Hey fellow Qubes-Users,
I want to use an remote PULSE audio server to playback sound output. The
server side is up & running. The connecting AppVM is based on the
debian-8 template
Standard auto-discover does not work, probably because the AppVM tries
to locate the remote server in the virtual in
Hey fellow Qubes-Users,
I want to use an remote PULSE audio server to playback sound output. The
server side is up & running. The connecting AppVM is based on the
debian-8 template
Standard auto-discover does not work, probably because the AppVM tries
to locate the remote server in the virtual in
Hey fellow Qubes-Users,
I want to use an remote PULSE audio server to playback sound output. The
server side is up & running. The connecting AppVM is based on the
debian-8 template
Standard auto-discover does not work, probably because the AppVM tries
to locate the remote server in the virtual in
The second and third post were send as a new mail (not a reply).
Why do these mails appears as answers here?
The first post was send as a reply to the mailing list, changing the
topic and expecting to create a new thread, my bad. Sorry.
But I do not understand why the other mails end up in this ot
Hey fellow Qubes-Users,
I want to use an remote PULSE audio server to playback sound output. The
server side is up & running. The connecting AppVM is based on the
debian-8 template
Standard auto-discover does not work, probably because the AppVM tries
to locate the remote server in the virtual in
Am 01/09/2017 um 02:51 PM schrieb Torsten Grote:
> On 01/09/2017 07:15 AM, Robert Mittendorf wrote:
>> I tried to use a tunnel in /etc/pulse/default.pa
> I think this is the wrong config file. There should be a qubes.pa or
> something like that.
>
> Kind Regards,
> Torsten
Am 01/12/2017 um 02:25 PM schrieb Torsten Grote:
> On 01/12/2017 08:37 AM, Robert Mittendorf wrote:
>> Now I have the tunnel enabled when I start the AppVM - but it is still
>> not working (the "current volume" bar right above the greyed-out
>> "Advance
> I suspect you too may be suffering
> https://github.com/QubesOS/qubes-issues/issues/2182
>
> Look at /var/log/libvirt/libxl/libxl-driver.log and see if there is a
> line like
> xc: error: X86_PV_VCPU_MSRS record truncated: length 8, min 9: Internal
> error
>
> The reason that directly booting
Am 09/20/2016 um 10:29 PM schrieb Chris Laprise:
This is a good candidate for filing an issue, but mainly for this
situation -- "A warning if an upstream VM does not implement the
firewall rules", which should include connecting to netvms.
IIRC, Qubes Manager used to grey-out the firewall ta
ess to the webserver and the update-servers of
the thunderbird add-ons (usually AMO).
BUT: I can only open up 1 URL at a time. If there is an DispVM with
Firefox already, the URL will not be opened in Firefox in a DispVM (not
in the existing window and not in a new one).
--
M. Sc. Informati
Hey Clark,
the article which you referenced to is about opening (and converting)
PDF documents. My idea is about opening URLs (Links) in a DispVM. I
think that is not related in any way, is it?
Robert
btw: did you notice, that googlegroups blocks email having a subject
starting with a quote
Hey Qubes-Team,
https://www.qubes-os.org/doc/hvm/
states that "shared templates for HVM domains" are not supported.
This is an outdated information, isn't it?
Robert
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
It seems like this issue was fixed in current 3.2 testing build. I can
open more than 1 url at a time from Thunderbird now.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, sen
Nice!
Btw: You did not update the "Download & Install" Button on the main page.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegro
new default DE?!
regards,
Robert Mittendorf
--
M. Sc. Informatik Robert Mittendorf
DigiTrace GmbH - Kompetenz in IT-Forensik
Geschäftsführer: Alexander Sigel, Martin Wundram
Registergericht Köln, HR B 72919
USt-IdNr: DE278529699
Zollstockgürtel 59, 50969 Köln
Telefon: 02
Hello fellow Qubes-Users,
I'd like to suggest to have an additional (optional) field in firewall
rules to store remarks for specific rules
(like "needed for xyz" "IP of www.MyHomepage.de" and others)
Is it possible to use Qubes firewall rules and own iptables-rules
together, or will the firew
I think I found the solution to your problem - at least my issues with
booting Kernel 4.4 and Qubes 3.2 are solved now. I increased the total
graphics memory from 256 MB to 512 MB - and boom, here you go!
Am 10/04/2016 um 06:02 PM schrieb habib.bhatti...@gmail.com:
I have a T450s and I follow
pen usb - is it a thumb drive or a tool for drawing?
if thumb drive how do you attach? (block device or usb device?)
are you using the usb-vm? afaik Windows Qubes tools do not yet support
USB-passthrough.
