Sidebar Sponsor |
|
Random Distribution |
Navy Linux
Navy Linux is an open source community project founded by UnixLab (Unix/Linux developers community). The project aims to provide a free-of-cost clone of Red Hat Enterprise Linux with minimal install media.
Status: Active
| |
Latest News and Updates |
|
2021-03-05 |
NEW • Distribution Release: Qubes OS 4.0.4 |
Rate this project
|
Andrew David Wong has announced the release of Qubes OS 4.0.4, an updated build of the project's security-focused Linux distribution that provides a way to "compartmentalise" computing tasks into isolated compartments called "qubes": "We are pleased to announce the release of Qubes OS 4.0.4. This is the fourth stable release of Qubes 4.0. It includes many updates over the initial 4.0 release, including: all 4.0 dom0 updates to date; Fedora 32 TemplateVM; Debian 10 TemplateVM; Whonix 15 Gateway and Workstation TemplateVMs; Linux kernel 5.4 by default. If you installed Qubes 4.0, 4.0.1, 4.0.2, or 4.0.3 and have fully updated, then your system is already equivalent to a Qubes 4.0.4 installation. No further action is required. Regardless of your current OS, if you wish to install (or reinstall) Qubes 4.0 for any reason, then the 4.0.4 ISO makes this more convenient and secure, since it bundles all Qubes 4.0 updates to date. Please see the installation guide for detailed instructions." Here is the brief release announcement. Download: Qubes-R4.0.4-x86_64.iso (4,959MB, SHA256, signature, torrent, pkglist). |
|
About Qubes
|
Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes. These qubes, which are implemented as virtual machines (VMs). This allows each component of the operating system to be isolated from other pieces, preenting compromises from spreading or information from leaking.
|
Screenshots |
| |
Recent Related News and Releases |
2024-07-14 |
Distribution Release: Qubes OS 4.2.2 |
|
The Qubes OS team have announced a new update to the project's security-focused operating system. One of the significant changes in Qubes OS 4.2.2 is an adjustment to how files are transferreed between isolated envirnonments, called qubes. "Qubes 4.2.2 includes a fix for #8332: File-copy qrexec service is overly restrictive. As explained in the issue comments, we introduced a change in Qubes 4.2.0 that caused inter-qube file-copy/move actions to reject filenames containing, e.g., non-Latin characters and certain symbols. The rationale for this change was to mitigate the security risks associated with unusual unicode characters and invalid encoding in filenames, which some software might handle in an unsafe manner and which might cause confusion for users. Such a change represents a trade-off between security and usability. After the change went live, we received several user reports indicating more severe usability problems than we had anticipated. Moreover, these problems were prompting users to resort to dangerous workarounds (such as packing files into an archive format prior to copying) that carry far more risk than the original risk posed by the unrestricted filenames. In addition, we realized that this was a backward-incompatible change that should not have been introduced in a minor release in the first place. Therefore, we have decided, for the time being, to restore the original (pre-4.2) behavior by introducing a new allow-all-names argument for the qubes.Filecopy service. By default, qvm-copy and similar tools will use this less restrictive service (qubes.Filecopy +allow-all-names) whenever they detect any files that would be have been blocked by the more restrictive service (qubes.Filecopy +). If no such files are detected, they will use the more restrictive service." Additional information is available in the release announcement. Download: Qubes-R4.2.2-x86_64.iso (6,577MB, SHA256, signature, torrent, pkglist). |
|
2023-12-19 |
Distribution Release: Qubes OS 4.2.0 |
|
