Re: [qubes-users] HCL Report for: Lenovo T14s AMD Ryzen 7 5850U PRO (20XF004VUS)

2022-04-20 Thread Sven Semmler

Thank you Roland for your HCL report, which is 
[online](https://www.qubes-os.org/hcl/#lenovo_thinkpad-t14s-20xf004vus_ryzen-7-pro-5850u_amd_integrated-graphics-cezanne)
 now!

/Sven

--
 public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8b39290-523a-c825-2051-fcf12b75ed0b%40SvenSemmler.org.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-users] Whonix support for Qubes 4.0 has ended

2022-04-20 Thread Andrew David Wong

Dear Qubes Community,

As a final reminder following our previous announcements [1][2], Whonix
support for Qubes 4.0 ends today, 2022-04-20.

## How does Whonix support work?

While Qubes OS releases are supported for six months [3] following each
subsequent major or minor release, Whonix templates have their own
support policy [4] set by the Whonix Project. This policy requires
Whonix template users to stay reasonably close to the cutting edge by
upgrading to new stable releases of Qubes OS and Whonix templates within
a month of their respective releases. To be precise:

- One month after a new stable version of Qubes OS is released, Whonix
  templates are no longer supported on any older release of Qubes OS.
  This means that users who wish to continue using Whonix templates on
  Qubes are usually required to upgrade to the latest stable Qubes OS
  version within one month of its release (unless the deadline is
  extended, as it has been in this case).

- One month after new stable versions of Whonix templates are released,
  older releases of Whonix templates are no longer supported. This means
  that users who wish to continue using Whonix templates on Qubes are
  usually required to upgrade to the latest stable Whonix template
  versions within one month of their release. (This point doesn't apply
  to the present situation, since this announcement pertains to a new
  Qubes OS release, not a new Whonix template release. However, I'm
  mentioning it here for the sake of completeness, as it's part of the
  Whonix support policy.)

## What does this mean for you?

If you're currently using Whonix on Qubes 4.0, you should immediately
either upgrade to Qubes 4.1 [5] or discontinue the use of Whonix.

If you're already on Qubes 4.1, or you don't use Whonix templates,
then you're all set. This announcement doesn't change anything for you.


[1] 
https://www.qubes-os.org/news/2022/02/04/qubes-4-1-0/#support-for-older-releases
[2] 
https://www.qubes-os.org/news/2022/03/17/whonix-support-for-qubes-4-0-extended/

[3] https://www.qubes-os.org/doc/supported-releases/#qubes-os
[4] https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support
[5] https://www.qubes-os.org/doc/upgrade/4.1/

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/04/20/whonix-support-for-qubes-4-0-has-ended/

--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff13512e-ce28-ac54-edfd-9b7215b5caf1%40qubes-os.org.


Re: [qubes-users] Temporary failure in name resolution

2022-04-20 Thread Ludovic

On 19/04/2022 13:17, 'Rune Philosof' via qubes-users wrote:
After upgrading the following, I lost dns functionality in 
sys-firewall and all vms using sys-firewall.


Using tcpdump on sys-net, it does not seem to receive the dns query.

When I run `systemctl stop systemd-resolved` in an appvm, dns works again.

It's the https://github.com/QubesOS/qubes-issues/issues/7429 solved 
issue, but the package is not yet in the stable repository ( 
https://github.com/QubesOS/updates-status/issues/2901 is in the 
current-testing repository).


--

Ludovic

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c31c1ed1-36dc-e621-3083-604fd8dd32af%40zyrianes.net.