-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06/07/2016 07:48 AM, Achim Patzner wrote:
> Am 31.05.2016 um 10:04 schrieb Zrubi:
>
>> I would install tcpdump in every VM, then you can dump traffic
>> at several point in your internal network.
>
> If you d
viding hashes for their firmware. Others may not even care about
such thing...
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXVX6tAAoJEC3TtYFBiXSv9CkQALCwk/aBqpuu9zHatqJzUFn+
3byLbx5Gu1wNEE8cna8huJdatU5Uo7V8pRmBzIFHmjqER7HavDjS
her NetvM, and assign the "free" network device
You can read more about these:
http://blog.invisiblethings.org/2011/09/28/playing-with-qubes-networking
- -for-fun.html
- --
Laszlo Zrubecz
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version
bes will
see you 2nd HDD.
Using the 2nd HDD under Qubes is another question, you may find
discussions about that topic on the mailing lists.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXWmz+AAoJEC3TtYFBiXSvECcQAJlwPqekYm/IPzm5uaXmXof7
HeAsMhaq8pHdXheyHpmZ2cXt
e plan with this?
> you can give me a more detailed hint on what to update?
I guess --help still work, but attached the output just in case :)
But in general the -s option is added for detailed support file
generation. By default (if no VM name given as a parameter) output
file is generated in dom0.
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06/16/2016 10:38 AM, stefan.goenit...@gmail.com wrote:
> So you think any encryption will fail, when you spend enough time &
> material?
https://xkcd.com/538/
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version
c/dnf/dnf.conf
You will find the qubes proxy related line, comment out that line, and
the update will be successful.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXbE+JAAoJEC3TtYFBiXSvl+IP/iL4KkBq5/liHyKfS0KlTcCv
8PsiLfIZ901cWDk/oTZXtUMO0IPhdx4Jm0RYYe4TOqNGyDm5r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06/11/2016 04:35 PM, J. Eppler wrote:
> Hello,
>
> what would you change or add to the Qubes Cheatsheet?
You should update the qubes-hcl-report entry according to --help
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version:
hcl-report should collect all available info from a laptop.
Not sure what version was included in the Live image, check the --help
and be sure to generate (and gather) support files as well.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXhdmJAAoJE
ms a poor
> motivation for me.
I'm playing games - while interested in strong security.
That's why I using Qubes on my laptop and running windows (as a gaming
platform) on my "gamer" desktop :)
But I would never ever mix the two. Not even with dual boot.
- --
Zrubi
-BEGIN PGP SIGNATURE-
TE machin
e)
This is an open source desktops solution. If ANY would care about
running windows under Qubes for real, why not managed to get a team of
programmers to make that work??
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJX
e for such
OS ;)
Most of those are unable to run on a template based windows because
placing it's shit all over the system, including registry -> they will
not survive a reboot and/or messing up everything.
Only the real "portable" apps are compatible.
Ohh, and I'm just a hapy
t are just pure hardware data. Without
user experience it is useless.
> Qubes web: *. A sctipt on qubes.org updates some HCL html in
> predefined format
Here is the current workflow as i did it before:
https://groups.google.com/d/msg/qubes-users/RagFsGlhPTY/HXyRCQOUBQAJ
See that old thread
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 02/22/2017 06:32 AM, Oleg Artemiev wrote:
> On Tue, Feb 21, 2017 at 3:34 AM, Zrubi <m...@zrubi.hu> wrote:
>> Of course you can still decide to not share those - it is up to
>> you.
> Yes, I still do - see 'my reasons' b
re memory?
there is no such thing as too much RAM. :)
I'm using ~12 online VMs and usually hitting memory limits of my 8Gb.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJYrW4gAAoJEH7adOMCkunmDooP/RVipZoCy6sIaYxMH83Cuz4V
HLVZjYPRxss
00Mb initial 512Mb max memory.
the remaining ~6 AppVMs are starting with 512Mb to 2048Mb max.
Of course all depend on what you are suing in those VM's. But I
usually have at least 1 browser +terminals +mail clients open.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
in Qubes.
Of course you can still decide to not share those - it is up to you.
I just wanted to make it clear to avoid confusion.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJYq/udAAoJEH7adOMCkunmJscP/3dk1W+v+hwen9YWGVrbK/kC
Xuy8OZqE+bbYVG3p8LMFvBW1BdaMbW
On 09/13/2016 08:44 AM, Zrubi wrote:
> Multiple (2 external +the internal) display support seems to be broken
> starting by Qubes 3.2rc*
>
> * display settings are not saved.
