On Thu, May 02, 2024 at 02:44:09PM -, qubist wrote:
> That's secondary, but in case you are interested, mpv gives better playback:
>
> https://forum.qubes-os.org/t/improving-video-playback-speed/21906/8
It does not seem to play back better to me, as well at most, especially not
with the
I also tried an untouched version of debian 12 minimal with updates and only
mplayer added from apt.
There was no mimeapps.list file in /usr/share/applications, /etc/xdg/,
$HOME/.config or $HOME/.local/share/applications.
I tried xdg-mime default mplayer.desktop video/x-matroska as the non-root
> Trying to copy the file first and then 'xdg-open TEST.pdf' in the
> target VM, I get the same series of errors:
>
> $ xdg-open TEST.pdf
> xdg-mime: mimetype argument missing
> Try 'xdg-mime --help' for more information.
> /usr/bin/xdg-open: 882: x-www-browser: not found
> /usr/bin/xdg-open:
Hi, I've been trying to get a dvm to open media files in mplayer in a
disposable qube.
Starting the disposable media qube from dom0 with qvm-run --dispvm media-dvm
--service -- qubes.StartApp+st works.
Copying files(same as the ones used to test qvm-open-in-vm/qvm-open-in-dvm) to
the vm with
I have a simple question, around "things that you have" (like sec.
tokens, etc).
Many "fido tokens" (yubi, nitro, google) allow NFC communication, most
computers as well, but i do not find anything in my qubes (maybe the
chips acts as USB client and my USB is down by default?)
=> Is there a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Rusty Bird:
> Boryeu Mao:
> > An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning
> > about running processes in the qube; similarly on command line
> > `qvm-shutdown sys-firewall` fails with an error. Is it possible to
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Boryeu Mao:
> An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning
> about running processes in the qube; similarly on command line
> `qvm-shutdown sys-firewall` fails with an error. Is it possible to
> designate an appVM to
On 2024-03-26 23:05, 'జిందం వాఐి' via qubes-users wrote:
On 2024-03-26 22:18, Andrew David Wong wrote:
On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote:
As you can see, only Intel processors are listed. I'm not personally
aware of any changes since then, but when it comes to Qubes
On 2024-03-26 22:18, Andrew David Wong wrote:
On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote:
As you can see, only Intel processors are listed. I'm not personally
aware of any changes since then, but when it comes to Qubes-certified
hardware, you should always consult the vendor's
* i see an option to purchase
laptop for amd also on their
website
* is this certified with only
intel?
--
regards,
జిందం వాఐి [ jindam, vani ]
web_ jindam.neocities.org
[matrix]_ @jindam:oikei.net
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
Sorry, i discuss in the Qubes Communityfaster responses, better
systemthen google groups
Bapak Ireng schrieb am Montag, 25. März 2024 um 16:32:33 UTC+1:
> i tried sudo /usr/libexec/initial-setup/initial-setup-graphical
>
> and the following is the output / result:
>
>
>
>
> i tried to
i tried sudo /usr/libexec/initial-setup/initial-setup-graphical
and the following is the output / result:
i tried to sent pictures, but google did not let me sent them. Sh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
Hi, after successfully installing Qubes 4.2 i am left all alone to
configure network (internet) Access.
I appreciate it very much if somebody could guide me to the right options.
The question is so vague, no one can reasonably answer it.
Does sys-net start on boot?
Does it have access to
Hi, after successfully installing Qubes 4.2 i am left all alone to
configure network (internet) Access.
I appreciate it very much if somebody could guide me to the right options.
Best regards, Bapak Hitam
--
You received this message because you are subscribed to the Google Groups
It was not fixed...
Apparently just an example of how random it is.
It was working for an hour or so. Now it is back to mic not working, just
sending out that beep beep sound.
On Wed, Mar 20, 2024 at 9:16 AM 'Rune Philosof' via qubes-users <
qubes-users@googlegroups.com> wrote:
> I
Without seeing the screenshot, I think I know the issue.
