by hand, hopefully I didn't make
any typos.)
Any idea what this might indicate?
Cheers,
- --
- -Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile OpenPGP: 2158 0643 C13B B40F B0FD 5854 B007 A32D AB44 3D9C
Send non-security-critical things
sending them; they have nothing to do with Qubes.
There are other email hosts that don't demand invite codes; you can
use one of them.
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYl7j+AAoJELPy0WV4bWVwa5oP/2axmIdHHGjWpQv3wV7J4/6q
TP7ZTA8zt4ywcMVTCjePn0mbVi/7wNNnoYT8XA2iYxnOILE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
podmo:
> bb.alas...@gmail.com wrote:
>> What about PCIe USB cards? Could I assign such pcie device to
>> specific cube, so USB ports on that card are available only for
>> that qube, as there is another controller on the card(I think so
>> at least),
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jeremy Rand:
> xmee...@gmail.com:
>> I just did a clean install of Qubes 3.2. For some reason the
>> resolution off apps in Fedora VMs is wildly inconsistent. The
>> borders of the windows, dom0, and the Debian VMs are corre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Fisk:
> On 12/30/2016 01:33 AM, Jarle Thorsen wrote:
>> torsdag 29. desember 2016 13.14.25 UTC+1 skrev Grzesiek Chodzicki
>> følgende:
>>> W dniu czwartek, 29 grudnia 2016 13:07:44 UTC+1 użytkownik
>>> Jarle Thorsen napisał:
Currently my
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jarle Thorsen:
> torsdag 29. desember 2016 13.14.25 UTC+1 skrev Grzesiek Chodzicki
> følgende:
>> W dniu czwartek, 29 grudnia 2016 13:07:44 UTC+1 użytkownik Jarle
>> Thorsen napisał:
>>> Currently my Windows 7 StandaloneVM feels a bit sluggish.
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
pixel fairy:
> On Tuesday, October 1, 2013 at 6:32:41 PM UTC-7, ears...@gmail.com
> wrote:
>> We all know Fedora is a big name, but is it a good choice for a
>> Security Driven OS like QubeOS to be based around? What do others
>> here think?
>
> The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Andrew David Wong:
> On 2016-12-13 12:56, Jeremy Rand wrote:
>> Andrew David Wong:
>>> On 2016-12-12 21:30, Jeremy Rand wrote:
>>>> I just tried to restore 5 VM's from a backup. The backup was
>>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
5fxfc1+2ch7pcmy34te01rpv5qj0zj3h115fu90fwr3h7yl5u via qubes-users:
> Also since Java is not the most secure environment, I'm planning on
> using i2pd which is based on C++.
In another context, I discussed the relative security of C++ and Java
with M
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
J. Eppler:
> Hello,
>
> here is the correct link:
Looks like Enigmail's line breaks in combination with Google Groups
may have broken the link I provided. Apologies (and thanks for
correcting) if that's the case.
Cheers,
- -Jeremy
-BEGIN PGP
n support them here:
https://www.crowdsupply.com/raptor-computing-systems/talos-secure-workst
ation
Cheers,
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYU3gOAAoJELPy0WV4bWVwO+IQAIr+UtgNk+29oFRjvd+UKMUF
QkWkXrn+PqWDYs63NSX4LWnyO3apo1wY/yjmBkSiKKvEnK+1v3nDOAxGxPSKyWC1
9DWhE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Andrew David Wong:
> On 2016-12-12 21:30, Jeremy Rand wrote:
>> I just tried to restore 5 VM's from a backup. The backup was
>> made on Qubes 3.0; I'm restoring to Qubes 3.2. All 5 VM's fail
>> to restore wit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I just tried to restore 5 VM's from a backup. The backup was made on
Qubes 3.0; I'm restoring to Qubes 3.2. All 5 VM's fail to restore
with this error (although of course the name of the VM in the error
message varies depending on what VM I'm tryin
kotot...@gmail.com:
> Hello community,
>
> I was wondering why one of my program was taking ~15 seconds to compile when
> my colleague compiled it within ~3 seconds on his system. I know there are a
> performance price to pay for the virtualisation but nonetheless. I was super
> annoyed and I v
Manuel Amador (Rudd-O):
> On 06/17/2016 04:11 AM, Drew White wrote:
>>
>>
>> On Sunday, 15 May 2016 14:05:50 UTC+10, Jeremy Rand wrote:
>>
>> FWIW, I think a legal argument could be made that such license
>> agreements are anti-competitive and t
7v5w7go9ub0o:
>
> On 10/23/2016 09:38 AM, Achim Patzner wrote:
>> Hi!
