f interest in moving to open hardware like
the POWER CPUs.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qub
n case.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group an
w.img files in /var/lib/qubes/appvms, your system
seems to have been installed with one of the non-LVM options. This could
be either Ext4 (rather limited) or Btrfs (flexible). Looking at the
output of the 'mount' command in dom0 will tell you which.
--
Chris Laprise, tas...@posteo.net
ht
changes).
I had noticed the relative lack of Debian updates, also. Thanks for
looking into the package status. Hopefully we'll get a simple answer.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
m -d 1 /rw
There are also graphical tools that show where space is used: Baobab
(Gnome) and Filelight (KDE).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are
for
John) could be excused for thinking their options are not the best.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
response helps you out some. Right now Qubes appears to be
in a state that's mostly suitable for "security techies"; There is
certainly room for improvement and your critique has made me think that
some new issues need to be opened to help address the usability issues.
--
Chris Laprise, tas..
-B40aZSJgi4ILdmPa5QfQ_eo53zHcerJAWHnmyyY5pYpZ1pE%3D%40protonmail.com
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
ice thing about WINE is, if you know your apps will run on it, then
you have a system that is much easier to maintain than Windows itself.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
, if those packages aren't present then it could be issue #4859.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qub
On 3/4/19 8:59 PM, Sphere wrote:
Thanks for this unman
I tried the commands you suggested and it still ended up with the very same "Error:
Unable to find a match"
I'll track that issue you raised to know when it gets fixed (Y)
Have you tried "sudo dnf clean all" in dom0
://reactos.org/download
It boots but does not recognize any drive to install.
So they got better at running on bare metal, but still clueless about
running as a VM guest.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3
ur chances that Qubes will work.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubsc
further and make a snapshot of the dom0
root volume before updating. With the default Qubes config this is a
quick process and means using 'lvcreate --snapshot' on the
qubes_dom0/root volume. For completeness, a copy of /boot and boot
sector should also be made just before the snapshot.
--
Chris
(like Qubes security) can remain comfortable with Nvidia
hardware ...if they go back to Windows.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
such as Qubes warn against using Nvidia:
https://www.qubes-os.org/doc/system-requirements/
Many computers can disable the Nvidia chip and use the Intel integrated
GPU instead. This can be controlled from the BIOS/firmware settings.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
lnerability may have been removed from
the repository, and the patched version may still be in testing?
Easiest way to resolve that is to add '--enablerepo=qubes*testing'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB
On 2/26/19 4:18 PM, w4oo2dt7re...@scryptmail.com wrote:
Hello,Chris Laprise,
I’ve been using qubes-tunnel for a few months now, and first tried with
qubes-vpn-support, ,thank you for develop them and answered so many
questions in a very clear manner, that helped a lot, I accumulated some
possible to shrink the upper limit using a combination
of qvm-block attach, resize2fs (in a VM), and lvresize. This is one of
those "if you know really what you're doing" options.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5
rom unclean shutdown in Qubes 4.0?
Others have run into this before:
https://github.com/QubesOS/qubes-issues/issues/3964
Here is some advice I found. It sounds OK but use at your own risk:
https://www.linuxglobal.com/fix-lvm-thin-cant-create-snapshot-failed-suspend-vg01pool0-queued-messages/
--
On 2/24/19 3:26 PM, 799 wrote:
Hello Chris,
On Sun, 24 Feb 2019 at 00:22, Chris Laprise <mailto:tas...@posteo.net>> wrote:
[...]
As you may already know, I created a Qubes service that provides
most of
the benefits of a dispVM by removing, hash checking, rep
in the VM instance before startup is
completed.)
All of this happens immediately before Qubes first mounts the /rw
private volume at startup.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
it go but also glade we have Qubes 4.0.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
On 2/20/19 9:26 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 20/02/2019 2.53 PM, Chris Laprise wrote:
On 2/20/19 2:46 PM, Stuart Perkins wrote:
On Wed, 20 Feb 2019 10:38:15 + lik...@gmx.de wrote:
On 2/19/19 6:22 PM, Chris Laprise wrote:
On 2/19/19 10
On 2/15/19 4:39 PM, Chris Laprise wrote:
On 2/15/19 4:14 PM, 'Evastar' via qubes-users wrote:
Hello,
Seems after last whonix update my old VPN VM begin leaking traffic.