They are from the same repository.
qvm-template lists *all* the template in the repo, whereas
qvm-template-gui filters to only show the most recent supported
versions.
--
I never presume to speak for the Qubes team.
When I comment in the
Installing a new template fixed it.
I installed fedora-39 and switched to it.
The old template had been upgraded in-place several times, back from
fedora-36, I think.
Maybe something is missing in the upgrade from 4.1 to 4.2, or in the
instructions on how to upgrade existing templates to 4.2.
Hi one7two99,
I have Qubes and Linux already installed in different partitions in legacy
mode and both work fine. Now I need to install windows 10 (to run Fusion
360 for personal use). I don't want to install it as a qube as my hardware
is not very powerful. I don't need Bitlocker. Could you
Suspend works
On Monday, March 4th, 2024 at 2:33 PM, 'bozoslivehere' via qubes-users
wrote:
> ---layout:
> 'hcl'
> type:
> 'Mini PC'
> hvm:
> 'yes'
> iommu:
> 'yes'
> slat:
> 'yes'
> tpm:
> '2.0'
> remap:
> 'yes'
> brand: |
> AZW
---layout:
'hcl'
type:
'Mini PC'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'2.0'
remap:
'yes'
brand: |
AZW
model: |
SER
bios: |
5800H603
cpu: |
AMD Ryzen 7 5800H with Radeon Graphics
cpu-short: |
FIXME
chipset: |
Advanced Micro Devices, Inc. [AMD] Renoir/Cezanne Root
[quote]
my sys-net is also sys-usb because I used the USB ethernet adapter so I
think this is the problem but I don't know how to fix.
[/quote]
I doubt that this is the problem.
Have you assigned the device to sys-net in the "devices" tab of sys-net
settings.
When sys-net boots up, can you run
After upgrading to 4.2 my audio device does not work.
I plug in a usb audio device, then attach that usb device to an appvm and
try to use it in e.g. meet.google.com.
For some reason it only works for the audio microphone or the speaker, not
both.
Example:
1. I attach the usb device to the
Hi,
since a recent update, thunderbird throws artefacts on xfce screen
(parts of its menu), that spawn virtual screen, survive log off & on
again, but disappear if VM is closed. And re-appear when thunderbird is
restarted. Very annoying! Am I alone with this type of glitch?
Thanks, best,
[quote="Ulrich_Windl1, post:8, topic:24602"]
I kind of disagree: When passing the URL as "$1", it is passed as one
single parameter. The user cannot be expected to know to how much more
levels of shell script the parameter will be passed to, so any deeper
layers have to keep the single
Just realized I sent this as "reply" instead of "reply all". Sorry for
the spam, Ulrich, but I want to make sure this is visible to others who
might have a similar problem.
I think the problem is that the URL doesn't end up getting quoted on the
other end. When this is sent:
On Thu, 22 Feb 2024 22:19:21 +0100
Ulrich Windl wrote:
>On 2/22/24 22:15, Ulrich Windl wrote:
>> On 2/22/24 21:54, 'Stuart Perkins' via qubes-users wrote:
>>>
>>> On Thu, 22 Feb 2024 21:25:18 +0100
>>> Ulrich Windl wrote:
>>>
>>>&
On Thu, 22 Feb 2024 21:25:18 +0100
Ulrich Windl wrote:
>Hi!
>
>
>I managed to configure Thunderbird to run any links via a DVM. However
>today I realized that URLs with parameters are truncated (Qubes-OS 4.2)
>after the first parameter it seem.
>
>For example I have the URL
I have for years done my development work using dedicated AppVMs that run
podman (https://podman.io/) containers based on images from bioconductor
(https://bioconductor.org/help/docker/) for project isolation and
reproducibility - images are pushed on a per project basis into the registry of
Hi
Am Sa., 17. Feb. 2024 um 08:10 Uhr schrieb 'haaber' via
qubes-users :
Hi
> I tried to upgrade my Qubes OS system from 4.1.2 to 4.2.0
using the
> "qubes-dist-upgrade" script.
...
