suggested, it is
not panacea. And it can also lower security if attacker uses a covert channel.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails fr
r attacks. They rather want to detect (and remedy from) accidental
failures. No matter how much those goals might look similar, they are in many
ways different.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users&qu
sniffing etc.)
Maybe none of those concerns is a thread for you, but you have been warned.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving ema
considering it.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post
is is statistically significant. On
the other hand, there are also some Debian-specific vulnerabilities. For
example, recent APT vulnerability or not-so-recent vulnerable SSH keys due to
some Debian-specific tuning. This does not suggest that Debian is less secure,
this suggests it is not so clear.
Regards
nd sudo find / -xdev -iname '*qubesc*' in dom0.) Where they are?
* Command `yum list` never shows 3.0.* for Qubes packages, with few exceptions
for templates and Windows tools.
It this result correct?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are
ate
> to manage in-VM configuration.
OK, thanks. I haven't found it mentioned anywhere, so I thought it might be
some half-done upgrade.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsu
For those who are interested in this:
* I've replaced the kwin --reload hack with dbus-launch kwin.
* Patch for 3.2 not decorating windows:
https://groups.google.com/forum/#!topic/qubes-devel/TCUsdyevoxI
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
many ways. At least unless a very restrictive (non-default) policy
is applied.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it
Qubes 3.2, essentially the same situation. Plus I am concerned also about dom0
USB, because I have external keyboard and touchpad.
Since there are similar issues in dom0, which is more close to bare metal than
domUs, I suspect that those are issues would not be mitigated by calling
standard sus
On Sunday, September 11, 2016 at 8:17:54 PM UTC+2, Vít Šesták wrote:
> In dom0, I've created /usr/lib64/pm-utils/sleep.d/53usb file and registered
> it in /usr/lib/systemd/system/qubes-suspend.service
Oops, forgot to include link to the files:
https://gist.gith
On Sunday, September 11, 2016 at 8:52:36 PM UTC+2, Marek Marczykowski-Górecki
wrote:
> In fact those modules (besides USBIP) should be blacklisted by default.
> Take a look at /etc/qubes-suspend-module-blacklist. Maybe it doesn't
> work for some reason? Or the file wasn't updated (and the new on i
On Sunday, September 11, 2016 at 9:54:42 PM UTC+2, Marek Marczykowski-Górecki
wrote:
> AFAIR only *_pci modules are talking to the hardware, so removing them
> should be enough. Can you check if your approach still works with only
> *_pci?
Got it, partially. The /usr/lib/qubes/prepare-suspend scr
t to
keyboards (e.g. NumLock/CapsLock/ScrollLock state, which is usually not much
interesting), but not keys. (It can forge keystrokes, though.) Is this correct?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users&
On Sunday, September 11, 2016 at 11:13:51 PM UTC+2, Marek Marczykowski-Górecki
wrote:
> Interesting. Any errors in journalctl?
Nothing interesting found there.
But... Today, I started having a similar issue with NetVM. It does not start
NetrowkManager after resume. It looks like the script is j
Thank you for pointing in the right direction. It was my fault in the script
for dom0. It failed in some way, causing other scripts not being called. I am
sorry for that. Now, I have a quick fix, but I should make it more robust.
On the keyboard: I had an idea about authenticated USB keyboard pr
This one might be the best reason for Wayland in Qubes, provided that Wayland
is better.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@
Attacker can use either a vulnerability in the card (if they know a suitable
one), regardless it is Ethernet or wlan, or they also might try to exploit a
legitimate feature. However, if you have VT-d supported by your CPU,
motherboard and BIOS, you should be safe against such attacks.
When Qube
Well, the points you have mentioned are also dubious for mainstream Linux
environment, not only for Qubes, because they suppose a malicious app already
installed in the system.
Other point are, however, accidental interferences with lockscreen. For
example, I sometimes see Thunderbird popup on
4. It depends if you just disable Wi-Fi, or if you don't have the hardware.
Removing wireless radio, microphone and camera might be hard on laptops, so it
depends on hardware you have. I wanted to note that staying anonymous with
whole physical (or even a virtual) machine compromised might be ha
Why is it not planned to support in-place upgrade? Is it harder than usual?
