New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What The hell is going on Guys???? #3577

Closed
qalosc opened this Issue Feb 12, 2018 · 3 comments

Comments

Projects
None yet
3 participants
@qalosc

qalosc commented Feb 12, 2018

Qubes OS version:

<4

Affected TemplateVMs:

I am just really confused using Qubes 4. I downloaded it yesterday installed and the whole thing is messy when managing qubes.
sys-net and other service vms should have their own category but they are listed as appvms!!.
Fedora-26-dvm and whonix-ws-dvm (there should also be a debian-9-dvm) should all be classed as disposable templates and give an option to create them. I hope this is just because its RC 4 and its still being worked on, because right now if feels like a mess.

Expected behavior:

Actual behavior:

General notes:


Related issues:

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Feb 12, 2018

Member

See here for explanation of some architectural changes in Qubes 4.0. Especially two fragments:

We also no longer distinguish between AppVMs, NetVMs and Proxy VMs. Instead, each VM has a property provides_network, which is false by default, except for the VMs which we want to expose networking to other VMs (e.g. because they might have some networking device assigned, such as cellular modem or WiFi device, or because they act as VPNs or proxies of some sort).

Another major change to DispVMs semantics in Qubes 4 (largely allowed by this relaxation of DispVM definition) is that any of the AppVMs can be now used as a template for the DispVM.

This provides lots of flexibility, e.g. it’s easy to create a customized DispVM for signing PDF documents, or various disposable service VMs, such as Net- and VPN- VMs. One just creates a normal AppVM, sets everything up there, e.g. loads keys, configures VPNs, connects to known WiFi networks, and then shuts down the AppVM and in place of it starts a DispVM based on that AppVM.

Read the full article for more details. Those changes provide much more flexibility.

Member

marmarek commented Feb 12, 2018

See here for explanation of some architectural changes in Qubes 4.0. Especially two fragments:

We also no longer distinguish between AppVMs, NetVMs and Proxy VMs. Instead, each VM has a property provides_network, which is false by default, except for the VMs which we want to expose networking to other VMs (e.g. because they might have some networking device assigned, such as cellular modem or WiFi device, or because they act as VPNs or proxies of some sort).

Another major change to DispVMs semantics in Qubes 4 (largely allowed by this relaxation of DispVM definition) is that any of the AppVMs can be now used as a template for the DispVM.

This provides lots of flexibility, e.g. it’s easy to create a customized DispVM for signing PDF documents, or various disposable service VMs, such as Net- and VPN- VMs. One just creates a normal AppVM, sets everything up there, e.g. loads keys, configures VPNs, connects to known WiFi networks, and then shuts down the AppVM and in place of it starts a DispVM based on that AppVM.

Read the full article for more details. Those changes provide much more flexibility.

@marmarek marmarek closed this Feb 12, 2018

@qalosc

This comment has been minimized.

Show comment
Hide comment

qalosc commented Feb 12, 2018

oh.

@qalosc

This comment has been minimized.

Show comment
Hide comment
@qalosc

qalosc Feb 12, 2018

Thanks for the reply.

qalosc commented Feb 12, 2018

Thanks for the reply.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment