On 11/11/2016 10:37 PM, Sec Tester wrote:
Perhaps another reason why VM's shouldn't have default root access?
"taskset 0x2 sudo ./measure -p 0.7 -s 16."
This really needs root to work?! This could be important... these
rowhammer vulns have become BAD.
Chris
--
You received this message be
> You might get more interest if you explained which features of the AirVPN GUI
> are worth having. The Github README is blank.
>
> I think most openvpn users are content to use the official client since it's
> simpler and better audited. The current fail-close solution has also been
> reviewed
Perhaps another reason why VM's shouldn't have default root access?
"taskset 0x2 sudo ./measure -p 0.7 -s 16."
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qu
On Saturday, 12 November 2016 06:39:50 UTC+10, Fred wrote:
> I made a change to the PCI devices for the sys-net VM and now Qubes
> hangs on boot when starting this vm.
>
> I've tried using the installation image to get to system rescue via the
> troubleshooting link in the installer. I can get in
So Im still new to Qubes, but after going through a bit of a learning curve,
building & customizing VM's to suit my security needs, I have a few thoughts on
its security.
Firstly I really love the direction Qubes has taken the future of operating
systems, and its has definitely become my OS of
Sec Tester:
> On Saturday, 12 November 2016 04:22:37 UTC+10, Chris Laprise wrote:
>>>
>>
>> A tip for stopping DNS leaks with the GUI: You have to run a script like
>> 'qubes-setup-dnat-to-ns' (in Qubes) or 'qubes-vpn-handler.sh' (in the
>> VPN doc) after the client connects or else DNS packets
On Fri, Nov 11, 2016 at 12:36:39PM +, Unman wrote:
> On Fri, Nov 11, 2016 at 06:09:36AM -0500, 'IntersolarMN' via qubes-users
> wrote:
> > > Hello,
> >
> > >
> >
> > > Thank you for your work on Qubes. Note: I haven't used Linux in more than
> > > a decade. I have installed Qubes and there'
try : sudo dnf install libreoffice
Here's how to copy paste between qubes os VM's;
CTRL + C
CTRL + Shift + C
then go to VM you want to copy to
CTRL + Shitf + v
CTRL + V
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
On Saturday, 12 November 2016 04:22:37 UTC+10, Chris Laprise wrote:
> >
>
> A tip for stopping DNS leaks with the GUI: You have to run a script like
> 'qubes-setup-dnat-to-ns' (in Qubes) or 'qubes-vpn-handler.sh' (in the
> VPN doc) after the client connects or else DNS packets won't get
> forw
Thank you for the tips. I'm still struggling with installing LibreOffice.
In order to obtain a copy of the LibreOffice install file onto the Template:
fedora23 domain, I'll need some new steps.
I can launch the Web Browser from the Template: fedora23 domain, but it will
not go to any website, i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 11, 2016 at 07:20:55PM -0200, Torsten Grote wrote:
> On 11/11/2016 06:01 PM, entr0py wrote:
> > Thanks! With that, some progress... Deleting ` > bus='xen'/>` from the config file results in usbtablet being replaced
> > with ps/2 mouse dev
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 11, 2016 at 05:01:47PM +0100, to...@vmail.me wrote:
> user@dom0]$ qvm-run -u root --pass-io --localcmd="input-proxy-receiver
> --mouse" sys-usb "input-proxy-sender /dev/input/by-id/*event*"
> Incompatible remote protocol version: 16000858
I followed the Qubes VPN documentation to set up a non-Qubes VPN proxyVM +
added in Qubes default firewall rules.
myproxyVM connected to internet on eth0.
connected to on eth1.
vpn is tunneled on tun0.
Replace eth1 with vif+ and should be analogous to Qubes VPN setup.
The non-Qubes proxyVM req
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-11 14:58, Marek Marczykowski-Górecki wrote:
> On Fri, Nov 11, 2016 at 11:57:07PM +0100, Marek Marczykowski-Górecki wrote:
>> On Fri, Nov 11, 2016 at 02:34:16PM -0800, Andrew David Wong wrote:
>>> On 2016-11-10 08:16, Robert Mittendorf wrot
On Fri, Nov 11, 2016 at 05:01:47PM +0100, to...@vmail.me wrote:
> user@dom0]$ qvm-run -u root --pass-io --localcmd="input-proxy-receiver
> --mouse" sys-usb "input-proxy-sender /dev/input/by-id/*event*"
> Incompatible remote protocol version: 1600085855
>
> qubes-input-proxy-1.0.7-1.fc23.x86_64
> q
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 11, 2016 at 11:57:07PM +0100, Marek Marczykowski-Górecki wrote:
> On Fri, Nov 11, 2016 at 02:34:16PM -0800, Andrew David Wong wrote:
> > On 2016-11-10 08:16, Robert Mittendorf wrote:
> > > I just copied a file from dom0 to a AppVM via qvm
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 11, 2016 at 02:34:16PM -0800, Andrew David Wong wrote:
> On 2016-11-10 08:16, Robert Mittendorf wrote:
> > I just copied a file from dom0 to a AppVM via qvm-copy-to-vm.
> > The file transfer started until the private storage was full.
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-10 08:16, Robert Mittendorf wrote:
> I just copied a file from dom0 to a AppVM via qvm-copy-to-vm.
> The file transfer started until the private storage was full.
