Re: [qubes-users] Re: QSB #43: L1 Terminal Fault speculative side channel (XSA-273)
On Monday, September 3, 2018 at 1:21:27 AM UTC-7, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Mon, Sep 03, 2018 at 01:46:11AM -0500, Andrew David Wong wrote: > > On 2018-09-02 22:22, pixel fairy wrote: > > > is it still necessary to disable hyper threading after upgrading > > > in qubes 4? > > > > > > > Hyper-threading should be disabled in Xen after you install the updates. > > It should not be necessary for you to take any further action to > > disable it there. > > > > If you're asking whether you should also disable it in your BIOS > > settings, then I'm not sure (CCing Marek). > > There is no need to additionally disable it in BIOS. Xen's smt=off > option means it won't be used even if BIOS reports its availability. Is this something that can eventually be resolved, allowing safe re-enabling of hyperthreading? or is that even known yet? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/56ca3f03-24bc-410d-af1f-ef92db60b208%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't create Linux HVM
Hello all. I have been trying to install a version of Ubuntu Linux called Buscador and can't get past the partitioning utility. I boot the live iso and everything works fine but when I boot the installer I go through the user set up screen fine but the partition utility never finds the partitions. Even if I boot the live ISO in an established Linux install it still does not find the partitions. Any ideas would be appreciated. Thanks in advance -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d087fc44-e7fc-4bad-b89d-07c6b0800766%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can I set an unencrypted external HD as /home folder for a VM
On 09/03/2018 06:03 PM, Guy Frank wrote: On Friday, August 31, 2018 at 6:31:58 PM UTC-4, Chris Laprise wrote: On 08/31/2018 01:40 PM, Guy Frank wrote: On Friday, August 31, 2018 at 12:17:54 PM UTC-5, js...@bitmessage.ch wrote: Guy Frank: One question I had is whether there is any way to set an unencrypted (or encrypted?) external HD as the /home folder for a VM? Guy Hi Guy, I'm not sure about setting it as /home but i think it's possible. But it's easy to attach an external HD to a vm and save your files to it. https://www.qubes-os.org/doc/usb/ Also it's pretty easy to encrypt it with luks for security, it just takes a little longer each time. -- Jackie Thanks Jackie for your reply! I remember it being fairly easy to attach USB devices w/ the right clicks here & there. So, yes, I'd have access to the files on my external HD. But it would be more convenient if I could get Qubes to mount the home folder on the HD as the Home folder for the given virtual machine. I imagine that's trickier and was wondering if there's a way to do it? Maybe use a script to mount the attached USB drive home (/home/guyuser) over the Qubes home directory? But then, if that's possible, some of the setup in the Qubes home directory might get missed. The key to using it as /home would be to setup a new storage pool to hold that VM. Unfortunately the docs could use a rewrite: https://www.qubes-os.org/doc/storage-pools/ The relevant commands are 'qvm-pool --add' and 'qvm-create --pool'. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 Hi Chris: Thanks! This looks like a step in the right direction, but I have some questions. I'm guessing the commands will tell Qubes to treat my external HD as a potential place to store a VM. But that seems like it wouldn't take the existing home directory on the external HD as the VM home directory but instead store a VM file containing the VM's home directory structure on the disk. That file would, I imagine, be difficult to access on the Kubuntu I have running on my home desktop and wouldn't contain the files currently on my external hard disk, which mirror my Kubuntu files. Is that the case and is there any fix? Am beginning to think the only way to work this is to simply attach my external HD as a USB device and give up on trying to make the files my home directory. You're right that it wouldn't readily treat a bare home