[qubes-users] Newb Help with Installation
Hello, So I'm attempting to install qubes to a usb stick. I've copied the iso onto the usb by using the dd command specified in the user documentation in ubuntu virtualbox (host os windows 10). I'm wondering if the fact I used a virtual machine to copy the iso versus a native linux os makes any difference? I attempted to boot into the bios on my lenova t430 and nothing happens when I go to boot. The boot menu comes up I select the usb and hit enter and the screen simply refreshes with the boot menu again. Again I've used linux before and can run basic command line but am a novice compared to most in this group I'm sure. Any ideas? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/167ded231e4.12ad2678923565.6434699087046297145%40zoho.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] error running 'setup' for Qubes Builder
On Sunday, December 23, 2018 at 7:13:36 PM UTC-7, awokd wrote: > seshu: > > I'm trying to build an Ubuntu templateVM using Qubes Builder. I'm running > > 4.0.1rc2 > > > > When, I ran the 'setup' command I got the following error message: > > > > [user@qubes-builder qubes-builder]$ sudo bash setup > > setup: line 16: from: command not found > > setup: line 34: syntax error near unexpected token `(' > > setup: line 34: `from subprocess import (Popen, STDOUT)' > > > > And the interactive screen never came up. I followed the instructions in > > https://www.qubes-os.org/doc/qubes-builder/ and at > > https://github.com/QubesOS/qubes-builder/blob/master/README.md > > > > I installed the packages as the instructions said. Then I ran the 'setup' > > command. > > > > Not sure what I am doing wrong. Any ideas? > > > > Thanks! > > > You want to run most/all of those build commands, including setup, as a > regular user. Not SU. Try: > ./setup Thanks, that did the trick! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/28a14ce1-e8f8-4a11-97ef-ebb89f2966c8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: How risky is GPU pass-through?
Zrubi: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/23/18 9:34 PM, Demi M. Obenour wrote: Someone I know is interested in using QubesOS. However, they are also a gamer: if they could not have a Windows VM with access to a dedicated graphics card for use by games, then QubesOS is not an option for them. Short answer: Qubes OS is not an option for them. The risk part would come only after this feature exists in practice ;) Search back for the details. What Zrubi said, really. Not a practical solution at this point. If at some point it works better, it seems to me too if the secondary GPU can be blocked from ever seeing dom0 and vice versa, it could be passed through without too large an attack surface increase. Assuming here Qubes/Xen/IOMMU can restrict overly large BARs, but that's any PCIe device. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9173fb7d-18d5-3f9b-3383-28a930e602fc%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] error running 'setup' for Qubes Builder
seshu: I'm trying to build an Ubuntu templateVM using Qubes Builder. I'm running 4.0.1rc2 When, I ran the 'setup' command I got the following error message: [user@qubes-builder qubes-builder]$ sudo bash setup setup: line 16: from: command not found setup: line 34: syntax error near unexpected token `(' setup: line 34: `from subprocess import (Popen, STDOUT)' And the interactive screen never came up. I followed the instructions in https://www.qubes-os.org/doc/qubes-builder/ and at https://github.com/QubesOS/qubes-builder/blob/master/README.md I installed the packages as the instructions said. Then I ran the 'setup' command. Not sure what I am doing wrong. Any ideas? Thanks! You want to run most/all of those build commands, including setup, as a regular user. Not SU. Try: ./setup -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cea31da4-529f-d14b-acdf-eb7d91294b6f%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Modifying a shortcut in the xfce menu?
On 12/23/18 7:44 PM, preill...@gmail.com wrote: I don't know how to edit the StartApp file, but think you could use this: qvm-run -q -a AppvmName 'firefox -P --no-remote' On 12/23/18 6:44 PM, Stumpy wrote: I am trying to figure how how to modify the firefox link/shortcut for one of my appvms in the xfce menu. I just want to add "-P --no-remote but all teh varients I have tried dont seem to work. I try to edit from the menu and in the "command" feild it has: qvm-run -q --service -- AppvmName qubes.StartApp+firefox I thought it would point to some .desktop file but that does not seem to be the case. I tried just adding -P --no-remote to the end but that didnt work either. Is there a page in the docs or github that covers this? Hey that worked! Thanks preilly40! While I will definitely go with that for the time being, if there is anyone that can say if that is totally ok or if its better to (find then) edit the StartApp file... as preilly40's method seems much easier. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/915b796c-b883-4d48-f375-433e63911935%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Modifying a shortcut in the xfce menu?
I don't know how to edit the StartApp file, but think you could use this: qvm-run -q -a AppvmName 'firefox -P --no-remote' On 12/23/18 6:44 PM, Stumpy wrote: > I am trying to figure how how to modify the firefox link/shortcut for > one of my appvms in the xfce menu. I just want to add "-P --no-remote > but all teh varients I have tried dont seem to work. > > I try to edit from the menu and in the "command" feild it has: > > qvm-run -q --service -- AppvmName qubes.StartApp+firefox > > I thought it would point to some .desktop file but that does not seem > to be the case. I tried just adding -P --no-remote to the end but that > didnt work either. > > Is there a page in the docs or github that covers this? > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0ce6dcc1-8394-9092-b86c-fcd32576260d%40gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How risky is GPU pass-through?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/23/18 9:34 PM, Demi M. Obenour wrote: > Someone I know is interested in using QubesOS. However, they are > also a gamer: if they could not have a Windows VM with access to a > dedicated graphics card for use by games, then QubesOS is not an > option for them. Short answer: Qubes OS is not an option for them. The risk part would come only after this feature exists in practice ;) Search back for the details. - -- Zrubi -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlwgIk0ACgkQVjGlenYH FQ2S2g//cIr3vnUjFbhTmWFwSu7SHxpGiT3RORuFOWKb5xilsksyFCBzCwNKphMl IyUG1czc66fiR+9ZcdwtX0iTyAjWsnQYLysfbaxOFGjF980pDc5stunWYSJN8NXE jkMiUwbTDXCLW0d/VrG2KMVf3GYt1vS/G9vuS3N5JAolGucTEJPOo8TuXYs44kM1 U/XlkqDdJyJnhDzw0YeJCGMGrHRtwlwfsyErOIMyt9hYyF/qAaegNlBg2hxbsB4h CR/UCHCDHKCw7Z7bO6SKYKdZfDn01c7HEba5zxIEGQj9fdGe9dAOUgCEi8UG0MWZ Auj5IdWV0uXtcvo7boWddu6hBiBYog96xv+ypzlhW035yLoht47z+qcyX1cw/nLx QLTp2fMivwwWGkxmJY9GaixGbMvMBsNRlvmhiisy9sc1pk0FCxNGhVtVwZBFf+C8 bUc7AfSBmfdu2iNZGCqg+uCu0gTjgmSlJWpBhzvS5eio+0O7oO04aJxawBFBINKi goILZ/7ezulvNlhhPgwnEyfy4C/2sCu9FQrXiy1dCIMngZ3pKa/BO9QqRItTQoGD GDQjEr1S6Cmlki5yf0dz+T8k8wiqAG0q9IRYHp3pxa4VTdjCE0pTOBvfqI+seRkG pv/n4O1zhzlrekaRcYNdNm6lIIA+fDl5/QNY9/py/iNyHDN4Sr8= =CU8M -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4c3dc396-ca0d-0fa7-505c-59c34b3763de%40zrubi.hu. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] HCL - Lenovo T480
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/24/18 12:47 AM, Zrubi wrote: > Hi, > > Just installed the 4.0.1-rc Now the correct .yml attached, ignore the previous one. - -- Zrubi -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlwgILUACgkQVjGlenYH FQ32BQ//VMZyPYPij1vv52OabPryaaMo4ls4m5BvoPTOEGOjk/vqTKczHGSlwH9l pFxH3j7FR0R5FWzaIjN5pKOWTqF/ybHzh3gdythIdpxMUblYy9iIOm5bTbqYONRr 1mv9vHAtjH49a//o/pcQfv0wnt5zvox5VBRuh17zr75v0yYJXNgOBQDQdV8fwOSr ySKYejrm9dr77wze0Hz1zkxq9cDjcFa+jFbPzooelLI1Y2lGIPF8xu4DkHvJwLkK gRP0VGACQdGyBZh65sKdExtk1fPa+CVJ4tZKRvpKULTL5FzfIlriFzyVPQbgOyXL aPD6/sCL21ciZ4ynUbfamC1a1oU2w0Vby3zhr4nmkd4j3Q1jXtSSKd9c39t15pQK lU/E/kQB25zSSAamWSsZUg+/LcZEbb/9gZZnq2IXhE5sKQFUpaaoExUgL8+hnYk8 Y1rDR0XCQV42RcRkssVXkv35k9D2+mnR/N32bfbS6CaDb3LYRq04LluDVzglkIoR uCvEGYhiumN9uB9KTOWmeWj33E9cXlpNMcTbZMEpJcZc6tsM/0z+FWRbsjJdfbjA FQ6cmZ+G5ofQRIRgoaWqk9+gGioctmdwPJi/nOfYh53uuQ6iuLwziepKRP00wFKA pQU/2DnJPdM7mKBVxyg0yo3m1lGHZ6YJD/NWfZko09qBZxLLVWc= =t6cn -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d30a0166-17c8-5ce5-d165-f04fa9a9fc15%40zrubi.hu. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-LENOVO-20L6S29E1W-20181223-122344.yml Description: application/yaml 0x617D70488F0E7BC6.asc Description: application/pgp-keys Qubes-HCL-LENOVO-20L6S29E1W-20181223-122344.yml.sig Description: Binary data 0x617D70488F0E7BC6.asc.sig Description: Binary data
