DistroWatch Weekly |
DistroWatch Weekly, Issue 697, 30 January 2017 |
Welcome to this year's 5th issue of DistroWatch Weekly!
There is usually a trade off to be made between convenience and security. Signing into a user account without a password is easy, but not at all secure while running every application in its own virtual machine is secure, but not at all convenient. This week we explore Subgraph OS, a project which attempts to juggle both security and convenience, providing its users with a friendly desktop environment with many powerful security features. In our Tips and Tricks column this week we look at the steps required to install Ubuntu Touch onto an Android phone and the resulting experience. Plus we discuss Arch Linux phasing out support for 32-bit computers, talk about the Budgie desktop using Qt for future development and Linux Mint updating its Debian Edition. We also share the releases of the past week and provide a list of the torrents we are seeding. In our Opinion Poll we talk about installing alternative ROMs on smart phones and we hope you will share your experiences, good or bad, in the comments section. This week we are pleased to announce we are hosting a new resource, simplified manual pages with straight forward examples detailing how to use command line programs. Plus we welcome the storage-focused OviOS Linux distribution and the web-focused CloudReady distribution to our database. We wish you all a fantastic week and happy reading!
Content:
Listen to the Podcast edition of this week's DistroWatch Weekly in OGG (65MB) and MP3 (42MB) formats.
|
Feature Story (by Jesse Smith) |
Subgraph OS 2016.12.30 Alpha
The Internet can seem a scary place, full of organizations monitoring our every on-line move and waves of attackers trying to gain access to our systems. A number of projects have been created with the aim of making Linux distributions safer and protecting our privacy. Tails, for example, routes Internet connections through the Tor anonymizing network to make it more difficult to track its users. The Qubes OS project isolates tasks, helping the user to essentially compartmentalize their applications and data.
Another Linux distribution which tries to protect the user and their files is Subgraph OS. The Subgraph distribution is based on Debian and includes several security features to keep the operating system locked down and our on-line browsing anonymous. The following excerpts from the Subgraph website give us a taste of the project's features:
Subgraph OS ships with a kernel hardened with Grsecurity, the best set of Linux kernel security enhancements available. Grsecurity includes PaX, a set of patches to make both the userland and the kernel more resistant to exploitation of memory corruption vulnerabilities.
* * * * *
Subgraph OS's application containment mechanism creates sandboxes around at-risk applications, such as the browser, e-mail client, PDF viewer, and IM client. The objective of this is to contain the impact of a successful attack against these applications, preventing compromise of the entire system. Each application within a container has a limited view of the host system and limited set of capabilities such as limiting access to the file system or the network.
* * * * *
Subgraph OS includes features to enforce application network policies such as Subgraph Metaproxy and the application firewall.
* * * * *
Metaproxy is configured to redirect outgoing connections to the Tor network based on a white-list of approved applications. Each application is automatically relayed through a proxy that will use a different Tor circuit.
* * * * *
The application firewall will restrict which applications can connect to the network based on the name of the application or the destination. Users will be prompted to set temporary or permanent policies as outgoing connections are made.
* * * * *
Subgraph OS users who install the operating system must have encrypted file systems. It is not optional in Subgraph OS.
Subgraph OS 2016.12.30 -- Running the Tor web browser
(full image size: 478kB, resolution: 1366x768 pixels)
Subgraph OS is available for 64-bit x86 computers exclusively. The ISO I downloaded for Subgraph was approximately 1.3GB in size. Booting from the Subgraph installation media brings up a menu asking us if we would like to start the distribution's live desktop mode, run a system installer or start a graphical installer.
I experimented with running Subgraph in a VirtualBox virtual machine first. When trying to launch the live mode in VirtualBox, the distribution displayed a graphical boot screen for a while, then switched to a text screen where I could watch status messages scroll by. The system eventually locked up, displaying a series of blinking messages which all read "Started Session # of user user."
I next tried to install Subgraph in VirtualBox. The distribution did install successfully, but once Subgraph was installed, trying to boot the distribution in VirtualBox resulted in the same issue with Subgraph displaying flashing text (this time the final, flickering boot message indicated Subgraph was trying to start the GNOME display manager) and failing to reach a login screen.
Subgraph OS 2016.12.30 -- Launching software from GNOME's Activities menu
(full image size: 433kB, resolution: 1366x768 pixels)
I then tried running Subgraph on a laptop computer. On the laptop, booting from the installation media and selecting the live environment loaded the GNOME desktop environment. The desktop was responsive and I noticed sound was muted by default. I found my wireless card was properly detected and everything seemed to be working well in the live environment so my next step was to install the distribution. There does not appear to be a way to launch the distribution's system installer from the live environment, but we can reboot and select the Install or Graphical Install options from the boot menu.
Subgraph uses the Debian system installer. I used the graphical installer which walks us through selecting our preferred language and our region. We can then confirm our computer's keyboard layout and create a password for our user account. Disk partitioning comes next, which is a little cumbersome. Subgraph offered to set itself up with a LVM volume by default, but I changed this and opted for install the distribution on a ext4 partition. Subgraph's packages are then installed on our hard drive and we are given the option of installing the GRUB boot loader. When the installer is finished, it automatically reboots the computer.
Subgraph's default desktop environment is GNOME 3.22. The desktop is mostly empty with a panel across the top of the display. The left side of the panel contains the Activities menu where we can launch applications and search for programs. Over on the right side of the panel is a system tray and user's menu. From the tray we can configure networking, manage the firewall, access system settings and logout.
