Intel Processor FSB Info :
133 = 533 MHz
200 = 800 MHz
266 = 1066 MHz
333 = 1333 MHz
400 = 1600 MHz
_________________________
Memory Info :
Memory Speeds (MHz)
and Data Tranfer Rates (GB/s) :
DDR1 266 MHz = PC2100
DDR1 333 MHz = PC2700
DDR1 400 MHz = PC3200
_________________________
DDR2 533 MHz = PC 4200
DDR2 667 MHz = PC 5300
DDR2 800 MHz = PC 6400
_________________________
DDR3 1066 MHz = PC 8500
DDR3 1333 MHz = PC 10600
DDR3 1600 MHz = PC 12800
DDR3 1866 MHz = PC 14900
_________________________
DDR4 2133 MHz = PC 17000
DDR4 2400 MHz = PC 19000
DDR4 2666 MHz = PC 21300
DDR4 2933 MHz = PC 23400
DDR4 3200 MHz = PC 25600
_________________________
Note :
* The practical data rate is determined by the system's Central Processing Unit and motherboard configuration.
|
Home Technical Update Operating System Setting up Ubuntu Installer and Hardware Configuration
Setting up Ubuntu Installer and Hardware Configuration |
Using Individual Components
In this section we will describe each installer component in
detail. The components have been grouped into stages that should
be recognizable for users. They are presented in the order they
appear during the install. Note that not all modules will be used
for every installation; which modules are actually used depends on
the installation method you use and on your hardware.
Setting up Ubuntu Installer and Hardware Configuration
Let's assume the Ubuntu Installer has booted and you are facing its
first screen. At this time, the capabilities of debian-installer are still quite
limited. It doesn't know much about your hardware, preferred language,
or even the task it should perform. Don't worry. Because debian-installer is quite
clever, it can automatically probe your hardware, locate the rest
of its components and upgrade itself to a capable installation system.
However, you still need to help debian-installer with some information it can't
determine automatically (like selecting your preferred language, keyboard
layout or desired network mirror).
You will notice that debian-installer performs hardware detection
several times during this stage. The first time is targeted specifically
at the hardware needed to load installer components (e.g. your CD-ROM or
network card). As not all drivers may be available during this first run,
hardware detection needs to be repeated later in the process.
One of the first things debian-installer does, is to check available memory.
If the available memory is limited, this component will make some
changes in the installation process which hopefully will allow
you to install Ubuntu on your system.
During a low memory install, not all components will be available.
One of the limitations is that you won't be able to choose a
language for the installation.
Selecting Localization Options
In most cases the first questions you will be asked concern the selection
of localization options to be used both for the installation and for the
installed system. The localization options consist of language, country
and locales.
The language you choose will be used for the rest of the installation
process, provided a translation of the different dialogs is available.
If no valid translation is available for the selected language, the
installer will default to English.
The selected country will be used later in the installation process to
pick the default timezone and an Ubuntu mirror appropriate for your
geographic location. Language and country together will be used to set
the default locale for your system and to help select your keyboard.
You will first be asked to select your preferred language. The language
names are listed in both English (left side) and in the language itself
(right side); the names on the right side are also shown in the proper
script for the language. The list is sorted on the English names.
At the top of the list is an extra option that allows you to select the
“C” locale instead of a language. Choosing the “C”
locale will result in the installation proceding in English; the installed
system will have no localization support as the locales
package will not be installed.
If you selected a language that is recognized as an official language for
more than one country[5], you will next be asked to select a country.
If you choose at the bottom of the list,
you will be presented with a list of all countries, grouped by continent.
If the language has only one country associated with it, that country
will be selected automatically.
A default locale will be selected based on the selected language and country.
If you are installing at medium or low priority, you will have the option
of selecting a different default locale and of selecting additional locales to
be generated for the installed system.
Keyboards are often tailored to the characters used in a language.
Select a layout that conforms to the keyboard you are using, or
select something close if the keyboard layout you want
isn't represented. Once the system installation is complete, you'll be
able to select a keyboard layout from a wider range of choices (run
kbdconfig as root after you have completed the
installation).
Move the highlight to the keyboard selection you desire and press
Enter. Use the arrow keys to move the highlight — they are
in the same place in all national language keyboard layouts, so they
are independent of the keyboard configuration. An 'extended' keyboard
is one with F1 through F10 keys
along the top row.
Looking for the Ubuntu Installer ISO Image
When installing via the hd-media method, there
will be a moment where you need to find and mount the Ubuntu Installer
iso image in order to get the rest of the installation files. The
component iso-scan does exactly this.
