to update fedora-30.
I may try changing my update vm to debian-10 to see if that helps. The
problem started when I switched the update vm from fedora-28 to fedora-30.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4
On 7/4/19 1:51 PM, Jon deps wrote:
On 6/20/19 8:00 PM, Chris Laprise wrote:
Version 1.4.1 of Qubes-vpn-support has been released. It includes
tweaks for smoother operation, greater control over the firewall, and
revised docs in the Readme:
https://github.com/tasket/Qubes-vpn-support
use firewall please enable networking”.
The sys-net VM should always have its netvm set to (none), because its
the one VM that communicates through the hardware and not through
another VM.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 7
On 7/4/19 4:16 AM, l1am9...@gmail.com wrote:
On Thursday, July 4, 2019 at 6:32:55 AM UTC, Philip Pians wrote:
On Thursday, July 4, 2019 at 3:49:42 AM UTC, Chris Laprise wrote:
On 7/3/19 5:34 PM, Philip Pians wrote:
Must be doing something wrong? Wanted to do the test stage and discovered no
vpn-client.conf
...the 'US_East.ovpn' is just an example. So you would do this instead:
sudo cp Openvpn.ovpn vpn-client.conf
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You rec
On 7/2/19 3:24 AM, Sphere wrote:
On Tuesday, July 2, 2019 at 5:37:58 AM UTC, Philip Pians wrote:
On Tuesday, July 2, 2019 at 4:36:22 AM UTC, Chris Laprise wrote:
On 7/1/19 11:18 PM, Philip Pians wrote:
On Tuesday, July 2, 2019 at 3:13:56 AM UTC, Philip Pians wrote:
Using instructions to
it on the line and
click the plus sign.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
or DoH.
Thanks a lot for your attention, interest and help. Again, very much
appreciated.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to th
On 6/30/19 4:10 PM, Chris Laprise wrote:
A shortcut you can take to setting up iptables for DNS is to populate
/etc/resolv.conf and then run '/usr/lib/qubes/qubes-setup-dnat-to-ns'.
This should configure the nat/PR-QBS chain with the DNS addresses you
set.
So check that your Do
hain with the DNS addresses you set.
So check that your DoT setup is updating /etc/resolv.conf, then run
'/usr/lib/qubes/qubes-setup-dnat-to-ns'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F0
mething like DoT becomes useful only
when your link is generally insecure or you need to use a third-party
DNS for some other reason (i.e. you set up your own VPN server but not a
DNS server to go with it).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiv
s-proxy-forwarder@13-127.0.0.1:8082-127.0.0.1:45048
comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=?
terminal=? res=success'
Jun 26 09:47:18 fedora-30 systemd[1]:
qubes-updates-proxy-forwarder@13-127.0.0.1:8082-127.0.0.1:45048.service:
Succeeded.
I wonder
the wifi drivers pre-installed... I have to manually
install 'firmware-iwlwifi' to get Intel cards working.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message be
ier versions of Fedora would wait instead of
timing-out immediately.
