qubes-doc/user/templates/windows/windows-qubes-4-1.rst
Marek Marczykowski-Górecki b93b3c571e
Convert to RST
2024-05-21 20:59:46 +02:00

564 lines
22 KiB
ReStructuredText
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

========================================
How to install Windows qubes in Qubes OS
========================================
You can install Windows just like any other OS as an
:doc:`HVM </user/advanced-topics/standalones-and-hvms>`, if you just want something simple and you can live
without some features. This works for Windows XP, 7, 8.1, 10 and 11.
Please keep in mind that Qubes Windows Tools are not supported on
Windows XP.
You will get an environment in which basic functions are supported, but
integration into the Qubes environment is rather restricted. The
following functions will work right out of the box:
- display (1440x900 or 1280x1024 are a nice fit onto FHD hw display)
- keyboard (incl. correct mapping), pointing device
- network (emulated Realtek NIC)
- audio output and input (available even without QWT installation if
``qvm-features audio-model`` is set as ``ich6``)
For better integration, a set of drivers and services, called Qubes
Windows Tools (QWT) is available. Installation of these tools is
straightforward and is described in a :doc:`separate document </user/templates/windows/qubes-windows-tools-4-1>`. QWTs main
features are:
- copy/paste between qubes
- copy files between qubes
- attaching USB devices to the qube
- attaching block devices to the qube (XEN PV disk driver must be
installed)
- automatically set up networking
- automatically set up time/clock synchronization
- XEN PV drivers (some of them optional)
- optional user migration from ``C:`` to the qubes private volume (to
be able use the qubes as a TemplateVM).
- seamless mode (Windows 7 only for now)
- propagating keyboard layout ?
Importing a Windows VM from an earlier version of Qubes
-------------------------------------------------------
- Importing from R3.2 or earlier will not work, because Qubes R3.2 has
the old stubdomain by default and this is preserved over backup and
restore (as Windows otherwise wont boot.
- Importing from R4.0 should work, see :doc:`Migrate backups of Windows VMs created under Qubes R4.0 to R4.1 </user/templates/windows/migrate-to-4-1>`.
Windows VM installation
-----------------------
**qvm-create-windows-qube**: An unofficial, third-party tool for
automating this process is available
`here <https://github.com/elliotkillick/qvm-create-windows-qube>`__.
(Please note that this tool has not been reviewed by the Qubes OS
Project. Use it at your own risk.)
However, if you are an expert or want to do it manually you may continue
below.
**Notes:** - The instructions may work on other versions than Windows 7,
8.1, 10 and 11 x64 but havent been tested. - Qubes Windows Tools (QWT)
only supports Windows 7, 8.1, 10 and 11 x64. For installation, see
:doc:`Qubes Windows Tools </user/templates/windows/qubes-windows-tools-4-1>`.
**Provide installation media**
Have the Windows ISO image (preferrably the 64-bit version) downloaded
in some qube.
Windows ISOs can be downloaded directly from Microsoft (eg.
`here <https://www.microsoft.com/en-us/software-download/windows10ISO>`__
for Win10), or selected and downloaded via the `Windows Media Creation Tool <https://go.microsoft.com/fwlink/?LinkId=691209>`__. You should,
however, regard the downloaded image to be untrustworthy, since there is
no reliable way to check that the download was not somehow compromised
(see the discussion in issue `Simplify Qubes Windows Tools Installation for R4.1 #7240 <https://github.com/QubesOS/qubes-issues/issues/7240>`__).
Unofficial “debloated” ISOs from projects like reviOS 18 or ameliorated
10 can be found on the net, although obviously you should consider them
even “unsafer” than MS provided ISOs. Alternatively, one could download
an official ISO and run scripts/apply patches before installation. Some
of the “tweaks” might end up being too much depending on the qubes
planned usage though (eg. no appx functionality in ameliorated windows -
so the installation of Windows Store apps is impossible, even with
powershell).
