@@ -16,7 +16,7 @@ <h1 class="title">Qubes OS Cheatsheet</h1>
1616</ header >
1717< h2 id ="qubes-cheatsheet "> Qubes Cheatsheet</ h2 >
1818< p > < em > a summary of useful qubes commands</ em > </ p >
19- < p > version: 3.1 </ p >
19+ < p > version: 3.2 </ p >
2020< h3 id ="mini-glossary "> Mini Glossary</ h3 >
2121< ul >
2222< li > Xen - < em > Hypervisor</ em > </ li >
@@ -31,12 +31,12 @@ <h3 id="mini-glossary">Mini Glossary</h3>
3131< li > GUI - < em > Graphical User Interface</ em > </ li >
3232</ ul >
3333< h3 id ="vm-management "> VM Management</ h3 >
34- < p > :!: < em > All commands are executed in Dom0 terminal (Konsole, Terminal, Xterm etc.)</ em > </ p >
34+ < p > < em > NOTE: All commands are executed in < code > @ Dom0</ code > terminal (Konsole, Terminal, Xterm etc.)</ em > </ p >
3535< h4 id ="qubes-manager "> qubes-manager</ h4 >
3636< p > - < em > Graphical VM Manager</ em > </ p >
3737< p > usage: < code > qubes-manager</ code > </ p >
3838< h4 id ="qvm-block "> qvm-block</ h4 >
39- < p > - < em > list/set VM PCI devices</ em > </ p >
39+ < p > - < em > Lists/attaches VM PCI devices</ em > </ p >
4040< p > usage:</ p >
4141< ul >
4242< li > < p > < code > qvm-block -l [options]</ code > </ p > </ li >
@@ -47,25 +47,25 @@ <h4 id="qvm-block">qvm-block</h4>
4747< p > ---</ p >
4848< p > < code > qvm-block -A personal dom0:/home/user/extradisks/data.img</ code > - < em > attaches an additional storage for the personal-vm</ em > </ p >
4949< h4 id ="qvm-clone "> qvm-clone</ h4 >
50- < p > - < em > clones an existing VM by copying all its disk files</ em > </ p >
50+ < p > - < em > Clones an existing VM by copying all its disk files</ em > </ p >
5151< p > usage: < code > qvm-clone [options] <existing-vm-name> <new-clone-vm-name></ code > </ p >
5252< p > ---</ p >
5353< p > < code > qvm-clone fedora-23 fedora-23-dev</ code > - < em > create a clone of fedora-23 called fedora-23-dev</ em > </ p >
5454< h4 id ="qvm-firewall "> qvm-firewall</ h4 >
55- < p > - < em > manage VM’s firewall rules</ em > </ p >
55+ < p > - < em > Manage VM firewall rules</ em > </ p >
5656< p > usage: < code > qvm-firewall -l [-n] <vm-name></ code > </ p >
5757< p > ---</ p >
5858< p > < code > qvm-firewall -l personal</ code > - < em > displays the firewall settings for the personal-vm</ em > </ p >
5959< p > < code > qvm-firewall -l -n fedora-23</ code > - < em > displays the firewall settings for the personal-vm with port numbers</ em > </ p >
6060< h4 id ="qvm-ls "> qvm-ls</ h4 >
61- < p > - < em > list VMs and various information about their state</ em > </ p >
61+ < p > - < em > Lists VMs and various information about their state</ em > </ p >
6262< p > usage: < code > qvm-ls [options] <vm-name></ code > </ p >
6363< p > ---</ p >
6464< p > < code > qvm-ls</ code > - < em > lists all vms</ em > </ p >
6565< p > < code > qvm-ls -n</ code > - < em > show network addresses assigned to VMs</ em > </ p >
6666< p > < code > qvm-ls -d</ code > - < em > show VM disk utilization statistics</ em > </ p >
6767< h4 id ="qvm-prefs "> qvm-prefs</ h4 >
68- < p > - < em > list /set various per-VM properties</ em > </ p >
68+ < p > - < em > List /set various per-VM properties</ em > </ p >
6969< p > usage:</ p >
7070< ul >
7171< li > < p > < code > qvm-prefs -l [options] <vm-name></ code > </ p > </ li >
@@ -76,51 +76,63 @@ <h4 id="qvm-prefs">qvm-prefs</h4>
