On 7/4/19 1:51 PM, Jon deps wrote:
On 6/20/19 8:00 PM, Chris Laprise wrote:
Version 1.4.1 of Qubes-vpn-support has been released. It includes
tweaks for smoother operation, greater control over the firewall, and
revised docs in the Readme:
https://github.com/tasket/Qubes-vpn-support
use firewall please enable networking”.
The sys-net VM should always have its netvm set to (none), because its
the one VM that communicates through the hardware and not through
another VM.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 7
On 7/4/19 4:16 AM, l1am9...@gmail.com wrote:
On Thursday, July 4, 2019 at 6:32:55 AM UTC, Philip Pians wrote:
On Thursday, July 4, 2019 at 3:49:42 AM UTC, Chris Laprise wrote:
On 7/3/19 5:34 PM, Philip Pians wrote:
Must be doing something wrong? Wanted to do the test stage and discovered
vpn-client.conf
...the 'US_East.ovpn' is just an example. So you would do this instead:
sudo cp Openvpn.ovpn vpn-client.conf
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
On 7/2/19 3:24 AM, Sphere wrote:
On Tuesday, July 2, 2019 at 5:37:58 AM UTC, Philip Pians wrote:
On Tuesday, July 2, 2019 at 4:36:22 AM UTC, Chris Laprise wrote:
On 7/1/19 11:18 PM, Philip Pians wrote:
On Tuesday, July 2, 2019 at 3:13:56 AM UTC, Philip Pians wrote:
Using instructions
it on the line and
click the plus sign.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
, interest and help. Again, very much
appreciated.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
On 6/30/19 4:10 PM, Chris Laprise wrote:
A shortcut you can take to setting up iptables for DNS is to populate
/etc/resolv.conf and then run '/usr/lib/qubes/qubes-setup-dnat-to-ns'.
This should configure the nat/PR-QBS chain with the DNS addresses you
set.
So check that your DoT setup
es you set.
So check that your DoT setup is updating /etc/resolv.conf, then run
'/usr/lib/qubes/qubes-setup-dnat-to-ns'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this messa
your link is generally insecure or you need to use a third-party
DNS for some other reason (i.e. you set up your own VPN server but not a
DNS server to go with it).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiv
:45048
comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=?
terminal=? res=success'
Jun 26 09:47:18 fedora-30 systemd[1]:
qubes-updates-proxy-forwarder@13-127.0.0.1:8082-127.0.0.1:45048.service:
Succeeded.
I wonder if its restarting over and over.
--
Chris Lapris
have to manually
install 'firmware-iwlwifi' to get Intel cards working.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
ely.
So this looks like a bug that should have an issue opened for it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
u can see Tor is carried inside the VPN tunnel (no Tor packets
visible to your ISP).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to t
), an equivalent update is
forthcoming in the next week. However, if you wish to switch to
Qubes-vpn-support now, you can install it without issues for a new VPN VM.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
erienced this a number of times with my own setups. It would be
nice to have the unmounting and closing handled automatically, perhaps
with this:
https://dev.qubes-os.org/projects/core-admin/en/latest/qubes-events.html#qubes.events.handler
--
Chris Laprise, tas...@posteo.net
https://github.com/task
On 6/17/19 11:38 AM, brendan.h...@gmail.com wrote:
Chris - thanks for jumping on this. :)
On Monday, June 17, 2019 at 11:16:05 AM UTC-4, Chris Laprise wrote:
I would fully expect lvremove to issue discards, if lvm is configured
for it. Did you try changing /etc/lvm/lvm.conf so
to btrfs. Its unified approach is more likely to process discards
completely.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
ng a file. Just
don't max out the pool completely, or you may end up with an un-bootable
system.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are su
On 6/15/19 4:44 PM, john s. wrote:
On 6/15/19 12:50 AM, Chris Laprise wrote:
On 6/14/19 6:00 PM, Jon deps wrote:
On 6/5/19 8:00 PM, Chris Laprise wrote:
On 6/2/19 3:41 AM, Finn wrote:
I've installed Qubes-OS 4.0.1 and it's XFCE desktop environment but I
would rather prefer either KDE
On 6/14/19 6:00 PM, Jon deps wrote:
On 6/5/19 8:00 PM, Chris Laprise wrote:
On 6/2/19 3:41 AM, Finn wrote:
I've installed Qubes-OS 4.0.1 and it's XFCE desktop environment but I
would rather prefer either KDE or GNOME desktop environment. I found
this document[1] where mentioned that Qubes-OS
the root-autosnap to
something else as a way to set aside the most recent good configuration
before making dom0 changes or before rebooting after making changes.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
On 6/12/19 3:04 PM, Mike Keehan wrote:
On Wed, 12 Jun 2019 10:29:54 -0400
Chris Laprise wrote:
On 6/11/19 6:50 PM, Chris Laprise wrote:
I think the best solution for a safe and comprehensive dom0 backup
is to have Qubes simply snapshot the root lv at boot time, before
its mounted as read
ating the DNAT rules in the firewall. Check
the PR-QBS chain to see if your DNS server IPs were added: iptables -L
-v -t nat PR-QBS
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
On 6/11/19 6:50 PM, Chris Laprise wrote:
I think the best solution for a safe and comprehensive dom0 backup is to
have Qubes simply snapshot the root lv at boot time, before its mounted
as read-write. It shouldn't take more than a few script lines in the
dom0 startup. Then dom0 can be backed
k the best solution for a safe and comprehensive dom0 backup is to
have Qubes simply snapshot the root lv at boot time, before its mounted
as read-write. It shouldn't take more than a few script lines in the
dom0 startup. Then dom0 can be backed up like any other vm.
