didn't make
any typos.)
Any idea what this might indicate?
Cheers,
- --
- -Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile OpenPGP: 2158 0643 C13B B40F B0FD 5854 B007 A32D AB44 3D9C
Send non-security-critical things to my Mobile with OpenPGP
ing them; they have nothing to do with Qubes.
There are other email hosts that don't demand invite codes; you can
use one of them.
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYl7j+AAoJELPy0WV4bWVwa5oP/2axmIdHHGjWpQv3wV7J4/6q
TP7ZTA8zt4ywcMVTCjePn0mbVi/7wNNnoYT8XA2iYxnOILEubUZHpbhgD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jeremy Rand:
> xmee...@gmail.com:
>> I just did a clean install of Qubes 3.2. For some reason the
>> resolution off apps in Fedora VMs is wildly inconsistent. The
>> borders of the windows, dom0, and the Debian VMs are co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Robert Fisk:
> On 12/30/2016 01:33 AM, Jarle Thorsen wrote:
>> torsdag 29. desember 2016 13.14.25 UTC+1 skrev Grzesiek Chodzicki
>> følgende:
>>> W dniu czwartek, 29 grudnia 2016 13:07:44 UTC+1 użytkownik
>>> Jarle Thorsen napisał:
Currently my
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jarle Thorsen:
> torsdag 29. desember 2016 13.14.25 UTC+1 skrev Grzesiek Chodzicki
> følgende:
>> W dniu czwartek, 29 grudnia 2016 13:07:44 UTC+1 użytkownik Jarle
>> Thorsen napisał:
>>> Currently my Windows 7 StandaloneVM feels a bit sluggish.
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
pixel fairy:
> On Tuesday, October 1, 2013 at 6:32:41 PM UTC-7, ears...@gmail.com
> wrote:
>> We all know Fedora is a big name, but is it a good choice for a
>> Security Driven OS like QubeOS to be based around? What do others
>> here think?
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Andrew David Wong:
> On 2016-12-13 12:56, Jeremy Rand wrote:
>> Andrew David Wong:
>>> On 2016-12-12 21:30, Jeremy Rand wrote:
>>>> I just tried to restore 5 VM's from a backup. The backup was
>>>> mad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
J. Eppler:
> Hello,
>
> here is the correct link:
Looks like Enigmail's line breaks in combination with Google Groups
may have broken the link I provided. Apologies (and thanks for
correcting) if that's the case.
Cheers,
- -Jeremy
-BEGIN PGP
tems/talos-secure-workst
ation
Cheers,
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJYU3gOAAoJELPy0WV4bWVwO+IQAIr+UtgNk+29oFRjvd+UKMUF
QkWkXrn+PqWDYs63NSX4LWnyO3apo1wY/yjmBkSiKKvEnK+1v3nDOAxGxPSKyWC1
9DWhESfBzM1dagy2spGEB7YpuAM4yrp1Ih58PxT1e/mRRca14NomwzNiNiqDpw94
rZWQXxQ/ig
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Andrew David Wong:
> On 2016-12-12 21:30, Jeremy Rand wrote:
>> I just tried to restore 5 VM's from a backup. The backup was
>> made on Qubes 3.0; I'm restoring to Qubes 3.2. All 5 VM's fail
>> to restore with this erro
kotot...@gmail.com:
> Hello community,
>
> I was wondering why one of my program was taking ~15 seconds to compile when
> my colleague compiled it within ~3 seconds on his system. I know there are a
> performance price to pay for the virtualisation but nonetheless. I was super
> annoyed and I
7v5w7go9ub0o:
>
> On 10/23/2016 09:38 AM, Achim Patzner wrote:
>> Hi!
>>
>>
>> After a few months of severe suffering from xfce on a HiDPI display I
>> gave in and installed @kde-desktop-qubes on my system – and I'm pretty
>> sure I don't want to see xfce for the next few years. Title bars have a
Jeremy Rand:
> If I install LibreOffice in a Fedora 23 Template using Qubes 3.2, the
> "Presentation Display" setting works properly with no issues, so I can
> see my notes on my main display and the presentation shows up on my
> external display.
>
> However, this
xmee...@gmail.com:
> I just did a clean install of Qubes 3.2. For some reason the resolution off
> apps in Fedora VMs is wildly inconsistent. The borders of the windows, dom0,
> and the Debian VMs are correct but the apps in Fedora VMs range from
> consistent with the others to so low as to be
qer...@tutanota.com:
>
> I am following this guide:
>
>
>
>
> https://forums.whonix.org/t/using-whonix-workstation-as-a-disposablevm-dispvm/2461
>
>
>
> I have created the whonix-ws dvm template but am unable to create a usable
> dvm like in the aforementioned guide, primarily because
pleom...@gmail.com:
> philosofy of qubes is that you are safe when your app is isolatet.This is
> wrong just keep app in sandboxes or jails and what wrong can be happen?
