diff options
author | Alyssa Rosenzweig <alyssa@rosenzweig.io> | 2017-04-03 09:19:08 -0700 |
---|---|---|
committer | Alyssa Rosenzweig <alyssa@rosenzweig.io> | 2017-04-03 09:19:08 -0700 |
commit | ece5fda25e70409032a16ea1cd64b0457279607b (patch) | |
tree | e665097fff51ab5443259de511c2649e3393c586 /docs/gnulinux | |
parent | 89a1d8e105de43ae0b3eafd9a37bed33cdabfb3e (diff) | |
download | librebootfr-ece5fda25e70409032a16ea1cd64b0457279607b.tar.gz librebootfr-ece5fda25e70409032a16ea1cd64b0457279607b.zip |
Fix -- bug
Diffstat (limited to 'docs/gnulinux')
-rw-r--r-- | docs/gnulinux/configuring_parabola.md | 2 | ||||
-rw-r--r-- | docs/gnulinux/encrypted_parabola.md | 14 | ||||
-rw-r--r-- | docs/gnulinux/grub_hardening.md | 4 |
3 files changed, 10 insertions, 10 deletions
diff --git a/docs/gnulinux/configuring_parabola.md b/docs/gnulinux/configuring_parabola.md index 9d167bce..0739038e 100644 --- a/docs/gnulinux/configuring_parabola.md +++ b/docs/gnulinux/configuring_parabola.md @@ -314,7 +314,7 @@ Finally, the wiki mentions 'temporary' files and the utility for managing them.\ \# **man systemd-tmpfiles**\ The command for 'clean' is:\ -\# **systemd-tmpfiles \--clean**\ +\# **systemd-tmpfiles --clean**\ According to the manpage, this *"cleans all files and directories with an age parameter"*. According to the Arch wiki, this reads information in /etc/tmpfiles.d/ and /usr/lib/tmpfiles.d/ to know what actions to diff --git a/docs/gnulinux/encrypted_parabola.md b/docs/gnulinux/encrypted_parabola.md index 2ac5a5ec..afa4d137 100644 --- a/docs/gnulinux/encrypted_parabola.md +++ b/docs/gnulinux/encrypted_parabola.md @@ -167,8 +167,8 @@ Reading through, it seems like Serpent (encryption) and Whirlpool (hash) is the best option. I am initializing LUKS with the following:\ -\# **cryptsetup -v \--cipher serpent-xts-plain64 \--key-size 512 \--hash -whirlpool \--iter-time 500 \--use-random \--verify-passphrase luksFormat +\# **cryptsetup -v --cipher serpent-xts-plain64 --key-size 512 --hash +whirlpool --iter-time 500 --use-random --verify-passphrase luksFormat /dev/sda1** Choose a **secure** passphrase here. Ideally lots of lowercase/uppercase numbers, letters, symbols etc all in a random pattern. The password length should be as long as you are able to handle @@ -273,8 +273,8 @@ signing and verifying packages:\ \# **pacman -Sy parabola-keyring**\ It says that if you get GPG errors, then it's probably an expired key and, therefore, you should do:\ - \# **pacman-key \--populate parabola**\ - \# **pacman-key \--refresh-keys**\ + \# **pacman-key --populate parabola**\ + \# **pacman-key --refresh-keys**\ \# **pacman -Sy parabola-keyring**\ To be honest, you should do the above anyway. Parabola has a lot of maintainers, and a lot of keys. Really!\ @@ -286,7 +286,7 @@ manually set the correct time\ \# **date MMDDhhmm\[\[CC\]YY\]\[.ss\]**\ I also had to install:\ \# **pacman -S archlinux-keyring**\ - \# **pacman-key \--populate archlinux**\ + \# **pacman-key --populate archlinux**\ In my case I saw some conflicting files reported in pacman, stopping me from using it.\ I deleted the files that it mentioned and then it worked. @@ -355,7 +355,7 @@ Time zone:\ (Replace Zone and Subzone to your liking. See /usr/share/zoneinfo) Hardware clock:\ -\# **hwclock \--systohc \--utc** +\# **hwclock --systohc --utc** Hostname: Write your hostname to /etc/hostname. For example, if your hostname is parabola:\ @@ -436,7 +436,7 @@ Or just delete it. Above it, put:\ file=/var/log/faillog*\ To unlock a user manually (if a password attempt is failed 3 times), do:\ -\# **pam\_tally \--user *theusername* \--reset** What the above +\# **pam\_tally --user *theusername* --reset** What the above configuration does is lock the user out for 10 minutes, if they make 3 failed login attempts. diff --git a/docs/gnulinux/grub_hardening.md b/docs/gnulinux/grub_hardening.md index cf0ef67f..9c1a819d 100644 --- a/docs/gnulinux/grub_hardening.md +++ b/docs/gnulinux/grub_hardening.md @@ -77,7 +77,7 @@ remember and easier to crack. Diceware passphrases are harder to crack because of far higher entropy (there are many words available to use, but only about 50 commonly used symbols in pass*words*). -\--> +--> The GRUB password can be entered in two ways: - plaintext @@ -105,7 +105,7 @@ As enabling password protection as above means that you have to input it on every single boot, we will make one menu entry work without it. Remember that we will have GPG signing active, thus a potential attacker will not be able to boot an arbitrary operating system. We do this by -adding option **\--unrestricted** to a menuentry definition: +adding option **--unrestricted** to a menuentry definition: menuentry 'Load Operating System (incl. fully encrypted disks) [o]' --hotkey='o' --unrestricted { ... |