Light-Debian-Core-Live-CD-Wheezy + Porteus-Wheezy

For talk and support relating specifically to Puppy derivatives
Message
Author
User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3081 Post by saintless »

Stemsee, this is one more example what is the advantage of main-stream linux.
Boot puppy sfs module with debian kernel and initrd and you get all debian save file options and multiple squashfs load + puppy system. Fully working system with debian save file options.
Boot debian squashfs module with latest puppy developed initrd and puppy kernel and you get broken system.

Fred took porteus initrd and kernel and made debian squashfs to work with them keeping the save file options and advantages from porteus on debian system. Then he went further with some help from Sfs and made the same initrd file to work the same way with debian kernel having the best from Porteus and Debian in one system that is now DebianDog.
When something does not work but you see value in it you should keep trying to make it work till it is done. The word stunts has much different meaning to me.
But you decide what has value for you. If you are happy to have by accident live/secure/safe boot disc option and this is OK, then I'm happy for you. I would even suggest to type xdm-start in terminal to activate the login manager and install firewall. Then remaster DebianDog before renaming the main module to puppy.sfs and you will have much more secure system that is well protected. Even from the user itself.

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3082 Post by saintless »

Hi, Fred.
Do you have any plans to work on encrypted save file option for porteus boot?
I'm reading some links from Sfs pointed to us in this thread - Russian language only but at least the code examples are in English :)
http://forum.puppyrus.org/index.php/top ... l#msg86697
http://forum.puppyrus.org/index.php/topic,15571.0.html
From what I understand the initrd.xz is very similar to porteus one. Not sure what is included inside but this is from one of the links:
http://www.puppyrus.org/~melvik/puppyru ... 02/kernel/
http://www.puppyrus.org/~melvik/puppyru ... 6-porteus/
http://www.puppyrus.org/~melvik/puppyru ... /initrd.xz
Otherwise I'm reading about encryption for Wheezy. I'm not sure what I will find as solution yet but we shall see.

Toni

mcewanw
Posts: 3169
Joined: Thu 16 Aug 2007, 10:48
Contact:

#3083 Post by mcewanw »

This post no longer applicable since fixed/upgraded versions of xrecord and pavrecord now uploaded later.

Cheers, William
Last edited by mcewanw on Sat 19 Jul 2014, 04:03, edited 1 time in total.
github mcewanw

mcewanw
Posts: 3169
Joined: Thu 16 Aug 2007, 10:48
Contact:

updated/fixed pavrecord deb uploaded now

#3084 Post by mcewanw »

Hi Toni,

Have now uploaded revised pavrecord (version 0.9.4) in deb format. This contains the critical VU peak level meter fix suggested by SFR. Thanks again Jake. I've attached it to main pavrecord thread since that helps me keep the various Puppy versions in sync:

http://www.murga-linux.com/puppy/viewtopic.php?p=656582

Toni and Fred: You should completely remove the old one includine the .pavrecord folder in $HOME before installing this fixed version, just to be sure all will be fine...

I'm currently busy working on updating the several versions of this and precord for Puppy. If only people could compile ffmpeg to contain the same encoders... By the way, Fred, your static ffmpeg squashfs build doesn't seem to include support for x11grab.

Cheers, William
github mcewanw

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3085 Post by saintless »

Thanks, William.
What is your suggestion - to replace pavrecord with the attached one or to uninstall the package and install the new one? Is there something more changed in the deb package than the version name and /usr/bin/pavrecord?
I try to keep at minimum configuration program directories in $HOME/ In Jwm version there is no $HOME/.pavrecord I guess it is not a problem since it is created on first program run?

Toni

mcewanw
Posts: 3169
Joined: Thu 16 Aug 2007, 10:48
Contact:

#3086 Post by mcewanw »

saintless wrote:Thanks, William.
What is your suggestion - to replace pavrecord with the attached one or to uninstall the package and install the new one? Is there something more changed in the deb package than the version name and /usr/bin/pavrecord?
I try to keep at minimum configuration program directories in $HOME/ In Jwm version there is no $HOME/.pavrecord I guess it is not a problem since it is created on first program run?

Toni
The only other thing changed in the deb package is the Debian Control file, which contains the correct current version number of pavrecord. The separate main pavrecord script I attached to this thread is the same one in the deb Toni. I particularly informed you of the new deb since you would need to replace the one currently stored at smokey's site.

Yes, it is not a problem (in fact it is better) to provide the iso with no $HOME/.pavrecord since as you say it is created automatically anyway the first time pavrecord is run.

