2017-07-30 22:02:49 -04:00
---
2021-03-13 13:06:18 -05:00
lang: en
2017-07-30 22:02:49 -04:00
layout: doc
permalink: /doc/releases/4.0/release-notes/
2021-03-13 13:06:18 -05:00
ref: 23
2021-03-13 12:42:50 -05:00
title: Qubes R4.0 release notes
2017-07-30 22:02:49 -04:00
---
Qubes R4.0 release notes
========================
New features since 3.2
----------------------
* Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc]
* [Admin API][admin-api] allowing strictly controlled managing from non-dom0
* All `qvm-*` command-line tools rewritten, some options have changed
* Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
2018-03-27 22:10:19 -04:00
* Use [PVH][qsb-37] and [HVM][hvm-switch] by default to [mitigate Meltdown & Spectre][qsb-37] and lower the [attack surface on Xen][qsb-24]
2017-07-30 22:02:49 -04:00
* Create USB VM by default
2018-12-08 22:20:41 -05:00
* [Multiple DisposableVMs templates support][dispvm-ticket]
2017-07-30 22:02:49 -04:00
* New [backup format][backup-format] using scrypt key-derivation function
* Non-encrypted backups no longer supported
* [split VM packages][packages-split], for better support minimal, specialized templates
* [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB
* [More flexible firewall interface][vm-interface] for ease unikernel integration
* Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead
* More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip]
* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc]
* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM
2018-03-27 22:10:19 -04:00
* [New storage subsystem design][storage]
2017-07-30 22:02:49 -04:00
* Dom0 update to Fedora 25 for better hardware support
* Kernel 4.9.x
You can get detailed description in [completed github issues][github-release-notes]
2018-02-08 10:05:55 -05:00
Security Notes
--------------
* PV VMs migrated from 3.2 to 4.0-rc4 or later are automatically set to PVH mode in order to protect against Meltdown (see [QSB #37 ][qsb-37]).
2018-02-10 15:10:47 -05:00
However, PV VMs migrated from any earlier 4.0 release candidate (RC1, RC2, or RC3) are not automatically set to PVH mode.
2018-02-08 10:05:55 -05:00
These must be set manually.
2018-02-07 17:30:44 -05:00
2018-04-25 21:32:47 -04:00
* The following steps may need to be applied in dom0 and Fedora 26 TemplateVMs in order to receive updates (see [#3737]).
2021-03-13 12:03:23 -05:00
2018-04-25 21:32:47 -04:00
Steps for dom0 updates:
2021-03-13 12:03:23 -05:00
2018-04-25 21:32:47 -04:00
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
2. Select `Terminal Emulator` .
3. In the window that opens, enter this command:
2021-03-13 12:03:23 -05:00
2021-03-28 14:58:39 -04:00
```
sudo nano /etc/yum.repos.d/qubes-dom0.repo
```
2021-03-13 12:03:23 -05:00
2018-04-25 21:32:47 -04:00
4. This opens the nano text editor. Change all four instances of `http` to `https` .
5. Press `CTRL+X` , then `Y` , then `ENTER` to save changes and exit.
6. Check for updates normally.
2021-03-13 12:03:23 -05:00
2018-04-25 21:32:47 -04:00
Steps for Fedora 26 TemplateVM updates:
2021-03-13 12:03:23 -05:00
2018-04-25 21:32:47 -04:00
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
2. Select `Template: fedora-26` , then `fedora-26: Terminal` .
3. In the window that opens, enter the command for your version:
2021-03-13 12:03:23 -05:00
2021-03-28 14:58:39 -04:00
```
[Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo
[Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo
```
2021-03-13 12:03:23 -05:00
2018-04-25 21:32:47 -04:00
4. This opens the gedit text editor in a window. Change all four instances of `http` to `https` .
5. Click the "Save" button in the top-right corner of the window.
6. Close the window.
7. Check for updates normally.
8. Shut down the TemplateVM.
2017-07-30 22:02:49 -04:00
Known issues
------------
2018-03-28 14:18:04 -04:00
* Locale using coma as decimal separator [crashes qubesd][locale-bug]. Either install with different locale (English (United States) for example), or manually apply fix explained in that issue.
2018-03-28 11:32:02 -04:00
* In the middle of installation, [keyboard layout reset to US][keyboard-layout-bug]. Be careful what is the current layout while setting default user password (see upper right screen corner).
2017-07-30 22:02:49 -04:00
* On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue.
* List of USB devices may contain device identifiers instead of name
2020-12-07 21:40:52 -05:00
* With R4.0.1, which ships kernel-4.19, you may never reach the anaconda startup and be block on an idle black screen with blinking cursor. You can try to add `plymouth.ignore-serial-consoles` in the grub installer boot menu right after `quiet rhgb` . With legacy mode, you can do it directly when booting the DVD or USB key. In UEFI mode, follow the same procedure described for [disabling ](/doc/uefi-troubleshooting/#installation-freezes-before-displaying-installer ) `nouveau` module (related [solved issue ](https://github.com/QubesOS/qubes-issues/issues/3849 ) in further version of Qubes).
2019-03-14 09:31:09 -04:00
2017-07-30 22:02:49 -04:00
* For other known issues take a look at [our tickets ](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug )
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
Downloads
---------
See [Qubes Downloads ](/downloads/ ).
Installation instructions
-------------------------
See [Installation Guide ](/doc/installation-guide/ ).
Upgrading
---------
There is no in-place upgrade path from earlier Qubes versions. The only
supported option to upgrade to Qubes R4.0 is to install it from scratch and use
[qubes backup and restore tools][backup] for migrating of all of the user VMs.
2018-02-01 18:32:22 -05:00
We also provide [detailed instruction][upgrade-to-r4.0] for this procedure.
2017-07-30 22:02:49 -04:00
[backup]: /doc/backup-restore/
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed
[custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477
[hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143
2017-07-31 16:48:20 -04:00
[packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771
2017-07-30 22:02:49 -04:00
[hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185
2017-08-01 13:41:42 -04:00
[manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132
2017-07-30 22:02:49 -04:00
[dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253
[qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854
[qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865
[qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910
2019-08-23 11:13:40 -04:00
[qrexec-doc]: /doc/qrexec/#specifying-vms-tags-types-targets-etc
2018-03-27 22:10:19 -04:00
[storage]: https://github.com/QubesOS/qubes-issues/issues/1842
2017-07-30 22:02:49 -04:00
[vm-interface]: /doc/vm-interface/
[admin-api]: /news/2017/06/27/qubes-admin-api/
[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
2018-03-27 21:24:17 -04:00
[qsb-37]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-037-2018.txt
2017-07-30 22:02:49 -04:00
[backup-format]: /doc/backup-emergency-restore-v4/
[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/
2018-02-03 15:51:06 -05:00
[upgrade-to-r4.0]: /doc/upgrade-to-r4.0/
2018-03-28 11:32:02 -04:00
[locale-bug]: https://github.com/QubesOS/qubes-issues/issues/3753
[keyboard-layout-bug]: https://github.com/QubesOS/qubes-issues/issues/3352
2018-04-25 21:32:47 -04:00
[#3737]: https://github.com/QubesOS/qubes-issues/issues/3737