ficant from a security perspective."
The reasoning can be found throughout the document (search for
"passphrase").
https://www.qubes-os.org/doc/split-gpg/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-
u sure that you're entering the correct passphrase?
2. Where exactly are you seeing this error?
3. Is there more to it, or is that the whole error?
4. In your system, what is /dev/sda2 (e.g., root partition)?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-B
rring to this
guide?
https://www.qubes-os.org/doc/custom-install/
If not, to what are you referring? (The installer itself should not
require any manual partitioning.)
P.S. - Please do not top-post, and please keep the list CCed.
> On Fri, Dec 16, 2016 at 5:55 PM, Andrew David Wong
>
ributions][5] by the
> [community][6]. ([wiki history][7])
>
> [...]
>
Excellent! Thank you to everyone who contributed. Added a link to the post here:
https://www.qubes-os.org/doc/whonix/#customizing-reinstalling--uninstalling-whonix
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
roblem VM.
>
> As I'm already wrote I still think the problem with background updates...
> Maybe race condition or something like this that freeze update task and all
> network access?
>
FWIW, `systemctl restart qubes-firewall` fixed it for me last time.
- --
Andrew Da
ube makes dom0 vulnerable? (i had the same
> setup until i got myself ps2 splitter)
>
Correct. If you're not using a USB qube (i.e., your USB controllers are left in
dom0), then a malicious USB device plugged into a USB port can compromise dom0.
- --
Andrew David Wong (Axon)
Community
sounds like the Tor Browser
update might've pushed you over the default 2 GB size limit. Maybe try
increasing the size of your DVM template?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYUnfxAAoJENtN0
e have
been two releases since this thread was started.
I understand that it can be frustrating to have a problem for a long
period of time without finding a solution, but to say something that
one knows is untrue as a way of venting that frustration is rather
transparent.
- --
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
(Please keep the list CCed.)
On 2016-12-14 08:17, explodingbee . wrote:
> *Hi Andrew Wong,* *See my comments below.*
>
> On Wed, Dec 14, 2016 at 9:20 AM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>
> On 2016-1
get this message :
>
> "Error starting VM 'email': Error: Failed to connect to qmemman: [errno 2] no
> such file or directory"
>
> Anyone can help to properly finish this upgrade to 3.2 process ?
>
Did you proceed to upgrade your TemplateVMs according to the instructio
e, you don't want to actually try to run the installer
in this situation!)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYVSqWAAoJENtN07w5UDAwVaUP/2Zae8Kfqn2M2Dvu4GQ6002d
95dMf1Cxi4apEcTqA14n5jgnE2c5ekSelX9pMUjeT
phase forever, without any
> visible progress, until the VM eventually crashes.
>
> Is there something that I missed, does anybody have a clue ?
>
> TIA, kind regards.
>
> ॐ
>
This is a longstanding Windows problem:
https://superuser.com/questions/951960/windows-7-sp1
"
The new functionality should still be considered safe, since a VM
window still can't voluntarily enter fullscreen mode. The user has to
select this option from the trusted window manager in dom0.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEG
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-17 04:22, Swâmi Petaramesh wrote:
> Le 17/12/2016 à 13:07, Andrew David Wong a écrit :
>>
>>> # cryptsetup luksOpen /dev/sda2 open_sda2
>>
>>> ...If your passphrase works that's good. if it d
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-17 07:18, Loren Rogers wrote:
> Perfect! Thanks for pointing that out. It may also be useful to
> mention the ALT+SPACE XFCE shortcut.
>
> Loren
>
Thanks. Updated.
- --
Andrew David Wong (Axon)
Community Manager,
k it would be fantastic to have this.
> There used to be such a service but it's long out of date
> now.
