Install Debian ARM
Install Debian ARM
Install Debian ARM
Debian GNU/Linux Installation Guide Copyright 2004 2010 the Debian Installer team This document contains installation instructions for the Debian GNU/Linux 6.0 system (codename squeeze), for the ARM (armel) architecture. It also contains pointers to more information and information on how to make the most of your new Debian system.
Warning
This installation guide is based on an earlier manual written for the old Debian installation system (the bootoppies), and has been updated to document the new Debian installer. However, for armel, the manual has not been fully updated and fact checked for the new installer. There may remain parts of the manual that are incomplete or outdated or that still document the boot-oppies installer. A newer version of this manual, possibly better documenting this architecture, may be found on the Internet at the debian-installer home page (http://www.debian.org/devel/debian-installer/). You may also be able to nd additional translations there.
This manual is free software; you may redistribute it and/or modify it under the terms of the GNU General Public License. Please refer to the license in Appendix F.
Table of Contents
Installing Debian GNU/Linux 6.0 For armel...................................................................................ix 1. Welcome to Debian ......................................................................................................................... 1 1.1. What is Debian? ................................................................................................................... 1 1.2. What is GNU/Linux? ........................................................................................................... 2 1.3. What is Debian GNU/Linux?............................................................................................... 3 1.4. What is Debian GNU/Hurd? ................................................................................................ 3 1.5. Getting Debian ..................................................................................................................... 3 1.6. Getting the Newest Version of This Document.................................................................... 4 1.7. Organization of This Document........................................................................................... 4 1.8. Your Documentation Help is Welcome................................................................................ 5 1.9. About Copyrights and Software Licenses............................................................................ 5 2. System Requirements ..................................................................................................................... 7 2.1. Supported Hardware............................................................................................................. 7 2.1.1. Supported Architectures .......................................................................................... 7 2.1.2. CPU, Main Boards, and Video Support................................................................... 8 2.1.3. Graphics Card Support ............................................................................................ 9 2.1.4. Network Connectivity Hardware............................................................................. 9 2.1.5. Peripherals and Other Hardware ............................................................................. 9 2.2. Devices Requiring Firmware ............................................................................................... 9 2.3. Purchasing Hardware Specically for GNU/Linux ........................................................... 10 2.3.1. Avoid Proprietary or Closed Hardware ................................................................. 10 2.4. Installation Media .............................................................................................................. 10 2.4.1. CD-ROM/DVD-ROM ........................................................................................... 10 2.4.2. Hard Disk............................................................................................................... 10 2.4.3. Network ................................................................................................................. 11 2.4.4. Un*x or GNU system ............................................................................................ 11 2.4.5. Supported Storage Systems ................................................................................... 11 2.5. Memory and Disk Space Requirements............................................................................. 11 3. Before Installing Debian GNU/Linux ......................................................................................... 12 3.1. Overview of the Installation Process.................................................................................. 12 3.2. Back Up Your Existing Data!............................................................................................. 13 3.3. Information You Will Need................................................................................................ 13 3.3.1. Documentation ...................................................................................................... 13 3.3.1.1. Installation Manual ................................................................................... 13 3.3.1.2. Hardware documentation .......................................................................... 13 3.3.2. Finding Sources of Hardware Information............................................................ 13 3.3.3. Hardware Compatibility ........................................................................................ 15 3.3.4. Network Settings ................................................................................................... 15 3.4. Meeting Minimum Hardware Requirements ..................................................................... 16 3.5. Pre-Partitioning for Multi-Boot Systems ........................................................................... 16 3.6. Pre-Installation Hardware and Operating System Setup.................................................... 17 4. Obtaining System Installation Media ......................................................................................... 19 4.1. Ofcial Debian GNU/Linux CD-ROM Sets ...................................................................... 19 4.2. Downloading Files from Debian Mirrors........................................................................... 19 4.2.1. Where to Find Installation Images ........................................................................ 19 4.2.1.1. NSLU2 Installation Files .......................................................................... 19 4.2.1.2. Thecus N2100 Installation Files ............................................................... 20 4.2.1.3. GLAN Tank Installation Files................................................................... 20
iii
4.2.1.4. Kurobox Pro Installation Files .................................................................. 20 4.2.1.5. HP mv2120 Installation Files ................................................................... 20 4.2.1.6. QNAP Turbo Station Installation Files ..................................................... 20 4.2.1.7. SheevaPlug and OpenRD Installation Files .............................................. 20 4.3. Preparing Files for TFTP Net Booting............................................................................... 21 4.3.1. Setting up RARP server......................................................................................... 21 4.3.2. Setting up a DHCP server...................................................................................... 21 4.3.3. Setting up a BOOTP server ................................................................................... 22 4.3.4. Enabling the TFTP Server ..................................................................................... 23 4.3.5. Move TFTP Images Into Place.............................................................................. 23 4.4. Automatic Installation........................................................................................................ 23 4.4.1. Automatic Installation Using the Debian Installer ................................................ 23 5. Booting the Installation System................................................................................................... 24 5.1. Booting the Installer on ARM............................................................................................ 24 5.1.1. Booting from TFTP ............................................................................................... 24 5.1.2. Booting from CD-ROM......................................................................................... 24 5.1.3. Booting from Firmware ......................................................................................... 24 5.1.3.1. Booting the NSLU2 .................................................................................. 24 5.1.3.1.1. Using the NSLU2 web interface .................................................. 24 5.1.3.1.2. Via the network using Linux/Unix ............................................... 24 5.1.3.1.3. Via the network using Windows................................................... 25 5.1.3.2. Booting the SS4000-E .............................................................................. 25 5.2. Accessibility....................................................................................................................... 26 5.2.1. Board Devices........................................................................................................ 26 5.2.2. High-Contrast Theme ............................................................................................ 27 5.3. Boot Parameters ................................................................................................................. 27 5.3.1. Debian Installer Parameters................................................................................... 27 5.3.1.1. Using boot parameters to answer questions.............................................. 30 5.3.1.2. Passing parameters to kernel modules ...................................................... 31 5.3.1.3. Blacklisting kernel modules...................................................................... 31 5.4. Troubleshooting the Installation Process ........................................................................... 32 5.4.1. CD-ROM Reliability ............................................................................................. 32 5.4.1.1. Common issues ......................................................................................... 32 5.4.1.2. How to investigate and maybe solve issues .............................................. 32 5.4.2. Boot Conguration ................................................................................................ 34 5.4.3. Interpreting the Kernel Startup Messages ............................................................. 34 5.4.4. Reporting Installation Problems ............................................................................ 34 5.4.5. Submitting Installation Reports............................................................................. 35 6. Using the Debian Installer............................................................................................................ 37 6.1. How the Installer Works..................................................................................................... 37 6.2. Components Introduction................................................................................................... 37 6.3. Using Individual Components............................................................................................ 40 6.3.1. Setting up Debian Installer and Hardware Conguration ..................................... 40 6.3.1.1. Check available memory / low memory mode ......................................... 40 6.3.1.2. Selecting Localization Options ................................................................. 41 6.3.1.3. Choosing a Keyboard................................................................................ 42 6.3.1.4. Looking for the Debian Installer ISO Image ............................................ 42 6.3.1.5. Conguring the Network .......................................................................... 42 6.3.1.6. Conguring the Clock and Time Zone ..................................................... 43 6.3.2. Partitioning and Mount Point Selection ................................................................ 44 6.3.2.1. Supported partitioning options.................................................................. 44
iv
6.3.2.2. Guided Partitioning................................................................................... 45 6.3.2.3. Manual Partitioning .................................................................................. 46 6.3.2.4. Conguring Multidisk Devices (Software RAID) .................................... 47 6.3.2.5. Conguring the Logical Volume Manager (LVM) ................................... 50 6.3.2.6. Conguring Encrypted Volumes............................................................... 51 6.3.3. Installing the Base System..................................................................................... 54 6.3.4. Setting Up Users And Passwords .......................................................................... 55 6.3.4.1. Set the Root Password .............................................................................. 55 6.3.4.2. Create an Ordinary User ........................................................................... 55 6.3.5. Installing Additional Software .............................................................................. 55 6.3.5.1. Conguring apt ......................................................................................... 55 6.3.5.1.1. Installing from more than one CD or DVD.................................. 56 6.3.5.1.2. Using a network mirror ................................................................ 56 6.3.5.2. Selecting and Installing Software ............................................................. 57 6.3.6. Making Your System Bootable.............................................................................. 59 6.3.6.1. Detecting other operating systems ............................................................ 59 6.3.6.2. Continue Without Boot Loader................................................................. 59 6.3.7. Finishing the Installation ....................................................................................... 59 6.3.7.1. Setting the System Clock .......................................................................... 59 6.3.7.2. Reboot the System .................................................................................... 59 6.3.8. Miscellaneous ........................................................................................................ 60 6.3.8.1. Saving the installation logs ....................................................................... 60 6.3.8.2. Using the Shell and Viewing the Logs...................................................... 60 6.3.8.3. Installation Over the Network................................................................... 60 6.4. Loading Missing Firmware ................................................................................................ 62 6.4.1. Preparing a medium............................................................................................... 62 6.4.2. Firmware and the Installed System ....................................................................... 63 7. Booting Into Your New Debian System ...................................................................................... 64 7.1. The Moment of Truth......................................................................................................... 64 7.2. Mounting encrypted volumes............................................................................................. 64 7.2.1. dm-crypt ................................................................................................................ 64 7.2.2. loop-AES ............................................................................................................... 65 7.2.3. Troubleshooting..................................................................................................... 65 7.3. Log In ................................................................................................................................. 66 8. Next Steps and Where to Go From Here .................................................................................... 67 8.1. Shutting down the system .................................................................................................. 67 8.2. If You Are New to Unix ..................................................................................................... 67 8.3. Orienting Yourself to Debian ............................................................................................. 67 8.3.1. Debian Packaging System ..................................................................................... 67 8.3.2. Application Version Management ......................................................................... 68 8.3.3. Cron Job Management........................................................................................... 68 8.4. Further Reading and Information....................................................................................... 68 8.5. Setting Up Your System To Use E-Mail ............................................................................ 69 8.5.1. Default E-Mail Conguration................................................................................ 69 8.5.2. Sending E-Mails Outside The System................................................................... 69 8.5.3. Conguring the Exim4 Mail Transport Agent ...................................................... 70 8.6. Compiling a New Kernel.................................................................................................... 71 8.6.1. Kernel Image Management ................................................................................... 71 8.7. Recovering a Broken System ............................................................................................. 72
A. Installation Howto........................................................................................................................ 74 A.1. Preliminaries ..................................................................................................................... 74 A.2. Booting the installer .......................................................................................................... 74 A.2.1. CDROM................................................................................................................ 74 A.2.2. Booting from network .......................................................................................... 74 A.2.3. Booting from hard disk......................................................................................... 74 A.3. Installation......................................................................................................................... 75 A.4. Send us an installation report ............................................................................................ 76 A.5. And nally. . . .................................................................................................................... 76 B. Automating the installation using preseeding ........................................................................... 77 B.1. Introduction ....................................................................................................................... 77 B.1.1. Preseeding methods .............................................................................................. 77 B.1.2. Limitations ............................................................................................................ 78 B.2. Using preseeding ............................................................................................................... 78 B.2.1. Loading the preconguration le.......................................................................... 78 B.2.2. Using boot parameters to preseed questions......................................................... 79 B.2.3. Auto mode............................................................................................................. 79 B.2.4. Aliases useful with preseeding ............................................................................. 81 B.2.5. Using a DHCP server to specify preconguration les ........................................ 81 B.3. Creating a preconguration le ......................................................................................... 82 B.4. Contents of the preconguration le (for squeeze) ........................................................... 83 B.4.1. Localization .......................................................................................................... 83 B.4.2. Network conguration .......................................................................................... 84 B.4.3. Network console ................................................................................................... 85 B.4.4. Mirror settings....................................................................................................... 85 B.4.5. Clock and time zone setup .................................................................................... 86 B.4.6. Partitioning............................................................................................................ 86 B.4.6.1. Partitioning example................................................................................. 87 B.4.6.2. Partitioning using RAID........................................................................... 88 B.4.6.3. Controlling how partitions are mounted................................................... 89 B.4.7. Base system installation........................................................................................ 90 B.4.8. Account setup ....................................................................................................... 90 B.4.9. Apt setup ............................................................................................................... 91 B.4.10. Package selection ................................................................................................ 92 B.4.11. Boot loader installation....................................................................................... 92 B.4.12. Finishing up the installation................................................................................ 93 B.4.13. Preseeding other packages .................................................................................. 94 B.5. Advanced options .............................................................................................................. 94 B.5.1. Running custom commands during the installation.............................................. 94 B.5.2. Using preseeding to change default values ........................................................... 94 B.5.3. Chainloading preconguration les...................................................................... 95 C. Partitioning for Debian................................................................................................................ 96 C.1. Deciding on Debian Partitions and Sizes .......................................................................... 96 C.2. The Directory Tree ............................................................................................................ 96 C.3. Recommended Partitioning Scheme.................................................................................. 97 C.4. Device Names in Linux ..................................................................................................... 98 C.5. Debian Partitioning Programs ........................................................................................... 99
vi
D. Random Bits ............................................................................................................................... 100 D.1. Linux Devices ................................................................................................................. 100 D.1.1. Setting Up Your Mouse ...................................................................................... 101 D.2. Disk Space Needed for Tasks.......................................................................................... 101 D.3. Installing Debian GNU/Linux from a Unix/Linux System............................................. 102 D.3.1. Getting Started.................................................................................................... 103 D.3.2. Install debootstrap............................................................................................. 103 D.3.3. Run debootstrap ................................................................................................ 104 D.3.4. Congure The Base System ............................................................................... 104 D.3.4.1. Create device les .................................................................................. 104 D.3.4.2. Mount Partitions..................................................................................... 105 D.3.4.3. Setting Timezone ................................................................................... 106 D.3.4.4. Congure Networking............................................................................ 106 D.3.4.5. Congure Apt......................................................................................... 107 D.3.4.6. Congure Locales and Keyboard........................................................... 107 D.3.5. Install a Kernel.................................................................................................... 108 D.3.6. Set up the Boot Loader ....................................................................................... 108 D.3.7. Finishing touches................................................................................................ 109 D.4. Installing Debian GNU/Linux using PPP over Ethernet (PPPoE) .................................. 109 E. Administrivia.............................................................................................................................. 111 E.1. About This Document ..................................................................................................... 111 E.2. Contributing to This Document ....................................................................................... 111 E.3. Major Contributions......................................................................................................... 111 E.4. Trademark Acknowledgement......................................................................................... 112 F. GNU General Public License .................................................................................................... 113 F.1. Preamble........................................................................................................................... 113 F.2. GNU GENERAL PUBLIC LICENSE............................................................................. 113 F.3. How to Apply These Terms to Your New Programs........................................................ 117
vii
List of Tables
3-1. Hardware Information Needed for an Install .............................................................................. 14 3-2. Recommended Minimum System Requirements ........................................................................ 16
viii
ix
The Debian Social Contract (http://www.debian.org/social_contract) is a statement of Debians commitments to the Free Software Community. Anyone who agrees to abide to the Social Contract may become a maintainer (http://www.debian.org/doc/maint-guide/). Any maintainer can introduce new software into Debian provided that the software meets our criteria for being free, and the package follows our quality standards. The Debian Free Software Guidelines (http://www.debian.org/social_contract#guidelines) are a clear and concise statement of Debians criteria for free software. The DFSG is a very inuential document in the Free Software Movement, and was the foundation of the The Open Source Denition (http://opensource.org/docs/denition_plain.html). The Debian Policy Manual (http://www.debian.org/doc/debian-policy/) is an extensive specication of the Debian Projects standards of quality.
