/news/2018/12/18/qubes-401-rc2/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlwZ2joACgkQ203TvDlQ
MDBFcA/8COFybMGZlmd5hzyyRbx3iD7O4bjOOVsS+B7WpmLf1FMsQoXknxMqZTF
gt;> concerned...
>>>
>>> I'm not sure about this, but the warning to update is implicit in the
>>> fact that R4 is out and the last version is typically the best supported
>>> one.
>>>
>>> --
>
ment is also available on the Qubes website:
https://www.qubes-os.org/news/2018/12/03/qsb-45/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlwGEq0ACgkQ203TvDlQ
MDDZLQ/9E/Hyg6/v7GoOyY
/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlwCAlMACgkQ203TvDlQ
MDBdqxAAoSjAP36xt0Is/bJPjUifzGR65d5hYVaQFVirQIXYYA0y7Mc35ZeCuzH5
4E66s
e new template instead of debian-8. You can do this easily
> using a batch script looping over relevant qube names. Once done
> you can delete the old template(s).
>
> unman
>
Yes. Part of updating a Qubes system is updating TemplateVMs (not
has ended support for Qubes 3.2, but Qubes 3.2 still supports
Whonix 14:
https://www.qubes-os.org/doc/supported-versions/#templatevms
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAF
/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlv0yhMACgkQ203TvDlQ
MDAcQA//Qj5Qk5VDED0mvUOBAoFl6EeQApBCPBDBosh6ORlazfQNSX1m0SvTwjck
CheHiTBtW7qVjPafK
nt is also available on the Qubes website:
https://www.qubes-os.org/news/2018/11/20/qsb-44/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAF
's worth noting that Bitcoin donations and payments from Qubes
Partners both bypass OC, so the largest amounts tend to avoid that fee.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j
> Confirm that your vault has no netvm. (I mean *check* this.)
> What is the content of the files you were copying?
> Check the contents of the qvm-copy you were running. I mean run
> find -name qvm-copy as root from /
> Then examine in a
h would be a better
> solution.
>
> I havent encountered this bug myself,so cant account for it. It might be
> helpful if those who have could say if they have enabled testing repos,
> or are using plain 4.0 Qubes repositories. Any other detail would be
> h
/reporting-bugs/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/11/12/qubes-321/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
s frustrating. Some of us are
> actually trying to get work done in the OS.
>
Hi Ryan,
Sorry for the frustrating problems. Would you mind filing a bug report
in qubes-issues so that the devs can look into it?
https://www.qubes-os.org/doc/reporting-bugs/
- --
Andrew David Wong (Axon)
Com
/security/xsa/#282
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/11/06/xsa-282-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
/doc/reporting-bugs/
[3] https://www.qubes-os.org/news/2018/10/05/qubes-321-rc1/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/11/05/qubes-401-rc1/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP
] https://www.qubes-os.org/team/#simon-gaiser-aka-hw42
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/11/05/qubes-security-team-update/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
-workstation/
[Let's Encrypt]: https://twitter.com/RMLLsec16/status/749982515948027904
```
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlvSe88ACgkQ203TvDlQ
/security/xsa/#278
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/10/24/xsa-278-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
;
Sorry about that! The truth is that everyone got really busy and just
forgot (and also forgot to make a calendar reminder for it before
that). The new canary (#17) is up now.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGI
signatures!
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/10/15/canary-17/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
//www.qubes-os.org/news/2018/10/05/qubes-321-rc1/#what-about-qubes-401
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlu/UQ8ACgkQ203TvDlQ
MDBPcQ/+ObuQnLrSAjbH0qaaYIPpmQfiT27vub1Dn
> I try to disable networking with the network manager applet.
>
Known bug:
https://github.com/QubesOS/qubes-issues/issues/3657
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ
-os.org/news/2018/10/05/qubes-321-rc1/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlu4K2EACgkQ203TvDlQ
MDCVBBAAyN6W5nqYHtbtdY9rQdz6IsOLff9etERcb3nfVAaLzr9q76DETivY8Wox
/#the-past-and-the-future
[7] https://www.whonix.org/wiki/Support
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/10/05/whonix-support-ending-for-qubes-32/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP
bug:
https://github.com/QubesOS/qubes-issues/issues/4154
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlurFjYACgkQ203TvDlQ
MDBM2w//fxd2tJTGnmLW1aUsFDEL/G8k3ARPMcDSksPtUPDaOw3K
/#whonix
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/09/13/whonix-version-support-policy/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
Wojtek Porczyk has just published a new article titled "Introducing
the Qubes U2F Proxy." The article is available on the Qubes website:
https://www.qubes-os.org/news/2018/09/11/qubes-u2f-proxy/
- --
Andrew
take any further action to
disable it there.
If you're asking whether you should also disable it in your BIOS
settings, then I'm not sure (CCing Marek).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP
Isn_hko7tQs/PcqIuUleEQAJ
>
We have now published QSB #43: L1 Terminal Fault speculative side
channel (XSA-273).
https://www.qubes-os.org/news/2018/09/02/qsb-43/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-15 03:58, Andrew David Wong wrote:
> On 2018-08-14 21:38, Sphere wrote:
>> CVE-2018-3646 in particular is alarming:
>> "The third flaw, CVE-2018-3646, has a CVSS Base Score of 7.1 and enables bad
>> actors to a
https://www.qubes-os.org/news/2018/09/02/qsb-43/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAluLWG8ACgkQ203TvDlQ
MDBaFw/9FEA1pX0sxe7znUF3+waSNQ0HYW
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-26 07:12, David Hobach wrote:
> On 08/14/2018 09:12 PM, Andrew David Wong wrote:
>> Patching
>> =
>>
>> The Xen Project has provided patches to fix this issue.
>>
>> The specific packa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-25 15:33, Chris Laprise wrote:
> On 08/25/2018 03:59 PM, Andrew David Wong wrote:
>> On 2018-08-25 14:24, 'awokd' via qubes-users wrote:
>>> On Sat, August 25, 2018 7:01 pm, Chris Laprise wrote:
>>>> On 0
e
switch on to make a VM play the role of a ProxyVM (and/or a NetVM?),
then switch it off again later, and it'll still be the same VM. At any
rate, that's what I gather from this comment from Marek:
https://github.com/QubesOS/qubes-issues/issues/1763#issuecomment-
://www.qubes-os.org/news/2018/08/24/whonix-13-approaching-eol/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAluA5D0ACgkQ203TvDlQ
MDBlmA//Vdkl2E+uxZMOJtIItg7aX95nfkGOFJXkNGBATIA325c
opic/qubes-users/Isn_hko7tQs/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlt7bFwACgkQ203TvDlQ
MDDvlA//U5HMGhY59cOLy2UmigJ049+gDJjYerj
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-17 00:58, Patrick Bouldin wrote:
> On Thursday, August 16, 2018 at 6:43:50 PM UTC-4, Andrew David Wong wrote:
>> On 2018-08-16 17:35, Andrew David Wong wrote:
>>> On 2018-08-16 15:47, Patrick Bouldin wrote:
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-16 17:35, Andrew David Wong wrote:
> On 2018-08-16 15:47, Patrick Bouldin wrote:
>> Hi trying to validate 4.0. I downloaded the
>> qubes-master-signing-key.asc and then not able to progress. I did
>> find Joanna's
fingerprint you obtained
through another channel, this is probably the simplest way:
$ gpg2 qubes-master-signing-key.asc
gpg: WARNING: no command supplied. Trying to guess what you mean ...
pub rsa4096 2010-04-01 [SC]
427F11FD0FAA4B080123F01CDDFA1A3E36879494
uid Qubes
2/
[3]
https://www.qubes-os.org/news/2018/08/14/xsa-268-269-271-272-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltz6z0ACgkQ203TvDlQ
MDCzmw/7BKlMiRdWnnx1mzMecvX
on the Qubes website:
https://www.qubes-os.org/news/2018/08/14/qsb-42/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltzKaMACgkQ203TvDlQ
/news/2018/08/14/xsa-268-269-271-272-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltzKcwACgkQ203TvDlQ
MDB9RA/+JGQLlCyOTw23zngxwT28f/yzl+hgE00maX1jgFayL500ErCjTttBpqez
Could you shed some light on
this, Patrick?
[1] https://www.whonix.org/wiki/Qubes/Install
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltwpWUACgkQ203TvDlQ
MDDAJxAAoVPnbBU2gLdc6tqrRON8
cess that warning
> refers to and why it is not recommended.