[qubes-users] HCL - Lenovo T480
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Just installed the 4.0.1-rc hit by the UEFI issues described here: https://www.qubes-os.org/doc/uefi-troubleshooting/ Use the workarounds, or Disable Secure Boot. Moreover: probably more better to go with the Legacy mode only - to skip the troubles. Affected by the suspend bugs: #3689 #3705 Sou you need to enable Thunderbolt BIOS Assist and/or disable the whole Thunderbolt support in general. - - TPM 2.0 not recognized, - - Fingerprint reader is a Windows only junk -> Disable it. And now I can feel the hi-DPI pain, as it has a FHD panel in 14" size. So everything is tiny now. DPI scaling helps in dom0, but every AppVM should need to use that settings... - -- Zrubi -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlwgHqAACgkQVjGlenYH FQ2Szg//X+M49jix1zg9G8MB7Jud/12g7e84UA2VqLP002dzGDaMw2O8mJg/7XhW vRkt4weVtn31zPgV8Z//3xyFFNmPjo7mk+NJ82xl/t+mHXNRjdBRHJmFtCnVnVot eL5Jx+3ZHoHr6LXYNYP74y2n7Z9vv9d1F6P9ZdUiOAHOJGDqrY2u17oa/DRil+fP GHaRbRYCMMOGQMSs52GyF8n7ogmTgZcGoWql80s/t7HjkJ3nHOsGmEEL8HAb03J1 OvIi6pzipqfEAIWKCISkQrLVMHWpnyypdp600SRuuhlw0pxSh1a+JYTQxpLaR3ds Pkd6P6XyydkXP0c4b8hS3KenZeX0ODnMI+N1HyODnBdQJ9CdLXrEy7PYv3/zdXNT s9TepZEdfplTX0zCRD8u7WDZj+tEhsTTjNquWRCM4/o1owS3xcuwyU2QIubYiZOd HPKchjqJBeBvqIDtC2jh8ukdpgKwaqWngPCL8XeKWg0YbEQiNHXaKkER1RE9Iuwq WbmvdCRoZs9Au0JCYZcWeMEVgRp9qYguNeyw3jpXvW4OZzaAAdTvQiCmsU6SFJ3k 4cnIel0gIJ3mbMQ6quDYDcthJy2wge7YYYyg4v1mGBRzajwoL49FLunDNVwF/Doa XYii6A9rDmzbZ9LR13AGPaYI3lh5mAoR5sOWaKtjxTnkCV4B3Oo= =hTrQ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6afa0362-5d12-79e0-3f61-57162ea14a59%40zrubi.hu. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-LENOVO-20L6S29E1W-20181224-002339.yml Description: application/yaml Qubes-HCL-LENOVO-20L6S29E1W-20181224-002339.yml.sig Description: Binary data
[qubes-users] Modifying a shortcut in the xfce menu?
I am trying to figure how how to modify the firefox link/shortcut for one of my appvms in the xfce menu. I just want to add "-P --no-remote but all teh varients I have tried dont seem to work. I try to edit from the menu and in the "command" feild it has: qvm-run -q --service -- AppvmName qubes.StartApp+firefox I thought it would point to some .desktop file but that does not seem to be the case. I tried just adding -P --no-remote to the end but that didnt work either. Is there a page in the docs or github that covers this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d1f142a2-7721-564c-293f-79de4eeefcb2%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] error running 'setup' for Qubes Builder
I'm trying to build an Ubuntu templateVM using Qubes Builder. I'm running 4.0.1rc2 When, I ran the 'setup' command I got the following error message: [user@qubes-builder qubes-builder]$ sudo bash setup setup: line 16: from: command not found setup: line 34: syntax error near unexpected token `(' setup: line 34: `from subprocess import (Popen, STDOUT)' And the interactive screen never came up. I followed the instructions in https://www.qubes-os.org/doc/qubes-builder/ and at https://github.com/QubesOS/qubes-builder/blob/master/README.md I installed the packages as the instructions said. Then I ran the 'setup' command. Not sure what I am doing wrong. Any ideas? Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1f31cfdd-1250-4c01-a69d-0603c5ad1e0c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How risky is GPU pass-through?
