On Mon, Sep 11, 2017 at 11:07 PM, wrote:
> I followed the tutorial here, specifically "Set up a ProxyVM as a VPN gateway
> using iptables and CLI scripts"
>
> https://www.qubes-os.org/doc/vpn/
>
> I like having the iptables anti-leak rules. However, it's connecting
>
On Tue, Dec 19, 2017 at 8:29 PM, Roy Bernat wrote:
> Its happen to me also .
>
> you should restart the computer and try again .
>
> if not copy the appvm .
I kept rebooting from last Thursday :) I finaly solved the issue by
recreating the vm. I wrote
a post about the same
Hi,
I am tryig to run Tails under 4.0rc3 along with virtual USB storage. I
need the storage
so that I can install Tails on it, and then do some work using the
Persistence volume (for development). Any tops if this can be done?
Kushal
--
Staff, Freedom of the Press Foundation
CPython Core
On Wed, Dec 20, 2017 at 12:55 PM, Matteo wrote:
>
> Thanks so much, it's a thing that i miss a lot.
> i come from windows with virtual box and found the qubes manager similar
> to virtual box gui (both useful and well done).
>
> but before you code it you should talk to joanna
Hi,
My Qubes 4.0rc3 (updated) is showing error for sys-net vm saying it
has a duplicate mac address for the NIC. This error message came
before (on the fresh install), and was fixed in a few reboots. But,
now I could not make it work for the last few days :(
Any tips how to solve this? I could
On Sat, Dec 23, 2017 at 1:28 AM, 'awokd' via qubes-users
wrote:
> On Fri, December 22, 2017 6:12 pm, Josefa Hays wrote:
>
>
>> I recently installed Q4.0-rc3. I have an old qubes-backup (from 2016) on
>> a LUKS encrypted external HDD. How do I restore my backup in 4.0
On Fri, Dec 29, 2017 at 10:31 PM, cooloutac wrote:
> seems marmarek posted an update, he suggest to update the fedora.
>
> But it seems passthrough for usb3 is still not supported yet, only block
> device.
>
> I'm glad for these posts before I attempted to try 4.0 and
On Fri, Dec 22, 2017 at 4:18 PM, Holger Levsen wrote:
> On Fri, Dec 22, 2017 at 02:34:41AM -0800, Reynir Björnsson wrote:
>> It may be a coincidence, but when it happened to me I got sys-net running by
>> shutting down sys-whonix first. I've since disabled sys-whonix and
Hi,
My sys-firwall is stuck at the boot time (with no limit) 4.0rc3
(updated). Is there anyway to boot
into dom0 without starting any other vm? Then I can remove and create
the sys-firewall vm again (or if there is any easy way to recreate the
vm). My primary Qubes laptop is not usable state
On Sun, Dec 24, 2017 at 3:14 PM, awokd wrote:
>
> It's not very elegant but this should work:
>
> Boot from your Qubes install media
> Troubleshooting
> Rescue a Qubes system
> 1
> Enter
> chroot /mnt/sysimage
> nano /var/lib/qubes/qubes.xml
> look for the line with
On Tue, Jan 23, 2018 at 12:17 PM, ThierryIT wrote:
> Hello,
>
> I have today to deal with two problems:
>
> 1) I am using Yubikey to be authentified on some web site like Github ...
> 2) I am using Yubikey to stock my PGP keys and to use them with mainly my
> emails
On Tue, Dec 26, 2017 at 8:18 PM, cooloutac wrote:
>
> wonder if your system runs low on ram? Could also try using system without
> iommu and see if it still happens.
>
I have 32GB here on a T470. I hope that is okay :)
Kushal
--
Staff, Freedom of the Press Foundation
Hi,
This is another common error I found (many times) over the weeks on
4.0rc3 (and with every update after that). I am wondering if anyone
else saw this error and if there is any issue already opened for it?
$ qvm-start netvpn
Got empty response from qubesd. See journalctl in dom0 for details.
On Wed, Oct 17, 2018 at 3:28 AM Johannes Graumann
wrote:
>
>
> Great to see work on this! While I haven't had time (yet) to play
> around with some of the salt introductions given in this thread,
> actually sticking with ansible would be my preferred solution ...
>
> Can you summarize where your
On Mon, Jul 2, 2018 at 12:13 PM Marek Marczykowski-Górecki
wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Mon, Jul 02, 2018 at 05:17:31PM +0200, Johannes Graumann wrote:
> > Would there be possibilities to bring a in my experience much more
> > approachable ansible option
On Thu, Jul 18, 2019 at 12:44 AM Johannes Graumann
wrote:
>
> On Wed, 2019-07-17 at 18:56 +0530, Kushal Das wrote:
> > On Tue, Jul 16, 2019 at 11:26 PM wrote:
> > > On Tuesday, July 16, 2019 at 10:35:11 AM UTC-4, unman wrote:
> > > > I really do recommend usi
On Tue, Jul 23, 2019 at 3:16 PM Martin Gladdish wrote:
>
> New Qubes user here, with less than a week's experience.
>
> Having fumbled my way through the initial install I'm now encountering a few
> tiny niggles that should be simple to fix.
>
> The first one that springs to mind is the default
On Tue, Jul 16, 2019 at 11:26 PM wrote:
>
> On Tuesday, July 16, 2019 at 10:35:11 AM UTC-4, unman wrote:
> > I really do recommend using qubesctl for almost all system
> > configuration. If only because it makes recovery so much easier.
> > I see people saying "keep a list of packages you've
Hi,
I wrote a blog post [0] explaining the steps required to move all the DNS calls
to any secure DoH server using Tor (to keep the calls anonymized). Here I am
modifying sys-firewall as the primary netwvm for the other AppVMs.
[0]
19 matches
Mail list logo