Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread 'justanotherquber' via qubes-users
On Thu, May 02, 2024 at 02:44:09PM -, qubist wrote: > That's secondary, but in case you are interested, mpv gives better playback: > > https://forum.qubes-os.org/t/improving-video-playback-speed/21906/8 It does not seem to play back better to me, as well at most, especially not with the

Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread 'justanotherquber' via qubes-users
I also tried an untouched version of debian 12 minimal with updates and only mplayer added from apt. There was no mimeapps.list file in /usr/share/applications, /etc/xdg/, $HOME/.config or $HOME/.local/share/applications. I tried xdg-mime default mplayer.desktop video/x-matroska as the non-root

Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread 'justanotherquber' via qubes-users
> Trying to copy the file first and then 'xdg-open TEST.pdf' in the > target VM, I get the same series of errors: > > $ xdg-open TEST.pdf > xdg-mime: mimetype argument missing > Try 'xdg-mime --help' for more information. > /usr/bin/xdg-open: 882: x-www-browser: not found > /usr/bin/xdg-open:

[qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-01 Thread 'justanotherquber' via qubes-users
Hi, I've been trying to get a dvm to open media files in mplayer in a disposable qube. Starting the disposable media qube from dom0 with qvm-run --dispvm media-dvm --service -- qubes.StartApp+st works. Copying files(same as the ones used to test qvm-open-in-vm/qvm-open-in-dvm) to the vm with

[qubes-users] NFC and other creative communications with your qubes-os

2024-04-20 Thread 'haaber' via qubes-users
I have a simple question, around "things that you have" (like sec. tokens, etc). Many "fido tokens" (yubi, nitro, google) allow NFC communication, most  computers as well, but i do not find anything in my qubes (maybe the chips acts as USB client and my USB is down by default?) => Is there a

Re: [qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-15 Thread 'Rusty Bird' via qubes-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Rusty Bird: > Boryeu Mao: > > An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning > > about running processes in the qube; similarly on command line > > `qvm-shutdown sys-firewall` fails with an error. Is it possible to > >

Re: [qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-15 Thread 'Rusty Bird' via qubes-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Boryeu Mao: > An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning > about running processes in the qube; similarly on command line > `qvm-shutdown sys-firewall` fails with an error. Is it possible to > designate an appVM to

Re: [qubes-users] Star Labs StarBook certified with intel only?

2024-03-27 Thread 'జిందం వాఐి' via qubes-users
On 2024-03-26 23:05, 'జిందం వాఐి' via qubes-users wrote: On 2024-03-26 22:18, Andrew David Wong wrote: On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote: As you can see, only Intel processors are listed. I'm not personally aware of any changes since then, but when it comes to Qubes

Re: [qubes-users] Star Labs StarBook certified with intel only?

2024-03-26 Thread 'జిందం వాఐి' via qubes-users
On 2024-03-26 22:18, Andrew David Wong wrote: On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote: As you can see, only Intel processors are listed. I'm not personally aware of any changes since then, but when it comes to Qubes-certified hardware, you should always consult the vendor's

[qubes-users] Star Labs StarBook certified with intel only?

2024-03-25 Thread 'జిందం వాఐి' via qubes-users
* i see an option to purchase laptop for amd also on their website * is this certified with only intel? -- regards, జిందం వాఐి [ jindam, vani ] web_ jindam.neocities.org [matrix]_ @jindam:oikei.net -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'Bapak Ireng' via qubes-users
Sorry, i discuss in the Qubes Communityfaster responses, better systemthen google groups Bapak Ireng schrieb am Montag, 25. März 2024 um 16:32:33 UTC+1: > i tried sudo /usr/libexec/initial-setup/initial-setup-graphical > > and the following is the output / result: > > > > > i tried to

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'Bapak Ireng' via qubes-users
i tried sudo /usr/libexec/initial-setup/initial-setup-graphical and the following is the output / result: i tried to sent pictures, but google did not let me sent them. Sh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'haaber' via qubes-users
Hi, after successfully installing Qubes 4.2 i am left all alone to configure network (internet) Access. I appreciate it very much if somebody could guide me to the right options. The question is so vague, no one can reasonably answer it. Does sys-net start on boot? Does it have access to

[qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'Bapak Ireng' via qubes-users
Hi, after successfully installing Qubes 4.2 i am left all alone to configure network (internet) Access. I appreciate it very much if somebody could guide me to the right options. Best regards, Bapak Hitam -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Re: Qubes 4.2: Attach usb audio device to appvm

2024-03-20 Thread 'Rune Philosof' via qubes-users
It was not fixed... Apparently just an example of how random it is. It was working for an hour or so. Now it is back to mic not working, just sending out that beep beep sound. On Wed, Mar 20, 2024 at 9:16 AM 'Rune Philosof' via qubes-users < qubes-users@googlegroups.com> wrote: > I

Re: [qubes-users] Inconsistency between `qvm-template list` and `qvm-template-gui`

2024-03-20 Thread 'unman' via qubes-users
Without seeing the screenshot, I think I know the issue. They are from the same repository. qvm-template lists *all* the template in the repo, whereas qvm-template-gui filters to only show the most recent supported versions. -- I never presume to speak for the Qubes team. When I comment in the

[qubes-users] Re: Qubes 4.2: Attach usb audio device to appvm

2024-03-20 Thread 'Rune Philosof' via qubes-users
Installing a new template fixed it. I installed fedora-39 and switched to it. The old template had been upgraded in-place several times, back from fedora-36, I think. Maybe something is missing in the upgrade from 4.1 to 4.2, or in the instructions on how to upgrade existing templates to 4.2.

