Re: [qubes-users] Failing Salt code: out of ideas and wrong error

2022-05-25 Thread 'unman' via qubes-users
On Tue, May 24, 2022 at 11:54:27PM +0200, 'Johannes Graumann' via qubes-users wrote: > Can any one point me to why the following fails? I have been banging my > head against this for a while ... > > --- SNIP --- > create bind dirs config file: > file.managed: > - name: /rw/config/qubes-bind

Re: [qubes-users] qubes update -- how to hold an old kernel ??

2022-06-12 Thread 'unman' via qubes-users
On Fri, Jun 10, 2022 at 08:55:41AM +0200, haaber wrote: > Recent QSB made me run the qubes-update. Regrettably, it wants to remove > a kernel version that I need to hold (in case of foreseeable problems > with newer ones). How can I freeze that older version and forbid its > uninstall? > > best, B

Re: [qubes-users] Problems with announced Fedora 35 templates

2022-06-12 Thread 'unman' via qubes-users
On Sun, Jun 12, 2022 at 01:44:41AM -0700, Viktor Ransmayr wrote: > Hello Steve, > > stevenlc...@gmail.com schrieb am Samstag, 11. Juni 2022 um 17:52:19 UTC+2: > > > > > It looks to me that your current sys-firewall template is not up to date > > for your current R4.1 version, or just broken. If

Re: [qubes-users] Fedora 36 templates available

2022-06-30 Thread 'unman' via qubes-users
On Tue, Jun 28, 2022 at 03:42:22AM +, Metatron wrote: > On Mon, Jun 27, 2022 at 07:41:57PM -0700, Andrew David Wong wrote: > > Dear Qubes Community, > > > > New Fedora 36 templates are now available for Qubes 4.1! > > Is anyone else having this problem: > # sudo qubes-dom0-update qubes-templa

Re: [qubes-users] Using the second os on the (dual-booted) system as a VM

2022-07-11 Thread 'unman' via qubes-users
On Mon, Jul 11, 2022 at 05:14:05AM -0700, MUT wrote: > I want to try creating maybe a standalone VM that would mount a partition > on my hard drive which has a seperate os installed on it as its root, and > use that as a VM. Effectively that would let you use the second OS you have > installed o

[qubes-users] Onion site and repos are down

2022-07-12 Thread 'unman' via qubes-users
I am advised that there is a hardware fault, and the onion site is down. We're working on it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr

Re: [qubes-users] Onion site and repos are down

2022-07-14 Thread 'unman' via qubes-users
I am advised that the onion server is back online unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this dis

Re: [qubes-users] VM initial memory

2022-07-16 Thread 'unman' via qubes-users
On Wed, Jul 13, 2022 at 05:28:01PM +0200, Qubes wrote: > Hi > > I am trying to figure out the significance of the "Initial memory" setting > of a VM. Does it make any difference? For example VM A and B. A is > configured with 500 MB initial memory and 2000 MB Max memory. VM B is > configured with

Re: [qubes-users] KDE on 4.1

2022-07-19 Thread 'unman' via qubes-users
On Tue, Jul 19, 2022 at 08:41:40AM +0200, Qubes wrote: > The procedure to install KDE in 4.1 doesn't seem to work, is that expected > behavior? Yes, the group isn't present. qubes-dom0-update kde-settings-qubes -- You received this message because you are subscribed to the Google Groups "qubes-

Re: [qubes-users] qubes core agent networking iso building help

2022-07-19 Thread 'unman' via qubes-users
On Mon, Jul 11, 2022 at 11:47:19AM -0700, Howard Chen wrote: > I need help to build the qubes core agent tools for the new OS that called > LinuxFX. Here is the story. > > I stumped across the YT for other Linux OS that functions similar to > Windows. This OS that was introduced to me by a YouTu

Re: [qubes-users] KDE on 4.1

2022-07-19 Thread 'unman' via qubes-users
On Tue, Jul 19, 2022 at 11:49:04AM +0200, Qubes wrote: > 'unman' via qubes-users wrote: > > On Tue, Jul 19, 2022 at 08:41:40AM +0200, Qubes wrote: > > > The procedure to install KDE in 4.1 doesn't seem to work, is that expected > > > behavior? > >

