Differences between revisions 23 and 24
Revision 23 as of 2015-10-26 13:36:49
Size: 5595
Editor: vauss
Comment: translation menu
Revision 24 as of 2015-11-09 15:22:53
Size: 5710
Comment: Table of content + better separation Debian / Hardware download process
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
You may either use FreedomBox on one of the supported [[FreedomBox/Hardware|hardware]], install it on a [[FreedomBox/Hardware/Debian|Debian]] machine, or deploy on a virtual machine. <<TableOfContents()>>

You may either use !FreedomBox on one of the supported [[FreedomBox/Hardware|hardware]], install it on a [[FreedomBox/Hardware/Debian|Debian]] machine, or deploy on a virtual machine.

== Downloading on Debian ==
Line 9: Line 13:
== Downloading Images == == Downloading on Hardware or Virtual Machine ==

=== Downloading Images ===
Line 15: Line 21:
== Verifying the Downloaded Images == === Verifying the Downloaded Images ===
Line 41: Line 47:
== Installation == === Installation ===

Translation(s): English - ?Français


Download and Install

You may either use FreedomBox on one of the supported hardware, install it on a Debian machine, or deploy on a virtual machine.

Downloading on Debian

If you are installing on Debian, you don't need to download these images. Instead read instructions on setting up FreedomBox on Debian.

Downloading on Hardware or Virtual Machine

Downloading Images

Recent images for supported targets are available here:

Verifying the Downloaded Images

It is important to verify the images you have downloaded to ensure that the file has not be corrupted during the transmission and that it is indeed the image built by FreedomBox developers.

  • First open a terminal and import the public key of the FreedomBox developer who built the images:

    $ gpg --keyserver x-hkp://pool.sks-keyservers.net --recv-keys 0x36C361440C9BC971
  • Next, verify the fingerprint of the public key:
    $ gpg --fingerprint 0x36C361440C9BC971
    pub   4096R/0C9BC971 2011-11-12
          Key fingerprint = BCBE BD57 A11F 70B2 3782  BC57 36C3 6144 0C9B C971
    uid                  Sunil Mohan Adapa <sunil@medhas.org>
    sub   4096R/4C1D4B57 2011-11-12
  • Finally, verify your downloaded image with its signature file .sig. For example:

    $ gpg --verify freedombox-unstable_2015-01-15_beaglebone-armhf-card.tar.bz2.sig freedombox-unstable_2015-01-15_beaglebone-armhf-card.tar.bz2
    gpg: Signature made Thursday 15 January 2015 09:27:50 AM IST using RSA key ID 0C9BC971
    gpg: Good signature from "Sunil Mohan Adapa <sunil@medhas.org>"
    gpg: WARNING: This key is not certified with a trusted signature!
    gpg:          There is no indication that the signature belongs to the owner.
    Primary key fingerprint: BCBE BD57 A11F 70B2 3782  BC57 36C3 6144 0C9B C971

Installation

After the download you can use the image to boot supported hardware (including virtual machines). You'll need to copy the image to the memory card or USB stick as follows:

  1. Figure out which device your card actually is.
    1. Unplug your card.
    2. Run dmesg -w to show and follow the kernel messages.

    3. Plug your card in. You will see messages such as following:
      [33299.023096] usb 4-6: new high-speed USB device number 12 using ehci-pci
      [33299.157160] usb 4-6: New USB device found, idVendor=058f, idProduct=6361
      [33299.157162] usb 4-6: New USB device strings: Mfr=1, Product=2, SerialNumber=3
      [33299.157164] usb 4-6: Product: Mass Storage Device
      [33299.157165] usb 4-6: Manufacturer: Generic
      [33299.157167] usb 4-6: SerialNumber: XXXXXXXXXXXX
      [33299.157452] usb-storage 4-6:1.0: USB Mass Storage device detected
      [33299.157683] scsi host13: usb-storage 4-6:1.0
      [33300.155626] scsi 13:0:0:0: Direct-Access     Generic- Compact Flash    1.01 PQ: 0 ANSI: 0
      [33300.156223] scsi 13:0:0:1: Direct-Access     Multiple Flash Reader     1.05 PQ: 0 ANSI: 0
      [33300.157059] sd 13:0:0:0: Attached scsi generic sg4 type 0
      [33300.157462] sd 13:0:0:1: Attached scsi generic sg5 type 0
      [33300.462115] sd 13:0:0:1: [sdg] 30367744 512-byte logical blocks: (15.5 GB/14.4 GiB)
      [33300.464144] sd 13:0:0:1: [sdg] Write Protect is off
      [33300.464159] sd 13:0:0:1: [sdg] Mode Sense: 03 00 00 00
      [33300.465896] sd 13:0:0:1: [sdg] No Caching mode page found
      [33300.465912] sd 13:0:0:1: [sdg] Assuming drive cache: write through
      [33300.470489] sd 13:0:0:0: [sdf] Attached SCSI removable disk
      [33300.479493]  sdg: sdg1
      [33300.483566] sd 13:0:0:1: [sdg] Attached SCSI removable disk
    4. In the above case, the disk that is newly inserted is available as /dev/sdg. Very carefully note this and use it in the copying step below.

  2. Decompress the downloaded image using tar:
    $ tar -xjvf freedombox-unstable_2015-08-06_beaglebone-armhf-card.tar.bz2

    The above command is an example for the beaglebone image built on 2015-08-06. Your downloaded file name will be different.

  3. Copy the image to your card. Double check and make sure you don't write to your computer's main storage (such as /dev/sda). Also make sure that you don't run this step as root to avoid potential damage. USB disks and SD cards inserted into the system should typically be write accessible to normal users.

    For example, if your SD card is /dev/sdf as noted in the first step above, then to copy the image, run:

    $ cd build
    $ dd bs=1M if=freedombox-unstable_2015-08-06_beaglebone-armhf-card.img of=/dev/sdf conv=fdatasync

    The above command is an example for the beaglebone image built on 2015-08-06. Your image file name will be different.

    When picking a device, use the drive-letter destination, like /dev/sdf, not a numbered destination, like /dev/sdf1. The device without a number refers to the entire device, while the device with a number refers to a specific partition. We want to use the whole device.

  4. Use the image by inserting the SD card or USB disk into the target device and booting from it. Also see hardware specific

    instructions on how to prepare your device at the Hardware section.

  5. Read (the rest of) the Manual for instructions on how to use applications in FreedomBox.


Intro

Information

Support

Contribute

Reports

Promote

Vision

Hardware

Live Help

Where To Start

Translate

Calls

Talks

Overview

Download

Q&A

To Do

Design

Releases

Press

Features

Manual

Contributors

Code

Blog

FreedomBox for Communities

FreedomBox Developer Manual

HELP & DISCUSSIONS: Discussion Forum - Matrix - Mailing List - #freedombox irc.debian.org | CONTACT Foundation | JOIN Project

Next call: Saturday, April 13 at 14:00 UTC

This page is copyright its contributors and is licensed under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.


CategoryFreedomBox