>
OK, I am not an expert on
Hi
I tried to upgrade my Qubes OS system from 4.1.2 to 4.2.0 using the
"qubes-dist-upgrade" script.
The upgrade failed - and - now the system is in a 'weird' state.
None of the Fedora- or Debian-based VM have 'external / public'
network access anymore.
The 'anon-whonix' VM however still does
On Friday, February 16th, 2024 at 6:32 PM, Ulrich Windl
wrote:
>
>
> Hi!
>
>
> I saw these messages when upading fedora-38 today. I didn't run QuebesOS
> for a while, so there were a lot of updates, but "runaway fork()"
> worries me a bit...
I've seen these messages too, during
Dear unman & qubes -community,
I am still on Q4.1 (no time to do a full install now). Since a few days,
my time ran large out of sync, despite the swdate displaying normal
functioning. I rebooted, I restarted swdate. Its log says:
[INFO] date output: 10:44:44
(which is London time, but
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Boryeu Mao:
> > For R4.1.2 I had some RPC calls with + and - characters in the file
> > name. These are considered as invalid characters to be part of service
> > names in the new qrexec policy format (e.g. in
> >
Hi Unman
I reply inline below.
On 2/6/24 11:45, 'haaber' via qubes-users wrote:
Hi,
I am still on Q4.1 (no time to do a full install now). Since a few days,
my time ran large out of sync, despite the swdate displaying normal
functioning. I rebooted, I restarted swdate. Its log says
On Tue, Feb 06, 2024 at 01:08:09PM +0100, 'haaber' via qubes-users wrote:
> addendum: if I run "date" in a client VM it will give the right
> timezone, but still has 3min of delay..
>
> On 2/6/24 11:45, 'haaber' via qubes-users wrote:
> > Hi,
> >
> >
addendum: if I run "date" in a client VM it will give the right
timezone, but still has 3min of delay..
On 2/6/24 11:45, 'haaber' via qubes-users wrote:
Hi,
I am still on Q4.1 (no time to do a full install now). Since a few days,
my time ran large out of sync, despite the swdate
Hi,
I am still on Q4.1 (no time to do a full install now). Since a few days,
my time ran large out of sync, despite the swdate displaying normal
functioning. I rebooted, I restarted swdate. Its log says:
[INFO] date output: 10:44:44
(which is London time, but otherwise correct), my
Hi,
HCL:
---
layout:
'hcl'
type:
'Desktop'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'no'
remap:
'yes'
brand: |
Purism
model: |
librem_mini_v2
bios: |
PureBoot-Release-20
cpu: |
Intel(R) Core(TM) i7-10510U CPU @ 1.80GHz
cpu-short: |
FIXME
chipset: |
Intel Corporation Comet Lake-U v1 4c Host
Can a librem key or yubikey be used to unlock a LUKS filesystem at boot in 4.2?
Wasn’t the issue previously related to dom0 being too old?
Thanks
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
---
layout:
'hcl'
type:
'Notebook'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'2.0'
remap:
'yes'
brand: |
ASUSTeK COMPUTER INC.
model: |
ASUS EXPERTBOOK B9400CEA_B9400CEA
bios: |
B9400CEA.311
cpu: |
11th Gen Intel(R) Core(TM) i7-1165G7 @ 2.80GHz
cpu-short: |
FIXME
chipset: |
ere? how can I make vpn leak-proof again with Qubes 4.2?
On 1/7/24 22:49, r.wiesbach via qubes-users wrote:
Hi,
The forum post does not use qubes-tunnel and I do not use wireguard
(but openVPN) - so I do not see how this post solves my issue?!
On 1/6/24 12:06, code9n wrote:
Hi,
This is on
Hi,
The forum post does not use qubes-tunnel and I do not use wireguard (but
openVPN) - so I do not see how this post solves my issue?!
On 1/6/24 12:06, code9n wrote:
Hi,
This is on the Forum:
https://forum.qubes-os.org/t/wireguard-vpn-setup/19141
cheers,
On Saturday 6 January 2024 at
Hi there,
vpnVM and netVM both in-place upgrades from Q4.1 (and worked fine
there). Template is fedora 38.
