On 13/01/2018 03.34, Andrew David Wong wrote:
> On 2018-01-12 08:00, 'awokd' via qubes-users wrote:
> > On Fri, January 12, 2018 1:09 pm, Holger Levsen wrote:
>
> >> I'm not so sure, why not use git branches?
>
>
> One reason that comes to mind:
>
> Segregating the documentation into two different
On 12/01/2018 14.09, Holger Levsen wrote:
> On Fri, Jan 12, 2018 at 01:04:23PM +, 'Tom Zander' via qubes-users wrote:
>> On Friday, 12 January 2018 11:18:19 GMT 'awokd' via qubes-users wrote:
>>> Would it be of value if I went through the published Docs and added these
>>> version headers? Shou
On Sunday, January 28, 2018 at 10:30:47 AM UTC+8, awokd wrote:
> On Sun, January 28, 2018 2:13 am, xxx wrote:
> > I burned the ISO to USB stick then started to install Qubes but got the
> > following:
> >
> >
> > [0.093375] ACPI Error: [\SB_.PCIO.XHC_.RHUB.HS11] Namespace lookup
> > failure, AE
On Sun, January 28, 2018 2:33 am, Yuraeitha wrote:
>
> Awkward same-time posting x)
> But listen to awokd, he has more experience than I do.
Not that much more! Unfortunately, on these boot issues most come down to
trial and error like you said...
--
You received this message because you are su
On Sunday, January 28, 2018 at 3:30:47 AM UTC+1, awokd wrote:
> On Sun, January 28, 2018 2:13 am, joeh9...@gmail.com wrote:
> > I burned the ISO to USB stick then started to install Qubes but got the
> > following:
> >
> >
> > [0.093375] ACPI Error: [\SB_.PCIO.XHC_.RHUB.HS11] Namespace lookup
>
On Sun, January 28, 2018 2:13 am, joeh9...@gmail.com wrote:
> I burned the ISO to USB stick then started to install Qubes but got the
> following:
>
>
> [0.093375] ACPI Error: [\SB_.PCIO.XHC_.RHUB.HS11] Namespace lookup
> failure, AE_NOT_FOUND (20170531/dswload-210) [0.093383] ACPI
> Except
I burned the ISO to USB stick then started to install Qubes but got the
following:
[0.093375] ACPI Error: [\SB_.PCIO.XHC_.RHUB.HS11] Namespace lookup failure,
AE_NOT_FOUND (20170531/dswload-210)
[0.093383] ACPI Exception: AE_NOT_FOUND, During name lookup/catalog
(20170531/psobject-252)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-12 07:58, awokd wrote:
> On Fri, January 12, 2018 1:04 pm, Tom Zander wrote:
>> On Friday, 12 January 2018 11:18:19 GMT 'awokd' via qubes-users
>> wrote:
>>
>>> Would it be of value if I went through the published Docs and
>>> added the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-12 08:00, 'awokd' via qubes-users wrote:
> On Fri, January 12, 2018 1:09 pm, Holger Levsen wrote:
>
>> I'm not so sure, why not use git branches?
>
One reason that comes to mind:
Segregating the documentation into two different branche
On Fri, January 12, 2018 1:09 pm, Holger Levsen wrote:
> I'm not so sure, why not use git branches?
It doesn't sound like that's the route the Qubes team wants to take right
now, but at least splitting the content on the same page would make it
easier to migrate to that approach if they change th
On Fri, January 12, 2018 1:04 pm, Tom Zander wrote:
> On Friday, 12 January 2018 11:18:19 GMT 'awokd' via qubes-users wrote:
>
>> Would it be of value if I went through the published Docs and added
>> these version headers? Should newer versions be added at the top (so 4.0
>> before 3.2 content)? 4
On Friday, 12 January 2018 13:09:35 GMT Holger Levsen wrote:
> I'm not so sure, why not use git branches?
