Re: [qubes-users] Tails VM: network broken since Qubes r4.2 (was online in r4.1)

2024-03-29 Thread Stickstoff
I tried to reach (firewall and networking) are listed, with the same fe:ff:ff:ff:ff:ff mac. The newly added entry has "flags mask: CM", the other has "C". Stickstoff [8] Tails default route: default via 10.137.0.9 dev eth0 proto static metric 100 10.137.0.0/24 dev eth0 pro

[qubes-users] Tails VM: network broken since Qubes r4.2 (was online in r4.1)

2024-03-28 Thread Stickstoff
hat others experience the same [7] symptoms of non reachable networking VMs, where r4.1 vs r4.2 was brought up. Does anyone have suggestions what else I might check and try? I would be very grateful for any help. It would feel archaic and counterproductive to use another machine for working on Tails..

[qubes-users] Re: HVM standalone: no mouse after suspend-to-ram

2024-03-20 Thread Stickstoff
versions, maybe the difference is the different hardware. I did not, however, change anything in the Tails VM for it to now work. Cheers, Stickstoff On 2024-02-01 13:40, Stickstoff wrote: Dear group, I am having issues with the mouse not coming back after standby. I am running Qubes 4.1.2 (R4.1

[qubes-users] HVM standalone: no mouse after suspend-to-ram

2024-02-01 Thread Stickstoff
XEN or qemu related, or rather on the Tails side? (Yes, Tails doesn't like to be in VMs. Yes, this comes with its own security implications.) Thank you, Stickstoff -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this g

[qubes-users] (Template)upgrade Debian r4.0 to r4.1 breaks (on r4.1 DOM0)

2022-11-22 Thread Stickstoff
orking them and deleting them within minutes really helps here! Sorry if this is out-of-scope for Qubes and more of a general dependencyhell topic. In that case, maybe the hints on how to get DOM0 to update again in the first place helps someone. Thank you in advance, Stickstoff [1] ht

Re: [qubes-users] Recover data from 'private-cow.img'

2021-04-18 Thread Stickstoff
ow? I would be very grateful for hints :-) Thank you, Stickstoff [1] https://www.qubes-os.org/doc/volume-backup-revert -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it

[qubes-users] Recover data from 'private-cow.img'

2021-04-17 Thread Stickstoff
a "apply its content as a patch to 'private.ig'"? Thank you in advance, Stickstoff [1] https://www.qubes-os.org/doc/template-implementation/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this grou

Re: [qubes-users] Re: 0.1 BTC bugfix bounty

2018-09-12 Thread Stickstoff
o finally have it figured out, so I don't need to compromise security for backups (regular Linux, or network in DOM0, or booting something else for backups etc). Thomas, please drop me a Bitcoin address. Cheers, Stickstoff -- You received this message because you are subscribed to the Google

[qubes-users] 0.1 BTC bugfix bounty (was: qvm-block doesn't list/expose dom0 loop devices)

2018-09-11 Thread Stickstoff
Hello everybody, On 07/29/2018 09:33 AM, Stickstoff wrote: > > I did some more tests. The difference is, if the VM is in a 'appvms' > parent folder, 'qvm-block attach' fails. When the VM folder is moved > elsewhere, with the same flags and rights, qvm-block works. Even if > th

[qubes-users] What exactly is 'private-cow.img' in appvms?

2018-08-02 Thread Stickstoff
'root.img' need one of the two .old as "binary patches" in any case. And just to be sure: 'root-cow.img' and 'volatile.img' shouldn't contain any backup-worthy data of a VM, right? Thank you, Stickstoff [1] https://www.qubes-os.org/doc/template-implementation/ -- You received th

[qubes-users] Re: GPU passthrough: 2000 USD bounty

2017-04-22 Thread Stickstoff
On 04/21/2017 10:13 PM, pixel fairy wrote: > havent tried this yet, but you can stream from ps4 to windows (or > mac), the requirements are pretty light and imply no need for > accelerated graphics on the client end. please mention me if you try > this and post back to the group. i have a ps4,

[qubes-users] GPU passthrough: 2000 USD bounty

2017-04-21 Thread Stickstoff
at becomes big enough for this. What do you people think? Or am I overlooking other options? Kernel 4.10 adds "virtual GPU support" [1], will that make things easier? Cheers, Stickstoff [1] http://news.softpedia.com/news/linux-kernel-4-10-officially-released-wit h-virtual-gpu-support-

Re: [qubes-users] HCL Suggestions?

2017-02-05 Thread Stickstoff
er testing functionality? I am no programmer, unfortunately, so I can't create such a stick by myself. And, of course, we need to be prepared for many new reports with a new maintainer and/or a more automated processing. Stickstoff -- You received this message because you are subscribed to the

Re: [qubes-users] Access all vm data from a backup-vm?

2016-11-21 Thread Stickstoff
>> what do you think of "qvm-copy-to-vm backupvm ." followed by rdiff-backup on >> the backupvm to luks encrypted disks? > > It's better, but personally I wouldn't do that either. > >> if you were using qubes-backup, how would you restore a single file or >> folder? > > Restore selected VM

[qubes-users] Access all vm data from a backup-vm?

2016-11-20 Thread Stickstoff
Hello dear new qubes family, I am having trouble designing a backup concept for my qubes workstation. My goal is to have a (daily) copy of the entire workstation on a trusted remote backup target (versioning, encryption, rotation is done remotely). Only a small part of the local data ("vault")