> It would be better to check the free disk space size before executing
> th
On 11/11/2016 06:01 PM, entr0py wrote:
> Thanks! With that, some progress... Deleting ` bus='xen'/>` from the config file results in usbtablet being replaced
> with ps/2 mouse device.
Awesome, thanks Marek!
Is there any way to make this permanent so we don't need to start the VM
with qvm-start ea
On Wednesday, November 9, 2016 at 5:03:12 AM UTC-8, Pablo Di Noto wrote:
> Hello,
>
> Never had much use for a Windows7 HVM so far.
>
> Months ago, I installed W7 on Qubes just for the sake of testing. Got to the
> point of installing qubes-windows-tools and had some success with it, but
> neve
I made a change to the PCI devices for the sys-net VM and now Qubes
hangs on boot when starting this vm.
I've tried using the installation image to get to system rescue via the
troubleshooting link in the installer. I can get into my system this way
but I'm unsure what to change as removing the p
I just copied a file from dom0 to a AppVM via qvm-copy-to-vm.
The file transfer started until the private storage was full.
It would be better to check the free disk space size before executing
the copy command.
regards,
Robert
--
You received this message because you are subscribed to the Googl
user@dom0]$ qvm-run -u root --pass-io --localcmd="input-proxy-receiver
--mouse" sys-usb "input-proxy-sender /dev/input/by-id/*event*"
Incompatible remote protocol version: 1600085855
qubes-input-proxy-1.0.7-1.fc23.x86_64
qubes-input-proxy-sender-1.0.7-1.fc23.x86_64
--
You received this message
pooosi...@vfemail.net:
> 1) Create new HVM with 20Gb disk space and 2Gb RAM, Install Win7.
You'll need closer to 40GB if you plan to fully update the OS.
> 7) Manually start machine. Machine boots fine, but... nothing happens.
> Seamless mode is disabled, but I cant see machine's window (screen)
On 11/10/2016 06:51 AM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Nov 09, 2016 at 02:08:46PM +0100, Zrubi wrote:
Applying the color profile is half of the job, next part is to provide
the same profile for AppVMs.
Here I'm stuck a bit because I wou
Marek Marczykowski-Górecki:
> On Tue, Nov 08, 2016 at 11:09:37PM -0200, Torsten Grote wrote:
>> On 11/07/2016 08:54 PM, 3n7r0...@gmail.com wrote:
>>> AFAICT, it's an issue with how QEMU is implemented in Xen. The input
>>> device in question is passed via `-usbdevice tablet` instead of being
>>> le
On 11/11/2016 01:24 PM, David Hobach wrote:
On 11/10/2016 10:07 PM, Chris Laprise wrote:
> On 11/10/2016 01:28 PM, David Hobach wrote:
>> I'd recommend to avoid any tools employing iptables which were not
>> written explicitly for Qubes as well.
>
> This. Or at least don't use them without caref
the filename of the colour profile .icc-file is stored in the X atom
_ICC_PROFILE. perhaps, if that is available then the correct profile can be
selected by gnome settings manager which currently says there are no colour
managed devices in vms. I think colord service would need to be enabled as
On 11/10/2016 10:07 PM, Chris Laprise wrote:
> On 11/10/2016 01:28 PM, David Hobach wrote:
>> I'd recommend to avoid any tools employing iptables which were not
>> written explicitly for Qubes as well.
>
> This. Or at least don't use them without careful inspection.
Might be worth to put some wa
On 11/11/2016 07:20 AM, Sec Tester wrote:
I have successfully applied the setup and scripting in
https://www.qubes-os.org/doc/vpn/
No more DNS leaks.
This means i can atleast use my vpn, until i find a way to make things work
with the AirVPN GUI.
A tip for stopping DNS leaks with the GUI:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Nov 08, 2016 at 11:09:37PM -0200, Torsten Grote wrote:
> On 11/07/2016 08:54 PM, 3n7r0...@gmail.com wrote:
> > AFAICT, it's an issue with how QEMU is implemented in Xen. The input
> > device in question is passed via `-usbdevice tablet` inste
basically i've been trying to install qubes on a macbook air (11-inch, early
2014). i've installed rEFInd and have partitioned my disk to allow space. when
i boot my usb install stick, the installer comes up with "no drives detected"
i've googled about everything (or maybe my search terms suck)
On Fri, Nov 11, 2016 at 06:09:36AM -0500, 'IntersolarMN' via qubes-users wrote:
> > Hello,
>
> >
>
> > Thank you for your work on Qubes. Note: I haven't used Linux in more than a
> > decade. I have installed Qubes and there's a couple of things I haven't
> > learned yet. Despite installing mult
I have successfully applied the setup and scripting in
https://www.qubes-os.org/doc/vpn/
No more DNS leaks.
This means i can atleast use my vpn, until i find a way to make things work
with the AirVPN GUI.
--
You received this message because you are subscribed to the Google Groups
"qubes-use
> Hello,
>
> Thank you for your work on Qubes. Note: I haven't used Linux in more than a
> decade. I have installed Qubes and there's a couple of things I haven't
> learned yet. Despite installing multiple word processors, none of my .odt
> files will open via Qubes. I think I need step by ste
After further testing, more specifically its a DNS IP leak with the AirVPN GUI
with network lock off.
I also leak DNS when running OpenVPN in the VPN-Proxy-VM,
Havent yet applied Qubes scripts to stop leaks.
--
You received this message because you are subscribed to the Google Groups
"qubes-u
36 matches
Mail list logo