Hello dear Qubes OS Berlin users!
This is the monthly reminder of the upcoming Qubes Users Berlin Meetup! :)
We will meet this Friday from 6 p.m. till 8 p.m. at xHain, a hack+makerspace at
Grünberger Str. 16 in Friedrichshain.
The usual topics have one new exciting addition - i3:
- Give i3
Hi Qubes-Users,
following notes for the HCL-entry for my GPD Win MAX 2 2025 (Ryzen AI
HX370, 64GB RAM, 4TB Samsung 990Pro):
- had to use the latest kernel with Fedora-templates for the sys-vms
Pro:
- runs stable for me
- all Hardware-components (network, video, camera, speaker, microphone
Hello dear Qubes OS Berlin users!
A shoutout to everyone who attended our April meetup with a quick recap!
We did discuss some pretty cool topics:
1. We got a peak into a very exciting Qubes OS feature in development by Ben -
preloaded disposable qubes
2. Salted site-specific browser qubes
11 PCI Express Gigabit Ethernet
Controller [10ec:8168] (rev 0e)
Intel Corporation Wi-Fi 6 AX210/AX211/AX411 160MHz [8086:2725] (rev 1a)
memory: |
64302
scsi: |
usb: |
2
certified:
'no'
versions:
- works:
yes
qubes: |
R4.2.4
xen: |
4.17.5
kernel: |
6.6.77-1
remark: |
I upgraded the initial 8GB of
Hello dear Qubes OS Berlin users!
This is the monthly reminder of the upcoming Qubes Users Berlin Meetup! :)
We will meet this Friday from 6 p.m. till 8 p.m. at xHain, a hack+makerspace at
Grünberger Str. 16 in Friedrichshain.
The usual topics have two new exciting additions - Salt & And
Any suggestions on how to troubleshoot this further?
Best,
G.P.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
T
Good day, community!
Sometimes (usually directly after VM's start) i have random qubes-guid
crash for different VMs. The issue is rare but sometimes gets annoying
requiring to restart VMs several times to get their GUI finally working.
Usually the crash is happening directly after VM
On Tue, Mar 25, 2025 at 07:19:12PM +0400, preven...@dnmx.su wrote:
> The tool `qvm-get-image` in `dom0` is really poorly explained. No manual
> and `--help` only says "Secure copy of images between virtual machines."
> One must visit the
> [code](https://github.com/Qubes
On Tue, Mar 25, 2025 at 11:00:00PM +, Qubes wrote:
> > What was that "same procedure"?
> By that i mean i follow the same install procedure for my templates as i
> have before, so i am installing the exact same packages as i always have.
> Here i am mostly focus
'unman' via qubes-users wrote:
On Sun, Mar 23, 2025 at 05:45:00PM +0000, Qubes wrote:
Recently, after upgrading to 4.2.4, i installed Krusader in the Fedora 41
xfce template, following the same procedures as i have done in the past on
my templates (meaning the same base packages are
Hello dear Qubes OS Berlin users!
This is the monthly reminder of the upcoming Qubes Users Berlin Meetup! :)
We will meet this Friday from 6 p.m. till 8 p.m. at xHain, a hack+makerspace at
Grünberger Str. 16 in Friedrichshain and pick up where we left off at the end
of November. :)
The topics
ype=Application
and then you can use "open with", "select app" click it and from that
day on, you'll have a qvm-copy back.
best, Bernhard
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from thi
On Sun, Mar 23, 2025 at 05:45:00PM +, Qubes wrote:
> Recently, after upgrading to 4.2.4, i installed Krusader in the Fedora 41
> xfce template, following the same procedures as i have done in the past on
> my templates (meaning the same base packages are installed like always), but
&g
Hi
I have been using the Krusader file manager for many years, starting to
use it on Qubes from 4.0 with Debian and later with Fedora templates.
Recently, after upgrading to 4.2.4, i installed Krusader in the Fedora
41 xfce template, following the same procedures as i have done in the
past
y: |
32472
scsi: |
usb: |
3
certified:
'no'
versions:
- works:
yes
qubes: |
R4.2.4
xen: |
4.17.5
kernel: |
6.6.77-1
remark: |
The iwlwifi driver in sys-net tends to crash when waking up from suspend
(page allocation failure); bumping
tel Corporation Alder Lake-P PCH CNVi WiFi [8086:51f0] (rev 01)
memory: |
31952
scsi: |
usb: |
4
certified:
'no'
versions:
- works:
'FIXME:yes|no|partial'
qubes: |
R4.2.4
xen: |
4.17.5
kernel: |
6.6.77-1
remark: |
FIXME
credit: |
FIXAUTHOR
link: |
FIXLINK
Sent with [Proton Mail]
Hi
I need to upgrade to the latest version of Qubes OS. I am wondering,
would someone know, if i restore fedora-37 templates on 4.2.4, will they
work?
