One of the reasons I always have Qubes manager on screen, not just to see updates, but to see if an orange triangle pops up, What vms using cpu/memory, etc.. always wanted i/o and network activity as well.
I mean maybe there is security implications? I dunno does gui automatically equal risk? lol but like 799 say options is good.
David,
Thank you for sharing your config for conky. I am going to install v4 and then conky.
Ray
I like seeing the status of all my VMs, not just when I go and seek that information out, but all the time. It just gives me more insight into what my computer is up to. It makes me feel more confident that it isn't doing anything it isn't supposed to be doing. It reminds me to be conscious of which qube I am in when I'm performing different tasks. I like having a sense that I am more aware of what my computer is up to, like I notice that sys-net's CPU bumped up a bit and maybe that alerts me to an issue, or I notice that my personal VM is taking longer to shut down than it used to, and maybe there is an issue there.
And not just that. If I'm being honest, it is also because it makes me feel more like I am running a cool, unique, complicated OS. The qubes manager is kind of Qubes' signature look. It's
I agree that the UI for it is kind of meh in 3.2, but that's mostly a graphical issue IMO. Personally, I'd rather see 4.0 have a qubes manager that is functionally the same as in 3.2, but with a more modern look. Darker, new icons.
> And not just that. If I'm being honest, it is also because it makes me feel
> more like I am running a cool, unique, complicated OS. The qubes manager is
> kind of Qubes' signature look. It's
>
> I agree that the UI for it is kind of meh in 3.2, but that's mostly a graphical > issue IMO. Personally, I'd rather see 4.0 have a qubes manager that is
> functionally the same as in 3.2, but with a more modern look. Darker, new
> icons.
I agree with you, but at the same time it is very clear that the team are very resource-constrained. I'm sure they would love to implement a better replacement but there is only so much they can do in a day, and there are plenty of other issues that I'd rather see them work on.
I have considered working on such a tool myself, but it's a lot of work and I have other projects I need to work on as well.
I agree. It wouldn't take long to put something together that does the basic stuff, but to make it as feature complete as the Qubes Manager in 3.2 let alone implement all the cool features we all want would take more time than one might think.
While I initially didn't like the loss of the Qubes Manager either, I've grown pretty used to not having it in Qubes 4. Refusing to upgrade due to not having the old Qubes Manager, is imho just being conservative stubborn to old habits, refusing change. While true change can go from better to worse, refusing change altogether is not always a good thing. One should try give the layout in Qubes 4 a chance.
While true Qubes 4 has its interface shortcomings compared to Qubes 3.2, I think it's interface isn't far from being superior to Qubes 3.2. too, with some tweaks here and there.
For example, expanding the widget to allow for more details, similar to how the old Qubes Manager worked. Perhaps even put in an option to make it detachable/moveable/sizeable from the widget icon to the desktop for those who prefer a window over a widget.
Either way, despite the loss from the extras in the old QUbes Manager, despite it was a major pain to get the templates to work properly in the start from a fresh install, despite all that, I still enjoy Qubes 4 more than I did Qubes 3.2. And if anything, Qubes 4 is more secure than 3.2., so refusing to upgrade for such minor things, seems to me quite weird. Albeit the complaints are understandable, but it doesn't make Qubes 4 inferior to Qubes 3.2, when counting all the pros and cons together.
We also have to remember Qubes 4 is laying the foundations to more features in the future. At least to my understanding, a lot in Qubes 4 is foundation work for more things to come in the future. Don't be so unsatisfied, it's work in progress, Qubes 4 is not a finished project. Think long-term, not short-term.
Imho, the Qubes team did a fantastic job with Qubes 4. They didn't have much time with the interface layout, given all the other things that was implemented in Qubes 4. After all, security takes president, and practical use is also a serious priority. Cosmetics and lesser user-ability have to take a second seat, given the paradigm and goals that's being followed, with so few resources.
Just give it time people, the Qubes team did an amazing job. Being frustrated to such a high degree though, is uncalled for. We should at the very least appreciate their hard work.
--You received this message because you are subscribed to the Google Groups "qubes-users" group.To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users...@googlegroups.com.To post to this group, send email to qubes...@googlegroups.com.To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAF0bz4TdnXihBjPobqc%3DQ2NB8BCZMYzASPoOHNeLGEzH-toFHA%40mail.gmail.com.For more options, visit https://groups.google.com/d/optout.
Sure, though I might not be able to cover it all, but here are some things to start with.
- Qubes 4 uses terminal to create or restore backups, there is as of yet no graphic menu anymore. It might seem frightening at first, but it's not that difficult to use. The most annoying thing is if you want to exclude some Templates or AppVM's, since it'll otherwise restore all your VM's. After you type in your backup password, just put -x "AppVM name" -x "AppVM name" without the exclamation markers. It takes a few minutes of concentration the first time around, but it's not exactly "difficult", just different and takes a bit longer.
