![]() ![]() Nwo open the local.gen and uncomment all the languages you plan on using for me it’s de_DE.UTF-8 /etc/locale.gen de_DE.UTF-8 UTF-8Īfterwards you can regenerate the local files locale-genĮcho KEYMAP=de-latin1 > /etc/nfĪnd now we are going to save our localtime ln -sf /usr/share/zoneinfo/Europe/Berlin /etc/localtime Set the LANG and make it persistent by saving it to the nf echo LANG=de_DE.UTF-8 > /etc/nf so we can start executing commands as if /mnt was our / arch-chroot /mnt The power of chmod - we previsouly installed arch onto /mnt so we now chroot into this directory. When using an ssd we append to each disk ,noatime,discardĪnother youtube user’s comment on this: You shouldn't use the discard mount option with dmcrypt (SSD) Now generate the fstab file and verify with cat genfstab -U -p /mnt > /mnt/etc/fstab We already mounted all partitions except the swap let’s mount the swap now then we can generate an fstab file based on all the mounted partitions swapon -L swap In the next step we have to add one of these append lines to each the arch and the fallback definition /mnt/boot/syslinux/syslinux.cfg APPEND cryptdevice=/dev/vda2:main root=/dev/mapper/main-root rw lang=de locale=de_DE.UTF-8 ( i have an intel based cpu so i ll be picking the intel-uc package ) pacstrap /mnt base base-devel syslinux nano linux linux-firmware mkinitcpio lvm2 dhcpcd inetutils intel-ucode We are now using pacstrap to install into the /mnt folder where we mounted the lvms to in the last step. Now we can mount the disks mount /dev/mapper/main-root /mnt Now we are going to create the logical volume groups pvcreate /dev/mapper/lvmĪnd now we can create the actual volume groups we ll need one for root and one for the swap, for some people it might be useful to also create one for /var or for /home lvcreate -L 2GB -n swap mainĬreate the filesystems mkfs.vfat -n BOOT /dev/vda1 Now lets open the container so we can start using the newly created /dev/mapper/lvm device cryptsetup luksOpen /dev/vda2 lvm Next step is to create the encryption il lb e using aes-xts-plain64 with 512 bits cryptsetup -c aes-xts-plain -y -s 512 luksFormat /dev/vda2Īs yt viewer brought to my attention that it might be better to actually use as it also works better with filesystems > 2TB cryptsetup -c aes-xts-plain64 -y -s 512 luksFormat /dev/vda2 You can use the following command to find out the throughput of various ciphers cryptsetup benchmark Modprobing dm-crypt which is used to encrypt our disks modprobe dm-crypt Update the system clock timedatectl set-ntp true In most cases this will be dhclient eth0 dhclient enp1s0 Verify that uefi has been loaded properly ls /sys/firmware/efi/efivarsĬonnect to the internet - most cases you will get an ip via dhcp so lets use dhclient to get an ip. Load your keyboard layout ( i ll be picking the german keyboard layout de-latin1 the default is us layout) loadkeys de-latin1 You will end up with a prompt as the root user You can use the tool dd to flash the image to your bootable usb media, plugin the media and run sudo dmesgĭmesg will tell you the device name of the usb stick you just inserted use the sdX in combination with dd to create a bootable image dd if=/path/to/arch.iso of=/dev/sdX If not you can also use gpg gpg -keyserver-options auto-key-retrieve -verify archlinux-2020.05.01-x86_64.iso.sig Gpg: Korrekte Signatur von "Pierre Schmitz " Gpg: Hinweis: Die "trustdb" ist nicht schreibbar You can grab the latest archlinux iso from ĭownload the iso and the matching signature to verify, if you are doing this from a arch you can use: pacman-key -v archlinux-2020.05.01-x86_64.iso.sig ![]() The following video shows the whole installation below the video you’ll find the transcript ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |