Hello James,
Am 12.07.2017 4:08 vorm. schrieb "James" :
Does anyone know what might be causing this, how I might fix it, or
what information I could provide to help diagnose it?
[...]
I am experiencing the same delays when starting a VM in Qubes: the whole
GUI freezes for
Does anyone know what might be causing this, how I might fix it, or
what information I could provide to help diagnose it?
(There should be an image attached to this message)
4.4.67-13.pvops.qubes.x86_64 w/ Xen 4.6.5
Nothing much(?) has been done to dom0 as far as I know, other than updates.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-07-11 13:30, Nick Geary wrote:
> I'm not planning to use it for dual boot. Would like to have the additional
> space to create larger VM's stored on the second drive.
>
> To be able to clone decent sized Ubuntu & Windows templates.
>
>
I liked this idea, so I wanted to try.
This seems to work:
in /etc/qubes/autostart/qubes-pulseaudio.desktop.d/30_qubes.conf
put this:
[Desktop Entry]
OnlyShowIn=X-AppVM;
Now only AppVMs have audio.
Putting a name in there did not work for me but going to an AppVM and doing
this:
mkdir
And according to the README in /etc/qubes/autostart you can override everything
from within the VM using ~/.config/autostart:
> This mechanism overrides only content of /etc/xdg/autostart, files placed in
> ~/.config/autostart are unaffected, so can be used to override settings per-VM
> basis.
On Wednesday, 12 July 2017 00:58:11 UTC+2, daltong defourne wrote:
> Is it possible to do this on a per-app-VM basis and not on a per-template
> basis?
>
> > TemplateVMs. There is a "OnlyShowIn" that can be used to define in what VMs
> > the application should autostart, either **by name** or
On Tue, Jul 11, 2017 at 07:36:08PM +,
baldric-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote:
> Chris Laprise:
> > On 07/10/2017 10:56 AM, Unman wrote:
> >> This simply isn't true - it's clear from the Purism statement that Librem
> >> 13v2 has not been entered for certification.
> >>
> >>
Thanks!
Is it possible to do this on a per-app-VM basis and not on a per-template basis?
On Tuesday, July 11, 2017 at 12:37:49 PM UTC+3, Noor Christensen wrote:
> On Tue, Jul 11, 2017 at 01:40:34AM -0700, daltong defourne wrote:
> > All other commands in rc. local are executed as expected, so
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 07/11/2017 10:08 PM, codegee...@gmail.com wrote:
> Right now, I have a lot of stuff all just "consolidated" on one hard drive.
> /var/storage/{Anime,public_html,Documents,Pictures,.config/{pale\
> moon,deluge}} and so on.
>
> But, obviously, I
Right now, I have a lot of stuff all just "consolidated" on one hard drive.
/var/storage/{Anime,public_html,Documents,Pictures,.config/{pale\ moon,deluge}}
and so on.
But, obviously, I want to try with Qubes to have some isolation from my
webserver, perhaps have my Torrent client not be able to
Chris Laprise:
> On 07/10/2017 10:56 AM, Unman wrote:
>> This simply isn't true - it's clear from the Purism statement that Librem
>> 13v2 has not been entered for certification.
>>
>> Since Qubes 4 is still at an early stage of development (not even RC1),
>> there is little prospect of ANY
Chris Laprise:
> On 07/10/2017 10:56 AM, Unman wrote:
>> This simply isn't true - it's clear from the Purism statement that Librem
>> 13v2 has not been entered for certification.
>>
>> Since Qubes 4 is still at an early stage of development (not even RC1),
>> there is little prospect of ANY
On Tue, Jul 11, 2017 at 1:00 PM, Noor Christensen <
kchr+qubes-us...@fripost.org> wrote:
> On Tue, Jul 11, 2017 at 07:58:17AM -0400, Protonmij wrote:
> > I appreciate you are trying to help, but I have no desire to try
> > unauthorised workarounds that potentially leave my machine compromised
> >
My system has a 120GB SSD and a 2TB HDD, and the HDD is totally empty now.
I want to use most of the SSD as a cache for the HDD according to
https://groups.google.com/forum/#!msg/qubes-users/ArHTEeQAH8A/r9zzY0DLBQAJ, but
qubes resides entirely on the SSD.
I have made a disk image of the SSD
I'm not planning to use it for dual boot. Would like to have the additional
space to create larger VM's stored on the second drive.
To be able to clone decent sized Ubuntu & Windows templates.
So far I've attempted to format the disk through fdisk as an extended
partition. Then used
so I set up my pacman.conf as suggested in the documentation and I also
initialized my keyring but I keep getting the following error:
error: xyne-x86_64: signature from "Xyne. (key #3) " is
invalid
error: database 'xyne-x86_64' is not valid (invalid or corrupted database
On Tue, Jul 11, 2017 at 07:58:17AM -0400, Protonmij wrote:
> I appreciate you are trying to help, but I have no desire to try
> unauthorised workarounds that potentially leave my machine compromised
> or in an undefined state.
