Kicksecure for KVM with Xfce

From Kicksecure
Revision as of 15:58, 23 February 2025 by 127.0.0.1 (→‎Footnotes)
Jump to navigation Jump to search

About this KVM Page
Contributor maintained wiki page.
Support Status stable
Difficulty medium
Contributor HulaHooparchive.org iconarchive.today icon
Support Community support only!
unofficial logo re-design for the KVMarchive.org iconarchive.today icon virtualizer

This is the KVM flavor of the Kicksecure project - a hardened and security centric version of Debian optimized for virtualized environments and clearnet usage.

Info COMMUNITY SUPPORT ONLY : THIS WHOLE WIKI PAGE is only supported by the community. Kicksecure developers are very unlikely to provide free support for this content. See Community Support for further information, including implications and possible alternatives.

Introduction

Much of the warnings and use case instructions from the Kicksecure edition, such as running the OS headlessly or using shared folders, are applicable.

For more details about Kicksecure, check Kicksecure pages.

Support tickets should be forwarded to the KVM subforumarchive.org iconarchive.today icon.

Build from Scratch

Advanced users are encouraged to build Kicksecure images for high security assurance.

Download Kicksecure

By downloading, you acknowledge that you have read, understood and agreed to our Terms of Service and License Agreement.

FREE

GUI

  • Kicksecure with Xfce graphical user interface (GUI).
  • This version of Kicksecure is designed to run inside KVM.

Download Kicksecure Xfce for KVM (FREE!) KVM

Optional: Digital signature verification.

CLI

  • Kicksecure with command line interface (CLI).
  • This version of Kicksecure is designed to run inside KVM.
  • Kicksecure with CLI is a version suited for advanced users -- those who want Kicksecure without a graphical user interface (GUI).

Download Kicksecure CLI for KVM (FREE!) KVM

Optional: Digital signature verification.

Note: Save your download to your usual ~/Downloads folder.

Decompress

Use tar to decompress the archive.

Click = Copy Copied to clipboard! tar -xvf Kicksecure*.libvirt.xz

Do not use unxz! Extract the images using tar.

Importing Kicksecure VM Template

The supplied XML files serve as a description for libvirt and define the properties of a Kicksecure VM and the networking it should have.

1. Kicksecure works with the network named default out of the box.

2. Import the Kicksecure image.

Click = Copy Copied to clipboard! virsh -c qemu:///system define Kicksecure*.xml

Moving the Kicksecure Image File

The XML files are configured to point to the default storage location of /var/lib/libvirt/images. The following steps move the images there so the machines can boot.

Note: Changing the default location may cause conflicts with SELinux, which will prevent the machines from booting.

It is recommended to move the image file instead of copying it.

Click = Copy Copied to clipboard! sudo mv Kicksecure*.qcow2 /var/lib/libvirt/images/Kicksecure.qcow2

Footnotes

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!


setup-dist - Error! Error messages are as follows: set_enable was called. /usr/local/etc/torrc.d/40_tor_control_panel.conf before: Do not edit this file! .... /usr/local/etc/torrc.d/50_user.conf ...