Re: [qubes-users] Re: Qubes 3.2 rc2 has been released!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-29 22:16, '109384'0194328'0193284'09132'84098 wrote: > Hello, > > if I try to upgrade the VMs like described under... > > Upgrade Fedora templates: > > https://www.qubes-os.org/doc/upgrade-to-r3.2/ > > I run into this error: > > sudo dnf install --enablerepo=qubes*testing --refresh qubes-upgrade-vm > > Error: Failed to synchronize cache for repo 'updates' > > How I can upgrade the VMs to Q32? > > Kind Regards > I frequently get that message when updating via tor (sys-whonix). I just wait for a new circuit or manually request a new identity via tor-arm in sys-whonix by pressing 'n', and that usually fixes it. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXnD3JAAoJENtN07w5UDAw5LsP/3Pb04RNevypKsbE+mTa8QoB JuEWVYo3Aaj51A340OqJy7ktXp2EWDtg3Ut210CK+jatFPtrqwaE0zBoMRIxQuD0 UIaNoIrHmKlxwjFPXRQ8a4sGVI2d2yJtQE/hFOeT9kwpPrDL2LNhu9ErIDohJH4P xKQq1arpH/d3oWebnyLjy6+WHs7K0G2ybnMtPtRjvdWBDsN+fFdoif3OcO2bJhex zVs8Vy61yFVBTfoAy2yc/OIPBqxJkxin5JLM6rwOQVgddnJ50eQf3tz3zaAIo8Fy mEaizz+XT+KtJXqz8SDHaoD4IVjTdiFQXM8DSZsf5cEdunXbyiqYcN5s1EekxNVL xo4e+MW9b+P3NNkysKy3itjyK3PppGtJyZrha9LDWCM26KugPs8dbsI39g7aKLH6 m7eshEpfMhOFTHhQxn2u0z7ATqozQLTZ4cpg6v+rUOrQZQ205cciIdVLeww52Yuv n5zp+itmKbX0PofMJS25K20uNRAifRxp4OpLzyZAiswRG4aHJqsMuo64bMG7PVoO 8YE2A5WdBwhrU2phcdYl8dm0G1HL6Nyr2bS7jcrS6RrNtwBugWojR2WivPh5hqYU FvKEjSuROM+qih3+m5T5ORSYcAyWkeSo7KCEbPkXIBAOW1FIrgqUGQq9Cx9lybkK CJDU5T/uS5FTdIjiw1Lo =WcTL -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b4a33cde-9c36-00cd-5ffd-4fd7466ffb40%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 3.2 rc2 has been released!
Hello, if I try to upgrade the VMs like described under... Upgrade Fedora templates: https://www.qubes-os.org/doc/upgrade-to-r3.2/ I run into this error: sudo dnf install --enablerepo=qubes*testing --refresh qubes-upgrade-vm Error: Failed to synchronize cache for repo 'updates' How I can upgrade the VMs to Q32? Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c3aa7cf5-6d6c-499a-8f7f-df65f922e186%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Snowden plans a wireless hardware security device
On Sat, Jul 30, 2016 at 1:45 AM, Syd Brisbywrote: > Edward Snowden and a hardware hacker have developed plans for a hardware > device to monitor wireless signals on the iphone6. This lets the user know > whether the phone's radio/s are actually on or off as it can be hard to > tell otherwise. (He even mentions an anit-evil maid aspect to the design.) > Wireless hacking / malware ain't no joke, as a female journalist was > recently killed in Syria by having her phone wirelessly tracked to > facilitate a strike to silence the media. > > What we need now is a version to fit on a laptop / netbook / PC - and > since the design is open-source, that might be possible. > > > https://www.wired.com/2016/07/snowden-designs-device-warn-iphones-radio-snitches/ > > http://boingboing.net/2016/07/21/ed-snowden-and-andrew-bunnie.html > > Isn't a laptop wireless hardware switch simpler? > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/cef39eeb-944f-4a84-86ed-cdccf2f8f911%40googlegroups.com > . > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qCQrdyk5Zom_rf8SNApUvhr3CgbeHk9UgfdV3PoGanj9g%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Snowden plans a wireless hardware security device
Edward Snowden and a hardware hacker have developed plans for a hardware device to monitor wireless signals on the iphone6. This lets the user know whether the phone's radio/s are actually on or off as it can be hard to tell otherwise. (He even mentions an anit-evil maid aspect to the design.) Wireless hacking / malware ain't no joke, as a female journalist was recently killed in Syria by having her phone wirelessly tracked to facilitate a strike to silence the media. What we need now is a version to fit on a laptop / netbook / PC - and since the design is open-source, that might be possible. https://www.wired.com/2016/07/snowden-designs-device-warn-iphones-radio-snitches/ http://boingboing.net/2016/07/21/ed-snowden-and-andrew-bunnie.html -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cef39eeb-944f-4a84-86ed-cdccf2f8f911%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes Bluetooth (mouse)
> From searching around the qubes mailing list, it sounds like bluetooth in > Qubes is a possibility (though there may be some security implications). Have not figured out Bluetooth yet, but can now confirm.. Logitech's "Unifying" tech (from way back in the day) works like a charm. It is the least amount of effort you will ever do in Qubes, for the most happiness. (That usually means there is some security vulnerability somewhere).. Plug in the usb unifying thingy and.. it works. Being not very technical, this could be a security flaw. But if your attack surface if not within 25 feet, go for it. Tested and working on a mx master. Right click and scroll wheel work, not sure about the other buttons, but don't get your hopes up. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/15b5c669-dfa8-425f-aa79-bd4a6b9c4218%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: PulseAudio Connection Terminated
On Friday, July 29, 2016 at 10:51:31 PM UTC, Marek Marczykowski-Górecki wrote: > > Check kernel messages - maybe this is out of memory condition? > No kernel error messages. Machine has 16GB RAM - dom0 has 4GB. No changes in hardware since last successful boot. Really need some help with this. Machine is locking up every 5 secs. Plus I need audio. Thanks! (For a few minutes I thought the issue might have resolved itself, but when I launched PulseAudio Volume Control, it went haywire again. No idea if those events are related.) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e4c24264-c23b-47a3-b722-4f010215a043%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Change HandleLidSwitch value in the installer?
