-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEE4R0VxtIENXaf+qRWjOE3NSoBmhcFAmDqGVAACgkQjOE3NSoB
 mhcsdg/6A2zT+GvdR0XtnGxyJoI1WDTHrTSt9e0BiVOWorCs1OoL85leR0jvzWgO
 hcXeIxiQK7EnG/QKQC1UMY3gSfL+t8bkaGlXVqcNPFdbVIiHqg/w0KuMaA1pq4mQ
 slGtcZyQjjWLLm8RiL4KxshnqVZWqokQwOg3GwL72bNvVxOGb5nJAI9VIyq9+C6N
 rqE3qUg3CkzVUxjEFh8kNjGGc/SrpWRlXDHr/6+L5BgGKGcXjhy3S480yRNHU5LI
 V/xqkFa+QJaA5F0E+2CIX+fuHSQGl8HrupdXltBRT4VYTibLICGAPsiibpETSrNX
 f0lPXUfJAQINw9MAWEvypuFhCHc21xwV/KHVymGuUsbLVFsSUDFrAimb9zBxvqRC
 MNAnIBcwrvgxBBg2P4XVTLaV6fKe8vGf3fuiV0Rlxpjk/5oq8KKwCc9LeSd1Q+Sq
 hHV72j/yOpXe/FJ10eWMJQLoOGUk/aMu8gAhpjSMBzuDV9kmwp3H2eNNrTrU3hxW
 UAvSaNTCK+klmNTWfiPKDaQCtJFhrBqglzo/yNo0JUBhpP6azZ41ISU9pd9lamc5
 kbBWioRjeb6hQ+aBgU6W2UY+q9S6gyvITpfB+PmjU+HzCUqoxpKKe2epQnnm63Tn
 46eceH/DdlFWZcRP0Zi2aMsdyylwRaGVoRASwb90JKRtfVSEd58=
 =gYJ6
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 
 iQGzBAABCAAdFiEE2igx/unaOtbQrvi8nUlmN9gUhKYFAmDrOeAACgkQnUlmN9gU
 hKYoCwv/RQXtJxSkEz79FaVQHFb2Jw2MK5Gl1W6mjDbOSHvyPJEHH04ZzQnIQKZX
 cYGSTvXoSiqdLwlFi+vGZXqdWPYprOCjDKDz0E+0Mxh4gr6FKY9NNlq335wN1ePg
 AEoHI78OzRHhyUBVJuEpS6MAHl45xkxbC6wsBvx+23/rSit5aNopghtiE7Ln/RlO
 fxfUUrYbA3sMr8TvxSiMSr6KkjFWZU44s5Gu+PH/N/iTmbYbSXmCvMP6j9V1BwKq
 2JDyGXIdqpGztAojiWDNL+b7lV0+Bd1QXh3BnBJ6H9u3TpqNC0nihPeATlV0SJi8
 dG1AB87/dv6NiZo4v5MH+yYIHyYNhte8vvPeN3NqoMHr4M9t3p9SviJc9+sVFDwZ
 X0eBx1aaZT7PDex2EPX9eHIVgBkzuhuMab9l5+zXDril+g/KOGPHwmk11PeEb3mA
 FNuo6HKwxuD0zVzPN0vQmcHG1nIl612sugI9J0bp6ZmaFdlApKa6UP57jE0I8Qg0
 Jz8IC2qg
 =hQrV
 -----END PGP SIGNATURE-----

Merge tag 'adw_6eea2bf3'

Tag for commit 6eea2bf394

# -----BEGIN PGP SIGNATURE-----
#
# iQIzBAABCgAdFiEE4R0VxtIENXaf+qRWjOE3NSoBmhcFAmDqGVAACgkQjOE3NSoB
# mhcsdg/6A2zT+GvdR0XtnGxyJoI1WDTHrTSt9e0BiVOWorCs1OoL85leR0jvzWgO
# hcXeIxiQK7EnG/QKQC1UMY3gSfL+t8bkaGlXVqcNPFdbVIiHqg/w0KuMaA1pq4mQ
# slGtcZyQjjWLLm8RiL4KxshnqVZWqokQwOg3GwL72bNvVxOGb5nJAI9VIyq9+C6N
# rqE3qUg3CkzVUxjEFh8kNjGGc/SrpWRlXDHr/6+L5BgGKGcXjhy3S480yRNHU5LI
# V/xqkFa+QJaA5F0E+2CIX+fuHSQGl8HrupdXltBRT4VYTibLICGAPsiibpETSrNX
# f0lPXUfJAQINw9MAWEvypuFhCHc21xwV/KHVymGuUsbLVFsSUDFrAimb9zBxvqRC
# MNAnIBcwrvgxBBg2P4XVTLaV6fKe8vGf3fuiV0Rlxpjk/5oq8KKwCc9LeSd1Q+Sq
# hHV72j/yOpXe/FJ10eWMJQLoOGUk/aMu8gAhpjSMBzuDV9kmwp3H2eNNrTrU3hxW
# UAvSaNTCK+klmNTWfiPKDaQCtJFhrBqglzo/yNo0JUBhpP6azZ41ISU9pd9lamc5
# kbBWioRjeb6hQ+aBgU6W2UY+q9S6gyvITpfB+PmjU+HzCUqoxpKKe2epQnnm63Tn
# 46eceH/DdlFWZcRP0Zi2aMsdyylwRaGVoRASwb90JKRtfVSEd58=
# =gYJ6
# -----END PGP SIGNATURE-----
# gpg: Signature made 7/10/2021 5:04:00 PM Central Daylight Time
# gpg:                using RSA key E11D15C6D20435769FFAA4568CE137352A019A17
# gpg: Can't check signature: No public key
This commit is contained in:
Dave Smith 2021-07-11 13:35:12 -05:00
commit d4d00ef9d1
188 changed files with 1071 additions and 938 deletions

View file

@ -5,7 +5,7 @@ permalink: /doc/bind-dirs/
redirect_from:
- /en/doc/bind-dirs/
ref: 186
title: How to Make Any File Persistent (bind-dirs)
title: How to make any file persistent (bind-dirs)
---
## What are bind-dirs? ##

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/UserDoc/ConfigFiles/
- /wiki/UserDoc/ConfigFiles/
ref: 180
title: Config Files
title: Config files
---
Qubes-specific VM config files

View file

@ -10,7 +10,7 @@ redirect_from:
- /doc/UserDoc/DispVMCustomization/
- /wiki/UserDoc/DispVMCustomization/
ref: 174
title: Disposable Customization
title: Disposable customization
---
## Introduction

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/gui-configuration/
ref: 184
title: GUI Configuration
title: GUI configuration
---
## Video RAM adjustment for high-resolution displays

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/SoftwareUpdateDom0/
- /wiki/SoftwareUpdateDom0/
ref: 194
title: How to Install Software in Dom0
title: How to install software in dom0
---
**Warning:** Installing software in dom0 is for advanced users only. Doing so

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/installing-contributed-packages/
ref: 225
title: Installing Contributed Packages
title: Installing contributed packages
---
_This page is for users who wish to install contributed packages.

View file

@ -6,7 +6,7 @@ redirect_from:
- /doc/managing-vm-kernel/
- /en/doc/managing-vm-kernel/
ref: 173
title: Managing VM Kernels
title: Managing qube kernels
---
By default, VMs kernels are provided by dom0.

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/MountFromOtherOs/
- /wiki/MountFromOtherOs/
ref: 175
title: How to Mount a Qubes Partition from Another OS
title: How to mount a Qubes partition from another OS
---
When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/QubesService/
- /wiki/QubesService/
ref: 138
title: Qubes Service
title: Qubes service
---
Usage documentation is in the `qvm-service` man page. There are also described predefined services.

View file

@ -10,7 +10,7 @@ redirect_from:
- /wiki/ResizeDiskImage/
- /wiki/ResizeRootDiskImage/
ref: 182
title: Resize Disk Image
title: Resize disk image
---
## Resizing Disk Images

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/rpc-policy/
ref: 178
title: RPC Policies
title: RPC policies
---
This document explains the basics of RPC policies in Qubes.

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/SecondaryStorage/
- /wiki/SecondaryStorage/
ref: 187
title: Secondary Storage
title: Secondary storage
---
Suppose you have a fast but small primary SSD and a large but slow secondary HDD.

View file

@ -9,7 +9,7 @@ redirect_from:
- /wiki/USBVM/
- /doc/sys-usb/
ref: 181
title: USB Qubes
title: USB qubes
---
If during installation you enabled the creation of a USB-qube, your system should be setup already and none of the mentioned steps here should be necessary. (Unless you want to [remove your USB-qube](#removing-a-usb-qube).) If for any reason no USB-qube was created during installation, this guide will show you how to do so.

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/VolumeBackupRevert/
- /wiki/VolumeBackupRevert/
ref: 206
title: Volume Backup and Revert
title: Volume backup and revert
---
With Qubes, it is possible to revert one of a VM's storage volumes to a previous

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/windows/
ref: 129
title: Windows VMs
title: Windows qubes
---
Like any other unmodified OSes, Windows can be installed in Qubes as an [HVM](/doc/standalone-and-hvm/) domain.

View file

@ -6,7 +6,7 @@ permalink: /doc/custom-install/
redirect_from:
- /doc/encryption-config/
ref: 152
title: Custom Installation
title: Custom installation
---
In the present context, "custom installation" refers to things like manual partitioning, setting up LVM and RAID, and manual LUKS encryption configuration.

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /downloads/mirrors/
ref: 148
title: Download Mirrors
title: Download mirrors
---
**Note:** The Qubes OS Project has no control over or access to data collected at these mirrors.

