On Tuesday, 28 November 2017 03:07:02 CET Andrew David Wong wrote:
> On 2017-11-27 16:03, 'Tom Zander' via qubes-users wrote:
> > I have a ‘work’ VM which holds a significant amount of user-data
> > and as such I want my homedir to be hosted on my spinning-disk
> > drive.
On Tuesday, 28 November 2017 18:33:37 CET Foppe de Haan wrote:
> Bottom line IMO these days security can't be done by a layman,
Security as a concept is not that black / white, there is no 100% security
and likewise I fail to see how "laymen" can't increase their security.
As a quick example, in
On Tuesday, 28 November 2017 14:18:44 CET cooloutac wrote:
> Of course many feel Qubes is for more advanced users, and apparently that
> will become a self fulfilling prophecy in version 4.
Looking at the (lack of) UI tools at this time, you can be excused thinking
this. I personally think its
On Tuesday, 28 November 2017 03:38:02 CET Andrew David Wong wrote:
> Our position is that reasonable security
> via compartmentalization (of which Qubes is an implementation) requires
> the user to make informed decisions about how to compartmentalize
> various parts of their digital life into
I have a ‘work’ VM which holds a significant amount of user-data and as such
I want my homedir to be hosted on my spinning-disk drive.
I’m more than fine just using a standard btrfs partition there, I really like
the snapshotting option there, but this does imply I would need to
automatically
Hi,
I recently installed 3.2 and got the archlinux template working.
I updated it to the latest and got KDE working nicely.
One problem I have is that every single time I (re) start the templateVM, a
new file is created in /etc/pacman.d/
it is a file that adds a http-proxy address.
The result
Last week I briefly tried 4.0RC2, only to realize that things like the
archlinux package was just missing.
Since then I learned that it actually is part of the testing repository.
This makes me wonder, what is the procedure of promoting something from testing
up to current?
I mean, if its
On Wednesday, 29 November 2017 02:40:01 CET Genevieve Gauthier wrote:
> What do you need me to do ?
Please expain in a little more detail what versions of the software you were
using, what steps we might follow to reproduce the problem.
For instance which screen was the last thing that was on
On Wednesday, 29 November 2017 08:51:33 CET '[799]' via qubes-users wrote:
> As far as I have understand, the problem is not that the password is
> shown, but that the report with this error mistake and the password could
> get transferred. I don't want that my password gets transferred in some
>
On Thursday, 30 November 2017 03:30:35 CET Unman wrote:
> I think I must be missing your point - it might be clearer if you gave
> examples of tasks that these user interfaces would serve.
I think we have some great examples already which could use more love.
The devices app, which allows you to
On Thursday, 30 November 2017 11:07:56 CET Joe Hemmerlein wrote:
> However, the TPM chip on this hardware works in UEFI boot mode only
I think its a known issue that Qubes doesn't support EFI.
It ironically creates an efi partition, but the installer doesn't create the
right stuff to actually
On Monday, 27 November 2017 06:30:48 CET Yuraeitha wrote:
> I wonder how such misunderstandings, or false interpretations, can be
> avoided among the people, like me, who are learning about Qubes (and
> Linux in general). But that's something for another time and topic, but
> an interesting one
On Thursday, 30 November 2017 01:21:40 CET Stumpy wrote:
> I don't see why this wouldn't work, but at the same time, I thought
> better to be safe than sorry.
>
> I have two monitors (1920x) hooked up to my comp which has two video out
> ports, I wanted to add a 4k monitor and will have to add an
On Friday, 1 December 2017 00:37:47 CET Stumpy wrote:
> I am not so familiar with google groups but I don't have a google
> account
For those of us in that section of the population; you can subscribe to the
group without having a google account and get 100% of the emails in your
email
On Friday, 1 December 2017 06:03:56 CET Drew White wrote:
> What can I do (logically) to resolve this issue?
Silly idea; make the bottom of both monitors be the same on your Linux side,
that may sidestep the issue.
If nothing else, you can move the windows taskbar to the left side of your
On Monday, 4 December 2017 16:38:12 CET r...@tuta.io wrote:
> Vm manager...
