see '[sys-net]
Network Manager Applet'. Its pretty easy to use it like this once you're
used to it.
I've done some investigation for (hopefully) a permanent fix, but don't
have time to work on it right now.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com
it would be with the default RAM
allocation; I highly recommend it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qube
On 11/01/2018 11:55 AM, Fidel Ramos wrote:
‐‐‐ Original Message ‐‐‐
On Thursday, November 1, 2018 1:59 AM, Chris Laprise wrote:
On 10/31/2018 03:06 PM, entiosis via qubes-users wrote:
1. I’ve successfully managed to set up a “ProxyVM” (or “AppVM” as it is called
in Qubes 4.0
dom0 to make that
button reappear?
Wish I could help you there. QM has been in a lot of flux for the past year.
Please keep in mind that I'm a newbie Qubes user and a fairly new Linux (Mint)
user of just a couple of years if/when you of you reply to these questions.
--
Chris Lapris
it _replaces_ OS X -- it doesn't run on it. A more logical arrangement
would be to run OS X on Qubes which is the reverse of what you seek.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You
w/config/vpn, and make sure
one of them appears there as "vpn-client.conf" which is what the "ln"
link command is for (but you can use "cp" instead of "ln" if you wish).
I'd also advise you not to try performing more than one solution at the
same
On 10/23/2018 09:45 AM, alexander.ibrahi...@gmail.com wrote:
Den tisdag 23 oktober 2018 kl. 02:27:49 UTC+2 skrev Chris Laprise:
On 10/22/2018 04:40 PM, alexander.ibrahi...@gmail.com wrote:
Hello,
I am trying to follow this guide:
https://www.reddit.com/r/Qubes/comments/6h4ue2
better in all regards than the old scripts, including ease of use.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
kups
even on large volumes:
https://github.com/tasket/sparsebak
Its still experimental but could be in beta as soon as December.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received th
.
Try 'sudo dnf list qubes-template*' to see a list of installed
templates. If there are none, try mounting the installation media,
locate a qubes-template*rpm file and install the rpm file directly. This
should be a lot less time-consuming than re-installing Qubes.
--
Chris Laprise, tas...
istributed to anyone else.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
:56 AM, mfreemon wrote:
On 10/2/18 2:25 AM, Ivan Mitev wrote:
On 10/2/18 1:32 AM, Chris Laprise wrote:
On 10/01/2018 05:48 PM, mfreemon wrote:
On 1/11/18 3:01 PM, Chris Laprise wrote:
> On 01/10/2018 03:47 PM, Connor Page wrote:
>> The official templates use nftables so shouldn’t
itching back to
KDE. Xfce had too many bugs and omissions for me.
https://www.qubes-os.org/doc/kde/
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subs
) for
scanning. Another way is to use Qubes-VM-hardening as a way to launch
the AV scanner at normal appVM startup, at the instant before the
private volume is brought online.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3
On 10/01/2018 05:48 PM, mfreemon wrote:
On 1/11/18 3:01 PM, Chris Laprise wrote:
> On 01/10/2018 03:47 PM, Connor Page wrote:
>> The official templates use nftables so shouldn’t be mixed with
iptables. I didn’t have time to learn about nftables, so just removed
nftables package from
On 10/01/2018 05:24 PM, Chris Laprise wrote:
On 10/01/2018 02:50 PM, Micah Lee wrote:
I recently installed Qubes 4.0 on a laptop, installed updates in dom0
and my templates, restored a backup, and did a bunch of custom
configuration. And then when I rebooted, Qubes wouldn't boot up due
lvdisplay to verify the LV status has changed.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
to use qubes-tunnel.
Stuart
FYI, I just posted a fix for a blocked traffic problem on Qubes 3.2 (4.0
is not affected).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message
iptables
rules, the other (recommended way) is to connect the particular VM
requiring LAN access to a clearnet VM such as sys-firewall (assuming you
have sys-firewall still connected directly to sys-net).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com
to give it some love, we would be significantly
happier \o/
Thank you!
I'm working on getting the packaging correct so that it integrates
properly with qubes-builder. Its a bit more complicated than I expected
but I think it could happen this week.
