From 0be85f82c2ffe56859701c9ada615bfa846d0879 Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Tue, 7 Mar 2017 05:12:10 +0000 Subject: remove hardening guides from debian/parabola guides. link to specing's guide --- docs/gnulinux/encrypted_parabola.html | 50 +++-------------------------------- 1 file changed, 4 insertions(+), 46 deletions(-) (limited to 'docs/gnulinux/encrypted_parabola.html') diff --git a/docs/gnulinux/encrypted_parabola.html b/docs/gnulinux/encrypted_parabola.html index 2bb1bcee..ec4229e8 100644 --- a/docs/gnulinux/encrypted_parabola.html +++ b/docs/gnulinux/encrypted_parabola.html @@ -572,52 +572,10 @@ initrd /boot/initramfs-linux-libre-lts.img You can also specify -u UUID or -a (device).

-

- Now, to protect your system from an attacker simply booting a live usb distro and re-flashing the boot firmware, we are going to add a password for GRUB. - In a new terminal window, if you are not yet online, start dhcp on ethernet:
- # systemctl start dhcpcd.service - Or make sure to get connected to the internet in any other way you prefer, at least. -

- -

- Use of the diceware method is recommended, for generating secure passphrases (instead of passwords). -

- -

- AGAIN: MAKE SURE TO DO THIS WHOLE SECTION ON grubtest.cfg *BEFORE* DOING IT ON grub.cfg. - (When we get there, upon reboot, select the menu entry that says Switch to grubtest.cfg and test that it works. - Only once you are satisfied, copy that to grub.cfg. Only a few steps to go, though.) - WHY? BECAUSE AN INCORRECTLY SET PASSWORD CONFIG MEANS YOU CAN'T AUTHENTICATE, WHICH MEANS 'BRICK'. -

- -

- (emphasis added, because it's needed: this is a common roadblock for users.) -

- -

- We need a utility that comes with GRUB, so we will download it temporarily. (Remember that GRUB isn't needed for booting, since it's already included as a payload in libreboot.) - Also, we will use flashrom, and I installed dmidecode. You only need base-devel (compilers and so on) to build and use cbfstool. It was already installed if you followed this tutorial, but here - it is:
- # pacman -S grub flashrom dmidecode base-devel
- Next, do:
- # grub-mkpasswd-pbkdf2
- Enter your chosen password at the prompt and your hash will be shown. Copy this string - you will add it to your grubtest.cfg. -

- -

- The password below (it's password, by the way) after 'password_pbkdf2 root' should be changed to your own. - Make sure to specify a password that is different from both your LUKS *and* your root/user password. - Obviously, do not simply copy and paste the examples shown here... -

- -

- Next, back in grubtest.cfg, above the first 'Load Operating System' menu entry, you should now add your GRUB password, like so - (replace with your own name (I used root on both lines, feel free to choose another one) and the password hash which you copied): -

-
-set superusers="root"
-password_pbkdf2 root grub.pbkdf2.sha512.10000.711F186347156BC105CD83A2ED7AF1EB971AA2B1EB2640172F34B0DEFFC97E654AF48E5F0C3B7622502B76458DA494270CC0EA6504411D676E6752FD1651E749.8DD11178EB8D1F633308FD8FCC64D0B243F949B9B99CCEADE2ECA11657A757D22025986B0FA116F1D5191E0A22677674C994EDBFADE62240E9D161688266A711
-
+

+ Refer to this guide for further guidance + on hardening your GRUB configuration, for security purposes. +

Save your changes in grubtest.cfg, then delete the unmodified config from the ROM image:
-- cgit v1.2.3-70-g09d2