NetVM is online, ping of vpn server hostname is fine within netVM.
Ping and dig do not work within vpnVM, but afair that is intended (leak
prevention of qubes-tunnel)
I tried to restart
Major issue is that the touchpad does not work.Suspend/wake does work fine.Have not tested much beyond the above.Thanks.
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
Most features works flawlessly.
I did not test suspend / sleep.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view
I actually had a similar issue. It ended up being a BIOS that refused to
detect rc3 is ISO format. Mounting the ISO and copying the files over to
a FAT formatted USB got around the boot issue but the qubes installer
doesn't see it's root partition then.
The working solution was to insert both
Works out of the box:
- networking (usb2lan)
- keyboard backlight
- build-in bluetooth
- sound
Works after tweaking:
- sceen is flickering unless adding "i915.enable_psr=0" in
/boot/efi/EFI/qubes/xen.cfg, more details:
Hi guys,
I recently tried to switch from i3lock to slock, but when I run 'sudo ./slock'
(it needs suid/sgid) I get this error:
slock: crypt: Invalid argument
I installed libxcrypt-compat, which slock needed.
It's supposed to be compatible with libcrypt(not found).
journalctl -f only shows
---
layout:
'hcl'
type:
'notebook'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'unknown'
remap:
'yes'
brand: |
HP
model: |
HP ZBook 17 G4
bios: |
P70 Ver. 01.44
cpu: |
Intel(R) Core(TM) i7-7820HQ CPU @ 2.90GHz
cpu-short: |
FIXME
chipset: |
Intel Corporation Xeon E3-1200 v6/7th Gen Core Processor Host
On Fri, Sep 08, 2023 at 08:10:44AM +0200, haaber wrote:
> I tried to configure split-ssh according to the tutorial on qubes pages,
> in its simple version (just agent, but no keepass integration). But now
> ssh offers *all* my private keys to *all* servers, which is odd, but
> more annoying, it
On Thu, Aug 24, 2023 at 11:26:30AM +0200, lik...@gmx.de wrote:
> Hi!
>
> Running grains['os'] in a target returns always "Fedora" and grains['id']
> returns "dom0". For this reason I cannot branch in my state files for
> different os templates.
> Executing this test in such a targeted
, 2:02 PM, 'Gandalfen' via qubes-users - qubes-users at
googlegroups.com wrote:
> ---
> layout:
> 'hcl'
> type:
> 'notebook'
> hvm:
> 'yes'
> iommu:
> 'yes'
> slat:
> 'yes'
> tpm:
> 'unknown'
> remap:
> 'yes'
> brand: |
> ASUSTeK COMPUTER INC.
>
---
layout:
'hcl'
type:
'notebook'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'unknown'
remap:
'yes'
brand: |
ASUSTeK COMPUTER INC.
model: |
Vivobook_ASUSLaptop X1503ZA_X1503ZA
bios: |
X1503ZA.305
cpu: |
12th Gen Intel(R) Core(TM) i7-12700H
cpu-short: |
Intel i7-12700H
chipset: |
Intel Corporation
On Thu, 2023-08-10 at 21:36 +, 51li...@ileg.al wrote:
> Its interesting, since my amd legion is testing machine, i never use
> sys-usb, and yeah i found that usb passthrough lead system to reboot.
> can you provide a more detail about step by step what have you done ?
>
At install time
On Wed, 2023-08-09 at 20:53 +0100, Edwin Török wrote:
> On Mon, 2023-08-07 at 21:45 +0100, 'Edwin Török' via qubes-users
> wrote:
> >
> > Must NOT use a USB qube. Using a USB qube results in an
> > instant
> > host reboot as soon as the USB qube is booted
On Mon, 2023-08-07 at 21:45 +0100, 'Edwin Török' via qubes-users wrote:
>
> Must NOT use a USB qube. Using a USB qube results in an instant
> host reboot as soon as the USB qube is booted (same issue happen on
> KVM
> when attempting to pass through any USB c
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Address sizes: 48 bits physical, 48 bits virtual
Byte Order: Little Endian
CPU(s): 32
On-line CPU(s) list: 0-31
Vendor ID: AuthenticAMD
Model name: AMD
In my desktop Qubes system the mainboard died. So I bought a new one.