directory as the VM's own, but create a Linux disk image instead. But if the other systems are Ubuntu or similar Linux, you have options. First is encryption: Ubuntu should recognize a LUKS-formatted drive when its inserted and prompt the user for a passphrase automatically to unlock and mount it. This could make your work flows more secure. Also, I recall Ubuntu having some way to mount disk image files from the file explorer. But you can setup the drive with LVM on top of LUKS (use the LVM Qubes driver), and I think in this case Ubuntu may try to make the LVM volumes available to the user as soon as its unlocked (if not, you could use gnome-disks as a GUI to do this, although a script with an icon would work too). -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2a97c1a3-4d5a-3e43-3589-9e324b47f631%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can I set an unencrypted external HD as /home folder for a VM
On Friday, August 31, 2018 at 6:31:58 PM UTC-4, Chris Laprise wrote: > On 08/31/2018 01:40 PM, Guy Frank wrote: > > On Friday, August 31, 2018 at 12:17:54 PM UTC-5, js...@bitmessage.ch wrote: > >> Guy Frank: > >>> One question I had is whether there is any way to set an unencrypted (or > >>> encrypted?) external HD as the /home folder for a VM? > >>> > >>> Guy > >> > >> Hi Guy, > >> > >> I'm not sure about setting it as /home but i think it's possible. But > >> it's easy to attach an external HD to a vm and save your files to it. > >> > >> https://www.qubes-os.org/doc/usb/ > >> > >> Also it's pretty easy to encrypt it with luks for security, it just > >> takes a little longer each time. > >> > >> -- > >> Jackie > > > > Thanks Jackie for your reply! > > > > I remember it being fairly easy to attach USB devices w/ the right clicks > > here & there. So, yes, I'd have access to the files on my external HD. > > > > But it would be more convenient if I could get Qubes to mount the home > > folder on the HD as the Home folder for the given virtual machine. I > > imagine that's trickier and was wondering if there's a way to do it? > > > > Maybe use a script to mount the attached USB drive home (/home/guyuser) > > over the Qubes home directory? But then, if that's possible, some of the > > setup in the Qubes home directory might get missed. > > > > The key to using it as /home would be to setup a new storage pool to > hold that VM. Unfortunately the docs could use a rewrite: > > https://www.qubes-os.org/doc/storage-pools/ > > The relevant commands are 'qvm-pool --add' and 'qvm-create --pool'. > > -- > > Chris Laprise, tas...@posteo.net > https://github.com/tasket > https://twitter.com/ttaskett > PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 Hi Chris: Thanks! This looks like a step in the right direction, but I have some questions. I'm guessing the commands will tell Qubes to treat my external HD as a potential place to store a VM. But that seems like it wouldn't take the existing home directory on the external HD as the VM home directory but instead store a VM file containing the VM's home directory structure on the disk. That file would, I imagine, be difficult to access on the Kubuntu I have running on my home desktop and wouldn't contain the files currently on my external hard disk, which mirror my Kubuntu files. Is that the case and is there any fix? Am beginning to think the only way to work this is to simply attach my external HD as a USB device and give up on trying to make the files my home directory. Guy -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/253d0a35-8450-4264-a191-b885e4ad6a11%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Sys-net fail to connect to internet
Hey guys currently running Qubes R 4.0 . And my sys-net as failing to connect to the internet + when I switch on mozila is lagging pretty bad. Please check the pic to see what exactly the configuration shows me . https://imgur.com/a/6fgXaAq Thanks in advance -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8859d8a9-db06-41ad-9116-e43430ea168b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] After I disabled ipv6 for all VMs the following problems arose.
