Hi all,
I’ve been using Qubes OS for a while and wanted to publish a “paper trail” of how I’m setting up Qubes R4.2.4 on my hardware—both as a reference for people with similar specs (or not) and as a place to collect quality-of-life recommendations from the community.
My main goal is to keep my fedora template as minimal as practical, while still being usable for day-to-day tasks. That same fedora template is used by sys-net, sys-firewall, and sys-usb, so the package list is intentionally biased toward “system qubes need this to function”.
Hardware / software details
| Component | Specification |
|---|---|
| Device | NovaCustom V56 |
| CPU | Intel(R) Core™ Ultra 7 155H |
| Graphics | Intel Corporation Meteor Lake-P |
| RAM | 64 GB |
| Qubes OS | R4.2.4 |
| BIOS | Dasharo (coreboot+UEFI) v1.0.0 |
| Kernel | 6.17.9-1.fc37 |
How I use Qubes day-to-day
I’m keeping my qube layout pretty simple:
- internet
- Template:
fedora-42-minimal - NetVM:
sys-whonix - Purpose: normal browsing with Firefox where I’m not trying to be particularly private.
- programming
- Template:
fedora-42-minimal - NetVM:
sys-firewall - Purpose: development/programming work.
- Note: created, but I haven’t installed any development tooling yet.
- vault (default)
- Template:
fedora-42-minimal - NetVM: n/a
- Purpose: storing accounts in an offline KeePassXC database.
- anon-whonix (default)
- Template:
whonix-workstation-17 - NetVM:
sys-whonix - Purpose: Tor browsing when privacy matters.
Packages installed in fedora-42-minimal
Below is the current packages set I’ve added to the fedora-42-minimal template. I grouped them by why they exist (system integration, sys-net, sys-usb, GUI, etc.) so it’s easier to skim.
Core Qubes integration
qubes-core-agentqubes-core-agent-dom0-updates
NetVM (sys-net)
qubes-core-agent-networkingqubes-core-agent-network-managerNetworkManager-wifinetwork-manager-appletnotification-daemongnome-keyringpolkit@hardware-support
FirewallVM (sys-firewall)
iproute
USB (sys-usb)
qubes-usb-proxyqubes-input-proxy-sender
default-mgmt-dvm
qubes-core-agent-passwordless-rootqubes-mgmt-salt-vm-connector
Audio
pipewire-qubes
GUI / graphics support
xorg-x11-xauthxorg-x11-server-Xorgmesa-dri-driversmesa-libGLmesa-libEGL
Fonts
dejavu-sans-fontsdejavu-serif-fontsdejavu-sans-mono-fonts
Applications
firefoxkeepassxc
What I did after a fresh Qubes install
- Updated all qubes via Qubes Update (dom0)
- Installed fedora-42-minimal via Template Manager (dom0)
- Installed the packages listed above into fedora-42-minimal
- Switched sys-net, default-dvm, and default-mgmt-dvm to fedora-42-minimal
- Set the global default template to fedora-42-minimal
- Removed fedora-41-xfce
- Created internet and programming qubes using fedora-42-minimal
What I’d like feedback on
If you spot anything that’s:
- missing but important (especially for sys-net / sys-firewall / sys-usb reliability),
- unnecessarily heavy for a “minimal but usable” template,
- or just a better way to structure this (e.g., splitting templates, alternative packages, etc.),
I’d really appreciate the suggestions.
Thanks!