Re: [qubes-users] KDE on 4.1

2022-07-19 Thread 'unman' via qubes-users
On Tue, Jul 19, 2022 at 01:26:13PM +0200, Qubes wrote: > Qubes wrote: > > 'unman' via qubes-users wrote: > > > On Tue, Jul 19, 2022 at 08:41:40AM +0200, Qubes wrote: > > > > The procedure to install KDE in 4.1 doesn't seem to work, is > > > &

Re: [qubes-users] qubes core agent networking iso building help

2022-07-20 Thread 'unman' via qubes-users
On Tue, Jul 19, 2022 at 09:28:00AM -0700, Howard Chen wrote: > Thanks, Unman. This will take me about 18 to 19 months to finish and > publish if I have the right tools that I need and the codes probabilities > for that to happen. > On Tuesday, July 19, 2022 at 4:08:06 AM UTC-7 unman wrote: > > >

Re: [qubes-users] qvm-firewall command error

2022-07-29 Thread 'unman' via qubes-users
On Wed, Jul 27, 2022 at 03:59:03PM -0700, Howard Chen wrote: > Currently, I am configuring my NetworkIT qube firewall with the > qvm-firewall command in dom0 terminal. However, when I entered this, it > showed this following error: > > [Howard@dom0 ~]$ qvm-firewall NetworkIT add dsthost 10.137.0

Re: [qubes-users] Re: Problems with Timesynchronization

2022-07-31 Thread 'unman' via qubes-users
> > Can you please comment on how it is possible, that > "ConditionPathExists=/var/run/qubes-service/clocksync was not met" - and - > ideally, how to resolve that issue. > That suggests that you do not have the clocksync service enabled. Set it with `qvm-service --enable QUBE clocksync` or `qvm

Re: [qubes-users] Qubes Contrib repository

2022-08-21 Thread 'unman' via qubes-users
On Sat, Aug 13, 2022 at 10:02:15PM +0200, Qubes wrote: > Qubes wrote: > > I guess one way to see what is available in the contrib repo is to look > > on [Github][1], but is there a way to list the available packages in the > > contrib repo from cli? > > > > Assuming that one has already added the

Re: [qubes-users] firefox-esr and brave-browser work, but firefox, nautilus, thunar, gnome-terminal, xterm do not

2022-08-25 Thread 'unman' via qubes-users
On Wed, Aug 24, 2022 at 07:12:45PM -0700, Andrew David Wong wrote: > On 8/24/22 2:31 PM, Franz wrote: > > Hello, > > the following command is intended to run an application in a new DVM: > > > > qvm-run --dispvm=debian-11-dvm --service qubes.StartApp+ > > > > If in place of I put firefox-esr or

Re: [qubes-users] No editor at all in 'fedora-36-minimal' template?

2022-10-09 Thread 'unman' via qubes-users
On Sun, Oct 09, 2022 at 05:34:50AM -0700, Viktor Ransmayr wrote: > Is it correct, that this template does not provide any editor 'package' at > all? No, there's nano -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group

Re: [qubes-users] Shutdown Delay

2023-01-03 Thread 'unman' via qubes-users
On Wed, Dec 28, 2022 at 11:00:18AM +0100, Ulrich Windl wrote: > Hi! > > Am I the only one that sees extra shutdown delays? > It seems that everything is unmounted, but still thing hang; unsure what that > is. See attachment. > What surprises me is that crypto seems to be stopped before unmount. >

Re: [qubes-users] 'qvm-copy' and 'qvm-copy-to-vm' in AppVM

2023-03-24 Thread 'unman' via qubes-users
qvm-copy-to-vm is deprecated and will be removed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussio

Re: [qubes-users] Odd behavior wile running two separate Whonix gateways

2023-03-24 Thread 'unman' via qubes-users
On Fri, Mar 24, 2023 at 04:23:48AM +, tiesta_symonne61 via qubes-users wrote: > I have two Whonix gateways, the default sys-whonix and a sys-whonix-clone. > Both are attached to different net vm's. > > The problem is that all qubes that have sys-whonix-clone as its net vm > show up under sys-

