> I try to disable networking with the network manager applet.
>
Known bug:
https://github.com/QubesOS/qubes-issues/issues/3657
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ
/www.qubes-os.org/news/2018/10/05/qubes-321-rc1/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlu4K2EACgkQ203TvDlQ
MDCVBBAAyN6W5nqYHtbtdY9rQdz6IsOLff9etERcb3nfVAaLzr9q76
-past-and-the-future
[7] https://www.whonix.org/wiki/Support
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/10/05/whonix-support-ending-for-qubes-32/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP
known bug:
https://github.com/QubesOS/qubes-issues/issues/4154
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlurFjYACgkQ203TvDlQ
MDBM2w//fxd2tJTGnmLW1aUsFDEL/G8k3ARPMcDSksPtUPD
/#whonix
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/09/13/whonix-version-support-policy/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
Wojtek Porczyk has just published a new article titled "Introducing
the Qubes U2F Proxy." The article is available on the Qubes website:
https://www.qubes-os.org/news/2018/09/11/qubes-u2f-proxy/
- --
Andrew
take any further action to
disable it there.
If you're asking whether you should also disable it in your BIOS
settings, then I'm not sure (CCing Marek).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-
bes-users/Isn_hko7tQs/PcqIuUleEQAJ
>
We have now published QSB #43: L1 Terminal Fault speculative side
channel (XSA-273).
https://www.qubes-os.org/news/2018/09/02/qsb-43/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.q
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-15 03:58, Andrew David Wong wrote:
> On 2018-08-14 21:38, Sphere wrote:
>> CVE-2018-3646 in particular is alarming:
>> "The third flaw, CVE-2018-3646, has a CVSS Base Score of 7.1 and enables bad
>> actors to a
s website:
https://www.qubes-os.org/news/2018/09/02/qsb-43/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAluLWG8ACgkQ203TvDlQ
MDBaFw/9FEA1pX0sxe7znUF3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-26 07:12, David Hobach wrote:
> On 08/14/2018 09:12 PM, Andrew David Wong wrote:
>> Patching
>> =
>>
>> The Xen Project has provided patches to fix this issue.
>>
>> The specific packages
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-25 15:33, Chris Laprise wrote:
> On 08/25/2018 03:59 PM, Andrew David Wong wrote:
>> On 2018-08-25 14:24, 'awokd' via qubes-users wrote:
>>> On Sat, August 25, 2018 7:01 pm, Chris Laprise wrote:
>>>
ly (or not) to *any* VM. You can flip the
switch on to make a VM play the role of a ProxyVM (and/or a NetVM?),
then switch it off again later, and it'll still be the same VM. At any
rate, that's what I gather from this comment from Marek:
https://github.
https://www.qubes-os.org/news/2018/08/24/whonix-13-approaching-eol/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAluA5D0ACgkQ203TvDlQ
MDBlmA//Vdkl2E+uxZMOJtIItg7aX95nfkGOFJXkNGBATI
.google.com/d/topic/qubes-users/Isn_hko7tQs/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlt7bFwACgkQ203TvDlQ
MDDvlA//U5HMGhY59cOLy2Um
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-17 00:58, Patrick Bouldin wrote:
> On Thursday, August 16, 2018 at 6:43:50 PM UTC-4, Andrew David Wong wrote:
>> On 2018-08-16 17:35, Andrew David Wong wrote:
>>> On 2018-08-16 15:47, Patrick Bouldin wrote:
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-16 17:35, Andrew David Wong wrote:
> On 2018-08-16 15:47, Patrick Bouldin wrote:
>> Hi trying to validate 4.0. I downloaded the
>> qubes-master-signing-key.asc and then not able to progress. I did
>> find Joanna
uid Qubes Master Signing Key
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlt1/BcACgkQ203TvDlQ
MDCmuA//Y7xSLlrHkdO4zLm+7FP3xyBFMCguQkVqLQ5JYcRuvCJRVtORHQL6V/rg
A7WL7pfOaAD
s-os.org/news/2018/08/14/qsb-42/
[3]
https://www.qubes-os.org/news/2018/08/14/xsa-268-269-271-272-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltz6z0ACgkQ203TvD
n the Qubes website:
https://www.qubes-os.org/news/2018/08/14/qsb-42/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltzKaMACgkQ203
/news/2018/08/14/xsa-268-269-271-272-qubes-not-affected/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltzKcwACgkQ203TvDlQ
MDB9RA/+JGQLlCyOTw23zngxwT28f/yzl+hgE00maX1jgFayL500ErCjTttBpqez
plateBasedVMs. Could you shed some light on
this, Patrick?