The file will usually be in documents folder.
You did install the Windows Qubes Tools, did
Software that you don't need is a security risk as it imposes additional
attack surface - we all know that.
Besides exploits those tools might cause additional threat (e.G. RDP-
VNC-, SSH-Clients)
So you better do not install non-universal software* in a template VM.
*software that is not needed
Hey folks,
sometimes the sys-firewall (more likely a service within it) crashes and
does no longer allow connected VMs to resolve DNS.
The ProxyVM must be the responsible entity, because the connection will
be fine again If I restart the sys-firewall.
Restarting the ProxyVM is tedious, as you c
Hey again,
I have quite some VMs that I don't use very often (e.g. for backup
reasons). I'd like to hide those without hiding all inactive VMs.
Is it possible to mark an own VM as "internal" like the fedora-23-dvm
template?
For future versions it might be nice to be able to group VMs or set a
Well, the discussion leaves the focus I intended it to have.
It is surely worth thinking about what a minimum templates needs to have.
Nevertheless I think Qubes is about "I know I can get exploited, so just
protect the other parts of the system". Afaik a normal Qubes template
has only the root
though normal DispVMs are
red.
Also the firewall rules (intranet only) are inherited from the work VM.
mit freundlichem Gruß,
Robert Mittendorf
--
M. Sc. Informatik Robert Mittendorf
DigiTrace GmbH - Kompetenz in IT-Forensik
Geschäftsführer: Alexander Sigel, Martin Wundram
Registergericht Köln
Am 10/12/2016 um 04:00 PM schrieb 7v5w7go9ub0o:
On 10/11/2016 09:30 AM, Robert Mittendorf wrote:
Software that you don't need is a security risk as it imposes
additional attack surface - we all know that.
Besides exploits those tools might cause additional threat (e.G. RDP-
VNC-, SSH-Cl
Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com:
feature. I use to make menu shortcuts to launch programs in dispvms inheriting
firewall rules. But xfce only lets you edit already existing rules, not
create new ones :( editing a config file is a little too much effort for me
lol.
However I would not use the "move to VM" command like this, as I
experienced those requests getting lost One time files were
actually deleted, since that time I always use copy instead of
move.
Sounds troubling. Do you remember the last Qubes release version
where you experienced this kind of d
Currently your easiest option is not to click on the links, but to
copy-paste them to an open dispVM. Small sacrifice for a major
security gain.
Well, the "easiest" option is to use a net-vm directly. What is the
security gain? Its a dispVM after all.
--
You received this message because y
Am 10/13/2016 um 04:12 PM schrieb Manuel Amador (Rudd-O):
On 10/11/2016 09:42 AM, Robert Mittendorf wrote:
Hey folks,
sometimes the sys-firewall (more likely a service within it) crashes
and does no longer allow connected VMs to resolve DNS.
The ProxyVM must be the responsible entity, because
Am 10/16/2016 um 12:59 AM schrieb raahe...@gmail.com:
On Saturday, October 15, 2016 at 6:05:39 PM UTC-4, aldenj...@gmail.com wrote:
I have the same issue!
see if you can select legacy boot mode in your bios and then install qubes.
I had a similar issue with Qubes 3.2 but not 3.1. For me the iss
Hey folks,
maybe someone did solve my problem before.
I want to allow Thunderbird in MailVM to update extensions. That is easy
for non-AMO[1] extensions, but AMO uses a lot of IPs for load-balancing,
availability and performance. Any idea of how to allow AMO-based
extension updates?
[1]AMO
Am 10/11/2016 um 08:05 PM schrieb Unman:
qvm-prefs -s internal True
Simple as that ? - thank you!
I checked the config files and did not find the "internal" switch
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
The data copied to that VM (i.e. the pdf file or whatever you opened)
must be considered leaked if the VM gets compromised via e.g. drive-by
exploits.
Agreed, it's limited to that data, but nevertheless an unexpected
potential impact. And depending on your data it can be critical.
Well, that i
Hello fellow Qubes users,
today I have a few questions about the GUI handling in Qubes. I use
Qubes 3.2 with Xfce desktop dom0.
1) If a window that already exists is set to active, it is not shown on
top. Example: I open up a programm that is alrady running and that
starts only a single inst
Am 10/25/2016 um 09:05 AM schrieb Andrew David Wong:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-24 23:48, pixel fairy wrote:
can the a usbvm be used to detect malicious usb devices? has anyone tried this?