Good day. After I disabled ipv6 for all VMs (because ipv6 is not used on my computer) the following problems arose. 1.whonix_firewall failed to load! 2. When I try to assign a static arp to the sys-firewall command: "arp -an | grep -v incom | awk '{print $ 2" "$ 4}' | tr -d '()'> / etc / ethers" after trying to load the arp table from / etc / ethers the following message appears: "Network is unreachable arp: can not set entry on line 3 of etherfile / etc / ethers Tell me, should I try to assign a static arp to the sys-firewall? How can I fix the operation of whonix_firewall when ipv6 is disabled? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/64c14cee-fb57-44a9-993a-9d8c4cf104e3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: cpu
I'm afraid so, yeah. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/86106a1d-14a2-46b8-b6f4-a790f328f107%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Anyone still using GRSecurity
Is anyone using GRSecurity currently? Are there better solutions? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6cf78467-241f-4d39-aacf-548c099ce95e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Unable to reset PCI device 0000:02.00.0
On Monday, September 3, 2018 at 10:31:50 AM UTC-4, unman wrote: > On Sun, Sep 02, 2018 at 03:56:46PM -0700, Patrick wrote: > > On Sunday, September 2, 2018 at 3:34:34 PM UTC-4, Jean-Philippe Ouellet > > wrote: > > > On Sun, Sep 2, 2018 at 10:12 AM, Patrick Bouldin > > > wrote: > > > > On Sunday, September 2, 2018 at 10:10:55 AM UTC-4, Patrick Bouldin > > > > wrote: > > > >> Qubes 4.0 Error - "Start failed: Requested operation is not valid: PCI > > > >> device :02:00.0 is in use by driver xenlight, domain sys-usb > > > >> > > > >> I don't know how to copy the log folder over and qubes doesn't have > > > >> the wireless network, which I believe is related, but I've attached a > > > >> picture of the log. > > > >> > > > >> This is a new Qubes install on a new Acer laptop Aspire A515-51-86AQ > > > >> Booting in legacy mode. > > > >> > > > >> I can get into the main desktop and get to Dom0 terminal, but can't > > > >> launch any of the default domains. > > > >> > > > >> There is another thread on here with the same error. He ran: > > > >> $ qvm-pci attach --persistent --option permissive=true --option > > > >> no-strict-reset=true sys-net dom0:00_XXX > > > >> > > > >> And it worked for him, but doesn't work for me, the response I get is > > > >> "error : backend vm "dom0" doesn't expose device "00.XXX" > > > > > > The "XXX" in the PCI device should be filled in with your actual PCI > > > device. > > > > > > >> So I wonder what "xenlight" is and it won't release what pci device? > > > > > > Just a library for interfacing with Xen. Unlikely to be the actual > > > problem. > > > > > > >> Suggestions? > > > >> > > > >> Thanks, > > > >> Patrick > > > > > > > > Pics attached here. > > > > > > It would be the first time I've seen this, but it might perhaps be > > > conceivable that changing BIOS settings caused your device to show up > > > with a different BDF (essentially "PCI address") than when Qubes was > > > installed? Use `lspci` in dom0 to enumerate them. > > > > > > An easier way than doing this via the command line is to use the > > > Devices tab of the Qubes VM Settings GUI - remove all devices then add > > > the one which looks like your network device. You can also configure > > > no-strict-reset via the button at the bottom of the GUI, which is > > > sometimes necessary. > > > > Thanks, I went to the work vm for example, and all of the devices were on > > the left side, nothing on the right, then I selected the wifi device and > > the response was "you've enabled dynamic memory balancing, some devices > > might not work!" > > > > and, it won't let me apply that change, saying "Can't attach