I figured it was an oversight. Nothing major (and kinda picky), but man, it's caught me more than once like a little splinter . . . Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2a75a892-29a2-48c5-8aff-b7f49946fa7b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Change HandleLidSwitch value in the installer?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-29 18:44, arthur.summ...@gmail.com wrote: > Actually, neither of those situations - the way post-install is set up is > perfect. This is what I'm referring to Right now, if I fire up the > installer, click "Begin Installation," and decide to close my laptop lid > while the installation runs, the system goes to standby. :[ Boo!!! Usually, > the USB fails to reconnect, and the installer breaks. That make more > sense? > Oh, I see what you mean now. Yes, that makes sense. The existing behavior is probably an oversight, since all power saving measures should be disabled while the OS is being installed. Tracking: https://github.com/QubesOS/qubes-issues/issues/2212 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXnAhSAAoJENtN07w5UDAwFlMP/iH/dzNuPsD49M6xU/Bm HcPl6EJ6za0DbCedWQF6yxx3hB1AqryUlP1XMV2fDlpWzOpl8GMBj03veN+iCL7r 2VfG9fIrUd0g9zpWkWYqAaan6pXYVG8O9A3ho97n68YrDPvT8FPAxjypWXhPhejO mfLuSaoOsSo2pwGzaDEiKcnwpvbj3mGgLjs5yfGSuEuyJM9VOsbphL+bFFAC5y/4 SUwrAuExYBPgAkN/ioPtd2bLnGX+BvhOI78ruqBwHisScm8gUG0usJ9TyqhjLrk4 VGpwJ+q2NOf05m1pniDa1fd39VjPaqxueK1vYNyYSveEUeZkFsGrRSWpZsXhLsDt 6se2ORKzLequPE7nERXrMV9oHwKHphUpO6ffmnO200kK2Ht1s6eqR85h9REPsnVD ABxZPMne0UZmFOvHOlWhw0e9qzXgye0x4l/0BIJhevRTIqPB3Qq2rOEWb3DRve85 +fc16khzYUxkpZBKvHn9DJXYcEvsxEiIkJw4HtyYRaj7Wwrgxj+Muh9U6W3U6Bdo YKa3dn0cby+w/qgzrWiz5m3o7Dq/GEC0cDeXLB7JmIMn58JDKIbDLwCRrNS1fw+g q1Kpbw2BUOo3OKpKHqNMLFhE+on9d9U5pQWGlKUlqcvdGeWzKNtFFGWyzYHOKrq7 A+pRjzq4DygCAEMqoWcO =tdW/ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aef6e007-262a-7d2b-5d95-8914fa7c132d%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Change HandleLidSwitch value in the installer?
Actually, neither of those situations - the way post-install is set up is perfect. This is what I'm referring to Right now, if I fire up the installer, click "Begin Installation," and decide to close my laptop lid while the installation runs, the system goes to standby. :[ Boo!!! Usually, the USB fails to reconnect, and the installer breaks. That make more sense? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b186eb46-7a8b-4819-9d06-4f58f67413d9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Thinkpad LTE Modem Module & Qubes Compatibility
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-29 15:36, 2fd3...@ahk.jp wrote: > Thinkpad's and other laptops have the option of installing a LTE/4G module > (EM7345 4G LTE Sierra Wireless). Does this works with Qubes? > I don't know, but I imagine it probably depends on the specific model. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXnAM2AAoJENtN07w5UDAwvqoQALYWRqREao2ANQuvWsne37RT CTybWZG+EbSv+kZim8xGWmcG4qDe32MextBWK7mwM1V/fqc4ELaVTEuR3wSwvpsR FkF3FAQsTkjqvYgC+kXHSutGBFDN4YiP/tc9c41ucvzRFrggry0NMW1xa8Fez8vP x1bhmY6+b70C+McLCiENZSQffU6gxwQV5vC0mhmZm45XZZ439kREGiK46ci2q2+T 2od/II4ra48SScf/BRt8bc8X681DWgoBLzjTO6cAiiMLS0j5LXWml76mVWCzgQaA 0+dhfI/Snf1Y1l6K/v6O9htD6fa0gl+gHQprXM2rKA/+Uu4Shq2y7UfYEkt0EFec 3FPvQkDiC/PPOWV1rfYn8cy5TBdnbm4/w5m63W2og4yT0p1UCI56ObhYNXaqy4DL 6O3du3hVzCXbol35qOaB1hNqGB99+Z4EpNv6jJVnN3ipMAlN16DLisy2avdNrdkz qEkZfv92EEVegjs+6SzQBXNoYUFk5x55GBCC6MHIE6S+3YA4y8kzInZOV3PUvDUf f0DBqVVZ6t7+7Gxdtg8QbEvuVn9mhIajuqRIdkP9ZluAyZOfgkLHTa2r0a9WRLSZ nDjIK4B5QyGRUtuTf57Ykx4+9zL0x/ppbKoVI/4X2j7BzsXmBeFonyeGsK1SMHDK q6z93Rn3kyweM878Jccu =5CtY -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aeec24d1-74a1-1947-8b5b-422fab56c298%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Change HandleLidSwitch value in the installer?
So, I'm glad that HandleLidSwitch is set properly after an install to keep laptop systems from going to sleep when closed. I always forget about that on new installs of different OSs, and then I have to remember how that flavor of whatever system lets you disable the setting. HOWEVER, could that be disabled in the installer? It's happened at least three times that I've closed the lid without thinking, the system goes into standby, and on resume, the USB hasn't reattached properly, so I have to start over again. Not a HUGE deal, but it is certainly a bit frustrating . . . Much appreciated! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e485ea4d-63f5-4407-8cc8-3aa5fcdc8d17%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: What do you think about the idea of a FileVM?
