Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Wednesday, July 3, 2019 5:24 AM, Sphere wrote:
> You're welcome and good luck!
> In any case, I was reminded that any sort of communication between
> non-interconnected qubes are not allowed. So even if both of your AppV
You're welcome and good luck!
In any case, I was reminded that any sort of communication between
non-interconnected qubes are not allowed. So even if both of your AppVM qubes
and sys-dns qube are connected to sys-firewall then they won't be able to
communicate with each other by default. Additio
‐‐‐ Original Message ‐‐‐
On Tuesday, July 2, 2019 7:34 AM, Sphere wrote:
> With my experience of using DNSCrypt I actually think that Qubes' has some
> unique way of handling DNS queries given how the nameservers automatically
> put into /etc/resolv.conf are on a different subnet.
>
> I
With my experience of using DNSCrypt I actually think that Qubes' has some
unique way of handling DNS queries given how the nameservers automatically put
into /etc/resolv.conf are on a different subnet.
I actually think there must be some sort of bind or unbound being ran in there
that resolves
On 7/1/19 3:40 PM, 'qubeslover' via qubes-users wrote:
Hello,
I tried but without results.
1. dnf install getdns-stubby in fedora-30-firewall (template).
2. servicectl enable stubby in fedora-30-firewall.
3. Shutdown fedora-30-firewall.
4. Restart sys-firewall
4. Sudo nano /etc/resolv.conf
‐‐‐ Original Message ‐‐‐
On Sunday, June 30, 2019 11:20 PM, 'qubeslover' via qubes-users
wrote:
> ‐‐‐ Original Message ‐‐‐
> On Sunday, June 30, 2019 10:36 PM, Chris Laprise tas...@posteo.net wrote:
>
> > On 6/30/19 4:10 PM, Chris Laprise wrote:
> >
> > > > > A shortcut you can t
‐‐‐ Original Message ‐‐‐
On Sunday, June 30, 2019 10:36 PM, Chris Laprise wrote:
> On 6/30/19 4:10 PM, Chris Laprise wrote:
>
> > > > A shortcut you can take to setting up iptables for DNS is to populate
> > > > /etc/resolv.conf and then run '/usr/lib/qubes/qubes-setup-dnat-to-ns'.
> >
On 6/30/19 4:10 PM, Chris Laprise wrote:
A shortcut you can take to setting up iptables for DNS is to populate
/etc/resolv.conf and then run '/usr/lib/qubes/qubes-setup-dnat-to-ns'.
This should configure the nat/PR-QBS chain with the DNS addresses you
set.
So check that your DoT setup is updat
On 6/30/19 2:46 PM, 'qubeslover' via qubes-users wrote:
Dear tasket,
today here is so hot that I feel like I am drunk. I typed the wrong title. The
topic actually was
"Dns-over-TLS in *sys-net*. Is it possible? How?"
Obviously, as you correctly (and politely) pointed out, it doesn't make sens
Dear tasket,
today here is so hot that I feel like I am drunk. I typed the wrong title. The
topic actually was
"Dns-over-TLS in *sys-net*. Is it possible? How?"
Obviously, as you correctly (and politely) pointed out, it doesn't make sense
at all to run DoT over VPN. Actually, I want to run Do
On 6/30/19 9:17 AM, 'qubeslover' via qubes-users wrote:
Dear qubes users,
I wish you a good Sunday.
I'd like to use DoT on my qubes laptop. However, I am not sure how to do. I
have followed a couple of pretty straightforward tutorials
(https://www.techrepublic.com/article/how-to-use-dns-over-t
Dear qubes users,
I wish you a good Sunday.
I'd like to use DoT on my qubes laptop. However, I am not sure how to do. I
have followed a couple of pretty straightforward tutorials
(https://www.techrepublic.com/article/how-to-use-dns-over-tls-on-ubuntu-linux/
and
https://techrevelations.de/2019/
On Mon, Nov 27, 2017 at 09:27:16PM +0100, CF wrote:
> Dear Users,
>
> A few (simple) questions as I was reading about DNS servers:
>
> 1 - Any feedback on using your own DNS server directly on your Qubes
> machine (using unbound for instance)? Is it straightforward to have your
> DNS cache persis
Dear Users,
A few (simple) questions as I was reading about DNS servers:
1 - Any feedback on using your own DNS server directly on your Qubes
machine (using unbound for instance)? Is it straightforward to have your
DNS cache persistent across reboots?
2 - Any feedback on the DNS over TLS provide
14 matches
Mail list logo