At first, iso-scan automatically mounts all block
devices (e.g. partitions) which have some known filesystem on them and
sequentially searches for filenames ending with
.iso (or .ISO for that
matter). Beware that the first attempt scans only files in the root
directory and in the first level of subdirectories (i.e. it finds
/whatever.iso,
/data/whatever.iso,
but not
/data/tmp/whatever.iso).
After an iso image has been found, iso-scan checks
its content to determine if the image is a valid Ubuntu iso image or
not. In the former case we are done, in the latter
iso-scan seeks for another image.
In case the previous attempt to find an installer iso image fails,
iso-scan will ask you whether you would like to
perform a more thorough search. This pass doesn't just look into the
topmost directories, but really traverses whole filesystem.
If iso-scan does not discover your installer iso
image, reboot back to your original operating system and check if the
image is named correctly (ending in .iso), if it is
placed on a filesystem recognizable by debian-installer, and if it is not
corrupted (verify the checksum). Experienced Unix users could do this
without rebooting on the second console.
As you enter this step, if the system detects that you have more than
one network device, you'll be asked to choose which device will be
your primary network interface, i.e. the one
which you want to use for installation. The other interfaces won't be
configured at this time. You may configure additional interfaces after
installation is complete; see the interfaces(5) man page.
By default, debian-installer tries to configure your computer's network
automatically via DHCP. If the DHCP probe succeeds, you are done. If the
probe fails, it may be caused by many factors ranging from unplugged
network cable, to a misconfigured DHCP setup. Or maybe you don't have
a DHCP server in your local network at all. For further explanation
check the error messages on the third console. In any case, you will
be asked if you want to retry, or if you want to perform manual
setup. DHCP servers are sometimes really slow in their responses, so
if you are sure everything is in place, try again.
The manual network setup in turn asks you a number of questions about
your network, notably
IP address,
Netmask,
Gateway,
Name server addresses, and a
Hostname.
Moreover, if you have a wireless network interface, you will be asked
to provide your Wireless ESSID and
a WEP key. Fill in the answers from
the section called “Information You Will Need”.
|
|
Some technical details you might, or might not, find handy: the
program assumes the network IP address is the bitwise-AND of your
system's IP address and your netmask. It will guess the broadcast
address is the bitwise OR of your system's IP address with the bitwise
negation of the netmask. It will also guess your gateway. If you
can't find any of these answers, use the system's guesses — you
can change them once the system has been installed, if necessary, by
editing /etc/network/interfaces. Alternatively,
you can install etherconf, which will step you
through your network setup.
|
Partitioning and Mount Point Selection
At this time, after hardware detection has been executed a final time,
debian-installer should be at its full strength, customized for the user's needs
and ready to do some real work.
As the title of this section indicates, the main task of the next few
components lies in partitioning your disks, creating filesystems,
assigning mountpoints and optionally configuring closely related issues
like LVM or RAID devices.
Now it is time to partition your disks. If you are uncomfortable with
partitioning, or just want to know more details, see Appendix C, Partitioning for Ubuntu.
First you will be given the opportunity to automatically partition
either an entire drive, or free space on a drive. This is also called
“guided” partitioning. If you do not want to
autopartition, choose from the menu.
If you choose guided partitioning, you may have two options: to create
partitions directly on the hard disk (classic method) or to use Logical
Volume Management (LVM). In the second case, the installer will create most
partitions inside one big partition; the advantage of this method is that
partitions inside this big partition can be resized relatively easily later.
Note: the option to use LVM may not be available on all architectures.
After you choose guided partitioning (either classic or using LVM), you
will be able to choose from the schemes listed in the table below.
All schemes have their pros and cons,
some of which are discussed in Appendix C, Partitioning for Ubuntu. If you are
unsure, choose the first one. Bear in mind that guided partitioning
needs a certain minimal amount of free space to operate with. If you don't
give it at least about 1GB of space (depends on chosen scheme), guided
partitioning will fail.
If you choose guided partitioning using LVM, the installer will also create
a separate /boot partition. The other partitions, except for the swap
partition, will be created inside the LVM partition.
After selecting a scheme, the next screen will show your new partition
table, including information on whether and how partitions will be
formatted and where they will be mounted.
The list of partitions might look like this:
This example shows two IDE harddrives divided into several partitions;
the first disk has some free space. Each partition line consists of the
partition number, its type, size, optional flags, file system, and
mountpoint (if any). Note: this particular setup cannot be created using
guided partitioning but it does show possible variation that can be achieved
using manual partitioning.
