Official installation instructions: : apt install keepassxc Installation type: included in debian standard Qubes OS release : 4.1 Debian release : 11 Required packages :
policykit-1 : required for YubiKey Challenger Response
xserver-xorg-input-libinput : required for YubiKey static password
qubes-usb-proxy : to connect the USB qube (sys-usb, usb-hub etc.) to this AppVM
UI settings (not mandatory) to make KeePassXC looks like the system theme
qt5-style-plugins
gtk2-engines-murrine
QT_QPA_PLATFORMTHEME=gtk2
Comments : It is not mandatory but highly recommended to install KeePassXC on a network off AppVM (vault, secrets etc.). This AppVM is also mostly used for split-GPG and split-SSH. This setup has been tested with Yubikey, it should also work with other hardware token keys (Challenger Response / hmac-sha1 method).
curl : required to download the gpg key for the apt repository
Remark
There are many ways to download the apt key.
You can either use wget or curl. Both do the download but have a different syntax. It is recommended to use the tool which is used in the official installation instruction.
If you are concerned about your security or if you want to keep the installation as small as possible you can i. e. remove curl right after the gpg download or skip the curl installation and do the gpg download in a different AppVM and afterwards move the gpg key to the template VM.
qubes-core-agent-networking : to allow internet access
qubes-core-agent-nautilus : graphical folder and file view and file operations
nautilus : graphical folder and file view and file operations
zenity : graphical user dialogs
gnome-keyring : gpg key management
fonts-noto-color-emoji : optionally, to ensure emojis are properly displayed
dunst : for desktop notifications
xfce4-notifyd : for desktop notifications
pulseaudio-qubes: Do be able to make audio and video calls
Remark
If you just want to do texting you can skip the pulseaudio-qubes package.
Comments : …
Thunderbird
Qubes OS - minimal installation
Official installation instructions: : Installation type: Qubes OS release : 4.1 Debian release : 11 Required packages :
xxx : yyy
xxx : yyy
Comments : …
Yubikey U2F
Qubes OS - minimal installation
Official installation instructions: : Installation type: Qubes OS release : 4.1 Debian release : 11 Required packages :
xxx : yyy
xxx : yyy
Comments : …
Yubikey Manager
Qubes OS - minimal installation
Official installation instructions: : Installation type: Qubes OS release : 4.1 Debian release : 11 Required packages :
Just a quick note that you could instead download the key in a disposable, then copy/paste it into the template, so curl does not have to be installed in the template itself.
And if someone would ask me to be as picky as possible, once assured about the authenticity of the content of the key whenever that’s possible (in an online qube, of course), after that I’d copy the content to a new file in an offline qube over qrexec, saving it as a key, and then would copy the key from there to a template in order to import it.
I do not know where you have read that I argue against adw’s suggestion. I appreciated his contribution already with a .
Creating a dedicated displ. curl / wget AppVM for apt-key downloads could also be a solution but these are to early to discuss here in details.
First, I would like to fill the table with examples. Afterwards we can fine tune and discuss some improvements and options to get things done… more efficiently or more secure.
Well, i could answer the same way: I do not know where you have read that I wrote that you argued against adw’s suggestion. But i won’t.
Thanks for the rest of your post.
I guess, I found a structure that works. The hidden summary allows to collapse for better search and browsing and the details will only be shown when you click on the arrow.
@adw Who can modify the wiki? Only me and the mods?
Can we open it to other minimal template users to keep it vital (add new programs, improve, correct, verify …)?
I found a lot about the wallet isolation but nothing on a minimal Debian setup.
Let me know when you have a working minimal template (maybe good to start with a non-isolated approach).
Yes, only the main dependencies are installed which is something you would like to do with minimal templates.
If you want to reduce (and customize) the terminal output you can add some additional commands and options. Currently, I am using this for my automated minimal template script:
For debian-11-minimal, I followed this in order to install and enable sys-corridor
and in addition installed iptables in debian-11-minimal.
Such created NamedDisp sys-corridor works: I can ping both IP addresses and names from it, but still no other qube can’t get online through it. sys-whonix’s connecting to tor stuck at 5%