View file

@ -16,7 +16,7 @@ redirect_from:
- /doc/InstallationGuideR3.0rc2/
- /doc/live-usb/
ref: 153
title: Installation Guide
title: Installation guide
---
Welcome to the Qubes OS installation guide! This guide will walk you through
@ -33,7 +33,8 @@ functional and secure.
<b>Warning:</b> Qubes has no control over what happens on your computer
before you install it. No software can provide security if it is installed on
compromised hardware. Do not install Qubes on a computer you don't trust.
See <a href="/doc/install-security/">installation security</a> for more information.
See <a href="/doc/install-security/">installation security</a> for more
information.
</div>
Qubes OS has very specific [system requirements](/doc/system-requirements/). To
@ -44,16 +45,17 @@ significant troubleshooting. You may also find it helpful to consult the
Even on supported hardware, you must ensure that [IOMMU-based
virtualization](https://en.wikipedia.org/wiki/Input%E2%80%93output_memory_management_unit#Virtualization)
is activated in the BIOS. Without it, Qubes OS won't be able to enforce
is activated in the BIOS or UEFI. Without it, Qubes OS won't be able to enforce
isolation. For Intel-based boards, this setting is called Intel Virtualization
for Directed I/O (**Intel VT-d**) and for AMD-based boards, it is called AMD
I/O Virtualization Technology (or simply **AMD-Vi**). This parameter should be
activated in your computer's BIOS, alongside the standard Virtualization
(**Intel VT-x**) and AMD Virtualization (**AMD-V**) extensions. This [external
activated in your computer's BIOS or UEFI, alongside the standard
Virtualization (**Intel VT-x**) and AMD Virtualization (**AMD-V**) extensions.
This [external
guide](https://web.archive.org/web/20200112220913/https://www.intel.in/content/www/in/en/support/articles/000007139/server-products.html)
made for Intel-based boards can help you figure out how to enter your BIOS to
locate and activate those settings. If those settings are not nested under the
Advanced tab, you might find them under the Security tab.
made for Intel-based boards can help you figure out how to enter your BIOS or
UEFI to locate and activate those settings. If those settings are not nested
under the Advanced tab, you might find them under the Security tab.
<div class="alert alert-warning" role="alert">
<i class="fa fa-exclamation-circle"></i>
@ -117,9 +119,9 @@ On Windows, you can use the [Rufus](https://rufus.akeo.ie/) tool to write the
ISO to a USB key. Be sure to select "Write in DD Image mode" *after* selecting
the Qubes ISO:
![Rufus menu](/attachment/doc/rufus-menu.png)
[![Rufus menu](/attachment/doc/rufus-menu.png)](/attachment/doc/rufus-menu.png)
![Rufus DD image mode](/attachment/doc/rufus-dd-image-mode.png)
[![Rufus DD image mode](/attachment/doc/rufus-dd-image-mode.png)](/attachment/doc/rufus-dd-image-mode.png)
## Installation
@ -132,12 +134,59 @@ instructions below.
### Getting to the boot screen
Just after you power on your machine, make the Qubes OS medium available to the
computer by inserting your DVD or USB drive. Shortly after the Power-on
self-test (POST) is completed, you should be greeted with the Qubes OS boot
screen.
"Booting" is the process of starting your computer. When a computer boots up,
it first runs low-level software before the main operating system. Depending on
the computer, this low-level software is may be called the
["BIOS"](https://en.wikipedia.org/wiki/BIOS) or
["UEFI"](https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface).
![Boot screen](/attachment/doc/boot-screen.png)
Since you're installing Qubes OS, you'll need to access your computer's BIOS or
UEFI menu so that you can tell it to boot from the USB drive to which you just
copied the Qubes installer ISO.
To begin, power off your computer and plug the USB drive into a USB port, but
don't press the power button yet. Right after you press the power button,
you'll have to immediately press a specific key to enter the BIOS or UEFI menu.
The key to press varies from brand to brand. `Esc`, `Del`, and `F10` are common
ones. If you're not sure, you can search the web for `<COMPUTER_MODEL> BIOS
key` or `<COMPUTER_MODEL> UEFI key` (replacing `<COMPUTER_MODEL>` with your
specific computer model) or look it up in your computer's manual.
Once you know the key to press, press your computer's power button, then
repeatedly press that key until you've entered your computer's BIOS or UEFI
menu. To give you and idea of what you should be looking for, we've provided a
couple of example photos below.
Here's an example of what the BIOS menu looks like on a ThinkPad T430:
[![ThinkPad T430 BIOS menu](/attachment/doc/Thinkpad-t430-bios-main.jpg)](/attachment/doc/Thinkpad-t430-bios-main.jpg)
And here's an example of what a UEFI menu looks like:
[![UEFI menu](/attachment/doc/uefi.jpeg)](/attachment/doc/uefi.jpeg)
Once you access your computer's BIOS or UEFI menu, you'll want to go to the
"boot menu," which is where you tell your computer which devices to boot from.
The goal is to tell the computer to boot from your USB drive so that you can
run the Qubes installer. If your boot menu lets you select which device to boot
from first, simply select your USB drive. (If you have multiple entries that
all look similar to your USB drive, and you're not sure which one is correct,
one option is just to try each one until it works.) If, on the other hand, your
boot menu presents you with a list of boot devices in order, then you'll want
to move your USB drive to the top so that the Qubes installer runs before
anything else.
Once you're done on the boot menu, save your changes. How you do this depends
on your BIOS or UEFI, but the instructions should be displayed right there on
the screen or in a nearby tab. (If you're not sure whether you've saved your
changes correctly, you can always reboot your computer and go back into the
boot menu to check whether it still reflects your changes.) Once your BIOS or
UEFI is configured the way you want it, reboot your computer. This time, don't
press any special keys. Instead, let the BIOS or UEFI load and let your
computer boot from your USB drive. If you're successful in this step, after a
few seconds you'll be presented with the Qubes installer screen:
[![Boot screen](/attachment/doc/boot-screen.png)](/attachment/doc/boot-screen.png)
<div class="alert alert-info" role="alert">
<i class="fa fa-info-circle"></i>
@ -165,26 +214,20 @@ If **Windows 10** is installed on your machine, you may need to follow specific
instructions to change the boot order. This may require an [advanced
reboot](https://support.microsoft.com/en-us/help/4026206/windows-10-find-safe-mode-and-other-startup-settings).
After the POST, you may have a chance to choose a boot device. You may wish to
select the USB drive or DVD drive as a temporary boot option so that the next
time you boot, your internal storage device will be selected first.