Qubes OS is a security-focused operating system which isolates system components and applications to minimialize the damage which can be done do to a security breech in any one aspect of the platform. The project's latest release, Qubes OS 4.2.0, offers both Debian and Fedora templates and shifts the default desktop from GNOME to Xfce. "Dom0 upgraded to Fedora 37. Xen upgraded to version 4.17. Default Debian template upgraded to Debian 12. Default Fedora and Debian templates use Xfce instead of GNOME. SELinux support in Fedora templates. Several GUI applications rewritten, including: Applications Menu (also available as preview in R4.1); Qubes Global Settings; create New Qube Qubes Update; Unified grub.cfg location for both UEFI and legacy boot; PipeWire support; fwupd integration for firmware updates; optional automatic clipboard clearing; Official packages built using Qubes Builder v2; Split GPG management in Qubes Global Settings; Qrexec services use new qrexec policy format by default (but old format is still supported)." Additional information is offered in the project's release announcement and in the release notes. Download: Qubes-R4.2.0-x86_64.iso (6,215MB, SHA256, signature, torrent, pkglist). |
|
2023-11-27 |
Development Release: Qubes OS 4.2.0 RC5 |
|
Qubes OS is a security-focused operating system which isolates key system components and tasks from each other. The project's latest development snapshop, Qubes OS 4.2.0-rc5, includes the following changes and developments since the 4.1.0 release: "We're pleased to announce that the fifth release candidate (RC) for Qubes OS 4.2.0 is now available for testing. Dom0 upgraded to Fedora 37; Xen upgraded to version 4.17; default Debian template upgraded to Debian 12; default Fedora and Debian templates use Xfce instead of GNOME; SELinux support in Fedora templates; several GUI applications rewritten, including Applications Menu (also available as preview in R4.1), Qubes Global Settings, create New Qube Qubes Update; unified grub.cfg location for both UEFI and legacy boot PipeWire support; fwupd integration for firmware updates; optional automatic clipboard clearing; official packages built using Qubes Builder v2; split GPG management in Qubes Global Settings; Qrexec services use new qrexec policy format by default." Additional details can be found in the release announcement and in the release notes. Download: Qubes-R4.2.0-rc5-x86_64.iso (6,157MB, SHA256, signature, torrent, pkglist). |
|
2023-08-29 |
Development Release: Qubes OS 4.2.0 RC2 |
|
Qubes OS is a security-oriented project which focuses on isolating the system components and data. The project has released Qubes OS 4.2.0-rc2 which introduces several key changes. The release announcement lists the highlights: "Dom0 upgraded to Fedora 37. Xen updated to version 4.17. Default Debian template upgraded to Debian 12. Default Fedora and Debian templates use Xfce instead of GNOME. SELinux support in Fedora templates. Several GUI applications rewritten, including: Applications Menu; Qubes Global Settings; Create New Qube; Qubes Update. Unified grub.cfg location for both UEFI and legacy boot. PipeWire support. fwupd integration for firmware updates. Optional automatic clipboard clearing. Official packages built using Qubes Builder v2. Split GPG and Split SSH management in Qubes Global Settings." The project's release notes offer additional details. Download: Qubes-R4.2.0-rc2-x86_64.iso (5,938MB, SHA256, signature, torrent, pkglist). |
|
2023-03-15 |
Distribution Release: Qubes OS 4.1.2 |
|
Qubes OS 4.1.2, the latest "patch" release of the project's security-oriented operating system for single-user desktop computing, is now available. This version brings the Fedora template up to version 37 and adds an optional "kernel-latest" Linux kernel, version 6.1.12: "We are pleased to announce the stable release of Qubes 4.1.2. This release aims to consolidate all the security patches, bug fixes, and upstream template OS upgrades that have occurred since the initial Qubes 4.1.0 release. Our goal is to provide a secure and convenient way for users to install (or reinstall) the latest stable Qubes release with an up-to-date ISO. If you are already using any version of Qubes 4.1 (including 4.1.0, 4.1.1, 4.1.2-rc1, and 4.1.2-rc2), then you should simply update normally (which includes upgrading any EOL templates you might have) in order to make your system effectively equivalent to this stable Qubes 4.1.2 release. No reinstallation or other special action is required. Qubes 4.1.2 includes numerous updates over the initial 4.1.0 release, in particular: all 4.1 dom0 updates to date; Fedora 37 template; USB keyboard support in the installer; kernel-latest available as a boot option when starting the installer." Continue to the release announcement for further details. Download (mirrors): Qubes-R4.1.2-x86_64.iso (5,881MB, SHA512, signature, torrent, pkglist). |
|
2022-07-19 |