On my laptop, Subgraph ran smoothly. The desktop was responsive, my hardware was properly detected, my screen was set to use its full resolution and the operating system was stable. The distribution, when logged into GNOME, used a modest 350MB of memory.
Subgraph OS 2016.12.30 -- Exploring options in the settings panel
(full image size: 187kB, resolution: 1366x768 pixels)
By default, Subgraph disabled GNOME's history logging and turned off location services. All network traffic, even to specific local network addresses, is routed through the Tor network. Using Tor to anonymize traffic means it is harder (though not impossible) for others to track us on-line, but it also means our network connection is slower. Websites tended to take anywhere from five to ten times longer to load when I was using Subgraph. Speaking of web browsing, Subgraph uses the Tor web browser which includes some nice security features and defaults to using DuckDuckGo as the primary search engine.
Subgraph ships with the Icedove e-mail client, which is a re-branded version of Thunderbird. Icedove's ability to auto-detect server configuration settings while create new e-mail accounts has been disabled to avoid leaking identifying information. This means we need to manually configure our e-mail account. The version of Icedove which ships with Subgraph features Enigmail, a tool which makes encrypting messages and reading encrypted messages straight forward. Enigmail will run automatically when we set up our first account and launches a wizard to help set up our encryption keys.
Subgraph OS 2016.12.30 -- Creating encryption keys with Enigmail
(full image size: 144kB, resolution: 1366x768 pixels)
Icedove is not the only application that has extra security features. The file manager has two additional features baked into it. The first scrubs selected files of identifying meta-data when we right-click on a document. I tested this function and it seemed to mostly work, but there was some remaining exif data left behind in images.
A second feature the file manager gives us the opportunity to share files with other people over the network using a service called OnionShare. When we right-click on a file and opt to share it, a window opens and gives us the chance to share the selected files over the Tor network. When we click a button OnionShare should provide us with a unique URL which we can then send to other people. Those people can then use the URL to download the files we share, at which point the OnionShare service stops sharing those files in order to prevent others from finding the link and downloading the data too. I tried using OnionShare on a few files, but the service was never able to supply me with a unique URL which meant I could not provide a link to my files to anyone else.
Another feature which I suspect will come in handy is the virtual keyboard. Having a virtual keyboard can be helpful if we either want to work with an on-screen keyboard on a touch screen or if we want to side-step equipment which could be logging our keystrokes.
Subgraph OS 2016.12.30 -- Using the on-screen keyboard
(full image size: 104kB, resolution: 1366x768 pixels)
I noticed printing services were not available in Subgraph. Selecting the printer module in the distribution's settings panel displays a message indicating the CUPS printer service is not available. We could install CUPS from the project's software repositories. Connecting to a local network printer probably will not work as our network traffic is redirected through Tor, but I have not tested this idea.
One feature of Subgraph I appreciated a lot was the firewall. When we try to connect to the Internet using the Icedove e-mail client or the Tor web browser, the connection goes through as expected. But most other applications, when they try to connect to a remote server, cause a warning to be displayed on the desktop. Outgoing connections are blocked and we are given the chance to allow the application to talk to remote servers either just for the duration of our current session or permanently. I have encountered several people over the years who want an application-focused firewall on Linux with an easy to use GUI and Subgraph provides this service.
Subgraph OS 2016.12.30 -- Filtering network traffic from applications
(full image size: 120kB, resolution: 1366x768 pixels)
One final application I found intriguing was the Ricochet messaging service. Ricochet looks a bit like other instant messaging programs, like Pidgin. However, Ricochet provides users with an anonymous, randomly generated handle we can share with others. I did not get into using Ricochet to chat with others, but I like the concept of a semi-anonymous chat service with connections redirected through Tor.
Subgraph OS 2016.12.30 -- The Ricochet messaging application
(full image size: 109kB, resolution: 1366x768 pixels)
Apart from the applications mentioned previously, Subgraph ships with a fairly standard collection of GNOME software and the LibreOffice productivity suite. The distribution also includes systemd 232 and version 4.8.15 of the Linux kernel. Should we wish to install additional software we can use the package manager to draw in new packages from the Debian Stretch repositories. Some extra packages are provided by a custom Subgraph repository.
Conclusions
The Subgraph distribution is still in an alpha state and I think it is worth keeping that in mind when attempting to evaluate the project's usefulness. The distribution has a few rough edges, for example the OnionShare service did not work for me. I also had trouble running the distribution in a VirtualBox environment. However, apart from those issues, Subgraph worked well for me. The distribution played well with my laptop's hardware and the Tor network and web browser worked for me.
I think Subgraph ships with several interesting features that people will find useful. The application level firewall worked really well for me and I liked that I was able to allow or block outgoing connections as they happened. This dynamic, user friendly approach to managing the firewall was easy to use and I think it will appeal to people coming from a Windows background especially. I also liked the way Enigmail is integrated with Icedove and the extra functions built into the file manager.
I think what impressed me most about using Subgraph was that, apart from the reduced network performance, using the distribution was much the same as using mainstream Linux distributions which ship with the GNOME desktop. Running Subgraph feels approximately the same as using Debian or Fedora in the way things are arranged. The performance and ease of use are fairly similar too. Often times security-focused distributions are more difficult to use or put up barriers the user needs to work with or around. With Subgraph there are few hurdles, but some nicely integrated security features I think privacy-minded people will enjoy.
