| DistroWatch Weekly
|DistroWatch Weekly, Issue 697, 30 January 2017
Welcome to this year's 5th issue of DistroWatch Weekly!
There is usually a trade off to be made between convenience and security. Signing into a user account without a password is easy, but not at all secure while running every application in its own virtual machine is secure, but not at all convenient. This week we explore Subgraph OS, a project which attempts to juggle both security and convenience, providing its users with a friendly desktop environment with many powerful security features. In our Tips and Tricks column this week we look at the steps required to install Ubuntu Touch onto an Android phone and the resulting experience. Plus we discuss Arch Linux phasing out support for 32-bit computers, talk about the Budgie desktop using Qt for future development and Linux Mint updating its Debian Edition. We also share the releases of the past week and provide a list of the torrents we are seeding. In our Opinion Poll we talk about installing alternative ROMs on smart phones and we hope you will share your experiences, good or bad, in the comments section. This week we are pleased to announce we are hosting a new resource, simplified manual pages with straight forward examples detailing how to use command line programs. Plus we welcome the storage-focused OviOS Linux distribution and the web-focused CloudReady distribution to our database. We wish you all a fantastic week and happy reading!
Listen to the Podcast edition of this week's DistroWatch Weekly in OGG (65MB) and MP3 (42MB) formats.
|Feature Story (by Jesse Smith)
Subgraph OS 2016.12.30 Alpha
The Internet can seem a scary place, full of organizations monitoring our every on-line move and waves of attackers trying to gain access to our systems. A number of projects have been created with the aim of making Linux distributions safer and protecting our privacy. Tails, for example, routes Internet connections through the Tor anonymizing network to make it more difficult to track its users. The Qubes OS project isolates tasks, helping the user to essentially compartmentalize their applications and data.
Another Linux distribution which tries to protect the user and their files is Subgraph OS. The Subgraph distribution is based on Debian and includes several security features to keep the operating system locked down and our on-line browsing anonymous. The following excerpts from the Subgraph website give us a taste of the project's features:
Subgraph OS ships with a kernel hardened with Grsecurity, the best set of Linux kernel security enhancements available. Grsecurity includes PaX, a set of patches to make both the userland and the kernel more resistant to exploitation of memory corruption vulnerabilities.
* * * * *
Subgraph OS's application containment mechanism creates sandboxes around at-risk applications, such as the browser, e-mail client, PDF viewer, and IM client. The objective of this is to contain the impact of a successful attack against these applications, preventing compromise of the entire system. Each application within a container has a limited view of the host system and limited set of capabilities such as limiting access to the file system or the network.
* * * * *
Subgraph OS includes features to enforce application network policies such as Subgraph Metaproxy and the application firewall.
* * * * *
Metaproxy is configured to redirect outgoing connections to the Tor network based on a white-list of approved applications. Each application is automatically relayed through a proxy that will use a different Tor circuit.
* * * * *
The application firewall will restrict which applications can connect to the network based on the name of the application or the destination. Users will be prompted to set temporary or permanent policies as outgoing connections are made.
* * * * *
Subgraph OS users who install the operating system must have encrypted file systems. It is not optional in Subgraph OS.
Subgraph OS 2016.12.30 -- Running the Tor web browser
(full image size: 478kB, resolution: 1366x768 pixels)
Subgraph OS is available for 64-bit x86 computers exclusively. The ISO I downloaded for Subgraph was approximately 1.3GB in size. Booting from the Subgraph installation media brings up a menu asking us if we would like to start the distribution's live desktop mode, run a system installer or start a graphical installer.
I experimented with running Subgraph in a VirtualBox virtual machine first. When trying to launch the live mode in VirtualBox, the distribution displayed a graphical boot screen for a while, then switched to a text screen where I could watch status messages scroll by. The system eventually locked up, displaying a series of blinking messages which all read "Started Session # of user user."
I next tried to install Subgraph in VirtualBox. The distribution did install successfully, but once Subgraph was installed, trying to boot the distribution in VirtualBox resulted in the same issue with Subgraph displaying flashing text (this time the final, flickering boot message indicated Subgraph was trying to start the GNOME display manager) and failing to reach a login screen.
Subgraph OS 2016.12.30 -- Launching software from GNOME's Activities menu
(full image size: 433kB, resolution: 1366x768 pixels)
I then tried running Subgraph on a laptop computer. On the laptop, booting from the installation media and selecting the live environment loaded the GNOME desktop environment. The desktop was responsive and I noticed sound was muted by default. I found my wireless card was properly detected and everything seemed to be working well in the live environment so my next step was to install the distribution. There does not appear to be a way to launch the distribution's system installer from the live environment, but we can reboot and select the Install or Graphical Install options from the boot menu.
Subgraph uses the Debian system installer. I used the graphical installer which walks us through selecting our preferred language and our region. We can then confirm our computer's keyboard layout and create a password for our user account. Disk partitioning comes next, which is a little cumbersome. Subgraph offered to set itself up with a LVM volume by default, but I changed this and opted for install the distribution on a ext4 partition. Subgraph's packages are then installed on our hard drive and we are given the option of installing the GRUB boot loader. When the installer is finished, it automatically reboots the computer.