**Create Windows VM**
Create a VM named WindowsNew in :doc:`HVM </user/advanced-topics/standalones-and-hvms>` mode (Xens current
PVH limitations precludes from using PVH). This can be done in either of
two ways:
- Using Qube Manager
In order to create the new qube, select the command Qube -> New Qube
in the Qube Manager:
.. code:: bash
- Name: ``WindowsNew``, Color: ``orange`` (for a standalone qubes,
SYSTEM MESSAGE for: /home/user/qubes-doc-rst2/user/templates/windows/windows-qubes-4-1.rst:105: (ERROR/3) Unexpected indentation.
Unexpected indentation.
``black`` for a template)
- Type: ``StandaloneVM (fully persistent)`` or
``TemplateVM (template home, persistent root)``
- Template: ``(none)``
- Networking: ``sys-firewall (default)``
- Launch settings after creation: check
- Click “OK”.
- Settings:
- Basic:
- System storage: 60.0+ GB
- Advanced:
- Include in memory balancing: uncheck
- Initial memory: 4096+ MB
- Kernel: ``(none)``
- Mode: ``HVM``
- Click “Apply”.
After creation, set ``qvm-prefs WindowsNew qrexec_timeout 7200`` via
CLI in a dom0 terminal.
- Using CLI in a dom0 terminal
- This can also be done via the following CLI commands in dom0, for
a standalone qube: ~~~ qvm-create class StandaloneVM label
orange property virt_mode=hvm WindowsNew ~~~ and for a template:
~~~ qvm-create class TemplateVM label black property
virt_mode=hvm WindowsNew ~~~
- After creation, set the following parameters via CLI in a dom0
terminal: ~~~ qvm-volume extend WindowsNew:root 60g qvm-prefs
WindowsNew memory 4096 qvm-prefs WindowsNew maxmem 4096 qvm-prefs
WindowsNew kernel qvm-prefs WindowsNew qrexec_timeout 7200 ~~~
These parameters are set for the following reasons:
- A typical Windows installation requires between 25GB up to 60GB of
disk space depending on the version (Home/Professional/…). Windows
updates also end up using significant space. So, extend the root
volume from the default 10GB to at least 60GB (note: it is
straightforward to increase the root volume size after Windows is
installed: simply extend the volume again in dom0 and then extend the
system partition with Windowss disk manager).
- Setting memory to 4096MB may work in most cases, but using 6144MB (or
even 8192MB) may reduce the likelihood of crashes during
installation, especially for Windows 10 or 11. This is important as
Windows qubes have to be created without memory balancing, as
requested by the parameter settings described above.
- The Windows installer requires a significant amount of memory or
else the VM will crash with such errors: ~~~
/var/log/xen/console/hypervisor.log:
p2m_pod_demand_populate: Dom120 out of PoD memory! (tot=102411
ents=921600 dom120) (XEN) domain_crash called from p2m-pod.c:1218
(XEN) Domain 120 (vcpu#0) crashed on cpu#3: ~~~ So, increase the VMs
memory to 4096MB (memory = maxmem because we dont use memory
balancing), or 6144MB / 8192MB, as recommended above.
- Disable direct boot so that the VM will go through the standard
cdrom/HDD boot sequence. This is done by setting the qubes kernel to
an empty value.
- After creating the new qube, increase the VMs ``qrexec_timeout``: in
case you happen to get a BSOD or a similar crash in the VM, utilities
like ``chkdsk`` wont complete on restart before ``qrexec_timeout``
automatically halts the VM. That can really put the VM in a totally
unrecoverable state, whereas with higher ``qrexec_timeout``,
``chkdsk`` or the appropriate utility has plenty of time to fix the
VM. Note that Qubes Windows Tools also require a larger timeout to
move the user profiles to the private volume the first time the VM
reboots after the tools installation. So set the parameter via the
following CLI command from a dom0 terminal, because the Qube manager
does not support this setting:
**Start Windows VM**
- The VM is now ready to be started; the best practice is to use an
installation ISO :ref:`located in a VM <user/advanced-topics/standalones-and-hvms:installing an os in an hvm>`. Now
boot the newly created qube from the Windows installation media. In
the Qubes Manager:
- Select the new qube, in this example “WindowsNew”.