--
Chris Laprise, tas...@posteo.net
https
the VPN to a ProxyVM increases the security of your VPN secrets.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"
of
the Qubes-specific DNS and iptables details.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
On 09/22/2018 11:01 AM, Chris Laprise wrote:
On 09/22/2018 05:01 AM, lik...@gmx.de wrote:
On 21/09/2018 23:43, Chris Laprise wrote:
On 09/21/2018 05:30 PM, Chris Laprise wrote:
On 09/21/2018 05:10 PM, liked2-mmb7mzph...@public.gmane.org wrote:
Hi,
there are several topics
On 09/22/2018 05:01 AM, lik...@gmx.de wrote:
On 21/09/2018 23:43, Chris Laprise wrote:
On 09/21/2018 05:30 PM, Chris Laprise wrote:
On 09/21/2018 05:10 PM, liked2-mmb7mzph...@public.gmane.org wrote:
Hi,
there are several topics in the documentation pointing to the
location of files like
On 09/21/2018 05:30 PM, Chris Laprise wrote:
On 09/21/2018 05:10 PM, lik...@gmx.de wrote:
Hi,
there are several topics in the documentation pointing to the location
of files like: root.img, volatile.img, private.img
here:
https://www.qubes-os.org/doc/hvm/
or here:
https://www.qubes-os.org
est to first try using the qvm-* commands
like "qvm-volume".
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
) then you'll have to install it in either a template or a
standalone VM made from a template (this is an option in the Qubes
Create VM dialog). The latter should make Crossover installation simpler
for testing purposes.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
ult won't run as
smoothly as Qubes-vpn-support - you can trust me on this because I wrote
both of them. :)
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because
now about labeling screens, but the pager settings do have a
checkbox for displaying only the current screen.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this messag
to do this in R4.0 is to click on "Provides network" instead.
The newer (proposed) doc + qubes-tunnel as suggested by awokd are much
easier to install and run more smoothly, BTW.
https://github.com/tasket/qubes-doc/blob/tunnel/configuration/vpn.md
--
Chris Laprise, tas...@po
an already do this with the service in
Qubes-VM-hardening since it can deploy files from template to anywhere
in /rw at the moment the appVM mounts it...
https://github.com/tasket/Qubes-VM-hardening
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP:
ternal firewall
script is in effect, which is why this step comes before any scripts are
added (i.e. its performed in a fresh VM).
You can either disable the firewall script in
/rw/config/qubes-firewall.d and reboot, or try the test in a new VM
connected to sys-net.
--
Chris Lapris
.
You said that Tor was running. When combining Tor with VPN, the VPN's
connection type should be TCP, not UDP. Did you check that?
When connecting to VPN through TOR, TCP is required but depending on
your provider's server config you may also have to change the port number.
--
Chris Laprise
ds nor malware would
be retained when sys-net is restarted. Then you could control wifi
connections from a dom0 script. This would be like having a separate
sys-net for each wifi connection, if you restart sys-net whenever the
wifi connection was changed.
--
Chris Laprise, tas...@posteo.ne
needed.
The debian-9 template already has everything it needs for sys-firewall use.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
to
create and setup a new proxyVM and use that instead.
3. Unlikely: Interference from malware, possibly residing in sys-net.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this messa
Tasket solution easier to set up for a relative novice in desperate need of VPN
security. I am also able to setup a few configurations so I can use different destinations. Is this the
version you are using?
You can think of the vpn doc as a much older version of qubes-tunnel. I
doubt switching
connection
will show "Initialization sequence completed" at the end.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Grou
On 09/03/2018 06:03 PM, Guy Frank wrote:
On Friday, August 31, 2018 at 6:31:58 PM UTC-4, Chris Laprise wrote:
On 08/31/2018 01:40 PM, Guy Frank wrote:
On Friday, August 31, 2018 at 12:17:54 PM UTC-5, js...@bitmessage.ch wrote:
Guy Frank:
One question I had is whether there is any way to set
On 09/02/2018 04:07 PM, Chris Laprise wrote:
On 09/02/2018 12:42 PM, Nicola Schwendener wrote:
Hi Chris,
thank you for your reply:
this is what I got:
Sep 02 18:37:07 sys-vpn-Express qubes-vpn-setup[654]: Sun Sep 2
18:37:07 2018 SENT CONTROL [Server-2203-1a]: 'PUSH_REQUEST' (status=1)
Sep 02
to be the problem. They're assigning '10.54.0.1' as DNS. You
could try replacing that with 8.8.8.8 for instance. The way to do this
is in the Qubes-vpn-support readme page... basically add a line to your
ovpn config file like:
setenv vpn_dns '8.8.8.8'
Then restart the VM.