7676< p > < code > qvm-prefs win7-copy -s mac 00:16:3E:5E:6C:05</ code > - < em > sets a new mac for the network card</ em > </ p >
7777< p > < code > qvm-prefs lab-win7 -s qrexec_installed true</ code > - < em > sets the qrexec to installed</ em > </ p >
7878< p > < code > qvm-prefs lab-win7 -s qrexec_timeout 120</ code > - < em > usefull for windows hvm based vms</ em > </ p >
79- < p > < code > qvm-prefs lab-win7 -s default_user joanna</ code > - < em > sets the login user to joanna</ em > </ p >
79+ < p > < code > qvm-prefs lab-win7 -s default_user joanna</ code > - < em > sets the login user to < code > joanna</ code > </ em > </ p >
8080< h4 id ="qvm-run "> qvm-run</ h4 >
81- < p > - < em > runs a specific command on a vm</ em > </ p >
81+ < p > - < em > Runs a specific command on a vm</ em > </ p >
8282< p > usage: < code > qvm-run [options] [<vm-name>] [<cmd>]</ code > </ p >
8383< p > ---</ p >
8484< p > < code > qvm-run personal xterm</ code > - < em > runs xterm on personal</ em > </ p >
8585< p > < code > qvm-run personal xterm --pass-io</ code > - < em > runs xterm and passes all sdtin/stdout/stderr to the terminal</ em > </ p >
8686< p > < code > qvm-run personal "sudo dnf update" --pass-io --nogui</ code > - < em > pass a < code > dnf update</ code > command directly to the VM</ em > </ p >
8787< h4 id ="qvm-start "> qvm-start</ h4 >
88- < p > - < em > starts a vm</ em > </ p >
88+ < p > - < em > Starts a vm</ em > </ p >
8989< p > usage: < code > qvm-start [options] <vm-name></ code > </ p >
9090< p > ---</ p >
9191< p > < code > qvm-start personal</ code > - < em > starts the personal-vm</ em > </ p >
9292< p > < code > qvm-start ubuntu --cdrom personal:/home/user/Downloads/ubuntu-14.04.iso</ code > - < em > starts the ubuntu-vm with the ubuntu installation CD</ em > </ p >
9393< h4 id ="qvm-shutdown "> qvm-shutdown</ h4 >
94- < p > - < em > shutdowns a vm</ em > </ p >
94+ < p > - < em > Stops a vm</ em > </ p >
9595< p > usage: < code > qvm-shutdown [options] <vm-name></ code > </ p >
9696< p > ---</ p >
9797< p > < code > qvm-shutdown personal</ code > - < em > shutdowns the personal-vm</ em > </ p >
9898< p > < code > qvm-shutdown --all</ code > - < em > shutdowns all VM’s</ em > </ p >
9999< h4 id ="qvm-kill "> qvm-kill</ h4 >
100- < p > - < em > kills a VM - same as pulling out the power cord - immediate shutdown</ em > </ p >
100+ < p > - < em > Kills a VM - same as pulling out the power cord - immediate shutdown</ em > </ p >
101101< p > usage: < code > qvm-kill [options] <vm-name></ code > </ p >
102102< p > ---</ p >
103103< p > < code > qvm-kill personal</ code > - < em > pull the power cord for the personal-vm - immediate shutdown</ em > </ p >
104104< h4 id ="qvm-trim-template "> qvm-trim-template</ h4 >
105- < p > - < em > trims the disk space of a template</ em > </ p >
105+ < p > - < em > Trims the disk space of a template</ em > </ p >
106106< p > usage: < code > qvm-trim-template <template-name></ code > </ p >
107107< p > ---</ p >
108108< p > < code > qvm-trim-template debian-8</ code > - < em > helpful after upgrading or removing many packages/files in the template</ em > </ p >
109109< h4 id ="qvm-sync-appmenus "> qvm-sync-appmenus</ h4 >
110- < p > - < em > updates desktop file templates for given StandaloneVM or TemplateVM</ em > </ p >
110+ < p > - < em > Updates desktop file templates for given StandaloneVM or TemplateVM</ em > </ p >
111111< p > usage: < code > qvm-sync-appmenus [options] <vm-name></ code > </ p >
