mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
106 lines
6.8 KiB
Markdown
106 lines
6.8 KiB
Markdown
---
|
|
layout: doc
|
|
title: InstallationGuideR2rc1
|
|
permalink: /doc/InstallationGuideR2rc1/
|
|
redirect_from: /wiki/InstallationGuideR2rc1/
|
|
---
|
|
|
|
Installation Guide for Qubes Release 2 rc1
|
|
==========================================
|
|
|
|
1. [Hardware Requirements](#hardware-requirements)
|
|
2. [Download installer ISO](#download-installer-iso)
|
|
3. [Burning the ISO onto a DVD or USB stick](#burning-the-iso-onto-a-dvd-or-usb-stick)
|
|
4. [Upgrading](#upgrading)
|
|
5. [Troubleshooting problems with the installer](#troubleshooting-problems-with-the-installer)
|
|
6. [Known Issues](#known-issues)
|
|
7. [Getting Help](#getting-help)
|
|
|
|
Hardware Requirements
|
|
---------------------
|
|
|
|
Please see the [Hardware Compatibility List](/hcl/) page for more information on required and recommended hardware.
|
|
|
|
Note: We don't recommend installing Qubes in a virtual machine! It will likely not work. Don't send emails asking about it. However, you can install it on an external USB hard drive and run from it, at least for testing (normally such disks are *orders* of magnitude slower than even the slowest internal hard drives).
|
|
|
|
Download installer ISO
|
|
----------------------
|
|
|
|
See [this page](/doc/QubesDownloads/) for ISO downloads. Remember, we have absolutely no control over those servers, and so you should be assuming that they might be compromised, or just be serving a compromised ISOs because their operators decided so, for whatever reason. Always verify the digital signature on the downloaded ISO. See this [page](/doc/VerifyingSignatures/) for more info about how to download and verify our GPG keys, and then verify the downloaded ISO:
|
|
|
|
{% highlight trac-wiki %}
|
|
gpg -v <iso>.asc
|
|
{% endhighlight %}
|
|
|
|
Burning the ISO onto a DVD or USB stick
|
|
---------------------------------------
|
|
|
|
Once you verify this is an authentic ISO, you should burn it on a DVD.
|
|
|
|
If you prefer to use USB as a source for installation, then you just need to copy the ISO onto the USB device, e.g. using dd:
|
|
|
|
{% highlight trac-wiki %}
|
|
dd if=Qubes-R2-rc1-x86_64-DVD.iso of=/dev/sdX
|
|
{% endhighlight %}
|
|
|
|
On windows you can use [this](http://www.chrysocome.net/dd) tool. Example command would be (as Administrator):
|
|
|
|
{% highlight trac-wiki %}
|
|
dd if=Qubes-R2-rc1-x86_64-DVD.iso of=\\?\Device\Harddisk1\Partition0 bs=1M --size --progress
|
|
{% endhighlight %}
|
|
|
|
**Be sure to use a correct device as the target in the dd command above (instead of sdX or Harddisk1)**
|
|
|
|
Before proceeding with the installation, you are encouraged to first read all the information on this page, especially the *Known Issues* paragraph.
|
|
|
|
Then, when finally ready, boot your system from the installer DVD and follow the instructions on screen. The installer is very simple and asks very few questions -- it's actually easier to install Qubes right now than most other Linux distributions!
|
|
|
|
The installer loads Xen right at the beginning, so chances are high that if you can see the installer's graphical screen, Qubes will work on your system :)
|
|
|
|
![qubes-r2-rc1-installer-welcome.png](/attachment/wiki/InstallationGuideR2rc1/qubes-r2-rc1-installer-welcome.png)
|
|
|
|
Upgrading
|
|
---------
|
|
|
|
The easiest and safest way to upgrade to Qubes R2rc1 (especially from older releases) is to install it from scratch and use [qubes backup and restore tools](/doc/BackupRestore/) for migrating of all of the user VMs.
|
|
|
|
Users of R2 beta 3 can upgrade using procedure that has been described [here](/doc/UpgradeToR2rc1/).
|
|
|
|
Note: if the user has custom Template VMs (i.e. other than the default template, e.g. created from it by cloning), or Standalone VMs, then the user should perform manual upgrade from R2B3 to R2rc1, as described under the link given above.
|
|
|
|
Troubleshooting problems with the installer
|
|
-------------------------------------------
|
|
|
|
If the installer fails for some reason, typically because of the graphics card not being correctly supported, it is possible to try booting the installer with a different kernel -- to do that, choose Troubleshooting menu in the Installer Welcome screen, and later choose an option to proceed with one of the kernels provided:
|
|
|
|
![qubes-r2-rc1-installer-troubleshooting.png](/attachment/wiki/InstallationGuideR2rc1/qubes-r2-rc1-installer-troubleshooting.png)
|
|
|
|
The installer ships with 4 different kernels (3.12, 3.11, 3.9 and 3.7) and all those kernel will be installed (regardless of which is selected to run the installer) so it is later always possible to boot the Qubes OS using any of those kernels.
|
|
|
|
Known Issues
|
|
------------
|
|
|
|
- On some graphics cards the Xfce4 Window Manager (one of the two supported Dom0 Windows Managers in Qubes R2, the other being KDE) might behave "strangely", e.g. decorations might not be drawn sometimes. Also the accompanying lightdm login manager might incorrectly display the wallpaper. If you're facing those problems, it's advisable to use the KDE Window Manager and kdm instead of Xfce4 and lightdm (this is default if one chooses the KDE only installation option in the installer).
|
|
|
|
- Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead.
|
|
|
|
- If your GPU is not correctly supported by the Dom0 kernel (e.g. the 3D desktop effects do not run smoothly) then you might experience "heaviness" with Windows 7-based AppVMs. In that case, please solve the problem with your GPU support in Dom0 in the first place (by using a different kernel), or install Qubes OS on a different system.
|
|
|
|
- HVMs with Qubes Tools installed will not have access to the network if firewallvm uses 3.12 kernel (the default). The workaround is to use older (3.11) kernel for firewallvm. You need to [install kernel-qubes-vm-3.11.10 package](/doc/SoftwareUpdateDom0/#how-to-downgrade-a-specific-package), then ensure that it is used for firewallvm (for example using Qubes Manager - advanced tab of VM settings).
|
|
|
|
- Just after installation, applications menu will not contain colorful application icons (new feature), only padlock in VM color. To get colorful icons, you need to start template VM (fedora-20-x64) and call `qvm-sync-appmenus fedora-20-x64` in dom0 terminal. If you have other Template VMs or Standalone VMs, repeat the steps for them too.
|
|
|
|
Getting Help
|
|
------------
|
|
|
|
- **User manuals are [here](/doc/UserDoc/).** (Strongly recommended!)
|
|
|
|
- Developers documentation (normally not needed by users) is [here](/doc/SystemDoc/)
|
|
|
|
- If you don't find answer in the sources given above, write to the *qubes-users* mailing list (you don't need to be subscribed to the list, just send email to the address given below):
|
|
- [https://groups.google.com/group/qubes-users](https://groups.google.com/group/qubes-users)
|
|
- `qubes-users@googlegroups.com`
|
|
|
|
- Please do not write email to individual developers (Marek, Joanna, etc) asking questions about installation or other problems. Please send all such questions to the mailing list.
|
|
|