![]() |
Linux distributions + Gentoo >
https://distrowatch.com/table.php?distribution=liberte
was dee.su/liberte [ 1 ] was web.archive.org/web/20191222061707/https://dee.su/liberte but was later purged from The Wayback Machine; fuck.
A live distribution focused on security and secure communications.
It has a lot of goodies cooked-in. I played with it for a bit, and think it’s ok.. but I’d need to hack on it a bit to make it work more comfortably for me.
- Properly titled Liberté Linux
-
Abandoned
2013-07-22 – 2012.3 i686 ∞
- I didn’t have working audio. I did no troubleshooting.
- Too GNOME-centric.
- I need to test their “unsafe browser”.
-
No Btrfs filesystem support.
- This is a blocker.
Downloading the distribution ∞
-
(no ssl certificate) https://sourceforge.net/projects/liberte/files/
Download the file and associated .asc, I got:
liberte-2012.3.isoliberte-2012.3.iso.ascliberte-2012.3.zip-
liberte-2012.3.zip.asc
Verifying a download ∞
Downloading their signing key ∞
I’m unhappy that I don’t have a proper place to get their key. The Chain of Trust is broken very early on.
- (invalid ssl certificate) zimmermann.mayfirst.org [ 2 ] was https://zimmermann.mayfirst.org/pks/lookup?op=get&search=0x6FDDD756110C1B07249FD07E9B027FCD81DE1001 (not archived)
-
(no ssl certificate) pgp.mit.edu:11371/pks/lookup?op=get&search=0x9B027FCD81DE1001
I use diffuse to compare multiple keys. If they are mostly the same, then this means that all of them (or my computer/connection) would have had to be compromised for the key to have been forged.
Liberté Linux public signing key ∞
- Liberte Linux – signing-public-key
- Liberte Linux – signing-public-key2
-
Liberte Linux – some other key
- Just a copy from one of my not-so-trustworthy sources, noted above.
Verifying a download ∞
(Diffuse)
#!/bin/sh #dir=zip #file=$dir/liberte-2012.3.zip dir=iso file=$dir/liberte-2012.3.iso # Download their signing key # # https://zimmermann.mayfirst.org/pks/lookup?op=get&search=0x6FDDD756110C1B07249FD07E9B027FCD81DE1001 # (was an invalid ssl certificate at the time) # pgp.mit.edu:11371/pks/lookup?op=get&search=0x9B027FCD81DE1001 # (no ssl certificate, when the URL worked) # I use diffuse to compare multiple keys. If they are mostly the same, then # this means that all of them would have had to be compromised for the key to # have been forged. \echo " * Import their signing key" \gpg --import signing-public-key.asc # -- # Download the Liberte files # # https://sourceforge.net/projects/liberte/files/ # (no ssl certificate) # the .zip and associated .asc, e.g.: # liberte-2012.3.zip # liberte-2012.3.zip.asc \echo " * Verifying $file" \gpg --verify $file.asc \echo 'The output should have been:' \echo 'Primary key fingerprint: 6FDD D756 110C 1B07 249F D07E 9B02 7FCD 81DE 1001'
Preparing a USB drive ∞
\sudo \gparted /dev/sdx
-
make one partition
- fat32
- align to cylinder
- (optional) volume label:
liberte-sd
Installation ∞
Tested 2013-07-23 on i686 Lubuntu 13.04, updated recently.
- Mount the USB drive.
-
Run unetbootin, point it at the iso, and point it at your usb drive.
version=liberte-2012.3 target=/media/user/liberte-sd # Unpack onto the USB drive \unzip $version.zip -d $target # Run the Liberté Linux install script. \sudo \sh -c $target/liberte/setup.sh auto
Yes, I really did have to jump through those hoops. The installation instructions were not functional/complete on my Lubuntu setup.
iso notes ∞
I had no idea how to install this..
install script:
\sudo \gparted /dev/sdc # make one partition, fat32, align to cylinder # volume label: liberte-sd
I had a file liberte-2012.3.iso.asc with:
Spoiler
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) iF4EABEIAAYFAlBBoEUACgkQmwJ/zYHeEAEDxgD9F93UCBRClyFSVjbHtSGUM2qO rEEcv1gqLb3FQT1qHFAA/0K1kqX1hAjxrALCbPYz2yk1Dl+1wBgnWVMHVCUd1gdn =rQ35 -----END PGP SIGNATURE-----
zip notes ∞
\sudo \gparted /dev/sdc
- make one partition, fat32, align to cylinder
- volume label: liberte-sd
- then mount it
-
then run unetbootin with the iso, and point it at that device
version=liberte-2012.3 # For ext2/3, otherwise it falls back to grub #\sudo \apt-get install extlinux # copy it all onto the device, and run the script that's on the device (while not being on the device onesself) # (incomplete:) \mkdir --parents $version \unzip $version.zip -d $version/ \sudo \sh -c $version/liberte/setup.sh auto
liberte-2012.3.zip.asc had
Spoiler
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) iF4EABEIAAYFAlBBoDoACgkQmwJ/zYHeEAGJIwD/VnMecvI+H4cXSnQACwROeCEn d+8zAkMO3c3TADsuDMcBANN08vhIHVEvdnoBeLhvfHSOiTtXID6o/O3blu3++4bz =s9y2 -----END PGP SIGNATURE-----


Added my most ancient notes, just so I can get them off my drive. I’ll probably never look at this distribution again.
Poked it with a stick; confirmed its death.