112112< p > ---</ p >
113113< p > < code > qvm-sync-appmenus archlinux-template</ code > - < em > useful for custom .desktop files or distributions not using dnf</ em > </ p >
114114< h3 id ="dom0 "> Dom0</ h3 >
115115< h4 id ="qubes-dom0-update "> qubes-dom0-update</ h4 >
116- < p > - < em > updates software in dom0</ em > </ p >
117- < p > usage: < code > qubes-dom0-update [--clean][--check-only][--gui] [<yum opts>][<pkg list>]</ code > </ p >
116+ < p > - < em > Updates or installes software in dom0</ em > </ p >
117+ < p > usage: < code > qubes-dom0-update [--enablerepo][--disablerepo][--clean][--check-only][--gui][--action=*][<pkg list>]</ code > </ p >
118+ < p > or</ p >
119+ < p > usage: < code > qubes-dom0-update</ code > </ p >
118120< p > ---</ p >
121+ < p > < code > qubes-dom0-update --check-only</ code > - < em > checks if new dom0 updates are available</ em > </ p >
119122< p > < code > sudo qubes-dom0-update</ code > - < em > updates dom0</ em > </ p >
123+ < p > < code > sudo qubes-dom0-update --gui</ code > - < em > allows to update dom0 through a graphical window</ em > </ p >
120124< p > < code > sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools</ code > - < em > install the windows tools (QWT)</ em > </ p >
121- < p > < code > sudo qubes-dom0-update kernel-3.19*</ code > - < em > install the official Fedora kernel-3.19* with Xen support</ em > </ p >
125+ < p > ---</ p >
126+ < p > < code > sudo qubes-dom0-update --action=search <search-term></ code > - < em > searches for package in dom0 repositories</ em > </ p >
127+ < p > example:</ p >
128+ < p > < code > sudo qubes-dom0-update --action=search qubes</ code > - < em > searches for all < code > qubes</ code > package in dom0 repositories</ em > </ p >
129+ < p > < em > NOTE: The tool excludes all templates (community and ITL) by default</ em > </ p >
130+ < p > ---</ p >
131+ < p > < code > sudo qubes-dom0-update --action=info <package-name></ code > - < em > displays infos about the package</ em > </ p >
132+ < p > example:</ p >
133+ < p > < code > sudo qubes-dom0-update --action=info qubes-core-dom0</ code > - < em > displays infos about the < code > qubes-core-dom0</ code > package</ em > </ p >
122134< h4 id ="qubes-hcl-report "> qubes-hcl-report</ h4 >
123- < p > - < em > generates a report about the system hardware information</ em > </ p >
135+ < p > - < em > Generates a report about the system hardware information</ em > </ p >
124136< p > usage: < code > qubes-hcl-report [-s] [<vm-name>]</ code > </ p >
125137< p > ---</ p >
126138< p > < code > qubes-hcl-report</ code > - < em > prints the hardware information on the console (terminal)</ em > </ p >
@@ -129,7 +141,7 @@ <h4 id="qubes-hcl-report">qubes-hcl-report</h4>
129141< p > < code > qubes-hcl-report -s personal</ code > - < em > sends the detailed hardware information report to the personal-vm</ em > </ p >
130142< p > < strong > Note:</ strong > < code > qubes-hcl-report -s [<vm-name>]</ code > generates a more detailed report. This report can contain sensitive information. Please do not upload the report if you do not want to share those information.</ p >
131143< h4 id ="virsh "> virsh</ h4 >
132- < p > - < em > management user tool for libvirt (hypervisor abstraction)</ em > </ p >
144+ < p > - < em > Management user tool for libvirt (hypervisor abstraction)</ em > </ p >
133145< p > usage: < code > virsh -c xen:/// <command> [<vm-name>]</ code > </ p >
134146< p > ---</ p >
135147< p > < code > virsh -c xen:/// list</ code > - < em > list running VM’s with additional information</ em > </ p >
@@ -142,7 +154,7 @@ <h4 id="xl">xl</h4>
142154< p > < code > xl top</ code > - < em > Monitor host and domains in realtime</ em > </ p >
143155< h3 id ="domu "> DomU</ h3 >
144156< h4 id ="qvm-copy-to-vm "> qvm-copy-to-vm</ h4 >
145- < p > - Copy file from one VM to another VM</ p >
157+ < p > - < em > Copy file from one VM to another VM</ em > </ p >
146158< p > usage: < code > qvm-copy-to-vm <vm-name> <file> [<file+>]</ code > - < em > file</ em > can be a single file or a folder</ p >
147159< p > ---</ p >
148160< p > < code > qvm-copy-to-vm work Documents</ code > - < em > copy the < code > Documents</ code > folder to the work VM</ em > </ p >
@@ -154,7 +166,7 @@ <h4 id="qvm-copy-to-vm">qvm-copy-to-vm</h4>
154166< li > The command would be: < code > qvm-copy-to-vm work Documents</ code > </ li >
155167</ ul >
156168< h4 id ="qvm-open-in-vm "> qvm-open-in-vm</ h4 >
157- < p > - Opens file in another VM</ p >
169+ < p > - < em > Opens file in another VM</ em > </ p >
158170< p > usage: < code > qvm-open-in-vm <vm-name> <file></ code > - < em > file</ em > can only be a single file</ p >
159171< p > ---</ p >
160172< p > < code > qvm-open-in-vm personal document.pdf</ code > - < em > opens < code > document.pdf</ code > in the personal VM</ em > </ p >
@@ -165,10 +177,11 @@ <h4 id="list-qubes-commands">List Qubes commands</h4>
165177< li > Enter in console:</ li >
166178< li > < code > qvm-*</ code > </ li >
167179< li > < code > qubes*</ code > </ li >
168- < li > Press two times < code > TAB</ code > </ li >
180+ < li > Press 2x times < code > TAB</ code > </ li >
169181</ ol >
170182< p > Output: List of < code > qvm-*</ code > or < code > qubes*</ code > commands.</ p >
171- < h4 id ="list-installed-qubes-packages "> List installed qubes packages</ h4 >
183+ < h4 id ="list-installed-qubes-os-packages "> List installed Qubes OS packages</ h4 >
184+ < p > - < em > List all installed Qubes OS packages</ em > </ p >
172185< p > < strong > Fedora Dom0</ strong > </ p >
173186< p > In VM or Dom0: < code > rpm -qa \*qubes-\*</ code > - < em > list (qubes-) installed packages</ em > </ p >
174187< h3 id ="filesfolders-from-and-to-dom0 "> Files/Folders from and to Dom0</ h3 >
@@ -214,12 +227,14 @@ <h3 id="copy-text-between-vm-a-and-b">Copy text between VM A and B</h3>
214227</ ol >
215228< h3 id ="troubleshoot "> Troubleshoot</ h3 >
216229< h4 id ="application-in-vm-does-not-start "> Application in VM does not start</ h4 >
230+ < p > - < em > How to get more information if applications in a VM refuse to start</ em > </ p >
217231< p > < code > qvm-run personal "command" --pass-io</ code > - < em > pass command directly to the VM. Returns an error message command fails.</ em > </ p >
218232< p > < code > qvm-run personal "xterm" --pass-io</ code > - < em > pass < code > xterm</ code > command directly to the VM. Returns an error message or starts xterm.</ em > </ p >
219233< p > ---</ p >
220234< p > < code > qvm-run <vmname> "command" --pass-io --nogui</ code > - < em > pass command to VM without using the GUI</ em > </ p >
221235< p > < code > qvm-run personal "ls" --pass-io --nogui</ code > - < em > pass < code > ls</ code > command directly to the VM. Returns error or output.</ em > </ p >