We had an onion service (back then a "hidden service") mirror of the
website, but I don't think we ever had an onion service package repo
(at least, not that I'm aware of)
r message to only one list next time. I'm
replying on both lists so that this message doesn't appear to be
ignored on one of them, but please direct any further replies only to
qubes-users (and, optionally, individual thread participants).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
h
bout the x220 and x230 models, and Michael has suggested
adding them as Qubes-certified laptops. [2]
Best,
Andrew
[1] https://github.com/QubesOS/qubes-issues/issues/2155
[2] https://github.com/QubesOS/qubes-issues/issues/1771
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https:/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-17 20:03, Andrew David Wong wrote:
> On 2016-12-17 15:25, RFJW wrote:
>> Hi Andrew,
>
>> I am looking to purchase or build a new laptop that is the most
>> qubes supported. I first thought of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-11 02:38, Simon wrote:
> Le 2016-12-11 07:36, Andrew David Wong a écrit :
>> That's strange. My dom0 dnf history shows all my updates, including
>> recent ones.
>>
>> Are you sure your dom0 has been g
https://www.qubes-os.org/doc/backup-restore/
Especially this part:
https://www.qubes-os.org/doc/backup-restore/#migrating-between-two-physical-machines
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-08 15:02, raahe...@gmail.com wrote:
> On Thursday, December 8, 2016 at 6:25:06 AM UTC-5, Andrew David
> Wong wrote: On 2016-12-07 05:59, jkitt wrote:
>>>> On Wednesday, 7 December 2016 13:37:36 UTC,
>>>>
ng a currently-supported distro in dom0 (for the
moment, anyway) is the reason for more frequent updates (compared to
the latter part of 3.1's lifespan).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYSf8LAAoJENtN0
ming slow as
> molasses with qubes is proper. What is going on?
>
It's going to be really hard to say without more information. Can you
tell us a bit about the details of your setup?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGI
is is why we blacklist USB controllers from dom0 if a USB
qube is created by the installer (so that they're not accidentally
exposed to dom0 afterward).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYdy0DAAoJENtN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-11 23:24, taii...@gmx.com wrote:
> On 01/12/2017 12:33 AM, Andrew David Wong wrote:
> On 2017-01-11 12:34, Andrew David Wong wrote:
>>>> On 01/11/17 11:04, taii...@gmx.com wrote:
>>>>> https://www.
ure has been discussed and requested
before, and I seem to recall someone saying they might try making one,
but I don't know whether anything ever came of it.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYdy1qAAoJENtN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-11 20:21, raahe...@gmail.com wrote:
> On Wednesday, January 11, 2017 at 4:14:07 PM UTC-5, Andrew David Wong wrote:
> On 01/11/17 07:14, Unman wrote:
>>>> On Wed, Jan 11, 2017 at 09:07:17AM -0500, 'Repairing' via qubes
gt;> through a VPN and sys Network ?
>
> Is there a way in Terminal to get a textual description of the
> linking ? thx
>
Technically, qvm-ls provides this, but it may not be what you have in
mind.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qube
baffled by this, so I'm turning to the list for
> help. Any ideas?
>
Make sure hardware acceleration is disabled in your browsers' settings.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATUR
h them.
>>
>> Your time is much appreciated.
>>
>
> This comes up so often it should be a FAQ.
Added: https://www.qubes-os.org/doc/user-faq/#how-do-i-play-video-files
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BE
aa8da516553b909
>
> Render result w/ graphviz.
>
Thanks for the reminder about that, Jean-Philippe!
And thank you to Zrubi and Andrew for developing these useful tools.
I've added a tracking issue to see about integrating one of these into
Qubes:
https://github.com/QubesOS/qubes-issues/issues/
e time and work required for
administrative tasks).
3. It's free (as in beer).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYdpazAAoJENtN07w5UDAwtzUP+wYdIX9LrCMcFdqTs/iXc9D8
djoaQGLiZGDN4rNTRc5lQBCCF0HdemetPfVIWwr
iring a manual/physical button press doesn't
solve the problem:
"Is communication with YubiKey encrypted, or at least somehow
authenticated? Otherwise malicious USB VM could easily perform some kind
of man in the middle attack and for example si
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 12/02/16 11:17, Kopimi Security wrote:
> On Thursday, December 1, 2016 at 12:56:11 AM UTC+1, Andrew David Wong wrote:
>> Unfortunately, the financial necessity of shifting our priorities to
>> commercial
>> clients will m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 12/02/16 15:32, Eva Star wrote:
> On 12/03/2016 02:10 AM, Andrew David Wong wrote:
>
>>> And additional question, how to get the new created window ID from qvm-run ?
