Skip to content

Commit b001f24

Browse files
committed
Fixed typos and layout issues in PDF; added new qubes-dom0-update examples; add Archlinux template install example
1 parent f872183 commit b001f24

4 files changed

+299
-111
lines changed

qubes-cheatsheet.html

+80-38
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ <h1 class="title">Qubes OS Cheatsheet</h1>
1616
</header>
1717
<h2 id="qubes-cheatsheet">Qubes Cheatsheet</h2>
1818
<p><em>a summary of useful qubes commands</em></p>
19-
<p>version: 3.1</p>
19+
<p>version: 3.2</p>
2020
<h3 id="mini-glossary">Mini Glossary</h3>
2121
<ul>
2222
<li>Xen - <em>Hypervisor</em></li>
@@ -31,12 +31,12 @@ <h3 id="mini-glossary">Mini Glossary</h3>
3131
<li>GUI - <em>Graphical User Interface</em></li>
3232
</ul>
3333
<h3 id="vm-management">VM Management</h3>
34-
<p>:!: <em>All commands are executed in Dom0 terminal (Konsole, Terminal, Xterm etc.)</em></p>
34+
<p><em>NOTE: All commands are executed in <code>@Dom0</code> terminal (Konsole, Terminal, Xterm etc.)</em></p>
3535
<h4 id="qubes-manager">qubes-manager</h4>
3636
<p>- <em>Graphical VM Manager</em></p>
3737
<p>usage: <code>qubes-manager</code></p>
3838
<h4 id="qvm-block">qvm-block</h4>
39-
<p>- <em>list/set VM PCI devices</em></p>
39+
<p>- <em>Lists/attaches VM PCI devices</em></p>
4040
<p>usage:</p>
4141
<ul>
4242
<li><p><code>qvm-block -l [options]</code></p></li>
@@ -47,25 +47,25 @@ <h4 id="qvm-block">qvm-block</h4>
4747
<p>---</p>
4848
<p><code>qvm-block -A personal dom0:/home/user/extradisks/data.img</code> - <em>attaches an additional storage for the personal-vm</em></p>
4949
<h4 id="qvm-clone">qvm-clone</h4>
50-
<p>- <em>clones an existing VM by copying all its disk files</em></p>
50+
<p>- <em>Clones an existing VM by copying all its disk files</em></p>
5151
<p>usage: <code>qvm-clone [options] &lt;existing-vm-name&gt; &lt;new-clone-vm-name&gt;</code></p>
5252
<p>---</p>
5353
<p><code>qvm-clone fedora-23 fedora-23-dev</code> - <em>create a clone of fedora-23 called fedora-23-dev</em></p>
5454
<h4 id="qvm-firewall">qvm-firewall</h4>
55-
<p>- <em>manage VM’s firewall rules</em></p>
55+
<p>- <em>Manage VM firewall rules</em></p>
5656
<p>usage: <code>qvm-firewall -l [-n] &lt;vm-name&gt;</code></p>
5757
<p>---</p>
5858
<p><code>qvm-firewall -l personal</code> - <em>displays the firewall settings for the personal-vm</em></p>
5959
<p><code>qvm-firewall -l -n fedora-23</code> - <em>displays the firewall settings for the personal-vm with port numbers</em></p>
6060
<h4 id="qvm-ls">qvm-ls</h4>
61-
<p>- <em>list VMs and various information about their state</em></p>
61+
<p>- <em>Lists VMs and various information about their state</em></p>
6262
<p>usage: <code>qvm-ls [options] &lt;vm-name&gt;</code></p>
6363
<p>---</p>
6464
<p><code>qvm-ls</code> - <em>lists all vms</em></p>
6565
<p><code>qvm-ls -n</code> - <em>show network addresses assigned to VMs</em></p>
6666
<p><code>qvm-ls -d</code> - <em>show VM disk utilization statistics</em></p>
6767
<h4 id="qvm-prefs">qvm-prefs</h4>
68-
<p>- <em>list/set various per-VM properties</em></p>
68+
<p>- <em>List/set various per-VM properties</em></p>
