Yeah I got a little ahead of myself lol, but I can use Openbox for the WM in XFCE instead of XFWM, and of course just create a Openbox desktop to log into as well as the default XFCE.
The vid kinda got me all excited (blush).
Yeah I got a little ahead of myself lol, but I can use Openbox for the WM in XFCE instead of XFWM, and of course just create a Openbox desktop to log into as well as the default XFCE.
Ok, so this confirms you got also the wrongly generated linuxfs.md5.JayM wrote: Fri Nov 27, 2020 3:44 am
The iso's md5:with the iso mounted:Code: Select all
$ md5sum AVL-MXE-2020.11.23-xfce4-amd64.iso 7c12005d3a8b3669f84d536542215062 AVL-MXE-2020.11.23-xfce4-amd64.iso
Code: Select all
linuxfs root@mx-desktop:/mnt/iso/iso1/antiX# md5sum -c linuxfs.md5 linuxfs: FAILED md5sum: WARNING: 1 computed checksum did NOT match root@mx-desktop:/mnt/iso/iso1/antiX# head /mnt/iso/iso1/antiX/*.md5 ==> /mnt/iso/iso1/antiX/initrd.gz.md5 <== e2d82f4774577e556c2ba6c7a99d53bc initrd.gz ==> /mnt/iso/iso1/antiX/linuxfs.md5 <== cdaf6aace23e4f2e176001727acb52e3 linuxfs
If the ISO-checksum do match, we can assume the ISO are OK, with only one flaw of the wrongly generated linuxfs.md5. So until you have the isos updated, you could tell the user, that the ISO are not compromised.AVLinux wrote: Thu Nov 26, 2020 11:54 pm I fear I have used a wrong word.. by 'compromised' I did not mean in a security or malware way. I meant if there were flaws or errors in the filesystem that would make the system function improperly or unstable
On both dd-dumped or fullfeatured mode generated LiveUSB, the MD5-sum check of the antiX/*.md5 sum are identical. So I can only assume JayM have chosen the other checkfs option, otherwise it would be an issue within the Live md5sum check script, which I would be really surprise me . Manual check after isomount is the quickest way anyway.AVLinux wrote: Thu Nov 26, 2020 11:54 pm .. I don't think it is a surprise that JayM would have a successful copy to USB using DD, there are not the same md5sum checks with DD are there? Also Jay ran checkfs not md5sum..
Code: Select all
gpg --quick-generate-key "demo iso signing key <demo-iso-signing@demos-home.com>" rsa4096 sign 2y
Code: Select all
gpg --quick-generate-key "demo iso signing key <demo-iso-signing@demos-home.com>" rsa4096 sign 2y
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: key EF80867E1956F430 marked as ultimately trusted
gpg: revocation certificate stored as '/home/demo/.gnupg/openpgp-revocs.d/9D2AAC5F57F8CD9BF78FD1B7EF80867E1956F430.rev'
public and secret key created and signed.
Note that this key cannot be used for encryption. You may want to use
the command "--edit-key" to generate a subkey for this purpose.
pub rsa4096 2020-11-27 [SC] [expires: 2022-11-27]
9D2AAC5F57F8CD9BF78FD1B7EF80867E1956F430
uid demo iso signing key <demo-iso-signing@demos-home.com>
Code: Select all
gpg --keyid-format 0xlong --list-keys demo-iso-signing@demos-home.com
pub rsa4096/0xEF80867E1956F430 2020-11-27 [SC] [expires: 2022-11-27]
9D2AAC5F57F8CD9BF78FD1B7EF80867E1956F430
uid [ultimate] demo iso signing key <demo-iso-signing@demos-home.com>
Code: Select all
gpg --keyid-format 0xlong --fingerprint 0xEF80867E1956F430
or
gpg --keyid-format 0xlong --fingerprint demo-iso-signing@demos-home.com
pub rsa4096/0xEF80867E1956F430 2020-11-27 [SC] [expires: 2022-11-27]
Key fingerprint = 9D2A AC5F 57F8 CD9B F78F D1B7 EF80 867E 1956 F430
uid [ultimate] demo iso signing key <demo-iso-signing@demos-home.com>
Code: Select all
gpg --local-user "demo-iso-signing@demos-home.com" --detach-sign --output demo-test.iso.sig demo-test.iso
gpg -u "demo-iso-signing@demos-home.com" -b -o demo-test.iso.sig demo-test.iso
gpg -u "demo-iso-signing@demos-home.com" -b demo-test.iso
gpg -u 0xEF80867E1956F430 -b demo-test.iso
Code: Select all
gpg --armor --output 0xEF80867E1956F430_public_signing_key.asc --export 0xEF80867E1956F430
Code: Select all
gpg --keyserver pool.sks-keyservers.net --send-key 0xEF80867E1956F430
gpg --keyserver keyserver.ubuntu.com --send-key 0xEF80867E1956F430
Code: Select all
gpg --armor --output 0xEF80867E1956F430_secrete.asc --export-secret-keys 0xEF80867E1956F430
Code: Select all
gpg --import 0xEF80867E1956F430_secrete.asc
Code: Select all
gpg --export-secret-keys 0xEF80867E1956F430 | paperkey > 0xEF80867E1956F430_secrete_paperkey.txt
Code: Select all
paperkey --pubring 0xEF80867E1956F430_public_signing_key.asc --secrets 0xEF80867E1956F430_secrete_paperkey.txt --output 0xEF80867E1956F430_secrete.gpg
Code: Select all
$ md5sum linuxfs
7475ac389c3ead1c7e5a8b228025b0d6 linuxfs
Code: Select all
$ head linuxfs.md5
cdaf6aace23e4f2e176001727acb52e3 linuxfs
Yes, try another USB-stick USB-3 min 8GB. ALso you can try full feature mode instead of DD-mode.Be OK wrote: Sat Nov 28, 2020 7:20 am Downloaded the iso today md5 checks flashed on usb stick with balenaetcher usb would not boot so flashed with mxliveusbmaker using DD as is a 4GB stic. Sadly that will not boot to.Using file manager i can see the files on the stick.Using gparted it show as file system iso9660 loabel mxlive used,unused and flags empty.
The release candidate2 was installed with no problems and running.
Machine:: Laptop System: Hewlett-Packard product: HP Pavilion 17 Notebook PC.
The problem is in the bios the boot manager option is greyed like the stick is not bootable.
Any advice ?