>>>
>>>
>> For KDE, there's kstart. For
rsions for
periods of time. However, we don't consider this to be a security risk of any
kind due to the way dom0 is isolated from domUs:
https://www.qubes-os.org/doc/supported-versions/#dom0
- --
Andrew David Wong (Axon)
Community Manager, Qub
ects the link between AppVMs and
> their templates?
>
Qubes won't let you delete a template while AppVMs are still based on it.
You'll have to temporarily switch those one or two AppVMs to a different
template, delete the one you don't want, clone the one you want, then switch
them to the new
fine.
>
> Does somebody know which package is missing?
>
Are you sure it's a missing package? I pretty sure I installed only those
packages and haven't run into that issue.
Does it work correctly if you try switching to the full template?
- --
Andrew David Wong (Axon)
Communi
s Qubes support gets relegated to older hardware with out fancy features.
>
> Should user experience also be considered for major releases?
>
Yes, but we simply don't have the workforce at this point. Higher priority
tasks consume all available developer bandwidth.
- --
Andrew Dav
remember the name
> have four-five chars :)
>
> And additional question, how to get the new created window ID from qvm-run ?
>
>
For KDE, there's kstart. For Xfce4, you'd have to install something, e.g.,
devilspie2.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
s-os.org/doc/dom0-tools/qvm-block/)
>
Thanks. Updating: https://github.com/QubesOS/qubes-core-admin/pull/83
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYQ844AAoJENtN
very easy to direct webcam on a particular VM.
I suppose difficulty is relative, but it should be easier now with USB
passthrough:
https://www.qubes-os.org/doc/usb/#attaching-a-single-usb-device-to-a-qube-usb-passthrough
> Again, the idea is excellent. If there is a way to save my time on point
Andrew.
>
Didn't forget; qubes-announce is strictly for QSBs and new releases:
https://www.qubes-os.org/mailing-lists/#qubes-announce
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYQ9WhAAoJENtN07w5UDAw9pEQAKd
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-03 06:14, Kopimi Security wrote:
> On Saturday, December 3, 2016 at 12:13:35 AM UTC+1, Andrew David Wong wrote:
>> On 12/02/16 11:17, Kopimi Security wrote:
>>> I'm excited about this, and wish to support Qubes.
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-04 00:08, Zbigniew Łukasiak wrote:
> On Friday, December 2, 2016 at 6:13:35 PM UTC-5, Andrew David Wong wrote:
>>> So that's what I'm thinking, maybe it would be good for the
>>> "evangelization" of Qubes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-04 02:27, Zbigniew Łukasiak wrote:
> On Sun, Dec 4, 2016 at 3:41 AM, Andrew David Wong <a...@qubes-os.org> wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> On 2016-12-04 00:08, Zbign
etvm...
>
Correct. I'm not sure about Broadcom (which historically has been highly
problematic on Qubes), but with a lot of Wi-Fi devices, your best bet is
to search with `dnf search ` and install the appropriate
package from the repo of your NetVM template's distro, if available.
- --
A
add new "Items" to it, one of which is a "Launcher." The
"Launcher" can be used to start apps inside AppVMs with one or two clicks. I
find this very convenient, since I have a lot of VMs and there's no way (that
I've found) to cre
rations performed in dom0 (non-zero security risk)
* A lot slower than `mv`
Is this accurate? Are there others?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYRheRAAoJENtN07w5UDAwKJgQAKGDVbcobfdLqPePDLk/QeVu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-05 14:01, Grzesiek Chodzicki wrote:
> W dniu niedziela, 4 grudnia 2016 09:37:01 UTC+1 użytkownik Andrew David Wong
> napisał:
>> On 2016-12-03 05:07, Grzesiek Chodzicki wrote:
>>> Also, you forgot to post this to
to work on the open source edition of Qubes, whether they're developers who are
already working on Qubes (who are listed on the Team page) or new developers
hired in the future.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.o
via Open Collective will
be paid directly to developers who have been hired to work on the open source
edition of Qubes. ITL will not see or benefit from any of that money. All from
donated funds should be transparently visible to everyone on our Open
Collective page.
