ve to also
comment those out for the upgrade procedure.
Then do the following:
apt-get update
apt-get upgrade
apt-get dist-upgrade
apt-get autoremove
This process worked for me.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB
, as
release candidates can become the actual release.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
On 7/10/19 1:19 PM, acunal.hamad...@gmail.com wrote:
Chris: Thank you for your thoughts
It just happened again less than an hour of up time while editing a plain text
file.
while trying to open a dom0 terminal
"Failed to execute command "exp-open --launch TerminalEmulator" Fa
/5149
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
to
mind when I read your post.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
As a
result, sys-vpn can perform both vpn and firewall functions. If you
consider sys-vpn's role to be trusted and low-risk, then the third
example can accomplish the same thing as the first two while consuming
less memory and CPU.
--
Chris Laprise, tas...@posteo.net
https://github.com/t
Heads up on the debian-10 update error (with workaround):
https://forums.whonix.org/t/apt-get-error-e-repository-tor-https-cdn-aws-deb-debian-org-debian-security-buster-updates-inrelease-changed-its-suite-value-from-testing-to-stable/7704
--
Chris Laprise, tas...@posteo.net
https://github.com
'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiv
er/
Since nvidia is generally a source a problems, I'd check to see if you
can change the BIOS/UEFI settings to turn off the Nvidia GPU and switch
to integrated Intel graphics (if available). That should raise the
compatibility profile substantially.
--
Chris Laprise, tas...@posteo.net
https://
On 7/6/19 4:14 PM, drok...@gmail.com wrote:
https://twitter.com/debian
Buster has arrived!
Yay! :D
I have to admit, I moved the rest of my VMs over to it a day early (had
already been using debian-10 for a while on a few misc things).
Thanks to unman for keeping us up to date!
--
Chris
script
(that's because you chose not to add it to the OS template). So it won't
be registered or active right after installation; a restart is necessary.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F
users. So a Tor list or forum is probably a better place to discuss
this issue.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Goog
this
@Chris I think you may be right about the fact that this is a bug and I guess
it's time to escalate it into an issue in github. I'm willing to lend a helping
hand in making the issue as needed.
My setup is all fully dependent on variations of fedora-30-minimal template
that I have tailored
On 7/4/19 1:51 PM, Jon deps wrote:
On 6/20/19 8:00 PM, Chris Laprise wrote:
Version 1.4.1 of Qubes-vpn-support has been released. It includes
tweaks for smoother operation, greater control over the firewall, and
revised docs in the Readme:
https://github.com/tasket/Qubes-vpn-support
use firewall please enable networking”.
The sys-net VM should always have its netvm set to (none), because its
the one VM that communicates through the hardware and not through
another VM.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 7
On 7/4/19 4:16 AM, l1am9...@gmail.com wrote:
On Thursday, July 4, 2019 at 6:32:55 AM UTC, Philip Pians wrote:
On Thursday, July 4, 2019 at 3:49:42 AM UTC, Chris Laprise wrote:
On 7/3/19 5:34 PM, Philip Pians wrote:
Must be doing something wrong? Wanted to do the test stage and discovered
vpn-client.conf
...the 'US_East.ovpn' is just an example. So you would do this instead:
sudo cp Openvpn.ovpn vpn-client.conf
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
On 7/2/19 3:24 AM, Sphere wrote:
On Tuesday, July 2, 2019 at 5:37:58 AM UTC, Philip Pians wrote:
On Tuesday, July 2, 2019 at 4:36:22 AM UTC, Chris Laprise wrote:
On 7/1/19 11:18 PM, Philip Pians wrote:
On Tuesday, July 2, 2019 at 3:13:56 AM UTC, Philip Pians wrote:
Using instructions
it on the line and
click the plus sign.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
, interest and help. Again, very much
appreciated.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
On 6/30/19 4:10 PM, Chris Laprise wrote:
A shortcut you can take to setting up iptables for DNS is to populate
/etc/resolv.conf and then run '/usr/lib/qubes/qubes-setup-dnat-to-ns'.