--
Chris Laprise, tas...@posteo
are automatically created and it can be used on any regular
Qubes lvm volume (but isn't limited to Qubes).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you ar
On 6/9/19 4:50 PM, kht-lists wrote:
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Sunday, June 9, 2019 2:52 PM, Chris Laprise wrote:
On 6/9/19 2:43 PM, Chris Laprise wrote:
On 6/9/19 2:01 PM, 'kht-lists' via qubes-users wrote:
After watching Matthew Wilson's
On 6/9/19 2:43 PM, Chris Laprise wrote:
On 6/9/19 2:01 PM, 'kht-lists' via qubes-users wrote:
After watching Matthew Wilson's excellent video and reviewing various
FAQs and documents on the qubes-os web site I find myself with a basic
philosophical question. Currently I run CentOS 7
in this way. Perhaps someone
else can chime in about this possibility.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
rd (if any):
https://github.com/tasket/Qubes-vpn-support
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
to the proxy vm. Finding a similar hook in
R4 would allow you to set the MTU automatically.
Given that wireguard is becoming popular on routers, and Qubes proxy vms
are basically routers, you might find some good tips for dealing with
this around the web.
--
Chris Laprise, tas...@posteo.net
the MTU and handling packet
fragmentation. I wonder if this is a case of Wireguard requiring manual
configuration where openvpn does not.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You
to DNS.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
On 6/8/19 3:20 PM, Chris Laprise wrote:
On 6/8/19 8:22 AM, mmo...@disroot.org wrote:
I saw this issue. But unfortunately the latest-kernel-vm (5.1.2-1)
doesn't contain the modules for wireguard.
So the problem still remains.
When I use the debian-9 template on the sys-vpn the other appvms
the
'10_wg.conf.example' file to '10_wg.conf'.
https://github.com/tasket/Qubes-vpn-support/
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
ropped some time ago.
This is news to me. Are you saying that Debian installs can't be cut
down to suit a GUI domain or small dom0?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
widgets) doesn't seem compatible with Qubes' concept.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
to such requests... I
think the poster is a 'WHATEVER YOU MIGHT THINK'.
Think about it. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
ring (year first) allows
sorting without having to parse the input as an actual date.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Goo
scripts to hang for the same period.
Current workaround is to run it with debian-9.
Issue:
https://github.com/tasket/Qubes-vpn-support/issues/39
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
and there are 219 packages to update.
2. Trying to remove thunderbird, dnf wants to remove 67 packages incl.
most of qubes*, nftables, salt, tinyproxy. It would be good to be able
to remove thunderbird or other large apps without the OS crumbling to
pieces.
--
Chris Laprise, tas...@posteo.net
https
in the templatevm. I
recommend not using minimal templates, and for now avoid fedora-29
(fedora-28 and debian are OK).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
unusable).
Thread
https://groups.google.com/d/msgid/qubes-users/44f1ae64-2da1-480f-aa30-98c5f22653ba%40googlegroups.com
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message
,
there might be a problem in that case.
The disk usage widget in the system tray will tell you what kind of
storage system your Qubes is using; if you used the default LVM it will
say "lvm" with the usage stats to the right.