> - under KDE it is saved somehow, but have to be disable composition
> for stable operation. But sti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 09/13/2016 11:55 PM, georgewalke...@gmail.com wrote:
> I just installed 3.2-rc3 on a Thinkpad T460s and it's great...but
> the NetworkManager widget is gone.
It is a known bug:
https://github.com/QubesOS/qubes-issues/issues/2293
- --
(under KDE4) to
get bug free multidisplay support - but at least that was WORKING.
It is only me or a general problem?
is there ANY workaround for those problems?
Thanks.
- --
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To u
hed
external display. So every time I have to remove my laptop from the
docking station I lost my screen settings what i really can't tolerate
at work.
(I was using the same setup with a Dell 6430 with Qubes 2.0 then 3.1
before - without such problems)
- --
Zrubi
--
You received this mess
ted against DMA attacks,
however most of the VM's are not even affected by DMA attacks, only the
ones having PCI device assigned.
(sys-net and sys-usb by default)
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To uns
from package
python3-libs-3.4.3-12.fc23.x86_64
Was not able to workaround it, because(?) those libs are used by dnf
itself :o
The official fedora upgrade way:
https://fedoraproject.org/wiki/DNF_system_upgrade
seems not compatible with Qubes
any hints how to solve this?
Thanks.
--
Zrubi
-
On 11/04/2016 10:06 AM, Zrubi wrote:
> Just found out that some test during an 'accurate' (long) calibration
> process do want to modify (apply the half baked profile) driver settings
> and checking the results, then make modification and checking it again.
> Doing this till find the
-os.org/doc/secondary-storage/
https://www.qubes-os.org/doc/encryption-config/
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users
in general it would be more convenient to just let colord do it's work.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr
om0 release - whatever
it is based on.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To p
can it say?
If you 100% sure that this is a false positive, then we should address
this issue for sure.
However I can't see how we can check if IOMMU is really working? Maybe
we can try DMA attack PoC script and try to break out from a netvm for
example?
(of course not as part of the hcl report :)
ion:
Windows is not designed to be run as a template based VM.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@goo
On 10/28/2016 01:19 PM, Zrubi wrote:
> On 09/03/2016 12:49 AM, Connor Page wrote:
>> I have calibrated my yellow screen using argyllcms.
>> I don't attach usb devices to dom0 so installed it in sys-usb as well.
>> used
>> https://encrypted.pcode.nl/blog/2013/11
e to make it work without plugging
the calibration device to dom0. - but let me know if you have any idea.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
On 11/03/2016 12:01 PM, Zrubi wrote:
> The current issue is to create a profile without attaching the
> calibration device to dom0.
> Even the profile creating is tricky because those calibration software
> may try to apply the result but at lest needs to create an app wi
round for this:
- Qubes copy from my vault
- Qubes paste it to the dest AppVM
- insert it to a simple terminal/gedit whatever
- copy it again from there
- paste it to the RDP session.
Really annoying - but do not have time and motivation to reveal the
problem behind.
--
Zrubi
--
You receiv
d this way - thanks.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this gro
On 10/28/2016 10:06 AM, Zrubi wrote:
> On 10/27/2016 03:31 PM, Marek Marczykowski-Górecki wrote:
>
>> I haven't tried recently, but it worked before. Maybe a workaround would
>> be to disable "updates" repository for the upgrade time? Just add
>> --disablerepo
template is working fine. I'm using it for a while for
production.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@google
don't want to be mean, but it's like we have our own Ken M in this
> mailing list, and it is Drew.
Yes, He is really annoying.
I just ignoring all the posts from him (and maybe whole threads) for a
while. Not easy for me - but nothing you can do about such issues.
--
Zrubi
--
You received
isible
effect, easy to forget.
- the /etc/yum.repos.d/qubes-r3.repo file hardcoded to Qubes versions,
and the upgrade not overwriting it if you made any change (enable more
repos for example)
- the short upgrade path (You discribed before) is working fine :)
Thanks for the fast response :)
--
ease describe in more details what and how you achieved?
Thanks.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubsc
- currently implementable - way to use a proxy VM (as it is
currently used as a dnf/yum proxy) and install your desired intrusion
detection software there.
Suricata is a good candidate for such thing:
https://suricata-ids.org/
(I would just need more time and more RAM to play with such things ;
and run the calibration there. The software is running fine, however
applying the resulted (or any other pre definde/test) profile seems not
working as expected. (no effect seen)
Work in progress in this part
--
Zrubi
--
You received this message because you are subscribed to the Google Gro
the apps I ever needed.
Devel VMs : Fedora, with development focused things.
Work : Fedora with work related apps.
Still thinking of merging the Devel one with my regular template because
of the update overhead.
--
Zrubi
--
You received this message because you are subscribed to the Google Group
> Regular.
In my case the work VM contains real work related apps that is only for
internal use, coming from an internal repo. So it is no way to mix with
any of my other templates.
--
Zrubi
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
dnf/dnf.conf in your template, and
comment out the qubes proxy line.
Of course this will disable the original "template protection" where
you can only reach the updates proxy.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJY23AqAAoJEH7adOMCkunmBJMP/RL0i7xF/tY
gh free time :(
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJY7e5NAAoJEH7adOMCkunmtEIP/1KGn93gd3WdfC1on3+//f4e
/ht1q6yVosHXypBT0WpRLrdWWEy+oBRfiMTbxq9xi/1CIwvMIcvOZHj0+rb+XHnZ
3j8qmmUFQQtVqyazlJuyJZYiDU1DFQl+CEA1NP/31TWNsv5bClH3jTgks68D8dr5
eUQml9KZBIgMTUfuwAJh3
ew pc and
> this is already a big problem...
>
It can be a keyboard layout problem, if you not using the default US
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJY7yp7AAoJEH7adOMCkunmo7MP/jIsvK3g9Ltl82ix/md9bJ2p
yG79shhf5hbAfhueEKvBPssPrGOhlHY
y general template (which I do
> not want ) or create a dedicated template just for the app vm that
> is supposed to run that app ... is that correct?
Yes, this is the two way I know.
Moreover the best is to not use it at all, if you not trust that app ;)
- --
Zrubi
-BEGIN PGP SIGNATURE-
the HCL script is pretty easy to read. You can check how it is decide
vt-d support.
it is actually relaying on xen, and parsing the output of these commands
:
xl info
xl dmesd
If you believe it is a false report, send us the support files as well
for further investigation.
- --
Zrubi
-
atasheet.pdf
So Xen (and qubes HCL script) reports about vt-d is seems to be true :)
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJYwQ2HAAoJEH7adOMCkunmJfMP/3y5Em90X88vXVA3LvQ7GnQy
SQ9ORhyB9Q5g8G5Q5zos8lZg8qjUb3o2fNCWJwtBKn/Bx9XXH
Vidia VGA and want to use it under Qubes -
accepting the risks for a better battery life. Or if that single card
is a new (1000 series) one, because that is not even supported by the
open source drivers.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJYvoSpAA
screen is just ugly. I know that this is not the
first priority, and not even a technical issue. But new users will see
that ugly thing first. So it's should be a Qubes skinned one. at least.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZgEjuAAoJEH7adOMCkunmiz8QAIESj31RZi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/01/2017 01:02 PM, Marek Marczykowski-Górecki wrote:
> On Tue, Aug 01, 2017 at 11:25:11AM +0200, Zrubi wrote:
>> - The isntall process is really long. Not debugged jet but
>> the creating initramfs seems to be running foreve
ices tray icon coming from dom0 is
invisible too.
I know that nobody cares about KDE related bugs.
This is just a status report, to save hours for other users try to use
KDE :)
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZhErQAAoJEH7adOMCkunmFGcQAJ+
ts."
>
> Am I doing something wrong?
No, you are right.
Seems we just lost that group somewhere...
@Marek do you have any idea about what happened?
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZeD9JAAoJEH7adOMCkunmr9cP/0mraqhevxTisjaolny9Uqam
After changing the kernel, you need to regenerate DispVM
savefile.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZVKz/AAoJEH7adOMCkunmqjgP/0mTXBtVPu+5aKUBp8PeK+Uu
qDopO/xn1r9gacDaddXQjoB8GYZwtM6W7Idr11AlvKaNVytbDJquZNY+EK
I give only:
- - 300Mb to net VMs
- - 300-512 to firewall VM's
and all are running fine.