Re: [qubes-users] Windows 10 and Qubes OS Dualboot

2024-03-07 Thread 'Marcelo' via qubes-users
Hi one7two99, I have Qubes and Linux already installed in different partitions in legacy mode and both work fine. Now I need to install windows 10 (to run Fusion 360 for personal use). I don't want to install it as a qube as my hardware is not very powerful. I don't need Bitlocker. Could you

Re: [qubes-users] HCL - Beelink SER5 Ryzen 7 5800H AMD Integrated Graphics (RX Vega 8)

2024-03-05 Thread 'bozoslivehere' via qubes-users
Suspend works On Monday, March 4th, 2024 at 2:33 PM, 'bozoslivehere' via qubes-users wrote: > ---layout: >   'hcl' > type: >   'Mini PC' > hvm: >   'yes' > iommu: >   'yes' > slat: >   'yes' > tpm: >   '2.0' > remap: >   'yes' > brand: | >   AZW

[qubes-users] HCL - Beelink SER5 Ryzen 7 5800H AMD Integrated Graphics (RX Vega 8)

2024-03-04 Thread 'bozoslivehere' via qubes-users
---layout:   'hcl' type:   'Mini PC' hvm:   'yes' iommu:   'yes' slat:   'yes' tpm:   '2.0' remap:   'yes' brand: |   AZW model: |   SER bios: |   5800H603 cpu: |   AMD Ryzen 7 5800H with Radeon Graphics cpu-short: |   FIXME chipset: |   Advanced Micro Devices, Inc. [AMD] Renoir/Cezanne Root

Re: [qubes-users] Ethernet socket device not available in Network Connections

2024-03-02 Thread 'unman' via qubes-users
[quote] my sys-net is also sys-usb because I used the USB ethernet adapter so I think this is the problem but I don't know how to fix. [/quote] I doubt that this is the problem. Have you assigned the device to sys-net in the "devices" tab of sys-net settings. When sys-net boots up, can you run

[qubes-users] Qubes 4.2: Attach usb audio device to appvm

2024-02-29 Thread 'Rune Philosof' via qubes-users
After upgrading to 4.2 my audio device does not work. I plug in a usb audio device, then attach that usb device to an appvm and try to use it in e.g. meet.google.com. For some reason it only works for the audio microphone or the speaker, not both. Example: 1. I attach the usb device to the

[qubes-users] [Qubes 4.1] issue with thunderbird after recent debian update

2024-02-26 Thread 'haaber' via qubes-users
Hi, since a recent update, thunderbird throws artefacts on xfce screen (parts of its menu), that spawn virtual screen, survive log off & on again, but disappear if VM is closed. And re-appear when thunderbird is restarted. Very annoying! Am I alone with this type of glitch? Thanks, best,

Re: [qubes-users] issue with URL handler in Thunderbird: started VM receives truncated URL

2024-02-23 Thread 'Skyler Ferris' via qubes-users
[quote="Ulrich_Windl1, post:8, topic:24602"] I kind of disagree: When passing the URL as "$1", it is passed as one single parameter. The user cannot be expected to know to how much more levels of shell script the parameter will be passed to, so any deeper layers have to keep the single

Re: [qubes-users] issue with URL handler in Thunderbird: started VM receives truncated URL

2024-02-22 Thread 'Skyler Ferris' via qubes-users
Just realized I sent this as "reply" instead of "reply all". Sorry for the spam, Ulrich, but I want to make sure this is visible to others who might have a similar problem. I think the problem is that the URL doesn't end up getting quoted on the other end. When this is sent:

Re: [qubes-users] issue with URL handler in Thunderbird: started VM receives truncated URL

2024-02-22 Thread 'Stuart Perkins' via qubes-users
On Thu, 22 Feb 2024 22:19:21 +0100 Ulrich Windl wrote: >On 2/22/24 22:15, Ulrich Windl wrote: >> On 2/22/24 21:54, 'Stuart Perkins' via qubes-users wrote: >>> >>> On Thu, 22 Feb 2024 21:25:18 +0100 >>> Ulrich Windl wrote: >>> >>>&

Re: [qubes-users] issue with URL handler in Thunderbird: started VM receives truncated URL

2024-02-22 Thread 'Stuart Perkins' via qubes-users
On Thu, 22 Feb 2024 21:25:18 +0100 Ulrich Windl wrote: >Hi! > > >I managed to configure Thunderbird to run any links via a DVM. However >today I realized that URLs with parameters are truncated (Qubes-OS 4.2) >after the first parameter it seem. > >For example I have the URL

[qubes-users] Qubes OS 4.2: no more access to local ports?