After investigation I found that it's because ipv6 primary connection
to whonix-gw. I guess that whonix-gw now supporting
On 2/20/19 2:46 PM, Stuart Perkins wrote:
On Wed, 20 Feb 2019 10:38:15 +
lik...@gmx.de wrote:
On 2/19/19 6:22 PM, Chris Laprise wrote:
On 2/19/19 10:41 AM, liked2-mmb7mzph...@public.gmane.org wrote:
Hi,
assume there are files stored in a qube without networking. Furthermore assume
ini with a
qubes-ssh: destination instead of internal: and have a VM setup for ssh
key access to the destination server.)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message beca
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
sure when Qubes started enabling ipv6 by default. I
thought R4.0 was going to support ipv6 but leave it disabled by default?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received th
On 2/15/19 8:47 AM, nosugarmaxta...@gmail.com wrote:
On Friday, 15 February 2019 16:37:17 UTC+11, Chris Laprise wrote:
On 2/14/19 10:02 PM, nosugarmaxta...@gmail.com wrote:
Hi all,
Right now I use Qubes for a bit of fun - setting up VPN's - chaining them,
trying to get HVM's up and running
and malware can be
removed by removing the affected VM.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
ight be an option.
Also note that a non-AES cipher may seem nearly as quick as AES for
access times, however it will have an impact on multitasking performance
since AES is hardware accelerated while the other ciphers are not on
most systems.
--
Chris Laprise, tas...@posteo.net
https://github
tion is pretty
black-and-white. If its true, we're dealing with a tech kakistocracy
that makes decisions in lockstep. How does our community respond to that?
I would like to see Qubes work on validating dom0, which benefits all
use cases, then think about ways of meeting this Windows admin culture
epository signatures to satisfy Red Hat's marketing
department... its been a long-term thorn in Qubes' side.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message becaus
the missing
vg with thin logical volumes?
Have you reached out on a popular Linux forum such as Fedora or
StackExchange? Since this is specific to Linux lvm it would be better to
expose it to many more eyes than what we have here.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
del, qubes-fan's advice makes a lot of sense.
With a regular Windows laptop the company admins are already trusting
you with physical access. That is a lot of power. So the question is why
wouldn't this trust extend to a Windows VM on Qubes, which has superior
protection from any remote attacks?
ut "always
available" non-LVM pool on your internal drive. Then symlinks can be used.
@Stefan: Would you post this as a feature-request issue? If not, I may
do so because having Qubes support removable storage pools automatically
could be valuable to a lot of people.
--
for the downloads
are newer than what is already installed then you may need to use
'--action=upgrade'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are su
method I described here:
https://groups.google.com/d/msgid/qubes-users/f4d997d5-7191-06d0-e7bb-ef42745a7db5%40posteo.net
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
is optimal for Qubes.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
as possible. However,
many of us believe there needs to be progress beyond even this goal and
that fully open source CPUs should be used as the main component in PCs;
this would have the effect of bolstering trust and accountability.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
firefox'" which should send a normal TERM signal to Firefox. Its best to
wait about 5 seconds before trying to shut down the VM so the browser
state has time to be written to disk.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E
and injection may occur during apt-get install/update using man-in-the-
middle attack, at least in some countries. Unless packages are compiled
with reproducible builds and fingerprints are available online, there
is no way to avoid such an attack.
WAT?
--
Chris Laprise, tas...@posteo.net
On 01/25/2019 03:01 PM, John S.Recdep wrote:
On 1/23/19 9:52 PM, Chris Laprise wrote:
On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote:
Patching
=
If you are a Qubes user, you should remove all APT-based (including
Debian and Whonix) TemplateVMs and StandaloneVMs
On 01/25/2019 02:03 PM, gone wrote:
Chris Laprise wrote on Wed, 23 January 2019 21:52
On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki
wrote:
A shortened update procedure for debian-9:
.
This method also works with whonix-gw-14 and
whonix-ws-14 templates.
