qubes-release: update release notes

This commit is contained in:
Marek Marczykowski-Górecki 2017-10-08 20:48:53 +02:00
parent 4173bbbfb5
commit a97c7a8422
No known key found for this signature in database
GPG Key ID: 063938BA42CFA724

View File

@ -1,67 +1,74 @@
Qubes R3.2 release notes Qubes R4.0 release notes
======================== ========================
New features since 3.1 New features since 3.2
---------------------- ----------------------
* Management Stack extended to support in-VM configuration - [documentation][salt-doc] * Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc]
* PV USB - [documentation][usb] * [Admin API][admin-api] allowing strictly controlled managing from non-dom0
* Dom0 update to Fedora 23 for better hardware support * All `qvm-*` command-line tools rewritten, some options have changed
* Kernel 4.4.x * Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
* KDE 5 support * [Use HVM by default][hvm-switch] to lower [attack surface on Xen][qsb-24]
* Tiling window managers support: awesome, [i3][i3] * Create USB VM by default
* More flexible Qubes RPC services - [related ticket][qrexec-argument], [documentation][qrexec-doc] * [Multiple Disposable VMs templates support][dispvm-ticket]
* New [backup format][backup-format] using scrypt key-derivation function
* Non-encrypted backups no longer supported
* [split VM packages][packages-split], for better support minimal, specialized templates
* [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB
* [More flexible firewall interface][vm-interface] for ease unikernel integration
* Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead
* More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip]
* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc]
* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM
* Dom0 update to Fedora 25 for better hardware support
* Kernel 4.9.x
You can get detailed description in [completed github issues][github-release-notes] You can get detailed description in [completed github issues][github-release-notes]
Known issues Known issues
------------ ------------
* Installation image does not fit on DVD, requires either DVD DL, or USB stick (5GB or more) * On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue.
* Windows Tools: `qvm-block` does not work * List of USB devices may contain device identifiers instead of name
* Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead. * For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug)
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+3.2%22+label%3Abug)
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems. It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
Downloads Downloads
--------- ---------
See [Qubes Downloads](/downloads/). See [Qubes Downloads](https://www.qubes-os.org/downloads/).
Installation instructions Installation instructions
------------------------- -------------------------
See [Installation Guide](/doc/installation-guide/). See [Installation Guide](https://www.qubes-os.org/doc/installation-guide/).
Upgrading Upgrading
--------- ---------
### From R3.1 There is no in-place upgrade path from earlier Qubes versions. The only
supported option to upgrade to Qubes R4.0 is to install it from scratch and use
[qubes backup and restore tools][backup] for migrating of all of the user VMs.
The easiest and safest way to upgrade to Qubes R3.2 is to install it from
scratch and use [qubes backup and restore tools](https://www.qubes-os.org/doc/backup-restore/) for
migrating of all of the user VMs.
Users of Qubes R3.1 can also upgrade using [this [backup]: https://www.qubes-os.org/doc/backup-restore/
procedure](https://www.qubes-os.org/doc/upgrade-to-r3.2/). [github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed
[custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477
[hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143
[packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771
[hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185
[manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132
[dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253
[qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854
[qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865
[qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910
[qrexec-doc]: https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
[vm-interface]: https://www.qubes-os.org/doc/vm-interface/
[admin-api]: https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
[backup-format]: https://www.qubes-os.org/doc/backup-emergency-restore-v4/
[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/
### From R3.0 or earlier
When upgrading from earlier versions the easiest and safest way is to install
it from scratch and use [qubes backup and restore tools](https://www.qubes-os.org/doc/backup-restore/)
for migrating of all of the user VMs.
Alternatively you can [upgrade to R3.1
using](/doc/releases/3.1/release-notes/#upgrading) first, then follow the
instructions above. This will be time consuming process.
[salt-doc]: /doc/salt/
[usb]: /doc/usb/
[i3]: /doc/i3/
[qrexec-argument]: https://github.com/QubesOS/qubes-issues/issues/1876
[qrexec-doc]: /doc/qrexec3/#service-argument-in-policy
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+3.2%22+label%3Arelease-notes+is%3Aclosed