It has been reduced to a single icon in your system tray.
Some features have been moved elsewhere (start menu has a config item per VM)
some are command-line only.
--
Tom Zander
Blog: https://zander.github.io
Vlog:
On Saturday, 16 December 2017 03:25:46 CET Yuraeitha wrote:
> Initially, this is all the reasons I can think of for wanting V-GPU.
...
> - Extending a single Qubes machine around the house or company, using
> multiple of screens, keyboards/mouses or other thinkable means.
This sounds inherently
On Sunday, 17 December 2017 11:59:26 CET Yuraeitha wrote:
> f, but from what I understand, complex software is hard to make secure,
> compared to well-made hardware minimizing use of software. If Qubes
> hypothetically were to adopt these, would the hardware approach be more
> secure here?
The
On Wednesday, 13 December 2017 00:49:14 CET Connor Page wrote:
> I’ll disagree with comparison of btrfs to lvm. there is a very significant
> difference between btrfs and lvm. btrfs is like a namespace and lvm
> volumes are block devices. one can put a namespace on a block device. but
> yes,
Last weeks there was a lot of talk about a lot of us missing the
qubes-manager, or frankly any sort of useful graphical user interface.
As I’m a long time programmer I decided to just give this a go and try to
get something useful going.
My approach is one where I talk directly to the Admin-API
On Sunday, 17 December 2017 19:59:36 CET donoban wrote:
> Any idea?
If you hit the ‘f’ key to go full screen, or use the application menu, then
you end up doing this using the application in the Qube.
Try to do it using the menu on the titlebar, which makes the trusted-window-
manager be the one
On Monday, 18 December 2017 10:13:48 CET pr0xy wrote:
> I am still a bit stuck concerning the Qubes Update Proxy. Where would I
> set the environment variables for my corporate proxy so that I could
> update dom0, templates and VMs?
You should add sys-net to your template VM if you want that
On Tuesday, 19 December 2017 16:33:49 CET Unman wrote:
> Tom
>
> Ive suggested before that if you give this advice you should
> clearly state the consequences.
Ok, no worries. Here you go:
The consequences is that the template, which has no personal or identifying
information, can be used to
On Wednesday, 20 December 2017 08:25:44 CET Matteo wrote:
> but before you code it you should talk to joanna to be sure it will be
> accepted and used.
I sent an email to the dev mailinglist at the same time I sent one here (no
reply so far) so at minimum she knows about it.
But I have to say
On Tuesday, 19 December 2017 22:09:31 CET David wrote:
> I'm attempting to wield a command from the archlinux wiki and getting
> access denied, even with sudo in front, and even when on dom0 (against
> my better judgment). Any thoughts?
A complex series like this is best just to run as root in a
On Wednesday, 20 December 2017 11:59:26 CET Holger Levsen wrote:
> oh, and if you want to securly erase data, use /dev/random, not
> /dev/urandom.
This is not good advice, your /dev/random device creates true randomness,
but it only generates a very small amount of data.
Bytes per minute.
On Friday, 8 December 2017 06:09:32 CET Chris Laprise wrote:
> What I want
> to say is that people that do not like to experiment with computer just
> memorize what they are told and always do the same steps just happy that
> it works.
I fully agree with that and it mirrors my observations.
On Friday, 8 December 2017 06:09:32 CET Chris Laprise wrote:
> There is the question of whether someone should try porting the original
> Qt-based Qubes Manager to R4.0. I mention this since the biggest
> complaint so far is not having a _comprehensive_ UI; Updating QM for the
> new Qubes API
On Friday, 8 December 2017 01:05:32 CET Patrick wrote:
> I found the problem! My /var/lib/qubes/qubes.xml file was corrupted, so
> it could not be parsed correctly by qubesd. I restored a previous version
> from /var/lib/qubes/backup and now I am back in business! Thanks anyway
> for checking out
On Friday, 8 December 2017 14:56:00 CET Chris Laprise wrote:
> > I also know that the “state of the art” in creating user interfaces has
> > moved on and the technology used in the old app is end-of-lifed for some
> > years now.
>
> Which end-of-life technology would that be?
