[qubes-users] Salt updates fails on Fedora-33

2021-03-02 Thread lok...@gmail.com
After I installed the fedora-33 template a few days ago, I have never been 
able to do a software update on it using the Salt-based updater. A manual 
update using "dnf update" works fine.

This is the error I'm getting in the updater tool:

Is this a known problem, and is there some easy way to fix this?

-
Updating fedora-33

Error on updating fedora-33: Command '['sudo', 'qubesctl', '--skip-dom0', 
'--targets=fedora-33', '--show-output', 'state.sls', 'update.qubes-vm']' 
returned non-zero exit status 20
fedora-33:
  --
  _error:
  Failed to return clean data
  retcode:
  1
  stderr:
  Traceback (most recent call last):
File "/var/tmp/.root_dd8a91_salt/salt-call", line 27, in 

  salt_call()
File "/var/tmp/.root_dd8a91_salt/pyall/salt/scripts.py", line 
445, in salt_call
  client.run()
File "/var/tmp/.root_dd8a91_salt/pyall/salt/cli/call.py", line 
48, in run
  caller = salt.cli.caller.Caller.factory(self.config)
File "/var/tmp/.root_dd8a91_salt/pyall/salt/cli/caller.py", 
line 64, in factory
  return ZeroMQCaller(opts, **kwargs)
File "/var/tmp/.root_dd8a91_salt/pyall/salt/cli/caller.py", 
line 329, in __init__
  super(ZeroMQCaller, self).__init__(opts)
File "/var/tmp/.root_dd8a91_salt/pyall/salt/cli/caller.py", 
line 89, in __init__
  self.minion = salt.minion.SMinion(opts)
File "/var/tmp/.root_dd8a91_salt/pyall/salt/minion.py", line 
912, in __init__
  opts["grains"] = salt.loader.grains(opts)
File "/var/tmp/.root_dd8a91_salt/pyall/salt/loader.py", line 
825, in grains
  ret = funcs[key]()
File "/var/tmp/.root_dd8a91_salt/pyall/salt/grains/core.py", 
line 2384, in ip_fqdn
  ret["ipv6"] = 
salt.utils.network.ip_addrs6(include_loopback=True)
File "/var/tmp/.root_dd8a91_salt/pyall/salt/utils/network.py", 
line 1353, in ip_addrs6
  return _ip_addrs(interface, include_loopback, interface_data, 
"inet6")
File "/var/tmp/.root_dd8a91_salt/pyall/salt/utils/network.py", 
line 1333, in _ip_addrs
  ret.add(addr)
File "/usr/lib64/python3.9/ipaddress.py", line 1920, in __hash__
  return hash((self._ip, self._scope_id))
  AttributeError: _scope_id
  stdout:

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8f30d150-f008-4a23-8d0b-cf074be23972n%40googlegroups.com.


Re: [qubes-users] Re: qrexec_timeout does not truly accept 360

2021-03-02 Thread unman
On Tue, Mar 02, 2021 at 03:24:31PM -0600, Rob Townley wrote:
> I really need this qube to run for over an hour without the hypervisor
> killing it.  Short of buying a much faster brand new machine, how does one
> do that?
> 
> On Mon, Mar 1, 2021 at 12:19 AM Rob Townley  wrote:
> 
> > qvm-prefs vmName qrexec_timeout 3600
> > does not return an error message.   When read, 3600 is returned.
> > However, the VM is forcibly stopped after 15 minutes.
> >
> > 1800 works
> > 2700 works
> > 3600 is not honored
> >
> > How can i get by this so this one VM can do finish its upgrade before
> > forcibly rebooted?
> >
> 

There's a confusion here - qrexec-timeout is the time to wait on boot
for the qrexec agent to be connected.
If the qube isn't booting up then you have no chance of performing an
upgrade. You should fix that problem first. BUT...
The fact that "the VM is forcibly stopped after 15 minutes" suggests to
me that you have the idleness monitor enabled, since this *does* have a
default shutdown time of 15 mins.
Can you check to see if you have the shutdown-idle service enabled this
qube?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20210303015840.GA8710%40thirdeyesecurity.org.


[qubes-users] Re: qrexec_timeout does not truly accept 3600

2021-03-02 Thread Rob Townley
I really need this qube to run for over an hour without the hypervisor
killing it.  Short of buying a much faster brand new machine, how does one
do that?

