New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Live USB/DVD #1018

Open
rootkovska opened this Issue Jun 1, 2015 · 3 comments

Comments

Projects
None yet
3 participants
@rootkovska
Member

rootkovska commented Jun 1, 2015

A version of the installer image that can be easily run from (R/O) USB or DVD.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 4, 2015

Member

Significant progress was made here:
https://github.com/marmarek/qubes-installer-qubes-os/tree/liveusb

It works pretty well in BIOS (legacy) mode.

Member

marmarek commented Aug 4, 2015

Significant progress was made here:
https://github.com/marmarek/qubes-installer-qubes-os/tree/liveusb

It works pretty well in BIOS (legacy) mode.

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Oct 6, 2015

liveusb: Prevent installing conflicting xorg drivers
Those two (qxl and mga) cannot be easily backported from F21, so do not
install them at all - are barely useful on Qubes anyway

QubesOS/qubes-issues#1018

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Oct 6, 2015

liveusb: handle both Debian and Fedora appmenus
Some applications are named differently, so we need a separate list.

QubesOS/qubes-issues#1018
QubesOS/qubes-issues#794

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Oct 6, 2015

livecd-tools: add 'repo --ignoregroups' support
Apparently this option wass ignored by livecd-tools, so groups from
Fedora repositories came in.

QubesOS/qubes-issues#1018

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Oct 6, 2015

liveusb: handle both Debian and Fedora appmenus
Some applications are named differently, so we need a separate list.

QubesOS/qubes-issues#1018
QubesOS/qubes-issues#794

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Oct 6, 2015

livecd-tools: add 'repo --ignoregroups' support
Apparently this option wass ignored by livecd-tools, so groups from
Fedora repositories came in.

QubesOS/qubes-issues#1018

@mfc mfc referenced this issue May 24, 2016

Open

[META] Tails-like functionality in Qubes #2024

0 of 6 tasks complete
@mfc

This comment has been minimized.

Show comment
Hide comment
@mfc

mfc Oct 17, 2017

Member

from qubes-users mailing list:

I had some enforced spare time last week and dusted off some old Live
images for r3.2. They need tidying up but are usable now.

There are two iso images, suitable for burning to DVD or USB.
Both use Debian templates.
The smaller (2GB) is pretty vanilla, with some additional non-free
drivers for wifi adapters.
The larger (2.4GB) has a TorVM, and Tor Browser in an online qube.
There are restrictive iptables on sys-net and TorVM, and MAC spoofing
set on sys-net. The offline qube has libre office and veracrypt
installed.

The menu system is simple, and wont update if you create new qubes.
You'll need to use 'qvm-run -a <new> <program>', or practice working with
the mysteries of xdg menus.

Both images will run(sort of) in 4GB RAM - 8 is better.

If you use DVD then get used to the sound of the disc thrashing. The
faster DVD drive you have the better. (That said they work reasonably well
on an old MacBook with 8GB RAM.) You also need patience - generally it
seems better to start new qubes discretely.

Running from USB is fine. If you have ample RAM you'll forget it's a
live system, unless you hammer the (limited) free disk space.

Both images are available from http://qubes.3isec.org - hashes and
signatures to check included.

I hope to have updated versions ready for 4.0-rc2, along with a tidy build
system, and (maybe) an installer.

Cheers

unman
Member

mfc commented Oct 17, 2017

from qubes-users mailing list:

I had some enforced spare time last week and dusted off some old Live
images for r3.2. They need tidying up but are usable now.

There are two iso images, suitable for burning to DVD or USB.
Both use Debian templates.
The smaller (2GB) is pretty vanilla, with some additional non-free
drivers for wifi adapters.
The larger (2.4GB) has a TorVM, and Tor Browser in an online qube.
There are restrictive iptables on sys-net and TorVM, and MAC spoofing
set on sys-net. The offline qube has libre office and veracrypt
installed.

The menu system is simple, and wont update if you create new qubes.
You'll need to use 'qvm-run -a <new> <program>', or practice working with
the mysteries of xdg menus.

Both images will run(sort of) in 4GB RAM - 8 is better.

If you use DVD then get used to the sound of the disc thrashing. The
faster DVD drive you have the better. (That said they work reasonably well
on an old MacBook with 8GB RAM.) You also need patience - generally it
seems better to start new qubes discretely.

Running from USB is fine. If you have ample RAM you'll forget it's a
live system, unless you hammer the (limited) free disk space.

Both images are available from http://qubes.3isec.org - hashes and
signatures to check included.

I hope to have updated versions ready for 4.0-rc2, along with a tidy build
system, and (maybe) an installer.

Cheers

unman
@mfc

This comment has been minimized.

Show comment
Hide comment
@mfc

mfc Oct 17, 2017

Member

worth connecting this ticket with the R3.2-specific ticket: #2024

Member

mfc commented Oct 17, 2017

worth connecting this ticket with the R3.2-specific ticket: #2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment