Re: [qubes-users] Salt Orchestration, vol.2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Tue, Mar 17, 2020 at 11:46:51AM +, Michał "rysiek" Woźniak wrote: > Hey hey, Hej, rysiek! > I started diving more deeply into Salt on QubesOS, since now I have two > laptops > with very similar config. One thing I'd like to use is Salt Orchestrate > runner: > https://docs.saltstack.com/en/latest/topics/orchestrate/orchestrate_runner.html > > My use-case is: I need to enable networking on some templates (`dom0: > qvm.prefs`) to pull code on them (`I:qubes:type:template: git`), and then > disable networking on those templates. > > So basically, I need Salt's `require`, but working *across* minions. I don't think that's possible. In principle Qubes' salt integration is salt-ssh on steroids. Relevant qrexec: https://github.com/QubesOS/qubes-mgmt-salt/blob/master/qubes.SaltLinuxVM Launched from: https://github.com/QubesOS/qubes-mgmt-salt/blob/master/qubesctl https://github.com/QubesOS/qubes-mgmt-salt/blob/master/qubessalt/__init__.py > Seems like it's available on R4.0. Before I dive deep into trying to get it > into > a functioning state (ha!), has anyone played with it? And most importantly: > how > bad of an idea is it? It is bad. There are multiple ways for this to fail for some very unrelated reasons. My most-often encountered problem with salt is it sometimes fails to start the mgmt dispvm for memory fragmentation reasons. So if this was supported, the failure mode would be: enable network, do something, fail to disable network. Also remember that the error reporting is not that good, esp. for this case. > Yes, I know enabling networking in templates is a Bad Idea, that's why I only > want to do it temporarily and in a well-managed way. But yes, other ideas on > how > to get this code into the templates are obviously welcome too -- I considered > just putting it directly in my salt configs repo (that I then manually copy to > dom0:/srv/salt/), but why would I want code that is supposed to be only > running > on TemplateVMs in dom0 at all, right? If you need *code*, you could either just push it from dom0 (since that is where you have salt in the first place). Or, with git, you can try this: https://github.com/woju/qubes-app-split-git. - -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEaO0VFfpr0tEF6hYkv2vZMhA6I1EFAl5w8+4ACgkQv2vZMhA6 I1GtWg/8Ce1soJZVyuqkIamiCrb/VE1YcOLNolsHsKvyxervrFVkQ0Zo1KokI03h qTgJ0l4D6YGaSVBxJhEcPNN1lONkJ1vQkQmxWPtXMGLEpHPJYuBjDkKxHINjSRc6 mcga0xx/EqhECUgL8+Qkij6zcAyMxwiA4KxQzYetBZlPxDqjt9J9fD98sKIPFduA tkdM38zcSv/Y1XxkGzWbW34nn5FYjJsZF0Ki/68bjiAfcBFfWa43P1YxuebLAR/7 taEWgKolole96XSD2knegOEgLxJz4JudIiYh27kYjFt2gn5GGcsPE/kzJCwDKTXi RCzQ/r7IXNhLMVqfQVnSYIHM8vpHWt12cc8qy7BmZHgouV/Vftvw3aXj6IJEZK8v jgIU9mAuWhpue4tsLzHwDx/aHoHft56EkgSiqxCbPN6TuH+r0+/RbDLEdhLBglZj DI+OSgOdpeR177e+CjI6wrPEFGnsEFu6STirXb8WOIMKglbnokT2QIVr1089whIw mkFirRLB+3dKCTMenslFDJrpg2w2RLlcwo4k44TO3wEMh9OXhfoueOHiUDAg64KF dinXJjW5dbrZ1i8pSoCGJrSc1jisC4I3/D7a+n1wLdPvAmbO8Qcdki81vuEE6YrI 1IsxIz9k7yR9b7g/8zhiK/vkvl6xV/w3yhmMCDMczZ3RFymdiRs= =AWuf -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20200317155943.GA1254%40invisiblethingslab.com.
Re: [qubes-users] Re: 35c3 session: Introduction to Qubes OS
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, Dec 30, 2018 at 02:52:46AM -0800, max via qubes-users wrote: > torsdag den 27. december 2018 kl. 12.12.36 UTC-5 skrev Wojtek Porczyk: > > Hi qubes-users, > > > > During 35th Chaos Communication Congress in Leipzig we'll be organizing an > > introductory session to Qubes OS: > > > > https://events.ccc.de/congress/2018/wiki/index.php/Session:Introduction_to_Qubes_OS > > Was it recorded, so others can view it later? I cannot find it here: > https://media.ccc.de/c/35c3 ? AFAIK it wasn't. It was a „self-organised session”, so there was no camera manned by CCC staff, and no-one else would record since on the Congress the recording people is generally frowned upon by attendees and organisers alike. - -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEaO0VFfpr0tEF6hYkv2vZMhA6I1EFAlwv82wACgkQv2vZMhA6 I1GhBg/+LEz9VRbkDkWwvxtcPtJf+L9mqoABFVzEk6pSxPrlEQDsfRT6D4hUv7sk MXGSn/P4MYJjTmPKOby0fHE1WHLbnwSVQFEq/sHwffuhCJQ0cX+BVoQ8UpeC70T1 HThMbffQQ0n4N1spzKdxREqaTjZEju2CnSiY6LDmOlvdCrxKab0Wukq1JbO5qt7w C7VFmJaN46qmRmwQEoerqe6sZQfGt2IFB65aBLDQ1NlVve2iLrABMQJdL5gp0iTQ LIqkfZyi9aZGREb04gNRd89w47dhKPDIdZD9dKleSjgrOHxK9whoKw7KkS+KLa5q gpsL8w5Rrmt2hnrT+3Fw2MkMnmn2vkF4ttg9mM6M4lNi/Eu3KAydHi0kbFCaNfRP TA+12VY/dnb7rajwuUpX0aC+/ZgopqfigrRSLYB/yAZvdgxXAFmaNYVu2t/L3Y9p vjsw8f8nHXEWIEZrqoMOUhyfMc5v8kVhMs1POD07jc1rGFY2+EpPELxBDZ02c4iO ThFSa/X0WKE7jj++C0R/T3BbbvpNXIJy5lY/A+DEguObN1+mCikcOAxNemgAgHUA QKxl30tjL7fyk0V/RGZ8ajgxj+ZEDjZcoa01eD6W3QGUY50k28kSD8QC42nHNT9K zunpa0ASACQTDmDIgReDfgYNwKbP/HesfNg4TD3MbbILP8OvVII= =Es5C -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190104235938.7jmihfkxnwujzmgy%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] 35c3 session: Introduction to Qubes OS
Hi qubes-users, During 35th Chaos Communication Congress in Leipzig we'll be organizing an introductory session to Qubes OS: https://events.ccc.de/congress/2018/wiki/index.php/Session:Introduction_to_Qubes_OS If you're at the CCC, please come! -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20181227171228.44rsfvtfv3ncsf2m%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout. signature.asc Description: PGP signature
[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Feb 20, 2018 at 04:27:16PM +0100, Tom Zander wrote: > On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote: > > On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel > wrote: > > > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki > wrote: > > > > We've decided to deprecate the '$' character from qrexec-related > > > > usage. > > > > Instead, to denote special tokens, we will use the '@' character, > > > > which we believe is less likely to be interpreted in a special way > > > > by the relevant software. > > > > > > I would argue against the @ sign on account that it is a special > > > character in bash as well. > > > > > > I don't immediately see a way to exploit it, but why risk it? > > > > We absolutely need a special character that is not allowed in qube name to > > make the special tokens immediately obvious in policy. The process I used > > was to list available characters (POSIX Portable Character Set [1]) > [] > > If I missed something, could you please point out? I know shell just good > > enough to know that it's not possible to know every shell