'''1. Save Progress and Backup'''
On rare occasions
https://forums.whonix.org/t/whonix-xfce-for-virtualbox-users-ram-increase-required/8993
the machine might freeze during the upgrade process. In this case any materials already in progress might be lost, for example documents or other drafts that were created. If this is applicable, save the progress before installing operating system updates. If required, backup all user data -- it is ideal to have a copy of the VM(s) so it is possible to try again (if necessary).
'''2. Flatpak Update'''
This step is only required if the user previously manually installed any software using [[Install_Software#flatpak|flatpak]]. Can be skipped otherwise.
* [[{{Non_q_project_name_short}}|{{non_q_project_name_long}}]] {{CodeSelect|code=
flatpak update
}}
* [[Qubes|{{q_project_name_long}}]] Template: {{CodeSelect|code=
http_proxy=http://127.0.0.1:8082 https_proxy=http://127.0.0.1:8082 flatpak update
}}
'''3. Update the APT Package Lists'''
System package lists should be updated at least once per day In {{project_name_short}} ''and'' on the host. with the latest version information for new/updated packages that are available. To update [[{{project_name_gateway_short}}|{{project_name_gateway_long}}]] packages lists, run.
{{CodeSelect|code=
sudo apt update
}}
The output should be similar to this.
{{CodeSelect|code=
Hit:1 tor+https://deb.debian.org/debian {{Stable project version based on Debian codename}} InRelease
Hit:2 tor+https://deb.{{project_clearnet}} bullseye {{Stable project version based on Debian codename}}
Hit:3 tor+https://deb.debian.org/debian {{Stable project version based on Debian codename}}-updates InRelease
Hit:4 tor+https://fasttrack.debian.net/debian {{Stable project version based on Debian codename}}-fasttrack InRelease
Hit:5 tor+https://deb.debian.org/debian-security {{Stable project version based on Debian codename}}-security InRelease
Hit:6 tor+https://deb.debian.org/debian {{Stable project version based on Debian codename}}-backports InRelease
Reading package lists... Done
}}
If an error message like this appears:
{{CodeSelect|code=
W: Failed to fetch https://ftp.us.debian.org/debian/dist/{{Stable_project_version_based_on_Debian_codename}}/contrib/binary-amd64/Packages 404 Not Found
W: Failed to fetch https://ftp.us.debian.org/debian/dist/{{Stable_project_version_based_on_Debian_codename}}/non-free/binary-amd64/Packages 404 Not Found
E: Some index files failed to download. They have been ignored, or old ones used instead.
Err https://ftp.us.debian.org {{Stable_project_version_based_on_Debian_codename}} Release.gpg
Could not resolve 'ftp.us.debian.org'
Err https://deb.torproject.org {{Stable_project_version_based_on_Debian_codename}} Release.gpg
Could not resolve 'deb.torproject.org'
Err https://security.debian.org {{Stable_project_version_based_on_Debian_codename}}/updates Release.gpg
Could not resolve 'security.debian.org'
Reading package lists... Done
W: Failed to fetch https://security.debian.org/dists/{{Stable_project_version_based_on_Debian_codename}}/updates/Release.gpg Could not resolve 'security.debian.org'
W: Failed to fetch https://ftp.us.debian.org/debian/dists/{{Stable_project_version_based_on_Debian_codename}}/Release.gpg Could not resolve 'ftp.us.debian.org'
W: Failed to fetch https://deb.torproject.org/torproject.org/dists/{{Stable_project_version_based_on_Debian_codename}}/Release.gpg Could not resolve 'deb.torproject.org'
W: Some index files failed to download. They have been ignored, or old ones used instead.
}}
Or this.
{{CodeSelect|code=
500 Unable to connect
}}
Then something went wrong. It could be a temporary Tor exit relay or server failure that should resolve itself. Check if the network connection is functional by [[Arm|changing the Tor circuit]] and trying again. Running [[systemcheck]] might also help to diagnose the problem.
Sometimes a message like this will appear.
{{CodeSelect|code=
Could not resolve 'security.debian.org'
}}
It that case, it helps to run.
{{CodeSelect|code=
nslookup security.debian.org
}}
And then try again.
'''4. APT Upgrade'''
To install the newest versions of the current packages installed on the system, run.
{{CodeSelect|code=
sudo apt full-upgrade
}}
Please note that if the {{project_name_short}} APT Repository was disabled (see [[Project-APT-Repository#Disable_{{project_name_short}}_APT_Repository|Disable {{project_name_short}} APT Repository]]), then manual checks are required for new {{project_name_short}} releases and [[Dev/Build_Documentation|manual installation from source code]].
'''5. Never Install Unsigned Packages!'''
If a message like this appears.
{{CodeSelect|code=
WARNING: The following packages cannot be authenticated!
thunderbird
Install these packages without verification [y/N]?
}}
Then do not proceed! Press N
and
. Running apt update
again should fix the problem. If not, something is broken or it might be a [[Warning#Man-in-the-middle_Attacks|man-in-the-middle attack]], which is not that unlikely because updates are retrieved via Tor exit relays and some are malicious. [[Arm#Nyx_Usage|Changing the Tor circuit]] is recommended if this message appears.
{{Anchor|signature verification errors}}
{{Anchor|signature verification warnings}}
'''6. Signature Verification Warnings'''
No signature verification warnings should appear. If it does occur, it will look similar to the following.
W: A error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: https://deb.torproject.org stable Release: The following signatures were invalid: KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681
E: Release file for tor+http://deb.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion/dists/bullseye/InRelease has expired (invalid since 1 d 20 h 41 min 7 s). Updates for this depot are not applied.Caution is warranted even though APT will automatically ignore repositories with expired keys or signatures, and no upgrades will be received from that repository. Unless the issue is already known or documented, it should be reported for further investigation. There are two possible reasons for this occurrence. Either there is a problem with the repository that is unfixed by contributors or a [[Warning#Man-in-the-middle_Attacks|man-in-the-middle attack]] has taken place. Rollback or indefinite freeze attacks as defined by {{TUF}}. The latter is not a big issue, since no malicious packages are installed. It may also automatically resolve itself after a period of time when a different, non-malicious Tor exit relay is used, or following a [[Arm#Arm|manual change of the Tor circuit]].
y
, but any customized settings will be lost (these can be re-added afterwards).
Or {{project_name_short}} changes can be delayed, inspected, and then backported if the effort is worth it.
{{project_name_short}} uses package [https://packages.debian.org/{{Stable project version based on Debian codename}}/config-package-dev config-package-dev
] which assumes ownership of configuration files coming from “other distributions” (mostly Debian, although third party repositories might be added by users). ([[Dev/About_Debian_Packaging#config-package-dev|{{project_name_short}} on config-package-dev
]])
Conflicts like these should be rare if [[Configuration_Files|modular flexible .d
style configuration folders]] are used.
See also:
* [[Configuration_Files#Reset_Configuration_Files_to_Vendor_Default|Reset Configuration Files to Vendor Default]]
* [[Configuration Files]]
'''8.''' If APT reports packages that can be autoremoved, [[Debian_Packages|safely run APT autoremove]].
{{Anchor|Restart Services after Updating}}
'''9. Restart Services After Updating'''
To restart services after updating, either reboot.
{{CodeSelect|code=
sudo reboot
}}