I downloaded another Win7_64bit.iso from another source, same problem.
>>Getting Stuck at a glowing windows logo Before windows even starts the
>>install process.
I found the Qubes VM directory dom0 /var/lib/qubes/vm-templates/
And confirmed when i delete the VM, that the VM is deleted from th
The article i read failed to mention it was close source...
Totally agree if thats the case.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr
Wow just been reading about Kaspersky OS.
Dam maybe this could be a new super hardened VM for Qubes..?
Apparently not even based on Linux tho, built from the ground up, 14 year
project.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
So using the VM manager i created a Win7 HVM (not a HVM template)
I copied over the Win7.iso to a the user directory in dom0
using "qvm-run --pass-io 'cat /path/to/file_in_src_domain' >
/path/to/file_name_in_dom0"
And ran "qvm-start win7 --cdrom=/home/myusername/Win7.iso"
=
First
Just pointing out that there documentation here needs updating to include
commands for fedora-24:
https://www.qubes-os.org/doc/templates/
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails f
I Really dislike Dolphin. Thumbnail previews dont even seem to work, and its
kinda annoying to use. I'd like to swap it out for something lite and simple
(like the fedora-23 file browser)
Just wanted to check thats not going to break anything?
Looking at the package removal list, i think it pro
It also raises the question,
Is there any benefit running a VPN-Proxy-VM through sys-firewall?
Or maybe save the overhead and just connect VPN-Proxy-VM directly to sys-Net?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from thi
On Thursday, 17 November 2016 10:33:28 UTC+10, Vít Šesták wrote:
> I've tried to replicate it in a DVM and it behaved according to my
> expectation:
>
> When running sudo apt remove imagemagick, it asks me for also removing some
> qubes-* packages. The reason is that those packages depend on Im
So im finally getting around to rebuilding the sys-firewall VM on a minimal
template. Put it off because i thought there would be a lot of scripting to
setup.
According to documentation, it doesnt need any extra packages.
https://www.qubes-os.org/doc/templates/fedora-minimal/
And when creating
On Wednesday, 16 November 2016 21:08:14 UTC+10, Unman wrote:
> On Wed, Nov 16, 2016 at 10:26:34AM +, Unman wrote:
> > On Tue, Nov 15, 2016 at 09:50:58PM -0800, Sec Tester wrote:
> > > So i wanted to uninstall that rubbish image editor "imagemagick"
> >
So i wanted to uninstall that rubbish image editor "imagemagick"
Ran: sudo apt-get remove imagemagick
VM crashed. Error in VM manager says "qrexec not connected"
Tried to restart, VM manager Error says "can not start qubes-guid"
Would prefer not to replace entire template if possible?
Cheers.
Concerning. Its not the same website is it? Remembering you by IP?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To po
A thought on security through obfuscation.
Right now in terminal is you type: "uname -r" we get the kernel version, which
has "qubes" in the name.
Straight away the attacker, knows he's dealing with a qubes VM. Could we not
name the kernels to match their original OS?
And following that same c
Could open up a vulnerability if not done carefully.
VM could use it to query and identify other VMs in existence on the system.
But if it required a dom0 authorization before checking & transferring, should
be ok.
--
You received this message because you are subscribed to the Google Groups
"
>
> Why not grsecurity/PaX? especially with Qubes 4 switching to HVM (or PVHv2 or
> whatever it's called now), it will apparently work fine.
Nice suggestion. I would certainly welcome its implementation.
Actually looks like there were successful efforts to implement this back in
2013.
https:
I guess the main benefit to having VPN on router is it takes that overhead off
the PCs CPU & memory.
But the paper is right, a lot of network hardware is backdoored. Especially the
cisco stuff. And im suspicious of the Chinese stuff too.
We should endeavor to run open source routers. But im not
you want to copy the file from your work VM to the fedora-23 template and then
install all with terminal?
1)open terminal in your workVM
2)ls (useful to lists directories/files)
3)cd Downloads (or where ever you saved it)
4)qvm-copy-to-vm "DestinationVM" filename
https://www.qubes-os.org/doc/vm-
> Yes, it is also available - as noted in the message.
And i read too quickly, doh :o)
Look forward to taking 24 for a spin.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send
> > This might add significant time to the install, but could be a tick box
> > option, with a note about extra time.
>
> I think a better practice along these lines is to supply the additional
> packages needed to create a desktop-friendly template... alongside the
> minimal template. This wo
NICE!!
Any specific improvements or fixes running Fedora-24?
I noticed F-23 seemed to have trouble playing flash videos for me.
F-24 Min template coming?
A Deb-8 min template would also be nice :)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group
Nice question. I would also like to know.
Have you setup a Win7 HVM?
This maybe be the best place to try setup Genymotion.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
Hi Marek,
>On Sunday, 13 November 2016 03:33:50 UTC+10, Marek Marczykowski-Górecki wrote:
> > They have basically said, Elite hackers can gain root, so lets just not
> > even bother with this foundational layer of security.