Does this address your co
> Thanks,
> Patrick
>
I recommend that you install it from the repo instead. In your template, issue:
$ sudo dnf install --enablerepo=google-chrome google-chrome-stable
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE--
yellow on debian based VMs.
>
> I struggle to give you all the information you probably need - I don't know
> much about Xen or Xen tools.
>
> Thanks.
>
Tracking issue with (probably) the same root cause:
https://github.com/QubesOS/qubes-issues/issues/2484
- --
Andrew David
yellow on debian based VMs.
>
> I struggle to give you all the information you probably need - I don't know
> much about Xen or Xen tools.
>
> Thanks.
>
You may want to try qvm-revert-template-changes:
https://www.qubes-os.org/doc/dom0-tools/qvm-revert-template-changes/
- -
: according to the summary above, you will be
> able to do "sudo dnf install xyz" and try it out, but everything out of
> /home and /usr/local will be gone after a reboot.
>
In addition, take a look at this:
https://www.qubes-os.org/doc/templates/#important-notes
- --
Andrew David
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
Since the initial launch [01] of Qubes OS back in April 2010, work on Qubes
has been funded in several different ways. Originally a pet project, it was
first supported by Invisible Things Lab [02] (ITL) out of the money we
p.
>
> Kind regards.
>
Make sure hardware acceleration is disabled in your browser's settings.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYRqLyAAoJENtN07w5UDAwQT4P/jTroDE1DPz8
e
VMs" button. Also try:
$ qvm-prefs -l work
to view the current settings, and:
$ qvm-prefs -s work [...]
to change them.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYb39AAAoJENtN07w5UDAw8MIQAKecS
0.6-201608081228
>
>
> Complete!
>
Not sure why the removal failed, but you can clean up any remnants by following
these instructions:
https://www.qubes-os.org/doc/remove-vm-manually/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qu
rite the encrypted volume with
your new Qubes installation. You may want to do some manual
partitioning before presenting this disk to the Qubes installer.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-01 08:29, Pawel Debski wrote:
> W dniu niedziela, 1 stycznia 2017 16:35:59 UTC+1 użytkownik Andrew David Wong
> napisał:
> On 2017-01-01 07:31, Pawel Debski wrote:
>>>> Folks,
>>>>
>>>> whe
datable: True
>
> But it does not check for updates!
>
Update checks are typically run in VMs based on the template, so if
you haven't had any VMs running based on that template that can reach
update repos, that's probably why.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
quot;, and "Jessie updates
> (main contrib non-free)". Is it supposed to be like that?
>
> Thanks
>
I've never tried the GUI package manager interface. Can you try just
using dnf from the command-line? For example:
$ sudo dnf install
- --
Andrew David Wong (Axon)
Comm
e of the same devices as those
assigned to sys-net?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYa7dIAAoJENtN07w5UDAwWjsP/Av7m3ts3Bb7LMcuancJptZC
WOm2hHlDY52dxjVtVc3OC8dEtmNCUTaVnEpf6RmDu0WUdT3ejMIduMe7+jOnp9dK
ee9R
>
Still in testing/development, but might be stable enough for your
usage. (Consider testing it if you can.) No audio yet, AFAIK.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYbBkCAAoJENtN07w5
//www.qubes-os.org/doc/user-faq/#can-i-install-qubes-on-a-system-without-vt-x
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYbBZAAAoJENtN07w5UDAwqCcP/2A1mBh+EuUzNJYyF30xmj6D
5Kbt18QBw3jXf1wD9qJQtaio2eEgoskeMPU7e
ed,
bulk-storage VMs, I use this method:
https://www.qubes-os.org/doc/secondary-storage/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYbBivAAoJENtN07w5UDAwceQP/0QX1OmJb3/i14ZEWETi0bYA
725uoQfPcBuTHAAhT/Kis6QhJ
ble from a KDE source (docs, devs) or even Fedora or another
distro that uses KDE. To clarify: The *cause* may be Qubes-related (I
have no idea), but the default file/list for KDE System Tools should
probably be the same as in non-Qubes KDE installations. At least, it's
worth checking.