I was going to make my upgrade path a little easier by first upgrading
my fedora-37 templates on 4.1.2 to fedora-39, back them up, and then
Hi
When you click on the blue Qubes Domains icon in the notification area a
menu drops down showing the user the running VMs, and if you hover your
mouse on a VM a menu pops out to the right with basic VM tasks, like
`Shutdown`, `Restart`, etc. Is it possible to add an item to this menu?
For
en fixed and at least some of the missing
mail has been delivered, but I know nothing about notifications.
--
I never presume to speak for the Qubes team.
When I comment in the mailing lists I speak for myself.
--
You received this message because you are subscribed to the Google Groups
&quo
> I confirm this.
>
> The last message I had was this:
> Date: Tue, 25 Feb 2025 13:49:50 +
> From: Qman via Qubes OS Forum
> Subject: [Qubes Forum] Secureblue for Default TemplateVM and Dom0? [General
> Discussion]
>
> I think that my mails are not being poste
lthough there are new posts, e.g. in section Guides. (No, spam filters
> are not blocking it.)
>
> Can someone have a look and provide feedback please?
>
I confirm this.
The last message I had was this:
Date: Tue, 25 Feb 2025 13:49:50 +
From: Qman via Qubes OS Forum
Subjec
Hello dear Qubes OS Berlin users!
This is the friendly monthly reminder of the upcoming Qubes Users Berlin
Meetup! :)
We will meet this Friday from 6 p.m. till 8 p.m. at xHain, a hack+makerspace at
Grünberger Str. 16 in Friedrichshain and pick up where we left off at the end
of November
Hello dear Qubes OS Berlin users!
This is the friendly monthly reminder of the upcoming Qubes Users Berlin
Meetup! :)
We will meet this Friday from 6 p.m. till 8 p.m. at xHain, a hack+makerspace at
Grünberger Str. 16 in Friedrichshain and pick up where we left off at the end
of November
On November 18, 2024 1:30:45 PM UTC, Simon Newton
wrote:
>On Mon, 18 Nov 2024 at 13:25, 'Roger Paranoia' via qubes-users <
>qubes-users@googlegroups.com> wrote:
>
>> Hello
>>
>> I've just oppened a browser (brave) on a dispvm and it doesn
t all? Has this happened to anybody
else?
Thanks in advance!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com
I'm back online to find that the server hosting the Onion site is down
for maintenance.
Apologies for the lack of notice - I had notification but did not see it
until today.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
fs default-dvm template debian-12
thank you. Bernhard
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To v
t] [--help] [--help-properties]
[--hide-default] [--get] [--set]
[--default] VMNAME [PROPERTY] [VALUE]
qvm-prefs: error: no such property: 'template'
That is where I was stuck with the manual best, Bernhard
--
You received this message because you are subscribed to the Google
take it as well. Cheers, Bernhard
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this dis
Hello dear Qubes OS users and especially those in Berlin! :)
Qubes Users Berlin have been back on track for some time now!
It was in silent mode due to time and resource constraints,
but the monthly topic/discussion meetup is now officially resuming with this
announcement:
We will meet every
dsx3wNuGN2hjAuWTgv
FOgWaFNd1MJ6+QKyBAcw4lANBgy2NUhw6smAy1qwColQ4P64eP0CJAgPCjwHHHym
jkOl+H+D/lbld0RjpHe6L2RkwvZ8l0Dvxjggtzjrd/O4DIqrplm3Cyo+yJKjZkhO
zL+txZb6HSfVjupwcRJgocarwnanSGqdN+cPcD6cgvyqdkayww==
=vCPI
-END PGP SIGNATURE-
--
You received this message because you are subscribed to the Google
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
'Rusty Bird' via qubes-users:
> Marek Marczykowski-Górecki:
> > On Wed, Oct 16, 2024 at 04:28:14PM +, Rusty Bird wrote:
> > > Also, on file-reflink
> > > systems, where the dom0 root filesystem is storing (p
oO85
FTeZTcvuF54Wz1d38aGNc2YKmS8r8EVOCytzu5yEFFOFrm4E4lCYUM6A0rBgywaN
yQYI46s4LVX+bcV80p6glQXHUpB40nFJ1xTmk6Y6sWMbdf4DdrIwPRKLkGVSCcwU
6IAvrZnpx5NIH/6nXR9MgY9aSKpgT6ZFZj7BNAMj9V2S/2l+OoJ8JvZsuqNJ/+uf
3UWaA9mlrGoso+as76dK0I+KUqR9/Gm2vyX1IJQCfwRNcOQVltY=
=mp6H
-END PGP SIGNATURE-
--
You received this message because you are subscri
trim /var/tmp/
real4m29.240s
So now I'm thinking fstrim is overkill just to install a template.