>
Not sure about this part, sorry.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltwoo4ACgkQ203TvDlQ
MDA7tQ/+IAdviYsznEJmU
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-04 00:01, Andrew David Wong wrote:
> On 2018-08-02 19:23, Micah Lee wrote:
>> Hello, I just discovered the recording of my HOPE talk showing off
>> many cool things about Qubes. Check it out if you're intere
gt;
Thanks, Micah! That was a great presentation!
Announced on the Qubes website:
https://www.qubes-os.org/news/2018/08/03/micah-lee-hope-conf-2018/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN P
w places that might be relevant (depending
on the template flavor):
https://www.qubes-os.org/doc/#managing-operating-systems-within-qubes
https://www.qubes-os.org/doc/templates/
https://www.qubes-os.org/doc/templates/fedora/
It would also be helpful to explain the benefit of having different
deskto
>>>
>>> The warning to all users is to NEVER run unattended (say,
>>> scripted) updates on fedora based templates since apparently
>>> they give a shit on security.
>>>
>> Checksums are only for integrity, not authenticity. For
>> security, PGP
r integrity, not authenticity. For security, PGP
signature checking is what matters.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlsJUvwACgkQ203TvDlQ
MDA+QxAAyhbtSlB3JE+65G
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-24 04:18, Holger Levsen wrote:
> On Wed, May 23, 2018 at 08:21:12PM -0500, Andrew David Wong wrote:
>> Fedora 26 will reach EOL ([end-of-life]) on 2018-06-01, and Debian 8
>> (["Jessie" full, not LTS][debian-
website:
https://www.qubes-os.org/news/2018/05/24/qsb-40/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlsHTIcACgkQ203TvDlQ
MDCoHw//dx+GcN8QIz0ww1tUQZufTaDwSy0eiY
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-23 20:21, Andrew David Wong wrote:
> Dear Qubes Community,
>
> Fedora 26 will reach EOL ([end-of-life]) on 2018-06-01, and Debian 8
> (["Jessie" full, not LTS][debian-releases]) will reach EOL on
> 2018-06-
/supported-versions/#note-on-dom0-and-eol
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/05/23/fedora-26-and-debian-8-approaching-eol/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP
d-of-kvm-or-some-other-hypervisor
> Regards
>
> Johan Skødebjerg Møller
>
> Sent with [ProtonMail](https://protonmail.com) Secure Email.
>
Please be sure to keep qubes-users CCed in any replies:
https://www.qubes-os.org/support/#keep-the-list-cced
- --
Andrew David Wong (
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-08 20:32, john wrote:
> On 05/08/18 15:19, Andrew David Wong wrote:
>
>>Xen vulnerability (XSA-260) and GUI daemon issue
>>
>> Summary
>>
>>
>> Today, the Xen Security
/
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/05/08/qsb-39/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlryTJAACgkQ203TvDlQ
MDAbYw
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-06 13:20, Marek Marczykowski-Górecki wrote:
> On Sun, May 06, 2018 at 12:25:32PM -0500, Andrew David Wong wrote:
>> On 2018-05-06 08:51, Vasilis wrote:
>>> Hi,
>>>
>>> I was trying to find out when an
f the package, which
then creates a new issue in updates-status. Should I have left the
issue open as a reminder to do this?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3
Got it. I understand I need to build the coreboot image and flash it. However
still a little confused on how exactly to implement the microcode update? I
assume its still not a part of the latest coreboot.
Was it these two files I am looking for changes in?
orted-versions/#qubes-os
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrqe+YACgkQ203TvDlQ
MDAi0hAAjh0Hhpa+nnM5FNX5PBbE6En09fcoTE9h839vr
on 2018-06-01 stating that Fedora 26 has reached EOL, as a final
reminder to anyone who hasn't migrated yet that they should do so
immediately.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
---
OK, just to clarify, if I am to build the coreboot image, I need to do that on
the G505s by say running Debian or Ubuntu (presumably could use a Live
disc/USB) or similar and building the image as shown here?
https://www.coreboot.org/Board:lenovo/g505s#Building_a_coreboot_image
Then I take the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-04-30 08:54, Andrew David Wong wrote:
> Dear Qubes Community,
>
> As many of you have noticed, parts of the Qubes OS website are
> temporarily down. The reason is that GitHub is doing unplanned
> maintenance on GitHub Pag
) files. If you need to
refer to any documentation, it's still available in the qubes-doc repo:
https://github.com/QubesOS/qubes-doc
We recommend having your own local copy of this repo.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
ility to change that. Please tell /u/lugh.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhPhcACgkQ203TvDlQ
MDDG/Q/+IIDMwR+I1Jt0jsHJ2hcfiTxyEiGeGNFk6KsNh/LyCvWUOr6QQzPgEIiP
teF320kgJ2QQeHyshdEB
r
instances of "http" to "https".