- --
Andrew
> finder, didn't see a clean way there.
>
> Any hint?
>
> Thanks, Patrick
>
Is this what you're looking for?
https://www.qubes-os.org/doc/remove-vm-manually/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.o
dentifies itself as a keyboard, then it's probably necessary to
follow the USB keyboard-specific instructions:
https://www.qubes-os.org/doc/usb/#how-to-use-a-usb-keyboard
Specifically, make sure you edit the RPC policy rules, if you haven't.
Also, you might find some hints here:
https://www.qubes-os
gt; ॐ
>
Thanks for the report! Added:
https://www.qubes-os.org/doc/anti-evil-maid/#known-issues
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYbBpLAAoJENtN07w5UDAwwakP/1lk5JU3mI5G35I
that you are using a Fedora template since 'mimeopen'
> works for a vanilla Debian template.
>
> For Fedora based dvms, the dvm does NOT pick up the association from the
> template. It's therefore necessary to customize the DispVM: there are
> instructions for doing this in the docs.
>
>
one that I'm aware of. Typically, you have to check the specs for
the motherboard you're considering purchasing.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYbHxhAAoJENtN07w5UDAwuSkP/1bcHUiX5JIXpaJXVMewmMM8
x8l9T
sues/1581#issuecomment-269873202
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYZ+LHAAoJENtN07w5UDAw6i8P/1uJF5f2URvwVTTOPIDRkuu6
ufoiPpdSehZ1pjpkuzK7dRrE6B5jGzRdA0nbZIFfbHxr1UPp0yaEiZh9DtOZYSFC
c5SgQM23xtp8A9YvzN
;> shutdown now
>
> I guess there is some formatting problems here? The '-' in the beginning of
> all the --exclude lines should be removed I think?
>
Correct. Enigmail automatically inserts them. (It also automatically removes
them, so if you were using Enigmail, you wouldn't se
> specific tasks that aren't used very often. Is there a better way
> to approach this?
>
> Thanks! Loren
>
Here's the method I use. It sounds like it meets your requirements:
https://www.qubes-os.org/doc/secondary-storage/
- --
Andrew David Wong (Axon)
Community Manager
ed to use to attach my printer to another disposable VM next time
> I need to print.
>
Added a note about that here:
https://github.com/QubesOS/qubes-issues/issues/2132#issuecomment-269730375
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGI
/github.com/QubesOS/qubes-issues/issues/1603
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYZdvJAAoJENtN07w5UDAwW6gQAMF6i9/lbqNX6rcFUxTGFaAZ
zAfnLSwMZ4McxjThBIcm0dc9BNnQIOOb8WEQrMKCMJXDMQEOjY79B5kGcWT5gFQn
fter the first pass.)
If you're really in a hurry, you can use substitute qvm-kill for
sys-usb and sys-net, as Foppe suggested.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYZd2GAAoJENtN07w5UDAwJfcP/i1Te9M0+2yHs0g2JzmpT
b set to autostart? If so, try disabling that to see
whether the system can boot.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYcnDpAAoJENtN07w5UDAw8NcP/iQTveiRfsgdJbeweJC84k6V
d3UdLc8i7OrFuh4Cya0opcH341OKvCid4R
he application has
> vanished
>
> what am i missing when i install in the vm to keep it regardless?
> kind, jim.
>
It sounds like you want to install these programs in a TemplateVM
instead of a TemplateBasedVM:
https://www.qubes-os.org/doc/templates/
- --
Andrew David Wong (
gt; firewall) 2. Document the procedure for other users who need copr
>
> Andrew, once I write up the instructions, is there a place I should
> submit them?