I agree with the idea of having an option for a storage VM, but my agreement goes a little deeper (and forks a bit). I know that the primary goal of Qubes is security, but there are a lot of different use cases for it. I use it because I like the compartmentalization provided by VMs. Security is almost a secondary for me - I wanted a bare-metal client hypervisor. Since XenClient no longer exists and no other offerings are well maintained, I landed on Qubes. For my purposes, sharing storage would be great, but baking it in DOES defeat the primary goals of the project. Personally, I'm a huge fan of Turnkey Linux (http://turnkeylinux.org), and I use their stuff regularly to stand up infrastructure components or for testing. They have a fileserver VM, and it's pretty beautiful. Actually, all of their stuff is pretty beautiful. However, unless I missed something, I don't see an easy way to import an OVA/VMDK into Qubes. If that existed, I'd be happier than a dog with eight legs (yes, I said that). This would solve a lot of use cases, simplify the creation of third party HVMs, and still maintain the goals of the project. Thoughts? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f9e16762-09b3-4f05-82a8-d65fdedbe2f1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] 3.2 RC2 - laptop screen lock bug
I'm happy to report that the issue I experienced below is gone, so I was able to install RC2. The AMDGPU drivers in the 4.4 kernel make a HUGE difference for dual monitors, so I'm excited! https://groups.google.com/forum/#!msg/qubes-users/uUwBy6RIUHQ/KESMemrcBQAJ However, I'm having an issue when I close my laptop lid, reopen it, and then try to unlock the screen. The screen freezes for a good 60 seconds before letting me use the mouse or keyboard. This isn't after a standby, and it doesn't occur every time the screen locks - ONLY after I close the laptop lid and reopen it. Here is the pertinent dmesg: [ 553.366878] audit: type=1130 audit(1469827523.468:173): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-suspend comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 553.388154] PM: Syncing filesystems ... done. [ 553.394865] PM: Preparing system for sleep (mem) [ 553.395089] Freezing user space processes ... [ 573.397815] Freezing of tasks failed after 20.002 seconds (2 tasks refusing to freeze, wq_busy=0): [ 573.397876] alsactl D 8800c326fb98 0 1382 1 0x0084 [ 573.397886] 8800c326fb98 88012f871d00 8800c3435700 [ 573.397893] 8800c327 8800c326fbd0 880134b8e040 880134b8e040 [ 573.397899] 88012fabc000 8800c326fbb0 81752685 000100047254 [ 573.397906] Call Trace: [ 573.397926] [] schedule+0x35/0x80 [ 573.397935] [] schedule_timeout+0x129/0x270 [ 573.397945] [] ? trace_event_raw_event_tick_stop+0x120/0x120 [ 573.397953] [] ? _raw_spin_unlock_irqrestore+0x1a/0x20 [ 573.397970] [] snd_power_wait+0xb5/0x110 [snd] [ 573.397976] [] ? wake_up_q+0x70/0x70 [ 573.397987] [] snd_ctl_elem_info_user+0x61/0xf0 [snd] [ 573.397999] [] snd_ctl_ioctl+0x5ec/0x6c0 [snd] [ 573.398010] [] ? __raw_callee_save___pv_queued_spin_unlock+0x11/0x20 [ 573.398019] [] do_vfs_ioctl+0x298/0x480 [ 573.398028] [] ? __audit_syscall_entry+0xab/0xf0 [ 573.398036] [] ? do_audit_syscall_entry+0x4b/0x70 [ 573.398042] [] ? syscall_trace_enter_phase1+0x13c/0x160 [ 573.398047] [] SyS_ioctl+0x79/0x90 [ 573.398053] [] entry_SYSCALL_64_fastpath+0x12/0x71 [ 573.398105] pulseaudio D 88012060fcd8 0 2732 2731 0x0084 [ 573.398112] 88012060fcd8 88012f851d00 880086d25700 [ 573.398118] 88012061 88012060fd10 880134a8e040 880134a8e040 [ 573.398124] 88012fabc000 88012060fcf0 81752685 00010004043f [ 573.398131] Call Trace: [ 573.398138] [] schedule+0x35/0x80 [ 573.398145] [] schedule_timeout+0x129/0x270 [ 573.398151] [] ? trace_event_raw_event_tick_stop+0x120/0x120 [ 573.398158] [] ? _raw_spin_unlock_irqrestore+0x1a/0x20 [ 573.398169] [] snd_power_wait+0xb5/0x110 [snd] [ 573.398173] [] ? wake_up_q+0x70/0x70 [ 573.398183] [] snd_ctl_ioctl+0xc5/0x6c0 [snd] [ 573.398189] [] do_vfs_ioctl+0x298/0x480 [ 573.398195] [] ? __audit_syscall_entry+0xab/0xf0 [ 573.398201] [] ? do_audit_syscall_entry+0x4b/0x70 [ 573.398206] [] ? syscall_trace_enter_phase1+0x13c/0x160 [ 573.398212] [] SyS_ioctl+0x79/0x90 [ 573.398217] [] entry_SYSCALL_64_fastpath+0x12/0x71 [ 573.398233] Restarting tasks ... done. [ 573.423849] PM: Syncing filesystems ... done. [ 573.429320] PM: Preparing system for sleep (freeze) [ 573.429475] Freezing user space processes ... [ 593.432916] Freezing of tasks failed after 20.002 seconds (2 tasks refusing to freeze, wq_busy=0): [ 593.433028] alsactl D 8800c326fb98 0 1382 1 0x0084 [ 593.433038] 8800c326fb98 88012f871d00 8800c3435700 [ 593.433046] 8800c327 8800c326fbd0 880134b8e040 880134b8e040 [ 593.433052] 88012fabc000 8800c326fbb0 81752685 000100047254 [ 593.433058] Call Trace: [ 593.433076] [] schedule+0x35/0x80 [ 593.433084] [] schedule_timeout+0x129/0x270 [ 593.433094] [] ? trace_event_raw_event_tick_stop+0x120/0x120 [ 593.433102] [] ? _raw_spin_unlock_irqrestore+0x1a/0x20 [ 593.433117] [] snd_power_wait+0xb5/0x110 [snd] [ 593.433123] [] ? wake_up_q+0x70/0x70 [ 593.433134] [] snd_ctl_elem_info_user+0x61/0xf0 [snd] [ 593.433146] [] snd_ctl_ioctl+0x5ec/0x6c0 [snd] [ 593.433155] [] ? __raw_callee_save___pv_queued_spin_unlock+0x11/0x20 [ 593.433164] [] do_vfs_ioctl+0x298/0x480 [ 593.433172] [] ? __audit_syscall_entry+0xab/0xf0 [ 593.433180] [] ? do_audit_syscall_entry+0x4b/0x70 [ 593.433186] [] ? syscall_trace_enter_phase1+0x13c/0x160 [ 593.433191] [] SyS_ioctl+0x79/0x90 [ 593.433197] [] entry_SYSCALL_64_fastpath+0x12/0x71 [ 593.433253] pulseaudio D 88012060fcd8 0 2732 2731 0x0084 [ 593.433260] 88012060fcd8 88012f851d00 880086d25700 [ 593.433266] 88012061 88012060fd10 880134a8e040 880134a8e040 [ 593.433272] 88012fabc000
Re: [qubes-users] Re: PulseAudio Connection Terminated
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jul 29, 2016 at 03:33:39PM -0700, 3n7r0...@gmail.com wrote: > 1. Deleting config files `~/.pulse`, `~/.config/pulse` did not resolve. > > 2. PulseAudio Manager Client Information says: > Linked to Library 5.0.0 > Compiled with Library 4.0.0 > Is that a problem? > > 3. pulseaudio -: > I: [pulseaudio] main.c: Daemon startup complete. > D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC1 is accessible: yes > D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card > alsa_card.pci-_01_00.1. > D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC0 is accessible: yes > D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card > alsa_card.pci-_00_1b.0. > I: [pulseaudio] module-suspend-on-idle.c: Source > alsa_input.pci-_00_1b.0.analog-stereo idle for too long, suspending ... > D: [pulseaudio] source.c: Suspend cause of source > alsa_input.pci-_00_1b.0.analog-stereo is 0x0004, suspending > I: [alsa-source-ALC898 Analog] alsa-source.c: Device suspended... > D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum. > I: [pulseaudio] module-suspend-on-idle.c: Sink > alsa_output.pci-_00_1b.0.analog-stereo idle for too long, suspending ... > D: [pulseaudio] sink.c: Suspend cause of sink > alsa_output.pci-_00_1b.0.analog-stereo is 0x0004, suspending > I: [alsa-sink-ALC898 Analog] alsa-sink.c: Device suspended... > D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum. > I: [pulseaudio] module-suspend-on-idle.c: Sink > alsa_output.pci-_01_00.1.hdmi-stereo idle for too long, suspending ... > D: [pulseaudio] sink.c: Suspend cause of sink > alsa_output.pci-_01_00.1.hdmi-stereo is 0x0004, suspending > Killed Check kernel messages - maybe this is out of memory condition? - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXm93tAAoJENuP0xzK19csaH8H+gOXLALzLuf+Mu0a7hMqUoQ/ P797s8dRQhZiaVdgLpQBowLiS65w15NS0sO9FXiTdCmArsGqyOFWP9cQ5wiIPTxN 1XZLfvjAECCvqB1oIvQzF7EWP6ex3MFpUo/mYhM7g15kQnnaxEZDXuYJonTVkb5V 7Dcxas42Yc7R1yLMYwpw+Xs+b64apfk9VSo+AiAWF8oOPWbayIcKN4baBJ9+RTSi jmIG9t3iF1zky3k+SvSCtB6+dZZVWkuuqrGGcdTFk9DMx9vxz2cGduiyCanQm94k lb+m1b5e65S8brmgAC9wAm5Li0F/9p/1HDNAV1UtCX6WaFiMuQJpIqPdiGeT8Eo= =j9Vd -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160729225124.GN32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Fedora 23 template upgrade conflict
