HTTPS SSH

travos - Travel OS

OS for traveling. Meant to be installed on a USB key of size at least 96 GB.

Works great on desktops and laptops too.

<div align="center"> <img src="https://github.com/EtiennePerot/travos/blob/master/res/grub.png?raw=true" alt="TravOS GRUB menu"/> </div>

Features

  • Boot on multiple live Linux distributions from a single USB stick:
  • Boot onto a persistent, LUKS-encrypted Arch installation from that same USB stick.
  • Automatically provision that Arch installation using Ansible.
  • Chainload to on-disk operating system.
  • Memtest86+.

Usage

Where /dev/sdX is your USB stick or any block device (WARNING: This will erase all data on /dev/sdX), and my-config.cfg as your configuration file (see example.cfg for details):

$ ./travos.sh --config=my-config.cfg /dev/sdX

If you don't have a USB stick, you can use --test to create a temporary image file and run QEMU on it:

$ ./travos.sh --config=my-config.cfg --test

Or you can use both to write the image to the USB key and start it with QEMU. This allows you to modify the USB image without rebooting onto it:

$ ./travos.sh --config=my-config.cfg /dev/sdX --test

If you've only edited your Ansible playbook and want to re-run it against the key without wiping+reformatting it:

$ ./travos.sh --config=my-config.cfg /dev/sdX --reprovision

See ./travos.sh --help for full usage details.

Partition scheme

In order to boot on as many computers as possible, the USB is formatted with a hybrid GPT+MBR scheme inspired by multibootusb.

  • Partition 1, 32 MB: Unformatted MSDOS legacy boot partition.
  • Partition 2, 8 GB: FAT32 EFI boot partition. (UUID: B007-0EF1, "boot EFI")
    • /boot: GRUB configuration and installation files, as copied from this repo's /grub directory.
    • /isos: ISO images for various live Linux distros.
    • /bin: Empty and unused; mostly just there to match multibootusb.
  • Partition 3, 48 GB: LUKS+ext4 Arch Linux root partition. (UUID: 0075a105-1035-a5c8-0000-deadbeefcafe, "travos luks arch").
  • Partition 4, rest of space: LUKS+ext4 home partition. (UUID: 0075a105-1035-803e-0000-deadbeefcafe, "travos luks home").

Partitions 1-3 are meant to be expendable and completely recreatable from this repository. Partition 4 is meant to be carried over from key to key.

GRUB configuration

Most configuration is copied from multibootusb, with changes to support the ISO images being on the EFI partition rather than the "data" one. This change is such that we save one partition.

Arch provisioning

The persistent Arch installation can be configured with Ansible. Change the configuration (see example.cfg) to set the following variables:

  • ANSIBLE_ROLES_PATH: A set of directories where Ansible roles are located.
  • ANSIBLE_ROLES: A set of Ansible roles to execute on the Arch installation.
  • ANSIBLE_LIBRARY: A set of directories where custom Ansible library modules are located.
  • ANSIBLE_ACTION_PLUGINS: A set of directories where custom Ansible action plugins are located.

The Ansible provisioning step is one of the last and typically longest parts of the script. It can be re-run without erasing the entire block device using the --reprovision flag.

When actively working on the Ansible roles to provision with, --provision-loop is recommended; it will interactively ask whether to re-apply the Ansible playbook after every attempt, allowing a tight edit-apply loop. --debug is also useful as it provides a visible QEMU window useful to inspect the state of the host.

The links below contain an affiliate code.

<div align="center"> <p> <a href="http://amzn.to/2rzfWzI"> <img src="https://github.com/EtiennePerot/travos/blob/master/res/aegis.png?raw=true" alt="Apricon Aegis 120GB USB3 key"/> </a><br/> <strong>Recommended USB key</strong>:<br/> <a href="http://amzn.to/2rzfWzI">Apricorn Aegis 120GB USB3 key</a> </p> </div>

Features

  • USB 3: fast to boot, snappy to operate.
  • 256-bit AES XTS onboard hardware encryption: basically the same as LUKS's default aes-xts-plain64 mode.
  • Wear-resistant hardware keypad: no PIN keyboard logging possible, and keys don't wear out revealing which ones have been touched more often.
  • Multiple 16-digit PINs: because 4-digit PINs are a joke.
  • Duress PIN: Wipes the device data and PIN settings when entered, providing plausible deniability.
  • Firmware-enforced read-only mode: prevents untrusted computers you plug the stick into to e.g. overwrite the USB key's bootloader with a keylogged version.
  • Self-destructs after too many unlock failures: self-explanatory.
  • Auto-locks after inactivity: in case you forget it.
  • Water-resistant housing: you can keep it on your person.
  • Epoxy-sealed electronics: prevents easy access to the circuitry.
  • Onboard firmware cannot be updated: not susceptible to BadUSB.

Manufacturer's page

If it has hardware-encryption, why are some partitions LUKS-encrypted?

Defense in depth. Even if the Aegis had a backdoor PIN or static encryption key, it wouldn't be enough to get at your data partition.

Licensing

As portions of this project are heavily based off multibootusb which is under the GPLv3, this project is also licensed under GPLv3.