![Boot order](/attachment/doc/boot-order.png)
### The installer home screen
On the first screen, you are asked to select the language that will be used
during the installation process. When you are done, select **Continue**.
![welcome](/attachment/doc/welcome-to-qubes-os-installation-screen.png)
[![welcome](/attachment/doc/welcome-to-qubes-os-installation-screen.png)](/attachment/doc/welcome-to-qubes-os-installation-screen.png)
Prior to the next screen, a compatibility test runs to check whether
IOMMU-virtualization is active or not. If the test fails, a window will pop up.
![Unsupported hardware detected](/attachment/doc/unsupported-hardware-detected.png)
[![Unsupported hardware detected](/attachment/doc/unsupported-hardware-detected.png)](/attachment/doc/unsupported-hardware-detected.png)
Do not panic. It may simply indicate that IOMMU-virtualization hasn't been
activated in the BIOS. Return to the [hardware
activated in the BIOS or UEFI. Return to the [hardware
requirements](#hardware-requirements) section to learn how to activate it. If
the setting is not configured correctly, it means that your hardware won't be
able to leverage some Qubes security features, such as a strict isolation of
@ -211,7 +254,7 @@ The Installation summary screen allows you to change how the system will be
installed and configured, including localization settings. At minimum, you are
required to select the storage device on which Qubes OS will be installed.
![Installation summary not ready](/attachment/doc/installation-summary-not-ready.png)
[![Installation summary not ready](/attachment/doc/installation-summary-not-ready.png)](/attachment/doc/installation-summary-not-ready.png)
### Localization
@ -221,23 +264,23 @@ press "Add". If you want it be your default language, select the "German" entry
in the list and press the arrow button. Click on "Done" in the upper left
corner, and you're ready to go!
![Keyboard layout selection](/attachment/doc/keyboard-layout-selection.png)
[![Keyboard layout selection](/attachment/doc/keyboard-layout-selection.png)](/attachment/doc/keyboard-layout-selection.png)
The process to select a new language is similar to the process to select a new
keyboard layout. Follow the same process in the "Language Support" entry.
![Language support selection](/attachment/doc/language-support-selection.png)
[![Language support selection](/attachment/doc/language-support-selection.png)](/attachment/doc/language-support-selection.png)
You can have as many keyboard layout and languages as you want. Post-install,
you will be able to switch between them and install others.
Don't forget to select your time and date by clicking on the Time & Date entry.
![Time and date](/attachment/doc/time-and-date.png)
[![Time and date](/attachment/doc/time-and-date.png)](/attachment/doc/time-and-date.png)
### Software
![Add-ons](/attachment/doc/add-ons.png)
[![Add-ons](/attachment/doc/add-ons.png)](/attachment/doc/add-ons.png)
On the software selection tab, you can choose which software to install in
Qubes OS. Two options are available:
@ -298,7 +341,7 @@ USB drive, just select the USB device as the target installation device. Bear
in mind that the installation process is likely to take longer than it would on
an internal storage device.
![Select storage device](/attachment/doc/select-storage-device.png)
[![Select storage device](/attachment/doc/select-storage-device.png)](/attachment/doc/select-storage-device.png)
<div class="alert alert-success" role="alert">
<i class="fa fa-check-circle"></i>
@ -317,11 +360,11 @@ finished, press **Done**.
recover it.
</div>
![Select storage passhprase](/attachment/doc/select-storage-passphrase.png)
[![Select storage passhprase](/attachment/doc/select-storage-passphrase.png)](/attachment/doc/select-storage-passphrase.png)
When you're ready, press **Begin Installation**.
![Installation summary ready](/attachment/doc/installation-summary-ready.png)
[![Installation summary ready](/attachment/doc/installation-summary-ready.png)](/attachment/doc/installation-summary-ready.png)
### Create your user account
@ -334,7 +377,7 @@ Select **User Creation** to define a new user with administrator privileges and
a password. Just as for the disk encryption, this password should be complex.
The root account is deactivated and should remain as such.
![Account name and password](/attachment/doc/account-name-and-password.png)
[![Account name and password](/attachment/doc/account-name-and-password.png)](/attachment/doc/account-name-and-password.png)
When the installation is complete, press **Reboot**. Don't forget to remove the
installation medium, or else you may end up seeing the installer boot screen
@ -347,24 +390,24 @@ again.
If the installation was successful, you should now see the GRUB menu during the
boot process.
![Grub boot menu](/attachment/doc/grub-boot-menu.png)
[![Grub boot menu](/attachment/doc/grub-boot-menu.png)](/attachment/doc/grub-boot-menu.png)
Just after this screen, you will be asked to enter your encryption passphrase.
![Unlock storage device screen](/attachment/doc/unlock-storage-device-screen.png)
[![Unlock storage device screen](/attachment/doc/unlock-storage-device-screen.png)](/attachment/doc/unlock-storage-device-screen.png)
### Initial Setup
You're almost done. Before you can start using Qubes OS, some configuration is
needed.
![Initial setup menu](/attachment/doc/initial-setup-menu.png)
[![Initial setup menu](/attachment/doc/initial-setup-menu.png)](/attachment/doc/initial-setup-menu.png)
By default, the installer will create a number of qubes (depending on the
options you selected during the installation process). These are designed to
give you a more ready-to-use environment from the get-go.
![Initial setup menu configuration](/attachment/doc/initial-setup-menu-configuration.png)
[![Initial setup menu configuration](/attachment/doc/initial-setup-menu-configuration.png)](/attachment/doc/initial-setup-menu-configuration.png)
Let's briefly go over the options:
@ -399,11 +442,11 @@ system.
After the configuration is done, you will be greeted by the login screen. Enter
your password and log in.
![Login screen](/attachment/doc/login-screen.png)
[![Login screen](/attachment/doc/login-screen.png)](/attachment/doc/login-screen.png)
Congratulations, you are now ready to use Qubes OS!
![Desktop menu](/attachment/doc/desktop-menu.png)
[![Desktop menu](/attachment/doc/desktop-menu.png)](/attachment/doc/desktop-menu.png)
## Next steps
@ -462,7 +505,7 @@ the other [How-To Guides](/doc/#how-to-guides), and learn about
useful and user friendly. We urge you to read it! It may very well contain
the answers to your questions. (Since the documentation is a community
effort, we'd also greatly appreciate your help in
[improving](/doc/doc-guidelines/) it!)
[improving](/doc/how-to-edit-the-documentation/) it!)
* If issues arise during installation, see the [Installation
Troubleshooting](/doc/installation-troubleshooting) guide.

