On 04/04/2017 03:13 AM, Trammell Hudson wrote:
On Mon, Apr 03, 2017 at 11:21:14PM +, Rusty Bird wrote:
Did you try the "rd.luks.key=LUKSUUID=KEYFILE" workaround? IIRC, this
shouldn't trigger the buggy if branch.
I haven't tried that one, although I did build a patched version of
systemd
On 04/04/2017 06:42 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-04-04 08:35, Hack wrote:
How to enable security-testing repository? I did not find any
documentation on the website.
Hi,
Are there any plans to include the acpi-call kernel module [1] in the
upcoming R4 kernels ? It's required to set charging thresholds on
(relatively) newer Thinkpads, which seem to be used by many fellow Qubes
users and developers.
Except compiling/installing a custom kernel, the only
On 05/06/2018 05:20 AM, Manuel Amador (Rudd-O) wrote:
> On 2018-04-23 10:41, Ivan Mitev wrote:
>> Hi,
>>
>> In 4.0, when creating an AppVM based on a TemplateVM, is it expected
>> that none of the new VM's prefs are copied from the template VM ?
>>
>&g
On 05/22/2018 08:02 AM, Sven Semmler wrote:
> On 05/02/2018 09:22 AM, Ivan Mitev wrote:
>> I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could
>> be used for more than one time, until the service call ends (eg. the
>> browser is closed by the us
Hi,
I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could be
used for more than one time, until the service call ends (eg. the
browser is closed by the user). The idea is to save resources/time and
allow several consecutive links to be opened in the *same* dispVM until
the user
On 05/02/2018 06:29 PM, Marek Marczykowski-Górecki wrote:
> On Wed, May 02, 2018 at 05:22:55PM +0300, Ivan Mitev wrote:
>> Hi,
>
>> I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could be
>> used for more than one time, until the service call
On 05/02/2018 09:25 PM, Ivan Mitev wrote:
>
> On 05/02/2018 06:29 PM, Marek Marczykowski-Górecki wrote:
>> On Wed, May 02, 2018 at 05:22:55PM +0300, Ivan Mitev wrote:
>>> Hi,
>>
>>> I'm trying to implement "semi-persistent" dispVMs (in 4.0) that c
On 01/25/18 13:27, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jan 25, 2018 at 01:05:04PM +0200, Ivan Mitev wrote:
Hi,
IIRC in R3.2 VMs were started at boot time according to their dependency on
other VMs. Eg. - for a basic setup without whonix
Hi,
IIRC in R3.2 VMs were started at boot time according to their dependency
on other VMs. Eg. - for a basic setup without whonix/tor/... - sys-net
would start first, then sys-firewall, and then other VMs configured to
start at boot time (in my case sys-usb, untrusted and work).
In R4.0
It's been a while since the last update on the status of donations and
IMHO there should be more regular updates on Qubes' financial status:
- people who have never thought about donating may then consider doing so.
- it would also serve as a reminder for people who have already donated
On 01/27/18 13:33, Sebastian Götte wrote:
On 01/22/2018 08:33 AM, Peter Todd wrote:
Note that flash drives with physical write protect switches are available, such
as the Kanguru FlashBlu30 line.
While better than a regular r/w USB drive, I would not actually trust these.
There's only going
Hi Andrew,
On 01/27/18 15:31, Andrew Clausen wrote:
Hi Ivan,
On 27 January 2018 at 12:57, Ivan Mitev <i...@maa.bz> wrote:
I don't see the benefit of using a DVD (we're talking about USB DVD
readers here) but maybe it's only me being thick...