--
This worked very well
On 01/24/2019 10:12 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 23/01/2019 3.52 PM, Chris Laprise wrote:
On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote:
Patching
=
If you are a Qubes user, you should remove all APT-based (including
.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
On 01/24/2019 06:29 AM, unman wrote:
On Thu, Jan 24, 2019 at 01:00:15AM -0500, Chris Laprise wrote:
On 01/23/2019 08:15 PM, js...@bitmessage.ch wrote:
Mike Keehan:
Hi,
I'm using Qubes Backup to save some of my qubes into another VM.
The backup VM has 18 Gb of storage available, but whenever
in 4.0.
Marek,
Isn't this the null bytes bug in GNU tar?
https://groups.google.com/d/msgid/qubes-users/f4d997d5-7191-06d0-e7bb-ef42745a7db5%40posteo.net
It would be a good idea to update this in dom0. My own backup tool uses
GNU tar as well.
--
Chris Laprise, tas...@posteo.net
https://github.com
-ef42745a7db5%40posteo.net
Also, using the 'upgrade' action is a lot less confusing. The official
steps are needlessly painful.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
is method also works with whonix-gw-14 and whonix-ws-14 templates.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
trigger didn't work.
I don't know how to do the un-hibernate (and it seems unlikely to work
on Qubes), but you could avoid hibernate in the first place with
'systemctl mask hibernate.target' in the template.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
ore stepping on.
Check out Joanna's blog at Invisible Things Lab. Lots of Qubes' DNA is
there.
(1) What we have learned about Intel ME
http://blog.ptsecurity.com/2018/11/what-we-have-learned-about-intel-me.html
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.
.
If you don't want to use one server IP all the time, you could add many
IPs to the conf file along with 'remote-random' which will choose one
randomly. Alternately, you could see if NordVPN has regional domain
names and use one of those in your conf.
--
Chris Laprise, tas...@posteo.net
https
On 01/12/2019 02:18 PM, Chris Laprise wrote:
On 01/12/2019 10:47 AM, Ivan Mitev wrote:
On 1/12/19 5:16 PM, Daniil Travnikov wrote:
Does anyone know how could be configured the Wireguard
(https://www.wireguard.com/) in Proxy VM?
Maybe do you know some doc like https://www.qubes-os.org/doc
'wireguard' package.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
en an
enhancement issue for this. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To un
On 01/08/2019 03:07 PM, Chris Laprise wrote:
On 01/08/2019 07:25 AM, simon.new...@gmail.com wrote:
As per subject, does anyone use things such as AIDE (or other file
integrity IDS) ?
I understand the security model is "if dom0 is compromised, you are
fscked" but it would be at
a heads up if such an event
happens.
I think Marek mentioned that HEADS has a root fs verification scheme. I
was going to try HEADS but the dependence on Google services made me
back off.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E
On 01/07/2019 02:04 PM, Chris Laprise wrote:
A Windows 7 vm I restored from R3.2 can boot. However I wanted to update
it with the new Qubes Windows Tools and it won't recognize the
--qubes-windows-tools volume. I also tried 'qvm-block attach' on the qwt
iso directly and Windows still won't see
fully updated Qubes drivers? Or
is it better to reinstall Windows instead (IIRC getting all the Windows
updates was difficult so I'd rather not repeat installation.)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3
e it won't look for newer dependencies in the buster repo and so
won't be able to find them.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are
, this version of KDE takes about 5sec longer to start up
- which the auto-login more than makes up for. And the Network Manager
icon is blank, even though it works. I'm happy to take that trade-off.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2
On 01/03/2019 06:03 PM, Frédéric Pierret wrote:
We built the upstream package of xscreensaver in current-testing for
both Qubes 3.2 and 4.0.
Welcome back to XFCE Chris :D !
LOL, seriously?
The XFCE deficits are too numerous, unfortunately.
--
Chris Laprise, tas...@posteo.net
https
.)