>
> The point is _if_ someone is able to run arbitrary code as user, he
maybe it needs to be made exacutable..
from the directory of file in terminal
sudo chmod +x /the/directory/of/file/filename.sh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send
Just a suggestion.
In bios try differnt settings.
Maybe change hard drive from ahci to ide or legacy of vise versa.
In my bios i had to change from uefi before i could even get to the install
menu.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" gro
Im not sure about the kernel problem, maybe one of the Qubes team will have
advice on that, post the error log if you can find it.
One other small thing that you've probably tried.
sudo dnf upgrade
Good luck
--
You received this message because you are subscribed to the Google Groups
"qubes-
Some examples of Default Root access possibly being exploited in Qubes.
===
Looks like the DRAMA attack would require root access in VM, to compromises
Qubes shared memory
"taskset 0x2 sudo ./measure -p 0.7 -s 16."
https://groups.google.com/forum/#!topic/qubes-users/qAd8NxcJB3I
Your trying to modify the fedora-23 template correct?
Is sys-firewall specified as its net VM?
If not, set the fedora-23 template NetVM to sys-firewall.
Then try "sudo dnf install libreoffice"
Do your other app VM's have internet access?
If not.
Does sys-firewall have sys-net set as its "NetVM"?
> You might get more interest if you explained which features of the AirVPN GUI
> are worth having. The Github README is blank.
>
> I think most openvpn users are content to use the official client since it's
> simpler and better audited. The current fail-close solution has also been
> reviewed
Perhaps another reason why VM's shouldn't have default root access?
"taskset 0x2 sudo ./measure -p 0.7 -s 16."
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qu
On Saturday, 12 November 2016 06:39:50 UTC+10, Fred wrote:
> I made a change to the PCI devices for the sys-net VM and now Qubes
> hangs on boot when starting this vm.
>
> I've tried using the installation image to get to system rescue via the
> troubleshooting link in the installer. I can get in
So Im still new to Qubes, but after going through a bit of a learning curve,
building & customizing VM's to suit my security needs, I have a few thoughts on
its security.
Firstly I really love the direction Qubes has taken the future of operating
systems, and its has definitely become my OS of
try : sudo dnf install libreoffice
Here's how to copy paste between qubes os VM's;
CTRL + C
CTRL + Shift + C
then go to VM you want to copy to
CTRL + Shitf + v
CTRL + V
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
rVPN.
This is currently out of my ability. I would welcome collaboration on this
task. If i do eventually get something working, i will be sure to post it back
here
On Saturday, 12 November 2016 04:24:36 UTC+10, David Hobach wrote:
> On 11/10/2016 10:07 PM, Chris Laprise wrote:
>
> @Se
I have successfully applied the setup and scripting in
https://www.qubes-os.org/doc/vpn/
No more DNS leaks.
This means i can atleast use my vpn, until i find a way to make things work
with the AirVPN GUI.
--
You received this message because you are subscribed to the Google Groups
"qubes-use
After further testing, more specifically its a DNS IP leak with the AirVPN GUI
with network lock off.
I also leak DNS when running OpenVPN in the VPN-Proxy-VM,
Havent yet applied Qubes scripts to stop leaks.
--
You received this message because you are subscribed to the Google Groups
"qubes-u
Thank you Chris & David for the replies.
Unfortunately at this stage no one seems to know a solution. I will try out the
Qubes VPN guide, as i really need to use my vpn. But will miss the AirVPN GUI
features.
I hope in time i'll find a way to secure from leaks while still using the GUI.
Please
I've considered leaving network lock off, and building my own custom IP Tables,
or firewall rules to stop the leaks.
But this is currently beyond my skill set, so would need some hand holding to
learn what to do.
I have looked at the section here on the Qubes site on how to stop leaks using
sc
Hey Rudd-O,
Thanks for your effort and great contribution to the Qubes community. Not sure
why Chris was critical, especially without specifically showing evidence of any
problems. Maybe just a troll?
I haven't tried your program out yet, Im keeping it as my backup option, as im
still hoping
Thank you for the reply Unman.
You might be right about them never having internet access. Because dnf & yum
works, i think i assumed the internet work.
The reason i actually found this issues, was because i was ping testing, trying
to solve a problem i was having setting up a VPN ProxyVM.
(Se
Im trying to setup a VPN ProxyVM on Qubes R3.2
==
Here's what works:
==
Ive got AirVPN GUI setup and working on Fedora-23-minimal
My AppVM can proxy through VPN ProxyVM
whatismyip.com shows the VPN IP
Here's whats broken:
W
Hey Drew, Cheers for the reply.
It wasn't possible to 100% follow your instructions;
In "Global settings" it doesn't seem possible to set the default "netVM" to
"none". It only lists choices of netVM or ProxyVMs. I left it set to
"sys-firewall".
I followed the rest of your instructions. Delete
UPDATE:
I just ran qvm-revert-template-changes fedora-23
Unfortunately still not able to ping out to the internet from templateVM.
Could sys-firewall config be causing this? I havent even played with those
settings tho.
--
You received this message because you are subscribed to the Google Gro
42 matches
Mail list logo