This concludes the guided partitioning. If you are satisfied with the
generated partition table, you can choose from the menu to
implement the new partition table (as described at the end of this
section). If you are not happy, you can choose to [6] and run guided partitioning again, or modify the proposed changes
as described below for manual partitioning.
A similar screen to the one shown just above will be displayed if you
choose manual partitioning except that your existing partition table will
be shown and without the mount points. How to manually setup your partition
table and the usage of partitions by your new Ubuntu system will be covered
in the remainder of this section.
If you select a pristine disk which doesn't have neither partitions
nor free space on it, you will be offered to create a new partition
table (this is needed so you can create new partitions). After this
a new line entitled “FREE SPACE” should appear under the
selected disk.
If you select some free space, you will be offered to create new
partition. You will have to answer a quick series of questions about
its size, type (primary or logical), and location (beginning or end of
the free space). After this, you will be presented with detailed
overview of your new partition. There are options like mountpoint,
mount options, bootable flag, or way of usage. If you don't like the
preselected defaults, feel free to change them to your liking. E.g. by
selecting the option , you can
choose different filesystem for this partition including the
possibility to use the partition for swap, software RAID, LVM, or not
use it at all. Other nice feature is the possibility to copy data from
existing partition onto this one.
When you are satisfied with your new partition, select
and you will be
thrown back to partman's main screen.
If you decide you want to change something about your partition,
simply select the partition, which will bring you to the partition
configuration menu. Because this is the same screen like when creating
a new partition, you can change the same set of options. One thing
which might not be very obvious at a first glance is that you can
resize the partition by selecting the item displaying the size of the
partition. Filesystems known to work are at least fat16, fat32, ext2,
ext3 and swap. This menu also allows you to delete a partition.
Be sure to create at least two partitions: one for the
root filesystem (which must be mounted as
/) and one for swap. If you
forget to mount the root filesystem, partman won't
let you continue until you correct this issue.
Capabilities of partman can be extended with installer
modules, but are dependent on your system's architecture. So if you can't
see all promised goodies, check if you have loaded all required modules
(e.g. partman-ext3, partman-xfs,
or partman-lvm).
After you are satisfied with partitioning, select from the partitioning
menu. You will be presented with a summary of changes made to the disks
and asked to confirm that the filesystems should be created as requested.
Configuring Logical Volume Manager (LVM)
If you are working with computers at the level of system administrator
or “advanced” user, you have surely seen the situation
where some disk partition (usually the most important one) was short on
space, while some other partition was grossly underused and you had to
manage this situation with moving stuff around, symlinking, etc.
To avoid the described situation you can use Logical Volume Manager
(LVM). Simply said, with LVM you can combine your partitions
(physical volumes in LVM lingo) to form
a virtual disc (so called volume group), which
can then be divided into virtual partitions (logical
volumes). The point is that logical volumes (and of course
underlying volume groups) can span across several physical discs.
Now when you realize you need more space for your old 160GB
/home partition, you can simply add a new 300GB
disc to the computer, join it with your existing volume group and then
resize the logical volume which holds your /home
filesystem and voila — your users have some room again on their
renewed 460GB partition. This example is of course a bit
oversimplified. If you haven't read it yet, you should consult the
LVM HOWTO.
LVM setup in debian-installer is quite simple. At first, you have to mark your
partitions to be used as physical volumes for LVM. (This is done in
partman in the menu where you should select → .) Then start the
lvmcfg module (either directly from
partman or from the debian-installer's main menu) and combine
physical volumes to volume group(s) under the menu. After that, you should create
logical volumes on the top of volume groups from the menu
.
After returning from lvmcfg back to
partman, you will see any created logical volumes
in the same way as ordinary partitions (and you should treat them like
that).
Configuring Multidisk Device (Software RAID)
If you have more than one harddrive[7] in your computer, you can use
mdcfg to setup your drives for increased
performance and/or better reliability of your data. The result is
called Multidisk Device (or after its most
famous variant software RAID).
MD is basically a bunch of partitions located on different disks and
combined together to form a logical device. This
device can then be used like an ordinary partition (i.e. in
partman you can format it, assign a mountpoint,
etc.).
The benefit you gain depends on a type of a MD device you are
creating. Currently supported are:
-
RAID0
-
Is mainly aimed at performance. RAID0 splits all incoming data into
stripes and distributes them equally over each
disk in the array. This can increase the speed of read/write
operations, but when one of the disks fails, you will loose
everything (part of the information is still on
the healthy disk(s), the other part was on the
failed disk).
