mirror of
https://github.com/tommytran732/QubesOS-Scripts
synced 2024-11-23 02:01:32 -05:00
Compare commits
No commits in common. "6b7dacda7caf04aaa47f88c106438aba55c70546" and "7ca046d5091627f841a60de6e5137b5655a2130b" have entirely different histories.
6b7dacda7c
...
7ca046d509
20
dom0.sh
20
dom0.sh
@ -20,20 +20,16 @@ sudo systemctl enable fstrim.timer
|
|||||||
|
|
||||||
# Theming
|
# Theming
|
||||||
|
|
||||||
# After a reboot, run qt5ct and set the theme to gtk-2
|
|
||||||
|
|
||||||
sudo qubes-dom0-update qubes-ctap-dom0 qt5ct qt5-qtstyleplugins
|
|
||||||
|
|
||||||
echo 'QT_QPA_PLATFORMTHEME=qt5ct' | sudo tee -a /etc/environment
|
|
||||||
|
|
||||||
# Add extra gtk theming - this is probably not necessary, but why not
|
|
||||||
|
|
||||||
sudo mkdir -p /etc/gtk-3.0
|
sudo mkdir -p /etc/gtk-3.0
|
||||||
echo '[Settings]
|
echo "[Settings]
|
||||||
gtk-theme-name=Arc-Dark
|
gtk-theme-name=Arc-Dark
|
||||||
gtk-application-prefer-dark-theme=1' | sudo tee /etc/gtk-3.0/settings.ini
|
gtk-application-prefer-dark-theme=1" | sudo tee /etc/gtk-3.0/settings.ini
|
||||||
|
|
||||||
sudo mkdir -p /etc/gtk-4.0
|
sudo mkdir -p /etc/gtk-4.0
|
||||||
echo '[Settings]
|
echo "[Settings]
|
||||||
gtk-theme-name=Arc-Dark
|
gtk-theme-name=Arc-Dark
|
||||||
gtk-application-prefer-dark-theme=1' | sudo tee /etc/gtk-4.0/settings.ini
|
gtk-application-prefer-dark-theme=1" | sudo tee /etc/gtk-3.0/settings.ini
|
||||||
|
|
||||||
|
sudo qubes-dom0-update qubes-u2f-dom0 qt5ct qt5-qtstyleplugins
|
||||||
|
|
||||||
|
echo "QT_QPA_PLATFORMTHEME=qt5ct" | sudo tee /etc/environment
|
||||||
|
@ -46,7 +46,6 @@ echo "countme=False" | sudo tee -a /etc/dnf/dnf.conf
|
|||||||
|
|
||||||
# Blacklisting kernel modules
|
# Blacklisting kernel modules
|
||||||
curl --proxy http://127.0.0.1:8082 https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf
|
curl --proxy http://127.0.0.1:8082 https://raw.githubusercontent.com/Kicksecure/security-misc/master/etc/modprobe.d/30_security-misc.conf | sudo tee /etc/modprobe.d/30_security-misc.conf
|
||||||
sudo sed -i 's/#install msr/install msr/g' /etc/modprobe.d/30_security-misc.conf
|
|
||||||
|
|
||||||
# Security kernel settings.
|
# Security kernel settings.
|
||||||
curl --proxy http://127.0.0.1:8082 https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf
|
curl --proxy http://127.0.0.1:8082 https://raw.githubusercontent.com/Kicksecure/security-misc/master/usr/lib/sysctl.d/990-security-misc.conf | sudo tee /etc/sysctl.d/990-security-misc.conf
|
||||||
@ -86,7 +85,10 @@ Description=Update user Flatpaks
|
|||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=oneshot
|
Type=oneshot
|
||||||
ExecStart=/usr/bin/flatpak --user update -y" | sudo tee /etc/systemd/user/update-user-flatpaks.service
|
ExecStart=/usr/bin/flatpak --user update -y
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=default.target" | sudo tee /etc/systemd/user/update-user-flatpaks.service
|
||||||
|
|
||||||
echo "[Unit]
|
echo "[Unit]
|
||||||
Description=Update user Flatpaks daily
|
Description=Update user Flatpaks daily
|
||||||
|
23
fedora/sysadmin-AppVM.sh
Normal file
23
fedora/sysadmin-AppVM.sh
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
#Run this in an AppVM, not a TemplateVM
|
||||||
|
|
||||||
|
echo '# SPLIT SSH CONFIGURATION >>>
|
||||||
|
# replace "vault" with your AppVM name which stores the ssh private key(s)
|
||||||
|
SSH_VAULT_VM="vault"
|
||||||
|
|
||||||
|
if [ "$SSH_VAULT_VM" != "" ]; then
|
||||||
|
export SSH_SOCK="/home/user/.SSH_AGENT_$SSH_VAULT_VM"
|
||||||
|
rm -f "$SSH_SOCK"
|
||||||
|
sudo -u user /bin/sh -c "umask 177 && exec socat 'UNIX-LISTEN:$SSH_SOCK,fork' 'EXEC:qrexec-client-vm $SSH_VAULT_VM qubes.SshAgent'" &
|
||||||
|
fi
|
||||||
|
# <<< SPLIT SSH CONFIGURATION' | sudo tee -a /rw/config/rc.local
|
||||||
|
|
||||||
|
echo '# SPLIT SSH CONFIGURATION >>>
|
||||||
|
# replace "vault" with your AppVM name which stores the ssh private key(s)
|
||||||
|
SSH_VAULT_VM="vault"
|
||||||
|
|
||||||
|
if [ "$SSH_VAULT_VM" != "" ]; then
|
||||||
|
export SSH_AUTH_SOCK="/home/user/.SSH_AGENT_$SSH_VAULT_VM"
|
||||||
|
fi
|
||||||
|
# <<< SPLIT SSH CONFIGURATION' | tee -a ~/.bashrc
|
@ -18,3 +18,6 @@ curl --proxy http://127.0.0.1:8082/ https://packages.element.io/debian/element-i
|
|||||||
echo "deb [signed-by=/usr/share/keyrings/element-io-archive-keyring.gpg] https://packages.element.io/debian/ default main" | sudo tee /etc/apt/sources.list.d/element-io.list
|
echo "deb [signed-by=/usr/share/keyrings/element-io-archive-keyring.gpg] https://packages.element.io/debian/ default main" | sudo tee /etc/apt/sources.list.d/element-io.list
|
||||||
sudo apt update
|
sudo apt update
|
||||||
sudo apt install --no-install-recommends element-desktop -y
|
sudo apt install --no-install-recommends element-desktop -y
|
||||||
|
|
||||||
|
# Adding a DNS entry for my Matrix server here so I can add a Firewall rule locking the AppVM to only being able to connect to my server.