The AppVMs are fine with 2048Mb - but surely depends on the apps you
want to start. (for example my USB VM are happy with only 512Mb of RAM)
- --
Zrubi
-BEGIN PGP SIGNATURE-
Versi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/04/2016 10:35 AM, Zrubi wrote:
> Another - currently implementable - way to use a proxy VM (as it
> is currently used as a dnf/yum proxy) and install your desired
> intrusion detection software there. Suricata is a good
course it will not save disk space unless you free it using:
qvm-trim-template (from dom0)
Now my debian template is much closer to fedora-minimal - while still
booting and working :)
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJY/058AAoJEH7adOMCkunmlTkP/jpnhbBHDzAIqG1bCv
can install and run every Qubes OS release.
Including the latest 4.0-rc1.
All you have to do is disable UEFI boot, and set "legacy boot only" in
BIOS.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZiWc/AAoJEH7adOMCkunm1H4P/1myU3LkL7S93AlTwMYxFqGi
Rn5TeOxSaMS
should be ebale to install/use Qubes 3.2 as well.
As I have this setup too.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZigXfAAoJEH7adOMCkunmMKsP/0ynjy/tGo9eHcnENDijf6ru
0N5oHi2EgDJBzVfLkiWXuADGGpCAiWFw+oXjiHRwvJxM1HdX7fi15nIiIYoU6
ticket to track:
https://github.com/QubesOS/qubes-issues/issues/2969
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZhHB7AAoJEH7adOMCkunmi/YP/RqQnkvTFedQmEI3GC64oebG
OvtHdsfxqOkecdPQyug7qTTImpN6IB3w7WwdoS09FcYq4FepOx08e672JQpMZeaT
nA1jMmgkS/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/04/2017 02:20 PM, Marek Marczykowski-Górecki wrote:
> On Fri, Aug 04, 2017 at 01:12:29PM +0200, Zrubi wrote:
>> Can't see the networking stuff. The most important is (at least
>> for me) the actual NetVM used by a Qube.
>
pull request part.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZFWaVAAoJEH7adOMCkunmwXIP/0UQyl6MHuZ3SS3g8RwD9Keb
B94S5E7dXbadpkr91wJhmvLPg7Zki+hQM3NaLMbYywpoTtS0XNqWm3nqLHOhMPv3
LEUYJ8BmV6nzk0JdDfW0NQ9+XKJ1qS5Vf8W+vzmpwKUHHo2HfZk/
m0 kernel (located in /boot) are both
unencrypted.
This can be the reason using TPM and AEM:
https://blog.invisiblethings.org/2011/09/07/anti-evil-maid.html
https://www.qubes-os.org/doc/anti-evil-maid/
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGB
preliminary_hw_support=0
> I've seen some graphics issues (different than yours) on
> Broadwell-based hardware, on 4.9 kernel. Adding iommu=no-igfx to
> Xen cmdline helped. See here:
> https://github.com/QubesOS/qubes-issues/issues/2836
Thanks, will try both xen and the mention
-paste operation :)
Feel free to use this article - as a whole, or parts
of it, or any derived work - for the Qubes Documentation Project.
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZHr9aAAoJEH7adOMCkunmHLMQAIZ/eOZRetYdwCLN50cU50XE
st simple and reliable one:
https://www.netbsd.org/~martin/rawrite32/download.html
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJZQoUGAAoJEH7adOMCkunmD8sP/2g7w5799vrMfTOwBzOIJF9+
QqYS8A/DjC2hz9q43RvPnJDPbfI7EjgCuk0I7wzxGh4NU+eMfLhOw+q
y, but in the
> meantime, what graphics hardware are you running, Zrubi? And which
> version of 4.4 are you running where things work fine? And finally
> if you can, if it's an Intel card, can you try booting with this
> kernel option to see if it makes a difference?
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06/15/2017 10:02 PM, Reg Tiangha wrote:
> On 06/15/2017 01:53 PM, Zrubi wrote:
>> Maybe it is a know issue, but: online netvm change on a
>> disposable VM is also broken on the latest 4.9 VM kernel. (Qubes
>> Manage
ed up which USB-devices are recognized ('lsusb' in
> sys-net) and tested out which USB-Ports work.
>
> Any idea what is happening with the first Controller?
Probably it is connected to the optional docking station, and it's ports
.
- --
Zrubi
-BEGIN PGP SIGNATUR
d more VRAM to render all your pixels in your
screens. These can be multiplied if you start using multi-monitor setups
.
