![]() Your computer won’t actually boot though, since you installed your Ubuntu bootloader to /dev/sda1 instead of /dev/sda. Then finish the rest of the steps, and wait for Ubuntu to install. It will pop up an error warning you that you’re not using a swap partition. When you install Qubes, the bootloader will be installed to /dev/sda, so it’s important that you put Ubuntu’s bootloader somewhere else. This is important: before you start installing Ubuntu, under “Device for boot loader installation” choose /dev/sda1 instead of /dev/sda. You can keep use as as ext4, and then select / as the mount point, and click ok. But above that you’ll have /dev/mapper/sda2_crypt, which contains your encrypted partition.Ĭlick on /dev/mapper/sda2_crypt and click Change. In /dev/sda you’ll have sda1, which is /boot, and sda2, which is “unknown”, and then a bunch of free space. Now your partition table should look like this. For use as, choose “physical volume for encryption”, and enter the disk encryption passphrase you want to use for Ubuntu twice. Set type to “Primary” and location to “Beginning of this space”. For me, I’m going to make my Ubuntu partition only 20 GB, leaving the rest of the space for Qubes. Now click the free space again and click the “+” to create Ubuntu’s encrypted root partition. Make the size 1024 MB, type “Primary”, location “Beginning of this space”, use as ext4, and set the mount point to /boot. Then select the free space and click the “+” to create Ubuntu’s plaintext /boot partition. When you get to the “Installation type” screen, choose “Something else”.ĭelete all the partitions you already have on your disk. ![]() I have enough RAM in my computer that I don’t need to, and the GUI partitioning tools don’t make it simple to encrypt your swap with the same key that you use to encrypt your root partition.įirst, boot to an Ubuntu install disk and start the installation like normal. To make things simpler, I’m not going to use a swap partition for Ubuntu. (You have to get really, really, really owned for an attacker who compromised Qubes to then compromise Ubuntu.) Keep in mind that if you’re booted into Ubuntu and you get owned, it’s possible for the attacker to then compromise Qubes. You should be able to adopt this same technique to dual-boot pretty much any two GNU/Linux distros with disk encryption. So here are instructions for how to dual-boot Qubes R2 rc1 and Ubuntu 14.04 LTS, using disk encryption for both. You normally don’t have any reason to do this, except for very specific cases, like software development with Vagrant. You also can’t run VirtualBox inside of Qubes. And Qubes VMs don’t support 3D acceleration, which you might occasionally need. It’s hard to get certain hardware working the way you expect in Qubes, like webcams or non-disk USB devices. ![]() Qubes is my preferred operating system, but occasionally you need to run something else. Dual-booting Qubes and Ubuntu with Encrypted Disks
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |