Qubes: Difference between revisions
(update) |
(update for Qubes 4.2) |
||
(39 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
Note: after restoring from a backup make sure to recreate the templates from the base again to save disk space because of copy-on-write. |
|||
⚫ | |||
* DD (debian-10) |
|||
* media (km-fedora-30) |
|||
** flatpak: VLC, filezilla, transmission |
|||
* personal (km-fedora-30) |
|||
** flatpak: Signal |
|||
* fopf (km-fedora-30) |
|||
* school (km-fedora-30) |
|||
* dev (km-fedora-30-dev) |
|||
* wm-ssh (fedora-30) |
|||
** firewall only allows ssh to bast4002.wikimedia.org |
|||
* vault (km-fedora-30) |
|||
** no network |
|||
* vault-gpg (fedora-29) |
|||
** no network |
|||
== Template VMs == |
== Template VMs == |
||
In my Fedora VMs |
|||
* debian-9: upstream |
|||
⚫ | |||
* debian-10: modified: |
|||
* <code>echo "vm.swappiness = 1" | sudo tee systemctl.conf</code> |
|||
** devscripts git-buildpackage dput-ng command-not-found gitk git-cola gir1.2-vte-2.91 (reportbug-gtk dep) webext-ublock-origin webext-https-everywhere |
|||
** I used this for Qubes 4.0 and 4.1, seeing if I don't need it for 4.2 |
|||
* fedora-29: upstream |
|||
* fedora-30: upstream |
|||
⚫ | |||
* km-fedora-30: fork: |
|||
** nextcloud-client-nautilus mozilla-https-everywhere mozilla-ublock-origin nano tree ack libgnome-keyring libreoffice quassel-client shotwell filezilla hugin mozilla-privacy-badger keepassxc |
|||
* RPC Policy: Set USB keyboards and mice to ask for being attached to dom0 |
|||
* km-fedora-30-dev: |
|||
** ack atom composer docker-ce fish git-cola gitk jq mosh mozilla-https-everywhere mozilla-privacy-badger mozilla-ublock-origin nano netxcloud-client-nautilus npm php pipenv podman pycharm-community python3-pyside python3-tox python34 python35 python36 python38 quassel-client tree |
|||
* <s>Follow https://github.com/Qubes-Community/Contents/blob/master/docs/customization/dpi-scaling.md for getting it to work with my 4k display.</s> Went back to a non-4k display. |
|||
* <s>Appearance -> Style -> Adwaita-dark</s> |
|||
* Change global copy/paste to use Win+C and Win+V |
|||
* Clock format: <code>%a %F %r</code> |
|||
Create <code>/usr/local/bin/vault</code>, mapped to ctrl+shift+x |
|||
<pre> |
|||
#!/bin/sh |
|||
exec qvm-run vault keepassxc |
|||
</pre> |
|||
<s>Redshift, following https://www.bryceguinta.me/install-configure-and-autostart-redshift-on-qubes-40.html, except place the config file at <code>~/redshift.conf</code> so it gets included in dom0 backups and use Settings -> Session and Startup to add the autostart entry.</s> |
|||
== Advanced debugging == |
|||
In the grub bootloader you can press "E" on a menu item to edit both the Linux and Xen command lines before booting. Removing "quiet" from Linux will make the boot process verbose and you can see where you get stuck. |
|||
Boot a Qubes installer USB, select rescue mode. Select option #1, enter your decryption password. Ignore the error which says "You have no Linux partitions...", it's wrong and [https://github.com/QubesOS/qubes-issues/issues/5609 a known issue]. |
|||
If you run e.g. <code>fdisk -l</code>, you should see your disks and VMs. You should be able to mount dom0 with e.g. <code>mkdir /mnt/dom0 && mount /dev/qubes_dom0/root /mnt/dom0</code>. To do stuff in dom0, you might <code>chroot /mnt/dom0.</code> |
|||
If you need <code>/proc</code>, <code>/sys</code>, etc. inside the chroot, see [https://superuser.com/questions/165116/mount-dev-proc-sys-in-a-chroot-environment#417004 this post] for how to mount them. |
|||
== Config == |
|||
* <code>/etc/qubes-rpc/policy/qubes.InputKeyboard</code> |
|||
** <code>sys-usb dom0 ask,default_target=dom0</code> |
|||
* <code>/etc/qubes-rpc/policy/qubes.InputTablet</code> |
|||
⚫ |
Latest revision as of 01:11, 19 May 2024
Note: after restoring from a backup make sure to recreate the templates from the base again to save disk space because of copy-on-write.
Template VMs
In my Fedora VMs
systemctl mask packagekit
echo "vm.swappiness = 1" | sudo tee systemctl.conf
- I used this for Qubes 4.0 and 4.1, seeing if I don't need it for 4.2
dom0
- RPC Policy: Set USB keyboards and mice to ask for being attached to dom0
Follow https://github.com/Qubes-Community/Contents/blob/master/docs/customization/dpi-scaling.md for getting it to work with my 4k display.Went back to a non-4k display.Appearance -> Style -> Adwaita-dark- Change global copy/paste to use Win+C and Win+V
- Clock format:
%a %F %r
Create /usr/local/bin/vault
, mapped to ctrl+shift+x
#!/bin/sh exec qvm-run vault keepassxc
Redshift, following https://www.bryceguinta.me/install-configure-and-autostart-redshift-on-qubes-40.html, except place the config file at
~/redshift.conf
so it gets included in dom0 backups and use Settings -> Session and Startup to add the autostart entry.
Advanced debugging
In the grub bootloader you can press "E" on a menu item to edit both the Linux and Xen command lines before booting. Removing "quiet" from Linux will make the boot process verbose and you can see where you get stuck.
Boot a Qubes installer USB, select rescue mode. Select option #1, enter your decryption password. Ignore the error which says "You have no Linux partitions...", it's wrong and a known issue.
If you run e.g. fdisk -l
, you should see your disks and VMs. You should be able to mount dom0 with e.g. mkdir /mnt/dom0 && mount /dev/qubes_dom0/root /mnt/dom0
. To do stuff in dom0, you might chroot /mnt/dom0.
If you need /proc
, /sys
, etc. inside the chroot, see this post for how to mount them.