files to compile
the nvidia driver. Anyone know where I can get these files?
Thanks!
Yes, its fedora 25.
A simpler route is to use integrated Intel/AMD graphics which are better
supported. It won't make a difference as far as speed goes.
--
Chris Laprise, tas...@posteo.net
https
he CentOS 7 "testing" template? I'm so over Fedora, but
need dnf for full compatibility with qubes-dom0-update.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this mess
2, before running install?
Also, what is the difference between the old style and the new style men?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
.
-
Also should mention that my new (very fast!) incremental backup tool
will be having its final alpha release probably in the next few days...
https://github.com/tasket/sparsebak/tree/new3
** Happy Holidays to everyone on this last day of Autumn! **
--
Chris Laprise, tas...@posteo.net
info:
https://www.whonix.org/wiki/Tor_Browser#tb-updater_postinst
I also have an issue about the curl status display. It seems to be
configured to ignore the TERM environment so when its in a qvm-run
session it scrolls tons of un-escaped characters which is annoying.
--
Chris Laprise, tas
. As the instructions suggest, you need to run:
cd /rw/config/vpn
sudo ln -s France.ovpn vpn-client.conf
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
TemplateVM
- Debian 9 TemplateVM
- Whonix 14 Gateway and Workstation TemplateVMs
- Linux kernel 4.14
The latest update has made my VMs start noticeably faster. I'm liking it. :D
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E
of the
Qubes VPN doc:
https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
This way you can use Network Manager documentation for additional
guidance in the GUI, or use any specific steps NordVPN has created for
Network Manager.
--
Chris Laprise, tas
On 12/16/2018 08:54 AM, Roy Bernat wrote:
On Sunday, 16 December 2018 08:50:32 UTC-5, Chris Laprise wrote:
You could look at 'sudo dnf history' in dom0 to identify the last
update, then roll back to the prior one:
sudo dnf rollback
So if the update that caused the problem is transaction 150
You could look at 'sudo dnf history' in dom0 to identify the last
update, then roll back to the prior one:
sudo dnf rollback
So if the update that caused the problem is transaction 150, specify 149
on the command line.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
-prompt
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
On 12/13/2018 02:31 PM, 799 wrote:
Hello Chris,
On Wed, 12 Dec 2018 at 22:52, Chris Laprise <mailto:tas...@posteo.net>> wrote:
But here's how you could start the loop:
qvm-ls --running -O name | (read line; while read line; do qvm-run -p
$line 'your vm command goes he
ight be a problem, especially \n
Maybe the pipe symbol | and ampersand & too.
Mike.
Yes, I would try typing the password with the backslashes doubled; might
work.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1
On 12/12/2018 04:01 PM, 799 wrote:
Hello,
Am Sa., 1. Dez. 2018, 05:12 hat Chris Laprise <mailto:tas...@posteo.net>> geschrieben:
Linux tends allocate whatever amount of RAM is given to it, even if
that
memory isn't put to use.
The only real negative to reducing
On 12/07/2018 08:03 AM, unman wrote:
On Fri, Dec 07, 2018 at 01:45:14AM -0800, blupunk...@gmail.com wrote:
interesting read chris. lowering the mtu to 1325 works. thanks. the wan
connection is a vpn on router I was trying. this explains the sudden
malfunction. that vpn config had a mtu 1500
) and clicking on
"provides network" when you create the proxyVM?
Does traceroute from the attached appVM show it going through the VPN
address?
perhaps a problem with firewall, iptables or a new debian update?
seems like things were more seamless with 3.2 concerning vpn's.
thanks guys
hardware is not well supported.
If you're wondering whether this makes any performance difference, for
Qubes the answer would be 'no'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
brightness is
stuck to 0 (no idea how to fix that though).
Otherwise, Qubes seems to work fine.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
On 11/26/2018 06:56 AM, pieter lems wrote:
Hello Chris,
I was wondering, if i run a qube based on a fedora template it uses
about 3.5GB of memory when just browsing. I decreased it to 2500 and it
works exactly the same. Will there be any negative effects by decreasing
the memory manually
mailbox now!
Christophe
Interesting... Thanks for the valuable feedback!
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
setup, if
working.
Thank you :)
This would be best asked in qubes-devel. If I had to guess I'd say we'll
see it in R4.1.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this m
Thank you all for your advice.