Thank you a lot that did the trick:) Thanks for the help Sent using GuerrillaMail.com Block or report abuse: https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/27471d9c8b8adcc92012982cb3b4d762ad20%40guerrillamail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Thinkpad LTE Modem Module & Qubes Compatibility
Thinkpad's and other laptops have the option of installing a LTE/4G module (EM7345 4G LTE Sierra Wireless). Does this works with Qubes? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3a4dc9d8-7281-4937-b36d-bfc5493aae1a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Thinkpad X1 4th Generation
Does anyone have any info regarding compatibility for the high end spec Thinkpad X1 4th Generation & Qubes? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c92ac2e9-9e0e-403f-bad8-ca6365a1f011%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: PulseAudio Connection Terminated
1. Deleting config files `~/.pulse`, `~/.config/pulse` did not resolve. 2. PulseAudio Manager Client Information says: Linked to Library 5.0.0 Compiled with Library 4.0.0 Is that a problem? 3. pulseaudio -: I: [pulseaudio] main.c: Daemon startup complete. D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC1 is accessible: yes D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card alsa_card.pci-_01_00.1. D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC0 is accessible: yes D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card alsa_card.pci-_00_1b.0. I: [pulseaudio] module-suspend-on-idle.c: Source alsa_input.pci-_00_1b.0.analog-stereo idle for too long, suspending ... D: [pulseaudio] source.c: Suspend cause of source alsa_input.pci-_00_1b.0.analog-stereo is 0x0004, suspending I: [alsa-source-ALC898 Analog] alsa-source.c: Device suspended... D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum. I: [pulseaudio] module-suspend-on-idle.c: Sink alsa_output.pci-_00_1b.0.analog-stereo idle for too long, suspending ... D: [pulseaudio] sink.c: Suspend cause of sink alsa_output.pci-_00_1b.0.analog-stereo is 0x0004, suspending I: [alsa-sink-ALC898 Analog] alsa-sink.c: Device suspended... D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum. I: [pulseaudio] module-suspend-on-idle.c: Sink alsa_output.pci-_01_00.1.hdmi-stereo idle for too long, suspending ... D: [pulseaudio] sink.c: Suspend cause of sink alsa_output.pci-_01_00.1.hdmi-stereo is 0x0004, suspending Killed -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/842acec0-a494-49f4-90b4-9aef9af512b2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to install /boot partition and GRUB on USB
Hello. First of all, thank you to the devs for creating such an awesome OS. I only have one computer, and I can't run Qubes exclusively. So I need to dual boot. I know this is not optimal, but I have to, and as such I need to take all the precautions I can, which means I have to make sure that neither of the OSes can access the other on disk. To do this I need 100% disk encryption, so I need to install my boot partition+GRUB on USB sticks. I know how to do this on my non-Qubes OS, but I cannot for the life of me figure out how to do this in the Qubes installer. I've searched and searched with no luck. Could someone give me a step-by-step guide to doing this in the Qubes installer? I find it really, really confusing. (The only problem I have is using the Qubes installer itself - I understand how partition tables work and all that). Thank you :-) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0e95a38cb5350850272518eec8a7d89c.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: What do you think about the idea of a FileVM?
On Friday, July 29, 2016 at 1:42:07 AM UTC, epic...@gmail.com wrote: > A fileVM would be a mountable filesystem that 2 or more AppVMs can share. You don't need a VM, just a Drive (physical, network, or image). Here's how I moved my data off of my appVM using a disk image: https://groups.google.com/d/msg/qubes-users/c-XQTfa_l-Y/IkY8x3u6BwAJ This is for dedicated use by one appVM at a time. You'll need to research implications of concurrent access by multiple VMs. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/69dfdb76-f061-46f2-b5f5-f61b7946d466%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] PulseAudio Connection Terminated
On a freshly rebooted Qubes 3.1, dom0 pulseaudio process consumes 100% cpu every 5 secs. Pulseaudio Manager shows a connection to server for a split second before announcing `Failure: Connection terminated`. This cycles continuously. Not sure what triggered this issue. May have been recent updates and/or "Attaching audio-input to VM". Have not experienced this in the prior year of using Qubes. "Detaching audio-input" does not work. Tips to troubleshoot? TIA. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1b7f8322-fac3-d8ea-b575-167fe90394f9%40gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What do you think about the idea of a FileVM?
On Fri, Jul 29, 2016 at 4:31 PM,wrote: > On Friday, July 29, 2016 at 2:36:57 AM UTC-6, grzegorz@gmail.com > wrote: > > W dniu piątek, 29 lipca 2016 03:42:07 UTC+2 użytkownik epic...@gmail.com > napisał: > > > A fileVM would be a mountable filesystem that 2 or more AppVMs can > share. > > > > > > A fileVM could be a normal partition like MSDOS/FAT32, an encrypted > filesystem, or even a distributed or cloud filesystem. > > > > > > There are numerous uses for this, for example, installing Dropbox on a > Linux AppVM and sharing the dropbox folder with a Windows AppVM that has > Microsoft Office installed so you can edit docx files. You would create one > DOS/FAT32 partition that would be attached to both the Linux and Windows > AppVM. Currently you would have to install dropbox on both the Windows and > Linux AppVMs doubling storage requirements. > > > > > > As long as the two AppVMs share the same risk tolerance there doesn't > seem to be any reason not to allow this in my mind? > > > > > > The current system of having to manually transfer individual files > from one AppVM to another is a productivity bottleneck and to many makes > QubesOS undesirable as a primary OS. > > > > > > I understand there are many reasons to enforce the manual transfer in > certain AppVM domains depending upon their nature, and this should be the > default, but we also need a way to intelligently share large amounts of > files between AppVMs in the same security domain. > > > > If I remember correctly this is already doable by attaching a block > device to two VMs at once. > > Do remember where you saw a procedure for this? > > I would suggest to use a network share, for example with a NAS that you can use also to keep encrypted Qubes backups. It is extremely easy to mount every time you need it just using nautilus and it is reliable. Also this way you can easily afford to have more space than you''ll ever be able to use. And the NAS can do other services too. For example a surveillance webcam, backup your websites and much more. Best Fran -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/2a633509-08af-4578-babc-9d39ed4a0dcf%40googlegroups.com > . > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qBX%3D%2Bdr47TmPX6uTFU3C7Nh4AjYPNUv%3DXggB%3DMOEA%3DdOw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: What do you think about the idea of a FileVM?