6969
<p>usage:</p>
7070
<ul>
7171
<li><p><code>qvm-prefs -l [options] &lt;vm-name&gt;</code></p></li>
@@ -76,51 +76,63 @@ <h4 id="qvm-prefs">qvm-prefs</h4>
7676
<p><code>qvm-prefs win7-copy -s mac 00:16:3E:5E:6C:05</code> - <em>sets a new mac for the network card</em></p>
7777
<p><code>qvm-prefs lab-win7 -s qrexec_installed true</code> - <em>sets the qrexec to installed</em></p>
7878
<p><code>qvm-prefs lab-win7 -s qrexec_timeout 120</code> - <em>usefull for windows hvm based vms</em></p>
79-
<p><code>qvm-prefs lab-win7 -s default_user joanna</code> - <em>sets the login user to joanna</em></p>
79+
<p><code>qvm-prefs lab-win7 -s default_user joanna</code> - <em>sets the login user to <code>joanna</code></em></p>
8080
<h4 id="qvm-run">qvm-run</h4>
81-
<p>- <em>runs a specific command on a vm</em></p>
81+
<p>- <em>Runs a specific command on a vm</em></p>
8282
<p>usage: <code>qvm-run [options] [&lt;vm-name&gt;] [&lt;cmd&gt;]</code></p>
8383
<p>---</p>
8484
<p><code>qvm-run personal xterm</code> - <em>runs xterm on personal</em></p>
8585
<p><code>qvm-run personal xterm --pass-io</code> - <em>runs xterm and passes all sdtin/stdout/stderr to the terminal</em></p>
8686
<p><code>qvm-run personal &quot;sudo dnf update&quot; --pass-io --nogui</code> - <em>pass a <code>dnf update</code> command directly to the VM</em></p>
8787
<h4 id="qvm-start">qvm-start</h4>
88-
<p>- <em>starts a vm</em></p>
88+
<p>- <em>Starts a vm</em></p>
8989
<p>usage: <code>qvm-start [options] &lt;vm-name&gt;</code></p>
9090
<p>---</p>
9191
<p><code>qvm-start personal</code> - <em>starts the personal-vm</em></p>
9292
<p><code>qvm-start ubuntu --cdrom personal:/home/user/Downloads/ubuntu-14.04.iso</code> - <em>starts the ubuntu-vm with the ubuntu installation CD</em></p>
9393
<h4 id="qvm-shutdown">qvm-shutdown</h4>
94-
<p>- <em>shutdowns a vm</em></p>
94+
<p>- <em>Stops a vm</em></p>
9595
<p>usage: <code>qvm-shutdown [options] &lt;vm-name&gt;</code></p>
9696
<p>---</p>
9797
<p><code>qvm-shutdown personal</code> - <em>shutdowns the personal-vm</em></p>
9898
<p><code>qvm-shutdown --all</code> - <em>shutdowns all VM’s</em></p>
9999
<h4 id="qvm-kill">qvm-kill</h4>
100-
<p>- <em>kills a VM - same as pulling out the power cord - immediate shutdown</em></p>
100+
<p>- <em>Kills a VM - same as pulling out the power cord - immediate shutdown</em></p>
101101
<p>usage: <code>qvm-kill [options] &lt;vm-name&gt;</code></p>
102102
<p>---</p>
103103
<p><code>qvm-kill personal</code> - <em>pull the power cord for the personal-vm - immediate shutdown</em></p>
104104
<h4 id="qvm-trim-template">qvm-trim-template</h4>
105-
<p>- <em>trims the disk space of a template</em></p>
105+
<p>- <em>Trims the disk space of a template</em></p>
106106
<p>usage: <code>qvm-trim-template &lt;template-name&gt;</code></p>
107107
<p>---</p>
108108
<p><code>qvm-trim-template debian-8</code> - <em>helpful after upgrading or removing many packages/files in the template</em></p>
109109
<h4 id="qvm-sync-appmenus">qvm-sync-appmenus</h4>
110-
<p>- <em>updates desktop file templates for given StandaloneVM or TemplateVM</em></p>
110+
