Skip to content

Qubes FAQ Migration Content Prep

Nina Eleanor Alter edited this page Feb 8, 2022 · 38 revisions

NOTE: The below is very in-progress. It is only the content & content ordering, intended to display on a page that would be styled to this Figma prototype..

Another NOTE: The "TOP" links on this page are just to ease navigation of this page in GitHub. The design factors the same basic functionality at the question level, which would have been unweildly, here.


· ·
What is Qubes OS? Is Qubes really free?
What is "a qube" and why are they special? I'd love to contribute, how can I get involved?
What is the main concept behind Qubes? I saw a video or read an article about a new feature. When will it be available?
Why is OS security important? How many people really use Qubes?
How is Qubes unique among other security solutions? Can I pay to have a specific feature developed?
Is Qubes just another Linux distribution? Can't Qubes just get venture funding?
What do all these terms mean, I'm feeling lost... I want to bring Qubes to my business, but don't know how.
How often are new versions of Qubes released? Is "x" version of Foo compatible with "y" version of Qubes?

1: condense "How is Qubes unique among..." answer, and "What about other approaches to security" answer

· ·
Why should I trust this website? What does it mean to "Distrust The Infrastructure?"
Why doesn't this website have security Feature "x"? Does Qubes use full disk encryption (FDE)?
How does Qubes OS provide security? How is Qubes affected by Xen Security Advisories (XSAs)?
How does Qubes OS provide privacy? (2) What about safe languages and formally verified microkernels?
Aren't antivirus programs and firewalls enough? What is a DMA attack?

2: condense "So what about Non Whonix qubes?" answer into this one

· ·
How can I get Qubes? Does Qubes allow multiple user accounts on one machine?
What do I need to run Qubes? Can I install Qubes OS together with other operating system (dual-boot/multi-boot)?
What is a terminal? Can I run applications like games, that require hardware acceleration?
Do I have to know Linux to use Qubes? Are there tutorials or step-by-step guides?
What is "a qube" and why are they special? Can I install Qubes in a virtual machine (e.g., on VMware)?
Are there tutorials or step-by-step guides? xx
· ·
What are the system requirements for Qubes? Is there a machine I can just go into a store and buy, that will work?
Is there a list of hardware that is compatible with Qubes? I can't find any hardware that I like—or, any that is compatible. Help?
That's a lot! How important are each of those things?! Can I install Qubes on a system without VT-x/AMD-V or VT-d/ADM-Vi/AMD IOMMU?
Is there any certified hardware for Qubes? Why is VT-x/AMD-V important?
How much memory is recommended for Qubes? Why is VT-d/ADM-Vi/AMD IOMMU important?
How much disk space does each qube require? tbd
· ·
Are there tutorials or step-by-step guides? How can I get my keyboard layout settings to behave correctly?
I need help troubleshooting a problem... I see a “Failed to start Load Kernel Modules” message on boot?
How do I play video files? I installed software in a qube, and it’s gone after restarting. Why?
Why is Qubes so slow and how can I make it faster? How do I run a Windows HVM in non-seamless mode (i.e., as a single window)?
Why does my network adapter not work? I have weird graphics glitches like the screen turning partially black.
Firefox is stuck in full-screen... Could you please make my preference the default?
· ·
How do I access an external USB drive? My encrypted drive doesn’t appear in a Debian qube.
What is a "block device"? I created a USB VM and assigned USB controllers to it. Now the USB VM won’t boot.
Can I rename my devices in Qubes? I assigned a PCI device to a qube, then unassigned it/shut down the qube. Why isn’t the device available in dom0?
Can I set up devices to automatically attach when connected? How do I connect Bluetooth devices?
· ·
Does Qubes have its own updater app? My qubes lost internet access after a template update. What should I do?
How can I update my apps? My dom0 and/or template update stalls when attempting to update via the GUI tool. What should I do?
Why is dom0 so old? Where did all these new qubes come from that open and close when I run updates—then, dissappear?
· ·
Why does Qubes use virtualization? Why passwordless sudo?
Which virtualization modes do VMs use? Do you recommend coreboot as an alternative to vendor BIOS?
What's so special about Qubes' GUI virtualization? How does Qubes compared to using a "Live CD" OS?
Why does Qubes use Xen instead of KVM or another hypervisor? How does Qubes compare to running VMs in a conventional OS?
What about this other/new (micro)kernel/hypervisor? How does Qubes compare to using a separate physical machine?
· ·
Why do you use GitHub? Do you have a bug bounty program?
When will Qubes prioritize usability? Why does dom0 need to be 64-bit?
How do I submit a patch? Why don’t you fix upstream bugs that affect Qubes?
How can I request a feature? What is Qubes’ attitude toward changing guest distros?
How should I report a bug? What is the canonical way to detect Qubes VM?
I found an error in the docs, what do I do? Is "x" thing compatible with "y" version?
Are there restrictions on the software that the Qubes developers are willing to use? Much, much more...

General — TOP

Q: What is Qubes OS?

answer: Qubes OS is a security-oriented, multi-environment operating system (OS).

The most common operating systems today are single-environment systems such as Windows, Mac, and various flavors (aka distributions) of Linux, such as Ubuntu, Fedora, and Debian. Qubes OS is based off of the Xen hypervisor. Hypervisors are common in the server world and among IT professionals, but not so much among regular folks. The "multiple virtual-environments on a single device" nature of Qubes, and the rich permissioning between virtual environments, is what makes Qubes OS unique. /nina — existing answer felt incomplete and spoke to contradictory audiences

Q: What is "a qube" and what makes them special?

answer: The "multiple-environment" experience described above is created by a collection of securely-isolated VMs we call qubes. Each qube has unique inheritance and descendance properties, as well as unique permissions we call policies. As such, a qube is a very specific type of VM, unique to the Qubes OS. The ecosystem of different qube types includes App qubes, Templates, Standalone qubes, and Service qubes, are of which are managed by an Admin qube (named dom0 in Qubes OS 4.1). /nina

Q: What is the main concept behind Qubes?

answer: To deliver security on the “Security by Compartmentalization (or Isolation)” principle. Want a lot of computers within one computer, and the ability for all of them to work together? That is why we created Qubes OS. /production, with minor nina edits

Why is OS security important?

answer: Most people use an operating system like Windows or macOS on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security.

For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. Malware is only one kind of an exploit, however; there are books and entire websites devoted to OS security. /nina, edited from production

How is Qubes unique different from other security solutions?

answer: In 2012, security researcher and Qubes OS founder Joanna Rutkowska, wrote:

First, if you use Xorg or similar X-based server as your GUI server, and this is what nearly all Linux, and most of the other non-Windows OSes use, then you don't have any form of GUI-level isolation, which is essential for a desktop system. I wrote more about this surprising problem some time ago. Proper GUI-level isolation was one of the main goals for Qubes.