>>
>>
>> After a few months of severe suffering from xfce on a HiDPI display I
>> gave in and installed @kde-desktop-qubes on my system – and I'm pretty
>> sure I don't want to see xfce for the next few years. Title bars have a
Jeremy Rand:
> If I install LibreOffice in a Fedora 23 Template using Qubes 3.2, the
> "Presentation Display" setting works properly with no issues, so I can
> see my notes on my main display and the presentation shows up on my
> external display.
>
> However, this
xmee...@gmail.com:
> I just did a clean install of Qubes 3.2. For some reason the resolution off
> apps in Fedora VMs is wildly inconsistent. The borders of the windows, dom0,
> and the Debian VMs are correct but the apps in Fedora VMs range from
> consistent with the others to so low as to be a
qer...@tutanota.com:
>
> I am following this guide:
>
>
>
>
> https://forums.whonix.org/t/using-whonix-workstation-as-a-disposablevm-dispvm/2461
>
>
>
> I have created the whonix-ws dvm template but am unable to create a usable
> dvm like in the aforementioned guide, primarily because ther
pleom...@gmail.com:
> philosofy of qubes is that you are safe when your app is isolatet.This is
> wrong just keep app in sandboxes or jails and what wrong can be happen?
Thanks for the spamfest. Looks like my null-routed email address list
finally has someone other than Drew in it. Next time
Rusty Bird:
> Hi Robert,
>
>> However I would not use the "move to VM" command like this, as I
>> experienced those requests getting lost One time files were
>> actually deleted, since that time I always use copy instead of
>> move.
>
> Sounds troubling. Do you remember the last Qubes release
Manuel Amador (Rudd-O):
> Folks, it gives me great pleasure to announce the product of over two
> years of work (primarily because I never paid enough attention to this
> project to bring it to completion): Qubes network server.
>
> The traditional Qubes OS networking model contemplates a client-o
m.j.p@gmail.com:
> hello, i'm just starting with qubes and wanted to have vm with intellij
> installed.
>
> i've choosen hvm to have my working apps only on one vm than via template.
Why are you using an HVM for that rather than a PV StandaloneVM? Am I
missing something?
Cheers,
-Jeremy
jidar:
> Howdy Qubes users, I've been following things for a while now and I've
> got a new laptop to run Qubes and will be submitting a HCL report after
> I work out all the kinks. The laptop is a Dell Precision 5510 with NVMe
> SSD, Xeon Processor and lots of ram. While working on this I've run i
raahe...@gmail.com:
> On Tuesday, October 4, 2016 at 12:13:38 PM UTC-4, cubit wrote:
>> 4. Oct 2016 16:04 by jerem...@airmail.cc:
>> I can confirm that I encountered this today. It was with a VM that had
>> been running for several days. I've encountered the same error (or one
>> similar to it) i
cubit:
> 4. Oct 2016 12:31 by a...@qubes-os.org:
>
>> Thanks for the report. Tracking:
>>
>> https://github.com/QubesOS/qubes-issues/issues/2362
>>
>
>
>
>
> Some unscientific testing.
>
>
>
>
> Trying a restart after 15 minutes of not doing a restart and the function
> works as expected
nishiwak...@gmail.com:
> Uh ok, this ipv6 listening on my template set me in full paranoid mode. I
> have found disappointing to see ipv6 wasn't disabled on Debian template, but
> yea sorry, I went completely mad & full retard mode about Qubes on the rest.
>
> I thought I was betrayed. I have be
nishiwak...@gmail.com:
> I won't wait another week with my HDD disabled by this OS.
I'm trying to figure out if this is a veiled threat of some kind...?