<p>- <em>Updates desktop file templates for given StandaloneVM or TemplateVM</em></p>
111111
<p>usage: <code>qvm-sync-appmenus [options] &lt;vm-name&gt;</code></p>
112112
<p>---</p>
113113
<p><code>qvm-sync-appmenus archlinux-template</code> - <em>useful for custom .desktop files or distributions not using dnf</em></p>
114114
<h3 id="dom0">Dom0</h3>
115115
<h4 id="qubes-dom0-update">qubes-dom0-update</h4>
116-
<p>- <em>updates software in dom0</em></p>
117-
<p>usage: <code>qubes-dom0-update [--clean][--check-only][--gui] [&lt;yum opts&gt;][&lt;pkg list&gt;]</code></p>
116+
<p>- <em>Updates or installes software in dom0</em></p>
117+
<p>usage: <code>qubes-dom0-update [--enablerepo][--disablerepo][--clean][--check-only][--gui][--action=*][&lt;pkg list&gt;]</code></p>
118+
<p>or</p>
119+
<p>usage: <code>qubes-dom0-update</code></p>
118120
<p>---</p>
121+
<p><code>qubes-dom0-update --check-only</code> - <em>checks if new dom0 updates are available</em></p>
119122
<p><code>sudo qubes-dom0-update</code> - <em>updates dom0</em></p>
123+
<p><code>sudo qubes-dom0-update --gui</code> - <em>allows to update dom0 through a graphical window</em></p>
120124
<p><code>sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools</code> - <em>install the windows tools (QWT)</em></p>
121-
<p><code>sudo qubes-dom0-update kernel-3.19*</code> - <em>install the official Fedora kernel-3.19* with Xen support</em></p>
125+
<p>---</p>
126+
<p><code>sudo qubes-dom0-update --action=search &lt;search-term&gt;</code> - <em>searches for package in dom0 repositories</em></p>
127+
<p>example:</p>
128+
<p><code>sudo qubes-dom0-update --action=search qubes</code> - <em>searches for all <code>qubes</code> package in dom0 repositories</em></p>
129+
<p><em>NOTE: The tool excludes all templates (community and ITL) by default</em></p>
130+
<p>---</p>
131+
<p><code>sudo qubes-dom0-update --action=info &lt;package-name&gt;</code> - <em>displays infos about the package</em></p>
132+
<p>example:</p>
133+
<p><code>sudo qubes-dom0-update --action=info qubes-core-dom0</code> - <em>displays infos about the <code>qubes-core-dom0</code> package</em></p>
122134
<h4 id="qubes-hcl-report">qubes-hcl-report</h4>
123-
<p>- <em>generates a report about the system hardware information</em></p>
135+
<p>- <em>Generates a report about the system hardware information</em></p>
124136
<p>usage: <code>qubes-hcl-report [-s] [&lt;vm-name&gt;]</code></p>
125137
<p>---</p>
126138
<p><code>qubes-hcl-report</code> - <em>prints the hardware information on the console (terminal)</em></p>
@@ -129,7 +141,7 @@ <h4 id="qubes-hcl-report">qubes-hcl-report</h4>
129141
<p><code>qubes-hcl-report -s personal</code> - <em>sends the detailed hardware information report to the personal-vm</em></p>
130142
<p><strong>Note:</strong> <code>qubes-hcl-report -s [&lt;vm-name&gt;]</code> generates a more detailed report. This report can contain sensitive information. Please do not upload the report if you do not want to share those information.</p>
131143
<h4 id="virsh">virsh</h4>
132-
<p>- <em>management user tool for libvirt (hypervisor abstraction)</em></p>
144+
