-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/25/16 23:26, zxe...@gmail.com wrote:
>> Have you changed the devices assigned to sys-usb? If so, it's possible
>> you're running into a pci_strictreset issue here? Try running this in dom0
>> (but before you do, make sure you understand the r
I have the misfortune of having an employer who uses Microsoft Exchange. To
help with that I have installed Davmail. "DavMail is a
POP/IMAP/SMTP/Caldav/Carddav/LDAP exchange gateway allowing users to use any
mail/calendar client (e.g. Thunderbird with Lightning or Apple iCal) with an
Exchange s
> Have you changed the devices assigned to sys-usb? If so, it's possible you're
> running into a pci_strictreset issue here? Try running this in dom0 (but
> before you do, make sure you understand the risks [1]):
>
> $ qvm-prefs -s sys-usb pci_strictreset false
>
> Then try starting sys-usb aga
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/25/16 21:56, zxe...@gmail.com wrote:
> When I first installed Qubes (3.2), I could attach and detach block devices
> without errors and mount flash drives in VM's. I wanted to use my external
> keyboard with my laptop so followed the steps in
When I first installed Qubes (3.2), I could attach and detach block devices
without errors and mount flash drives in VM's. I wanted to use my external
keyboard with my laptop so followed the steps in the guide
(https://www.qubes-os.org/doc/usb/) for "Creating and Using a USB qube" (using
the ma
On Saturday, November 26, 2016 at 12:32:48 AM UTC-5, raah...@gmail.com wrote:
> On Saturday, November 26, 2016 at 12:08:03 AM UTC-5, jkitt wrote:
> > The point is that the security of a grsecurity protected system depends on
> > the userspace being compiled in a special way. The binaries need to b
On Saturday, November 26, 2016 at 12:08:03 AM UTC-5, jkitt wrote:
> The point is that the security of a grsecurity protected system depends on
> the userspace being compiled in a special way. The binaries need to be
> compiled with pie, and shared objects need to be compiled with pic. There are
The point is that the security of a grsecurity protected system depends on the
userspace being compiled in a special way. The binaries need to be compiled
with pie, and shared objects need to be compiled with pic. There are also some
other mitigations like SSP.
A grsecurity kernel on it's own i
It seems that Purism has failed to follow through on its promise to provide
open firmware (i.e coreboot) and overstated it's capability to provide a
completely free firmware (i.e. libreboot). As a result, they have left many
unhappy customers and/or prospective customers. I doubt that we will ev
Okay.
I guess solving these issues help with to accelerate learning curve.
Thanks again.
Vincent
Vincent "Kim" Elliott
ITC Consultant
Kingston, Jamaica
876-381-0661
On Fri, Nov 25, 2016 at 6:39 PM, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:
> -BEGIN PGP SIGNED ME
when I use gui, before it updates anything I have to select them all and then
hit apply. It doesn't do that for you guys?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Nov 26, 2016 at 12:37:23AM +, Duncan Guthrie wrote:
> Hej folks,
> I have installed Grub2 as my Coreboot payload, and now I want to boot Qubes
> from a USB drive.
> Since I haven't made any changes to Grub2's default config, I am trying
Hej folks,
I have installed Grub2 as my Coreboot payload, and now I want to boot Qubes
from a USB drive.
Since I haven't made any changes to Grub2's default config, I am trying to boot
Qubes from the command line Grub provides.
I do the following:
set root=(usb0)
linux /isolinux/vmlinuz
ini
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 25, 2016 at 11:59:26AM -0500, Vincent Elliott wrote:
> Marek,
>
> Thanks a mil.
>
> I doubled the size, restarted the VM and the interface came right up.
>
> I spent many days trying to find a fix... perhaps the default size should
> b
https://github.com/coldhakca/coldkernel/issues/35#issuecomment-262175541
https://www.coldhak.ca
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsub
On Friday, November 25, 2016 at 8:52:01 AM UTC-5, jkitt wrote:
> On Friday, 25 November 2016 11:38:21 UTC, raah...@gmail.com wrote:
> > can you just tell us the options so we can compile it ourselves? paste the
> > cfg or something.
>
> https://wiki.gentoo.org/wiki/Hardened/FAQ#Do_I_need_to_pas
On Friday, November 25, 2016 at 8:52:01 AM UTC-5, jkitt wrote:
> On Friday, 25 November 2016 11:38:21 UTC, raah...@gmail.com wrote:
> > can you just tell us the options so we can compile it ourselves? paste the
> > cfg or something.