[1] https://www.whonix.org/wiki/Qubes/Install
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltwpWUACgkQ203TvDlQ
MDDAJxAAoVPnb
cess that warning
> refers to and why it is not recommended.
>
Not sure about this part, sorry.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAltwoo4ACgkQ203TvDlQ
MDA7tQ/+IAd
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-04 00:01, Andrew David Wong wrote:
> On 2018-08-02 19:23, Micah Lee wrote:
>> Hello, I just discovered the recording of my HOPE talk showing off
>> many cool things about Qubes. Check it out if you're i
606
>
Thanks, Micah! That was a great presentation!
Announced on the Qubes website:
https://www.qubes-os.org/news/2018/08/03/micah-lee-hope-conf-2018/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BE
p environments in templates.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlsK8k4ACgkQ203TvDlQ
MDBuHRAAwCdNlXS9tR0fxB0wW75GB3W7PrdBKZcomxWWNMhR03WYizFhxUbAM7YT
8XxxBAWiAc7A9EGDejfaDlUZ+D
misread and I would have liked to verify
> once more: too late for this time however, I had deleted the
> template this morning right away. I'll re-do it!
>
> Bernhard
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://ww
r integrity, not authenticity. For security, PGP
signature checking is what matters.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlsJUvwACgkQ203TvDlQ
MDA+QxAAyhbtSlB3JE+65G
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-24 04:18, Holger Levsen wrote:
> On Wed, May 23, 2018 at 08:21:12PM -0500, Andrew David Wong wrote:
>> Fedora 26 will reach EOL ([end-of-life]) on 2018-06-01, and Debian 8
>> (["Jessie" full, not LTS][debian-rel
website:
https://www.qubes-os.org/news/2018/05/24/qsb-40/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlsHTIcACgkQ203TvDlQ
MDCoHw//dx+GcN8QIz0ww1tUQZufTaDwSy0eiY
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-23 20:21, Andrew David Wong wrote:
> Dear Qubes Community,
>
> Fedora 26 will reach EOL ([end-of-life]) on 2018-06-01, and Debian 8
> (["Jessie" full, not LTS][debian-releases]) will reach EOL on
> 2018-06-06. W
os.org/doc/supported-versions/#note-on-dom0-and-eol
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/05/23/fedora-26-and-debian-8-approaching-eol/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
qubes-use-xen-instead-of-kvm-or-some-other-hypervisor
> Regards
>
> Johan Skødebjerg Møller
>
> Sent with [ProtonMail](https://protonmail.com) Secure Email.
>
Please be sure to keep qubes-users CCed in any replies:
https://www.qubes-os.org/support/#keep-the-list-cced
- --
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-08 20:32, john wrote:
> On 05/08/18 15:19, Andrew David Wong wrote:
>
>>Xen vulnerability (XSA-260) and GUI daemon issue
>>
>> Summary
>>
>>
>> Today, the Xen Security
g/security/
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/05/08/qsb-39/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlryTJAACgkQ203Tv
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-05-06 13:20, Marek Marczykowski-Górecki wrote:
> On Sun, May 06, 2018 at 12:25:32PM -0500, Andrew David Wong wrote:
>> On 2018-05-06 08:51, Vasilis wrote:
>>> Hi,
>>>
>>> I was trying to find out when an
of the package, which
then creates a new issue in updates-status. Should I have left the
issue open as a reminder to do this?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rC
/supported-versions/#qubes-os
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrqe+YACgkQ203TvDlQ
MDAi0hAAjh0Hhpa+nnM5FNX5PBbE6En09fcoTE9h
ment
on 2018-06-01 stating that Fedora 26 has reached EOL, as a final
reminder to anyone who hasn't migrated yet that they should do so
immediately.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-04-30 08:54, Andrew David Wong wrote:
> Dear Qubes Community,
>
> As many of you have noticed, parts of the Qubes OS website are
> temporarily down. The reason is that GitHub is doing unplanned
> maintenance on GitHub Pag
(Markdown) files. If you need to
refer to any documentation, it's still available in the qubes-doc repo:
https://github.com/QubesOS/qubes-doc
We recommend having your own local copy of this repo.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGI
e ability to change that. Please tell /u/lugh.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhPhcACgkQ203TvDlQ
MDDG/Q/+IIDMwR+I1Jt0jsHJ2hcfiTxyEiGeGNFk6KsNh/LyCvWUOr6QQzPgEIiP
teF32
ge all four
instances of "http" to "https".
5. Click the "Save" button in the top-right corner of the window.
6. Close the window.
7. Check for updates normally.
8. Shut down the TemplateVM.
Thank you to awokd for suggesting and testing these instructions!
For furthe
XSA Tracker:
https://www.qubes-os.org/security/xsa/#258
https://www.qubes-os.org/security/xsa/#259
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrhHcoACgkQ203TvDlQ
ore devs are the developers in this list:
https://www.qubes-os.org/team/#core-team
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlrWtBgACgkQ203TvDlQ
MDC6HxAAsjMZLDgpnVfJd5rj4HMQ8j1vZ2i+
e resolved itself, or perhaps a problem
on your end.
Also, note this FAQ entry:
https://www.qubes-os.org/faq/#i-keep-getting-failed-to-synchronize-cache-for-repo-errors-when-trying-to-update-my-fedora-templates
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
---
e flag
remained active.
How [can I] get these entries out of the appropriate database again?
Maybe the same part of the boot process which is removing corpses of
dispVMs could do these plausibility checks for machines that do not
exist anymore. Or add a qubes-system-dbck.
issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.1%22+label%3Aenhancement
[26] https://www.qubes-os.org/doc/contributing/
[27] https://www.qubes-os.org/donate/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/03/28/qubes-40/
- --
Andrew Da
there's only Fedora
> 21 Template available. Thanks
>
Yes, here are the instructions:
https://www.qubes-os.org/doc/templates/fedora/#upgrading
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-22 20:04, js...@riseup.net wrote:
> Andrew David Wong:
>> On 2018-03-22 17:45, js...@riseup.net wrote:
>>> Trying to update my templates I get "connection failed" errors
>>> on connectin
onfirmed with whonix yet).
>
> Anyone else having this problem?
>
> -Jackie
>
Yes, this is a known issue. See:
https://github.com/QubesOS/qubes-issues/issues/1352#event-1536336416
- --
Andrew David Wong (Axon)
Communit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-17 15:10, Andrew David Wong wrote:
> On 2018-03-17 15:07, socks wrote:
>> On 03/17/2018 08:37 AM, socks wrote:
>>> I'm sure it's the newb in me, but I'm trying to verify the rc5.iso and
>>> get
gt;
>
> desktop ~/Downloads/Qubes-R4.0-rc5-x86_64 $ md5sum -c
> Qubes-R4.0-rc5-x86_64.iso.DIGESTS
> Qubes-R4.0-rc5-x86_64.iso: OK
> md5sum: WARNING: 22 lines are improperly formatted
>
>
> so: is this .iso OK or ?
>
That's normal:
https://ask.fedoraproject.or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-17 14:57, qubes-li...@riseup.net wrote:
>
>
> Andrew David Wong:
>> On 2018-03-17 11:40, qubes-li...@riseup.net wrote:
>>
>>>> Have you made sure that you have updated the packages in the
>>
signed Git tags.
>
> |$ cd qubes-secpack/ $ git tag -v `git describe` I get "object not
> found" proceeding in the /canaries , it's ok |
>
Cannot reproduce. Following those exact steps works for me. Perhaps
there was a typo?
- --
Andrew David Wong (Axon)
Community
me.
>
> Yes I've updated and regenerated the dispvm after the dom0 update.
>
Same here. Updating and regenerating did not resolve the issue.
Tracking:
https://github.com/QubesOS/qubes-issues/issues/3711
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://ww
something?:
> https://github.com/QubesOS/qubes-secpack/tree/master/canaries
>
> Is it only released on github in the future?
>
> Sincerely
> Max
>
It's not automatic. I just didn't have time to update everything and
publish all the announcement
are as follows:
- Xen packages, version 4.6.6-37
[...]
```
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/03/15/qsb-37-update/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qube
[1] This file should be signed in two ways: (1) via detached PGP
signatures by each of the signers, distributed together with this
canary in the qubes-secpack.git repo, and (2) via digital signatures
on the corresponding qubes-secpack.git repo tags. [2]
[2] Don't just trust the contents of this file bl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-12 02:26, Gaijin wrote:
> On 2018-02-12 01:47, Andrew David Wong wrote:
>> On 2018-02-11 18:57, Gaijin wrote:
>>
>>> The Qubes OS v3 and v2 onion services sites don't appear to have been
>>> update
gt; light on that.