Debian developers are also involved in a number of other projects; some specic to Debian, others involving some or all of the Linux community. Some examples include:
The Linux Standard Base (http://www.linuxbase.org/) (LSB) is a project aimed at standardizing the basic GNU/Linux system, which will enable third-party software and hardware developers to easily design programs and device drivers for Linux-in-general, rather than for a specic GNU/Linux distribution. The Filesystem Hierarchy Standard (http://www.pathname.com/fhs/) (FHS) is an effort to standardize the layout of the Linux le system. The FHS will allow software developers to concentrate their efforts on designing programs, without having to worry about how the package will be installed in different GNU/Linux distributions.
Debian Jr. (http://www.debian.org/devel/debian-jr/) is an internal project, aimed at making sure Debian has something to offer to our youngest users.
For more general information about Debian, see the Debian FAQ (http://www.debian.org/doc/FAQ/).
Chapter 1. Welcome to Debian Once youve got your system installed, you can read Chapter 8. That chapter explains where to look to nd more information about Unix and Debian, and how to replace your kernel. Finally, information about this document and how to contribute to it may be found in Appendix E.
Many of the programs in the system are licensed under the GNU General Public License, often simply referred to as the GPL. The GPL requires you to make the source code of the programs available whenever you distribute a binary copy of the program; that provision of the license ensures that any user will be able to modify the software. Because of this provision, the source code1 for all such programs is available in the Debian system. There are several other forms of copyright statements and software licenses used on the programs in Debian. You can nd the copyrights and licenses for every package installed on your system by looking in the le /usr/share/doc/package-name/copyright once youve installed a package on your system.
1. For information on how to locate, unpack, and build binaries from Debian source packages, see the Debian FAQ (http://www.debian.org/doc/FAQ/), under Basics of the Debian Package Management System.
Chapter 1. Welcome to Debian For more information about licenses and how Debian determines whether software is free enough to be included in the main distribution, see the Debian Free Software Guidelines (http://www.debian.org/social_contract#guidelines). The most important legal notice is that this software comes with no warranties. The programmers who have created this software have done so for the benet of the community. No guarantee is made as to the suitability of the software for any given purpose. However, since the software is free, you are empowered to modify that software to suit your needs and to enjoy the benets of the changes made by others who have extended the software in this way.
Chapter 2. System Requirements Architecture IBM/Motorola PowerPC Debian Designation Subarchitecture powerpc PowerMac PReP Sun SPARC sparc sun4u sun4v IBM S/390 s390 IPL from VM-reader and DASD IPL from tape generic tape Flavor pmac prep sparc64
This document covers installation for the ARM architecture. If you are looking for information on any of the other Debian-supported architectures take a look at the Debian-Ports (http://www.debian.org/ports/) pages.
Chapter 2. System Requirements Orion5x Orion is a system on a chip (SoC) from Marvell that integrates an ARM CPU, Ethernet, SATA, USB, and other functionality in one chip. There are many Network Attached Storage (NAS) devices on the market that are based on an Orion chip. We currently support the following Orion based devices: Buffalo Kurobox (http://www.cyrius.com/debian/orion/buffalo/kuroboxpro/), HP mv2120 (http://www.cyrius.com/debian/orion/hp/mv2120), QNAP Turbo Station (http://www.cyrius.com/debian/orion/qnap/) (TS-109, TS-209 and TS-409). Versatile The Versatile platform is emulated by QEMU and is therefore a nice way to test and run Debian on ARM if you dont have the hardware.
Chapter 2. System Requirements However, this does not mean that such hardware cannot be used during an installation. Starting with Debian GNU/Linux 5.0, debian-installer supports loading rmware les or packages containing rmware from a removable medium, such as a oppy disk or USB stick. See Section 6.4 for detailed information on how to load rmware les or packages during the installation.
2.4.1. CD-ROM/DVD-ROM
Note: Whenever you see CD-ROM in this manual, it applies to both CD-ROMs and DVD-ROMs, because both technologies are really the same from the operating systems point of view, except for some very old nonstandard CD-ROM drives which are neither SCSI nor IDE/ATAPI.
CD-ROM based installation is supported for some architectures. On machines which support bootable CD-ROMs, you should be able to do a completely oppy-less installation. Even if your system doesnt support booting from a CD-ROM, you can use the CD-ROM in conjunction with the other techniques to install your system, once youve booted up by other means; see Chapter 5. IDE/ATAPI CD-ROMs are supported on all ARM machines.
10
2.4.3. Network
The network can be used during the installation to retrieve les needed for the installation. Whether the network is used or not depends on the installation method you choose and your answers to certain questions that will be asked during the installation. The installation system supports most types of network connections (including PPPoE, but not ISDN or PPP), via either HTTP or FTP. After the installation is completed, you can also congure your system to use ISDN and PPP. You can also boot the installation system over the network. Diskless installation, using network booting from a local area network and NFS-mounting of all local lesystems, is another option.
11
12
Chapter 3. Before Installing Debian GNU/Linux The installer software, debian-installer, is the primary concern of this manual. It detects hardware and loads appropriate drivers, uses dhcp-client to set up the network connection, runs debootstrap to install the base system packages, and runs tasksel to allow you to install certain additional software. Many more actors play smaller parts in this process, but debian-installer has completed its task when you load the new system for the rst time. To tune the system to your needs, tasksel allows you to choose to install various predened bundles of software like a Web server or a Desktop environment. One important option during the installation is whether or not to install a graphical desktop environment, consisting of the X Window System and one of the available graphical desktop environments. If you choose not to select the Desktop environment task, you will only have a relatively basic, command line driven system. Installing the Desktop environment task is optional because it requires a fairly large amount of disk space, and because many Debian GNU/Linux systems are servers which dont really have any need for a graphical user interface to do their job. Just be aware that the X Window System is completely separate from debian-installer, and in fact is much more complicated. Installation and troubleshooting of the X Window System is not within the scope of this manual.
13
The manuals that come with each piece of hardware. The BIOS setup screens of your computer. You can view these screens when you start your computer by pressing a combination of keys. Check your manual for the combination. Often, it is the Delete key. The cases and boxes for each piece of hardware. System commands or tools in another operating system, including le manager displays. This source is especially useful for information about RAM and hard drive memory. Your system administrator or Internet Service Provider. These sources can tell you the settings you need to set up your networking and e-mail.
Table 3-1. Hardware Information Needed for an Install Hardware Hard Drives Information You Might Need How many you have. Their order on the system. Whether IDE (also known as PATA), SATA or SCSI. Available free space. Partitions. Partitions where other operating systems are installed. Monitor Model and manufacturer. Resolutions supported. Horizontal refresh rate. Vertical refresh rate. Color depth (number of colors) supported. Screen size. Mouse Type: serial, PS/2, or USB. Port. Manufacturer. Number of buttons. Network Model and manufacturer. Type of adapter. Printer Model and manufacturer. Printing resolutions supported.
14
Chapter 3. Before Installing Debian GNU/Linux Hardware Video Card Information You Might Need Model and manufacturer. Video RAM available. Resolutions and color depths supported (these should be checked against your monitors capabilities).
Checking manufacturers web sites for new drivers. Looking at web sites or manuals for information about emulation. Lesser known brands can sometimes use the drivers or settings for better-known ones. Checking hardware compatibility lists for Linux on web sites dedicated to your architecture. Searching the Internet for other users experiences.
Your host name (you may be able to decide this on your own). Your domain name. Your computers IP address. The netmask to use with your network. The IP address of the default gateway system you should route to, if your network has a gateway. The system on your network that you should use as a DNS (Domain Name Service) server.
On the other hand, if your administrator tells you that a DHCP server is available and is recommended, then you dont need this information because the DHCP server will provide it directly to your computer during the installation process. If you use a wireless network, you should also nd out:
15
The actual minimum memory requirements are a lot less then the numbers listed in this table. Depending on the architecture, it is possible to install Debian with as little as 20MB (for s390) to 48MB (for i386 and amd64). The same goes for the disk space requirements, especially if you pick and choose which applications to install; see Section D.2 for additional information on disk space requirements. It is possible to run a graphical desktop environment on older or low-end systems, but in that case it is recommended to install a window manager that is less resource-hungry than those of the GNOME or KDE desktop environments; alternatives include xfce4, icewm and wmaker, but there are others to choose from. It is practically impossible to give general memory or disk space requirements for server installations as those very much depend on what the server is to be used for. Remember that these sizes dont include all the other materials which are usually to be found, such as user les, mail, and data. It is always best to be generous when considering the space for your own les and data. Disk space required for the smooth operation of the Debian GNU/Linux system itself is taken into account in these recommended system requirements. Notably, the /var partition contains a lot of state information specic to Debian in addition to its regular contents, like logles. The dpkg les (with information on all installed packages) can easily consume 40MB. Also, apt-get puts downloaded packages here before they are installed. You should usually allocate at least 200MB for /var, and a lot more if you install a graphical desktop environment.
16
Chapter 3. Before Installing Debian GNU/Linux You can nd information about your current partition setup by using a partitioning tool for your current operating system. Partitioning tools always provide a way to show existing partitions without making changes. In general, changing a partition with a le system already on it will destroy any information there. Thus you should always make backups before doing any repartitioning. Using the analogy of the house, you would probably want to move all the furniture out of the way before moving a wall or you risk destroying it. If your computer has more than one hard disk, you may want to dedicate one of the hard disks completely to Debian. If so, you dont need to partition that disk before booting the installation system; the installers included partitioning program can handle the job nicely. If your machine has only one hard disk, and you would like to completely replace the current operating system with Debian GNU/Linux, you also can wait to partition as part of the installation process (Section 6.3.2), after you have booted the installation system. However this only works if you plan to boot the installer system from tapes, CD-ROM or les on a connected machine. Consider: if you boot from les placed on the hard disk, and then partition that same hard disk within the installation system, thus erasing the boot les, youd better hope the installation is successful the rst time around. At the least in this case, you should have some alternate means of reviving your machine like the original systems installation tapes or CDs. If your machine already has multiple partitions, and enough space can be provided by deleting and replacing one or more of them, then you too can wait and use the Debian installers partitioning program. You should still read through the material below, because there may be special circumstances like the order of the existing partitions within the partition map, that force you to partition before installing anyway. If none of the above apply, youll need to partition your hard disk before starting the installation to create partitionable space for Debian. If some of the partitions will be owned by other operating systems, you should create those partitions using native operating system partitioning programs. We recommend that you do not attempt to create partitions for Debian GNU/Linux using another operating systems tools. Instead, you should just create the native operating systems partitions you will want to retain. If you are going to install more than one operating system on the same machine, you should install all other system(s) before proceeding with Linux installation. Windows and other OS installations may destroy your ability to start Linux, or encourage you to reformat non-native partitions. You can recover from these actions or avoid them, but installing the native system rst saves you trouble. If you currently have one hard disk with one partition (a common setup for desktop computers), and you want to multi-boot the native operating system and Debian, you will need to: 1. Back up everything on the computer. 2. Boot from the native operating system installer media such as CD-ROM or tapes. 3. Use the native partitioning tools to create native system partition(s). Leave either a place holder partition or free space for Debian GNU/Linux. 4. Install the native operating system on its new partition. 5. Boot back into the native system to verify everythings OK, and to download the Debian installer boot les. 6. Boot the Debian installer to continue installing Debian.
17
18
19
20
21
In this example, there is one server servername which performs all of the work of DHCP server, TFTP server, and network gateway. You will almost certainly need to change the domain-name options, as well as the server name and client hardware address. The filename option should be the name of the le which will be retrieved via TFTP. After you have edited the dhcpd conguration le, restart it with /etc/init.d/dhcpd3-server restart.
Now, you must create an /etc/bootptab le. This has the same sort of familiar and cryptic format as the good old BSD printcap, termcap, and disktab les. See the bootptab manual page for more information. For CMU bootpd, you will need to know the hardware (MAC) address of the client. Here is an example /etc/bootptab:
client:\ hd=/tftpboot:\ bf=tftpboot.img:\ ip=192.168.1.90:\ sm=255.255.255.0:\ sa=192.168.1.1:\ ha=0123456789AB:
You will need to change at least the ha option, which species the hardware address of the client. The bf option species the le a client should retrieve via TFTP; see Section 4.3.5 for more details. By contrast, setting up BOOTP with ISC dhcpd is really easy, because it treats BOOTP clients as a moderately special case of DHCP clients. Some architectures require a complex conguration for booting clients via BOOTP. If yours is one of those, read the section Section 4.3.2. Otherwise you will probably be able to get away with simply adding the allow bootp directive to the conguration
22
Chapter 4. Obtaining System Installation Media block for the subnet containing the client in /etc/dhcp3/dhcpd.conf, and restart dhcpd with /etc/init.d/dhcpd3-server restart.
All in.tftpd alternatives available in Debian should log TFTP requests to the system logs by default. Some of them support a -v argument to increase verbosity. It is recommended to check these log messages in case of boot problems as they are a good starting point for diagnosing the cause of errors.
23
24
Chapter 5. Booting the Installation System 5.1.3.1.2. Via the network using Linux/Unix You can use upslug2 from any Linux or Unix machine to upgrade the machine via the network. This software is packaged for Debian. First, you have to put your NSLU2 in upgrade mode: 1. Disconnect any disks and/or devices from the USB ports. 2. Power off the NSLU2 3. Press and hold the reset button (accessible through the small hole on the back just above the power input). 4. Press and release the power button to power on the NSLU2. 5. Wait for 10 seconds watching the ready/status LED. After 10 seconds it will change from amber to red. Immediately release the reset button. 6. The NSLU2 ready/status LED will ash alternately red/green (there is a 1 second delay before the rst green). The NSLU2 is now in upgrade mode. See the NSLU2-Linux pages (http://www.nslu2-linux.org/wiki/OpenSlug/UsingTheBinary) if you have problems with this. Once your NSLU2 is in upgrade mode, you can ash the new image:
sudo upslug2 -i di-nslu2.bin
Note that the tool also shows the MAC address of your NSLU2, which may come in handy to congure your DHCP server. After the whole image has been written and veried, the system will automatically reboot. Make sure you connect your USB disk again now, otherwise the installer wont be able to nd it.