If the machine used to copy or ch
On 01/28/18 02:16, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jan 25, 2018 at 02:21:35PM +0200, Ivan Mitev wrote:
On 01/25/18 13:27, Marek Marczykowski-Górecki wrote:
So, the question is why sys-net crashes. Take a look at
/var/log/xen/console
Also it seems like some functions "might (maybe)" work as intended, for example
I can copy files between VM's and Win7, on a Win7 that was installed on Qubes 3.2., but
backup restored on Qubes 4. Others seem like they can do this too. Also it seems it's a
common problem not to be internet in
On 02/04/18 19:26, Yuraeitha wrote:
On Sunday, February 4, 2018 at 6:00:15 PM UTC+1, Ivan Mitev wrote:
Also it seems like some functions "might (maybe)" work as intended, for example
I can copy files between VM's and Win7, on a Win7 that was installed on Qubes 3.2., but
backu
On 02/08/18 17:31, Yuraeitha wrote:
@Ivan
On Thursday, February 8, 2018 at 1:22:06 PM UTC+1, Ivan Mitev wrote:
- I think it's great if you post your guide for others to see :) You
can always leave a disclaimer, such as no code has not been audited in
this particular case, however
On 02/08/18 20:00, brendan.h...@gmail.com wrote:
On Thursday, February 8, 2018 at 11:50:23 AM UTC-5, Ivan Mitev wrote:
FYI I've just added a "Fresh install on R4" section. It's still a work
in progress though: I get a cryptic msg in guest-win7-dm.log file a bit
after the
On 02/08/18 00:18, Yuraeitha wrote:
@Ivan
On Monday, February 5, 2018 at 7:50:30 AM UTC+1, Ivan Mitev wrote:
On 02/04/18 19:26, Yuraeitha wrote:
On Sunday, February 4, 2018 at 6:00:15 PM UTC+1, Ivan Mitev wrote:
Also it seems like some functions "might (maybe)" work a
Hi Marek,
On 02/08/18 03:13, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Feb 07, 2018 at 02:18:59PM -0800, Yuraeitha wrote:
@Ivan
On Monday, February 5, 2018 at 7:50:30 AM UTC+1, Ivan Mitev wrote:
On 02/04/18 19:26, Yuraeitha wrote:
On Sunday
@ bowabos & awokd
On 02/09/18 20:19, bowa...@gmail.com wrote:
On Friday, 9 February 2018 18:10:24 UTC, awokd wrote:
On Fri, February 9, 2018 5:56 pm, Ivan Mitev wrote:
I saw on qubes-users that you're updating the official documentation,
that's great.
Not only me! Some of the docum
On 02/09/18 18:05, 'awokd' via qubes-devel wrote:
On Thu, February 8, 2018 4:50 pm, Ivan Mitev wrote:
IMHO a public wiki - official or not - should not replace the current
documentation: someone may add unsecure instructions (willingly or not)
and there will always be users who blindingly
On 02/11/18 06:36, joevio...@gmail.com wrote:
[No responses from qubes-users, trying here next!]
https://github.com/QubesOS/qubes-issues/issues/3558
In RC4.0... After suspend/resume
Any monitors that were inverted or rotated, will be black.
The mouse does move across the screen... but no
- I think it's great if you post your guide for others to see :) You
can always leave a disclaimer, such as no code has not been audited in
this particular case, however that it worked for a few of users who
tried it (it worked for me on my first try, more to come though). If
people have
On 01/23/18 16:05, 'Tom Zander' via qubes-devel wrote:
On Tuesday, 23 January 2018 05:56:05 CET Chris Laprise wrote:
But at some point the hardware will make or break us, and the
hardware we got now is Wintel; even Linux is an afterthought when you're
not looking at server components.
I'm
Hi,
Given that linux templates boot a kernel provided by qubes, what's the
rationale of having kernel packages installed in the default linux
templates ? Is it only to be able to run them as HVM ?
If yes, when using pv, can they be safely removed or is there something
else that depends on those
Thanks for the quick, informative answer !
On 04/20/2018 11:21 AM, Marek Marczykowski-Górecki wrote:
> On Fri, Apr 20, 2018 at 09:27:13AM +0300, Ivan Mitev wrote:
>> Hi,
>
>> Given that linux templates boot a kernel provided by qubes, what's the
>> rationale of having k
Hi,
In 4.0, when creating an AppVM based on a TemplateVM, is it expected
that none of the new VM's prefs are copied from the template VM ?