FWIW, I've booted from USB drives while Qubes was installed internally
before. I'm under the impression that lots of people here have done so.
neilhard...@gmail.com:
> I created a new Net VM, in order to use Debian, and it works fine.
>
> But now I want to revert back to sys-net.
>
> The problem is that my sys-firewall no longer works.
>
> How do I get sys-firewall to work again?
>
> It starts up fine, but simply doesn't work. Other A
entr0py:
>
> You're too modest. You make people's heads explode with your mastery of
> complex subjects - for fun!
Well, my head did kind of explode from reading those highly entertaining
highlights, but I think your explanation only is valid if "mastery" is a
signed variable.
> Just including
York Keyser:
> Hi group,
>
> I have a short, maybe stupid question, where or how can I see the
> available memory. Not the memory of each VM I need to know how much
> memory is availably global wide. (Short-term and Long-term memory)
>
> Regards York
Last I heard, there isn't an easy way to see
Achim Patzner:
> Am 28.09.2016 um 10:06 schrieb Drew White:
>> On Wednesday, 28 September 2016 17:47:01 UTC+10, Foppe de Haan wrote:
>>> On Wednesday, September 28, 2016 at 8:20:29 AM UTC+2, Drew White wrote:
Why does QWT require TESTSIGNING to be turned on?
Is that because Win7 requires
raahe...@gmail.com:
> On Tuesday, September 27, 2016 at 5:11:27 PM UTC-4, Jeremy Rand wrote:
>> raahe...@gmail.com:
>>> or just only allow https in the vm firewall settings.
>>
>> I assume you mean whitelisting TCP port 443? If so, be aware that while
>> t
johnyju...@sigaint.org:
>> The "listening" services are less of a concern, since the firewall
>> wouldn't permit any incoming connections to be passed through to start
>> with. It's the "phone home" style services, like time sync, Samba name
>> lookups on microsoft servers, and such, that are more
raahe...@gmail.com:
> or just only allow https in the vm firewall settings.
I assume you mean whitelisting TCP port 443? If so, be aware that while
this will stop most non-HTTPS traffic, there is nothing that prevents
other protocols from using port 443. It's a fairly well-known attack on
Tor's
'Gabriel' via qubes-users:
> Hi fellows,
>
> I started using qubes a while ago and I have a question concerning backups.
> What I want is a complete backup to a dedicated external USB HDD. I
> understand to achieve this all the VMs must be shut down.
> Therefore when I plugged in the HDD I mounte
7;t know if
that setup is still maintained, but yes, it has been thought of.
Also, I think SecureDrop uses 4 physical machines, 1 of which runs Tor
and another of which runs the hidden service, a 3rd of which is offline
completely (I can't remember the purpose of the 4th offhand). So it
Dima Puntus:
> AFAIK, Qubes is still using the old Fedora 20 video drivers (even
> for Intel IGPs), while Fedora 25, Wayland enabled is only 2 months away.
AFAIK Qubes 3.2 is using Fedora 23 for dom0, meaning the video drivers
should be the same as what's in Fedora 23.
Cheers,
-
nekroze.law...@gmail.com:
> On Tuesday, August 30, 2016 at 12:57:54 PM UTC+10, Jeremy Rand wrote:
>> Seems to me that an attack could be constructed where the Tor exit used
>> for update downloads feeds sys-whonix an exploit, and from there is able
>> to either break out of T
Granted, this is a fairly lousy attack as attacks go, but isn't the
entire point of Whonix that nothing is supposed to run inside the Whonix
gateway except Tor?
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
T
Cube:
> On Saturday, August 27, 2016 at 10:50:20 AM UTC-7, Cube wrote:
>> This would be more in the style of Tails - no persistent state.
>
> Wups, there is some thought on this already
>
> https://www.whonix.org/wiki/Qubes/Disposable_VM
>
> There are issues, anybody try this?
I use Whonix as a
.
Since my main display is much higher resolution than the external
display, the result is that the presentation appears zoomed in, with
much of the border cut off.
Note that I'm using the jessie-backports version of LibreOffice in my
Debian/Whonix VM's.
Any idea what might be causing th
whoever it likes.
(Unless I'm misunderstanding what you're doing.)
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qube
ead.
