Derivative repository (Kicksecure, Whonix) unexpectedly not enabled by default in Qubes-Whonix

I am having the exact reason the starter of this thread has had. I have resolved it by following the recommendations in this thread (-onion)

However I am not greatly concerned because from what I understand these repositories are supposed to be enabled by default so i have not been receiving updates. It should be investigated why that is since this is a default qubes os installation why out the box it has not been receiving full updates.

2 Likes

I agree with watermelon3. The whonix wiki Trust page Patrick linked says that the stable whonix apt repository is enabled by default for qubes-whonix. However, as part of trying to debug this yesterday I redownloaded the whonix-workstation-17 template using qvm-template in dom0 and it wasn’t enabled there just as it was not enabled on the version of the template that installed with my fresh qubes 4.2. That seems like either that page is out of date or there’s been an oversight in the creation of these templates.

Edit to add some more info: the version of the gateway and workstation that I pulled from qvm-template yesterday and confirmed this on were 0:4.2.0-202412112157.

Also iirc when running $ systemcheck -v in the template whilst it does note that the derivative repository is not enabled, this is listed as “INFO” and colored green. If it is meant to be enabled by default, it should at least showing as a warning, imo.

1 Like

No such bug exists in newer Templates.

And will be spotted if there’s a regression in the future.

This is already implemented in newer versions.

(-v / --verbose option is unnecessary. This is always reported.)

1 Like