--
Chris Laprise, tas...@posteo.net
https://github.com/ta
On 5/28/19 8:42 AM, brendan.h...@gmail.com wrote:
On Saturday, May 25, 2019 at 2:28:13 PM UTC-4, Chris Laprise wrote:
I think the only _good_ way to deal with COW metadata expansion, since
its always related to data fragmentation, is to keep expanding it and
let system performance degrade
al folders and instead using
a passphrase with Qubes backup to backup the vaultvm to the backupvm,
then use whatever file transfer software your cloud provider requires in
the backupvm.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20
On 5/28/19 5:04 AM, Side Realiq wrote:
From: Chris Laprise
Sent: Mon May 27 19:58:35 CEST 2019
To: David Hobach , Side Realiq ,
Subject: Re: [qubes-users] How to automate cloud backups of trusted vault files?
On 5/27/19 9:05 AM, David Hobach wrote
rough ssh to the
destination system.
Initial setup of the container looks like (in vault vm):
truncate -s 50M backup.img # Size is 50 megabytes
cryptsetup luksFormat backup.img
cryptsetup luksOpen backup.img backup
mkfs.ext4 /dev/mapper/backup
cryptsetup luksClose backup
sudo mkdir /mnt/bac
. Or
how to do this? :( :( :(
Thanks.
(new email because no access to my password and data :( )
Based on what others have posted about the update, you should try to
select the prior kernel version under "Advanced options" in the grub
boot menu.
--
Chris Laprise, tas...@posteo
a pool you
can still use 'qvm-block attach' to let VMs access the space as
secondary disks.
I guess need to reduce size of current windows partition then empty part of hdd
to format to ext4 or other linux filesystem and then it will be possible to use
as storage for appvms?
Thanks
--
Chr
On 5/25/19 12:45 PM, Brendan Hoar wrote:
On Sat, May 25, 2019 at 12:09 PM Chris Laprise <mailto:tas...@posteo.net>> wrote:
It would be interesting if thin-lvm min transfer were the reason for
this difference in behavior between fstrim and the filesystem.
Indeed. Pr
and/or modifying many small files then that figure could balloon close
to 100% in a very short period.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
' instead.
Also, references to debian-8 & debian-9 should be changed to debian-9
and debian-10, respectively. Finally, the compacting procedure doesn't
apply on Qubes 4.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB
[4] https://wiki.archlinux.org/index.php/Dell_Inspiron_5575
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qub
was no way to play audio from VMs.
I'd be interested if anyone thinks they know why this conflict occurs
and/or possible workarounds.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
Yo
of sidechannel attacks and suffer less performance degradation[1] from
resulting security patches; that's certainly a reason to go in AMD's
direction.
1.
https://www.tomshardware.com/news/intel-amd-mitigations-performance-impact,39381.html
--
Chris Laprise, tas...@posteo.net
https://github.com/
wouldn't know
where to look next.
There is a memory-allocation bug with a fix in dom0 current-testing. The
package is qubes-core-dom0-4.0.43 and the issue is here:
https://github.com/QubesOS/qubes-issues/issues/4891
Applying this fix makes a very noticeable difference on my system.
--
Chris
On 5/18/19 8:54 PM, 'awokd' via qubes-users wrote:
Chris Laprise:
On 5/16/19 6:27 AM, Chris Laprise wrote:
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
Any ideas why a freshly
On 5/16/19 6:27 AM, Chris Laprise wrote:
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
Any ideas why a freshly-installed Whonix 14 template would experience an
update verification
"Midnight Surfing" palette.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
my experience.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
consider recommending a switch to AMD processors as a
short-term mitigation against CPU vulnerabilities.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
On 5/13/19 6:52 PM, 'awokd' via qubes-users wrote:
Chris Laprise:
Its also the case that Fedora is intended to be a testbed,
NON-production OS and Qubes has plans to migrate away from it.
Interesting; more details on this somewhere, or was it IRC chatter?
There's an issue for it:
https
lso read the vpn-related sections of the Whonix docs; There
are tradeoffs to using a vpn with Whonix.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscri
template.|
|thanks in advance.|
At this point I'd suggest using Fedora 28 with Qubes-vpn-support, as a
bug has been logged about a problem with Fedora 29. OTOH, you could try
using NM with Fedora 29 to see if that works.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://
--poolmetadatasize +200M qubes_dom0/pool00
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
rmware with
Coreboot... an exercise that I'm about to try. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-u
of existing apps.
Various troubleshooting threads around the net usually assume that KDE
is installed with 'plasma-nm' widget, but my tests with a Qubes template
running KDE show the problem still exists.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
dn't check.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
reputation for compatibility because they're so
secretive about driver code; OTOH there are plenty of Intel and AMD
graphics options available.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
Yo
operating systems. OTOH, AMD and Intel offer plenty of choices that are
compatible because those companies are much more cooperative.