This should configure the nat/PR-QBS chain with the DNS addresses you
set.
So check that your DoT setup
es you set.
So check that your DoT setup is updating /etc/resolv.conf, then run
'/usr/lib/qubes/qubes-setup-dnat-to-ns'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this messa
your link is generally insecure or you need to use a third-party
DNS for some other reason (i.e. you set up your own VPN server but not a
DNS server to go with it).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
There are mirrors btw. https://www.qubes-os.org/downloads/#mirrors
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
Yup. Down for me too.
The update servers were down earlier today. Not sure if related.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
> Do remember to run backups, though. EXT3 on thin LVM is not
> as resilient as NTFS, for example.
Thanks for the reminder!
> For a canonical answer, you might try the qubes-devel mailing list since
> they get more in-depth.
Will try to ask over there.
Thanks much!
Case closed
--
You
1. Installation was smooth except for the following error:
> The following error occurred while installing the boot loader. The system will
> not be bootable. Would you like to ignore this and continue with installation?
>
> failed to set new efi boot target
Issue solved by manually creating
> I will do a fresh install and confirm again that disabling msi does the trick.
Confirmed. I tweaked the command a bit because it removed the default kernel
options.
> qvm-prefs sys-net kernelopts "nopat iommu=soft swiotlb=8192 pci=nomsi"
Any idea if this would introduce any security
> You fooled me with the cogent problem description and troubleshooting
> approach.
(~_^) I am a professional Googler and I might have found a solution.
Rmb the dmesg logs above where qubes show
[ 4.742826] igb :00:06.0: Using MSI interrupts. 1 rx queue(s), 1 tx queue(s)
while Ubuntu show
> I don't think you said which template you are using for sys-net did you?
The default was Fedora-29.
And some observations..
When I shutdown sys-net, the physical LED of the network adapter is still going
through the blinking and off cycle. This probably means that it has nothing to
do
> Quickest thing to try is to switch sys-net's template to Debian. Also,
> experiment with
I tried the Debian template but it still doesn't work. Same symptoms
> https://www.qubes-os.org/doc/pci-devices/#pci-passthrough-issues attach
> options.
I need some help here. Couldn't find the
.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiv
:45048
comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=?
terminal=? res=success'
Jun 26 09:47:18 fedora-30 systemd[1]:
qubes-updates-proxy-forwarder@13-127.0.0.1:8082-127.0.0.1:45048.service:
Succeeded.
I wonder if its restarting over and over.
--
Chris Lapris
On 6/26/19 7:56 AM, 'awokd' via qubes-users wrote:
Chris:
Hi all!
Welcome!
Successfully booted into Qubes but couldn't get network working.
1. Physically, port LEDs go off and start blinking after awhile. Keeps
repeating.
2. Network icon on top right is red and shows 'loading animation
Hi all!
It's my first time installing Qubes and I need some help with my network
adapters.
I am using Qubes 4.0.1
The hardware is Fitlet2 with Intel Celeron J3455 (supports both VT-x and VT-d).
It comes with 4 Gigabit Ethernet ports using Intel i211.
Installation was successful but EFI boot
ely.