The typical use for RAID0 is a partition for video editing.
-
RAID1
-
Is suitable for setups where reliability is the first concern. It
consists of several (usually two) equally sized partitions where every
partition contains exactly the same data. This essentially means three
things. First, if one of your disks fails, you still have the data
mirrored on the remaining disks. Second, you can use only a fraction
of the available capacity (more precisely, it is the size of the
smallest partition in the RAID). Third, file reads are load balanced among
the disks, which can improve performance on a server, such as a file
server, that tends to be loaded with more disk reads than writes.
Optionally you can have a spare disk in the array which will take the
place of the failed disk in the case of failure.
-
RAID5
-
Is a good compromise between speed, reliability and data redundancy.
RAID5 splits all incomming data into stripes and distributes them
equally on all but one disks (similar to RAID0). Unlike RAID0, RAID5
also computes parity information, which gets
written on the remaining disk. The parity disk is not static (that
would be called RAID4), but is changing periodically, so the parity
information is distributed equally on all disks. When one of the
disks fails, the missing part of information can be computed from
remaining data and its parity. RAID5 must consist of at least three
active partitions. Optionally you can have a spare disk in the array
which will take the place of the failed disk in the case of failure.
As you can see, RAID5 has similar degree of reliability like RAID1
while achieving less redundancy. On the other hand it might be a bit
slower on write operation than RAID0 due to computation of parity
information.
To sum it up:
If you want to know the whole truth about Software RAID, have a look
at Software RAID HOWTO.
To create a MD device, you need to have the desired partitions it
should consist of marked for use in a RAID. (This is done in
partman in the menu where you should select → .)
|
|
Support for MD is a relatively new addition to the installer.
You may experience problems for some RAID levels and in combination
with some bootloaders if you try to use MD for the root
(/) filesystem. For experienced users, it may be
possible to work around some of these problems by executing some
configuration or installation steps manually from a shell.
|
Next, you should choose from the main partman menu.
(The menu will only appear after you mark at least one partition for
use as .)
On the first screen of mdcfg simply select
. You will be presented with
a list of supported types of MD devices, from which you should choose
one (e.g. RAID1). What follows depends on the type of MD you selected.
-
RAID0 is simple — you will be issued with the list of available
RAID partitions and your only task is to select the partitions which
will form the MD.
-
RAID1 is a bit more tricky. First, you will be asked to enter the
number of active devices and the number of spare devices which will
form the MD. Next, you need to select from the list of available RAID
partitions those that will be active and then those that will be
spare. The count of selected partitions must be equal to the number
provided few seconds ago. Don't worry. If you make a mistake and
select different number of partitions, the debian-installer won't let you
continue until you correct the issue.
-
RAID5 has similar setup procedure as RAID1 with the exception that you
need to use at least three active partitions.
It is perfectly possible to have several types of MD at once. For
example if you have three 200 GB hard drives dedicated to MD, each
containing two 100 GB partitions, you can combine first partitions on
all three disk into the RAID0 (fast 300 GB video editing partition)
and use the other three partitions (2 active and 1 spare) for RAID1
(quite reliable 100 GB partition for /home).
After you setup MD devices to your liking, you can
mdcfg to return
back to the partman to create filesystems on your
new MD devices and assign them the usual attributes like mountpoints.
Configuring Encrypted Volumes
debian-installer allows you to set up encrypted partitions. Every file you write
to such a partition is immediately saved to the device in encrypted
form. Access to the encrypted data is granted only after entering
the passphrase used when the encrypted
partition was originally created. This feature is useful to protect
sensitive data in case your laptop or hard drive gets stolen. The
thief might get physical access to the hard drive, but without knowing
the right passphrase, the data on the hard drive will look like random
characters.
The two most important partitions to encrypt are: the home partition,
where your private data resides, and the swap partition, where
sensitive data might be stored temporarily during operation. Of
course, nothing prevents you from encrypting any other partitions that might
be of interest. For example /var where database
servers, mail servers or print servers store their data, or
/tmp which is used by various programs to store
potentially interesting temporary files. Some people may even want to
encrypt their whole system. The only exception is
the /boot partition which must remain
unencrypted, because currently there is no way to load the kernel from
an encrypted partition.
|
|
Please note that the performance of encrypted partitions will be
less than that of unencrypted ones because the data needs to be
decrypted or encrypted for every read or write. The performance impact
depends on your CPU speed, chosen cipher and a key length.
|
To use encryption, you have to create a new partition by selecting
some free space in the main partitioning menu. Another option is to
choose an existing partition (e.g. a regular partition, an LVM logical
volume or a RAID volume). In the
menu, you need to select at the option. The menu will then change to
include several cryptographic options for the partition.
debian-installer supports several encryption methods. The default method
is dm-crypt (included in newer Linux kernels,
able to host LVM physical volumes), the other
is loop-AES (older, maintained separately from
the Linux kernel tree). Unless you have compelling reasons to do
otherwise, it is recommended to use the default.