Regards,
Chris
-
Chris Willard
ch...@meliser.co.uk
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
rf the ME. (disabling ME is impossible)
>
> It is easy to find components to refurb it yourself with a new
> battery/keyboard/palmrest/lid etc for not much money.
>
Thanks for this. I will have a look.
Regards,
Chris
-
Chris Willard
ch...@meliser.co.uk
Sent with ProtonMail Secure Emai
Hello Pieter,
‐‐‐ Original Message ‐‐‐
On Thursday, 29 November 2018 16:19, pieter lems
wrote:
> Hello chris I switched from a dell xps 15 to a hp spectre x360 not long ago
> and I must say i prefer the Hp spectre. I know it's not an answer to your
> question an
Hello All,
Work said they will get me a new laptop and I would like to run Qubes V4 on it.
Can anyone recommend a current model? I'd like an i7 with lots of memory!
I had a look at the HCL but the models don't appear to be on the Dell site to
buy.
Many thanks for any help.
Regards,
Chris
On 11/25/2018 04:47 PM, Christophe Pfeifer wrote:
On Sunday, November 25, 2018 7:43 PM, Chris Laprise wrote:
On 11/25/2018 10:32 AM, 'Christophe Pfeifer' via qubes-users wrote:
Hi,
I followed the tutorial "Set up a ProxyVM as a VPN gateway using
iptables and CLI scripts" [
't think it would have an effect)...
https://github.com/tasket/Qubes-vpn-support
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscrib
On 11/19/2018 03:01 PM, Otto Kratik wrote:
On Monday, November 19, 2018 at 12:27:40 PM UTC-5, Chris Laprise wrote:
It could be as simple as editing your /etc/resolv.conf so it contains
your VPN provider's DNS server (or other DNS server that you prefer)
instead of the Qubes internal routing
On 11/19/2018 12:27 PM, Chris Laprise wrote:
It could be as simple as editing your /etc/resolv.conf so it contains
your VPN provider's DNS server (or other DNS server that you prefer)
instead of the Qubes internal routing addresses.
Replace this:
nameserver 10.139.1.1
nameserver 10.139.1.2
On 11/19/2018 09:05 AM, Otto Kratik wrote:
On Monday, November 19, 2018 at 1:09:33 AM UTC-5, Chris Laprise wrote:
The Qubes VPN doc has two methods for correct openvpn configuration:
https://www.qubes-os.org/doc/vpn/
A better method is located here:
https://github.com/tasket/Qubes-vpn
On 11/19/2018 01:09 AM, Chris Laprise wrote:
On 11/18/2018 07:36 PM, Otto Kratik wrote:
I realize it's possible to create a dedicated ProxyVM and use
NetworkConfig to route VPN traffic, but that's not what I'm asking about.
In Qubes 3.2 from any standard Debian AppVM connected to Sys-Net I am
:
https://www.qubes-os.org/doc/vpn/
A better method is located here:
https://github.com/tasket/Qubes-vpn-support/
The difference is more failsafe checks and much smoother setup & operation.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5
see '[sys-net]
Network Manager Applet'. Its pretty easy to use it like this once you're
used to it.
I've done some investigation for (hopefully) a permanent fix, but don't
have time to work on it right now.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com
it would be with the default RAM
allocation; I highly recommend it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qube
On 11/01/2018 11:55 AM, Fidel Ramos wrote:
‐‐‐ Original Message ‐‐‐
On Thursday, November 1, 2018 1:59 AM, Chris Laprise wrote:
On 10/31/2018 03:06 PM, entiosis via qubes-users wrote:
1. I’ve successfully managed to set up a “ProxyVM” (or “AppVM” as it is called
in Qubes 4.0
dom0 to make that
button reappear?
Wish I could help you there. QM has been in a lot of flux for the past year.
Please keep in mind that I'm a newbie Qubes user and a fairly new Linux (Mint)
user of just a couple of years if/when you of you reply to these questions.
--
Chris Lapris
it _replaces_ OS X -- it doesn't run on it. A more logical arrangement
would be to run OS X on Qubes which is the reverse of what you seek.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You
ory up
Thanks Unman for your followups, but I'm still getting some errors.
Also thanks for the ~ explanation, I didn't understand that until now.