- Switch to the “Advanced” tab.
- Click “Boot from CDROM”:
- “from file in qube”:
- Select the qube that has the ISO.
- Select ISO by clicking “…”.
- Click “OK” to boot into the windows installer.
This can also be done via the following CLI command in dom0 (assuming
that the Windows installer ISO is stored in the directory
``/home/user/`` in the AppVM ``untrusted``): ~~~ qvm-start
cdrom=untrusted:/home/user/windows_install.iso WindowsNew ~~~
- Install Windows on the new VM
- At the first start, the Windows logo may be briefly shown, and
then a black screen with a blinking cursor may appear and stay for
a few minutes. This is normal, and you just have to wait until the
installation window appears.
- The installation will run mostly as usual, but automatic reboots
will halt the qube - just restart it again and again until the
installation is finished. Note, however, that for these restarts,
the parameter ``--cdrom`` **must not** be used, because otherwise
the installation will start all over.
- Install on first disk.
- **For Windows 11 only**: Windows 11 requires TPM 2.0, which
currently is not supported from Xen. In Order to install Windows
11 under Qubes, the check for TPM in the Windows installer has to
be disabled:
- When you start setup without having a TPM, you get an error
message like *This PC does not fulfil the minimum requirements for Windows 11*.
- Typing Shift-F10 then opens a console window.
- Here you type ``regedit`` to start the registry editor.
- There you position to the key
``HKEY_LOCAL_MACHINE\SYSTEM\Setup``.
- Now create the key ``LabConfig``.
- Position to this key and create 3 DWORD values called
``BypassTPMCheck``, ``BypassSecureBootCheck`` and
``BypassRAMCheck`` and set each value to ``1``.
- Close the registry editor and console windows.
- In the setup window, hit the left arrow in the left upper
corner. You will then return into the setup, which will
continue normally and install Windows 11 without TPM 2.0.
:warning:
**Caution:** This temporary patch may cease to work if
SYSTEM MESSAGE for: /home/user/qubes-doc-rst2/user/templates/windows/windows-qubes-4-1.rst:249: (WARNING/2) Field list ends without a blank line; unexpected unindent.
Field list ends without a blank line; unexpected unindent.
it so pleases Microsoft some time.
The installation of Windows 11 may require an internet connection
to grab a Microsoft ID. This is currently true only for the home
addition, but will probably extend to the Pro edition, too. A
workaround to bypass the internet connection requirements of the
Windows 11 setup has been published that currently works for
version 21H2 but may be blocked some time in the future by
Microsoft:
- When you reach the “Lets Connect You To A Network” page, type
Shift-F10 to open a console window.
- Here you type ``taskmgr`` to start the Task Manager window so
you can see all running processes.
- Expand the Task Manager by clicking the “More Details” button,
and then find “Network Connection Flow.”
- Select this process and then hit the “End Task” button.
- Now you can close these newly opened windows and return to the
Windows 11 setup, where you will enter local account
information.
For Windows 11 version 22H2, the following sequence of actions to
use a local account instead of a Microsoft account has been
published:
- Enter ``no@thankyou.com`` (or some other senseless address) as
the email address and click ``Next`` when Windows 11 setup
prompts you to log into your Microsoft account.
- Enter any text you want in the password field and click
``Sign in``. If this method works, youll get a message saying
“Oops, something went wrong.”
- Click ``Next``. A screen appears saying “Whos going to use
this device?” This is the local account creation screen.
- Enter the username you want to use and click ``Next``.
- Enter a password and click ``Next``. You can leave the field
blank but its not recommended.
- On systems shipped with a Windows license, the product key may be
read from flash via root in dom0:
``strings < /sys/firmware/acpi/tables/MSDM``
Alternatively, you can also try a Windows 7 license key (as of
2018/11 they are still accepted for a free upgrade to Windows 10).
- The VM will shutdown after the installer completes the extraction of
Windows installation files. Its a good idea to clone the VM now (eg.
