1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2024-06-25 12:47:01 -04:00

Avoid phased updates

Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
Tommy 2024-01-24 17:44:48 -07:00
parent b40ec2a6e6
commit ac9acc7ff7
Signed by: Tomster
GPG Key ID: 555C902A34EC968F
3 changed files with 50 additions and 26 deletions

View File

@ -14,48 +14,56 @@
# License for the specific language governing permissions and limitations under
# the License.
#Adding KickSecure's signing key
unpriv(){
sudo -u nobody "$@"
}
# Avoid phased updates
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/apt/apt.conf.d/99sane-upgrades | sudo tee /etc/apt/apt.conf.d/99sane-upgrades
sudo chmod 644 /etc/apt/apt.conf.d/99sane-upgrades
# Adding KickSecure's signing key
curl --proxy http://127.0.0.1:8082/ --tlsv1.3 --proto =https --max-time 180 --output ~/derivative.asc https://www.kicksecure.com/derivative.asc
sudo cp ~/derivative.asc /usr/share/keyrings/derivative.asc
echo "deb [signed-by=/usr/share/keyrings/derivative.asc] https://deb.kicksecure.com bullseye main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list
sudo apt update
#Debloat
# Debloat
sudo apt purge -y thunderbird emacs emacs-gtk emacs-bin-common emacs-common firefox* keepassxc cups* system-config-printer* xsettingsd yelp*
sudo apt autoremove -y
sudo apt autoclean
#Distribution morphing
# Distribution morphing
sudo apt install --no-install-recommends kicksecure-qubes-cli gnome-settings-daemon -y
sudo apt autoremove -y
sudo mv /etc/apt/sources.list ~/
sudo touch /etc/apt/sources.list
#Enabling SUID Disabler and Permission Hardener
#E nabling SUID Disabler and Permission Hardener
sudo systemctl enable --now permission-hardening
#Enable hardened malloc
# Enable hardened malloc
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
#Restrict /proc and access
# Restrict /proc and access
sudo systemctl enable --now proc-hidepid.service
#Reduce kernel information leaks
#Will break a lot of applications. The apps I use on KickSecure work fine with it so I am enabling it.
# educe kernel information leaks
# Will break a lot of applications. The apps I use on KickSecure work fine with it so I am enabling it.
sudo systemctl enable --now hide-hardware-info.service
#Install packages
# Install packages
sudo apt install --no-install-recommends tirdad qubes-gpg-split qubes-u2f eog qt5ct qt5-style-plugins arc-theme -y
#Setup SSH client
# Setup SSH client
echo "GSSAPIAuthentication no" | sudo tee /etc/ssh/ssh_config.d/10-custom.conf
echo "VerifyHostKeyDNS yes" | sudo tee -a /etc/ssh/ssh_config.d/10-custom.conf
#Force DNSSEC
# Force DNSSEC
sudo sed -i 's/#DNSSEC=no/DNSSEC=yes/g' /etc/systemd/resolved.conf
sudo systemctl restart systemd-resolved
#Theming
# Theming
echo "export QT_QPA_PLATFORMTHEME=gtk2" | sudo tee /etc/environment
@ -68,7 +76,7 @@ automount-open=false" | sudo tee /etc/dconf/db/local.d/custom
sudo dconf update
#Flatpak update service
# Flatpak update service
echo "[Unit]
Description=Update user Flatpaks

View File

@ -14,20 +14,28 @@
# License for the specific language governing permissions and limitations under
# the License.
#Install packages
unpriv(){
sudo -u nobody "$@"
}
# Avoid phased updates
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/apt/apt.conf.d/99sane-upgrades | sudo tee /etc/apt/apt.conf.d/99sane-upgrades
sudo chmod 644 /etc/apt/apt.conf.d/99sane-upgrades
# Install packages
sudo apt install --no-install-recommends tirdad qt5ct qt5-style-plugins arc-theme -y
#Enabling SUID Disabler and Permission Hardener
# Enabling SUID Disabler and Permission Hardener
sudo systemctl enable --now permission-hardening
#Enable hardened malloc
# Enable hardened malloc
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
#Restrict /proc and access
# Restrict /proc and access
sudo systemctl enable --now proc-hidepid.service
#Reduce kernel information leaks
#Will break a lot of applications. The apps I use on Whonix work fine with it so I am enabling it.
# Reduce kernel information leaks
# Will break a lot of applications. The apps I use on Whonix work fine with it so I am enabling it.
sudo systemctl enable --now hide-hardware-info.service
echo "export QT_QPA_PLATFORMTHEME=gtk2" | sudo tee /etc/environment

View File

@ -14,23 +14,31 @@
# License for the specific language governing permissions and limitations under
# the License.
#Install packages
unpriv(){
sudo -u nobody "$@"
}
# Avoid phased updates
unpriv curl https://raw.githubusercontent.com/TommyTran732/Linux-Setup-Scripts/main/etc/apt/apt.conf.d/99sane-upgrades | sudo tee /etc/apt/apt.conf.d/99sane-upgrades
sudo chmod 644 /etc/apt/apt.conf.d/99sane-upgrades
# Install packages
sudo apt install --no-install-recommends tirdad qt5ct qt5-style-plugins arc-theme git -y
#Enabling SUID Disabler and Permission Hardener
# Enabling SUID Disabler and Permission Hardener
sudo systemctl enable --now permission-hardening
#Enable hardened malloc
# Enable hardened malloc
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
#Restrict /proc and access
# Restrict /proc and access
sudo systemctl enable --now proc-hidepid.service
#Reduce kernel information leaks
#Will break a lot of applications. The apps I use on Whonix work fine with it so I am enabling it.
# Reduce kernel information leaks
# Will break a lot of applications. The apps I use on Whonix work fine with it so I am enabling it.
sudo systemctl enable --now hide-hardware-info.service
#Theming
# Theming
echo "export QT_QPA_PLATFORMTHEME=gtk2" | sudo tee /etc/environment