sysprep | build chroot | docker image | pkg build | xen guest
post-installation –or– rootfs image tuning
make sure you don’t use more make jobs that you have cpu cores
grep ^proc /proc/cpuinfo
vi /src/config
export A=x86_64
export MAKE_THREADS=3
–either– enable BASH
butch install bash echo /bin/bash >> /etc/shells # dropbear needs that vi /root/.bashrc source /etc/profile
–or– enable MKSH
butch search ksh
butch install mksh
ln -s mksh /bin/ksh
echo /bin/ksh >> /etc/shells # dropbear needs that
eventually switch to BASH by default
vi /etc/passwd
root:x:0:0:root:/root:/bin/bash
tune the environment whatever shell you have (assuming BASH or MKSH)
cp -pi /etc/profile /etc/profile.dist vi /etc/profile
if [ "`whoami`" = "root" ]]; then
PS1="$HOSTNAME# "
else
PS1="$HOSTNAME> "
fi
case "$-" in *i*)
alias ll='ls --color=auto -alh'
alias ls='ls --color=auto'
alias cp='cp -i'
alias mv='mv -i'
alias rm='rm -i'
;;
esac
enable some kind of an ssh daemon
butch install dropbear echo /bin/ash > /etc/shells echo /bin/bash >> /etc/shells vi /etc/rc.local /sbin/dropbear -R -sjk -G wheel -F >> /var/log/dropbear.log 2>&1 &
–either– check default trust store is up
update-ca-certificates
–or– eventually put some certs in place
cd /etc/ssl/
wget https://curl.se/ca/cacert.pem
eventually install a few packages
create a user with busybox
adduser -s /bin/sh -G GROUPNAME -D USERNAME
chmod 700 /home/USERNAME/
# -D Don't assign a password
https://sabotage-linux.github.io/
https://sabotage-linux.neocities.org/
https://sabotage-linux.neocities.org/blog/11/
https://github.com/sabotage-linux/sabotage
https://codeberg.org/sabotage-linux/sabotage/
https://github.com/leahneukirchen/sabotage
https://github.com/pikhq/sabotage
https://www.openwall.com/lists/sabotage/