boot can be a risk, since
Qubes can't isolate USB controllers during early stages of the boot
process. IIRC, Joanna's recommendation is to unplug all USB devices
before (re)booting.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.
expected DNS server on my LAN.
>>
>> Do you have an idea why this DNAT rule is missing? (I am not sure to
>> understand why 2 different nameserver are filled in resolv.conf).
>>
>> Many thanks for your help,
>>
>> Antoine
>>
>> --
>
> No idea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-05 12:05, raahe...@gmail.com wrote:
> On Sunday, March 5, 2017 at 5:31:48 AM UTC-5, Andrew David Wong wrote:
> On 2017-03-03 15:41, raahe...@gmail.com wrote:
>>>> On Friday, March 3, 2017 at 6:38:24 PM UTC-5, raah...@gm
y userspace, which
> could optionally do some authenticity checks (e.g. verify the bootloader
> was not modified)[2], and then ask for the main partition password.
> Although not perfect, this helps protects the kernel and early userspace
> from tampering and mitigates certain other offline attacks
need it?!
>>>
>>> thanks
>>
>> I removed it haven't noticed any problems. But I also wonder
>> what it is.
>
> Hopefully removing it did not lessen my security?
>
Relevant issue: https://github.com/QubesOS/qub
days for this but didn't see anything submitted,
so I've created an issue for it:
https://github.com/QubesOS/qubes-issues/issues/2670
Didn't mean to steal your thunder, but I was afraid it would end up
falling through the cracks (as so many important issues do).
> We shoul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-01 13:41, Grzegorz Chodzicki wrote:
>
>
> On 03/01/2017 10:19 PM, Andrew David Wong wrote:
>> On 2017-03-01 07:39, Grzesiek Chodzicki wrote:
>>> W dniu środa, 1 marca 2017 16:05:32 UTC+1 użytkownik Grzesie
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-01 07:39, Grzesiek Chodzicki wrote:
> W dniu środa, 1 marca 2017 16:05:32 UTC+1 użytkownik Grzesiek
> Chodzicki napisał:
>> W dniu środa, 1 marca 2017 04:45:27 UTC+1 użytkownik Andrew
>> David Wong napisał:
>
ng updates (optionally as a cron job):
https://gist.github.com/andrewdavidwong/d0b109186de65835255d467ae103c289
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYtptVAAoJENtN07w5UDAwkLwP/3Wp9RLzcU
ability of templates that are already
installed.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYtpsMAAoJENtN07w5UDAwJqAP/jA8bi+kmOwkGoOr3t8RRq1X
UQKorCQ4Nd96PkJ75uYPAmRspoxnTfIgaul6mtoO6ZVYXArQlcX9BkAxhqlcjelb
pX
announcement on the Web at:
https://www.qubes-os.org/news/2017/03/01/qubes-os-3-1-eol-on-2017-03-29/
[Supported Versions]: https://www.qubes-os.org/doc/supported-versions/
[Version Scheme]: https://www.qubes-os.org/doc/version-scheme/
[downloads]: https://www.qubes-os.org/downloads/
- --
Andrew David
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-28 03:21, Grzesiek Chodzicki wrote:
> W dniu wtorek, 28 lutego 2017 06:50:47 UTC+1 użytkownik Andrew
> David Wong napisał: On 2017-02-27 10:29, Grzesiek Chodzicki wrote:
>>>> W dniu poniedziałek, 27 lutego 2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-27 10:29, Grzesiek Chodzicki wrote:
> W dniu poniedziałek, 27 lutego 2017 19:19:07 UTC+1 użytkownik
> Andrew David Wong napisał: We’re pleased to announce that the Qubes
> OS Project has been accepted as a mentor organization f
you’re interested in
participating, please see our GSoC 2017 page for details!
https://www.qubes-os.org/gsoc/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYtG2GAAoJENtN07w5UDAwsvkP/2YTJ29u+cJRRtZXewopCUEm
work with such a commercial
> software in an AppVM, as I don't want to work in the TemplateVM?
