- UI enforcing GnuPG HSM with sig subkey installed
- Examples: Yubikey, Ledger, Trezor
- Public key matching device in step #1 on flash drive
- TOTP/HTOP capable Personal HSM
- Examples: Nitrokey, Librem Key
- PC with TPM verified coreboot-heads firmware installed
- Examples: Nitropad, Insurgo PrivacyBeast, Librem 13/15
- Flash drive containing latest QubesOS image
-
Enroll personal GnuPG public key into TPM via "OEM Factory Reset"
-
Regenerate TOTP/HOTP secret in Librem Key
-
Change user/admin pins of Librem Key
-
Boot QubesOS installer and install with FDE + defaults.
-
Reboot to OS
-
Sign new QubesOS install and boot entry when asked with GnuPG HSM
-
Boot into QubesOS
-
(optional) Install desired WM/shell if not XFCE/bash
Example:
[jdoe@dom0 ~]$ sudo qubes-dom0-update i3 i3-settings-qubes zsh
-
Install critical packages for HSM use in Debian TemplateVM
user@debian10:~$ sudo apt install scdaemon u2f-host
-
Create a user in Debian TemplateVM
user@debian10:~$ sudo useradd -m -G qubes -s /bin/bash jdoe
-
Add new user to sudoers in TemplateVM
user@debian10:~$ sudo vim /etc/sudoers
-
Set user and preferred template as default in general use Qubes
[jdoe@dom0 ~]$ sudo qvm-prefs --set personal default_user jdoe [jdoe@dom0 ~]$ sudo qvm-prefs --set personal template debian-10 [jdoe@dom0 ~]$ sudo qvm-prefs --set work default_user jdoe [jdoe@dom0 ~]$ sudo qvm-prefs --set work template debian-10
-
Customize Personal/Work Qubes to preference, and create more as desired