Someone I know is interested in using QubesOS. However, they are also a gamer: if they could not have a Windows VM with access to a dedicated graphics card for use by games, then QubesOS is not an option for them. How risky is GPU pass-through? My understanding is that on most laptops, the primary (internal) display is connected to the integrated GPU. Therefore, it appears to me that the risks are no more than pass-through of the USB, Ethernet, or wireless controllers, all of which QubesOS does by default. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4eb079dc-a0b4-b216-fd92-33f72bd7e1e3%40gmail.com. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Failed to start load kernal module
On Sat, Dec 22, 2018 at 10:18:21PM -0800, seshu wrote: > On Saturday, December 22, 2018 at 10:22:17 PM UTC-7, awokd wrote: > > sabirpage.offic...@gmail.com: > > > Hi, I am trying to install qubes 4.0 and download fresh iso, followed the > > > instructions and made my usb bootable with rufus and installed it on my > > > hp follio 9470m, but getting error everytime I installed it on real > > > hardware, > > > Please help me > > > Screenshot below > > > > > > https://user-images.githubusercontent.com/10298367/27842477-126786b6-6113-11e7-9ba1-f2e02621cae4.jpg > > > > > > My laptop is not accessible I am formatting it, changing bios setting but > > > no luck, request anyone to help, any help is appreciated. > > > > > If you're referred to that "failed" message, it's a false alarm. Mine > > does it too; ignore it. > > I get that message also. I was wondering if that is a bug? Should it be > reported in the qubes-issues system? > It's a long standing false report, and there's already an open issue for it.(#2638) In my opinion it's not a bug in Qubes. If you check the system status (as instructed) you will probably find that the modules load service is active and exited SUCCESS. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20181223125613.rdy7twqunh7ci2id%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] bottom line with win7 VMs in qubes v4?
On Sun, Dec 23, 2018 at 05:19:52AM +, 'awokd' via qubes-users wrote: > Stumpy: > > on IRC a few people mentioned that win vms didnt work in q4 but I see > > posts with people talking about windows vm issues but these issues dont > > seem to preclude qubes ability to run a win vm? > > > > I just need a simple win7 VM to run ms office, photoshop, and a few > > other non sound/network/special things, but would need to be able to > > copy files/text between other app vms and the winvm. Would this take > > alot of extra work or should it be about as "straight forward" > > > They work, check the documentation about it. Haven't tested qvm-copy on > them, though. I dont use Windows myself but have set up numerous users with Win7 HVMs, sometimes as templates. The Win7 qubes work fine. I know people who do all their "office" work in those qubes,with various flavours of Windows. Applications used include Office, Matlab and some heavy data analysis tools. Network connectivity is fine. Qubes Windows Tools are somewhat variable - I dont see any pattern in the problems. I suggest cloning your Win7, making sure it is up to date and then trying the Windows tools. If it goes pear shaped you have the original qube to fall back on. As to moving data between qubes, there are different approaches. If QWT work then you use qvm-copy/move as usual. Without them, start Winqube with USB attached, do your work , transfer files to USB drive, shutdown and attach USB to another qube. Like a very small sneakernet. Or create dedicated tx qube: enable networking between the two and use a shared folder on that qube to shuttle files between windows and other qubes. If you set this up right, you can have script starting the tx qube before Winqube,enabling the networking, automounting drive in Winqube. Then work is done in Windows, saved to drive, and user clicks in another window and qvm-copy/move out of the Windows grouping. Absolutely straightforward and easy to pick up as normal part of workflow. I haven't used 10 but I know there are users who do, again with various success with QWT. Any of the above approaches will work with 10. Stumpy, if you need help with any part of this, just ask. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20181223124751.c2m32a7byfabzuye%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: updating CentOS-7 templates
On Sat, Dec 22, 2018 at 12:05:44PM -0500, Achim Patzner wrote: > Frédéric Pierret wrote on Sat, 22 December 2018 > 12:16 > > A PR is opened. Waiting Marek's approval. It was related > > to ABI version requirement not done in the > > qubes-gui-agent-linux. Between xorg 1.19 and xorg 1.20 the > > ABI version changed from 23 to 24 so xserver was refusing > > to load the qubes driver. > > -- > > Just keep in mind more or less the same happens if you > transmongrify a Debian template into a Kali following > https://www.qubes-os.org/doc/pentesting/kali/ which is a > warning that there are problems ahead as soon as Debian is > getting its collective ass far enough off the ground to > update X. > > > Achim As Frédéric says, we're working on this so that by the time buster comes in there will be a fully working solution out the box. It's to be expected that there will be breakages in Debian if you move to the testing version. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20181223115943.ikjvvg5itwc5iuuc%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: VPN for Linux Dummies
mandag den 17. december 2018 kl. 15.09.48 UTC-5 skrev stefanne...@gmail.com: snip > > Do you have some hints? (I can`t answer tomorrow, but on wednesday.) > I configured everything I needed via gui, to connect via appvm, but that might not work for you. Here's what I did: https://www.militant.dk/2018/04/15/configuring-cisco-asa-vpn-on-qubes-4-0-with-openconnect/ Sincerely Max -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/620a5345-f72c-4f1c-be19-28b4429b5e97%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.