>
Consider using a StandaloneVM:
https://www.qubes-os.org/doc/glossary/#standalonevm
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-23 04:56, Unman wrote:
> On Wed, Feb 22, 2017 at 08:55:23PM -0800, Andrew David Wong wrote:
>> On 2017-02-17 16:54, Unman wrote:
>>> On Sat, Feb 18, 2017 at 12:14:52AM +0100, u+q...@bestemt.no
>>> wrote:
>&g
ird with TorBirdy and Split GPG. This is
what I used to do, though I did run into compatibility issues, which
*might* now be solved. Using Split GPG would help to mitigate the
concern about exposing your PGP keys to the Whonix Workstation VM:
https://www.qubes-os.org/doc/split-gpg/
- --
/866
More recently, unman has shared a script that works around this issue:
https://groups.google.com/d/msg/qubes-users/2uN9ybLTqHQ/XMy6d5UkDwAJ
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE
in this manner,
but I see no changes (no option to add additional menu entries or
launcher entries) even after regenerating the DVM Template. How is
this supposed to work?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQ
short time.
>
Unman is correct. I'll just add that one way to "poke Tor," i.e., to
get a "new identity" by building a new circuit, is to open Arm (Tor
Controller) in sys-whonix and press "n".
- --
Andrew David Wong (Axon)
Community Manager, Qubes O
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-20 10:02, hawk...@bitmessage.ch wrote:
> On Mon, 20 Feb 2017 02:05:41 -0800
> Andrew David Wong wrote:
>
> On 2017-02-17 13:06, hawk...@bitmessage.ch wrote:
>>>> As a generalization of my previous quest
being a fc23
> version? (maybe the version was simply not updated)
> how can i install pycairo?
>
> - John
>
This is a known issue:
https://github.com/QubesOS/qubes-issues/issues/2606
As described in the comments, the workaround is to specify a version
num
me - 100Мб
> /var/log - 300Mb
> /var/log/
>
> BTW: Looks like LVM thin provisioning gives at least two times slower
> writes, so I'm about to use usual LVM.
>
>
Take a look at this, if you haven't already:
https://www.qubes-os.org/doc/custom-install/
- --
Andrew Da
XFCE panel. I would like to get this displaying
>> the netVM's traffic rate, next to the red netvm in Dom0's panel.
>> However, typically it doesn't run in the "notification area", and I'm
>> not sure how to get it displayed in Dom0 (as the netvm i
a minimal
> vms? - john
>
This is a known issue with no known workaround:
https://github.com/QubesOS/qubes-issues/issues/2536
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYqr6cAAoJENtN07w5UDAwtI8P/2baaYODx
GUI of each TemplateVM, you can
save resources and hassle. Here's an example:
https://gist.github.com/andrewdavidwong/d0b109186de65835255d467ae103c289
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJY
hx
>
You have to install it in the TemplateVM (or, for more advanced users,
pick a persistent dir and/or use bind-dirs):
https://www.qubes-os.org/doc/templates/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJY
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-12 11:54, qu...@posteo.de wrote:
> Hi Andrew,
>
> thx for adding it to the documentation. On 12.02.2017 03:22, Andrew
> David Wong wrote:
>
>> Thanks. Added:
>>
>> https://gi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-11 21:46, elsiebuck...@gmail.com wrote:
> On Saturday, February 11, 2017 at 9:08:56 PM UTC-5, Andrew David
> Wong wrote:
>>
>> You should try to the method I described here:
>>
>> https://groups.
t;
See: https://www.qubes-os.org/doc/yubi-key/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYn8cdAAoJENtN07w5UDAwNCoQAKqWEHlX9WgzZM8aUdsuqZC1
sPVL8P7ihP4thyFiHnxfS527ASb8UxnpXFwZCnyEmtp103ons
Thx in advance
>
> I have finally figured out the missing package. It is "perl-Encode".
> With this the dvm creation process runs through. Can somebody add this
> to the "Customize disposable vm Wiki"?
>
> Regards
>
Thanks. Added:
https://github.com/Qubes
I described here:
https://groups.google.com/d/topic/qubes-users/fSiFkQeoqGE/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYn8OnAAoJENtN07w5UDAwAG4QAM8LURn
tainers, like docker and lxc, are possible, as
> is emulation like running qemu without kvm extensions or virtualbox
> with 32bit guests with acceleration turned off.