That has my preference still, but I'm ok for any workable solution.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this me
On Fri, Jan 12, 2018 at 01:04:23PM +, 'Tom Zander' via qubes-users wrote:
> On Friday, 12 January 2018 11:18:19 GMT 'awokd' via qubes-users wrote:
> > Would it be of value if I went through the published Docs and added these
> > version headers? Should newer versions be added at the top (so 4.0
On Friday, 12 January 2018 11:18:19 GMT 'awokd' via qubes-users wrote:
> Would it be of value if I went through the published Docs and added these
> version headers? Should newer versions be added at the top (so 4.0 before
> 3.2 content)? 4.0 might just be "TBD".
I think that would be wonderful,
On Fri, January 12, 2018 4:20 am, Andrew David Wong wrote:
> It shouldn't require much effort. In most cases, all you have to add
> is `## Qubes 3.2` above the existing documentation, shift the rest of the
> headers down one by adding a `#` in front of each one, then add `## Qubes
> 4.0` above the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-11 22:23, Chris Laprise wrote:
> On 01/11/2018 10:31 PM, Andrew David Wong wrote:
>> On 2018-01-11 14:41, Chris Laprise wrote:
>>>
>>> At least no section repetition for the scripts should be
>>> necessary. But doing this for the dialogs
On 01/11/2018 10:31 PM, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2018-01-11 14:41, Chris Laprise wrote:
>>
>> At least no section repetition for the scripts should be necessary. But
>> doing this for the dialogs still adds a lot to an already long doc.
>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-11 16:11, 'Tom Zander' via qubes-users wrote:
> On Thursday, 11 January 2018 18:16:04 GMT Unman wrote:
>> On the VPN case your own comment confirms that it would be
>> better to provide a separate section, rather than trying to put
>> "ex
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-11 14:41, Chris Laprise wrote:
> On 01/11/2018 01:16 PM, Unman wrote:
>> On Thu, Jan 11, 2018 at 09:18:46AM +, 'Tom Zander' via qubes-users wrote:
>>> On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
On 2018-01-1
On Thursday, 11 January 2018 18:16:04 GMT Unman wrote:
> On the VPN case your own comment confirms that it would be better to
> provide a separate section, rather than trying to put "exceptions" in to
> the existing text.
Thank you for explaining that unman, much clearer indeed.
While I agree on
On 01/10/2018 03:47 PM, Connor Page wrote:
> The official templates use nftables so shouldn’t be mixed with iptables. I
> didn’t have time to learn about nftables, so just removed nftables package
> from debian 9 template. YMMV.
>
Hmmm, I was just thinking how Qubes' own guest scripts still use
On 01/11/2018 01:16 PM, Unman wrote:
> On Thu, Jan 11, 2018 at 09:18:46AM +, 'Tom Zander' via qubes-users wrote:
>> On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
>>> On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
>>
I poked the Qubes guys about providing a se
On Thu, Jan 11, 2018 at 09:18:46AM +, 'Tom Zander' via qubes-users wrote:
> On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
> > On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
>
> > > I poked the Qubes guys about providing a separate dir on the website to
> > > make
On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
> On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
> > I poked the Qubes guys about providing a separate dir on the website to
> > make it clear what is 3.x and what is 4.x specific, but they stated we
> > should instead pu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
> On Wednesday, 10 January 2018 18:32:39 GMT Chris Laprise wrote:
>> I also have a download-able project that makes the scripted/antileak
>> setup fairly simple in Qubes R4.0:
>
> Please consi
The official templates use nftables so shouldn’t be mixed with iptables. I
