot the latest Alpine Linux Installation CD. At the login prompt, use the root
user without a password to log in. Now we will follow the Setup-alpine script and make our changes along the way.
Run the scripts in this order:
# setup-keymap # setup-hostname # setup-interfaces # rc-service networking start
If you are configuring static networking (you didn't configure any interfaces to use DHCP), run setup-dns
.
# passwd # setup-timezone # rc-update add networking boot # rc-update add urandom boot # rc-update add acpid default # rc-service acpid start
Edit your /etc/hosts to look like this, replacing <hostname> with your hostname and <domain> with your TLD (if you don't have a TLD, use 'localdomain':
vi
(pronounced vee-eye).Contents of /etc/hosts
# setup-apkrepos # apk update # setup-sshd # setup-ntp
Now we will deviate from the install script.
Install the following packages required to set up LVM and LUKS:
parted
partition editor is needed for advanced partitioning and GPT disklabels. BusyBox fdisk
is a very stripped-down version with minimal functionality# apk add lvm2 cryptsetup e2fsprogs parted
Optionally, if you want to overwrite your storage with random data first, install haveged
, which is a random number generator based on hardware events and has a higher throughput than /dev/urandom
:
# apk add haveged # rc-service haveged start
Creating the Partition Layout
BIOS/MBR with DOS disklabel
We will be partitioning the storage device with a non-encrypted /boot
partition for use with the Syslinux bootloader. Syslinux is meant for use with legacy BIOS and the MSDOS MBR partition table. Syslinux does support GPT partition tables but GRUB2 is the better option for UEFI.
+---------------------------+------------------------+-----------------------+ | Partition name | Partition purpose | Filesystem type | +---------------------------+------------------------+-----------------------+ | /dev/sda1 | Boot partition | ext4 | | /dev/sda2 | LUKS container | LUKS | | |-> /dev/mapper/lvmcrypt | LVM container | LVM | | |-> /dev/vg01/root | Root partition | ext4 | | |-> /dev/vg01/swap | Swap partition | swap | +---------------------------+------------------------+-----------------------+
Create an approx. 100MB partition to boot off, then assign the rest of the space to your LUKS partition.
# parted -a optimal (parted) mklabel msdos (parted) mkpart primary ext4 0% 100M (parted) name 1 boot (parted) set 1 boot on (parted) mkpart primary ext4 100M 100% (parted) name 2 crypto-luks
To view your partition table, type print
while still in parted
. Your results should look something like this:
(parted) print Model: ATA TOSHIBA ******** (scsi) Disk /dev/sda: 1000GB Sector size (logical/physical): 512B/4096B Partition Table: msdos Disk Flags: Number Start End Size Type File system Flags 1 1049kB 99.6MB 98.6MB primary ext4 boot 2 99.6MB 1000GB 1000GB primary ext4
UEFI with GPT disklabel
We will be encrypting the whole disk but the EFI system partition mounted at /boot/efi
. This means that GRUB2 will decrypt the LUKS volume and load the kernel from there, preventing someone with physical access to your computer from maliciously installing a rootkit (or bootkit) in your boot partition while your computer is not already unlocked. The partitioning scheme will look like this:
+---------------------------+------------------------+-----------------------+ | Partition name | Partition purpose | Filesystem type | +---------------------------+------------------------+-----------------------+ | /dev/sda1 | EFI system partition | fat32 | | /dev/sda2 | LUKS container | LUKS | | |-> /dev/mapper/lvmcrypt | LVM container | LVM | | |-> /dev/vg01/root | Root partition | ext4 | | |-> /dev/vg01/boot | Boot partition | ext4 | | |-> /dev/vg01/swap | Swap partition | swap | +---------------------------+------------------------+-----------------------+
Create an approx. 200MB EFI system partition, then assign the rest of the space to your LUKS partition.
# parted -a optimal (parted) mklabel gpt (parted) mkpart primary fat32 0% 200M (parted) name 1 esp (parted) set 1 esp on (parted) mkpart primary ext4 200M 100% (parted) name 2 crypto-luks
Optional: Overwrite LUKS Partition with Random Data
This should be done if your hard drive wasn't encrypted previously. It helps purge old, non-encrypted data and makes it harder for an attacker to work out how much data you have on your drive if they have access to the encrypted contents.
We will be using haveged
as it is considerably faster than /dev/urandom
when generating pseudo-random numbers (it's almost as high as /dev/zero
in throughput), and is (supposedly) very close to truly random.