For instance: (test2 is a TemplateVM)
qvm-prefs test2 kernel -> ''
qvm-prefs test2 virt_mode -> 'hvm'
qvm-prefs test2 memory -> '2096'
qvm-create
On 12/11/18 5:20 PM, Steve Coleman wrote:
On 12/9/18 10:38 AM, Chris Laprise wrote:
'Sparsebak'
Fast Time Machine-like disk image backups for Qubes OS and Linux LVM.
I tested the new version this morning and had worked around a few issues
such as first trying to run from
On 12/10/18 7:57 PM, Chris Laprise wrote:
On 12/10/2018 05:23 AM, Ivan Mitev wrote:
That's really great work.
On 12/9/18 5:38 PM, Chris Laprise wrote:
Status - Alpha version
--
Can do full or incremental backups of Linux thin-provisioned LVM to
local dom0 or VM filesystems or via
On 12/11/18 8:46 PM, Chris Laprise wrote:
On 12/11/2018 11:19 AM, Ivan Mitev wrote:
On 12/11/18 5:20 PM, Steve Coleman wrote:
I was attempting to "send" all my VM's private sections to a drive
mounted on sys-usb, and I seem to have run into a problem with one
particular A
On 12/10/18 10:05 PM, daltong defourne wrote:
Hello!
I'm trying to exclude a service that is started by XDG-autostart from starting
up only on SOME app-VMs based on same template-VM (so deleting the .desktop
file from appvm completely is not an option)
After reading some comments on
On 12/16/18 4:59 PM, unman wrote:
On Sun, Dec 16, 2018 at 02:27:39PM +0200, Ivan Mitev wrote:
On 12/16/18 2:16 PM, unman wrote:
On Tue, Dec 11, 2018 at 08:54:45AM +0200, Ivan Mitev wrote:
On 12/10/18 10:05 PM, daltong defourne wrote:
Hello!
I'm trying to exclude a service
On 12/16/18 2:16 PM, unman wrote:
On Tue, Dec 11, 2018 at 08:54:45AM +0200, Ivan Mitev wrote:
On 12/10/18 10:05 PM, daltong defourne wrote:
Hello!
I'm trying to exclude a service that is started by XDG-autostart from starting
up only on SOME app-VMs based on same template-VM (so
That's really great work.
On 12/9/18 5:38 PM, Chris Laprise wrote:
Status - Alpha version
--
Can do full or incremental backups of Linux thin-provisioned LVM to
local dom0 or VM filesystems or via ssh, as well as simple volume
retrieval for restore and verify.
I'm not familiar with
I've seen some users written bash completion plugins for qvm-* commands.
We'd need to integrate one. For example this one:
https://groups.google.com/forum/#!msg/qubes-users/C1zUZGbVFok/l-akx0p1BQAJ
(or something based on it)
FWIW the following has been working for me without any problem
Hi,
On 1/12/19 2:43 PM, Achim Patzner wrote:
> Hi!
>
> Would it be possible to modify their environment to run them with
> smaller virtual screen size and scale their output on the way to their
> X window? A lot of things that need to run in a HVM is not necessarily
> able to scale very well (or
On Wednesday, 22 May 2019 01:03:44 UTC, qtpie wrote:
> Chris Laprise:
> > On 12/09/2018 10:38 AM, Chris Laprise wrote:
> >> 'Sparsebak'
> >>
> >> Fast Time Machine-like disk image backups for Qubes OS and Linux LVM.
> >>
> >
> > And of course, a link to the project :)
> >
> >
re- "Google "Season of Docs" -- deadline April 22"
[new post to avoid polluting the original one that is linked to in the
gsod web page.]
I thought about posting about GSoD back in January but in my opinion
making documentation easier to contribute should be a prerequisite to
finding cool topics
On 4/20/19 9:59 PM, Andrew David Wong wrote:
> On 20/04/2019 10.45 AM, Ivan Mitev wrote:
>> re- "Google "Season of Docs" -- deadline April 22"
>> [new post to avoid polluting the original one that is linked to in the
>> gsod web page.]
>
>>
40 matches
Mail list logo