didn’t have time to learn about nftables, so just removed nftables package from
debian 9 template. YMMV.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe f
On 01/10/2018 01:53 PM, 'Tom Zander' via qubes-users wrote:
On Wednesday, 10 January 2018 18:32:39 GMT Chris Laprise wrote:
I also have a download-able project that makes the scripted/antileak
setup fairly simple in Qubes R4.0:
Please consider updating the docs repo with this :-)
I poked the
On Wednesday, 10 January 2018 18:32:39 GMT Chris Laprise wrote:
> I also have a download-able project that makes the scripted/antileak
> setup fairly simple in Qubes R4.0:
Please consider updating the docs repo with this :-)
I poked the Qubes guys about providing a separate dir on the website to
On 01/10/2018 12:42 PM, Kushal Das wrote:
On Wed, Jan 10, 2018 at 10:44 PM, heartsucker wrote:
Hi everyone
I'm testing out Qubes 4.0-rc3 and need to set up VPM VMs for different
domains. I'm attempting to follow the instructions listed here:
https://www.qubes-os.org/doc/vpn/
The screenshots d
On Wed, Jan 10, 2018 at 10:44 PM, heartsucker wrote:
> Hi everyone
>
> I'm testing out Qubes 4.0-rc3 and need to set up VPM VMs for different
> domains. I'm attempting to follow the instructions listed here:
> https://www.qubes-os.org/doc/vpn/
>
> The screenshots deviate significantly from what I'
Hi everyone
I'm testing out Qubes 4.0-rc3 and need to set up VPM VMs for different
domains. I'm attempting to follow the instructions listed here:
https://www.qubes-os.org/doc/vpn/
The screenshots deviate significantly from what I'm seeing in my
installation, namely that there doesn't seem to be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Jan 07, 2018 at 04:59:44AM -0800, Fabrizio Romano Genovese wrote:
> Ok, I dug a bit deeper into this. It doesn't look like a problem of how much
> memory I give to VMs. Essentially, my QubesOS boots in two different ways:
>
> - When QubesOS
On Sunday, January 7, 2018 at 1:59:45 PM UTC+1, Fabrizio Romano Genovese wrote:
> Ok, I dug a bit deeper into this. It doesn't look like a problem of how much
> memory I give to VMs. Essentially, my QubesOS boots in two different ways:
>
> - When QubesOS is happy, it starts in ~1 min (yup, starti
On Sunday, January 7, 2018 at 1:59:45 PM UTC+1, Fabrizio Romano Genovese wrote:
> Ok, I dug a bit deeper into this. It doesn't look like a problem of how much
> memory I give to VMs. Essentially, my QubesOS boots in two different ways:
>
> - When QubesOS is happy, it starts in ~1 min (yup, starti
Ok, I dug a bit deeper into this. It doesn't look like a problem of how much
memory I give to VMs. Essentially, my QubesOS boots in two different ways:
- When QubesOS is happy, it starts in ~1 min (yup, starting up all the VMs
still takes a while). The overall system is very reactive, for instan
Well, I'm not trying to accomplish nothing in particular, it's just that the
template doesn't behave as it should: It asks me to run
update-command-not-found to fix a problem, and I cannot do that because curl
fails.
Sometimes, the fact that the template doesn't really distinguish between a
co
On Sat, January 6, 2018 1:19 am, Fabrizio Romano Genovese wrote:
> Yup, if you type curl it works, but you can't curl anything out of it
OK, I see what you mean. What are you trying to accomplish? If it's just a
one time file copy, you could use qvm-copy-to-vm to copy it to your
template from anot
Yup, if you type curl it works, but you can't curl anything out of it because
you don't have connection. To reproduce what I'm talking about, open a terminal
in whonix-ws/gw and type some random stuff (like "sdshgow"). Press enter.
Whonix will tell you
"Could not find the database of available
On Fri, January 5, 2018 11:11 pm, Fabrizio Romano Genovese wrote:
>
> This very very annoying thing happened to me also on Qubes 3.2.
