-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-15 20:10, Emma Baillie wrote:
> No, you misunderstand me. I already did all the things in that document.
Sorry for the misunderstanding. You do not have to (and, indeed, cannot)
update your TemplateBasedVMs from Fedora 21 to Fedora 23,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-15 19:33, eobail...@gmail.com wrote:
> Hi qubes people,
>
> I have just completed the Qubes 3.0 to 3.1 upgrade process, ending up, as
> suggested in the upgrade doc, with getting the new Fedora 23 template.
>
> However, I'm not sure
Hi qubes people,
I have just completed the Qubes 3.0 to 3.1 upgrade process, ending up, as
suggested in the upgrade doc, with getting the new Fedora 23 template.
However, I'm not sure where to go from here. All my existing VMs (which is just
the standard out-of-the-box set) are still using
Background: I am testing Qubes OS 3.1 on my desktop machine (CompuLabs
Intense PC) with a view to migrating my laptop (HP Spectre X360) from
Linux Mint 18 (Xfce).
My network printer is functioning under Linux Mint (based on Debian). I
appeared to have successfully added the printer (Epson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-15 16:23, IX4 Svs wrote:
> Hello
>
> The instructions over at https://www.qubes-os.org/doc/hvm/ still say:
>
> == Using Template-based HVM domains
>
> TODO (Coming in Qubes R2 beta 3). ==
>
> What is the current authoritative source
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-15 08:42, Paf LeGeek wrote:
>>
>> The vpn doc was written for both Fedora and Debian templates. The
>> /rw/config/rc.local script is a Qubes feature that works on both. The doc
>> uses that location so users do not have to dedicate a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-15 02:31, adicarli...@gmail.com wrote:
> Writing OS being where i dd from my old, potentially at risk OS
>
I think that depends entirely on the OS and tools you used to create the
bootable USB drive. In principle, the Qubes ISO should
Worth noting that, even though I had the same issue with Rufus, I could still
install Qubes-OS from the USB when I bypass the media check.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails
On Tuesday, 16 August 2016 07:55:08 UTC+10, Alex wrote:
> On Mon, Aug 15, 2016 at 11:43 AM, pixel fairy wrote:
> On Sunday, August 14, 2016 at 3:22:30 PM UTC-7, Alex wrote:
>
> ...
>
> > 1. Install the Chromium browser in your appvm template - skip if you were
> > already
On 08/15/2016 01:05 PM, kotot...@gmail.com wrote:
Thank you very much for your help. The DNS are transmitted but the rules in the
firewall seems to be missing:
Chain PR-QBS (1 references)
pkts bytes target prot opt in out source destination
0 0 DNAT
On 08/15/2016 11:22 AM, angelo "angico" costa wrote:
Hi, guys!
Still slowly progressing through Qubes.
I changed from XFCE to KDE and qubes-manager simply disappeared! I invoke it
through the menu link as well as through CLI, but it just doesn't show up. It
shows normally on XFCE, though.
On Mon, Aug 15, 2016 at 11:43 AM, pixel fairy wrote:
> On Sunday, August 14, 2016 at 3:22:30 PM UTC-7, Alex wrote:
> ...
> > 1. Install the Chromium browser in your appvm template - skip if you
> were already using it. Shut down the template VM.
>
> I keep wondering how
On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-14 15:22, IX4 Svs wrote:
> > Just spent a few minutes to figure this out so I thought I'd share.
> >
>
> Thanks, Alex! Would you mind if we added this
On Monday, August 15, 2016 at 4:51:13 PM UTC, 3n7r...@gmail.com wrote:
> On Monday, August 15, 2016 at 2:35:45 PM UTC, 3n7r...@gmail.com wrote:
> > On Monday, August 15, 2016 at 1:33:35 PM UTC, 3n7r...@gmail.com wrote:
> > > Qubes 3.1
> > > Windows7 Pro x64
> > > Windows Tools 3.0.4-1
> > >
> > >
On Monday, August 15, 2016 at 2:35:45 PM UTC, 3n7r...@gmail.com wrote:
> On Monday, August 15, 2016 at 1:33:35 PM UTC, 3n7r...@gmail.com wrote:
> > Qubes 3.1
> > Windows7 Pro x64
> > Windows Tools 3.0.4-1
> >
> > Without Debug mode, VM does not produce any windows and ends in an
> > unresponsive
On 08/15/2016 03:33 AM, kotot...@gmail.com wrote:
Hi,
I set up a proxyVM with openvpn following the instructions from
https://www.qubes-os.org/doc/vpn/.
I cannot do DNS query over the VPN, for example this command executed from a
VM connected to the Proxy:
[user@fedora-23-dvm ~]$ dig
On 08/15/2016 10:49 AM, Paf LeGeek wrote:
I use the Debian 8 Template so the rc.local file is in the /etc/ folder not in
the /rw/ folder. As I said, the script works find if i launch it manually in my
ProxyVM terminal.
This is the content of my rc.local
#!/bin/sh -e
#
# rc.local
#
# This
I use the Debian 8 Template so the rc.local file is in the /etc/ folder not in
the /rw/ folder. As I said, the script works find if i launch it manually in my
ProxyVM terminal.
This is the content of my rc.local
#!/bin/sh -e
#
# rc.local
#
# This script is executed at the end of each multiuser
Qubes 3.1
Windows7 Pro x64
Windows Tools 3.0.4-1
Without Debug mode, VM does not produce any windows and ends in an unresponsive
Yellow state.
With Debug mode, VM appears to hang after Windows logo boot screen. In F8
Low-Resolution Mode, VM boots to desktop and is fully functional.
Increasing
I realize that nVidia's aren't the preferred video card, but (being
divorce-poor) one sometimes has to make do with what one has. :)
With my on-board nVidia (GeForce7100) and the nouveau driver (on both
Tails and Qubes), things work okay, then suddenly at some random point the
screen gets filled
On Sunday, August 14, 2016 at 3:22:30 PM UTC-7, Alex wrote:
...
> 1. Install the Chromium browser in your appvm template - skip if you were
> already using it. Shut down the template VM.
I keep wondering how safe chromium browser is. do redhat or debian track
updates in time with google-chrome?
Writing OS being where i dd from my old, potentially at risk OS
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post
Can someone answer or point to me a place in the docs for this.
I want to know about the level of metadata sharing between the writing OS, the
disk, aswell as between new vms and the OS itself.
When i dd my verified OS to my usb i assume some amount of identifiable info is
on the disk.
This isnt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Aug 15, 2016 at 11:06:32AM +0200, Joanna Rutkowska wrote:
> On Sun, Aug 14, 2016 at 12:55:10PM -0700, el...@tutanota.com wrote:
> > Just to clarify, that means that even if the UEFI is exploited, it does not
> > matter with Qubes?
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-14 15:22, IX4 Svs wrote:
> Just spent a few minutes to figure this out so I thought I'd share.
>
Thanks, Alex! Would you mind if we added this to the docs at some point?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Aug 14, 2016 at 12:55:10PM -0700, el...@tutanota.com wrote:
> Just to clarify, that means that even if the UEFI is exploited, it does not
> matter with Qubes?
Yes. Unless the isolation-provider that Qubes happens to be using -- currently
Hi,
I set up a proxyVM with openvpn following the instructions from
https://www.qubes-os.org/doc/vpn/.
I cannot do DNS query over the VPN, for example this command executed from a
VM connected to the Proxy:
[user@fedora-23-dvm ~]$ dig www.google.com
; <<>> DiG
27 matches
Mail list logo