Unfortunately I didn't make a backup for some days.
After building the new hardware system my Qubes installation from the old ssd
doesn't start there.
(Somehow the system freezes or at least the keyboard is being switched off
On Fri, Jun 30, 2023 at 12:27:41PM +0200, haaber wrote:
> Hi I was wondering if it would not me preferable (at least in some VM's)
> to delocalise the QubesIncoming folder in /tmp to have it "cleaned up"
> regularly. It's a pain to do so manually. Is there a problem doing so ?
> What would be the
On 21/06/2023 11:49, haaber wrote:
>> We observe that the file /run/user/1000/openssh_agent is different
>> from/home/user/.SSH_AGENT_sshkeys. That may be a problem.
Running the following command in the work qube should work:
SSH_AUTH_SOCK=/home/user/.SSH_AGENT_vault ssh-add -L
You
On Tue, Jun 06, 2023 at 01:24:18PM -0500, Leo28C wrote:
> I managed to set up a pi-hole qube and make it my network's DNS
> filtering/caching server. Ironically, it works flawlessly across my network
> EXCEPT it completely breaks DNS for all other qubes in the same system. On
> Debian-based qubes
After more than a week of intensive use, I haven't noticed any problems so far.
The "cirrus7 nimbini v3" (or presumably all NUC12WSHv5) seemed to be suitable
hardware for anyone who wants to use QubesOS as a desktop system.
Do I still have to submit something to be included in the HCl or do
Here is my HCL report for the motherboard MSI MEG x670e ACE.
Booting even the installer works only with the x2apic=false flag set in
both xen and linux lines in grub. Automatic creation of networking related
qubes (sys-firewall and sys-net) during first configuration after install
crashes the pc.
--- Original Message ---
On Friday, May 26th, 2023 at 4:24 AM, 'Stuart Perkins' via qubes-users
wrote:
> Bottom post is the standard on this list. See my response at the bottom... :)
>
> On Thu, 25 May 2023 19:02:23 +
> "'sonnenfinsternis' via qubes-u
Bottom post is the standard on this list. See my response at the bottom... :)
On Thu, 25 May 2023 19:02:23 +
"'sonnenfinsternis' via qubes-users" wrote:
>Sounds helpful, I'll try it when I get a chance, thanks :) After reading this
>[1], I can now even use my USB mous
Sounds helpful, I'll try it when I get a chance, thanks :) After reading this
[1], I can now even use my USB mouse directly after booting, without having to
assign it to dom0 first. So slowly but surely I'm warming up to QubesOS. A
wonderful system :) Now if I can just find a way to see how
I forgot to attach the yml file. Sorry!
--- Original Message ---
On Wednesday, May 24th, 2023 at 11:51 PM, sonnenfinsternis
wrote:
> Here's my review of the cirrus7 nimbini v3, which is largely based on the
> Intel NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs
>
Here's my review of the cirrus7 nimbini v3, which is largely based on the Intel
NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs great. Most
importantly, it is a dream to work on a fanless computer that still runs
completely silent under heavy load despite various Qubes
Thanks for quickly adding my data to the list :-)
--- Original Message ---
On Thursday, May 11th, 2023 at 2:32 AM, Sven Semmler
wrote:
> Thank you Eichennarr for your HCL report, which is online now!
>
> /Sven
>
> --
>
is
not pre-installed by default in Debian. But this can be easily fixed:
https://unix.stackexchange.com/questions/312456/debian-apt-not-apt-get-autocompletion-not-working
Best regards :)
--- Original Message ---
On Tuesday, May 9th, 2023 at 7:57 PM, 'Kamil Aronowski' via qubes-users
Demi Marie Obenour:
On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote:
Andrew David Wong:
On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote:
If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix
it doesn't connect to internet. If one
Andrew David Wong:
On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote:
If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix
it doesn't connect to internet. If one uses Debian or Fedora based AppVM and
runs vanilla Firefox, it works like a breeze.