> Essentially, on a whonix-based template, (whonix-ws or whonix-gw, doesn't
> really matter), every time I type something (aside of some basic commands
> such as su
Hello all,
This very very annoying thing happened to me also on Qubes 3.2. Essentially, on
a whonix-based template, (whonix-ws or whonix-gw, doesn't really matter), every
time I type something (aside of some basic commands such as sudo, firefox, ls
etc) I receive the message:
"Could not find t
On Thursday, 4 January 2018 11:49:45 GMT Fabrizio Romano Genovese wrote:
> Looking at the console messages at startup, it looks like the problem is
> that Qubes takes more than one minute to boot sys-net, sys-firewall,
> sys-usb and sys-whonix. That was not the case in 3.2.
>
> Also, when giving
>
As the title says, Qubes 4.0rc3 boot is very slow compared to Qubes 3.2.
Looking at the console messages at startup, it looks like the problem is that
Qubes takes more than one minute to boot sys-net, sys-firewall, sys-usb and
sys-whonix. That was not the case in 3.2.
Also, when giving
qvm-st
I have used Qubes 3.2 in the past with Windows HVM without any problems.
I setup my Windows Standalone but having issues getting the system to boot with
the iso. It is not even getting to the boot screen.
When I start with the iso I get the error msg:
Got empty response from qubesd. See journalct
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-11-29 15:03, genevieve.c.gauth...@gmail.com wrote:
> On Wed, 2017-11-29 at 15:59 +, Unman wrote:
>> In the Fedora documentation there ARE methods described for
>> getting bug reports out of the install process, but they require
>> activ
On Wed, 2017-11-29 at 15:59 +, Unman wrote:
> In the Fedora documentation there ARE methods described for getting
> bug
> reports out of the install process, but they require active
> intervention
> from the user (copy to another drive or scp across network). There's
> no
> suggestion that thes
On Wed, Nov 29, 2017 at 02:51:33AM -0500, '[799]' via qubes-users wrote:
> Hello Unman,
>
> >> It's perfectly possible that the installer (not principally written by
> >> Qubes) could mistakenly include a passphrase string.
>
> As far as I have understand, the problem is not that the password is
On Wednesday, 29 November 2017 02:40:01 CET Genevieve Gauthier wrote:
> What do you need me to do ?
Please expain in a little more detail what versions of the software you were
using, what steps we might follow to reproduce the problem.
For instance which screen was the last thing that was on bef
On Wednesday, 29 November 2017 08:51:33 CET '[799]' via qubes-users wrote:
> As far as I have understand, the problem is not that the password is
> shown, but that the report with this error mistake and the password could
> get transferred. I don't want that my password gets transferred in some
> p
Hello Unman,
>> It's perfectly possible that the installer (not principally written by
>> Qubes) could mistakenly include a passphrase string.
As far as I have understand, the problem is not that the password is shown, but
that the report with this error mistake and the password could get transf
I do not know how to help you. I have taken a picture without removing the
geotag (authentic picture /w geotag in my own living room. the picture
(one of many) is in my iphone but my own finger is hiding MY OWN
PASSPHRASE... I could see it 20/20.. I still have everything I used (my
own laptop),
On Tue, Nov 28, 2017 at 07:48:49PM -0500, '[799]' via qubes-users wrote:
> Hello,
>
> Original-Nachricht
> An 29. Nov. 2017, 00:48, schrieb:
> Sorry but I almost fainted ! (I even took a picture ! I could not believe
> this MEGA-HUGE security flaw right in front of my eyes )
> (
Hello,
Original-Nachricht
An 29. Nov. 2017, 00:48, schrieb:
Sorry but I almost fainted ! (I even took a picture ! I could not believe this
MEGA-HUGE security flaw right in front of my eyes )
(...)
Sorry, you are supposed to be good and security expert but you are asking me
(THE
Sorry but I almost fainted ! (I even took a picture ! I could not believe this
MEGA-HUGE security flaw right in front of my eyes )
An installation error prompt this screen :
An unknown error has occurred
This program has encountered an unknown error. You may report the bug below or
quit the p
53 matches
Mail list logo