Qubes OS 4.1.1 has already been released and the end of support for version 4.0 has been announced

Recently the release of the new stable version of the Qubes 4.1.1 operating system was announced, which is a release that goes on to consolidate all of the security patches, bug fixes, and upstream template OS updates that have occurred since the initial Qubes 4.1.0 release in February.

For those of you who are new to Qubes OS, you should know that this is an operating system that implements the idea of ​​using a hypervisor for isolation strict application and operating system components (each class of applications and system services run on separate virtual machines).

Applications in Qubes are divided into classes according to the importance of the data that is processed and the tasks that are solved. Each class of application (eg work, entertainment, banking) as well as system services (network subsystem, firewall, storage, USB stack, etc.) run on separate virtual machines running with the Xen hypervisor.

At the same time, these applications are available on the same desktop and are highlighted for clarity in different colors of window frames. Each environment has read access to the underlying root FS and to local storage that does not overlap with storage in other environments; a special service is used to organize the interaction of the application.

What's new in Qubes OS 4.1.1

This new version released as mentioned at the beginning it is an update version and especially bug fixes from the previous version, although we can find the updates from the changes that have been made of the versions of the programs that form the basic environment of the system (dom0).

It is also highlighted that A template has been created for the creation of virtual environments based on Fedora 36 and in which the Linux 5.15 kernel is also proposed by default.

Besides it It is also announced that the version of Qubes 4.0 arrives at EOL (end of life) on 2022-08-04 (basically next week). That is why users of this version of Qubes 4.0 are called upon to do so as soon as they have the opportunity to update to Qubes 4.1 through the clean reinstall method, and the sooner the better, this with the purpose to avoid future problems.

Likewise, the developers also make a recommendation on the update of version 4.0 that you choose to directly skip this new version of Qubes 4.1.1.

It is important to mention the following problems and they plan to update to this new version, from V4.0:

  • The script does not convert the LUKS1 disk encryption format to LUKS2 (the fresh installation of Qubes 4.1 uses LUKS2 for disk encryption, while previous versions use LUKS1).
  • Early preview builds of Qubes 4.0 (before R4.0-rc2) created a /boot/efi partition of only 200 MB, which is too small for R4.1. In the case of such a partition layout, a clean install is necessary.
  • If the user has created some custom qrexec policy entries, they may not be handled correctly in R4.1, resulting in all calls being denied.
  • It is recommended to check the log for qrexec policy errors after a system reboot, using the journalctl -b command.

Finally yes you want to know a little more about it of this new version, you can read the details in the Qubes OS 4.1.1 release note at following link.

Download Qubes OS

If you want to try this Qubes OS you can do it by downloading the system image from its official website and in its download section you will get it, you can do it in the following link

A system with 6 GB of RAM and an Intel or AMD 64-bit CPU with support for VT-x c EPT/AMD-v c RVI and VT-d / AMD IOMMU technologies is required, an Intel GPU (NVIDIA GPU and AMD are not well tested). The size of the installation image is 5,5 GB.

It is important to emphasize that Qubes OS can not only be installed as the main operating system, but also offers the possibility of being able to test it in its Live version.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.