<p>- <em>Management user tool for libvirt (hypervisor abstraction)</em></p>
133145
<p>usage: <code>virsh -c xen:/// &lt;command&gt; [&lt;vm-name&gt;]</code></p>
134146
<p>---</p>
135147
<p><code>virsh -c xen:/// list</code> - <em>list running VM’s with additional information</em></p>
@@ -142,7 +154,7 @@ <h4 id="xl">xl</h4>
142154
<p><code>xl top</code> - <em>Monitor host and domains in realtime</em></p>
143155
<h3 id="domu">DomU</h3>
144156
<h4 id="qvm-copy-to-vm">qvm-copy-to-vm</h4>
145-
<p>- Copy file from one VM to another VM</p>
157+
<p>- <em>Copy file from one VM to another VM</em></p>
146158
<p>usage: <code>qvm-copy-to-vm &lt;vm-name&gt; &lt;file&gt; [&lt;file+&gt;]</code> - <em>file</em> can be a single file or a folder</p>
147159
<p>---</p>
148160
<p><code>qvm-copy-to-vm work Documents</code> - <em>copy the <code>Documents</code> folder to the work VM</em></p>
@@ -154,7 +166,7 @@ <h4 id="qvm-copy-to-vm">qvm-copy-to-vm</h4>
154166
<li>The command would be: <code>qvm-copy-to-vm work Documents</code></li>
155167
</ul>
156168
<h4 id="qvm-open-in-vm">qvm-open-in-vm</h4>
157-
<p>- Opens file in another VM</p>
169+
<p>- <em>Opens file in another VM</em></p>
158170
<p>usage: <code>qvm-open-in-vm &lt;vm-name&gt; &lt;file&gt;</code> - <em>file</em> can only be a single file</p>
159171
<p>---</p>
160172
<p><code>qvm-open-in-vm personal document.pdf</code> - <em>opens <code>document.pdf</code> in the personal VM</em></p>
@@ -165,10 +177,11 @@ <h4 id="list-qubes-commands">List Qubes commands</h4>
165177
<li>Enter in console:</li>
166178
<li><code>qvm-*</code></li>
167179
<li><code>qubes*</code></li>
168-
<li>Press two times <code>TAB</code></li>
180+
<li>Press 2x times <code>TAB</code></li>
169181
</ol>
170182
<p>Output: List of <code>qvm-*</code> or <code>qubes*</code> commands.</p>
171-
<h4 id="list-installed-qubes-packages">List installed qubes packages</h4>
183+
<h4 id="list-installed-qubes-os-packages">List installed Qubes OS packages</h4>
184+
<p>- <em>List all installed Qubes OS packages</em></p>
172185
<p><strong>Fedora Dom0</strong></p>
173186
<p>In VM or Dom0: <code>rpm -qa \*qubes-\*</code> - <em>list (qubes-) installed packages</em></p>
174187
<h3 id="filesfolders-from-and-to-dom0">Files/Folders from and to Dom0</h3>
@@ -214,12 +227,14 @@ <h3 id="copy-text-between-vm-a-and-b">Copy text between VM A and B</h3>
214227
</ol>
215228
<h3 id="troubleshoot">Troubleshoot</h3>
216229
<h4 id="application-in-vm-does-not-start">Application in VM does not start</h4>
230+
<p>- <em>How to get more information if applications in a VM refuse to start</em></p>
217231
<p><code>qvm-run personal &quot;command&quot; --pass-io</code> - <em>pass command directly to the VM. Returns an error message command fails.</em></p>
218232
<p><code>qvm-run personal &quot;xterm&quot; --pass-io</code> - <em>pass <code>xterm</code> command directly to the VM. Returns an error message or starts xterm.</em></p>
219233
<p>---</p>
220234
<p><code>qvm-run &lt;vmname&gt; &quot;command&quot; --pass-io --nogui</code> - <em>pass command to VM without using the GUI</em></p>
221235