In Qt5 (released 19
On Thursday, 7 December 2017 01:53:40 CET Patrick wrote:
> However... I immediatelyy found out VM's still did not start on my system.
> After looking in journalctl and systemctl, I found out qubesd would not
> start: "failed to start Qubes OS daemon". I attached text files of the
> error outputs
On Thursday, 7 December 2017 09:41:37 CET qbertq...@gmail.com wrote:
> My understanding is that you attach and detach block devices from the dom0
> side, and you mount, umount, and eject from the AppVM side.
>
> Is it possible to detach and/or attach block devices from the AppVM side,
> or is
On Thursday, 7 December 2017 14:17:52 CET Franz wrote:
> > On another note what would it take ($$$) for someone to create this back
> > on 4 as an option for the community (obviously theres quite a few of us)
> > that want this to install?
> >
> > Im not rich by any means living in one bedroom
On Thursday, 7 December 2017 17:38:15 CET Jean-Philippe Ouellet wrote:
> Remember that the "R4" you're speaking of is still just a release
> candidate - it is *not* finished!
To most people the concept of a "release candidate" is that the software
released is possible the final version, if there
On Monday, 11 December 2017 11:31:22 GMT Connor Page wrote:
> templates establish a connection to a proxy running in some netvm defined
> in dom0 over a vchan.
Would you be able to repeat that in English ? :-)
--
You received this message because you are subscribed to the Google Groups
Lots of things changed in Qubes4, and I think I am finding out things lots of
others will need to find out at one point too.
So for them, as well as for my own memory, I'll write some howto emails.
The task;
as I run Qubes on a machine with a relatively small SSD and large spinning
disk, I
On Monday, 11 December 2017 17:48:45 GMT Unman wrote:
> This is a case where "making stuff work a lot nicer" isn't necessarily a
> good idea.
The "log nicer" is that it is quite a bit faster and error handling is much
better.
> I don't think you should advise against this without explaining
On Monday, 11 December 2017 15:10:17 GMT Connor Page wrote:
> I hope you do understand that there is no encryption in what you propose.
Thats why I wrote;
> I assume you already partitioned and did everything you need with the
> drive, it should be available to dom0.
I cowerdly leave the
On Wednesday, 6 December 2017 16:08:28 CET Unman wrote:
> "useful, but wasnt any good" - do you mean buggy or poorly designed?
> What 2 features should be implemented/fixed?
>
> I confess I rarely use the Manager, so don't have a feel for what's wrong
> with it.
To be clear, the main reason the
On Wednesday, 6 December 2017 17:34:24 CET Elias Mårtenson wrote:
> I had a script that updated the templatevms and it was written in Python,
> taking advantage of the API. This script stopped working in 4.0. I rewrote
> it to use the commandline tools instead.
>
> Perhaps a new UI could also be
On Wednesday, 6 December 2017 08:14:44 CET taii...@gmx.com wrote:
> On 12/04/2017 06:34 PM, r...@tuta.io wrote:
> > Just read it. Thats fucking stupid.
>
> Sure is, I am tired of the linux greybeard obsession with the CLI - it
> is not always the best choice.
>
> When it comes to management of
On Wednesday, 6 December 2017 19:28:54 CET Unman wrote:
> > the main reason the old one is removed seems to be that it
> > would have had to be reimplemented due to the architecture changes in
> > 4.0
> Tom, this is simply not true.
> If you look at issue #2132
That issue actually supports the
On Wednesday, 6 December 2017 13:02:43 CET Franz wrote:
> Sorry for the obviously stupid question, but why is it harder to write it
> in python rather than something else?
Not at all, its a good question.
It is harder to *have* to write it in python instead of any langauge any
developer may be
On Sunday, 10 December 2017 07:09:35 CET qbertq...@gmail.com wrote:
> What I don't understand
Just want to point out that the 4.0 support for dispVMs is extremely basic
and honestly quite broken.
The concept works, most of the tools don't or are just shitty.
Happy to hear you made it work :)
--
On Tuesday, 12 December 2017 16:18:25 CET Connor Page wrote:
> so in short, first create a qubes storage pool
> qvm-pool --add
In the spirit of a “howto”, can you fill in the actual values to allow one to
add a second drive as the ‘private’ (home) partition *only* of a Qube?