So this looks like a bug that should have an issue opened for it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
u can see Tor is carried inside the VPN tunnel (no Tor packets
visible to your ISP).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to t
), an equivalent update is
forthcoming in the next week. However, if you wish to switch to
Qubes-vpn-support now, you can install it without issues for a new VPN VM.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
erienced this a number of times with my own setups. It would be
nice to have the unmounting and closing handled automatically, perhaps
with this:
https://dev.qubes-os.org/projects/core-admin/en/latest/qubes-events.html#qubes.events.handler
--
Chris Laprise, tas...@posteo.net
https://github.com/task
On 6/17/19 11:38 AM, brendan.h...@gmail.com wrote:
Chris - thanks for jumping on this. :)
On Monday, June 17, 2019 at 11:16:05 AM UTC-4, Chris Laprise wrote:
I would fully expect lvremove to issue discards, if lvm is configured
for it. Did you try changing /etc/lvm/lvm.conf so
to btrfs. Its unified approach is more likely to process discards
completely.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
ng a file. Just
don't max out the pool completely, or you may end up with an un-bootable
system.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are su
On 6/15/19 4:44 PM, john s. wrote:
On 6/15/19 12:50 AM, Chris Laprise wrote:
On 6/14/19 6:00 PM, Jon deps wrote:
On 6/5/19 8:00 PM, Chris Laprise wrote:
On 6/2/19 3:41 AM, Finn wrote:
I've installed Qubes-OS 4.0.1 and it's XFCE desktop environment but I
would rather prefer either KDE
On 6/14/19 6:00 PM, Jon deps wrote:
On 6/5/19 8:00 PM, Chris Laprise wrote:
On 6/2/19 3:41 AM, Finn wrote:
I've installed Qubes-OS 4.0.1 and it's XFCE desktop environment but I
would rather prefer either KDE or GNOME desktop environment. I found
this document[1] where mentioned that Qubes-OS
the root-autosnap to
something else as a way to set aside the most recent good configuration
before making dom0 changes or before rebooting after making changes.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
On 6/12/19 3:04 PM, Mike Keehan wrote:
On Wed, 12 Jun 2019 10:29:54 -0400
Chris Laprise wrote:
On 6/11/19 6:50 PM, Chris Laprise wrote:
I think the best solution for a safe and comprehensive dom0 backup
is to have Qubes simply snapshot the root lv at boot time, before
its mounted as read
ating the DNAT rules in the firewall. Check
the PR-QBS chain to see if your DNS server IPs were added: iptables -L
-v -t nat PR-QBS
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
On 6/11/19 6:50 PM, Chris Laprise wrote:
I think the best solution for a safe and comprehensive dom0 backup is to
have Qubes simply snapshot the root lv at boot time, before its mounted
as read-write. It shouldn't take more than a few script lines in the
dom0 startup. Then dom0 can be backed
k the best solution for a safe and comprehensive dom0 backup is to
have Qubes simply snapshot the root lv at boot time, before its mounted
as read-write. It shouldn't take more than a few script lines in the
dom0 startup. Then dom0 can be backed up like any other vm.
--
Chris Laprise, tas...@posteo
isk.
I have the BootIt collection which is great and have used it for years - highly
recommended.
Regards,
Chris
-
Chris Willard
ch...@meliser.co.uk
Sent with ProtonMail Secure Email.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" grou
are automatically created and it can be used on any regular
Qubes lvm volume (but isn't limited to Qubes).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you ar
On 6/9/19 4:50 PM, kht-lists wrote:
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Sunday, June 9, 2019 2:52 PM, Chris Laprise wrote:
On 6/9/19 2:43 PM, Chris Laprise wrote:
On 6/9/19 2:01 PM, 'kht-lists' via qubes-users wrote:
After watching Matthew Wilson's
On 6/9/19 2:43 PM, Chris Laprise wrote:
On 6/9/19 2:01 PM, 'kht-lists' via qubes-users wrote:
After watching Matthew Wilson's excellent video and reviewing various
FAQs and documents on the qubes-os web site I find myself with a basic
philosophical question. Currently I run CentOS 7
in this way. Perhaps someone
else can chime in about this possibility.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
rd (if any):
https://github.com/tasket/Qubes-vpn-support
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
to the proxy vm. Finding a similar hook in
R4 would allow you to set the MTU automatically.
Given that wireguard is becoming popular on routers, and Qubes proxy vms
are basically routers, you might find some good tips for dealing with
this around the web.
--
Chris Laprise, tas...@posteo.net
the MTU and handling packet
fragmentation. I wonder if this is a case of Wireguard requiring manual
configuration where openvpn does not.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You
On 6/8/19 6:11 PM, mmo...@disroot.org wrote:
Thanks Chris.