Subgraph's default desktop environment is GNOME 3.22. The desktop is mostly empty with a panel across the top of the display. The left side of the panel contains the Activities menu where we can launch applications and search for programs. Over on the right side of the panel is a system tray and user's menu. From the tray we can configure networking, manage the firewall, access system settings and logout.
On my laptop, Subgraph ran smoothly. The desktop was responsive, my hardware was properly detected, my screen was set to use its full resolution and the operating system was stable. The distribution, when logged into GNOME, used a modest 350MB of memory.
Subgraph OS 2016.12.30 -- Exploring options in the settings panel
(full image size: 187kB, resolution: 1366x768 pixels)
By default, Subgraph disabled GNOME's history logging and turned off location services. All network traffic, even to specific local network addresses, is routed through the Tor network. Using Tor to anonymize traffic means it is harder (though not impossible) for others to track us on-line, but it also means our network connection is slower. Websites tended to take anywhere from five to ten times longer to load when I was using Subgraph. Speaking of web browsing, Subgraph uses the Tor web browser which includes some nice security features and defaults to using DuckDuckGo as the primary search engine.
Subgraph ships with the Icedove e-mail client, which is a re-branded version of Thunderbird. Icedove's ability to auto-detect server configuration settings while create new e-mail accounts has been disabled to avoid leaking identifying information. This means we need to manually configure our e-mail account. The version of Icedove which ships with Subgraph features Enigmail, a tool which makes encrypting messages and reading encrypted messages straight forward. Enigmail will run automatically when we set up our first account and launches a wizard to help set up our encryption keys.
Subgraph OS 2016.12.30 -- Creating encryption keys with Enigmail
(full image size: 144kB, resolution: 1366x768 pixels)
Icedove is not the only application that has extra security features. The file manager has two additional features baked into it. The first scrubs selected files of identifying meta-data when we right-click on a document. I tested this function and it seemed to mostly work, but there was some remaining exif data left behind in images.
A second feature the file manager gives us the opportunity to share files with other people over the network using a service called OnionShare. When we right-click on a file and opt to share it, a window opens and gives us the chance to share the selected files over the Tor network. When we click a button OnionShare should provide us with a unique URL which we can then send to other people. Those people can then use the URL to download the files we share, at which point the OnionShare service stops sharing those files in order to prevent others from finding the link and downloading the data too. I tried using OnionShare on a few files, but the service was never able to supply me with a unique URL which meant I could not provide a link to my files to anyone else.
Another feature which I suspect will come in handy is the virtual keyboard. Having a virtual keyboard can be helpful if we either want to work with an on-screen keyboard on a touch screen or if we want to side-step equipment which could be logging our keystrokes.
Subgraph OS 2016.12.30 -- Using the on-screen keyboard
(full image size: 104kB, resolution: 1366x768 pixels)
I noticed printing services were not available in Subgraph. Selecting the printer module in the distribution's settings panel displays a message indicating the CUPS printer service is not available. We could install CUPS from the project's software repositories. Connecting to a local network printer probably will not work as our network traffic is redirected through Tor, but I have not tested this idea.
One feature of Subgraph I appreciated a lot was the firewall. When we try to connect to the Internet using the Icedove e-mail client or the Tor web browser, the connection goes through as expected. But most other applications, when they try to connect to a remote server, cause a warning to be displayed on the desktop. Outgoing connections are blocked and we are given the chance to allow the application to talk to remote servers either just for the duration of our current session or permanently. I have encountered several people over the years who want an application-focused firewall on Linux with an easy to use GUI and Subgraph provides this service.
Subgraph OS 2016.12.30 -- Filtering network traffic from applications
(full image size: 120kB, resolution: 1366x768 pixels)
One final application I found intriguing was the Ricochet messaging service. Ricochet looks a bit like other instant messaging programs, like Pidgin. However, Ricochet provides users with an anonymous, randomly generated handle we can share with others. I did not get into using Ricochet to chat with others, but I like the concept of a semi-anonymous chat service with connections redirected through Tor.
Subgraph OS 2016.12.30 -- The Ricochet messaging application
(full image size: 109kB, resolution: 1366x768 pixels)
Apart from the applications mentioned previously, Subgraph ships with a fairly standard collection of GNOME software and the LibreOffice productivity suite. The distribution also includes systemd 232 and version 4.8.15 of the Linux kernel. Should we wish to install additional software we can use the package manager to draw in new packages from the Debian Stretch repositories. Some extra packages are provided by a custom Subgraph repository.
The Subgraph distribution is still in an alpha state and I think it is worth keeping that in mind when attempting to evaluate the project's usefulness. The distribution has a few rough edges, for example the OnionShare service did not work for me. I also had trouble running the distribution in a VirtualBox environment. However, apart from those issues, Subgraph worked well for me. The distribution played well with my laptop's hardware and the Tor network and web browser worked for me.
I think Subgraph ships with several interesting features that people will find useful. The application level firewall worked really well for me and I liked that I was able to allow or block outgoing connections as they happened. This dynamic, user friendly approach to managing the firewall was easy to use and I think it will appeal to people coming from a Windows background especially. I also liked the way Enigmail is integrated with Icedove and the extra functions built into the file manager.