On Mon, Mar 1, 2021 at 12:19 AM Rob Townley  wrote:

> qvm-prefs vmName qrexec_timeout 3600
> does not return an error message.   When read, 3600 is returned.
> However, the VM is forcibly stopped after 15 minutes.
>
> 1800 works
> 2700 works
> 3600 is not honored
>
> How can i get by this so this one VM can do finish its upgrade before
> forcibly rebooted?
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CA%2BVdTb8pC%2Bxv5XpFZ9%2B2Fow4WK%2BHDo%2Bq8UdkqZMWA1VwbzpsPA%40mail.gmail.com.


Re: [qubes-users] Re: Howto grab/capture sound of one VM

2021-03-02 Thread gorki via qubes-users
Am 23.02.21 um 17:25 schrieb Steve Coleman:
> 
> 
> ...
> 
> Not sure exactly what you mean by capture. To play the audio, or record it?
> 
> Look at the pulse audio configuration apps inside that VM. You should be
> able to figure out what device channels are processing sound by looking
> at the audio volume meters inside that VM.
> 
> If recording it is what you want then look for a sound recorder app in
> that VM. If playing the sound is what you want then look at the
> pulseaudio controls in dom0.

I cannot record inside the VM, the app doesn't allow saving the stream.
But the data should somehow pass the Dom0 I guess.
So there (I wish) it should be possible to 'cat < VMsoundIO >
Audiofile.raw" (or similar  )

Just curious
G.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0f4a9e8-1592-f623-9453-8637e6f02720%40ixls.eu.


[qubes-users] Re: Doing all DNS calls using DoH over Tor

2021-03-02 Thread liked2

On 2/28/21 11:51 PM, unman wrote:

On Sun, Feb 28, 2021 at 12:37:49PM +, liked2-mmb7mzph...@public.gmane.org 
wrote:

On 8/2/20 11:46 AM, Kushal Das wrote:

Hi,

I wrote a blog post [0] explaining the steps required to move all the DNS calls
to any secure DoH server using Tor (to keep the calls anonymized). Here I am
modifying sys-firewall as the primary netwvm for the other AppVMs.

[0] https://kushaldas.in/posts/use-doh-over-tor-for-your-qubes-system.html

Kushal



Thanks Kushal!

I was using your setup successfully until changing the template from fedora 32 
to fedora 33. Unfortunately, I cannot figure out why it stopped working. 
Switching back to fedora 32 works again.

Any ideas?



Read the announcement about the Fedora33 template, and you'll see a
specific section on the handling of DNS, I think.



1) Marmarek reccomends in this comment: 
https://www.zeit.de/wirtschaft/2021-02/einfamilienhaeuser-klimaschutz-debatte-eigenheim-gruene-
stadt-land?utm_source=pocket-newtab-global-de-DE
to add a .lan suffix.

2) Another suggestion is 
https://www.zeit.de/wirtschaft/2021-02/einfamilienhaeuser-klimaschutz-debatte-eigenheim-gruene-
stadt-land?utm_source=pocket-newtab-global-de-DE

to disable systemd-resolved and enable NetworkManager.

I can't imagine how 1) would help with that setup. Are there suggestions how to 
accomplish 2)?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f00d731c-ed26-14aa-53e0-e3e4a6d90219%40gmx.de.


Re: [qubes-users] Unable to get VPN to ping out. Unable to set up ProxyVM as sys-vpn

2021-03-02 Thread Stumpy

On 3/1/21 7:36 PM, 'awokd' via qubes-users wrote:

roberto re:


I've looked around but I can't seem to find any up-to-date, uncomplicated
step by step guide to get a fail closed, antileak VPN tunnel environment.


https://github.com/QubesOS-contrib/qubes-tunnel



Sorry I dont have any words of wisdom, I have literally posted for weeks 
actually trying to get a functional VPN, I have gotten it to work using 
the iptables cli method, and once using the qubes tunnel method (was 
easy the one time it worked for me).


Honestly while there are those who have gotten it going I am thinking 
there are bugs or something esp for those who want to use minimal 
non-fedora templates... but thats just me.


Best of luck.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37a4d58e-c0cc-4147-4024-a0243c51dcd0%40posteo.co.


[qubes-users] How screwed am I? (corrupt backup files?)

2021-03-02 Thread Stumpy
I have a bunch of backups... all in one place... and it seems most of 
them have been borked in some way. I have tried to restore 50gb backups 
using qube manager and end up with empty appvms (that show a size of 0mb 
in qubes manger and as far as i can tell are empty when i start them up 
and look in them), though with many of the restores I dont get errors?