* * * * *
Hardware used in this review
My physical test equipment for this review was a de-branded HP laptop with the following
specifications:
- Processor: Intel i3 2.5GHz CPU
- Display: Intel integrated video
- Storage: Western Digital 700GB hard drive
- Memory: 6GB of RAM
- Wired network device: Realtek RTL8101E/RTL8102E PCI Express Fast
- Wireless network device: Realtek RTL8188EE Wireless network card
|
Miscellaneous News (by Jesse Smith) |
Arch to phase out 32-bit, Solus to use Qt for Budgie development, Linux Mint testing updated LMDE media
Barttomiej Piotrowski has announced through the Arch Linux developer mailing list that the popular rolling release distribution will be phasing out support for computers running 32-bit CPUs. "Due to the decreasing popularity of i686 among the developers and the community, we have decided to phase out the support of this architecture. The decision means that February's ISO will be the last that allows to install 32-bit Arch Linux. The next 9 months are deprecation period, during which i686 will be still receiving upgraded packages. Starting from November 2017, packaging and repository tools will no longer require that from maintainers, effectively making i686 unsupported." The discussion can be found on the Arch Linux mailing list.
* * * * *
The Solus project, home of the Budgie desktop environment, is looking to make some significant changes to the technology underlying Budgie. The Budgie desktop is currently integrated with GNOME and GNOME's applications. However, as GNOME evolves the Budgie developers have had to adjust their software to match. Ikey Doherty explains: "Originally, Budgie intended to integrate with GNOME applications. What actually happened is that it then fully integrated into the GNOME stack. We got our integration, but at a heavy cost. Over time, as GNOME has evolved, every single major release of GNOME has caused issues for Budgie. This is from 3.10, when Budgie first began, all the way through to GNOME 3.22. Whether it's API or ABI changes, components eating other components (such as Mutter folding in cogl and clutter), many, many theme and widget breakages, GdkScreen APIs no longer functioning the same, or even segfaults caused due to the behaviour of GSettings relocatable schemas being changed.. You get the idea. Let it be known, this post is not designed to insult or belittle GNOME. The fact of the matter is, as a project, I have tremendous respect for GNOME. They have a vision and intend to see it through. Unfortunately, this has made it difficult for a project with the complexity of Budgie to then reuse those same components of GNOME." Looking ahead, the Budgie project will migrate to the Qt framework for future development. Qt is a popular toolkit for desktop development and is currently used by the KDE Plasma, Lumina and LXQt desktop environments.
* * * * *
The Linux Mint project maintains several editions of its distribution, most of them based on packages provided by Ubuntu. However, the Linux Mint team maintains a separate branch based on Debian Stable which is appropriately called Linux Mint Debian Edition (LMDE). Linux Mint Debian Edition, version 2, was released back in 2015 and is based on Debian 8 "Jessie". The Mint team is working on updated installation media for LMDE 2 to make installing and updating new copies of the distribution easier. The new media, labelled LMDE 2-Beta, is not a new version of the Debian-based operating system, but presents users with installation media that has been updated with available security fixes. "LMDE 2 received many updates in the last two years, including many improvements which were ported from Linux Mint as well as all the new versions of MATE, Cinnamon and the Xapps. This release provides a new set of installation images for LMDE 2 which includes all these updates." People who are already running LMDE 2 can get the same security updates through their package manager.
* * * * *
These and other news stories can be found on our Headlines page.
|
Tips and Tricks (by Jesse Smith) |
Running Ubuntu Touch on an Android phone
Last year I got my hands on an Ubuntu phone, specifically a Meizu Pro 5, and spent a few weeks with the device to see how the Ubuntu Touch operating system compared to other mobile platforms, particularly Android. Following my review and follow-up Questions and Answers column, I alternated between using the Ubuntu phone and my Android phone. I liked the design of the Ubuntu Touch operating system with its quick messaging replies, informative scopes and lack of advertisements. On the other hand, the Ubuntu device would occasionally wake up and vibrate in the night and I experienced some connection problems with mobile networks. I reported these issues to the developers and, about once or twice a month, I'd switch phones to keep up to date with developments.
By late 2016 the Ubuntu developers had fixed the issues I was experiencing with the Pro 5. Meanwhile I was becoming increasingly frustrated whenever I used the Android Moto G phone. The regular nag screens, advertisements and pop-ups asking me to update components made the platform more cluttered and distracting than I would have liked. I found myself regarding the Android device as something that made my mobile experience more complicated while the Ubuntu device was making my life easier. As a result, for the past two months I have been using the Ubuntu phone exclusively.
At this point I have grown to like using the Ubuntu phone and other people who have seen it in action usually express an interest in the device, but there is a big barrier to people getting their hands on an Ubuntu phone: no one is currently selling them. There is some good news though, it is possible to take some existing Android phones and install Ubuntu on them, much the same way many of us purchase a laptop bundled with Windows and install our preferred Linux distribution on it. One project which strives to make installing Ubuntu on mobile devices a better experience is UBports. The UBports project works to get Ubuntu running on phones and provides install images and instructions for getting Ubuntu running on a small number of Android devices. I decided to explore the process, see what steps are involved and how well the UBports software works.
I purchased a Nexus 5, one of the three devices currently listed as supported on the UBports website. The Nexus 5 was second-hand and arrived in the mail with a rubber bumper and about 60% battery charge. No USB cable or charger was included.
The Nexus 5 arrived in its factory reset state, running Android 6.0.1. I used the phone with its default Android operating system for a while to establish a base-line for how well the phone worked. For the most part, the Nexus 5 performed well. It ran smoothly and all its functions worked. The battery drained a little quicker than I'm used to, but not too badly. The one unwelcome quirk was that it sometimes took four or five taps on the power button to get the phone to start once it had been powered off. The power button would activate the screen when the phone was sleeping on the first try and the power button issue only seemed to manifest on cold boots. Not a big problem for me as I rarely turn off phones, but the power button was a minor annoyance.
Android 6.0 -- The Settings screen
(full image size: 95kB, resolution: 1080x1920 pixels)
Using the Nexus 5 with Android quickly reminded me why I planned to wipe the phone and install a different operating system. Between the initial set up and launching three applications, the device showed me six nag screens to sign up for services or provide my e-mail address, plus a notification asking me to install software updates. I was eager to get started with my experiment.
UBports provides brief installation instructions and an install image for the Nexus 5. The code name for the install image is Hammerhead. The project indicates the functions of the Nexus 5 should all work, with the exception of Bluetooth.
The installation instructions can be performed from any computer running a recent version of Ubuntu Desktop or one of its derivatives, such as Ubuntu MATE or Linux Mint. The install steps can be performed from either an installed copy of the operating system or a live medium. This means if we have Ubuntu 16.04 on a USB thumb drive, we can use it to install Ubuntu Touch on a phone.
The installation steps on the UBports website make a few assumptions and I want to address those. For example, the UBports documentation assumes our desktop operating system is a modern derivative of Ubuntu and has the Universe repository enabled. The tools we install require the Universe repository to be activated, which can be handled in Ubuntu's Software & Updates application. The UBports documentation also assumes we have already unlocked our phone. If you have not done this ahead of time, the installation of Ubuntu Touch will fail. I will cover these extra steps below.
To recap, we need the following to install Ubuntu on the Nexus 5 (or similar phone):
- A computer running Ubuntu 16.04 (or newer). We can also use a derivative of Ubuntu and the desktop operating system can be running from live media, it does not need to be installed on the hard drive.
- A USB cable to connect the phone to the computer.
- The phone, in my case a Nexus 5. The phone should have a full battery charge.
The first thing we need to do is unlock the phone. On the Nexus 5, this can be done by booting the phone into its Android operating system. Then go into the Settings panel and scroll down to the bottom entry, About Phone. On the About Phone settings page, near the bottom, is an entry labelled Build Number. Tap the Build Number label six times, this will enable Developer Options. Go back a page to the main Settings screen. There will be a new entry called Developer Options. Go into Developer Options and turn on the USB Debugging switch.
Next we switch over to the desktop computer. From the desktop environment, launch the Software & Updates application. Make sure the Universe repository is enabled and close the window. Next, open a virtual terminal and run the following two commands:
sudo apt-get update
sudo apt-get install ubuntu-device-flash phablet-tools
The above commands will download approximately 49MB of packages and set up the necessary tools on your computer. Now, reboot the Nexus 5 and (as the device powers on) hold down the power button and the Volume Up and Volume Down buttons. (The UBports instructions mention the power button and Volume Up, but the Volume Down button must be held too.)
This should cause the Nexus 5 to boot into fastboot mode. We will see a menu come up with boot options. Plug the phone into the computer, via the USB cable. Then run the following command from the computer's virtual terminal:
sudo fastboot oem unlock
The phone should now display a prompt asking if we want to unlock its boot loader. On the phone, press the Volume Up or Volume Down button to select "Yes". Then press the power button to confirm the action. The phone should now be unlocked. From here, we can run a single (though long) command to download a new installation image and copy it to the phone:
sudo ubuntu-device-flash --server=http://system-image.ubports.com touch --channel=ubuntu-touch/stable --device=hammerhead --bootstrap
The above command downloads the Nexus 5 image, called Hammerhead, copies the operating system to the phone and attempts to reboot the phone. If all goes well, the Ubuntu logo (or the UBports logo) should appear on the phone's screen, followed by a reboot. The process takes a few minutes and, if it is interrupted, the installation will fail. The first time I tried this process, something went wrong when files were copying to the phone and the ubuntu-device-flash command reported a problem pushing files to the device. Re-running the above command fixed the issue.
Ubuntu Touch -- Apps scope
(full image size: 302kB, resolution: 1080x1920 pixels)
After a few minutes, the phone will reboot and display the Ubuntu loading screen. The Ubuntu first run wizard will then appear on the phone and walk us through connecting to a wireless network, selecting our location and choosing our time zone. We are then shown the Ubuntu Apps scope and the Unity 8 desktop environment. Additional applications and scopes can be accessed through the App Store icon at the bottom of the screen and settings can be accessed via a drop-down panel at the top of the screen. Should we wish to install new software or check for package updates we will need an Ubuntu account.
The Nexus 5 was fairly responsive when running Ubuntu, offering similar performance to when it was running Android 6. The model I purchased has 16GB of internal storage and had 12GB of space left over after the installation was finished. The device offers about 1.8GB of RAM, 1GB of which was used by Ubuntu. These resource consumption numbers matched my experience running Ubuntu on the Meizu Pro 5.
Up to this point we have covered how to get Ubuntu Touch on an Android phone, but what works and what doesn't? The answer is a bit complicated because there are actually multiple branches of UBport's installation media. There are three development (Devel) branches, an RC branch and a Stable branch. What works and what does not will vary depending on which installation image we use.
When I tried running the Stable and RC branches, the phone properly connected to wireless networks, Bluetooth didn't work and (according to reports I read on UBport's forum) receiving phone calls will not work. The phone's settings panel, installing new applications and using scopes all worked. The camera worked and the device could detect and use its SIM card. I found that trying to launch the default web browser (or any other web browser I installed) would cause the browser to immediately crash. The inability to browse the web appears to be the result of a security feature working a little too well.
When I ran the various development branches, I found the web browser would work, but I was unable to connect to password protected wireless networks. Open networks could be accessed, but no encrypted wi-fi networks. When I ran the Stable branch the phone would not shut off completely and the screen would glow, slowly draining the battery. When running the Devel branches, the phone powered off all the way. Everything else appeared to work the some under both the Stable and Devel branches.
For people who want to try alternative images to the default, Stable image, change the name of the channel parameter in the ubuntu-device-flash command during the installation. So instead of
sudo ubuntu-device-flash --server=http://system-image.ubports.com touch --channel=ubuntu-touch/stable --device=hammerhead --bootstrap
Use this:
sudo ubuntu-device-flash --server=http://system-image.ubports.com touch --channel=ubuntu-touch/devel_rc-proposed --device=hammerhead --bootstrap
Ubuntu Touch -- Settings panel
(full image size: 151kB, resolution: 1080x1920 pixels)
After playing with the various install images for the Nexus 5, I had to conclude the Ubuntu Touch port was not quite ready for daily use. Most of the desired functionality is present, but a few key pieces are missing. As the UBports website shows, the project has most of the features working. The phone suspends, the touch screen works, the device detects mobile and wi-fi networks. Screen rotation works as do the camera and GPS. These are all important features and it is good to see the small UBports team has made so much progress. Unfortunately, the phone's installation branches make the user decide between accessing protected wireless networks and being able to browse the web. And, with the older images at least, receiving calls appears to be an issue. Bluetooth capabilities are detected by the operating system, but not usable yet.
The work UBports has done is impressive, but right now the Nexus 5 port is only close to being usable on a day-to-day basis. Almost all the pieces are in place, but there are still a few key pieces missing, whichever installation channel we use. The port continues to progress and, hopefully, the final few rough edges will be polished in a few months.
The Nexus 5 is not the only port in the works. The Fairphone 2 and OnePlus One devices also have mostly working ports and it looks as though the Fairphone can already be used to make calls. (I contacted the Fairphone project and asked if I could test their device, but they did not have any phones to spare at the time and I could not find any to purchase.)
At this point I wouldn't recommend using UBports on a person's main phone, but if you have a spare device lying around and want to test Ubuntu on it, the project is making installing Ubuntu Touch fairly easy. The entire process of unlocking the phone and installing Ubuntu takes about 15 minutes. At the current rate of development, I think the UBports images may be complete enough to use on a primary mobile device later this year.
As for the Nexus 5 I was using, I'm considering putting a fresh install of Ubuntu Touch on the device and auctioning it off if there is any interest. Please leave a comment if the idea of having an experimental Ubuntu phone appeals to you.
* * * * *
Additional tips and tricks can be found in our Tips and Tricks archive.
|
Released Last Week |
Tails 2.10
The Amnesic Incognito Live System (Tails) distribution is a Debian-based project which focuses on security and anonymity. Tails includes tools for removing meta data from files and routes Internet traffic through the Tor anonymizing network. The project's latest release, Tails 2.10, now includes the OnionShare utility for sharing files from the user's computer over the Tor network. The Tor web browser now features a circuit viewer which will show the nodes a person's web traffic is routed through as it makes its way through the Tor network. Other changes include: "Upgrade Tor to 0.2.9.9. Upgrade Tor Browser to 6.5. Upgrade Linux to 4.8. This should improve the support for newer hardware (graphics, Wi-Fi, etc.) Upgrade Icedove to 45.6.0. Replace AdBlock Plus with uBlock Origin. Configure the APT package manage to use Debian's Onion services. Install the AMDGPU display driver. This should improve the support for newer AMD graphics adapters. Renamed the Boot Loader Menu entries from "Live" to "Tails", and replaced the confusing "failsafe" wording with "Troubleshooting Mode". Add support for exFAT. Remove Nyx (previously called arm). Rewrite Tor control port filter entirely. Now Tails can safely support OnionShare, the circuit view of Tor Browser, and similar. This also enabled Whonix to replace their own similar piece of software with this one." Further information and a list of known issues can be found in the project's release announcement.
Parsix GNU/Linux 8.15
Parsix GNU/Linux is a desktop distribution based on Debian's Stable branch. The Parsix project has released an update to their 8.x series, Parsix GNU/Linux 8.15r0. The new release features the GNOME 3.22.2 desktop environment and version 4.4.44 of the Linux kernel. The Parsix news page reads: We are proud to announce the final release of Parsix GNU/Linux 8.15 code name Nev. Parsix 8.15 ships with GNOME 3.22.2, an updated kernel based on Linux 4.4.44 and tons of updated and upgraded packages. It has been built on top of rock solid Debian Jessie (8.0) platform and all base packages have been synchronized with Debian Jessie repositories as of January 23, 2017." Addition information and key package versions can be found in the project's release notes.
Scientific Linux 7.3
Pat Riehecky has announced the release of Scientific Linux 7.3, a new version of the project's distribution built from the source packages for Red Hat Enterprise Linux (RHEL) and enhanced with scientific applications. The changes in this version include: "The 4.7 GB install disk for Scientific Linux 7 has been discontinued. We have retained the dual-layer install media. We have also produced an 'Everything' image which exceeds dual-layer sizes, but contains the entire tree. OpenAFS has been updated to version 1.6.20, the latest upstream stable. There is a new Scientific Linux End User License Agreement (EULA). The EULA now contains information about the U.S. Government contract under which Fermilab produces Scientific Linux. The Scientific Linux context plugin has been altered to be less aggressive in its use of network resources." See the release announcement and release notes for further details.
