You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Debian comes with a broken <code>/etc/apt/sources.list</code> file by default.
314
320
315
321
* Debian default <code>/etc/apt/sources.list</code> comes with a broken <code>deb cd-rom:</code> line.
316
322
* Debian default <code>/etc/apt/sources.list</code> comes with <code>http</code> instead of <code>https</code> by default.
317
323
* Debian default <code>/etc/apt/sources.list</code> has only the <code>debian-security</code> repository enabled by default but not the <code>debian</code> repository. As a result, no packages are installable until the user figures out how to add that line to APT sources.
318
324
319
-
When using Debian Installer (not Calamares), installing while not using a network mirror, Debian default <code>/etc/apt/sources.list</code> comes empty except fora broken <code>deb cd-rom:</code> line.
325
+
When using Debian Installer (D-I) (not Calamares), installing while not using a network mirror, Debian default <code>/etc/apt/sources.list</code> comes empty except for a broken <code>deb cd-rom:</code> line.
320
326
</ref>
321
327
* <code>sudo</code> pre-configured by default. <ref>
322
-
On Debian, the user must run after a new installation <code>su</code> followed by <code>/usr/bin/adduser user sudo</code> and reboot (or re-login) to be able to user <code>sudo</code>.
328
+
On Debian, when installing using D-I (Debian Installer), when setting a root password during installation, the user must run after a new installation <code>su</code> followed by <code>/usr/bin/adduser user sudo</code> and reboot (or re-login) to be able to user <code>sudo</code>.
323
329
</ref>
324
330
* <code>bash-completion</code> installed by default so for example by typing <code>sudo apt install libreo</code> followed by the TAB key a word completion to <code>libreoffice</code> will be suggested.
325
331
* <code>zsh</code> installed as default shell that supports TAB word completion, colorful output, etc.
@@ -330,7 +336,9 @@ On Debian, the user must run after a new installation <code>su</code> followed b
330
336
* Package [https://github.com/{{project_name_short}}/vm-config-dist shared folder help] simplifies shared folder set up for virtual machines. <ref>
331
337
It currently only assists with using shared folders in VirtualBox. Other virtualizers -- such as KVM shared folder setup -- might be possible in the future.
332
338
</ref>
333
-
* Package [https://github.com/{{project_name_short}}/usability-misc usabilty-misc] is installed by default, increasing flexibility and providing numerous, miscellaneous usability features. <ref>Such as creating default folders, allowing commands to be run without a password, simplifying the running of OpenVPN as an unpriveleged user, and much more.</ref>
339
+
* Package [https://github.com/{{project_name_short}}/usability-misc usabilty-misc] is installed by default, increasing flexibility and providing numerous, miscellaneous usability features. <ref>
340
+
Such as creating default folders, allowing commands to be run without a password, simplifying the running of OpenVPN as an unpriveleged user, and much more.
Copy file name to clipboardExpand all lines: Dev%2FDefault_Browser.mw
+9Lines changed: 9 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1074,6 +1074,15 @@ Cons:
1074
1074
* Still in early development, not generally usable and very likely has security issues in its current state of development.
1075
1075
* May be usable in the future, once mature and packaged for Debian. Will likely require multiple years more development before it is secure and usable.
There are a number of projects that provide customized settings for Firefox. It is unlikely that most of these projects will be useful to Kicksecure, since they may enable settings that are potentially dangerous or disable settings that users need enabled, thus adding extra risk and support burden to the project. They are listed together here since they are not really web browsers, simply different ways of configuring existing browsers.
Copy file name to clipboardExpand all lines: Dev%2Fboot.mw
+35-29Lines changed: 35 additions & 29 deletions
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,40 @@ Boot Process Related Development Notes
17
17
* See also [[Verified Boot]] chapter [[Verified_Boot#Keys|Keys]].
18
18
19
19
= GRUB =
20
+
== GRUB Slow Upstream ==
21
+
{{quotation
22
+
|quote=We all know and love GRUB2. It is a good boot loader. It is also big, complex, rich, massive and tends to move slow on the development side.
