Hi everybody,
I happened to notice that the RPMs needed to upgrade the qubes tools
inside templates to fc26 have appeared, and started my usual
clone-upgrade process to test the viability of the new major version.
So far I don't have any problems with the manually-upgraded fc26
templates (sudo dnf
On Thu, Oct 19, 2017 at 1:25 AM, blacklight wrote:
> We all know well why xen was chosen as the hypervisor for qubes instead of
> kvm, since this has been stated in multiple places by the devs. But i wonder
> how feasable it would be to use bhyve as a hypervisor for qubes. Ive read
> that it on
Hi,
If you want to scan your traffic for malicious code or for indicators of
compromise, you may consider to install 2nd firewall VM with pfSense or
OPNsense as a system. They allow to install Snort/Suricata in IPS mode. In
addition, OPNsense (don't remember that in pfSense) allows to turn on Cl
On Thursday, October 19, 2017 at 5:44:20 PM UTC, Νικος Παπακαρασταθης wrote:
> Hello
>
> Is there any kind of end point security fore qubes xen hv except of
> isolation? Something like usual ...internet security software used in
> windows(antivirus antispam etc unified).If not how for example pa
On 10/19/2017 01:44 PM, Νικος Παπακαρασταθης wrote:
Hello
Is there any kind of end point security fore qubes xen hv except of isolation?
Something like usual ...internet security software used in windows(antivirus
antispam etc unified).If not how for example payments are safe?
Hi,
The typic
A manual method, 3 steps to ensure a fix:
*) Modify the AppVM autostart in /var/lib/qubes/qubes.xml quick, easy and dirty.
*) Modify Grub or EFI settings (plenty of guides around), so Dom0 can see the
USB controller. You either use EFI or Grub, not both at the same time. First
identify which yo
Hello
Is there any kind of end point security fore qubes xen hv except of isolation?
Something like usual ...internet security software used in windows(antivirus
antispam etc unified).If not how for example payments are safe?
--
You received this message because you are subscribed to the Googl
Dnia Monday, October 16, 2017 8:20:40 PM CEST Ron Qubed pisze:
> Have you considered using SSHFS rather than NFS? I'm no security expert, but
> it would seem to me to be more secure than NFS.
For what it's worth, we're using (not with Qubes, just generally) a system of
LUKS volumes in large (hund
On Wednesday, October 18, 2017 at 11:59:06 PM UTC, Stumpy wrote:
> On 18.10.2017 20:16, qubenix wrote:
> > Foppe de Haan:
> >> On Wednesday, October 18, 2017 at 12:38:05 AM UTC+2, Stumpy wrote:
> >>> hm...
> >>>
> >>> Is there something else I can post that would make this easier to
> >>> dia
On Thursday, October 19, 2017 at 1:18:21 PM UTC, cqui...@gmail.com wrote:
> Hi, I read around a bit but didn't really find much on this. I just created
> fedora-24 and fedora-25 vms following the docs pages. Since these are newer
> versions of the fedora os, should I switch sys-net and sys-firewa
On Thursday, October 19, 2017 at 1:18:21 PM UTC, cqui...@gmail.com wrote:
> Hi, I read around a bit but didn't really find much on this. I just created
> fedora-24 and fedora-25 vms following the docs pages. Since these are newer
> versions of the fedora os, should I switch sys-net and sys-firewa
In Qubes 3.2 from a fedora 25 AppVM, when I try and open a docx (Word)
file via DispVM via the right-click menu, I just get a directory
listing inside the DispVM. Instead of opening the file with
LibreOffice it appears to unzip the file and show the underlying dir
structure. (The docx format is zip
Le jeudi 19 octobre 2017 15:05:17 UTC+2, pixel fairy a écrit :
> heres how to run docker in qubes 3.2, same method should work in 4.0
>
> https://gist.github.com/xahare/6b47526354a92f290aecd17e12108353
Thanks for the link
Regards
--
You received this message because you are subscribed to t
On Wednesday, October 18, 2017 at 3:37:37 AM UTC-7, Roy Bernat wrote:
>
> Good point . drifting is known issue ... so what is the solution? :)
if it drifts, reboot the auth vm, time will be resynced.
--
You received this message because you are subscribed to the Google Groups
"qubes-user
Hi, I read around a bit but didn't really find much on this. I just created
fedora-24 and fedora-25 vms following the docs pages. Since these are newer
versions of the fedora os, should I switch sys-net and sys-firewall to use
fedora-25 as a template instead of fedora-23, or should I just leave
heres how to run docker in qubes 3.2, same method should work in 4.0
https://gist.github.com/xahare/6b47526354a92f290aecd17e12108353
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it
On Thu, Oct 19, 2017 at 01:55:08PM +0200, deadbrain wrote:
> thanks for the answer I may use a Debian/sid plus siduction kernel
> inside this VM For my use case standard headers are sufficient , I don't
> see the value added to install its own kernel, could you give more details
> please?
Hi Holger,
thanks for the answer I may use a Debian/sid plus siduction kernel
inside this VM For my use case standard headers are sufficient , I
don't see the value added to install its own kernel, could you give more
details please?
Thanks again for the support
On 10/19/2017 01:4
On Thu, Oct 19, 2017 at 04:29:51AM -0700, jerome.moli...@gmail.com wrote:
> -> 2) From time to time I am providing Java consulting, and now many
> customers use docker containers (no comments -) ) ... Is it possible inside a
> VM to run Docker ? No problem with firewalling & other stuff...
yes,
Hi all,
I am waiting for the upcoming 4.0 release to install Qubes on a Thinkpad P51
(big machine). Before pressing the button I would like to know if some of my
use cases are compatible with Qubes-OS...
-> 1) I am doing ARM Cortex programming based on GCC-arm-none-eabi , in this
context USB con
Trying to replace
> cd /mnt/var/lib/qubes/servicevms mv sys-usb sys-usb.bak
with qvm-prefs. (That may be even better than using systemctl.)
Please have a look at the following instructions, modified what you
wrote. I hope we could simplify/clarify for novice users and add this to
the Qubes docum
Trying to replace
> cd /mnt/var/lib/qubes/servicevms mv sys-usb sys-usb.bak
with systemctl disabling the autostart of the VM. Could that work?
Please have a look at the following instructions, modified what you
wrote. I hope we could simplify/clarify for novice users and add this to
the Qubes do
I had to use iommu=force to make a notebook boot Qubes R4. [1]
Does that pose any security risk?
Cheers,
Patrick
[1] (Because 'BIOS did not enable IDB for VT properly. - TUXEDO
InfinityBook Pro 13' [2])
[2] https://groups.google.com/forum/#!topic/qubes-users/gAKEomiulUY
--
You received this m
Patrick Schleizer:
> Qubes R4 RC1 with TUXEDO InfinityBook Pro 13 [1]. Xen crashes. Boot aborts.
>
>> BIOS did not enable IDB for VT properly. crash Xen for security purposes
>
> Did anyone see this error ever before? Any idea how to fix it?
>
> Cheers,
> Patrick
>
> [1]
> https://www.tuxedocom
We all know well why xen was chosen as the hypervisor for qubes instead of kvm,
since this has been stated in multiple places by the devs. But i wonder how
feasable it would be to use bhyve as a hypervisor for qubes. Ive read that it
only uses roughly 30k lines of code, so its smaller then xen w
Thanks Chris.That's a real shame because I was really looking forward to trying
out Qubes. I don't need a huge amount of security but if there's an obvious
vulnerability like that then it doesn't make much sense to install it on this
machine. It'll have to wait until I get a machine that's compa
26 matches
Mail list logo