512af4bf76
This is needed for more reliable updates over tor, and also gives some more privacy. Fixes QubesOS/qubes-issues#3737 |
||
---|---|---|
.. | ||
fedora-updates.repo.in | ||
fedora.repo.in | ||
GPL | ||
qubes-dom0-dist-upgrade.spec | ||
qubes-dom0.repo.in | ||
qubes-release.spec | ||
qubes-templates.repo | ||
README.Qubes-Release-Notes | ||
RPM-GPG-KEY-fedora-25-primary | ||
RPM-GPG-KEY-qubes-3-primary | ||
RPM-GPG-KEY-qubes-3-templates-community | ||
RPM-GPG-KEY-qubes-3-unstable | ||
RPM-GPG-KEY-qubes-3.1-primary | ||
RPM-GPG-KEY-qubes-3.1-templates-community | ||
RPM-GPG-KEY-qubes-3.1-unstable | ||
RPM-GPG-KEY-qubes-3.2-primary | ||
RPM-GPG-KEY-qubes-3.2-templates-community | ||
RPM-GPG-KEY-qubes-3.2-unstable | ||
RPM-GPG-KEY-qubes-4-primary | ||
RPM-GPG-KEY-qubes-4-templates-community | ||
RPM-GPG-KEY-qubes-4-unstable | ||
RPM-GPG-KEY-qubes-4.0-primary | ||
RPM-GPG-KEY-qubes-4.0-templates-community | ||
RPM-GPG-KEY-qubes-4.0-unstable |
Qubes R4.0 release notes ======================== New features since 3.2 ---------------------- * Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc] * [Admin API][admin-api] allowing strictly controlled managing from non-dom0 * All `qvm-*` command-line tools rewritten, some options have changed * Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM * Use [PVH][qsb-37] and [HVM][hvm-switch] by default to [mitigate Meltdown & Spectre][qsb-37] and lower the [attack surface on Xen][qsb-24] * Create USB VM by default * [Multiple Disposable VMs templates support][dispvm-ticket] * New [backup format][backup-format] using scrypt key-derivation function * Non-encrypted backups no longer supported * [split VM packages][packages-split], for better support minimal, specialized templates * [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB * [More flexible firewall interface][vm-interface] for ease unikernel integration * Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead * More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip] * More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc] * [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM * Dom0 update to Fedora 25 for better hardware support * Kernel 4.14.x You can get detailed description in [completed github issues][github-release-notes] Known issues ------------ * On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue. * List of USB devices may contain device identifiers instead of name * For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug) It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems. Downloads --------- See [Qubes Downloads](https://www.qubes-os.org/downloads/). Installation instructions ------------------------- See [Installation Guide](https://www.qubes-os.org/doc/installation-guide/). Upgrading --------- There is no in-place upgrade path from earlier Qubes versions. The only supported option to upgrade to Qubes R4.0 is to install it from scratch and use [qubes backup and restore tools][backup] for migrating of all of the user VMs. [backup]: https://www.qubes-os.org/doc/backup-restore/ [github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed [custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477 [hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143 [packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771 [hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185 [manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132 [dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253 [qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854 [qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865 [qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910 [qrexec-doc]: https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later [vm-interface]: https://www.qubes-os.org/doc/vm-interface/ [admin-api]: https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/ [qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt [qsb-37]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-037-2018.txt [backup-format]: https://www.qubes-os.org/doc/backup-emergency-restore-v4/ [api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/