5.1.3.1.3. Via the network using Windows There is a tool (http://www.everbesthk.com/8-download/sercomm/rmware/all_router_utility.zip) for Windows to upgrade the rmware via the network.
If using Windows, you may want to consider using the program hyperterminal. Use a baud rate of 115200, 8 bits word length, no stop bits, and one parity bit.
1. 2. A USB serial converter will also work. This cable is often found in older desktop machines with builtin 9-pin serial ports.
25
Chapter 5. Booting the Installation System When the machine boots, you will see the following line of output:
No network interfaces found EM-7210 ver.T04 2005-12-12 (For ver.AA) == Executing boot script in 1.000 seconds - enter ^C to abort
At this point, hit Control-C to interrupt the boot loader3. This will give you the RedBoot prompt. Enter the following commands:
load -v -r -b 0x01800000 -m ymodem ramdisk.gz load -v -r -b 0x01008000 -m ymodem zImage exec -c "console=ttyS0,115200 rw root=/dev/ram mem=256M@0xa0000000" -r 0x01800000
After every load command, the system will expect a le to be transmitted using the YMODEM protocol. When using cu, make sure you have the package lrzsz installed, then hit enter, followed by the ~< escape sequence to start an external program, and run sb initrd.gz or sb vmlinuz. Alternatively, it is possible to load the kernel and ramdisk using HTTP rather than YMODEM. This is faster, but requires a working HTTP server on the network. To do so, rst switch the bootloader to RAM mode:
fis load rammode g
This will seemingly restart the machine; but in reality, it loads reboot to RAM and restarts it from there. Not doing this step will cause the system to hang in the necessary ip_address step that comes next. You will need to hit Ctrl-C again to interrupt the boot. Then:
ip_address -l 192.168.2.249 -h 192.168.2.4 load -v -r -b 0x01800000 -m http /initrd.gz load -v -r -b 0x01008000 -m http /zImage exec -c "console=ttyS0,115200 rw root=/dev/ram mem=256M@0xa0000000" -r 0x01800000
Where 192.168.2.249 is the IP address of the installed system and 192.168.2.4 the IP address of the HTTP server containing the kernel and ramdisk les. The installer will now start as usual.
5.2. Accessibility
Some users may need specic support because of e.g. some visual impairment. Most accessibility features have to be enabled manually. Some boot parameters can be appended to enable accessibility features. Note that on most architectures the boot loader interprets your keyboard as a QWERTY keyboard.
3. Note that you have only one second to do so; if you miss this window, just powercycle the machine and try again.
26
should be emitted early in the process. total should match the total amount of RAM, in kilobytes. If this doesnt match the actual amount of RAM you have installed, you need to use the mem=ram parameter, where ram is set to the amount of memory, sufxed with k for kilobytes, or m for megabytes. For example, both mem=65536k and mem=64m mean 64MB of RAM. If you are booting with a serial console, generally the kernel will autodetect this. If you have a videocard (framebuffer) and a keyboard also attached to the computer which you wish to boot via serial console, you may have to pass the console=device argument to the kernel, where device is your serial device, which is usually something like ttyS04.
27
Chapter 5. Booting the Installation System in brackets behind the (normal) long form. Examples in this manual will normally use the short form too. debconf/priority (priority) This parameter sets the lowest priority of messages to be displayed. The default installation uses priority=high. This means that both high and critical priority messages are shown, but medium and low priority messages are skipped. If problems are encountered, the installer adjusts the priority as needed. If you add priority=medium as boot parameter, you will be shown the installation menu and gain more control over the installation. When priority=low is used, all messages are shown (this is equivalent to the expert boot method). With priority=critical, the installation system will display only critical messages and try to do the right thing without fuss. DEBIAN_FRONTEND This boot parameter controls the type of user interface used for the installer. The current possible parameter settings are:
DEBIAN_FRONTEND=noninteractive DEBIAN_FRONTEND=text DEBIAN_FRONTEND=newt DEBIAN_FRONTEND=gtk
The default frontend is DEBIAN_FRONTEND=newt. DEBIAN_FRONTEND=text may be preferable for serial console installs. Generally, only the newt frontend is available on default install media. On architectures that support it, the graphical installer uses the gtk frontend. BOOT_DEBUG Setting this boot parameter to 2 will cause the installers boot process to be verbosely logged. Setting it to 3 makes debug shells available at strategic points in the boot process. (Exit the shells to continue the boot process.)
BOOT_DEBUG=0
Shells are run at various points in the boot process to allow detailed debugging. Exit the shell to continue the boot. INSTALL_MEDIA_DEV The value of the parameter is the path to the device to load the Debian installer from. For example, INSTALL_MEDIA_DEV=/dev/floppy/0
28
Chapter 5. Booting the Installation System The boot oppy, which normally scans all oppies it can to nd the root oppy, can be overridden by this parameter to only look at the one device. lowmem Can be used to force the installer to a lowmem level higher than the one the installer sets by default based on available memory. Possible values are 1 and 2. See also Section 6.3.1.1. noshell Prevents the installer from offering interactive shells on tty2 and tty3. Useful for unattended installations where physical security is limited. debian-installer/framebuffer (fb) Some architectures use the kernel framebuffer to offer installation in a number of languages. If framebuffer causes a problem on your system you can disable the feature using the parameter fb=false. Problem symptoms are error messages about bterm or bogl, a blank screen, or a freeze within a few minutes after starting the install. debian-installer/theme (theme) A theme determines how the user interface of the installer looks (colors, icons, etc.). What themes are available differs per frontend. Currently both the newt and gtk frontends only have a dark theme that was designed for visually impaired users. Set the theme by booting with theme=dark . netcfg/disable_dhcp By default, the debian-installer automatically probes for network conguration via DHCP. If the probe succeeds, you wont have a chance to review and change the obtained settings. You can get to the manual network setup only in case the DHCP probe fails. If you have a DHCP server on your local network, but want to avoid it because e.g. it gives wrong answers, you can use the parameter netcfg/disable_dhcp=true to prevent conguring the network with DHCP and to enter the information manually. hw-detect/start_pcmcia Set to false to prevent starting PCMCIA services, if that causes problems. Some laptops are well known for this misbehavior. disk-detect/dmraid/enable (dmraid) Set to true to enable support for Serial ATA RAID (also called ATA RAID, BIOS RAID or fake RAID) disks in the installer. Note that this support is currently experimental. Additional information can be found on the Debian Installer Wiki (http://wiki.debian.org/DebianInstaller/). preseed/url (url) Specify the url to a preconguration le to download and use for automating the install. See Section 4.4. preseed/le (le) Specify the path to a preconguration le to load for automating the install. See Section 4.4. preseed/interactive Set to true to display questions even if they have been preseeded. Can be useful for testing or debugging a preconguration le. Note that this will have no effect on parameters that are passed as boot parameters, but for those a special syntax can be used. See Section B.5.2 for details.
29
Chapter 5. Booting the Installation System auto-install/enable (auto) Delay questions that are normally asked before preseeding is possible until after the network is congured. See Section B.2.3 for details about using this to automate installs. nish-install/keep-consoles During installations from serial or management console, the regular virtual consoles (VT1 to VT6) are normally disabled in /etc/inittab. Set to true to prevent this. cdrom-detect/eject By default, before rebooting, debian-installer automatically ejects the optical media used during the installation. This can be unnecessary if the system does not automatically boot off the CD. In some cases it may even be undesirable, for example if the optical drive cannot reinsert the media itself and the user is not there to do it manually. Many slot loading, slim-line, and caddy style drives cannot reload media automatically. Set to false to disable automatic ejection, and be aware that you may need to ensure that the system does not automatically boot from the optical drive after the initial installation. base-installer/install-recommends (recommends) By setting this option to false, the package management system will be congured to not automatically install Recommends, both during the installation and for the installed system. See also Section 6.3.3. Note that this option allows to have a leaner system, but can also result in features being missing that you might normally expect to be available. You may have to manually install some of the recommended packages to obtain the full functionality you want. This option should therefore only be used by very experienced users. debian-installer/allow_unauthenticated By default the installer requires that repositories be authenticated using a known gpg key. Set to true to disable that authentication. Warning: insecure, not recommended. rescue/enable Set to true to enter rescue mode rather than performing a normal installation. See Section 8.7.
30
Chapter 5. Booting the Installation System The second, more exible option is to specify language and country separately. In this case locale can optionally be added to specify a specic default locale for the installed system. Example: language=en country=DE locale=en_GB.UTF-8. anna/choose_modules (modules) Can be used to automatically load installer components that are not loaded by default. Examples of optional components that may be useful are openssh-client-udeb (so you can use scp during the installation) and ppp-udeb (see Section D.4). netcfg/disable_dhcp Set to true if you want to disable DHCP and instead force static network conguration. mirror/protocol (protocol) By default the installer will use the http protocol to download les from Debian mirrors and changing that to ftp is not possible during installations at normal priority. By setting this parameter to ftp, you can force the installer to use that protocol instead. Note that you cannot select an ftp mirror from a list, you have to enter the hostname manually. tasksel:tasksel/rst (tasks) Can be used to select tasks that are not available from the interactive task list, such as the kde-desktop task. See Section 6.3.5.2 for additional information.
If you need to pass multiple parameters to the same or different modules, just repeat this. For example, to set an old 3Com network interface card to use the BNC (coax) connector and IRQ 10, you would pass:
3c509.xcvr=3 3c509.irq=10
31
If the CD-ROM does not boot, check that it was inserted correctly and that it is not dirty. If the installer fails to recognize a CD-ROM, try just running the option Detect and mount CDROM a second time. Some DMA related issues with older CD-ROM drives are known to be resolved in this way.
If this does not work, then try the suggestions in the subsections below. Most, but not all, suggestions discussed there are valid for both CD-ROM and DVD, but well use the term CD-ROM for simplicity. If you cannot get the installation working from CD-ROM, try one of the other installation methods that are available.
Some older CD-ROM drives do not support reading from discs that were burned at high speeds using a modern CD writer. If your system boots correctly from the CD-ROM, it does not necessarily mean that Linux also supports the CD-ROM (or, more correctly, the controller that your CD-ROM drive is connected to). Some older CD-ROM drives do not work correctly if direct memory access (DMA) is enabled.
32
Check that your BIOS actually supports booting from CD-ROM (older systems possibly dont) and that your CD-ROM drive supports the media you are using. If you downloaded an iso image, check that the md5sum of that image matches the one listed for the image in the MD5SUMS le that should be present in the same location as where you downloaded the image from.
$ md5sum debian-testing-i386-netinst.iso a20391b12f7ff22ef705cee4059c6b92 debian-testing-i386-netinst.iso
Next, check that the md5sum of the burned CD-ROM matches as well. The following command should work. It uses the size of the image to read the correct number of bytes from the CD-ROM.
$ dd if=/dev/cdrom | \ > head -c stat --format=%s debian-testing-i386-netinst.iso | \ > md5sum a20391b12f7ff22ef705cee4059c6b92 262668+0 records in 262668+0 records out 134486016 bytes (134 MB) copied, 97.474 seconds, 1.4 MB/s
If, after the installer has been booted successfully, the CD-ROM is not detected, sometimes simply trying again may solve the problem. If you have more than one CD-ROM drive, try changing the CD-ROM to the other drive. If that does not work or if the CD-ROM is recognized but there are errors when reading from it, try the suggestions listed below. Some basic knowledge of Linux is required for this. To execute any of the commands, you should rst switch to the second virtual console (VT2) and activate the shell there.
Switch to VT4 or view the contents of /var/log/syslog (use nano as editor) to check for any specic error messages. After that, also check the output of dmesg. Check in the output of dmesg if your CD-ROM drive was recognized. You should see something like (the lines do not necessarily have to be consecutive):
Probing IDE interface ide1... hdc: TOSHIBA DVD-ROM SD-R6112, ATAPI CD/DVD-ROM drive ide1 at 0x170-0x177,0x376 on irq 15 hdc: ATAPI 24X DVD-ROM DVD-R CD-R/RW drive, 2048kB Cache, UDMA(33) Uniform CD-ROM driver Revision: 3.20
If you dont see something like that, chances are the controller your CD-ROM is connected to was not recognized or may be not supported at all. If you know what driver is needed for the controller, you can try loading it manually using modprobe.
Check that there is a device node for your CD-ROM drive under /dev/. In the example above, this would be /dev/hdc. There should also be a /dev/cdrom. Use the mount command to check if the CD-ROM is already mounted; if not, try mounting it manually:
$ mount /dev/hdc /cdrom
33
Chapter 5. Booting the Installation System Check if there are any error messages after that command.
rw
A 1 in the rst column after using_dma means it is enabled. If it is, try disabling it:
$ echo -n "using_dma:0" >settings
Make sure that you are in the directory for the device that corresponds to your CD-ROM drive.
If there are any problems during the installation, try checking the integrity of the CD-ROM using the option near the bottom of the installers main menu. This option can also be used as a general test if the CD-ROM can be read reliably.
34
Chapter 5. Booting the Installation System Other pertinent installation messages may be found in /var/log/ during the installation, and /var/log/installer/ after the computer has been booted into the installed system.
35
Chapter 5. Booting the Installation System In the bug report, describe what the problem is, including the last visible kernel messages in the event of a kernel hang. Describe the steps that you did which brought the system into the problem state.
36
37
38
Chapter 6. Using the Debian Installer anna Annas Not Nearly APT. Installs packages which have been retrieved from the chosen mirror or CD. clock-setup Updates the system clock and determines whether the clock is set to UTC or not. tzsetup Selects the time zone, based on the location selected earlier. partman Allows the user to partition disks attached to the system, create le systems on the selected partitions, and attach them to the mountpoints. Included are also interesting features like a fully automatic mode or LVM support. This is the preferred partitioning tool in Debian. partitioner Allows the user to partition disks attached to the system. A partitioning program appropriate to your computers architecture is chosen. partconf Displays a list of partitions, and creates le systems on the selected partitions according to user instructions. lvmcfg Helps the user with the conguration of the LVM (Logical Volume Manager). mdcfg Allows the user to set up Software RAID (Redundant Array of Inexpensive Disks). This Software RAID is usually superior to the cheap IDE (pseudo hardware) RAID controllers found on newer motherboards. base-installer Installs the most basic set of packages which would allow the computer to operate under Linux when rebooted. user-setup Sets up the root password, and adds a non-root user. apt-setup Congures apt, mostly automatically, based on what media the installer is running from. pkgsel Uses tasksel to select and install additional software. os-prober Detects currently installed operating systems on the computer and passes this information to the bootloader-installer, which may offer you an ability to add discovered operating systems to the bootloaders start menu. This way the user could easily choose at the boot time which operating system to start.
39
Chapter 6. Using the Debian Installer bootloader-installer The various bootloader installers each install a boot loader program on the hard disk, which is necessary for the computer to start up using Linux without using a oppy or CD-ROM. Many boot loaders allow the user to choose an alternate operating system each time the computer boots. shell Allows the user to execute a shell from the menu, or in the second console. save-logs Provides a way for the user to record information on a oppy disk, network, hard disk, or other media when trouble is encountered, in order to accurately report installer software problems to Debian developers later.