5. Click the "Save" button in the top-right corner of the window.
6. Close the window.
7. Check for updates normally.
8. Shut down the TemplateVM.
Thank you to awokd for suggesting and testing these instructions!
For further informat
to the XSA Tracker:
https://www.qubes-os.org/security/xsa/#258
https://www.qubes-os.org/security/xsa/#259
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhHcoACgkQ203TvDlQ
re the developers in this list:
https://www.qubes-os.org/team/#core-team
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrWtBgACgkQ203TvDlQ
MDC6HxAAsjMZLDgpnVfJd5rj4HMQ8j1vZ2i+yrL1CEo2Tj
What's everyone's opinion of the Thinkpenguin router:
https://thinkpenguin.com/gnu-linux/free-software-wireless-n-mini-vpn-router-tpe-r1100
Has FSF approval and uses LibreCMC.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
Sorry to beat a dead horse. I am sure folks here are sick of answering hardware
questions.
So I understand the dev team currently seems to like the Lenovo Thinkpad X1
Carbon 5th gen. I assume best to get with 16GB RAM (max) and an SSD. I assume
you get with Windows10 or 7 and wipe it clean
resolved itself, or perhaps a problem
on your end.
Also, note this FAQ entry:
https://www.qubes-os.org/faq/#i-keep-getting-failed-to-synchronize-cache-for-repo-errors-when-trying-to-update-my-fedora-templates
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEG
On 04/09/2018 12:52 PM, 'Neelix' via qubes-users wrote:
> Hi Andrew,
>
>
> Did you also make a back up of the templates? Or did you installed the
> same applications on your new templates?
>
>
>
>
> On 04/09/2018 05:52 AM, Andrew Morgan wrote:
>> Hey t
On 04/08/2018 11:59 PM, Drew White wrote:
> On Monday, 9 April 2018 13:52:34 UTC+10, Andrew Morgan wrote:
>> Hey there,
>>
>> The upgrade to Qubes 4.0 was mostly painless, with a few things needed
>> to be set up and worked-around here and there. I did do a backup from
isn't launching. I have to manually launch everything from Qubes
Manager -> Run command in VM -> gnome-terminal.
Is there a way I can debug this further?
Thanks,
Andrew Morgan
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
iate database again?
Maybe the same part of the boot process which is removing corpses of
dispVMs could do these plausibility checks for machines that do not
exist anymore. Or add a qubes-system-dbck.
```
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://ww
+is%3Aissue+milestone%3A%22Release+4.1%22+label%3Aenhancement
[26] https://www.qubes-os.org/doc/contributing/
[27] https://www.qubes-os.org/donate/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/03/28/qubes-40/
- --
Andrew David Wong (Axon)
Community
ly Fedora
> 21 Template available. Thanks
>
Yes, here are the instructions:
https://www.qubes-os.org/doc/templates/fedora/#upgrading
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-22 20:04, js...@riseup.net wrote:
> Andrew David Wong:
>> On 2018-03-22 17:45, js...@riseup.net wrote:
>>> Trying to update my templates I get "connection failed" errors
>>> on connectin
ith whonix yet).
>
> Anyone else having this problem?
>
> -Jackie
>
Yes, this is a known issue. See:
https://github.com/QubesOS/qubes-issues/issues/1352#event-1536336416
- --
Andrew David Wong (Axon)
Community Manager, Qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-17 15:10, Andrew David Wong wrote:
> On 2018-03-17 15:07, socks wrote:
>> On 03/17/2018 08:37 AM, socks wrote:
>>> I'm sure it's the newb in me, but I'm trying to verify the rc5.iso and
>>> getting stuck here
top ~/Downloads/Qubes-R4.0-rc5-x86_64 $ md5sum -c
> Qubes-R4.0-rc5-x86_64.iso.DIGESTS
> Qubes-R4.0-rc5-x86_64.iso: OK
> md5sum: WARNING: 22 lines are improperly formatted
>
>
> so: is this .iso OK or ?
