[qubes-users] X11 forwarding stopped working in fedora-26, still works in debian-9

2018-05-10 Thread pixel fairy
sometime in the last couple days, ssh -X stopped working in fedora-26 templates, at least on my box. still works from debian-9. anyone else notice this? anything change? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this

Re: [qubes-users] ProxyVM in Qubes 4.0

2018-05-10 Thread Ivan Mitev
On 05/10/2018 11:08 PM, Quentin Le Guennec wrote: > From the docs (https://www.qubes-os.org/doc/vpn/) > > "Create a new VM, name it, click the ProxyVM radio button, and choose a > color and template." > > On Qubes 4.0, I don't see that radio button. I don't see anything about > that in the

[qubes-users] Re: gpg-split revoke command $ export QUBES_GPG_DOMAIN=work-gpg

2018-05-10 Thread john
On 05/08/18 20:56, qubes-fan-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote: I am playing with gpg-split and I did a missclick. I would need to revoke the command. I executed the command $ export QUBES_GPG_DOMAIN=work-gpg by mistake in vault qube instead of work-gpg cube. Is there a way to

[qubes-users] opening links in another VM opens two browsers

2018-05-10 Thread qubenix
Hey everyone! Hope you are all doing well. I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/ so links clicked in one debian-9 AppVM will open in separate debian-9 AppVM. What actually happens is interesting. If I have firefox running in the destination VM already,

[qubes-users] Re: Keyboard Problems - Corsair Gaming K65 Lux RGB

2018-05-10 Thread Yethal
W dniu czwartek, 10 maja 2018 22:44:06 UTC+2 użytkownik fe...@oxley.org napisał: > HI, > > I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes. > > When I boot my system: > > 1. Press F11 to get to boot selection menu > 2. Select boot drive containing Qubes > 3. Initial

[qubes-users] Keyboard Problems - Corsair Gaming K65 Lux RGB

2018-05-10 Thread felix
HI, I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes. When I boot my system: 1. Press F11 to get to boot selection menu 2. Select boot drive containing Qubes 3. Initial boot and then hard disk drive encryption key in requested. At (3) the keyboard no longer works. It

[qubes-users] ProxyVM in Qubes 4.0

2018-05-10 Thread Quentin Le Guennec
>From the docs (https://www.qubes-os.org/doc/vpn/) "Create a new VM, name it, click the ProxyVM radio button, and choose a color and template." On Qubes 4.0, I don't see that radio button. I don't see anything about that in the manual page of qvm-create either. Am I missing something? -- You

[qubes-users] HCL - HP_ZBook_15_G4

2018-05-10 Thread Tom Marciniak
t. Qubes-HCL-HP-HP_ZBook_15_G4-20180510-122011.yml Description: application/yaml

Re: [qubes-users] trouble with whonix-14-dvm

2018-05-10 Thread mossy
mossy: > 'awokd' via qubes-users: >> Think I got it working with the -14 templates from unstable. In dom0: >> >> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable >> qubes-template-whonix-gw-14 >> qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black >> qvm-prefs

Re: [qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot

2018-05-10 Thread Ilpo Järvinen
On Thu, 10 May 2018, qubes-...@tutanota.com wrote: > I set up the split-gpg with vault-safe VM, where my private keys are stored, > and the work VM, with pub keys and server communication. > > All runs well after executing the > [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe > > The issue

Re: [qubes-users] trouble with whonix-14-dvm

2018-05-10 Thread mossy
'awokd' via qubes-users: > Think I got it working with the -14 templates from unstable. In dom0: > > sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable > qubes-template-whonix-gw-14 > qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black > qvm-prefs sys-whonix-14

Re: [qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot

2018-05-10 Thread mossy
qubes-...@tutanota.com: > I set up the split-gpg with vault-safe VM, where my private keys are stored, > and the work VM, with pub keys and server communication. > > All runs well after executing the > [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe > > The issue is, that the export doesnt

[qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot

2018-05-10 Thread qubes-fan
I set up the split-gpg with vault-safe VM, where my private keys are stored, and the work VM, with pub keys and server communication. All runs well after executing the [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe The issue is, that the export doesnt survive rebooting the work VM, and I

[qubes-users] Re: How to Add additional Drive and Erase/Clean it?

2018-05-10 Thread levonsar8
> There is fdisk or with gparted on dom0: > sudo qubes-dom0-update gparted > sudo gparted > * remember to eject the drives wherever they are monted, even on dom0. Thank you very much! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To