On the move. Sorry if I'm terse.
On 26 Oct 2017, at 07:11, Sean Hunter <s...@uncarved.com> wrote:
>
> One thing is that during the install it gave the attached message about ioMMU
> so perhaps something related to that has changed? I’m going to look at that
> next.
there (first set
sys-net as updatevm there too). Then shutdown that template vm and restart
sys-net and sys-firewall so they get the updates.
Once that’s working remember to set the updatevms back to sys-firewall.
Sean
Sent from my phone. Sorry if brief.
> On 22 Oct 2017, at 23:15, Francesco
but it
is way better than a Dell.
If I look at https://puri.sm/faq/do-librem-devices-support-coreboot/ it says
that 13v2 and 15v3 (what I have) come with coreboot pre-installed and for
earlier versions they have instructions to update to coreboot.
Sean
--
You received this message because you
y mean updating your sys-net template to fedora-25.
Sean
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
On Sun, Oct 08, 2017 at 01:43:06PM -0400, Chris Laprise wrote:
> On 10/08/2017 05:34 AM, Sean Hunter wrote:
> > >
> > Yup confirmed here - I've just tried turning on mac spoofing using the
> > NetworkManager instructions and the fedora-25 template in 4.0rc1 and spoofs
&g
Works just fine for me on Qubes 4.0 rc 1
Sent from my phone. Sorry if brief.
> On 28 Sep 2017, at 09:21, Coracle wrote:
>
> I'm getting the message here and elsewhere that Qubes OS doesn't yet support
> extended desktops or multiple monitors.
>
> I want to
: ME disabled, open-source bios and has hardware disable
switches for mic and wifi
Let me know if you have specific questions and I’ll try to address
Sean
Sent from my phone. Sorry if brief.
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
mall annoyances which I’m happy to post to the list separately if people would
find that helpful.
Sean
Sent from my phone. Sorry if brief.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and s
> On 24 Sep 2017, at 14:26, Yethal <grzegorz.chodzi...@gmail.com> wrote:
>
> W dniu niedziela, 24 września 2017 15:03:45 UTC+2 użytkownik Sean Hunter
> napisał:
>> Yeah. Grep | cut -f1 from that script is similar to the awk line I use
>> except that I a
. Sorry if brief.
> On 24 Sep 2017, at 13:44, Yethal <grzegorz.chodzi...@gmail.com> wrote:
>
> W dniu niedziela, 24 września 2017 13:45:19 UTC+2 użytkownik Sean Hunter
> napisał:
>> Hey there,
>>
>> I was trying out attaching usb devices to qubes and thoug
it to an AppVM.
[sean@dom0 ~]# qvm-usb
BACKEND:DEVID DESCRIPTIONUSED BY
fedora-25:1-1 QEMU_QEMU_USB_Tablet_42
p:1-1 QEMU_QEMU_USB_Tablet_42
sys-firewall:1-1 QEMU_QEMU_USB_Tablet_42
sys-usb:1-3 Yubico_Yubikey_4_OTP+U2F+CCID
sys
, so not making any promises. :)
Cheers,
Sean
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this g
I see that 4.0rc2 is due out in a little over a week. Does anyone know if
there'll be an upgrade path from rc1 to rc2, or if complete re-install will
be preferred? I'm trying to decide how invested I should get in my current
4.0rc1 setup.
Thanks,
Sean
--
You received this message because
On Thu, Aug 24, 2017 at 4:28 PM
wrote:
>
> Issue 1: Copying files from dom0 seems to be broken.
>
> qvm-copy-to-vm hangs and never completes. sending a SIGINT results in
> error message popup: qfile-unpacker: Fatal error: Child process exited
>
I spent a while fighting with this myself with the same dock. Turns out
the dock adds USB and ethernet support via PCI hot adding some new PCI
devices. The Qubes kernel has also disabled PCI hot add disabled in order
to block some attack vectors.
Everything on the dock should work if you turn
If you set it up as:
AppVM -> TorVM -> VpnVM -> NetVM
The VPN VM will use the Net VM to talk to the VPN server
The Tor VM will use the VPN VM to talk to the next Tor node, then to your
website
With this, the website will see you coming from a Tor exit node.
AppVM -> VpnVM -> TorVM -> NetVM
On Mon, Aug 14, 2017 at 6:53 AM Sean Dilda <sean.di...@gmail.com> wrote:
> On Mon, Aug 14, 2017 at 6:23 AM ora...@riseup.net <ora...@riseup.net>
> wrote:
>
>
>> for me fresh install on x230 using legacy boot and there is no grub, so
>> how make the iomm
On Mon, Aug 14, 2017 at 6:23 AM ora...@riseup.net wrote:
> for me fresh install on x230 using legacy boot and there is no grub, so
> how make the iommu=no-igfx edit?
>
I had to make the same edit.. however, I did see the grub screen for a few
seconds until it started the
I'm playing around with Qubes 4.0rc1 and I noticed that the IPs that are
getting assigned internally to my AppVMs are possible conflicts for me.
Does anyone know what IP ranges are used internally? And how do we
configure which ranges it can use?
Thanks!
--
You received this message because
t;proprietary"- drivers.)
Please, give a hand with this issue
Thank you and Best Regards,
Sean
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+uns
For Wifi, in sys-net keep 02:00.0, but remove (03:00.0 and) 03:00.1.
If you need Ethernet, good luck. I have been unable to get the Realtek Ethernet
devices to function reliably -- barely at all -- on my Lemur, but Wifi works
great.
For the error that you're getting, you need to add 03:00.0
21 matches
Mail list logo