On Friday, July 29, 2016 at 2:36:57 AM UTC-6, grzegorz@gmail.com wrote: > W dniu piątek, 29 lipca 2016 03:42:07 UTC+2 użytkownik epic...@gmail.com > napisał: > > A fileVM would be a mountable filesystem that 2 or more AppVMs can share. > > > > A fileVM could be a normal partition like MSDOS/FAT32, an encrypted > > filesystem, or even a distributed or cloud filesystem. > > > > There are numerous uses for this, for example, installing Dropbox on a > > Linux AppVM and sharing the dropbox folder with a Windows AppVM that has > > Microsoft Office installed so you can edit docx files. You would create one > > DOS/FAT32 partition that would be attached to both the Linux and Windows > > AppVM. Currently you would have to install dropbox on both the Windows and > > Linux AppVMs doubling storage requirements. > > > > As long as the two AppVMs share the same risk tolerance there doesn't seem > > to be any reason not to allow this in my mind? > > > > The current system of having to manually transfer individual files from one > > AppVM to another is a productivity bottleneck and to many makes QubesOS > > undesirable as a primary OS. > > > > I understand there are many reasons to enforce the manual transfer in > > certain AppVM domains depending upon their nature, and this should be the > > default, but we also need a way to intelligently share large amounts of > > files between AppVMs in the same security domain. > > If I remember correctly this is already doable by attaching a block device to > two VMs at once. Do remember where you saw a procedure for this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2a633509-08af-4578-babc-9d39ed4a0dcf%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Fedora 23 template upgrade conflict
On 07/29/2016 02:08 PM, 45uiay+8xfsofrot5g94 via qubes-users wrote: Just did, still no luck. The update still presents the same error. I had to use 'dnf clean all' before update would work. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/158132a4-3174-ec27-971f-f0bfb9c09dc8%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: [qubes-devel] Window border colors
> Jeremy Rand: >> Marek Marczykowski-Górecki: >> Try this: >> >> Go to system settings -> Application Style -> Window Decorations. It >> should be set to "Breeze". If it is set to "Plastik", it may be the >> cause of the problems. >> >> If this is the case, I think this may be related to KDE update done by >> Fedora recently (a lot of kf5-* packages), so unrelated to >> qubes-gui-dom0 version. > > Yes! It was set to Plastik. Changing it to Breeze and clicking Apply > instantly fixed the issues. (Well, I can't test whether it fixed the > icon of the launcher, because I've already done the workaround that I > described previously. But everything else is fixed now.) > > Thank you Marek! > > -Jeremy > This also instantly fixed the same problem for me, and I can confirm that it began at about the same time as the kf5-* updates from Fedora. Thank you! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/243b1d95-2d10-7786-c7fd-4fcc3ce05a97%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 3.2 rc2 has been released!
Iestyn Best: > Thank you guys, great work. > > Just a little side note, yesterday when I updated it seemed to break my > window borders in KDE. I am now using XFCE and all seems fine. > > I have not tried KDE again today, just trying to get use to XFCE now as that > is your focus now. > I can't link to the exact message right now (qubes-devel, Marek, thread named "Window Borders", fifth message in the thread), but these instructions fix that issue in KDE: "Try this: Go to system settings -> Application Style -> Window Decorations. It should be set to "Breeze". If it is set to "Plastik", it may be the cause of the problems. If this is the case, I think this may be related to KDE update done by Fedora recently (a lot of kf5-* packages), so unrelated to qubes-gui-dom0 version." -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3b1026c0-664a-5945-b6d8-0814ef247010%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Installation failed and destroyed drive
On Wednesday, May 4, 2016 at 8:02:11 AM UTC-7, ricky...@gmail.com wrote: > The SSD is detected by the machine though, it's listed in the boot menu. > Acer Chromebook C720. > have you tried to restart with Chrome OS? or is it completely useless now? (or is Chrome OS useless to you). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/281455db-b20e-468e-9c90-9f5883304150%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 3.2 rc2 has been released!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-28 11:57, Marek Marczykowski-Górecki wrote: > On Thu, Jul 28, 2016 at 12:49:25PM -0400, Chris Laprise wrote: >> On 07/28/2016 08:44 AM, Marek Marczykowski-Górecki wrote: >>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 >>> >>> Details here: https://www.qubes-os.org/news/2016/07/28/ >>> qubes-OS-3-2-rc2-has-been-released/ >>> >>> As usual, you can download new image from: >>> https://www.qubes-os.org/downloads/ >>> >>> Users of R3.2 rc1 can just install updates, no need for full reinstall. >>> For older releases check above page for upgrade instructions. >>> > >> Fedora 23 template shows a broken dependency for qubes-db: > >> Error: nothing provides xen-libs >= 2001:4.6.1-20 > >> If manually add --allowerasing, it just tries to skip updating qubes-db. > > That package was still in testing repository. Now should be better. > Marek, another user is still reporting the same problem: https://groups.google.com/d/msg/qubes-users/hBGELi7w4aQ/q_skPwGoCwAJ Any ideas? - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXm581AAoJENtN07w5UDAwVEUP/1pP7qzWCorTEPBwK+Dntv4F Ngg0o7UO2HWWRbaNS31kw2g378wNBMYaP4ufb8Afp33BkSO0OJMDQIU1SVUjAPmG El2y8ZNCDGGs5irDLtY6yFiGkLFyfKDOus1mIHBQrKVOOcZLcvLMymPw0vbFLLRq LBzliocqU0m2aisp8hc7K1NdifHnSSJP0TwQ2N4rYAklMYiQ00qnqZ+PsPxe3N/x 0QyjsLzBkLF10+5y4qmWPQK0IG7n4q/Ry2jouVDbHGdjp1CGAuuM0WDaB+Gu18F8 MLgbqW8k6m6LmNkKZcA4ou+Upv25TaphrX/PL1xEj4m8h2IpmCvWxEI/E9Crv/CX ZS/nrEv0MqeFxuD3VPjsaViAJ0OimIomF6MngM01+Pezs7OwWbyQDJeSg5BCXimx odEPxgph3dYZ641bpZkMzKTN2sVsewORBDGt0N3uZIVUMiR3msVhWoBO8Mvp3OaX PBZYNR3lUALMWityUg389MmQyaZFgTABuJZ+4j0/KpCLaRFLN9Fg6lWQNIX5la6E V/bqRnKc2ddKjZu4kqd+k5lDE8jdks+rvheEx4+lBE/BMw2xosKBBMSHWj68vPvz 3k65++lIt37fJZkI2upOwkkPJBgVtiRxg5HMPkAVNmAaL00Q2vV7NVTuMIa+h7ky PX0rAt1/0ck7AGqeR91k =p/XK -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/51065331-24c7-2037-7cf3-21ecb75bc386%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Fedora 23 template upgrade conflict
