Yes,
thanks, I have installed Mirage Firewall.
Some more info that might interest people here. I got some answers from a
developer of stage1-xen rkt:
https://github.com/rkt/stage1-xen/issues/1#issuecomment-356764768
Also in December Xen launched a new initiative for unikernals, called
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
> On Wednesday, 10 January 2018 18:32:39 GMT Chris Laprise wrote:
>> I also have a download-able project that makes the scripted/antileak
>> setup fairly simple in Qubes R4.0:
>
> Please
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-10 16:30, 'awokd' via qubes-users wrote:
> On Wed, January 10, 2018 5:13 pm, Pawel G wrote:
>> I upgraded dom0 from fedora-24 to fedora-25 on Qubes r3.2.
>
> Well there's the problem! :) Ordinarily, you should not upgrade
> dom0. There's
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-10 15:22, dangmad...@gmail.com wrote:
> Does anyone have any experience converting a Debian Template to a
> Kali Template, with TemplateBasedVMs?
>
Take a look at this, if you haven't already:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-08 12:35, taii...@gmx.com wrote:
> Is there any news on a fix or work-around coming for 3.2?
>
> Converting all the templates to HVM is doable and would greatly
> improve security, in light of the severity of these exploits I see
> no
I recently had to make a fresh Qubes install.
Been trying all night to upgrade from 23 to 26 by different means but it
doesn't seem possible.
I don't seem to be able to download the 26 template either... It says all
mirrors have been used and it fails.
Help ?
--
You received this message
After following the instructions for using the fedora 26 template, it does not
show in the app menu as disposable, only as "Domain: fedora-26-dvm".
I executed:
sudo qubes-dom0-update qubes-template-fedora-26
qvm-create -l red -t fedora-26 fedora-26-dvm
qvm-prefs fedora-26-dvm
On Wednesday, January 10, 2018 at 9:35:41 AM UTC+1, Tim W wrote:
> On Tuesday, January 9, 2018 at 2:35:28 PM UTC-5, Chris Laprise wrote:
> > On 01/09/2018 05:17 AM, Roy Bernat wrote:
> > > On Tuesday, 9 January 2018 11:12:17 UTC+2, msg...@gmail.com wrote:
> > >> On Tuesday, January 9, 2018 at
On 01/10/2018 01:53 PM, 'Tom Zander' via qubes-users wrote:
On Wednesday, 10 January 2018 18:32:39 GMT Chris Laprise wrote:
I also have a download-able project that makes the scripted/antileak
setup fairly simple in Qubes R4.0:
Please consider updating the docs repo with this :-)
I poked the
On Saturday, June 25, 2016 at 7:49:39 PM UTC+2, cubit wrote:
> To use the Windows Key, it is `Mod4`
>
>
> "Mod4-c"
> "Mod4-v"
How did you figure that out?
I haven't been able to find documentation with a list available modifier names.
I tried using the names from `xev`'s output with no luck.
I recently installed qubes on my new laptop, but i think i accidently ticked
the box which configure qubes to use sysnet as usb qube, does someone know i
can revert this and usb a normal usb qube instead?
Cheers,
Blacklight447
--
You received this message because you are subscribed to the
Den onsdag den 10. januar 2018 kl. 10.05.32 UTC+1 skrev Rune Philosof:
> On Saturday, June 25, 2016 at 7:49:39 PM UTC+2, cubit wrote:
> > To use the Windows Key, it is `Mod4`
> >
> >
> > "Mod4-c"
> > "Mod4-v"
>
> How did you figure that out?
> I haven't been able to find documentation with a
Well i seen to be kinda stuck there.
Do i simply assign all usb to the new usb qube?
Original Message
On Jan 10, 2018, 11:18 AM, awokd wrote:
> On Wed, January 10, 2018 10:10 am, 'Blacklight447' via qubes-users wrote: > I
> recently installed qubes on my new laptop, but i
On Wed, January 10, 2018 11:07 am, 'Blacklight447' via qubes-users wrote:
> Well i seen to be kinda stuck there.
> Do i simply assign all usb to the new usb qube?
>
>
> Original Message
> On Jan 10, 2018, 11:18 AM, awokd wrote:
>
>
>> On Wed, January 10, 2018 10:10 am,
On Wed, January 10, 2018 10:10 am, 'Blacklight447' via qubes-users wrote:
> I recently installed qubes on my new laptop, but i think i accidently
> ticked the box which configure qubes to use sysnet as usb qube, does
> someone know i can revert this and usb a normal usb qube instead?
