Commit Graph

3378 Commits

Author SHA1 Message Date
Lunar
7551dc21ce Updated info on Jessie and old releases 2017-06-29 23:05:02 -05:00
Lunar
3680b51e80 Removed info on Debian Stretch being in 'testing' 2017-06-29 22:40:54 -05:00
Andrew David Wong
4b3b9a47ec
Add missing links 2017-06-29 20:58:28 -05:00
Andrew David Wong
309c7af753
Update Package Contributions (QubesOS/qubes-issues#2876) 2017-06-29 20:54:07 -05:00
Andrew David Wong
ae69f225cf
Add section on maintainers and versions
QubesOS/qubes-issues#2876
2017-06-29 19:33:52 -05:00
Andrew David Wong
c02e7ce9c2
Merge branch 'rustybird-ff' 2017-06-29 19:27:29 -05:00
Rusty Bird
002104a340
fast-forwarded -> fast-forwardable
QubesOS/qubes-issues#2876
2017-06-29 08:14:37 +00:00
Andrew David Wong
ec56b8c2b5
Create Package Contributions page
QubesOS/qubes-issues#2876
2017-06-28 20:48:24 -05:00
Marek Marczykowski-Górecki
3923a4c3f6
admin-api: document backup profile 2017-06-27 16:01:57 +02:00
Andrew David Wong
f23bca5bff
Remove old link 2017-06-26 22:12:55 -05:00
Andrew David Wong
c591cabd82
Merge mgmt-design into admin-api 2017-06-26 22:02:29 -05:00
Andrew David Wong
aa5149c19d
Merge branch 'SamuelHentschel-master' 2017-06-26 21:43:13 -05:00
Andrew David Wong
e75d4295c2
Merge branch 'master' of https://github.com/SamuelHentschel/qubes-doc into SamuelHentschel-master 2017-06-26 21:42:56 -05:00
SamuelHentschel
054032ebfa Update "Configuring A VM's System from Dom0" title 2017-06-26 00:21:41 -04:00
Marek Marczykowski-Górecki
9cd7cee04f
admin-api: remove separate methods for firewall policy
QubesOS/qubes-issues#2869
2017-06-26 06:05:31 +02:00
Marek Marczykowski-Górecki
7756a5353a
Add Qubes 4.0 policy keywords 2017-06-25 13:02:48 +02:00
Marek Marczykowski-Górecki
caf8dfb91a
admin-api: fix default= definition in property.Get
The actual value used there is `True` or `False`
2017-06-25 01:31:38 +02:00
Marek Marczykowski-Górecki
b3b91c8baf
admin-api: clone operation with a token
This way complete operation require policy approval for both source and
destination volumes
2017-06-25 01:31:38 +02:00
marmarta
3c6401c7e2 Update qubes-builder.md
grammar mistakes
2017-06-23 14:33:38 +02:00
Andrew David Wong
9862d245ba
Add QSB 31 2017-06-20 09:00:57 -05:00
Marek Marczykowski-Górecki
b160399f9b
admin-api: add volume.Clone
It is needed for VM clone operation: we have volume.Import, but not
volume.Export - at least not yet. And doing export+import would be very
inefficient, especially on smart storage pools (like LVM).
2017-06-19 00:16:24 +02:00
Marek Marczykowski-Górecki
3d6870656b
admin-api: remove clone operation
Can be achieved using other operations.
2017-06-19 00:08:07 +02:00
Wojtek Porczyk
a43d14339e admin-api: fix html ents 2017-06-14 11:26:07 +02:00
Wojtek Porczyk
feeeb6da8d admin-api: description of the tags 2017-06-14 11:22:52 +02:00
Joshua Boat
1cb8f11565 Update to add StandaloneVM Tutorial 2017-06-10 18:34:29 +01:00
Andrew David Wong
6c009f83cb
Fix link 2017-06-07 20:38:11 -05:00
Andrew David Wong
58e4ea30cc
Update links 2017-06-07 20:21:44 -05:00
Andrew David Wong
a4f52f47b7
Merge certified-laptops and hardware-certification into hardware 2017-06-07 20:20:59 -05:00
Andrew David Wong
066bd62dc7
Add link to Qubes Core Admin Client documentation
Also: Update link to Qubes Core Admin documentation for uniformity.
2017-06-05 20:36:59 -05:00
Piotr PAWLICKI
4409214247 Kali Linux TemplateVM
Partial rewrite of the page, mainly the last Kali TemplateVM section to:
- add missing steps in TemplateVM creation (ex: trimming to optimize disk space usage)
- correct inconsistent file names across subsections, which made the instruction nonfunctional "as-it"
- match shell commands with textual instructions
- remove unused, duplicate or wrongly formatted links /references
- enhance consistency in commands and style used within the same section
- enhance consistency in commands and style with other pages (ex: Qubes' Basics and Common Tasks, Fedora 23 to Fedora 24 upgrade, etc.)
- better follow Qubes Glossary and Documentation Guidelines
- have a hierarchical succession of headers / section titles
2017-06-05 19:06:11 +02:00
Andrew David Wong
7e262449ff
Add Canary 12 2017-06-05 08:41:27 -05:00
Andrew David Wong
f100abe67b
Add link to qubes-core-admin documentation
QubesOS/qubes-issues#2834
2017-06-04 00:01:29 -05:00
Andrew David Wong
9543d86a5b
Merge branch 'Zrubi-master' 2017-06-03 23:43:14 -05:00
Andrew David Wong
fa83a252ef
Merge branch 'master' of https://github.com/Zrubi/qubes-doc into Zrubi-master 2017-06-03 23:42:49 -05:00
Andrew David Wong
d48ca10635
Add warning about QubesOS/qubes-issues#2835 2017-06-01 19:44:09 -05:00
Wojtek Porczyk
17b9dc3bb3 sphinx boilerplate for dev.qubes-os.org 2017-05-30 17:23:30 +02:00
Andrew David Wong
af2c0e1bc7
Merge branch 'tasket-patch-13' 2017-05-25 22:53:03 -05:00
Zrubi
c33f514396 Update vm-interface.md 2017-05-25 11:09:44 +02:00
Zrubi
d380133d19 Update vm-interface.md
Added the "dpi" Deep Packet Inspection option for supporting L7 firewall rules
2017-05-25 11:07:49 +02:00
tasket
846854b940 Cover new package options
Per https://github.com/QubesOS/qubes-issues/issues/2527
2017-05-24 22:45:00 -04:00
Andrew David Wong
1c01026478
Merge branch 'bbrr3332-master' 2017-05-23 00:38:29 -05:00
Andrew David Wong
06aecf8300
Merge branch 'master' of https://github.com/bbrr3332/qubes-doc into bbrr3332-master 2017-05-23 00:38:13 -05:00
Marek Marczykowski-Górecki
ecbfeb2e73
admin-api update
1. Drop separate admin.vm.microphone.* calls - lets use
admin.vm.device.mic.* for this. Yes, this means microphone cannot
be attached to multiple VMs at the same time (which is regression vs
Qubes 3.2). But this is a good thing from security point of view.