View file

@ -1,12 +1,14 @@
---
lang: en
layout: doc
permalink: /doc/supported-versions/
permalink: /doc/supported-releases/
redirect_from:
- /doc/supported-versions/
ref: 154
title: Supported Versions
title: Supported releases
---
This page details the level and period of support for versions of operating
This page details the level and period of support for releases of operating
systems in the Qubes ecosystem.
## Qubes OS
@ -27,14 +29,15 @@ are available from our [download mirrors](/downloads/#mirrors).
| Release 4.0 | 2018-03-28 | TBA | Supported |
| Release 4.1 | TBA | TBA | [In development](https://github.com/QubesOS/qubes-issues/issues?utf8=%E2%9C%93&q=is%3Aissue+milestone%3A%22Release+4.1%22+) |
### Note on point releases
### Note on patch releases
Please note that point releases, such as 3.2.1 and 4.0.1, do not designate
separate, new versions of Qubes OS. Rather, they designate their respective
major or minor releases, such as 3.2 and 4.0, inclusive of all package updates
up to a certain point. For example, installing Release 4.0 and fully updating
it results in the same system as installing Release 4.0.1. Therefore, point
releases are not displayed as separate rows on any of the tables on this page.
Please note that patch releases, such as 3.2.1 and 4.0.1, do not designate
separate, new major or minor releases of Qubes OS. Rather, they designate their
respective major or minor releases, such as 3.2 and 4.0, inclusive of all
package updates up to a certain point. For example, installing Release 4.0 and
fully updating it results in the same system as installing Release 4.0.1.
Therefore, patch releases are not displayed as separate rows on any of the
tables on this page.
## Dom0
@ -62,7 +65,7 @@ base distribution in dom0 even after it has reached end-of-life (EOL).
## Templates
The following table shows select [template](/doc/templates/) versions that are
The following table shows select [template](/doc/templates/) releases that are
currently supported. Currently, only [Fedora](/doc/templates/fedora/) and
[Debian](/doc/templates/debian/) templates are officially supported by the
Qubes OS Project. [Whonix](https://www.whonix.org/wiki/Qubes) templates are
@ -112,19 +115,19 @@ partner, the [Whonix Project](https://www.whonix.org/). The Whonix Project has
set its own support policy for Whonix templates in Qubes.
This policy requires Whonix template users to stay reasonably close to the
cutting edge by upgrading to new stable versions of Qubes OS and Whonix
cutting edge by upgrading to new stable releases of Qubes OS and Whonix
templates within a month of their respective releases. To be precise:
* One month after a new stable version of Qubes OS is released, Whonix
templates will no longer be supported on any older version of Qubes OS. This
templates will no longer be supported on any older release of Qubes OS. This
means that users who wish to continue using Whonix templates on Qubes must
always upgrade to the latest stable Qubes OS version within one month of its
always upgrade to the latest stable Qubes OS release within one month of its
release.
* One month after new stable versions of Whonix templates are released, older
versions of Whonix templates will no longer be supported. This means that
releases of Whonix templates will no longer be supported. This means that
users who wish to continue using Whonix templates on Qubes must always
upgrade to the latest stable Whonix template versions within one month of
upgrade to the latest stable Whonix template releases within one month of
their release.
We aim to announce both types of events one month in advance in order to remind

View file

@ -4,7 +4,7 @@ lang: en
layout: doc
permalink: /doc/testing/
ref: 147
title: Testing New Releases and Updates
title: Testing new releases and updates
---
Testing new Qubes OS releases and updates is one of the most helpful ways in