But these needs are not growing as fast as your conventional RAM needs.
I'm using 3xHD screens, and the 512Mb VRAM used by the int
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/22/2017 10:18 AM, cdgam...@gmail.com wrote:
> Summary: Deal-breaker probably is down to getting VLC working
> properly
>
did you tried to switch video output?
I would start with X11 instead of automatic.
- --
Zrubi
-
to find out which physical USB "connector" attached to
which PCI device. (It is mainboard specific) Then you can decide which
should be remain in dom0.
- - you have to remove the "rd.qubes.hide_all_usb" from the GRUB cmd line.
- --
Zrubi
-BEGIN PGP
r should one also verify that
> the display card meet some kind of minimum specifications (for the
> scenario where we are going to run a LOT of VMs, only limited by
> the available RAM)?
See my note above.
> + How is this different with Qubes 4.x compared to 3
p_actions_specific_for_LUKS
https://unix.stackexchange.com/questions/252672/how-do-i-change-a-luks-p
assword
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJaDViJAAoJEBozWgtUjzdkjEgP/0YJaJx02wCw58jXYDOFf3xY
sa3VASFf9lNtWz3B9JSK8hM+mn4aIh402zS2oGu+OQLaE9oG4H+c2e2oNDwHih
is Ctrl-Shift-c / Ctrl-Shift-v
>
> In a Terminal window, these shortcuts are mapped to normal copy
> paste, rather than inter-vm copy pasting so it doesn't work out of
> the box.
Shift-Insert is the "magic key" you searching for ;)
- --
Zrubi
-BEGIN
elease.
So there is no point to bury it because of a missing feature in the
latest release candidate...
Saying it while I'm also think that removing the Qubes Manager was a
big mistake. Thant new thing in the info bar is buggy and useless in
my use case too.
- --
Zrubi
-BEGIN PGP SIG
in most terminals.
(Of course you can also reassign these defaults according to your needs)
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJaKRC5AAoJEBozWgtUjzdkq8YP/1W4gOsnMrRHwmqaePDFdU2C
+jlMI0fnkm3I+YusGfV3Z2Xj9jgaVatoSz8rNUzvAIt5kpF269frUmNAp9xA6dJr
JbVX7hksOmmnG
no time
to write a new manager for the Qubes 4.x I just shared my use case.
Feel free to ignore them if you don't like 'em ;)
- --
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJaUA23AAoJEBozWgtUjzdkZ9IP/32ydmOQ28Y2DkIMHXU131Gs
Vjk5dnhZ77kAwKA6vDKrfXaCyKA5ut07dSnzPkcunj
to ask your device manufacturer.
As the proper IOMMU support is depends on :
- - CPU
- - motherboard chipset
- - BIOS
all of those are just a "black box" for us.
(I have seen some cheap devices where the BIOS was hiding the
virtualization features intentionally)
- --
Zrubi
--
ll, since
> RC-2.
Asked because I have similar issue (using R3.2), caused by wrong
monitor layout definitions. Means the actual window placed out of the
screen known by the affected VM.
The resolution is to run this script manually from dom0:
qubes-monitor-layout-notify
- --
Zrubi
-BEGIN P
e's any solution other than reinstalling, but
> if anyone has ideas, I'd love to hear it.
Is this issue can be related to multiple monitor setup changes (for
example attaching/detaching external monitors) by any chance?
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEw39Thm3rBIO+xeXXGj
ed method. First though, a location might be ideal
> starting place, where to keep everything updated?
>
> Initial thoughts - A https://www.qubes-os.org/doc/ page listing all
> the unofficial projects. The most simple and easy way.
Have you seen this page:
https://www.qubes-
E/OpenWRT.
and they promise to removing non-free parts.
In my opinion non-free is a legal definition, and there is no direct
relation to security and/or privacy.
If you really care, you may build your own firmware, and then you can
decide what to include...
- --
Zrubi
-BEGIN PGP SIGNATURE-
hing like this often
> replicated when using other hypervisor systems?
VMware using similar solution for handling snapshots, and
non-persistent disk images. VMware VDI also using this for
provisioning new (disposable) desktops.
Don't know about the others.
- --
Zrubi
-BEGIN P
ing the integrated VGA.
in general:
Optimus was never* working under Linux.
nVidia 10xx cards are working only with the binary drivers.
