ShredOS: permanently configure nwipe certificate defaults for mass server wipes #369
Replies: 6 comments 5 replies
-
Before I list the various ways to do this, can you confirm what boot medium you are using. USB stick or, as you are wiping servers, PXE? |
Beta Was this translation helpful? Give feedback.
-
So to create a modified .img, this is the way I've done it in the past. Ignore the references to Ventoy and grub.cfg, instead of grub.cfg you can insert /etc/nwipe/nwipe.conf this works with whatever method you use to burn to a USB stick. See the following link for the command details: https://github.com/PartialVolume/shredos.x86_64?tab=readme-ov-file#how-to-edit-the-shredos-efibootgrubcfg-and-bootgrubgrubcfg-files-when-using-ventoy-with-shredos-img-files In summary, we take the original .img, then copy it block by block to a file, we mount the file as a virtual disc, we write the modified /etc/nwipe/nwipe.conf file onto this virtual disc. Then unmount the virtual disc and now you have your modified .img file to burn to USB flash drives. To generate your modified nwipe.conf I would boot a vanilla ShredOS, add your organisation name and details, then control C. These organisation changes will be written back to the USB stick in /etc/nwipe/nwipe.conf. You can then use this nwipe conf file (and also the customers file, should you wish to add customers to that) in the above procedure to create your modified .img This assumes you are familiar with the Linux command line and have a Linux system you can do this on. If any of this is unclear or you run into difficulties let me know and I'll hopefully be able to help. |
Beta Was this translation helpful? Give feedback.
-
Hi, How ze ShredOS with Your Own
|
Beta Was this translation helpful? Give feedback.
-
As I was curious, I just asked chatGPT the following question. "Can you show me an example of the nwipe.conf configuration file as used by the open source program called nwipe?" Here's ChatGPTs response...Certainly! The nwipe.conf file is used to preconfigure the behavior of nwipe, an open-source data erasure tool (a fork of dwipe, which itself comes from DBAN). While nwipe is mostly driven via command-line or interactive terminal UI, it can accept configurations via nwipe.conf to preset options and automate behavior. 🧾 Example nwipe.conf File
This is nothing like nwipe.conf should be configured, although I suppose it qualified the statement by saying it 'might' look like this .. or not. The formatting of nwipe.conf is completely wrong however the preamble about dwipe and that is command line driven and also has an interactive terminal user interface, is correct. It could have been more specific and said it uses a ncurses based user interface. |
Beta Was this translation helpful? Give feedback.
-
Thank you very much for your patience and your answers. With your help, I was able to finalize it and now have 5 finished USB sticks that I can use. Best regards |
Beta Was this translation helpful? Give feedback.
-
For what its worth, Google's Gemini (Chrome in AI mode) generated data that is pretty accurate on the first attempt, even including the config library we use. Q: Show me an example of nwipe.conf as used by the opensource program called nwipe.
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
❓ How to permanently embed company information into a ShredOS image for nwipe certificates?
🎯 Goal
We need to customize ShredOS so that the certificate information for
nwipe
(Business, Customer, Operator) is automatically defined at boot.Our use case: wiping a large number of servers. Entering this information manually on every boot is not feasible.
❓ Question
👉 How can we permanently embed our company/customer/operator information into a ShredOS image, so that it is automatically included in every generated certificate?
Is there a supported way (config file, build option, etc.), or do we need to modify the initramfs inside the
bzImage
?🔍 Attempts So Far
core.gz
orrootfs.gz
, but appears to be embedded inside thebzImage
.bzImage
withbinwalk
and extracted several large blobs (52C4
,24955D9
,2516AB3
,300138A-0
).file
reportszlib compressed data
for300138A-0
.zcat
,gunzip
,zlib-flate
zlib.decompress()
with different modeslz4
,xz
,zstd
binwalk -y cpio
showed no hits → CPIO header not detected.Thanks for any help :-)
Beta Was this translation helpful? Give feedback.
All reactions