Re: [qubes-users] How Qubes handles the start of services

2023-03-27 Thread 'unman' via qubes-users
On Mon, Mar 27, 2023 at 03:48:15PM +0200, r.wiesb...@web.de wrote: > Hi there, > > every VM/qube has a "services" tab in its settings window. It seems like > Qubes is designed in a manner that requires two switches for a service: > it needs to be enabled in the template *and* requires an entry in

Re: [qubes-users] How Qubes handles the start of services

2023-03-28 Thread 'unman' via qubes-users
On Mon, Mar 27, 2023 at 06:33:26PM +0200, r.wiesb...@web.de wrote: > Hi uman, > > that was the reference in qubes-doc that I found before and that I could > not find today when I was writing this email. However, it does not > explain what the advantage of this two-switch-model is compared to just

Re: [qubes-users] Kali Linux Purple - Defense

2023-04-05 Thread 'unman' via qubes-users
On Tue, Apr 04, 2023 at 10:11:19PM -0700, Foilsurf wrote: > Hello, > which of the out of the Box Defense features of the new *Kali Linux Purple*, > would be very nice to have also in *QubesOS *to raise the defense bar? (the > attacks also get every day harder...) > Kind Regards > I see that they

Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-14 Thread 'unman' via qubes-users
Exactly this issue arose on GitHub - it is, as you say, because you did not update the qubes repository definition in timely way. You can read the issue [here](https://github.com/qubesos/qubes-issues/issues/7865) The resolution is to follow the steps in the upgrade script - courtesy of Marek: ```

Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-14 Thread 'unman' via qubes-users
On Fri, Apr 14, 2023 at 04:10:29PM +0200, qubes-li...@riseup.net wrote: > Hi uman, > > thanks for your reply. > > 'unman' via qubes-users: > > Exactly this issue arose on GitHub - it is, as you say, because you did > > not update the qubes repository defin

Re: [qubes-users] Modifying /etc/hosts in dispVM

2023-04-19 Thread 'unman' via qubes-users
On Wed, Apr 19, 2023 at 07:06:19AM -0700, john.e...@gmail.com wrote: > I haven't been able to figure out how I can modify /etc/hosts in a dispVM > so that my entry (such as 10.1.1.1 myhost.example.commyhost) will be > used instead of DNS. > > I'm trying to direct my traffic to a different

Re: [qubes-users] Modifying /etc/hosts in dispVM

2023-04-20 Thread 'unman' via qubes-users
On Thu, Apr 20, 2023 at 11:29:08AM +, Rusty Bird wrote: [quote] 'host' isn't suitable for testing this, because it never looks at the [/quote] Right - neither are most of the *other* DNS utilities - ping should do. Or `getent hosts ...` -- You received this message because you are subscribed

Re: [qubes-users] Data recovery -- thin provisioned LVM metadata (?) problem

2023-04-25 Thread 'unman' via qubes-users
On Tue, Apr 25, 2023 at 08:19:48AM +0200, haaber wrote: > Dear all, > > I had a lethally bad hardware failure on computer.  Since I had to buy a > new machine this took a while, now I try to save some data: the old SSD > is attached to a brand-new qubes via usb adapter. I started > > sudo pvscan 

Re: [qubes-users] Template for X?

2023-04-29 Thread 'unman' via qubes-users
On Sat, Apr 29, 2023 at 04:53:10PM +0800, Sandy Harris wrote: [quote] Is there a template to make a qube that just runs as an X terminal? [/quote] Have you tried a minimal template? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe f

Re: [qubes-users] Updating via a wireguard connection

2023-04-29 Thread 'unman' via qubes-users
On Fri, Apr 28, 2023 at 11:58:55AM -0700, Jeremy Hansen wrote: > I would like to configure Qubes to do its updates via a connection to a > wireguard service I have set up. > > I understand how to set up a wireguard enabled template and a qubes based on > that template following this: > > https:

Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time

2023-05-03 Thread 'unman' via qubes-users
On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote: > Is there a sane way to update existing `*.conf` files on VMs that are > already running? > Is there a not-so-labour-intensive way to solve this problem? Use salt - it's easy to apply to existing qubes, as well as template. You can (if you w

Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time

2023-05-03 Thread 'unman' via qubes-users
On Wed, May 03, 2023 at 04:19:00PM +, Qubes wrote: > > 'unman' via qubes-users wrote: > > On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote: > > > > > Is there a sane way to update existing `*.conf` files on VMs that are > > > already running

Re: [qubes-users] Colourful prompt

2023-05-04 Thread 'unman' via qubes-users
On Thu, May 04, 2023 at 05:01:38AM -0700, Andrew David Wong wrote: > On 5/3/23 4:02 AM, Qubes wrote: > > I have noticed on Fedora, the cli prompt itself is not colourful although > > the rest of the output is. Is there a way to get the prompt itself in > > colour as well? The prompt on Debian is

Re: [qubes-users] How to make sys-firewall broadcast a local qube as the system-wide DNS server?

2023-06-08 Thread 'unman' via qubes-users
On Tue, Jun 06, 2023 at 01:24:18PM -0500, Leo28C wrote: > I managed to set up a pi-hole qube and make it my network's DNS > filtering/caching server. Ironically, it works flawlessly across my network > EXCEPT it completely breaks DNS for all other qubes in the same system. On > Debian-based qubes I

Re: [qubes-users] QubesIncoming folder in /tmp ??

2023-06-30 Thread 'unman' via qubes-users
On Fri, Jun 30, 2023 at 12:27:41PM +0200, haaber wrote: > Hi I was wondering if it would not me preferable (at least in some VM's) > to delocalise the QubesIncoming folder in /tmp to have it "cleaned up" > regularly. It's a pain to do so manually. Is there a problem doing so ?  > What would be the

Re: [qubes-users] saltstack: detect the os within a running target/state.sls

2023-08-25 Thread 'unman' via qubes-users
On Thu, Aug 24, 2023 at 11:26:30AM +0200, lik...@gmx.de wrote: > Hi! > > Running grains['os'] in a target returns always "Fedora" and grains['id'] > returns "dom0". For this reason I cannot branch in my state files for > different os templates. > Executing this test in such a targeted state.sls:

Re: [qubes-users] split-ssh question

2023-09-10 Thread 'unman' via qubes-users
On Fri, Sep 08, 2023 at 08:10:44AM +0200, haaber wrote: > I tried to configure split-ssh according to the tutorial on qubes pages, > in its simple version (just agent, but no keepass integration). But now > ssh offers *all* my private keys to *all* servers, which is odd, but > more annoying, it usu

Re: [qubes-users] time sync dysfunctional

2024-02-06 Thread 'unman' via qubes-users
On Tue, Feb 06, 2024 at 01:08:09PM +0100, 'haaber' via qubes-users wrote: > addendum: if I run "date" in a client VM it will give the right > timezone, but still has 3min of delay.. > > On 2/6/24 11:45, 'haaber' via qubes-users wrote: > > Hi, > > > > I am still on Q4.1 (no time to do a full insta

Re: [qubes-users] Ethernet socket device not available in Network Connections

2024-03-02 Thread 'unman' via qubes-users
[quote] my sys-net is also sys-usb because I used the USB ethernet adapter so I think this is the problem but I don't know how to fix. [/quote] I doubt that this is the problem. Have you assigned the device to sys-net in the "devices" tab of sys-net settings. When sys-net boots up, can you run `su

Re: [qubes-users] Inconsistency between `qvm-template list` and `qvm-template-gui`

2024-03-20 Thread 'unman' via qubes-users
Without seeing the screenshot, I think I know the issue. They are from the same repository. qvm-template lists *all* the template in the repo, whereas qvm-template-gui filters to only show the most recent supported versions. -- I never presume to speak for the Qubes team. When I comment in the m

Re: [qubes-users] Unable to boot appvm due to qubes-relabel-rw

2024-06-26 Thread 'unman' via qubes-users
On Mon, Jun 17, 2024 at 12:02:25PM +0200, 'Rune Philosof' via qubes-users wrote: > Also, if this was a rarely used appvm, then I might not have noticed that > the problem started due to a template vm upgrade. > I also might not have the old template vm present on my system to switch > back to for c