23
+
|context=openSUSE blog post [https://news.opensuse.org/2023/12/20/systemd-fde/ Systemd-boot and Full Disk Encryption in Tumbleweed and MicroOS] talking about their motivation to add support for systemd-boot
24
+
}}
25
+
26
+
{{quotation
27
+
|quote=The openSUSE package for this boot loader contains more than 200 patches. Some of those patches are there for the last 5, 6 … 10 years. That is both an indication of the talent of the maintainers, but also can signal an issue in how slow the upstream contribution process can be.
28
+
|context=openSUSE blog post [https://news.opensuse.org/2023/12/20/systemd-fde/ Systemd-boot and Full Disk Encryption in Tumbleweed and MicroOS] talking about their motivation to add support for systemd-boot
29
+
}}
30
+
31
+
== GRUB Feature Richness ==
32
+
{{quotation
33
+
|quote=GRUB2 supports all the relevant systems, including mainframes, arm or powerpc. Multiple types of file systems, including btrfs or NTFS. It contains a full network stack, an USB stack, a terminal, can be scripted … In some sense, it is almost a mini OS by itself.
34
+
|context=openSUSE blog post [https://news.opensuse.org/2023/12/20/systemd-fde/ Systemd-boot and Full Disk Encryption in Tumbleweed and MicroOS] talking about their motivation to add support for systemd-boot
35
+
}}
36
+
37
+
== GRUB Full Disk Encryption ==
38
+
{{quotation
39
+
|quote=Kicksecure doesn’t use GRUB to unlock encrypted disks. This is because we use Debian’s GRUB, and Debian’s GRUB only has very bad LUKS support (only supports LUKS1, can’t handle non-US keyboard layouts, ugly, slow, only gives you one shot to unlock the drive, and then the Linux kernel has to unlock the drive again once it boots). Instead, we use an unencrypted /boot partition and let the initramfs handle decrypt. This lets us use more secure encryption, provides a better user interface for decryption, works with multiple keyboard layouts, and works faster.
* [https://forums.kicksecure.com/t/iso-change-to-unencrypted-boot-if-using-full-disk-encryption/420 ISO: Change to unencrypted /boot if using Full Disk Encryption]
46
+
47
+
== GRUB Upstream Contributions ==
48
+
* [https://lists.gnu.org/archive/html/grub-devel/2025-04/msg00000.html Determining when paging is and isn't enabled in GRUB]
* [https://lists.gnu.org/archive/html/grub-devel/2025-04/msg00247.html PATCH 0/1 - Add Xen command line parsing]
52
+
* [https://lists.gnu.org/archive/html/grub-devel/2025-04/msg00248.html PATCH 1/1 - Add Xen command line parsing]
53
+
20
54
== grub-install command responsibility ==
21
55
22
56
Who should run the <code>grub-install</code> command? SystemBuildTools or Debian package maintainer scripts?
@@ -119,7 +153,7 @@ Related Debian pull requests:
119
153
=== grub-efi and grub-pc ===
120
154
* Debian for grub-pc with grub-efi co-install-ability feature request: [https://bugs-devel.debian.org/cgi-bin/bugreport.cgi?bug=904062 Allow concurrent installation of grub-pc and grub-efi-amd64]
121
155
122
-
== Bootloader-related Kicksecure and Whonix packages ==
156
+
= Bootloader-related Kicksecure and Whonix packages =
123
157
The following packages directly affect the bootloader or bootloader configuration used by Kicksecure.
124
158
125
159
=== live-config-dist ===
@@ -226,34 +260,6 @@ derivative-maker sets a custom GRUB configuration for Kicksecure live ISOs. This
226
260
* live-theme/theme.txt
227
261
** Provides dynamic parts of the GRUB theme. Specifies the colors and positions of UI elements, and includes a progress bar indicating how much time the user has to react before GRUB automatically boots the first boot mode listed in the ISO's boot menu.
228
262
229
-
= GRUB Upstream =
230
-
== GRUB Slow Upstream ==
231
-
{{quotation
232
-
|quote=We all know and love GRUB2. It is a good boot loader. It is also big, complex, rich, massive and tends to move slow on the development side.
