I have for a long time wanted to use kicksecure17 as my sys-net, sys-firewall and VPN qubes.
I will start with asking for help regarding changing the template of default-dvm which is the template for sys-net, sys-firewall and sys-usb to kicksecure17, from currently fedora41.
How I have done it and what issues have come up:
In Qube Manager, I simply right clicked the default-dvm qube and selected kicksecure17 in the template list.
sys-usb worked out the box, for sys-net I installed macchanger inside the kicksecure17 profile, and in order for macchanger to work, although I enabled auto mac randomize for any network cable inserted, it did not work. I had to manually use the following commands:
sudo ip link set ens6 down
sudo macchanger -m 00:11:22:33:44:55 ens6
sudo ip link set ens6 up
sudo systemctl restart networking
After these commands, the mac did change, and my connection was up, however nothing in the browser from sys-net or sys-firewall was loading. But my router local ip 192.168.0.1 was working. Eventually my VPN qube connected as well and everything was working fine.
The issue appeared when I tried to restart or shutdown, or even kill the sys-net qube, which was working fine until recently, it started lagging and not responding to my commands and this error would appear
cannot connect to qrexec agent for 60 seconds
Eventually I managed to kill it and changed the template back to fedora41, everything working the same, but my question is:
- What can be causing the qrexec to not work in kicksecure after making all the mac/networking restart changes
- Any way I could automate the maccchanger random mac/every qube restart, or at least have it display the little computer icon in the taskbar like fedora is doing and right click and set the mac from there, without having to go through dom0 xterm for sys-net qube every time it gets restarted
- Is it normal to now allow anything to load in browsers outside internal IP’s? I don’t mind it, I just want to double check that it is expected behavior.
That is all I would need from sys-net, sys-firewall and sys-usb. They should work easy with no issues with kicksecure17 and thus hardening against any external attacks.
After this is figured out, my next goal is to migrate my mullvad vpn qube to kicksecure as well, would this be very challenging to have a state of the art mullvad qube over kicksecure with everything blocked and only allowing traffic over vpn without any leaks?
Thank you