View file

@ -84,7 +84,7 @@ Restore from your backup
We recommend that you restore only your [app qubes](/doc/glossary/#app-qube) and [standalones](/doc/glossary/#standalone) from R3.2.
Using [templates](/doc/templates/) and [service qubes](/doc/glossary/#service-qube) from R3.2 is not fully supported (see [#3514](https://github.com/QubesOS/qubes-issues/issues/3514)).
Instead, we recommend using the templates that were created specifically for R4.0, which you can [customize](/doc/software-update-vm/) according to your needs.
For the template OS versions supported in R4.0, see [Supported Versions](/doc/supported-versions/#templates).
For the template OS versions supported in R4.0, see [supported releases](/doc/supported-releases/#templates).
If the restore tool complains about missing templates, you can select the option to restore the app qubes anyway, then change them afterward to use one of the default R4.0 templates.
Note about additional disp-* qubes created during restore
@ -110,7 +110,7 @@ Upgrade all Template and Standalone VM(s)
We strongly recommend that you update **all** templates and standalones before use so that you have the latest security patches from upstream distributions.
In addition, if the default templates have reached EOL (end-of-life) by the time you install R4.0, we strongly recommend that you upgrade them before use.
Please see [Supported Versions](/doc/supported-versions/) for information on supported OS versions and consult the guides below for specific upgrade instructions:
Please see [supported releases](/doc/supported-releases/) for information on supported OS versions and consult the guides below for specific upgrade instructions:
* [Upgrading Fedora templates](/doc/templates/fedora/#upgrading)
* [Upgrading Debian templates](/doc/templates/debian/#upgrading)

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/upgrade/
ref: 158
title: Upgrade Guides
title: Upgrade guides
---
These guides are for upgrading from one version of Qubes to another.

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/certified-laptops/
- /hardware-certification/
ref: 144
title: Certified Hardware
title: Certified hardware
---
The Qubes OS Project aims to partner with a select few computer vendors to ensure that Qubes users have reliable hardware purchasing options.

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/hardware-testing/
ref: 145
title: Hardware Testing
title: Hardware testing
---
The Qubes developers test Qubes OS on certain hardware models.

View file

@ -9,7 +9,7 @@ redirect_from:
- /wiki/HCLR1/
- /wiki/HCL-R2B2/
ref: 146
title: Hardware Compatibility List (HCL)
title: Hardware compatibility list (HCL)
---
The [HCL](/hcl) is a compilation of reports generated and submitted by users across various Qubes versions about their hardware's compatibility with Qubes.

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/SystemRequirements/
- /wiki/SystemRequirements/
ref: 142
title: System Requirements
title: System requirements
---
<div class="alert alert-warning" role="alert">

View file

@ -6,7 +6,7 @@ redirect_from:
- /en/doc/backup-emergency-restore-v2/
- /doc/BackupEmergencyRestoreV2/
ref: 207
title: Emergency Backup Recovery (v2)
title: Emergency backup recovery (v2)
---
This page describes how to perform emergency restore of backup created on Qubes

View file

@ -6,7 +6,7 @@ redirect_from:
- /en/doc/backup-emergency-restore-v3/
- /doc/BackupEmergencyRestoreV3/
ref: 201
title: Emergency Backup Recovery (v3)
title: Emergency backup recovery (v3)
---
This page describes how to perform an emergency restore of a backup created on

View file

@ -6,7 +6,7 @@ redirect_from:
- /en/doc/backup-emergency-restore-v4/
- /doc/BackupEmergencyRestoreV4/
ref: 192
title: Emergency Backup Recovery (v4)
title: Emergency backup recovery (v4)
---
This page describes how to perform an emergency restore of a backup created on

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/BackupRestore/
- /wiki/BackupRestore/
ref: 199
title: How to Back Up, Restore, and Migrate
title: How to back up, restore, and migrate
---
With Qubes, it's easy and secure to back up and restore your whole system, as

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/CopyingFiles/
- /wiki/CopyingFiles/
ref: 191
title: How to Copy and Move Files
title: How to copy and move files
---
*This page is about copying and moving files.

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/CopyPaste/
- /wiki/CopyPaste/
ref: 196
title: How to Copy and Paste Text
title: How to copy and paste text
---
*This page is about copying and pasting plain text.

View file

@ -9,7 +9,7 @@ redirect_from:
- /doc/CopyToDomZero/
- /wiki/CopyToDomZero/
ref: 198
title: How to Copy from Dom0
title: How to copy from dom0
---
This page covers copying files and clipboard text between [dom0](/doc/glossary/#dom0) and [domUs](/doc/glossary/#domu).

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/FullScreenMode/
- /wiki/FullScreenMode/
ref: 205
title: How to Enter Fullscreen Mode
title: How to enter fullscreen mode
---
What is fullscreen mode?

View file

@ -9,7 +9,7 @@ redirect_from:
- /doc/SoftwareUpdateVM/
- /wiki/SoftwareUpdateVM/
ref: 189
title: How to Install Software
title: How to install software
---
When you wish to install software in Qubes OS, you should generally install it