I think what impressed me most about using Subgraph was that, apart from the reduced network performance, using the distribution was much the same as using mainstream Linux distributions which ship with the GNOME desktop. Running Subgraph feels approximately the same as using Debian or Fedora in the way things are arranged. The performance and ease of use are fairly similar too. Often times security-focused distributions are more difficult to use or put up barriers the user needs to work with or around. With Subgraph there are few hurdles, but some nicely integrated security features I think privacy-minded people will enjoy.
* * * * *
Hardware used in this review
My physical test equipment for this review was a de-branded HP laptop with the following
- Processor: Intel i3 2.5GHz CPU
- Display: Intel integrated video
- Storage: Western Digital 700GB hard drive
- Memory: 6GB of RAM
- Wired network device: Realtek RTL8101E/RTL8102E PCI Express Fast
- Wireless network device: Realtek RTL8188EE Wireless network card
|Miscellaneous News (by Jesse Smith)
Arch to phase out 32-bit, Solus to use Qt for Budgie development, Linux Mint testing updated LMDE media
Barttomiej Piotrowski has announced through the Arch Linux developer mailing list that the popular rolling release distribution will be phasing out support for computers running 32-bit CPUs. "Due to the decreasing popularity of i686 among the developers and the community, we have decided to phase out the support of this architecture. The decision means that February's ISO will be the last that allows to install 32-bit Arch Linux. The next 9 months are deprecation period, during which i686 will be still receiving upgraded packages. Starting from November 2017, packaging and repository tools will no longer require that from maintainers, effectively making i686 unsupported." The discussion can be found on the Arch Linux mailing list.
* * * * *
The Solus project, home of the Budgie desktop environment, is looking to make some significant changes to the technology underlying Budgie. The Budgie desktop is currently integrated with GNOME and GNOME's applications. However, as GNOME evolves the Budgie developers have had to adjust their software to match. Ikey Doherty explains: "Originally, Budgie intended to integrate with GNOME applications. What actually happened is that it then fully integrated into the GNOME stack. We got our integration, but at a heavy cost. Over time, as GNOME has evolved, every single major release of GNOME has caused issues for Budgie. This is from 3.10, when Budgie first began, all the way through to GNOME 3.22. Whether it's API or ABI changes, components eating other components (such as Mutter folding in cogl and clutter), many, many theme and widget breakages, GdkScreen APIs no longer functioning the same, or even segfaults caused due to the behaviour of GSettings relocatable schemas being changed.. You get the idea. Let it be known, this post is not designed to insult or belittle GNOME. The fact of the matter is, as a project, I have tremendous respect for GNOME. They have a vision and intend to see it through. Unfortunately, this has made it difficult for a project with the complexity of Budgie to then reuse those same components of GNOME." Looking ahead, the Budgie project will migrate to the Qt framework for future development. Qt is a popular toolkit for desktop development and is currently used by the KDE Plasma, Lumina and LXQt desktop environments.
* * * * *
The Linux Mint project maintains several editions of its distribution, most of them based on packages provided by Ubuntu. However, the Linux Mint team maintains a separate branch based on Debian Stable which is appropriately called Linux Mint Debian Edition (LMDE). Linux Mint Debian Edition, version 2, was released back in 2015 and is based on Debian 8 "Jessie". The Mint team is working on updated installation media for LMDE 2 to make installing and updating new copies of the distribution easier. The new media, labelled LMDE 2-Beta, is not a new version of the Debian-based operating system, but presents users with installation media that has been updated with available security fixes. "LMDE 2 received many updates in the last two years, including many improvements which were ported from Linux Mint as well as all the new versions of MATE, Cinnamon and the Xapps. This release provides a new set of installation images for LMDE 2 which includes all these updates." People who are already running LMDE 2 can get the same security updates through their package manager.
* * * * *
These and other news stories can be found on our Headlines page.
|Tips and Tricks (by Jesse Smith)
Running Ubuntu Touch on an Android phone
Last year I got my hands on an Ubuntu phone, specifically a Meizu Pro 5, and spent a few weeks with the device to see how the Ubuntu Touch operating system compared to other mobile platforms, particularly Android. Following my review and follow-up Questions and Answers column, I alternated between using the Ubuntu phone and my Android phone. I liked the design of the Ubuntu Touch operating system with its quick messaging replies, informative scopes and lack of advertisements. On the other hand, the Ubuntu device would occasionally wake up and vibrate in the night and I experienced some connection problems with mobile networks. I reported these issues to the developers and, about once or twice a month, I'd switch phones to keep up to date with developments.
By late 2016 the Ubuntu developers had fixed the issues I was experiencing with the Pro 5. Meanwhile I was becoming increasingly frustrated whenever I used the Android Moto G phone. The regular nag screens, advertisements and pop-ups asking me to update components made the platform more cluttered and distracting than I would have liked. I found myself regarding the Android device as something that made my mobile experience more complicated while the Ubuntu device was making my life easier. As a result, for the past two months I have been using the Ubuntu phone exclusively.
At this point I have grown to like using the Ubuntu phone and other people who have seen it in action usually express an interest in the device, but there is a big barrier to people getting their hands on an Ubuntu phone: no one is currently selling them. There is some good news though, it is possible to take some existing Android phones and install Ubuntu on them, much the same way many of us purchase a laptop bundled with Windows and install our preferred Linux distribution on it. One project which strives to make installing Ubuntu on mobile devices a better experience is UBports. The UBports project works to get Ubuntu running on phones and provides install images and instructions for getting Ubuntu running on a small number of Android devices. I decided to explore the process, see what steps are involved and how well the UBports software works.
