--- layout: wiki title: SoftwareUpdateDom0 permalink: /wiki/SoftwareUpdateDom0/ --- Updating software in Dom0 ========================= Why would one want to update software in Dom0? ---------------------------------------------- Normally there should be few reasons for updating software in Dom0. This is because there is no networking in Dom0, which means that even if some bugs will be discovered e.g. in the Dom0 Desktop Manager, this really is not a problem for Qubes, because all the 3rd party software running in Dom0 is not accessible from VMs or network in any way. Some exceptions to the above include: Qubes GUI daemon, Xen store daemon, and disk back-ends (we plan move the disk backends to untrusted domain in Qubes 2.0). Of course we believe this software is reasonably secure and we hope it will not need patching. However, we anticipate some other situations when updating Dom0 software might be required: - Updating drivers/libs for new hardware support - Correcting non-security related bugs (e.g. new buttons for qubes manager) - Adding new features (e.g. GUI backup tool) How to do that? --------------- Currently Dom0 update procedure requires command line -- in the future we will make it available from the GUI manager. First, start the console in Dom0, and switch to root. Then attach Dom0 to the netvm, and run yum update: ``` {.wiki} $ sudo bash # qvm-dom0-networking up # yum update ``` Note that by default there is only one repository enabled: this is qubes-dom0-current.you When finished, detach Dom0 from the network: ``` {.wiki} # qvm-dom0-networking down ``` In the future we will modify this update procedure so that it won't require attaching networking to Dom0. Most likely we will use a moderately-trusted system service VM to perform the download of the update rpm via network, and later copy this file to Dom0 using our secure file copy mechanism. Dom0 will then verify the signature on the RPM, and assuming it was ok, will install the rpm.