222236< h4 id ="console-in-vm "> Console in VM</ h4 >
237+ < p > - < em > Attach a console to a VM</ em > </ p >
223238< p > < code > virsh -c xen:/// console <vmname></ code > - < em > opens console in < code > <vmname></ code > </ em > </ p >
224239< p > ---</ p >
225240< p > < em > Why? Connect if GUI/qrexec does not work for any reason. This way you can restart/investigate a failed service.</ em > </ p >
@@ -230,7 +245,8 @@ <h4 id="console-in-vm">Console in VM</h4>
230245< p > < em > (and when #1130 would be implmented the same for “user”)</ em > </ p >
231246< p > ---</ p >
232247< p > In console mode press < code > CTRL</ code > + < code > ^</ code > + < code > ]</ code > on keyboard to escape from console mode.</ p >
233- < h4 id ="domu-log-files "> DomU Log files</ h4 >
248+ < h4 id ="appvm-log-files "> AppVM Log files</ h4 >
249+ < p > - < em > Log files in AppVMs</ em > </ p >
234250< p > < code > /var/log/qubes</ code > - < em > log file directory</ em > </ p >
235251< p > log files per DomU VM:</ p >
236252< ul >
@@ -240,28 +256,31 @@ <h4 id="domu-log-files">DomU Log files</h4>
240256< li > < code > qubesdb.<vmname>.log</ code > - < em > qubesdb information</ em > </ li >
241257</ ul >
242258< h4 id ="get-qubes-os-version "> Get Qubes OS Version</ h4 >
259+ < p > - < em > Get the Qubes OS release version</ em > </ p >
243260< p > < code > cat /etc/qubes-release</ code > - < em > prints Qubes release in human readable form</ em > </ p >
244261< p > < code > rpm -qa \*qubes-release\*</ code > - < em > prints exact Qubes release number</ em > </ p >
245262< h4 id ="get-xen-version "> Get Xen Version</ h4 >
263+ < p > - < em > Display the Xen version</ em > </ p >
246264< p > < code > xl info | grep xen_version</ code > - < em > prints the Xen version</ em > </ p >
247- < h4 id ="qubes-xen-boot "> Qubes / Xen Boot</ h4 >
265+ < h4 id ="qubes-os-xen-boot "> Qubes OS / Xen Boot</ h4 >
266+ < p > - < em > Qubes OS and Xen system/kernel messages</ em > </ p >
248267< p > < code > dmesg</ code > - < em > prints error, warning and informational messages about device drivers and the kernel during the boot process as well as when we connect a hardware to the system on the fly.</ em > </ p >
249268< p > < code > xl dmesg</ code > - < em > prints error, warning and informational messages created during Xen’s boot process</ em > </ p >
250- < p > :!: < em > use < code > dmesg</ code > and < code > xl dmesg</ code > in combination with < code > less</ code > , < code > cat</ code > , < code > tail</ code > or < code > head</ code > .</ em > </ p >
269+ < p > < em > NOTE: use < code > dmesg</ code > and < code > xl dmesg</ code > in combination with < code > less</ code > , < code > cat</ code > , < code > tail</ code > or < code > head</ code > .</ em > </ p >
251270< h3 id ="grow-disk "> Grow disk</ h3 >
252271< h4 id ="qvm-grow-private "> qvm-grow-private</ h4 >
253- < p > - < em > increase private storage capacity of a specified VM</ em > </ p >
272+ < p > - < em > Increase private storage capacity of a specified VM</ em > </ p >
254273< p > usage: < code > qvm-grow-private <vm-name> <size></ code > </ p >
255274< p > < strong > Example</ strong > </ p >
256275< ul >
257276< li > In dom0 terminal: < code > qvm-grow-private personal 40GB</ code > </ li >
258277< li > In the personal VM: < code > sudo resize2fs /dev/xvdb</ code > </ li >
259278</ ul >
260- < h3 id ="appvms-and- tmpfs "> AppVMs and TMPFS</ h3 >