Second, all mainstream desktop OSes, such as Windows, Linux, BSD, even OSX, are all based on a monolithic kernels, which present a significant security problem. This is because a typical monolithic kernel of a contemporary desktop OS contains tens of millions of lines of code, and to make it worse, most of this code is reachable from (untrusted) applications via all sorts of APIs, making the attack surface on the kernel huge. And it requires just one successful kernel exploit to own the whole system, bypassing any security mechanisms that might have been built on top of it, such as SELinux, LXC, etc. Continue Reading

Is Qubes just another Linux distribution?

answer: If you really want to call it a distribution, then it’s more of a “Xen distribution” than a Linux one. But Qubes is much more than just Xen packaging. It has its own VM management infrastructure, with support for template VMs, centralized VM updating, etc. It also has a very unique GUI virtualization infrastructure. /production-verbatim

How often are new versions of Qubes released?

answer:Various security and stability updates are published on an as-needed, regular basis—as often as daily, though usually monthly. The release schedules of Template distributions and other external utilities, is a lot of what dictates that schedule. Sometimes enhancements are bundled into those releases—it all depends on which features are available to be released, and when. Many features are more time intensive to QA and stabilize, than others.

A new numbered release for Qubes OS is cut for deploying new user-facing components, significant functional updates, or major architectural changes. Qubes 3.2 was released in September 2016. The next major release was 4.0, in March of 2018. The next major release, was Qubes 4.1 was officially released in February of 2022.

Unfortunately, much of what may seem like huge gaps of time between releases, comes down to simple resourcing availability and the complexity of delivering... well, an entire operating system, made of many other operating systems that other people make. Our core team is small, and unlike projects such as Signal and Ubuntu, Qubes OS does not have millions of dollars to fund many full-time, dedicated maintainers. Of course we'd love to change that, and would significantly hasten the pace of our development and release schedule, if we could. Until then, we are deeply grateful to our small army of volunteer contributors that make PRs, PR reviews, keeping our documentation current, managing our user community, and so much more, possible. /nina

What do all these terms mean, I'm feeling lost...

answer:Everybody has to start somewhere! Our glossary of terms has been thoughtfully developed over the past 10 years by volunteers and core team members, to describe unique terms of art to the Qubes OS project. If you don't see something in our glossary, try to do an internet search to find it—our docs cover many rich security, Linux, and Xen concepts that likely sound alien to newcomers. Our Official Forum also has many helpful folks on it, who welcome questions. /nina

I saw a video or read an article about a cool new feature. When will it be available?

answer:We'd love to have a date to report, but with our team as small as it is and kept on their toes addressing ongoing security needs, we never can say for certain. Often our estimates land horribly tardy, which disappoints our users more than we are comfortable with. So, in the spirit of under-promise and over-deliver, we ask folks to patiently await an announcement, and to trust that we do deploy things we know our users are excited to get, just as soon as they are reliably stable (for dozens of hardware configurations, template versions, etc). /nina

How many people use Qubes?

answer: Upwards of 40,000 users are estimtated to be using Qubes, as of 2022. We track the number of unique IPv4 addresses that connect to the Qubes update servers each month, and have a formula for estimating the number of Tor users doing the same through Whonix. Our methodology is explained in further detail on our Statistics page.

Is Qubes really free?

answer: Qubes is free and open-source software. This means that everyone is free to use, copy, and change the software in any way. "Free" speaks to copyright and ownership concepts, and the freedom for any person to do anything they desire with source code. Qubes is also free of charge to anyone that wants to download and use it, and no matter how they want to use it. Invisible Things Lab GmbH is the business entity that maintains and licenses Qubes OS. The open source license Qubes OS is published under, is a YYYx123 license.

The source code for Qubes is also openly available, so that anyone can contribute to and audit it. Only the CTO of Invisible Things Lab has the signing key to create certified packages for the public to download and install, so don't worry—it is a good thing that "just anyone" can audit and contribute to Qubes OS! Qubes is only possible, in fact, because of the large and generous community that contributes to building, auditing, and continually improving it. /nina

I'd love to contribute, how can I get involved?

answer:

Can I pay to have a specific feature developed?

answer:

Can't Qubes just get venture funding?

answer:

I want to bring Qubes into my business, but don't know how.

answer: —tbd—

Is "x" version of Foo compatible with "y" version of Qubes?

answer: 4 very different versions of Qubes OS now having been deployed, we are unable to speak to technical specifics at this level of detail, sustainably, in our regular FAQ. Please consult Qubes Documentation or Release Notes specific to the version of Qubes OS you have questions about, for release-specific compatability inquiries.

Security & Privacy — TOP

Why should I trust this website?

answer: —— /production-verbatim

Why doesn't this website have security Feature "x"?

answer:

How does Qubes provide security?

answer:

How does Qubes provide privacy?

answer:

Aren't antivirus programs and firewalls enough?

answer:

Does Qubes use full disk encryption (FDE)?

answer:

What does it mean to "Distrust The Infrastructure?"

A core tenet of the Qubes philosophy is “distrust the infrastructure,” where “the infrastructure” refers to things like hosting providers, CDNs, DNS services, package repositories, email servers, PGP keyservers, etc. As a project, we focus on securing endpoints instead of attempting to secure “the middle” (i.e., the infrastructure), since one of our primary goals is to free users from being forced to entrust their security to unknown third parties. Instead, our aim is for users to be required to trust as few entities as possible (ideally, only themselves and any known persons whom they voluntarily decide to trust).

Users can never fully control all the infrastructure they rely upon, and they can never fully trust all the entities who do control it. Therefore, we believe the best solution is not to attempt to make the infrastructure trustworthy, but instead to concentrate on solutions that obviate the need to do so. We believe that many attempts to make the infrastructure appear trustworthy actually provide only the illusion of security and are ultimately a disservice to real users. Since we don’t want to encourage or endorse this, we make our distrust of the infrastructure explicit. /production-verbatim

How is Qubes affected by Xen Security Advisories (XSAs)?

answer: The Qubes team pays close attention to Xen Security Advisories. Whenever Qubes is significantly affected by an XSA, a Qubes Security Bulletin (QSB) will be published, and a link to that bulletin is added to our XSA Tracker. Learn more about XSAs and Qubes. /nina. Existing content directs to a dead link.