>
> you could make your own qubes build with it on. look for marmarek
> in qubes-devel for threads on tha
better
> competition in security conscious hardware.
>
>> Shouldn't these CPUs and motherboards be specially noted as
>> dangerous in qubes HCL?
>
> agreed, but i think its up to Andrew David Wong
>
> (i hope that triggers a mention notice so he sees this)
>
;m writing to the mailing list
> to let other puzzled flatpak-distributed-software-users know.
>
Thanks, Alex! :)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYnrgwAAoJENtN07w5UDAwfV0QAJ
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-10 15:32, Oleg Artemiev wrote:
> On Tue, Feb 7, 2017 at 1:41 PM, Andrew David Wong
> wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>>
>> [Please keep the list CCed.]
>>>>> why do we use
ly, it should also work in the same
way using qvm-block, but the let's try to eliminate some variables.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYnRpuAAoJENtN07w5UDAwZe8P/A0UlSRG9cZl+dQ3K3Km0Icy
your updateVM is NOT running through Tor then
> updates will always file. If it IS then they will fail some of the time
> - that seems to be inevitable using Tor.
>
> If you really do want to revert then you dont need to worry about this.
> Just revert the changes you made
bug it.
>
> I would be thankful for any help.
>
> Thanks!
>
Is chromium the only program with which you experience this problem?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE---
y. Please describe, in detail, (1)
what you expect to happen, (2) the exact steps you're performing in an
attempt to achieve (1), and (3) the actual results you're experiencing
instead of (1).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP S
stead of red should not matter (except
aesthetically).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYm4+7AAoJENtN07w5UDAwrQMP/2vJz6L0ghQrIY09+t1jYBmB
bJBhGAVLD1fjkh9iobbOhos/AVWAJiSzxSBCB3xdPODF4Jm
ow, it's very difficult. I just try to be very careful when
entering passphrases. If I have insufficient privacy, I don't enter
them at all. Once per-VM encryption is implemented, it should help
with many aspects of this problem:
https://github.com/QubesOS/qubes-issues/issues/1293
- --
cluded by default soon:
https://github.com/QubesOS/qubes-issues/issues/953
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYm43EAAoJENtN07w5UDAwPuQP/25xgVK7bL5XMJjRHKLeWMJu
5HXOai2TaFKLdIscyVHIZbjSqT/9B+06+
cussed here:
https://groups.google.com/d/topic/qubes-users/fSiFkQeoqGE/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYmapOAAoJENtN07w5UDAwQKkP/Rk9PPLXAPtTagkGJssRoOXU
jF50P
to:
https://github.com/QubesOS/qubes-issues/issues/2054
You may have to manually edit /var/lib/qubes.xml, but be very careful
if you do.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYmal5AA
es to access. But qubes attempts to expose the drive
> as a block device makes it unaccessible to sound-juicer.
>
> Is there a way to prevent this? E. g. prevent qubes from exposing a certain
> device in a certain appvm?
>
> Best regards,
> Timo
>
Not sure if this is an op
These might be particularly subjective to the user's workflow.
>> Why not just place those windows on that virtual desktop if you
>> want to, and not place any other ones there? Why does it have to
>> be enforced by the OS?
> I did not request to
es
> in sys-firewall which isn't connected to whonix-gw but to sys-net?
In that case, you can set your UpdateVM as a ProxyVM that uses
sys-whonix as its NetVM. You can just create a new ProxyVM for this
purpose.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-o
non-whonix, so the network is
> reachable from my hardware. My sys-net has 2 devices attached, an
> eth0 device and my wireless card; using wireless.
>
Are you only able to connect through Tor, or can do you also have
clearnet connections from AppVMs?