pci device to > > a VM in pvh mode" > > > > Then I tried to issue your suggestion "$ qvm-pci attach --persistent > > --option permissive=true --option no-strict-reset=true sys-net dom02:00.0" > > which is my wireless device and the error response "no backend vm '02'" > > > > > > I'm wondering if this is the right way to go or maybe just try a different > > installation route? > > > > Thanks, > > Patrick > > > > There's a typo in your command: > you have dom02:00.0 and the command should be dom0:02 > > The two messages you received can be fixed in the Qube settings window. > You can change the VM mode on the Advanced pane - select HVM. > There's a checkbox for memory balancing on the same pane , if that's > needed. I habitually turn this off and set the memory/maxmem settings > low. ymmv Thanks, I'm feeling outgunned on this one. I really have no idea about what is truly going on - what's the root cause issue and why? What device is not resetting and why that matters, etc. etc. Just to be clear. While I'm able to get into the Qubes desktop, and can get to dom0 terminal, none of the pre-configured VMs are coming up. If I simply do a start from the Dom0 qubes manager, on any VM, the same error comes up: "Unable to reset PCI device :01:00.1: Internal error: active :01:00.0 devices on bus with :01:00.1 not doing bus reset." The log says: "unable to release device /dev/loop0: No such device or address" I have tried all your suggestions (HVM/mem checkbox/low mem), no change in result. Based on this, what is going on in the first place? I feel if I can understand the root of it I stand a chance in solving. Thanks, Patrick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d5abd8e2-8e59-4d1b-bc3c-2d7917a12c18%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Unable to reset PCI device 0000:02.00.0
On Sun, Sep 02, 2018 at 03:56:46PM -0700, Patrick wrote: > On Sunday, September 2, 2018 at 3:34:34 PM UTC-4, Jean-Philippe Ouellet wrote: > > On Sun, Sep 2, 2018 at 10:12 AM, Patrick Bouldin > > wrote: > > > On Sunday, September 2, 2018 at 10:10:55 AM UTC-4, Patrick Bouldin wrote: > > >> Qubes 4.0 Error - "Start failed: Requested operation is not valid: PCI > > >> device :02:00.0 is in use by driver xenlight, domain sys-usb > > >> > > >> I don't know how to copy the log folder over and qubes doesn't have the > > >> wireless network, which I believe is related, but I've attached a > > >> picture of the log. > > >> > > >> This is a new Qubes install on a new Acer laptop Aspire A515-51-86AQ > > >> Booting in legacy mode. > > >> > > >> I can get into the main desktop and get to Dom0 terminal, but can't > > >> launch any of the default domains. > > >> > > >> There is another thread on here with the same error. He ran: > > >> $ qvm-pci attach --persistent --option permissive=true --option > > >> no-strict-reset=true sys-net dom0:00_XXX > > >> > > >> And it worked for him, but doesn't work for me, the response I get is > > >> "error : backend vm "dom0" doesn't expose device "00.XXX" > > > > The "XXX" in the PCI device should be filled in with your actual PCI device. > > > > >> So I wonder what "xenlight" is and it won't release what pci device? > > > > Just a library for interfacing with Xen. Unlikely to be the actual problem. > > > > >> Suggestions? > > >> > > >> Thanks, > > >> Patrick > > > > > > Pics attached here. > > > > It would be the first time I've seen this, but it might perhaps be > > conceivable that changing BIOS settings caused your device to show up > > with a different BDF (essentially "PCI address") than when Qubes was > > installed? Use `lspci` in dom0 to enumerate them. > > > > An easier way than doing this via the command line is to use the > > Devices tab of the Qubes VM Settings GUI - remove all devices then add > > the one which looks like your network