William
github mcewanw

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3087 Post by saintless »

Thanks, William.
Pavrecord re-uploaded:
http://smokey01.com/saintless/Fredx181/ ... 4_i386.deb

Toni

User avatar
fredx181
Posts: 4448
Joined: Wed 11 Dec 2013, 12:37
Location: holland

#3088 Post by fredx181 »

Hi Toni,
Hi, Fred.
Do you have any plans to work on encrypted save file option for porteus boot?
Thanks, I didn't have plans but I'll look at it when I have time.
Remove this lines from /root/bashrc and the problem is solved.
Code:
if [ $SUDO_USER ]; then
sudo -H -u $SUDO_USER xauth extract - $DISPLAY | xauth merge -
fi
Thanks, that solved it.
These days I'm busy working as volunteer for an alternative computer repair/shop.
They switched to Lubuntu as replacement for windows xp.
Also they have some "thin clients" (it's very low-ram small computer, 256MB RAM and only 256MB HDD) for connecting to server.
I tried openbox version on that but it's to heavy so using your JWM version now :)

Btw, I tried using Simple network setup as default network manager but frisbee is more reliable for wired connection (sns is unstable when unplugging/plugging cable and automatic connecting when rebooted)
Fred wrote:We forgot to add the gsu line on top of /usr/bin/frisbee.
Sorry, should have wrote: I forgot on openbox version, obviously didn't install latest deb you made.

Fred

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3089 Post by saintless »

Hi, Fred.
Nice to read you work with old PC like mine :) Better comress the main module with default gzip for this computer. It will work faster.

Encrypted save file and save partition solved for live-boot-3x thanks to Refracta forum and Dzz:
http://refracta.freeforums.org/snapshot ... -t182.html
He also solved the rw-boot partition mounting and SWAP not working issue for live-boot-3x. Now the persistence save file can be on the boot partition. Tested the pach for initrd from Dzz and works fine for encrypted save file with DebianDog.

I will look for live-boot-2x encrypted save file option now.

If we decide to use by default encrypted save file/partition we need to include cryptsetup package (it is 1Mb uncompressed) and we need to rebuild initrd files with cryptsetup support.

We have time to decide and test this, Fred. At least with live-boot-3x the problem is solved and it can be included even as separate initrd.img for encrypted save file/partition support without touching anything in the iso files.

Toni

stemsee

#3090 Post by stemsee »

a couple days ago I acheived remedial save function with DebianPup equal to the solution saintless posted for booting puppy with DD (DebianDog) initrd. This assumes booting to ram from sda3 chang appropriately for your setup or add searh for savefile function.

Mount script
#!/bin/sh
mkdir -p /media/sda3 && mount /dev/sda3 /media/sda3
mount /media/sda3/live/debian-save.2fs /initrd/pup_ro5
cp -r -p /initrd/pup_ro5/. /initrd/pup_rw/

restart X to see changes or add to init

save script
#!/bin/sh
cp -r -p /initrd/pup_rw/. /initrd/pup_ro5/

But work continues to implant full puppy options

Edit: the official fatdog64 option is to specify a kernel argument pupsave=ram:/path/to/savefile #mounts save file on /initrd/pup_rw ram layer
or pupsave=save:/path/to/savefile #mounts savefile on /initrd/pup_save - which doesn't exist outside of real FatDog64 initrd.
neither worked for me, maybe not enough testing.
Last edited by stemsee on Fri 20 Jun 2014, 10:25, edited 1 time in total.

mcewanw
Posts: 3169
Joined: Thu 16 Aug 2007, 10:48
Contact:

#3091 Post by mcewanw »

Toni,

I take it your old computer with DebianDog developments, and your family and self haven't been in danger of being washed away by the floods over there in Varna and Burgas?

William
github mcewanw

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3092 Post by saintless »

Hi, William.
I'm fine and my family also. We have small flat in Varna - Asparuhovo (where the tragedy happened) but we live 5 Km from there at the moment. Unfortunately official statement is at least eleven people died in the floods in Varna (including 2 children)... Hope there will not be more...

Toni

dancytron
Posts: 1519
Joined: Wed 18 Jul 2012, 19:20

#3093 Post by dancytron »

Please consider added "rar" as a package. It is very small and the binary to uncompress rar files. In xfce version, it automatically worked with xarchiver and right click "extract to here" without needing any configuration.

Thanks,


Dan

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3094 Post by saintless »

Sorry, Dan, rar (unrar) is non-free software and we can't include it installed in DebianDog:
https://packages.debian.org/wheezy/rar
We need to find alternative free version for linux that does the same job or to leave the user to install it with apt-get or Synaptic later.

Toni

dancytron
Posts: 1519
Joined: Wed 18 Jul 2012, 19:20

#3095 Post by dancytron »

Sorry, didn't realize that.

User avatar
fredx181
Posts: 4448
Joined: Wed 11 Dec 2013, 12:37
Location: holland

#3096 Post by fredx181 »

Hi Toni,
I think I have the hardest part done for porteus save file encryption: the loading at boot.
Here's initrd1.xz-crypt
https://drive.google.com/file/d/0ByBgCD ... sp=sharing
If it works for you also then I need only to modify the makepfile.sh script for supporting encryption.

Also attached make-changes script from original porteus, maybe it can be useful.

Fred
Attachments
make-changes.tar.gz
make-changes script from porteus inside archive
(7.99 KiB) Downloaded 137 times

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3097 Post by saintless »

fredx181 wrote:Hi Toni,
I think I have the hardest part done for porteus save file encryption: the loading at boot.
Here's initrd1.xz-crypt
https://drive.google.com/file/d/0ByBgCD ... sp=sharing
If it works for you also then I need only to modify the makepfile.sh script for supporting encryption.