View file

@ -5,11 +5,11 @@ permalink: /doc/how-to-update/
redirect_from:
- /doc/updating-qubes-os/
ref: 200
title: How to Update
title: How to update
---
*This page is about updating your system while staying on the same [supported
version of Qubes OS](/doc/supported-versions/#qubes-os). If you're instead
version of Qubes OS](/doc/supported-releases/#qubes-os). If you're instead
looking to upgrade from your current version of Qubes OS to a newer version,
see the [Upgrade Guides](/doc/upgrade/).*
@ -87,7 +87,7 @@ as well as OSes used in [templates](/doc/templates/) (and
to receive security updates.** This means that you *must* periodically upgrade
Qubes OS and your templates before they reach EOL. You can always see which
versions of Qubes OS and select templates are supported on the [Supported
Versions](/doc/supported-versions/) page.
Versions](/doc/supported-releases/) page.
In the case of Qubes OS itself, we will make an
[announcement](/news/categories/#releases) when a supported Qubes OS release is
@ -104,8 +104,8 @@ for when each Fedora release reaches EOL. You can always find out when an OS
reaches EOL from the upstream project that maintains it. We also pass along any
EOL notices we receive for official template OSes as a convenience to Qubes
users (see [Supported Versions:
Templates](/doc/supported-versions/#templates)).
Templates](/doc/supported-releases/#templates)).
The one exception to all this is the specific release used for dom0 (not to be
confused with Qubes OS as a whole), which [doesn't have to be
upgraded](/doc/supported-versions/#note-on-dom0-and-eol).
upgraded](/doc/supported-releases/#note-on-dom0-and-eol).

View file

@ -9,7 +9,7 @@ redirect_from:
- /doc/StickMounting/
- /wiki/StickMounting/
ref: 193
title: How to Use Block Storage Devices
title: How to use block storage devices
---
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*

View file

@ -9,7 +9,7 @@ redirect_from:
- /doc/ExternalDeviceMountPoint/
- /wiki/ExternalDeviceMountPoint/
ref: 188
title: How to Use Devices
title: How to use devices
---
This is an overview of device handling in Qubes OS.

View file

@ -11,7 +11,7 @@ redirect_from:
- /doc/DisposableVms/
- /wiki/DisposableVMs/
ref: 203
title: How to Use Disposables
title: How to use disposables
---
A [disposable](/doc/glossary/#disposable) is a lightweight [qube](/doc/glossary/#qube) that can be created quickly and will self-destruct when closed.

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/recording-optical-discs/
- /en/doc/recording-optical-discs/
ref: 204
title: How to Use Optical Discs
title: How to use optical discs
---
Passthrough reading and recording (a.k.a., "burning") are not supported by Xen.

View file

@ -9,7 +9,7 @@ redirect_from:
- /doc/AssigningDevices/
- /wiki/AssigningDevices/
ref: 197
title: How to Use PCI Devices
title: How to use PCI devices
---
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*

View file

@ -6,7 +6,7 @@ redirect_from:
- /doc/usb-devices/
- /doc/usb/
ref: 195
title: How to Use USB Devices
title: How to use USB devices
---
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*

View file

@ -10,7 +10,7 @@ redirect_from:
- /doc/tools/3.2/dom0/
- /doc/tools/3.2/domU/
ref: 141
title: Command-Line Tools
title: Command-line tools
---
Dom0

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/AntiEvilMaid/
- /wiki/AntiEvilMaid/
ref: 164
title: Anti Evil Maid (AEM)
title: Anti evil maid (AEM)
---
Background

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/DataLeaks/
- /wiki/DataLeaks/
ref: 171
title: Data Leaks
title: Data leaks
---
The Role of the Firewall

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/device-handling-security/
ref: 170
title: Device Handling Security
title: Device handling security
---
Any additional ability a VM gains is additional attack surface.

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/u2f-proxy/
ref: 167
title: U2F Proxy
title: U2F proxy
---
The [Qubes U2F Proxy](https://github.com/QubesOS/qubes-app-u2f) is a secure proxy intended to make use of U2F two-factor authentication devices with web browsers without exposing the browser to the full USB stack, not unlike the [USB keyboard and mouse proxies](/doc/usb/) implemented in Qubes.

View file

@ -7,7 +7,7 @@ redirect_from:
- /doc/VMSudo/
- /wiki/VMSudo/
ref: 165
title: Passwordless Root Access in VMs
title: Passwordless root access in qubes
---
Background (`/etc/sudoers.d/qubes` in VM):

View file

@ -10,7 +10,7 @@ redirect_from:
- /doc/DebianTemplateUpgrade8/
- /wiki/DebianTemplateUpgrade8/
ref: 133
title: How to Upgrade a Debian Template In-place
title: How to upgrade a Debian template in-place
---
<div class="alert alert-danger" role="alert">

View file

@ -8,10 +8,10 @@ redirect_from:
- /doc/Templates/Debian/
- /wiki/Templates/Debian/
ref: 134
title: Debian Templates
title: Debian templates
---
The Debian [template](/doc/templates/) is an officially [supported](/doc/supported-versions/#templates) template in Qubes OS.
The Debian [template](/doc/templates/) is an officially [supported](/doc/supported-releases/#templates) template in Qubes OS.
This page is about the standard (or "full") Debian template.
For the minimal version, please see the [Minimal templates](/doc/templates/minimal/) page.
There is also a [Qubes page on the Debian Wiki](https://wiki.debian.org/Qubes).

View file

@ -21,7 +21,7 @@ redirect_from:
- /wiki/FedoraTemplateUpgrade28/
- /doc/template/fedora/upgrade-29-to-30/
ref: 137
title: How to Upgrade a Fedora Template In-place
title: How to upgrade a Fedora template in-place
---
<div class="alert alert-danger" role="alert">
@ -197,7 +197,7 @@ See the [news](/news/) announcement for each specific template release for any i
### End-of-life (EOL) releases
We strongly recommend against using any Fedora release that has reached [end-of-life (EOL)](https://fedoraproject.org/wiki/End_of_life).
Also see [supported versions](/doc/supported-versions/).
Also see [supported releases](/doc/supported-releases/).
## Additional information

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/templates/fedora/
ref: 136
title: Fedora Templates
title: Fedora templates
---
The Fedora [template](/doc/templates/) is the default template in Qubes OS. This page is about the standard (or "full") Fedora template. For the minimal and Xfce versions, please see the [Minimal templates](/doc/templates/minimal/) and [Xfce templates](/doc/templates/xfce/) pages.