What about safe languages and formally verified microkernels?

answer:

What is a DMA attack?

answer:

Getting Started With Qubes — TOP

How can I get Qubes?

answer:

What do I need to run Qubes?

answer:

Do I have to know Linux to use Qubes?

answer:

What is a terminal?

answer:

Is there a guide to step me through installation?

answer:

Does Qubes allow multiple user accounts on one machine?

answer:

Can I install Qubes OS together with other operating system (dual-boot/multi-boot)?

answer:

Can I run applications like games, that require hardware acceleration?

answer:

Can I install Qubes in a virtual machine (e.g., on VMware)?

answer:

Hardware — TOP

What are the system requirements for Qubes?

answer:

Is there a list of hardware that is compatible with Qubes?

answer:

That's a lot! How important are each of those things?!

answer:

Is there any certified hardware for Qubes?

answer:

How much memory is recommended for Qubes?

answer:

How much disk space does each qube require?

answer:

Is there a machine I can just go into a store and buy, that will work?

answer:

I can't find any hardware that I like—or, any that is compatible. Help?

answer:

Can I install Qubes on a system without VT-x/AMD-V or VT-d/ADM-Vi/AMD IOMMU?

answer:

Why is VT-x/AMD-V important?

answer:

Why is VT-d/ADM-Vi/AMD IOMMU important?

answer:

Using Qubes — TOP

Are there tutorials or step-by-step guides?

answer:

I need help troubleshooting a problem...

answer:

How do I play video files?

answer:

Why is Qubes so slow and how can I make it faster?

answer: tbd

Why does my network adapter not work?

answer:

Firefox is stuck in full-screen, help?

answer:

How can I get my keyboard layout settings to behave correctly?

answer:

Could you please make my preference the default?

answer: This answer is scolding and just awful sounding. Might we perhaps this question?

I see a “Failed to start Load Kernel Modules” message on boot, help?

answer:

I installed software in a qube, and it’s gone after restarting. Why?

answer:

I cannot get my keyboard layout settings to behave correctly, help?

answer:

How do I run a Windows HVM in non-seamless mode (i.e., as a single window)?

answer:

I have weird graphics glitches like the screen turning partially black.

answer:

Using Devices In Qubes — TOP

How do I access an external USB drive?

answer:

What is a "block device"?

answer:

Can I rename my devices in Qubes?

answer:

Can I set up devices to automatically attach when connected?

answer:

My encrypted drive doesn’t appear in a Debian qube.

answer:

I created a USB VM and assigned USB controllers to it. Now the USB VM won’t boot.

answer:

I assigned a PCI device to a qube, then unassigned it/shut down the qube. Why isn’t the device available in dom0?

answer:

How do I connect Bluetooth devices?

answer:

Updating Qubes — TOP

Does Qubes have its own updater app?

answer:

How can I update my apps?

answer:

Why is dom0 so old?

answer:

My qubes lost internet access after a template update. What should I do?

answer:

My dom0 and/or template update stalls when attempting to update via the GUI tool. What should I do?

answer:

Where did all these new qubes come from that open and close when I run updates—then, dissappear?

answer:

Architecture — TOP

Why does Qubes use virtualization?

answer: We believe that this is currently the only practically viable approach to implementing strong isolation while simultaneously providing compatibility with existing applications and drivers.

Which virtualization modes do VMs use?

answer: An overview of Qubes' VM virtualization modes:

VM type Mode
Default VMs without PCI devices (most VMs) PVH
Default VMs with PCI devices HVM
Stub domains - Default VMs w/o PCI devices N/A
Stub domains - Default VMs w/ PCI devices PV
Stub domains - HVMs PV

What's so special about Qubes' GUI virtualization?

answer: We have designed the GUI virtualization subsystem with two primary goals: security and performance. Our GUI infrastructure introduces only about 2,500 lines of C code (LOC) into the privileged domain (Dom0), which is very little, and thus leaves little space for bugs and potential attacks. At the same time, due to the smart use of Xen shared memory, our GUI implementation is very efficient, so most virtualized applications really feel as if they were executed natively.

Why does Qubes use Xen instead of KVM or another hypervisor?

answer: We believe the Xen architecture allows for the creation of more secure systems (i.e. with a much smaller TCB, which translates to a smaller attack surface). In 2010 Joanna wrote about this in her Architecture Specification document for Qubes 0.3 Alpha. /ouch. Should Marek update? If not, someone else should compose a sentence explaining why it still stands, or affirming that it still stands. Especially if there are worries about Xen ceasing or something?

What about this other/new (micro)kernel/hypervisor?

answer: — Oh dear. The existing answer is painfully out of date. —

Why Passwordless Sudo?

answer: We have found that there's really no point in user/root isolation, because all the user data (and VM management interface) is already accessible from dom0 user level; so, there is nothing more to get from a dom0 root account. Read more about: Passwordless root access in Qubes /nina: just putting a link for a user to click on, instead of a TL;DR of an answer and then the link, is a sucky experience for users; for many the TL;DR does just fine

Do you recommend coreboot as an alternative to vendor BIOS?

answer:

How does Qubes compared to using a "Live CD" OS?

answer:

How does Qubes compare to running VMs in a conventional OS?

answer:

How does Qubes compare to using a separate physical machine?

answer:

Development — TOP

Why do you use GitHub?

answer: First and foremost: We've been here for years, and we're a tiny team stretched very lean. Second, we distrust the infrastructure, including GitHub (though there are aspects we’re still working on).

Third, GitHub is free of cost for us to use. We’d have to spend either time or money to migrate to GitLab, or to another solution. Right now, for better and for worse, we do not have either the time or money to do that. GitHub also has low admin/overhead requirements, which is important given how little time we have to spare.

We realize the chain of revenue and ownership and licensing all tied to GitHub's business, is problematic. We can spend time moving the management of Qubes Project to another platform, or we can spend time on the project itself. Our users have made it clear they'd prefer the later. Should a massive revenue windfall come upon us, rest assured we will likely prioritize this! /nina, based on what was there already and various conversations

When will Qubes prioritize usability?

answer: (note: I get asked this in email semi-often and see it in the surveys a lot, so want to TL;DR that we do care, a lot, just—ohai priorities)

How do I submit a patch?

answer:

How can I request a feature?

answer:

How should I report a bug?

answer:

I found an error in the docs, should I correct it?

answer:

Do you have a bug bounty program?

answer:

Why does dom0 need to be 64-bit?

answer:

Why don’t you fix upstream bugs that affect Qubes?

answer:

What is Qubes’ attitude toward changing guest distros?

answer:

What is the canonical way to detect Qubes VM?

answer:

Are there restrictions on the software that the Qubes developers are willing to use?

answer:

Is "x" thing compatible with "y" version?

answer: —per Andrew tip, say something here that points users to version-specific questions in technical FAQ in the docs—

...and much, much more!

answer: —per Andrew tip, advanced dev/contrib content should direct to a technical/contributor FAQ in the docs—


— Everything below this line, verbatim cut/pasted from the main repo on Sat 05 Feb, 11:53am PST —

General & Security

What is Qubes OS?