> if you go
On Tuesday, 12 December 2017 16:24:16 CET cooloutac wrote:
> well I'm no expert but with ps/2 keyboard it will be the only thing
> attached, unlike usb which can have multiple devices on same controller,
> spoofed as other devices. Is there a better option?
The attack modes are two very
On Saturday, 9 December 2017 23:03:38 CET qbertq...@gmail.com wrote:
> In Qubes OS 3, the documented way of creating DVM Templates is to use
> qvm-create-default-dvm (see
> https://www.qubes-os.org/doc/dispvm-customization/)
>
> qvm-create-default-dvm was removed in Qubes OS 4, so what's the new
On Wednesday, 27 December 2017 03:02:57 CET dangmad...@gmail.com wrote:
> Opted to reinstall template, but I cannot download it without my
> connection dropping, and thus timing me out. dnf does not resume the
> download, despite it claiming to be saving the download to cache.
>
> I have put
On Wednesday, 27 December 2017 00:34:38 CET Leo Gaspard wrote:
> > I'm more concerned that they tried then how they failed.
> > It leaves a bad taste in my mouth.
> tl;dr: please do google for “looking glass” and “mozilla”
Its good we agree on all the technical details, and I agree intent is
On Friday, 29 December 2017 19:23:01 CET taii...@gmx.com wrote:
> I am sure the massive
> markup over parts cost is worth it for a "tested working properly"
> system right?
Yes. Yes it is.
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You
On Friday, 5 January 2018 15:37:37 GMT Unman wrote:
> Look at the nat table in the upstream netvm.
> You'll see that sys-net NATs these requests to the NS used by sys-net.
Ah, that hint was enough, I didn't expect NAT, thanks!
Got it working now.
--
Tom Zander
Blog: https://zander.github.io
On Friday, 5 January 2018 23:43:58 GMT Zrubi wrote:
> > I'll attach two sceenshots of the tool, to give you a bit of an
> > idea of what it already does and maybe if its worth your time to
> > compile
>
> Probably this is very subjective, but:
> For me, the most important parts/feature of the
On Saturday, 6 January 2018 17:42:00 GMT russlyatos...@gmail.com wrote:
> hey, Please confirm we cannot install Qubes 4.0 on DVD, and the minimum
> on flash drive to install Qubes 4.0 we must have 32GB? thanks
Not sure if this is helpful; the minimum size harddrive I've installed Qubes
on
On Saturday, 6 January 2018 10:56:13 GMT haaber wrote:
> 2) Reboots hang systematically at "Reached target shutdown" and has to
> be rebooted via a coldboot.
I've been seeing this too, although sometimes it goes on after half a minute
only to hang at some other point (after loads of messages).
Hi,
I've set up a new qubes install and created two LVM volume groups. I wanted to
try and see how this works with qubes and I tried out the pools concept.
The problem is that I think I did everything according to the docs, but the
qvm-create command gives me an error message.
Can someone
On Sunday, 24 December 2017 02:09:54 CET Marek Marczykowski-Górecki wrote:
> > sudo lvcreate -L 390.5g -n data Slow
>
> You need yo create those as thin pools, not standard volumes. For
> example this way:
> lvcreate -L 37g --thinpool systems qubes_dom0
Thanks, that fixed it :-)
It took some
On Saturday, 6 January 2018 23:19:54 GMT pixel fairy wrote:
> The app menu, top left, keeps entries for old template VMs. is there a way
> to get rid of them?
You find the data backing this in
$HOME/.local/share/qubes-appmenus/
--
Tom Zander
Blog: https://zander.github.io
Vlog:
On Sunday, 7 January 2018 19:40:27 GMT Yuraeitha wrote:
> But there are still some
> issues, i.e. no visual interface to show your overall disk space useage
> (the other month, you had to pull and combine several commands to make it
> show accurately). I'm not sure if this disk space useage
I needed space on my dom0 (Q4) drive, so I ended up using qvm-clone to copy
my fedora25 template, my sys-net & sys-firewall to a different pool.
I naturally also copied the setup from the config dialog.