So this looks like a bug that should have an issue opened for it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You recei
u can see Tor is carried inside the VPN tunnel (no Tor packets
visible to your ISP).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to t
win vpn project), an equivalent update is
forthcoming in the next week. However, if you wish to switch to
Qubes-vpn-support now, you can install it without issues for a new VPN VM.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A
e experienced this a number of times with my own setups. It would be
nice to have the unmounting and closing handled automatically, perhaps
with this:
https://dev.qubes-os.org/projects/core-admin/en/latest/qubes-events.html#qubes.events.handler
--
Chris Laprise, tas...@posteo.net
https://githu
On 6/17/19 11:38 AM, brendan.h...@gmail.com wrote:
Chris - thanks for jumping on this. :)
On Monday, June 17, 2019 at 11:16:05 AM UTC-4, Chris Laprise wrote:
I would fully expect lvremove to issue discards, if lvm is configured
for it. Did you try changing /etc/lvm/lvm.conf so that
oving to btrfs. Its unified approach is more likely to process discards
completely.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the G
lesystem, you would zero-fill an fs by creating a file. Just
don't max out the pool completely, or you may end up with an un-bootable
system.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 188
On 6/15/19 4:44 PM, john s. wrote:
On 6/15/19 12:50 AM, Chris Laprise wrote:
On 6/14/19 6:00 PM, Jon deps wrote:
On 6/5/19 8:00 PM, Chris Laprise wrote:
On 6/2/19 3:41 AM, Finn wrote:
I've installed Qubes-OS 4.0.1 and it's XFCE desktop environment but I
would rather prefer eit
On 6/14/19 6:00 PM, Jon deps wrote:
On 6/5/19 8:00 PM, Chris Laprise wrote:
On 6/2/19 3:41 AM, Finn wrote:
I've installed Qubes-OS 4.0.1 and it's XFCE desktop environment but I
would rather prefer either KDE or GNOME desktop environment. I found
this document[1] where mentioned tha
e the root-autosnap to
something else as a way to set aside the most recent good configuration
before making dom0 changes or before rebooting after making changes.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4
On 6/12/19 3:04 PM, Mike Keehan wrote:
On Wed, 12 Jun 2019 10:29:54 -0400
Chris Laprise wrote:
On 6/11/19 6:50 PM, Chris Laprise wrote:
I think the best solution for a safe and comprehensive dom0 backup
is to have Qubes simply snapshot the root lv at boot time, before
its mounted as read
.e. only downstream VMs get to
access the tunnel).
What IS necessary is populating the DNAT rules in the firewall. Check
the PR-QBS chain to see if your DNS server IPs were added: iptables -L
-v -t nat PR-QBS
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/tt
On 6/11/19 6:50 PM, Chris Laprise wrote:
I think the best solution for a safe and comprehensive dom0 backup is to
have Qubes simply snapshot the root lv at boot time, before its mounted
as read-write. It shouldn't take more than a few script lines in the
dom0 startup. Then dom0 can be b
forgot to plan.
I think the best solution for a safe and comprehensive dom0 backup is to
have Qubes simply snapshot the root lv at boot time, before its mounted
as read-write. It shouldn't take more than a few script lines in the
dom0 startup. Then dom0 can be backed up like any other vm.
--
ated in just seconds. With this tool,
snapshots are automatically created and it can be used on any regular
Qubes lvm volume (but isn't limited to Qubes).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4
On 6/9/19 4:50 PM, kht-lists wrote:
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Sunday, June 9, 2019 2:52 PM, Chris Laprise wrote:
On 6/9/19 2:43 PM, Chris Laprise wrote:
On 6/9/19 2:01 PM, 'kht-lists' via qubes-users wrote:
After watching Matthe
On 6/9/19 2:43 PM, Chris Laprise wrote:
On 6/9/19 2:01 PM, 'kht-lists' via qubes-users wrote:
After watching Matthew Wilson's excellent video and reviewing various
FAQs and documents on the qubes-os web site I find myself with a basic
philosophical question. Currently I ru
configuring their appVMs in this way. Perhaps someone
else can chime in about this possibility.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscr
e in username/password (if any):
https://github.com/tasket/Qubes-vpn-support
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to th
ected to the proxy vm. Finding a similar hook in
R4 would allow you to set the MTU automatically.
Given that wireguard is becoming popular on routers, and Qubes proxy vms
are basically routers, you might find some good tips for dealing with
this around the web.
--
Chris Laprise, tas...@poste
openvpn probing the MTU and handling packet
fragmentation. I wonder if this is a case of Wireguard requiring manual
configuration where openvpn does not.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F0
tream VMs access
to DNS.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
On 6/8/19 3:20 PM, Chris Laprise wrote:
On 6/8/19 8:22 AM, mmo...@disroot.org wrote:
I saw this issue. But unfortunately the latest-kernel-vm (5.1.2-1)
doesn't contain the modules for wireguard.