Distribution Release: Qubes OS 4.1.1 |
|
Andrew David Wong has announced the release of Qubes OS 4.1.1, a "patch" release of the project's security-oriented operating system for single-user desktop computing. This version upgrades the Fedora template to version 36 and the Linux kernel to version 5.15: "We're pleased to announce the stable release of Qubes 4.1.1. This release aims to consolidate all the security patches, bug fixes, and upstream template OS upgrades that have occurred since the initial Qubes 4.1.0 release in February. Our goal is to provide a secure and convenient way for users to install (or reinstall) the latest stable Qubes release with an up-to-date ISO. If you are already using Qubes 4.1.0 or Qubes 4.1.1-rc1, then you should simply update normally (which includes upgrading any EOL templates you might have) in order to make your system essentially equivalent to this stable Qubes 4.1.1 release. No special action is required on your part. Qubes 4.1.1 includes numerous updates over the initial 4.1.0 release, in particular: 4.1.0 dom0 updates to date; Fedora 36 template (upgraded from Fedora 34); Linux kernel 5.15 (upgraded from 5.10)." See the release announcement for more details. Download (mirrors): Qubes-R4.1.1-x86_64.iso (5,523MB, SHA512, signature, torrent, pkglist). |
|
2022-02-05 |
Distribution Release: Qubes OS 4.1.0 |
|
Andrew David Wong has announced the release of Qubes OS 4.1.0, a major new update from the project that focuses on Linux operating system security by isolating computing tasks into separate "qubes". This version brings a variety of improvements, bug fixes and component updates: "At long last, the Qubes 4.1.0 stable release has arrived. The culmination of years of development, this release brings a host of new features, major improvements and numerous bug fixes. The GUI domain is a qube separate from dom0 that handles all display-related tasks and some system management. This separation allows us to more securely isolate dom0 while granting the user more flexibility with respect to graphical interfaces. Qrexec is is an RPC (remote procedure call) mechanism that allows one qube to do something inside another qube. The qrexec policy system enforces 'who can do what and where.' Qubes 4.1 brings a new qrexec policy format, significant performance improvements, support for socket services and policy notifications that make it easier to detect problems." Read the rest of the release announcement for a complete list of new features. Download (mirrors): Qubes-R4.1.0-x86_64.iso (5,679MB, SHA512, signature, torrent, pkglist). |
|
2022-01-18 |
Development Release: Qubes OS 4.1.0 RC4 |
|
Qubes OS is a security-oriented, desktop operating system which places a strong focus on isolating individual tasks. The project's latest development snapshot includes testing for Gentoo templates, Debian reproducible builds, and domain changes for the graphical interface. The release announcement states: "The fourth release candidate for Qubes 4.1.0 is here. There are no major changes to report. We've just focused on fixing bugs that were discovered and reported in the third release candidate. If you're currently using any Qubes 4.1.0 release candidate, a regular update is sufficient to upgrade to the latest one. Otherwise, read on for more about how to get started with testing Qubes 4.1.0-rc4. In case you still haven't heard, Qubes 4.1.0 includes several major new features, each of which is explained in depth in its own article: Qubes Architecture Next Steps: The GUI Domain; Qubes Architecture Next Steps: The New Qrexec Policy System; New Gentoo templates and maintenance infrastructure; Reproducible builds for Debian: a big step forward. There are also numerous other improvements and bug fixes listed in the release notes and in the issue tracker." Download: Qubes-R4.1.0-rc4-x86_64.iso (5,651MB, SHA256, signature, torrent, pkglist). |
|
2021-01-24 |
Development Release: Qubes OS 4.0.4 RC2 |
|
