From a97c7a84227087292eb19b65b3dad2cb2cc1f39e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= Date: Sun, 8 Oct 2017 20:48:53 +0200 Subject: [PATCH] qubes-release: update release notes --- qubes-release/README.Qubes-Release-Notes | 87 +++++++++++++----------- 1 file changed, 47 insertions(+), 40 deletions(-) diff --git a/qubes-release/README.Qubes-Release-Notes b/qubes-release/README.Qubes-Release-Notes index fe17553..f91f1dd 100644 --- a/qubes-release/README.Qubes-Release-Notes +++ b/qubes-release/README.Qubes-Release-Notes @@ -1,67 +1,74 @@ -Qubes R3.2 release notes +Qubes R4.0 release notes ======================== -New features since 3.1 +New features since 3.2 ---------------------- -* Management Stack extended to support in-VM configuration - [documentation][salt-doc] -* PV USB - [documentation][usb] -* Dom0 update to Fedora 23 for better hardware support -* Kernel 4.4.x -* KDE 5 support -* Tiling window managers support: awesome, [i3][i3] -* More flexible Qubes RPC services - [related ticket][qrexec-argument], [documentation][qrexec-doc] +* Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc] +* [Admin API][admin-api] allowing strictly controlled managing from non-dom0 +* All `qvm-*` command-line tools rewritten, some options have changed +* Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM +* [Use HVM by default][hvm-switch] to lower [attack surface on Xen][qsb-24] +* Create USB VM by default +* [Multiple Disposable VMs templates support][dispvm-ticket] +* New [backup format][backup-format] using scrypt key-derivation function +* Non-encrypted backups no longer supported +* [split VM packages][packages-split], for better support minimal, specialized templates +* [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB +* [More flexible firewall interface][vm-interface] for ease unikernel integration +* Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead +* More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip] +* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc] +* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM +* Dom0 update to Fedora 25 for better hardware support +* Kernel 4.9.x You can get detailed description in [completed github issues][github-release-notes] Known issues ------------ -* Installation image does not fit on DVD, requires either DVD DL, or USB stick (5GB or more) +* On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue. -* Windows Tools: `qvm-block` does not work +* List of USB devices may contain device identifiers instead of name -* Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead. - -* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+3.2%22+label%3Abug) +* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug) It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems. Downloads --------- -See [Qubes Downloads](/downloads/). +See [Qubes Downloads](https://www.qubes-os.org/downloads/). Installation instructions ------------------------- -See [Installation Guide](/doc/installation-guide/). +See [Installation Guide](https://www.qubes-os.org/doc/installation-guide/). Upgrading --------- -### From R3.1 - -The easiest and safest way to upgrade to Qubes R3.2 is to install it from -scratch and use [qubes backup and restore tools](https://www.qubes-os.org/doc/backup-restore/) for -migrating of all of the user VMs. - -Users of Qubes R3.1 can also upgrade using [this -procedure](https://www.qubes-os.org/doc/upgrade-to-r3.2/). - -### From R3.0 or earlier - -When upgrading from earlier versions the easiest and safest way is to install -it from scratch and use [qubes backup and restore tools](https://www.qubes-os.org/doc/backup-restore/) -for migrating of all of the user VMs. - -Alternatively you can [upgrade to R3.1 -using](/doc/releases/3.1/release-notes/#upgrading) first, then follow the -instructions above. This will be time consuming process. +There is no in-place upgrade path from earlier Qubes versions. The only +supported option to upgrade to Qubes R4.0 is to install it from scratch and use +[qubes backup and restore tools][backup] for migrating of all of the user VMs. + + +[backup]: https://www.qubes-os.org/doc/backup-restore/ +[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed +[custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477 +[hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143 +[packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771 +[hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185 +[manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132 +[dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253 +[qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854 +[qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865 +[qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910 +[qrexec-doc]: https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later +[vm-interface]: https://www.qubes-os.org/doc/vm-interface/ +[admin-api]: https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/ +[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt +[backup-format]: https://www.qubes-os.org/doc/backup-emergency-restore-v4/ +[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/ -[salt-doc]: /doc/salt/ -[usb]: /doc/usb/ -[i3]: /doc/i3/ -[qrexec-argument]: https://github.com/QubesOS/qubes-issues/issues/1876 -[qrexec-doc]: /doc/qrexec3/#service-argument-in-policy -[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+3.2%22+label%3Arelease-notes+is%3Aclosed