So the problem still remains.
When I use the debian-9 template on the sys-vpn the other appvm
e the
'10_wg.conf.example' file to '10_wg.conf'.
https://github.com/tasket/Qubes-vpn-support/
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are
That dom0 Debian target
dropped some time ago.
This is news to me. Are you saying that Debian installs can't be cut
down to suit a GUI domain or small dom0?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D1
h UI, melded
WM/app widgets) doesn't seem compatible with Qubes' concept.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google G
itively to such requests... I
think the poster is a 'WHATEVER YOU MIGHT THINK'.
Think about it. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are
supplied a date. The ordering (year first) allows
sorting without having to parse the input as an actual date.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you
es the vpn scripts to hang for the same period.
Current workaround is to run it with debian-9.
Issue:
https://github.com/tasket/Qubes-vpn-support/issues/39
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
f
update again and there are 219 packages to update.
2. Trying to remove thunderbird, dnf wants to remove 67 packages incl.
most of qubes*, nftables, salt, tinyproxy. It would be good to be able
to remove thunderbird or other large apps without the OS crumbling to
pieces.
--
Chris Laprise
nd is missing in the templatevm. I
recommend not using minimal templates, and for now avoid fedora-29
(fedora-28 and debian are OK).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this
ich point
the storage pool becomes unusable).
Thread
https://groups.google.com/d/msgid/qubes-users/44f1ae64-2da1-480f-aa30-98c5f22653ba%40googlegroups.com
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F
there might be a problem in that case.
The disk usage widget in the system tray will tell you what kind of
storage system your Qubes is using; if you used the default LVM it will
say "lvm" with the usage stats to the right.
--
Chris Laprise, tas...@posteo.net
https://github.c
On 5/28/19 8:42 AM, brendan.h...@gmail.com wrote:
On Saturday, May 25, 2019 at 2:28:13 PM UTC-4, Chris Laprise wrote:
I think the only _good_ way to deal with COW metadata expansion, since
its always related to data fragmentation, is to keep expanding it and
let system performance degrade
not well acquainted with the specifics, I'd suggest
dropping the requirement to backup individual folders and instead using
a passphrase with Qubes backup to backup the vaultvm to the backupvm,
then use whatever file transfer software your cloud provider requires in
the backupvm.
--
On 5/28/19 5:04 AM, Side Realiq wrote:
From: Chris Laprise
Sent: Mon May 27 19:58:35 CEST 2019
To: David Hobach , Side Realiq ,
Subject: Re: [qubes-users] How to automate cloud backups of trusted vault files?
On 5/27/19 9:05 AM, David Hobach wrote
x27;, then unmounts and closes the
container. Finally, it pipes the container img file through ssh to the
destination system.
Initial setup of the container looks like (in vault vm):
truncate -s 50M backup.img # Size is 50 megabytes
cryptsetup luksFormat backup.img
cryptsetup luksOpen back
ne with M.2 slot to recover. Or
how to do this? :( :( :(
Thanks.
(new email because no access to my password and data :( )
Based on what others have posted about the update, you should try to
select the prior kernel version under "Advanced options" in the grub
boot menu.
--
Chris Lap
t points to it. If you don't setup a pool you
can still use 'qvm-block attach' to let VMs access the space as
secondary disks.
I guess need to reduce size of current windows partition then empty part of hdd
to format to ext4 or other linux filesystem and then it will be possible
On 5/25/19 12:45 PM, Brendan Hoar wrote:
On Sat, May 25, 2019 at 12:09 PM Chris Laprise <mailto:tas...@posteo.net>> wrote:
It would be interesting if thin-lvm min transfer were the reason for
this difference in behavior between fstrim and the filesystem.
Indeed. Pretty sur
ding cloning/snapshotting
and/or modifying many small files then that figure could balloon close
to 100% in a very short period.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received thi
read
's/stretch/buster/g' instead.