I've solved this differently. I'm using the PostUp/PostDown script to set the
DNAT rules through a script that I've made, which also sets the resolv.conf
properly since the resolvconf daemon is not working as it should.
Just FYI
On 6/8/19 3:20 PM, Chris Laprise wrote:
On 6/8/19 8:22 AM, mmo...@disroot.org wrote:
I saw this issue. But unfortunately the latest-kernel-vm (5.1.2-1)
doesn't contain the modules for wireguard.
So the problem still remains.
When I use the debian-9 template on the sys-vpn the other appvms
the
'10_wg.conf.example' file to '10_wg.conf'.
https://github.com/tasket/Qubes-vpn-support/
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
ropped some time ago.
This is news to me. Are you saying that Debian installs can't be cut
down to suit a GUI domain or small dom0?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
widgets) doesn't seem compatible with Qubes' concept.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
to such requests... I
think the poster is a 'WHATEVER YOU MIGHT THINK'.
Think about it. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
ring (year first) allows
sorting without having to parse the input as an actual date.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Goo
scripts to hang for the same period.
Current workaround is to run it with debian-9.
Issue:
https://github.com/tasket/Qubes-vpn-support/issues/39
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
and there are 219 packages to update.
2. Trying to remove thunderbird, dnf wants to remove 67 packages incl.
most of qubes*, nftables, salt, tinyproxy. It would be good to be able
to remove thunderbird or other large apps without the OS crumbling to
pieces.
--
Chris Laprise, tas...@posteo.net
https
in the templatevm. I
recommend not using minimal templates, and for now avoid fedora-29
(fedora-28 and debian are OK).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
unusable).
Thread
https://groups.google.com/d/msgid/qubes-users/44f1ae64-2da1-480f-aa30-98c5f22653ba%40googlegroups.com
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message
,
there might be a problem in that case.
The disk usage widget in the system tray will tell you what kind of
storage system your Qubes is using; if you used the default LVM it will
say "lvm" with the usage stats to the right.
--
Chris Laprise, tas...@posteo.net
https://github.com/ta
On 5/28/19 8:42 AM, brendan.h...@gmail.com wrote:
On Saturday, May 25, 2019 at 2:28:13 PM UTC-4, Chris Laprise wrote:
I think the only _good_ way to deal with COW metadata expansion, since
its always related to data fragmentation, is to keep expanding it and
let system performance degrade
al folders and instead using
a passphrase with Qubes backup to backup the vaultvm to the backupvm,
then use whatever file transfer software your cloud provider requires in
the backupvm.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20
On 5/28/19 5:04 AM, Side Realiq wrote:
From: Chris Laprise
Sent: Mon May 27 19:58:35 CEST 2019
To: David Hobach , Side Realiq ,
Subject: Re: [qubes-users] How to automate cloud backups of trusted vault files?
On 5/27/19 9:05 AM, David Hobach wrote
rough ssh to the
destination system.
Initial setup of the container looks like (in vault vm):
truncate -s 50M backup.img # Size is 50 megabytes
cryptsetup luksFormat backup.img
cryptsetup luksOpen backup.img backup
mkfs.ext4 /dev/mapper/backup
cryptsetup luksClose backup
sudo mkdir /mnt/bac
. Or
how to do this? :( :( :(
Thanks.
(new email because no access to my password and data :( )
Based on what others have posted about the update, you should try to
select the prior kernel version under "Advanced options" in the grub
boot menu.
--
Chris Laprise, tas...@posteo
a pool you
can still use 'qvm-block attach' to let VMs access the space as
secondary disks.
I guess need to reduce size of current windows partition then empty part of hdd
to format to ext4 or other linux filesystem and then it will be possible to use
as storage for appvms?
Thanks
--
Chr
On 5/25/19 12:45 PM, Brendan Hoar wrote:
On Sat, May 25, 2019 at 12:09 PM Chris Laprise <mailto:tas...@posteo.net>> wrote:
It would be interesting if thin-lvm min transfer were the reason for
this difference in behavior between fstrim and the filesystem.
Indeed. Pr
and/or modifying many small files then that figure could balloon close
to 100% in a very short period.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
' instead.
Also, references to debian-8 & debian-9 should be changed to debian-9
and debian-10, respectively. Finally, the compacting procedure doesn't
apply on Qubes 4.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB
[4] https://wiki.archlinux.org/index.php/Dell_Inspiron_5575
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qub
was no way to play audio from VMs.
I'd be interested if anyone thinks they know why this conflict occurs
and/or possible workarounds.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
Yo
of sidechannel attacks and suffer less performance degradation[1] from
resulting security patches; that's certainly a reason to go in AMD's
direction.
1.
https://www.tomshardware.com/news/intel-amd-mitigations-performance-impact,39381.html
--
Chris Laprise, tas...@posteo.net
https://github.com/
wouldn't know
where to look next.
There is a memory-allocation bug with a fix in dom0 current-testing. The
package is qubes-core-dom0-4.0.43 and the issue is here:
https://github.com/QubesOS/qubes-issues/issues/4891
Applying this fix makes a very noticeable difference on my system.
--
Chris
On 5/18/19 8:54 PM, 'awokd' via qubes-users wrote:
Chris Laprise:
On 5/16/19 6:27 AM, Chris Laprise wrote:
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
Any ideas why a freshly
On 5/16/19 6:27 AM, Chris Laprise wrote:
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
Any ideas why a freshly-installed Whonix 14 template would experience an
update verification
"Midnight Surfing" palette.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
my experience.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
consider recommending a switch to AMD processors as a
short-term mitigation against CPU vulnerabilities.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
On 5/13/19 6:52 PM, 'awokd' via qubes-users wrote:
Chris Laprise:
Its also the case that Fedora is intended to be a testbed,
NON-production OS and Qubes has plans to migrate away from it.
Interesting; more details on this somewhere, or was it IRC chatter?
There's an issue for it:
https
lso read the vpn-related sections of the Whonix docs; There
are tradeoffs to using a vpn with Whonix.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscri
template.|
|thanks in advance.|
At this point I'd suggest using Fedora 28 with Qubes-vpn-support, as a
bug has been logged about a problem with Fedora 29. OTOH, you could try
using NM with Fedora 29 to see if that works.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://
--poolmetadatasize +200M qubes_dom0/pool00
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
rmware with
Coreboot... an exercise that I'm about to try. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-u
of existing apps.
Various troubleshooting threads around the net usually assume that KDE
is installed with 'plasma-nm' widget, but my tests with a Qubes template
running KDE show the problem still exists.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
dn't check.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
reputation for compatibility because they're so
secretive about driver code; OTOH there are plenty of Intel and AMD
graphics options available.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
Yo
operating systems. OTOH, AMD and Intel offer plenty of choices that are
compatible because those companies are much more cooperative.
With that said, the HCL has been due for an update, so I would also
search the forums for recent posts with 'HCL' in the title.
--
Chris Laprise, tas...@posteo.net
o internet
No characters should appear on the password line. You can check it
manually by looking in the userpassword.txt file as I mentioned.
Also, it will be necessary to look at the log as I described to find out
what is causing the problem.
--
Chris Laprise, tas...@posteo.net
https://github.com/ta
. When it says Ready but there is no connection, its
usually because of a mis-typed username or password. You can check this
in the /rw/config/vpn/userpassword.txt file.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D1
your
VPN provider (step 2).
Its your decision whether to copy all or just one config. But its easier
to copy all because there are usually other non-ovpn files which are
non-optional so copying all doesn't run the risk of damaging the configs.
--
Chris Laprise, tas...@posteo.net
https
201 - 300 of 1196 matches
Mail list logo