Just did, still no luck. The update still presents the same error. Sent using GuerrillaMail.com Block or report abuse: https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/57f8bdfe58f70486a7caae4e500d17762723%40guerrillamail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Fedora 23 template upgrade conflict
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-29 10:37, 45uaue+5xrw8epnk2plg via qubes-users wrote: > The upgrade was triggered by the Qubes VM manager. How can I pass arguments > to it? > Sorry, disregard that. It looks like this has already been fixed (as of ~22 hours ago): https://groups.google.com/d/msg/qubes-users/X-FM2yQSkuk/cOzFRBZcCwAJ Please try updating again. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXm5XGAAoJENtN07w5UDAwuhQP/jFYQqCGQYhwjnVWWBl6ndFN YqGbiCEsCkOTRMGMpPZetCsrnjWhEThiSs9vdHEahn8RlSXlXBdxVJCrtROXC5BN W5cJC86WrEcJGYKNb15eFeqcM3vb5ntdzJjqQxOYVqpNoeIS45xwD0sGsQtEyuJh aiNRZ3cH58XaZD76bM6HTP5g9Biw5JplOO6HqUJClvTeiQ7nryC/rqPKN0HpkUhx kqdphKOvc5EFepiXzMfbsJtfeEKY6N2Yf8ifWawDsq1rtz4dajTZAgkRqqd3ZyvO WCUvoQXQkguDeD78kHy2nWvdAhfc76JyFSA+4DF+W3pkZJQ0wbBW/QCr+llmvYMx 9OfE/muBxr1BzVa0XKUJYyu/6D1dCkqJO0h5lEM1bXJK3fUANcL6giskXTFXsCDm id3cfrM9mQVGVU6y+x1+CG4x/86KLhdpxuad38rECpdc0XPK15geD8g8EHpj+wUl hfdgS0OoSWANxFyZbfCHV7OPaS0XwqwPjSkKmaP3ydzi45ZYwVJVfYJgNzT9f2zf O4ZiT53MsUFNrk4bOKJaOVOTp1lX46JVOFrW1ZTDSjgsfgNUcx5wcr3auIrZBx08 +owH8UDP0cylZkBjPnRF5ZmZyE910DTKH2hafRj/bljZ+Q50wOLRfV1hd+8Woe3t yJ4OXyUT8EFXIGNLdntZ =gqPX -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4dd8ce25-7b7a-3f4e-1ff2-c76e6fe75d81%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] What do you think about the idea of a FileVM?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-28 18:42, epicd...@gmail.com wrote: > A fileVM would be a mountable filesystem that 2 or more AppVMs can share. > > A fileVM could be a normal partition like MSDOS/FAT32, an encrypted > filesystem, or even a distributed or cloud filesystem. > > There are numerous uses for this, for example, installing Dropbox on a > Linux AppVM and sharing the dropbox folder with a Windows AppVM that has > Microsoft Office installed so you can edit docx files. You would create one > DOS/FAT32 partition that would be attached to both the Linux and Windows > AppVM. Currently you would have to install dropbox on both the Windows and > Linux AppVMs doubling storage requirements. > > As long as the two AppVMs share the same risk tolerance there doesn't seem > to be any reason not to allow this in my mind? > > The current system of having to manually transfer individual files from > one AppVM to another is a productivity bottleneck and to many makes > QubesOS undesirable as a primary OS. > > I understand there are many reasons to enforce the manual transfer in > certain AppVM domains depending upon their nature, and this should be the > default, but we also need a way to intelligently share large amounts of > files between AppVMs in the same security domain. > If there's such a great need to be constantly transferring files back and forth between two or more domains, then that suggests that they shouldn't actually be separate security domains in the first place, doesn't it? An exception to this would be VMs that are separate VMs not because they are distinct security domains, but for other reasons. For example, you have a Windows domain and a Linux domain, and you have to test things using the same files in both VMs. You regard them as a single security domain, but of course they must exist as separate VMs. So, I can see this as being useful for the latter type of purpose. However, that's a more advanced usage of Qubes aimed not at regular users but perhaps as developers. Just a thought. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXm5T8AAoJENtN07w5UDAwV2IP/2ADsbDhIRSbQiPtoI3ocBI7 HqnCU7gQuYRrK/CDlsD4hxYz7K9uApZKdrAeC7t3r6h1T/Rf+XX2v/ttcNHroj2S GAeDKyrwiY423cOjcES/3PtUd5yPLeJXpOfXZNh87xUDKOLEaJE7KPfa1Ep6YvUR GLGd3ofAi3I9vtsKU/kEeApFYpI2nSE+izzTjIw4AerYyfAcmG+ZJyIr11XFcqmz AG51AITrSTEUfxzRrKnOXnXy9Ic2BvRtvMibA6zUDPyvruG9f/ws9z+v1tHg62vn ETO5ptcjXnC2QRlWldsCVM2auUmNKFlhdw9lys3Qfzm/BBxqBytzHYnfcCW6cOYK HbhE2L2ZgztLiYpBNi8nWIkiV5aBn3GHk3+FiBJOA2TYQahNnDphAgPoTeb3qQIP 8v3Y7TT89Xf1jgQ8c34Fm40bFyynoerp7aPY8/KprZm37mucvjZXHUi6SbH+4mWp mvcGQv1bcWpHKNiVhlZqrZyzUUB3Jbn6a4tZLEvxTgSyUbOpWFYxUm8DDm/yrpcr RdnBoI+t4bcRgqxEqUvrVq2rI0imO8D/I+hvYtx2CX1O9FKeuB9b/Pa45x9TrYd3 06+j6L1EKla1pHp6nYWi/NIY8h5KZBc2wpQD8ZM/ShqLfxaRqr29LqN8y2eYz8Ad zjrch+uQz3UnJ3i+owxP =CQhd -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3fe93bc6-23f2-119a-c2e6-16e2e09e2e70%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes Security Bulletin #24 (Critical bug)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-28 17:25, Chris Laprise wrote: > On 07/27/2016 04:27 PM, Andrew David Wong wrote: >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 >> >> On 2016-07-26 20:01, Chris Laprise wrote: >>> On 07/26/2016 08:45 PM, el...