Hello Joanna there is any iso more recent?

On Monday, August 10, 2015 at 5:24:23 PM UTC+2 Joanna Rutkowska wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hello,
>
> We have built and uploaded the first ever working Qubes Live USB image! :)
>
> It's based on the recently released 3.0-rc2 release. Now you should be 
> able to
> run and try Qubes OS of any laptop without needing to install it anywhere! 
> And
> perhaps run Qubes HCL reporting tool and send us some more data? [1]
>
> We have faced several challenges when making this Live USB edition of 
> Qubes OS,
> which traditional Linux distro don't need to bother with:
>
> 1. We needed to ensure Xen is properly started when booting the stick. In 
> fact
> we still don't support UEFI boot for the sitck for this reason, even 
> though the
> Fedora liveusb creator we used does support it. Only legacy boot for this
> version, sorry.
>
> 2. We discovered that the Fedora liveusb-create does _not_ verify 
> signatures on
> downloaded packages -- we have temporarily fixed that by creating a local 
> repo,
> verifying the signatures manually (ok, with a script ;) and then building 
> from
> there. Sigh.
>
> 3. We had to solve the problem of Qubes too easily triggering Out Of Memory
> condition in Dom0 when running as Live OS.
>
> This last problem has been a result of Qubes using the copy-on-write 
> backing for
> the VM's root filesystems, which is used to implement our cool 
> Template-based
> scheme [2]. Normally these are backed by regular files on disk -- even 
> though
> these files are discardable upon VM reboots, they must be preserved during 
> the
> VM's life span, and they can easily grow to a few tens of MBs per VM, 
> sometimes
> even more. Also, each of the VM's private image, which essentially holds 
> just
> the user home directory, typically starts with a few tens of MBs for an 
> "empty
> VM". Now, while these represent rather insignificant numbers on a 
> disk-basked
> system, in case of a LiveUSB scenarios all these files must be stored in 
> RAM,
> which is always a scare resource on any OS, and especially Qubes.
>
> We have implemented some quick optimizations in order to minimize the above
> problem, but this is still far from a proper solution. We're planning to 
> work
> more on this next.
>
> Now, there are three directions in how we want to work further on this 
> Qubes
> Live USB variant:
>
> 1. Introduce easily clickable "install to disk" option, merging this with 
> the
> Qubes installation ISO. So, e.g. make it possible to first see if the given
> hardware is compatible with Qubes (run the hcl reporting tool) and only 
> then
> install on the main disk. Also, ensure UEFI boot works well.
>
> 2. Introduce options for persistence while still running this out of a USB
> stick. This would be achieved by allowing (select) VMs' private images to 
> be
> stored on the r/w partition (or on another stick).
>
> 2a. A nice variant of this persistence option, especially for frequent
> travellers, I think, would be to augment our backup tools so that it was
> possible to create a LiveUSB-hosted backups of select VMs. One could then 
> pick a
> few of their VMs, necessary for a specific travel, back them to a LiveUSB 
> stick,
> and take this stick when traveling to a hostile country (not risking taking
> other, more sensitive ones for the travel). This should make life a bit 
> simpler
> for some ... [3]
>
> 3. Introduce more useful preconfigured VMs setup, especially including
> Whonix/Tor VMs.
>
> [1] https://www.qubes-os.org/doc/HCL/
> [2] https://www.qubes-os.org/doc/SoftwareUpdateVM/
> [3] https://twitter.com/rootkovska/status/541980196849872896
>
>
> Current limitations
> - --------------------
>
> 0. It's considered an alpha currently, so meter your expectations
> accordingly...
>
> 1. Currently just the 3 exemplary VMs (untrusted, personal, work), plus the
> default net and firewall VMs are created automatically,
>
> 2. The user has an option to manually (i.e. via command line) create an
> additional partition, e.g. for storing GPG keyring, and then mounting it 
> to a
> select VMs. This is to add poor-man's persistence. We will be working on
> improving/automating that, of course,
>
> 3. Currently there is no option of "install to disk". We will be adding 
> this
> in the future,
>
> 4. The amount of "disk" space is limited by the amount of RAM the laptop
> has. This has a side effect of e.g. not being able to restore (even few) 
> VMs
> from a large Qubes backup blob,
>
> 5. It's ease to generate Out Of Memory (OOM) in Dom0 rather easily by 
> creating
> lots of VMs are writing a lot into the VMs filesystem... (Alpha, right?)
>
> 6. There is no DispVM savefile, so if one starts one the savefile must be
> regenerated which takes about 1-2 mins.
>
> 7. UEFI boot doesn't work, and if you try booting it via UEFI Xen will not 
> be
> started, rendering the whole experiment unusable.
>
> We're planning to release an updated version sometime in September.
>
> Download and burning
> - ---------------------
>
> Get the ISO (and its signature for verification):
>
> http://ftp.qubes-os.org/iso/Qubes-R3.0-rc2-x86_64-LIVE.iso
> http://ftp.qubes-os.org/iso/Qubes-R3.0-rc2-x86_64-LIVE.iso.asc
>
> Then "burn" onto a USB stick (replace /dev/sdX with your USB stick device):
>
> $ sudo dd if=Qubes-R3.0-rc2-x86_64-LIVE.iso of=/dev/sdX
>
> Note that you should specify the whole device, (e.g. /dev/sdc, not a single
> partition, e.g. /dev/sdc1).
>
> And, please, please, make sure to use caution and not overwrite your HDD or
> other important device. And in case you do, please, please, do not email
> qubes-users complaining about ;P
>
> Happy Live-Qubesing! ;)
>
> joanna.
> -----BEGIN PGP SIGNATURE-----
>
> iQIcBAEBAgAGBQJVyMIeAAoJEDOT2L8N3GcYSi0P/jeG6/4M5Ux6BjKDXP3+OrRC
> YM+vL+JZcbn3vPOYifgl+LndMEmwYEBLrSMnqmj/Ze5iC9qLYzOM33032xL2GJBu
> NLUujS9Y1Z4xocLQ6sgmeXbvxsqPGQ4CE79UWA438mqGcjkFd85IamEijyYaj/fY
> Wz1TnK2Lwys5gMrCArPpqPL1dmQuGW4uZTABIw3wxyIlqLZ7HSTLVNIiiCOIfklG
> xbMBB1l71WUgLfTxA14AUJI02R65mg3B/kkMq9I3pZCXhdE9G7dd8s3nH/wV7mrA
> 5nOM0slZ9Q+IXPPu6UbfHt7kHQ+qHToSUURF14nmsbftaWsjBvIOsCNZ2njCQQIH
> yXvsSp8J+kpiy57C/7i261qlp3O0/L6jsvLBwovOTlHzrM2KUj7XRfmTguj8QMUk
> R3LQC+dXr7wgg7f31jiAgkKR3LkPuFEJ9y/8+esnMCg5JjMoYvU68Gl2RUoXynDX
> bCXZ0cW+rxcD1hIEDef9WwUa3Drx3aquVfAUGZ4WGj+TNRFKxmqY/CUTTr8nShfO
> rsoHctHsmWDWqgfM0RqUnFi8fzj/mGTr11Y9I/gdTrdOheQdxIYkKCW+naBht7jr
> dS0xB1cOl/Xhqngorkt6vaqbXny8TmH7vG7PNiQdARAKrFKFW3Qmp3si3t21OtaW
> seNGJL/0vJpo3CkV7Agc
> =2CxZ
> -----END PGP SIGNATURE-----
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38fc410c-797d-4d12-b55e-129a68b3cc70n%40googlegroups.com.

Reply via email to