View file

@ -6,7 +6,7 @@ redirect_from:
- /doc/reinstall-template/
- /doc/whonix/reinstall/
ref: 128
title: How to Reinstall a Template
title: How to reinstall a template
---
If you suspect your [template](/doc/templates/) is broken, misconfigured, or compromised, you can reinstall any template that was installed from the Qubes repository.

View file

@ -11,7 +11,7 @@ redirect_from:
- /wiki/Templates/FedoraMinimal/
- /doc/templates/debian-minimal/
ref: 132
title: Minimal Templates
title: Minimal templates
---
The minimal [templates](/doc/templates/) are lightweight versions of their
@ -34,7 +34,7 @@ templates, along with some examples of common use cases.
bug report. Instead, please see [Help, Support, Mailing Lists, and
Forum](/support/) for the appropriate place to ask for help. Once you have
learned how to solve your problem, please [contribute what you learned to
the documentation](/doc/doc-guidelines/).
the documentation](/doc/how-to-edit-the-documentation/).
3. The minimal templates are intentionally *minimal*. [Do not ask for your
favorite package to be added to the minimal template by

View file

@ -91,7 +91,7 @@ when you wish to install a fresh template from the Qubes repositories, e.g.:
* When a template version you're using reaches
[end-of-life](/doc/how-to-update/#upgrading-to-avoid-eol).
* When a new version of a template that you wish to use becomes
[supported](/doc/supported-versions/).
[supported](/doc/supported-releases/).
* When you suspect your template has been compromised.
* When you have made modifications to your template that you no longer want.

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/Templates/Xfce/
- /wiki/Templates/Xfce/
ref: 222
title: XFCE Templates
title: Xfce templates
---
If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your qubes,

View file

@ -8,7 +8,7 @@ redirect_from:
- /doc/ManagingAppVmShortcuts/
- /wiki/ManagingAppVmShortcuts/
ref: 202
title: App Menu Shortcut Troubleshooting
title: App menu shortcut troubleshooting
---
For ease of use Qubes aggregates shortcuts to applications that are installed in app qubes and shows them in one application menu (aka "app menu" or "start menu") in dom0.

View file

@ -2,7 +2,7 @@
lang: en
layout: doc
permalink: /doc/autostart-troubleshooting/
title: Autostart Troubleshooting
title: Autostart troubleshooting
---
The following instructions are valid for **Qubes OS R4.0 legacy mode** and

View file

@ -8,7 +8,7 @@ redirect_from:
- /wiki/OutOfmemory/
- /doc/out-of-memory/
ref: 231
title: Disk Troubleshooting
title: Disk troubleshooting
---
## "Out of disk space" error ##

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/gui-troubleshooting/
ref: 233
title: GUI Troubleshooting
title: GUI troubleshooting
---
## Can't click on anything after connecting 4k external display

View file

@ -5,7 +5,7 @@ permalink: /doc/hardware-troubleshooting/
redirect_from:
- /doc/newer-hardware-troubleshooting/
ref: 97
title: Hardware Troubleshooting
title: Hardware troubleshooting
---
## Audio doesn't work / Troubleshooting newer hardware

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/hvm-troubleshooting/
ref: 232
title: HVM Troubleshooting
title: HVM troubleshooting
---
## HVM pauses on boot, followed by kernel error

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/installation-troubleshooting/
ref: 224
title: Installation Troubleshooting
title: Installation troubleshooting
---
## "An unknown error has occurred" error during installation

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/media-troubleshooting/
ref: 235
title: Media Troubleshooting
title: Media troubleshooting
---
## Can't play media videos in a VM due to missing codecs

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/pci-troubleshooting/
ref: 230
title: PCI Troubleshooting
title: PCI troubleshooting
---
## DMA errors

View file

@ -6,7 +6,7 @@ redirect_from:
- /en/doc/wireless-troubleshooting/
- /doc/wireless-troubleshooting/
ref: 94
title: Suspend/Resume Troubleshooting
title: Suspend/resume troubleshooting
---
First check if there are any remarks for similar devices in the [Hardware

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/uefi-troubleshooting/
ref: 177
title: UEFI Troubleshooting
title: UEFI troubleshooting
---
## Successfully installed in legacy mode, but had to change some kernel parameters

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/update-troubleshooting/
ref: 239
title: Update Troubleshooting
title: Update troubleshooting
---
## “Failed to synchronize cache for repo” errors when updating Fedora templates

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/usb-troubleshooting/
ref: 234
title: USB Troubleshooting
title: USB troubleshooting
---
## disp-sys-usb does not start

View file

@ -5,7 +5,7 @@ permalink: /doc/vm-troubleshooting/
redirect_from:
- /doc/remove-vm-manually/
ref: 223
title: VM Troubleshooting
title: Qube troubleshooting
---
## VM Kernel troubleshooting

View file

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/vpn-troubleshooting/
ref: 240
title: VPN Troubleshooting
title: VPN troubleshooting
---
## Tips