2024-02-20 Thread nonsense via qubes-users
I have for years done my development work using dedicated AppVMs that run podman (https://podman.io/) containers based on images from bioconductor (https://bioconductor.org/help/docker/) for project isolation and reproducibility - images are pushed on a per project basis into the registry of

Re: [qubes-users] Need help after a failed in-place upgrade attempt

2024-02-20 Thread 'haaber' via qubes-users
Hi Am Sa., 17. Feb. 2024 um 08:10 Uhr schrieb 'haaber' via qubes-users : Hi > I tried to upgrade my Qubes OS system from 4.1.2 to 4.2.0 using the > "qubes-dist-upgrade" script. ... > OK, I am not an expert on

Re: [qubes-users] Need help after a failed in-place upgrade attempt

2024-02-16 Thread 'haaber' via qubes-users
Hi I tried to upgrade my Qubes OS system from 4.1.2 to 4.2.0 using the "qubes-dist-upgrade" script. The upgrade failed - and - now the system is in a 'weird' state. None of the Fedora- or Debian-based VM have 'external / public' network access anymore. The 'anon-whonix' VM however still does

Re: [qubes-users] Updating fedora-38: "b'warning: runaway fork() in Lua script\n'"

2024-02-16 Thread 'mov' via qubes-users
On Friday, February 16th, 2024 at 6:32 PM, Ulrich Windl wrote: > > > Hi! > > > I saw these messages when upading fedora-38 today. I didn't run QuebesOS > for a while, so there were a lot of updates, but "runaway fork()" > worries me a bit... I've seen these messages too, during

Re: [qubes-users] time sync dysfunctional

2024-02-14 Thread 'haaber' via qubes-users
Dear unman & qubes -community, I am still on Q4.1 (no time to do a full install now). Since a few days, my time ran large out of sync, despite the swdate displaying normal functioning. I rebooted, I restarted swdate. Its log says:   [INFO] date output: 10:44:44 (which is London time, but

Re: [qubes-users] Re: question on 'service-name' for the new (R4.2) qrexec policy

2024-02-13 Thread 'Rusty Bird' via qubes-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Boryeu Mao: > > For R4.1.2 I had some RPC calls with + and - characters in the file > > name. These are considered as invalid characters to be part of service > > names in the new qrexec policy format (e.g. in > >

Re: [qubes-users] time sync dysfunctional

2024-02-06 Thread 'haaber' via qubes-users
Hi Unman I reply inline below. On 2/6/24 11:45, 'haaber' via qubes-users wrote: Hi, I am still on Q4.1 (no time to do a full install now). Since a few days, my time ran large out of sync, despite the swdate displaying normal functioning. I rebooted, I restarted swdate. Its log says

Re: [qubes-users] time sync dysfunctional

2024-02-06 Thread 'unman' via qubes-users
On Tue, Feb 06, 2024 at 01:08:09PM +0100, 'haaber' via qubes-users wrote: > addendum: if I run "date" in a client VM it will give the right > timezone, but still has 3min of delay.. > > On 2/6/24 11:45, 'haaber' via qubes-users wrote: > > Hi, > > > >

Re: [qubes-users] time sync dysfunctional

2024-02-06 Thread 'haaber' via qubes-users
addendum: if I run "date" in a client VM it will give the right timezone, but still has 3min of delay.. On 2/6/24 11:45, 'haaber' via qubes-users wrote: Hi, I am still on Q4.1 (no time to do a full install now). Since a few days, my time ran large out of sync, despite the swdate

[qubes-users] time sync dysfunctional

2024-02-06 Thread 'haaber' via qubes-users
Hi, I am still on Q4.1 (no time to do a full install now). Since a few days, my time ran large out of sync, despite the swdate displaying normal functioning. I rebooted, I restarted swdate. Its log says:   [INFO] date output: 10:44:44 (which is London time, but otherwise correct), my

[qubes-users] HCL Purism Librem mini V2 with Qubes 4.2

2024-01-21 Thread code9n via qubes-users
Hi, HCL: --- layout: 'hcl' type: 'Desktop' hvm: 'yes' iommu: 'yes' slat: 'yes' tpm: 'no' remap: 'yes' brand: | Purism model: | librem_mini_v2 bios: | PureBoot-Release-20 cpu: | Intel(R) Core(TM) i7-10510U CPU @ 1.80GHz cpu-short: | FIXME chipset: | Intel Corporation Comet Lake-U v1 4c Host

[qubes-users] LUKS and Yubikey in 4.2?

