Re: [qubes-users] Qubes Live Images

2017-10-17 Thread Michael Carbone
On 10/16/2017 06:32 PM, Unman wrote:
> I had some enforced spare time last week and dusted off some old Live
> images for r3.2. They need tidying up but are usable now.
> 
> There are two iso images, suitable for burning to DVD or USB.
> Both use Debian templates.
> The smaller (2GB) is pretty vanilla, with some additional non-free
> drivers for wifi adapters.
> The larger (2.4GB) has a TorVM, and Tor Browser in an online qube.
> There are restrictive iptables on sys-net and TorVM, and MAC spoofing
> set on sys-net. The offline qube has libre office and veracrypt
> installed.
> 
> The menu system is simple, and wont update if you create new qubes.
> You'll need to use 'qvm-run -a  ', or practice working with
> the mysteries of xdg menus.
> 
> Both images will run(sort of) in 4GB RAM - 8 is better.
> 
> If you use DVD then get used to the sound of the disc thrashing. The
> faster DVD drive you have the better. (That said they work reasonably well
> on an old MacBook with 8GB RAM.) You also need patience - generally it
> seems better to start new qubes discretely.
> 
> Running from USB is fine. If you have ample RAM you'll forget it's a
> live system, unless you hammer the (limited) free disk space.
> 
> Both images are available from http://qubes.3isec.org - hashes and
> signatures to check included.
> 
> I hope to have updated versions ready for 4.0-rc2, along with a tidy build
> system, and (maybe) an installer.
> 
> Cheers
> 
> unman

hi unman,

this is really great, thanks for all your efforts! I've updated the
associated ticket with your email:

https://github.com/QubesOS/qubes-issues/issues/1552#issuecomment-337277453

and the more general live image ticket:

https://github.com/QubesOS/qubes-issues/issues/1018

there's also a ticket on documenting how to create live images for
developers, which you seem to have navigated:

https://github.com/QubesOS/qubes-issues/issues/1970

once Marek has had a chance to check it out it would be good to move it
over to the downloads page.

I also like your work on the QubesTor iso, moves us a bit towards
Tails-like functionality:

https://github.com/QubesOS/qubes-issues/issues/2024

-- 
Michael Carbone

Qubes OS | https://www.qubes-os.org
@QubesOS 

PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b7228cdb-8bac-0daf-0e03-efa8d84e2483%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes Live Images

2017-10-16 Thread Unman
I had some enforced spare time last week and dusted off some old Live
images for r3.2. They need tidying up but are usable now.

There are two iso images, suitable for burning to DVD or USB.
Both use Debian templates.
The smaller (2GB) is pretty vanilla, with some additional non-free
drivers for wifi adapters.
The larger (2.4GB) has a TorVM, and Tor Browser in an online qube.
There are restrictive iptables on sys-net and TorVM, and MAC spoofing
set on sys-net. The offline qube has libre office and veracrypt
installed.

The menu system is simple, and wont update if you create new qubes.
You'll need to use 'qvm-run -a  ', or practice working with
the mysteries of xdg menus.

Both images will run(sort of) in 4GB RAM - 8 is better.

If you use DVD then get used to the sound of the disc thrashing. The
faster DVD drive you have the better. (That said they work reasonably well
on an old MacBook with 8GB RAM.) You also need patience - generally it
seems better to start new qubes discretely.

Running from USB is fine. If you have ample RAM you'll forget it's a
live system, unless you hammer the (limited) free disk space.

Both images are available from http://qubes.3isec.org - hashes and
signatures to check included.

I hope to have updated versions ready for 4.0-rc2, along with a tidy build
system, and (maybe) an installer.

Cheers

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171016223202.asz2pplz7caouqdz%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.