[qubes-users] Confuse Update QUbes OS

2019-07-14 Thread Luc libaweb
Hello,

When I update my Dom0, I have : 
Failed to synchronize cach for repo "template" and "current"

But, I have then nothing to do and complete.

Qubes OS is updated ?

My release cat is 4.0 but not 4.0.1 ?

I don't uderstand if I have to upgrade template or it's automatic whith the 
update tool.

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/857b8206-a6b8-410f-8f0b-7a65cce40c89%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Edit Dom0 conf.

2019-07-09 Thread Luc libaweb
Le mardi 9 juillet 2019 12:53:37 UTC+2, Mike Keehan a écrit :
> Files in /etc are owned by the user 'root', so you need to use sudo
> to be able to change them.
> 
> "sudo vi /etc/. ".
> 
> Be carefull, these files are essential for correct operation of
> the system.  You would be best advised to make a backup of any
> file you want to edit!
> 
> Mike.
> 
> 
>
Thanks, it's work. But can you delete this post because I don't publish with 
identity on google groupe ? I have change account. Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1a843e10-917f-49c5-92bd-067f0a49a024%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Enable acces web template

2019-07-09 Thread Luc libaweb
Hello,

When you install/adapt your template VM, it's necessary to open access to 
Firewall for open connection and install softs.

It's the best way ? Normaly a template not have never web access ?

I'm not sur for the best way. 

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/859c7bbe-d5cd-41e4-83d3-81fd53e28321%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes OS and Google Groups

2019-07-09 Thread Luc libaweb
Hello,

Qubes OS is the best alternative today for security and other OS than Win and 
Osx. Many Noobs coming and it's good for Qubes OS.

just a question, why use Google with the positioning of Qubes OS? There are so 
many other alternatives? 

Just do a search google groups to know anyone who uses/particpate to Qubes OS, 
contradictory no ? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee066411-4e42-435e-ba33-bbf9fef6ddd3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VPN before sys-firewall ?

2019-07-09 Thread Luc libaweb
Hello,

I read lot of things about VPN in Qubes OS.

I have mount a standalone VM with client VPN installed. This VPN VM connect to 
the network with sys-firewall.

Others VM connect them directly on this VM VPN.

So, AppVM connect to Netvm Standalone VM VPN connect to Netvm Sys-Firewall

It's good or not for security ? Maybe the VM VPN bypass the sys-Firewall ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de18b1ff-59f3-4692-a30e-c2dd0941cfc9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN before sys-firewall ?

2019-07-10 Thread Luc libaweb
Le mardi 9 juillet 2019 23:22:23 UTC+2, Chris Laprise a écrit :
> On 7/9/19 4:49 PM, Luc libaweb wrote:
> > Hello,
> > 
> > I read lot of things about VPN in Qubes OS.
> > 
> > I have mount a standalone VM with client VPN installed. This VPN VM connect 
> > to the network with sys-firewall.
> > 
> > Others VM connect them directly on this VM VPN.
> > 
> > So, AppVM connect to Netvm Standalone VM VPN connect to Netvm Sys-Firewall
> > 
> > It's good or not for security ? Maybe the VM VPN bypass the sys-Firewall ?
> > 
> 
> In practice, you won't see any difference between these configurations 
> unless you have placed special rules _inside_ sys-firewall (in the 
> /rw/config dir):
> 
> sys-vpn -> sys-firewall -> sys-net
> 
> sys-firewall -> sys-vpn -> sys-net
> 
> sys-vpn -> sys-net
> 
> The reason is that sys-vpn uses "provides network" and is thus a proxyVM 
> just like sys-firewall; if you add firewall rules to your appVMs, they 
> should be processed the same way in either sys-firewall or sys-vpn. As a 
> result, sys-vpn can perform both vpn and firewall functions. If you 
> consider sys-vpn's role to be trusted and low-risk, then the third 
> example can accomplish the same thing as the first two while consuming 
> less memory and CPU.
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Thanks, so, the default sys-firewall just block all ingoing traffic separatly. 
I think that it's better to place de sys-vpn after the sys-firewall because the 
configuration of the sys-vpn is just - install the client VPN and force 
autoconnection and autostart. If the client app VPN is compromised, it still 
exists the sys-firewall between at rest.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc407776-8a46-4312-8c92-458fd01900c8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Backup error file too large ?

2019-07-10 Thread Luc libaweb
Every backup test show "Error : Writing backup to VM X failed : cat:write 
error: File Too large. 

I put USB disk on VM and active de backup Qubes os. Then, I have this error.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6f2b38c-561a-4c79-95dd-33de3acfb5ad%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.