Qubes 3.2 rc1 has been released!

410 views
Skip to first unread message

Marek Marczykowski-Górecki

unread,
Jun 18, 2016, 4:49:02 AM6/18/16
to qubes-users
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Details here:
https://www.qubes-os.org/news/2016/06/18/qubes-OS-3-2-rc1-has-been-released/

As usual, you can download new image from:
https://www.qubes-os.org/downloads/

Keep in mind it is only release candidate, so not recommended for daily
use.

- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJXZQr2AAoJENuP0xzK19csn7UH/jCj+lfb6i9FGWXvWZi+2f1j
9Jg+LUNzJmKFtcvUqmzkN75tJ4ErSGPJsOBLZef4b1d0y9xR8Xcv4tfnG09fv+xe
lQM+BY0VZ2vWjwyjrKZKyvOA5aDyjA73NFeOW1XFojafl7m3ykef7M2j6cW8eyEz
VXq+IetkSFzvGW9yAA3qwxi8QuytbAvih9qPqqqzKLGIPF6bauXxoLNgm4Vqjy37
fq91hYD9+/DK3yGN0SlYQv3mojlrKQ+yBSA8S74dRPHeNp/laL/P/zWLWVFKqDng
9e0TZSDAg4igKHlKJ7il9X8A72LnHG3OAIRpAgVTyJ1OwTG3f2KxDxANM7zRgjg=
=5mIU
-----END PGP SIGNATURE-----

1032948'109438'0193284'0913284'0914328

unread,
Jun 18, 2016, 5:39:57 AM6/18/16
to qubes-users
Merci!

Great Work

jkitt

unread,
Jun 18, 2016, 8:04:28 AM6/18/16
to qubes-users
Nice! Since I'm new to Qubes my question would be - "upgrade path" does this mean that releases normally can be upgraded via qubes-update-dom0?

JPL

unread,
Jun 18, 2016, 8:08:50 AM6/18/16
to qubes-users


On Saturday, June 18, 2016 at 9:49:02 AM UTC+1, Marek Marczykowski-Górecki wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Details here:
https://www.qubes-os.org/news/2016/06/18/qubes-OS-3-2-rc1-has-been-released/

As usual, you can download new image from:
https://www.qubes-os.org/downloads/

Keep in mind it is only release candidate, so not recommended for daily
use.

- --
Best Regards,
Marek Marczykowski-Górecki

Good work - can't wait to try it out. Agree with the focus on hardware compatibility issues. Seems to be the main thing holding Qubes back at the moment.

Marek Marczykowski-Górecki

unread,
Jun 18, 2016, 8:21:43 AM6/18/16
to jkitt, qubes-users
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On Sat, Jun 18, 2016 at 05:04:28AM -0700, jkitt wrote:
> Nice! Since I'm new to Qubes my question would be - "upgrade path" does
> this mean that releases normally can be upgraded via qubes-update-dom0?

Yes, we try to provide such option when easily possible.

- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJXZTzPAAoJENuP0xzK19csYoMH/A0ftBdVGr0Qm6xgqXm1YjsF
AAhF1SBOwNZTH9v7Yu88pVvDvZka5mov0IeC27BUKZOoODbWn3HV12ibP1F7q+4M
GZo5q1PxswZI7JwRS/T4d+hs++hLcaUbslXbokwYrRGJRoYyGMhwI7G3rLSLx8+V
JoG9ktYMdU82J1mmShGDVDeLwHVqCP2+N1ObHRsnjRQnwwLcLeu34O/Fm2RHwaNJ
ha+mg3rcM7eRNlHpqJs33eK6P5cL+69sLNiEsTjNqYCaqRHf792ySI5pcaYy2Cp9
s4LDIOuwu+fciKeUEw4PSEinNlqMRdPPEaWzMMN3pnSj+nmDlwBgW3Ou9owOSJU=
=5taS
-----END PGP SIGNATURE-----

Cyrinux

unread,
Jun 18, 2016, 4:45:06 PM6/18/16
to qubes...@googlegroups.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Great!