First, let's have a look at available options available when you
select Device-mapper (dm-crypt) as the
encryption method. As always: when in doubt, use the defaults, because
they have been carefully chosen with security in mind.
-
Encryption: aes
-
This option lets you select the encryption algorithm
(cipher) which will be used to encrypt the data
on the partition. debian-installer currently supports the following block
ciphers: aes, blowfish,
serpent, and twofish.
It is beyond the scope of this document to discuss the qualities of
these different algorithms, however, it might help your decision to
know that in 2000, AES was chosen by the American
National Institute of Standards and Technology as the standard
encryption algorithm for protecting sensitive information in the 21st
century.
-
Key size: 256
-
Here you can specify the length of the encryption key. With a larger
key size, the strength of the encryption is generally improved. On the
other hand, increasing the length of the key usually has a negative
impact on performance. Available key sizes vary depending on the
cipher.
-
IV algorithm: cbc-essiv:sha256
-
The Initialization Vector or
IV algorithm is used in cryptography to ensure
that applying the cipher on the same clear text
data with the same key always produces a unique
cipher text. The idea is to prevent the
attacker from deducing information from repeated patterns in the encrypted
data.
From the provided alternatives, the default
cbc-essiv:sha256 is currently the least
vulnerable to known attacks. Use the other alternatives only when you
need to ensure compatibility with some previously installed system
that is not able to use newer algorithms.
-
Encryption key: Passphrase
-
Here you can choose the type of the encryption key for this partition.
-
Passphrase
-
The encryption key will be computed[8] on the basis of a passphrase which you will be able
to enter later in the process.
-
Random key
-
A new encryption key will be generated from random data each time you
try to bring up the encrypted partition. In other words: on every
shutdown the content of the partition will be lost as the key is
deleted from memory. (Of course, you could try to guess the key with a
brute force attack, but unless there is an unknown weakness in the
cipher algorithm, it is not achievable in our lifetime.)
Random keys are useful for swap partitions because you do not need to
bother yourself with remembering the passphrase or wiping sensitive
information from the swap partition before shutting down your
computer. However, it also means that you
will not be able to use
the “suspend-to-disk” functionality offered by newer
Linux kernels as it will be impossible (during a subsequent boot) to
recover the suspended data written to the swap partition.
-
Erase data: yes
-
Determines whether the content of this partition should be overwritten
with random data before setting up the encryption. This is recommended
because it might otherwise be possible for an attacker to discern
which parts of the partition are in use and which are not. In
addition, this will make it harder to recover any leftover data from
previous installations[9].
If you select → , the menu
changes to provide the following options:
-
Encryption: AES256
-
For loop-AES, unlike dm-crypt, the options for cipher and key size are
combined, so you can select both at the same time. Please see the
above sections on ciphers and key sizes for further information.
-
Encryption key: Keyfile (GnuPG)
-
Here you can select the type of the encryption key for this partition.
-
Keyfile (GnuPG)
-
The encryption key will be generated from random data during the
installation. Moreover this key will be encrypted
with GnuPG, so to use it, you will need to
enter the proper passphrase (you will be asked to provide one later in
the process).
-
Random key
-
Please see the the section on random keys above.
-
Erase data: yes
-
Please see the the section on erasing data above.
|
|
Please note that the graphical version of the
installer still has some limitations when compared to the textual
one. For cryptography it means you can set up only volumes using
passphrases as the encryption keys.
|
After you have selected the desired parameters for your encrypted
partitions, return back to the main partitioning menu. There should
now be a new menu item called . After you select it, you will be asked to confirm
the deletion of data on partitions marked to be erased and possibly
other actions such as writing a new partition table. For large
partitions this might take some time.