> I don't know why the upda
nk that's normal. My last dom0 updates were on January 8. I
haven't seen any available since then, whether checking over Tor or
over my home clearnet connection.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
--
s.google.com/d/msg/qubes-users/2uN9ybLTqHQ/XMy6d5UkDwAJ
> - (how) can I preconfigure disposable VMs? AIUI the home directory is always
> created freshly, how can I put stuff in there? (eg always re-configuring
> Firefox is annoying…)
https://www.qubes-os.org/doc/dispvm-customizatio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-03 17:49, Andrew David Wong wrote:
> [...] This is a good time to mention that we're in need of an HCL
> maintainer. Our longtime volunteer HCL maintainer, Zrubi, no
> longer has the time to do it. We all owe Zrubi a deb
the last time Vít Šesták posted.
> Its one of the last couple posts on 1/4/16. That is where it starts about
> the fedora minimal between Him myself and Manuel/Rudd-o. Maybe that might
> be of some help.
>
Also, take a look at the "NetVM&q
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-05 14:23, Unman wrote:
> On Sun, Feb 05, 2017 at 04:38:09AM -0800, Andrew David Wong wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>>
>> On 2017-02-04 12:59, Unman wrote:
>>> On Sat, Fe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-05 05:10, Stickstoff wrote:
> On 02/05/2017 01:39 PM, Andrew David Wong wrote:
>> On 2017-02-04 15:10, Oleg Artemiev wrote:
>>>> This is a good time to mention that we're in need of an HCL
>>>> ma
ng about how to create
a USB qube?
https://www.qubes-os.org/doc/usb/#creating-and-using-a-usb-qube
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlx5XAAoJENtN07w5UDAwYjEP/3cEI+b
nd
restoring AppVMs in such symlinked directories.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlx2RAAoJENtN07w5UDAwwtoQAI64lYDoPjb6jMBDnzJersmF
QmeYHjLxf+amM0E2ujfjJnviVQCuEIrEiN/kCJiRosI+q0kvZnP+3vEIsUBNBR7Y
had to be edited manually, but it could indeed be
automated better. Can you help us with that? :D
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlxzlAAoJENtN07w5UDAwK8AQAMRo/7/9OUj0W6/CTc32Bqfj
iQ6If
/lib/qubes/appvms. So if you
> generate a number of different dvms based on different templates,
> it's simple to switch between them before launching a new dispVM.
> The launch time isn't noticeably different from starting up a new
> dispVM, and voila - multi
) EFI loader, using configuration [...],
> vmlinuz [...], initrd.img [...]"
>
> (I'm guessing the video is going elsewhere, but I don't know
> where!)
>
> Thanks!
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP S
do it. We all owe Zrubi a debt of gratitude for
keeping up this thankless task for so long! :)
Any volunteers?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlTMPAAoJENtN07w5UDAwy8IQAIsstiJxRm1/c8ZSqo86jS9x
zHiO84jZ
t-run-yum-or-dnf-failed-to-synchronize-cache-for-repo/
https://unix.stackexchange.com/questions/286707/failed-to-syncronize-cache-for-repo-fedora-possible-proxy-issues
https://bugzilla.redhat.com/show_bug.cgi?id=1219283
https://bugzilla.redhat.com/show_bug.cgi?id=1205341
- --
Andrew David Won
s-specific.
It usually means that there's some problem with the repo server or
with your connection to the server. You can keep retrying the server
until you get through, or try again later.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN P
VM
>
> Additional details:
> Switching the template back to regular fedora-24 causes the qvm-usb to work
> fine.
>
Are you sure that the necessary packages and all dependencies are
actually installed? See:
https://github.com/QubesOS/qubes-issues/issues/2606
- --
Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-03 09:57, Patrick Bouldin wrote:
> On Friday, February 3, 2017 at 12:44:12 PM UTC-5, Patrick Bouldin
> wrote:
>> On Friday, February 3, 2017 at 12:28:36 AM UTC-5, Andrew David
>> Wong wrote:
> On 2017-02-02 07:57,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-03 00:27, Hack wrote:
> On 02/03/2017 09:05 AM, Andrew David Wong wrote: On 2017-02-02
> 23:13, Hack wrote:
>>>> On 02/03/2017 06:35 AM, Andrew David Wong wrote: On
>>>> 2017-02-02 06:09, Hack wrote:
>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-02-02 23:13, Hack wrote:
> On 02/03/2017 06:35 AM, Andrew David Wong wrote: On 2017-02-02
> 06:09, Hack wrote:
>>>> Hi,
>>>>
>>>> Could it be possible to provide Qubes OS with Devilspie2 at
>>
spie2 (or a similar program) yourself and
set up your own virtual desktops as you please, if that's what you desire?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYlBacAAoJENtN07w5UDAwgBUP/jeFcplQex
sr0 /home/user/CD',
> the path exists. the error notice: bad superblock Any idea?