I am trying to figure out how to restore them manually per the qubes 
emergency restore doc page and am getting errors like:


[user@disp9624 appvms2salvage]$ sudo tar -i -xvf 
qubes-2019-12-14T162028_shuttle -C ~/Templates/

backup-header
backup-header.hmac
qubes.xml.000.enc
dom0-home/bob.000.enc
tar: Skipping to next header
tar: Archive contains ‘Q\352\334\\\275h\274\202B*\275s’ where numeric 
off_t value expected
tar: Archive contains ‘I\221\272\031\205\325\314۴5\373\377’ where 
numeric off_t value expected
tar: Archive contains ‘\037\2571\344\323\377ȧD\204\t"’ where numeric 
off_t value expected
tar: Archive contains ‘p\177\246\257\371\215\243Bqp[\350’ where numeric 
off_t value expected
tar: Archive contains ‘\210\265\225\265[\313\311i\205!TI’ where numeric 
off_t value expected
tar: Archive contains ‘\255\220.\217\232\254j\247\326\325\355\303’ where 
numeric off_t value expected
tar: Archive contains ‘\032q&\345\377k\005\342.value expected
tar: Archive contains ‘ע8"]T\310pr'\0\353’ where numeric off_t value 
expected
tar: Archive contains ‘Q\241\371x\216\244AȞ\350?\343’ where numeric 
off_t value expected
tar: Archive contains ‘a\023\2478\223\320\363S\231\275\345\320’ where 
numeric off_t value expected
tar: Archive contains ‘\034v\320\313j7\262v\362\033G\002’ where numeric 
off_t value expected
tar: Archive contains ‘\317\r\367Z\241.\256\017\036r[\342’ where numeric 
off_t value expected

vm3/root.img.025.enc
tar: Skipping to next header
tar: Archive contains ‘!\017\257\f\317f\356\r\273\377\271\t’ where 
numeric off_t value expected
tar: Archive contains ‘ؽY--f\212\317\025%\371\177’ where numeric off_t 
value expected
tar: Archive contains ‘\241\227w\376\235f\347\263\366\025\342M’ where 
numeric off_t value expected
tar: Archive contains ‘\331(\330n\372\352\033\343ٷ߉’ where numeric off_t 
value expected
tar: Archive contains ‘\337\323\002h\315\371\002w\242\334\355\031’ where 
numeric off_t value expected
tar: Archive contains ‘\001\327£\375\034[-QV7\036’ where numeric off_t 
value expected
tar: Archive contains ‘k\020\327\023\210Cq\b[5\334 ’ where numeric off_t 
value expected
tar: Archive contains ‘\255\273Y\273\360\004u\276\360\027\270M’ where 
numeric off_t value expected
tar: Archive contains ‘[-\244\206\260(&\220\246)’ where numeric off_t 
value expected
tar: Archive contains ‘\a\002\251\354 ݓ-t\031h\037’ where numeric off_t 
value expected
tar: Archive contains ‘8\362\241\251\360Ah\255-\272\f^’ where numeric 
off_t value expected
tar: Archive contains ‘\353\250\317\342\260\\\356\362\301;\303\311’ 
where numeric off_t value expected
tar: Archive contains ‘\001Z\223\220ɜ\327j\360\235fA’ where numeric 
off_t value expected
tar: Archive contains ‘Ő\267\033z0_\264\326_-\326’ where numeric off_t 
value expected
tar: Archive contains ‘\316\354\330Țv|w\027\311%\370’ where numeric 
off_t value expected
tar: Archive contains ‘\233\215\351K\226\303BH\241\250<\337’ where 
numeric off_t value expected
tar: Archive contains ‘\376:{\204\362\312$\267\223\205\310p’ where 
numeric off_t value expected
tar: Archive contains ‘\236\226\3258+~\245\033\003~\376\022’ where 
numeric off_t value expected
tar: Archive contains ‘\260\341D\266\241[\224~\303\037\220\263’ where 
numeric off_t value expected
tar: Archive contains ‘w\360<\215\023\212\315:p:^\003’ where numeric 
off_t value expected
tar: Archive contains ‘\227\177\212\211FF\375\360Oe\201\232’ where 
numeric off_t value expected
tar: Archive contains ‘\247;\347P\306M\035a\213\350-\221’ where numeric 
off_t value expected
tar: Archive contains ‘\356b\372\212\326S\230H\320s\261w’ where numeric 
off_t value expected
tar: Archive contains ‘J\263\236[\034&"ƭ\344%\336’ where numeric off_t 
value expected
tar: Archive contains ‘\323Uy\260\225X/a\314\020] ’ where numeric off_t 
value expected
tar: Archive contains ‘P;\a\300\214E\304\026\373\314D\353’ where numeric 
off_t value expected
tar: Archive contains ‘nW\273B"\224\366*\334|\241R’ where numeric off_t 
value expected
tar: Archive contains ‘@\214\027D*\342-u\034}\214x’ where numeric off_t 
value expected
tar: Archive contains ‘\016\364\236DV\314\020\302]N\035y’ where numeric 
off_t value expected
tar: Archive contains ‘\362\307"\031\277y\330څ\021\304\320’ where 
numeric off_t value expected
tar: Archive contains ‘\375k\374\206\235j+\016W=w\215’ where numeric 
off_t value expected

tar: Exiting with failure status due to previous errors

Can someone explain how bad things are looking from these errors?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails 

