On Thu, May 17, 2018 5:41 pm, john wrote:
> On 05/17/18 06:25, awokd wrote:
>> On Thu, May 17, 2018 3:46 pm,
>> josefh.maier-revL73yDgGBWk0Htik3J/w...@public.gmane.org wrote:
>>> Hello Forum
>>>
>>> why was Whonix and not Tails selected for thes anon-vm of QubesOS?
>>> Thank's for your feedback!
>>
john:
> On 05/17/18 06:25, awokd wrote:
>> On Thu, May 17, 2018 3:46 pm,
>> josefh.maier-revL73yDgGBWk0Htik3J/w...@public.gmane.org wrote:
>>> Hello Forum
>>>
>>> why was Whonix and not Tails selected for thes anon-vm of QubesOS?
>>> Thank's for your feedback!
>>
>> Don't know the exact discussion
Setup:
Software -- Qubes R4.0, Debian AppVM
Hardware -- External monitor connected by HDMI to laptop, USB mouse
Issue:
Mouse works perfectly when application window is on laptop monitor [aligned
with dom0 mouse pointer]. However, when the application windows is moved to the
external monitor, th
On Saturday, May 12, 2018 at 8:03:11 AM UTC-4, qube...@gmail.com wrote:
> Hello there, I was wondering if there is a workaround to make this work.
> I have a Yubikey with U2F, which has the dual purpose of being a normal
> Yubikey as well as being able to do U2F when the webbrowser requests it.
>
On Thursday, May 17, 2018 at 8:57:09 PM UTC-4, Qubes Guy wrote:
> I've successfully used qvm-block (in Dom0) to attach USB drives to different
> VMs (persistently), but I've noticed that Qubes (or Linux) sometimes gives
> them to different devices over time. In other words, on Monday, my
> BIG_T
I've successfully used qvm-block (in Dom0) to attach USB drives to different
VMs (persistently), but I've noticed that Qubes (or Linux) sometimes gives them
to different devices over time. In other words, on Monday, my BIG_TOSHIBA drive
will be on /dev/sda, but it'll be assigned to /dev/sdj when
I've successfully used qvm-block (in Dom0) to attach USB drives to different
VMs (even persistently), but I've noticed that Qubes (or Linux?) sometimes
gives them to different devices over time. In other words, on Monday, my
BIG_TOSHIBA drive will be on /dev/sda, but it'll be assigned to /dev/sd
(I think this failed sending before, retrying. Pardon if
duplicate)
Everything works that I have tried -- USB keyboard& mouse,
external NFS mount, VPN, additional volumes, others. I can
successfully use VPN in some domains and no VPN in others at
the same time.
In order for networking to work, yo
Hello guys
I'm thinking of ways to multiboot Qubes 4 safely on my laptop. Would it be
possible to install the /boot partition on a thumb drive while having the /
encrypted filesystem on an internal drive partition? This should not require
Anti-Evil Maid, right?
Also if this works, will I have
On 05/17/18 09:13, john wrote:
In new Fed28 template I am getting fedora-27 updates sigh
I now have persistent green arrows in Fed26 template and the Fed28 just
created from the cloned Fed26 , but sadly I am seeing the Fed27 updates
in what is supposed to be Fed28 ...
Must I go and mak
In new Fed28 template I am getting fedora-27 updates sigh
I now have persistent green arrows in Fed26 template and the Fed28 just
created from the cloned Fed26 , but sadly I am seeing the Fed27 updates
in what is supposed to be Fed28 ...
Must I go and make a Fed27 template before going
On 05/17/18 06:13, Roy Bernat wrote:
I tries to install fedora 28 by upgrade 26 but at the end i am getting lot of
errors.
is there any option to download clean fedora-28 / 27 ?
Thanks
Roy
why not try
https://www.qubes-os.org/doc/templates/fedora/
$ sudo qubes-dom0-update qubes-template-fedo
On 05/17/18 06:25, awokd wrote:
On Thu, May 17, 2018 3:46 pm,
josefh.maier-revL73yDgGBWk0Htik3J/w...@public.gmane.org wrote:
Hello Forum
why was Whonix and not Tails selected for thes anon-vm of QubesOS?
Thank's for your feedback!
Don't know the exact discussion that led up to it, but I imag
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
I want to restore a backed VM in a new pool. I don't see any option on
qvm-backup-restore for specify it.
Is there any way for do it or do I have to restore and then move it?
Regards.
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEznLCgPSfWTT+
On 05/15/2018 08:01 PM, 'Evastar' via qubes-users wrote:
And 2th question:
Do you know how to restore all connections after proxyvm reboot. Yes, it's not
possible to reboot it from qubes manager, but I can reboot it with terminal.
Then, maybe, some simple steps exists to reconnect all AppVMs?
>> My machine directly boots into BIOS screen if my Asus Zenbook UX303 after
>> updating Qubes 4.0 dom0, security repo enabled. I don't remember the error
>> messages (s.th. with keys).
>> So I boot from rescue USB Stick. Have to choose (3), going directly to
>> shell. —
>> And here I'm stuck, s
On 05/15/2018 07:51 PM, 'Evastar' via qubes-users wrote:
If the vif interfaces are going down, that suggests a bug either in
Today it happens again and now I open terminal at ethervpn and write "route".
It freeze, not totally freeze, but it print line by line output of this command and ever
> My machine directly boots into BIOS screen if my Asus Zenbook UX303 after
> updating Qubes 4.0 dom0, security repo enabled. I don't remember the error
> messages (s.th. with keys).