40
Chapter 6. Using the Debian Installer If that is not sufcient, the installer will further reduce memory consumption by loading only those components essential to complete a basic installation. This reduces the functionality of the installation system. You will be given the opportunity to load additional components manually, but you should be aware that each component you select will use additional memory and thus may cause the installation to fail. If the installer runs in low memory mode, it is recommended to create a relatively large swap partition (64128MB). The swap partition will be used as virtual memory and thus increases the amount of memory available to the system. The installer will activate the swap partition as early as possible in the installation process. Note that heavy use of swap will reduce performance of your system and may lead to high disk activity. Despite these measures, it is still possible that your system freezes, that unexpected errors occur or that processes are killed by the kernel because the system runs out of memory (which will result in Out of memory messages on VT4 and in the syslog). For example, it has been reported that creating a big ext3 le system fails in low memory mode when there is insufcient swap space. If a larger swap doesnt help, try creating the le system as ext2 (which is an essential component of the installer) instead. It is possible to change an ext2 partition to ext3 after the installation. It is possible to force the installer to use a higher lowmem level than the one based on available memory by using the boot parameter lowmem as described in Section 5.3.1.
41
If you selected a combination of language and country for which no locale is dened and there exist multiple locales for the language, then the installer will allow you to choose which of those locales you prefer as the default locale for the installed system2. In all other cases a default locale will be selected based on the selected language and country. Any default locale selected as described in the previous paragraph will use UTF-8 as character encoding. If you are installing at low priority, you will have the option of selecting additional locales, including so-called legacy locales3, to be generated for the installed system; if you do, you will be asked which of the selected locales should be the default for the installed system.
2. At medium and low priority you can always select your preferred locale from those available for the selected language (if theres more than one). 3. Legacy locales are locales which do not use UTF-8, but one of the older standards for character encoding such as ISO 8859-1 (used by West European languages) or EUC-JP (used by Japanese).
42
2. Alternatively, the time zone can be set at the very start of the installation by passing the parameter time/zone=value when you boot the installation system. The value should of course be a valid time zone, for example Europe/London or UTC. For automated installations the time zone can be set to any desired value using preseeding.
43
Logical Volume Management (LVM) Software RAID Supported are RAID levels 0, 1, 4, 5, 6 and 10.
Encryption Multipath (experimental) See our Wiki (http://wiki.debian.org/DebianInstaller/MultipathSupport) for information. Support for multipath is currently only available if enabled when the installer is booted.
ext2r0, ext2, ext3, ext4 The default le system selected in most cases is ext3; for /boot partitions ext2 will be selected by default when guided partitioning is used.
jfs (not available on all architectures) xfs (not available on all architectures) reiserfs (optional; not available on all architectures) Support for the Reiser le system is no longer available by default. When the installer is running at medium or low debconf priority it can be enabled by selecting the partman-reiserfs component. Only version 3 of the le system is supported.
jffs2 Used on some systems to read ash memory. It is not possible to create new jffs2 partitions.
44
FAT16, FAT32
When using LVM or encrypted LVM, the installer will create most partitions inside one big partition; the advantage of this method is that partitions inside this big partition can be resized relatively easily later. In the case of encrypted LVM the big partition will not be readable without knowing a special key phrase, thus providing extra security of your (personal) data. When using encrypted LVM, the installer will also automatically erase the disk by writing random data to it. This further improves security (as it makes it impossible to tell which parts of the disk are in use and also makes sure that any traces of previous installations are erased), but may take some time depending on the size of your disk.
Note: If you choose guided partitioning using LVM or encrypted LVM, some changes in the partition table will need to be written to the selected disk while LVM is being set up. These changes effectively erase all data that is currently on the selected hard disk and you will not be able to undo them later. However, the installer will ask you to conrm these changes before they are written to disk.
If you choose guided partitioning (either classic or using (encrypted) LVM) for a whole disk, you will rst be asked to select the disk you want to use. Check that all your disks are listed and, if you have several disks, make sure you select the correct one. The order they are listed in may differ from what you are used to. The size of the disks may help to identify them. Any data on the disk you select will eventually be lost, but you will always be asked to conrm any changes before they are written to the disk. If you have selected the classic method of partitioning, you will be able to undo any changes right until the end; when using (encrypted) LVM this is not possible. Next, you will be able to choose from the schemes listed in the table below. All schemes have their pros and cons, some of which are discussed in Appendix C. If you are unsure, choose the rst one. Bear in mind that guided partitioning needs a certain minimal amount of free space to operate with. If you dont give it at least about 1GB of space (depends on chosen scheme), guided partitioning will fail. Partitioning scheme All les in one partition Separate /home partition Minimum space 600MB 500MB Created partitions
/, swap /, /home, swap
4. The installer will encrypt the LVM volume group using a 256 bit AES key and makes use of the kernels dm-crypt support.
45
Chapter 6. Using the Debian Installer Partitioning scheme Separate /home, /usr, /var and /tmp partitions Minimum space 1GB Created partitions /, /home, /usr, /var, /tmp, swap
If you choose guided partitioning using (encrypted) LVM, the installer will also create a separate /boot partition. The other partitions, including the swap partition, will be created inside the LVM partition. After selecting a scheme, the next screen will show your new partition table, including information on whether and how partitions will be formatted and where they will be mounted. The list of partitions might look like this:
IDE1 master (hda) - 6.4 GB WDC AC36400L #1 primary 16.4 MB B f ext2 /boot #2 primary 551.0 MB swap swap #3 primary 5.8 GB ntfs pri/log 8.2 MB FREE SPACE IDE1 slave (hdb) - 80.0 GB ST380021A #1 primary 15.9 MB ext3 #2 primary 996.0 MB fat16 #3 primary 3.9 GB xfs #5 logical 6.0 GB f ext3 #6 logical 1.0 GB f ext3 #7 logical 498.8 MB ext3 #8 logical 551.5 MB swap #9 logical 65.8 GB ext2
This example shows two IDE harddrives divided into several partitions; the rst disk has some free space. Each partition line consists of the partition number, its type, size, optional ags, le system, and mountpoint (if any). Note: this particular setup cannot be created using guided partitioning but it does show possible variation that can be achieved using manual partitioning. This concludes the guided partitioning. If you are satised with the generated partition table, you can choose Finish partitioning and write changes to disk from the menu to implement the new partition table (as described at the end of this section). If you are not happy, you can choose to Undo changes to partitions and run guided partitioning again, or modify the proposed changes as described below for manual partitioning.
46
Chapter 6. Using the Debian Installer for swap, software RAID, LVM, an encrypted le system, or not be used at all. Other settings include mountpoint, mount options, and bootable ag; which settings are shown depends on how the partition is to be used. If you dont like the preselected defaults, feel free to change them to your liking. E.g. by selecting the option Use as:, you can choose a different lesystem for this partition, including options to use the partition for swap, software RAID, LVM, or not use it at all. Another nice feature is the ability to copy data from an existing partition onto this one. When you are satised with your new partition, select Done setting up the partition and you will return to partmans main screen. If you decide you want to change something about your partition, simply select the partition, which will bring you to the partition conguration menu. This is the same screen as is used when creating a new partition, so you can change the same settings. One thing that may not be very obvious at a rst glance is that you can resize the partition by selecting the item displaying the size of the partition. Filesystems known to work are at least fat16, fat32, ext2, ext3 and swap. This menu also allows you to delete a partition. Be sure to create at least two partitions: one for the root lesystem (which must be mounted as /) and one for swap. If you forget to mount the root lesystem, partman wont let you continue until you correct this issue. Capabilities of partman can be extended with installer modules, but are dependent on your systems architecture. So if you cant see all promised goodies, check if you have loaded all required modules (e.g. partman-ext3, partman-xfs, or partman-lvm). After you are satised with partitioning, select Finish partitioning and write changes to disk from the partitioning menu. You will be presented with a summary of changes made to the disks and asked to conrm that the lesystems should be created as requested.
47
Chapter 6. Using the Debian Installer remaining disks. Second, you can use only a fraction of the available capacity (more precisely, it is the size of the smallest partition in the RAID). Third, le-reads are load-balanced among the disks, which can improve performance on a server, such as a le server, that tends to be loaded with more disk reads than writes. Optionally you can have a spare disk in the array which will take the place of the failed disk in the case of failure. RAID5 Is a good compromise between speed, reliability and data redundancy. RAID5 splits all incoming data into stripes and distributes them equally on all but one disk (similar to RAID0). Unlike RAID0, RAID5 also computes parity information, which gets written on the remaining disk. The parity disk is not static (that would be called RAID4), but is changing periodically, so the parity information is distributed equally on all disks. When one of the disks fails, the missing part of information can be computed from remaining data and its parity. RAID5 must consist of at least three active partitions. Optionally you can have a spare disk in the array which will take the place of the failed disk in the case of failure. As you can see, RAID5 has a similar degree of reliability to RAID1 while achieving less redundancy. On the other hand, it might be a bit slower on write operations than RAID0 due to computation of parity information. RAID6 Is similar to RAID5 except that it uses two parity devices instead of one. A RAID6 array can survive up to two disk failures. RAID10 RAID10 combines striping (as in RAID0) and mirroring (as in RAID1). It creates n copies of incoming data and distributes them across the partitions so that none of the copies of the same data are on the same device. The default value of n is 2, but it can be set to something else in expert mode. The number of partitions used must be at least n. RAID10 has different layouts for distributing the copies. The default is near copies. Near copies have all of the copies at about the same offset on all of the disks. Far copies have the copies at different offsets on the disks. Offset copies copy the stripe, not the individual copies. RAID10 can be used to achieve reliability and redundancy without the drawback of having to calculate parity. To sum it up: Type RAID0 Minimum Devices 2 Spare Device no Survives disk failure? no Available Space Size of the smallest partition multiplied by number of devices in RAID Size of the smallest partition in RAID
RAID1
optional
yes
48
Chapter 6. Using the Debian Installer Type RAID5 Minimum Devices 3 Spare Device optional Survives disk failure? yes Available Space Size of the smallest partition multiplied by (number of devices in RAID minus one) Size of the smallest partition multiplied by (number of devices in RAID minus two) Total of all partitions divided by the number of chunk copies (defaults to two)
RAID6
optional
yes
RAID10
optional
yes
If you want to know more about Software RAID, have a look at Software RAID HOWTO (http://www.tldp.org/HOWTO/Software-RAID-HOWTO.html). To create an MD device, you need to have the desired partitions it should consist of marked for use in a RAID. (This is done in partman in the Partition settings menu where you should select Use as:physical volume for RAID.)
Note: Make sure that the system can be booted with the partitioning scheme you are planning. In general it will be necessary to create a separate le system for /boot when using RAID for the root (/) le system. Most boot loaders do support mirrored (not striped!) RAID1, so using for example RAID5 for / and RAID1 for /boot can be an option.
Warning
Support for MD is a relatively new addition to the installer. You may experience problems for some RAID levels and in combination with some bootloaders if you try to use MD for the root (/) le system. For experienced users, it may be possible to work around some of these problems by executing some conguration or installation steps manually from a shell.
Next, you should choose Congure software RAID from the main partman menu. (The menu will only appear after you mark at least one partition for use as physical volume for RAID.) On the rst screen of mdcfg simply select Create MD device. You will be presented with a list of supported types of MD devices, from which you should choose one (e.g. RAID1). What follows depends on the type of MD you selected.
RAID0 is simple you will be issued with the list of available RAID partitions and your only task is to select the partitions which will form the MD.
49
RAID1 is a bit more tricky. First, you will be asked to enter the number of active devices and the number of spare devices which will form the MD. Next, you need to select from the list of available RAID partitions those that will be active and then those that will be spare. The count of selected partitions must be equal to the number provided earlier. Dont worry. If you make a mistake and select a different number of partitions, debian-installer wont let you continue until you correct the issue. RAID5 has a setup procedure similar to RAID1 with the exception that you need to use at least three active partitions. RAID6 also has a setup procedure similar to RAID1 except that at least four active partitions are required. RAID10 again has a setup procedure similar to RAID1 except in expert mode. In expert mode, debian-installer will ask you for the layout. The layout has two parts. The rst part is the layout type. It is either n (for near copies), f (for far copies), or o (for offset copies). The second part is the number of copies to make of the data. There must be at least that many active devices so that all of the copies can be distributed onto different disks.
It is perfectly possible to have several types of MD at once. For example, if you have three 200 GB hard drives dedicated to MD, each containing two 100 GB partitions, you can combine the rst partitions on all three disks into the RAID0 (fast 300 GB video editing partition) and use the other three partitions (2 active and 1 spare) for RAID1 (quite reliable 100 GB partition for /home). After you set up MD devices to your liking, you can Finish mdcfg to return back to the partman to create lesystems on your new MD devices and assign them the usual attributes like mountpoints.
50
Display conguration details: shows LVM device structure, names and sizes of logical volumes and more Create volume group Create logical volume Delete volume group Delete logical volume Extend volume group Reduce volume group Finish: return to the main partman screen
Use the options in that menu to rst create a volume group and then create your logical volumes inside it. After you return to the main partman screen, any created logical volumes will be displayed in the same way as ordinary partitions (and you should treat them as such).
is immediately saved to the device in encrypted form. Access to the encrypted data is granted only after entering the passphrase used when the encrypted partition was originally created. This feature is useful to protect sensitive data in case your laptop or hard drive gets stolen. The thief might get physical access to the hard drive, but without knowing the right passphrase, the data on the hard drive will look like random characters. The two most important partitions to encrypt are: the home partition, where your private data resides, and the swap partition, where sensitive data might be stored temporarily during operation. Of course, nothing prevents you from encrypting any other partitions that might be of interest. For example /var where database servers, mail servers or print servers store their data, or /tmp which is used by various programs to store potentially interesting temporary les. Some people may even want to encrypt their whole system. The only exception is the /boot partition which must remain unencrypted, because currently there is no way to load the kernel from an encrypted partition.
Note: Please note that the performance of encrypted partitions will be less than that of unencrypted ones because the data needs to be decrypted or encrypted for every read or write. The performance impact depends on your CPU speed, chosen cipher and a key length.
To use encryption, you have to create a new partition by selecting some free space in the main partitioning menu. Another option is to choose an existing partition (e.g. a regular partition, an LVM logical volume or a RAID volume). In the Partition settings menu, you need to select physical volume for encryption at the Use as: option. The menu will then change to include several cryptographic options for the partition.
debian-installer supports several encryption methods. The default method is dm-crypt (included
in newer Linux kernels, able to host LVM physical volumes), the other is loop-AES (older, maintained separately from the Linux kernel tree). Unless you have compelling reasons to do otherwise, it is recommended to use the default.