quirk. :) > > The thing you have to rememeber is that the escape character never needs to > be typed by the user. > In QRexec you are defining an API, applications like qvm-run are using that > API. What the user passes into qvm-run and what is actually sent to dom0 > does not have to be identical. > I guess you do the translation currently as well; '$' turns into '@' in your > new code. > > The consequence of this is that you don't have to limit yourself to the > posix list. > Using the portable characters set for a non-character simply isn't needed. > > So, knowing that your API is actually based on 8-bit characters and not 7 > bits which you are limiting yourself to, my suggestion is to take something > above 127 and below 256 as a special char. > Most fun one would be “ÿ” which is a normal character you can pass on a > shell script if you must, its actual byte-value is 0xFF Thank you for the suggestion, but I don't think it's correct. The character has to be input in at least two places: in /etc/qubes-rpc/policy as the second token (destination) on the line and as argument to qrexec-client[-vm] executable. Using any of the common editors, any language-specific keyboard layout, and any common encoding. Most people have UTF-8, or ISO-8859-*, but we don't exclude the possibility to have admin qube on Windows -- there was at least one serious attempt -- so this brings UTF-16 and Windows-125*. As and example, may I use ÿ character you provided: 1) You're right the codepoint is U+00FF, but UTF-8 encoding is actually "\xc3\xbf", so no, we cannot use it. 2) I don't have it on my keyboard. So anytime I have to input one of those characters, I search all the modifiers for the right one (ý? no. ŷ? neither. ỹ? my font has trouble with that, is that even a letter? ý? tried this one already...). I don't have real data, but I think most people don't even know where to start looking for this and in the optimistic case will end up sourcing it from gucharmap or equivalent. This is bad UX. Maybe there is a character outside portable charset that is portable and writable enough, but I don't know of any. I haven't thought there is hope enough to actually find one, so I didn't bother searching. That's why I've asked. Again, thanks for your review. I think it's helpful, because this change was made behind community's back (for obvious reasons), fast, and in very limited group of people. I wasn't sure if we didn't make some mistake, so the best what I could hope for was to explain myself and get ex post facto review, which you provided. - -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJajVQEAAoJEL9r2TIQOiNRpbUQAJjEEAk+rKZOrFjjMkG3WQem /KNCL9gfVt3T6/keBBuEwfX3XcOIiO/FBWNfcf6dxeBGGcMHHQn0pd4Ucj/HZw8b 0/s63gjXH+ru7m4x2VW/3uDI4igkic6UUYPVHDB0sQtbTvGGWsr5pPJxcx7JgbwX +mJmDgt7i/9Y3lAGEva5ex+q7WG4hJd8ArgnJGAVnp7MrTgIduHW1/2QufC6uvvE gRRc3gbZK5FkT5Yg38UumE4sNcmnV0Nvu3m+o/g/cBcEER7wO81XW6TKFj0Ok/Bg Ostsov9NwO3iGv0usSUvMKfw7Aac3VK9SsW0r5sxA/QFe9jVvasVnmvIrxTRwwL+ W+gP5piagxgphLhUcR6LwyEhRPWzb06iDaaztXnLXyInWFEGdei1ATmlQNI0Rmno pNh/QLQqS6YF+hAl8LxSkOj3tjcg7MTYl00y9Z6ePJRUDA84s1hlWT43agWNN4L3 SX55/UzTU8DlhcduL3WmY6DVIKKlfE2Q82VorkprY6i/u/d7fdCblYLOtatZh2JB OK1ZFOprRlAJodYQMUws7o8cDgY3LxfgKX45PC23DJG6o5CDM+WoqmUw72uxMFft jRE29
Re: [qubes-users] Admin API and secure of a client