>
As explained above, I'm envisioning that the finished output of the
community system will be a high-quality PR submitted to qubes-doc.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
o reflect well on the official project (its members
follow the Code of Conduct [1], the website doesn't serve malware,
etc.), then it shouldn't be a problem.
[1] https://www.qubes-os.org/code-of-conduct/
- --
Andrew David Wong (Axon)
Community Manager, Qubes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-08 17:20, 'Evastar' via qubes-users wrote:
> p.s. What is about Qubes Users community on Reddit?
>
I'm afraid I don't understand the question, but does this answer it?
https://www.reddit.com/r/Qubes/
- -
he GUI
(i.e., submit content, ideas, and suggestions in any format, which the
community then turns into proper PRs).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlqgnJcACg
missing information how to upgrade coming from a Qubes
> 4rc4.
>
Here you go:
https://www.qubes-os.org/news/2018/03/06/qubes-40-rc5/#current-qubes-40-users
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZ
esting]:
https://www.qubes-os.org/doc/software-update-dom0/#testing-repositories
[domU-testing]:
https://www.qubes-os.org/doc/software-update-vm/#testing-repositories
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/03/06/qubes-40-rc5/
- --
Andrew D
t;>>>
>>> It's just a reflection of the fact that dom0 is still using
>>> fedora 23, which is long past eol. SO no updates for the
>>> screensaver. Is it an issue? I don't think there have been
>>> advisories since 34, so 5.36 should be fin
start to fork qubes-doc to qubes-community-doc and
>> start there. If we think we need to rearrange the content or get
>> rid of it, because it just doesn't make sense, we can still do
>> so.
>>
>> In the main qubes-doc repository it seems that some skilled use
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-02 23:16, Andrew David Wong wrote:
> On 2018-03-02 15:05, Yuraeitha wrote:
>> Some of the issues/questions addressed seems like they could be
>> solved quite effectively and efficiently on a highly
>>
rum?
>
FYI, in case you haven't seen this thread:
https://groups.google.com/d/topic/qubes-users/2rqas38ncFA/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203
guide
that clearly *doesn't* belong in qubes-doc for some reason (and is
demonstrably valuable to a subset of users, and clearly doesn't belong
in any of our other extant systems), that'll probably be a convincing
example of t
added to the XSA Tracker:
https://www.qubes-os.org/security/xsa/#252
https://www.qubes-os.org/security/xsa/#255
https://www.qubes-os.org/security/xsa/#256
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
ora-23 template VM because even after several restarts the fedora-23
>> template VM is still showing up in the Qubes VM Manager. How can I get rid
>> of it for good?
>>
>
> See link in first line. I forgot link the first time I sent this.
>
Try this:
https://www.qubes-os
yle
>
Does this help?
https://www.qubes-os.org/doc/templates/fedora/#after-installing
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlqNELUACgkQ203TvDlQ
MDDjCBAAuCHhRevjEfH
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-02-17 19:17, Andrew David Wong wrote:
> On 2018-02-17 09:00, rqwang2...@gmail.com wrote:
>> R3.2
>
>> It seems that my wireless network controller sometimes failed to work even
>> when I use the method desc
g
> vms when wifi fails?
>
You don't have to shut down any other VMs in order to restart sys-net.
You just have to change the NetVM settings of any ProxyVMs that are
using it first (which is usually just sys-firewall). Try this:
$ qvm-prefs -s sys-firewall netvm none
$ q
just have a dedicated VM (e.g.,
the "untrusted" VM) that always has the same NetVM setting.
> thanks J
>
> Sent from my iPhone
>
P.S. - Please keep the qube-users mailing list CCed and direct future
queries there. You can read more about our mailing lists here:
https://www
/#users Bottom of user section
>
FYI, you can link to an individual FAQ by using the "link" icon that
appears when you hover over it. (This works for all headings on the
Qubes website.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
>
> For example I don't see the news of the 4.0-rc4 release, or recent
> changes to the Docs.
>
Thanks for the report! Tracking:
https://github.com/QubesOS/qubes-issues/issues/1352#issuecomment-364812018
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qu
requirement when it runs under KVM with virtualized
> hardware. (Not sure.)
>
> Regards, Vít Šesták 'v6ak'
>
We've received a hosting offer and are currently trying to make
contact and work out the details. Thank you to all who have offered
help.
- --
Andrew
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-02-07 05:20, 'Tom Zander' via qubes-users wrote:
> On Wednesday, 7 February 2018 08:17:11 CET Andrew David Wong
> wrote:
>> Are you using the `-a` option?