Sure, you can run whatever kind of detection software you like in a USB
What would be the advantage of a Ubuntu-template compared to the Debian
template?
(No offense, I'm just curious)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Am 10/25/2016 um 04:15 PM schrieb Vít Šesták:
I don't think that a USB drive can directly record keystrokes. The
communication goes in the opposite direction that the USB drive would need.
A malicious USB drive can also listen the data going to other USB devices on
the same controller. You can
After updating Qubes tool, basically all relavant devices have issues.
Qubes Video, Xen Interface, Xen PV Storage, Xen PV Network.
Config in registry incomplete or broken (Code 19)
The repair option of the QWT uninstaller does not solve the issue as well.
Any idea? Otherwise I think I'm stuck
You can enable full screen mode, in that mode browser fullscreen works.
The video tends to be flickering, I think because of missing hardware
acceleration.
However other applications like RDP cause problems in fullscreen mode.
In that case you cannot switch to another window without disconnect
Windows problems may have a lot of reasons.
Sometimes after a failed boot windows wants to start "boot help" (or
whatever its called in English) and defaults to use it. As you do not
see this selection in Qubes (only if you enable debug mode) it boots
into that mode and Qubes is tuck at yellow
Just saw the Qubes VPN project right now.
Quick-reading the tutorial I have to questions:
1) why does the VPN-VM need to be allowed to do DNS, if DNS requests are
routed through the VPN. Is it just in case the VPN server it wants to
connect to is defined by hostname instead of IP?
2) why is th
Am 10/27/2016 um 02:28 PM schrieb Manuel Amador (Rudd-O):
On 10/27/2016 04:34 AM, Andrew David Wong wrote:
Building on what Chris said, here are your general options, from best
to worst:
[...]
2. Make sure the data is encrypted before it ever touches the storage
medium (then wipe the encryptio
How long did you wait?
btw: "installed windows tools" is missleading. I guess you downloaded
the QWT to dom0, as you did not even install windows before step 1.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
Hey,
yesterday I noticed that even if VMs share a class C network, all trafic
is routed through the gateway and by default the gateway does not allow
a connection to other VMs in the same subnet.
This makes a lot of sense from a security perspective, but the shown
information is missleading.
Try to install KB3020369 first and then KB3020369 (May 2016 Rollup
Update). That worked for us.
Searching for updates is reasonably fast now on our Qubes Win HVMs
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
I just copied a file from dom0 to a AppVM via qvm-copy-to-vm.
The file transfer started until the private storage was full.
It would be better to check the free disk space size before executing
the copy command.
regards,
Robert
--
You received this message because you are subscribed to the Googl
On 2016-11-11 14:58, Marek Marczykowski-Górecki wrote:
>
> >> Actually I don't think it is a good idea. File copy protocol is
> >> intentionally very simple, including being unidirectional. We don't
> want
> >> to add any non-essential features there, to keep it as simple as
> >> possible.
>
> > BT
> It isn't the TOOL here that will "waste people's time". They waste
> their own time by not checking beforehand.
Why should a user always check the free disk space, if a tool can easily
do it? That's wasting time as well. Especially in the Qubes environment,
where you are easily handling tens of
Am 11/14/2016 um 04:31 PM schrieb xxthatnavygu...@gmail.com:
> On Monday, December 21, 2015 at 10:30:49 PM UTC-6, Alex Guzman wrote:
>> Installed Qubes with no (noticable) issues.
>>
>> Attempted EFI boot fails -- I disabled the quiet flags and it seems to hang
>> after loading Linux (the last lin
Am 11/17/2016 um 01:18 PM schrieb kotot...@gmail.com:
> Is there a bug somewhere in the kernel, in Xen or Qubes which prevent them to
> properly use this BIOS power management system correctly?
>
> Have other users experience something similar?
Thanks for sharing. Maybe power management does only
As mentioned here:
https://www.qubes-os.org/doc/templates/fedora-minimal/
I installed:
NetworkManager NetworkManager-wifi network-manager-applet wireless-tools
dbus-x11 dejavu-sans-fonts tinyproxy
to the minimal template to use it for a NetVM (WiFi)
The NetworkManager icon appears and lists avai
Am 12/01/2016 um 11:07 PM schrieb Andrew David Wong:
> Are you sure it's a missing package? I pretty sure I installed only those
> packages and haven't run into that issue.
>
> Does it work correctly if you try switching to the full template?
>
>
As said before using the full template in the same V
I solved the problem using
dnf install notification-daemon gnome-keyring
without this it is not possible to store credentials for a new network
or change existing ones.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this gr
52 matches
Mail list logo