Also attached make-changes script from original porteus, maybe it can be useful.

Fred
Hi, Fred.
Works fine with already encrypted persistence file renamed to changes.dat
Here is what we have to the moment:

Porteus-boot:
Saving changes inside encrypted save file (changes.dat or different named).
No changes in boot code needed.
initrd1.xz-crypt is only 0,3Mb bigger:
http://smokey01.com/saintless/DebianDog ... 1.xz-crypt

Live-boot-3x, thanks to Refracta initrd patch:
Saving changes inside encrypted persistence save file (with persistence.conf inside):
Saving changes inside partition labeled persistence (with persistence.conf inside).
Saving changes in non-encrypted persistence save file placed inside encrypted partition.
initrd1.img-crypt is 1,9Mb bigger:
http://smokey01.com/saintless/DebianDog ... .img-crypt
Needs addition to boot code. This one will use encrypted persistence save file placed inside /live directory:

Code: Select all

title DebianDog Wheezy live-boot-3 Persistence Encrypted
 uuid 25e43216-01b1-43eb-b02d-6350e970da2c
 kernel /live/vmlinuz1 boot=live config swapon noeject quickreboot autologin basemountmode=rw,noatime,umask=000 persistence persistence-path=/live/ persistence-encryption=none,luks
 initrd /live/initrd.img-crypt
swapon - this option works now to auto-mount swap partition on boot
basemountmode=rw,noatime,umask=000 (or basemountmode=rw) - this one will mount boot partition RW and now save file can be placed on boot partition. If it is missing boot partiition is mounted RO.
persistence-path=/live/ - this points the path to persistence save file.
persistence-encryption=none,luks - the system will search for non-encrypted or luks-encrypted save file/partition.

Live-boot-2x - still searching for solution but for the moment only live-sn (non-encrypted) and home-rw (non-encrypted) but placed inside encrypted partition works. I can't make live-rw from encrypted partition to work and also can't make encrypted save file work.

Fred, I think we should upload the initrd-crypt files for testing for some period of time. Replacing them inside the iso without proper testing from more people may bring more troubles later. Maybe wait more than a month for next updated iso?
We will also need to include aespipe and cryptsetup packages in the main module.
What do you think we should do?

Toni

User avatar
fredx181
Posts: 4448
Joined: Wed 11 Dec 2013, 12:37
Location: holland

#3098 Post by fredx181 »

Hi Toni,
Fred, I think we should upload the initrd-crypt files for testing for some period of time. Replacing them inside the iso without proper testing from more people may bring more troubles later. Maybe wait more than a month for next updated iso?
We will also need to include aespipe and cryptsetup packages in the main module.
What do you think we should do?
We don't have many testers these days, maybe we should hire some :)
We could maybe replace the iso's with included cryptsetup and aespipe (where is that for?) and other changes and give the choice to download and use initrd crypt. I 'm not in a hurry though.
Btw, the porteus-boot encrypted savefile option should be ok I think, I tested it around 20 times.

Here's mk-save.gtkdlg and makepfile.sh with added checkbox for encryption support.
I added parts of the porteus "make-changes" script which is very solid IMO.

Attached: mk-save.tar.gz

EDIT: uploaded again with major correction in mk-save.gtkdlg script

Fred
Attachments
mk-save.tar.gz
mk-save.gtkdlg and makepfile.sh with encryption support
(4.26 KiB) Downloaded 129 times

User avatar
saintless
Posts: 3862
Joined: Sat 11 Jun 2011, 13:43
Location: Bulgaria

#3099 Post by saintless »

fredx181 wrote:Attached: mk-save.tar.gz
Thank you, Fred!
I will test porteus encrypted save file proper in the next days.
Live-boot-3x encrypted save is also tested many times by me last few days and I think it will work fine.
Live-boot-2x is the one making troubles for me but I think I will get it done in time.

I think the best way to go is to add cryptsetup and aespipe (older aes encryption support for cryptsetup) in the main module and to replace only porteus initrd1.xz with the new one. The iso size will stay almost the same and we have encryption save file option for porteus boot. But this is for later.
initrd1.img-crypt and initrd.img-crypt will be available for download from the site (both will add 4Mb to the iso size and I see nobody else but me using live-boot-2x and live-boot-3x).

I will keep testing the encryption changes in the next days and get back with results.
We don't have many testers these days, maybe we should hire some
Much easier for us this way, Fred :)

Toni

dancytron
Posts: 1519
Joined: Wed 18 Jul 2012, 19:20

#3100 Post by dancytron »

fredx181 wrote:Hi Toni,
*stuff deleted
We don't have many testers these days, maybe we should hire some :)
*stuff deleted
I think you guys should consider trying to get a wider pool of users by posting it on some Debian message boards or maybe the Porteus ones.

I have had some trouble getting Google Earth to recognize my display card, which is showing direct rendering and works for xbmc. I'll try to write up the issue sometime this week.

Post Reply