Thanks for the spamfest. Looks like my null-routed email address list
finally has someone other than Drew in it. Next time
Rusty Bird:
> Hi Robert,
>
>> However I would not use the "move to VM" command like this, as I
>> experienced those requests getting lost One time files were
>> actually deleted, since that time I always use copy instead of
>> move.
>
> Sounds troubling. Do you remember the last Qubes release
Manuel Amador (Rudd-O):
> Folks, it gives me great pleasure to announce the product of over two
> years of work (primarily because I never paid enough attention to this
> project to bring it to completion): Qubes network server.
>
> The traditional Qubes OS networking model contemplates a
m.j.p@gmail.com:
> hello, i'm just starting with qubes and wanted to have vm with intellij
> installed.
>
> i've choosen hvm to have my working apps only on one vm than via template.
Why are you using an HVM for that rather than a PV StandaloneVM? Am I
missing something?
Cheers,
-Jeremy
raahe...@gmail.com:
> On Tuesday, October 4, 2016 at 12:13:38 PM UTC-4, cubit wrote:
>> 4. Oct 2016 16:04 by jerem...@airmail.cc:
>> I can confirm that I encountered this today. It was with a VM that had
>> been running for several days. I've encountered the same error (or one
>> similar to it)
cubit:
> 4. Oct 2016 12:31 by a...@qubes-os.org:
>
>> Thanks for the report. Tracking:
>>
>> https://github.com/QubesOS/qubes-issues/issues/2362
>>
>
>
>
>
> Some unscientific testing.
>
>
>
>
> Trying a restart after 15 minutes of not doing a restart and the function
> works as expected
nishiwak...@gmail.com:
> Uh ok, this ipv6 listening on my template set me in full paranoid mode. I
> have found disappointing to see ipv6 wasn't disabled on Debian template, but
> yea sorry, I went completely mad & full retard mode about Qubes on the rest.
>
> I thought I was betrayed. I have
nishiwak...@gmail.com:
> I won't wait another week with my HDD disabled by this OS.
I'm trying to figure out if this is a veiled threat of some kind...?
FWIW, I've booted from USB drives while Qubes was installed internally
before. I'm under the impression that lots of people here have done so.
neilhard...@gmail.com:
> I created a new Net VM, in order to use Debian, and it works fine.
>
> But now I want to revert back to sys-net.
>
> The problem is that my sys-firewall no longer works.
>
> How do I get sys-firewall to work again?
>
> It starts up fine, but simply doesn't work. Other
York Keyser:
> Hi group,
>
> I have a short, maybe stupid question, where or how can I see the
> available memory. Not the memory of each VM I need to know how much
> memory is availably global wide. (Short-term and Long-term memory)
>
> Regards York
Last I heard, there isn't an easy way to see
Achim Patzner:
> Am 28.09.2016 um 10:06 schrieb Drew White:
>> On Wednesday, 28 September 2016 17:47:01 UTC+10, Foppe de Haan wrote:
>>> On Wednesday, September 28, 2016 at 8:20:29 AM UTC+2, Drew White wrote:
Why does QWT require TESTSIGNING to be turned on?
Is that because Win7
raahe...@gmail.com:
> On Tuesday, September 27, 2016 at 5:11:27 PM UTC-4, Jeremy Rand wrote:
>> raahe...@gmail.com:
>>> or just only allow https in the vm firewall settings.
>>
>> I assume you mean whitelisting TCP port 443? If so, be aware that while
>> t
johnyju...@sigaint.org:
>> The "listening" services are less of a concern, since the firewall
>> wouldn't permit any incoming connections to be passed through to start
>> with. It's the "phone home" style services, like time sync, Samba name
>> lookups on microsoft servers, and such, that are
raahe...@gmail.com:
> or just only allow https in the vm firewall settings.
I assume you mean whitelisting TCP port 443? If so, be aware that while
this will stop most non-HTTPS traffic, there is nothing that prevents
other protocols from using port 443. It's a fairly well-known attack on
Tor's
'Gabriel' via qubes-users:
> Hi fellows,
>
> I started using qubes a while ago and I have a question concerning backups.
