> I will do a fresh install and confirm again that disabling msi does the trick.
Confirmed. I tweaked the command a bit because it removed the default kernel
options.
> qvm-prefs sys-net kernelopts "nopat iommu=soft swiotlb=8192 pci=nomsi"
Any idea if this would introduce any security vulnerabi
It appears the USB stick that was used to flash the ISO was not sufficient.
Switched to a 16GB USB stick as the previous was only 8GB. The 16GB USB stick
worked. After installing the QUBES OS it was pretty straightforward thereafter.
The reason was because had already experienced PARROT OS. Now.
> You fooled me with the cogent problem description and troubleshooting
> approach.
(~_^) I am a professional Googler and I might have found a solution.
Rmb the dmesg logs above where qubes show
[ 4.742826] igb :00:06.0: Using MSI interrupts. 1 rx queue(s), 1 tx queue(s)
while Ubuntu show
[1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 27/06/2019 8.15 PM, Andrew David Wong wrote:
> On 27/06/2019 6.44 PM, haaber wrote:
>> Hi, by running qvm-ls a directed graph of which qubes depends on
>> which other as netVM can be obtained. I thought that this would
>> be nice to have the netw
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
Marek will be speaking at this year's Xen Developer and Design Summit.
[1] The summit will take place July 9-11 in Chicago, Illinois. Marek's
presentation is titled, "A Journey to Mirage OS as Xen PVH." Here is the
description
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 27/06/2019 6.44 PM, haaber wrote:
> Hi, by running qvm-ls a directed graph of which qubes depends on
> which other as netVM can be obtained. I thought that this would be
> nice to have the network graph visualized in the qubes widget (or
> in netw
Hi, by running qvm-ls a directed graph of which qubes depends on which
other as netVM can be obtained. I thought that this would be nice to
have the network graph visualized in the qubes widget (or in
network-manager, which is more natural, but maybe harder to fiddle in
the code).
The graph is fl
That's very strange.
I dont see this behaviour.
I'll take a look in the mornng.
I'm afraid I cant reproduce. :-(
Works for me.
After recent updates on dom0 & buster, problems disappeared. Cheers,
Bernhard
--
You received this message because you are subscribed to the Google Groups
"qubes-u
ehag...@gmail.com:
> Ok, first thanks for the links.
>
> what is a template
>
> Its mor fundamental than the vm right
>
> how is it done
>
Please review the Qubes documentation in https://www.qubes-os.org/doc/.
It covers the basics and then some. You might want to think twice about
storing
This takes som explanation. With capita I mean that box that comes up when
preforming a registration or setting up a new account at a webbpage. In order
to confirm thar youre not a robot and so on.
I tried this with my Tor browser and just dont work out. I tried it a number of
times an eventua
I did down load wasabi, extracted and selected destination folder for the
files. Then I used dolphin to try and find them in order to compleat the
instalation. but they wasent visibel in the selected folder.
How come
souldent dolphin be used like that
the fil finder in the non whonix wm work
I just have no ider hoe stuff acturly works so im some what cautious.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
why would wasabi some how compromise alla whonix gatways
The are all seperated right like individual computers
if a program can do that then whole qubes consept would be useles
sorry dident realy get the qustions I was asked.
--
You received this message because you are subscribed to the
Ok, first thanks for the links.
what is a template
Its mor fundamental than the vm right
how is it done
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qu
Thanks for your input Brendan, David, Chris.
Having switched to KDE, the laptop is now completely stable, and in my
opinion far more usable than XFCE.
I'm also running Trisquel on a Thinkpad X200 flashed with Libreboot, which
feels more secure although requires more care over choosing what to
ins
On Tue, Jun 25, 2019 at 05:10:16PM +0100, unman wrote:
> On Tue, Jun 25, 2019 at 12:34:50PM +1000, haaber wrote:
> > > On Mon, Jun 24, 2019 at 09:51:27AM +1000, haaber wrote:
> > > > Hello, I have a funny (and slightly annoying) behaviour when running a
> > > > debian-dvm (based on buster): trying
On Wed, Jun 26, 2019 at 10:12:40PM -0700, Sphere wrote:
> @unman: thanks for that
> I also noticed that qubes-updates-proxy.service fails by default on startup
> and I'm unsure if that is a minimal template-only problem but I was able to
> fix it thanks to it indicating that the problem is a miss
The general idea is correct
If dom0 gets pwned then everything else can be pwned and stolen, including your
data
pwning dom0 properly and successfully however, is not trivial because dom0 has
no direct access to network hardware to communicate in the first place and
malicious actors would need m
Jon deps:
On 6/27/19 1:10 AM, Chris wrote:
I tried the Debian template but it still doesn't work. Same symptoms
https://www.qubes-os.org/doc/pci-devices/#pci-passthrough-issues attach
options.
I need some help here. Couldn't find the configuration file mentioned
(/var/lib/qubes/servicevms
On Wednesday, June 26, 2019 at 4:34:11 PM UTC, cubit wrote:
> I am not sure if this is related to recent updates but after updating today
> and doing a reboot, my sys-firewall and other appVMs are not getting DNS
> resolving working.
>
>
>
> - sys-net (fedora30) starts up with out an issue, ca
20 matches
Mail list logo