[qubes-users] Thinkpad T450s - After upgrade to 3.2, can't boot into new 4.4 kernel

2017-03-26 Thread miguel . jacq
Hi, On the weekend I upgraded my Qubes 3.1 to 3.2, on my Thinkpad T450s. (I had attempted a fresh install with the 3.2 ISO, but found that I could not actually get the installer going, likely due to UEFI issues as per the docs [1]. However 'use rEFInd' per the docs meant absolutely nothing to m

[qubes-users] Re: Thinkpad T450s - After upgrade to 3.2, can't boot into new 4.4 kernel

2017-03-26 Thread miguel . jacq
On Monday, March 27, 2017 at 1:51:34 PM UTC+11, migue...@gmail.com wrote: > Thanks! Forgot to add - yes, my BIOS settings are as per the bottom section 'Instructions for getting your Lenovo 450 laptop working with Qubes/Linux' of https://www.qubes-os.org/doc/thinkpad-troubleshooting/, though I s

[qubes-users] Re: Qubes 3.2 won't boot with newer kernels on Lenovo T450

2017-05-10 Thread miguel . jacq
Hi, On Wednesday, May 10, 2017 at 2:43:15 PM UTC+10, koto...@gmail.com wrote: > I currently have XEN 4.6.5 and the following kernels: > 4.4.62-12 - goes to infinite boot > 4.4.38-11 - same > 4.1.24-10 - boots fine I had the same problem on my T450S. I seem to have solved it by changing the Grap

[qubes-users] Re: start application on startup

2017-05-21 Thread miguel . jacq
Hi, On Sunday, May 21, 2017 at 4:47:19 AM UTC+10, aforete wrote: > Am I doing something wrong here? is there any other way to start > applications once a vm starts? Yes, you can do the following in your AppVM: 1) make the directory /home/user/.config/autostart if it doesn't already exist 2) add

[qubes-users] Split SSH

2017-05-21 Thread miguel . jacq
I haven't seen it discussed yet here, but some users might be interested to know that there's a Split SSH agent implementation at https://github.com/henn/qubes-app-split-ssh I am unsure if the developer intends to work further on it. Therefore, users may also be interested in several pull reque

[qubes-users] qubes-template-debian-7 missing?

2016-10-19 Thread miguel . jacq
Hi, I'm trying to install the Debian 7 (Wheezy) template on Qubes 3.1. Per https://www.qubes-os.org/doc/templates/debian I run: sudo qubes-dom0-update qubes-template-debian-7 The result I get is No Match for argument qubes-template-debian7 Nothing to download Has the template disappeared? M

[qubes-users] Re: qubes-template-debian-7 missing?

2016-10-19 Thread miguel . jacq
Looks indeed like it is missing from http://yum.qubes-os.org/r3.1/templates-itl/rpm/ but is present in 3.0 at http://yum.qubes-os.org/r3.0/templates-itl/rpm/ Docs probably need updating if this was deliberate. A shame as Debian 7 still gets 'long term support' security updates so would still be

[qubes-users] Re: No Kernel update since dirtycow (copy-on-write) exploit?

2016-11-03 Thread miguel . jacq
On Saturday, October 29, 2016 at 5:27:11 AM UTC+11, dede wrote: > Qubes still use 4.4.14-11. > > So it's still vulnerable, right? > > Even qubes not like a normal linux distribution i would sleep better if > we get a update. I'd second this, and I'm surprised not more people are talking about i

Re: [qubes-users] Re: No Kernel update since dirtycow (copy-on-write) exploit?

2016-11-03 Thread miguel . jacq
On Friday, November 4, 2016 at 9:27:24 AM UTC+11, Marek Marczykowski-Górecki wrote: > > In Qubes VM, it's nothing more than "sudo -s" which you have for free > already. Basically, the idea is that someone get code execution in the > VM, there is nothing worse in that VM. Getting root gives you no

[qubes-users] Intrusion detection daemons in VMs

2016-11-03 Thread miguel . jacq
Coming out of a discussion in https://groups.google.com/forum/#!topic/qubes-users/hs2yapPlUVA I am interested, does anyone run intrusion detection tools within their VMs? I use OSSEC [1] extensively elsewhere (on servers), but not sure it would work so well in agent-server model in Qubes. 'l

Re: [qubes-users] Intrusion detection daemons in VMs

2016-11-04 Thread miguel . jacq
On Friday, November 4, 2016 at 8:35:14 PM UTC+11, Laszlo Zrubecz wrote: > Another - currently implementable - way to use a proxy VM (as it is > currently used as a dnf/yum proxy) and install your desired intrusion > detection software there. > Suricata is a good candidate for such thing: > https://

Re: New Tor Browser behavior (Re: [qubes-users] Upgrading to Fedora 32...)

2020-06-19 Thread miguel . jacq
Hi, On Tuesday, June 16, 2020 at 2:00:44 AM UTC+10, Sven Semmler wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 6/14/20 5:37 PM, Ulrich Windl wrote: > > Tor browser 9.5 suggests ".onion available", but when clicking on > > it, you end up on a different page. Is that inten

Re: New Tor Browser behavior (Re: [qubes-users] Upgrading to Fedora 32...)

2020-06-19 Thread miguel . jacq
On Saturday, June 20, 2020 at 4:13:28 PM UTC+10, migue...@gmail.com wrote: > > > https://github.com/QubesOS/qubesos.github.io/blob/be1a8b965c518fd4b5711a9540fccfd9561ca4bb/_includes/head.html#L5 > >

[qubes-users] Yum errors trying to update dom0 on Qubes 4.0

2021-01-14 Thread Miguel Jacq
Hi, My 'Qubes Updates' notifier told me there were updates available for the dom0. I tried running my usual command: qubes-dom0-update --enablerepo=qubes-dom0-security-testing --clean but I am getting the error below. Any ideas? This is Qubes 4.0, and the Debian repository for my TemplateVM

[qubes-users] Re: Yum errors trying to update dom0 on Qubes 4.0

2021-01-14 Thread Miguel Jacq
I guess it was a transient thing, as it's now working fine. On Friday, January 15, 2021 at 12:59:51 PM UTC+11 Miguel Jacq wrote: > > Hi, > > My 'Qubes Updates' notifier told me there were updates available for the > dom0. > > I tried running my usual command: