On 11/17/2016 08:04 PM, te...@outoftheblue.pl wrote:
> Hi everyone,
>
> I was about to add my hcl report to wiki when I noticed that for some
> reson it reports IOMMU as enabled, while to my best knowledge it should
> not be supported on my system. As googling didn't help me understand
> what's go
W dniu środa, 23 listopada 2016 00:34:09 UTC+1 użytkownik Drew White napisał:
> On Tuesday, 22 November 2016 13:41:30 UTC+11, Loren Rogers wrote:
> > On 11/21/2016 06:24 PM, Drew White wrote:
> > > On Tuesday, 22 November 2016 06:04:43 UTC+11, Loren Rogers wrote:
> > >> On 11/21/2016 11:04 AM, Lo
As the title says: I've cloned my fedora 23 templates and followed the
procedure to upgrade them to fedora 24. Everything is splendid, the only two
disappointing things are:
a) Network manager applet icon is missing. May this be related to the fact that
my netvm runs on a minimal template?
b)
Dear Marek,
I've tried the solution you proposed in that post. I've managed to make that
little script to work (strangely enough, it looks like salt minds about
indenting in the code. I'm mainly used to latex that doesn't care and this left
me a bit surprised.
I created a file /srv/salt/update
I just get the "Starting Windows" and the glowing logo on a black screen. Left
it for an hour, nothing else happens.
I found this which doesn't seem relevant (or if it is I can't make the
connection) :
https://groups.google.com/forum/#!searchin/qubes-users/starting$20windows$20hang%7Csort:relev
Just to add - Windows Home Premium, 64bit. All linux VMs work fine.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To p
On Thursday, November 24, 2016 at 8:33:14 AM UTC+1, BePe wrote:
> Hi All,
>
> I have an installation of QubeOS 3.2 inside a KVM VM (I know
> that it's not recommended but it's very practical for testing)
> that was working without any major issue since last week when I
>
On Thursday, November 24, 2016 at 12:59:04 PM UTC+1, David Wylie wrote:
> I just get the "Starting Windows" and the glowing logo on a black screen.
> Left it for an hour, nothing else happens.
>
> I found this which doesn't seem relevant (or if it is I can't make the
> connection) :
>
> https:/
Hi - it is W7 Home Premium (I said it in the title but missed the 7 out in the
body, apologies).
Followed all the links I can find on the Qubes website, including that one.
Installed windows-tools from the current-testing repo.
One thing I am doing is loading the iso from another VM (as documen
Hi all,
I've not seen many docker posts, but for the heck of it I'd like to report on
how I made an app-vm that has a website running in docker and reachable by
everything connected to sys-firewall.
1) install docker in fedora-24, dnf install docker
2) create the new appvm, I called it 'dock
On Thursday, November 24, 2016 at 2:05:30 PM UTC+1, Opal Raava wrote:
> Hi all,
>
> I've not seen many docker posts, but for the heck of it I'd like to report on
> how I made an app-vm that has a website running in docker and reachable by
> everything connected to sys-firewall.
>
> 1) install
Looking at the log file (which I can't copy/paste - shift-ctl-v & ctl_v just
doesn't copy the log file contents like it says it will), the last entry is
vga s->lfb_addr = f000 s->lfb_end = f100
Don't know if that helps.
--
You received this message because you are subscribed to the G
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Nov 23, 2016 at 10:48:23PM -0800, tom...@gmail.com wrote:
> So, after Marek's fix here,
> https://github.com/QubesOS/qubes-issues/issues/1659
> is it true that I can expect this from it:
> - HVM passthrough working using stub domain via xl ?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Nov 24, 2016 at 02:44:25AM -0800, Fabrizio Romano Genovese wrote:
> Dear Marek,
>
> I've tried the solution you proposed in that post. I've managed to make that
> little script to work (strangely enough, it looks like salt minds about
> in
Hi Opal,
Thanks.
But I don't know all the actions that should be realized. For sur there
will be IP configuration, routing and probably iptables rules.
BePe
On 11/24/2016 01:22 PM, Opal Raava wrote:
> On Thursday, November 24, 2016 at 8:33:14 AM UTC+1, BePe wrote:
>> Hi All,
>>
>> I have a
On Thursday, November 24, 2016 at 3:03:01 PM UTC+1, BePe wrote:
> Hi Opal,
> Thanks.
> But I don't know all the actions that should be realized. For sur there
> will be IP configuration, routing and probably iptables rules.
> BePe
>
> On 11/24/2016 01:22 PM, Opal Raava wrote:
> > On Thursday, Nove
First, I want to thank you for your efforts on Qubes OS, and for improving OS
security/privacy in general. I am new to Qubes OS, have been enjoying it a lot,
and have a few questions:
* Primarily I would like to use Qubes for data science work. I understand that
OpenGL is not supported for secu
The error I get is 127, that should be "command not found" if I got it right...
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegrou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Nov 24, 2016 at 08:19:22AM -0800, Fabrizio Romano Genovese wrote:
> The error I get is 127, that should be "command not found" if I got it
> right...