Instead, maybe Salt or something could ensure that everyone (including
people who installed via qubes-dist-upgrade) has the 'discard' mount
option (or 'discard=async'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Boryeu Mao:
> On Tue, Oct 15, 2024 at 3:59 AM Rusty Bird wrote:
> > Boryeu Mao:
> > > For the template install command on Qubes release 4.2.3
> > >
> > >sudo qubes-dom0-update qubes-template-fedora-40-mini
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Boryeu Mao:
> For the template install command on Qubes release 4.2.3
>
>sudo qubes-dom0-update qubes-template-fedora-40-minimal
>
> I received a message that
>
>fstrim: /var/tmp/tmpsd1ns61v/var/lib/qubes/vm-
On Sat, Oct 05, 2024 at 08:21:24PM +0200, roger paranoia wrote:
> Hello
>
> I am trying to verify the templates downloaded from:
>
> https://qubes.3isec.org/rpm/r4.2/templates/qubes-template-jammy-minimal-4.2.0-202405182317.noarch.rpm
> https://qubes.3isec.org/rpm/r4.2/templa
Dear all,
on a standard linux distro, flashing microcontrollers like arduino,
esp32, and many others is quite straightforward. Of course I may
mimick this on qubes: create a "flash" qube, give it acces rights to USB
controller, run alternatively sys-usb or "flash" and fla
https://github.com/apebl/gnome-ext-qubes-window-borders
I’ve created a GNOME Shell extension for Qubes OS that adds colored
borders to windows. I hope this is useful for you.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
Hello!
I'm trying to upgrade a standalone Debian 11 qube from Qubes OS 4.1
to Debian 12 on Qubes OS 4.2.
I started by making a backup from the standalone on Qubes OS 4.1.
Then I restored it on a fresh Qubes OS 4.2 installation.
Inside that restored standalone I run the upgrade script:
On Monday, July 29th, 2024 at 08:28, colony.three via qubes-users
wrote:
>
>
> > My recommendation is:
>
> > 1. Create a trusted VM to run WireGuard or a key-protected onion
> > service.
> > 2. Allow that VM (and only that VM) to connect to sshd in dom
be, but a template is in effect a whole OS.
On one machine I don't want to install all my server software in template
debian, just to spin off qubes from it. Do I have to clone template debian for
each individual service?
I've tried to understand this but it doesn't addr
On Saturday, July 27th, 2024 at 12:53, Demi Marie Obenour
wrote:
>
>
> On Thu, Jul 25, 2024 at 02:09:02PM +0000, Qubes OS Users Mailing List wrote:
>
> > The server is a headless lights-out deal, and actually what I'd like to do
> > is connect x2go to d
n log as user where user refers to the first dom0 user in qubes group and
with corresponding dom0 password
This is indecipherable.
Running sudo qubesctl --all state.highstate took a long time, until the first
stage timed out as unable to reach the network. No wonder, /etc/resolv.conf
symlinks
On Mon, Jun 17, 2024 at 12:02:25PM +0200, 'Rune Philosof' via qubes-users wrote:
> Also, if this was a rarely used appvm, then I might not have noticed that
> the problem started due to a template vm upgrade.
> I also might not have the old template vm present on my system to s
simplest to implement is probably to remove the time out, and have the
user kill the vm if it takes too long.
But that might be problematic in the case of service vms that start at
boot? If so, the time out could be conditional.
On Mon, Jun 17, 2024 at 11:23 AM 'Rune Philosof' via qubes-use
After updating from `fedora-38` to `fedora-39`, I have some AppVMs that I
am unable to boot because `qubes-relabel-rw` takes more than 60s.
The VMs have large `/rw/bind-dirs/var/lib/docker`.
I can clean my docker state before making the template switch, but it would
be nice to avoid having to
ebian AppVM Firefox,
it works like a breeze.