--
Chris Laprise, tas
try ping, is it from a downstream appVM (a regular appVM that
is connected to the proxyVM)?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
ould be to setup a new storage pool to
hold that VM. Unfortunately the docs could use a rewrite:
https://www.qubes-os.org/doc/storage-pools/
The relevant commands are 'qvm-pool --add' and 'qvm-create --pool'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttas
On 08/25/2018 03:59 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-08-25 14:24, 'awokd' via qubes-users wrote:
On Sat, August 25, 2018 7:01 pm, Chris Laprise wrote:
On 08/25/2018 02:25 PM, Rusty Bird wrote:
odindva0...@gmail.com:
I am using version R 4
r VM types was a mistake. People are getting confused and referring to
"network-providing appVM" in the generic is awkward at best --
especially if you are merely describing or referring to VMs instead of
giving instructions on creating them.
--
Chris Laprise, tas...@posteo.net
https://git
is easier than wifi):
https://unix.stackexchange.com/questions/253030/how-to-setup-network-without-wicd-or-networkmanager
In order to execute commands to repair the template, you'll need to
start a root shell from dom0 like this:
$ qvm-run -u root vmname 'xterm'
Good luck!
--
Chris Laprise
Zeko
You'd be better off switching to integrated graphics; much much simpler.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
and store VMs inside them.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
lumes are swap space. They are deallocated when the VM is
started/stopped.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
On 08/18/2018 09:47 PM, Stumpy wrote:
On 2018-08-18 22:30, Chris Laprise wrote:
On 08/18/2018 12:39 PM, Stumpy wrote:
I am able to ping via the vpn vm but when I try to connect to the net
with an appvm that is using the vpn vm I cant connect to anything. Im
using v4.0 and the script method
-using-the-qubes-tunnel-service
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
line)
2. AND upgrading Intel microcode to 20180807
On #2, assuming Intel has still abandoned Ivy Bridge and earlier CPUs, I
wonder if this makes the CoreBoot targeted systems essentially
unsafe/unusable.
Very bad.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
Qubes tools.
Their VPN protocol appears to be IPsec (which isn't great BTW); you
could start with a Linux IPsec tutorial in a proxyVM to see if you can
connect to this other person.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73E
On 08/13/2018 05:32 PM, joevio...@gmail.com wrote:
On Monday, 13 August 2018 17:13:06 UTC-4, Chris Laprise wrote:
On 08/13/2018 04:47 PM,
Related question.
If I installed Qubes and used LUKS encryption (I have to run cryptsetup
openLuks just to see the LVM inside)... then I add physical
b and grub
accommodate that multi-volume setup.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
the thin pool? Or would it make sense to keep it as
its own LV? Yeah, it means dom0 cannot grow with the pool, but should it?
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
special about fedora-28
either; I get similar results from debian-9 and whonix-ws.
Can Qubes access all of that RAM? Look at the total_memory figure from
'xl info'.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3
an eye on your disk space meter.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
f regular lvm. If reliability is high on your list then Btrfs may
be better... it seems to be older with a lot more people using it, and
has more internal error-correction mechanisms (but it still isn't
recommended for RAID5/6). Btrfs is worth considering as an alternative.
--
Chris
ntioned
earlier; only whonix-ws is needed. Once you have your appVMs switched
over to whonix-ws-14 you can delete the clone.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received th
What I did: Cloned the old whonix-ws template, switched appvms to the
clone, then did 'dnf remove' on the old templates and finally performed
the recommended whonix install procedure.
Later, I was able to switch existing whonix appVMs to whonix-ws-14.
--
Chris Laprise, tas...@posteo.net
https://
/HDD mode, but Btrfs does.
The HDD mode avoids some thrashing.