Also, references to debian-8 & debian-9 should be changed to debian-9
and debian-10, respectively. Finally, the compacting procedure doesn't
apply on Qubes 4.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/
ega8-Graphics-1TB-HDD-4GB-RAM-i5575-A410BLU-PUS/212669685
[4] https://wiki.archlinux.org/index.php/Dell_Inspiron_5575
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message be
no way to play audio from VMs.
I'd be interested if anyone thinks they know why this conflict occurs
and/or possible workarounds.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
Yo
oice isn't
random consumer gear. AMD processors tend to be more secure in the face
of sidechannel attacks and suffer less performance degradation[1] from
resulting security patches; that's certainly a reason to go in AMD's
direction.
1.
https://www.tomshardware.com/news/intel-amd-
t obvious from those, afraid I wouldn't know
where to look next.
There is a memory-allocation bug with a fix in dom0 current-testing. The
package is qubes-core-dom0-4.0.43 and the issue is here:
https://github.com/QubesOS/qubes-issues/issues/4891
Applying this fix makes a very noticeable
On 5/18/19 8:54 PM, 'awokd' via qubes-users wrote:
Chris Laprise:
On 5/16/19 6:27 AM, Chris Laprise wrote:
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
Any idea
On 5/16/19 6:27 AM, Chris Laprise wrote:
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
Any ideas why a freshly-installed Whonix 14 template would experience an
update verific
add-in with the "Midnight Surfing" palette.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&qu
palettes of
Gnome/Gtk apps but the opposite hasn't been true in my experience.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Go
I'm getting a hash sum error when updating my whonix-gw-14 template
today. No error occurred when updating whonix-ws-14.
See below for the apt-get output...
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4
consider recommending a switch to AMD processors as a
short-term mitigation against CPU vulnerabilities.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are
On 5/13/19 6:52 PM, 'awokd' via qubes-users wrote:
Chris Laprise:
Its also the case that Fedora is intended to be a testbed,
NON-production OS and Qubes has plans to migrate away from it.
Interesting; more details on this somewhere, or was it IRC chatter?
There's an issue
u should also read the vpn-related sections of the Whonix docs; There
are tradeoffs to using a vpn with Whonix.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you a
fedora-29 template.|
|thanks in advance.|
At this point I'd suggest using Fedora 28 with Qubes-vpn-support, as a
bug has been logged about a problem with Fedora 29. OTOH, you could try
using NM with Fedora 29 to see if that works.
--
Chris Laprise, tas...@posteo.net
https://github.com/
ap
# swapon -a
# lvextend --poolmetadatasize +200M qubes_dom0/pool00
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-use
s first requires re-flashing the firmware with
Coreboot... an exercise that I'm about to try. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subsc
ehavior of existing apps.
Various troubleshooting threads around the net usually assume that KDE
is installed with 'plasma-nm' widget, but my tests with a Qubes template
running KDE show the problem still exists.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://
Sid; I didn't check.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
best compatibility. Finally,
Nvidia has a rotten reputation for compatibility because they're so
secretive about driver code; OTOH there are plenty of Intel and AMD
graphics options available.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BE
forums for recent posts with 'HCL' in the title.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
internet
No characters should appear on the password line. You can check it
manually by looking in the userpassword.txt file as I mentioned.
Also, it will be necessary to look at the log as I described to find out
what is causing the problem.
--
Chris Laprise, tas...@posteo.net
https://github.c
When it says Ready but there is no connection, its
usually because of a mis-typed username or password. You can check this
in the /rw/config/vpn/userpassword.txt file.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73E
These instructions show you where to place the config files from your
VPN provider (step 2).
Its your decision whether to copy all or just one config. But its easier
to copy all because there are usually other non-ovpn files which are
non-optional so copying all doesn't run the risk
so has a new de-duplication feature that we're
testing to save even more bandwidth and disk space.