It seems that it could be an issue with the Whonix. Are there any
limitations in the Whonix design that prevent the beast from connecting
to the VPN over Tor? I remember that the 1.4.4 in the Qubes 4.1 it was
working.
Any workarounds?
'taran1s&
That seems promising.
Does it mean that the whole procedure is still the same just instead of
unzipping the 1.4.4 one downloads the replace-iptables-with-nftables and
it should work as the original 1.4.4 on Qubes 4.1.
Will it work as a VPN over Tor including the Tor browser?
Chris Bensch
> Do you have any recommendation how to solve that?
I just use a simplified version of
https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/
to run the Mullvad GUI directly. Going by the time stamp on my note
file, it has been working very reliably for most of a year now,
Does anyone have the VPN running through the srcipt from tasket? Were
there any changes in the 4.2 that can prevent it to run?
https://github.com/tasket/Qubes-vpn-support/tree/v1.4.4
I can get the VPN running from within the vpn proxy (I know it is not
recommended) and firefox shows it exits
ceived this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msg
ror as the original media qube.
I add MimeType=video/x-matroska to the desktop file and re-run the xdg-mime
command.
I still get the same error.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop r
video/webm) to the .desktop file being
used, before running xdg-mime, to get it to work.
> And there it is: xdg-open wrongly detects gnome3 which is not
> installed. Then I checked:
>
> $ printenv | grep XDG_CURRENT_DESKTOP
> XDG_CURRENT_DESKTOP=X-QUBES ## NOT XFCE, which is th
with qvm-copy works.
Opening the copied files with xdg-open or qubes-open works in the dvm.
Opening media files in mplayer in the disposable qube with qvm-open-in-dvm used
to work.
It stopped working after I switched the media qube's template from
debian-11-minimal to debian-12-minimal.
I use
I have a simple question, around "things that you have" (like sec.
tokens, etc).
Many "fido tokens" (yubi, nitro, google) allow NFC communication, most
computers as well, but i do not find anything in my qubes (maybe the
chips acts as USB client and my USB is down by defa
r. Is it possible to
> > designate an appVM to behave similarly so it won't get shutdown
> > accidentally?
>
> Not as a user-facing feature AFAIK. But you could use the qubes.ext
> Python entry point
>
> https://github.com/QubesOS/qubes-core-admin/blob/v4.2.21/qube
an appVM to behave similarly so it won't get shutdown
> accidentally?
Not as a user-facing feature AFAIK. But you could use the qubes.ext
Python entry point
https://github.com/QubesOS/qubes-core-admin/blob/v4.2.21/qubes/ext/__init__.py#L57-L59
to add another "domain-pre-shutdown
On 2024-03-26 23:05, 'జిందం వాఐి' via qubes-users wrote:
On 2024-03-26 22:18, Andrew David Wong wrote:
On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote:
As you can see, only Intel processors are listed. I'm not personally
aware of any changes since then, b
On 2024-03-26 22:18, Andrew David Wong wrote:
On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote:
As you can see, only Intel processors are listed. I'm not personally
aware of any changes since then, but when it comes to Qubes-certified
hardware, you should always consu
* i see an option to purchase
laptop for amd also on their
website
* is this certified with only
intel?
--
regards,
జిందం వాఐి [ jindam, vani ]
web_ jindam.neocities.org
[matrix]_ @jindam:oikei.net
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
Sorry, i discuss in the Qubes Communityfaster responses, better
systemthen google groups
Bapak Ireng schrieb am Montag, 25. März 2024 um 16:32:33 UTC+1:
> i tried sudo /usr/libexec/initial-setup/initial-setup-graphical
>
> and the following is the output / result:
>
>
&
i tried sudo /usr/libexec/initial-setup/initial-setup-graphical
and the following is the output / result:
i tried to sent pictures, but google did not let me sent them. Sh
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
Hi, after successfully installing Qubes 4.2 i am left all alone to
configure network (internet) Access.
I appreciate it very much if somebody could guide me to the right options.
The question is so vague, no one can reasonably answer it.
Does sys-net start on boot?
Does it have access to
Hi, after successfully installing Qubes 4.2 i am left all alone to
configure network (internet) Access.
I appreciate it very much if somebody could guide me to the right options.
Best regards, Bapak Hitam
--
You received this message because you are subscribed to the Google Groups
"
It was not fixed...
Apparently just an example of how random it is.
It was working for an hour or so. Now it is back to mic not working, just
sending out that beep beep sound.
On Wed, Mar 20, 2024 at 9:16 AM 'Rune Philosof' via qubes-users <
qubes-users@googlegroups.com> wrote:
Without seeing the screenshot, I think I know the issue.