Qubes OS is a security-oriented Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. The project's latest development snapshot is Qubes OS 4.0.4-rc2 which updates its operating system tempates and packages. "We're pleased to announce the second release candidate for Qubes OS 4.0.4. Qubes OS 4.0.4-rc2 includes many updates over the initial 4.0 release, in particular: All 4.0 dom0 updates to date. Fedora 32 TemplateVM. Debian 10 TemplateVM. Whonix 15 Gateway and Workstation TemplateVMs. Linux kernel 5.4 by default. Bug fixes from 4.0.4-rc1. A point release does not designate a separate, new version of Qubes OS. Rather, it designates its respective major or minor release (in this case, 4.0) inclusive of all updates up to a certain point. Installing Qubes 4.0 and fully updating it results in the same system as installing Qubes 4.0.4." Further information can be found in the project's release announcement. Download: Qubes-R4.0.4-rc2-x86_64.iso (4,958MB, SHA256, signature, pkglist). |
|
2020-01-02 |
Distribution Release: Qubes OS 4.0.2 |
|
Happy New Year! We start the year with the announcement about the release of Qubes OS 4.0.2, the latest update of the project's security-focused Linux distribution which allows users to "compartmentalise" computing tasks into isolated compartments called qubes. The new release updates the Linux kernel to version 4.19.89: "We are pleased to announce the release of Qubes 4.0.2. This is the second stable point release of Qubes 4.0. It includes many updates over the initial 4.0 release, in particular: all 4.0 dom0 updates to date; Fedora 30 TemplateVM; Debian 10 TemplateVM; Whonix 15 Gateway and Workstation TemplateVMs; Linux kernel 4.19 by default. If you installed Qubes 4.0 or 4.0.1 and have fully updated, then your system is already equivalent to a Qubes 4.0.2 installation. No further action is required. Note: at 4.5 GB, the Qubes 4.0.2 ISO image will not fit on a single-layer DVD (for the technical details underlying this, please see issue #5367). Instead, we recommend copying the ISO image onto a sufficiently large USB drive. However, if you would prefer to use optical media, we suggest selecting a dual-layer DVD or a Blu-ray disc." See the release announcement for further information. Download: Qubes-R4.0.2-x86_64.iso (4,607MB, SHA256, signature, torrent, installation guide, pkglist). |
|
2019-01-09 |
Distribution Release: Qubes OS 4.0.1 |
|
Marek Marczykowski-Górecki has announced the release of Qubes OS 4.0.1, an updated version of the project's security-focused Linux distribution which allows users to "compartmentalise" computing tasks into isolated compartments called qubes. This new release is mostly a bug-fix and security update and is recommended for all new Qubes installations: "We are pleased to announce the release of Qubes 4.0.1. This is the first stable point release of Qubes 4.0. It includes many updates over the initial 4.0 release, in particular: all 4.0 dom0 updates to date, including a lot of bug fixes and improvements for GUI tools; Fedora 29 TemplateVM; Debian 9 TemplateVM; Whonix 14 Gateway and Workstation TemplateVMs; Linux kernel 4.14. If you're currently using an up-to-date Qubes 4.0 installation (including updated Fedora 29, Debian 9, and Whonix 14 templates), then your system is already equivalent to a Qubes 4.0.1 installation. No action is needed. Similarly, if you're currently using a Qubes 4.0.1 release candidate and you've followed the standard procedure for keeping it up-to-date, then your system is equivalent to a 4.0.1 stable installation." Read the rest of the release announcement for additional information. Download: Qubes-R4.0.1-x86_64.iso (4,476MB, SHA256, signature, torrent, installation guide, pkglist). |
|
2018-03-29 |
Distribution Release: Qubes OS 4.0 |
|
Andrew David Wong has announced the release of Qubes OS 4.0, a major new update of the project's security-oriented desktop Linux distribution based on Fedora 25: "After nearly two years in development and countless hours of testing, we're pleased to announce the stable release of Qubes OS 4.0. Version 4.0 includes several fundamental improvements to the security and functionality of Qubes OS: the Qubes Admin API; Qubes Core Stack version 3; fully virtualized virtual machines for enhanced security; multiple, flexible Disposable VM templates; a more expressive, user-friendly Qubes RPC policy system; a powerful new VM volume manager that makes it easy to keep VMs on external drives; enhanced TemplateVM security via split packages and network interface removal; more secure backups with scrypt for stronger key derivation and enforced encryption; re-written command-line tools with new options." See the release announcement and release notes for more information. Download the installation DVD image from here: Qubes-R4.0-x86_64.iso (4,369MB, SHA256, signature, torrent, installation guide, pkglist). |
