User Tools

Site Tools


computing:slackware

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
computing:slackware [2019/06/17 06:55] oemb1905computing:slackware [2021/10/27 23:16] (current) oemb1905
Line 7: Line 7:
 ------------------------------------------- -------------------------------------------
  
-First, let's install Slackware using full disk encryption using Luks, along with LVM.  This is based on the Grey Seeker tutorial, and is the officially supported full disk encryption as documented here [[http://slackware.cs.utah.edu/pub/slackware/slackware64-14.1/README_CRYPT.TXT|Slackware Encryption]].  First, lets create our partitions using gdisk:+First, let's install Slackware using full disk encryption using Luks, along with LVM.  This is my attempt to document and write out Grey Seeker'tutorial, and is the officially supported full disk encryption as documented here [[http://slackware.cs.utah.edu/pub/slackware/slackware64-14.1/README_CRYPT.TXT|Slackware Encryption]].  First, lets create our partitions using gdisk:
  
   gdisk /dev/sda   gdisk /dev/sda
Line 126: Line 126:
 To get your psk key, run: To get your psk key, run:
  
-  wpa_passphrase ssid 'passphrase'+  wpa_passphrase <ssidname> 'passphrase'
  
 Then, edit the /etc/rc.d/rc.inet1.conf as follows: Then, edit the /etc/rc.d/rc.inet1.conf as follows:
  
-  IFNAME[1]="ath0"+  IFNAME[1]="wlan0"
   IPADDR[1]=""   IPADDR[1]=""
   NETMASK[1]=""   NETMASK[1]=""
Line 173: Line 173:
   slackpkg clean-system   slackpkg clean-system
      
-Set up a crypt for sensitive data:+Set up a crypt for sensitive d200ata:
  
   cryptsetup luksFormat /dev/sdaX   cryptsetup luksFormat /dev/sdaX
Line 187: Line 187:
   mount /dev/mapper/vault /mnt/vault     mount /dev/mapper/vault /mnt/vault  
  
 +Or, install pam mount and let it handle mounting like so:
  
- --- //[[netcmnd@jonathanhaack.com|oemb1905]] 2019/06/16 23:48//+  sudo nano /etc/security/pam_mount.conf.xml 
 +   
 +Under volume definitions, enter the same volume, but use the block ID instead of the device lettering (which can change): 
 + 
 +  <volume user="user" fstype="crypt" path="/dev/disk/by-uuid/97627555-91xd-4293-a5vg-6xc211gd9945" mountpoint="/mnt/vault" options="noatime,exec,fsck,nodev,nosuid"/>
  
 + --- //[[jonathan@haacksnetworking.com|oemb1905]] 2021/10/27 17:13//
computing/slackware.1560754547.txt.gz · Last modified: 2019/06/17 06:55 by oemb1905