>
I suspect that this is not a Qubes-specific problem:
https://lists.debian.org/debian-user/2012/08/msg00530.html
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
rate fine, except for the
> hdmi monitor.
>
>
> Thank you, Patrick
>
Maybe this is the same issue?
https://github.com/QubesOS/qubes-issues/issues/2387
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBC
qubes-issues/issues/2606
Did you make sure to restart the VM after installing pycairo?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYknEXAAoJENtN07w5UDAw7FEQAJ7
t; (not sure if its mounted at exactly /mnt/sysroot - see `mount` output to
>>>
>>> be sure).
>>>
>>>
>>>
>>> Big thanks to Marek!!
>>>
>>> Regards
>>>
>>> Ronald
>
> Check whether the network shares
x27;s not a problem with your router?
> I am installing on a Dell PowerEdge T710 and have added
> "-- efi=attr=uc" to the boot command.
>
> Any help with these problems would be much appreciated as I would
> like to use Qubes as my main operating system.
>
mat is:
HCL -
Thank you for your understanding. You can read more about the HCL
submission procedure here:
https://www.qubes-os.org/doc/hcl/#generating-and-submitting-new-reports
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.or
he correct subject line format is:
HCL -
Thank you for your understanding. You can read more about the HCL
submission procedure here:
https://www.qubes-os.org/doc/hcl/#generating-and-submitting-new-reports
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https:/
pment as my daily job, so I should be able to look
> into and debug things, if you give me an hint
CCing Marek, Master of Hints. :)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYkVJpAAoJENtN07w5UDAwiTUP/0J0QZDE78MWHo
ome other productivity programs) in
fedora-24-okular.
03. In dom0: $ qvm-create-default-dvm fedora-24-okular
04. Create a PDF in fedora-24-okular.
05. Double-click on the PDF in Nautilus. It opens in Evince by default,
as expected.
06. Right-click on the PDF in Nautilus. In Properties, set Ok
> using dnf to update all packages, the problem is introduced. The
> smallest package set I've found to reproduce this is just dnf, ie.
>
> dnf update dnf
>
> will trigger the behaviour. But I'm not really sure where to look
> next. Any suggestions?
>
> Th
ething like:
$ sudo cryptsetup open /dev/xvdi hdd
$ sudo mount /dev/mapper/hdd /mnt/removable
$ cd /mnt/removable
$ ls
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYjG4DAAoJENtN07w5UDAwQO0QAMPg3I4YoMMxMRcJ
our USB qube great power -- potentially
control of the entire system.
Perhaps someone who has dealt with these issues on Qubes 3.2 will be
able to speak from experience.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN
m USB?
>
> A greeting
>
Yes, you can pass `qvm-start --hddisk=DRIVE_HD` or `qvm-start
- --cdrom=DRIVE_CDROM`. See `qvm-start --help` for details.
You can also go to Qubes Manager -> VM Settings (of an HVM) ->
Advanced tab -> [x] Additional drive -> Select the type, backend
7;s probably your best bet.
Another option is a browser extension that allows you to whitelist the
domains you want. This is less secure than Qubes firewall rules
(because it's enforced from within the browser instead of from outside
the VM), but it allows potentially much more fine-gra
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-27 18:11, anoa wrote:
> On 01/27/2017 12:21 AM, Andrew David Wong wrote:
>> [Please don't top-post.]
>>
>> On 2017-01-26 20:21, marcio...@gmail.com wrote:
>>> I think it would be not very practical
, it can freely stole it and send wherever it wants.
>>>
>>
>> Yeah, I don't see much benefit in using the split model for
>> something like passwords. It really makes sense for asymmetric
>> crypto or other challange-re
> 2. In general I would like to know if you can install or run the OS
> on images on the secondary disk or as an alternative to a secondary
> physical disk (SATA or USB)?