<p><code>qvm-run personal &quot;ls&quot; --pass-io --nogui</code> - <em>pass <code>ls</code> command directly to the VM. Returns error or output.</em></p>
222236
<h4 id="console-in-vm">Console in VM</h4>
237+
<p>- <em>Attach a console to a VM</em></p>
223238
<p><code>virsh -c xen:/// console &lt;vmname&gt;</code> - <em>opens console in <code>&lt;vmname&gt;</code></em></p>
224239
<p>---</p>
225240
<p><em>Why? Connect if GUI/qrexec does not work for any reason. This way you can restart/investigate a failed service.</em></p>
@@ -230,7 +245,8 @@ <h4 id="console-in-vm">Console in VM</h4>
230245
<p><em>(and when #1130 would be implmented the same for “user”)</em></p>
231246
<p>---</p>
232247
<p>In console mode press <code>CTRL</code> + <code>^</code> + <code>]</code> on keyboard to escape from console mode.</p>
233-
<h4 id="domu-log-files">DomU Log files</h4>
248+
<h4 id="appvm-log-files">AppVM Log files</h4>
249+
<p>- <em>Log files in AppVMs</em></p>
234250
<p><code>/var/log/qubes</code> - <em>log file directory</em></p>
235251
<p>log files per DomU VM:</p>
236252
<ul>
@@ -240,28 +256,31 @@ <h4 id="domu-log-files">DomU Log files</h4>
240256
<li><code>qubesdb.&lt;vmname&gt;.log</code> - <em>qubesdb information</em></li>
241257
</ul>
242258
<h4 id="get-qubes-os-version">Get Qubes OS Version</h4>
259+
<p>- <em>Get the Qubes OS release version</em></p>
243260
<p><code>cat /etc/qubes-release</code> - <em>prints Qubes release in human readable form</em></p>
244261
<p><code>rpm -qa \*qubes-release\*</code> - <em>prints exact Qubes release number</em></p>
245262
<h4 id="get-xen-version">Get Xen Version</h4>
263+
<p>- <em>Display the Xen version</em></p>
246264
<p><code>xl info | grep xen_version</code> - <em>prints the Xen version</em></p>
247-
<h4 id="qubes-xen-boot">Qubes / Xen Boot</h4>
265+
<h4 id="qubes-os-xen-boot">Qubes OS / Xen Boot</h4>
266+
<p>- <em>Qubes OS and Xen system/kernel messages</em></p>
248267
<p><code>dmesg</code> - <em>prints error, warning and informational messages about device drivers and the kernel during the boot process as well as when we connect a hardware to the system on the fly.</em></p>
249268
<p><code>xl dmesg</code> - <em>prints error, warning and informational messages created during Xen’s boot process</em></p>
250-
<p>:!: <em>use <code>dmesg</code> and <code>xl dmesg</code> in combination with <code>less</code>, <code>cat</code>, <code>tail</code> or <code>head</code>.</em></p>
269+
<p><em>NOTE: use <code>dmesg</code> and <code>xl dmesg</code> in combination with <code>less</code>, <code>cat</code>, <code>tail</code> or <code>head</code>.</em></p>
251270
<h3 id="grow-disk">Grow disk</h3>
252271
<h4 id="qvm-grow-private">qvm-grow-private</h4>
253-
<p>- <em>increase private storage capacity of a specified VM</em></p>
272+
<p>- <em>Increase private storage capacity of a specified VM</em></p>
254273
<p>usage: <code>qvm-grow-private &lt;vm-name&gt; &lt;size&gt;</code></p>
255274
<p><strong>Example</strong></p>
256275
<ul>
257276
<li>In dom0 terminal: <code>qvm-grow-private personal 40GB</code></li>
258277
<li>In the personal VM: <code>sudo resize2fs /dev/xvdb</code></li>
259278
</ul>
260-