2024-01-21 Thread 'Jeremy Hansen' via qubes-users
Can a librem key or yubikey be used to unlock a LUKS filesystem at boot in 4.2? Wasn’t the issue previously related to dom0 being too old? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving

[qubes-users] HCL - ASUS Expertbook B9400CEA

2024-01-10 Thread 'Greg Wojcieszczuk' via qubes-users
--- layout:   'hcl' type:   'Notebook' hvm:   'yes' iommu:   'yes' slat:   'yes' tpm:   '2.0' remap:   'yes' brand: |   ASUSTeK COMPUTER INC. model: |   ASUS EXPERTBOOK B9400CEA_B9400CEA bios: |   B9400CEA.311 cpu: |   11th Gen Intel(R) Core(TM) i7-1165G7 @ 2.80GHz cpu-short: |   FIXME chipset: |

Re: [qubes-users] Re: Qubes 4.2: qubes-tunnel not working after upgrade (cannot resolve hostname)

2024-01-07 Thread r.wiesbach via qubes-users
ere? how can I make vpn leak-proof again with Qubes 4.2? On 1/7/24 22:49, r.wiesbach via qubes-users wrote: Hi, The forum post does not use qubes-tunnel and I do not use wireguard (but openVPN) - so I do not see how this post solves my issue?! On 1/6/24 12:06, code9n wrote: Hi,   This is on

Re: [qubes-users] Re: Qubes 4.2: qubes-tunnel not working after upgrade (cannot resolve hostname)

2024-01-07 Thread r.wiesbach via qubes-users
Hi, The forum post does not use qubes-tunnel and I do not use wireguard (but openVPN) - so I do not see how this post solves my issue?! On 1/6/24 12:06, code9n wrote: Hi,   This is on the Forum: https://forum.qubes-os.org/t/wireguard-vpn-setup/19141 cheers, On Saturday 6 January 2024 at

[qubes-users] Qubes 4.2: qubes-tunnel not working after upgrade (cannot resolve hostname)

2024-01-05 Thread r.wiesbach via qubes-users
Hi there, vpnVM and netVM both in-place upgrades from Q4.1 (and worked fine there). Template is fedora 38. NetVM is online, ping of vpn server hostname is fine within netVM. Ping and dig do not work within vpnVM, but afair that is intended (leak prevention of qubes-tunnel) I tried to restart

[qubes-users] HCL - Framework 13 AMD Ryzen 7840U

2023-11-08 Thread 'Shigeru Kawaguchi' via qubes-users
Major issue is that the touchpad does not work.Suspend/wake does work fine.Have not tested much beyond the above.Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an

[qubes-users] HCL - Lenovo ThinkPad T480

2023-10-22 Thread 'Yanase Yuki' via qubes-users
Most features works flawlessly. I did not test suspend / sleep. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view

Re: [qubes-users] Re: Issue with "Qubes release 4.2.0-rc3" | USB Installation Media not detected in UEFI BIOS

2023-10-05 Thread 'Jarrah' via qubes-users
I actually had a similar issue. It ended up being a BIOS that refused to detect rc3 is ISO format. Mounting the ISO and copying the files over to a FAT formatted USB got around the boot issue but the qubes installer doesn't see it's root partition then. The working solution was to insert both

[qubes-users] HCL - ThinkPad X1 Carbon Gen 10

2023-10-02 Thread gluonium via qubes-users
Works out of the box: - networking (usb2lan) - keyboard backlight - build-in bluetooth - sound  Works after tweaking: - sceen is flickering unless adding "i915.enable_psr=0" in /boot/efi/EFI/qubes/xen.cfg, more details:

[qubes-users] slock issue

2023-09-18 Thread 'justanotherquber' via qubes-users
Hi guys, I recently tried to switch from i3lock to slock, but when I run 'sudo ./slock' (it needs suid/sgid) I get this error: slock: crypt: Invalid argument I installed libxcrypt-compat, which slock needed. It's supposed to be compatible with libcrypt(not found). journalctl -f only shows

[qubes-users] HCL - HP ZBook 17 G4

2023-09-11 Thread 'crypto_pipao' via qubes-users
--- layout: 'hcl' type: 'notebook' hvm: 'yes' iommu: 'yes' slat: 'yes' tpm: 'unknown' remap: 'yes' brand: | HP model: | HP ZBook 17 G4 bios: | P70 Ver. 01.44 cpu: | Intel(R) Core(TM) i7-7820HQ CPU @ 2.90GHz cpu-short: | FIXME chipset: | Intel Corporation Xeon E3-1200 v6/7th Gen Core Processor Host

Re: [qubes-users] split-ssh question

2023-09-10 Thread 'unman' via qubes-users
On Fri, Sep 08, 2023 at 08:10:44AM +0200, haaber wrote: > I tried to configure split-ssh according to the tutorial on qubes pages, > in its simple version (just agent, but no keepass integration). But now > ssh offers *all* my private keys to *all* servers, which is odd, but > more annoying, it

Re: [qubes-users] saltstack: detect the os within a running target/state.sls

2023-08-25 Thread 'unman' via qubes-users
On Thu, Aug 24, 2023 at 11:26:30AM +0200, lik...@gmx.de wrote: > Hi! > > Running grains['os'] in a target returns always "Fedora" and grains['id'] > returns "dom0". For this reason I cannot branch in my state files for > different os templates. > Executing this test in such a targeted