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Windows, macOS, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.

Why is OS security important?

Most people use an operating system like Windows or macOS on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you're actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name.

Aren't antivirus programs and firewalls enough?

Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it's common for malware creators to check to see if their malware is recognized by any signature-based antivirus programs. If it's recognized, they scramble their code until it's no longer recognizable by the antivirus programs, then send it out. The best of these programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it's too late for those who have already been compromised. More advanced antivirus software may perform better in this regard, but it's still limited to a detection-based approach. New zero-day vulnerabilities are constantly being discovered in the common software we all use, such as our web browsers, and no antivirus program or firewall can prevent all of these vulnerabilities from being exploited.

How does Qubes OS provide security?

Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated compartments called qubes.

This approach allows you to keep the different things you do on your computer securely separated from each other in isolated qubes so that one qube getting compromised won't affect the others. For example, you might have one qube for visiting untrusted websites and a different qube for doing online banking. This way, if your untrusted browsing qube gets compromised by a malware-laden website, your online banking activities won't be at risk. Similarly, if you're concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use disposable qube. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop.

Moreover, all of these isolated qubes are integrated into a single, usable system. Programs are isolated in their own separate qubes, but all windows are displayed in a single, unified desktop environment with unforgeable colored window borders so that you can easily identify windows from different security levels. Common attack vectors like network cards and USB controllers are isolated in their own hardware qubes while their functionality is preserved through secure networking, firewalls, and USB device management. Integrated file and clipboard copy and paste operations make it easy to work across various qubes without compromising security. The innovative Template system separates software installation from software use, allowing qubes to share a root filesystem without sacrificing security (and saving disk space, to boot). Qubes even allows you to sanitize PDFs and images in a few clicks. Those concerned about physical hardware attacks will benefit from Anti Evil Maid.

How does Qubes OS provide privacy?

There can be no privacy without security, since security vulnerabilities allow privacy measures to be circumvented. This makes Qubes exceptionally well-suited for implementing effective privacy tools.

Users concerned about privacy will appreciate the integration of Whonix into Qubes, which makes it easy to use Tor securely. For more information about how to use this powerful tool correctly and safely, please see Qubes-Whonix Guides.

For the privacy policies covering our website, repositories, Qubes OS itself, and more, please see Privacy Policy.

What about privacy in non-Whonix qubes?

The main way Qubes OS provides privacy is via its integration with Whonix. Qubes OS does not claim to provide special privacy (as opposed to security) properties in non-Whonix qubes. This includes disposables.

For example, a standard Fedora qube is expected to have basically the same privacy properties as that upstream Fedora distribution, enhanced to some degree by the control Qubes provides over that qube. For most users, this level of privacy may be good enough for many common activities. However, users seeking more advanced privacy features should use Whonix qubes.

Privacy is far more difficult than is commonly understood. In addition to the web browser, there is also VM fingerprinting and advanced deanonymization attacks that most users have never considered (and this is just to mention a few examples). The Whonix Project specializes in protecting against these risks.

In order to achieve the same results in non-Whonix qubes (including disposables), one would have to reinvent Whonix. Such duplication of effort makes no sense when Whonix already exists and is already integrated into Qubes OS.

Therefore, when you need privacy, you should use Whonix qubes. Remember, though, that privacy is difficult to achieve and maintain. Whonix is a powerful tool, but no tool is perfect. Read the documentation thoroughly and exercise care when using it.

How does Qubes OS compare to using a "live CD" OS?

Booting your computer from a live CD (or DVD) when you need to perform sensitive activities can certainly be more secure than simply using your main OS, but this method still preserves many of the risks of conventional OSes. For example, popular live OSes (such as Tails and other Linux distributions) are still monolithic in the sense that all software is still running in the same OS. This means, once again, that if your session is compromised, then all the data and activities performed within that same session are also potentially compromised.

How does Qubes OS compare to running VMs in a conventional OS?

Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as "Type 2" or "hosted" hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they're designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it "hosts" the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they're really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.

By contrast, Qubes uses a "Type 1" or "bare-metal" hypervisor called Xen. Instead of running inside an OS, Type 1 hypervisors run directly on the "bare metal" of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult.

Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet.

How does Qubes OS compare to using a separate physical machine?

Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider. Briefly, here are some of the main pros and cons of this approach relative to Qubes:

Pros
  • Physical separation doesn't rely on a hypervisor. (It's very unlikely that an attacker will break out of Qubes' hypervisor, but if one were to manage to do so, one could potentially gain control over the entire system.)
  • Physical separation can be a natural complement to physical security. (For example, you might find it natural to lock your secure laptop in a safe when you take your unsecure laptop out with you.)
Cons
  • Physical separation can be cumbersome and expensive, since we may have to obtain and set up a separate physical machine for each security level we need.
  • There's generally no secure way to transfer data between physically separate computers running conventional OSes. (Qubes has a secure inter-VM file transfer system to handle this.)
  • Physically separate computers running conventional OSes are still independently vulnerable to most conventional attacks due to their monolithic nature.
  • Malware which can bridge air gaps has existed for several years now and is becoming increasingly common.

(For more on this topic, please see the paper Software compartmentalization vs. physical separation.)

What is the main concept behind Qubes?

To build security on the "Security by Compartmentalization (or Isolation)" principle.

What about other approaches to security?

The other two popular approaches are “Security by Correctness” and “Security by Obscurity.” We don't believe either of these approaches are capable of providing reasonable security today, nor do we believe that they will be capable of doing so in the foreseeable future.

How is Qubes different from other security solutions?

Please see this article for a thorough discussion.

Is Qubes just another Linux distribution?

If you really want to call it a distribution, then it's more of a "Xen distribution" than a Linux one. But Qubes is much more than just Xen packaging. It has its own VM management infrastructure, with support for template VMs, centralized VM updating, etc. It also has a very unique GUI virtualization infrastructure.

What about safe languages and formally verified microkernels?

In short: these are non-realistic solutions today. We discuss this in further depth in our Architecture Specification document.

Why does Qubes use virtualization?

We believe that this is currently the only practically viable approach to implementing strong isolation while simultaneously providing compatibility with existing applications and drivers.

Does Qubes use full disk encryption (FDE)?