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Aug 08, 2017 at 07:13:51AM -0700, Nicolas Mojon wrote: > My question may be stupid but how can I do that cause no package seems to > exist from repository Those packages (.rpm and .deb, respectively) are for now in current-testing repository. You have to change "enable=" to "1" in /etc/yum.repos.d/qubes* and/or uncomment relevant line in /etc/apt/sources.list.d/*qubes* . (Sorry I don't remember exact file names). https://www.qubes-os.org/doc/software-update-vm/ - -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJZidfUAAoJEL9r2TIQOiNRzIcQAIPn68b/f/UkuQ4ILYmAQUmX SaH5DtPfTlhiBh/U1l0kZPbEX7yN1LslmhSHAuroqohNoTPmRBuxtyZFNNCFQYQU Kguw5YIxEoW6cPfouoxQa+bOhTCpopxWONbnzSoQ0lBUeViAFXChgfRkfz4+sP/F r7rQFx5yd/J9eZ0hNk/fwQAYoWkcXshUk2Vc1zQR04V7ImAvnzYMLd8VHGp1qYoU haekTa/xIe+YVPplUY0XuDa8V32/1dM8Jh9FoqrUUr3J2xDPm8YzB3++OpmBLkTh do0gTQ2HU+gO4wwpBLJ5eZFcFH6lGtbgvp0JN2T+f53PceGndvWA+/P8XWkISqyB Bu88kT+s2IRUJ7+TTPwWK+k5Ms9rxELE2Lzdh832Jm+DyP+6WoORITr+4hvQDUxN aYyW8oVVQiEbV2kghfZ+ZfpG2eZTnYE4KPvilLzUGFvHfd8tQNMMx+2EwrWEBMCa /olK5nj2MdjYrJp8w/5MDhF9YVt8yGjapPq1yYQDJf96a83naxO3aIby71OY4/mT pniww0vcRyvatv4XJ+B/jjTMJbOzG/x2IAQnFemwCg/bBzCOXaqHAMA6+3qj0Ngw n0m/y4HoD8OQln5+652HMqvJwCeLC8g8d55mSKvzAc/DkE2pG3OmuXoK2ZI+IlYk 21HJf28n1uFP0j74+p4u =tcZm -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170808152508.GF20480%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Admin API and secure of a client
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Aug 08, 2017 at 05:23:19AM -0700, Nicolas Mojon wrote: > Bash: qvm-ls command not found Did you install the "qubes-core-admin-client" package? - -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJZiblCAAoJEL9r2TIQOiNRNm0QAKIoBUSuv61fkZzo8rlX7PLC wtWnMpm2iVQV0sDd6pqNexY+UcuSELMHCidgh28+IJyNktbhXojhoWQnn7Yy1I6j Q+Kq7SZpFHt7XTpq/+Vh4ltwY3b796VnuoYW4+6OQTMQmEk9Ma4+xyqW5Eby0SrE dL68oFUOiW/M9FfBy2xf0FD3/5bY9kETJtniyZBdUpsstQ3t4LBhZLxlN01uvzDE egyRH4VxlIi5V2NtlNj3bomRD81rqWqOUbAY2Sm/MtRZrRtVoNXAL7sxzcDQbadE /HCnZAlHzMsDwGG7ORTCZO6YMDbDwdMCQ9i/gPngSwDQf1A+lmnpGnYaWGkN31mP Ejdrq1QBwiJEawlTqst4pq5TCDDR57wc80aBmUP2I0MWNwovf1ZBWucj6lBMiAj4 kyUklWRwl0eXyQJiDCFGPHbN+f0BW5UrW6VUDRJHib9HUe5KdzyxRFosPQGDA2eR R+Ws2tgrhlbyKxVDscpZmzDP6OGg/hzYPhMAMfHkTF6ZIVdbAEc08RF5D9yT24nD OSWTs1XlquzjeNOEJaS8cTgz9vtwDhlqtNVcdpdjcAmlAr1PBRFUKal7UjBl1KmT XA1gDINVtSn/1ct7mdUqLGqA9z+IYj4lNSCXLsENGwFvc09JoFR13kMjb916fbm5 zlOV9pq2dLilS7nELn1x =bGwD -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170808131443.GE20480%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4.0 Alpha release date
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Apr 05, 2017 at 11:50:32AM -, ei...@mail2tor.com wrote: > If no, building Qubes 4.0 with Qubes-builer is a solution for daily use ? It is not ready to be used yet. As of release date, I can offer no comment. - -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJY5QuLAAoJEL9r2TIQOiNRVvYQALcEM6TGXPp29chCjf/lyw6N aJQuX4LcxpQjV3uyfa4YwkS1NymbSoujET4po/6/1KHAJDlAsjnwkcq5sSFqd2FL CSrr3s4+PFk6oL2gUiKZFZ/yMVx4XdktVzz4DAKIRNLapYdWqMAHmj2UDv49dgHj rd1gxBbJlqMwn4RpTDThGVvSyrI2VSNzZ2wFX2WZ89KGc1gtEmRJEtdTEZ3dXelV k4IGyV7AnyGZ7FVkUMpA7y1wbw43gngy1+fmS633sMa1oQaf7orHvhWdfR07Aucw Ga9ltD052EoJ/+EpyQlMiw/j9lAprGZvqmK0yMeoKN01fXVpfb7W/USeYs80RDFT 9RXMm+TP9ccGwbHyVfB555AUh7QLu02LqO0N3ysMx5kNDadBFXzrmEqfb2Jimkm6 SsI9Alzrt1NxXTgeAEPt5wyEe+IdPuXEqiHylp30kB+ZC5FcJpnOwEj075Zi4qWr yv+9L3cdac+3qFcgVVfvNqYYFutCbJ4fW9tP98W8flv3DJR+oqODzPQSvNv1xTzx