Everything seemed to work for a while, so I removed the sys-net /firewall
originals.
Now I
On Monday, 8 January 2018 06:53:46 GMT khmartin...@gmail.com wrote:
> Is your new net vm different than "sys-net"? This caused me problems too.
> One solution is to rename the new net vm to "sys-net" or you can edit
> this file in dom0:
>
> /etc/qubes-rpc/policy/qubes.UpdatesProxy
>
> In that
I understand that there is a memory-manager to balance the memory between VM
spaces.
Does anyone know if dom0 is being managed this way?
Currently there is 4GB assigned to dom0, of which 1.3 GB is in use.
At the same time I have chromium getting out-of-memory errors in an AppVM.
I'd like to
On Thursday, 11 January 2018 06:39:02 GMT brutellealexan...@gmail.com wrote:
> I don't seem to be able to download the 26 template either... It says all
> mirrors have been used and it fails.
This is definitely the direction you want to go, download the template from
dom0 using
sudo
On Thursday, 11 January 2018 03:42:11 GMT Andrew David Wong wrote:
> On 2018-01-10 12:53, 'Tom Zander' via qubes-users wrote:
> > I poked the Qubes guys about providing a separate dir on the website to
> > make it clear what is 3.x and what is 4.x specific, but they stated we
>
On Thursday, 11 January 2018 14:07:57 GMT Vít Šesták wrote:
> For your case, I have few questions:
>
> * What's dom0 swap usage? Qmemman includes this amount in memory
> requirements.
My dom0 has no swap, I didn't disable it, it just never had any.
I guess thats because in the installer I
On Thursday, 4 January 2018 02:11:16 GMT Mark Malcom wrote:
> I downloaded fedora-26 template and after that my gnome-tweak-tool is
> completely ignored: no themes, no windows scaling anymore. Not just the
> Tweak Tool, but if I try to change the scale factor with gnomesettings,
> that is also
I'm trying to figure out how this works, and I am stuck.
In every qube (except sys-net) there is a resolv.conf that points to two
name servers.
10.139.1.1 and .2
This raises two questions;
* how does sys-net handle these requests on this odd address. No 'ip ad'
network seems to listen on
On Tuesday, 9 January 2018 01:54:40 GMT Fabrizio Romano Genovese wrote:
> Hello all,
> This looks like an old issue:
> https://github.com/QubesOS/qubes-issues/issues/2715
>
> I'd be interested in using only the basic tablet features (essentially
> moving the mouse and clicking around using the
On Tuesday, 9 January 2018 08:54:02 GMT aaq via qubes-users wrote:
> Okay, so I found the documentation for bind-dirs
> (https://www.qubes-os.org/doc/bind-dirs/), but was still wondering if
> you meant binding the AppVMs /usr/bin and /usr/local/bin, or was thinking
> of something else?
>
> I
On Monday, 8 January 2018 13:29:02 GMT 'Ahmed Al Aqtash' via qubes-users
wrote:
> * One I call 'trusted' which is based on debian sid (unstable) that I
> install everything I use for daily usage (firefox, libreoffice, mpv,
> emacs, other open source tools). Primarily AppVM's will be based out
On Monday, 8 January 2018 10:10:17 GMT qubestheb...@tutanota.com wrote:
> Hi.
>
> https://www.phoronix.com/scan.php?page=news_item=AMD-PSP-Disable-Option
> It's still yet not known whether this disabling is effective and whether
> it disables the PSP in its entirety.
>
> But if it does, then
On Sunday, 14 January 2018 08:12:24 CET r...@tuta.io wrote:
> Is qubes able to use the computing power of the gpu or is the type of gpu
> installed a waste in this issue?
Relevant here is an email I wrote recently;
https://groups.google.com/forum/#!msg/qubes-devel/40ImS390sAw/Z7M0E8RiAQAJ
The
On Sunday, 14 January 2018 03:07:09 GMT jerr...@disroot.org wrote:
> the template is whonix-ws
> when running command
> sudo qubes-dom0-update --action=reinstall qubes-template-package-name
This is quite broken in 4.0 and you have to be a bit clever to work around
this; here are some tips.