OpenSSL is used for lots of things that aren't network-related. I'm
under the impression that OpenSSL is used for the Qubes backup/restore
system. A Qubes devloper would be able to answer with more certainty.
-Jeremy Rand
--
You received this message because you are subscribed to th
in fixed it for me. Might
have been a server issue on Fedora's end.
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-us
e that internally
used RAID0, so it's probably faster than most. Might I ask whether your
external USB drive was USB2 or USB3, whether it was an HDD or SSD, and
whether it used RAID0?
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
So, my guess is that the issue you're encountering either was fixed
between 3.1 and 3.2rc1 (and didn't seem to exist in 3.0rc1), or is in
some way unique to your setup. Maybe a hardware issue?
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
neilhard...@gmail.com:
> So you're saying that you can run an entire Xen exploit without installing
> anything to the hard drive at all... Just purely run it in the RAM itself.
Well, most GNU/Linux systems have a /tmp/ partition, which acts like a
hard drive but is backed by RAM. So even if you
d in the VM will disappear when the VM is closed. This
would, presumably, mitigate persistent malware placed via Firefox
exploits, but won't help against malware that combines a Firefox exploit
with a Xen exploit. It still seems like an improvement against the
default configuration.
Cheers,
-Jerem
oomsday scenarios.)
Is my intuition on this corect?
Of course, using a separate VM means increased RAM usage, which may or
may not be worth it.
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubsc
Marek Marczykowski-Górecki:
> On Wed, Jul 27, 2016 at 09:53:00AM +0000, Jeremy Rand wrote:
>> 45in10+d44wd6z0yzqcg via qubes-users:
>>> The proposed workaround solved part of the issue, however I'm still facing
>>> issues with application windows that are
45in10+d44wd6z0yzqcg via qubes-users:
> The proposed workaround solved part of the issue, however I'm still facing
> issues with application windows that are not displayed as outlined on my
> previous comment:
>
> Since this update every time a command is launched, when the respective AppVM
> i
Marek Marczykowski-Górecki:
> On Wed, Jul 27, 2016 at 04:32:24AM +0000, Jeremy Rand wrote:
>> Marek Marczykowski-Górecki:
>>> On Tue, Jul 26, 2016 at 03:11:33PM -0700, Andrew David Wong wrote:
>>>> On 2016-07-26 14:52, Manuel Amador (Rudd-O) wrote:
>>>>>
Jeremy Rand:
> Marek Marczykowski-Górecki:
>> On Tue, Jul 26, 2016 at 03:11:33PM -0700, Andrew David Wong wrote:
>>> On 2016-07-26 14:52, Manuel Amador (Rudd-O) wrote:
>>>> Hello. I just did an update, rebooted, and now my window borders do not
>>>>
fedora-23 TemplateVM.
_QUBES_LABEL is 8.
_KDE_NET_WM_COLOR_SCHEME is
"/home/jeremy/.local/share/qubes-kde/black.colors".
_QUBES_LABEL_COLOR does not show up in the xprop output at all.
Hope this helps in diagnosing.
Cheers,
-Jeremy Rand
--
You received this message bec
my use
cases being able to test software I write on the latest OS release is a
higher priority, so it's doing its job just fine.
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
Andrew David Wong:
> On 2016-07-18 01:27, Jeremy Rand wrote:
>> Hello,
>
>> Might there be any plans to allow sending a directory to a DispVM? Right
>> now in Qubes 3.2 rc1, attempting to do so from the file manager GUI in a
>> Fedora 23 template yields this e
x27;t see any mention of
this topic.)
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To pos
work is very much appreciated by the vast majority of
Qubes users. Keep on doing what you're doing!
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06/27/2016 04:45 AM, 41zxmg+5qvzr7o3u2us via qubes-users wrote:
> Jeremy,
>
> You are awesome, that does work indeed. The tutorial is a bit
> unclear, but when I add this as two separate lines it works
> smoothly :)
>
>
> Many thanks :)
Glad I
le bit more clear? I'm totally okay with the fact that I lost a
few hours debugging this (I'm using a release candidate, after all),
but I imagine some users might find this frustrating.
Cheers,
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXcPKfAAoJEAHN/E
61 matches
Mail list logo