I purchased a Nexus 5, one of the three devices currently listed as supported on the UBports website. The Nexus 5 was second-hand and arrived in the mail with a rubber bumper and about 60% battery charge. No USB cable or charger was included.
The Nexus 5 arrived in its factory reset state, running Android 6.0.1. I used the phone with its default Android operating system for a while to establish a base-line for how well the phone worked. For the most part, the Nexus 5 performed well. It ran smoothly and all its functions worked. The battery drained a little quicker than I'm used to, but not too badly. The one unwelcome quirk was that it sometimes took four or five taps on the power button to get the phone to start once it had been powered off. The power button would activate the screen when the phone was sleeping on the first try and the power button issue only seemed to manifest on cold boots. Not a big problem for me as I rarely turn off phones, but the power button was a minor annoyance.
Android 6.0 -- The Settings screen
(full image size: 95kB, resolution: 1080x1920 pixels)
Using the Nexus 5 with Android quickly reminded me why I planned to wipe the phone and install a different operating system. Between the initial set up and launching three applications, the device showed me six nag screens to sign up for services or provide my e-mail address, plus a notification asking me to install software updates. I was eager to get started with my experiment.
UBports provides brief installation instructions and an install image for the Nexus 5. The code name for the install image is Hammerhead. The project indicates the functions of the Nexus 5 should all work, with the exception of Bluetooth.
The installation instructions can be performed from any computer running a recent version of Ubuntu Desktop or one of its derivatives, such as Ubuntu MATE or Linux Mint. The install steps can be performed from either an installed copy of the operating system or a live medium. This means if we have Ubuntu 16.04 on a USB thumb drive, we can use it to install Ubuntu Touch on a phone.
The installation steps on the UBports website make a few assumptions and I want to address those. For example, the UBports documentation assumes our desktop operating system is a modern derivative of Ubuntu and has the Universe repository enabled. The tools we install require the Universe repository to be activated, which can be handled in Ubuntu's Software & Updates application. The UBports documentation also assumes we have already unlocked our phone. If you have not done this ahead of time, the installation of Ubuntu Touch will fail. I will cover these extra steps below.
To recap, we need the following to install Ubuntu on the Nexus 5 (or similar phone):
The first thing we need to do is unlock the phone. On the Nexus 5, this can be done by booting the phone into its Android operating system. Then go into the Settings panel and scroll down to the bottom entry, About Phone. On the About Phone settings page, near the bottom, is an entry labelled Build Number. Tap the Build Number label six times, this will enable Developer Options. Go back a page to the main Settings screen. There will be a new entry called Developer Options. Go into Developer Options and turn on the USB Debugging switch.
- A computer running Ubuntu 16.04 (or newer). We can also use a derivative of Ubuntu and the desktop operating system can be running from live media, it does not need to be installed on the hard drive.
- A USB cable to connect the phone to the computer.
- The phone, in my case a Nexus 5. The phone should have a full battery charge.
Next we switch over to the desktop computer. From the desktop environment, launch the Software & Updates application. Make sure the Universe repository is enabled and close the window. Next, open a virtual terminal and run the following two commands:
sudo apt-get update
The above commands will download approximately 49MB of packages and set up the necessary tools on your computer. Now, reboot the Nexus 5 and (as the device powers on) hold down the power button and the Volume Up and Volume Down buttons. (The UBports instructions mention the power button and Volume Up, but the Volume Down button must be held too.)
sudo apt-get install ubuntu-device-flash phablet-tools
This should cause the Nexus 5 to boot into fastboot mode. We will see a menu come up with boot options. Plug the phone into the computer, via the USB cable. Then run the following command from the computer's virtual terminal:
sudo fastboot oem unlock
The phone should now display a prompt asking if we want to unlock its boot loader. On the phone, press the Volume Up or Volume Down button to select "Yes". Then press the power button to confirm the action. The phone should now be unlocked. From here, we can run a single (though long) command to download a new installation image and copy it to the phone:
sudo ubuntu-device-flash --server=http://system-image.ubports.com touch --channel=ubuntu-touch/stable --device=hammerhead --bootstrap
The above command downloads the Nexus 5 image, called Hammerhead, copies the operating system to the phone and attempts to reboot the phone. If all goes well, the Ubuntu logo (or the UBports logo) should appear on the phone's screen, followed by a reboot. The process takes a few minutes and, if it is interrupted, the installation will fail. The first time I tried this process, something went wrong when files were copying to the phone and the ubuntu-device-flash command reported a problem pushing files to the device. Re-running the above command fixed the issue.
Ubuntu Touch -- Apps scope
(full image size: 302kB, resolution: 1080x1920 pixels)
After a few minutes, the phone will reboot and display the Ubuntu loading screen. The Ubuntu first run wizard will then appear on the phone and walk us through connecting to a wireless network, selecting our location and choosing our time zone. We are then shown the Ubuntu Apps scope and the Unity 8 desktop environment. Additional applications and scopes can be accessed through the App Store icon at the bottom of the screen and settings can be accessed via a drop-down panel at the top of the screen. Should we wish to install new software or check for package updates we will need an Ubuntu account.