device. You can also configure > > no-strict-reset via the button at the bottom of the GUI, which is > > sometimes necessary. > > Thanks, I went to the work vm for example, and all of the devices were on the > left side, nothing on the right, then I selected the wifi device and the > response was "you've enabled dynamic memory balancing, some devices might not > work!" > > and, it won't let me apply that change, saying "Can't attach pci device to a > VM in pvh mode" > > Then I tried to issue your suggestion "$ qvm-pci attach --persistent --option > permissive=true --option no-strict-reset=true sys-net dom02:00.0"which is > my wireless device and the error response "no backend vm '02'" > > > I'm wondering if this is the right way to go or maybe just try a different > installation route? > > Thanks, > Patrick > There's a typo in your command: you have dom02:00.0 and the command should be dom0:02 The two messages you received can be fixed in the Qube settings window. You can change the VM mode on the Advanced pane - select HVM. There's a checkbox for memory balancing on the same pane , if that's needed. I habitually turn this off and set the memory/maxmem settings low. ymmv -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180903143147.acek673j6y6vl3y6%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: cpu
On Monday, 3 September 2018 09:15:47 UTC-4, Foppe de Haan wrote: > On Monday, September 3, 2018 at 3:02:24 PM UTC+2, Roy Bernat wrote: > > Hi > > > > i have dell xps 9360 . core i7 . until the update today i had 4 cores . > > > > now the dom see only two . why ? someone gas an idea . strange that the > > computer is feeling faster than ever. > > > > Roy > > If it's a 7th-gen intel CPU, those "i7"'s only had two real cores with > hyperthreading making it look like there were 4. HT had to be disabled > because of https://www.qubes-os.org/news/2018/09/02/qsb-43/ (Known to affect > Intel CPUs, doesn't look like it affects AMD.) Hi Thank you fir your replay . good to know is it affect my performance ? I already have a bad performance ( refresh rate ... slow response ) xps 9360 16GB core i7 512nvme Roy -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a41a48e5-ec0b-45c4-b907-ea384250f440%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: cpu
On Monday, September 3, 2018 at 3:02:24 PM UTC+2, Roy Bernat wrote: > Hi > > i have dell xps 9360 . core i7 . until the update today i had 4 cores . > > now the dom see only two . why ? someone gas an idea . strange that the > computer is feeling faster than ever. > > Roy If it's a 7th-gen intel CPU, those "i7"'s only had two real cores with hyperthreading making it look like there were 4. HT had to be disabled because of https://www.qubes-os.org/news/2018/09/02/qsb-43/ (Known to affect Intel CPUs, doesn't look like it affects AMD.) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/930f888f-1c67-4b7f-b295-a35911b36ca6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] cpu
Hi i have dell xps 9360 . core i7 . until the update today i had 4 cores . now the dom see only two . why ? someone gas an idea . strange that the computer is feeling faster than ever. Roy -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/977860a2-f1a3-4894-ad83-9d012201ae29%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] systemd replacement for dom0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Marcus Linsner: > I'm mainly asking because I fail to make certain services stop in a > certain order at reboot/shutdown. Hmm, maybe I should focus on > starting them in a certain order? then maybe shutdown will do it in > reverse order [...] Yes, that's how systemd does it. See Before= and After= in the systemd.unit manpage. Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJbjRxlXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfMA8QAIHtHBR3n/TfayCr6Oosrn1W wKA7x5jWBPTKh40K0H3OPipfWhAoHSy+8Og6jL+sW8k3G3MumVkz4ee9dcz3uT/e sidKEFxYO9z7rBRlcKNkvnT2WfA1WEyimSV6A2sjtE4GZT8N9oDtcogb2vdn/I0X lPxJ2/xlN8mkhpe2VMfcpA0lcuvZ7UNfh1i2wiL1BeJKUZHFOwuQJSAFMg9JcZKz IzJPQoH2WhsFHJ2zggRSgsRSvE38MI9gOsyQ/ola2BDZpoHf8HsW6F16yVkfZtmq QSqTv1z91aAEqccxJp8zWr022XhHwYKdTOlI48fPiaCddgV/dJbi2dgrsUv46qb7 y+zU9qTb9b95A/n4eadKKeQWq0DEvM4DTX690TX5eVMKIxc2WeqummLxICGAgsYH lHEnyLJGaR9F8fhAI2Tf/uMStAFoOdgbyjqyzWtdfn7S6LIM5Gjcu7bC0wT1W42l VNGHJd3T20w2Xnb2H2dJ0fbSVLxBG4ef01xQyH6SFxArlmuttUyZrJZ3v3fKnyPz ia5qMky7sQWEuo3VT61nSiMg52cQq6iDWHzl5llyaqXZsyJWrcIB2E6xGvaNVQDa F7SdyhR38Khy/H0J4S0kL11rjgjp+Ff4Jrzl1g+PPT55Y43MfNturiePO5nVndFd Ro+lUw0hr97WC4I660Po =9moi -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180903113501.GA946%40mutt. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] setting up vpn issue
Hi Chris, yes it worked... now I added the dns provided by ExpressVPN. thank you very much best regards Nick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0f1f0427-65b0-47cf-af91-3c95c25cd993%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: QSB #43: L1 Terminal Fault speculative side channel (XSA-273)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Sep 03, 2018 at 01:46:11AM -0500, Andrew David Wong wrote: > On 2018-09-02 22:22, pixel fairy wrote: > > is it still necessary to disable hyper threading after upgrading > > in qubes 4? > > > > Hyper-threading should be disabled in Xen after you install the updates. > It should not be necessary for you to take any further action to > disable it there. > > If you're asking whether you should also disable it in your BIOS > settings, then I'm not sure (CCing Marek). There is no need to additionally disable it in BIOS. Xen's smt=off option means it won't be used even if BIOS reports its availability. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAluM7v8ACgkQ24/THMrX 1ywhvggAk05Ra0VOk/rEelhxGqrQGPouTJWfmGL5/jpDRU7QTmErB2BqqHNQXbY0 TvJD+8DJTQBT84Gw+JrN4CYamS7VXMFFngekxDV4tZWfnkNiJQTJzM+Raa0zBcC2 7m10uoz1T8G9U5AH+5+yfCEx9hHgRn96SFbxmasOwRSyqIQ4MP4IPWLKzeh7EmbE U0iCKxsEjzD2V8HfDo3CoTfg0mXhygiQPF8qWDTs30hBPVYC14evci94sX2YqP40 8h/NRtZRMNk32F/+H8OU1fPHocO9/LbejU0jkeCxah3BRD3pkHLlCk5f+8hJfwOb 9eRwYGBIyJqYWervftRTN7oJLxCFZw== =T+UF -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180903082119.GB1371%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: QSB #43: L1 Terminal Fault speculative side channel (XSA-273)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2018-09-02 22:22, pixel fairy wrote: > is it still necessary to disable hyper threading after upgrading > in qubes 4? > Hyper-threading should be disabled in Xen after you install the updates. It should not be necessary for you to take any further action to disable it there. If you're asking whether you should also disable it in your BIOS settings, then I'm not sure (CCing Marek). - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAluM2K4ACgkQ203TvDlQ MDDegg//cxd+JmxvrobVWh4yQk6JB1+QiRPjn2Y9C/tW3Tktu1bvjy2jxEDFAeIW /Xqh612uXyqS85J0tDQkMro4hnTklpUko7mqYqC2Z6aQMthet5jZ6TF7IOnT9+ng Ijx0e/I0M5AWOqzgNBE8yA9eHbvxXsCqwwDSkcJfCBKyJa1DVW1uw1vMx65+oHC3 Gt5WuYBEzIqAjd0Z8IU1RB0FUlP6yHFtFcN7lVzOxYZ4VhLQXkySJzCpoDCRtgj5 tpdPZ6xGDXjrm+QBI53MjPmQ6OrtW3sNcKQ7iB1G2zAulx524IA4HIWpJjrH+W3G y2cYWgzJ0O9pbvOHWG/FHiySRdGMrQ0fHwHOrtVmF3bCQD4saHe0OUqZHhgfL2+H 6ltad1spUla5w6H5qlOuEzSPu3Gd0g6HfBYJPMaSEJW6aGpQ0OPOxfRenwYCnaRx ABMRXMaZcNEo7joK1GA+OtQUFQuVL4gaW5CV+kZSQid+Sk0ZdUMbDemBT+R9hxTD CSKyfu7gNTY5U2GhK3T3UhMhodhUBU0DVdKhFH7y+5bK9Kn+wXXkmYFCyKGF1iPm LxKX2zzMSJdHZBOcp/i+0Nwm8H6wxkknUuZqAi9On1i7Qn8Id//dj6bD+G62ecNM +CLaXSESSySaE5DS508b5TNYLzjYITRgHcG0exFDkJxSuD/VXlE= =8bBD -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/03b0892e-6fb3-7ff6-ad60-5e980437f8f4%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.