51
Chapter 6. Using the Debian Installer First, lets have a look at the options available when you select Device-mapper (dm-crypt) as the encryption method. As always: when in doubt, use the defaults, because they have been carefully chosen with security in mind. Encryption: aes This option lets you select the encryption algorithm (cipher) which will be used to encrypt the data on the partition. debian-installer currently supports the following block ciphers: aes, blowsh, serpent, and twosh. It is beyond the scope of this document to discuss the qualities of these different algorithms, however, it might help your decision to know that in 2000, AES was chosen by the American National Institute of Standards and Technology as the standard encryption algorithm for protecting sensitive information in the 21st century. Key size: 256 Here you can specify the length of the encryption key. With a larger key size, the strength of the encryption is generally improved. On the other hand, increasing the length of the key usually has a negative impact on performance. Available key sizes vary depending on the cipher. IV algorithm: cbc-essiv:sha256 The Initialization Vector or IV algorithm is used in cryptography to ensure that applying the cipher on the same clear text data with the same key always produces a unique cipher text. The idea is to prevent the attacker from deducing information from repeated patterns in the encrypted data. From the provided alternatives, the default cbc-essiv:sha256 is currently the least vulnerable to known attacks. Use the other alternatives only when you need to ensure compatibility with some previously installed system that is not able to use newer algorithms. Encryption key: Passphrase Here you can choose the type of the encryption key for this partition. Passphrase The encryption key will be computed6 on the basis of a passphrase which you will be able to enter later in the process. Random key A new encryption key will be generated from random data each time you try to bring up the encrypted partition. In other words: on every shutdown the content of the partition will be lost as the key is deleted from memory. (Of course, you could try to guess the key with a brute force attack, but unless there is an unknown weakness in the cipher algorithm, it is not achievable in our lifetime.) Random keys are useful for swap partitions because you do not need to bother yourself with remembering the passphrase or wiping sensitive information from the swap partition before shutting down your computer. However, it also means that you will not be able to use the suspend-to-disk functionality offered by newer Linux kernels as it will be impossible (during a subsequent boot) to recover the suspended data written to the swap partition.
6. Using a passphrase as the key currently means that the partition will be set up using LUKS (http://luks.endorphin.org/).
52
Chapter 6. Using the Debian Installer Erase data: yes Determines whether the content of this partition should be overwritten with random data before setting up the encryption. This is recommended because it might otherwise be possible for an attacker to discern which parts of the partition are in use and which are not. In addition, this will make it harder to recover any leftover data from previous installations7.
If you select Encryption method:Loopback (loop-AES), the menu changes to provide the following options: Encryption: AES256 For loop-AES, unlike dm-crypt, the options for cipher and key size are combined, so you can select both at the same time. Please see the above sections on ciphers and key sizes for further information. Encryption key: Keyfile (GnuPG) Here you can select the type of the encryption key for this partition. Keyle (GnuPG) The encryption key will be generated from random data during the installation. Moreover this key will be encrypted with GnuPG, so to use it, you will need to enter the proper passphrase (you will be asked to provide one later in the process). Random key Please see the section on random keys above. Erase data: yes Please see the the section on erasing data above.
After you have selected the desired parameters for your encrypted partitions, return back to the main partitioning menu. There should now be a new menu item called Congure encrypted volumes. After you select it, you will be asked to conrm the deletion of data on partitions marked to be erased and possibly other actions such as writing a new partition table. For large partitions this might take some time. Next you will be asked to enter a passphrase for partitions congured to use one. Good passphrases should be longer than 8 characters, should be a mixture of letters, numbers and other characters and should not contain common dictionary words or information easily associable with you (such as birthdates, hobbies, pet names, names of family members or relatives, etc.).
Warning
Before you input any passphrases, you should have made sure that your keyboard is congured correctly and generates the expected characters. If you are unsure, you can switch to the second virtual console and type some text at the prompt. This ensures that you wont be surprised later, e.g. by trying to input a passphrase using a qwerty keyboard layout when you used an azerty layout during the installation. This situation can have several causes. Maybe you switched to another keyboard layout 7. It is believed that the guys from three-letter agencies can restore the data even after several rewrites of the magnetooptical media, though.
53
If you selected to use methods other than a passphrase to create encryption keys, they will be generated now. Because the kernel may not have gathered a sufcient amount of entropy at this early stage of the installation, the process may take a long time. You can help speed up the process by generating entropy: e.g. by pressing random keys, or by switching to the shell on the second virtual console and generating some network and disk trafc (downloading some les, feeding big les into /dev/null, etc.). This will be repeated for each partition to be encrypted. After returning to the main partitioning menu, you will see all encrypted volumes as additional partitions which can be congured in the same way as ordinary partitions. The following example shows two different volumes. The rst one is encrypted via dm-crypt, the second one via loop-AES.
Encrypted volume (sda2_crypt) - 115.1 GB Linux device-mapper #1 115.1 GB F ext3 Loopback (loop0) - 515.2 MB AES256 keyfile #1 515.2 MB F ext3
Now is the time to assign mount points to the volumes and optionally change the le system types if the defaults do not suit you. Pay attention to the identiers in parentheses (sda2_crypt and loop0 in this case) and the mount points you assigned to each encrypted volume. You will need this information later when booting the new system. The differences between the ordinary boot process and the boot process with encryption involved will be covered later in Section 7.2. Once you are satised with the partitioning scheme, continue with the installation.
54
55
If you do scan multiple CDs or DVDs, the installer will prompt you to exchange them when it needs packages from another CD/DVD than the one currently in the drive. Note that only CDs or DVDs that belong to the same set should be scanned. The order in which they are scanned does not really matter, but scanning them in ascending order will reduce the chance of mistakes.
8. Note that the program which actually installs the packages is called dpkg. However, this program is more of a low-level tool. apt-get is a higher-level tool, which will invoke dpkg as appropriate. It knows how to retrieve packages from your CD, the network, or wherever. It is also able to automatically install other packages which are required to make the package youre trying to install work correctly.
56
Chapter 6. Using the Debian Installer 6.3.5.1.2. Using a network mirror One question that will be asked during most installs is whether or not to use a network mirror as a source for packages. In most cases the default answer should be ne, but there are some exceptions. If you are not installing from a full CD or DVD or using a full CD/DVD image, you really should use a network mirror as otherwise you will end up with only a very minimal system. However, if you have a limited Internet connection it is best not to select the desktop task in the next step of the installation. If you are installing from a single full CD or using a full CD image, using a network mirror is not required, but is still strongly recommended because a single CD contains only a fairly limited number of packages. If you have a limited Internet connection it may still be best to not select a network mirror here, but to nish the installation using only whats available on the CD and selectively install additional packages after the installation (i.e. after you have rebooted into the new system). If you are installing from a DVD or using a DVD image, any packages needed during the installation should be present on the rst DVD. The same is true if you have scanned multiple CDs as explained in the previous section. Use of a network mirror is optional. One advantage of adding a network mirror is that updates that have occurred since the CD/DVD set was created and have been included in a point release, will become available for installation, thus extending the life of your CD/DVD set without compromising the security or stability of the installed system. In summary: selecting a network mirror is generally a good idea, except if you do not have a good Internet connection. If the current version of a package is available from CD/DVD, the installer will always use that. The amount of data that will be downloaded if you do select a mirror thus depends on 1. the tasks you select in the next step of the installation, 2. which packages are needed for those tasks, 3. which of those packages are present on the CDs or DVDs you have scanned, and 4. whether any updated versions of packages included on the CDs or DVDs are available from a mirror (either a regular package mirror, or a mirror for security or volatile updates).
Note that the last point means that, even if you choose not to use a network mirror, some packages may still be downloaded from the Internet if there is a security or volatile update available for them and those services have been congured.
57
Chapter 6. Using the Debian Installer as Desktop environment, Web server, or Print server9. Section D.2 lists the space requirements for the available tasks. Some tasks may be pre-selected based on the characteristics of the computer you are installing. If you disagree with these selections you can deselect them. You can even opt to install no tasks at all at this point.
Tip: In the standard user interface of the installer, you can use the space bar to toggle selection of a task.
Note: Unless you are using the special KDE or Xfce/LXDE CDs, the Desktop environment task will install the GNOME desktop environment. It is not possible to interactively select a different desktop during the installation. However, it is possible to get debian-installer to install a KDE desktop environment instead of GNOME by using preseeding (see Section B.4.10) or by adding the parameter desktop=kde at the boot prompt when starting the installer. Alternatively the more lightweight Xfce and LXDE desktop environments can be selected by using desktop=xfce or desktop=lxde. Note that this will only work if the packages needed for the desired desktop environment are actually available. If you are installing using a single full CD image, they will need to be downloaded from a mirror as most needed packages are only included on later CDs; installing KDE, Xfce or LXDE this way should work ne if you are using a DVD image or any other installation method.
The various server tasks will install software roughly as follows. DNS server: bind9; File server: samba, nfs; Mail server: exim4, spamassassin, uw-imap; Print server: cups; SQL database: postgresql; Web server: apache2. The Standard system task will install any package that has a priority standard. This includes a lot of common utilities that are normally available on any Linux or Unix system. You should leave this task selected unless you know what you are doing and want a really minimal system. If during language selection a default locale other than the C locale was selected, tasksel will check if any localization tasks are dened for that locale and will automatically try to install relevant localization packages. This includes for example packages containing word lists or special fonts for your language. If a desktop environment was selected, it will also install appropriate localization packages for that (if available). Once youve selected your tasks, select Continue. At this point, aptitude will install the packages that are part of the selected tasks. If a particular program needs more information from the user, it will prompt you during this process. You should be aware that especially the Desktop task is very large. Especially when installing from a normal CD-ROM in combination with a mirror for packages not on the CD-ROM, the installer may want to retrieve a lot of packages over the network. If you have a relatively slow Internet connection, this can take a long time. There is no option to cancel the installation of packages once it has started. Even when packages are included on the CD-ROM, the installer may still retrieve them from the mirror if the version available on the mirror is more recent than the one included on the CD-ROM. If you are installing the stable distribution, this can happen after a point release (an update of the original
9. You should know that to present this list, the installer is merely invoking the tasksel program. It can be run at any time after installation to install more packages (or remove them), or you can use a more ne-grained tool such as aptitude. If you are looking for a specic single package, after installation is complete, simply run aptitude install package, where package is the name of the package you are looking for.
58
Chapter 6. Using the Debian Installer stable release); if you are installing the testing distribution this will happen if you are using an older image.
59
6.3.8. Miscellaneous
The components listed in this section are usually not involved in the installation process, but are waiting in the background to help the user in case something goes wrong.
60
Chapter 6. Using the Debian Installer steps of the installation from the console, at least to the point of setting up the networking. (Although you can automate that part with Section 4.4.) This component is not loaded into the main installation menu by default, so you have to explicitly ask for it. If you are installing from CD, you need to boot with medium priority or otherwise invoke the main installation menu and choose Load installer components from CD and from the list of additional components select network-console: Continue installation remotely using SSH. Successful load is indicated by a new menu entry called Continue installation remotely using SSH. After selecting this new entry, you will be asked for a new password to be used for connecting to the installation system and for its conrmation. Thats all. Now you should see a screen which instructs you to login remotely as the user installer with the password you just provided. Another important detail to notice on this screen is the ngerprint of this system. You need to transfer the ngerprint securely to the person who will continue the installation remotely. Should you decide to continue with the installation locally, you can always press Enter, which will bring you back to the main menu, where you can select another component. Now lets switch to the other side of the wire. As a prerequisite, you need to congure your terminal for UTF-8 encoding, because that is what the installation system uses. If you do not, remote installation will be still possible, but you may encounter strange display artefacts like destroyed dialog borders or unreadable non-ascii characters. Establishing a connection with the installation system is as simple as typing:
$ ssh -l installer install_host
Where install_host is either the name or IP address of the computer being installed. Before the actual login the ngerprint of the remote system will be displayed and you will have to conrm that it is correct.
Note: The ssh server in the installer uses a default conguration that does not send keep-alive packets. In principle, a connection to the system being installed should be kept open indenitely. However, in some situations depending on your local network setup the connection may be lost after some period of inactivity. One common case where this can happen is when there is some form of Network Address Translation (NAT) somewhere between the client and the system being installed. Depending on at which point of the installation the connection was lost, you may or may not be able to resume the installation after reconnecting. You may be able to avoid the connection being dropped by adding the option -o ServerAliveInterval=value when starting the ssh connection, or by adding that option in your ssh conguration le. Note however that in some cases adding this option may also cause a connection to be dropped (for example if keep-alive packets are sent during a brief network outage, from which ssh would otherwise have recovered), so it should only be used when needed.
Note: If you install several computers in turn and they happen to have the same IP address or hostname, ssh will refuse to connect to such host. The reason is that it will have different ngerprint, which is usually a sign of a spoong attack. If you are sure this is not the case, you will need to delete the relevant line from ~/.ssh/known_hosts11 and try again.
After the login you will be presented with an initial screen where you have two possibilities called Start menu and Start shell. The former brings you to the main installer menu, where you can
11. The following command will remove an existing entry for a host: ssh-keygen -R <hostname|IP address>.
61
Chapter 6. Using the Debian Installer continue with the installation as usual. The latter starts a shell from which you can examine and possibly x the remote system. You should only start one SSH session for the installation menu, but may start multiple sessions for shells.
Warning
After you have started the installation remotely over SSH, you should not go back to the installation session running on the local console. Doing so may corrupt the database that holds the conguration of the new system. This in turn may result in a failed installation or problems with the installed system.
Note that it is possible to skip loading the rmware if you know the device will also function without it, or if the device is not needed during the installation.
Warning
Support for loading rmware is still relatively basic and is likely to be improved in future releases of the installer. Currently debian-installer will for example not display any warning if you choose to load missing rmware, but the requested rmware is not found. Please report any issues you encounter by ling an installation report (see Section 5.4.5).
62
http://cdimage.debian.org/cdimage/unofcial/non-free/rmware/
Just download the tarball for the correct release and unpack it to the le system on the medium. If the rmware you need is not included in the tarball, you can also download specic rmware packages from the (non-free section of the) archive. The following overview should list most available rmware packages but is not guaranteed to be complete and may also contain non-rmware packages:
http://packages.debian.org/search?keywords=rmware
It is also possible to copy individual rmware les to the medium. Loose rmware could be obtained for example from an already installed system or from a hardware vendor.
63
7.2.1. dm-crypt
For partitions encrypted using dm-crypt you will be shown the following prompt during the boot:
Starting early crypto disks... part_crypt(starting) Enter LUKS passphrase:
In the rst line of the prompt, part is the name of the underlying partition, e.g. sda2 or md0. You are now probably wondering for which volume you are actually entering the passphrase. Does it relate to your /home? Or to /var? Of course, if you have just one encrypted volume, this is easy and you can just enter the passphrase you used when setting up this volume. If you set up more than one encrypted volume during the installation, the notes you wrote down as the last step in Section 6.3.2.6 come in handy. If you did not make a note of the mapping between part_crypt and the mount points before, you can still nd it in /etc/crypttab and /etc/fstab of your new system. The prompt may look somewhat different when an encrypted root le system is mounted. This depends on which initramfs generator was used to generate the initrd used to boot the system. The example below is for an initrd generated using initramfs-tools:
Begin: Mounting root file system... ... Begin: Running /scripts/local-top ... Enter LUKS passphrase:
64
Chapter 7. Booting Into Your New Debian System No characters (even asterisks) will be shown while entering the passphrase. If you enter the wrong passphrase, you have two more tries to correct it. After the third try the boot process will skip this volume and continue to mount the next lesystem. Please see Section 7.2.3 for further information. After entering all passphrases the boot should continue as usual.