Next you will be asked to enter a passphrase for partitions configured
to use one. Good passphrases should be longer than 8 characters,
should be a mixture of letters, numbers and other characters and
should not contain common dictionary words or information easily
associable with you (such as birthdates, hobbies, pet names, names of
family members or relatives, etc.).
|
|
Before you input any passphrases, you should have made sure that your
keyboard is configured correctly and generates the expected
characters. If you are unsure, you can switch to the second virtual
console and type some text at the prompt. This ensures that you won't be
surprised later, e.g. by trying to input a passphrase using a qwerty
keyboard layout when you used an azerty layout during the installation.
This situation can have several causes. Maybe you switched to another
keyboard layout during the installation, or the selected keyboard layout
might not have been set up yet when entering the passphrase for the
root file system.
|
If you selected to use methods other than a passphrase to create
encryption keys, they will be generated now. Because the kernel may
not have gathered a sufficient amount of entropy at this early stage
of the installation, the process may take a long time. You can help
speed up the process by generating entropy: e.g. by pressing random
keys, or by switching to the shell on the second virtual console and
generating some network and disk traffic (downloading some files,
feeding big files into /dev/null, etc.).
This will be repeated for each partition to be encrypted.
After returning to the main partitioning menu, you will see all
encrypted volumes as additional partitions which can be configured in
the same way as ordinary partitions. The following example shows two
different volumes. The first one is encrypted via dm-crypt, the second
one via loop-AES.
Now is the time to assign mount points to the volumes and optionally
change the file system types if the defaults do not suit you.
One thing to note here are the identifiers in parentheses
(crypt0
and loop0 in this case) and the mount
points you assigned to each encrypted volume. You will need this
information later when booting the new system. The differences between
ordinary boot process and boot process with encryption involved will
be covered later in the section called “Mounting encrypted volumes”.
Once you are satisfied with the partitioning scheme, continue with the
installation.
After partitioning the installer asks a few more questions that will be
used to set up the system it is about to install.
Configuring Your Time Zone
Depending on the location selected at the beginning of the installation
process, you might be shown a list of timezones relevant for that location.
If your location has only one time zone, you will not be asked anything and
the system will assume that time zone.
The installer might ask you if the computer's clock is set to UTC. Normally
this question is avoided if possible and the installer tries to work out
whether the clock is set to UTC based on things like what other operating
systems are installed.
In expert mode you will always be able to choose
whether or not the clock is set to UTC.
Systems that (also) run Dos or Windows are normally
set to local time. If you want to dual-boot, select local time
instead of GMT.
Note that the installer does not currently allow you to actually set the
time in the computer's clock. You can set the clock to the current time
after you have installed, if it is incorrect or if it was previously not
set to UTC.
Setting Up Users And Passwords
The system will ask you whether you wish to create an ordinary user
account at this point. This account should be your main personal
log-in.
The account you create at this point will be given root
privileges by means of the sudo command, and the root
account itself will have login disabled. If you wish, you can enable the
root account later by setting a password for it with the command
sudo passwd root.
You should not use the root account for
daily use or as your personal login, nor should you use
sudo except when root privileges are really required.
Why not? Well, one reason to avoid using root's privileges is that it
is very easy to do irreparable damage as root. Another reason is that
you might be tricked into running a Trojan-horse
program — that is a program that takes advantage of your
super-user powers to compromise the security of your system behind
your back. Any good book on Unix system administration will cover this
topic in more detail — consider reading one if it is new to you.
You will first be prompted for the user's full name. Then you'll be asked
for a name for the user account; generally your first name or something
similar will suffice and indeed will be the default. Finally, you will be
prompted for a password for this account.
If at any point after installation you would like to create another
account, use the adduser command.
Installing the Base System
Although this stage is the least problematic, it consumes a significant
fraction of the install because it downloads, verifies and unpacks the whole
base system. If you have a slow computer or network connection, this could
take some time.
During the Base installation, package unpacking and setup messages are
redirected to tty4. You can access this
terminal by pressing
Left Alt-F4;
get back to the main installer process with
Left Alt-F1.
The unpack/setup messages generated by the base installation are saved in
/var/log/syslog when the installation is
performed over a serial console.
As part of the installation, a Linux kernel will be installed. At the default
priority, the installer will choose one for you that best matches your
hardware. In lower priority modes, you will be able to choose from a list
of available kernels.
Installing Additional Software
After the base system is installed, you have a usable but limited system.
Most users will want to add additional software to the system to tune it to
their needs, and the installer lets you do so. This step can take even
longer than installing the base system if you have a slow computer or
network.