The Nexus 5 was fairly responsive when running Ubuntu, offering similar performance to when it was running Android 6. The model I purchased has 16GB of internal storage and had 12GB of space left over after the installation was finished. The device offers about 1.8GB of RAM, 1GB of which was used by Ubuntu. These resource consumption numbers matched my experience running Ubuntu on the Meizu Pro 5.
Up to this point we have covered how to get Ubuntu Touch on an Android phone, but what works and what doesn't? The answer is a bit complicated because there are actually multiple branches of UBport's installation media. There are three development (Devel) branches, an RC branch and a Stable branch. What works and what does not will vary depending on which installation image we use.
When I tried running the Stable and RC branches, the phone properly connected to wireless networks, Bluetooth didn't work and (according to reports I read on UBport's forum) receiving phone calls will not work. The phone's settings panel, installing new applications and using scopes all worked. The camera worked and the device could detect and use its SIM card. I found that trying to launch the default web browser (or any other web browser I installed) would cause the browser to immediately crash. The inability to browse the web appears to be the result of a security feature working a little too well.
When I ran the various development branches, I found the web browser would work, but I was unable to connect to password protected wireless networks. Open networks could be accessed, but no encrypted wi-fi networks. When I ran the Stable branch the phone would not shut off completely and the screen would glow, slowly draining the battery. When running the Devel branches, the phone powered off all the way. Everything else appeared to work the some under both the Stable and Devel branches.
For people who want to try alternative images to the default, Stable image, change the name of the channel parameter in the ubuntu-device-flash command during the installation. So instead of
sudo ubuntu-device-flash --server=http://system-image.ubports.com touch --channel=ubuntu-touch/stable --device=hammerhead --bootstrap
sudo ubuntu-device-flash --server=http://system-image.ubports.com touch --channel=ubuntu-touch/devel_rc-proposed --device=hammerhead --bootstrap
Ubuntu Touch -- Settings panel
(full image size: 151kB, resolution: 1080x1920 pixels)
After playing with the various install images for the Nexus 5, I had to conclude the Ubuntu Touch port was not quite ready for daily use. Most of the desired functionality is present, but a few key pieces are missing. As the UBports website shows, the project has most of the features working. The phone suspends, the touch screen works, the device detects mobile and wi-fi networks. Screen rotation works as do the camera and GPS. These are all important features and it is good to see the small UBports team has made so much progress. Unfortunately, the phone's installation branches make the user decide between accessing protected wireless networks and being able to browse the web. And, with the older images at least, receiving calls appears to be an issue. Bluetooth capabilities are detected by the operating system, but not usable yet.
The work UBports has done is impressive, but right now the Nexus 5 port is only close to being usable on a day-to-day basis. Almost all the pieces are in place, but there are still a few key pieces missing, whichever installation channel we use. The port continues to progress and, hopefully, the final few rough edges will be polished in a few months.
The Nexus 5 is not the only port in the works. The Fairphone 2 and OnePlus One devices also have mostly working ports and it looks as though the Fairphone can already be used to make calls. (I contacted the Fairphone project and asked if I could test their device, but they did not have any phones to spare at the time and I could not find any to purchase.)
At this point I wouldn't recommend using UBports on a person's main phone, but if you have a spare device lying around and want to test Ubuntu on it, the project is making installing Ubuntu Touch fairly easy. The entire process of unlocking the phone and installing Ubuntu takes about 15 minutes. At the current rate of development, I think the UBports images may be complete enough to use on a primary mobile device later this year.
As for the Nexus 5 I was using, I'm considering putting a fresh install of Ubuntu Touch on the device and auctioning it off if there is any interest. Please leave a comment if the idea of having an experimental Ubuntu phone appeals to you.
* * * * *
Additional tips and tricks can be found in our Tips and Tricks archive.
|Released Last Week
The Amnesic Incognito Live System (Tails) distribution is a Debian-based project which focuses on security and anonymity. Tails includes tools for removing meta data from files and routes Internet traffic through the Tor anonymizing network. The project's latest release, Tails 2.10, now includes the OnionShare utility for sharing files from the user's computer over the Tor network. The Tor web browser now features a circuit viewer which will show the nodes a person's web traffic is routed through as it makes its way through the Tor network. Other changes include: "Upgrade Tor to 0.2.9.9. Upgrade Tor Browser to 6.5. Upgrade Linux to 4.8. This should improve the support for newer hardware (graphics, Wi-Fi, etc.) Upgrade Icedove to 45.6.0. Replace AdBlock Plus with uBlock Origin. Configure the APT package manage to use Debian's Onion services. Install the AMDGPU display driver. This should improve the support for newer AMD graphics adapters. Renamed the Boot Loader Menu entries from "Live" to "Tails", and replaced the confusing "failsafe" wording with "Troubleshooting Mode". Add support for exFAT. Remove Nyx (previously called arm). Rewrite Tor control port filter entirely. Now Tails can safely support OnionShare, the circuit view of Tor Browser, and similar. This also enabled Whonix to replace their own similar piece of software with this one." Further information and a list of known issues can be found in the project's release announcement.