I am following Chris guide: https://github.com/tasket/Qubes-vpn-support/
But I am stuck at secound stage: sudo unzip ~/ovpn-configs-example.zip
First of al
On 10/23/2018 09:45 AM, alexander.ibrahi...@gmail.com wrote:
Den tisdag 23 oktober 2018 kl. 02:27:49 UTC+2 skrev Chris Laprise:
On 10/22/2018 04:40 PM, alexander.ibrahi...@gmail.com wrote:
Hello,
I am trying to follow this guide:
https://www.reddit.com/r/Qubes/comments/6h4ue2
better in all regards than the old scripts, including ease of use.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
kups
even on large volumes:
https://github.com/tasket/sparsebak
Its still experimental but could be in beta as soon as December.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received th
.
Try 'sudo dnf list qubes-template*' to see a list of installed
templates. If there are none, try mounting the installation media,
locate a qubes-template*rpm file and install the rpm file directly. This
should be a lot less time-consuming than re-installing Qubes.
--
Chris Laprise, tas...
istributed to anyone else.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
:56 AM, mfreemon wrote:
On 10/2/18 2:25 AM, Ivan Mitev wrote:
On 10/2/18 1:32 AM, Chris Laprise wrote:
On 10/01/2018 05:48 PM, mfreemon wrote:
On 1/11/18 3:01 PM, Chris Laprise wrote:
> On 01/10/2018 03:47 PM, Connor Page wrote:
>> The official templates use nftables so shouldn’t
itching back to
KDE. Xfce had too many bugs and omissions for me.
https://www.qubes-os.org/doc/kde/
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subs
) for
scanning. Another way is to use Qubes-VM-hardening as a way to launch
the AV scanner at normal appVM startup, at the instant before the
private volume is brought online.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3
On 10/01/2018 05:48 PM, mfreemon wrote:
On 1/11/18 3:01 PM, Chris Laprise wrote:
> On 01/10/2018 03:47 PM, Connor Page wrote:
>> The official templates use nftables so shouldn’t be mixed with
iptables. I didn’t have time to learn about nftables, so just removed
nftables package from
On 10/01/2018 05:24 PM, Chris Laprise wrote:
On 10/01/2018 02:50 PM, Micah Lee wrote:
I recently installed Qubes 4.0 on a laptop, installed updates in dom0
and my templates, restored a backup, and did a bunch of custom
configuration. And then when I rebooted, Qubes wouldn't boot up due
lvdisplay to verify the LV status has changed.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
network
when connected to the VPN, which I ought to be able to, and a traceroute should
go through my home system's DNS server. This may be the best solution for my
need for now. It is better than the previous sys-net hosted openvpn instance.
Thanks to Chris for the explanation as to why
be
the best solution for my need for now. It is better than the previous
sys-net hosted openvpn instance. Thanks to Chris for the explanation as
to why to use qubes-tunnel.
There are two ways to access a LAN while connected to a VPN with
qubes-tunnel. One is to add exceptions to the ProxyVM internal
to give it some love, we would be significantly
happier \o/
Thank you!
I'm working on getting the packaging correct so that it integrates
properly with qubes-builder. Its a bit more complicated than I expected
but I think it could happen this week.
--
Chris Laprise, tas...@posteo.net
https
the VPN to a ProxyVM increases the security of your VPN secrets.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"
of
the Qubes-specific DNS and iptables details.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
On 09/22/2018 11:01 AM, Chris Laprise wrote:
On 09/22/2018 05:01 AM, lik...@gmx.de wrote:
On 21/09/2018 23:43, Chris Laprise wrote:
On 09/21/2018 05:30 PM, Chris Laprise wrote:
On 09/21/2018 05:10 PM, liked2-mmb7mzph...@public.gmane.org wrote:
Hi,
there are several topics
On 09/22/2018 05:01 AM, lik...@gmx.de wrote:
On 21/09/2018 23:43, Chris Laprise wrote:
On 09/21/2018 05:30 PM, Chris Laprise wrote:
On 09/21/2018 05:10 PM, liked2-mmb7mzph...@public.gmane.org wrote:
Hi,
there are several topics in the documentation pointing to the
location of files like
On 09/21/2018 05:30 PM, Chris Laprise wrote:
On 09/21/2018 05:10 PM, lik...@gmx.de wrote:
Hi,
there are several topics in the documentation pointing to the location
of files like: root.img, volatile.img, private.img
here:
https://www.qubes-os.org/doc/hvm/
or here:
https://www.qubes-os.org
est to first try using the qvm-* commands
like "qvm-volume".