>
> Regards, Max
>
Yes, you can submit them by following these instructions:
https://www.qubes-os.org/doc/doc-guidelines/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-07 18:42, Manuel Amador (Rudd-O) wrote:
> On 12/24/2016 05:58 PM, Andrew David Wong wrote:
>>
>> This is not true. Dropbox doesn't even start automatically, much
>> less communicate automatically. If you install D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-07 18:27, Patrick Bouldin wrote:
> On Saturday, January 7, 2017 at 3:21:42 AM UTC-5, Andrew David Wong wrote:
> On 2017-01-06 14:37, Patrick Bouldin wrote:
>>>> On Wednesday, December 28, 2016 at 2:41:28 AM UTC-5, Andr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-07 00:21, Andrew David Wong wrote:
> On 2017-01-06 14:37, Patrick Bouldin wrote:
>> On Wednesday, December 28, 2016 at 2:41:28 AM UTC-5, Andrew
>> David Wong wrote: On 2016-12-27 12:39, Patrick Bouldin wrote:
>>>&g
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-06 14:37, Patrick Bouldin wrote:
> On Wednesday, December 28, 2016 at 2:41:28 AM UTC-5, Andrew David
> Wong wrote: On 2016-12-27 12:39, Patrick Bouldin wrote:
>>>> On Tuesday, December 27, 2016 at 2:13:48 PM UTC-5, Pa
ly.
>
Another, additional way of answering this question:
"On a system without VT-d, everything should work in the same way,
except there will be no real security benefit to having a separate
NetVM, as an attacker could always use a simple DMA attack to go from
the NetVM to Dom0."
T
pdate mechanism itself still works correctly. That is, if you run
`sudo qubes-dom0-update`, and it returns "No updates available," that
is because there are, in fact, no updates available. No cause for alarm.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https:/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-08 14:57, Patrick Bouldin wrote:
> On Sunday, January 8, 2017 at 11:15:56 AM UTC-5, Andrew David Wong wrote:
> On 2017-01-07 18:27, Patrick Bouldin wrote:
>>>> On Saturday, January 7, 2017 at 3:21:42 AM UTC-5, Andre
;>>>> then
>>>>>>> the HS being set up.
>>>>>>> Obviously you will need to test the TBB is working.
>>>>>>>
>>>>>>> unman
>>>>>>>
>>>>>>>
>>>>>
that there is a lot of activity. Although,
> my initial comment regarding development was more regarding the
> installation side of the OS. As it does (to me) appear to be
> lacking, compared to other Distro's slick installation. I am
> guessing this is more to do with the incorporation
a solution. It may be technically over my head, way over in
> fact currently. Yet Microsoft's actions with 10, that they have
> also pushed into 8 & 7, just. Ugh.
>
> Thank you once again,
>
> - Mike Mez
>
> On Tue, Dec 20, 2016 at 4:04 AM, Andrew David Wong
> &l
rpm
> repo?
>
Make sure no TemplateBasedVMs are based on the template to be removed.
Then, in dom0:
$ sudo dnf remove
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYWDWlAAoJENtN07w5UDAwUeIP/0ICMJf53L
f hardware compatibility issue.
Try switching between legacy boot and UEFI.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYWDQCAAoJENtN07w5UDAwYT8QAJHpEO8JrfQnvA6yPvOxXddr
7aJ8
ing, though: If you do decide to go with Qubes and attempt to
do DIY GPU passthrough, that's likely to be *much* more challenging
from a technical perspective (though generous users have provided
detailed guides on this list already). You sho
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-19 16:51, Marek Marczykowski-Górecki wrote:
> On Sun, Dec 18, 2016 at 10:02:54PM -0800, Andrew David Wong wrote:
>> There's also:
>
>> qvm-remove --just-db
>
>> which only removes the entry from the Qubes
from the Qubes Xen DB without removing
any files. What exactly does "Xen DB" refer to in this context, Marek?
> Is there any files I have missed? Also, perhaps a short doc with
> this would be useful for when things go wrong and a VM needs to be
> manually removed.
>
> Th
n has already been asked and
answered.
> *6. *Does this OS work with the KDE Plasma Gui?
>
Yes: https://www.qubes-os.org/doc/kde/
> *7. *Anything else you can say about Qubes that I haven't
> asked?
>
Please read through our documentation to learn more:
https://www.qu
601 - 700 of 1609 matches
Mail list logo