Any ideas how
On Thu, 11 May 2023 15:20:17 -0700
Andrew David Wong wrote:
>Dear Qubes Community,
>
>The Fedora Project has
>[announced](https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/)
> that Fedora 36 will reach EOL
or Fedora
based AppVM and runs vanilla Firefox, it works like a breeze.
Any ideas how to solve this?
Leo28C:
I followed this guide: https://micahflee.com/2019/11/using-mullvad-in-qubes/
(works with others too not just Mullvad)
On Wed, May 10, 2023 at 9:51 AM 'taran1s' via qubes-users <
qubes-us
Hi,
What is the best practice for setting up a VPN proxy in Qubes these days
(for Mullvad, VPN over Tor)?
I found two versions for setup of VPN proxy in Qubes:
The first one is from tasket called Qubes-vpn-support. The last version
is dated Dec 2020:
Hi there :)
I've only been using QubesOS for two weeks and so far I'm totally thrilled!
Thanks to all who contribute to this wonderful project :-)
But there are a few questions that I have not been able to clarify online or
with friends, so I would like to try here:
1) Is there somewhere in
Here is my report on the TUXEDO InfinityBook S 15 Gen7. Great laptop, but
honestly it is quite annoying in the long run that the fan blows so loud when
you work in many Qubes in parallel :-(
Greetings!
Eichennarr
---
layout:
'hcl'
type:
'notebook'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
On Thu, May 04, 2023 at 05:01:38AM -0700, Andrew David Wong wrote:
> On 5/3/23 4:02 AM, Qubes wrote:
> > I have noticed on Fedora, the cli prompt itself is not colourful although
> > the rest of the output is. Is there a way to get the prompt itself in
> > colour as well? The prompt on Debian is
On Wed, May 03, 2023 at 04:19:00PM +, Qubes wrote:
> > 'unman' via qubes-users wrote:
> > On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote:
> >
> > > Is there a sane way to update existing `*.conf` files on VMs that are
> > > already running?
> >
On Wed, May 03, 2023 at 12:53:00PM +, Qubes wrote:
> Is there a sane way to update existing `*.conf` files on VMs that are
> already running?
> Is there a not-so-labour-intensive way to solve this problem?
Use salt - it's easy to apply to existing qubes, as well as template.
You can (if you
On Fri, Apr 28, 2023 at 11:58:55AM -0700, Jeremy Hansen wrote:
> I would like to configure Qubes to do its updates via a connection to a
> wireguard service I have set up.
>
> I understand how to set up a wireguard enabled template and a qubes based on
> that template following this:
>
>
On Sat, Apr 29, 2023 at 04:53:10PM +0800, Sandy Harris wrote:
[quote]
Is there a template to make a qube that just runs as an X terminal?
[/quote]
Have you tried a minimal template?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
On Tue, Apr 25, 2023 at 08:19:48AM +0200, haaber wrote:
> Dear all,
>
> I had a lethally bad hardware failure on computer. Since I had to buy a
> new machine this took a while, now I try to save some data: the old SSD
> is attached to a brand-new qubes via usb adapter. I started
>
> sudo pvscan
On Thu, Apr 20, 2023 at 11:29:08AM +, Rusty Bird wrote:
[quote]
'host' isn't suitable for testing this, because it never looks at the
[/quote]
Right - neither are most of the *other* DNS utilities - ping should do.
Or `getent hosts ...`
--
You received this message because you are subscribed
On Wed, Apr 19, 2023 at 07:06:19AM -0700, john.e...@gmail.com wrote:
> I haven't been able to figure out how I can modify /etc/hosts in a dispVM
> so that my entry (such as 10.1.1.1 myhost.example.commyhost) will be
> used instead of DNS.
>
> I'm trying to direct my traffic to a different
On 4/17/23 07:21, Gabriel Philippe wrote:
> "solved". Ugly, but works. Via a .desktop in ~/.config/autostart. The
> trick was to not run xmodmap immediately, but to delay it: sleep 2;
> xmodmap /home/user/...