> I think I'll wait until Qubes get the Coreboot issues resolved and
>
So what is required to get a new template? If I understand correctly third
parties create templates for other distros as well, right?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
On Tuesday, July 11, 2017 at 5:06:44 PM UTC+2, Salmiakki wrote:
> Since it just came out I would like to know if it is safe to upgrade or if
> there are specific things that should be taken into account.
>
> Can the same instruction as for the upgrade from 23 to 24 be used?
You can if/when a
Since it just came out I would like to know if it is safe to upgrade or if
there are specific things that should be taken into account.
Can the same instruction as for the upgrade from 23 to 24 be used?
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
sit
https://groups.google.com/d/msgid/qubes-users/05f4ba459afa70f20ce661fe0e0a438c%408chan.co.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-Dell_Inc_-Studio_XPS_435MT-20170711-090912.cpio.gz
Description: GNU Zip compressed data
---
layout:
'hcl'
type:
'desktop'
h
We have KeePassX as the preferred password storage system when making
vaults but I wonder if something like Hashicorp Vault might be able to
provide additional security properties.
The benefit is that there's an audit trail, you can expire passwords, you
can set fine-grain controls on what VM's
[2017-05-23 15:18] Vít Šesták:
> So, I've created DVM-like sys-usb and it the first working version was easier
> than I thought. Just make /var/lib/qubes/servicevms/sys-usb/private.img an
> empty file. I have renamed the original file and performed "touch
> private.img".
>
> VM sys-usb then
I appreciate you are trying to help, but I have no desire to try unauthorised
workarounds that potentially leave my machine compromised or in an undefined
state.
I think I'll wait until Qubes get the Coreboot issues resolved and then
formally issue a solution
Thank again for your efforts
Sent
On Tue, Jul 11, 2017 at 01:40:34AM -0700, daltong defourne wrote:
> All other commands in rc. local are executed as expected, so it's not
> a rc.local issue per se, but rather maybe something like pulseaudio
> startup thing.
>
> Any pointers as to how to reliably "de-pulse-ize" VMs at startup?
>
On Tue, Jul 11, 2017 at 04:52:27AM -0400, 'Protonmij' via qubes-users wrote:
> > The most significant fact about my post appears to have been
> > overlooked - my x230 with Coreboot onboard boots all Linux distros
> > I've tried, including;Tails, Debian, Fedora etc. Why does it not
> > boot Qubes?
On Tue, Jul 11, 2017 at 05:17:06AM -0400, Chris Laprise wrote:
> On 07/11/2017 04:25 AM, Noor Christensen wrote:
> > Hi,
> >
> > I am curious if it is possible to attach "arbitrary" block devices to a
> > VM, similar to how additional disks drives can be specified for HVMs.
> >
> > For example,
On Tue, Jul 11, 2017 at 11:27:18AM +0200, Noor Christensen wrote:
> On Tue, Jul 11, 2017 at 04:52:27AM -0400, 'Protonmij' via qubes-users wrote:
> > > From this post https://github.com/QubesOS/qubes-issues/issues/2553
> > > there is a clear acknowledgement from Qubes Developers that there
> > >
On 07/11/2017 04:25 AM, Noor Christensen wrote:
Hi,
I am curious if it is possible to attach "arbitrary" block devices to a
VM, similar to how additional disks drives can be specified for HVMs.
For example, let's say I have a backup disk image on dom0 that I would
like to read from another VM
I was able to determine the cause of the problem. After having changed
the label by editing xen.cfg as described the following needs to be done
in addition before the media can be used on an UEFI system to install Qubes:
5. Unmount the USB media, but leave it connected to the machine.
Hi!
Basically, I want to disable pulseaudio for stuff like firewall VM and VPN VM
and the like.
They don't need it and it makes pavucontrol pannel a mess.
I tried just doing a
sudo pactl exit
in terminal of VMs that don't need sound and it works like a charm
HOWEVER
inserting a
pactl
On Mon, Jul 10, 2017 at 04:09:09PM -0400, Chris Laprise wrote:
> On 07/10/2017 03:15 PM, yreb-qusw wrote:
> > On 07/09/2017 11:56 PM, Chris Laprise wrote:
> > And I use suspend function daily, and it's a bit hassle to get the VPNs
> > up and running again, even with the launcher workaround, very
Hi,
I am curious if it is possible to attach "arbitrary" block devices to a
VM, similar to how additional disks drives can be specified for HVMs.
For example, let's say I have a backup disk image on dom0 that I would
like to read from another VM without having to copy the entire file. Is
this
33 matches
Mail list logo