InstallationGuide changed

Updated for Beta 2
This commit is contained in:
Joanna Rutkowska 2011-09-19 08:46:18 +00:00
parent b2adfd1e99
commit ca74c669c7

View File

@ -4,7 +4,7 @@ title: InstallationGuide
permalink: /wiki/InstallationGuide/
---
Installation Guide (for Qubes Beta 1)
Installation Guide (for Qubes Beta 2)
=====================================
Hardware Requirements
@ -16,6 +16,7 @@ Minimum:
- 64-bit Intel or AMD processor (x86\_64 aka x64 aka AMD64)
- Intel GPU strongly preferred (if you have Nvidia GPU, prepare for some [troubleshooting](/wiki/InstallNvidiaDriver); we haven't tested ATI hardware)
- 10GB of disk (Note that **it is possible to install Qubes on an external USB disk**, so that you can try it without sacrificing your current system. Mind, however, that USB disks are usually SLOW!)
- Fat SSD disk strongly recommended
Additional requirements:
@ -23,15 +24,15 @@ Additional requirements:
If you don't meet the additional criteria, you can still install and use Qubes. It still offers significant security improvement over traditional OSes, because things such as GUI isolation, or kernel protection do not require special hardware.
**Note:** We don't recommend installing Qubes in a virtual machine!
**Note:** We don't recommend installing Qubes in a virtual machine! **Note:** There is a problem with supporting keyboard and mouse on Mac, and so Mac hardware is currently unsupported (patches welcomed!)
Download installer ISO
----------------------
You can download the ISO and the digital signature for the ISO from here:
- [http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta1-x86\_64-DVD.iso](http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta1-x86_64-DVD.iso)
- [http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta1-x86\_64-DVD.iso.asc](http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta1-x86_64-DVD.iso.asc)
- [http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta2-x86\_64-DVD.iso](http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta2-x86_64-DVD.iso)
- [http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta2-x86\_64-DVD.iso.asc](http://s3-eu-west-1.amazonaws.com/qubes-os/iso/Qubes-R1-Beta2-x86_64-DVD.iso.asc)
See this [page](/wiki/VerifyingSignatures) for more info about how to download and verify our GPG keys. Then, verify the downloaded ISO:
@ -39,22 +40,19 @@ See this [page](/wiki/VerifyingSignatures) for more info about how to download a
gpg -v <iso>.asc
```
Burning the ISO onto a DVD or USB stick
---------------------------------------
Once you verify this is an authentic ISO, you should burn it on a DVD. For instructions on how to "burn" it on a USB stick, see [this page](/wiki/UsbInstallation). Before proceeding with the installation, you are encouraged to first read all the information on this page, especially the *Known Issues* paragraph.
Then, when finally ready, boot your system from the installer DVD and follow the instructions on screen. The installer is very simple and asks very few questions -- it's actually easier to install Qubes right now than most other Linux distributions!
The installer loads Xen right at the beginning, so chances are high that if you can see the installer's graphical screen, Qubes will work on your system :)
Migrating from Qubes Alpha 3
----------------------------
Migrating from Qubes Beta 1
---------------------------
If you have Qubes Alpha 3 currently installed on your system, you must reinstall from scratch, as we offer no direct upgrade option in the installer. However, we do offer tools for smooth migration of your AppVMs. In order to do that, please backup your AppVMs using the ```qvm-backup``` tool [as usual](/wiki/BackupRestore) (under Qubes Alpha 3). Then, after you install Qubes Beta 1, you will need to restore them using a special argument that would tell the restore tool to replace the old template name, used on Alpha 3, with the new one that we use on Qubes Beta 1:
``` {.wiki}
qvm-backup-restore /mnt/backup/<backup_dir> --replace-template=linux-x64:fedora-14-x64
```
As you can see we decided to name our default template in Beta 1 in a bit more descriptive way (*fedora-14-x64*), mostly because we might be providing more templates in the future (e.g. based on other Linux distros).