Re: [qubes-users] Migrating to Qubes OS

2021-03-02 Thread Flex


> 
> Am 02.03.21 um 01:21 schrieb 'awokd' via qubes-users:
>> For 1 & 2, have you attempted the steps under
>> https://www.qubes-os.org/doc/usb-qubes/#manual-setup ?
>>
>> 3 Does your VPN provider support OpenVPN? It's better. If so,
>> https://github.com/QubesOS-contrib/qubes-tunnel is probably the best
>> approach. Otherwise, try
>> https://www.mail-archive.com/qubes-users@googlegroups.com/msg02913.html.
>>
>> 4 Unknown
>>
>> 5 Only fix I can think of might be to switch the desktop from xfce to
>> something like i3, but haven't attempted that.
> 
> 1&2: I had a look into that but did not try yet as I was afraid of
> breaching the security of dom0, but if it is the only workaround
> possible I might take that risk.
> Would https://www.qubes-os.org/doc/usb-qubes/#automatic-setup do the same?
> Further I am not sure if that will solve the keyboard layout problem or
> has a potential to make things worse?
> 
> 3: My VPN Provider reccommends IKEv2 strongswan but PPTP is mentioned as
> well and worked fine using Ubuntu. After PPTP failed I tried strongswan
> with a debian VM but although the connection seems to work for a few
> moments (not really, but it just displays a notification the connection
> was established succesfully) and then displays an error message the
> connection failed.
> The providers reply was the default-route might not point to the
> VPN-Interface, which seems to be the case referring to the output of 'ip
> route'.
> 
> 5 As far as I understood Qubes is quite bound to xfce as a desktop
> environment at the moment and problems might occur when switching,
> therefore I am not keen to try this.
> Would it be safe to use "Session and Startup" of dom0 to autostart
> Applications and is there a command to assign a workspace to each
> specific App or restore the session (tried ticking the option but no
> changes)?
> 

Regarding 1&2 would it be possible to clone the usb-qube and then sort
the usb-controllers to both qubes and giving one usb-controller the
access to dom0 as described in
https://www.qubes-os.org/doc/usb-qubes/#automatic-setup ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20fd49a7-cb40-95bd-9140-5c75640b1cf2%40posteo.de.


Re: [qubes-users] Migrating to Qubes OS

2021-03-02 Thread Janosh



Am 02.03.21 um 01:21 schrieb 'awokd' via qubes-users:
> For 1 & 2, have you attempted the steps under
> https://www.qubes-os.org/doc/usb-qubes/#manual-setup ?
> 
> 3 Does your VPN provider support OpenVPN? It's better. If so,
> https://github.com/QubesOS-contrib/qubes-tunnel is probably the best
> approach. Otherwise, try
> https://www.mail-archive.com/qubes-users@googlegroups.com/msg02913.html.
> 
> 4 Unknown
> 
> 5 Only fix I can think of might be to switch the desktop from xfce to
> something like i3, but haven't attempted that.

1&2: I had a look into that but did not try yet as I was afraid of
breaching the security of dom0, but if it is the only workaround
possible I might take that risk.
Would https://www.qubes-os.org/doc/usb-qubes/#automatic-setup do the same?
Further I am not sure if that will solve the keyboard layout problem or
has a potential to make things worse?

3: My VPN Provider reccommends IKEv2 strongswan but PPTP is mentioned as
well and worked fine using Ubuntu. After PPTP failed I tried strongswan
with a debian VM but although the connection seems to work for a few
moments (not really, but it just displays a notification the connection
was established succesfully) and then displays an error message the
connection failed.
The providers reply was the default-route might not point to the
VPN-Interface, which seems to be the case referring to the output of 'ip
route'.

5 As far as I understood Qubes is quite bound to xfce as a desktop
environment at the moment and problems might occur when switching,
therefore I am not keen to try this.
Would it be safe to use "Session and Startup" of dom0 to autostart
Applications and is there a command to assign a workspace to each
specific App or restore the session (tried ticking the option but no
changes)?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afd105d1-2c7a-0d9f-544b-a7c5426dd19c%40posteo.de.