<h3 id="appvms-and-tmpfs">AppVMs and TMPFS</h3>
261-
<p>Enlarge /tmp if you run out of space on the default ~200MB</p>
279+
<h3 id="enlarge-appvms-tmpfs">Enlarge AppVMs TMPFS</h3>
280+
<p>Enlarge <code>/tmp</code> if you run out of space on the default ~200MB</p>
262281
<p><code>sudo mount -o remount,size=1024M /tmp</code> - <em>enlarge the space to 1024MB</em></p>
263282
<h3 id="inter-vm-networking">Inter VM Networking</h3>
264-
<p>- <em>Does not expose services to the outside world!</em></p>
283+
<p><em>NOTE: Does not expose services to the outside world!</em></p>
265284
<p>Make sure:</p>
266285
<ul>
267286
<li>Both VMs are connected to the same firewall VM</li>
@@ -290,7 +309,7 @@ <h3 id="inter-vm-networking">Inter VM Networking</h3>
290309
<p>for bidirectional access:</p>
291310
<pre><code># echo &quot;iptables -I FORWARD 2 -s 10.137.2.10 -d 10.137.2.11 -j ACCEPT&quot; &gt;&gt; /rw/config/qubes_firewall_user_script</code></pre>
292311
<h4 id="add-usb-wifi-card-to-sys-net-vm">Add USB Wifi card to sys-net VM</h4>
293-
<p>* - <em>attach a USB Wifi card to sys-net VM</em></p>
312+
<p>- <em>Attach a USB Wifi card to sys-net VM</em></p>
294313
<p>The bus and device number can be different than shown in this example:</p>
295314
<ol type="1">
296315
<li><code>qvm-pci -l sys-net</code> - <em>list all attached pci devices of sys-net</em></li>
@@ -303,6 +322,9 @@ <h4 id="add-usb-wifi-card-to-sys-net-vm">Add USB Wifi card to sys-net VM</h4>
303322
<h3 id="templates">Templates</h3>
304323
<h4 id="fedora">Fedora</h4>
305324
<p>- <em>Fedora template specific</em></p>
325+
<p><strong>Installing the Template</strong></p>
326+
<p><code>sudo qubes-dom0-update qubes-template-fedora-24</code> - <em>installs the fedora-24 template</em></p>
327+
<p><code>sudo qubes-dom0-update qubes-template-fedora-23</code> - <em>installs the fedora-23 template</em></p>
306328
<p><strong>Updating, Searching &amp; Installing Packages</strong></p>
307329
<p>Fedora &gt; 21</p>
308330
<ul>
@@ -322,14 +344,20 @@ <h4 id="fedora">Fedora</h4>
322344
<p><code>Start Menu &gt;&gt; Template:Fedora 21 &gt;&gt; Package Sources &gt;&gt; Enable RPMFusion</code> - ENABLE RPMFusion, (already covers RPMFusion signing keys)</p>
323345
<h4 id="fedora-minimal">Fedora Minimal</h4>
324346
<p>- <em>Fedora minimal template</em></p>
347+
<p>Qubes OS:</p>
348+
<p><code>sudo qubes-dom0-update qubes-template-fedora-24-minimal</code> - <em>installs the fedora-24-minimal template</em></p>
349+
<p><code>sudo qubes-dom0-update qubes-template-fedora-23-minimal</code> - <em>installs the fedora-23-minimal template</em></p>
325350
<p><code>sudo qubes-dom0-update qubes-template-fedora-21-minimal</code> - <em>installs the fedora-21-minimal template</em></p>
326351
<h4 id="debian">Debian</h4>
327-
<p>- <em>Debian templates</em></p>
352+
<p>- <em>Debian template</em></p>
328353
<p><strong>Installing the Template</strong></p>
329354
<ul>
330-
<li><code>sudo qubes-dom0-update qubes-template-debian-7</code> - <em>Debian 7 “Wheezy”</em></li>
331355
<li><code>sudo qubes-dom0-update qubes-template-debian-8</code> - <em>Debian 8 “Jessie”</em></li>
332356
</ul>
