Installation Guide
This guide walks you through installing NubiferOS, including important details about disk encryption, the installer, and known issues.
Download
Download the latest NubiferOS ISO from our download page.
After downloading, verify the checksum:
sha256sum nubiferos-alpha-1.0-amd64.iso
# Compare with SHA256SUMS file from download page
Create Bootable USB
Using dd (Linux/macOS)
# Find your USB device
lsblk
# Write the ISO (replace /dev/sdX with your USB device)
sudo dd if=nubiferos-alpha-1.0-amd64.iso of=/dev/sdX bs=4M status=progress conv=fsync
sync
Warning: Double-check the device name. dd will overwrite whatever you point it at.
Using Balena Etcher (All Platforms)
- Download Balena Etcher
- Select the NubiferOS ISO
- Select your USB drive
- Click "Flash!"
Using Rufus (Windows)
- Download Rufus
- Select the NubiferOS ISO
- Select your USB drive
- Use "DD Image" mode (not ISO mode)
- Click "Start"
Installing in a Virtual Machine
NubiferOS works well in VMware Workstation and VirtualBox for testing or development. Here's how to set it up:
VMware Workstation
Create a new VM with these settings:
- Guest OS: Debian 12.x 64-bit
- Memory: 4GB minimum (8GB recommended)
- Disk: 40GB minimum
- Firmware: UEFI (required)
To enable UEFI:
- Edit VM Settings → Options → Advanced
- Set "Firmware type" to UEFI
- Or edit the .vmx file and add:
firmware = "efi"
Mount the ISO and boot
VirtualBox
Create a new VM with these settings:
- Type: Linux, Version: Debian (64-bit)
- Memory: 4GB minimum (8GB recommended)
- Disk: 40GB minimum (VDI, dynamically allocated)
Enable UEFI:
- Settings → System → Motherboard
- Check "Enable EFI (special OSes only)"
For better performance:
- Settings → System → Processor: 2+ CPUs
- Settings → Display → Video Memory: 128MB
- Settings → Display → Enable 3D Acceleration (optional)
Mount the ISO and boot
VM-Specific Notes
- UEFI is required: NubiferOS uses a UEFI bootloader. Legacy BIOS mode won't work.
- LUKS encryption is mandatory: Full disk encryption is required even in VMs. This is a core security feature of NubiferOS.
- Nested virtualization: If you need Docker/containers inside the VM, enable nested virtualization in your hypervisor.
Boot and Install (Physical Hardware)
- Insert the USB drive and boot from it (usually F12, F2, or Del to access boot menu)
- Select "Install NubiferOS" from the boot menu
- The Calamares installer will launch
Understanding the Installer
NubiferOS uses the Calamares installer, which is the same installer used by many Linux distributions. Here's what to expect:
Step 1: Welcome & Language
Select your language and click "Next".
Step 2: Location & Timezone
Select your timezone. This affects system time and locale settings.
Step 3: Keyboard Layout
Choose your keyboard layout. You can test it in the text box provided.
Step 4: Partitioning
This is where you configure disk encryption.
Recommended: Erase disk with encryption
- Select "Erase disk"
- Check "Encrypt system"
- Enter a strong LUKS passphrase
Important: This passphrase is required every time you boot. Choose something memorable but secure.
Step 5: Users
Create your user account. This screen has some important details:
The Three Passwords Explained
You'll notice the installer asks for passwords in multiple places. Here's what each one does:
| Password | Purpose | When You'll Use It |
|---|---|---|
| LUKS Passphrase | Decrypts your disk at boot | Every boot, before login screen |
| User Password | Logs into your account | After boot, at login screen |
| Root Password | System administration | When using sudo (optional, can match user password) |
Why three passwords?
- LUKS passphrase: Protects your data if someone steals your laptop. Without it, the disk is unreadable.
- User password: Protects your session from other users on the same machine.
- Root password: Allows administrative tasks. In NubiferOS, you can use
sudowith your user password instead.
Tip: You can use the same password for all three if you prefer simplicity, but using different passwords provides defense-in-depth.
Required Password Checkbox
You'll see a checkbox that says "Require a password to log in". This checkbox cannot be unchecked in NubiferOS.
Why? NubiferOS is designed for security-conscious cloud engineers. Auto-login would bypass the security model and leave your cloud credentials exposed if someone accesses your machine.
Step 6: Summary
Review your choices. This is your last chance to go back and change anything.