They are from the same repository.
qvm-template lists *all* the template in the repo, whereas
qvm-template-gui filters to only show the most recent supported
versions.
--
I never presume to speak for the Qubes team.
When I comment in the
ound. I have attached a 3
> second recording of the ticking sound.
>
> I have not changed any audio settings.
> I have tested with two different usb soundcards.
> It worked in Qubes 4.1.
>
> I wonder what has changed in the audio setup from Qubes 4.1 to 4.2.
>
> On Thursda
Hi one7two99,
I have Qubes and Linux already installed in different partitions in legacy
mode and both work fine. Now I need to install windows 10 (to run Fusion
360 for personal use). I don't want to install it as a qube as my hardware
is not very powerful. I don't need Bitlocker.
Suspend works
On Monday, March 4th, 2024 at 2:33 PM, 'bozoslivehere' via qubes-users
wrote:
> ---layout:
> 'hcl'
> type:
> 'Mini PC'
> hvm:
> 'yes'
> iommu:
> 'yes'
> slat:
> 'yes'
> tpm:
&g
Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit
Ethernet Controller [10ec:8168] (rev 15)
Intel Corporation Wi-Fi 6 AX200 [8086:2723] (rev 1a)
memory: |
29618
scsi: |
usb: |
4
certified:
'no'
versions:
- works:
'FIXME:yes|no|partial'
up, can you run `sudo journalctl -b ` in sys-net and look for
any entries relating to networking devices.
It may be that you need specific drivers for the NIC, so knowing what it
is would be a help.
--
I never presume to speak for the Qubes team.
When I comment in the mailing lists I speak for m
microphones.
but somehow the "default" speaker now outputs through the usb device.
In 4.1 it would either work for both mic and speaker or for none.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and s
best, Bernhard
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://group
the result might be
```bash
#!/bin/bash --
exec qvm-run-vm @dispvm /bin/firefox -- "'${1//\'/\'\\\'\'}'"
```
[/quote]
I believe this is a script improvement. The URL is not trusted data and
these safeguards do not have an impact on valid inputs.
--
You re
; I have only used in in policy files, but I assume
that it will work here too so long as you are running 4.1 or newer. So
the new file would look like this:
```bash
#!/bin/bash
qvm-run-vm '@dispvm' /bin/firefox "'$1'"
```
--
You received this message because you ar
On Thu, 22 Feb 2024 22:19:21 +0100
Ulrich Windl wrote:
>On 2/22/24 22:15, Ulrich Windl wrote:
>> On 2/22/24 21:54, 'Stuart Perkins' via qubes-users wrote:
>>>
>>> On Thu, 22 Feb 2024 21:25:18 +0100
>>> Ulrich Windl wrote:
>>>
>&g
On Thu, 22 Feb 2024 21:25:18 +0100
Ulrich Windl wrote:
>Hi!
>
>
>I managed to configure Thunderbird to run any links via a DVM. However
>today I realized that URLs with parameters are truncated (Qubes-OS 4.2)
>after the first parameter it seem.
>
>Fo
nters?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.goo
Hi
Am Sa., 17. Feb. 2024 um 08:10 Uhr schrieb 'haaber' via
qubes-users :
Hi
> I tried to upgrade my Qubes OS system from 4.1.2 to 4.2.0
using the
> "qubes-dist-upgrade" script.
...
>
OK, I am not an
Hi
I tried to upgrade my Qubes OS system from 4.1.2 to 4.2.0 using the
"qubes-dist-upgrade" script.
The upgrade failed - and - now the system is in a 'weird' state.
None of the Fedora- or Debian-based VM have 'external / public'
network access anymore.
The '
152.fc38
>
> xorg-x11-server-common 1.20.1428.fc38 -> 1.20.1429.fc38
>
> xen-licenses 4.17.25.fc38 -> 4.17.26.fc38
>
> amd-gpu-firmware 202312111.fc38 -> 202401152.fc38
>
> amd-ucode-firmware 202312111.fc38 -> 202401152.fc38
>
> atheros-firmware 2023
Dear unman & qubes -community,
I am still on Q4.1 (no time to do a full install now). Since a few days,
my time ran large out of sync, despite the swdate displaying normal
functioning. I rebooted, I restarted swdate. Its log says:
[INFO] date output: 10:44:44
(which is London time,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Boryeu Mao:
> > For R4.1.2 I had some RPC calls with + and - characters in the file
> > name. These are considered as invalid characters to be part of service
> > names in the new qrexec policy format (e.g. in
> >
Hi Unman
I reply inline below.