Yes, of course! Full disk encryption is enabled by default. Specifically, we use LUKS/dm-crypt. You can even manually configure your encryption parameters if you like!

What do all these terms mean?

All Qubes-specific terms are defined in the glossary

Does Qubes run every app in a separate VM?

No! This would not make much sense. Qubes uses lightweight VMs to create security qubes (e.g., "work," "personal," and "banking,"). A typical user would likely need around five qubes. Very paranoid users, or those who are high-profile targets, might use a dozen or more qubes.

Why does Qubes use Xen instead of KVM or some other hypervisor?

In short: we believe the Xen architecture allows for the creation of more secure systems (i.e. with a much smaller TCB, which translates to a smaller attack surface). We discuss this in much greater depth in our Architecture Specification document.

How is Qubes affected by Xen Security Advisories (XSAs)?

See the XSA Tracker.

What about this other/new (micro)kernel/hypervisor?

Whenever starting a discussion about another (micro)kernel or hypervisor in relation to Qubes, we strongly suggest including answers to the following questions first:

  1. What kinds of containers does it use for isolation? Processes? PV VMs? Fully virtualized VMs (HVMs)? And what underlying h/w technology is used (ring0/3, VT-x)?
  2. Does it require specially written/built applications (e.g. patched Firefox)?
  3. Does it require custom drivers, or can it use Linux/Windows ones?
  4. Does it support VT-d, and does it allow for the creation of untrusted driver domains?
  5. Does it support S3 sleep?
  6. Does it work on multiple CPUs/Chipsets?
  7. What are the performance costs, more or less? (e.g. "XYZ prevents concurrent execution of two domains/processes on shared cores of a single processor", etc.)
  8. Other special features? E.g. eliminates cooperative covert channels between VMs?

Here are the answers for Xen 4.1 (which we use as of 2014-04-28):

  1. PV and HVM Virtual Machines (ring0/3 for PV domains, VT-x/AMD-v for HVMs).
  2. Runs unmodified usermode apps (binaries).
  3. Runs unmodified Linux drivers (dom0 and driver domains). PV VMs require special written pvdrivers.
  4. Full VT-d support including untrusted driver domains.
  5. S3 sleep supported well.
  6. Works on most modern CPUs/Chipsets.
  7. Biggest performance hit on disk operations (especially in Qubes when complex 2-layer mapping used for Linux qubes). No GPU virtualization.
  8. Mostly WorksTM :)

Which virtualization modes do VMs use?

Here is an overview of the VM virtualization modes:

VM type Mode
Default VMs without PCI devices (most VMs) PVH
Default VMs with PCI devices HVM
Stub domains - Default VMs w/o PCI devices N/A
Stub domains - Default VMs w/ PCI devices PV
Stub domains - HVMs PV

What's so special about Qubes' GUI virtualization?

We have designed the GUI virtualization subsystem with two primary goals: security and performance. Our GUI infrastructure introduces only about 2,500 lines of C code (LOC) into the privileged domain (Dom0), which is very little, and thus leaves little space for bugs and potential attacks. At the same time, due to the smart use of Xen shared memory, our GUI implementation is very efficient, so most virtualized applications really feel as if they were executed natively.

Why passwordless sudo?

Please refer to this page.

Why is dom0 so old?

Please see:

Do you recommend coreboot as an alternative to vendor BIOS?

Yes, where it is possible to use it an open source boot firmware ought to be more trustable than a closed source implementation. coreboot is as a result a requirement for Qubes Certified Hardware. The number of machines coreboot currently supports is limited and the use of some vendor supplied blobs is generally still required. Where coreboot does support your machine and is not already installed, you will generally need additional hardware to flash it. Please see the coreboot website / their IRC channel for further information.

How should I report documentation issues?

If you can fix the problem yourself, please see how to edit the documentation. If not, please see issue tracking.

Will Qubes seek to get certified under the GNU Free System Distribution Guidelines (GNU FSDG)?

Not currently, for the same reasons that Debian is not certified.

Should I trust this website?

This website is hosted on GitHub Pages (why?). Therefore, it is largely outside of our control. We don't consider this a problem, however, since we explicitly distrust the infrastructure. For this reason, we don't think that anyone should place undue trust in the live version of this site on the Web. Instead, if you want to obtain your own trustworthy copy of this website in a secure way, you should clone our website repo, verify the PGP signatures on the commits and/or tags signed by the doc-signing keys (which indicates that the content has undergone review), then either render the site on your local machine or simply read the source, the vast majority of which was intentionally written in Markdown so as to be readable as plain text for this very reason. We've gone to special effort to set all of this up so that no one has to trust the infrastructure and so that the contents of this website are maximally available and accessible.

What does it mean to "distrust the infrastructure"?

A core tenet of the Qubes philosophy is "distrust the infrastructure," where "the infrastructure" refers to things like hosting providers, CDNs, DNS services, package repositories, email servers, PGP keyservers, etc. As a project, we focus on securing endpoints instead of attempting to secure "the middle" (i.e., the infrastructure), since one of our primary goals is to free users from being forced to entrust their security to unknown third parties. Instead, our aim is for users to be required to trust as few entities as possible (ideally, only themselves and any known persons whom they voluntarily decide to trust).

Users can never fully control all the infrastructure they rely upon, and they can never fully trust all the entities who do control it. Therefore, we believe the best solution is not to attempt to make the infrastructure trustworthy, but instead to concentrate on solutions that obviate the need to do so. We believe that many attempts to make the infrastructure appear trustworthy actually provide only the illusion of security and are ultimately a disservice to real users. Since we don't want to encourage or endorse this, we make our distrust of the infrastructure explicit.

Also see: Should I trust this website?

Why do you use GitHub?

Three main reasons:

  1. We distrust the infrastructure including GitHub (though there are aspects we're still working on).
  2. It's free (as in beer). We'd have to spend either time or money to implement a solution ourselves or pay someone to do so, and we can't spare either one right now.
  3. It has low admin/overhead requirements, which is very important, given how little time we have to spare.

Also see: Should I trust this website?

Why doesn't this website have security feature X?

Although we caution users against placing undue trust in this website because we distrust the infrastructure, we have no objection to enabling website security features when doing so is relatively costless and provides some marginal benefit to website visitors. So, if feature X isn't enabled, it's most likely for one of three reasons:

  1. Our GitHub Pages platform doesn't support it.
  2. Our platform supports it, but we've decided not to enable it.
  3. Our platform supports it, but we're not aware that we can enable it or have forgotten to do so.

If it seems like a feature that we can and should enable, please let us know!

Users

Can I watch YouTube videos in qubes?

Absolutely.