Re: [qubes-users] HCL - ASUS Vivobook X1503ZA

2023-08-22 Thread 'Gandalfen' via qubes-users
, 2:02 PM, 'Gandalfen' via qubes-users - qubes-users at googlegroups.com wrote: > --- > layout: > 'hcl' > type: > 'notebook' > hvm: > 'yes' > iommu: > 'yes' > slat: > 'yes' > tpm: > 'unknown' > remap: > 'yes' > brand: | > ASUSTeK COMPUTER INC. >

[qubes-users] HCL - ASUS Vivobook X1503ZA

2023-08-21 Thread 'Gandalfen' via qubes-users
--- layout: 'hcl' type: 'notebook' hvm: 'yes' iommu: 'yes' slat: 'yes' tpm: 'unknown' remap: 'yes' brand: | ASUSTeK COMPUTER INC. model: | Vivobook_ASUSLaptop X1503ZA_X1503ZA bios: | X1503ZA.305 cpu: | 12th Gen Intel(R) Core(TM) i7-12700H cpu-short: | Intel i7-12700H chipset: | Intel Corporation

Re: [qubes-users] HCL - Gigabyte B650E Aorus Master - AMD Ryzen 9 7950X

2023-08-11 Thread 'Edwin Török' via qubes-users
On Thu, 2023-08-10 at 21:36 +, 51li...@ileg.al wrote: > Its interesting, since my amd legion is testing machine, i never use > sys-usb, and yeah i found that usb passthrough lead system to reboot. > can you provide a more detail about step by step what have you done ? > At install time

Re: [qubes-users] HCL - Gigabyte B650E Aorus Master - AMD Ryzen 9 7950X

2023-08-09 Thread 'Edwin Török' via qubes-users
On Wed, 2023-08-09 at 20:53 +0100, Edwin Török wrote: > On Mon, 2023-08-07 at 21:45 +0100, 'Edwin Török' via qubes-users > wrote: > > > >   Must NOT use a USB qube. Using a USB qube results in an > > instant > > host reboot as soon as the USB qube is booted

Re: [qubes-users] HCL - Gigabyte B650E Aorus Master - AMD Ryzen 9 7950X

2023-08-09 Thread 'Edwin Török' via qubes-users
On Mon, 2023-08-07 at 21:45 +0100, 'Edwin Török' via qubes-users wrote: > >   Must NOT use a USB qube. Using a USB qube results in an instant > host reboot as soon as the USB qube is booted (same issue happen on > KVM > when attempting to pass through any USB c

[qubes-users] HCL - Gigabyte B650E Aorus Master - AMD Ryzen 9 7950X

2023-08-07 Thread 'Edwin Török' via qubes-users
Architecture:    x86_64   CPU op-mode(s):    32-bit, 64-bit   Address sizes: 48 bits physical, 48 bits virtual   Byte Order:    Little Endian CPU(s):  32   On-line CPU(s) list:   0-31 Vendor ID:   AuthenticAMD   Model name:    AMD

[qubes-users] How to use lvms from a disk with a valid Qubes installation as qubes in another Qubes pc?

2023-07-09 Thread 'Qru' via qubes-users
In my desktop Qubes system the mainboard died. So I bought a new one. Unfortunately I didn't make a backup for some days. After building the new hardware system my Qubes installation from the old ssd doesn't start there. (Somehow the system freezes or at least the keyboard is being switched off

Re: [qubes-users] QubesIncoming folder in /tmp ??

2023-06-30 Thread 'unman' via qubes-users
On Fri, Jun 30, 2023 at 12:27:41PM +0200, haaber wrote: > Hi I was wondering if it would not me preferable (at least in some VM's) > to delocalise the QubesIncoming folder in /tmp to have it "cleaned up" > regularly. It's a pain to do so manually. Is there a problem doing so ?  > What would be the

Re: [qubes-users] Re: ssh-split issue

2023-06-21 Thread 1b6c8d73d15b.qubeslist via qubes-users
On 21/06/2023 11:49, haaber wrote: >> We observe that the file /run/user/1000/openssh_agent is different >> from/home/user/.SSH_AGENT_sshkeys. That may be a problem. Running the following command in the work qube should work: SSH_AUTH_SOCK=/home/user/.SSH_AGENT_vault ssh-add -L You

Re: [qubes-users] How to make sys-firewall broadcast a local qube as the system-wide DNS server?

2023-06-08 Thread 'unman' via qubes-users
On Tue, Jun 06, 2023 at 01:24:18PM -0500, Leo28C wrote: > I managed to set up a pi-hole qube and make it my network's DNS > filtering/caching server. Ironically, it works flawlessly across my network > EXCEPT it completely breaks DNS for all other qubes in the same system. On > Debian-based qubes

[qubes-users] Re: HCL - cirrus7 nimbini v3 (NUC12WSHv5)

2023-06-06 Thread 'sonnenfinsternis' via qubes-users
After more than a week of intensive use, I haven't noticed any problems so far. The "cirrus7 nimbini v3" (or presumably all NUC12WSHv5) seemed to be suitable hardware for anyone who wants to use QubesOS as a desktop system. Do I still have to submit something to be included in the HCl or do

[qubes-users] HCL report motherboard MSI MEG x670e ACE

2023-06-02 Thread 'R D T' via qubes-users
Here is my HCL report for the motherboard MSI MEG x670e ACE. Booting even the installer works only with the x2apic=false flag set in both xen and linux lines in grub. Automatic creation of networking related qubes (sys-firewall and sys-net) during first configuration after install crashes the pc.

Re: [qubes-users] Re: Beginner questions

2023-05-26 Thread 'sonnenfinsternis' via qubes-users
--- Original Message --- On Friday, May 26th, 2023 at 4:24 AM, 'Stuart Perkins' via qubes-users wrote: > Bottom post is the standard on this list. See my response at the bottom... :) > > On Thu, 25 May 2023 19:02:23 + > "'sonnenfinsternis' via qubes-u

Re: [qubes-users] Re: Beginner questions

2023-05-25 Thread 'Stuart Perkins' via qubes-users
Bottom post is the standard on this list. See my response at the bottom... :) On Thu, 25 May 2023 19:02:23 + "'sonnenfinsternis' via qubes-users" wrote: >Sounds helpful, I'll try it when I get a chance, thanks :) After reading this >[1], I can now even use my USB mous

Re: [qubes-users] Re: Beginner questions

2023-05-25 Thread 'sonnenfinsternis' via qubes-users
Sounds helpful, I'll try it when I get a chance, thanks :) After reading this [1], I can now even use my USB mouse directly after booting, without having to assign it to dom0 first. So slowly but surely I'm warming up to QubesOS. A wonderful system :) Now if I can just find a way to see how

[qubes-users] Re: HCL - cirrus7 nimbini v3 (NUC12WSHv5)

2023-05-24 Thread 'sonnenfinsternis' via qubes-users
I forgot to attach the yml file. Sorry! --- Original Message --- On Wednesday, May 24th, 2023 at 11:51 PM, sonnenfinsternis wrote: > Here's my review of the cirrus7 nimbini v3, which is largely based on the > Intel NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs >

[qubes-users] HCL - cirrus7 nimbini v3 (NUC12WSHv5)

2023-05-24 Thread 'sonnenfinsternis' via qubes-users
Here's my review of the cirrus7 nimbini v3, which is largely based on the Intel NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs great. Most importantly, it is a dream to work on a fanless computer that still runs completely silent under heavy load despite various Qubes

Re: [qubes-users] HCL - TUXEDO InfinityBook S 15 Gen7

2023-05-24 Thread 'sonnenfinsternis' via qubes-users
Thanks for quickly adding my data to the list :-) --- Original Message --- On Thursday, May 11th, 2023 at 2:32 AM, Sven Semmler wrote: > Thank you Eichennarr for your HCL report, which is online now! > > /Sven > > -- >

Re: [qubes-users] Re: Beginner questions

2023-05-24 Thread 'sonnenfinsternis' via qubes-users
is not pre-installed by default in Debian. But this can be easily fixed: https://unix.stackexchange.com/questions/312456/debian-apt-not-apt-get-autocompletion-not-working Best regards :) --- Original Message --- On Tuesday, May 9th, 2023 at 7:57 PM, 'Kamil Aronowski' via qubes-users

Re: [qubes-users] Best practice VPN in Qubes

2023-05-13 Thread 'taran1s' via qubes-users
Demi Marie Obenour: On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote: Andrew David Wong: On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote: If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix it doesn't connect to internet. If one

Re: [qubes-users] Best practice VPN in Qubes

2023-05-13 Thread 'taran1s' via qubes-users
Andrew David Wong: On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote: If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix it doesn't connect to internet. If one uses Debian or Fedora based AppVM and runs vanilla Firefox, it works like a breeze. Any ideas how

Re: [qubes-users] Fedora 36 reaches EOL on 2023-05-16

2023-05-12 Thread 'Stuart Perkins' via qubes-users
On Thu, 11 May 2023 15:20:17 -0700 Andrew David Wong wrote: >Dear Qubes Community, > >The Fedora Project has >[announced](https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/) > that Fedora 36 will reach EOL

Re: [qubes-users] Best practice VPN in Qubes

2023-05-12 Thread 'taran1s' via qubes-users
or Fedora based AppVM and runs vanilla Firefox, it works like a breeze. Any ideas how to solve this? Leo28C: I followed this guide: https://micahflee.com/2019/11/using-mullvad-in-qubes/ (works with others too not just Mullvad) On Wed, May 10, 2023 at 9:51 AM 'taran1s' via qubes-users < qubes-us