On Friday, 19 January 2018 12:48:27 CET wordswithn...@gmail.com wrote:
> Qubes already has built-in the capability to screenshot the entire desktop
> (Printscreen) or the current window (Ctrl+Printscreen).
Yes, it does.
But this is not something you should use and then send to a VM becuase that
On Friday, 19 January 2018 11:48:56 CET aaq via qubes-users wrote:
> What can I do
Could this have something to do with the broken qmemman?
Try turning off memory-management and give the sys-net an initial amount of
something like 800MB.
also check if xentop has anything weird in the first
On Saturday, 20 January 2018 20:03:31 CET Davidson wrote:
> Hey, thanks again for your work, much appreciated.
>
> Another thought just occurred to me, a collapsible tree like option. I
> have like "work" VMs (one for libre office stuff, another for email,
> another for vid confer) and for
On Friday, 19 January 2018 16:38:54 CET Marek Marczykowski-Górecki wrote:
> Specifically qmemman was broken in qubes-core-dom0 in 4.0.16 and 4.0.17.
Can confirm it works much better 4.0.18 than it ever did before :)
--
Tom Zander
Blog: https://zander.github.io
Vlog:
On Saturday, 20 January 2018 23:25:55 CET Unman wrote:
> You are probably missing the desktop files from /usr/share/applications
> You can copy the files from out of a Fedora based qube if you have one.
Ohh, smart, I didn't think about that.
I did this to get the majority of them back;
```
cd
On Monday, 22 January 2018 15:56:06 CET 'Guillaume Bertin' via qubes-users
wrote:
> My ideal configuration for my standalone home computer would be "dpms
> after 10 minutes" and "lock after 120 minutes".
I'm not sure if this is the kind of answer you are looking for;
xscreensaver is a really
On Sunday, 14 January 2018 15:02:48 GMT jerr...@disroot.org wrote:
> can you somehow save the data? is it a corrupt file? when i put this file
> in the template folder in /var/lib/qubes, the data is not there.
'private.img' is the contens of /home and /rw
you may be looking for 'root.img' if you
On Thursday, 11 January 2018 18:16:04 GMT Unman wrote:
> On the VPN case your own comment confirms that it would be better to
> provide a separate section, rather than trying to put "exceptions" in to
> the existing text.
Thank you for explaining that unman, much clearer indeed.
While I agree on
On Saturday, 27 January 2018 18:14:23 CET billol...@gmail.com wrote:
> First, while KDE seems to be working well, I noticed that I can't download
> and install new themes, widgets, etc. through the KDE GUI. It can't
> connect to the KDE server. I'm assuming that this is because dom0
> doesn't
On Thursday, 25 January 2018 19:28:58 CET 'awokd' via qubes-users wrote:
> Resuming working my way through splitting up the documentation now that
> the 3.2 vs. 3.3 question has been mostly settled. Some general questions:
Awesome!
I was thinking about the qubes docs when I saw a wiki that had a
On Monday, 5 February 2018 12:21:51 CET Tim W wrote:
> I am currently going thru all the setup script qubes build template
> options to find what templates compile correctly and what ones have bugs.
> After that I am happy to write up a markdown page for how to compile and
> install the Qubes
On Monday, 5 February 2018 02:33:02 CET Unman wrote:
> You are, of
> course, free to rewrite Qubes and its components in a language you're
> comfortable with.
Don't be so dramatic, I m not suggesting any such thing.
--
Tom Zander
Blog: https://zander.github.io
Vlog:
On Sunday, 4 February 2018 21:00:55 CET 'awokd' via qubes-users wrote:
> Working on it (where other contributors haven't already)! Am about halfway
> through now.
Sweet!
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received this
On Sunday, 4 February 2018 18:10:44 CET Yuraeitha wrote:
> Also it's been explicitly said that no Qubes 4 existing features will be
> added to the new-old Qube Manager. Which might also hint towards no
> changes coming to Qube Manager. If anything, it has to be re-made almost
> entirely to work
On Monday, 5 February 2018 00:55:34 CET Unman wrote:
> On Sun, Feb 04, 2018 at 08:14:57PM +0100, 'Tom Zander' via qubes-users
wrote:
> > * Having nothing but python APIs for your operating system is something
> > that makes no sense. Python was never meant for serve
On Tuesday, 30 January 2018 00:19:58 CET ludwig jaffe wrote:
> Ok I found the file, backed it up and want to edit it.