The only thing its lacking at this point is built-in encryption, so
you'll have to supply that yourself with an encrypted filesystem if you
desire it.
--
Chris Laprise, tas...@post
On 4/20/19 7:14 PM, Jon deps wrote:
On 4/19/19 9:22 PM, Jon deps wrote:
On 4/18/19 12:08 PM, Chris Laprise wrote:
On 4/17/19 8:38 PM, Stumpy wrote:
I was thinking the line "remote random" in my .ovpn file, along with
the ip addresses would make the VPN VM randomly select differen
lines, one for each address.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
ve politics. In FOSS, if you took the most focused and wise
designers from Mozilla, Canonical and Google, I think you could make
some kind of broadly attractive platform that is more open and secure
than Android. It would be a fantastic thing to see.
--
Chris Laprise, tas...@posteo.net
https://g
y storage as a Qubes storage pool,
then create empty vms in that pool. Finally, mv/lvrename/snapshot/ln
(your choice, depending on type of storage and preference) your existing
volumes as necessary.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2
ize then its
possible by attaching a volume to a non-networked dispvm, running
'resize2fs' in the dispvm, then using 'qvm-volume resize --force
vm:volume size' in dom0.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356
On 3/30/19 3:47 PM, 'awokd' via qubes-users wrote:
Chris Laprise wrote on 3/30/19 7:10 PM:
I agree. But even so, AMD are better by some noticeable margin.
Intel... OMGWTF. With the 'VISA' exploit they're contradicting the
researchers, and with 'Foreshadow
iously wrong. VM starting
5 mins? SERIOUSLY wrong.
Certainly check those logs.
Try systemd-analyze blame to see if there are any services need
attention, and systemd-analyze plot for a graphical view.
This sounds like dom0 root filling up with logs:
https://github.com/QubesOS/qubes-issues/issues
es without deleting them all.
See issue 4927:
https://github.com/QubesOS/qubes-issues/issues/4927#issuecomment-479082579
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this m
the
restore folder is relatively easy, if the user chooses.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"
ystem crash. Luckily lvconvert
--repair did work but IIRC I had to do something with the metadata
volume (maybe expand or duplicate it) that I can't remember exactly.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1
ys 'yes') response?
The qubes-multi-update script already does this when run in unattended
mode and I've never had a problem with it, even in highly customized
Debian templates.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2
en an interesting forum thread to read, So, I was wondering what
potential RISC V and SiFive offer?
Sifive isn't interesting for PCs/laptops. IIRC it is the BOOM processor
project that is said to take RISC-V in that direction.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://t
owser ??
You could do that, but installing the non-ESR from Debian is easier and
more secure.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed t
On 3/30/19 12:25 PM, 'awokd' via qubes-users wrote:
Chris Laprise wrote on 3/30/19 2:44 AM:
On 3/29/19 7:18 PM, jrsmi...@gmail.com wrote:
https://github.com/system76/coreboot
Clearly they think they can handle modern hardware. Makes me wonder
why the coreboot folks have thrown
x. Also, Qubes
currently uses dashes only for separators, so using the other 3
lvm-allowed symbols ( . _ + ) will set your names apart.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You receive
first AMD system this week.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
y can free gigabytes of disk space.
https://www.qubes-os.org/doc/template/debian/upgrade-8-to-9/
I just upgraded from 9 to 10 using these instructions
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 18
itself in the window frames
we constantly look at. Definitely not a trendy move but great nonetheless.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are
to use 'mount --bind' in addition to all of
the above steps.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Gro
I've created an issue for this:
https://github.com/QubesOS/qubes-issues/issues/4920
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed t
ly. I would appreciate any help.
I have the same issue which I've mentioned in #3591. My workaround in
Debian is to go back to pvh to install the 4.19 kernel from testing.
Then I can use the template in hvm mode.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.
201 - 300 of 1261 matches
Mail list logo