Linux Mint 18.1 "KDE", "Xfce"
The Linux Mint team has announced the availability of two new editions of Linux Mint 18.1. The two new editions, KDE and Xfce, feature Mint's X-Apps, desktop applications which are designed to look and act the same across multiple desktop environments. The update manager has been updated to make kernel updates more visible and installing additional language support has been improved: "The Language Settings checks are more exhaustive than before. In previous versions, full support for a particular language included its language packs and localized versions of popular applications such as Thunderbird and Firefox. This now includes a lot more packages such as dictionaries, help packages, fonts, and optional components which depend on the list of applications you installed." The Xfce edition ships with the Xfce 4.12 desktop environment while the KDE edition ships with KDE's Plasma 5.8 desktop. Further information, including system requirements, can be found in the project's release announcements (KDE, Xfce).
Linux Mint 18.1 -- Running the KDE Plasma desktop
(full image size: 774kB, resolution: 1280x1024 pixels)
Bodhi Linux 4.1.0
Jeff Hoogland has announced the availability of a new stable version of Bodhi Linux. The new version, Bodhi Linux 4.1.0, is an update to the project's 4.x.x series and is mostly a bug-fix release. "Today I am happy to announce the first scheduled update release of the Bodhi Linux 4 branch - Bodhi Linux 4.1.0. This release serves to package up the fixes for a few bugs that slipped through the cracks in the 4.0.0 release, as well as provided updated package sets for the install ISO images. Most notably these ISO images come with EFL 1.18.4, Linux Kernel 4.8, and a new Moksha Theme based on the 'Arc Dark' theme. Existing Bodhi 4.0.0 users already have the bug fixes incorporated into these ISO images, but they will need to manually install the newer kernel and theme if they wish to utilize them." Further details can be found in the project's release announcement. The Bodhi release is available in both 32-bit and 64-bit flavours, and it provides two specialist editions - "AppPack" with a large number of pre-installed applications and "Legacy" for older computers.
* * * * *
Development, unannounced and minor bug-fix releases
|
Torrent Corner |
Weekly Torrents
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found here. All torrents we make available here are also listed on the very useful Linux Tracker website. Thanks to Linux Tracker we are able to share the following torrent statistics.
Torrent Corner statistics:
- Total torrents seeded: 286
- Total data uploaded: 54.5TB
|
Upcoming Releases and Announcements |
Summary of expected upcoming releases
|
Opinion Poll |
Running alternative phone operating systems
Many of us like to tinker with operating systems and are as likely to place an alternative operating system on our phone as we are to install a new distribution on our desktop computer. This week we would like to explore whether our readers install alternative or custom operating systems on their smart phones. If you do, please leave us a comment mentioning which operating systems you have installed on your mobile device.
You can see the results of our previous poll on running desktop applications remotely here. All previous poll results can be found in our poll archives.
|
Running alternative phone operating systems
I stick with the default OS: | 1037 (67%) |
I install an alternative OS on my main phone: | 312 (20%) |
I install an alternative OS on a spare phone: | 199 (13%) |
|
|
DistroWatch.com News |
Simplified manual pages
Most Linux distributions, along with flavours of BSD and Unix, ship with local manual pages, commonly called "man pages". These manual pages document the programs included with the operating system and list the functions and options supplied by each program. While manual pages are a very valuable resource, they often act better as quick references for people who already understand how a command works rather than an introduction to the available utilities. The documentation in manual pages is often technical and many manual pages do not include examples of how programs are to be used.
The TLDR team has put together a large collection of simplified manual pages. While many manual pages are dozens of pages long and feature complex explanations of a program's options, the TLDR documentation is brief and more accessible to newcomers. The TLDR versions of manual pages include a plain language explanation of each program along with a few examples of how a program is most commonly used.
DistroWatch now hosts these simplified manual pages (along with a handful of our own pages). We hope this will provide our readers with a quick and easy way to discover what a program does and how it is to be used. The collection of manual pages can be found in our Simplified Manual Pages section.
* * * * *
New distributions added to database
OviOS Linux
OviOS Linux is an independent, storage OS which combines open source technologies to provide a dedicated, performance-oriented storage system. The goal is to keep OviOS Linux a pure storage, appliance-like OS. It targets users and admins who need a stable out-of-the-box iSCSI, NFS, SMB and FTP server. The distribution features a special command line shell called "ovios shell" which strives to simplify system management.
CloudReady
CloudReady is an operating system built and maintained by Neverware. Based on Google’s open source Chromium OS, CloudReady uses web apps and cloud storage instead of traditional software and local storage. The CloudReady distribution is available in free and commercially supported versions.