On 2/6/24 11:45, 'haaber' via qubes-users wrote:
Hi,
I am still on Q4.1 (no time to do a full install now). Since a few days,
my time ran large out of sync, despite the swdate displaying normal
functioning. I rebooted, I restarted swdate. It
On Tue, Feb 06, 2024 at 01:08:09PM +0100, 'haaber' via qubes-users wrote:
> addendum: if I run "date" in a client VM it will give the right
> timezone, but still has 3min of delay..
>
> On 2/6/24 11:45, 'haaber' via qubes-users wrote:
> > Hi,
&
addendum: if I run "date" in a client VM it will give the right
timezone, but still has 3min of delay..
On 2/6/24 11:45, 'haaber' via qubes-users wrote:
Hi,
I am still on Q4.1 (no time to do a full install now). Since a few days,
my time ran large out of sync, despite t
-to-Berlin-time
clock displays 10:42 which is 1h and 3min wrong. If it was 1h exactly,
I'd guess a user-malconfig, but 3min ??
do you have some hints on that?
Thank you, Bernhard
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet
Controller [10ec:8168] (rev 07)
memory: |
65410
scsi: |
Samsung SSD 870 Rev: 1B6Q
usb: |
1
certified:
'no'
versions:
- works:
'yes'
qubes: |
R4.2.0
xen: |
4.17.2
kernel: |
6.1.62-1
remark: |
Everything seems fine
credit: |
code
Can a librem key or yubikey be used to unlock a LUKS filesystem at boot in 4.2?
Wasn’t the issue previously related to dom0 being too old?
Thanks
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
roller])
gpu-short: |
FIXME
network: |
Intel Corporation Wi-Fi 6 AX201 [8086:a0f0] (rev 20)
memory: |
16073
scsi: |
usb: |
3
certified:
'no'
versions:
- works:
'FIXME:yes|no|partial'
qubes: |
R4.2.0
xen: |
4.17.2
kernel: |
6.1.62-1
Hi,
Part of the answer may be that Q4.2 switched from iptables to nftables
and qubes-tunnel has not been adapted for this
(However I am not sure whether this holds for fedora38 templates that
were in-place upgrades from 4.1 to 4.2 or only for "native" 4.2
templates obtained from
Hi,
The forum post does not use qubes-tunnel and I do not use wireguard (but
openVPN) - so I do not see how this post solves my issue?!
On 1/6/24 12:06, code9n wrote:
Hi,
This is on the Forum:
https://forum.qubes-os.org/t/wireguard-vpn-setup/19141
cheers,
On Saturday 6 January 2024 at 00
Hi there,
vpnVM and netVM both in-place upgrades from Q4.1 (and worked fine
there). Template is fedora 38.
NetVM is online, ping of vpn server hostname is fine within netVM.
Ping and dig do not work within vpnVM, but afair that is intended (leak
prevention of qubes-tunnel)
I tried to restart
Major issue is that the touchpad does not work.Suspend/wake does work fine.Have not tested much beyond the above.Thanks.
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from i
Most features works flawlessly.
I did not test suspend / sleep.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.co
I actually had a similar issue. It ended up being a BIOS that refused to
detect rc3 is ISO format. Mounting the ISO and copying the files over to
a FAT formatted USB got around the boot issue but the qubes installer
doesn't see it's root partition then.
The working solution was to i
Works out of the box:
- networking (usb2lan)
- keyboard backlight
- build-in bluetooth
- sound
Works after tweaking:
- sceen is flickering unless adding "i915.enable_psr=0" in
/boot/efi/EFI/qubes/xen.cfg, more details:
https://wiki.archlinux.org/title/inte
l -f only shows successes while running the command.
I tried to remove i3lock in case of conflict, but i3-settings-qubes depends on
it.
I tried to compile slock without any patches, same error when running that.
I managed to get it to run with the PAM_auth patch, which replaces the use of
shadow, but I
a1) (prog-if
00 [VGA controller])
gpu-short: |
FIXME
network: |
Intel Corporation Ethernet Connection (2) I219-LM (rev 31)
Intel Corporation Wireless 8265 / 8275 (rev 78)
memory: |
16035
scsi: |
SAMSUNG MZ7LN256 Rev: 1H3Q
usb: |
1
versions:
- works:
'FIXME:yes|no|partial'
qubes: |
R4.1
xen
1 - 100 of 3198 matches
Mail list logo