Re: [qubes-users] qrexec_timeout does not truly accept 3600

2021-03-02 Thread 'awokd' via qubes-users

Rob Townley:

qvm-prefs vmName qrexec_timeout 3600
does not return an error message.   When read, 3600 is returned.
However, the VM is forcibly stopped after 15 minutes.

1800 works
2700 works
3600 is not honored

How can i get by this so this one VM can do finish its upgrade before
forcibly rebooted?

Think you can disable qrexec with "qvm-features [vmname] qrexec 0". Do 
this on the template. Set back to 1 when done.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38ea9107-5d4d-8042-fbd6-b0777c70a5cc%40danwin1210.me.


Re: [qubes-users] Unable to get VPN to ping out. Unable to set up ProxyVM as sys-vpn

2021-03-02 Thread 'awokd' via qubes-users

roberto re:


I've looked around but I can't seem to find any up-to-date, uncomplicated
step by step guide to get a fail closed, antileak VPN tunnel environment.


https://github.com/QubesOS-contrib/qubes-tunnel

--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a842f938-57ef-6a87-018f-a23897992a4b%40danwin1210.me.


Re: [qubes-users] trouble with apt-get on dabian

2021-03-02 Thread 'awokd' via qubes-users

Steve Coleman:


Apparently, I need to reinstall a new fedora-33 template baseline and
painstakingly install all these packages one at a time while restarting
Debian-10 to try an 'apt-get update' between package installs. Somewhere
along the way, it will break and whatever I just installed will be the
culprit. I think I'll be doing a lot of cloning of templates creating
checkpoints along the way.


Good find. Hope my suggestions didn't cost you too much time.

Depending how many packages you're talking about, a binary search might 
help- install half of them recursively.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b78adc2-73b3-b0d2-58ac-f3f1b2227eca%40danwin1210.me.


Re: [qubes-users] Migrating to Qubes OS

2021-03-02 Thread 'awokd' via qubes-users

Flex:

Hello,

migrating from Ubuntu 20.04 to Qubes OS I have still quite a few
problems I ran into and could not solve yet using the documentation etc.

1. I need to use an external USB-Keyboard which is plugged into the
docking station of my X230 Thinkpad. I can connect the Keyboard to one
running VM using sys-usb but this results in a falsely changed keyboard
layout (US instead of DE) and I need to reboot to reset this as the
built in keyboard layout is affected in the same way.

2. Further it would be great to know how to automatically connect to
several selected VM after boot without connecting it directly to dom0 or
if not possible how to connect it to dom0 as I was not able to
understand the many different options mentioned in the documentation etc.

3. The sys-net VPN (PPTP) is not working although the settings are the
same as using Ubuntu, where it connected. Is there a way to get the VPN
up and running?

4. The qubes add on for thunderbird is not compatible with thunderbird
78 is it planned to upgrade it soon?

5. When disconnecting from the docking station to which the 2nd screen
is connected to, the windows are not automatically resized/-grouped so
it is kind of hard to access those invisible on the second screen which
is no longer attached, is there a way to improve this?

That is it for now though I might run in to more issues the coming days.
Hope you can help me especially with the first and 3rd issue as those
are most urgent.

Many thanks!
Flex

For 1 & 2, have you attempted the steps under 
https://www.qubes-os.org/doc/usb-qubes/#manual-setup ?


3 Does your VPN provider support OpenVPN? It's better. If so, 
https://github.com/QubesOS-contrib/qubes-tunnel is probably the best 
approach. Otherwise, try 
https://www.mail-archive.com/qubes-users@googlegroups.com/msg02913.html.


4 Unknown

5 Only fix I can think of might be to switch the desktop from xfce to 
something like i3, but haven't attempted that.

--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c183f83-3637-87b0-6dbc-2474328e2439%40danwin1210.me.


Re: [qubes-users] trouble with apt-get on dabian

2021-03-02 Thread Mike Keehan

On 3/1/21 11:48 AM, Mike Keehan wrote:



HI,

Just a "me too" I'm afraid.  I installed Fedora 33, and used it for all
the sys-vms, and my sys-net would not connect to wifi - kept displaying
the prompt for the wifi password, even though the password was correct.

Switched back to Fedora 32 on sys-net, and it works OK again.

(I also had my screen freeze at one point - might be due to the i915
driver update.  Had this problem a long time ago when using the Arch
distro, but never on Qubes before.)

Just monitoring things for now.

Mike.



Did an update and now it works fine.  Silly me.

Mike.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0d3ee0e3-7353-3f84-654b-5bb776efdefd%40keehan.net.