qubes-doc/installing/upgrade/upgrade-to-r4.0.md

121 lines
6.5 KiB
Markdown
Raw Normal View History

2018-01-25 08:45:36 -05:00
---
layout: doc
title: Upgrading to R4.0
permalink: /doc/upgrade-to-r4.0/
redirect_from:
- /en/doc/upgrade-to-r4.0/
- /doc/UpgradeToR4.0/
- /doc/UpgradeToR4.0rc1/
---
Upgrading Qubes R3.2 to R4.0
============================
2018-01-25 08:45:36 -05:00
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**
Current Qubes R3.2 systems cannot be upgraded in-place to R4.0.
A full backup, clean 4.0 install, and restore is required.
This can be done by following the procedure below.
2018-01-25 08:45:36 -05:00
Preparation
-----------
1. Go to [downloads](/downloads/) and prepare a USB drive or DVD with the R4.0 installer.
2018-01-25 08:45:36 -05:00
2. If this is your only computer, and you do not have a R3.2 installer, you should also create a separate R3.2 USB drive or DVD installer at this time.
2018-01-25 08:45:36 -05:00
Backup R3.2
-----------
2018-01-25 08:45:36 -05:00
1. Attach the backup drive you will be using.
These steps assume it is a USB drive.
2018-01-25 08:45:36 -05:00
2. Shutdown all non-essential VMs.
Typically, `sys-usb` will be the only VM you need to leave running.
2018-01-25 08:45:36 -05:00
3. Follow the **Creating a Backup** section in the [Backup, Restoration, and Migration](/doc/backup-restore/) guide to back up **all VMs** except sys-usb.
2018-01-25 08:45:36 -05:00
6. Verify the integrity of your backup by following the **Restoring from a Backup** section in the [Backup, Restoration, and Migration](/doc/backup-restore/) guide and:
2018-01-25 08:45:36 -05:00
* If you're using Qubes Manager, check the box under "Restore options" that says, "Verify backup integrity, do not restore the data."
* If you're using `qvm-backup-restore` from the command-line, use the `--verify-only` option.
2018-01-25 08:45:36 -05:00
7. If your backup verifies successfully, proceed to the next section.
If it does not, **stop**.
Go back and repeat the backup steps, review the documentation or search the qubes-users mailing list, or ask for assistance on the [qubes-users mailing list](/support/#qubes-users) or IRC.
2018-01-25 08:45:36 -05:00
Install R4.0
------------
2018-01-25 08:45:36 -05:00
This section provides general guidance on installing R4.0 as part of migrating from R3.2.
For further details, please see the [installation guide](/doc/installation-guide/).
2018-01-25 08:45:36 -05:00
1. Shut down R3.2 and boot the R4.0 installer.
2018-01-25 08:45:36 -05:00
2. Follow the installation prompts until you get to the drive selection screen.
Choose **I want to make additional space available**.
Select the box at the top of the list in order to select all partitions.
**This will erase the entire drive**, so do this only if Qubes is the only OS installed on your computer.
If you did not successfully verify your backup in the previous section, cancel the installation, and go back to do that now.
2018-01-25 08:45:36 -05:00
3. Complete the R4.0 installation.
Ask for assistance on the [qubes-users mailing list](/support/#qubes-users) if you run into trouble.
2018-01-25 08:45:36 -05:00
4. If you are unable to successfully install R4.0 on your system, all is not lost.
Use the R3.2 installer to reinstall R3.2, then restore from your backup.
2018-01-25 08:45:36 -05:00
Restore from your backup
------------------------
2018-01-25 08:45:36 -05:00
1. Welcome to Qubes R4.0!
The first thing you might notice is that **Qubes Manager** is not started by default.
We won't need it for the next step, but we will be starting it later.
2018-01-25 08:45:36 -05:00
2. Since patches may have been released since your installation image was created, update Qubes R4.0 by going to the dom0 command line (**Qubes menu -> Terminal Emulator**) then running:
2018-01-25 08:45:36 -05:00
sudo qubes-dom0-update
2018-01-25 08:45:36 -05:00
3. Reboot dom0.
2018-01-25 08:45:36 -05:00
4. Go to **Qubes menu -> System Tools -> Qubes Manager** to start it.
2018-01-25 08:45:36 -05:00
5. Follow the **Restoring from a Backup** section in the [Backup, Restoration, and Migration](/doc/backup-restore/) guide.
We recommend that you restore only your [TemplateBasedVMs](/doc/glossary/#templatebasedvm) and [StandaloneVMs](/doc/glossary/#standalonevm) from R3.2.
Using [TemplateVMs](/doc/templates/) and [SystemVMs](/doc/glossary/#systemvm) from R3.2 is not fully supported (see [#3514](https://github.com/QubesOS/qubes-issues/issues/3514)).
Instead, we recommend using the TemplateVMs that were created specifically for R4.0, which you can [customize](/doc/software-update-vm/) according to your needs.
For the TemplateVM OS versions supported in R4.0, see [Supported Versions](/doc/supported-versions/#templatevms).
If the restore tool complains about missing templates, you can select the option to restore the AppVMs anyway, then change them afterward to use one of the default R4.0 templates.
2018-01-25 08:45:36 -05:00
Note about additional disp-\* qubes created during restore
----------------------------------------------------------
One of differences between R3.2 and R4.0 is handling Disposable qubes.
In R3.2, Disposable qube inherited its network settings (netvm, firewall rules) from the calling qube.
In R4.0 it is no longer the case.
Instead, in R4.0 it's possible to create multiple DVM templates and choose which one should be used by each qube.
It's even possible to use different DVM templates for different operations from the same qube.
This allows much more flexibility, as not only network settings can be differentiated, but all the qubes properties (including template, memory settings etc).
Restoring a backup from R3.2 preserve the old behavior by creating separate DVM template for each network-providing VM (and also `disp-no-netvm` for network-isolated qubes).
Then, each restored qubes are configured to use appropriate DVM template, according to its `netvm` or `dispvm_netvm` property from R3.2.
This way, DispVMs started on R4.0 by qubes restored from R3.2 backup have the same netvm settings as they had on R3.2.
If this behavior is undesired for you, or you want to configure it differently, you can remove those `disp-*` DVM templates.
But to do so, you first need make sure they are not set for any `default_dispvm` property anywhere. Both Qubes Manager and `qvm-remove` tool will show you where such DVM template is used, so you can go there and change the setting.
2018-01-25 08:45:36 -05:00
Upgrade all Template and Standalone VM(s)
-----------------------------------------
2018-01-25 08:45:36 -05:00
We strongly recommend that you update **all** TemplateVMs and StandaloneVMs before use so that you have the latest security patches from upstream distributions.
In addition, if the default templates have reached EOL (end-of-life) by the time you install R4.0, we strongly recommend that you upgrade them before use.
Please see [Supported Versions](/doc/supported-versions/) for information on supported OS versions and consult the guides below for specific upgrade instructions:
2018-01-25 08:45:36 -05:00
* [Upgrading Fedora TemplateVMs](/doc/templates/fedora/#upgrading)
* [Upgrading Debian TemplateVMs](/doc/templates/debian/#upgrading)
2018-09-12 21:27:28 -04:00
* [Updating Whonix TemplateVMs](https://www.whonix.org/wiki/Qubes/Update)
2018-01-25 08:45:36 -05:00