Parsix GNU/Linux 8.15
Parsix GNU/Linux is a desktop distribution based on Debian's Stable branch. The Parsix project has released an update to their 8.x series, Parsix GNU/Linux 8.15r0. The new release features the GNOME 3.22.2 desktop environment and version 4.4.44 of the Linux kernel. The Parsix news page reads: We are proud to announce the final release of Parsix GNU/Linux 8.15 code name Nev. Parsix 8.15 ships with GNOME 3.22.2, an updated kernel based on Linux 4.4.44 and tons of updated and upgraded packages. It has been built on top of rock solid Debian Jessie (8.0) platform and all base packages have been synchronized with Debian Jessie repositories as of January 23, 2017." Addition information and key package versions can be found in the project's release notes.
Scientific Linux 7.3
Pat Riehecky has announced the release of Scientific Linux 7.3, a new version of the project's distribution built from the source packages for Red Hat Enterprise Linux (RHEL) and enhanced with scientific applications. The changes in this version include: "The 4.7 GB install disk for Scientific Linux 7 has been discontinued. We have retained the dual-layer install media. We have also produced an 'Everything' image which exceeds dual-layer sizes, but contains the entire tree. OpenAFS has been updated to version 1.6.20, the latest upstream stable. There is a new Scientific Linux End User License Agreement (EULA). The EULA now contains information about the U.S. Government contract under which Fermilab produces Scientific Linux. The Scientific Linux context plugin has been altered to be less aggressive in its use of network resources." See the release announcement and release notes for further details.
Linux Mint 18.1 "KDE", "Xfce"
The Linux Mint team has announced the availability of two new editions of Linux Mint 18.1. The two new editions, KDE and Xfce, feature Mint's X-Apps, desktop applications which are designed to look and act the same across multiple desktop environments. The update manager has been updated to make kernel updates more visible and installing additional language support has been improved: "The Language Settings checks are more exhaustive than before. In previous versions, full support for a particular language included its language packs and localized versions of popular applications such as Thunderbird and Firefox. This now includes a lot more packages such as dictionaries, help packages, fonts, and optional components which depend on the list of applications you installed." The Xfce edition ships with the Xfce 4.12 desktop environment while the KDE edition ships with KDE's Plasma 5.8 desktop. Further information, including system requirements, can be found in the project's release announcements (KDE, Xfce).
Linux Mint 18.1 -- Running the KDE Plasma desktop
(full image size: 774kB, resolution: 1280x1024 pixels)
Bodhi Linux 4.1.0
Jeff Hoogland has announced the availability of a new stable version of Bodhi Linux. The new version, Bodhi Linux 4.1.0, is an update to the project's 4.x.x series and is mostly a bug-fix release. "Today I am happy to announce the first scheduled update release of the Bodhi Linux 4 branch - Bodhi Linux 4.1.0. This release serves to package up the fixes for a few bugs that slipped through the cracks in the 4.0.0 release, as well as provided updated package sets for the install ISO images. Most notably these ISO images come with EFL 1.18.4, Linux Kernel 4.8, and a new Moksha Theme based on the 'Arc Dark' theme. Existing Bodhi 4.0.0 users already have the bug fixes incorporated into these ISO images, but they will need to manually install the newer kernel and theme if they wish to utilize them." Further details can be found in the project's release announcement. The Bodhi release is available in both 32-bit and 64-bit flavours, and it provides two specialist editions - "AppPack" with a large number of pre-installed applications and "Legacy" for older computers.
* * * * *
Development, unannounced and minor bug-fix releases
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found here. All torrents we make available here are also listed on the very useful Linux Tracker website. Thanks to Linux Tracker we are able to share the following torrent statistics.
Torrent Corner statistics:
- Total torrents seeded: 286
- Total data uploaded: 54.5TB
|Upcoming Releases and Announcements
Summary of expected upcoming releases
Running alternative phone operating systems
Many of us like to tinker with operating systems and are as likely to place an alternative operating system on our phone as we are to install a new distribution on our desktop computer. This week we would like to explore whether our readers install alternative or custom operating systems on their smart phones. If you do, please leave us a comment mentioning which operating systems you have installed on your mobile device.
You can see the results of our previous poll on running desktop applications remotely here. All previous poll results can be found in our poll archives.
Running alternative phone operating systems
|I stick with the default OS: ||1037 (67%)|
| I install an alternative OS on my main phone: ||312 (20%)|
| I install an alternative OS on a spare phone: ||199 (13%)|
Simplified manual pages
Most Linux distributions, along with flavours of BSD and Unix, ship with local manual pages, commonly called "man pages". These manual pages document the programs included with the operating system and list the functions and options supplied by each program. While manual pages are a very valuable resource, they often act better as quick references for people who already understand how a command works rather than an introduction to the available utilities. The documentation in manual pages is often technical and many manual pages do not include examples of how programs are to be used.
The TLDR team has put together a large collection of simplified manual pages. While many manual pages are dozens of pages long and feature complex explanations of a program's options, the TLDR documentation is brief and more accessible to newcomers. The TLDR versions of manual pages include a plain language explanation of each program along with a few examples of how a program is most commonly used.