[qubes-users] Best practice VPN in Qubes

2023-05-10 Thread 'taran1s' via qubes-users
Hi, What is the best practice for setting up a VPN proxy in Qubes these days (for Mullvad, VPN over Tor)? I found two versions for setup of VPN proxy in Qubes: The first one is from tasket called Qubes-vpn-support. The last version is dated Dec 2020:

[qubes-users] Beginner questions

2023-05-09 Thread 'sonnenfinsternis' via qubes-users
Hi there :) I've only been using QubesOS for two weeks and so far I'm totally thrilled! Thanks to all who contribute to this wonderful project :-) But there are a few questions that I have not been able to clarify online or with friends, so I would like to try here: 1) Is there somewhere in

[qubes-users] HCL - TUXEDO InfinityBook S 15 Gen7

2023-05-09 Thread 'sonnenfinsternis' via qubes-users
Here is my report on the TUXEDO InfinityBook S 15 Gen7. Great laptop, but honestly it is quite annoying in the long run that the fan blows so loud when you work in many Qubes in parallel :-( Greetings! Eichennarr --- layout: 'hcl' type: 'notebook' hvm: 'yes' iommu: 'yes' slat: 'yes'

Re: [qubes-users] Colourful prompt

2023-05-04 Thread 'unman' via qubes-users
On Thu, May 04, 2023 at 05:01:38AM -0700, Andrew David Wong wrote: > On 5/3/23 4:02 AM, Qubes wrote: > > I have noticed on Fedora, the cli prompt itself is not colourful although > > the rest of the output is. Is there a way to get the prompt itself in > > colour as well? The prompt on Debian is

Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time

2023-05-03 Thread 'unman' via qubes-users
On Wed, May 03, 2023 at 04:19:00PM +, Qubes wrote: > > 'unman' via qubes-users wrote: > > On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote: > > > > > Is there a sane way to update existing `*.conf` files on VMs that are > > > already running? > >

Re: [qubes-users] Injecting configuration files into appVM when it's created/started for the first time

2023-05-03 Thread 'unman' via qubes-users
On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote: > Is there a sane way to update existing `*.conf` files on VMs that are > already running? > Is there a not-so-labour-intensive way to solve this problem? Use salt - it's easy to apply to existing qubes, as well as template. You can (if you

Re: [qubes-users] Updating via a wireguard connection

2023-04-29 Thread 'unman' via qubes-users
On Fri, Apr 28, 2023 at 11:58:55AM -0700, Jeremy Hansen wrote: > I would like to configure Qubes to do its updates via a connection to a > wireguard service I have set up. > > I understand how to set up a wireguard enabled template and a qubes based on > that template following this: > >

Re: [qubes-users] Template for X?

2023-04-29 Thread 'unman' via qubes-users
On Sat, Apr 29, 2023 at 04:53:10PM +0800, Sandy Harris wrote: [quote] Is there a template to make a qube that just runs as an X terminal? [/quote] Have you tried a minimal template? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe

Re: [qubes-users] Data recovery -- thin provisioned LVM metadata (?) problem

2023-04-25 Thread 'unman' via qubes-users
On Tue, Apr 25, 2023 at 08:19:48AM +0200, haaber wrote: > Dear all, > > I had a lethally bad hardware failure on computer.  Since I had to buy a > new machine this took a while, now I try to save some data: the old SSD > is attached to a brand-new qubes via usb adapter. I started > > sudo pvscan 

Re: [qubes-users] Modifying /etc/hosts in dispVM

2023-04-20 Thread 'unman' via qubes-users
On Thu, Apr 20, 2023 at 11:29:08AM +, Rusty Bird wrote: [quote] 'host' isn't suitable for testing this, because it never looks at the [/quote] Right - neither are most of the *other* DNS utilities - ping should do. Or `getent hosts ...` -- You received this message because you are subscribed

Re: [qubes-users] Modifying /etc/hosts in dispVM

2023-04-19 Thread 'unman' via qubes-users
On Wed, Apr 19, 2023 at 07:06:19AM -0700, john.e...@gmail.com wrote: > I haven't been able to figure out how I can modify /etc/hosts in a dispVM > so that my entry (such as 10.1.1.1 myhost.example.commyhost) will be > used instead of DNS. > > I'm trying to direct my traffic to a different

Re: [qubes-users] Re: Changing key mappings / running a command at startup

2023-04-17 Thread 'Dan' via qubes-users
On 4/17/23 07:21, Gabriel Philippe wrote: > "solved". Ugly, but works. Via a .desktop in ~/.config/autostart. The > trick was to not run xmodmap immediately, but to delay it: sleep 2; > xmodmap /home/user/... I have something similar, but how can I run something in dom0 every time sys-usb

Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-14 Thread 'unman' via qubes-users
On Fri, Apr 14, 2023 at 04:10:29PM +0200, qubes-li...@riseup.net wrote: > Hi uman, > > thanks for your reply. > > 'unman' via qubes-users: > > Exactly this issue arose on GitHub - it is, as you say, because you did > > not update the qubes repository definition in t

Re: [qubes-users] dependency problem after upgrading standalone debian 11 VM

2023-04-14 Thread 'unman' via qubes-users
Exactly this issue arose on GitHub - it is, as you say, because you did not update the qubes repository definition in timely way. You can read the issue [here](https://github.com/qubesos/qubes-issues/issues/7865) The resolution is to follow the steps in the upgrade script - courtesy of Marek:

[qubes-users] Good USB-C docking station?