Can I run applications, like games, which require hardware acceleration?

Those won’t fly. We do not provide GPU virtualization for Qubes. This is mostly a security decision, as implementing such a feature would most likely introduce a great deal of complexity into the GUI virtualization infrastructure. However, Qubes does allow for the use of accelerated graphics (e.g. OpenGL) in dom0’s Window Manager, so all the fancy desktop effects should still work. App qubes use a software-only (CPU-based) implementation of OpenGL, which may be good enough for basic games and applications.

For further discussion about the potential for GPU passthrough on Xen/Qubes, please see the following threads:

Is Qubes a multi-user system?

No. Qubes does not pretend to be a multi-user system. Qubes assumes that the user who controls Dom0 controls the whole system. It is very difficult to securely implement multi-user support. See here for details.

However, in Qubes 4.x we will be implementing management functionality. See Admin API and Core Stack for more details.

What are the system requirements for Qubes OS?

See the system requirements.

Is there a list of hardware that is compatible with Qubes OS?

See the Hardware Compatibility List.

Is there any certified hardware for Qubes OS?

See Certified Hardware.

How much disk space does each qube require?

Each qube is created from a template and shares the root filesystem with this template (in a read-only manner). This means that each qube needs only as much disk space as is necessary to store its own private data. This also means that it is possible to update the software for several qubes simultaneously by running a single update process in the template upon which those qubes are based. (These qubes will then have to be restarted in order for the update to take effect in them.)

How much memory is recommended for Qubes?

Please see the system requirements.

Can I install Qubes on a system without VT-x/AMD-V or VT-d/AMD-Vi/AMD IOMMU?

Please see the system requirements for the latest information. If you are receiving an error message on install saying your "hardware lacks the features required to proceed", check to make sure the virtualization options are enabled in your BIOS/UEFI configuration. You may be able to install without the required CPU features for testing purposes only, but VMs (in particular, sys-net) may not function correctly and there will be no security isolation. For more information, see Qubes-certified hardware.

Why is VT-x/AMD-V important?

By default, Qubes uses Xen's PVH and HVM virtualization modes, which require VT-x/AMD-V. This means that, without VT-x/AMD-V, no VMs will start in a default Qubes installation. In addition, if your system lacks VT-x/AMD-V, then it also lacks VT-d/AMD-Vi/AMD IOMMU. (See next question.)

Why is VT-d/AMD-Vi/AMD IOMMU important?

On a system without VT-d/AMD-Vi/AMD IOMMU, there will be no real security benefit to having a separate NetVM, as an attacker could always use a simple DMA attack to go from the NetVM to Dom0. Nonetheless, all of Qubes' other security mechanisms, such as qube separation, work without VT-d/AMD-Vi/AMD IOMMU. Therefore, a system running Qubes without VT-d/AMD-Vi/AMD IOMMU would still be significantly more secure than one running Windows, Mac, or Linux.

What is a DMA attack?

Direct Memory Access (DMA) is mechanism for PCI devices to access system memory (read/write). Without VT-d/AMD-Vi/AMD IOMMU, any PCI device can access all the memory, regardless of the VM to which it is assigned (or if it is left in dom0). Most PCI devices allow the driver to request an arbitrary DMA operation (like "put received network packets at this address in memory", or "get this memory area and send it to the network"). So, without VT-d/AMD-Vi/AMD IOMMU, it gives unlimited access to the whole system. Now, it is only a matter of knowing where to read/write to take over the system, instead of just crashing. But since you can read the whole memory, it isn't that hard.

Now, how does this apply to Qubes OS? The above attack requires access to a PCI device, which means that it can be performed only from the NetVM or USB VM, so someone must first break into one of those VMs. But this isn't that hard, because there is a lot of complex code handling network traffic. There is a history of bugs in DHCP clients, DNS clients, etc. Most attacks on the NetVM and USB VM (but not all of them!) require being somewhat close to the target system, for example, being connected to the same Wi-Fi network, or in the case of a USB VM, having physical access to a USB port.

Can I use AMD-v instead of VT-x?

Yes, and see this message.

Can I install Qubes in a virtual machine (e.g., on VMware)?

Some users have been able to do this, but it is neither recommended nor supported. Qubes should be installed bare-metal. (After all, it uses its own bare-metal hypervisor!)

What is a terminal?

A terminal emulator, nowadays often referred to as just a terminal, is a program which provides a text window. Inside that window, a shell is typically running in it. A shell provides a command-line interface where the user can enter and run commands.

See introductions on Wikibooks: here, here and here.

Why does my network adapter not work?

You may have an adapter (wired, wireless), that is not compatible with open-source drivers shipped by Qubes. You may need to install a binary blob, which provides drivers, from the linux-firmware package.

Open a terminal and run sudo dnf install linux-firmware in the template upon which your NetVM is based. You have to restart the NetVM after the template has been shut down.

Can I install Qubes OS together with other operating system (dual-boot/multi-boot)?

You shouldn't do that, because it poses a security risk for your Qubes OS installation. But if you understand the risk and accept it, read documentation on multibooting. It begins with an explanation of the risks with such a setup.

Which version of Qubes am I running?

See here.

My qubes lost internet access after a template update. What should I do?

See Update Troubleshooting.

My keyboard layout settings are not behaving correctly. What should I do?

See Hardware Troubleshooting.

My dom0 and/or template update stalls when attempting to update via the GUI tool. What should I do?

This can usually be fixed by updating via the command line.

In dom0, open a terminal and run sudo qubes-dom0-update.

In your templates, open a terminal and run sudo dnf upgrade.

How do I run a Windows HVM in non-seamless mode (i.e., as a single window)?

Enable "debug mode" in the qube's settings, either by checking the box labeled "Run in debug mode" in the Qubes VM Manager qube settings menu or by running the qvm-prefs command.

I created a USB VM and assigned USB controllers to it. Now the USB VM won't boot.

This is probably because one of the controllers does not support reset. See the USB Troubleshooting guide.

I assigned a PCI device to a qube, then unassigned it/shut down the qube. Why isn't the device available in dom0?

This is an intended feature. A device which was previously assigned to a less trusted qube could attack dom0 if it were automatically reassigned there. In order to re-enable the device in dom0, either:

  • Reboot the physical machine.

or

  • Go to the sysfs (/sys/bus/pci), find the right device, detach it from the pciback driver and attach back to the original driver. Replace <BDF> with your device, for example 00:1c.2:

    echo 0000:<BDF> > /sys/bus/pci/drivers/pciback/unbind
    MODALIAS=`cat /sys/bus/pci/devices/0000:<BDF>/modalias`
    MOD=`modprobe -R $MODALIAS | head -n 1`
    echo 0000:<BDF> > /sys/bus/pci/drivers/$MOD/bind
    

See also here.

