en:server:operating_systems:arch_linux

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
en:server:operating_systems:arch_linux [2023/06/13 04:39] – [Verify the ISO image] changed md5sum to sha256sums danen:server:operating_systems:arch_linux [2024/03/07 20:29] – [Create an initial ramdisk] updated upstream changes - microcode hook by default dan
Line 32: Line 32:
   * other GnuPGP systems   * other GnuPGP systems
     * ''gpg %%--%%keyserver pgp.mit.edu %%--%%keyserver-options auto-key-retrieve %%--%%verify archlinux-<version>-x86_64.iso.sig''     * ''gpg %%--%%keyserver pgp.mit.edu %%--%%keyserver-options auto-key-retrieve %%--%%verify archlinux-<version>-x86_64.iso.sig''
-  * and check the sha256sums with the following command +  * and check the sha256sum with the following command 
-    * ''sha256sums archlinux-<version>-x86_64.iso''+    * ''sha256sum archlinux-<version>-x86_64.iso''
  
 <alert type="info" icon="fa fa-info-circle">Another method to verify the authenticity of the signature is to ensure that the public key's fingerprint is identical to the key fingerprint of the [[https://www.archlinux.org/people/developers/|Arch Linux developer]] who signed the ISO-file. See [[https://en.wikipedia.org/wiki/Public-key_cryptography|Wikipedia:Public-key_cryptography]] for more information on the public-key process to authenticate keys.</alert> <alert type="info" icon="fa fa-info-circle">Another method to verify the authenticity of the signature is to ensure that the public key's fingerprint is identical to the key fingerprint of the [[https://www.archlinux.org/people/developers/|Arch Linux developer]] who signed the ISO-file. See [[https://en.wikipedia.org/wiki/Public-key_cryptography|Wikipedia:Public-key_cryptography]] for more information on the public-key process to authenticate keys.</alert>
Line 234: Line 234:
  
 <code> <code>
-HOOKS=(base udev autodetect keyboard keymap modconf block encrypt lvm2 filesystems fsck)+HOOKS=(base udev autodetect microcode modconf kms keyboard keymap consolefont block filesystems fsck encrypt lvm2)
 </code> </code>
  
Line 258: Line 258:
 linux /vmlinuz-linux-hardened linux /vmlinuz-linux-hardened
 initrd  /initramfs-linux-hardened-fallback.img initrd  /initramfs-linux-hardened-fallback.img
-options cryptdevice=UUID=$(blkid -s UUID -o value /dev/sda2)=root root=/dev/vg0/root rw" >> /boot/loader/entries/arch-fallback.conf+options cryptdevice=UUID=$(blkid -s UUID -o value /dev/sda2):root root=/dev/vg0/root rw" >> /boot/loader/entries/arch-fallback.conf
 </code> </code>
  
  • en/server/operating_systems/arch_linux.txt
  • Last modified: 2024/03/07 20:30
  • by dan