Type in "qvm-backup-restore -h" for help on commands if needed, or find a Qubes doc guide on the official website. The commandline appears the same in Qubes 3.2 as it is in 4.0-RC2, so you can practice in Qubes 3.2 with a few test AppVM's.
- Also, from what I hear, it takes a lot longer to restore backups if you run it through Dom0. Apparently it goes a lot faster if you i.e. make a USB-Qube and restore your backup through an AppVM. I cannot verify if it goes faster since my touch-screen on my laptop is tied to my USB, therefore I cannot create a USB-QUbe. Which meant I had to go for the slow one through Dom0. It took about 10 hours or so for about 60-70 GB of backup data.
- Be sure to turn off suspend or hibernate while you run your backup.
- Qubes 4-RC2 appears to have some template difficulties, primarily debian and whonix, but also sometimes fedora. The way I solved it was during the install, I allowed the install of Whonix templates. However during the last-step for configuration setup, I removed Whonix in the configuration setup. I also removed the automatic easy "Personal, Work" AppVM setup configuration. I only selected the first line. For whatever reason, if I selected any other configurations below the first, it causes python code errors. Afterwards fedora template works fine, and Whonix is easily fixed with the Qubes official Whonix install guide on the official website. It's basically just to create the sys-whonix and tie the whonix-gw and whonix-ws to the syswhonix for networking.
- debian won't run for me, I still haven't found a way to fix it. Instead I just made an extra copy of my Fedora template, and use that template for my packages etc. that I don't want installed in my more secure template/AppVM's.
- Qubes 4-RC2 sometimes freezes during install, it'll depend on your hardware. For my case, it only froze once. I restarted and started over, no changes to settings. This time it made it through. Qubes 4-RC1 always froze for me, no matter how many times I tried. The takeaway is, it sometimes helps to restart and try again.
- If Qubes 4 succesfully installs, but you get python errors or templates don't appear despite that you installed them, try re-install everything. I believe the late-stage Qubes configuration is what makes the difference. See above step a few steps up.
- Find another way to monitor your RAM/CPU use. For example I use "Xl list" in Dom0 to see how much memory Dom0 and all the other Templates/AppVM's are using. The widget shoes Template/AppVM memory use, but it doesn't show you how much memory you got in Dom0. The Dom0 RAM may be nice to know, so you know how much memory you got left for new VM's you plan to start up.
- There appears to be a new method to update Templatee VM's. Fedora still works the old way. But Debian and Whonix doesn't. I haven't found any Qubes guides or post about this yet, and haven't had the time to experiment to find out how it works now. But basically, Fedora template updates work. Whonix might also work. I had a lot of trouble with the Debian template system though. Either way, just go with Fedora for now until a guide or post is availale on this matter, or till the error is fixed (if there is any errors and it simply is just a user mistake).
- Given the situation, without insider knowledge (aka I simply dont know, this is just a guess), I believe there will be a Qubes 4-RC3 release. All these python errors and template nightmare, and careful picking Qubes configuarion to minimize these issues, seems to be too much to fix with just some updates. However if you can get the Fedora template working, you can just re-install the other templates whenever a fix becomes available.
- Qubes 4 appears to come with SALT enabled by default. I haven't ventured too much into this new area much yet, however it seemingly adds a security layer to VM and VM files so that they can't be changed (Possibly? It's still new to me after all, I can't say for sure). Presumably as long it's on the SALT configuration list, you can't change certain things in this VM. Supposedly it's to make Qubes more hack-proof. I haven't yet discovered when this SALT protection applies and when it doesn't. But it can be a real pain if you try to change something, and you don't realize it's the SALT protection preventing you to do it.
So it's good to know about it and read up about it. I certainly plan to when I have the time. There is a Qubes developer discussion somewhere on github about it somewhere as well. You should be able to play around with it in Qubes 3.2. before moving to Qubes 4. Apparently its pre-installed in Qubes 3.2, but it's pre-enabled in Qubes 4 for VM's. So Qubes 3.2. has it installed, but not enabled. Something like that.
- These are the issues I personally encountered during Qubes 4-RC1 and Qubes 4-RC2, in comparison to Qubes 3.2. I Can't think of more things to watch out for at the moment. I still need more time to mess around with fixes and solutions, reading up and learning, though this is what I gathered for now.
I forgot to mention, in addition to the above, Qubes-Windoes-Tools appears to not have been updated for Qubes 4 yet. Which means it's tricky to start your Windows due to memory management, and you can't transfer text of files outside or into Windows. You may perhaps be able to get internet working if you can tweak it yourself, but I haven't personally ventured there yet, so I don't know if it's easy or a lot of work to do yourself.
You can find out more about the RAM issue in my post here: https://groups.google.com/forum/#!topic/qubes-users/i48rHs1rBfU