|
2018-02-01 |
Development Release: Qubes OS 4.0 RC4 |
|
Andrew David Wong has announced the availability of the fourth release candidate for Qubes OS 4.0, un upcoming new version of the project's Fedora-based, security-oriented desktop Linux distribution: "We're pleased to announce the fourth release candidate for Qubes 4.0. This release contains important safeguards against the Spectre and Meltdown attacks, as well as bug fixes for many of the issues discovered in the previous release candidate. A full list of the Qubes 4.0 issues closed so far is available here. The Qubes VM Manager is back by popular demand. The returning Qubes Manager will be slightly different from the 3.2 version. Specifically, it will not duplicate functionality that is already provided by the new 4.0 widgets. Specific examples include attaching and detaching block devices, attaching and detaching the microphone, and VM CPU usage. In addition, the default TemplateVMs have been upgraded to Fedora 26 and Debian 9." See the release announcement and release notes for further information. Download: Qubes-R4.0-rc4-x86_64.iso (4,350MB, SHA256, signature, torrent, pkglist). |
|
2017-11-28 |
Development Release: Qubes OS 4.0 RC3 |
|
Andrew David Wong has announced that the third release candidate for Qubes OS 4.0 is now ready for testing. Qubes OS is a Fedora-based, security-oriented desktop Linux distribution with a strong focus on system security; this is achieved through what the project calls "compartmentalisation", a feature that allows users to separate the various parts of their desktop tasks into securely isolated compartments called qubes. Much of the work prior to this release concentrated on bug fixing, rather than on adding new features: "We're pleased to announce the third release candidate for Qubes 4.0. Our goal for this release candidate is to improve the stability and reliability of Qubes 4.0, so we've prioritized fixing known bugs over introducing new features. Many of the bugs discovered in our previous release candidate are now resolved. A full list of the Qubes 4.0 issues closed so far is available here. Current users of Qubes 4.0-rc2 can upgrade in-place by downloading the latest updates from the testing repositories in both dom0 and TemplateVMs." See the release announcement and release notes for more details. Download: Qubes-R4.0-rc3-x86_64.iso (4,482MB, SHA256, signature, torrent, pkglist). |
|
2017-10-25 |
Development Release: Qubes OS 4.0 RC2 |
|
Marek Marczykowski-Górecki has announced the availability of the second release candidate for Qubes OS 4.0, a Fedora-based desktop Linux distribution with a strong focus on system security. This is achieved by isolating different tasks into separate virtual domains: "We're pleased to announce the second release candidate for Qubes 4.0. As usual, this release candidate includes numerous bug fixes over the previous one. Two of the most important changes are: improved PCI passthrough with sys-net and sys-usb running in HVM mode by default - with this change, we've officially achieved our Qubes 4.0 goal of having all qubes running in HVM mode by default for enhanced security; Whonix templates are back - we've fixed various blocking issues and the Whonix templates are available in the default installer once again. There were two primary reasons for the substantial delay of this release. The first was our discovery of the security issue that would come to be known as XSA-237." See the release announcement and release notes for further information and technical details. Download: Qubes-R4.0-rc2-x86_64.iso (4,430MB, SHA256, signature, torrent, pkglist). |
|
2017-07-31 |
Development Release: Qubes OS 4.0 RC1 |
|
Qubes OS is a desktop operating system which strongly isolates different tasks into separate domains to reduce the consequences of any one application being compromised. The Qubes OS project has released the first release candidate for Qubes OS 4.0, which features a big overhaul of the core Qubes technology. "No doubt this release marks a major milestone in Qubes OS development. The single most import undertaking which sets this release apart, is the complete rewrite of the Qubes Core Stack. We have a separate set of posts detailing the changes (Why/What/How), and the first post is planned to be released in the coming 2 weeks. This new Core Stack allows to easily extend the Qubes Architecture in new directions, allowing us to finally build (in a clean way) lots of things we’ve wanted for years, but which would have been too complex to build on the 'old' Qubes infrastructure. The new Qubes Admin API, which we introduced in a recent post, is a prime example of one such feature. (Technically speaking, we’ve neatly put the Admin API at the heart of the new Qubes Core Stack so that it really is part of the Core Stack, not merely an 'application' built on top of it.)" Further details, including new features, can be found in the project's release announcement and in the release notes. Download: Qubes-R4.0-rc1-x86_64.iso (3,303MB, SHA256, signature, torrent, pkglist). |