> Do you know an xml ediitor with folding to edit this with more comfort,
> as there is no in the xml, just spaghetti.
> A vim for xml with folding or something like that with
Is this a known issue?
I can start a VM using qvm-start, but when I use qvm-run nothing happens, it
hangs forever. Even commands that don't need a X server.
For any qube of the various OSs I run.
The Qubes icons also no longer show in my system-tray.
I can still update dom0 via yum, though.
On Saturday, 27 January 2018 15:45:27 CET Yoganandam Marava wrote:
> by adding forward rules at sysfirewall we can ping each other VM through
> ip address but not using VM name. Is this some thing possible with Qubes
> 4? I am naive in networking.please suggest if there is a way?
Each VM has a
On Tuesday, 30 January 2018 02:51:06 CET 'awokd' via qubes-users wrote:
> Enable Debug mode?
I always wondered what this was, anyone know what effect it has to set this
to true?
--
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel
--
You received
On Tuesday, 30 January 2018 01:05:39 CET 'Tom Zander' via qubes-users
wrote:
> I can start a VM using qvm-start, but when I use qvm-run nothing happens,
> it hangs forever. Even commands that don't need a X server.
> For any qube of the various OSs I run.
>
> The Qubes icons also
On Tuesday, 30 January 2018 11:19:18 CET 'Tom Zander' via qubes-users wrote:
> There were a bunch more updates in the repo 4.0 current-testing this
> morning which I applied and I rebooted, but no change.
> Still no icons in my systray, still not able to start any apps on any VMs.
Oh,
On Tuesday, 6 February 2018 11:32:07 CET 'awokd' via qubes-users wrote:
> I'm not getting past the first step of:
>
> Verify you are cutting through the sys-net VM firewall by looking at its
> counters (column 2)
Yes, that sounds familiar.
The problem isn't limited to sys-net either, using
On Saturday, 10 February 2018 09:05:51 CET Yuraeitha wrote:
> On Saturday, February 10, 2018 at 6:51:47 AM UTC+1,
cybe...@national.shitposting.agency wrote:
> > I have a usb drive attached to sys-usb, lets say its mounted at /mnt on
> > sys-usb and im trying to backup a vm named MyVm from dom0
On Monday, 5 February 2018 04:34:35 CET Tim W wrote:
> People complain about doc being outdated..then fix them.
If someone can figure out how to port-forward in 4.0, please do update the
docs. I never managed to get that working.
The firewall page can also be a bit more detailed as-is, it
On Monday, 5 February 2018 08:00:35 CET 'awokd' via qubes-users wrote:
> Why are you complaining about bugs when running a ".0rc" version? They're
> to be expected; if not the point of release candidates.
Actually...
https://en.wikipedia.org/wiki/Software_release_life_cycle#Release_candidate
On Wednesday, 7 February 2018 08:17:11 CET Andrew David Wong wrote:
> Are you using the `-a` option?
>
> qvm-run -a
>
> This starts the VM if it's powered off, then runs the command in it.
> Working fine for me on 3.2.
As I wrote, qvm-start works fine, the VM is active and working.
You
On Tuesday, 20 February 2018 14:04:03 CET Wojtek Porczyk wrote:
> On Tue, Feb 20, 2018 at 01:21:30PM +0100, 'Tom Zander' via qubes-devel
wrote:
> > On Tuesday, 20 February 2018 01:49:37 CET Marek Marczykowski-Górecki
wrote:
> > > We've decided to deprecate the '$' character from qrexec-related
>
On Tuesday, 20 February 2018 19:41:19 CET Marek Marczykowski-Górecki wrote:
> > On the 'other' side of qrexec (on dom0) you have perfect control over
> > the
> > situation and you also don't have any need for recoding or encodings or
> > anything like that. It still is just 8 bits data, not
1 - 100 of 126 matches
Mail list logo