--- title: "Installing Arch Linux with Full Disk Encryption (LUKS)" date: 2018-12-19 lastmod: 2019-01-29 categories: ["Tutorial"] tags: ["linux"] --- This is a guide written on how to install Arch Linux using LUKS for disk encryption, and Systemd-boot as the bootloader. It is assumed that the reader has basic linux knowledge and understands that examples are given via output commands. The reader may always consult manpages, the [Arch Wiki](https://wiki.archlinux.org/), or other documentation to build a better understanding of the tools and methods used. --- # Partitioning 1. Create a partition scheme using partitioner of choice (e.g. `gdisk`, `fdisk`, `cgdisk`). - First partition should be EFI/boot partition at around 256MB+ (type: `ef00`) - Second partition should be Linux LVM partition using rest of disk space (type: `8e00`) 1. Make the the EFI/boot partition FAT32 via `mkfs.fat -F32` # Encryption 1. Format the Linux LVM partition: ```bash cryptsetup luksFormat /dev/sdaN Enter passphrase: ``` **Note:** _Remember your passphrase! You will need this every time you boot your computer_ 1. Create a mapping for your Linux LVM (LUKS): ```bash cryptsetup open --type luks /dev/sdaN ``` _Use whatever name you want. Ex. `lvm`, `volume`, etc._ 1. Create the physical volume, volume group, and logical volumes for `` specified in the previous step: ```bash pvcreate /dev/mapper/ vgcreate /dev/mapper/ ``` _Use whatever volume name you want. Ex. `volume`, `main`, `linux`, etc._ ```bash lvcreate -L2G -n swap ``` _Select size for swap, if desired. Here we use `2G` for 2Gb._ ```bash lvcreate -L16G -n root lvcreate -l 100%FREE -n home ``` 1. Specify and write the desired filesystems: ```bash mkfs.ext4 /dev/mapper/-root mkfs.ext4 /dev/mapper/-home mkswap /dev/mapper/-swap ``` # Install Linux 1. Mount the boot partition and logical volumes for installation: ```bash mount /dev/mapper/-root /mnt mkdir /mnt/home mkdir /mnt/boot mount /dev/mapper/-home /mnt/home mount /dev/sdaN /mnt/boot swapon /dev/mapper/-swap ``` 1. Install the base system (_Assuming you have internet connectivity. Use `wifi-menu`, or other, to connect to the internet at this point._): ```bash pacstrap /mnt base base-devel ``` # Set-up Linux Installation 1. Generate the `fstab`: ```bash genfstab -p /mnt >> /mnt/etc/fstab ``` 1. Move into the installation: ```bash arch-chroot /mnt ``` 1. Configure `initramfs`: 1. Edit `HOOKS` in `/etc/mkinitcpio.conf` using text editor of your choice (e.g. `vi`, `nano`, etc.). Move the `keyboard` hook before `filesystems`, and add `encrypt` and `lvm2` hooks **before** `filesystems`: ```bash $ egrep '^HOOKS' /etc/mkinitcpio.conf HOOKS=(base udev autodetect modconf block keyboard encrypt lvm2 filesystems fsck) ``` _Read the comment documentation on `HOOKS` in the document to find out more._ 1. Generate `initramfs`: ```bash mkinitcpio -p linux ``` 1. Install a bootloader (e.g. `systemd-boot`, `grub`, `syslinux`, etc.): 1. I will be using `systemd-boot` ```bash bootctl --path=/boot/ install ``` 1. Edit the loader configuration using a text editor of your choice: ```bash $ cat /boot/loader/loader.conf default arch timeout 3 editor 0 ``` 1. Create the loader entry for the default `arch` entry specified above (_You can edit this name if desired._). Use `blkid /dev/sdaN` to find the UUID of your crypt device, and recall the volume name you gave your device above (_`main` in example below_): ```bash $ cat /boot/loader/entries/arch.conf title Arch Linux linux /vmlinuz-linux.img initrd /initramfs-linux.img options cryptdevice=UUID=9f1fc119-b1dc-49d8-9a5a-686ad9e2fd2e:volume root=/dev/mapper/main-root quiet rw ``` 1. Create a root password using `passwd`. 1. Set a hostname: ```bash echo "" > /etc/hostname ``` 1. Set up the time: ```bash ln -fs /usr/share/zoneinfo// /etc/localtime hwclock --systohc --utc ``` 1. Set the locale to `en_US`: ```bash sed -i 's/^\#en_US/en_US/' /etc/locale.gen locale-gen locale > /etc/locale.conf ``` 1. Done! ```bash exit unmount -R /mnt reboot ```