aboutsummaryrefslogtreecommitdiffstats
path: root/src/fripost-partman-udeb/base.sh
Commit message (Collapse)AuthorAgeFiles
* Consolidate sshd_configHEADmasterGuilhem Moulin2020-05-171
|
* fix bug in fripost_mdadm_create.Guilhem Moulin2017-05-301
|
* /proc/sys/kernel/random/poolsize is in bits not bytes.Guilhem Moulin2017-05-301
|
* Make the encrypted installation work with Jessie.Guilhem Moulin2015-06-071
|
* Select the first available block device by default.Guilhem Moulin2015-06-071
|
* wibbleGuilhem Moulin2015-06-071
|
* Jessie fixups.Guilhem Moulin2015-06-071
|
* Upgrade preseeding to Debian 7.7.Guilhem Moulin2015-06-071
|
* wibbleGuilhem Moulin2015-06-071
|
* Show a progress bar when creating RAID arrays.Guilhem Moulin2015-06-071
|
* Enable RAID root system.Guilhem Moulin2015-06-071
| | | | | | | | | | | | | | | | | | | | | Quoting /usr/share/doc/cryptsetup/README.keyctl : The current state for dm-crypt in Linux is that it is single threaded, thus every dm-crypt mapping only uses a single core for crypto operations. To use the full power of your many-core processor it is thus necessary to split the dm-crypt device. For Linux software raid arrays the easiest segmentation is to just put the dm-crypt layer below the software raid layer. However, this seems no longer true since 2.6.38, cf. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714806 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c029772125594e31eb1a5ad9e0913724ed9891f2 http://kernelnewbies.org/Linux_2_6_38#head-49f5f735853f8cc7c4d89e5c266fe07316b49f4c Therefore encrypting the array (instead of assembling an array of encrypted disks) shouldn't cause a performance cost. Also, it makes the ramdisk much easier to configure :-)
* Ensure urandom entropy is of cryptographic quality.Guilhem Moulin2015-06-071
| | | | | | | | | | | | The non-blocking PRNG /dev/urandom doesn't block if it has been seeded enough, sadly (e.g., if the entropy pool is empty). Reading a few bytes from the *blocking* should ensure that "the kernel RNG has [...] reach full entropy at least once, which guarantees cryptographic quality of the rest of the /dev/urandom stream." -- Tor bug #10676 https://trac.torproject.org/projects/tor/ticket/10676 See also urandom(4).
* UEFI support.Guilhem Moulin2015-06-071
| | | | | Tested with the IntelĀ® Desktop Board DH87RL, BIOS [RLH8710H.86A] version 0323.
* bugfixGuilhem Moulin2015-06-071
|
* Reformulate the headers showing the license.Guilhem Moulin2015-06-071
| | | | | To be clearer, and to follow the recommendation of the FSF, we include a full header rather than a single sentence.
* wibbleGuilhem Moulin2015-06-071
| | | | | Replaced [ -n "$string" ] with [ "$string" ], and [ -z "$string" ] with [ ! "$string" ].
* Fix shell traps.Guilhem Moulin2015-06-071
|
* Replace the 'syslog' facility (5) by 'user' (1).Guilhem Moulin2015-06-071
| | | | | 'syslog' is meant for the messages generated internally by syslogd, whereas 'user' is for user-level messages.
* wibbleGuilhem Moulin2015-06-071
|
* Reorganization.Guilhem Moulin2015-06-071
Move preseed-related stuff in ./preseed/, and vm-related stuff in ./virtualenv/.