Hello,
I followed the instructions here (
https://www.qubes-os.org/news/2018/09/11/qubes-u2f-proxy/) to setup the U2F
proxy:
- I didn't install anything on sys-usb
- I installed `qubes-u2f` in my broswer VMs
- I installed `qubes-u2f-dom0` in dom0 and enabled the `qubes-u2f-proxy`
service for my
Sep 22, 2019, 22:20 by cube...@tutamail.com:
>
>
> Sep 22, 2019, 19:52 by qubes-users@googlegroups.com:
>
>> cube...@tutamail.com:
>>
>>> And that's what I'm having a proplem with, unexpectedly. When I set up
>>> 'sys-firewall' or 'sys-net' as netVM for 'whonix-sys' I can't get
>>> 'anon-whonix
Sep 22, 2019, 19:52 by qubes-users@googlegroups.com:
> cube...@tutamail.com:
>
>> And that's what I'm having a proplem with, unexpectedly. When I set up
>> 'sys-firewall' or 'sys-net' as netVM for 'whonix-sys' I can't get
>> 'anon-whonix' to establish Tor Browser connection, can't access any w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 9/22/19 6:39 AM, duc...@disroot.org wrote:
> In the official documentation "Copying from (and to) dom0", there
> is no mention at all of how to copy text via the clipboard from a
> domain to dom0. What is the method to use?
>
https://www.qubes-o
awokd:
> muhammad19238...@gmail.com:
>> Thank you, this worked fine(For future duckduckgoers, I did this on fedora
>> in the end, I now feel it makes more sense because the disk usage of the
>> template is not avoidable, by having extra templates its just weighing your
>> disk down). However I h
cube...@tutamail.com:
> And that's what I'm having a proplem with, unexpectedly. When I set up
> 'sys-firewall' or 'sys-net' as netVM for 'whonix-sys' I can't get
> 'anon-whonix' to establish Tor Browser connection, can't access any website.
> Even whonix-sys 'Tor Control Panel' struggles with
Hi,
I have a problem with whonix on qubes 4.0.1 - manually upgraded to whonix-15,
fedora-30, kernel 4.19.
When whonix-sys networking VM is configured to my VPN VM, tor connection gets
established which allows me to use TOR browser in 'anon-whonix'. Everything
works fine, but... that's not th
On Sun, Sep 22, 2019 at 02:51:00PM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
Is there any way to automatically do stream isolation on a per-VM basis?
Right now it appears this is not necessarily the case -- the network
traffic of AppVMs A and B may end up using the sam
On 2019-09-22 11:34, 'awokd' via qubes-users wrote:
Stumpy:
W: GPG error: https://updates.signal.org/desktop/apt xenial InRelease:
The following signatures couldn't be verified because the public key is
not available: NO_PUBKEY D980A17457F6FB06
I also get a very similar message, with the exa
Stumpy:
> W: GPG error: https://updates.signal.org/desktop/apt xenial InRelease:
> The following signatures couldn't be verified because the public key is
> not available: NO_PUBKEY D980A17457F6FB06
> I also get a very similar message, with the exact same last message "See
> apt-secure(8) manpage
Stumpy:
> This time i did not go the secondary storage route as I was having a
> miserable time trying to get it to work, for whatever reason I seem to
> understand diagrams of LVM but when it comes to putting the whole thing
> together, esp via terminal, i am not getting it.
> So as a result, thi
I have been trying to install Signal on whonix but have run into some
issues. Initally I tried the whonix method
https://www.whonix.org/wiki/Signal and the first time i started it up it
worked fine, but after restarting that appvm it now gives me:
user@host:~$ ./signal-start
+ set -e
+ sudo tee
On 2019-09-21 14:48, 'awokd' via qubes-users wrote:
Stumpy:
I did a fresh install on my computer and (am pretty sure) I setup an LVM
(I know I am not using the right termin, sorry) across the SSD drive and
the regular drive. The problem is, my computer is now much slower than
it was when I was r
tetrahedra via qubes-users:
> Is there any way to automatically do stream isolation on a per-VM basis?
> Right now it appears this is not necessarily the case -- the network
> traffic of AppVMs A and B may end up using the same Tor circuits (and
> exit nodes).
>
> Is there a way to set this up?
>
Is there any way to automatically do stream isolation on a per-VM basis?
For example:
I start AppVM "A", with networking via Whonix, and interact with the
internet as "Alice"
I start AppVM "B", with networking via Whonix, and interact with the
internet as "Bob"
Naturally I want Alice to appear
On Sunday, September 22, 2019 at 7:37:40 AM UTC-4, one7...@gmail.com wrote:
>
> Hello,
>
> *Von:* tetrahedra via qubes-users
> *Betreff:* [qubes-users] Making a DispVM permanent
>
> Is there a way to turn currently-running DispVM instance into a regular
> permanent AppVM, which I can delete later?
Hello
schrieb am So., 22. Sep. 2019, 13:40:
>
> In the official documentation "Copying from (and to) dom0", there is no
> mention at all of how to copy text via the clipboard from a domain to
> dom0. What is the method to use?
Copying from dom0 to an AppVM is ok, as dom0 has to be trusted. The
Sorry guys, another couple of questions!
I was trying to manually correct the .onion addresses in the dom0 repos
at qubes-dom0.repo and qubes-templates.repo. I had the new address in a
text file on a flash drive. I think the advice is not to connect flash
drives directly to dom0 so I attached it t
Hello,
Von: tetrahedra via qubes-users
Betreff: [qubes-users] Making a DispVM permanent
Is there a way to turn currently-running DispVM instance into a regular
permanent AppVM, which I can delete later?
The way I would do it:
1) Open a xterm in the same (!) disposable VM
qvm-run xterm
'awokd' via qubes-users:
> duc...@disroot.org:
>
>> I followed the Onionizing Repos guide, commented out the metalinks and
>> uncommented the onion lines. On first test (sudo qubes-dom0-update) I
>> got a 404 error:
>>
>>> HTTP Error 404 - Not Found
>>
>>> http://yum.sik5nlgfc5qylnnsr57qrbm64zbdx6
20 matches
Mail list logo