>>
>> qvm-run -a
>>
>> This st
able.
>
Are you using the `-a` option?
qvm-run -a
This starts the VM if it's powered off, then runs the command in it.
Working fine for me on 3.2.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZ
what is
> triggering this bug, since my usb-vm is also based on a
> fedora-26-minimal template but does have the gui-entrys/the
> qvm-copy function
>
> cheers
>
Thanks. Updated the issue.
P.S. - Please try to avoid top-posting.
> On 02/06/18 02:21, Andrew David Wong wrote:
ce or twice, you might want to boot from a live image
> instead and run it from there. Don't forget to verify signatures!
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEE
h package i need to add?
>
When you say that it's "missing," does you mean that the CLI tool is
missing, or the option is missing from the GUI context menu, or both?
In either case, this sounds like this might be an oversight. Tracking:
https://github.com/QubesOS/qubes-issu
u'd like to send it to a Qubes developer in case it might be
useful (I don't know whether it will be), you can send it to Marek in
a PGP-encrypted email:
https://www.qubes-os.org/team/#marek-marczykowski-g%C3%B3recki
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://ww
elpful!
We've been investigating this problem for a while, but we haven't been
able to determine the cause.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlp3pq
fusion and creates extra
> work, which takes time away from working on the actual problem.
>
> -> agree
>
> I don't want to bother the team. Just my two pences.
>
> Thx
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https:
ke it's a github shortcoming. Had you taken 2 secs
>> to websearch it, you'd have found:
>>
>> https://stackoverflow.com/questions/21333654/how-to-re-open-an-issue-in-github#21333938
>>
>> first hit, no need to even click the link, the answer
available on the Qubes website:
https://www.qubes-os.org/news/2018/01/31/qubes-40-rc4/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlpyfsUACgkQ203TvDlQ
MDDB3w/+M0JJTT1cW
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-26 05:14, awokd wrote:
> On Fri, January 26, 2018 3:36 am, Andrew David Wong wrote:
>> On 2018-01-25 12:28, awokd wrote:
>>> 1. Should I open an issue for tracking and move the discussion
>>> over there? Mov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-26 05:38, 'awokd' via qubes-users wrote:
> On Fri, January 26, 2018 9:22 am, Alex Dubois wrote:
>> On Friday, 26 January 2018 03:36:33 UTC, Andrew David Wong
>> wrote:
>
>> Happy to contribute. maybe we
d from the tiny amount of developer time ~70
EUR/month would pay for.)
However, I'd be surprised if there were no one in the Qubes community
willing to share a suitable machine for this purpose. My guess is that
there aren't as many readers on qubes-project as there are on
qubes-devel and qube
n want to keep
severely outdated category 2 documentation around. Does it have any
value anymore, or will it just produce misleading search results?
(Note that it will all remain permanently archived in the git revision
history, so it's mainly a question of v
being tested
by the community.
If you use Anti Evil Maid, you will need to reseal your secret
passphrase to new PCR values, as PCR18+19 will change due to the new Xen
binaries.
```
[1] https://github.com/QubesOS/qubes-secpack/pull/18
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
ht
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-24 04:28, Andrew David Wong wrote:
> On 2018-01-23 09:17, Alex Dubois wrote:
>> On Tuesday, 23 January 2018 07:26:09 UTC, Andrew David Wong wrote:
>> Dear Qubes Community,
>
>> The Qubes and Whonix projects now
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-01-23 09:17, Alex Dubois wrote:
> On Tuesday, 23 January 2018 07:26:09 UTC, Andrew David Wong wrote:
> Dear Qubes Community,
>
> The Qubes and Whonix projects now have next-generation Tor onion
> services [1] (a.k.a. &qu
es | PV |HVM| HVM |
Stub domains - Default VMs w/o PCI | N/A |PV | N/A |
Stub domains - Default VMs w/ PCI | N/A |PV | PV|
Stub domains - HVMs| PV |PV | PV|
```
On 2018-01-11 08:57, Andrew David Wong wrote:
> Dear Qubes C
/trac.torproject.org/projects/tor/wiki/doc/NextGenOnions
[3] https://www.whonix.org/blog/whonix-new-v3-onion-address
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/01/23/qubes-whonix-next-gen-tor-onion-services/
- --
Andrew David Wong (Axon)
Community Man
tml
And on the Qubes website:
https://www.qubes-os.org/news/2018/01/22/qubes-air/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlpmBMEACgkQ
601 - 700 of 1913 matches
Mail list logo