qubes-installer-qubes-os/qubes-release
Marek Marczykowski-Górecki d323fdb456
qubes-release 4.0-0.4
2017-11-21 05:15:48 +01:00
..
fedora-updates.repo.in
fedora.repo.in
GPL
qubes-dom0-dist-upgrade.spec
qubes-dom0.repo.in qubes-release: add security-testing repository definition 2015-07-13 15:24:58 +02:00
qubes-release.spec qubes-release 4.0-0.4 2017-11-21 05:15:48 +01:00
qubes-templates.repo Enable yum repos 2015-03-27 01:23:24 +01:00
README.Qubes-Release-Notes qubes-release: update release notes 2017-10-08 20:49:29 +02:00
RPM-GPG-KEY-fedora-25-primary qubes-release: add Fedora 25 key 2017-02-14 02:35:47 +01:00
RPM-GPG-KEY-qubes-3-primary qubes-release: update keys for R3 release 2014-11-20 16:40:37 +01:00
RPM-GPG-KEY-qubes-3-templates-community qubes-release: update keys for R3 release 2014-11-20 16:40:37 +01:00
RPM-GPG-KEY-qubes-3-unstable qubes-release: update keys for R3 release 2014-11-20 16:40:37 +01:00
RPM-GPG-KEY-qubes-3.1-primary qubes-release 3.1-0.1 2015-09-29 16:37:26 +02:00
RPM-GPG-KEY-qubes-3.1-templates-community qubes-release 3.1-0.1 2015-09-29 16:37:26 +02:00
RPM-GPG-KEY-qubes-3.1-unstable qubes-release 3.1-0.1 2015-09-29 16:37:26 +02:00
RPM-GPG-KEY-qubes-3.2-primary qubes-release: add symlinks for R3.2 keys 2016-05-25 10:37:36 +02:00
RPM-GPG-KEY-qubes-3.2-templates-community qubes-release: add symlinks for R3.2 keys 2016-05-25 10:37:36 +02:00
RPM-GPG-KEY-qubes-3.2-unstable qubes-release: add symlinks for R3.2 keys 2016-05-25 10:37:36 +02:00
RPM-GPG-KEY-qubes-4-primary qubes-release: Add Qubes 4.x release signing key 2017-04-08 13:48:37 +02:00
RPM-GPG-KEY-qubes-4-templates-community qubes-release: Add Qubes 4.0 community templates signing key 2017-09-14 11:44:32 +02:00
RPM-GPG-KEY-qubes-4-unstable qubes-release: add R4 unstable key 2017-11-03 22:08:57 +01:00
RPM-GPG-KEY-qubes-4.0-primary qubes-release: Add Qubes 4.x release signing key 2017-04-08 13:48:37 +02:00
RPM-GPG-KEY-qubes-4.0-templates-community qubes-release: Add Qubes 4.0 community templates signing key 2017-09-14 11:44:32 +02:00
RPM-GPG-KEY-qubes-4.0-unstable qubes-release: add R4 unstable key 2017-11-03 22:08:57 +01:00

Qubes R4.0 release notes
========================

New features since 3.2
----------------------

* Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc]
* [Admin API][admin-api] allowing strictly controlled managing from non-dom0
* All `qvm-*` command-line tools rewritten, some options have changed
* Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
* [Use HVM by default][hvm-switch] to lower [attack surface on Xen][qsb-24]
* Create USB VM by default
* [Multiple Disposable VMs templates support][dispvm-ticket]
* New [backup format][backup-format] using scrypt key-derivation function
* Non-encrypted backups no longer supported
* [split VM packages][packages-split], for better support minimal, specialized templates
* [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB
* [More flexible firewall interface][vm-interface] for ease unikernel integration
* Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead
* More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip]
* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc]
* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM
* Dom0 update to Fedora 25 for better hardware support
* Kernel 4.9.x

You can get detailed description in [completed github issues][github-release-notes]

Known issues
------------

* On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue.

* List of USB devices may contain device identifiers instead of name

* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug)

It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.

Downloads
---------

See [Qubes Downloads](https://www.qubes-os.org/downloads/).

Installation instructions
-------------------------

See [Installation Guide](https://www.qubes-os.org/doc/installation-guide/).

Upgrading
---------

There is no in-place upgrade path from earlier Qubes versions. The only
supported option to upgrade to Qubes R4.0 is to install it from scratch and use
[qubes backup and restore tools][backup] for migrating of all of the user VMs.


[backup]: https://www.qubes-os.org/doc/backup-restore/
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed
[custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477
[hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143
[packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771
[hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185
[manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132
[dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253
[qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854
[qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865
[qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910
[qrexec-doc]: https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
[vm-interface]: https://www.qubes-os.org/doc/vm-interface/
[admin-api]: https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
[backup-format]: https://www.qubes-os.org/doc/backup-emergency-restore-v4/
[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/