mirror of
https://github.com/thiloho/thiloho.github.io.git
synced 2025-11-22 02:11:35 +01:00
Initialize project with general functionality
This commit is contained in:
136
src/content/blog/nixos-with-ext4-and-luks/index.md
Normal file
136
src/content/blog/nixos-with-ext4-and-luks/index.md
Normal file
@@ -0,0 +1,136 @@
|
||||
---
|
||||
id: 1
|
||||
title: "Steps to install NixOS on a system with ext4 and LUKS"
|
||||
description: "A guide to installing NixOS with full disk encryption using LUKS and LVM, showing the complete process from disk partitioning to system configuration"
|
||||
pubDate: "2025-01-04"
|
||||
---
|
||||
|
||||
## Disk layout
|
||||
|
||||
```sh
|
||||
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
|
||||
sda 8:0 0 233.8G 0 disk
|
||||
├─sda1 8:1 0 500M 0 part /boot # Unencrypted EFI partition
|
||||
└─sda2 8:2 0 233.3G 0 part # Encrypted partition
|
||||
└─cryptroot 254:0 0 233.3G 0 crypt # LUKS container
|
||||
├─vg-swap 254:1 0 8G 0 lvm [SWAP] # LVM swap volume
|
||||
└─vg-root 254:2 0 225.3G 0 lvm / # LVM root volume
|
||||
```
|
||||
|
||||
## Partitioning
|
||||
|
||||
```
|
||||
parted /dev/sda -- mklabel gpt
|
||||
|
||||
parted /dev/sda -- mkpart ESP fat32 1MB 512MB
|
||||
|
||||
parted /dev/sda -- mkpart primary 512MB 100%
|
||||
|
||||
parted /dev/sda -- set 1 esp on
|
||||
```
|
||||
|
||||
## Setting up Encryption
|
||||
|
||||
```
|
||||
cryptsetup luksFormat /dev/sda2
|
||||
|
||||
cryptsetup luksOpen /dev/sda2 cryptroot
|
||||
```
|
||||
|
||||
## Setting up LVM
|
||||
|
||||
```
|
||||
pvcreate /dev/mapper/cryptroot
|
||||
|
||||
vgcreate vg /dev/mapper/cryptroot
|
||||
|
||||
lvcreate -L 8G vg -n swap
|
||||
|
||||
lvcreate -l 100%FREE vg -n root
|
||||
```
|
||||
|
||||
## Creating Filesystems
|
||||
|
||||
```
|
||||
mkfs.fat -F 32 -n boot /dev/sda1
|
||||
|
||||
mkfs.ext4 -L root /dev/vg/root
|
||||
|
||||
mkswap -L swap /dev/vg/swap
|
||||
```
|
||||
|
||||
## Mounting Filesystems
|
||||
|
||||
```
|
||||
mount /dev/vg/root /mnt
|
||||
|
||||
mkdir -p /mnt/boot
|
||||
mount -o umask=077 /dev/sda1 /mnt/boot
|
||||
|
||||
swapon /dev/vg/swap
|
||||
```
|
||||
|
||||
## NixOS configuration
|
||||
|
||||
```sh
|
||||
nixos-generate-config --root /mnt
|
||||
|
||||
# Get UUID of encrypted partition (needed for configuration)
|
||||
blkid -s UUID /dev/sda2
|
||||
```
|
||||
|
||||
Edit `/mnt/etc/nixos/configuration.nix`:
|
||||
|
||||
```nix
|
||||
{ config, lib, pkgs, ... }:
|
||||
{
|
||||
boot = {
|
||||
loader = {
|
||||
systemd-boot.enable = true;
|
||||
efi.canTouchEfiVariables = true;
|
||||
};
|
||||
|
||||
# Encryption configuration
|
||||
initrd = {
|
||||
luks.devices = {
|
||||
cryptroot = {
|
||||
device = "/dev/disk/by-uuid/UUID-OF-SDA2"; # Replace with your UUID
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
# ...
|
||||
}
|
||||
```
|
||||
|
||||
## Installation
|
||||
|
||||
```
|
||||
nixos-install
|
||||
|
||||
reboot
|
||||
```
|
||||
|
||||
## How it works
|
||||
|
||||
1. **UEFI Phase**
|
||||
- The UEFI firmware loads systemd-boot from the unencrypted /boot partition
|
||||
- systemd-boot loads the NixOS kernel and initrd
|
||||
2. **Early boot**
|
||||
- Kernel starts and loads initrd
|
||||
- initrd asks for LUKS passphrase
|
||||
- after entering correct passphrase, /dev/sda2 will be decrypted
|
||||
3. **LVM setup**
|
||||
- LVM volumes are available after decryption
|
||||
- System can now access root and swap volumes
|
||||
4. **System start**
|
||||
- Root file system is mounted
|
||||
- Control handed over to systemd
|
||||
- regular boot process continues
|
||||
|
||||
## Change of encryption password
|
||||
|
||||
To make this step as easy as possible, I recommend using [GNOME Disks](https://apps.gnome.org/DiskUtility).
|
||||
|
||||

|
||||
Reference in New Issue
Block a user