{{Header}} {{hide_all_banners}} {{title|title= {{q_project_name_long}} }} {{#seo: |description=Using {{q_project_name_short}} |image=Download-qubes.jpg }} __FORCETOC__ [[File:Download-qubes.jpg|thumb]] {{intro| [[About|{{project_name_long}}]] for [https://www.qubes-os.org Qubes OS]. }} = Distribution Morphing = What is distro morphing? See [[Distribution Morphing]]. In dom0. '''1.''' Install debian-{{stable project version based on Debian version short}} as per [https://www.qubes-os.org/doc/templates/debian/ Qubes Debian Template documentation] which is [[unspecific|unspecific to {{project_name_short}}]]. '''2.''' Clone Template debian-{{stable project version based on Debian version short}} into template {{project_name_workstation_template}}. '''3.''' Start the {{project_name_workstation_template}} Template. ---- Inside the {{project_name_workstation_template}} Template. '''1.''' Follow the instructions [[Debian|Install {{project_name_short}} inside Debian]], choose meta package {{project_name_short_lowercase}}-qubes-cli or {{project_name_short_lowercase}}-qubes-gui. '''2.''' Shutdown the Template. '''3.''' Done. Distribution morphing of Debian into {{project_name_short}} is complete. '''4.''' Change Template. Optional: The user may change the Template for any App Qube from Debian to {{project_name_short}} as per the usual Qubes way. '''5.''' Create new app Qubes. Optional: The user may create new App Qubes based on the {{project_name_workstation_template}} Template as per the usual Qubes way. = Template = There is no ready-made template yet. Future: This wiki page will be updated once available. Information for developers: * [https://github.com/Kicksecure/qubes-template-kicksecure qubes-template-kicksecure] * [https://github.com/QubesOS/qubes-issues/issues/9573 build Kicksecure Qubes Template #9573] * Please contribute to {{project_name_short}} and Qubes OS by creating and maintaining a kicksecure-{{VersionShort}} Qubes Template. = Support Status = How stable is this? Should be very stable. This is because Qubes-Whonix is based on Kicksecure. The lead developer of Kicksecure is also a user of Qubes and using Kicksecure in Qubes. = Service VMs = {{project_name_short}} in Qubes service VMs such as sys-net, sys-firewall, sys-usb are functional. This is classified as [[unsupported]] to avoid complex support requests for issues not caused by {{project_name_short}} being directed at {{project_name_short}} support. https://forums.kicksecure.com/t/kicksecure-for-sys-qubes-and-sys-vpn/442 If using in-VM kernel: {{quotation |quote=it's problematic for VMs with PCI devices (especially when using Debian kernel, due to old wifi drivers, but there are also other factors like significantly slower boot time in HVM mode). |context=https://github.com/QubesOS/qubes-issues/issues/9570#issuecomment-2468812870 }} = ISO = Using the Kicksecure [[ISO]] is not the recommended way to install {{project_name_long}} on Qubes. Instead, until a [[Qubes#Template|Template]] is available, [[Qubes#Distribution_Morphing|Distribution Morphing]] is the recommended installation method. If the user wishes to use the ISO for any reason (such as testing, development, comparison, or curiosity), the following steps apply. Note: You need to download the Kicksecure ISO into a separate AppVM/Qube that will be used to install Kicksecure from (in the example below, the ISO has been downloaded in "debian-personal"). '''1.''' Create a new qube, following the instructions in the image. [[File:kickiso.png|600px]] '''2.''' Remove "Install system from device" because we want to modify the VM before installing Kicksecure on it, then press "OK" to create the Kicksecure qube/VM. [[File:kickiso2.png|600px]] '''3.''' Enter Kicksecure qube settings. [[File:kickiso3.png|600px]] '''4.''' Preferably, change system storage to 20 GB, then press "Advanced". [[File:kickiso4.png|600px]] '''5.''' Disable "Include in memory balancing", then increase "Initial memory" to preferably 4 GB. Press "Apply" to adjust the edited settings, then press "Boot qube from CD-ROM" to choose the Kicksecure ISO. [[File:kickiso5.png|600px]] '''6.''' Choose the qube where you have downloaded the Kicksecure ISO, then press "..." to browse for the ISO path. [[File:kickiso6.png|600px]] '''7.''' Choose Kicksecure ISO. [[File:kickiso7.png|600px]] '''8.''' Make sure everything is correctly chosen, then press "OK". [[File:kickiso8.png|600px]] '''9.''' Kicksecure is booted and ready to be installed. Kicksecure supports offline installation, so there's no need for network configuration before installation. [[File:kickiso9.png|600px]] '''10.''' Done == Networking == If you want to use the internet before or after installation, you need to go through the following steps: '''1.''' Right-click on the Network Manager taskbar icon, then choose "Edit connections..." [[File:kickiso10.png|600px]] '''2.''' Choose "Wired connection 1", then press the settings (gear) icon. [[File:kickiso11.png|600px]] '''3.''' Choose "IPv4 settings", then under "Method", select "Manual", and press "Add". [[File:kickiso12.png|600px]] '''4.''' Fill in the blanks with the "Net qube" info, except for the subnet mask, which should be set as 255.255.255.0 instead of 255 at the end https://github.com/QubesOS/qubes-issues/issues/4189. If the network still doesn't work, try changing the gateway to 10.137.0.1 https://github.com/QubesOS/qubes-issues/issues/7412. [[File:kickiso13.png|600px]] '''5.''' After filling in the blanks, press "Save." The Network Manager gear should update itself with the newly added information. [[File:kickiso14.png|600px]] '''6.''' Done See also: * [https://forum.qubes-os.org/t/qubes-hvm-how-to-auto-detect-the-network-settings-ip-gateway-from-inside-the-vm/27523 Qubes HVM: How to auto detect the network settings (IP, gateway) from inside the VM?] * [[Recovery#Qubes| Qube (VM) Recovery]]. == ISO Troubleshooting == If the user sees the following: '''Figure:''' ''virtual console login screen'' [[File:virtual_console.png|600px]] Then increase RAM according to instructions in chapter [[#ISO]]. = Qubes Persistence = Qubes (non-)persistence is a Qubes default and [[Unspecific|unspecific to {{project_name_short}}]]. {{Qubes_persistence}} = Qubes Template Modifications = If a Qubes template has been modified, to make changes in App Qubes based on that Template take effect, it is required to shut down the Template and restart the App Qubes based on that Template. This is a Qubes default and [[Unspecific|unspecific to {{project_name_short}}]]. To apply changes made to a Template: '''1.''' Make the required modification to the Template. '''2.''' Shut down the Template. '''3.''' Shut down the App Qube based on the modified Template. '''4.''' Start the App Qube based on the modified Template. '''5.''' Done. These steps ensure that all changes made to the Template are properly propagated to the App Qubes. = Footnotes = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]