Thanks!

Le 18/06/2016 à 10:48, Marek Marczykowski-Górecki a écrit :
> Details here:
> https://www.qubes-os.org/news/2016/06/18/qubes-OS-3-2-rc1-has-been-rel
eased/
>
>
>
As usual, you can download new image from:
> https://www.qubes-os.org/downloads/
>
> Keep in mind it is only release candidate, so not recommended for
> daily use.
>
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=+YB7
-----END PGP SIGNATURE-----

derfa...@gmail.com

unread,
Jun 19, 2016, 11:48:17 AM6/19/16
to qubes-users
hi,

On Saturday, June 18, 2016 at 10:49:02 AM UTC+2, Marek Marczykowski-Górecki wrote:
> [ ... 3.2 rc1 release ... ]

i gave the iso a spin, first booted via UEFI, which made the installer hang half way through at "installing bootloader". rebooted using legacy grub, all shiny. then during firstboot, selected to only create default VMS, after a while an error came up stating that 'sys-firewall' is not a vm name. logging in, there were only the template vms created. also, no panel and no desktop inside kde. create vms manually, reboot -> all good, incl. kde desktop + panel. happy fake :)

now, should i open tickets for this or how does this work? i did not investigate these little quirks further..

the usability improvement to grey out the usbvm option because i'm using a usb kb/mouse is very cool - i got trapped there the first time i installed qubes ;)

one other thing i noticed a while ago - the dracut text-mode installer does not show the pop-up asking the user for the LUKS passphrase, the installation doesn't work because of that.. bug? feature?

best,

fake

Marcus at WetwareLabs

unread,
Jun 19, 2016, 3:58:16 PM6/19/16
to qubes-users
Hi,

I gave it a quick spin. Here's few issues that I noticed:
- There's a problem with mouse cursor jumping left on every click. (Logitech G600).  It's the same problem discussed here:  https://bbs.archlinux.org/viewtopic.php?id=204830.  And here's the bug report. I never had a same problem with previous Qubes versions, so it must be the new Xorg version. I could continue installation by plugging in another mouse. Also the solution is discussed there in the first link, and problem can be fixed later after installation.
- During package installation there's notice: "You have specified that package 'chrony' should be installed. This package does not exist".
- Error during first boot: "Failed to start “Load kernel modules”". Recommendation to check "systemctl status systemd-modules-load.service", but there's nothing obviously wrong there, and in the end of the listing, there's "Started Load Kernel Modules."
- When creating VM's there's error: ['/usr/bin/qvm-prefs' '--force root' '--set' 'sys-firewall' 'netvm' 'sys-net'] failed: stdout: "" stderr: "A VM with the name 'sys-firewall' does not exist in the system.
  Nothing related in the console screen though. So it's the same problem Mr. "fake" noticed earlier.


derfa...@gmail.com

unread,
Jun 19, 2016, 6:54:50 PM6/19/16
to qubes-users
hi,

On Sunday, June 19, 2016 at 9:58:16 PM UTC+2, Marcus at WetwareLabs wrote:
> On Saturday, June 18, 2016 at 11:49:02 AM UTC+3, Marek Marczykowski-Górecki
> > [...]
> - During package installation there's notice: "You have specified that package 'chrony' should be installed. This package does not exist".

ah, forgot about that one, jep, saw that too.

> - When creating VM's there's error: ['/usr/bin/qvm-prefs' '--force root' '--set' 'sys-firewall' 'netvm' 'sys-net'] failed: stdout: "" stderr: "A VM with the name 'sys-firewall' does not exist in the system.
>   Nothing related in the console screen though. So it's the same problem Mr. "fake" noticed earlier.

exactly. just installed it on another machine and noted down the exact error message, this is what i see, too, but with a couple more commas between the ''.

on the second machine i set up (Lenovo P50), contrary to what i reported earlier, the UEFI bootloader install worked, though!

it has been reported previously that the xrandr-screen-location-config thingy is missing from the kde systemsettings5 "display and monitor" config option iirc, i use "arandr" in the meantime.