How do I play video files?

If you're having trouble playing a video file in a qube, you're probably missing the required codecs. The easiest way to resolve this is to install VLC Media Player and use that to play your video files. You can do this in multiple different template distros (Fedora, Debian, etc.).

For Debian:

  1. (Recommended) Clone an existing Debian template

  2. Install VLC in that template:

    $ sudo apt install vlc
    
  3. Use VLC to play your video files.

For Fedora:

  1. (Recommended) Clone an existing Fedora template

  2. Enable the appropriate RPMFusion repos in the desired Fedora template.

  3. Install VLC in that template:

    $ sudo dnf install vlc
    
  4. Use VLC to play your video files.

How do I access my external drive?

The recommended approach is to pass only the specific partition you intend to use from sys-usb to another qube via qvm-block. They will show up in the destination qube as /dev/xvd* and must be mounted manually. Another approach is to attach the entire USB drive to your destination qube. However, this could theoretically lead to an attack because it forces the destination qube to parse the device's partition table. If you believe your device is safe, you may proceed to attach it.

In Qubes 4.0, this is accomplished with the Devices Widget located in the tool tray (default top right corner, look for an icon with a yellow square). From the top part of the list, click on the drive you want to attach, then select the qube to attach it to. Although you can also attach the entire USB device to a qube by selecting it from the bottom part of the list, in general this approach should not be used because you are exposing the target qube to unnecessary additional attack surface.

Although external media such as external hard drives or flash drives plugged in via USB are available in the USB qube, it is not recommended to access them directly from inside the USB qube. See Block (Storage) Devices for more information.

My encrypted drive doesn't appear in Debian qube.

This is an issue that affects qubes based on Debian Jessie. The problem is fixed in Stretch, and does not affect Fedora-based qubes.

A mixed drive with some encrypted partitions appears correctly in Nautilus. The encrypted partitions are identified and the user is prompted for password on attempting to mount the partition.

A fully encrypted drive does not appear in Nautilus.

The workaround is to manually decrypt and mount the drive:

  1. Attach USB device to qube - it should be attached as /dev/xvdi or similar.
  2. sudo cryptsetup open /dev/xvdi bk --type luks
  3. sudo cryptsetup status /dev/mapper/bk (Shows useful status info.)
  4. sudo mount /dev/mapper/bk /mnt

The decrypted device is now available at /mnt - when you have finished using it unmount and close the drive.

  1. sudo umount /mnt
  2. sudo cryptsetup close bk --type luks
  3. Remove USB from qube.

Windows Update is stuck.

This has nothing to do with Qubes. It's a longstanding Windows bug.

Fullscreen Firefox is frozen.

Press F11 twice.

I have weird graphics glitches like the screen turning partially black.

If it seems like the issue described in this thread, try disabling the window compositor:

  • Q → System Tools → Window Manager Tweaks → Compositor → uncheck "Enable display compositing"

Please report (via the mailing lists) if you experience this issue, and whether disabling the compositor fixes it for you or not.

My HVM in Qubes R4.0 won't let me start/install an OS

I see a screen popup with SeaBios and 4 lines, last one being Probing EDD (edd=off to disable!... ok.

From a dom0 prompt, enter:

qvm-prefs <HVMname> kernel ""

When I try to install a template, it says no match is found.

See VM Troubleshooting.

I keep getting "Failed to synchronize cache for repo" errors when trying to update my Fedora templates

See Update Troubleshooting.

I see a "Failed to start Load Kernel Modules" message on boot

The full message looks like:

[FAILED] Failed to start Load Kernel Modules.
See 'systemctl status systemd-modules-load.service' for details.

This is cosmetic only, and can safely be ignored.

Why is Qubes so slow and how can I make it faster?

During boot, Qubes starts several virtual machines. Having so many qubes running at once inevitably strains the resources of your computer and causes slowness. The most effective way to speed up Qubes is to get more powerful hardware -- a fast CPU, a lot of memory and fast SSDs. Qubes is slower when reading from the disk because of the VM overhead, which is why we recommend installing it on a fast SSD.

Could you please make my preference the default?

Wouldn't it be great if Qubes were configured just the way you like it by default with all of your favorite programs and settings? Then you could just install Qubes without having to install any programs in it or adjust any settings! You might even think that if a particular program or setting works so well for you, it would work well for everyone, so you'd actually be doing everyone a favor! The problem is that Qubes has tens of thousands of different users with radically different needs and purposes. There is no particular configuration that will be ideal for everyone (despite how much you might feel that your preference would be better for everyone), so the best we can do is to put power in the hands of users to configure their Qubes installations the way they like (subject to security constraints, of course). Please don't ask for your favorite program to be installed by default or for some setting that obviously varies by user preference to be changed so that it matches your preference. This is an incredibly selfish attitude that demonstrates a complete lack of consideration for the thousands of other Qubes users who don't happen to share your preferences.

Software installed in a qube is gone after restarting. Why?

Software must be installed in the template on which your qube is based.

Developers

Are there restrictions on the software that the Qubes developers are willing to use?

Yes. In general, the Qubes developers will not use a piece of software unless there is an easy way to verify both its integrity and authenticity, preferably via PGP signatures (see Verifying Signatures). Specifically:

  • If PGP signatures are used, the signing key(s) should have well-publicized fingerprint(s) verifiable via multiple independent channels or be accessible to the developers through a web of trust.
  • If the software is security-sensitive and requires communication with the outside world, a "split" implementation is highly preferred (for examples, see Split GPG and Split Bitcoin).
  • If the software has dependencies, these should be packaged and available in repos for a current, Qubes-supported version of Fedora (preferred) or Debian (unless all the insecure dependencies can run in an untrusted VM in a "split" implementation).
  • If the software must be built from source, the source code and any builders must be signed. (Practically speaking, the more cumbersome and time-consuming it is to build from source, the less likely the developers are to use it.)

Why does dom0 need to be 64-bit?

Since 2013 Xen has not supported 32-bit x86 architecture and Intel VT-d, which Qubes uses to isolate devices and drivers, is available on Intel 64-bit processors only.