>
> https://wiki.gentoo.org/wiki/Hardened/FAQ#Do_I_need_to_pas
W dniu czwartek, 24 listopada 2016 23:48:56 UTC+1 użytkownik Marek
Marczykowski-Górecki napisał:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Thu, Nov 24, 2016 at 11:08:33AM -0800, Grzesiek Chodzicki wrote:
> > W dniu czwartek, 24 listopada 2016 14:51:14 UTC+1 użytkownik Marek
> >
Marek,
Thanks a mil.
I doubled the size, restarted the VM and the interface came right up.
I spent many days trying to find a fix... perhaps the default size should
be doubled to accomodate any other noobs with the same hardware?
Vincent
Vincent "Kim" Elliott
ITC Consultant
Kingston, Jamaica
8
All the packets listed in the link are already installed on my template-vm.
Moreover, as I said, I didn't do a fresh install, I upgraded to f24 my
pre-existing f23 templates. It would be strange if some packets would go
missing after the upgrade!
Same thing for the fonts (the font problem affe
First of all, for the developers of Qubes reading this: **massive props**. Your
work is amazing, very much needed, and I appreciate it to the extreme. I cannot
help with development, but will do my best to help in other ways.
On to the topic: I'm new to Qubes -I've only been using it for the las
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 25, 2016 at 07:57:59AM -0800, Vincent Elliott wrote:
> On Thursday, 15 May 2014 01:27:56 UTC-5, inf...@gmail.com wrote:
> > On Monday, 12 May 2014 09:58:30 UTC+2, Marek Marczykowski-Górecki wrote:On
> > 12.05.2014 00:43, inf...@gmail.c
On Thursday, 15 May 2014 01:27:56 UTC-5, inf...@gmail.com wrote:
> On Monday, 12 May 2014 09:58:30 UTC+2, Marek Marczykowski-Górecki wrote:On
> 12.05.2014 00:43, inf...@gmail.com wrote:
>
> > On 12/05/14 00:38, Marek Marczykowski-Górecki wrote:
>
> >>
>
> >> ..
>
> >> Looks more like some mi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi! Just bought the Dell XPS 13 (9360) and installed Qubes. Most things work
but it won't wake after suspend. Keyboard lights up but the screen doesn't
wake. It is not possible to switch to tty (Ctrl+F2). How can I debug this on
Qubes? /David
-B
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/24/16 07:29, rspeiglv...@gmail.com wrote:
> * Finally, I am interested in the Purism Librem 13 laptop and noticed that it
> was supported for Qubes R3.x but not R4.x. Is this because of some hardware
> issues or because R4.x hasn't been relea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/24/16 02:35, Fabrizio Romano Genovese wrote:
> As the title says: I've cloned my fedora 23 templates and followed the
> procedure to upgrade them to fedora 24. Everything is splendid, the only two
> disappointing things are:
>
> a) Network m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/21/16 20:19, Patrick Schleizer wrote:
> Nautilus previews are still enabled unfortunately. TODO:
>
> https://github.com/QubesOS/qubes-issues/issues/1108
>
> Dolphin [and Nautilus] previews are disabled in Qubes-Whonix, but not in
> other Qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/21/16 13:21, Eva Star wrote:
> On 11/19/2016 03:42 PM, Andrew David Wong wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>
>>
>> You can use the qvm-trim-template tool to do this. For example:
>>
>> $ qvm-trim-template fedora-24
>>
>> https:/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/21/16 07:46, Me wrote:
> Do Qubes have any intention of following in the footsteps of TAILS as
> proposed below:
> [...]
This is a good idea. Tracking it here:
https://github.com/QubesOS/qubes-issues/issues/2459
- --
Andrew David Wong (Axon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/21/16 09:12, Loren Rogers wrote:
>
> On 11/19/2016 06:31 AM, Andrew David Wong wrote:
> On 2016-11-16 12:10, Loren Rogers wrote:
I can't seem to update dom0 using the regular updater. The system keeps
telling me there are updates fo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/21/16 07:11, 55qpno+2vc52qkc122uo via qubes-users wrote:
> Hi,
>
> After yesterday's upgrade my date/time panel on the XFCE panel appears with a
> white-ish background that makes almost impossible to verifying the current
> time/date.
> Is a
On Friday, November 25, 2016 at 1:36:42 PM UTC+1, Desobediente wrote:
> As for these checking algorithms, everything can be faked,
Not really pertinent to this discussion but PUFs:
https://en.wikipedia.org/wiki/Physical_unclonable_function
--
You received this message because you are subscribe
On Friday, 25 November 2016 11:38:21 UTC, raah...@gmail.com wrote:
> can you just tell us the options so we can compile it ourselves? paste the
> cfg or something.
https://wiki.gentoo.org/wiki/Hardened/FAQ#Do_I_need_to_pass_any_flags_to_LDFLAGS.2FCFLAGS_in_order_to_turn_on_hardened_building.3F
I found the "problem".