TJJF5A7yEJnuhSbC2C9Cu639ZexA+Z133A4t6wFNZdJyq1sGL1UKQDL7TxxUL/KF w2yL4HDnPfx+6DqiaaPMAWxIxQSszpQLnHIWPDqnRjislYCDI8WZ4DPtsJpaq6IJ QZ12hqD7vx6XdZEWSc2U =3BKw -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170405152150.GF2826%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4 - Walk The Talk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Mar 08, 2017 at 11:18:51AM -0500, 'Sudoyum' via qubes-users wrote: > First of all I would like to congratulate the Qubes team and their very > pro-active User community on creating their highly regarded Qubes OS. > > As an IT professional working for a large multi-national, I have been > following, closely, the development of Qubes for some time, with the > ultimate intent of perhaps rolling out Qubes on an experimental basis within > our IT Department. > > As you'd expect, when we consider entering into a partnering relationships, > our primary considerations after costs are reliability and integrity - it is > imperative that all our partners "walk the talk". In other words, if new > software is planned to be released on a forthcoming date, that date must be > met. If problems exist they need to be discussed in an open and honest way > and if necessary revised dates agreed. > > I hope this short note explains what most professional Clients demand of > their Suppliers. Keep up the good work and do your best to give us > a reliable release date for Qubes 4. As an IT professional working for a large multi-national, you are very much welcome to send inquiries about any offered partnership (which would include agreement about deliverables and their deadlines) to bussin...@qubes-os.org. This way your enterprise needs will get proper attention. Until then, we work on "when it will be ready" schedule, in cooperation with our open and sometimes very honest community. - -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJYwDU0AAoJEL9r2TIQOiNRWw0P/13R4igDcmGLefXcQMeyhKZA 3YcfnXsNBeis2qI2RTbHgf4Sefmlm4uPysw8/zWD/4UGjYrgRsdk+RRDIG0rMGG0 YRMldMVh+BOVF5oRd526/+psbZLwxBWF8qghrX/m+COAuaPHb+NEZfSuNG3HWJSE GtnW7jupNEoyDS1XxIh0L6zbNNpwI4k7JPySi4TpNrNg/KDwpjz4oopQYkQtumLA LVehvvt57E0GbRZjFHyUTL+v/K/KjYrwy/9bbJJiltu+kvnnFoKohyAL6yDA5DlI dzA2+1f4hT2zzJZahc+ZUZ3DRxXuXIqrnEkavPd4gc3+j3MB0BKq+zBCURAuVqIT iNWET4Z8eq1cTbOarEYZozEKrBwuFg0LdHNC/GSqesTSp8qjBjjE+opNClPZwmZE 4iANkoIpYz7Wby3lio7pZs17GKc42QyivTpWboHf9MByw6aECnYsMFGqJ/ye6E8L jiiBj3Ca8RH6xa3SdkX6dliiUWZrUfj+KIyDDSTuAnGcQVbVpGKlaz+LLnHtVT8Y e+w6oXqE7ut3tcegjhpnTeoPH74O+8Y+kA7MCmxonXtFayHYRSV21NPQ29viBcZW CAatoEFDyaN8hDvusySLcmS8dHzICEGVBEoLzzMAtGaRu9trer9phc6r+wwPtqSp WVMpB4NFWzwV3ML5nqS+ =RJtW -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170308164541.GL29493%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Screen geometry for VMs
On Tue, Oct 04, 2016 at 10:29:16PM +0200, Alex wrote: > starting to buffer for ~1 minute after just 3 seconds of playback. This seems like poor Tor circuit. Isn't this firefox in a VM connected through sys-whonix? -- pozdrawiam / best regards _.-._ Wojtek Porczyk .-^' '^-. Invisible Things Lab |'-.-^-.-'| | | | | I do not fear computers,| '-.-' | I fear lack of them.'-._ : ,-' -- Isaac Asimov `^-^-_> -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161004205150.GW5213%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout. signature.asc Description: Digital signature