> So I boot from rescue USB Stick. Have to choose (3), going directly to shell.
> —
> And here I'm stuck, since m
On Thu, May 17, 2018 3:46 pm, josefh.ma...@hushmail.com wrote:
> Hello Forum
>
> why was Whonix and not Tails selected for thes anon-vm of QubesOS?
> Thank's for your feedback!
Don't know the exact discussion that led up to it, but I imagine it's due
to the flexibility Whonix-Gateway provides by p
These microcodes from platomav are not new enough to have spectre v2
fixed at them! We are in the process of requesting an updated
microcodes from AMD, and there is already some progress: we have been
offered the updated microcodes with spectre V2 fix under the NDA.
However, most likely this NDA re
Hello Jo
schrieb am Do., 17. Mai 2018, 15:22:
> Am Donnerstag, 17. Mai 2018 07:28:19 UTC+2 schrieb [ 799 ]:
> > (...)
> > my solution to run more complicated command in an AppVM:
> >
> > 1) "build" a script in dom0
> > 2) qvm-copy the script to the AppVM
> > 3) use qvm-run from dom0 to launch th
I tries to install fedora 28 by upgrade 26 but at the end i am getting lot of
errors.
is there any option to download clean fedora-28 / 27 ?
Thanks
Roy
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
Hello Forum
why was Whonix and not Tails selected for thes anon-vm of QubesOS?
Thank's for your feedback!
Joe
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qub
" I needed to remove the assignement of one of the USB controllers from sys-usb
"
What do you mean by that? Are you unloading a kernel module before suspending
or the PCI controller? Which module is this?
The sys-usb still freezes on resume, so for the time being I have to manually
kill and star
On Thu, May 17, 2018 12:51 pm, Bernhard wrote:
>
>> You shouldn't mount encrypted drives on sys-usb. Use qvm-block to attach
>> the partition to a different VM, then mount it there.
>>
> This is a good question, I think. Since we distrust sys-usb I agree that
> we should not do the cryptsetup opera
Am Donnerstag, 17. Mai 2018 07:28:19 UTC+2 schrieb [ 799 ]:
> On 05/13 04:40, cr33dc0d3r wrote:
>
> > what i try to accomplish is a process executed on dom0 that downloads an
> > data package from the server onto AppVM1 - then forward it over to another
> > AppVM - then execute (read) it. Curren
https://share.riseup.net/#9tAE4-t7G8clcYXQxGQQVA
sys-net not working properly with older kernel though :/
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-u
You shouldn't mount encrypted drives on sys-usb. Use qvm-block to attach
the partition to a different VM, then mount it there.
This is a good question, I think. Since we distrust sys-usb I agree that
we should not do the cryptsetup operations in sys-usb. But if you
distrust the attached devic
Same issue here. Might have o do with the latest dom0 updates. Getting a kernel
panic.
When booting, in grub menu choose "advanced options" and try to boot with an
older kernel. Then it should boot. 4.14.18-1 works fine here, 4.14.35-1 breaks
everything.
Screenshot following
--
You received
awokd:
Thanks for the clarification!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email
On Thu, May 17, 2018 12:17 pm, Thibaut Demmerlé wrote:
> Hello!
> Until now everything worked with Qubes 4.0 on my Librem 13v2 (with
> coreboot
> updated).
> Now, when I boot I can still enter the encryption password, but when it
> comes to the user password, Qubes don’t load the desktop anymore an
Hello!
Until now everything worked with Qubes 4.0 on my Librem 13v2 (with coreboot
updated).
Now, when I boot I can still enter the encryption password, but when it
comes to the user password, Qubes don’t load the desktop anymore and go
back to the user password...
I feel desperate because I would
On Wed, May 16, 2018 10:08 pm, qubes...@go-bailey.com wrote:
> For a default install of Qubes 4, is there anything else that needs to
> be done in regards to disk trims/discards for SSDs?
>
> The docs page at:
>
> https://www.qubes-os.org/doc/disk-trim/
>
> mentions setting up a systemd timer or a
On Wed, May 16, 2018 8:15 am, Tim Wolf wrote:
> Hello all!
>
> I know there is a way to manually create a new volume in dom0 and create
> new entries for this volume in the XEN configuration file for the VM it
> should be added. After starting the VM I can configure the partitions
> and filesystems
On Wed, May 16, 2018 7:35 pm, Mindus Amitiel Debsin wrote:
> So I have a couple questions now as to whether or not I can use Qubes as a
> primary OS:
>
> 1) Is it true that only Windows 7 can be installed as a qube?
I think a couple have managed to get Win10 installed, but 7 is better
supported
On Thu, May 17, 2018 6:03 am, Alex wrote:
> Hi all,
>
> In migrating multiple systems to Qubes 4.0 I noticed that sys-usb was
> unable to mount the LUKS encrypted hard drive that contained my Qubes
> backup. Looking into the logs I realised the process was getting killed by
> oom-killer, which is i
After working fine for weeks, my USB keyboard stopped working out of a sudden.
sys-usb qube dmesg says:
-- cut --
[ 3545.840080] usb 1-2: new low-speed USB device number 11 using xhci_hcd
[ 3545.973689] usb 1-2: New USB device found, idVendor=413c, idProduct=2107
[ 3545.973740] usb 1-2: New USB
37 matches
Mail list logo