1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2024-11-22 01:41:34 -05:00
My Scripts for template VMs
Go to file
2022-05-27 02:10:38 -04:00
fedora Reorganize 2022-05-27 02:10:38 -04:00
kicksecure Oopsie 2022-05-27 00:56:03 -04:00
kicksecure-minimal Typos 2022-05-26 18:09:59 -04:00
dom0.sh Fixes 2022-05-26 22:31:56 -04:00
LICENSE Initial commit 2022-02-03 02:57:15 -05:00
README.md Update README.md 2022-05-27 02:07:12 -04:00
whonix-hardening.sh kickseucre 2022-05-26 13:50:11 -04:00

QubesOS-Scripts

My scripts for setting up QubesOS.

Running these scripts should be very straight forward. For the default Fedora template, run fedora.sh to trim it down first. For Debian templates, run kicksecure.sh to trim them down and convert them to KickSecure. Note that there are 2 different kicksecure.sh, one for the minimal template, and one for the normal one.

After you are done running those scripts, any other script can be used in a different template based on those trimmed down templates to create their respective virtual machines.

I have a script to create a Brave VM based on the normal KickSecure and Fedora templates. The idea behind this is that you would want to use a disposable Brave VM for web browsing most of the time, and have it seperated from your AppVM. If you try to visit a link inside of an AppVM without a browser, qubes will launch a browser inside of a disposable VM for you. Of course, for VMs where you want the browser to stay persistent, you can just base it on the Brave template instead.

If you want to install Flatpak packages, install them inside of an AppVM as a user Flatpak and enable the update-user-flatpaks.service as a user systemd service for automatic updates.

It is recommended that you follow the docs here to make a prompt for root access on non-minimal VMs. dom0.sh already takes care dom dom0 so you only need to worry about the guests.

Notes

  1. Kicksecure, while having more security mitigation, takes significantly longer than Fedora to launch and generally runs slower.
  2. Currently, launching Flatpak apps from the appmenu does not work on KickSecure. I have not been able to find the culprit, so any help would be greatly appreciated.
  3. My personal recommendation is use KickSecure for system VMs like sys-net and sys-usb. For normal apps, especially Flatpaks, just use Fedora instead. Of course, the exception to this rule would be when you can only get official binaries for Debian, like with Signal and Element for example.