2. Drop admin.backup.Restore - use standard Admin API methods
(admin.vm.Create, admin.vm.volume.Import etc)

Cc: @kalkin
2017-05-23 00:10:10 +02:00
bbrr3332
781cf2122a Correct error in postfix setup guide 2017-05-22 21:24:37 +01:00
Dean V
f572f00826 Edit + Disagreement
Did some prosaic editing:
* Removed unnecessary parentheses
* Shortened long sentences
* Wording changes.
* Removed restatements of earlier sentences
Also, this document made the following error about cooperative covert leaking channels in Qubes OS:

> It is likely that the only way to **fully protect against leaks of type 1** and 2 is to either pause or shut down all other VMs while performing sensitive operations in the target VM(s) (such as key generation).

This is wrong. Closing the other VMs while performing such important activities does nothing to stop leaks in type 1, assuming you turn the other VMs back on at some point. The (presumably compromised) AppVM in question can easily write the information it needs to leak down until the other Qubes come back online. Inserted a new sentence clarifying this.
2017-05-17 19:54:15 -07:00
Marek Marczykowski-Górecki
fa79d40d66
admin-api: fix misplaced comment about device assignment options 2017-05-15 14:25:05 +02:00
Andrew David Wong
41360bc84b
Merge branch 'fortasse-master'
Fixes QubesOS/qubes-issues#2807
2017-05-14 14:25:14 -05:00
Andrew David Wong
af60a8c86f
Merge branch 'master' of https://github.com/fortasse/qubes-doc into fortasse-master 2017-05-14 14:25:05 -05:00
Andrew David Wong
6d91a06a8f
Add point about checking against different keyservers 2017-05-14 14:14:30 -05:00
Andrew David Wong
da55b6f9ab
Add PGP Web of Trust to list of QMSK verification ideas 2017-05-14 13:28:22 -05:00