Have you installed qubes-mgmt-salt-vm-connector in your default template
during upgrade to
W dniu czwartek, 24 listopada 2016 14:05:30 UTC+1 użytkownik Opal Raava napisał:
> Hi all,
>
> I've not seen many docker posts, but for the heck of it I'd like to report on
> how I made an app-vm that has a website running in docker and reachable by
> everything connected to sys-firewall.
>
>
On Thursday, November 24, 2016 at 5:08:23 AM UTC-8, David Wylie wrote:
> Looking at the log file (which I can't copy/paste - shift-ctl-v & ctl_v just
> doesn't copy the log file contents like it says it will), the last entry is
>
> vga s->lfb_addr = f000 s->lfb_end = f100
>
>
> Don't k
Looks like qubes-mgmt-salt-vm-connector is already installed in my templates.
Are you sure the command is
pkg.uptodate: []
? This looks right in the salt documentation, but there is nothing else I can
think about...
--
You received this message because you are subscribed to the Google Group
Hello, i deleted the appvm for disposable-vm ... does anyone know how to
recreate it? Thanks.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr
I didn't follow the instructions properly. I modified the existing conf file
which gets overwritten. I copied it as per the instructions and it all works as
it should.
I hereby offer myself to be roundly whipped through the streets of Aberdeen.
Apologies, and thanks.
--
You received this mess
On 11/24/2016 03:57 AM, Pawel Debski wrote:
W dniu środa, 23 listopada 2016 00:34:09 UTC+1 użytkownik Drew White napisał:
On Tuesday, 22 November 2016 13:41:30 UTC+11, Loren Rogers wrote:
On 11/21/2016 06:24 PM, Drew White wrote:
On Tuesday, 22 November 2016 06:04:43 UTC+11, Loren Rogers w
On Thursday, November 24, 2016 at 5:30:52 PM UTC+1, Grzesiek Chodzicki wrote:
> W dniu czwartek, 24 listopada 2016 14:05:30 UTC+1 użytkownik Opal Raava
> napisał:
> > Hi all,
> >
> > I've not seen many docker posts, but for the heck of it I'd like to report
> > on how I made an app-vm that has
W dniu czwartek, 24 listopada 2016 14:51:14 UTC+1 użytkownik Marek
Marczykowski-Górecki napisał:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Wed, Nov 23, 2016 at 10:48:23PM -0800, tom...@gmail.com wrote:
> > So, after Marek's fix here,
> > https://github.com/QubesOS/qubes-issues/i
10.137.2.0/24 is a network specification of all hosts, a way of saying
10.137.2.*, i dont think the ip number of the sys-firewall comes into it. Its
probably got an ip of 10.137.2.1 orso
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
I am interested in purchasing the Purism Librem 13 laptop and noticed that it
was supported for Qubes R3.x but not R4.x.
Is this because of some hardware issues or because R4.x hasn't been released
yet? Would it make sense to wait for R4.x before purchasing?
--
You received this message becau
W dniu czwartek, 24 listopada 2016 20:53:08 UTC+1 użytkownik rspei...@gmail.com
napisał:
> I am interested in purchasing the Purism Librem 13 laptop and noticed that it
> was supported for Qubes R3.x but not R4.x.
>
> Is this because of some hardware issues or because R4.x hasn't been released
On Thu, Nov 24, 2016 at 3:00 PM, Grzesiek Chodzicki
wrote:
> W dniu czwartek, 24 listopada 2016 20:53:08 UTC+1 użytkownik
> rspei...@gmail.com napisał:
>> I am interested in purchasing the Purism Librem 13 laptop and noticed that
>> it was supported for Qubes R3.x but not R4.x.
>>
>> Is this bec
W dniu czwartek, 24 listopada 2016 21:06:45 UTC+1 użytkownik Jean-Philippe
Ouellet napisał:
> On Thu, Nov 24, 2016 at 3:00 PM, Grzesiek Chodzicki
> wrote:
> > W dniu czwartek, 24 listopada 2016 20:53:08 UTC+1 użytkownik
> > rspei...@gmail.com napisał:
> >> I am interested in purchasing the Puris
Thanks for you feedback. I heard that Coreboot was released for Librem 13 by a
3rd party. Is that not open enough or is it that it hasn't been officially
accepted by Librem?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from th
I would like to use Qubes for development work in Rust. I understand that Rust
can eliminate many different sorts of memory related bugs. Would it be helpful
to use in Qubes OS development for improving security? Are there any security
concerns to prevent using Rust? For example, the Qubes GUI c
I would like to use Qubes for data science work. I understand that OpenGL is
not supported for security concerns. I'm wondering whether I could use a OpenCL
on a GPU in Qubes for running deep learning algorithms. I'm leaning towards
getting an AMD Vega GPU when it comes out. I guess what I am wo
Thanks for your feedback. I heard that Coreboot was released for Librem 13 by a
3rd party. Is that not open enough or is it that it hasn't been officially
accepted by Librem?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from t
On 11/19/2016 10:31 PM, Marek Marczykowski-Górecki wrote:
Yes, exactly
Is it possible to check non encrypted boot part of the disk for
checksums after OS was loaded and warn user about some changes? ( or
check some files on boot part)
Is it a good idea?