CloudReady 54.1.25 -- Running the Chromium web browser
(full image size: 553kB, resolution: 1366x768 pixels)
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 6 February 2017. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
|
|
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 1, value: US$20.00) |
|
|
|
bc1qxes3k2wq3uqzr074tkwwjmwfe63z70gwzfu4lx lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr 86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
Extended Lifecycle Support by TuxCare |
| |
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1100 (2024-12-09): Oreon 9.3, differences in speed, IPFire's new appliance, Fedora Asahi Remix gets new video drivers, openSUSE Leap Micro updated, Redox OS running Redox OS |
• Issue 1099 (2024-12-02): AnduinOS 1.0.1, measuring RAM usage, SUSE continues rebranding efforts, UBports prepares for next major version, Murena offering non-NFC phone |
• Issue 1098 (2024-11-25): Linux Lite 7.2, backing up specific folders, Murena and Fairphone partner in fair trade deal, Arch installer gets new text interface, Ubuntu security tool patched |
• Issue 1097 (2024-11-18): Chimera Linux vs Chimera OS, choosing between AlmaLinux and Debian, Fedora elevates KDE spin to an edition, Fedora previews new installer, KDE testing its own distro, Qubes-style isolation coming to FreeBSD |
• Issue 1096 (2024-11-11): Bazzite 40, Playtron OS Alpha 1, Tucana Linux 3.1, detecting Screen sessions, Redox imports COSMIC software centre, FreeBSD booting on the PinePhone Pro, LXQt supports Wayland window managers |
• Issue 1095 (2024-11-04): Fedora 41 Kinoite, transferring applications between computers, openSUSE Tumbleweed receives multiple upgrades, Ubuntu testing compiler optimizations, Mint partners with Framework |
• Issue 1094 (2024-10-28): DebLight OS 1, backing up crontab, AlmaLinux introduces Litten branch, openSUSE unveils refreshed look, Ubuntu turns 20 |
• Issue 1093 (2024-10-21): Kubuntu 24.10, atomic vs immutable distributions, Debian upgrading Perl packages, UBports adding VoLTE support, Android to gain native GNU/Linux application support |
• Issue 1092 (2024-10-14): FunOS 24.04.1, a home directory inside a file, work starts of openSUSE Leap 16.0, improvements in Haiku, KDE neon upgrades its base |
• Issue 1091 (2024-10-07): Redox OS 0.9.0, Unified package management vs universal package formats, Redox begins RISC-V port, Mint polishes interface, Qubes certifies new laptop |
• Issue 1090 (2024-09-30): Rhino Linux 2024.2, commercial distros with alternative desktops, Valve seeks to improve Wayland performance, HardenedBSD parterns with Protectli, Tails merges with Tor Project, Quantum Leap partners with the FreeBSD Foundation |
• Issue 1089 (2024-09-23): Expirion 6.0, openKylin 2.0, managing configuration files, the future of Linux development, fixing bugs in Haiku, Slackware packages dracut |
• Issue 1088 (2024-09-16): PorteuX 1.6, migrating from Windows 10 to which Linux distro, making NetBSD immutable, AlmaLinux offers hardware certification, Mint updates old APT tools |
• Issue 1087 (2024-09-09): COSMIC desktop, running cron jobs at variable times, UBports highlights new apps, HardenedBSD offers work around for FreeBSD change, Debian considers how to cull old packages, systemd ported to musl |
• Issue 1086 (2024-09-02): Vanilla OS 2, command line tips for simple tasks, FreeBSD receives investment from STF, openSUSE Tumbleweed update can break network connections, Debian refreshes media |
• Issue 1085 (2024-08-26): Nobara 40, OpenMandriva 24.07 "ROME", distros which include source code, FreeBSD publishes quarterly report, Microsoft updates breaks Linux in dual-boot environments |
• Issue 1084 (2024-08-19): Liya 2.0, dual boot with encryption, Haiku introduces performance improvements, Gentoo dropping IA-64, Redcore merges major upgrade |
• Issue 1083 (2024-08-12): TrueNAS 24.04.2 "SCALE", Linux distros for smartphones, Redox OS introduces web server, PipeWire exposes battery drain on Linux, Canonical updates kernel version policy |
• Issue 1082 (2024-08-05): Linux Mint 22, taking snapshots of UFS on FreeBSD, openSUSE updates Tumbleweed and Aeon, Debian creates Tiny QA Tasks, Manjaro testing immutable images |
• Issue 1081 (2024-07-29): SysLinuxOS 12.4, OpenBSD gain hardware acceleration, Slackware changes kernel naming, Mint publishes upgrade instructions |
• Issue 1080 (2024-07-22): Running GNU/Linux on Android with Andronix, protecting network services, Solus dropping AppArmor and Snap, openSUSE Aeon Desktop gaining full disk encryption, SUSE asks openSUSE to change its branding |
• Issue 1079 (2024-07-15): Ubuntu Core 24, hiding files on Linux, Fedora dropping X11 packages on Workstation, Red Hat phasing out GRUB, new OpenSSH vulnerability, FreeBSD speeds up release cycle, UBports testing new first-run wizard |
• Issue 1078 (2024-07-08): Changing init software, server machines running desktop environments, OpenSSH vulnerability patched, Peppermint launches new edition, HardenedBSD updates ports |
• Issue 1077 (2024-07-01): The Unity and Lomiri interfaces, different distros for different tasks, Ubuntu plans to run Wayland on NVIDIA cards, openSUSE updates Leap Micro, Debian releases refreshed media, UBports gaining contact synchronisation, FreeDOS celebrates its 30th anniversary |
• Issue 1076 (2024-06-24): openSUSE 15.6, what makes Linux unique, SUSE Liberty Linux to support CentOS Linux 7, SLE receives 19 years of support, openSUSE testing Leap Micro edition |
• Issue 1075 (2024-06-17): Redox OS, X11 and Wayland on the BSDs, AlmaLinux releases Pi build, Canonical announces RISC-V laptop with Ubuntu, key changes in systemd |
• Issue 1074 (2024-06-10): Endless OS 6.0.0, distros with init diversity, Mint to filter unverified Flatpaks, Debian adds systemd-boot options, Redox adopts COSMIC desktop, OpenSSH gains new security features |
