sometime in the last couple days, ssh -X stopped working in fedora-26
templates, at least on my box. still works from debian-9.
anyone else notice this? anything change?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
On 05/10/2018 11:08 PM, Quentin Le Guennec wrote:
> From the docs (https://www.qubes-os.org/doc/vpn/)
>
> "Create a new VM, name it, click the ProxyVM radio button, and choose a
> color and template."
>
> On Qubes 4.0, I don't see that radio button. I don't see anything about
> that in the manu
On 05/08/18 20:56, qubes-fan-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote:
I am playing with gpg-split and I did a missclick. I would need to revoke the
command.
I executed the command
$ export QUBES_GPG_DOMAIN=work-gpg
by mistake in vault qube instead of work-gpg cube.
Is there a way to
Hey everyone! Hope you are all doing well.
I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/
so links clicked in one debian-9 AppVM will open in separate debian-9
AppVM. What actually happens is interesting.
If I have firefox running in the destination VM already, everythin
W dniu czwartek, 10 maja 2018 22:44:06 UTC+2 użytkownik fe...@oxley.org napisał:
> HI,
>
> I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes.
>
> When I boot my system:
>
> 1. Press F11 to get to boot selection menu
> 2. Select boot drive containing Qubes
> 3. Initial bo
HI,
I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes.
When I boot my system:
1. Press F11 to get to boot selection menu
2. Select boot drive containing Qubes
3. Initial boot and then hard disk drive encryption key in requested.
At (3) the keyboard no longer works. It i
>From the docs (https://www.qubes-os.org/doc/vpn/)
"Create a new VM, name it, click the ProxyVM radio button, and choose a
color and template."
On Qubes 4.0, I don't see that radio button. I don't see anything about
that in the manual page of qvm-create either. Am I missing something?
--
You r
om/d/optout.
Qubes-HCL-HP-HP_ZBook_15_G4-20180510-122011.yml
Description: application/yaml
mossy:
> 'awokd' via qubes-users:
>> Think I got it working with the -14 templates from unstable. In dom0:
>>
>> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable
>> qubes-template-whonix-gw-14
>> qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black
>> qvm-prefs sys-wh
On Thu, 10 May 2018, qubes-...@tutanota.com wrote:
> I set up the split-gpg with vault-safe VM, where my private keys are stored,
> and the work VM, with pub keys and server communication.
>
> All runs well after executing the
> [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe
>
> The issue is,
'awokd' via qubes-users:
> Think I got it working with the -14 templates from unstable. In dom0:
>
> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable
> qubes-template-whonix-gw-14
> qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black
> qvm-prefs sys-whonix-14 provid
qubes-...@tutanota.com:
> I set up the split-gpg with vault-safe VM, where my private keys are stored,
> and the work VM, with pub keys and server communication.
>
> All runs well after executing the
> [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe
>
> The issue is, that the export doesnt s
I set up the split-gpg with vault-safe VM, where my private keys are stored,
and the work VM, with pub keys and server communication.
All runs well after executing the
[user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe
The issue is, that the export doesnt survive rebooting the work VM, and I ne
13 matches
Mail list logo