``qvm-clone WindowsNew WindowsNewbkp1``). Then, (re)start the VM via
the Qubes Manager or with ``qvm-start WindowsNew`` from a dom0
terminal (without the ``--cdrom`` parameter!).
The second part of Windows installer should then be able to complete
successfully.
**After Windows installation**
- From the Windows command line, disable hibernation in order to avoid
incomplete Windows shutdown, which could lead to corruption of the
VMs disk. ~~~ powercfg -H off ~~~ Also, recent versions of Windows
wont show the CD-ROM drive after starting the qube with
``qvm-start vm --cdrom ...`` (or using the GUI). The solution is to
disable hibernation in Windows with this command. (That command is
included in QWTs setup but its necessary to run it manually in
order to be able to open QWTs setup ISO/CD-ROM in Windows).
- In case you switch from ``sys-firewall`` to ``sys-whonix``, youll
need a static IP network configuration, DHCP wont work for
``sys-whonix``. Sometimes this may also happen if you keep using
``sys-firewall``. In both cases, proceed as follows:
- Check the IP address allocated to the qube - either from GUI
Manager, or via ``qvm-ls -n WindowsNew`` from a dom0 terminal
(E.g. 10.137.0.x with gateway 10.138.y.z).
- In the Windows qube, open the Network manager and change the IPv4
configuration of the network interfacefrom “Automatic” to
“Manual”.
- Enter the Address: 10.137.0.x in our example.
- Enter the Netmask: 255.255.255.0
- Enter the Gateway: 10.138.y.z in our example.
- Enter DNS: 10.139.1.1,10.139.1.2 (the Virtual DNS addresses
used by Qubes.
- Click “Apply”. You should now see “Connected”.
- Given the higher than usual memory requirements of Windows, you may
get a ``Not enough memory to start domain 'WindowsNew'`` error. In
that case try to shutdown unneeded VMs to free memory before starting
the Windows VM.
At this point you may open a tab in dom0 for debugging, in case
something goes amiss:
.. code:: bash
tailf /var/log/qubes/vm-WindowsNew.log \
/var/log/xen/console/hypervisor.log \
/var/log/xen/console/guest-WindowsNew-dm.log
At that point you should have a functional and stable Windows VM,
although without updates, Xens PV drivers nor Qubes integration (see
sections :ref:`Windows Update <user/templates/windows/windows-qubes-4-1:windows update>` and
:ref:`Xen PV drivers and Qubes Windows Tools <user/templates/windows/qubes-windows-tools-4-1:xen pv drivers and qubes windows tools>`).
It is a good time to clone the VM again.
**Installing Qubes Windows Tools**
To install Qubes Windows Tools, follow instructions in :doc:`Qubes Windows Tools </user/templates/windows/qubes-windows-tools-4-1>`, but dont
forget to ``qvm-clone`` your qube before you install Qubes Windows Tools
(QWT) in case something goes south.
**Post-install best practices**
Optimize resources for use in virtual machine as “vanilla” version of
Windows are bloated; e.g.:
- set up Windows for best performance (this pc → advanced settings → …)
- think about Windows page file: is it needed ? should you set it with
a fixed size ? maybe on the private volume ?
- disable services you dont need
- disable networking stuff in the network adapters setting (eg. link
discovery, file and print server, …)
- background: set a solid color
-
For additional information on configuring a Windows qube, see the
`Customizing Windows 7 templates <https://forum.qubes-os.org/t/19005>`__ page (despite the
focus on preparing the VM for use as a template, most of the
instructions are independent from how the VM will be used -
i.e. TemplateVM or StandaloneVM).
Windows as a template
---------------------
As described above Windows 7, 8.1, 10 and 11 can be installed as
TemplateVM. To have the user data stored in AppVMs depending on this
template, the option ``Move User Profiles`` has to be selected on
installation of Qubes Windows Tools. For Windows 7, before installing
QWT, the private disk ``D:`` has to be renamed to ``Q:``, see the QWT
installation documentation in :doc:`Qubes Windows Tools </user/templates/windows/qubes-windows-tools-4-1>`.