DistroWatch now hosts these simplified manual pages (along with a handful of our own pages). We hope this will provide our readers with a quick and easy way to discover what a program does and how it is to be used. The collection of manual pages can be found in our Simplified Manual Pages section.
* * * * *
New distributions added to database
OviOS Linux is an independent, storage OS which combines open source technologies to provide a dedicated, performance-oriented storage system. The goal is to keep OviOS Linux a pure storage, appliance-like OS. It targets users and admins who need a stable out-of-the-box iSCSI, NFS, SMB and FTP server. The distribution features a special command line shell called "ovios shell" which strives to simplify system management.
CloudReady is an operating system built and maintained by Neverware. Based on Google’s open source Chromium OS, CloudReady uses web apps and cloud storage instead of traditional software and local storage. The CloudReady distribution is available in free and commercially supported versions.
CloudReady 54.1.25 -- Running the Chromium web browser
(full image size: 553kB, resolution: 1366x768 pixels)
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 6 February 2017. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip.
(Tips this week: 1, value: US$20.00)
|Linux Foundation Training
|• Issue 781 (2018-09-17): Linux Mint 3 "Debian Edition", file systems for SSDs, MX makes installing Flatpaks easier, Arch team answers questions, Mageia reaches EOL|
|• Issue 780 (2018-09-10): Netrunner 2018.08 Rolling, Fedora improves language support, how to customize Kali Linux, finding the right video drivers|
|• Issue 779 (2018-09-03): Redcore 1806, keeping ISO downloads safe from tampering, Lubuntu makes Calamares more flexible, Ubuntu improves GNOME performance|
|• Issue 778 (2018-08-27): GuixSD 0.15.0, ReactOS 0.4.9, Steam supports Windows games on Linux, Haiku plans for beta, merging disk partitions|
|• Issue 777 (2018-08-20): YunoHost 188.8.131.52, limiting process resource usage, converting file systems on Fedora, Debian turns 25, Lubuntu migrating to Wayland|
|• Issue 776 (2018-08-13): NomadBSD 1.1, Maximum storage limits on Linux, openSUSE extends life for 42.3, updates to the Librem 5 phone interface|
|• Issue 775 (2018-08-06): Secure-K OS 18.5, Linux is about choice, Korora tests community spin, elementary OS hires developer, ReactOS boots on Btrfs|
|• Issue 774 (2018-07-30): Ubuntu MATE & Ubuntu Budgie 18.04, upgrading software from source, Lubuntu shifts focus, NetBSD changes support policy|
|• Issue 773 (2018-07-23): Peppermint OS 9, types of security used by different projects, Mint reacts to bugs in core packages, Slackware turns 25|
|• Issue 772 (2018-07-16): Hyperbola GNU/Linux-libre 0.2.4, UBports running desktop applications, OpenBSD auto-joins wi-fi networks, boot environments and zedenv|
|• Issue 771 (2018-07-09): Linux Lite 4.0, checking CPUs for bugs, configuring GRUB, Mint upgrade instructions, SUSE acquired by EQT|
|• Issue 770 (2018-07-02): Linux Mint 19, Solus polishes desktop experience, MintBox Mini 2, changes to Fedora's installer|
|• Issue 769 (2018-06-25): BunsenLabs Helium, counting Ubuntu users, UBports upgrading to 16.04, Fedora CoreOS, FreeBSD turns 25|
|• Issue 768 (2018-06-18): Devuan 2.0.0, using pkgsrc to manage software, the NOVA filesystem, OpenBSD handles successful cron output|
|• Issue 767 (2018-06-11): Android-x86 7.1-r1, transferring files over OpenSSH with pipes, LFS with Debian package management, Haiku ports LibreOffice|
|• Issue 766 (2018-06-04): openSUSE 15, overview of file system links, Manjaro updates Pamac, ReactOS builds itself, Bodhi closes forums|
|• Issue 765 (2018-05-28): Pop!_OS 18.04, gathering system information, Haiku unifying ARM builds, Solus resumes control of Budgie|
|• Issue 764 (2018-05-21): DragonFly BSD 5.2.0, Tails works on persistent packages, Ubuntu plans new features, finding services affected by an update|
|• Issue 763 (2018-05-14): Fedora 28, Debian compatibility coming to Chrome OS, malware found in some Snaps, Debian's many flavours|
|• Issue 762 (2018-05-07): TrueOS 18.03, live upgrading Raspbian, Mint plans future releases, HardenedBSD to switch back to OpenSSL|
|• Issue 761 (2018-04-30): Ubuntu 18.04, accessing ZFS snapshots, UBports to run on Librem 5 phones, Slackware makes PulseAudio optional|
|• Issue 760 (2018-04-23): Chakra 2017.10, using systemd to hide files, Netrunner's ARM edition, Debian 10 roadmap, Microsoft develops Linux-based OS|
|• Issue 759 (2018-04-16): Neptune 5.0, building containers with Red Hat, antiX introduces Sid edition, fixing filenames on the command line|
|• Issue 758 (2018-04-09): Sortix 1.0, openSUSE's Transactional Updates, Fedora phasing out Python 2, locating portable packages|
|• Issue 757 (2018-04-02): Gatter Linux 0.8, the UNIX and Linux System Administration Handbook, Red Hat turns 25, super long term support kernels|