* Back in time, there was a project called: Bumblebee.
But that is dead for ages.
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEw39Thm3r
rewall it will not be able to access
> the network. so if I have a running disposable VMs when net-vm
> needs a restart they will not be able to access the network after
> the restart
>
You probably have hit by several bugs, including this one:
https://github.com/QubesOS/qubes-issues/is
please check your kernels, and report back.
Thanks.
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEw39Thm3rBIO+xeXXGjNaC1SPN2QFAlqyrtoACgkQGjNaC1SP
N2SwQA/+ML/cbUQM8LxwbPaNvUgo2wotTBmK90aKe7oBnCH3HXpYk5odi8Sr9VZ4
h/96rHwg1SAfki0tuau2kwl3Qsmy1CZtLcaeAqwXOI55ASGPZSi3nTBK8y
4.14.12
As I reported here:
https://groups.google.com/d/msgid/qubes-devel/05031ade-b019-986e-e378-32
cc8fff916e%40zrubi.hu
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEw39Thm3rBIO+xeXXGjNaC1SPN2QFAlqZG1UACgkQGjNaC1SP
N2RvbRAAsq5QPJe6U35nmxKvMkQGxEYVN9r3Kl9kncO5y8Btsa9kTFeiYNd7IxcQ
Noc
proxy") is
misleading.
Beside from that it is a good collection of all the possible proxy
settings locations.
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEw39Thm3rBIO+xeXXGjNaC1SPN2QFAlqZGWQACgkQGjNaC1SP
N2QDHA/+KDsuGTavjimlA3nd6W0Wh7zmV7G8E7SFrF/NaY4ntftREKew8wPAR
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
This is the message.
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlvOPMcACgkQVjGlenYH
FQ0lQQ/8Dp3dl+pkiwA109NvJ+n57ZEUh4hxQkSBR/AK5AUT+dontt3dBvdQG8D+
MhrRytCKkx8fZjeU//92Vyx9elE3+VvNX644sFxzzBgUvvJi7+V+K
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 10/22/18 11:10 PM, Zrubi wrote:
> This is the message.
..and a reply.
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlvPAr4ACgkQVjGlenYH
FQ3KCQ//Z9w+6Zw7mlSIEOdJuzbKHk59KYjbEudGUlhvbfqTPtAeRvs1eN/lU
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 10/23/18 1:15 PM, Zrubi wrote:
> On 10/22/18 11:10 PM, Zrubi wrote:
>> This is the message.
>
> ..and a reply.
one more reply.
- --
Zrubi
-BEGIN PGP SIGNATURE-
iQIzBAEBCAAdFiEEmAe1Y2qfQjTIsHwdVjGlenYHFQ0FAlvPBfIACgkQ
Zrubi wrote on Mon, 22 October 2018 21:10
> This is the message.
Forum reply with quote.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-u
Achim Patzner wrote on Fri, 26 October 2018 12:32
> Even with 1&1 being quite cheap: How expensive is it?
I have paid only $12 - with the domain included.
So the first year was a gift :)
The next year would cost more for sure, but we should not
worry about this at least for the next 10 monts ;)
Achim Patzner wrote on Fri, 26 October 2018 12:32
> And then sends out the password for that account by mail
> to the mailing
> list? 8)
Nope :d
It should send it to your mail addres.
But, let's try it:
https://qubes-os.info/index.php?t=reset;
--
You received this message because you are
Achim Patzner wrote on Fri, 26 October 2018 12:32
> How well is it dealing with the endemic "I can earn
> 8000$ an hour by
> selling all my grandmothers and so can you"-type forum
> spam (besides
> having a houskeeping department consisting of more mods
> than users)?
Only registered ussers can
I just wondering If my instructions was not clear about how
to get access to the forum interface?
Or just nobody cares?
I would accept if nobody is interested, but I see a lot of
registration "attempt" in the logs...
--
You received this message because you are subscribed to the Google Groups
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 10/30/18 1:54 PM, 'awokd' via qubes-users wrote:
> Zrubi wrote on 10/30/18 12:02 PM:
>> I just wondering If my instructions was not clear about how to
>> get access to the forum interface? Or just nobody cares?
>>
>>
I would say it is not a problen until the mail gets
delivered :)
But, this is one of the reasons that this is a PoC project:
we well only see - if start testing it.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
1 - 100 of 145 matches
Mail list logo