261- < p > Enlarge /tmp if you run out of space on the default ~200MB</ p >
279+ < h3 id ="enlarge- appvms-tmpfs "> Enlarge AppVMs TMPFS</ h3 >
280+ < p > Enlarge < code > /tmp</ code > if you run out of space on the default ~200MB</ p >
262281< p > < code > sudo mount -o remount,size=1024M /tmp</ code > - < em > enlarge the space to 1024MB</ em > </ p >
263282< h3 id ="inter-vm-networking "> Inter VM Networking</ h3 >
264- < p > - < em > Does not expose services to the outside world!</ em > </ p >
283+ < p > < em > NOTE: Does not expose services to the outside world!</ em > </ p >
265284< p > Make sure:</ p >
266285< ul >
267286< li > Both VMs are connected to the same firewall VM</ li >
@@ -290,7 +309,7 @@ <h3 id="inter-vm-networking">Inter VM Networking</h3>
290309< p > for bidirectional access:</ p >
291310< pre > < code > # echo "iptables -I FORWARD 2 -s 10.137.2.10 -d 10.137.2.11 -j ACCEPT" >> /rw/config/qubes_firewall_user_script</ code > </ pre >
292311< h4 id ="add-usb-wifi-card-to-sys-net-vm "> Add USB Wifi card to sys-net VM</ h4 >
293- < p > * - < em > attach a USB Wifi card to sys-net VM</ em > </ p >
312+ < p > - < em > Attach a USB Wifi card to sys-net VM</ em > </ p >
294313< p > The bus and device number can be different than shown in this example:</ p >
295314< ol type ="1 ">
296315< li > < code > qvm-pci -l sys-net</ code > - < em > list all attached pci devices of sys-net</ em > </ li >
@@ -303,6 +322,9 @@ <h4 id="add-usb-wifi-card-to-sys-net-vm">Add USB Wifi card to sys-net VM</h4>
303322< h3 id ="templates "> Templates</ h3 >
304323< h4 id ="fedora "> Fedora</ h4 >
305324< p > - < em > Fedora template specific</ em > </ p >
325+ < p > < strong > Installing the Template</ strong > </ p >
326+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-24</ code > - < em > installs the fedora-24 template</ em > </ p >
327+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-23</ code > - < em > installs the fedora-23 template</ em > </ p >
306328< p > < strong > Updating, Searching & Installing Packages</ strong > </ p >
307329< p > Fedora > 21</ p >
308330< ul >
@@ -322,14 +344,20 @@ <h4 id="fedora">Fedora</h4>
322344< p > < code > Start Menu >> Template:Fedora 21 >> Package Sources >> Enable RPMFusion</ code > - ENABLE RPMFusion, (already covers RPMFusion signing keys)</ p >
323345< h4 id ="fedora-minimal "> Fedora Minimal</ h4 >
324346< p > - < em > Fedora minimal template</ em > </ p >
347+ < p > Qubes OS:</ p >
348+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-24-minimal</ code > - < em > installs the fedora-24-minimal template</ em > </ p >
349+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-23-minimal</ code > - < em > installs the fedora-23-minimal template</ em > </ p >
325350< p > < code > sudo qubes-dom0-update qubes-template-fedora-21-minimal</ code > - < em > installs the fedora-21-minimal template</ em > </ p >
326351< h4 id ="debian "> Debian</ h4 >
327- < p > - < em > Debian templates </ em > </ p >
352+ < p > - < em > Debian template </ em > </ p >
328353< p > < strong > Installing the Template</ strong > </ p >
329354< ul >
330- < li > < code > sudo qubes-dom0-update qubes-template-debian-7</ code > - < em > Debian 7 “Wheezy”</ em > </ li >
331355< li > < code > sudo qubes-dom0-update qubes-template-debian-8</ code > - < em > Debian 8 “Jessie”</ em > </ li >
332356</ ul >
357+ < p > Only till Qubes OS 3.1:</ p >