best,

fake

Andrew David Wong

unread,
Jun 20, 2016, 2:38:53 PM6/20/16
to derfa...@gmail.com, qubes-users
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2016-06-19 08:48, derfa...@gmail.com wrote:
> hi,
>
> On Saturday, June 18, 2016 at 10:49:02 AM UTC+2, Marek
> Marczykowski-Górecki wrote:
>> [ ... 3.2 rc1 release ... ]
>
> i gave the iso a spin, first booted via UEFI, which made the
> installer hang half way through at "installing bootloader".
> rebooted using legacy grub, all shiny. then during firstboot,
> selected to only create default VMS, after a while an error came up
> stating that 'sys-firewall' is not a vm name. logging in, there
> were only the template vms created. also, no panel and no desktop
> inside kde. create vms manually, reboot -> all good, incl. kde
> desktop + panel. happy fake :)
>
> now, should i open tickets for this or how does this work? i did
> not investigate these little quirks further..
>

Generally, for organizational purposes, we like to have every issue
tracked on GitHub, even if the initial report and discussion take
place on the mailing lists. So, ordinarily, I would create an issue to
track this. In this case, however, I'm not sure that we have enough
information to create an issue. If you can provide further details
about this problem or are able to reproduce it, that would help. Or if
you'd like to file the issue yourself, please go ahead.

> the usability improvement to grey out the usbvm option because i'm
> using a usb kb/mouse is very cool - i got trapped there the first
> time i installed qubes ;)
>
> one other thing i noticed a while ago - the dracut text-mode
> installer does not show the pop-up asking the user for the LUKS
> passphrase, the installation doesn't work because of that.. bug?
> feature?

Can you clarify what you mean by "the installation doesn't work"? As
in, can't proceed? (How were you able to install in that case?)

Does it seem related to this issue?

https://github.com/QubesOS/qubes-issues/issues/794

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----
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=spAH
-----END PGP SIGNATURE-----

Iestyn Best

unread,
Jun 20, 2016, 10:58:51 PM6/20/16
to qubes-users
Hi Marek,

Firstly, thank you (and all the Qubes-OS team) for all your great work and the progress you are making. I am sure the community greatly appreciates everything you guys are doing.

Now, I was wondering how the progress with the windows tools is going. Has there been any progress on the Windows 8 or 10 support?

Regards,
Iestyn Best

mmih...@gmail.com

unread,
Jun 21, 2016, 1:45:48 AM6/21/16
to qubes-users, derfa...@gmail.com
> > one other thing i noticed a while ago - the dracut text-mode
> > installer does not show the pop-up asking the user for the LUKS
> > passphrase, the installation doesn't work because of that.. bug?
> > feature?
>
> Can you clarify what you mean by "the installation doesn't work"? As
> in, can't proceed? (How were you able to install in that case?)
>
> Does it seem related to this issue?
>
> https://github.com/QubesOS/qubes-issues/issues/794

Good morning,

What I have noticed is that in the text mode the LUKS password prompt is not visible until you press a key like ENTER. Then the prompt appears and you can type in the password. Or, to be exact, you could type in the password blindly and it would still work.

For those that have problem entering the disk encryption password in the graphic boot mode I'd suggest to switch to text mode by pressing the "Pause/Break" key. Then, when the screen activity subsides, you should press the ENTER key. In this way you might get a password prompt.

-- Regards, Matej.

raah...@gmail.com

unread,
Jun 28, 2016, 1:36:42 PM6/28/16
to qubes-users, derfa...@gmail.com, mmih...@gmail.com

Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we choose not to reinstall is there security implications?

Marek Marczykowski-Górecki

unread,
Jun 28, 2016, 2:23:31 PM6/28/16
to raah...@gmail.com, qubes-users, derfa...@gmail.com, mmih...@gmail.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On Tue, Jun 28, 2016 at 10:36:42AM -0700, raah...@gmail.com wrote:
> Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we choose not to reinstall is there security implications?

Yes. Experimental instruction already online:
https://www.qubes-os.org/doc/upgrade-to-r3.2/

- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJXcsCcAAoJENuP0xzK19csjowH/RHfqm/DKhbiVJpu3Nnu997L
CbdgyL4Jt2qMLnIad72QL26mzrb42EEx1A3xYSVjfxRWktIrAN83ZXJFVgRJlJee
qcsfdtKWZukJmGQ1FZ5M8V/r9oFHw5WBETQQSmreLLgytZam80r0Ssgc55n0wBNj
y2G7g9V3Oxi1fbMZOptNKFWfeEoC7++Udx8tK0zuLV/LU/X5HwVmeeyqtazhhaJx
MEI4SRM5fgbj4gGACCFPgRrgLjsW8MC1LIeNT38k57X+vgNgQga6Rj4ieJttJDu7
b0nifYm21r5J/47tjFxUnI/sEklRVJO0bPpXzrnIkLFcW7D7hNf5Fvk0yuGI8i0=
=Y5rc
-----END PGP SIGNATURE-----

Chris Laprise

unread,
Jun 28, 2016, 11:09:32 PM6/28/16
to Marek Marczykowski-Górecki, raah...@gmail.com, qubes-users, derfa...@gmail.com, mmih...@gmail.com


On 06/28/2016 02:23 PM, Marek Marczykowski-Górecki wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> On Tue, Jun 28, 2016 at 10:36:42AM -0700, raah...@gmail.com wrote:
>> Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we choose not to reinstall is there security implications?
> Yes. Experimental instruction already online:
> https://www.qubes-os.org/doc/upgrade-to-r3.2/
>
> - --

FWIW, I tried this yesterday and it produced a system that stalled in
the middle of booting, so I installed fresh from DVD.

Chris

Drew White

unread,
Jun 29, 2016, 6:26:43 AM6/29/16
to qubes-users, raah...@gmail.com, derfa...@gmail.com, mmih...@gmail.com
On Wednesday, 29 June 2016 04:23:31 UTC+10, Marek Marczykowski-Górecki wrote:
On Tue, Jun 28, 2016 at 10:36:42AM -0700, raah...@gmail.com wrote:
> Will we be able to upgrade to 3.2 from dom0 update eventually?  Or if we choose not to reinstall is there security implications?

Yes. Experimental instruction already online:
https://www.qubes-os.org/doc/upgrade-to-r3.2/
 
What about from Qubes 2?

Marek Marczykowski-Górecki

unread,
Jun 29, 2016, 7:17:58 AM6/29/16
to Drew White, qubes-users, raah...@gmail.com, derfa...@gmail.com, mmih...@gmail.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On Wed, Jun 29, 2016 at 03:26:43AM -0700, Drew White wrote:
> On Wednesday, 29 June 2016 04:23:31 UTC+10, Marek Marczykowski-Górecki
> wrote:
> >
> > On Tue, Jun 28, 2016 at 10:36:42AM -0700, raah...@gmail.com <javascript:>
> > wrote:
> > > Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we
> > choose not to reinstall is there security implications?
> >
> > Yes. Experimental instruction already online:
> > https://www.qubes-os.org/doc/upgrade-to-r3.2/
> >
>
> What about from Qubes 2?

https://www.qubes-os.org/doc/releases/3.2/release-notes/#tocAnchor-1-1-5

From R3.0 or earlier

When upgrading from earlier versions the easiest and safest way is to
install it from scratch and use qubes backup and restore tools for
migrating of all of the user VMs.

Alternatively you can upgrade to R3.1 first, then follow the
instructions above. This will be time consuming process.

- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJXc63gAAoJENuP0xzK19csm4wH/jCbunxVvZDuhngc/3avpcgP
XTijURzLvjN/urHU2VlpXgjmNnFEA7L1hF3Gmzs06FF91xKQCj4v+ScCiDUnC/3T
AHlKpGgXUsU94g74y2Nb8B+3qhupsrJFnfSSzZRnwHXIXzdv79r68w+S5XiaSXBq
TsTiXyJwNGICfMxRFUIvVoOtQ+dCWHv3iIoozsbgLjzVS/a3UY8G99uuUlETahaX
khHrdJJB4J/RbV+cvXEdIOBBmMTXTPAt4OGhYLkgTpxHJTE8lIjORbOY2Ioq0ER5
vP1XXWtjHt+xbNR6m04tei4pDnv7VoA52FmIX/wC3DdzCAXMBcvKLQQ7P7YnkBM=
=NcTe
-----END PGP SIGNATURE-----

Drew White

unread,
Jun 29, 2016, 7:29:46 AM6/29/16
to qubes-users, drew....@gmail.com, raah...@gmail.com, derfa...@gmail.com, mmih...@gmail.com


I guess I should re-phrase the question..
 
Has the upgrade been tested from version 2?
What is the failure rate for the upgrade?

Upgrading to 3.1 first, that happens normally the same way as the 3.1 - 3.2 upgrade?

What is the data consumption for these upgrades?
i.e. how much data does it use? (in relation to the internet, in bytes)





Qubed One

unread,
Jul 1, 2016, 6:03:23 PM7/1/16
to qubes...@googlegroups.com
Marek Marczykowski-Górecki:
> On Tue, Jun 28, 2016 at 10:36:42AM -0700, raah...@gmail.com wrote:
>> Will we be able to upgrade to 3.2 from dom0 update eventually? Or if we choose not to reinstall is there security implications?
>
> Yes. Experimental instruction already online:
> https://www.qubes-os.org/doc/upgrade-to-r3.2/
>
>


Thanks!

Upgrading from 3.1 to 3.2 worked perfectly for me.

raah...@gmail.com

unread,
Jul 22, 2016, 7:24:16 PM7/22/16
to qubes-users, qube...@riseup.net
trying to update qubes on a machine after doing the command sudo qubes-dom0-update --enablerepo=qubes*testing --releasever=3.2 qubes-release shows lots of updates to be installed, but I get errors.

Package: xfce4-panel-4.12.0-4.fc23 requires libgarcon-gtk2-1.so.0
Package: kde-style-plastik-for-qubes-1.1-1.fc20 requires libkdecorations.so.4
Package: 1000:garcon-0.2.0-3.fc20 requires libxfce4util.so.6
Package: qubes-kde-dom0-4.12.3-1.fc20 requires kde-workspace-libs
Obsoleted by: 1:kde-workspace-common-4.11.22-7.fc23 Not found
package: qubes-kde-dom0-4.12.3-1.fc20 requies kde workspace
Obsoleted By: Plasma-desktop-5.6.5-1.fc23 Not found
You could try using --skip-broken to worka round the problem
You could try running:rpm- Va--nofiles --nodigest

raah...@gmail.com

unread,
Jul 22, 2016, 7:31:35 PM7/22/16
to qubes-users, qube...@riseup.net, raah...@gmail.com
I tried sudo qubes-dom0-update --skip-broken and I got error at end about Multilib version problems found.
Protected multilib versions: unbound-libs-1.5.5-1.fc23 != unbound-libs-1.5.4-4.fc20
gnupb-1.4.19-3.fc23 != gnupb-1.4.19-2.fc20
libdrm-2.4.65-1.fc23 != libdrm-2.4.58-1.fc20

Qubed One

unread,
Jul 23, 2016, 4:54:53 PM7/23/16
to qubes...@googlegroups.com
raah...@gmail.com:
Was this machine fully updated before running the update command
containing qubes-release? Do you normally use updates-testing or
security-testing? You might try getting all updates from qubes*testing
first, then reboot and run the command containing qubes-release.

raah...@gmail.com

unread,
Jul 23, 2016, 8:26:39 PM7/23/16
to qubes-users, qube...@riseup.net
Ah its too late I already borked it. I'm gonna have to reinstall but tks for your reply.
Reply all
Reply to author
Forward
0 new messages