diff options
author | Tobias Heinicke <theinicke@bss-wf.de> | 2015-07-02 01:03:46 +0200 |
---|---|---|
committer | Francis Rowe <info@gluglug.org.uk> | 2015-07-02 00:30:53 +0100 |
commit | a8541811e98467478948b57db1e6c23ff72dcc7a (patch) | |
tree | 6755ef6077527ab9af74024b8a44e4250a271542 /docs/gnulinux/encrypted_trisquel.html | |
parent | fa9e47ac349a26806b74347d2e41e0b1ebce675a (diff) | |
download | librebootfr-a8541811e98467478948b57db1e6c23ff72dcc7a.tar.gz librebootfr-a8541811e98467478948b57db1e6c23ff72dcc7a.zip |
Changed cryptomount occurences to exclude SOURCE.
The GNU/Linux installation guides call 'cryptomount -a', which ignores
any SOURCE parameter given and mounts all encrypted volumes regardless.
To avoid confusion I removed the parameter and added a small note
regarding mounting only specific partitions.
Diffstat (limited to 'docs/gnulinux/encrypted_trisquel.html')
-rw-r--r-- | docs/gnulinux/encrypted_trisquel.html | 11 |
1 files changed, 9 insertions, 2 deletions
diff --git a/docs/gnulinux/encrypted_trisquel.html b/docs/gnulinux/encrypted_trisquel.html index 367dbbfb..27864a81 100644 --- a/docs/gnulinux/encrypted_trisquel.html +++ b/docs/gnulinux/encrypted_trisquel.html @@ -229,7 +229,7 @@ <p> Do that:<br/> - grub> <b>cryptomount -a (ahci0,msdos1)</b><br/> + grub> <b>cryptomount -a</b><br/> grub> <b>set root='lvm/grubcrypt-trisquel'</b><br/> grub> <b>linux /vmlinuz root=/dev/mapper/grubcrypt-trisquel cryptdevice=/dev/mapper/grubcrypt-trisquel:root</b><br/> grub> <b>initrd /initrd.img</b><br/> @@ -276,13 +276,19 @@ </p> <p> - <b>cryptomount -a (ahci0,msdos1)</b><br/> + <b>cryptomount -a</b><br/> <b>set root='lvm/grubcrypt-trisquel'</b><br/> <b>linux /vmlinuz root=/dev/mapper/grubcrypt-trisquel cryptdevice=/dev/mapper/grubcrypt-trisquel:root</b><br/> <b>initrd /initrd.img</b> </p> <p> + Note: <i>cryptomount -a</i> mounts all encrypted devices found. It may be desirable to just mount the needed partition. + To do so you may either specify your partition via layout (e.g.: <i>cryptomount -a (ahci0,msdos1)</i>) + or use the UUID <i>cryptomount -u UUID</i>. + </p> + + <p> Additionally, you should set a GRUB password. This is not your LUKS password, but it's a password that you have to enter to see GRUB. This protects your system from an attacker simply booting a live USB and re-flashing your firmware. <b>This should be different than your LUKS passphrase and user password.</b> </p> @@ -320,6 +326,7 @@ <p> Copyright © 2014, 2015 Francis Rowe <info@gluglug.org.uk><br/> + Copyright © 2015 Tobias Heinicke <theinicke@bss-wf.de><br/> This document is released under the Creative Commons Attribution-ShareAlike 4.0 International Public License and all future versions. A copy of the license can be found at <a href="../cc-by-sa-4.txt">../cc-by-sa-4.txt</a>. </p> |