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
) then you'll have to install it in either a template or a
standalone VM made from a template (this is an option in the Qubes
Create VM dialog). The latter should make Crossover installation simpler
for testing purposes.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
ult won't run as
smoothly as Qubes-vpn-support - you can trust me on this because I wrote
both of them. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because
now about labeling screens, but the pager settings do have a
checkbox for displaying only the current screen.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this messag
to do this in R4.0 is to click on "Provides network" instead.
The newer (proposed) doc + qubes-tunnel as suggested by awokd are much
easier to install and run more smoothly, BTW.
https://github.com/tasket/qubes-doc/blob/tunnel/configuration/vpn.md
--
Chris Laprise, tas...@po
an already do this with the service in
Qubes-VM-hardening since it can deploy files from template to anywhere
in /rw at the moment the appVM mounts it...
https://github.com/tasket/Qubes-VM-hardening
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP:
On 09/14/2018 03:25 PM, 22...@tutamail.com wrote:
Thank you Anac and Chris, appreciate your suggestions:
You said that Tor was running. When combining Tor with VPN, the VPN's
connection type should be TCP, not UDP. Did you check that?
I did check this...opened the connection to Any/Any
.
You said that Tor was running. When combining Tor with VPN, the VPN's
connection type should be TCP, not UDP. Did you check that?
When connecting to VPN through TOR, TCP is required but depending on
your provider's server config you may also have to change the port number.
--
Chris Laprise
ds nor malware would
be retained when sys-net is restarted. Then you could control wifi
connections from a dom0 script. This would be like having a separate
sys-net for each wifi connection, if you restart sys-net whenever the
wifi connection was changed.
--
Chris Laprise, tas...@posteo.ne
needed.
The debian-9 template already has everything it needs for sys-firewall use.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
to
create and setup a new proxyVM and use that instead.
3. Unlikely: Interference from malware, possibly residing in sys-net.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this messa
Tasket solution easier to set up for a relative novice in desperate need of VPN
security. I am also able to setup a few configurations so I can use different destinations. Is this the
version you are using?
You can think of the vpn doc as a much older version of qubes-tunnel. I
doubt switching
connection
will show "Initialization sequence completed" at the end.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Grou
On 09/03/2018 06:03 PM, Guy Frank wrote:
On Friday, August 31, 2018 at 6:31:58 PM UTC-4, Chris Laprise wrote:
On 08/31/2018 01:40 PM, Guy Frank wrote:
On Friday, August 31, 2018 at 12:17:54 PM UTC-5, js...@bitmessage.ch wrote:
Guy Frank:
One question I had is whether there is any way to set
On 09/02/2018 04:07 PM, Chris Laprise wrote:
On 09/02/2018 12:42 PM, Nicola Schwendener wrote:
Hi Chris,
thank you for your reply:
this is what I got:
Sep 02 18:37:07 sys-vpn-Express qubes-vpn-setup[654]: Sun Sep 2
18:37:07 2018 SENT CONTROL [Server-2203-1a]: 'PUSH_REQUEST' (status=1)
Sep 02
On 09/02/2018 12:42 PM, Nicola Schwendener wrote:
Hi Chris,
thank you for your reply:
this is what I got:
Sep 02 18:37:07 sys-vpn-Express qubes-vpn-setup[654]: Sun Sep 2 18:37:07 2018
SENT CONTROL [Server-2203-1a]: 'PUSH_REQUEST' (status=1)
Sep 02 18:37:07 sys-vpn-Express qubes-vpn-setup[654
try ping, is it from a downstream appVM (a regular appVM that
is connected to the proxyVM)?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
ould be to setup a new storage pool to
hold that VM. Unfortunately the docs could use a rewrite:
https://www.qubes-os.org/doc/storage-pools/
The relevant commands are 'qvm-pool --add' and 'qvm-create --pool'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttas
On 08/25/2018 03:59 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-25 14:24, 'awokd' via qubes-users wrote:
On Sat, August 25, 2018 7:01 pm, Chris Laprise wrote:
On 08/25/2018 02:25 PM, Rusty Bird wrote:
odindva0...@gmail.com:
I am using version R 4
r VM types was a mistake. People are getting confused and referring to
"network-providing appVM" in the generic is awkward at best --
especially if you are merely describing or referring to VMs instead of
giving instructions on creating them.