(I don't care so much this time, though, because I expect Qubes 4 To be
released before my current laptop's EOL, so I'll probably switch hardware with
this upgrade. As a result, I am unlikely to use in-place upgrade this
about it in advance:
https://github.com/QubesOS/qubes-issues/issues/8127#issuecomment-1791105502
Is there any other pitfall?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
I've found a related thread on Qubes OS forum:
https://forum.qubes-os.org/t/if-i-change-my-motherboard/11346
On Thursday, November 9, 2023 at 4:48:45 PM UTC+1 Vít Šesták wrote:
> Hello,
> I'd like to change my motherboard (for a different model), while keeping
> other c
Hello,
Qubes OS used to allow me to show startup console by pressing escape.
After a recent upgrade, Qubes shows nothing there. Is it intentional? Can I
reenable it?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-u
is not removed. I don't think
there is a corruption of the SHM, as some similar situation happened on OOM
kill. So maybe it is just about some final cleaning missing there. Do you
have some further idea?
Regards,
Vít Šesták 'v6ak'
*) Well, I hit a kind of antiheisenbug. GUID doe
runnng VMs also hang indefinitely and cannot even respond to qvm-run -p
vm-name ls.
V6
On Thursday, August 22, 2019 at 3:08:41 PM UTC+2, David Hobach wrote:
>
> On 8/21/19 11:59 PM, Vít Šesták wrote:
> > Hello,
> > sometimes, Intel driver makes my X11 crash (see X11-crash.l
plate.
Regards,
Vít Šesták 'v6ak'
*) Well, it can improve security by making administration easier. Without
that, it would be easy to make some infrequently-used VM outdated. When you
would start the VM after some time, you would risk various attacks sooner
or lated.
--
You receiv
when reading. So,
some quick reboot can help there, BIOS should do the rest, at least in
theory.
Regards,
Vít Šesták 'v6ak'
On Friday, May 17, 2019 at 9:55:08 PM UTC+2, Daniil Travnikov wrote:
>
> Did anyone use software like Punic Button?
>
> I mean for example you need to turn
g*.
I have tried running debuginfo-install kernel-4.19.79-1.pvops.qubes.x86_64,
but it uses DNF/YUM internally, so it cannot work.
Is there any way to get kernel debug symbols in dom0?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Grou
I was able to find.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
the BIOS contains a newer microcode.)
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googl
While comparing Qubes 4 to Fedora 25 might be tempting, it is not similar as it
might seem. Qubes 4 is based on Fedora 25, but some parts including kernel are
independent. So, seeing different kernel-related behavior in Fedora 25 and
Qubes 4 is definitely not a surprise.
Regards,
Vít Šesták
elict from the last run, can it?
Other TemplateVMs work correctly.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
-root'
How can I do that?
Regards,
Vít Šesták 'v6ak'
On Wednesday, January 22, 2020 at 1:43:00 PM UTC+1, Vít Šesták wrote:
>
> Hello,
> I have done this:
>
> 1. Started a template VM update.
> 2. It seems to have run out of space during the update.
> 3. I extended the
-root'
How can I do that?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.co
Thank you! This has allowed me to mount the volume to a DVM, which has
allowed me to fix the issue. Just running fsck in the DVM was enough to fix
the issue.
Maybe I should create an issue (or find an existing one) for that.
Regards,
Vít Šesták 'v6ak'
--
You received this message b
, since I don't have
Internet connection on this laptop. I probably could transfer updates from
the other laptop, but I don't think this would make a difference.
* Use Debian. Due to the kernel version, it does not seem to be worth
trying.
Any ideas?
Regards,
Vít Šesták 'v
Šesták 'v6ak'
On Wednesday, March 18, 2020 at 8:46:31 PM UTC+1, Vít Šesták wrote:
>
> Hello,
> on a new laptop, I am trying to setup Qubes OS 4.0. I have installed the
> latest point release (i.e., 4.0.3). I have bunch of issues, the most
> important one is that I cannot
Well, maybe it would be better to just compile some newer StubDom.
Also, I have realized that there is some similar discussion on Github:
https://github.com/QubesOS/qubes-issues/issues/5615
Regards,
Vít Šesták 'v6ak'
On Thursday, March 19, 2020 at 10:42:00 PM UTC+1, Ilpo Järvinen wro
o, it depends on how you use it.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googl
The problem with Zoom is probably that it opens a transparent overlay, likely
because of annotations. However, Qubes OS does not support transparency. There
is a workaround that hides the overlay:
xdotool selectwindow windowunmap
Regards,
Vít Šesták 'v6ak'
--
You received th
long term.
