Perfect.
Sound good to me. I'm going to quickly run through your checklist first to
re-verify everything then I'll get on the IRC.
I've never been on either but I'll send a quick update here when I've got it
going.
--
You received this message because you are subscribed to the Google
The short version is, the certificate for the https URL listed in
/etc/yum.repos.d/qubes-r4.repo is throwing the below error, and browsing
to the same URL returns an invalid certificate.
URL: https://yum.qubes-os.org/r4.0/current/vm/
The certificate expired earlier today, approximately 6 hours
OGBaby:
> Hey Qubenix, I have an update for you and anyone curious. The MDB_BAD_TXN
> error has been resolved. For anyone wondering this error most likely mean
> your blockchain was interrupted during sync and is now corrupt.
>
> The solution advised by Monero channels is to delete the
Hey Qubenix, I have an update for you and anyone curious. The MDB_BAD_TXN error
has been resolved. For anyone wondering this error most likely mean your
blockchain was interrupted during sync and is now corrupt.
The solution advised by Monero channels is to delete the blockchain data
("lmdb")
I see several posts citing 4.0rc2 when it is clear from context that they are
talking about 4.0.1-rc2. They are completely different releases. Take care to
cite the correct release in your posts.
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
U2F Proxy is not so cool. So far no joy getting it to work. Someone on reddit
had similar issues and questions and resolved by installing USB keyboard
support. That’s not mentioned in the Qubes docs and I hope we don’t have to
resort to that. If that were a requirement, surely the docs would
I install from USB3 stick all the time and it’s fast. Even if it is dropping
back to 2.0, it should not be as slow as you describe.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
I would be more concerned about security than drivers. I connected a Caldigit
Plus TB3 hub to my Qubes laptop and it worked fine, but now I had a new threat
vector since TB has direct access to the PCI bus. As someone else here noted,
there may be a time when they vector is secure, but not yet.
On Tue, Dec 25, 2018 at 04:22:32AM -0800, Martin Weck wrote:
> Hi,
> I have got a Lenovo L460 with Broadcom brcm4356 Wifi Adapter that I don't get
> working on Qubes.
> To isolate the problem, I have first installed a debian-9 directly on the
> machine and got this after some problems working
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Zrubi:
> On 12/23/18 9:34 PM, Demi M. Obenour wrote:
>> Someone I know is interested in using QubesOS. However, they
>> are also a gamer: if they could not have a Windows VM with access
>> to a dedicated graphics card for use by games, then QubesOS
Hello friends! Pls, help me :(
I need to configure port forwarding to Kali linux VM via sys-net --->
sys-firewall ---> sys-whonix ---> VPN-VM ---> KaliVM to use meterpreter and
apache2 on my Kali linux VM. At first I tried to use scripts:
regarding the HVM approach, I have noticed that the whole device is missing,
although I have added it to the VM:
user@debian:~$ sudo lspci -k
00:00.0 Host bridge: Intel Corporation 440FX - 82441FX PMC [Natoma] (rev 02)
Subsystem: Red Hat, Inc Qemu virtual machine
00:01.0 ISA bridge: Intel
Hi,
I have got a Lenovo L460 with Broadcom brcm4356 Wifi Adapter that I don't get
working on Qubes.
To isolate the problem, I have first installed a debian-9 directly on the
machine and got this after some problems working
onsdag den 19. december 2018 kl. 05.34.37 UTC-5 skrev qube...@tutanota.com:
> Hi, I updated the dom0 and after I tried to update the Fed-28 template. I get
> following error:
>
> [user@fedora-28 ~]$ sudo dnf update
> Last metadata expiration check: 0:27:37 ago on Wed 19 Dec 2018 11:04:23 AM
>
Packets are not transmitted after I added port 80 and 8080 to sys-net.
[user@sys-net ~]$ sudo iptables -t nat -L -v -n
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
15234 807K PR-QBS all -- *
On Monday, December 24, 2018 at 1:52:53 PM UTC+1, Hugo Costa wrote:
> On Sunday, 23 December 2018 20:34:48 UTC, Demi M. Obenour wrote:
> > Someone I know is interested in using QubesOS. However, they are also a
> > gamer: if they could not have a Windows VM with access to a dedicated
> >
I need to forward the port to Kali Vm in order to use meterpreter and apache2
on my KaliVM:
sys-net ---> sys-firewall ---> sys-whonix ---> VPN ---> KaliVM.
This can be done?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
What mistake do I make?
-
[user@sys-net ~]$ ifconfig | grep -i cast
ens6: flags=4099 mtu 1500
ens5f0u1: flags=4163 mtu 1500
inet 192.168.0.157 netmask 255.255.255.0 broadcast 192.168.0.255
vif3.0: flags=4163 mtu 1500
inet 10.137.0.5 netmask 255.255.255.255 broadcast
On 20181225 at 00:25 -0800 menoldst...@gmail.com wrote:
> Permission denied (you must be root)
Sometimes a closer look at the error mesage solves the riddle.
Achim
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To uns
Thanks for the brilliant work with qubes, I took value from the hardware
support page to wanted to send in my data aswell.
Can confirm everything works pretty much out of the box.
Only issue I have is the Corsair k70 keyboard does need to be unplugged
then plugged back in at boot when
I'm installing AEM for the first time in Qubes 4 and noticed that the
readme(https://github.com/QubesOS/qubes-antievilmaid/blob/master/anti-evil-maid/README)
has been significantly expanded since 3.2, specifically it mentions to make
sure to get the latest RACM update at the SINIT module
вторник, 25 декабря 2018 г., 5:26:04 UTC+3 пользователь unman написал:
> On Mon, Dec 24, 2018 at 06:08:27AM -0800, menoldst...@gmail.com wrote:
> > Hello. Qubes-users. I installed Kali linux and now I need to make it so
> > that apache2 would work not only on the local network, but also on the
>
22 matches
Mail list logo