Post-installation Security Advice

From Kicksecure
Jump to navigation Jump to search

Ball-63527-640.jpg

Introduction[edit]

Kicksecure ™ comes with many security features. Kicksecure ™ is Security Hardened by default and also provides extensive Documentation including a System Hardening Checklist. The more you know, the safer you can be.

This page provides security advice, including steps that can be applied after installation of Kicksecure ™ for better security.

On Kicksecure ™[edit]

Increase Virtual Machine RAM[edit]

If using a Kicksecure ™ VM...

Kicksecure ™ default password info box Kicksecure ™ for Qubes users can skip this section. [1]

If enough host RAM is available, ideally the virtual RAM setting of Kicksecure ™ should be increased to 2048 MB RAM. [2] If it is infeasible to increase the virtual RAM setting, Kicksecure ™ will still function properly. [3]

If it is unknown how much RAM is available, follow these steps on the host: [4] [5] [6]

  • Windows 10: Task Manager in More details viewClick/tap on the Performance tabClick/tap on Memory; or Open a command promptRun wmic MemoryChip get /format:list
  • macOS: Apple menuAbout This Mac
  • Linux: Open a terminalRun free -h [7]

Related:

VirtualBox[edit]

  1. To add RAM in VirtualBox the VM must first be powered down.
  2. Virtual machineMenuSettingsAdjust Memory sliderHit: OK

KVM[edit]

1. Shutdown the virtual machine(s).

virsh -c qemu:///system shutdown <vm_name>

2. Increase the maximum memory.

virsh setmaxmem <vm_name> <memsize> --config

3. Set the actual memory.

virsh setmem <vm_name> <memsize> --config

4. Restart the virtual machine(s).

virsh -c qemu:///system start <vm_name>

Change Keyboard Layout[edit]

Kicksecure ™Change Keyboard Layout info box Kicksecure ™ for Qubes users can skip this section. [8]

If you are using a keyboard layout other than qwerty (US), consider changing the keyboard layout. Refer to the dedicated Keyboard Layout entry for further details.

Test Keyboard Layout[edit]

Kicksecure ™Test Keyboard Layout info box Kicksecure ™ for Qubes users can skip this section.

  • Start menuAccessoriesMousepad; or
  • Open file ~/testfile in a text editor of your choice as a regular, non-root user.

If you are using a graphical environment, run.

mousepad ~/testfile

If you are using a terminal, run.

nano ~/testfile

Try typing the words user, changeme and qwerty. Try typing further words to ensure the desired keyboard layout is functional.

Change Password[edit]

Kicksecure ™ default password info box Kicksecure ™ for Qubes users can skip this section. [9] [10]

After Kicksecure ™ has finished installing, immediately change the password for the user user account.

1. To avoid possible issues, review the Change Keyboard Layout and Test Keyboard Layout entries before proceeding further.

2. Open a terminal (such as Xfce Terminal Emulator).

Start menuApplicationsSystemTerminal

3. Run a test command as root by using sudo.

Run. [11]

sudo systemd-detect-virt

4. Read the note below regarding the username and password.

Kicksecure default admin password is: changeme default username: user
default password: changeme

When typing the password it will not appear on the screen, nor will the asterisk sign (*) be visible. It is necessary to type blindly and trust the procedure.

5. Change the user (and sudo) password.

To change the user (Kicksecure ™ default user) password, run. [11] This will also be the password when running sudo from Linux user account user. [12]

sudo passwd user

6. Root password.

No changes required. Optional, for details, see root account in Kicksecure ™.

7. Done.

The procedure of changing passwords is complete.

If issues appear when gaining root, consider using dsudo.

Another option is to boot into recovery mode and change passwords there.

Security Updates[edit]

Regularly check for security updates and apply them in a timely fashion; see Operating System Updates.

Appendix[edit]

How do I Check the Current Kicksecure ™ Version?[edit]

See /etc/*_version.

Open a terminal.

If you are using Kicksecure ™ inside Qubes, complete the following steps.

Qubes App Launcher (blue/grey "Q")Kicksecure ™ ProxyVM (commonly named kicksecure)Xfce Terminal

If you are using a graphical Whonix with XFCE, run.

Start MenuXfce Terminal

cat /etc/*_version

Should show.

11.1
16

The first line shows the version of the major and minor version of Debian. The second line shows the version of the derivative (Kicksecure ™).

Footnotes[edit]

  1. Qubes has dynamic RAM assignment.
  2. This provides higher performance during upgrades and lowers the likelihood of issues.
  3. Although non-ideal, swap-file-creator will create an encrypted swap file and the system is configured to swap as little as possible.
  4. https://www.tenforums.com/tutorials/66809-determine-system-memory-size-speed-type-windows-10-a.html
  5. https://vitux.com/how-to-check-installed-ram-on-debian/
  6. https://support.apple.com/en-us/HT201191
  7. This command works in Red Hat, CentOS, Suse, Ubuntu, Fedora, Debian and other distributions. Alternative commands include: cat /proc/meminfo |grep MemTotal, top, and vmstat -s.
  8. By default, Qubes VMs use the same keyboard layout as Qubes dom0.
  9. By default, Qubes does not require a password for superuser access.
  10. https://www.qubes-os.org/doc/vm-sudo/
  11. 11.0 11.1 Type the command in the terminal and press <Enter>.
  12. Usual Debian / sudo default. Unspecific to Kicksecure ™,


Unfinished: This wiki is a work in progress. Please do not report broken links until this notice is removed, use Search Engines First and contribute improving this wiki.