# haveged -n 0 | dd of=/dev/sda2
Encrypting the LVM Physical Volume Partition
To encrypt the partition which will later contain the LVM PV, you could either use the default settings (aes-xts-plain64 cipher with 256-bit key and Argon2 hashing with iter-time 2000ms), or you could use these settings which have added security with the trade-off being a non-noticeable decrease in performance in modern computers:
Default settings:
# cryptsetup luksFormat /dev/sda2
Optimized for security:
# cryptsetup -v -c serpent-xts-plain64 -s 512 --hash whirlpool --iter-time 5000 --use-random luksFormat /dev/sda2
Creating the Logical Volumes and File Systems
Open the LUKS partition:
# cryptsetup luksOpen /dev/sda2 lvmcrypt
Create the PV on lvmcrypt
:
# pvcreate /dev/mapper/lvmcrypt
Create the vg0
LVM VG in the /dev/mapper/lvmcrypt
PV:
# vgcreate vg0 /dev/mapper/lvmcrypt
LV Creation fro BIOS/MBR
This will create a 2GB swap partition and a root partition which takes up the rest of the space. This setup is for those who do not need to use the hibernate/suspend to disk state. If you do need to suspend to disk, create a swap partition slightly larger than the size of your RAM (change the size after # lvcreate -L
).
# lvcreate -L 2G vg0 -n swap # lvcreate -l 100%FREE vg0 -n root
The LVs created in the previous steps are automatically marked active. To verify, enter:
# lvscan
LV Creation for UEFI/GPT
This will create a 2GB swap partition, a 2GB boot partition and a root partition which takes up the rest of the space. This setup is for those who do not need to use the hibernate/suspend to disk state. If you do need to suspend to disk, create a swap partition slightly larger than the size of your RAM (change the size after # lvcreate -L
).
# lvcreate -L 2G vg0 -n swap # lvcreate -L 2G vg0 -n boot # lvcreate -l 100%FREE vg0 -n root
The LVs created in the previous steps are automatically marked active. To verify, enter:
# lvscan
Creating and Mounting the File Systems
Format the root
and boot
LVs using the ext4 file system:
# mkfs.ext4 /dev/vg0/root
Format the swap LV:
# mkswap /dev/vg0/swap
Before you can install Alpine Linux, you must mount the partitions and LVs. Mount the root LV to the /mnt/
directory:
# mount -t ext4 /dev/vg0/root /mnt/
Next format your boot partition, create a mount point and mount it:
- If you're using BIOS and MBR:
# mkfs.ext4 /dev/sda1 # mkdir -v /mnt/boot # mount -t ext4 /dev/sda1 /mnt/boot
- If you're using UEFI and GPT:
# apk add dosfstools # mkfs.fat -F32 /dev/sda1 # mkfs.ext4 /dev/vg01/boot # mkdir -v /mnt/boot # mount -t ext4 /dev/vg0/boot /mnt/boot # mkdir -v /mnt/boot/efi # mount -t ext4 /dev/sda1 /mnt/boot/efi
Lastly, activate your swap partition:
# swapon /dev/vg0/swap
Installing Alpine Linux
In this step you will install Alpine Linux in the /mnt/
directory, which contains the mounted file system structure:
# setup-disk -m sys /mnt/
The installer downloads the latest packages to install the base installation. Additionally, the installer automatically creates the entries for the mount points in /etc/fstab file, which is currently mounted in the /mnt/
directory.
To get the UUID of your storage device into a file for later use, use this command:
# blkid -s UUID -o value /dev/sda2 > ~/uuid
To enable the operating system to decrypt the PV at boot time, create the /mnt/etc/crypttab file. Enter the following line into the file to decrypt the /dev/sda2
partition using the luks
module and map it to the lvmcrypt
name:
lvmcrypt UUID=<UUID> none luks
vi
, then type :r ~/uuid
to load the UUID onto a new line.The swap LV is not automatically added to the fstab
file. To add it manually, add the following line to the /mnt/etc/fstab file:
/dev/vg0/swap swap swap defaults 0 0
Edit the /mnt/etc/mkinitfs/mkinitfs.conf file and append the cryptsetup
module to the features
parameter:
features="... cryptsetup"
en-us
keyboard mapping by default when prompting for the password to decrypt the partition at boot time. If you changed the keyboard mapping in the temporary environment and want to use it at the boot password prompt, be sure to also add the keymap
feature to the list above.Rebuild the initial RAM disk:
# mkinitfs -c /mnt/etc/mkinitfs/mkinitfs.conf -b /mnt/ $(ls /mnt/lib/modules/)
The command uses the settings from the mkinitfs.conf
file set in the -c
parameter to generate the RAM disk. The command is executed in the /mnt/
directory and the RAM disk is generated using the modules for the installed kernel. Without setting the kernel version using the $(ls /mnt/lib/modules/
) option, mkinitfs
tries to generate the RAM disk using the kernel version installed in the temporary environment, which can differ from the latest one installed by the setup-disk
utility.