|• Issue 756 (2018-03-26): NuTyX 10.0, Neptune supplies Debian users with Plasma 5.12, SolydXK on a Raspberry Pi, SysV init development|
|• Issue 755 (2018-03-19): Learning with ArchMerge and Linux Academy, Librem 5 runs Plasma Mobile, Cinnamon gets performance boost|
|• Issue 754 (2018-03-12): Reviewing Sabayon and Antergos, the growing Linux kernel, BSDs getting CPU bug fixes, Manjaro builds for ARM devices|
|• Issue 753 (2018-03-05): Enso OS 0.2, KDE Plasma 5.12 features, MX Linux prepares new features, interview with MidnightBSD's founder|
|• Issue 752 (2018-02-26): OviOS 2.31, performing off-line upgrades, elementary OS's new installer, UBports gets test devices, Redcore team improves security|
|• Issue 751 (2018-02-19): DietPi 6.1, testing KDE's Plasma Mobile, Nitrux packages AppImage in default install, Solus experiments with Wayland|
|• Issue 750 (2018-02-12): Solus 3, getting Deb packages upstream to Debian, NetBSD security update, elementary OS explores AppCentre changes|
|• Issue 749 (2018-02-05): Freespire 3 and Linspire 7.0, misunderstandings about Wayland, Xorg and Mir, Korora slows release schedule, Red Hat purchases CoreOS|
|• Issue 748 (2018-01-29): siduction 2018.1.0, SolydXK 32-bit editions, building an Ubuntu robot, desktop-friendly Debian options|
|• Issue 747 (2018-01-22): Ubuntu MATE 17.10, recovering open files, creating a new distribution, KDE focusing on Wayland features|
|• Issue 746 (2018-01-15): deepin 15.5, openSUSE's YaST improvements, new Ubuntu 17.10 media, details on Spectre and Meltdown bugs|
|• Issue 745 (2018-01-08): GhostBSD 11.1, Linspire and Freespire return, wide-spread CPU bugs patched, adding AppImage launchers to the application menu|
|• Issue 744 (2018-01-01): MX Linux 17, Ubuntu pulls media over BIOS bug, PureOS gets endorsed by the FSF, openSUSE plays with kernel boot splash screens|
|• Issue 743 (2017-12-18): Daphile 17.09, tools for rescuing files, Fedora Modular Server delayed, Sparky adds ARM support, Slax to better support wireless networking|
|• Issue 742 (2017-12-11): heads 0.3.1, improvements coming to Tails, Void tutorials, Ubuntu phasing out Python 2, manipulating images from the command line|
|• Issue 741 (2017-12-04): Pop!_OS 17.10, openSUSE Tumbleweed snapshots, installing Q4OS on a Windows partition, using the at command|
|• Issue 740 (2017-11-27): Artix Linux, Unity spin of Ubuntu, Nitrux swaps Snaps for AppImage, getting better battery life on Linux|
|• Issue 739 (2017-11-20): Fedora 27, cross-distro software ports, Ubuntu on Samsung phones, Red Hat supports ARM, Parabola continues 32-bit support|
|• Issue 738 (2017-11-13): SparkyLinux 5.1, rumours about spyware, Slax considers init software, Arch drops 32-bit packages, overview of LineageOS|
|• Issue 737 (2017-11-06): BeeFree OS 18.1.2, quick tips to fix common problems, Slax returning, Solus plans MATE and software management improvements|
|• Issue 736 (2017-10-30): Ubuntu 17.10, "what if" security questions, Linux Mint to support Flatpak, NetBSD kernel memory protection|
|• Issue 735 (2017-10-23): ArchLabs Minimo, building software with Ravenports, WPA security patch, Parabola creates OpenRC spin|
|• Issue 734 (2017-10-16): Star 1.0.1, running the Linux-libre kernel, Ubuntu MATE experiments with snaps, Debian releases new install media, Purism reaches funding goal|
|• Issue 733 (2017-10-09): KaOS 2017.09, 32-bit prematurely obsoleted, Qubes security features, IPFire updates Apache|
|• Issue 732 (2017-10-02): ClonOS, reducing Snap package size, Ubuntu dropping 32-bit Desktop, partitioning disks for ZFS|
|• Issue 731 (2017-09-25): BackSlash Linux Olaf, W3C adding DRM to web standards, Wayland support arrives in Mir, Debian experimenting with AppArmor|
|• Issue 730 (2017-09-18): Mageia 6, running a completely free OS, HAMMER2 file system in DragonFly BSD's installer, Manjaro to ship pre-installed on laptops|
|• Full list of all issues|
|Random Distribution |
Asianux is a Linux server operating system which is co-developed by Chinese Leading Linux vendor Red Flag Software Co., Ltd. and Japanese Linux vendor Miracle Linux Cooperation, aiming at the common-standard enterprise Linux platform for Enterprise systems in Asia. It provides enterprise customers with high reliability, scalability, manageability and better hardware and software compatibility. Asianux certification partner program will invite more hardware and software products to be certified on Asianux, and it will definitely help to reduce developing and certificating resources and provide Linux with high quality and low cost. Red Flag Software and Miracle will distribute and market Asianux without any modifications in each Linux distribution package in China and Japan. New products will be based on Asianux and each will be bundled with localised features in each country.