I am not sure where to find any relevant log. Maybe journalctl, but I have
seen nothing suspicious there.
Do you have any idea about the cause, solution or even a suggestion for
debugging?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscri
g. And maybe it could have been written without
flags. The script just ignores VMs with the first flag being “0” (maybe in
order to ignore dom0) and the second flag being “r” (probably not needed
with --running).
Regards,
Vít Šesták 'v6ak'
On Monday, January 4, 2021 at 11:51:23 PM
heory.
On OCR: I am not sure how could it help. Maybe it could limit the character
set and let you review the copied text. Cool, but I believe this can be
done in some much easier ways…
@stevenlc: Nation State Adversary has a good acronym…
Vít Šesták 'v6ak'
On Wednesday, January 6,
reading of the battery status.
BTW, if you have ~25% CPU load, I guess you just have quad-core CPU (or
maybe dual-core with hyperthreading).
Regards,
Vít Šesták 'v6ak'
On Wednesday, January 6, 2021 at 11:34:42 AM UTC+1 Jarrah wrote:
> This is some really nice tracing work. I'
tatus – currently, it is disabled and discouraged. I might decide
to reimplement this, but I am not 100% sure right now.
Regards,
Vít Šesták 'v6ak'
On Friday, January 15, 2021 at 5:40:38 PM UTC+1 David Hobach wrote:
> Hi Vit,
>
> > * I have many VMs in my computer.
> &g
Although my implementation is not fully complete, I have decided to share
my progress: https://github.com/v6ak/qubes-i3status-dir
It is available under a WTFPL-like license.
Regards,
Vít Šesták 'v6ak'
On Monday, January 18, 2021 at 2:39:09 PM UTC+1 Vít Šesták wrote:
> BTW, I
Hello,
I'm posting HCL report for my computer with this ASRock B550 Phantom Gaming
4/ac and Ryzen 7 5800X. I've few comments:
* You need to configure the MoBo, most notably to enable the IOMMU.
* The installer 4.0.4 boot shows blank screen after "Xen is relinquishing
VGA console" or something si
--
So, this does not look like a GPU issue. It does not write any message
after resume. (Well, even few messages before finishing suspend are
missing, but they might be just not written to the log...)
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Go
://gcc.gnu.org/bugzilla/show_bug.cgi?id=94087
On Friday, March 5, 2021 at 11:13:59 PM UTC+1 sv...@svensemmler.org wrote:
> On 3/5/21 2:59 PM, Vít Šesták wrote:
> > I'm posting HCL report for my computer with this ASRock B550 Phantom
> > Gaming 4/ac and Ryzen 7 5800X.
>
> Hi V
ago on Sat Mar 6 16:25:06 2021.
Dependencies resolved.
Nothing to do.
Complete!
5. Since this seems to be related to a CPU instruction which seems to be
affected by microcode/BIOS, I've decided to update the BIOS. Which seems to
have been the way to go, see above.
Regards,
Vít Šesták 'v6a
I guess that the xfreerdp just creates a window that is large enough and
positioned in a way that hides the window borders. However, Qubes OS AFAIK
does not allow the positioning for security reasons. However, you can do
this yourself. It depends on your desktop environment and configuration,
t
stallable packages)
Regards,
Vít Šesták 'v6ak'
On Friday, March 19, 2021 at 11:40:02 AM UTC+1 a...@qubes-os.org wrote:
> Dear Qubes Community,
>
> We have just published Qubes Security Bulletin (QSB) 067: Multiple RPM
> vulnerabilities. The text of this QSB is reproduce
It seems to have been fixed now. The dom0 updates have passed. The DomU
Fedora updates have succeeded with updating the macros.qubes file, which is
supposingly the workaround by Qubes team.
Regards,
Vít Šesták 'v6ak'
On Friday, March 19, 2021 at 1:59:48 PM UTC+1 a...@qubes-os.org wr
t, i.e. when I don't quote
selectively.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubs
Wi-Fi needs drivers and microcode. This might be source of some troubles.
Have you tried non-minimal template or Fedora template?
v6ak
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
issues with Wi-Fi in a minimal template (not sure if Debian
or Fedora). Finally, I concluded it was not worth the hassle. This is the
reason why I suggest trying some other template, even if it is not the
preferred solution in long-term.