Installing a bootloader
Syslinux with BIOS
Install the Syslinux package:
# apk add syslinux
Edit /mnt/etc/update-extlinux.conf and append the following kernel options to the default_kernel_opts
parameter, replacing <UUID> with the UUID of /dev/sda2
:
default_kernel_opts="... cryptroot=UUID=<UUID> cryptdm=lvmcrypt"
The cryptroot
parameter sets the name of the device that contains the root file system, and the cryptdm
parameter sets the name of the mapping previously set in crypttab
.
Because the update-extlinux
utility operates only on the /boot/
directory, temporarily change the root to the /mnt/
directory and update the boot loader configuration:
# chroot /mnt/ # update-extlinux # exit
- If an error occurs in the
update-extlinux
command you can most likely ignore it.
Write the MBR to the /dev/sda
device:
# dd bs=440 count=1 conv=notrunc if=/mnt/usr/share/syslinux/mbr.bin of=/dev/vda
Grub with UEFI
Install GRUB2
for EFI and (optionally) remove syslinux:
# apk add grub grub-efi efibootmgr apk del syslinux
Edit /mnt/etc/default/grub and add the following kernel options to the GRUB_CMDLINE_LINUX_DEFAULT
parameter, replacing <UUID> with the UUID of the encrypted partition (in this case, /dev/sda2
:
cryptroot=UUID=<UUID> cryptdm=lvmcrypt
The cryptroot
parameter sets the name of the device that contains the root file system. The cryptdm
parameter sets the name of the mapping previously set in the crypttab
file.
Mount the required filesystems for the Grub EFI installer to the installation:
# mount -t proc /proc /mnt/proc # mount --rbind /dev /mnt/dev # mount --make-rslave /mnt/dev
Then chroot in and use grub-install
to install Grub.
# chroot /mnt # source /etc/profile # export PS1="(chroot) $PS1" # (chroot) grub-install --target=x86_64-efi --efi-directory=/boot/efi # (chroot) grub-mkconfig -o /boot/grub/grub.cfg # (chroot) exit
Unmounting the Volumes and Partitions
Unmount the /mnt/
partitions and reboot:
# cd # umount -ql /mnt/dev # umount -R /mnt # reboot
Troubleshooting
General Procedure
In case your system fails to boot, you can verify the settings and fix incorrect configurations.
Reboot and do the steps in Prepare the temporary installation environment again.
Setup the LUKS partition and activate the LVs:
# cryptsetup luksOpen /dev/sda2 # vgchange -ay
Verify that you run the steps described in the Installing Alpine Linux section correctly. Update the configuration if necessary, unmount the partitions, then reboot.
System can't find boot device
This can be because you are using a GPT partition table on a motherboard that runs BIOS instead of UEFI, or you are running an MSDOS/MBR/Syslinux install without enabling legacy boot mode in the UEFI settings.
Secure boot
If secure boot complains of an unsigned bootloader, you can either disable it or adapt this guide to sign GRUB. If you're using Syslinux, then secure boot should be automatically disabled when you enable legacy boot mode.
Hardening
- To harden, you should disable DMA[1] and install a hardened version of AES (TRESOR[2] or Loop-Amnesia[3]) since by default cryptsetup with luks uses AES by default.
- Disable DMA in the BIOS and set the password for the BIOS according to Wikipedia.[4]
- Blacklist kernel modules that use DMA and any unused expansion modules (FireWire, CardBus, ExpressCard, Thunderbolt, USB 3.0, PCI Express and hotplug modules) that use DMA.
See also
- Bootloaders
- Alpine setup scripts
- Installing on GPT LVM
- Setting up LVM on GPT-labeled disks
- Setting up disks manually
- https://wiki.gentoo.org/wiki/Syslinux
- https://wiki.gentoo.org/wiki/GRUB2
- https://wiki.archlinux.org/index.php/Syslinux
- https://wiki.archlinux.org/index.php/GRUB
- https://wiki.gentoo.org/wiki/Sakaki's_EFI_Install_Guide