233
-
|context=openSUSE blog post [https://news.opensuse.org/2023/12/20/systemd-fde/ Systemd-boot and Full Disk Encryption in Tumbleweed and MicroOS] talking about their motivation to add support for systemd-boot
234
-
}}
235
-
236
-
{{quotation
237
-
|quote=The openSUSE package for this boot loader contains more than 200 patches. Some of those patches are there for the last 5, 6 … 10 years. That is both an indication of the talent of the maintainers, but also can signal an issue in how slow the upstream contribution process can be.
238
-
|context=openSUSE blog post [https://news.opensuse.org/2023/12/20/systemd-fde/ Systemd-boot and Full Disk Encryption in Tumbleweed and MicroOS] talking about their motivation to add support for systemd-boot
239
-
}}
240
-
241
-
== GRUB Feature Richness ==
242
-
{{quotation
243
-
|quote=GRUB2 supports all the relevant systems, including mainframes, arm or powerpc. Multiple types of file systems, including btrfs or NTFS. It contains a full network stack, an USB stack, a terminal, can be scripted … In some sense, it is almost a mini OS by itself.
244
-
|context=openSUSE blog post [https://news.opensuse.org/2023/12/20/systemd-fde/ Systemd-boot and Full Disk Encryption in Tumbleweed and MicroOS] talking about their motivation to add support for systemd-boot
245
-
}}
246
-
247
-
== GRUB Full Disk Encryption ==
248
-
{{quotation
249
-
|quote=Kicksecure doesn’t use GRUB to unlock encrypted disks. This is because we use Debian’s GRUB, and Debian’s GRUB only has very bad LUKS support (only supports LUKS1, can’t handle non-US keyboard layouts, ugly, slow, only gives you one shot to unlock the drive, and then the Linux kernel has to unlock the drive again once it boots). Instead, we use an unencrypted /boot partition and let the initramfs handle decrypt. This lets us use more secure encryption, provides a better user interface for decryption, works with multiple keyboard layouts, and works faster.
* [https://forums.kicksecure.com/t/iso-change-to-unencrypted-boot-if-using-full-disk-encryption/420 ISO: Change to unencrypted /boot if using Full Disk Encryption]
256
-
257
263
= Calamares =
258
264
* [https://github.com/calamares/calamares/pull/2422 Prototype implementation of BIOS+UEFI boot support]
* Aaron: Left Daniel some feedback on things that didn't work. If not fixed in a week (so around April 4th), our plan is to merge as-is and fix bugs after.
719
717
720
718
= ARCHIVED =
719
+
== grub skin - change text ==
720
+
* Please change from <code>Choose an operating system to start</code> to <code>Choose boot mode</code>.
Copy file name to clipboardExpand all lines: Dev%2Fuser-sysmaint-split.mw
+59-2Lines changed: 59 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -130,8 +130,6 @@ This is documented on the [[unrestricted admin mode]] wiki page.
130
130
131
131
= Boot Modes Considered Too Unimportant to Be Added to GRUB Default Boot Menu =
132
132
133
-
'''Currently, we don’t have theoretical boot modes that haven't been implemented.'''
134
-
135
133
'''DIY Methods to Include Other Entries in the GRUB Boot Menu'''
136
134
137
135
{{IconSet|h2|A}} Files in the <code>/etc/grub.d/</code> folder could add entries, but they could be non-executable by default. To opt-in, users could run <code>sudo chmod +x /etc/grub.d/somenumber_name-of-boot-mode</code>.
@@ -349,6 +347,65 @@ Future work ideas:
349
347
* '''Warning popups:'''
350
348
** When starting Firefox in sysmaint mode, a popup could warn users to avoid browsing the internet unless absolutely necessary.
351
349
350
+
= Boot Menu Names and Ordering =
351
+
=== Mode First Ordering ===
352
+
Initial implementation.
353
+
354
+
<pre>
355
+
PERSISTENT Mode | USER Session | For daily activities
356
+
LIVE Mode | USER Session | For disposable use
357
+
PERSISTENT Mode | SYSMAINT Session | For maintenance tasks
358
+
LIVE Mode | SYSMAINT Session | For maintenance testing
[https://www.kicksecure.com/w/index.php?title=Dev/user-sysmaint-split&oldid=87353 Older concept version still containing "SUPERADMIN" and "SECUREADMIN".]
0 commit comments