• Issue 1073 (2024-06-03): LXQt 2.0.0, an overview of Linux desktop environments, Canonical partners with Milk-V, openSUSE introduces new features in Aeon Desktop, Fedora mirrors see rise in traffic, Wayland adds OpenBSD support |
• Issue 1072 (2024-05-27): Manjaro 24.0, comparing init software, OpenBSD ports Plasma 6, Arch community debates mirror requirements, ThinOS to upgrade its FreeBSD core |
• Issue 1071 (2024-05-20): Archcraft 2024.04.06, common command line mistakes, ReactOS imports WINE improvements, Haiku makes adjusting themes easier, NetBSD takes a stand against code generated by chatbots |
• Issue 1070 (2024-05-13): Damn Small Linux 2024, hiding kernel messages during boot, Red Hat offers AI edition, new web browser for UBports, Fedora Asahi Remix 40 released, Qubes extends support for version 4.1 |
• Issue 1069 (2024-05-06): Ubuntu 24.04, installing packages in alternative locations, systemd creates sudo alternative, Mint encourages XApps collaboration, FreeBSD publishes quarterly update |
• Issue 1068 (2024-04-29): Fedora 40, transforming one distro into another, Debian elects new Project Leader, Red Hat extends support cycle, Emmabuntus adds accessibility features, Canonical's new security features |
• Issue 1067 (2024-04-22): LocalSend for transferring files, detecting supported CPU architecure levels, new visual design for APT, Fedora and openSUSE working on reproducible builds, LXQt released, AlmaLinux re-adds hardware support |
• Issue 1066 (2024-04-15): Fun projects to do with the Raspberry Pi and PinePhone, installing new software on fixed-release distributions, improving GNOME Terminal performance, Mint testing new repository mirrors, Gentoo becomes a Software In the Public Interest project |
• Issue 1065 (2024-04-08): Dr.Parted Live 24.03, answering questions about the xz exploit, Linux Mint to ship HWE kernel, AlmaLinux patches flaw ahead of upstream Red Hat, Calculate changes release model |
• Issue 1064 (2024-04-01): NixOS 23.11, the status of Hurd, liblzma compromised upstream, FreeBSD Foundation focuses on improving wireless networking, Ubuntu Pro offers 12 years of support |
• Issue 1063 (2024-03-25): Redcore Linux 2401, how slowly can a rolling release update, Debian starts new Project Leader election, Red Hat creating new NVIDIA driver, Snap store hit with more malware |
• Issue 1062 (2024-03-18): KDE neon 20240304, changing file permissions, Canonical turns 20, Pop!_OS creates new software centre, openSUSE packages Plasma 6 |
• Issue 1061 (2024-03-11): Using a PinePhone as a workstation, restarting background services on a schedule, NixBSD ports Nix to FreeBSD, Fedora packaging COSMIC, postmarketOS to adopt systemd, Linux Mint replacing HexChat |
• Issue 1060 (2024-03-04): AV Linux MX-23.1, bootstrapping a network connection, key OpenBSD features, Qubes certifies new hardware, LXQt and Plasma migrate to Qt 6 |
• Issue 1059 (2024-02-26): Warp Terminal, navigating manual pages, malware found in the Snap store, Red Hat considering CPU requirement update, UBports organizes ongoing work |
• Issue 1058 (2024-02-19): Drauger OS 7.6, how much disk space to allocate, System76 prepares to launch COSMIC desktop, UBports changes its version scheme, TrueNAS to offer faster deduplication |
• Issue 1057 (2024-02-12): Adelie Linux 1.0 Beta, rolling release vs fixed for a smoother experience, Debian working on 2038 bug, elementary OS to split applications from base system updates, Fedora announces Atomic Desktops |
• Issue 1056 (2024-02-05): wattOS R13, the various write speeds of ISO writing tools, DSL returns, Mint faces Wayland challenges, HardenedBSD blocks foreign USB devices, Gentoo publishes new repository, Linux distros patch glibc flaw |
• Issue 1055 (2024-01-29): CNIX OS 231204, distributions patching packages the most, Gentoo team presents ongoing work, UBports introduces connectivity and battery improvements, interview with Haiku developer |
• Issue 1054 (2024-01-22): Solus 4.5, comparing dd and cp when writing ISO files, openSUSE plans new major Leap version, XeroLinux shutting down, HardenedBSD changes its build schedule |
• Issue 1053 (2024-01-15): Linux AI voice assistants, some distributions running hotter than others, UBports talks about coming changes, Qubes certifies StarBook laptops, Asahi Linux improves energy savings |
• Issue 1052 (2024-01-08): OpenMandriva Lx 5.0, keeping shell commands running when theterminal closes, Mint upgrades Edge kernel, Vanilla OS plans big changes, Canonical working to make Snap more cross-platform |
• Issue 1051 (2024-01-01): Favourite distros of 2023, reloading shell settings, Asahi Linux releases Fedora remix, Gentoo offers binary packages, openSUSE provides full disk encryption |
• Issue 1050 (2023-12-18): rlxos 2023.11, renaming files and opening terminal windows in specific directories, TrueNAS publishes ZFS fixes, Debian publishes delayed install media, Haiku polishes desktop experience |
• Issue 1049 (2023-12-11): Lernstick 12, alternatives to WINE, openSUSE updates its branding, Mint unveils new features, Lubuntu team plans for 24.04 |
• Issue 1048 (2023-12-04): openSUSE MicroOS, the transition from X11 to Wayland, Red Hat phasing out X11 packages, UBports making mobile development easier |
• Issue 1047 (2023-11-27): GhostBSD 23.10.1, Why Linux uses swap when memory is free, Ubuntu Budgie may benefit from Wayland work in Xfce, early issues with FreeBSD 14.0 |
• Issue 1046 (2023-11-20): Slackel 7.7 "Openbox", restricting CPU usage, Haiku improves font handling and software centre performance, Canonical launches MicroCloud |
• Full list of all issues |
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Random Distribution |
Satux
Satux was a Brazilian desktop Linux distribution and live DVD based on Debian GNU/Linux.
Status: Discontinued
|
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|