7.2.2. loop-AES
For partitions encrypted using loop-AES you will be shown the following prompt during the boot:
Checking loop-encrypted file systems. Setting up /dev/loopX (/mountpoint) Password:
No characters (even asterisks) will be shown while entering the passphrase. If you enter the wrong passphrase, you have two more tries to correct it. After the third try the boot process will skip this volume and continue to mount the next lesystem. Please see Section 7.2.3 for further information. After entering all passphrases the boot should continue as usual.
7.2.3. Troubleshooting
If some of the encrypted volumes could not be mounted because a wrong passphrase was entered, you will have to mount them manually after the boot. There are several cases.
The rst case concerns the root partition. When it is not mounted correctly, the boot process will halt and you will have to reboot the computer to try again. The easiest case is for encrypted volumes holding data like /home or /srv. You can simply mount them manually after the boot. For loop-AES this is a one-step operation:
# mount /mount_point Password:
where /mount_point should be replaced by the particular directory (e.g. /home). The only difference from an ordinary mount is that you will be asked to enter the passphrase for this volume. For dm-crypt this is a bit trickier. First you need to register the volumes with device mapper by running:
# /etc/init.d/cryptdisks start
This will scan all volumes mentioned in /etc/crypttab and will create appropriate devices under the /dev directory after entering the correct passphrases. (Already registered volumes will be skipped, so you can repeat this command several times without worrying.) After successful registration you can simply mount the volumes the usual way:
# mount /mount_point
65
If any volume holding noncritical system les could not be mounted (/usr or /var), the system should still boot and you should be able to mount the volumes manually like in the previous case. However, you will also need to (re)start any services usually running in your default runlevel because it is very likely that they were not started. The easiest way to achieve this is by switching to the rst runlevel and back by entering
# init 1
at the shell prompt and pressing Control-D when asked for the root password.
7.3. Log In
Once your system boots, youll be presented with the login prompt. Log in using the personal login and password you selected during the installation process. Your system is now ready for use. If you are a new user, you may want to explore the documentation which is already installed on your system as you start to use it. There are currently several documentation systems, work is proceeding on integrating the different types of documentation. Here are a few starting points. Documentation accompanying programs you have installed can be found in /usr/share/doc/, under a subdirectory named after the program (or, more precise, the Debian package that contains the program). However, more extensive documentation is often packaged separately in special documentation packages that are mostly not installed by default. For example, documentation about the package management tool apt can be found in the packages apt-doc or apt-howto. In addition, there are some special folders within the /usr/share/doc/ hierarchy. Linux HOWTOs are installed in .gz (compressed) format, in /usr/share/doc/HOWTO/en-txt/. After installing dhelp, you will nd a browsable index of documentation in /usr/share/doc/HTML/index.html. One easy way to view these documents using a text based browser is to enter the following commands:
$ cd /usr/share/doc/ $ w3m .
The dot after the w3m command tells it to show the contents of the current directory. If you have a graphical desktop environment installed, you can also use its web browser. Start the web browser from the application menu and enter /usr/share/doc/ in the address bar. You can also type info command or man command to see documentation on most commands available at the command prompt. Typing help will display help on shell commands. And typing a command followed by --help will usually display a short summary of the commands usage. If a commands results scroll past the top of the screen, type | more after the command to cause the results to pause before scrolling past the top of the screen. To see a list of all commands available which begin with a certain letter, type the letter and then two tabs.
66
/sbin
67
For instance, if you replace /usr/bin/perl, that will work, but then if you upgrade your perl package, the le you put there will be replaced. Experts can get around this by putting packages on hold in aptitude. One of the best installation methods is apt. You can use the command line version apt-get or fullscreen text version aptitude. Note apt will also let you merge main, contrib, and non-free so you can have export-restricted packages as well as standard versions.
68
69
Chapter 8. Next Steps and Where to Go From Here Just congure your favorite graphical mail program to use the correct servers to send and receive e-mail (how is outside the scope of this manual). However, in that case you may need to congure individual utilities to correctly send e-mails. One such utility is reportbug, a program that facilitates submitting bug reports against Debian packages. By default it expects to be able to use exim4 to submit bug reports. To correctly set up reportbug to use an external mail server, please run the command reportbug --congure and answer no to the question if an MTA is available. You will then be asked for the SMTP server to be used for submitting bug reports.
After entering that command (as root), you will be asked if you want split the conguration into small les. If you are unsure, select the default option. Next you will be presented with several common mail scenarios. Choose the one that most closely resembles your needs. internet site Your system is connected to a network and your mail is sent and received directly using SMTP. On the following screens you will be asked a few basic questions, like your machines mail name, or a list of domains for which you accept or relay mail. mail sent by smarthost In this scenario your outgoing mail is forwarded to another machine, called a smarthost, which takes care of sending the message on to its destination. The smarthost also usually stores incoming mail addressed to your computer, so you dont need to be permanently online. That also means you have to download your mail from the smarthost via programs like fetchmail. In a lot of cases the smarthost will be your ISPs mail server, which makes this option very suitable for dial-up users. It can also be a company mail server, or even another system on your own network. mail sent by smarthost; no local mail This option is basically the same as the previous one except that the system will not be set up to handle mail for a local e-mail domain. Mail on the system itself (e.g. for the system administrator) will still be handled. local delivery only This is the option your system is congured for by default.
4. You can of course also remove exim4 and replace it with an alternative MTA/MDA.
70
Chapter 8. Next Steps and Where to Go From Here no conguration at this time Choose this if you are absolutely convinced you know what you are doing. This will leave you with an uncongured mail system until you congure it, you wont be able to send or receive any mail and you may miss some important messages from your system utilities. If none of these scenarios suits your needs, or if you need a ner grained setup, you will need to edit conguration les under the /etc/exim4 directory after the installation is complete. More information about exim4 may be found under /usr/share/doc/exim4; the le README.Debian.gz has further details about conguring exim4 and explains where to nd additional documentation. Note that sending mail directly to the Internet when you dont have an ofcial domain name, can result in your mail being rejected because of anti-spam measures on receiving servers. Using your ISPs mail server is preferred. If you still do want to send out mail directly, you may want to use a different e-mail address than is generated by default. If you use exim4 as your MTA, this is possible by adding an entry in /etc/email-addresses.
handle special hardware needs, or hardware conicts with the pre-supplied kernels use options of the kernel which are not supported in the pre-supplied kernels (such as high memory support) optimize the kernel by removing useless drivers to speed up boot time create a monolithic instead of a modularized kernel run an updated or development kernel learn more about linux kernels
71
Chapter 8. Next Steps and Where to Go From Here Note that youll nd complete documentation on using kernel-package /usr/share/doc/kernel-package. This section just contains a brief tutorial. under
Hereafter, well assume you have free rein over your machine and will extract your kernel source to somewhere in your home directory5. Well also assume that your kernel version is 2.6.32. Make sure you are in the directory to where you want to unpack the kernel sources, extract them using tar xjf /usr/src/linux-source-2.6.32.tar.bz2 and change to the directory linux-source-2.6.32 that will have been created. Now, you can congure your kernel. Run make xconfig if X11 is installed, congured and being run; run make menuconfig otherwise (youll need libncurses5-dev installed). Take the time to read the online help and choose carefully. When in doubt, it is typically better to include the device driver (the software which manages hardware peripherals, such as Ethernet cards, SCSI controllers, and so on) you are unsure about. Be careful: other options, not related to a specic hardware, should be left at the default value if you do not understand them. Do not forget to select Kernel module loader in Loadable module support (it is not selected by default). If not included, your Debian installation will experience problems. Clean the source tree and reset the kernel-package parameters. To do that, do make-kpkg clean. Now, the kernel: fakeroot make-kpkg --initrd --revision=custom.1.0 kernel_image. The version number of 1.0 can be changed at will; this is just a version number that you will use to track your kernel builds. Likewise, you can put any word you like in place of custom (e.g., a host name). Kernel compilation may take quite a while, depending on the power of your machine. Once the compilation is complete, you can install your custom kernel like any package. As root, do dpkg -i ../linux-image-2.6.32-subarchitecture_custom.1.0_armel.deb. The subarchitecture part is an optional sub-architecture, depending on what kernel options you set. dpkg -i will install the kernel, along with some other nice supporting les. For instance, the System.map will be properly installed (helpful for debugging kernel problems), and /boot/config-2.6.32 will be installed, containing your current conguration set. Your new kernel package is also clever enough to automatically update your boot loader to use the new kernel. If you have created a modules package, youll need to install that package as well. It is time to reboot the system: read carefully any warning that the above step may have produced, then shutdown -r now. For more information on Debian kernels and kernel compilation, see the Debian Linux Kernel Handbook (http://kernel-handbook.alioth.debian.org/). For more information on kernel-package, read the ne documentation in /usr/share/doc/kernel-package. compile
72
Chapter 8. Next Steps and Where to Go From Here the display to indicate that this is rescue mode, not a full installation. Dont worry, your system is not about to be overwritten! Rescue mode simply takes advantage of the hardware detection facilities available in the installer to ensure that your disks, network devices, and so on are available to you while repairing your system. Instead of the partitioning tool, you should now be presented with a list of the partitions on your system, and asked to select one of them. Normally, you should select the partition containing the root le system that you need to repair. You may select partitions on RAID and LVM devices as well as those created directly on disks. If possible, the installer will now present you with a shell prompt in the le system you selected, which you can use to perform any necessary repairs. If the installer cannot run a usable shell in the root le system you selected, perhaps because the le system is corrupt, then it will issue a warning and offer to give you a shell in the installer environment instead. You may not have as many tools available in this environment, but they will often be enough to repair your system anyway. The root le system you selected will be mounted on the /target directory. In either case, after you exit the shell, the system will reboot. Finally, note that repairing broken systems can be difcult, and this manual does not attempt to go into all the things that might have gone wrong or how to x them. If you have problems, consult an expert.
73
A.1. Preliminaries
The debian-installer is still in a beta state. If you encounter bugs during your install, please refer to Section 5.4.5 for instructions on how to report them. If you have questions which cannot be answered by this document, please direct them to the debian-boot mailing list (debian-boot@lists.debian.org) or ask on IRC (#debian-boot on the OFTC network).
A.2.1. CDROM
There are two different netinst CD images which can be used to install squeeze with the debian-installer. These images are intended to boot from CD and install additional packages over a network, hence the name netinst. The difference between the two images is that on the full netinst image the base packages are included, whereas you have to download these from the web if you are using the business card image. If youd rather, you can get a full size CD image which will not need the network to install. You only need the rst CD of the set. Download whichever type you prefer and burn it to a CD.
74
A.3. Installation
Once the installer starts, you will be greeted with an initial screen. Press Enter to boot, or read the instructions for other boot methods and parameters (see Section 5.3). After a while you will be asked to select your language. Use the arrow keys to pick a language and press Enter to continue. Next youll be asked to select your country, with the choices including countries where your language is spoken. If its not on the short list, a list of all the countries in the world is available. You may be asked to conrm your keyboard layout. Choose the default unless you know better. Now sit back while debian-installer detects some of your hardware, and loads the rest of itself from CD, oppy, USB, etc. Next the installer will try to detect your network hardware and set up networking by DHCP. If you are not on a network or do not have DHCP, you will be given the opportunity to congure the network manually. The next step is setting up your clock and time zone. The installer will try to contact a time server on the Internet to ensure the clock is set correctly. The time zone is based on the country selected earlier and the installer will only ask to select one if a country has multiple zones. Now it is time to partition your disks. First you will be given the opportunity to automatically partition either an entire drive, or available free space on a drive (see Section 6.3.2.2). This is recommended for new users or anyone in a hurry. If you do not want to autopartition, choose Manual from the menu. On the next screen you will see your partition table, how the partitions will be formatted, and where they will be mounted. Select a partition to modify or delete it. If you did automatic partitioning, you should just be able to choose Finish partitioning and write changes to disk from the menu to use what it set up. Remember to assign at least one partition for swap space and to mount a partition on /. For more detailed information on how to use the partitioner, please refer to Section 6.3.2; the appendix Appendix C has more general information about partitioning. Now debian-installer formats your partitions and starts to install the base system, which can take a while. That is followed by installing a kernel. The base system that was installed earlier is a working, but very minimal installation. To make the system more functional the next step allows you to install additional packages by selecting tasks. Before packages can be installed apt needs to be congured as that denes from where the packages will be retrieved. The Standard system task will be selected by default and should normally be installed. Select the Desktop environment task if you would like to have a graphical desktop after the installation. See Section 6.3.5.2 for additional information about this step. Installation of the base system is followed by setting up user accounts. By default you will need to provide a password for the root (administrator) account and information necessary to create one regular user account.
75
Appendix A. Installation Howto The last step is to install a boot loader. If the installer detects other operating systems on your computer, it will add them to the boot menu and let you know.
debian-installer will now tell you that the installation has nished. Remove the cdrom or other
boot media and hit Enter to reboot your machine. It should boot up into the newly installed system and allow you to log in. This is explained in Chapter 7. If you need more information on the install process, see Chapter 6.
76
B.1. Introduction
Preseeding provides a way to set answers to questions asked during the installation process, without having to manually enter the answers while the installation is running. This makes it possible to fully automate most types of installation and even offers some features not available during normal installations. Preseeding is not required. If you use an empty preseed le, the installer will behave just the same way as in a normal manual installation. Each question you preseed will (if you got it right!) modify the installation in some way from that baseline.
Notes: a. but only if you have network access, and set preseed/url appropriately
An important difference between the preseeding methods is the point at which the preconguration le is loaded and processed. For initrd preseeding this is right at the start of the installation, before the rst question is even asked. For le preseeding this is after the CD or CD image has been loaded. For network preseeding it is only after the network has been congured. Obviously, any questions that have been processed before the preconguration le is loaded cannot be preseeded (this will include questions that are only displayed at medium or low priority, like the rst hardware detection run). Section B.2.2 offers a way to avoid these questions being asked. In order to avoid the questions that would normally appear before the preseeding occurs, you can start the installer in auto mode. This delays questions that would normally be asked too early for preseeding (i.e. language, country and keyboard selection) until after the network comes up, thus allowing them to be preseeded. It also runs the installation at critical priority, which avoids many unimportant questions. See Section B.2.3 for details.
77
B.1.2. Limitations
Although most questions used by debian-installer can be preseeded using this method, there are some notable exceptions. You must (re)partition an entire disk or use available free space on a disk; it is not possible to use existing partitions.
