-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 6/22/20 9:19 PM, verifiablel...@86.is wrote:
> cat ips.txt | while read line; do qvm-firewall appvm-name add
> --before 0 accept dsthost=$line; done
Thank you! I'll look into qvm-firewall and then write a little script
to parse the downloaded
On 2020-06-22 16:37, Sven Semmler wrote:
Is there a better way for me to import the ranges from
https://api.github.com/meta or any other such configuration and import
them into a qubes firewall rules?
You can add firewall rules from Dom0. I've got a one-liner that will
read IPs from a file
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 6/22/20 7:44 PM, 'Jon will' via qubes-users wrote:
> I have the OS of my dreams!
This is not said nearly often enough! Thanks Qubes Team!
/Sven
- --
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6
GOT IT! Now the only thing I need to do is get HVMs working and I have
the OS of my dreams! Thanks!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
A new article has just been published on the Qubes website:
"Qubes Architecture Next Steps: The New Qrexec Policy System"
by Marek Marczykowski-Górecki & Marta Marczykowska-Górecka
Hi
When I mount a samba share, if it matters from where I will share,
inside an AppVM the mount is mounted, I suspect, as 'user'. Yes root is
doing the mount, but I think the user that is used to connect to the
network share is the uid of the logged in user which is by default user
and I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
I find myself manually entering the IP ranges from
https://api.github.com/meta into the firewall rules of my 'dev' qube.
Obviously this is tedious.
Is there a better way for me to import the ranges from
https://api.github.com/meta or any other
Hey guys,
I'm working on my 2nd qubes machine but this task I could never figure out on
the first one to begin with.
Can someone please tell me if you were able to achieve the following?
- Have two NICs handling two separate sys-net
- Behind each sys-net their own firewall
- behind the
On Mon, Jun 22, 2020 at 04:54:18PM +, 'Matt Drez' via qubes-users wrote:
> Reading from proxy failed - read (104: Connection reset by peer) [IP:
> 127.0.0.1 8082]
try ...
qrexec-client-vm '$default' qubes.UpdatesProxy
... and/or ...
(echo -e 'GET http://google.com/
Hey guys,
I'm working on my 2nd Qubes machine and this one is giving me a hell of a ride.
My debian based templates no longer updating. It did work after the fresh
install but during setting things up at some point it stopped. I'm not sure at
what step so I couldn't backtrack. Fedora 31 still
> It's not an uncommon error.
> Try the obvious - go in to the qube settings, and change VCPU to
Thanks. That helped to install it but I'd like to run it with more than one
core. Do you have a solution for that? It's still a BSOD after install if I try
to give more than one core.
--
You
> I'm having this installation issue when trying to Install Qubes on a MSI
> Laptop
Can we get a little more info on the laptop? CPU, GPU, etc.
> [image: qubes_error.png]
> How should I find out how to continue the installation (if there is any
> chance) ?
Could you provide output of `dmesg` in
> Sorry for the late response, It took forever for the iso to download.
> IT'S WORKING! There is just one last problem. I can't get wireless
> working. Any ideas?
Congratulations on getting it working. Just remember that is a
pre-release version of Qubes. It's not fully supported and may have
13 matches
Mail list logo