It seems that the code of the systemd script that detects virtualization
(systemd-detect-virt) has changed between fedora-23 and fedora-24.
The one in fedora-24 is confused by the fact I use QubesOS insed a KVM
VM and is not able to detect xen on top of the VM (it detects KVM
In the settings tab on the qubes manager you could passthrough almost
everything. For example, if you passthrough the video card, your screen
will black out.
As for these checking algorithms, everything can be faked, which implies
the very idea of checking the system is broken because you can run
You would need "GPU passthrough" and give the entire GPU to one VM. Some people
try; most fail. It's not supported and finicky.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, sen
On Friday, November 25, 2016 at 12:55:27 AM UTC+1, Drew White wrote:
> Is there any way that I can pass through all real hardware specifics to the
> guest to make it not think it's running under xen? (primarily Windows)
It depends on what exactly is used as input to creating this device identifie
On Tuesday, November 22, 2016 at 7:57:56 PM UTC+1, kev27 wrote:
> I saw this being retweeted by the Qubes account on Twitter. Can Grsec support
> still land in Qubes 4.0, or should we expect it for 4.1 or 4.2, etc?
>
> I think if Grsec would be enabled by default in Qubes, it would be no
> quest
On Friday, November 25, 2016 at 6:38:21 AM UTC-5, raah...@gmail.com wrote:
> On Wednesday, November 23, 2016 at 6:34:08 PM UTC-5, jkitt wrote:
> > On Tuesday, 22 November 2016 19:49:07 UTC, Ronald Duncan wrote:
> > > Will this be using the latest linux kernel since grsecurity only provide
> > > t
On Wednesday, November 23, 2016 at 6:34:08 PM UTC-5, jkitt wrote:
> On Tuesday, 22 November 2016 19:49:07 UTC, Ronald Duncan wrote:
> > Will this be using the latest linux kernel since grsecurity only provide
> > the latest version free.
>
> Yes, it will be an "unstable" kernel. A bare metal grs
you can install lm-sensors to dom0 and check temps while using the pc.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
T
On Thursday, November 24, 2016 at 3:11:15 PM UTC-5, Loren Rogers wrote:
> On 11/24/2016 01:39 PM, Loren Rogers wrote:
> >
> >
> > On 11/24/2016 03:57 AM, Pawel Debski wrote:
> >> W dniu środa, 23 listopada 2016 00:34:09 UTC+1 użytkownik Drew White
> >> napisał:
> >>> On Tuesday, 22 November 2016 1
On Monday, November 21, 2016 at 2:04:43 PM UTC-5, Loren Rogers wrote:
> On 11/21/2016 11:04 AM, Loren Rogers wrote:
> >
> > On 11/21/2016 12:42 AM, Drew White wrote:
> >> On Sunday, 20 November 2016 04:56:03 UTC+11, Loren Rogers wrote:
> >>> Another correlation I've noticed is that my machine rand
On Thursday, November 24, 2016 at 6:55:27 PM UTC-5, Drew White wrote:
> Is there any way that I can pass through all real hardware specifics to the
> guest to make it not think it's running under xen? (primarily Windows)
what? lol
--
You received this message because you are subscribed to the G
À 25.11.2016 04:36, Jean-Philippe Ouellet a écrit:
On Thu, Nov 24, 2016 at 8:12 PM, Duncan Guthrie
wrote:
And of course Coreboot is fast and fun.
I love your description of BIOS work as "fun" ;)
In my experience, getting things working has been anything but! xD
I like customising things, s
I suspect that the script vif-route-qubes is not called at all?
What triggers this script? Where is it configured?
On 11/24/2016 04:09 PM, Opal Raava wrote:
> On Thursday, November 24, 2016 at 3:03:01 PM UTC+1, BePe wrote:
>> Hi Opal,
>> Thanks.
>> But I don't know all the actions that should be r
вторник, 28 июня 2016 г., 17:37:57 UTC+3 пользователь Chris Laprise написал:
> On 06/27/2016 09:47 PM, indoler...@gmail.com wrote:
> > What are the tradeoffs between btfs, lvm, and lvm with thin provisioning
> > WRT speed and space efficiency?
> >
>
> Both btrfs and (thin) lvm do similar things w
On Friday, November 25, 2016 at 3:55:04 AM UTC+1, Drew White wrote:
> How do I attach am IMG to appear as an FDD?
A floppy? You mean in Windows? I've never seen anything about that being
supported.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group
48 matches
Mail list logo