I am fairly new to Qubes, but I have been able to get a up and running with alot of different qubes with this one exception.
Everytime I try to launch my windows VM from the dropdown menu in Qube Manager to launch the VM with Qubes Windows Tools it does not launch. So I tried launching it through the dom0 terminal with qvm-start and I get the error “losetup: /usr/lib/qubes/qubes-windows-tools.iso: failed to set up loop device: No such file or directory.”
Do I need to download the ISO, and if so where is it available for download?
I have tried “qubes-dom0-update qubes-windows-tools” and I get the same error in the dom0 terminal.
Note: Due to the security problems described in QSB-091, installation of Qubes Windows Tools is currently blocked. Instead, a text file containing a warning is displayed. Currently, it is difficult to estimate the severity of the risks posed by the sources of the Xen drivers used in QWT possibly being compromised, so it was decided not to offer direct QWT installation until this problem could be treated properly. While Windows qubes are, in Qubes, generally not regarded as being very trustworthy, a possible compromise of the Xen drivers used in Qubes Windows Tools might create a risk for Xen or dom0 and thus be dangerous for Qubes itself. If you understand this risk and are willing to take it, you can still install the previous versions of Qubes Windows Tools, using the command
sudo qubes-dom0-update qubes-windows-tools-4.1.68
for Qubes R4.1.2, or
sudo qubes-dom0-update qubes-windows-tools-4.1.69
for Qubes R4.2.0, respectively, instead of the command listed in step 1 of the installation described below. This will provide the .iso file to be presented as installation drive to the Windows qube in step 3 of the QWT installation.
If you prefer to download the corresponding .rpm files for manual QWT installation, these are still available from the repositories (version 4.1.68-1 for Qubes R4.1.2 and version 4.1.69-1 for Qubes R4.2.0).
Warning: These older versions of Qubes Windows Tools will be replaced during the next dom0 update by the current dummy version 4.1.70-1. This can be inhibited by appending the line exclude=qubes-windows-tools to the file /etc/dnf/dnf.conf in dom0. But this will also stop any further QWT updates - so be sure to remove this line when - hopefully - a new functional version 4.1.71-1 of Qubes Windows Tools will be made available!!!
A new set of drivers based on the current master branch
(9.0-unstable) and built on a trusted environment have been uploaded
on the same folder with the following hashes:
What version do you want? I have 9 different versions of the tools. I downloaded them ages ago and put them into my storage for use for whatever version I wanted instead of having to always configure things again and again.
I just attach the ISO as a BOOT TO DEVICE and it generally functions properly.
Otherwise I attach it as a device on booting via the CLI which the interface is supposed to do properly, but doesn’t do that functionality for some reason.
I still use the drivers, as there is no issue with anything that I’m doing on my Windows to worry about this “vulnerabilty”.
I posted earlier that I have 9 different versions, and asked what one you wanted, but noone wants them even though they are asking about them and wanting them?