@tutanota.com wrote: > What is best way to verify our system supports these things? I think you can also check out the processor with Intel.. ark.intel.com You can search through the different processors if you are looking to pick up a new computer. >>> A guide I found at AMD: >>> http://support.amd.com/en-us/kb-articles/Pages/ >>> GPU120AMDRVICPUsHyperVWin8.aspx >>> >>> From Microsoft: http://support.amd.com/en-us/kb-articles/Pages/ >>> GPU120AMDRVICPUsHyperVWin8.aspx >>> >>> Basically, anything recent that isn't too cost-reduced. >>> >>> Chris >>> >> Chris, I think you may have accidentally pasted the same link twice. >> > > Sorry, didn't hit Ctrl-shift-V when I should ;) > > Here's the MS link: > http://social.technet.microsoft.com/wiki/contents/articles/ > 1401.hyper-v-list-of-slat-capable-cpus-for-hosts.aspx > > > Chris > Thanks! However, it looks like that article hasn't been updated in a while. Here's Intel's current, complete list of all CPUs that support EPT,so you can ctrl+F and search for your model: http://ark.intel.com/search/advanced?s=t=true - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXm5OsAAoJENtN07w5UDAwxYEP/3BVq+xK4NMIm1Q6h+IQKpsU ueT0XXWu7Yj+Eao7fSDyco+YP3UkNha3LgFWgs9n6fqmGL6YgoKbqb6jlb20tKAa R9Q4KiA8NK+X7PWB9yBIKM9laDxE1PE0z9D6goIpH18U7iHMkJRGoTJpn5CzWC/z 2W5BHZqCBuSAr1hBGSY4qY+lPT1iG+AVUldB4/rlFCXPiHc888ES1Gi7wI8J2ut8 +AhGYa/ECnV9lPeX/xSdzUBXywuWgm2gH7fe7F9opaN3IF3WY73dZ1t0qmNJxsaP XIsDhXB4ppqmyiat1++CIw/DfEBy1KbtplUnPPb3ANJG6FYj6/fCNhEF3h+1QPDn qnGxXnsL+dtQ4DFo2UdAYnJeuzxWEieo6u/mAvWIpzj2OqkettNUMy6OS7p+L97P t5b2sEYuItL93hGDnaTVKgTshVKdH0Nt6pkEg+vl7uz0FzWYSTh/WC8Y6g4pCR3p vpPu5d1U/4cALLhcx4s4CfN/kBadaA2PqhYZOy8MZK90nyAi6KJ0ue9fHSJf7HuQ 8SviI5T04x4FkzPgcIB0UI91N2o35xuIiFOP/iK2E/nuGHHlPkgREH0HXqguS6te KqPby754EPkiOoEaQwSsR89mdMjxf9eWfxmPFI/gJUQTYtQ4h5UXfl5LHFz/8ARj H3ozoQUTYfsrxmXtEuBH =O1JX -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c2305be3-fe7b-60a4-d3e4-6dd24c01d347%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to log all the websites accessed by a VM
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-24 16:22, Andrew David Wong wrote: > But if anyone has a better solution, I'm all ears. > I appreciate all the alternative suggestions. It's always nice to have multiple options for achieving the same effect, but I'm struggling to see why I should switch from my current method (which seems to work fine for me) to one of the other proposed methods (which seem more complicated to me). It's quite possible I'm missing something. So, which of these many methods is better (more secure, more reliable, etc.), and why? - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXm4/vAAoJENtN07w5UDAwrj4P/0xjZ26jr9eWtQRG9tpRpcfx ctqIeowBENekv/jubdgOzZcLL1alUoRky1r1xUXF4bZk9V3DePS/W0NKrEQzc/Ip IFRfQUy1+eoDxrJkYkz++es1SiIy/jWR9MkqkUcDbxWQDHQKX5LQk/6aiQG7fHvT 8eER5KYDOxAbuVl6sWQrgf6SG5feOGmKP1jznwfzrT3KhCFlJB79kikh2S0SoaIZ jAgwOpJf6x/hpcjISSKLAQ/hDJyBw8qj6A9siwEoIILx+j9bFT0bK1kqz3b8npYP OaaOzuWHbVFgPsCJkai6j/wKXIeGEM4caFrGpCssLJFDLadABkKFpcpKv561Xt5m G7p5BD6RFXiPi9rgnuqBI9qLSS4MJfn+ES4l2GJdB1hCnd+o9N0XugZouc1fEEXk Qx3qOd0VsBpgUDCHfl+juAYh6yNUCrF8RubvcltGZVy8oW0aE/0utXlbnkkle8SA hdziRvpdBlr20kVyhZbZiUlgyaEkBBsbXPfsfQNnIOzwt8nuNEUmcFQQeHuwO2TF lYMPgyJhAfVhJjuUYjDZMwYEVBTtnCVEtH47c4rdRCvCzOCMQoixg1NWxQPx9ntc yDtV2Jh7wPlvKWtRh6DsNFBGrvUI/LXjRwlgLwlGrct5BJt33/We9Sdr1iZVrRZS CrC0SrbQbbBQJ55KKxoT =dOfF -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/87fe6126-0856-c1f2-890b-b16892e513b8%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Fedora 23 template upgrade conflict
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-29 09:45, 45uaue+5xrw8epnk2plg via qubes-users wrote: > Hello, > > Does anyone knows how to fix this? > > Thank you. > Did you try with '--allowerasing'? - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXm4swAAoJENtN07w5UDAwj8cP/jHidk8sSLybJHroXV6B6PFX 3jDYx4Zq15qHDb8UuXIBqds20i8ZyOlwt3yXUR9If1S/g0Kp9u4F4SQrmg2NZTac g7Jf4C+JP5KngpLETYGOxu6y0GdV8SjStNwmmHPHh7JNXajCs+sOxcDwuwnEP6Wf ysWw1Rm4OBlZSrFZsBtntWt1IsGdqs2CaylKaFozHlPgN9m9arSAOC3kNAb77x+T wmNdRSuh+RzSmCBweXFVuZZ3pi08ajAukKn2znpc1ukAQWtV1BMWcSID2B+LiqjZ OxZ629g1mDwX6v6G5eyfJ6vw8x7xMvMgWuVRiXeUjQMMuWYiAKpC+DIoX50Gtomi iwZZPu38qc5Wszw3RcVymZcR6+sin9Xe7kTOivj6G3G2fSWApEyKLhUzUQpUeEIK QglkuYg3lUmXwITwbEygIjL06gL+N+cHOkzYrUS6jqceAFwOcVor9OjwmRViUBeq n42C8P5J+AWT6dvpn9lD7pc/qbMR5/ZqPwn6jSuvzG63z3ihIrmnSl27g2Lo/pA1 bBMDR+0YredXY+746ZUNUqIwBK3L4UZ7FoSew5Rvz8OJb2RtBg/tplc0pHkIp2tg bKWVrjiA49+OVzZhE4+J/jIwl/ckyYWXS2gRNJKMLaHH+VUoqOH0AusvqK28LbOu gfafDTWNXj5sc/jlmvoe =DtW9 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/21ada6c3-407a-f890-d79f-64a75d4e64f8%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL - Hewlett-Packard-500-223w
I have successfully created and used several CentOS 7 (1511/Minimal) HVMs. Intel i3 so no IOMMU. No TPM installed. Seems to work decent so far. 16GB RAM, I can have 3 CentOS HVMs open simultaneously, the work VM (with 4 terminals and Firefox), the Fedora 23 VM open (while doing an update on the Fedora 23 VM) and everything was still fairly responsive, very nice. I've had this machine loaded for about three months now. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAM9FSFy-uzCFgMOyRYW_E7aCxwRNw-XOhwJ3KynY6e0bKHCKew%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-Hewlett-Packard-500-223w-20160729-124134.cpio.gz Description: GNU Zip compressed data Qubes-HCL-Hewlett-Packard-500-223w-20160729-124134.yml Description: application/yaml
[qubes-users] Re: Fedora 23 template upgrade conflict
Hello, Does anyone knows how to fix this? Thank you. Sent using GuerrillaMail.com Block or report abuse: https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/170b5212d455b681f023ff3cda93ef011888%40guerrillamail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 3.2 rc2 has been released!