|
||||||
|
echo "5.226.143.168 matrix.arcticfoxes.net" | sudo tee -a /etc/hosts
|
||||||
|
@ -42,6 +42,9 @@ sudo touch /etc/apt/sources.list
|
|||||||
#E nabling SUID Disabler and Permission Hardener
|
#E nabling SUID Disabler and Permission Hardener
|
||||||
sudo systemctl enable --now permission-hardening
|
sudo systemctl enable --now permission-hardening
|
||||||
|
|
||||||
|
# Enable hardened malloc
|
||||||
|
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
|
||||||
|
|
||||||
# Restrict /proc and access
|
# Restrict /proc and access
|
||||||
sudo systemctl enable --now proc-hidepid.service
|
sudo systemctl enable --now proc-hidepid.service
|
||||||
|
|
||||||
@ -80,7 +83,10 @@ Description=Update user Flatpaks
|
|||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=oneshot
|
Type=oneshot
|
||||||
ExecStart=/usr/bin/flatpak --user update -y" | sudo tee /etc/systemd/user/update-user-flatpaks.service
|
ExecStart=/usr/bin/flatpak --user update -y
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=default.target" | sudo tee /etc/systemd/user/update-user-flatpaks.service
|
||||||
|
|
||||||
echo "[Unit]
|
echo "[Unit]
|
||||||
Description=Update user Flatpaks daily
|
Description=Update user Flatpaks daily
|
||||||
|
21
kicksecure/signal.sh
Normal file
21
kicksecure/signal.sh
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Copyright (C) 2023 Thien Tran
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
||||||
|
# use this file except in compliance with the License. You may obtain a copy of
|
||||||
|
# the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations under
|
||||||
|
# the License.
|
||||||
|
|
||||||
|
curl --proxy http://127.0.0.1:8082/ https://updates.signal.org/desktop/apt/keys.asc | gpg --dearmor > signal-desktop-keyring.gpg
|
||||||
|
cat signal-desktop-keyring.gpg | sudo tee -a /usr/share/keyrings/signal-desktop-keyring.gpg > /dev/null
|
||||||
|
|
||||||
|
echo 'deb [arch=amd64 signed-by=/usr/share/keyrings/signal-desktop-keyring.gpg] https://updates.signal.org/desktop/apt xenial main' | sudo tee -a /etc/apt/sources.list.d/signal-xenial.list
|
||||||
|
sudo apt update && sudo apt install --no-install-recommends signal-desktop -y
|
@ -28,6 +28,9 @@ sudo apt install --no-install-recommends tirdad qt5ct qt5-style-plugins arc-them
|
|||||||
# Enabling SUID Disabler and Permission Hardener
|
# Enabling SUID Disabler and Permission Hardener
|
||||||
sudo systemctl enable --now permission-hardening
|
sudo systemctl enable --now permission-hardening
|
||||||
|
|
||||||
|
# Enable hardened malloc
|
||||||
|
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
|
||||||
|
|
||||||
# Restrict /proc and access
|
# Restrict /proc and access
|
||||||
sudo systemctl enable --now proc-hidepid.service
|
sudo systemctl enable --now proc-hidepid.service
|
||||||
|
|
||||||
|
@ -28,6 +28,9 @@ sudo apt install --no-install-recommends tirdad qt5ct qt5-style-plugins arc-them
|
|||||||
# Enabling SUID Disabler and Permission Hardener
|
# Enabling SUID Disabler and Permission Hardener
|
||||||
sudo systemctl enable --now permission-hardening
|
sudo systemctl enable --now permission-hardening
|
||||||
|
|
||||||
|
# Enable hardened malloc
|
||||||
|
echo "/usr/lib/libhardened_malloc.so/libhardened_malloc.so" | sudo tee /etc/ld.so.preload
|
||||||
|
|
||||||
# Restrict /proc and access
|
# Restrict /proc and access
|
||||||
sudo systemctl enable --now proc-hidepid.service
|
sudo systemctl enable --now proc-hidepid.service
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user