aboutsummaryrefslogtreecommitdiff
path: root/docs/gnulinux
diff options
context:
space:
mode:
authorAlyssa Rosenzweig <alyssa@rosenzweig.io>2017-04-03 09:19:08 -0700
committerAlyssa Rosenzweig <alyssa@rosenzweig.io>2017-04-03 09:19:08 -0700
commitece5fda25e70409032a16ea1cd64b0457279607b (patch)
treee665097fff51ab5443259de511c2649e3393c586 /docs/gnulinux
parent89a1d8e105de43ae0b3eafd9a37bed33cdabfb3e (diff)
downloadlibrebootfr-ece5fda25e70409032a16ea1cd64b0457279607b.tar.gz
librebootfr-ece5fda25e70409032a16ea1cd64b0457279607b.zip
Fix -- bug
Diffstat (limited to 'docs/gnulinux')
-rw-r--r--docs/gnulinux/configuring_parabola.md2
-rw-r--r--docs/gnulinux/encrypted_parabola.md14
-rw-r--r--docs/gnulinux/grub_hardening.md4
3 files changed, 10 insertions, 10 deletions
diff --git a/docs/gnulinux/configuring_parabola.md b/docs/gnulinux/configuring_parabola.md
index 9d167bce..0739038e 100644
--- a/docs/gnulinux/configuring_parabola.md
+++ b/docs/gnulinux/configuring_parabola.md
@@ -314,7 +314,7 @@ Finally, the wiki mentions 'temporary' files and the utility for
managing them.\
\# **man systemd-tmpfiles**\
The command for 'clean' is:\
-\# **systemd-tmpfiles \--clean**\
+\# **systemd-tmpfiles --clean**\
According to the manpage, this *"cleans all files and directories with
an age parameter"*. According to the Arch wiki, this reads information
in /etc/tmpfiles.d/ and /usr/lib/tmpfiles.d/ to know what actions to
diff --git a/docs/gnulinux/encrypted_parabola.md b/docs/gnulinux/encrypted_parabola.md
index 2ac5a5ec..afa4d137 100644
--- a/docs/gnulinux/encrypted_parabola.md
+++ b/docs/gnulinux/encrypted_parabola.md
@@ -167,8 +167,8 @@ Reading through, it seems like Serpent (encryption) and Whirlpool (hash)
is the best option.
I am initializing LUKS with the following:\
-\# **cryptsetup -v \--cipher serpent-xts-plain64 \--key-size 512 \--hash
-whirlpool \--iter-time 500 \--use-random \--verify-passphrase luksFormat
+\# **cryptsetup -v --cipher serpent-xts-plain64 --key-size 512 --hash
+whirlpool --iter-time 500 --use-random --verify-passphrase luksFormat
/dev/sda1** Choose a **secure** passphrase here. Ideally lots of
lowercase/uppercase numbers, letters, symbols etc all in a random
pattern. The password length should be as long as you are able to handle
@@ -273,8 +273,8 @@ signing and verifying packages:\
   \# **pacman -Sy parabola-keyring**\
   It says that if you get GPG errors, then it's probably an expired
key and, therefore, you should do:\
-   \# **pacman-key \--populate parabola**\
-   \# **pacman-key \--refresh-keys**\
+   \# **pacman-key --populate parabola**\
+   \# **pacman-key --refresh-keys**\
   \# **pacman -Sy parabola-keyring**\
   To be honest, you should do the above anyway. Parabola has a lot of
maintainers, and a lot of keys. Really!\
@@ -286,7 +286,7 @@ manually set the correct time\
   \# **date MMDDhhmm\[\[CC\]YY\]\[.ss\]**\
   I also had to install:\
   \# **pacman -S archlinux-keyring**\
-   \# **pacman-key \--populate archlinux**\
+   \# **pacman-key --populate archlinux**\
   In my case I saw some conflicting files reported in pacman, stopping
me from using it.\
   I deleted the files that it mentioned and then it worked.
@@ -355,7 +355,7 @@ Time zone:\
(Replace Zone and Subzone to your liking. See /usr/share/zoneinfo)
Hardware clock:\
-\# **hwclock \--systohc \--utc**
+\# **hwclock --systohc --utc**
Hostname: Write your hostname to /etc/hostname. For example, if your
hostname is parabola:\
@@ -436,7 +436,7 @@ Or just delete it. Above it, put:\
file=/var/log/faillog*\
To unlock a user manually (if a password attempt is failed 3 times),
do:\
-\# **pam\_tally \--user *theusername* \--reset** What the above
+\# **pam\_tally --user *theusername* --reset** What the above
configuration does is lock the user out for 10 minutes, if they make 3
failed login attempts.
diff --git a/docs/gnulinux/grub_hardening.md b/docs/gnulinux/grub_hardening.md
index cf0ef67f..9c1a819d 100644
--- a/docs/gnulinux/grub_hardening.md
+++ b/docs/gnulinux/grub_hardening.md
@@ -77,7 +77,7 @@ remember and easier to crack. Diceware passphrases are harder to crack
because of far higher entropy (there are many words available to use,
but only about 50 commonly used symbols in pass*words*).
-\-->
+-->
The GRUB password can be entered in two ways:
- plaintext
@@ -105,7 +105,7 @@ As enabling password protection as above means that you have to input it
on every single boot, we will make one menu entry work without it.
Remember that we will have GPG signing active, thus a potential attacker
will not be able to boot an arbitrary operating system. We do this by
-adding option **\--unrestricted** to a menuentry definition:
+adding option **--unrestricted** to a menuentry definition:
menuentry 'Load Operating System (incl. fully encrypted disks) [o]' --hotkey='o' --unrestricted {
...