|
2016-09-29 |
Distribution Release: Qubes OS 3.2 |
|
Joanna Rutkowska has announced the release of Qubes OS 3.2, a new stable release of the Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. From the release announcement: "I'm happy to announce that today we're releasing Qubes OS 3.2. This is an incremental improvement over the 3.1 version that we released earlier this year. A lot of work went into making this release more polished, more stable and easier to use than our previous releases. One major feature that we've improved upon in this release is our integrated management infrastructure, which was introduced in Qubes 3.1. Whereas before it was only possible to manage whole VMs, it is now possible to manage the insides of VMs as well. The principal challenge we faced was how to allow such a tight integration of the management engine software (for which we use Salt) with potentially untrusted VMs without opening a large attack surface on the (complex) management code." Download the new Qubes OS release from here: Qubes-R3.2-x86_64.iso (4,050MB, SHA256, signature, pkglist). |
|
2016-03-09 |
Distribution Release: Qubes OS 3.1 |
|
Joanna Rutkowska has announced the launch of Qubes OS 3.1, a new stable release of the Qubes operating system which enforces strong isolation between tasks. Version 3.1 of the security-oriented project features a new management system that centrally controls Qubes configuration: "The major new architectural feature of this release has been the introduction of Qubes Management infrastructure, which is based on popular Salt management software. In Qubes 3.1 this management stack makes it possible to conveniently control system-wide Qubes configuration using centralized, declarative statements. Declarative is a key word here: it makes creating advanced configurations significantly simpler (the user or administrator needs only to specify what they want to get, rather than how they want to get it). This has already allowed us to improve our installation wizard (firstboot) so that it now offers the user ability to easily select various options to pre-create some useful configurations, such as e.g. Whonix or USB-hosting VMs." The new release of Qubes OS also supports booting on machines with UEFI and introduces additional hardware support for a range of video cards. The release announcement and release notes have additional details. Download: Qubes-R3.1-x86_64.iso (4,754MB, SHA256, signature, torrent, pkglist). |
|
2015-10-01 |
Distribution Release: Qubes OS 3.0 |
|
Joanna Rutkowska has announced the availability of a new release of Qubes OS, a Fedora based platform which isolates a user's tasks for improved security. The new release, Qubes OS 3.0, includes a number of important improvements over the 2.0 release. Among the new features are separating Qubes from the underlying hypervisor (which may allow Qubes to use alternative hypervisors in the future), Debian templates and an upgrade from Xen 4.1 to 4.4. "New features since 2.0: HAL (Hypervisor Abstraction Layer) - based on libvirt, opens a whole new possibilities of using different hypervisors. Currently Qubes OS uses Xen. Xen 4.4 - many new features, but for us the most important is much more mature libxl tool stack. Qrexec 3 - greatly improved performance by using direct VM-VM connections and bigger buffers. Debian templates get official support. Whonix templates. Build system improvements - especially support for distribution-specific plugins (makes supporting multiple distributions much easier) and building templates using DispVM. Automated tests - makes much easier to find bugs." Further information can be found in the project's release announcement and the release notes. Download: Qubes-R3.0-x86_64-DVD.iso (3,533MB, SHA256, pkglist).