If you have Qubes Beta 1 currently installed on your system, you must reinstall from scratch, as we offer no direct upgrade option in the installer (sorry). However, we do offer tools for smooth migration of your AppVMs. In order to do that, please backup your AppVMs using the ```qvm-backup``` tool [as usual](/wiki/BackupRestore). Then, after you install Qubes Beta 2, you can restore them using ```qvm-backup-restore``` tool that.
Installing Updates
------------------
@ -73,31 +71,8 @@ Known Issues
- KDE taskbar might look ugly. This problem can be easily solved by turning composition on (it's called "Desktop Effects", and can be found in System Settings/Desktop tab).
- Currently there is no support for delegating single USB devices to NetVMs, which likely mean that you will not be able to use your 3G modem. The only option is to delegate the whole USB controller to a NetVM, which, however, might not always be desirable, because of the other devices that are connected to this USB controller.
- KDE might break after resume from suspend-to-RAM -- this is a KDE-specific bug and applies to some GPUs only. The solution is to switch off composition (normally Alt-Shift-F12) before putting the computer into sleep.
- It might take up to 1 minute after you log in for the NetVM's network icon to appear in the tray -- be patient!
- Under some circumstances, when you choose "Use All Space" during installation, the installer will not replace your boot partition but will create another one.
- It might take up to 1 minute for some apps to start from a newly created AppVM. This happens only for the first time.
- Installer doesn't enable ```qubes_setupdvm``` service by default, which prevents Disposable VMs from working correctly. You should enable it manually from the console in Dom0:
``` {.wiki}
sudo bash
chkconfig qubes_setupdvm on
```
- Installer might not support some USB keyboards (\#230). This seems to include all the Mac Book keyboards (most PC laptops have PS2 keyboards and are not affected).
- ~~Virtualized tray icons might look incorrectly directly for some apps. This problem seems to vanish whenever the app refreshes the icon.~~ (Solved after updating to qubes-gui-dom0 1.2.11)
- ~~If using a wired connection in netvm, it might not come up properly after suspend/resume. One may need to manually do ` ifconfig eth0 down; ifconfig eth0 up` in netvm after resume.~~ (Solved after updating to qubes-core-dom0 1.5.26)
- ~~An inter-domain file copy operation might corrupt your files!~~ (Solved after updating to qubes-core-vm 1.5.28, see also [this post for details](https://groups.google.com/group/qubes-devel/browse_thread/thread/ee627f9c0ecb4ec0))
Getting Help
------------
@ -109,33 +84,3 @@ Getting Help
- [http://groups.google.com/group/qubes-devel](http://groups.google.com/group/qubes-devel)
- ```qubes-devel@googlegroups.com```
Enabling VT-d/IOMMU protection
------------------------------
In order to take advantage of NetVM isolation you should enable VT-d/IOMMU (if your system supports it) after you complete the installation. To do that you should add ```iommu=1``` boot option to Xen by editing your ```grub.conf``` file. This can be done in the following way:
1. Open konsole in Dom0 (Start-\>Applications-\>System Tools-\>Terminal)
2. Working now under console, switch to root first:
``` {.wiki}
sudo bash
```
3. Use your favourite editor such as vi or joe to open the /boot/grub/grub.conf and add **```iommu=1```** just after the ```/xen.gz``` string as shown in the example below (some fragments of the file omitted for clarity):
``` {.wiki}
title Qubes (2.6.34.1-14.xenlinux.qubes.x86_64)
root (hd0,0)
kernel /xen.gz iommu=1
module /vmlinuz-2.6.34.1-14.xenlinux.qubes.x86_64 (...)
module /initramfs-2.6.34.1-14.xenlinux.qubes.x86_64.img
```
You should now reboot your system and examine Xen logs to see if VT-d has indeed been enabled (Xen can fail to enable VT-d on your system for various of reasons, lack of proper BIOS support being the most common one). To do that just grep the Xen system log for iommu and vtd strings (you need to open konsole in Dom0 again):
``` {.wiki}
xm dmesg | grep -i iommu
xm dmesg | grep -i vtd
```
Yes, we will make this procedure more user friendly in the next Beta :)