The main means that people use to install packages on their system is
via a program called apt-get, from the
apt package.[10]
Other front-ends for package management, like aptitude
and synaptic are also in use and depend on
apt-get. These front-ends are recommended for new users,
since they integrate some additional features (package searching and status checks)
in a nice user interface.
apt must be configured so that it knows where to retrieve
packages from. The installer largely takes care of this automatically based on
what it knows about your installation medium. The results of this configuration
are written to the file /etc/apt/sources.list, and you can
examine and edit it to your liking after the install is complete.
Selecting and Installing Software
During the installation process, you may be given the opportunity to select
additional software to install. Rather than picking individual software
packages from the
15250
available packages, this stage of
the installation process focuses on selecting and installing predefined
collections of software to quickly set up your computer to perform various
tasks.
(If you are installing from a full Ubuntu CD, rather than from the server CD
or by booting the installer over the network, then this stage of the
installation process will simply automatically install the set of packages
that make up the Ubuntu desktop, and you can ignore the rest of this
section.)
So, you have the ability to choose tasks first,
and then add on more individual packages later. These tasks loosely
represent a number of different jobs or things you want to do with
your computer, such as “Desktop environment”,
“Web server”, or “Print server”[11]. the section called “Disk Space Needed for Tasks” lists the space
requirements for the available tasks.
Once you've selected your tasks, select
Ok. At this point,
aptitude will install the packages you've
selected.
|
|
In the standard user interface of the installer, you can use the space bar
to toggle selection of a task.
|
|
|
Note that some tasks may be pre-selected based on the characteristics of the
computer you are installing. If you disagree with these selections you can
un-select the tasks. You can even opt to install no tasks at all at this point.
|
Each package you selected with tasksel is downloaded,
unpacked and then installed in turn by the apt-get and
dpkg programs. If a particular program needs more
information from the user, it will prompt you during this process.
Making Your System Bootable
If you are installing a diskless workstation, obviously, booting off
the local disk isn't a meaningful option, and this step will be
skipped.
Note that multiple operating systems booting on a single machine is
still something of a black art. This document does not even attempt
to document the various boot managers, which vary by architecture and
even by subarchitecture. You should see your boot manager's
documentation for more information.
Detecting other operating systems
Before a boot loader is installed, the installer will attempt to probe for
other operating systems which are installed on the machine. If it finds a
supported operating system, you will be informed of this during the boot
loader installation step, and the computer will be configured to boot this
other operating system in addition to Ubuntu.
Note that multiple operating systems booting on a single machine is still
something of a black art. The automatic support for detecting and setting
up boot loaders to boot other operating systems varies by architecture and
even by subarchitecture. If it does not work you should consult your
boot manager's documentation for more information.
Install the Grub Boot Loader
on a Hard Disk
The main i386 boot loader is called “grub”.
Grub is a flexible and robust boot loader and a good default choice for
newbies and old hands alike.
By default, grub will be installed into the Master Boot Record (MBR), where
it will take over complete control of the boot process. If you prefer, you
can install it elsewhere. See the grub manual for complete information.
If you do not want to install grub at all, use the Back button to get to
the main menu, and from there select whatever bootloader you would like to
use.
Install the LILO Boot Loader
on a Hard Disk
The second i386 boot loader is called “LILO”.
It is an old complex program which offers lots of functionality,
including DOS, Windows, and OS/2 boot management. Please carefully
read the instructions in the directory
/usr/share/doc/lilo/ if you have special needs;
also see the LILO mini-HOWTO.
|
|
Currently the LILO installation will only create menu entries for other
operating systems if these can be chainloaded.
This means you may have to manually add a menu entry for operating
systems like GNU/Linux and GNU/Hurd after the installation.
|
debian-installer presents you three choices where to install the
LILO boot loader:
-
Master Boot Record (MBR)
-
This way the LILO will take complete control of the
boot process.
-
new Ubuntu partition
-
Choose this if you want to use another boot
manager. LILO will install itself at the beginning
of the new Ubuntu partition and it will serve as a secondary boot
loader.
-
Other choice
-
Useful for advanced users who want to install LILO
somewhere else. In this case you will be asked for desired
location. You can use traditional device names such as
/dev/hda or /dev/sda.
If you can no longer boot into Windows 9x (or DOS) after this step,
you'll need to use a Windows 9x (MS-DOS) boot disk and use the
fdisk /mbr command to reinstall the MS-DOS
master boot record — however, this means that you'll need to use
some other way to get back into Ubuntu! For more information on this
please read the section called “Reactivating DOS and Windows”.
Continue Without Boot Loader
This option can be used to complete the installation even when no boot
loader is to be installed, either because the arch/subarch doesn't
provide one, or because none is desired (e.g. you will use existing
boot loader).