--
Chris Laprise, tas...@posteo.net
https://git
is easier than wifi):
https://unix.stackexchange.com/questions/253030/how-to-setup-network-without-wicd-or-networkmanager
In order to execute commands to repair the template, you'll need to
start a root shell from dom0 like this:
$ qvm-run -u root vmname 'xterm'
Good luck!
--
Chris Laprise
Zeko
You'd be better off switching to integrated graphics; much much simpler.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
and store VMs inside them.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
lumes are swap space. They are deallocated when the VM is
started/stopped.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
On 08/18/2018 09:47 PM, Stumpy wrote:
On 2018-08-18 22:30, Chris Laprise wrote:
On 08/18/2018 12:39 PM, Stumpy wrote:
I am able to ping via the vpn vm but when I try to connect to the net
with an appvm that is using the vpn vm I cant connect to anything. Im
using v4.0 and the script method
-using-the-qubes-tunnel-service
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
line)
2. AND upgrading Intel microcode to 20180807
On #2, assuming Intel has still abandoned Ivy Bridge and earlier CPUs, I
wonder if this makes the CoreBoot targeted systems essentially
unsafe/unusable.
Very bad.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
Qubes tools.
Their VPN protocol appears to be IPsec (which isn't great BTW); you
could start with a Linux IPsec tutorial in a proxyVM to see if you can
connect to this other person.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73E
On 08/13/2018 05:32 PM, joevio...@gmail.com wrote:
On Monday, 13 August 2018 17:13:06 UTC-4, Chris Laprise wrote:
On 08/13/2018 04:47 PM,
Related question.
If I installed Qubes and used LUKS encryption (I have to run cryptsetup
openLuks just to see the LVM inside)... then I add physical
b and grub
accommodate that multi-volume setup.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
the thin pool? Or would it make sense to keep it as
its own LV? Yeah, it means dom0 cannot grow with the pool, but should it?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
special about fedora-28
either; I get similar results from debian-9 and whonix-ws.
Can Qubes access all of that RAM? Look at the total_memory figure from
'xl info'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3
an eye on your disk space meter.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
f regular lvm. If reliability is high on your list then Btrfs may
be better... it seems to be older with a lot more people using it, and
has more internal error-correction mechanisms (but it still isn't
recommended for RAID5/6). Btrfs is worth considering as an alternative.
--
Chris
On 08/13/2018 07:32 AM, qubes-...@tutanota.com wrote:
Chris, which guide did you follow when installing the new whonix 14 Template as a
"recommended whonix install procedure"? I found these two.
http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Qubes/Instal
What I did: Cloned the old whonix-ws template, switched appvms to the
clone, then did 'dnf remove' on the old templates and finally performed
the recommended whonix install procedure.
Later, I was able to switch existing whonix appVMs to whonix-ws-14.
--
Chris Laprise, tas...@posteo.net
https://
/HDD mode, but Btrfs does.
The HDD mode avoids some thrashing.
Also, I remember installing a 4.0 release candidate on an external HDD
and didn't note unusual thrashing at the time.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E
MB RAM, and I
find dom0+KDE works smoothly with max RAM at 1500MB. Most personal and
work VMs do fine with max RAM at 1500 - 2000MB.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You re
On 08/08/2018 12:05 PM, trueriver wrote:
Chris's suggestion was not quite right, but near enough for me to get it
working. This is no reflection on Chris but is down to inconsistent naming
conventions between different devs on different projects.
Chris said
You can open a terminal in your
in the template and start with wifi turned off. It can
be turned on by right-clicking the systray icon and enabling the wifi
checkbox.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
2018
Can you try again?
Works for me too.
Regards,
Chris
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.co
On 05/23/2018 11:29 AM, trucs.important...@gmail.com wrote:
Hi, I've reinstalled Qubes 4.0 and copy (ctrl+c / ctrl+alt+c) works but not
paste (ctrl+alt+v / ctrl+v)...
An idea to resolve it?
The combination is Ctrl+Shift not Ctrl-Alt.
--
Chris Laprise, tas...@posteo.net
https://github.com
know if the
tboot update has an impact on graphics but thought I'd mention it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
401 - 500 of 1196 matches
Mail list logo