In addition, with features like improved ASLR, it is often more difficult to exploit a bug on x64 Linux than x86 Linux. While we designed Qubes from the beginning to limit potential attack vectors, we still realize that some of the code running in Dom0, e.g. our GUI daemon or xen-store daemon, however simple, might contain some bugs. Plus since we haven't implemented a separate storage domain, the disk backends are in Dom0 and are "reachable" from the VMs, which adds up to the potential attack surface. So, having faced a choice between 32-bit and 64-bit OS for Dom0, it was almost a no-brainer. The 64-bit option provides some (little perhaps, but some) more protection against some classes of attacks, and at the same time does not have any disadvantages except the extra requirement of a 64 bit processor. And even though Qubes now "needs" a 64 bit processor, it didn't make sense to run Qubes on a system without 3-4GB of memory, and those have 64-bit CPUs anyway.

What is the recommended build environment for Qubes OS?

Any rpm-based, 64-bit environment, the preferred OS being Fedora.

How do I build Qubes from sources?

See these instructions.

How do I submit a patch?

See the Qubes Source Code Repositories article.

What is Qubes' attitude toward changing guest distros?

We try to respect each distro's culture, where possible. See the discussion on issue #1014 for an example.

The policy is there mostly to ease maintenance, on several levels:

  • Less modifications means easier migration to new upstream distribution releases.
  • The upstream documentation matches the distribution running in the Qubes VM.
  • We're less likely to introduce Qubes-specific issues.
  • Each officially supported distribution (ideally) should offer the same set of Qubes-specific features - a change in one supported distribution should be followed also in others, including new future distributions.

Why don't you fix upstream bugs that affect Qubes OS?

First, a bit of background in case you're new to the open-source software world: There are a huge number of different open-source projects that each focus on the software they create and maintain. Some focus on specific frameworks, libraries, and background subsystems that most users never see. Others focus on specific tools and apps that use these frameworks, libraries, and background subsystems. Still others focus on combining many different tools and apps. And some, like Qubes OS, are entire operating systems that include all kinds of other software. When one piece of software uses a different piece of software, the piece of software being used is said to be "upstream," while the piece of software using it said to be "downstream." For example, Qubes OS uses the Xen hypervisor, so Xen is upstream relative to Qubes, and Qubes is downstream relative to Xen (and likewise for the respective project that creates and maintains each piece of software).

Many open-source operating systems, including Qubes OS, are transparent about the fact that they are "compilations" of upstream software. By contrast, proprietary, commercial operating systems like Windows and macOS tend to either obscure this fact or avoid using upstream software in favor of doing everything in-house, because they have the huge workforce and commercial revenue that allows them to do so. If you're accustomed to using a proprietary, commercial operating system, then you may need some time to get used to the fact that Qubes OS is a compilation of many different pieces of open-source software.

Now, let's get to the original question: Why don't we fix upstream bugs that affect Qubes OS? This question can come up in different ways. For example, many people, especially those who aren't familiar with how open-source software development works, wonder why we sometimes close issues as "not our bug." Don't we care about the Qubes users who are affected by these bugs? Are we really so cold and heartless?

On the contrary, it is precisely because we care so much about Qubes users that we do this. It's important to understand that Qubes OS combines different pieces of software from a very large number of upstream projects (especially since it includes entire separate OSes inside of itself) and that many of these projects have much larger workforces and much more funding than we do. They are better equipped to fix bugs in their own software. Not only are they the ones who wrote the code, they're also more familiar with how best to integrate any fixes into the entire code base for maintainability. Besides, they own the code. We can't force any other project to accept a patch, even if we sincerely believe it's a good bug fix. In some cases, we have to maintain our own fork of an upstream project, which just adds to our ongoing maintenance burden.

In contrast to some of the large upstream projects whose software we use, the Qubes OS Project is small, lean, and focused on one goal: creating and maintaining a reasonably secure operating system for regular desktop users. The Qubes core developers are specialists. They are among the best in the world at virtualization security, low-level system security, and implementing security-by-compartmentalization at the operating-system level. There are many aspects of Qubes OS engineering work for which they are uniquely qualified. Recognizing this, it only makes sense to focus their time where it will provide the greatest benefit, on doing security-related work that only they can do. By contrast, it would be a wasteful misallocation of skill and talent (to the long-term detriment of Qubes users) to have them fixing bugs that are in code they didn't write, that doesn't belong to them, that (in some cases) belongs to a huge upstream project with ample time and resources, and that the upstream project is equally capable of fixing (and, in many cases, is better suited to fix, as that's their area of specialization).

Moreover, the question is based on a faulty assumption in the first place, because we already do in fact fix some upstream bugs that affect Qubes OS. For example, the Qubes core developers have made significant upstream Xen contributions, particularly in the area of security, as that's where our developers specialize. So, the original question should really be rephrased to ask, "Why don't you fix every upstream bug that affects Qubes OS?" In light of the foregoing explanation, we hope you agree that this would be an unreasonable expectation.

"Very well," you might be thinking, "but there's still an upstream bug that affects me! What can I do about it?" Recall what we discussed above about how the open-source world works. If there's a bug in some piece of upstream software, then there's an open-source project responsible for creating and maintaining that software. They're the ones who wrote the code and who are best equipped to fix the bug. You should file a bug report in that project's issue tracker instead. Not only will you be helping all other affected Qubes users, you'll also be helping all downstream users of that software!

(Note: If you're wondering about cases in which a bug has already been fixed upstream but hasn't yet arrived in your Qubes OS release, please see backports. These are not cases in which an issue is closed as "not our bug.")

Is the I/O emulation component (QEMU) part of the Trusted Computing Base (TCB)?

No. Unlike many other virtualization systems, Qubes takes special effort to keep QEMU outside of the TCB. This has been achieved thanks to the careful use of Xen's stub domain feature. For more details about how we improved on Xen's native stub domain use, see here.

Is Secure Boot supported?

UEFI Secure Boot is not supported out of the box as UEFI support in Xen is very basic. Arguably secure boot reliance on UEFI integrity is not the best design. The relevant binaries (shim.efi, xen.efi, kernel / initramfs) are not signed by the Qubes Team and secure boot has not been tested. Intel TXT (used in Anti Evil Maid) at least tries to avoid or limit trust in BIOS. See the Heads project [1] [2] for a better-designed non-UEFI-based secure boot scheme with very good support for Qubes.

What is the canonical way to detect Qubes VM?

Check /usr/share/qubes/marker-vm file existence. Additionally, its last line contains Qubes release version (e.g., 4.0). The file was introduced after the initial Qubes 4.0 release. If you need to support not-fully-updated systems, check for the existence of /usr/bin/qrexec-client-vm.

Is there a way to automate tasks for continuous integration or DevOps?

Yes, Qubes natively supports automation via Salt (SaltStack). There is also the unofficial ansible-qubes toolkit. (Warning: Since this is an external project that has not been reviewed or endorsed by the Qubes team, allowing it to manage dom0 may be a security risk.)

Clone this wiki locally