|
|
2015-04-24 |
Development Release: Qubes OS 3.0 RC1 |
|
Joanna Rutkowska has announced the availability of the first release candidate for Qubes OS 3.0, a rather unique Fedora-based desktop Linux distribution which attempts to provide strong security for desktop computing using independent virtual containers: "Finally, we're releasing the first installable ISO image for Qubes OS 3.0, the release candidate 1 (3.0-rc1). Compared to Qubes 2, which we released last year, Qubes OS 3.0 brings major improvements in two distinct areas. It implements the new hypervisor-abstracted architecture (which we call HAL), and introduces a load of new features - Xen 4.4, new qrexec. It also brings lots of new VM templates with full Qubes integration: Debian 7 and 8, Whonix 9 and many more. It also provides important modifications and improvements to our build system. Let me spend a while discussing these build system improvements now, as these are quite important for the future of the project." See the full release announcement for a detailed description of the upcoming features and a roadmap to achieve these goals. Interested testers can download (MD5) the installation DVD image from SourceForge: Qubes-R3.0-rc1-x86_64-DVD.iso (3,849MB, pkglist). |
|
2014-09-27 |
Distribution Release: Qubes OS 2 |
|
Joanna Rutkowska has announced the release of Qubes OS 2, a Fedora-based, security-oriented desktop Linux distribution with integrated Xen virtualisation: "Today we're releasing Qubes OS R2! I'm not going to write about all the cool features in this release because you can find all this in our Wiki and previous announcements. Suffice to say that we've come a long way over those 4+ years from a primitive proof of concept to a powerful desktop OS which, I believe, it is today. One of the biggest difficulties we have been facing with Qubes since the very beginning, has been the amount of this extra, not-so-exciting, not directly security-related work, but so much needed to ensure things actually work. Yet, the line between what is, and what is not-security related, is sometimes very thin and one can easily cross it if not being careful." Read the rest of the release announcement for more information. Download (MD5): Qubes-R2-x86_64-DVD.iso (2,935MB, pkglist). |
|
2014-08-06 |
Development Release: Qubes OS 2 RC2 |
|
Joanna Rutkowska has announced the availability of the second release candidate for Qubes OS 2, a Fedora-based desktop Linux distribution with integrated Xen virtualisation designed for improved security: "Today we release the second release candidate for Qubes OS R2. There are currently no more open tickets for the final R2 release, and we hope that what we release today is stable enough and so it will be identical, or nearly identical, to the final R2 ISO image. After the RC1 release a few months ago we have been hit by a number of problems related to unreliable VM startups. The most prevalent problem has been traced down to an upstream bug in systemd, which just happened to be manifesting on Qubes OS due to specific conditions imposed by our startup scripts. Actually, it has not been the first time when some things related to VM bootup or initialization didn't work quite well on Qubes." Read the rest of the release announcement for more information. Download (MD5): Qubes-R2-rc2-x86_64-DVD.iso (2,854MB, pkglist). |
|
2014-04-20 |
Development Release: Qubes OS 2 RC1 |
|
Joanna Rutkowska has announced the availability of the first release candidate for Qubes OS 2, a Fedora-based distribution with strong desktop security via integrated Xen virtualisation: "Today we're releasing Qubes OS R2 RC1 (release candidate), which is expected to be the last milestone before the final Qubes OS R2 release. As mentioned previously today's release is bringing mainly UI improvements and polishing and lots of bug fixes, as well as some last new features. Both Dom0 and VMs have been upgraded to Fedora 20. Support for full templates download via two new repo definitions - templates-itl and templates-community. With a bit of imagination we could call it Qubes 'AppStore' for VMs. Currently we have only published one template there – the new default FC20-based template, but we plan to upload more templates in the coming weeks." Read the rest of the release announcement for further details. Download (MD5): Qubes-R2-rc1-x86_64-DVD.iso (2,824MB). |
