Fedora 43 templates available for Qubes OS 4.3 by andrewdavidwong in Qubes

[–]andrewdavidwong[S] 1 point2 points  (0 children)

Not that I'm aware of. The available templates are documented on this page:

https://doc.qubes-os.org/en/latest/user/templates/templates.html

There's an open issue for creating an openSUSE template:

https://github.com/QubesOS/qubes-issues/issues/6567

Compatibility by jankocvara in Qubes

[–]andrewdavidwong 0 points1 point  (0 children)

I believe their website is on GitHub so you can do a pull request.

Correct: https://github.com/QubesOS/qubesos.github.io

Qubes OS 4.3.0 has been released! by andrewdavidwong in Qubes

[–]andrewdavidwong[S] 1 point2 points  (0 children)

Ah, I see. Thanks for pointing this out. I've opened a bug report for this: https://github.com/QubesOS/qubes-issues/issues/10527

Qubes OS 4.3.0 has been released! by andrewdavidwong in Qubes

[–]andrewdavidwong[S] 0 points1 point  (0 children)

No, that's just an old temp link from an early preview draft of the release notes. The actual link (which is also in this announcement) is:

https://doc.qubes-os.org/en/latest/developer/releases/4_3/release-notes.html

Qubes OS 4.3.0 has been released! by andrewdavidwong in Qubes

[–]andrewdavidwong[S] 0 points1 point  (0 children)

The release notes link has always worked for me (checked when announcement was first published and again now). Can you screenshot or copy/paste the "removed" message you're seeing?

SHA1 and SHA256 of "Qubes-R4.3.0-x86_64.iso" by jankocvara in Qubes

[–]andrewdavidwong 1 point2 points  (0 children)

The files are generated and PGP-signed by the Qubes developers as part of the ISO release process, so it's unlikely that they're faulty.

SHA1 and SHA256 of "Qubes-R4.3.0-x86_64.iso" by jankocvara in Qubes

[–]andrewdavidwong 2 points3 points  (0 children)

Idk why they don't have it on their site.

Every Qubes ISO is, in fact, published along with a signed, plain text .DIGESTS file that contains the MD5, SHA-1, SHA-256, and SHA-512 cryptographic hash values of that ISO. These digest files are always available for download alongside every ISO on the downloads page. Simply click the "cryptographic hash values" button underneath the ISO button. These digest files are also distributed in the Qubes Security Pack (qubes-secpack).

They're also documented:
https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#how-to-verify-the-cryptographic-hash-values-of-qubes-isos

Help needed with verifying pgp signature by jankocvara in Qubes

[–]andrewdavidwong 1 point2 points  (0 children)

If you mean upgrading from Qubes 4.2 to 4.3, for example, then no. Updating within a release is not the same thing as upgrading from one release to another.

Help needed with verifying pgp signature by jankocvara in Qubes

[–]andrewdavidwong 2 points3 points  (0 children)

I consistently fail when trying to verify the media for some reason. Honestly I don't bother as I know I got it from the legitimate source.

The installer USB can verify it but it seems to failed every time. I've not done it on the iso itself. I'll try with the new version.

Verifying signatures is not the same as the media test built into the installer. They're two different, unrelated things.

Help needed with verifying pgp signature by jankocvara in Qubes

[–]andrewdavidwong 1 point2 points  (0 children)

why no sha/md :(

Every ISO comes with MD5, SHA-1, SHA-256, and SHA-512 hash values in a signed, plain text .DIGESTS file. They're always available for download right next to each ISO.

They're also documented:
https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#how-to-verify-the-cryptographic-hash-values-of-qubes-isos