78
Appendix B. Automating the installation using preseeding Note that preseed/url can be shortened to just url and preseed/file to just file when they are passed as boot parameters.
For most installations some of the default options in your bootloader conguration le, like vga=normal, may be safely removed which may allow you to add more options for preseeding.
Note: It may not always be possible to specify values with spaces for boot parameters, even if you delimit them with quotes.
1. The owner of a debconf variable (or template) is normally the name of the package that contains the corresponding debconf template. For variables used in the installer itself the owner is d-i. Templates and variables can have more than one owner which helps to determine whether they can be removed from the debconf database if the package is purged.
79
This relies on there being a DHCP server that will get the machine to the point where autoserver can be resolved by DNS, perhaps after adding the local domain if that was provided by DHCP. If this was done at a site where the domain is example.com, and they have a reasonably sane DHCP setup, it would result in the preseed le being retrieved from http://autoserver.example.com/d-i/squeeze/./preseed.cfg. The last part of that url (d-i/squeeze/./preseed.cfg) is taken from auto-install/defaultroot. By default this includes the directory squeeze to allow future versions to specify their own codename and let people migrate forwards in a controlled manner. The /./ bit is used to indicate a root, relative to which subsequent paths can be anchored (for use in preseed/include and preseed/run). This allows les to be specied either as full URLs, paths starting with / that are thus anchored, or even paths relative to the location where the last preseed le was found. This can be used to construct more portable scripts where an entire hierarchy of scripts can be moved to a new location without breaking it, for example copying the les onto a USB stick when they started out on a web server. In this example, if the preseed le sets preseed/run to /scripts/late_command.sh then the le will be fetched from http://autoserver.example.com/d-i/squeeze/./scripts/late_command.sh. If there is no local DHCP or DNS infrastructure, or if you do not want to use the default path to preseed.cfg, you can still use an explicit url, and if you dont use the /./ element it will be anchored to the start of the path (i.e. the third / in the URL). Here is an example that requires minimal support from the local network infrastructure:
auto url=http://192.168.1.2/path/to/mypreseed.file
if the URL is missing a protocol, http is assumed, if the hostname section contains no periods, it has the domain derived from DHCP appended to it, and if theres no /s after the hostname, then the default path is added.
In addition to specifying the url, you can also specify settings that do not directly affect the behavior of debian-installer itself, but can be passed through to scripts specied using preseed/run in the loaded preseed le. At present, the only example of this is auto-install/classes, which has an alias classes. This can be used thus:
auto url=example.com classes=class_A;class_B
The classes could for example denote the type of system to be installed, or the localization to be used. It is of course possible to extend this concept, and if you do, it is reasonable to use the auto-install namespace for this. So one might have something like auto-install/style which is then used in your scripts. If you feel the need to do this, please mention it on the
80
Appendix B. Automating the installation using preseeding <debian-boot@lists.debian.org> mailing list so that we can avoid namespace conicts, and perhaps add an alias for the parameter for you. The auto boot label is not yet dened everywhere. The same effect may be achieved by simply adding the two parameters auto=true priority=critical to the kernel command line. The auto parameter is an alias for auto-install/enable and setting it to true delays the locale and keyboard questions until after there has been a chance to preseed them, while priority is an alias for debconf/priority and setting it to critical stops any questions with a lower priority from being asked. Additional options that may be of interest while attempting to automate an install while using DHCP are: interface=auto netcfg/dhcp_timeout=60 which makes the machine choose the rst viable NIC and be more patient about getting a reply to its DHCP query.
Tip: An extensive example of how to use this framework, including example scripts and classes, can be found on the website of its developer (http://hands.com/d-i/). The examples available there also show many other nice effects that can be achieved by creative use of preconguration.
81
Appendix B. Automating the installation using preseeding ISC DHCP server (the dhcp3-server Debian package).
if substring (option vendor-class-identifier, 0, 3) = "d-i" { filename "http://host/preseed.cfg"; }
Note that the above example limits this lename to DHCP clients that identify themselves as "d-i", so it will not affect regular DHCP clients, but only the installer. You can also put the text in a stanza for only one particular host to avoid preseeding all installs on your network. A good way to use the DHCP preseeding is to only preseed values specic to your network, such as the Debian mirror to use. This way installs on your network will automatically get a good mirror selected, but the rest of the installation can be performed interactively. Using DHCP preseeding to fully automate Debian installs should only be done with care.
There are a few rules to keep in mind when writing a preconguration le.
Put only a single space or tab between type and value: any additional whitespace will be interpreted as belonging to the value. A line can be split into multiple lines by appending a backslash (\) as the line continuation character. A good place to split a line is after the question name; a bad place is between type and value. Split lines will be joined into a single line with all leading/trailing whitespace condensed to a single space. For debconf variables (templates) used in the installer itself, the owner should be set to d-i; to preseed variables used in the installed system, the name of the package that contains the corresponding debconf template should be used. Only variables that have their owner set to something other than d-i will be propagated to the debconf database for the installed system. Most questions need to be preseeded using the values valid in English and not the translated values. However, there are some questions (for example in partman) where the translated values need to be used. Some questions take a code as value instead of the English text that is shown during installation.
The easiest way to create a preconguration le is to use the example le linked in Section B.4 as basis and work from there. An alternative method is to do a manual installation and then, after rebooting, use the debconf-getselections from the debconf-utils package to dump both the debconf database and the installers cdebconf database to a single le:
$ debconf-get-selections --installer > file $ debconf-get-selections >> file
82
However, a le generated in this manner will have some items that should not be preseeded, and the example le is a better starting place for most users.
Note: This method relies on the fact that, at the end of the installation, the installers cdebconf database is saved to the installed system in /var/log/installer/cdebconf. However, because the database may contain sensitive information, by default the les are only readable by root. The directory /var/log/installer and all les in it will be deleted from your system if you purge the package installation-report.
To check possible values for questions, you can use nano to examine the les in
/var/lib/cdebconf while an installation is in progress. View templates.dat for the raw templates and questions.dat for the current values and for the values assigned to variables.
To check if the format of your preconguration le is valid before performing an install, you can use the command debconf-set-selections -c preseed.cfg .
B.4.1. Localization
Setting localization values will only work if you are using initrd preseeding. With all other methods the preconguration le will only be loaded after these questions have been asked. The locale can be used to specify both language and country and can be any combination of a language supported by debian-installer and a recognized country. If the combination does not form a valid locale, the installer will automatically select a locale that is valid for the selected language. To specify the locale as a boot parameter, use locale=en_US . Although this method is very easy to use, it does not allow preseeding of all possible combinations of language, country and locale2. So alternatively the values can be preseeded individually. Language and country can also be specied as boot parameters.
# Preseeding only locale sets language, country and locale. d-i debian-installer/locale string en_US # The values can also be preseeded individually for greater flexibility. #d-i debian-installer/language string en #d-i debian-installer/country string NL #d-i debian-installer/locale string en_GB.UTF-8 # Optionally specify additional locales to be generated. #d-i localechooser/supported-locales en_US.UTF-8, nl_NL.UTF-8 2. Preseeding locale to en_NL would for example result in en_US.UTF-8 as default locale for the installed system. If e.g. en_GB.UTF-8 is preferred instead, the values will need to be preseeded individually.
83
Keyboard conguration consists of selecting a keyboard architecture and a keymap. In most cases the correct keyboard architecture is selected by default, so theres normally no need to preseed it. The keymap must be known to the debian-installer for the selected keyboard architecture.
# Keyboard selection. #d-i console-tools/archs select at d-i console-keymaps-at/keymap select us # Example for a different keyboard architecture #d-i console-keymaps-usb/keymap select mac-usb-us
To skip keyboard conguration, preseed console-tools/archs with skip-config. This will result in the kernel keymap remaining active.
Note: The changes in the input layer for 2.6 kernels have made the keyboard architecture virtually obsolete. For 2.6 kernels normally a PC (at) keymap should be selected.
84
Please note that netcfg will automatically determine the netmask if netcfg/get_netmask is not preseeded. In this case, the variable has to be marked as seen for automatic installations. Similarly, netcfg will choose an appropriate address if netcfg/get_gateway is not set. As a special case, you can set netcfg/get_gateway to none to specify that no gateway should be used.
85
B.4.6. Partitioning
Using preseeding to partition the harddisk is limited to what is supported by partman-auto. You can choose to partition either existing free space on a disk or a whole disk. The layout of the disk can be determined by using a predened recipe, a custom recipe from a recipe le or a recipe included in the preconguration le. Preseeding of advanced partition setups using RAID, LVM and encryption is supported, but not with the full exibility possible when partitioning during a non-preseeded install. The examples below only provide basic information on the use of recipes. For detailed information see the les partman-auto-recipe.txt and partman-auto-raid-recipe.txt included in the debian-installer package. Both les are also available from the debian-installer
86
Appendix B. Automating the installation using preseeding source repository (http://svn.debian.org/wsvn/d-i//trunk/installer/doc/devel/). Note that the supported functionality may change between releases.
Warning
The identication of disks is dependent on the order in which their drivers are loaded. If there are multiple disks in the system, make very sure the correct one will be selected before using preseeding.
87
The full recipe format is documented in the file partman-auto-recipe.txt included in the debian-installer package or available from D-I source repository. This also documents how to specify settings such as file system labels, volume group names and which physical devices to include in a volume group.
# This makes partman automatically partition without confirmation, provided # that you told it what to do using one of the methods above. d-i partman-partitioning/confirm_write_new_label boolean true d-i partman/choose_partition select finish d-i partman/confirm boolean true d-i partman/confirm_nooverwrite boolean true
Warning
This type of automated partitioning is easy to get wrong. It is also functionality that receives relatively little testing from the developers of debian-installer. The responsibility to get the various recipes right (so they make sense and dont conict) lies with the user. Check /var/log/syslog if you run into problems.
# The method should be set to "raid". #d-i partman-auto/method string raid # Specify the disks to be partitioned. They will all get the same layout, # so this will only work if the disks are the same size. #d-i partman-auto/disk string /dev/sda /dev/sdb # Next you need to specify the physical partitions that will be used. #d-i partman-auto/expert_recipe string \ # multiraid :: \ # 1000 5000 4000 raid \ # $primary{ } method{ raid } \ # . \ # 64 512 300% raid \ # method{ raid } \
88
Last you need to specify how the previously defined partitions will be used in the RAID setup. Remember to use the correct partition numbers for logical partitions. RAID levels 0, 1, 5, 6 and 10 are supported; devices are separated using "#". Parameters are: <raidtype> <devcount> <sparecount> <fstype> <mountpoint> \ <devices> <sparedevices> partman-auto-raid/recipe string 1 2 0 ext3 / /dev/sda1#/dev/sdb1 . 1 2 0 swap /dev/sda5#/dev/sdb5 . 0 2 0 ext3 /home /dev/sda6#/dev/sdb6 . \ \ \ \ \ \ \ \ \
#d-i # # # # # # # # #
# For additional information see the file partman-auto-raid-recipe.txt # included in the debian-installer package or available from D-I source # repository. # This makes partman automatically partition without confirmation. d-i partman-md/confirm boolean true d-i partman-partitioning/confirm_write_new_label boolean true d-i partman/choose_partition select finish d-i partman/confirm boolean true d-i partman/confirm_nooverwrite boolean true
Warning
Traditional device names may change based on the order in which the kernel discovers devices at boot, which may cause the wrong lesystem to be mounted. Similarly, labels are likely to clash if you plug in a new disk or a USB drive, and if that happens your systems behaviour when started will be random.
89
Warning
Be aware that preseeding passwords is not completely secure as everyone with access to the preconguration le will have the knowledge of these passwords. Using MD5 hashes is considered slightly better in terms of security but it might also give a false sense of security as access to a MD5 hash allows for brute force attacks.
# Skip creation of a root account (normal user account will be able to # use sudo). #d-i passwd/root-login boolean false # Alternatively, to skip creation of a normal user account. #d-i passwd/make-user boolean false # Root password, either in clear text #d-i passwd/root-password password r00tme #d-i passwd/root-password-again password r00tme # or encrypted using an MD5 hash. #d-i passwd/root-password-crypted password [MD5 hash] # To create a normal user account. #d-i passwd/user-fullname string Debian User #d-i passwd/username string debian
90
The passwd/root-password-crypted and passwd/user-password-crypted variables can also be preseeded with ! as their value. In that case, the corresponding account is disabled. This may be convenient for the root account, provided of course that an alternative method is set up to allow administrative activities or root login (for instance by using SSH key authentication or sudo). The following command can be used to generate an MD5 hash for a password:
$ printf "r00tme" | mkpasswd -s -m md5
91
You can also choose to install no tasks, and force the installation of a set of packages in some other way. We recommend always including the standard task. If you want to install some individual packages in addition to packages installed by tasks, you can use the parameter pkgsel/include. The value of this parameter can be a list of packages separated by either commas or spaces, which allows it to be used easily on the kernel command line as well.
#tasksel tasksel/first multiselect standard, web-server # If the desktop task is selected, install the kde and xfce desktops # instead of the default gnome desktop. #tasksel tasksel/desktop multiselect kde, xfce # Individual additional packages to install #d-i pkgsel/include string openssh-server build-essential # Whether to upgrade packages after debootstrap. # Allowed values: none, safe-upgrade, full-upgrade #d-i pkgsel/upgrade select none # Some versions of the installer can report back on what software you have # installed, and what software you use. The default is not to report back, # but sending reports helps the project determine what software is most # popular and include it on CDs. #popularity-contest popularity-contest/participate boolean false
92
# With a few exceptions for unusual partitioning setups, GRUB 2 is now the # default. If you need GRUB Legacy for some particular reason, then # uncomment this: #d-i grub-installer/grub2_instead_of_grub_legacy boolean false # This is fairly safe to set, it makes grub install automatically to the MBR # if no other operating system is detected on the machine. d-i grub-installer/only_debian boolean true # This one makes grub-installer install to the MBR if it also finds some other # OS, which is less safe as it might not be able to boot that other OS. d-i grub-installer/with_other_os boolean true # Alternatively, if you want to install to a location other than the mbr, # uncomment and edit these lines: #d-i grub-installer/only_debian boolean false #d-i grub-installer/with_other_os boolean false #d-i grub-installer/bootdev string (hd0,0) # To install grub to multiple disks: #d-i grub-installer/bootdev string (hd0,0) (hd1,0) (hd2,0) # Optional password for grub, either in clear text #d-i grub-installer/password password r00tme #d-i grub-installer/password-again password r00tme # or encrypted using an MD5 hash, see grub-md5-crypt(8). #d-i grub-installer/password-crypted password [MD5 hash] # Use the following option to add additional boot parameters for the # installed system (if supported by the bootloader installer). # Note: options passed to the installer will be added automatically. #d-i debian-installer/add-kernel-opts string nousb
An MD5 hash for a password for grub can be generated using grub-md5-crypt, or using the command from the example in Section B.4.8.