The bad screensaver is one of the reasons I switched back to KDE, and
why I recommend it to other Qubes users. The default environment doesn't
rise to the level of an every day functional desktop.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2
On 01/03/2019 05:07 PM, gone wrote:
On 1/3/19 10:45 PM, Chris Laprise wrote:
On 01/03/2019 03:40 PM, gone wrote:
On 1/3/19 12:50 AM, unman wrote:
On Wed, Jan 02, 2019 at 05:08:50PM +0100, gone wrote:
On 1/1/19 10:19 PM, Chris Laprise wrote:
On 01/01/2019 02:37 PM, gone wrote:
Hello, 1st
On 01/03/2019 03:40 PM, gone wrote:
On 1/3/19 12:50 AM, unman wrote:
On Wed, Jan 02, 2019 at 05:08:50PM +0100, gone wrote:
On 1/1/19 10:19 PM, Chris Laprise wrote:
On 01/01/2019 02:37 PM, gone wrote:
Hello, 1st of all, I want to thank all the developers and supporters
for that great stuff
On 01/03/2019 01:43 PM, 799 wrote:
Hello Chris,
thanks for yor answer.
On Thu, 3 Jan 2019 at 03:55, Chris Laprise <mailto:tas...@posteo.net>> wrote:
> I thought I found out how to have OpenVPN auto-connect after the
sys-vpn
> AppVM has launched:
>
On 01/02/2019 07:44 PM, 799 wrote:
On Thu, 3 Jan 2019 at 01:19, Chris Laprise <mailto:tas...@posteo.net>> wrote:
Hmmm, that 3.x language should be changed in the doc. Where its says
"proxyVM", that simply means "appVM with provides network" in Qubes 4.0
is my own project)
has only 4 basic steps with no editing necessary.
BTW, the expressvpn app doesn't deal with the Qubes forwarding issue, so
you can be sure it doesn't address security fully either. That is a
recipe for leaking unencrypted packets.
--
Chris Laprise, tas...@posteo.net
h
ith expressvpn's Network Manager
instructions. This also involves creating an appVM with "provides
network" checked, and then enabling NM for it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
best for 2019.
Installing from Debian testing is much easier and it has Python 3.7.
Just set the default release as in the following link, then add a line
for "testing" in your /etc/apt/sources.list (and then 'apt update'):
https://www.debian.org/doc/manuals/apt-howto/ch-apt-ge
files to compile
the nvidia driver. Anyone know where I can get these files?
Thanks!
Yes, its fedora 25.
A simpler route is to use integrated Intel/AMD graphics which are better
supported. It won't make a difference as far as speed goes.
--
Chris Laprise, tas...@posteo.net
https
he CentOS 7 "testing" template? I'm so over Fedora, but
need dnf for full compatibility with qubes-dom0-update.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this mess
2, before running install?
Also, what is the difference between the old style and the new style men?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
.
-
Also should mention that my new (very fast!) incremental backup tool
will be having its final alpha release probably in the next few days...
https://github.com/tasket/sparsebak/tree/new3
** Happy Holidays to everyone on this last day of Autumn! **
--
Chris Laprise, tas...@posteo.net
info:
https://www.whonix.org/wiki/Tor_Browser#tb-updater_postinst
I also have an issue about the curl status display. It seems to be
configured to ignore the TERM environment so when its in a qvm-run
session it scrolls tons of un-escaped characters which is annoying.
--
Chris Laprise, tas
. As the instructions suggest, you need to run:
cd /rw/config/vpn
sudo ln -s France.ovpn vpn-client.conf
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
TemplateVM
- Debian 9 TemplateVM
- Whonix 14 Gateway and Workstation TemplateVMs
- Linux kernel 4.14
The latest update has made my VMs start noticeably faster. I'm liking it. :D
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E
of the
Qubes VPN doc:
https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
This way you can use Network Manager documentation for additional
guidance in the GUI, or use any specific steps NordVPN has created for
Network Manager.