> What I want is a complete backup to a dedicated external USB HDD. I
> understand to achieve this all the VMs must be shut down.
> Therefore when I plugged in the HDD I
still maintained, but yes, it has been thought of.
Also, I think SecureDrop uses 4 physical machines, 1 of which runs Tor
and another of which runs the hidden service, a 3rd of which is offline
completely (I can't remember the purpose of the 4th offhand). So it's
fairly similar to a Qubes
nekroze.law...@gmail.com:
> On Tuesday, August 30, 2016 at 12:57:54 PM UTC+10, Jeremy Rand wrote:
>> Seems to me that an attack could be constructed where the Tor exit used
>> for update downloads feeds sys-whonix an exploit, and from there is able
>> to either break out of T
d, this is a fairly lousy attack as attacks go, but isn't the
entire point of Whonix that nothing is supposed to run inside the Whonix
gateway except Tor?
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscri
ce my main display is much higher resolution than the external
display, the result is that the presentation appears zoomed in, with
much of the border cut off.
Note that I'm using the jessie-backports version of LibreOffice in my
Debian/Whonix VM's.
Any idea what might be causing this?
Cheers,
-J
m misunderstanding what you're doing.)
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
lots of things that aren't network-related. I'm
under the impression that OpenSSL is used for the Qubes backup/restore
system. A Qubes devloper would be able to answer with more certainty.
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-u
t for me. Might
have been a server issue on Fedora's end.
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...
ost. Might I ask whether your
external USB drive was USB2 or USB3, whether it was an HDD or SSD, and
whether it used RAID0?
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group a
tering either was fixed
between 3.1 and 3.2rc1 (and didn't seem to exist in 3.0rc1), or is in
some way unique to your setup. Maybe a hardware issue?
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group a
s closed. This
would, presumably, mitigate persistent malware placed via Firefox
exploits, but won't help against malware that combines a Firefox exploit
with a Xen exploit. It still seems like an improvement against the
default configuration.
Cheers,
-Jeremy Rand
--
You received this message because y
Is my intuition on this corect?
Of course, using a separate VM means increased RAM usage, which may or
may not be worth it.
Cheers,
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
Marek Marczykowski-Górecki:
> On Wed, Jul 27, 2016 at 09:53:00AM +0000, Jeremy Rand wrote:
>> 45in10+d44wd6z0yzqcg via qubes-users:
>>> The proposed workaround solved part of the issue, however I'm still facing
>>> issues with application windows that are not
45in10+d44wd6z0yzqcg via qubes-users:
> The proposed workaround solved part of the issue, however I'm still facing
> issues with application windows that are not displayed as outlined on my
> previous comment:
>
> Since this update every time a command is launched, when the respective AppVM
>
Marek Marczykowski-Górecki:
> On Wed, Jul 27, 2016 at 04:32:24AM +0000, Jeremy Rand wrote:
>> Marek Marczykowski-Górecki:
>>> On Tue, Jul 26, 2016 at 03:11:33PM -0700, Andrew David Wong wrote:
>>>> On 2016-07-26 14:52, Manuel Amador (Rudd-O) wrote:
>>>&g
23 TemplateVM.
_QUBES_LABEL is 8.
_KDE_NET_WM_COLOR_SCHEME is
"/home/jeremy/.local/share/qubes-kde/black.colors".
_QUBES_LABEL_COLOR does not show up in the xprop output at all.
Hope this helps in diagnosing.
Cheers,
-Jeremy Rand
--
You received this message because you a
ses being able to test software I write on the latest OS release is a
higher priority, so it's doing its job just fine.
-Jeremy Rand
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving e
Andrew David Wong:
> On 2016-07-18 01:27, Jeremy Rand wrote:
>> Hello,
>
>> Might there be any plans to allow sending a directory to a DispVM? Right
>> now in Qubes 3.2 rc1, attempting to do so from the file manager GUI in a
>> Fedora 23 template yields this e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06/27/2016 04:45 AM, 41zxmg+5qvzr7o3u2us via qubes-users wrote:
> Jeremy,
>
> You are awesome, that does work indeed. The tutorial is a bit
> unclear, but when I add this as two separate lines it works
> smoothly :)
>
>
> Many thanks :)
Glad
I'm totally okay with the fact that I lost a
few hours debugging this (I'm using a release candidate, after all),
but I imagine some users might find this frustrating.
Cheers,
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXcPKfAAoJEAHN/EbZ1y06N9YP/2TR/IejUyrsGLvVWesJaK1m
49 matches
Mail list logo