Look through
On Sunday, January 7, 2018 at 10:14:26 AM UTC-8, haaber wrote:
> > https://i.redditmedia.com/5mA7LrMiwgmmhrwfYF8Jks0WEng66fxWoCcGw33dhCA.jpg?w=597=339d919645f1de31a42913c748d1d7fb
> I personally consider
> this troll post.
That Red Pill is a bitter one, isn't it?
--
You received this message
The official templates use nftables so shouldn’t be mixed with iptables. I
didn’t have time to learn about nftables, so just removed nftables package from
debian 9 template. YMMV.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
Hi Qubes Community,
I have not received even one notice of interest. Can it really be that here in
"Crypto Valley", there are no security and privacy concerned enthusiasts who
has some spare time and need some cash for spare expenses whilst doing some
interesting and independent work ..?
I
I upgraded dom0 from fedora-24 to fedora-25 on Qubes r3.2.
After reboot, I can login, GUI starts, I'm able to open dom0 Terminal window
etc. but Qubes Manager is not running, I can't start VMs:
"Failed to execute child process "qvm-run" (No such file or directory)."
"journaltcl | grep Fail"
On Wed, January 10, 2018 8:35 pm, dangmad...@gmail.com wrote:
> On Sunday, January 7, 2018 at 10:14:26 AM UTC-8, haaber wrote:
> That Red Pill is a bitter one, isn't it?
I don't trust ME either and run me_cleaner but that link is just some
unsubstantiated text. If he'd really been working at
Meltdown can be mitigated by using HVM/PVH. If you look at the XSA, they also
have prepared PV-in-PVH mode that mitigates it also for PVs. (This probably
won't work for CPUs without VT-x/AMD-v, but those are rare today. It also
probably won't work for VMs with PCI devices if system does not
Does anyone have any experience converting a Debian Template to a Kali
Template, with TemplateBasedVMs?
I would also be interested in playing with a debian template converted to Linux
Mint Debian Edition or BunsenLabs (CrunchBang).
Or possibly an Ubuntu converted to Linux Mint. (But ubuntu
Hello,
Maybe somebody can help me with python3 on fedora 25 template?
There is not google.protobuf package at fedora 25
It's possible to install it with sudo pip3 install protobuf
But it does not load when script call it "import google.protobuf"
Also it can not be loaded with included
On 01/10/2018 05:34 PM, Vít Šesták wrote:
Maybe absence of suitable hardware is the reason why we don't have it.
The target I imagine would be ARM servers with performance ARM CPU's
such as the ones from Gigabyte running AppliedMicro CPU's.
Unlike the high performance POWER these ARM CPU's
Fedora 25 is unsupported and no longer receiving security updates, I
would update to Fedora 26 and check back.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Wed, January 10, 2018 5:13 pm, Pawel G wrote:
> I upgraded dom0 from fedora-24 to fedora-25 on Qubes r3.2.
Well there's the problem! :) Ordinarily, you should not upgrade dom0.
There's an article somewhere that explains why, but basically it's not
touched by the other VMs so there's no reason.
Quick googling suggests that ARM has kind of IOMMU and there is Xen for ARMv8
and even ARMv7. Everything looks doable at first sight. I am not sure how large
class of ARM CPUs is ready for that nowadays, though.
Maybe it would not be so hard. In theory, I see no component where just
changing
On Wed, January 10, 2018 10:21 pm, Vít Šesták wrote:
> Meltdown can be mitigated by using HVM/PVH. If you look at the XSA, they
> also have prepared PV-in-PVH mode that mitigates it also for PVs. (This
I pointed this one out too last week, sounds interesting.
> probably won't work for CPUs
Am I the only one to notice you brought up POWER/TALOS something like
five times in the last week, even when the thread originally had nothing
to do with it (like this one)?
I get it you're enthusiastic about an open processor getting actually
used (unlike RISCV) (and must say I am too), but it's
On Tuesday, January 9, 2018 at 2:35:28 PM UTC-5, Chris Laprise wrote:
> On 01/09/2018 05:17 AM, Roy Bernat wrote:
> > On Tuesday, 9 January 2018 11:12:17 UTC+2, msg...@gmail.com wrote:
> >> On Tuesday, January 9, 2018 at 2:11:06 PM UTC+7, Tim W wrote:
> >>> On Tuesday, January 9, 2018 at 1:16:10
30 matches
Mail list logo