Or maybe some USB disk with loader w
On Thu, Nov 24, 2016 at 11:59:43AM -0500, Shpendi Dika wrote:
> Hello, i deleted the appvm for disposable-vm ... does anyone know how to
> recreate it? Thanks.
>
I assume you deleted something like fedora-23-dvm
You can regenerate it from dom0 konsole:
qvm-create-default-dvm fedora-23
Or create a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Nov 24, 2016 at 12:51:41PM -0800, rspeiglv...@gmail.com wrote:
> Thanks for your feedback. I heard that Coreboot was released for Librem 13 by
> a 3rd party. Is that not open enough or is it that it hasn't been officially
> accepted by Libr
I am interested in knowing hardware details for my pc and want to run lshw on
dom-0.
How can I install it on dom-0? Is there any alternative to it that is already
present on dom-0?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
Thanks Marek... that was very helpful. Realistically speaking... could I
purchase the Librem 13, install the Coreboot firmware and then it make be
compatible with R4.x?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this gr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Nov 24, 2016 at 02:30:30PM -0800, rspeiglv...@gmail.com wrote:
> Thanks Marek... that was very helpful. Realistically speaking... could I
> purchase the Librem 13, install the Coreboot firmware and then it make be
> compatible with R4.x?
A
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 25, 2016 at 12:19:14AM +0300, Eva Star wrote:
> On 11/19/2016 10:31 PM, Marek Marczykowski-Górecki wrote:
>
> > Yes, exactly
>
> Is it possible to check non encrypted boot part of the disk for checksums
> after OS was loaded and warn us
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Nov 24, 2016 at 11:08:33AM -0800, Grzesiek Chodzicki wrote:
> W dniu czwartek, 24 listopada 2016 14:51:14 UTC+1 użytkownik Marek
> Marczykowski-Górecki napisał:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On Wed, Nov 23,
On Thu, Nov 24, 2016 at 10:29 AM, wrote:
> * Primarily I would like to use Qubes for data science work. I understand
> that OpenGL is not supported for security concerns. I'm wondering whether I
> could use a OpenCL on a GPU in Qubes for running deep learning algorithms.
> Would this be suppor
On Thu, Nov 24, 2016 at 3:44 PM, wrote:
> I would like to use Qubes for development work in Rust. I understand that
> Rust can eliminate many different sorts of memory related bugs. Would it be
> helpful to use in Qubes OS development for improving security? Are there any
> security concerns t
On Friday, 25 November 2016 07:11:15 UTC+11, Loren Rogers wrote:
> On 11/24/2016 01:39 PM, Loren Rogers wrote:
> >
> >
> > On 11/24/2016 03:57 AM, Pawel Debski wrote:
> >> W dniu środa, 23 listopada 2016 00:34:09 UTC+1 użytkownik Drew White
> >> napisał:
> >>> On Tuesday, 22 November 2016 13:41:3
On Friday, 25 November 2016 09:11:09 UTC+11, grv wrote:
> I am interested in knowing hardware details for my pc and want to run lshw on
> dom-0.
>
> How can I install it on dom-0? Is there any alternative to it that is already
> present on dom-0?
as root, run
[root@dom0 ]$ qubes-dom0-updat
On Thu, Nov 24, 2016 at 8:51 AM, Marek Marczykowski-Górecki
wrote:
> Actually, generic PCI passthrough should just work in both cases now.
> Don't know if GPU passthrough is any special here, but I wouldn't be
> surprised if it is...
At least for intel-integrated stuff I can confirm that it defin
Is there any way that I can pass through all real hardware specifics to the
guest to make it not think it's running under xen? (primarily Windows)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
Purism laptops are new intel so they will never have real coreboot
support, only FSP shimboot which is a black box that does most of the work.
Its pointless, honestly you might as well just get an AMD (with
iommu/amd-vi) laptop if you want to avoid ME (just make sure it does not
have AMD PSP,
On 25.11.2016 01:44, taii...@gmx.com wrote:
Purism laptops are new intel so they will never have real coreboot
support, only FSP shimboot which is a black box that does most of the
work.
Its pointless, honestly you might as well just get an AMD (with
iommu/amd-vi) laptop if you want to avoid ME
Error occurrs for no reason.
This is all the information it tells me.
It extracts each file one at a time, so there should be no issue.
Any advice on what is wrong?
Extracting data: 48.4 GiB to restore
Some errors occurred during data extraction, c
How do I attach am IMG to appear as an FDD?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send
On Thu, Nov 24, 2016 at 6:55 PM, Drew White wrote:
> Is there any way that I can pass through all real hardware specifics to the
> guest to make it not think it's running under xen? (primarily Windows)
Malware trying to determine if it's on bare metal will likely always
be able to do so, other c
On Friday, 25 November 2016 14:30:43 UTC+11, Jean-Philippe Ouellet wrote:
> On Thu, Nov 24, 2016 at 6:55 PM, Drew White wrote:
> > Is there any way that I can pass through all real hardware specifics to the
> > guest to make it not think it's running under xen? (primarily Windows)
>
> Malware t
56 matches
Mail list logo