>
That's normal:
https://ask.fedoraproject.org/en/question/10956/check
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-17 14:57, qubes-li...@riseup.net wrote:
>
>
> Andrew David Wong:
>> On 2018-03-17 11:40, qubes-li...@riseup.net wrote:
>>
>>>> Have you made sure that you have updated the packages in the
>>
s.
>
> |$ cd qubes-secpack/ $ git tag -v `git describe` I get "object not
> found" proceeding in the /canaries , it's ok |
>
Cannot reproduce. Following those exact steps works for me. Perhaps
there was a typo?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
h
>
> Yes I've updated and regenerated the dispvm after the dom0 update.
>
Same here. Updating and regenerating did not resolve the issue.
Tracking:
https://github.com/QubesOS/qubes-issues/issues/3711
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os
github.com/QubesOS/qubes-secpack/tree/master/canaries
>
> Is it only released on github in the future?
>
> Sincerely
> Max
>
It's not automatic. I just didn't have time to update everything and
publish all the announcements until just now. :)
- --
Andrew
llows:
- Xen packages, version 4.6.6-37
[...]
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/03/15/qsb-37-update/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
digital signatures
on the corresponding qubes-secpack.git repo tags. [2]
[2] Don't just trust the contents of this file blindly! Verify the
digital signatures!
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/03/15/canary-15/
- --
Andrew David Wong (Axon)
Community
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-12 02:26, Gaijin wrote:
> On 2018-02-12 01:47, Andrew David Wong wrote:
>> On 2018-02-11 18:57, Gaijin wrote:
>>
>>> The Qubes OS v3 and v2 onion services sites don't appear to have been
>>> updated sin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-08 14:19, Yuraeitha wrote:
> What we do need confirmation about is how this will officially
> relate to Qubes OS on the contents that is finished in the Qubes
> Community doc page though though. Hopefully Andrew can shine som
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-08 00:43, Ivan Mitev wrote:
> Andrew: what's your position about mentioning this community effort
> somewhere in the official qubes site ? (maybe as a news post with
> the proper disclaimer + modifying the "contribute to the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-08 17:20, 'Evastar' via qubes-users wrote:
> p.s. What is about Qubes Users community on Reddit?
>
I'm afraid I don't understand the question, but does this answer it?
https://www.reddit.com/r/Qubes/
- --
Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-07 08:48, Yuraeitha wrote:
> It might be a good idea to have some finished thoughts /
> discussions ready for Andrew, it'd be inhuman to expect him to read
> everything (it's a lot to read).
Thanks. I appreciate that. :)
&
> great news. I am missing information how to upgrade coming from a Qubes
> 4rc4.
>
Here you go:
https://www.qubes-os.org/news/2018/03/06/qubes-40-rc5/#current-qubes-40-users
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
ht
://www.qubes-os.org/doc/software-update-dom0/#testing-repositories
[domU-testing]:
https://www.qubes-os.org/doc/software-update-vm/#testing-repositories
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/03/06/qubes-40-rc5/
- --
Andrew David Wong (Axon
gt; It's just a reflection of the fact that dom0 is still using
>>> fedora 23, which is long past eol. SO no updates for the
>>> screensaver. Is it an issue? I don't think there have been
>>> advisories since 34, so 5.36 should be fine.
>>
>> Didn't think
>>> This is the spirit of git
>>
>> can't we just start to fork qubes-doc to qubes-community-doc and
>> start there. If we think we need to rearrange the content or get
>> rid of it, because it just doesn't make sense, we can still do
>> so.
>>
>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-02 23:16, Andrew David Wong wrote:
> On 2018-03-02 15:05, Yuraeitha wrote:
>> Some of the issues/questions addressed seems like they could be
>> solved quite effectively and efficiently on a highly
>>
rum?
>
FYI, in case you haven't seen this thread:
https://groups.google.com/d/topic/qubes-users/2rqas38ncFA/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQ
subset of users, and clearly doesn't belong
in any of our other extant systems), that'll probably be a convincing
example of the need for the new system. (Moreover, it might help to
define the requirements of the new system.)
Likewise, if there'
added to the XSA Tracker:
https://www.qubes-os.org/security/xsa/#252
https://www.qubes-os.org/security/xsa/#255
https://www.qubes-os.org/security/xsa/#256
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
601 - 700 of 1726 matches
Mail list logo