2019-06-10 18:15:53 -04:00
|
|
|
---
|
|
|
|
layout: doc
|
2021-09-03 03:08:23 -04:00
|
|
|
title: Qubes OS 4.1 release notes
|
2019-06-10 18:15:53 -04:00
|
|
|
permalink: /doc/releases/4.1/release-notes/
|
|
|
|
---
|
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
## New features and improvements since Qubes 4.0
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
- Optional qubes-remote-support package now available from repositories
|
|
|
|
(strictly opt-in, no package installed by default; no new ports or network
|
|
|
|
connections open by default; requires explicit connection initiation by the
|
|
|
|
user, then requires sharing a code word with the remote party before a
|
|
|
|
connection can be established; see
|
|
|
|
[#6364](https://github.com/QubesOS/qubes-issues/issues/6364) for more
|
|
|
|
information)
|
|
|
|
- Qubes firewall reworked to be more defensive (see
|
|
|
|
[#5540](https://github.com/QubesOS/qubes-issues/issues/5540) for details)
|
2021-10-10 01:00:04 -04:00
|
|
|
- Xen upgraded to version 4.14
|
|
|
|
- Dom0 operating system upgraded to Fedora 32
|
2021-09-03 03:08:23 -04:00
|
|
|
- Default desktop environment upgraded to Xfce 4.14
|
|
|
|
- Upgraded default template releases
|
|
|
|
- Experimental support for GUI running outside of dom0 (hybrid mode GUI domain
|
|
|
|
without real GPU passthrough; see
|
|
|
|
[#5662](https://github.com/QubesOS/qubes-issues/issues/5662) for details)
|
2021-10-10 01:00:04 -04:00
|
|
|
- Experimental support for audio server running outside of dom0 ("Audio domain")
|
2021-09-03 03:08:23 -04:00
|
|
|
- sys-firewall and sys-usb are now disposables by default
|
2021-09-10 18:53:54 -04:00
|
|
|
- UEFI boot now loads GRUB, which in turn loads Xen, making the boot path
|
|
|
|
similar to legacy boot and allowing the user to modify boot parameters or
|
|
|
|
choose an alternate boot menu entry
|
2021-09-03 03:08:23 -04:00
|
|
|
- New qrexec policy format (see
|
|
|
|
[#4370](https://github.com/QubesOS/qubes-issues/issues/4370) for details)
|
|
|
|
- qrexec protocol improvements (see
|
|
|
|
[#4909](https://github.com/QubesOS/qubes-issues/issues/4909) for details)
|
|
|
|
- New qrexec-policy daemon
|
|
|
|
- Simplified using in-qube kernels
|
|
|
|
- Clarified disposable-related terminology and properties
|
|
|
|
- Default kernelopts can now be specified by a kernel package
|
|
|
|
- Improved support for high-resolution displays
|
|
|
|
- Improved notifications when a system drive runs out of free space
|
|
|
|
- Support for different cursor shapes
|
|
|
|
- "Paranoid mode" backup restore option now properly supported using
|
|
|
|
disposables
|
|
|
|
- Users can now choose between Debian and Fedora in the installer
|
2021-09-06 18:49:21 -04:00
|
|
|
- Certain files and applications are now opened in disposables, e.g.,
|
|
|
|
Thunderbird email attachments
|
2021-09-03 03:08:23 -04:00
|
|
|
- New graphical interface for managing testing repository updates
|
|
|
|
- New "Cute Qube" icon family (replaces padlock icons)
|
|
|
|
- Disposable qube types now use the disposable icon
|
|
|
|
- New Template Manager tool for installing, removing, and updating templates
|
|
|
|
(meanwhile, the tool previously known as the "Template Manager," which was
|
|
|
|
for mass template switching, has been integrated into the Qube Manager)
|
|
|
|
- The "file" storage driver has been deprecated in Qubes 4.1 and will be
|
|
|
|
removed in Qubes 4.2
|
|
|
|
- `property-del` event renamed to `property-reset` to avoid confusion
|
|
|
|
- qrexec no longer supports non-executable files in `/etc/qubes-rpc`
|
|
|
|
- qrexec components have been reorganized into the core-qrexec repository
|
|
|
|
- The `qvm-pool` argument parser has been rewritten and improved
|
|
|
|
- Removed the need for the out-of-tree u2mfn kernel module
|
2021-10-10 01:00:04 -04:00
|
|
|
- Qrexec services can now run as a socket server
|
2021-09-03 03:08:23 -04:00
|
|
|
- Improved template distribution mechanism
|
|
|
|
- Now possible to restart qrexec-agent
|
|
|
|
- The term "VM" has largely been replaced by "qube"
|
2021-10-10 01:00:04 -04:00
|
|
|
- GUI daemon is now configured using `qvm-features` tool, `/etc/qubes/guid.conf` file is no longer used
|
|
|
|
- `qvm-run` tool got `--no-shell` option to run a single command without using a shell inside the qube
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
For a full list, including more detailed descriptions, please see
|
2021-10-10 01:00:04 -04:00
|
|
|
[here](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.1%22+label%3A%22release+notes%22+is%3Aclosed).
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
## Known issues
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
For a full list of known 4.1 issues with open bug reports, please see
|
|
|
|
[here](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.1%22+label%3Abug).
|
|
|
|
We strongly recommend [updating Qubes OS](/doc/how-to-update/) immediately
|
|
|
|
after installation in order to apply any and all available bug fixes.
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
## Download
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
See [downloads](/downloads/).
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
## Installation instructions
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
See the [installation guide](/doc/installation-guide/).
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-09-03 03:08:23 -04:00
|
|
|
## Upgrading
|
2019-06-10 18:15:53 -04:00
|
|
|
|
2021-10-09 12:20:25 -04:00
|
|
|
Please see [How to upgrade to Qubes 4.1](/doc/upgrade/4.1/).
|