Also, I remember installing a 4.0 release candidate on an external HDD
and didn't note unusual thrashing at the time.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E
MB RAM, and I
find dom0+KDE works smoothly with max RAM at 1500MB. Most personal and
work VMs do fine with max RAM at 1500 - 2000MB.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You re
of a service by this name. I then did a bit of
searching and it turns out that the correct command is
sudo systemctl start NetworkManager
Yes, I should have mentioned I worked that out on Debian 9. Fedora
service names are different.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
in the template and start with wifi turned off. It can
be turned on by right-clicking the systray icon and enabling the wifi
checkbox.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received
On 05/23/2018 11:29 AM, trucs.important...@gmail.com wrote:
Hi, I've reinstalled Qubes 4.0 and copy (ctrl+c / ctrl+alt+c) works but not
paste (ctrl+alt+v / ctrl+v)...
An idea to resolve it?
The combination is Ctrl+Shift not Ctrl-Alt.
--
Chris Laprise, tas...@posteo.net
https://github.com
know if the
tboot update has an impact on graphics but thought I'd mention it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google
or btrfs) should work more
smoothly than Hyper-V storage. Note the warnings re: volume spoilage on
the Microsoft page don't apply to Qubes; you still have to update each
cloned OS, but there is no need for you to keep track of volumes to
avoid spoilage.
--
Chris Laprise, tas...@posteo.net
https
-scripts
$ findpref -p netvm sys-vpn sys-vpn
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
d:
ip route add default via $IP
So sure, I don't know why it's report .10/24 and not .1/24
Maybe you know where/how to get correct IP? My regular setup works with
hard-coded 192.168.30.1, but I want to parse it on the fly.
Normally I would use 'hostname -I' to find the VM's IP addres
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiv
ook similar in the sense that they're all
virtual.) Its probably worth reporting this behavior on the ethervpn
forum/list.
You might also try writing a small script to bring the vif interfaces up.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP:
0_example.conf
and manpages for systemd.unit "overriding vendor settings").
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Goo
a recent version of Qubes-vpn-support or qubes-tunnel,
restarting the service is simple:
sudo systemctl restart qubes-vpn-handler
or
sudo systemctl restart qubes-tunnel
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3
/configuration/vpn.md#set-up-a-proxyvm-as-a-vpn-gateway-using-the-qubes-tunnel-service
https://github.com/tasket/qubes-tunnel
This thread is for qubes-tunnel not Qubes-vpn-support.
Also I can't read minds... Can you describe a specific example with one VPN?
--
Chris Laprise, tas...@posteo.net
https
On 05/14/2018 09:09 AM, Chris Laprise wrote:
On 05/12/2018 03:11 PM, JonHBit wrote:
I've updating to 1.4beta4 and switched templates from debian-9 to
fedora-28, but I'm getting the same error - also it seems like openvpn
flag defaults changed, as it now returns an error for the up and down
the path
(connect VPN directly to sys-net) because a VPN qube configured with
qubes-tunnel still does the job of a regular proxy qube (like sys-firewall).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106
the quotes
I'm a little unclear: Did you get the link working like this?
I have two fedora 26 templates, one was last updated over 10 days ago
and the other updated today. The VPN link won't come up with the latter
one...
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https
, so am
not ready to declare an issue.
Question: is there some auto-update feature (of dom0, or templates, or
whatever) that may be automatically asking for a network connection?
Regards
River~~
See this issue:
https://github.com/QubesOS/qubes-issues/issues/3588
--
Chris Laprise, tas
If using 'qubes-tunnel-openvpn' service for your VPN VM, your configs
should reside in /rw/config/qtunnel and the setenv line that you add
will be:
setenv tunnel_dns '208.67.222.222 208.67.220.220'
-
It would be nice, however, if you made the switch to qubes-tunnel to
give us some testi
On 04/26/2018 05:29 PM, JonHBit wrote:
On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
On 04/17/2018 11:42 PM, Chris Laprise wrote:
On 04/17/2018 09:20 PM, JonHBit wrote:
Worked well for me using a debian-9 template & commit 4e96ca8, only
trouble was that my
On 04/20/2018 11:14 AM, cicero wrote:
On 04/20/18 04:58, Chris Laprise wrote:
Since there's no connection information in the template -- only the
VPN scripts & the OS are there -- templates don't affect configuration
issues like different locations. In any case, you have a proxyVM w
in appVM's once VPN is disconnect allow clear and unencrypted
traffic.