--
Chris Laprise, tas
On 12/16/2018 08:54 AM, Roy Bernat wrote:
On Sunday, 16 December 2018 08:50:32 UTC-5, Chris Laprise wrote:
You could look at 'sudo dnf history' in dom0 to identify the last
update, then roll back to the prior one:
sudo dnf rollback
So if the update that caused the problem is transaction 150
You could look at 'sudo dnf history' in dom0 to identify the last
update, then roll back to the prior one:
sudo dnf rollback
So if the update that caused the problem is transaction 150, specify 149
on the command line.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
-prompt
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
On 12/13/2018 02:31 PM, 799 wrote:
Hello Chris,
On Wed, 12 Dec 2018 at 22:52, Chris Laprise <mailto:tas...@posteo.net>> wrote:
But here's how you could start the loop:
qvm-ls --running -O name | (read line; while read line; do qvm-run -p
$line 'your vm command goes he
ight be a problem, especially \n
Maybe the pipe symbol | and ampersand & too.
Mike.
Yes, I would try typing the password with the backslashes doubled; might
work.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1
On 12/12/2018 04:01 PM, 799 wrote:
Hello,
Am Sa., 1. Dez. 2018, 05:12 hat Chris Laprise <mailto:tas...@posteo.net>> geschrieben:
Linux tends allocate whatever amount of RAM is given to it, even if
that
memory isn't put to use.
The only real negative to reducing
u see this error".
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
) and clicking on
"provides network" when you create the proxyVM?
Does traceroute from the attached appVM show it going through the VPN
address?
perhaps a problem with firewall, iptables or a new debian update?
seems like things were more seamless with 3.2 concerning vpn's.
thanks guys
hardware is not well supported.
If you're wondering whether this makes any performance difference, for
Qubes the answer would be 'no'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
brightness is
stuck to 0 (no idea how to fix that though).
Otherwise, Qubes seems to work fine.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
make the browser noticeably slower.
You can check swap use from the VM's terminal with the 'free' command.
I'm currently running Firefox with several windows and Thunderbird in
one 2000MB VM now and swap use is still zero. I would expect slowdowns
if swap use went much above 500MB.
--
Chris
mailbox now!
Christophe
Interesting... Thanks for the valuable feedback!
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
setup, if
working.
Thank you :)
This would be best asked in qubes-devel. If I had to guess I'd say we'll
see it in R4.1.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this m
On 11/25/2018 04:47 PM, Christophe Pfeifer wrote:
On Sunday, November 25, 2018 7:43 PM, Chris Laprise wrote:
On 11/25/2018 10:32 AM, 'Christophe Pfeifer' via qubes-users wrote:
Hi,
I followed the tutorial "Set up a ProxyVM as a VPN gateway using
iptables and CLI scripts" [
't think it would have an effect)...
https://github.com/tasket/Qubes-vpn-support
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscrib
On 11/19/2018 03:01 PM, Otto Kratik wrote:
On Monday, November 19, 2018 at 12:27:40 PM UTC-5, Chris Laprise wrote:
It could be as simple as editing your /etc/resolv.conf so it contains
your VPN provider's DNS server (or other DNS server that you prefer)
instead of the Qubes internal routing
On 11/19/2018 12:27 PM, Chris Laprise wrote:
It could be as simple as editing your /etc/resolv.conf so it contains
your VPN provider's DNS server (or other DNS server that you prefer)
instead of the Qubes internal routing addresses.
Replace this:
nameserver 10.139.1.1
nameserver 10.139.1.2
On 11/19/2018 09:05 AM, Otto Kratik wrote:
On Monday, November 19, 2018 at 1:09:33 AM UTC-5, Chris Laprise wrote:
The Qubes VPN doc has two methods for correct openvpn configuration:
https://www.qubes-os.org/doc/vpn/
A better method is located here:
https://github.com/tasket/Qubes-vpn
On 11/19/2018 01:09 AM, Chris Laprise wrote:
On 11/18/2018 07:36 PM, Otto Kratik wrote:
I realize it's possible to create a dedicated ProxyVM and use
NetworkConfig to route VPN traffic, but that's not what I'm asking about.
In Qubes 3.2 from any standard Debian AppVM connected to Sys-Net I am
:
https://www.qubes-os.org/doc/vpn/
A better method is located here:
https://github.com/tasket/Qubes-vpn-support/
The difference is more failsafe checks and much smoother setup & operation.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5
301 - 400 of 1140 matches
Mail list logo