Handbook:Parts/Installation/Media

Hardware requirements
Before we start, we first list what hardware requirements are needed to successfully install Gentoo on a box.

Minimal installation CD
The Gentoo minimal installation CD is a bootable image: a self-contained Gentoo environment. It allows the user to boot Linux from the CD or other installation media. During the boot process the hardware is detected and the appropriate drivers are loaded. The image is maintained by Gentoo developers and allows anyone to install Gentoo if an active Internet connection is available.

The Minimal Installation CD is called.

The occasional Gentoo LiveDVD
Occasionally, a special DVD image is crafted which can be used to install Gentoo. The instructions in this chapter target the Minimal Installation CD, so things might be a bit different when booting from the LiveDVD. However, the LiveDVD (or any other official Gentoo Linux environment) supports getting a root prompt by just invoking or  in a terminal.

What are stages then?
A stage3 tarball is an archive containing a profile specific minimal Gentoo environment. Stage3 tarballs are suitable to continue the Gentoo installation using the instructions in this handbook. Previously, the handbook described the installation using one of three stage tarballs. Gentoo does not offer stage1 and stage2 tarballs for download any more since these are mostly for internal use and for bootstrapping Gentoo on new architectures.

Stage3 tarballs can be downloaded from on any of the official Gentoo mirrors. Stage files update frequently and are not included in official installation images.

Obtain the media
The default installation media that Gentoo Linux uses are the minimal installation CDs, which host a bootable, very small Gentoo Linux environment. This environment contains all the right tools to install Gentoo. The CD images themselves can be downloaded from the downloads page (recommended) or by manually browsing to the ISO location on one of the many available mirrors.

If downloading from a mirror, the minimal installation CDs can be found as follows:


 * 1) Go to the  directory.
 * 2) Select the directory for the relevant target architecture (such as ).
 * 3) Select the  directory.
 * 4) For  and  architectures select either the  or  directory (respectively). For all other architectures navigate to the  directory.

Inside this location, the installation media file is the file with the suffix. For instance, take a look at the following listing:

In the above example, the file is the minimal installation CD itself. But as can be seen, other related files exist as well:


 * A file which is a text file listing all files available on the installation media. This file can be useful to verify if particular firmware or drivers are available on the installation media before downloading it.
 * A file which contains the hash of the ISO file itself, in various hashing formats/algorithms. This file can be used to verify if the downloaded ISO file is corrupt or not.
 * A file which is a cryptographic signature of the ISO file. This can be used to both verify if the downloaded ISO file is corrupt or not, as well as verify that the download is indeed provided by the Gentoo Release Engineering team and has not been tampered with.

Ignore the other files available at this location for now - those will come back when the installation has proceeded further. Download the file and, if verification of the download is wanted, download the   file for the  file as well. The file does not need to be downloaded as the installation instructions will not refer to this file anymore, and the  is not needed if the signature in the  file is verified.

Verifying the downloaded files
The file provides a cryptographic signature of the ISO. By validating it, one can make sure that the installation file is provided by the Gentoo Release Engineering team and is intact and unmodified.

Microsoft Windows based verification
To first verify the cryptographic signature, tools such as GPG4Win can be used. After installation, the public keys of the Gentoo Release Engineering team need to be imported. The list of keys is available on the signatures page. Once imported, the user can then verify the signature in the file.

Linux based verification
On a Linux system, the most common method for verifying the cryptographic signature is to use the software. With this package installed, the following command can be used to verify the cryptographic signature in the file.

First, download the right set of keys as made available on the signatures page:

Alternatively you can use instead the WKD to download the key:

Or if using official Gentoo release media, import the key from (provided by ):

Next verify the cryptographic signature:

To be absolutely certain that everything is valid, verify the fingerprint shown with the fingerprint on the Gentoo signatures page.

Burning a disk
Of course, with just an ISO file downloaded, the Gentoo Linux installation cannot be started. The ISO file needs to be burned on a CD to boot from, and in such a way that its content is burned on the CD, not just the file itself. Below a few common methods are described - a more elaborate set of instructions can be found in Our FAQ on burning an ISO file.

Burning with Microsoft Windows 7 and above
Versions of Microsoft Windows 7 and above can both mount and burn ISO images to optical media without the requirement for third-party software. Simply insert a burnable disk, browse to the downloaded ISO files, right click the file in Windows Explorer, and select "Burn disk image".

Burning with Linux
The utility from the package  can burn ISO images on Linux.

To burn the ISO file on the CD in the device (this is the first CD device on the system - substitute with the right device file if necessary):

Users that prefer a graphical user interface can use K3B, part of the package. In K3B, go to and use.

Extra hardware configuration
When the Installation medium boots, it tries to detect all the hardware devices and loads the appropriate kernel modules to support the hardware. In the vast majority of cases, it does a very good job. However, in some cases it may not auto-load the kernel modules needed by the system. If the PCI auto-detection missed some of the system's hardware, the appropriate kernel modules have to be loaded manually.

In the next example the 8139too module (which supports certain kinds of network interfaces) is loaded:

Optional: User accounts
If other people need access to the installation environment, or there is need to run commands as a non-root user on the installation medium (such as to chat using without root privileges for security reasons), then an additional user account needs to be created and the root password set to a strong password.

To change the root password, use the utility:

To create a user account, first enter their credentials, followed by the account's password. The and  commands are used for these tasks.

In the next example, a user called john is created:

To switch from the (current) root user to the newly created user account, use the command:

TTYs
To view the Gentoo handbook during the installation, first create a user account as described above. Then press + to go to a new terminal (TTY).

During the installation, the command can be used to browse the Gentoo handbook - of course only from the moment that the Internet connection is working.

To go back to the original terminal, press +.

GNU Screen
The Screen utility is installed by default on official Gentoo installation media. It may be more efficient for the seasoned Linux enthusiast to use to view installation instructions via split panes rather than the multiple TTY method mentioned above.

Optional: Starting the SSH daemon
To allow other users to access the system during the installation (perhaps to support during an installation, or even do it remotely), a user account needs to be created (as was documented earlier on) and the SSH daemon needs to be started.

To fire up the SSH daemon on an OpenRC init, execute the following command:

To be able to use sshd, the network needs to function properly. Continue with the chapter on Configuring the network.