|
2013-12-11 |
Development Release: Qubes OS 2 Beta 3 |
|
Joanna Rutkowska has announced the availability of the third beta release of Qubes OS 2, a Fedora-based distribution designed to provide strong security for desktop computing: "Today we're releasing Qubes R2 beta 3, the latest milestone on our roadmap for Qubes R2. Even though it is still called a beta, most users should install it, because, we believe, it is the most polished and stable Qubes version. Highlights: seamless GUI virtualization for Windows 7-based AppVMs, and support for HVM-based templates (e.g. Windows-based templates); a much more advanced infrastructure for system backups; it is now possible to set 'autostart' property on select VMs; we now ship the installer with multiple kernel versions (3.7, 3.9, and 3.11); new monitor layout is now dynamically propagated to the AppVMs; cleanups and fixes." See the release announcement for further information. Download from SourceForge: Qubes-R2-Beta3-x86_64-DVD.iso (2,464MB). |
|
2013-02-28 |
Development Release: Qubes OS 2 Beta 2 |
|
Joanna Rutkowska has announced the availability of the second beta release of Qubes OS 2, a Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines: "Qubes 2 beta 2 has been released. We're progressing fast and today I would like to announce the release of Qubes R2 beta 2. The major changes in this beta release include: upgraded Dom0 distribution to the latest Fedora 18 (all previous releases used Fedora 13 for Dom0); upgraded default VM template also to Fedora 18; upgraded Dom0 kernel to 3.7.6; upgraded KDE environment in Dom0 (KDE 4.9); introduced Xfce 4.10 environment for Dom0 as an alternative to KDE; a few other fixes and improvements, including the recently discussed disposable VM-based PDF converter. The upgrade of the Dom0 distribution and kernel should significantly improve hardware compatibility." See the release announcement for more information and a screenshot. Download: Qubes-R2-Beta2-x86_64-DVD.iso (2,139MB). |
|
2012-12-14 |
Development Release: Qubes OS 2 Beta 1 |
|
Joanna Rutkowska has announced the availability of the first beta build of Qubes OS version 2, a Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines: "It's my pleasure to announce that the first beta for Qubes Release 2 is now available for download. This release introduces generic support for fully virtualized AppVMs (called HVMs in Xen parlance), and specifically initial support for Windows-based AppVMs integration. Generic support for HVMs means you can now install many different OSes as Qubes VMs, such as various Linux distros, BSD systems, and, of course, Windows. Essentially all you need is an installation ISO and the whole process is similar to creating a VM in a program like Virtual Box or VMware Workstation (although we believe the underlying architecture for this is more secure in Qubes)." Read the rest of the release announcement for further information. Download: Qubes-R2-Beta1-x86_64-DVD.iso (1,694MB). |
|
2012-09-04 |
Distribution Release: Qubes OS 1.0 |
|
Joanna Rutkowska has announced the release of Qubes OS 1.0, a Fedora-based security distribution for the desktop with a number of isolated domains implemented as lightweight virtual machines running under Xen: "After nearly three years of work, I have a pleasure to announce that Qubes OS 1.0 has finally been released. Qubes OS is an advanced tool for implementing security by isolation on your desktop, using domains implemented as lightweight Xen virtual machines. It tries to marry two contradictory goals: how to make the isolation between domains as strong as possible, mainly due to clever architecture that minimizes the amount of trusted code, and how to make this isolation as seamless and easy as possible. Again, how the user is going to take advantage of this isolation is totally left up to the user." Read the release announcement and visit the project's security goals page to learn more. Download: Qubes-R1-x86_64-DVD.iso (1,668MB, torrent).
|
|
|
Sidebar Sponsor |
|
|