358+ < ul >
359+ < li > < code > sudo qubes-dom0-update qubes-template-debian-7</ code > - < em > Debian 7 “Wheezy”</ em > </ li >
360+ </ ul >
333361< p > < strong > Updating, Searching & Installing Packages</ strong > </ p >
334362< ul >
335363< li > installing packages: < code > apt-get install <package-name></ code > </ li >
@@ -341,16 +369,16 @@ <h4 id="debian">Debian</h4>
341369</ ol > </ li >
342370</ ul >
343371< h4 id ="qubes-os-whonix "> Qubes OS + Whonix</ h4 >
344- < p > - < em > Whonix is an debian based OS focused on anonymity, privacy and security</ em > </ p >
345- < p > Whonix has two parts :</ p >
372+ < p > - < em > Whonix is an Debian based OS focused on anonymity, privacy and security</ em > </ p >
373+ < p > Whonix consists of two components :</ p >
346374< ol type ="1 ">
347375< li > Whonix-Gateway (uses TOR for all connections to the outside world)</ li >
348376< li > Whonix-Workstation (for application)</ li >
349377</ ol >
350378< p > < strong > Install Whonix</ strong > </ p >
351- < p > Whonix-Gateway TemplateVM Binary Install < span class =" citation " data-cites =" Dom0 " > @Dom0</ span > :</ p >
379+ < p > Whonix-Gateway TemplateVM Binary Install < code > @Dom0</ code > :</ p >
352380< p > < code > sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-gw-experimental</ code > </ p >
353- < p > Whonix-Workstation TemplateVM Binary Install < span class =" citation " data-cites =" Dom0 " > @Dom0</ span > :</ p >
381+ < p > Whonix-Workstation TemplateVM Binary Install < code > @Dom0</ code > :</ p >
354382< ol type ="1 ">
355383< li > < code > export UPDATES_MAX_BYTES=$[ 4 * 1024 ** 3 ]</ code > </ li >
356384< li > < code > sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-ws</ code > </ li >
@@ -364,8 +392,11 @@ <h4 id="qubes-os-whonix">Qubes OS + Whonix</h4>
364392< li > Start Whonix-Workstation AppVM</ li >
365393</ ol >
366394< h4 id ="archlinux "> Archlinux</ h4 >
367- < p > - < em > Archlinux</ em > </ p >
395+ < p > - < em > Archlinux template </ em > </ p >
368396< p > < strong > Installing the Template</ strong > </ p >
397+ < p > In Qubes OS 3.2:</ p >
398+ < p > < code > sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-archlinux</ code > </ p >
399+ < p > or manually</ p >
369400< p > Use the following instructions: < a href ="https://www.qubes-os.org/doc/templates/archlinux/ "> Archlinux Template</ a > </ p >
370401< p > < strong > Updating, Searching & Installing Packages</ strong > </ p >
371402< ul >
@@ -383,5 +414,16 @@ <h3 id="create-vm-from-vmware-or-virtualbox-images">Create VM from VMware or Vir
383414< li > VirtualBox: < code > qemu-img convert ReactOS.vdi -O raw reactos.img</ code > </ li >
384415</ ul > </ li >
385416</ ol >
417+ < h3 id ="qubes-os-directories "> Qubes OS Directories</ h3 >
418+ < h4 id ="dom0-qubes-os "> Dom0 (Qubes OS)</ h4 >
419+ < p > - < em > Qubes OS specific directories</ em > </ p >
420+ < ul >
421+ < li > < code > /var/log/qubes</ code > - < em > Qubes OS VM log files</ em > </ li >
422+ < li > < code > /var/lib/qubes</ code > - < em > Qubes OS VMs and other Qubes OS specific files</ em > </ li >
423+ </ ul >
424+ < h3 id ="qubes-os-repositories "> Qubes OS Repositories</ h3 >
425+ < ul >
426+ < li > < a href ="http://yum.qubes-os.org " class ="uri "> http://yum.qubes-os.org</ a > - < em > Browsable Fedora repositories</ em > </ li >
427+ </ ul >
386428</ body >
387429</ html >
0 commit comments