With that said, the HCL has been due for an update, so I would also
search the forums for recent posts with 'HCL' in the title.
--
Chris Laprise, tas...@posteo.net
o internet
No characters should appear on the password line. You can check it
manually by looking in the userpassword.txt file as I mentioned.
Also, it will be necessary to look at the log as I described to find out
what is causing the problem.
--
Chris Laprise, tas...@posteo.net
https://github.com/ta
. When it says Ready but there is no connection, its
usually because of a mis-typed username or password. You can check this
in the /rw/config/vpn/userpassword.txt file.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D1
your
VPN provider (step 2).
Its your decision whether to copy all or just one config. But its easier
to copy all because there are usually other non-ovpn files which are
non-optional so copying all doesn't run the risk of damaging the configs.
--
Chris Laprise, tas...@posteo.net
https
-duplication feature that we're
testing to save even more bandwidth and disk space.
The only thing its lacking at this point is built-in encryption, so
you'll have to supply that yourself with an encrypted filesystem if you
desire it.
--
Chris Laprise, tas...@posteo.net
https://github.com
On 4/20/19 7:14 PM, Jon deps wrote:
On 4/19/19 9:22 PM, Jon deps wrote:
On 4/18/19 12:08 PM, Chris Laprise wrote:
On 4/17/19 8:38 PM, Stumpy wrote:
I was thinking the line "remote random" in my .ovpn file, along with
the ip addresses would make the VPN VM randomly select differen
lines, one for each address.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
st focused and wise
designers from Mozilla, Canonical and Google, I think you could make
some kind of broadly attractive platform that is more open and secure
than Android. It would be a fantastic thing to see.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/tta
storage pool,
then create empty vms in that pool. Finally, mv/lvrename/snapshot/ln
(your choice, depending on type of storage and preference) your existing
volumes as necessary.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB
by attaching a volume to a non-networked dispvm, running
'resize2fs' in the dispvm, then using 'qvm-volume resize --force
vm:volume size' in dom0.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You
On 3/30/19 3:47 PM, 'awokd' via qubes-users wrote:
Chris Laprise wrote on 3/30/19 7:10 PM:
I agree. But even so, AMD are better by some noticeable margin.
Intel... OMGWTF. With the 'VISA' exploit they're contradicting the
researchers, and with 'Foreshadow' they said app programmers should
5 mins? SERIOUSLY wrong.
Certainly check those logs.
Try systemd-analyze blame to see if there are any services need
attention, and systemd-analyze plot for a graphical view.
This sounds like dom0 root filling up with logs:
https://github.com/QubesOS/qubes-issues/issues/4927
--
Chris Laprise
deleting them all.
See issue 4927:
https://github.com/QubesOS/qubes-issues/issues/4927#issuecomment-479082579
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this mess
older is relatively easy, if the user chooses.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&quo
--repair did work but IIRC I had to do something with the metadata
volume (maybe expand or duplicate it) that I can't remember exactly.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
?
The qubes-multi-update script already does this when run in unattended
mode and I've never had a problem with it, even in highly customized
Debian templates.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F
an interesting forum thread to read, So, I was wondering what
potential RISC V and SiFive offer?
Sifive isn't interesting for PCs/laptops. IIRC it is the BOOM processor
project that is said to take RISC-V in that direction.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com
??
You could do that, but installing the non-ESR from Debian is easier and
more secure.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
On 3/30/19 12:25 PM, 'awokd' via qubes-users wrote:
Chris Laprise wrote on 3/30/19 2:44 AM:
On 3/29/19 7:18 PM, jrsmi...@gmail.com wrote:
https://github.com/system76/coreboot
Clearly they think they can handle modern hardware. Makes me wonder
why the coreboot folks have thrown up
ently uses dashes only for separators, so using the other 3
lvm-allowed symbols ( . _ + ) will set your names apart.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message b
first AMD system this week.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
gigabytes of disk space.
https://www.qubes-os.org/doc/template/debian/upgrade-8-to-9/
I just upgraded from 9 to 10 using these instructions
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You
e constantly look at. Definitely not a trendy move but great nonetheless.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
&
of
the above steps.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
I've created an issue for this:
https://github.com/QubesOS/qubes-issues/issues/4920
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
workaround in
Debian is to go back to pvh to install the 4.19 kernel from testing.
Then I can use the template in hvm mode.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message b
On 3/4/19 8:23 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 04/03/2019 1.40 PM, Chris Laprise wrote:
[...] You can also take this a step further and make a snapshot of
the dom0 root volume before updating. With the default Qubes config
this is a quick process
201 - 300 of 1140 matches
Mail list logo