[qubes-users] Re: Discourse site stuck in read-only mode

2021-02-03 Thread 54th Parallel
The problem resolved itself. I looked around and it seems like the site is put in read-only mode when Discourse does maintenance. On Thursday, 4 February 2021 at 11:07:15 UTC+8 54th Parallel wrote: > I noticed that the Discourse site is stuck in read-only mode. I tried > logging out, bu

[qubes-users] Discourse site stuck in read-only mode

2021-02-03 Thread 54th Parallel
I noticed that the Discourse site is stuck in read-only mode. I tried logging out, but it's not letting me, citing read-only mode. Anyone else having the same issue? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this

[qubes-users] Re: Current state of Wireguard and Qubes

2020-12-02 Thread 54th Parallel
On Wednesday, 2 December 2020 at 05:01:10 UTC+8 evado...@gmail.com wrote: > looks like not it's at buster-backports... > Enable the testing repo by modifyting `/etc/apt/sources.list` in the TemplateVM and adding `deb https://deb.debian.org/debian testing main`. Don't forget to set your default

[qubes-users] Re: Current state of Wireguard and Qubes

2020-12-01 Thread 54th Parallel
On Tuesday, 1 December 2020 at 16:44:31 UTC+8 evado...@gmail.com wrote: > New 5.4 kernel announced support Wireguard? Can I install it and them > create fedora AppVM with wireguard? > > Or what is the better way now to install wireguard appvm? Only the way to > go with Debian 10? > > Thanks >

[qubes-users] Re: QSB #060: Multiple Xen issues (XSA-345, XSA-346, XSA-347)

2020-10-22 Thread 54th Parallel
> > XSA-346, XSA-457: A malicious domain with a PCI device (e.g., sys-net or > sys-usb in the default configuration) could try to exploit this > vulnerability in order to crash the host. > Just wanted to point out that there's a very minor typo here ('XSA-457'). Also, since the last QSB was

Re: [qubes-users] Grsecurity+Debian 10 has issues when PCI devices are being attached

2020-10-10 Thread 54th Parallel
On Friday, 9 October 2020 at 18:07:56 UTC+8 drw...@gmail.com wrote: > I should've been a bit more clear but yes by PVH I meant virt_mode == hvm. > > On Friday, October 9, 2020 at 3:18:35 AM UTC+2 Jarrah wrote: > >> >> > I've been trying to get a Debian 10 sys-net running with grsecurity as >> a

[qubes-users] Re: Xen ported to Rasberry Pi 4

2020-09-30 Thread 54th Parallel
On Wednesday, 30 September 2020 at 14:05:20 UTC+8 sandyi...@gmail.com wrote: > (from Slashdot) > https://www.theregister.com/2020/09/29/xen_on_rpi_4/ > *Salivates over the prospect of ARM Qubes* -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Re: Announcement: New community forum for Qubes OS users!

2020-09-18 Thread 54th Parallel
On Tuesday, 15 September 2020 at 01:13:13 UTC+8 m.fernande...@gmail.com wrote: > The cloud-based aspect of Chromebooks means that in those situations where > you don't consider you have much local on-site security, you can gain extra > security by keeping things in the cloud, and using cloud

Re: [qubes-users] Re: Announcement: New community forum for Qubes OS users!

2020-08-26 Thread 54th Parallel
On Wednesday, 26 August 2020 at 10:52:47 UTC+8 sv...@svensemmler.org wrote: > Here are my thoughts: security is on a spectrum, here are two extremes: > > a) > - - completely offline > - - in a locked room at a secure location > - - completely shielded > - - I never leave that room > > b) >

Re: [qubes-users] sys-firewall based on debian-10-minimal not recognized

2020-08-25 Thread 54th Parallel
On Wednesday, 26 August 2020 at 11:00:36 UTC+8 sv...@svensemmler.org wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 8/22/20 10:10 AM, unman wrote: > > To deal with the question here, I use debian minimal templates > > extensively, (NOT with qubes-vm-hardening), and have

[qubes-users] Re: Fwd: Audio not working: "snd_hda_intel: No response from codec, resetting bus"

2020-08-24 Thread 54th Parallel
On Monday, 27 July 2020 at 23:52:20 UTC+8 fiftyfour...@gmail.com wrote: > > Hi Claudia, > > I'm suffering from the same problem as you, and 'dmesg | grep -i > snd_hda_intel' brought me to this thread. > > My sound was originally working fine after I updated dom0 and domus > (tested via

[qubes-users] Re: Unable to installes mirage-firewall: this version of runc doesn't work on cgroups v2

2020-08-22 Thread 54th Parallel
On Sunday, 23 August 2020 at 07:51:11 UTC+8 one7...@gmail.com wrote: > Hello, > > I'm trying to install mirage-fw with a Fedora-32 Build-AppVM and run into > the following error: > > OCI runtime create failed: this version of runc doesn't work on cgroups > v2: unknown > [...] > Any ideas how

Re: [qubes-users] sys-firewall based on debian-10-minimal not recognized

2020-08-22 Thread 54th Parallel
On Saturday, 22 August 2020 at 18:57:22 UTC+8 Frank Schäckermann wrote: > I am not sure what you mean with „behind a vpn vm“. > > My setup is such that I have the sys-net VM which is used as network vm in > sys-firewall and a few sys-vpn-xxx. sys-firewall in turn is used as network > vm for all

Re: [qubes-users] Re: Announcement: New community forum for Qubes OS users!

2020-08-22 Thread 54th Parallel
On Saturday, 22 August 2020 at 17:37:24 UTC+8 Qubes wrote: > > Yes a big difference, but the two are intertwined in ways that it is > impossible to separate them. If you believe an operating system from > Google, Microsoft, Apple, or any other tech giant, provides > "near-absolute" security I

Re: [qubes-users] sys-firewall based on debian-10-minimal not recognized

2020-08-22 Thread 54th Parallel
On Friday, 21 August 2020 at 16:58:48 UTC+8 54th Parallel wrote: > I'm having the same issue with disposable firewalls built on > debian-10-minimal, with the minimum amount of packages, on > brand-spanking-new installations (plural) being unreliable firewalls. They > someti

Re: [qubes-users] Re: Announcement: New community forum for Qubes OS users!

2020-08-21 Thread 54th Parallel
On Saturday, 22 August 2020 at 01:35:05 UTC+8 Qubes wrote: > > If you configure Firefox and uMatrix properly you should see less of > these funnies creep up. Have a look at this guide, > >

Re: [qubes-users] Re: Announcement: New community forum for Qubes OS users!

2020-08-21 Thread 54th Parallel
On Friday, 21 August 2020 at 23:35:05 UTC+8 deeplow wrote: > It's working just fine for me (also tried it in chromium version > 83.0.4103.116). Does it work for you in other browsers? > Working fine on Firefox and Tor Browser, but not Chrome 84.0.4147 on Chrome OS (yes, I'm a dirty Google

[qubes-users] Re: Announcement: New community forum for Qubes OS users!

2020-08-21 Thread 54th Parallel
On Friday, 21 August 2020 at 01:21:11 UTC+8 a...@qubes-os.org wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Dear Qubes community, > > We're pleased to announce the launch of a new forum for Qubes OS users: > > https://qubes-os.discourse.group > Not sure if I'm the only

Re: [qubes-users] KDE high dom0 CPU usage

2020-08-21 Thread 54th Parallel
On Thursday, 20 August 2020 at 20:08:10 UTC+8 donoban wrote: > Maybe your problem is Opengl not being hardware accelerated. Try > switching to XRender under System Settings -> Display and Monitor -> > Compositor -> Rendering backend > KDE was already uninstalled when you posted this so I

Re: [qubes-users] sys-firewall based on debian-10-minimal not recognized

2020-08-21 Thread 54th Parallel
On Tuesday, 11 February 2020 at 00:56:07 UTC+8 awokd wrote: > > Systemctl in sys-firewall tells me qubes-firewall.service is "loaded > active running", if that helps. > > -- > - don't top post > Mailing list etiquette: > - trim quoted reply to only relevant portions > - when possible, copy

[qubes-users] Re: Announcement: New community forum for Qubes OS users!

2020-08-20 Thread 54th Parallel
On Friday, 21 August 2020 at 01:21:11 UTC+8 a...@qubes-os.org wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Dear Qubes community, > > We're pleased to announce the launch of a new forum for Qubes OS users: > > https://qubes-os.discourse.group > > This is an official user

Re: [qubes-users] KDE high dom0 CPU usage

2020-08-20 Thread 54th Parallel
On Thursday, 20 August 2020 at 13:25:49 UTC+8 Chris Laprise wrote: > On 8/20/20 12:29 AM, 54th Parallel wrote: > > I switch off any nvidia gpus before installation. The company is > anti-open source and I'm not interested in running drivers that are the > result of

Re: [qubes-users] KDE high dom0 CPU usage

2020-08-19 Thread 54th Parallel
On Thursday, 20 August 2020 at 06:58:35 UTC+8 Chris Laprise wrote: > Not an issue with dom0 KDE here. But I did have this problem with > k/ubuntu on my new AMD Ryzen Thinkpad... graphics driver was not working > and defaulted to a non-accelerated framebuffer mode. In this case I had > to

[qubes-users] KDE high dom0 CPU usage

2020-08-19 Thread 54th Parallel
Quick question: I decided to try out KDE on 4.0 and was liking it until I noticed the low overall framerate and the high CPU usage of dom0 shown in xentop whenever there's motion (like dragging windows around). Since I'm using an i7-1065G7, power shouldn't be an issue, so I was surprised. Is

Re: [qubes-users] How would you remotely infiltrate a default Qubes OS?

2020-08-18 Thread 54th Parallel
On Wednesday, 19 August 2020 at 00:15:08 UTC+8 Robert Spigler wrote: > This is the real solution for the Intel problem :) > > https://github.com/QubesOS/qubes-issues/issues/4318 > > I believe IBM stated they also have protections against the Rowhammer > attacks > I'm all for having Qubes on

Re: [EXT] Re: [qubes-users] Google requiring login to access qubes-users

2020-08-18 Thread 54th Parallel
Andrew wrote: >We're actually working on an announcement about this right now. Stay tuned! I see you're very much on top of things. Looking forward to it! On Tuesday, 18 August 2020 at 21:14:07 UTC+8 awokd wrote: > > I imagine China's policy requiring real ID to use the Internet has > Google

Re: [qubes-users] Unable to create set templates as disposable vm templates

2020-08-17 Thread 54th Parallel
On Monday, 17 August 2020 at 05:11:16 UTC+8 Ari wrote: > find templates that fit best with your vm and that u know well, dont look > for templates on the black market and have low ratings > Am I missing something, or is there a sketchy unofficial source for templates with ratings somewhere?

Re: [EXT] Re: [qubes-users] Google requiring login to access qubes-users

2020-08-17 Thread 54th Parallel
On Monday, 17 August 2020 at 08:38:20 UTC+8 Chris Laprise wrote: > The mail-archive site doesn't come up prominently in searches and I even > forgot it existed, but thanks for the reminder. > > The list remains in peoples' minds as being a "Google group" so they are > likely to gravitate

Re: [qubes-users] Qubes dom0-update-guard script

2020-08-17 Thread 54th Parallel
of sys-whonix as the dom0 update VM instead of writing a separate script to be run after the fact. On Friday, 14 August 2020 at 22:38:33 UTC+8 54th Parallel wrote: > On Friday, 14 August 2020 at 19:24:11 UTC+8 disrupt_the_flow wrote: > >> I am so confused. Please explain what yo

Re: [qubes-users] How would you remotely infiltrate a default Qubes OS?

2020-08-15 Thread 54th Parallel
On Sunday, 16 August 2020 at 01:14:08 UTC+8 Chris Laprise wrote: > I'm not going to get into details now, but the short story is Intel > haven't addressed all the sidechannel vulnerabilities, and the long and > varied trend of Intel vulns points to a fundamentally flawed > implementation...

Re: [qubes-users] How would you remotely infiltrate a default Qubes OS?

2020-08-15 Thread 54th Parallel
On Saturday, 15 August 2020 at 14:39:32 UTC+8 a...@qubes-os.org wrote: > > Then don't use it! :) > With the new look that makes it so much harder to use (top posting is default now) and replying to multiple people in a single post is a pain, so I just might give Thunderbird or Mutt a try.

Re: [qubes-users] Qubes dom0-update-guard script

2020-08-14 Thread 54th Parallel
On Friday, 14 August 2020 at 19:24:11 UTC+8 disrupt_the_flow wrote: > I am so confused. Please explain what you want to do, but no like in a > pseudo-script method. > The thread above contains all the pertinent information--if you're using Google Groups, try 'expanding all' and reading through

Re: [qubes-users] Qubes dom0-update-guard script

2020-08-14 Thread 54th Parallel
How does this look? *Outline of qubes-dom0-update-guard* *Usage: Use in conjunction with manual dom0 update* *sudo qubes-dom0-update -y && qubes-dom0-update-guard* Prompt 1: "Please enter the name of a clean VM with access to Tor (e.g. anon-whonix): " Check if entered name is a VM

Re: [qubes-users] How would you remotely infiltrate a default Qubes OS?

2020-08-13 Thread 54th Parallel
> Since the lions' share of Qubes installs are Intel based, I think a > side-channel attack would be the most likely way to breach a Qubes > system. I thought Spectre and Meltdown have been dealt with by shutting off hyperthreading and updating microcode? Also, the latest CPUs have Spectre