>
Yes, this is easy:
https://www.qubes-os.org/doc/secondary-storage/
- --
Andrew David Wo
ur (sub)key(s) in order to get
Split-GPG working correctly. As mentioned above, we do not believe PGP
key passphrases to be significant from a security perspective."
From: https://www.qubes-os.org/doc/split-gpg/
- --
Andrew David Wong (Axon)
Community Mana
here was a
thread about it:
https://groups.google.com/d/topic/qubes-users/jtjyq8N6bY0/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYiVS2AAoJENtN07w5UDAwMNwQA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-25 14:22, Pietro Speroni di Fenizio wrote:
> On Wednesday, January 25, 2017 at 11:13:54 PM UTC+1, Andrew David Wong wrote:
> On 2017-01-25 13:27, Pietro Speroni di Fenizio wrote:
>>>> Hello, we just installed a Qubes in
. In fact when the computer turns on at the beginning only
> dom0 is active and even sys-net and sys-firewall are inactive.
>
> Many thanks, Pietro
>
It sounds like you have this device assigned to more than one VM.
Check the "Devices" tab in the VM Settings for each VM t
in/qubes-users/redshift
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYhhi8AAoJENtN07w5UDAw3CYP/3RumzXamieUNnWg5aHQ7Son
BZS3lLseYzNX4HuTpVH0a1Cq+Ttqp8khQTn6SOVvrQF31GhUsY1HstY6ElN9dKJ2
+/Fjssv8SwIk+BeAyvo
y) use the Qubes onion service
repos by following these instructions:
https://www.qubes-os.org/doc/onion-service-repos/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJ
allowing the traffic from the relevant IP in the FORWARD
> chain?
>
> Try changing the netvm for the relevant qube - make sure the iptables
> rules change on the firewall. Then try reconnecting.
> You can do this on command line using:
> qvm-prefs netvm -s none
> and
> q
noise using the same setup but running windows, so i
> dont think its the hardware or cable.
>
> Any suggestions?
>
Have you tried enabling low-latency audio mode for the affected VMs?
https://www.qubes-os.org/doc/config-files/
- --
Andrew David Wong (Axon)
Community Manager, Qubes
now issue? Is there a tool i can use to monitor my
> system temps? where should i install such tool? in dom0?
>
> Thanks
>
Sounds like it might be this (or related to this):
https://github.com/QubesOS/qubes-issues/issues/2399
- --
Andrew David Wong (Axon)
Community Manager, Qubes O
gt; That's strange. I thought that was the original qubes onion
>>>> address? If you (meaning qubes admin/dev) don't have control over
>>>> "http://qubesosmamapaxpa.onion/";, who does?
>>>>
>
> Yes, it
'yum.qubes-os.org' was no longer present in
>> the text and therefore couldn't be found in order to be
>> replaced.
>
> I'm not sure what you mean by this. Why would "yum.qubes-os.org"
> not have been present in the
u might be doing something wrong but leaving it out of
your descriptions.
For example, your "procedure" didn't even include enabling the
RPMFusion repo, so evidently a lot of important details are missing
from your reports.
- --
Andrew David Wong (Axon)
Community
are 2 distinct onion addresses that can be used for
> the qubes repos, "qubesos4z6n4.onion" or "whonix
> kk63ava6.onion". Is there any reason to prefer one over
> the other?
>
No, both point to the same server.
> 2. Which onion address s
rect onion repo. Tried using "sudo
> sed -i 's/yum.qubes-os.org/yum.qubesos4z6n4.onion/'
> /etc/yum.repos.d/qubes-dom0.repo && cat
> /etc/yum.repos.d/qubes-dom0.repo" with the same results.'
>
> (Noticed the command from the whonix wiki
if the devs could make that change in an
> upcoming update, at least until onion service repos are
> implemented.
>
Qubes onion repos have just been implemented. Minimal documentation
available here:
https://www.qubes-os.org/doc/hidden-service-repos/
- --
Andrew David Wong (Axon)
Commun
901 - 1000 of 1911 matches
Mail list logo