A live distribution focused on security and secure communications.
It has a lot of goodies cooked-in. I played with it for a bit, and think it's ok.. but I'd need to hack on it a bit to make it work more comfortably for me.
- Properly titled Liberté Linux
2013-07-22 - 2012.3 i686 ∞
- I didn't have working audio. I did no troubleshooting.
- Too GNOME-centric.
- I need to test their "unsafe browser".
No Btrfs filesystem support.
- This is a blocker.
Downloading the distribution ∞
(no ssl certificate) https://sourceforge.net/projects/liberte/files/
Download the file and associated
.asc, I got:
Verifying a download ∞
Downloading their signing key ∞
I'm unhappy that I don't have a proper place to get their key. The Chain of Trust is broken very early on.
- (invalid ssl certificate) zimmermann.mayfirst.org
(no ssl certificate) pgp.mit.edu:11371/pks/lookup?op=get&search=0x9B027FCD81DE1001
diffuse to compare multiple keys. If they are mostly the same, then this means that all of them (or my computer/connection) would have had to be compromised for the key to have been forged.
Liberté Linux public signing key ∞
- Liberte Linux - signing-public-key
- Liberte Linux - signing-public-key2
- Just a copy from one of my not-so-trustworthy sources, noted above.
Verifying a download ∞
#!/bin/sh #dir=zip #file=$dir/liberte-2012.3.zip dir=iso file=$dir/liberte-2012.3.iso # Download their signing key # # https://zimmermann.mayfirst.org/pks/lookup?op=get&search=0x6FDDD756110C1B07249FD07E9B027FCD81DE1001 # (was an invalid ssl certificate at the time) # pgp.mit.edu:11371/pks/lookup?op=get&search=0x9B027FCD81DE1001 # (no ssl certificate, when the URL worked) # I use diffuse to compare multiple keys. If they are mostly the same, then # this means that all of them would have had to be compromised for the key to # have been forged. \echo " * Import their signing key" \gpg --import signing-public-key.asc # -- # Download the Liberte files # # https://sourceforge.net/projects/liberte/files/ # (no ssl certificate) # the .zip and associated .asc, e.g.: # liberte-2012.3.zip # liberte-2012.3.zip.asc \echo " * Verifying $file" \gpg --verify $file.asc \echo 'The output should have been:' \echo 'Primary key fingerprint: 6FDD D756 110C 1B07 249F D07E 9B02 7FCD 81DE 1001'
Preparing a USB drive ∞
\sudo \gparted /dev/sdx
make one partition
- align to cylinder
- (optional) volume label:
Tested 2013-07-23 on i686 Lubuntu 13.04, updated recently.
- Mount the USB drive.
Run unetbootin, point it at the iso, and point it at your usb drive.
version=liberte-2012.3 target=/media/user/liberte-sd # Unpack onto the USB drive \unzip $version.zip -d $target # Run the Liberté Linux install script. \sudo \sh -c $target/liberte/setup.sh auto
Yes, I really did have to jump through those hoops. The installation instructions were not functional/complete on my Lubuntu setup.
iso notes ∞
I had no idea how to install this..
\sudo \gparted /dev/sdc # make one partition, fat32, align to cylinder # volume label: liberte-sd
I had a file
zip notes ∞
\sudo \gparted /dev/sdc
- make one partition, fat32, align to cylinder
- volume label: liberte-sd
- then mount it
then run unetbootin with the iso, and point it at that device
version=liberte-2012.3 # For ext2/3, otherwise it falls back to grub #\sudo \apt-get install extlinux # copy it all onto the device, and run the script that's on the device (while not being on the device onesself) # (incomplete:) \mkdir --parents $version \unzip $version.zip -d $version/ \sudo \sh -c $version/liberte/setup.sh auto