Regards,
Vít Šesták 'v6ak'
--
You received th
ways-on-top and fullscreen, from dom0 perspective, you might want it
hidden. Both is possible. I can share scripts for that. Some manual work is
still needed, but they can be useful.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
u assign all USB
devices in the USB controller to the qube. Qubes 4.1 will probably also
implement USB passthrough even for Windows, though.
b. If it is Linux-based, what interface do you want it to be accessible
from?
Regards,
Vít Šesták 'v6ak'
--
You received this message because
/ssh_known_hosts
* /etc/ssh/ssh_config.d/something.conf allows you to configure SSH client,
e.g., RevokedHostKeys.
* /etc/xdg/xfce4/terminal/terminalrc for XFCE4 Terminal settings
* /usr/share/geany/geany.conf
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscri
I have several ways:
a. Google
b. ChatGPT, e.g. “Can I configure XFCE Terminal for all users?” (real
example copied from my history)
c. Try to find a file with the same name (maybe without initial dot) in
/usr, /etc, etc. Something like this: sudo find / -xdev -name zshrc
Regards,
Vít Šesták
omeplatform-qt5/README.md
/usr/lib64/libQt5Gui.so.5.15.9
/usr/lib64/libQt6Gui.so.6.4.3
2. Look in the binary:
strings /usr/lib64/libQt6Gui.so.6.4.3 | grep '^QT_'
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qube
t the
way to look for that is the same.
Regards,
Vít Šesták 'v6ak'
On Thursday, May 4, 2023 at 2:31:52 PM UTC+2 Qubes wrote:
> > Vít Šesták wrote:
> > Perhaps my search terms are just out of whack, but I have had a good
> > look around and I cannot find a system wide
y for each
running domU qube. But this looks like a temporary issue, as QRPc seems to
continue working, either for newly launched qubes and for qubes launched
before update.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
&qu
So, you have found an ancient UNIX command to be useful for fuzzy testing: cat.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegrou
mount root from there. But I wonder why it does not work
straightforwardly.
Regards,
Vít Šesták 'v6ak'
*) Have you tried Googling for “anaconda rescue”? ;)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
Since Qubes 4.0.1 was released [1] before your message and before the DSA [2],
I assume it is not a good idea to install Debian and Whonix from the 4.0.1
installation media, is it?
If it is right, then I suggest adding a note on the download page [3] until
4.0.2 release.
Regards,
Vít Šesták
On February 14, 2019 6:18:47 PM GMT+01:00, "Marek Marczykowski-Górecki" wrote:
>On Thu, Feb 14, 2019 at 05:58:09PM +0100, Vít Šesták wrote:
>> When I update dom0 and then Debian/Whonix without restarting the Qube
>Manager or Update “widget”*, is it enough? Or I need to restar
to make a TemplateVM. Just use the private disk image
(which is typically /rw) for /data.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it
Why? I suggest having updates as automated as possible – for security reasons.
It allows you to have all the latest security updates as soon as possible.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" g
them…
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
Hello,
I have tried to boot Fedora 29 Silverblue in a HVM from the official ISO. I
have noticed that there is some kernel panic before the HVM shuts down. The
problem is that I cannot read it. Is there any way to read it, e.g., by
disabling the automatic reboot somehow?
Regards,
Vít Šesták
,
Vít Šesták 'v6ak'
On March 18, 2019 2:00:48 AM GMT+01:00, "Marek Marczykowski-Górecki"
wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA256
>
>On Sun, Mar 17, 2019 at 04:02:31PM -0700, Vít Šesták wrote:
>> Hello,
>> I have tried to boot Fedora 29 S
In some cases, Alt+Win+Tab is not handled by dom0 (at least with Kwin) and the
remote VM handles it as Alt+Tab (AFAIR at least Windows and Unity).
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
pport=1 rhgb quiet rd.qubes.hide_all_usb
plymouth.ignore-serial-consoles
$ uname -r
4.19.43-1.pvops.qubes.x86_64
Do you have any idea what to do with it?
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
T
reason.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
, we
will probably see a Github comment.)
If you are supereager, you can compile it yourself 😉
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving ema
I have forgotten to send the mail to qubes-users…
On Sun, Mar 7, 2021, 08:43 Prof. Dr. Michael Schefczyk wrote:
> Dear Vít Šesták,
>
>
>
> Thank you very much! Indeed, fullscreen is possible with and without the
> allow_fullscreen setting. Unfortunately, there seems to be n
Well, in order to use the back from my first post, don't use the actual
fullscreen.
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails f
201 - 279 of 279 matches
Mail list logo