357+
<p>Only till Qubes OS 3.1:</p>
358+
<ul>
359+
<li><code>sudo qubes-dom0-update qubes-template-debian-7</code> - <em>Debian 7 “Wheezy”</em></li>
360+
</ul>
333361
<p><strong>Updating, Searching &amp; Installing Packages</strong></p>
334362
<ul>
335363
<li>installing packages: <code>apt-get install &lt;package-name&gt;</code></li>
@@ -341,16 +369,16 @@ <h4 id="debian">Debian</h4>
341369
</ol></li>
342370
</ul>
343371
<h4 id="qubes-os-whonix">Qubes OS + Whonix</h4>
344-
<p>- <em>Whonix is an debian based OS focused on anonymity, privacy and security</em></p>
345-
<p>Whonix has two parts:</p>
372+
<p>- <em>Whonix is an Debian based OS focused on anonymity, privacy and security</em></p>
373+
<p>Whonix consists of two components:</p>
346374
<ol type="1">
347375
<li>Whonix-Gateway (uses TOR for all connections to the outside world)</li>
348376
<li>Whonix-Workstation (for application)</li>
349377
</ol>
350378
<p><strong>Install Whonix</strong></p>
351-
<p>Whonix-Gateway TemplateVM Binary Install <span class="citation" data-cites="Dom0">@Dom0</span>:</p>
379+
<p>Whonix-Gateway TemplateVM Binary Install <code>@Dom0</code>:</p>
352380
<p><code>sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-gw-experimental</code></p>
353-
<p>Whonix-Workstation TemplateVM Binary Install <span class="citation" data-cites="Dom0">@Dom0</span>:</p>
381+
<p>Whonix-Workstation TemplateVM Binary Install <code>@Dom0</code>:</p>
354382
<ol type="1">
355383
<li><code>export UPDATES_MAX_BYTES=$[ 4 * 1024 ** 3 ]</code></li>
356384
<li><code>sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-ws</code></li>
@@ -364,8 +392,11 @@ <h4 id="qubes-os-whonix">Qubes OS + Whonix</h4>
364392
<li>Start Whonix-Workstation AppVM</li>
365393
</ol>
366394
<h4 id="archlinux">Archlinux</h4>
367-
<p>- <em>Archlinux</em></p>
395+
<p>- <em>Archlinux template</em></p>
368396
<p><strong>Installing the Template</strong></p>
397+
<p>In Qubes OS 3.2:</p>
398+
<p><code>sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-archlinux</code></p>
399+
<p>or manually</p>
369400
<p>Use the following instructions: <a href="https://www.qubes-os.org/doc/templates/archlinux/">Archlinux Template</a></p>
370401
<p><strong>Updating, Searching &amp; Installing Packages</strong></p>
371402
<ul>
@@ -383,5 +414,16 @@ <h3 id="create-vm-from-vmware-or-virtualbox-images">Create VM from VMware or Vir
383414
<li>VirtualBox: <code>qemu-img convert ReactOS.vdi -O raw reactos.img</code></li>
384415
</ul></li>
385416
</ol>
417+
<h3 id="qubes-os-directories">Qubes OS Directories</h3>
418+
<h4 id="dom0-qubes-os">Dom0 (Qubes OS)</h4>
419+
<p>- <em>Qubes OS specific directories</em></p>
420+
<ul>
421+
<li><code>/var/log/qubes</code> - <em>Qubes OS VM log files</em></li>
422+
<li><code>/var/lib/qubes</code> - <em>Qubes OS VMs and other Qubes OS specific files</em></li>
423+
</ul>
424+
<h3 id="qubes-os-repositories">Qubes OS Repositories</h3>
425+
<ul>
426+
<li><a href="http://yum.qubes-os.org" class="uri">http://yum.qubes-os.org</a> - <em>Browsable Fedora repositories</em></li>
427+
</ul>
386428
</body>
387429
</html>

0 commit comments

Comments
 (0)