I have something similar, but how can I run something in dom0 every time
sys-usb
On Fri, Apr 14, 2023 at 04:10:29PM +0200, qubes-li...@riseup.net wrote:
> Hi uman,
>
> thanks for your reply.
>
> 'unman' via qubes-users:
> > Exactly this issue arose on GitHub - it is, as you say, because you did
> > not update the qubes repository definition in t
Exactly this issue arose on GitHub - it is, as you say, because you did
not update the qubes repository definition in timely way.
You can read the issue
[here](https://github.com/qubesos/qubes-issues/issues/7865)
The resolution is to follow the steps in the upgrade script - courtesy
of Marek:
I'm desperate to find a good USB-C docking station that will work well with my
Lenovo ThinkPad, >=2 screens (and QubesOS).
The Lenovo one is terrible. On Qubes it never worked for 2 screens and has four
a couple of months now jittery video via USB-C - if at all.
It's not just me too... A
On Tue, Apr 04, 2023 at 10:11:19PM -0700, Foilsurf wrote:
> Hello,
> which of the out of the Box Defense features of the new *Kali Linux Purple*,
> would be very nice to have also in *QubesOS *to raise the defense bar? (the
> attacks also get every day harder...)
> Kind Regards
>
I see that
Hi all,
DEAR MODS: If I should have sent this to the wrong place, or if I should go
about this in a different way, please do tell me. Doing my best in good faith,
willing to learn.
Qubes beginner here who feels like he's fairly good at flying a Cessna (Mint)
and is now trying to fly a
On Mon, Mar 27, 2023 at 06:33:26PM +0200, r.wiesb...@web.de wrote:
> Hi uman,
>
> that was the reference in qubes-doc that I found before and that I could
> not find today when I was writing this email. However, it does not
> explain what the advantage of this two-switch-model is compared to just
On Mon, Mar 27, 2023 at 03:48:15PM +0200, r.wiesb...@web.de wrote:
> Hi there,
>
> every VM/qube has a "services" tab in its settings window. It seems like
> Qubes is designed in a manner that requires two switches for a service:
> it needs to be enabled in the template *and* requires an entry in
On Sun, March 26, 2023 22:07, Demi Marie Obenour wrote:
> zram and zswap are potentially vulnerable to timing attacks, so I
> recommend avoiding them. - --
I see! Let me scratch those off my list then
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
Is there anything I can do to get more qubes out of my RAM, besides trial
and error with allocation values? I figure there's gotta be some daemon or
other that I never use that's eating up RAM on every instance of
fedora/debian for no good reason. Or perhaps some sort of swap
optimization such as
On Fri, Mar 24, 2023 at 04:23:48AM +, tiesta_symonne61 via qubes-users
wrote:
> I have two Whonix gateways, the default sys-whonix and a sys-whonix-clone.
> Both are attached to different net vm's.
>
> The problem is that all qubes that have sys-whonix-clone as its net vm
> sh
qvm-copy-to-vm is deprecated and will be removed.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this
I have two Whonix gateways, the default sys-whonix and a sys-whonix-clone.
Both are attached to different net vm's.
The problem is that all qubes that have sys-whonix-clone as its net vm
show up under sys-whonix's tray icon, not sys-whonix-clone's. I'm pretty
sure the actual traffic is being
I see there is a 'snowflake' proxy option in the Tor control panel,
however it gets stuck at 0% and refuses to connect. I can't find any
resources. Closest I found is this forum thread:
https://forum.qubes-os.org/t/snowflake-proxy-causes-crash-in-tor-control-panel/12326
It's not the same issue,
Hello everyone, I am trying to set up the dark theme in dom0. All
working well but at the end it doesnt work. There are some errors
popping up and I think this is the issue but duno how to solve that.
[xxx@dom0 ~]$ sudo qubes-dom0-update qt5-qtstyleplugins
Using sys-whonix-update as UpdateVM
1 - 100 of 4020 matches
Mail list logo