If you plan to manually configure your bootloader, you should check the
name of the installed kernel in /target/boot.
You should also check that directory for the presence of an
initrd; if one is present, you will probably have
to instruct your bootloader to use it. Other information you will need
are the disk and partition you selected for your /
filesystem and, if you chose to install /boot on a
separate partition, also your /boot filesystem.
Finishing the Installation
These are the last bits to do before rebooting to your new system. It
mostly consists of tidying up after the debian-installer.
Finish the Installation and Reboot
This is the last step in the initial Ubuntu installation process. You will
be prompted to remove the boot media (CD, floppy, etc) that you used to
boot the installer. The installer will do any last minute tasks, and then
reboot into your new Ubuntu system.
The components listed in this section are usually not involved in the
installation process, but are waiting in the background to help the
user in case something goes wrong.
Saving the installation logs
If the installation is successful, the logfiles created during
the installation process will be automatically saved to
/var/log/installer/ on your new
Ubuntu system.
Choosing from the main
menu allows you to save the log files to a floppy disk, network, hard
disk, or other media. This can be useful if you encounter fatal problems
during the installation and wish to study the logs on another system
or attach them to an installation report.
Using the Shell and Viewing the Logs
There is an item on the
menu. If the menu is not available when you need to use the shell,
press Left Alt-F2
(on a Mac keyboard, Option-F2) to switch to the second virtual
console. That's the Alt key on the
left-hand side of the space bar, and the
F2 function key, at the same time. This is a separate
window running a Bourne shell clone called ash.
At this point you are booted from the RAM disk, and there is a limited
set of Unix utilities available for your use. You can see what
programs are available with the command ls /bin /sbin /usr/bin
/usr/sbin and by typing help. The
text editor is nano. The shell has some nice features
like autocompletion and history.
Use the menus to perform any task that they are able to do — the
shell and commands are only there in case something goes wrong. In
particular, you should always use the menus, not the shell, to
activate your swap partition, because the menu software can't detect
that you've done this from the shell. Press Left
Alt-F1 to get back to menus, or
type exit if you used a menu item to open the
shell.
Installation Over the Network
One of the more interesting components is
network-console. It allows you to do a large
part of the installation over the network via SSH. The use of the
network implies you will have to perform the first steps of the
installation from the console, at least to the point of setting up
the networking. (Although you can automate that part with
the section called “Automatic Installation”.)
This component is not loaded into the main installation menu by default,
so you have to explicitly ask for it.
If you are installing from CD, you need to boot with medium priority or
otherwise invoke the main installation menu and choose and from the list of
additional components select . Successful load is
indicated by a new menu entry called .
After selecting this new entry, you
will be asked for a new password
to be used for connecting to the installation system and for its
confirmation. That's all. Now you should see a screen which instructs
you to login remotely as the user installer with
the password you just provided. Another important detail to notice on
this screen is the fingerprint of this system. You need to transfer
the fingerprint securely to the “person who will continue the
installation remotely”.
Should you decide to continue with the installation locally, you
can always press Enter, which will bring you back to
the main menu, where you can select another component.
Now let's switch to the other side of the wire. As a prerequisite, you
need to configure your terminal for UTF-8 encoding, because that is
what the installation system uses. If you do not, remote installation
will be still possible, but you may encounter strange display
artefacts like destroyed dialog borders or unreadable non-ascii
characters. Establishing a connection with the installation system
is as simple as typing:
Where install_host is either the name
or IP address of the computer being installed. Before the actual
login the fingerprint of the remote system will be displayed and
you will have to confirm that it is correct.
|
|
If you install several computers in turn and they happen to have the
same IP address or hostname, ssh will refuse to connect
to such host. The reason is that it will have different fingerprint, which
is usually a sign of a spoofing attack. If you are sure this is not the
case, you will need to delete the relevant line from
~/.ssh/known_hosts and try again.
|
After the login you will be presented with an initial screen where you
have two possibilities called and
. The former brings you to the
main installer menu, where you can continue with the installation as
usual. The latter starts a shell from which you can examine and possibly
fix the remote system. You should only start one SSH session for the
installation menu, but may start multiple sessions for shells.
|
|
After you have started the installation remotely over SSH, you should
not go back to the installation session running on the local console.
Doing so may corrupt the database that holds the configuration of
the new system. This in turn may result in a failed installation or
problems with the installed system.
Also, if you are running the SSH session from an X terminal, you should
not resize the window as that will result in the connection being
terminated.
|
|
|