better README
This commit is contained in:
parent
6f98289af0
commit
f4795c232a
27
README.md
27
README.md
@ -79,32 +79,9 @@ After firmware updates (UEFI/BIOS), the TPM bindings need to be updated:
|
||||
|
||||
3. **Verify Installation**
|
||||
```bash
|
||||
ssh root@your-server
|
||||
ssh null@your-server
|
||||
systemctl status clevis-luks-askpass
|
||||
lsblk
|
||||
btrfs filesystem show # Check RAID1 status
|
||||
clevis-luks-list -d /dev/sda2
|
||||
```
|
||||
|
||||
## Recovery
|
||||
|
||||
If you need to recover the system:
|
||||
|
||||
1. **Using Rescue System**
|
||||
- Boot into Rescue System
|
||||
- Mount the encrypted volumes:
|
||||
```bash
|
||||
cryptsetup luksOpen /dev/sda2 root_a
|
||||
cryptsetup luksOpen /dev/sdb2 root_b
|
||||
mount /dev/mapper/root_a /mnt
|
||||
```
|
||||
- Access your data at `/mnt`
|
||||
|
||||
2. **Using Tang Server**
|
||||
- Ensure your Tang server is accessible
|
||||
- The system should automatically unlock if TPM measurements match
|
||||
|
||||
3. **Using Manual Passphrase**
|
||||
- Connect via SSH during early boot (dropbear)
|
||||
- Enter the LUKS passphrase when prompted
|
||||
- The passphrase is stored in `/root/luks-passphrase.txt` on the installed system
|
||||
```
|
Loading…
Reference in New Issue
Block a user