Step 7: Install
The installation takes 10-20 minutes depending on your hardware. Don't interrupt it.
Known Issues & Workarounds
Alpha Release Limitations
This is an alpha release. Some things may not work perfectly.
Issue: LUKS Password Checkbox Bug
Symptom: If you uncheck "Encrypt system" after initially checking it, the installer may still prompt for a LUKS passphrase, or behave unexpectedly.
Workaround: Don't uncheck it. LUKS encryption is mandatory in NubiferOS - it's a core security requirement, not optional. If you accidentally unchecked it:
- Go back to the partitioning step
- Select "Erase disk" and ensure "Encrypt system" is checked
- Continue with installation
Note: LUKS encryption protects your cloud credentials at rest. Without it, anyone with physical access to your machine could read your credentials.
Issue: Installer Crashes on Some Hardware
Symptom: Calamares crashes during partitioning on certain NVME drives.
Workaround:
- Boot into the live environment
- Open a terminal and manually partition:
sudo fdisk /dev/nvme0n1 # Create partitions manually - Restart the installer and select "Manual partitioning"
Issue: Slow Installation on USB 2.0
Symptom: Installation takes 45+ minutes.
Workaround: Use a USB 3.0 port if available. The ISO is large due to included tools.
Post-Installation
First Boot
- You'll see the GRUB bootloader
- Enter your LUKS passphrase when prompted
- The GNOME login screen appears
- Log in with your user credentials
Verify Installation
Open a terminal and verify NubiferOS is working:
# Check version
cat /etc/nubifer-release
# Verify workspace tools
nubifer-workspace --version
# Check credential manager
nubifer-creds --version
Initialize Your GPG Key
NubiferOS uses GPG for credential encryption. On first boot, you'll be prompted to create a GPG key:
# If not prompted automatically, run:
nubifer-setup gpg
# Follow the prompts to create your key
# This key encrypts your cloud credentials
Important: Remember your GPG passphrase. It's needed to access your encrypted credentials.
Set Up Your First Workspace
# Create your first workspace
nubifer-workspace create \
--name "My First Workspace" \
--provider aws \
--account-id 123456789012 \
--region us-east-1
See the Quick Start Guide for detailed workspace setup.
Security Architecture
Understanding what you just installed:
┌─────────────────────────────────────────────────────────┐
│ Boot Process │
├─────────────────────────────────────────────────────────┤
│ 1. BIOS/UEFI loads GRUB │
│ 2. GRUB prompts for LUKS passphrase │
│ 3. Disk decrypted, kernel loaded │
│ 4. GNOME login screen appears │
│ 5. User logs in with user password │
│ 6. GPG key unlocked (may prompt for passphrase) │
│ 7. Credentials available via pass/GPG │
└─────────────────────────────────────────────────────────┘
Why Full Disk Encryption?
- Laptop theft: If someone steals your laptop, they can't read your data
- Credential protection: Your cloud credentials are encrypted at rest
- Compliance: Many security frameworks require encryption at rest
- Peace of mind: Even if you lose your device, your data is safe
The Encryption Stack
| Layer | Technology | What It Protects |
|---|---|---|
| Disk | LUKS (AES-256) | Everything on disk |
| Credentials | GPG (AES-256) | Cloud credentials specifically |
| Runtime | GNOME Keyring | Keys in memory during session |
Troubleshooting
Can't Boot After Installation
Symptom: System doesn't boot, goes straight to BIOS.
Fix:
- Boot from USB again
- Select "Boot existing OS" if available
- Or reinstall with "Install bootloader to /dev/sda" explicitly selected
Forgot LUKS Passphrase
Bad news: There's no recovery. LUKS encryption is designed this way.
Prevention:
- Write down your passphrase and store it securely
- Consider using a password manager for the passphrase
- Test your passphrase before completing installation
Forgot User Password
Fix: Boot into recovery mode and reset:
- At GRUB, select "Advanced options"
- Select "Recovery mode"
- Enter LUKS passphrase
- Select "root shell"
- Run:
passwd <username>
GPG Key Issues
Symptom: Can't access credentials, GPG errors.
Fix:
# Check GPG agent
gpg-agent --daemon
# List keys
gpg --list-keys
# If no keys, create one
gpg --full-generate-key
Next Steps
- Quick Start Guide - Set up your first workspace
- Credential Security - Understand how credentials are protected
- Workspace Isolation - Learn about namespace isolation