This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision |
en:server:operating_systems:arch_linux [2022/10/24 08:24] – external edit 127.0.0.1 | en:server:operating_systems:arch_linux [2024/03/07 20:30] (current) – [Microcode] updated upstream changes - microcode hook in mkinitcpio.conf by default dan |
---|
* other GnuPGP systems | * other GnuPGP systems |
* ''gpg %%--%%keyserver pgp.mit.edu %%--%%keyserver-options auto-key-retrieve %%--%%verify archlinux-<version>-x86_64.iso.sig'' | * ''gpg %%--%%keyserver pgp.mit.edu %%--%%keyserver-options auto-key-retrieve %%--%%verify archlinux-<version>-x86_64.iso.sig'' |
* and check the md5sum with the following command | * and check the sha256sum with the following command |
* ''md5sum archlinux-<version>-x86_64.iso'' | * ''sha256sum archlinux-<version>-x86_64.iso'' |
| |
<alert type="info" icon="fa fa-info-circle">Another method to verify the authenticity of the signature is to ensure that the public key's fingerprint is identical to the key fingerprint of the [[https://www.archlinux.org/people/developers/|Arch Linux developer]] who signed the ISO-file. See [[https://en.wikipedia.org/wiki/Public-key_cryptography|Wikipedia:Public-key_cryptography]] for more information on the public-key process to authenticate keys.</alert> | <alert type="info" icon="fa fa-info-circle">Another method to verify the authenticity of the signature is to ensure that the public key's fingerprint is identical to the key fingerprint of the [[https://www.archlinux.org/people/developers/|Arch Linux developer]] who signed the ISO-file. See [[https://en.wikipedia.org/wiki/Public-key_cryptography|Wikipedia:Public-key_cryptography]] for more information on the public-key process to authenticate keys.</alert> |
| |
<code> | <code> |
HOOKS=(base udev autodetect keyboard keymap modconf block encrypt lvm2 filesystems fsck) | HOOKS=(base udev autodetect microcode modconf kms keyboard keymap consolefont block filesystems fsck encrypt lvm2) |
</code> | </code> |
| |
linux /vmlinuz-linux-hardened | linux /vmlinuz-linux-hardened |
initrd /initramfs-linux-hardened-fallback.img | initrd /initramfs-linux-hardened-fallback.img |
options cryptdevice=UUID=$(blkid -s UUID -o value /dev/sda2)=root root=/dev/vg0/root rw" >> /boot/loader/entries/arch-fallback.conf | options cryptdevice=UUID=$(blkid -s UUID -o value /dev/sda2):root root=/dev/vg0/root rw" >> /boot/loader/entries/arch-fallback.conf |
</code> | </code> |
| |
pacman -S amd-ucode | pacman -S amd-ucode |
</code> | </code> |
| |
and add ''initrd /**intel**-ucode.img'' or ''initrd /**amd**-ucode.img'' above ''initrd /initramfs-linux-hardened.img'', ''initrd /initramfs-linux-hardened-**fallback**.img'' in ''/boot/loader/entries/arch.conf'' and ''/boot/loader/entries/arch-**fallback**.conf'' | |
| |
==== doas ==== | ==== doas ==== |
| |