AppVMs based on these templates can be created the normal way by using
the Qube Manager or by specifying ~~~ qvm-create class=AppVM template=
~~~
On starting the AppVM, sometimes a message is displayed that the Xen PV
Network Class needs to restart the system. This message can be safely
ignored and closed by selecting “No”.
**Caution:** These AppVMs must not be started while the corresponding
TemplateVM is running, because they share the TemplateVMs license data.
Even if this could work sometimes, it would be a violation of the
license terms.
Furthermore, if manual IP setup was used for the template, the IP
address selected for the template will also be used for the AppVM, as it
inherits this address from the template. Qubes, however, will have
assigned a different address to the AppVM, which will have to changed to
that of the template (e.g. 10.137.0.x) so that the AppVM can access the
network, vis the CLI command in a dom0 terminal: ~~~ qvm-prefs
WindowsNew ip 10.137.0.x ~~~
Windows 10 and 11 Usage According to GDPR
-----------------------------------------
If Windows 10 or 11 is used in the EU to process personal data,
according to GDPR no automatic data transfer to countries outside the EU
is allowed without explicit consent of the person(s) concerned, or other
legal consent, as applicable. Since no reliable way is found to
completely control the sending of telemetry from Windows 10 or 11, the
system containing personal data must be completely shielded from the
internet.
This can be achieved by installing Windows 10 or 11 in a TemplateVM with
the user data directory moved to a separate drive (usually ``Q:``).
Personal data must not be stored within the TemplateVM, but only in
AppVMs depending on this TemplateVM. Network access by these AppVMs must
be restricted to the local network and perhaps additional selected
servers within the EU. Any data exchange of the AppVMs must be
restricted to file and clipboard operations to and from other VMs in the
same Qubes system.
Windows update
--------------
Depending on how old your installation media is, fully updating your
Windows VM may take *hours* (this isnt specific to Xen/Qubes) so make
sure you clone your VM between the mandatory reboots in case something
goes wrong. For Windows 7, you may find the necessary updates bundled at
`WinFuture Windows 7 SP1 Update Pack 2.107 (Vollversion) <https://10gbit.winfuture.de/9Y6Lemoxl-I1_901xOu6Hg/1648348889/2671/Update%20Packs/2020_01/WinFuture_7SP1_x64_UpdatePack_2.107_Januar_2020-Vollversion.exe>`__.
At your own risk you may use such an installation image with bundled
updates, but generally we do not recommend this way for security reasons
- so, if you do it anyhow, check that you get this image from a source
that you trust, which may be quite different from that one named here!
Note: if you already have Qubes Windows Tools installed the video
adapter in Windows will be “Qubes video driver” and you wont be able to
see the Windows Update process when the VM is being powered off because
Qubes services would have been stopped by then. Depending on the size of
the Windows update packs it may take a bit of time until the VM
shutdowns by itself, leaving one wondering if the VM has crashed or
still finalizing the updates (in dom0 a changing CPU usage - eg. shown
with the domains widget in the task bar, or with ``xentop`` - usually
indicates that the VM hasnt crashed).
To avoid guessing the VMs state enable debugging
(``qvm-prefs -s WindowsNew debug true``) and in Windows device manager
(My computer -> Manage / Device manager / Display adapters) temporarily
re-enable the standard VGA adapter and disable “Qubes video driver”. You
can disable debugging and revert to Qubes display once the VM is
updated.
Troubleshooting
---------------
**Windows 7 - USB drives are not visible in your domain**
After Qubes Windows Tools have been installed on your Windows 7 system,
please install the `Chipset_Driver_X2NF0_WN_2.1.39.0_A03.EXE driver <https://web.archive.org/web/20221007093126/https://dl.dell.com/FOLDER01557883M/3/Chipset_Driver_X2NF0_WN_2.1.39.0_A03.EXE>`__.
Then shut down your domain.
From now on you should be able to attach your USB drive by passing it
from your *Qubes Devices* menu as a *USB device* rather than *Data (Block) Device*
This procedure has been tested on Windows 7 installed as a TemplateVM.
Different combinations (such as StandaloneVM or different Windows
versions) have not been tested.