93
# This first command is run as early as possible, just after # preseeding is read. #d-i preseed/early_command string anna-install some-udeb # This command is run immediately before the partitioner starts. It may be # useful to apply dynamic partitioner preseeding that depends on the state # of the disks (which may not be visible when preseed/early_command runs). #d-i partman/early_command \ # string debconf-set partman-auto/disk "$(list-devices disk | head -n1)" # This command is run just before the install finishes, but when there is # still a usable /target directory. You can chroot to /target and use it # directly, or use the apt-install and in-target commands to easily install # packages and run commands in the target system. #d-i preseed/late_command string apt-install zsh; in-target chsh -s /bin/zsh
achieved for all questions by setting the parameter preseed/interactive=true at the boot prompt. This can also be useful for testing or debugging your preconguration le.
The
same
effect
can
be
94
Appendix B. Automating the installation using preseeding Note that the d-i owner should only be used for variables used in the installer itself. For variables belonging to packages installed on the target system, you should use the name of that package instead. See the footnote to Section B.2.2. If you are preseeding using boot parameters, you can make the installer ask the corresponding question by using the ?= operator, i.e. foo/bar ?=value (or owner :foo/bar ?=value). This will of course only have effect for parameters that correspond to questions that are actually displayed during an installation and not for internal parameters.
It is also possible to chainload from the initrd or le preseeding phase, into network preseeding by setting preseed/url in the earlier les. This will cause network preseeding to be performed when the network comes up. You need to be careful when doing this, since there will be two distinct runs at preseeding, meaning for example that you get another chance to run the preseed/early command, the second one happening after the network comes up.
95
Content Essential command binaries Static les of the boot loader Device les Host-specic system conguration User home directories Essential shared libraries and kernel modules Contains mount points for replaceable media
96
Content Mount point for mounting a le system temporarily Virtual directory for system information (2.4 and 2.6 kernels) Home directory for the root user Essential system binaries Virtual directory for system information (2.6 kernels) Temporary les Secondary hierarchy Variable data Data for services provided by the system Add-on application software packages
The following is a list of important considerations regarding directories and partitions. Note that disk usage varies widely given system conguration and specic usage patterns. The recommendations here are general guidelines and provide a starting point for partitioning.
The root partition / must always physically contain /etc, /bin, /sbin, /lib and /dev, otherwise you wont be able to boot. Typically 150250MB is needed for the root partition. contains all user programs (/usr/bin), libraries (/usr/lib), documentation (/usr/share/doc), etc. This is the part of the le system that generally takes up most space. You should provide at least 500MB of disk space. This amount should be increased depending on the number and type of packages you plan to install. A generous workstation or server installation should allow 46GB. variable data like news articles, e-mails, web sites, databases, the packaging system cache, etc. will be placed under this directory. The size of this directory depends greatly on the usage of your system, but for most people will be dictated by the package management tools overhead. If you are going to do a full installation of just about everything Debian has to offer, all in one session, setting aside 2 or 3 GB of space for /var should be sufcient. If you are going to install in pieces (that is to say, install services and utilities, followed by text stuff, then X, ...), you can get away with 300500 MB. If hard drive space is at a premium and you dont plan on doing major system updates, you can get by with as little as 30 or 40 MB. temporary data created by programs will most likely go in this directory. 40100MB should usually be enough. Some applications including archive manipulators, CD/DVD authoring tools, and multimedia software may use /tmp to temporarily store image les. If you plan to use such applications, you should adjust the space available in /tmp accordingly. every user will put his personal data into a subdirectory of this directory. Its size depends on how many users will be using the system and what les are to be stored in their directories. Depending on your planned usage you should reserve about 100MB for each user, but adapt this value to your needs. Reserve a lot more space if you plan to save a lot of multimedia les (pictures, MP3, movies) in your home directory.
/usr:
/var:
/tmp:
/home:
97
The rst oppy drive is named /dev/fd0. The second oppy drive is named /dev/fd1. The rst SCSI disk (SCSI ID address-wise) is named /dev/sda. The second SCSI disk (address-wise) is named /dev/sdb, and so on. The rst SCSI CD-ROM is named /dev/scd0, also known as /dev/sr0. The master disk on IDE primary controller is named /dev/hda. The slave disk on IDE primary controller is named /dev/hdb.
98
The master and slave disks of the secondary controller can be called /dev/hdc and /dev/hdd, respectively. Newer IDE controllers can actually have two channels, effectively acting like two controllers.
The partitions on each disk are represented by appending a decimal number to the disk name: sda1 and sda2 represent the rst and second partitions of the rst SCSI disk drive in your system. Here is a real-life example. Lets assume you have a system with 2 SCSI disks, one at SCSI address 2 and the other at SCSI address 4. The rst disk (at address 2) is then named sda, and the second sdb. If the sda drive has 3 partitions on it, these will be named sda1, sda2, and sda3. The same applies to the sdb disk and its partitions. Note that if you have two SCSI host bus adapters (i.e., controllers), the order of the drives can get confusing. The best solution in this case is to watch the boot messages, assuming you know the drive models and/or capacities.
99
fd0 fd1
IDE Hard disk / CD-ROM on the rst IDE port (Master) IDE Hard disk / CD-ROM on the rst IDE port (Slave) IDE Hard disk / CD-ROM on the second IDE port (Master) IDE Hard disk / CD-ROM on the second IDE port (Slave) First partition of the rst IDE hard disk Fifteenth partition of the fourth IDE hard disk
SCSI Hard disk with lowest SCSI ID (e.g. 0) SCSI Hard disk with next higher SCSI ID (e.g. 1) SCSI Hard disk with next higher SCSI ID (e.g. 2) First partition of the rst SCSI hard disk Tenth partition of the fourth SCSI hard disk
sr0 sr1
SCSI CD-ROM with the lowest SCSI ID SCSI CD-ROM with the next higher SCSI ID
Serial port 0, COM1 under MS-DOS Serial port 1, COM2 under MS-DOS PS/2 mouse device Pseudo device, repeater data from GPM (mouse) daemon
cdrom
100
mouse
null zero
Anything written to this device will disappear One can endlessly read zeros out of this device
To load a mouse driver module, you can use the modconf command (from the package with the same name) and look in the category kernel/drivers/input/mouse.
The following table lists sizes reported by aptitude for the tasks listed in tasksel. Note that some tasks have overlapping constituents, so the total installed size for two tasks together may be less than the
1. Serial mice usually have a 9-hole D-shaped connector; bus mice have an 8-pin round connector, not to be confused with the 6-pin round connector of a PS/2 mouse or the 4-pin round connector of an ADB mouse.
101
Appendix D. Random Bits total obtained by adding up the numbers. By default the installer will install the GNOME desktop environment, but alternative desktop environments can be selected either by using one of the special CD images, or by specifying the desired desktop environment when the installer is booted (see Section 6.3.5.2). Note that you will need to add the sizes listed in the table to the size of the standard installation when determining the size of partitions. Most of the size listed as Installed size will end up in /usr and in /lib; the size listed as Download size is (temporarily) required in /var.
Task Desktop environment GNOME (default) KDE Xfce LXDE Laptopa Web server Print server DNS server File server Mail server SQL database
Download size (MB) Space needed to install (MB) 703 613 403 370 9 13 84 1 29 5 18 2533 2205 1459 1333 35 55 299 4 103 19 68
Notes: a. There is some overlap of the Laptop task with the Desktop environment task. If you install both, the Laptop task will only require a few MB additional disk space. If you install in a language other than English, tasksel may automatically install a localization task, if one is available for your language. Space requirements differ per language; you should allow up to 350MB in total for download and installation.
102
To create an ext2 le system instead, omit -j. Initialize and activate swap (substitute the partition number for your intended Debian swap partition):
Mount one partition as /mnt/debinst (the installation point, to be the root (/) lesystem on your new system). The mount point name is strictly arbitrary, it is referenced later below.
# mkdir /mnt/debinst # mount /dev/hda6 /mnt/debinst
Note: If you want to have parts of the lesystem (e.g. /usr) mounted on separate partitions, you will need to create and mount these directories manually before proceding with the next stage.
103
The debootstrap binary is located in the Debian archive (be sure to select the proper le for your architecture). Download the debootstrap .deb from the pool (http://ftp.debian.org/debian/pool/main/d/debootstrap/), copy the package to the work folder, and extract the les from it. You will need to have root privileges to install the les.
# ar -x debootstrap_0.X.X_all.deb # cd / # zcat /full-path-to-work/work/data.tar.gz | tar xv
After chrooting you may need to set the terminal denition to be compatible with the Debian base system, for example:
# export TERM=xterm-color
104
manually create only specic device les using MAKEDEV bind mount /dev from your host system on top of /dev in the target system; note that the postinst scripts of some packages may try to create device les, so this option should only be used with care
dump pass 0 1 0 2 0 0 0 0 0 0 2 2 2 2
/media/floppy auto noauto,rw,sync,user,exec 0 /media/cdrom iso9660 noauto,ro,user,exec 0 /tmp /var /usr /home ext3 ext3 ext3 ext3 rw,nosuid,nodev rw,nosuid,nodev rw,nodev rw,nosuid,nodev 0 0 0 0
Use mount -a to mount all the le systems you have specied in your /etc/fstab, or, to mount le systems individually, use:
# mount /path # e.g.: mount /usr
Current Debian systems have mountpoints for removable media under /media, but keep compatibility symlinks in /. Create these as as needed, for example:
# # # # # cd /media mkdir cdrom0 ln -s cdrom0 cdrom cd / ln -s media/cdrom
105
Appendix D. Random Bits You can mount the proc le system multiple times and to arbitrary locations, though /proc is customary. If you didnt use mount -a, be sure to mount proc before continuing:
# mount -t proc proc /proc
The command ls /proc should now show a non-empty directory. Should this fail, you may be able to mount proc from outside the chroot:
# mount -t proc proc /mnt/debinst/proc
# editor /etc/network/interfaces
106
If you have multiple network cards, you should arrange the names of driver modules in the /etc/modules le into the desired order. Then during boot, each card will be associated with the interface name (eth0, eth1, etc.) that you expect.
Make sure to run aptitude update after you have made changes to the sources list.
107
Note that the keyboard cannot be set while in the chroot, but will be congured for the next reboot.
If you intend to use a pre-packaged kernel, you may want to create the conguration le /etc/kernel-img.conf before you do so. Heres an example le:
# Kernel image management overrides # See kernel-img.conf(5) for details do_symlinks = yes relative_links = yes do_bootloader = yes do_bootfloppy = no do_initrd = yes link_in_boot = no
For detailed information about this le and the various options, consult its man page which will be available after installing the kernel-package package. We recommend that you check that the values are appropriate for your system. Then install the kernel package of your choice using its package name.
# aptitude install linux-image-2.6.32-arch-etc
If you did not create a /etc/kernel-img.conf before installing a pre-packaged kernel, you may be asked some questions during its installation that refer to it.
108
Of course, you can also just use aptitude to install packages individually. After the installation there will be a lot of downloaded packages in /var/cache/apt/archives/. You can free up some diskspace by running:
# aptitude clean
Boot the installer with the boot parameter modules=ppp-udeb. This will ensure the component responsible for the setup of PPPoE (ppp-udeb) will be loaded and run automatically. Follow the regular initial steps of the installation (language, country and keyboard selection; the loading of additional installer components3).
3. The ppp-udeb component is loaded as one of the additional components in this step. If you want to install at medium or low priority (expert mode), you can also manually select the ppp-udeb instead of entering the modules parameter at the boot prompt.
109
The next step is the detection of network hardware, in order to identify any Ethernet cards present in the system. After this the actual setup of PPPoE is started. The installer will probe all the detected Ethernet interfaces in an attempt to nd a PPPoE concentrator (a type of server which handles PPPoE connections). It is possible that the concentrator will not to be found at the rst attempt. This can happen occasionally on slow or loaded networks or with faulty servers. In most cases a second attempt to detect the concentrator will be successful; to retry, select Congure and start a PPPoE connection from the main menu of the installer.
After a concentrator is found, the user will be prompted to type the login information (the PPPoE username and password). At this point the installer will use the provided information to establish the PPPoE connection. If the correct information was provided, the PPPoE connection should be congured and the installer should be able to use it to connect to the Internet and retrieve packages over it (if needed). If the login information is not correct or some error appears, the installer will stop, but the conguration can be attempted again by selecting the menu entry Congure and start a PPPoE connection.
110
Appendix E. Administrivia
E.1. About This Document
This manual was created for Sarges debian-installer, based on the Woody installation manual for boot-oppies, which was based on earlier Debian installation manuals, and on the Progeny distribution manual which was released under GPL in 2003. This document is written in DocBook XML. Output formats are generated by various programs using information from the docbook-xml and docbook-xsl packages. In order to increase the maintainability of this document, we use a number of XML features, such as entities and proling attributes. These play a role akin to variables and conditionals in programming languages. The XML source to this document contains information for each different architecture proling attributes are used to isolate certain bits of text as architecture-specic.
111
Appendix E. Administrivia manual (http://www.informatik.uni-oldenburg.de/~amigo/debian_inst.html)), Arto Astala, Eric Delaunay/Ben Collins (SPARC information), Tapio Lehtonen, and Stphane Bortzmeyer for numerous edits and text. We have to thank Pascal Le Bail for useful information about booting from USB memory sticks. Extremely helpful text and information was found in Jim Minthas HOWTO for network booting (no URL available), the Debian FAQ (http://www.debian.org/doc/FAQ/), the Linux/m68k FAQ (http://www.linux-m68k.org/faq/faq.html), the Linux for SPARC Processors FAQ (http://www.ultralinux.org/faq.html), the Linux/Alpha FAQ (http://linux.iol.unh.edu/linux/alpha/faq/), amongst others. The maintainers of these freely available and rich sources of information must be recognized. The section on chrooted installations in this manual (Section D.3) was derived in part from documents copyright Karsten M. Self.
112
F.1. Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the gnu General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundations software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the gnu Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each authors protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modied by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reect on the original authors reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyones free use or not licensed at all. The precise terms and conditions for copying, distribution and modication follow.
113
Appendix F. GNU General Public License 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modication".) Each licensee is addressed as "you". Activities other than copying, distribution and modication are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Programs source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a. You must cause the modied les to carry prominent notices stating that you changed the les and the date of any change. b. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c. If the modied program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modied work as a whole. If identiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
114
Appendix F. GNU General Public License 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a. Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b. Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machinereadable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c. Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface denition les, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by
115
Appendix F. GNU General Public License all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program species a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL AND COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO
116
Appendix F. GNU General Public License OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS
free software; you can redistribute it and/or the terms of the GNU General Public License the Free Software Foundation; either version 2 or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with absolutely no warranty; for details type show w. This is free software, and you are welcome to redistribute it under certain conditions; type show c for details.
The hypothetical commands show w and show c should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than show w and show c; they could even be mouse-clicks or menu items whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program Gnomovision (which makes passes at compilers) written by James Hacker.
117
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License.
118