Compare commits

...

2 Commits

Author SHA1 Message Date
a8995f364b
update: file "dmcrypt" "3.0.0-beta.1" > "4.0.0-beta.1" 2025-06-27 19:00:23 +00:00
3e023263d5
feat(loc)!: switch system "aa000-0" name to "aa-00-00"
I have switched to a clearer naming convention for my systems. This
commit moves the directory and file locations to reflect that change.
2025-06-27 18:53:13 +00:00
58 changed files with 29 additions and 23 deletions

29
aa-00-00/dmcrypt Normal file
View File

@ -0,0 +1,29 @@
# Inferencium - aa-00-00
# dm-crypt - Configuration
# Version: 4.0.0-beta.1
# Copyright 2023 Jake Winters
# SPDX-License-Identifier: BSD-3-Clause
# Global
## How long to wait for each timeout (seconds)
dmcrypt_key_timeout="1"
## Max number of checks to perform (see dmcrypt_key_timeout)
#dmcrypt_max_timeout="300"
## Number of password retries
dmcrypt_retries="5"
# Swap (list first to prevent key leakage into unencrypted swap)
## In the case of a swap partition, create the filesystem, beforehand, and add an offset to the cryptsetup swap options
## below so the PARTUUID is not overwritten by cryptsetup and can be used as the source device.
## If using AES-XTS as the cipher, a key size of double the target security level should be used as XTS mode splits the
## key size, making a key size of 512 bits effectively 256 bits (AES-256), and a key size of 256 bits effectively 128
## bits (AES-128).
## For ephemeral swap which has a randomly-generated, per-boot key, set the key file as /dev/urandom; all data will be
## irreversibly lost on system shutdown or reboot. Note that using ephemeral swap prevents hibernation to the target
## swap partition.
swap="swap"
source="PARTUUID=[REDACTED]"
options="--offset 2048 --cipher aes-xts-plain64 --key-size 512 --key-file /dev/urandom"

View File

@ -1,23 +0,0 @@
# Inferencium - aa000-0
# dm-crypt - Configuration
# Version: 3.0.0-beta.1
# Copyright 2023 Jake Winters
# SPDX-License-Identifier: BSD-3-Clause
# Global
## How long to wait for each timeout (in seconds)
dmcrypt_key_timeout="1"
## Max number of checks to perform (see dmcrypt_key_timeout)
#dmcrypt_max_timeout="300"
# Number of password retries
dmcrypt_retries="5"
# swap
## These should come first so no keys make their way into unencrypted swap.
swap="swap"
source="PARTUUID=[REDACTED]"
options="--offset 2048 --cipher aes-xts-plain64 --key-size 512 --key-file /dev/urandom"