In this case you're following the usage and threat model that LEAP
designed bitmask for. IOW, the appVM is like a regular Linux PC and the
user must be mindful of the connection state.
--
Chris Laprise, tas...@posteo.net
https
in appVM's once VPN is disconnect allow clear and unencrypted
traffic.
In this case you're following the usage and threat model that LEAP
designed bitmask for. IOW, the appVM is like a regular Linux PC and the
user must be mindful of the connection state.
--
Chris Laprise, tas...@posteo.net
https
On 04/22/2018 01:43 PM, Chris Laprise wrote:
On 04/22/2018 12:52 PM, js...@bitmessage.ch wrote:
niepowie...@gmail.com:
I'm user of vpn bitmask software and accidentally, from time to time
connection disconnect and there is few second to connect again.
How is easiest way to set up firewall
:
iptables -I FORWARD -o eth0 -j DROP
iptables -I FORWARD -i eth0 -j DROP
Also, if you run bitmask just in individual appVMs (instead of proxyVM,
which shares the connection with some number of appVMs) then in that
situation it probably won't need Qubes-specific rules to prevent leaks.
--
Chris
On 04/20/2018 09:24 AM, Chris Laprise wrote:
This script has a number of options for selecting templates and
standalone VMs and it can update them all in a single run...
Link - https://github.com/tasket/Qubes-scripts
Enjoy!
Update: Fixed a typo in qubes-multi-update.
-
Also added another
On 04/21/2018 08:54 AM, Chris Laprise wrote:
On 04/21/2018 07:18 AM, 'awokd' via qubes-users wrote:
On Fri, April 20, 2018 11:38 pm, trueriver wrote:
Is that -root-tmp volume a sign of a bug, if so where?
I am not confident of reproducing the bug, if indeed it is one.
My gut feeling
g failed with an error message
about same. I didn't see -root-tmp at any time; not sure what might have
created it.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this mess
that a bug left behind a similarly named meta-volume
that is now preventing a normal installation from completing. Comparing
the output of 'qvm-volume' with 'sudo lvs' may provide a clue if that's
the case.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
On 04/20/2018 10:04 AM, cicero wrote:
On 04/20/18 03:12, Chris Laprise wrote:
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't
This script has a number of options for selecting templates and
standalone VMs and it can update them all in a single run...
Link - https://github.com/tasket/Qubes-scripts
Enjoy!
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E
On 04/20/2018 02:03 AM, cicero wrote:
On 04/19/18 14:04, Chris Laprise wrote:
On 04/19/2018 07:26 PM, john wrote:
I installed this in a App/proxy 4.0 VM, as I am familiar with the
3.2 CLI VPN creation.
I don't really understand how installing it in a Template or The
Template(not cloning
be an additional non-persistent volume,
but belonging to each configured VM not the template.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed
of _tasks and risks_ you expose each VM to... not so much when
applied to specific apps (although occasionally risk types translate
into specific apps).
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F
. I myself use Fedora only for sys-firewall (to handle dom0 updates),
to test software compatibility, and occasionally to build a template.
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
-
On 04/17/2018 11:42 PM, Chris Laprise wrote:
On 04/17/2018 09:20 PM, JonHBit wrote:
Worked well for me using a debian-9 template & commit 4e96ca8, only
trouble was that my VPN provider's configs used
/etc/update-resolv-conf and failed silently when it was missing - so
shipping it with q
On 04/17/2018 09:20 PM, JonHBit wrote:
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
Hello fellow Qubes users:
Per issue 3503 the Qubes project would like to incorporate VPN features
from Qubes-vpn-support -- which a number of you are already using --
into the Qubes 4.1
o try this out and
report here on your results!
-
PS - Some of you will wonder if installing qubes-tunnel into an existing
template already used for Qubes-vpn-support will cause a conflict; They
will not conflict as long as the two services aren't enabled for the
same ProxyVM(s).
--
Chri
team is listed here:
https://www.qubes-os.org/team/
--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
401 - 500 of 1140 matches
Mail list logo