mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-12-23 06:09:29 -05:00
[Kali] minor fix
This commit is contained in:
parent
c437bb245f
commit
0bd9330831
@ -12,8 +12,8 @@ Warnings
|
||||
--------------
|
||||
* The installation scripts and provided tools may have bugs, be vulnerable to Man in the Middle (MitM) attacks or other vulnerabilities.
|
||||
* Adding additional repositories or tools for installing software extends your trust to those tool providers.
|
||||
* Please keep in mind that using such template for security and privacy critical tasks is not recommended.
|
||||
* Kali Linux distribution is a rolling distribution constantly based on Debian testing release, so it will always have a newer software base than available in Qubes OS Debian template. Keep in mind that it may result in problems (especially in regard to package dependency) not covered by this tutorial.
|
||||
* Please keep in mind that using such a template for security and privacy critical tasks is not recommended.
|
||||
* Kali Linux distribution is a rolling distribution based on Debian testing release, so it will always have a newer software base than available in the Qubes OS Debian template. Keep in mind that this may result in problems (especially in regard to package dependencies) not covered by this tutorial.
|
||||
|
||||
From the official ISO file <a name="hvm4_0"/>
|
||||
==================================================
|
||||
@ -41,17 +41,17 @@ The steps can be summarized as:
|
||||
3. Add the Kali repository
|
||||
4. Update the template
|
||||
|
||||
Get Kali Linux GPG key
|
||||
Get Kali Linux PGP key
|
||||
-----------------------
|
||||
**CAUTION:** Before proceeding, please carefully read [On Digital Signatures and Key Verification][qubes-verifying-signatures].
|
||||
This website cannot guarantee that any GPG key you download from the Internet is authentic.
|
||||
Always obtain a trusted key fingerprint via other channels, and always check key you download against your trusted copy of the fingerprint.
|
||||
This website cannot guarantee that any PGP key you download from the Internet is authentic.
|
||||
Always obtain a trusted key fingerprint via other channels, and always check any key you download against your trusted copy of the fingerprint.
|
||||
|
||||
This step is required since by (security) default TemplateVM do not have a
|
||||
direct Internet connectivity. Users understanding the risks of enabling such
|
||||
access can change this configuration in firewall settings for the TemplateVM.
|
||||
|
||||
1. Retrieve the Kali Linux GPG key using a DisposableVM.
|
||||
1. Retrieve the Kali Linux PGP key using a DisposableVM.
|
||||
|
||||
```shell_session
|
||||
$ gpg --keyserver hkp://keys.gnupg.net --recv-key 44C6513A8E4FB3D30875F758ED444FF07D8D0BF6
|
||||
@ -59,7 +59,7 @@ $ gpg --list-keys --with-fingerprint 44C6513A8E4FB3D30875F758ED444FF07D8D0BF6
|
||||
$ gpg --export --armor 44C6513A8E4FB3D30875F758ED444FF07D8D0BF6 > kali-key.asc
|
||||
```
|
||||
|
||||
2. **DO NOT TURN OFF** the DisposableVM, the `kali-key.asc` file will be copied to
|
||||
2. **DO NOT TURN OFF** the DisposableVM, the `kali-key.asc` file will be copied in
|
||||
the Kali Linux template for a further step.
|
||||
|
||||
3. Make sure the key is the authentic Kali key.
|
||||
@ -69,14 +69,14 @@ Create a Kali Linux (rolling) template
|
||||
----------------------------------------
|
||||
These instructions will show you how to upgrade a Debian TemplateVM to Kali Linux.
|
||||
|
||||
1. (Optional) Check for latest Debian stable templates and install it (if not already done)
|
||||
1. (Optional) Check for latest Debian stable template and install it (if not already done)
|
||||
|
||||
```shell_session
|
||||
# qubes-dom0-update --action="search all" qubes-template-debian
|
||||
# qubes-dom0-update <latest Debian template>
|
||||
```
|
||||
|
||||
2. Start your latest Debian template
|
||||
2. Start your Debian template
|
||||
|
||||
```shell_session
|
||||
$ qvm-start debian-<X>
|
||||
@ -114,14 +114,14 @@ e.g. in this example we update `buster` stable repository to `bullseye` testing
|
||||
For installation based on Debian 10 stable, please note that the security repository of Debian testing has [recently been renamed][Debian-security-naming-convention] from `<current testing>/update` to `<current-testing>-security`. To account for that change, execute the following command.
|
||||
|
||||
```shell_session
|
||||
# sed -i 's/bullseye\/updates/bullseye-security/g' /etc/apt/sources.list
|
||||
# sed -i 's%bullseye/updates%bullseye-security%g' /etc/apt/sources.list
|
||||
```
|
||||
|
||||
5. Update the template
|
||||
|
||||
**Note:** During execution of the update, carefully read list of packages to be removed. If it contains `qubes-*` packages, terminate operation and try to resolve `qubes-*` packages missing dependencies first.
|
||||
|
||||
6. Copy the Kali GPG key from the DisposableVM to the new template:
|
||||
6. Copy the Kali PGP key from the DisposableVM to the new template:
|
||||
|
||||
```shell_session
|
||||
$ qvm-copy kali-key.asc
|
||||
@ -129,7 +129,7 @@ $ qvm-copy kali-key.asc
|
||||
|
||||
The DisposableVM can now be turned off.
|
||||
|
||||
7. Add the Kali GPG key to the list of keys trusted to authenticate packages:
|
||||
7. Add the Kali PGP key to the list of keys trusted to authenticate packages:
|
||||
|
||||
```shell_session
|
||||
# cat /home/user/QubesIncoming/dispXXX/kali-key.asc | apt-key add -
|
||||
@ -157,7 +157,7 @@ $ qvm-run -a kali-rolling gnome-terminal
|
||||
Install the Kali tools
|
||||
------------------------------
|
||||
At this point you should have a working template and you can install the tools you need.
|
||||
Keep in mind that the tools you will install can easily take more than 10 GB, [so you will need to **grow** the size of the VM.][qubes-resize-disk-image]
|
||||
Keep in mind that the tools you will install can easily take more than 10 GB, [so you will need to **grow** the size of the VM system storage.][qubes-resize-disk-image]
|
||||
|
||||
Alternative Options to Kali Linux
|
||||
===================================
|
||||
|
Loading…
Reference in New Issue
Block a user