The QUBES website incorrectly lists the file size for 3.2-rc2 It still lists: "4.8 GB (4,816,109,568 bytes)" It's actually now small enough to fit within a DVD disc now. 3.92 GB -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3d427595-f9e7-4f4c-99d6-87346a41c898%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Cryptsetup LUKS Nuke Option
Hello Andrew, imagine you have many files with CID data (customer identified data) and you must protect them after the EU data protection law. Now you must clean all data of the customer x. And this should be secure. A simple trick might be to use encryption. All files get encrypted with a own key. Instead of wiping the files, you can can simple destroy the keys (in a very secure way). This is simple and fast. But, it will be only valid, if and olny if the encryption will hold and really is safe. Ok, the only way to do this will be the one time pad, which is absolutely secure (as long the length is long enough to prevent the guessing). But for practical reasons, this might be take big disk spaces. For a compromise you can combine two ciphers, so if one will work and the other will get problems today or tomorrow, this "smart wiping" of files, will work. And by the way, if qubes os will have it's own real non-deterministic random generator, you can use the OTP to secure the passwords itself, which have a very limited disk space, so this will be feasible. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/97f34092-8565-490a-9d73-6310bd6dc791%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to switch VM network on and off?
Hello Andrew, good to know it and to keep this in mind to stay secure in different levels, which can be adapted to the requirements. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7b73fb90-5e0f-4aa8-b0d7-3698d9fc9987%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to switch VM network on and off?
Hello Frank, perfect, so I can keep the network setup and can prevent the installed software to "call home", without my control. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d658b44e-5562-4e39-b6d6-d0fec1668203%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: What do you think about the idea of a FileVM?
W dniu piątek, 29 lipca 2016 03:42:07 UTC+2 użytkownik epic...@gmail.com napisał: > A fileVM would be a mountable filesystem that 2 or more AppVMs can share. > > A fileVM could be a normal partition like MSDOS/FAT32, an encrypted > filesystem, or even a distributed or cloud filesystem. > > There are numerous uses for this, for example, installing Dropbox on a Linux > AppVM and sharing the dropbox folder with a Windows AppVM that has Microsoft > Office installed so you can edit docx files. You would create one DOS/FAT32 > partition that would be attached to both the Linux and Windows AppVM. > Currently you would have to install dropbox on both the Windows and Linux > AppVMs doubling storage requirements. > > As long as the two AppVMs share the same risk tolerance there doesn't seem to > be any reason not to allow this in my mind? > > The current system of having to manually transfer individual files from one > AppVM to another is a productivity bottleneck and to many makes QubesOS > undesirable as a primary OS. > > I understand there are many reasons to enforce the manual transfer in certain > AppVM domains depending upon their nature, and this should be the default, > but we also need a way to intelligently share large amounts of files between > AppVMs in the same security domain. If I remember correctly this is already doable by attaching a block device to two VMs at once. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20a68704-36ac-4bd7-9454-6225916962d7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] A problem with update
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Jul 28, 2016 at 10:56:28PM -0400, M. Vefa Bicakci wrote: > On 07/28/2016 05:24 AM, Marek Marczykowski-Górecki wrote: > > On Wed, Jul 27, 2016 at 10:31:10PM -0700, admix...@gmail.com wrote: > >> Hi, > >> I'm trying to update qubes but there still show that there is no updates > >> (for few moths). > >> I thought that was true until I tried to download update for xen. > > > >> Some commands: > >> http://pastebin.com/Q7nhfZnX > >> Linux dom0 4.1.13-9.pvops.qubes.x86_64 #1 SMP Thu Feb 11 15:46:02 UTC 2016 > >> x86_64 x86_64 x86_64 GNU/Linux > > > >> Can somebody tell me whats going on? > > > > I think --debuglevel option is not supported - this is why you've got > > that help message instead. Try `qubes-dom0-update --clean` to remove old > > metadata first. > > Hello Marek and Andrew, > > On a related note, the script at > "/usr/lib/qubes/qubes-download-dom0-updates.sh" may have > a minor bug related to the removal of the cache files when the --clean option > is passed > to the qubes-dom0-update script in dom0. > > When I run "sudo qubes-dom0-update --clean", as seen below my signature, "rm" > outputs an > error mentioning that it cannot remove a directory. Even though "--clean" was > used, the > timestamp for the metadata expiration check indicates that dnf is using > metadata from > almost 12 minutes ago. This indicates an issue with the clean-up of the > dnf/yum cache. > > When I "rm -rf" all the offending directory on sys-net using the command > listed below, > then "--clean" works as expected as can be seen below, where the metadata > expiration > check indicates only a 23 second delta, which is a more plausible value when > using "--clean". > > All this to say, would it be possible to make the > "qubes-download-dom0-updates.sh" script use > "rm -rf" rather than "rm -f" on the paths related to the dnf/yum cache for > dom0 updates? Yes, this is already fixed in qubes-core-vm 3.2.9: https://github.com/marmarek/qubes-core-agent-linux/commit/40d5f85b361d6f2ca889f7a9f1230baca826e1bf - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXmwZVAAoJENuP0xzK19csgF8H/iuY7YLn6aF6e4nDCckzKjUK b2cKuhJOXt3vYulv5fR2zSQJMQAhdorC7iHXhsBQKvolNxEgqGa0Mt/B+IUixIfT 4A7pZHCR/aO+exXkamzGkvB8ShEnBLGIEKXSXUTri2KMgJzubgjH34VgjUAIgsQa iFKE1Tj6NTYlIaGPjKoVccnP+3/HSGrsDDmNoNZ3Ru4o8OSP9NCBlCMvOXIDOWr6 VDr8UKfsrU9oEQADa/dOK9TlbqMt8MaeHPrp8sDB4IUD0hQJowyjgazvUxXVixqc BYMTrhVY5hmg10z86JbEL3T+kjZF3XM6zjwc2exqtablytN2gc1J+WDARVXuu8Q= =MGXn -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160729073132.GL32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.