Re: [qubes-users] Boot log

2019-07-22 Thread frozentime345
[:f0:1f.0] fault index 7986, iommu reg = 82c0009f4000 Not sure how to upload the entire logs on google groups browser version? On Friday, July 19, 2019 at 8:48:09 PM UTC, awokd wrote: > > Frozentime345: > > After the latest update during boot it is showing messages like VT-D and

[qubes-users] Boot log

2019-07-19 Thread Frozentime345
After the latest update during boot it is showing messages like VT-D and others are not enabled. I tried to access this information using "sudo journalctl -b" but found nothing. Is there are any boot log that I can access to read and diagnose these issues? Also, does anyone know why these

[qubes-users] Sometimes randomly shuts off at encryption screen

2019-07-04 Thread Frozentime345
Sometimes when I boot up the system freezes in the middle of typing my encryption password and shuts down. Happens rarely. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an

Re: [qubes-users] Does restoring automatically verify integrity?

2019-06-21 Thread frozentime345
On Wednesday, June 19, 2019 at 10:55:13 PM UTC, awokd wrote: > Frozentime345: > > Does restoring automatically verify integrity? Or are we suppose to run > > an integrity check before restoring? > > > Yes, restore uses the password you enter as both an encryption and

[qubes-users] Does restoring automatically verify integrity?

2019-06-18 Thread Frozentime345
Does restoring automatically verify integrity? Or are we suppose to run an integrity check before restoring? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

Re: [qubes-users] Log qubes firewall packets

2019-04-21 Thread Frozentime345
Okay thanks, should I post this in issues as a feature request? On 4/21/19 4:06 PM, Zrubi wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 4/21/19 9:13 PM, Frozentime345 wrote: Wondering how to log packets blocked and accepted by qubes firewall for specific vm or all vms if thats

[qubes-users] Log qubes firewall packets

2019-04-21 Thread Frozentime345
Wondering how to log packets blocked and accepted by qubes firewall for specific vm or all vms if thats the only option? Couldn't find anything in website or google or qvm-firewall -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe

[qubes-users] Don't give focus to new windows in certain work-spaces

2019-01-24 Thread Frozentime345
I like when it automatically gives focus to new windows most of the time, but when Im entering passwords it's sometimes a pain. Any way to off the feature for just one workspace? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe

[qubes-users] Decrypt from shell or modify boot

2018-12-16 Thread Frozentime345
Is there any way to decrypt the hard drive using a shell and then boot like that? Or otherwise modify the boot to accept a key-file(on a flash drive) instead of a pass-phrase? Ctrl+alt+f2 or any other combo doesn't seem to open a shell, is there any way? -- You received this message because

[qubes-users] How to use encryption key(on flash drive) instead of pass phrase

2018-12-16 Thread Frozentime345
I was trying to follow the custom install guide to do this but keep failing at "setting up installation environment". Preferably I would want to use just the key and not have any pass phrase. I learned that you can change the encryption key in dm-crypt so maybe the easier method is to install

[qubes-users] Weakly verifying device through an image hidden by pin

2018-10-27 Thread Frozentime345
Along the lines of what I read in the anti-evil maid blog it would be nice if you could have an image with the google 3M privacy filter behind a pin available on the lock screen to verify this is your device. I understand the anti evil maid test checks for all sorts of hardware manipulation

[qubes-users] Blacklist Dom0 Upgrades

2018-10-18 Thread Frozentime345
Just a minor convenient feature would be to blacklist certain dom0 rpm upgrades, the kernel updates keep breaking my Ethernet so I'm avoiding them. I'm manually applying the other updates but dom0 is still saying "has updates" so I also have to manually check whether new updates are available.

[qubes-users] Re: White-list for block devices, networks, etc

2018-10-18 Thread frozentime345
On Tuesday, October 16, 2018 at 5:46:13 PM UTC, Frozentime345 wrote: > System: Fedora 27/Debian 9 Templates, R3.2->upgrading to 4.0 soon > > I looked through rpc policy but I couldn't find anything like this, is there > a way to only allow certain block devices for certain appvms?

[qubes-users] White-list for block devices, networks, etc

2018-10-16 Thread Frozentime345
System: Fedora 27/Debian 9 Templates, R3.2->upgrading to 4.0 soon I looked through rpc policy but I couldn't find anything like this, is there a way to only allow certain block devices for certain appvms? Doesn't even have to be a secure feature just something to prevent user error, but it has

[qubes-users] Any way to draw characters on lockscreen/encryption screen?

2018-08-20 Thread Frozentime345
I'm interested in drawing out characters as a method of invisibleish input on either a touchpad or touchscreen since I want to bring my qubes device anywhere. I couldn't find any mention of this in a fedora google search or a qubes search nor in qubes settings. I doubt it exists but I just