2023-04-14 Thread nonsense via qubes-users
I'm desperate to find a good USB-C docking station that will work well with my Lenovo ThinkPad, >=2 screens (and QubesOS). The Lenovo one is terrible. On Qubes it never worked for 2 screens and has four a couple of months now jittery video via USB-C - if at all. It's not just me too... A

Re: [qubes-users] Kali Linux Purple - Defense

2023-04-05 Thread 'unman' via qubes-users
On Tue, Apr 04, 2023 at 10:11:19PM -0700, Foilsurf wrote: > Hello, > which of the out of the Box Defense features of the new *Kali Linux Purple*, > would be very nice to have also in *QubesOS *to raise the defense bar? (the > attacks also get every day harder...) > Kind Regards > I see that

[qubes-users] Successful Qubes install, now stuck with Freeplane install. Can you help me get started? Please?

2023-03-31 Thread charliesierra2 via qubes-users
Hi all, DEAR MODS: If I should have sent this to the wrong place, or if I should go about this in a different way, please do tell me. Doing my best in good faith, willing to learn. Qubes beginner here who feels like he's fairly good at flying a Cessna (Mint) and is now trying to fly a

Re: [qubes-users] How Qubes handles the start of services

2023-03-28 Thread 'unman' via qubes-users
On Mon, Mar 27, 2023 at 06:33:26PM +0200, r.wiesb...@web.de wrote: > Hi uman, > > that was the reference in qubes-doc that I found before and that I could > not find today when I was writing this email. However, it does not > explain what the advantage of this two-switch-model is compared to just

Re: [qubes-users] How Qubes handles the start of services

2023-03-27 Thread 'unman' via qubes-users
On Mon, Mar 27, 2023 at 03:48:15PM +0200, r.wiesb...@web.de wrote: > Hi there, > > every VM/qube has a "services" tab in its settings window. It seems like > Qubes is designed in a manner that requires two switches for a service: > it needs to be enabled in the template *and* requires an entry in

Re: [qubes-users] RAM budgeting techniques

2023-03-26 Thread tiesta_symonne61 via qubes-users
On Sun, March 26, 2023 22:07, Demi Marie Obenour wrote: > zram and zswap are potentially vulnerable to timing attacks, so I > recommend avoiding them. - -- I see! Let me scratch those off my list then -- You received this message because you are subscribed to the Google Groups "qubes-users"

[qubes-users] RAM budgeting techniques

2023-03-26 Thread tiesta_symonne61 via qubes-users
Is there anything I can do to get more qubes out of my RAM, besides trial and error with allocation values? I figure there's gotta be some daemon or other that I never use that's eating up RAM on every instance of fedora/debian for no good reason. Or perhaps some sort of swap optimization such as

Re: [qubes-users] Odd behavior wile running two separate Whonix gateways

2023-03-24 Thread 'unman' via qubes-users
On Fri, Mar 24, 2023 at 04:23:48AM +, tiesta_symonne61 via qubes-users wrote: > I have two Whonix gateways, the default sys-whonix and a sys-whonix-clone. > Both are attached to different net vm's. > > The problem is that all qubes that have sys-whonix-clone as its net vm > sh

Re: [qubes-users] 'qvm-copy' and 'qvm-copy-to-vm' in AppVM

2023-03-24 Thread 'unman' via qubes-users
qvm-copy-to-vm is deprecated and will be removed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this

[qubes-users] Odd behavior wile running two separate Whonix gateways

2023-03-24 Thread tiesta_symonne61 via qubes-users
I have two Whonix gateways, the default sys-whonix and a sys-whonix-clone. Both are attached to different net vm's. The problem is that all qubes that have sys-whonix-clone as its net vm show up under sys-whonix's tray icon, not sys-whonix-clone's. I'm pretty sure the actual traffic is being

[qubes-users] How do I get Snowflake proxy working in sys-whonix?

2023-03-20 Thread tiesta_symonne61 via qubes-users
I see there is a 'snowflake' proxy option in the Tor control panel, however it gets stuck at 0% and refuses to connect. I can't find any resources. Closest I found is this forum thread: https://forum.qubes-os.org/t/snowflake-proxy-causes-crash-in-tor-control-panel/12326 It's not the same issue,

[qubes-users] Dark theme in Dom

2023-03-19 Thread 'taran1s' via qubes-users
Hello everyone, I am trying to set up the dark theme in dom0. All working well but at the end it doesnt work. There are some errors popping up and I think this is the issue but duno how to solve that. [xxx@dom0 ~]$ sudo qubes-dom0-update qt5-qtstyleplugins Using sys-whonix-update as UpdateVM

  1   2   3   4   5   6   7   8   9   10   >