qubes-release: update release notes
This commit is contained in:
parent
4173bbbfb5
commit
a97c7a8422
@ -1,67 +1,74 @@
|
||||
Qubes R3.2 release notes
|
||||
Qubes R4.0 release notes
|
||||
========================
|
||||
|
||||
New features since 3.1
|
||||
New features since 3.2
|
||||
----------------------
|
||||
|
||||
* Management Stack extended to support in-VM configuration - [documentation][salt-doc]
|
||||
* PV USB - [documentation][usb]
|
||||
* Dom0 update to Fedora 23 for better hardware support
|
||||
* Kernel 4.4.x
|
||||
* KDE 5 support
|
||||
* Tiling window managers support: awesome, [i3][i3]
|
||||
* More flexible Qubes RPC services - [related ticket][qrexec-argument], [documentation][qrexec-doc]
|
||||
* Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc]
|
||||
* [Admin API][admin-api] allowing strictly controlled managing from non-dom0
|
||||
* All `qvm-*` command-line tools rewritten, some options have changed
|
||||
* Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
|
||||
* [Use HVM by default][hvm-switch] to lower [attack surface on Xen][qsb-24]
|
||||
* Create USB VM by default
|
||||
* [Multiple Disposable VMs templates support][dispvm-ticket]
|
||||
* New [backup format][backup-format] using scrypt key-derivation function
|
||||
* Non-encrypted backups no longer supported
|
||||
* [split VM packages][packages-split], for better support minimal, specialized templates
|
||||
* [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB
|
||||
* [More flexible firewall interface][vm-interface] for ease unikernel integration
|
||||
* Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead
|
||||
* More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip]
|
||||
* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc]
|
||||
* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM
|
||||
* Dom0 update to Fedora 25 for better hardware support
|
||||
* Kernel 4.9.x
|
||||
|
||||
You can get detailed description in [completed github issues][github-release-notes]
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
* Installation image does not fit on DVD, requires either DVD DL, or USB stick (5GB or more)
|
||||
* On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue.
|
||||
|
||||
* Windows Tools: `qvm-block` does not work
|
||||
* List of USB devices may contain device identifiers instead of name
|
||||
|
||||
* Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead.
|
||||
|
||||
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+3.2%22+label%3Abug)
|
||||
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug)
|
||||
|
||||
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
|
||||
|
||||
Downloads
|
||||
---------
|
||||
|
||||
See [Qubes Downloads](/downloads/).
|
||||
See [Qubes Downloads](https://www.qubes-os.org/downloads/).
|
||||
|
||||
Installation instructions
|
||||
-------------------------
|
||||
|
||||
See [Installation Guide](/doc/installation-guide/).
|
||||
See [Installation Guide](https://www.qubes-os.org/doc/installation-guide/).
|
||||
|
||||
Upgrading
|
||||
---------
|
||||
|
||||
### From R3.1
|
||||
There is no in-place upgrade path from earlier Qubes versions. The only
|
||||
supported option to upgrade to Qubes R4.0 is to install it from scratch and use
|
||||
[qubes backup and restore tools][backup] for migrating of all of the user VMs.
|
||||
|
||||
The easiest and safest way to upgrade to Qubes R3.2 is to install it from
|
||||
scratch and use [qubes backup and restore tools](https://www.qubes-os.org/doc/backup-restore/) for
|
||||
migrating of all of the user VMs.
|
||||
|
||||
Users of Qubes R3.1 can also upgrade using [this
|
||||
procedure](https://www.qubes-os.org/doc/upgrade-to-r3.2/).
|
||||
[backup]: https://www.qubes-os.org/doc/backup-restore/
|
||||
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed
|
||||
[custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477
|
||||
[hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143
|
||||
[packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771
|
||||
[hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185
|
||||
[manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132
|
||||
[dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253
|
||||
[qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854
|
||||
[qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865
|
||||
[qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910
|
||||
[qrexec-doc]: https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
|
||||
[vm-interface]: https://www.qubes-os.org/doc/vm-interface/
|
||||
[admin-api]: https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
|
||||
[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
|
||||
[backup-format]: https://www.qubes-os.org/doc/backup-emergency-restore-v4/
|
||||
[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/
|
||||
|
||||
### From R3.0 or earlier
|
||||
|
||||
When upgrading from earlier versions the easiest and safest way is to install
|
||||
it from scratch and use [qubes backup and restore tools](https://www.qubes-os.org/doc/backup-restore/)
|
||||
for migrating of all of the user VMs.
|
||||
|
||||
Alternatively you can [upgrade to R3.1
|
||||
using](/doc/releases/3.1/release-notes/#upgrading) first, then follow the
|
||||
instructions above. This will be time consuming process.
|
||||
|
||||
[salt-doc]: /doc/salt/
|
||||
[usb]: /doc/usb/
|
||||
[i3]: /doc/i3/
|
||||
[qrexec-argument]: https://github.com/QubesOS/qubes-issues/issues/1876
|
||||
[qrexec-doc]: /doc/qrexec3/#service-argument-in-policy
|
||||
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+3.2%22+label%3Arelease-notes+is%3Aclosed
|
||||
|
Loading…
Reference in New Issue
Block a user