Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that DO affect the security of Qubes OS
The
Hi!
Actually you won't have much fun with only 8 GB RAM; 16 is probably OK, and 32
or more is nice. Remember that at least four operating systems have to run
(Dom0, net, firewall, app).
Kind regards,
Ulrich
--
You received this message because you are subscribed to the Google Groups
I used
https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/
to setup a dedicated VPN VM with the Mullvad GUI. Has some
idiosyncrasies, but works really not bad. Been using it for a couple
weeks already as a daily drive.
On Sun, 30 Jul 2023 01:30:52 -0700 (PDT)
klem klen wrote:
> I
I should have added. We are on a similar path. I am looking to use the
gui app for Mullvad instead. The app provides access to all the Mullvad
Servers/Nodes all around the world. Has Bridges. Makes it easy to delete
connections, I am allowed five, but use multiple computers and end up
https://forum.qubes-os.org/t/wireguard-vpn-setup/19141
On Saturday, July 29, 2023 at 5:11:58 PM UTC-5 ale...@magenta.de wrote:
> I couldn't find a usable description of how to set up the most secure
> WireGuard configuration on Qubes. I am aiming to create a flexible
> network arrangement with
On 7/29/23 8:48 AM, ales...@magenta.de wrote:
> I am still in the process of configuring Qubes (4.1.1). I am trying now to
> disable Hibernation at all level of the system.
>
> I couldn't find any reference of Hibernation in the official documentation or
> the Wiki. Could someone describe the
I couldn't find a usable description of how to set up the most secure
WireGuard configuration on Qubes. I am aiming to create a flexible
network arrangement with chosen VMs going through WireGuard only and
others through Tor only.
I have tried the information at
I am using a fresh installation of Qubes 4.1.1.
When I use the File Manager Preferences tab there is a message
indicating that GVFS is not available. "Important features including
trash support, removable media and remote location browsing will not work".
I also notice that I cannot use
I am still in the process of configuring Qubes (4.1.1). I am trying now
to disable Hibernation at all level of the system.
I couldn't find any reference of Hibernation in the official
documentation or the Wiki. Could someone describe the way to disable it
universally?
--
You received this
Dear Qubes Community,
We have published [Qubes Security Bulletin 091: Windows PV drivers potentially
compromised](https://github.com/QubesOS/qubes-secpack/blob/main/QSBs/qsb-091-2023.txt).
The text of this QSB and its accompanying cryptographic signatures are
reproduced below. For an
Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is affected*.
Therefore, *user action is required*.
## XSAs that DO affect the security of Qubes OS
The following
Dear Qubes Community,
We have published [Qubes Security Bulletin 090: Zenbleed (CVE-2023-20593,
XSA-433)](https://github.com/QubesOS/qubes-secpack/blob/main/QSBs/qsb-090-2023.txt).
The text of this QSB and its accompanying cryptographic signatures are
reproduced below. For an explanation of
Thanks for the info. With --pass-io no error messages were returned
from qvm-run
and kill. I am now inclined to think that the process (being one from
command firefox-esr running on some-dom) returns a exit code of 9 when kill'ed
with SIGKILL, which is caught by qvm-run, which issues the message
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Boryeu Mao:
> of ``some-dom: command failed with code: 137``, which I have been ignoring
> since the job with ``some-pid`` did get killed. What could be the meaning
> of the code 137 and its significance?
137 == 128 + (signal) 9
of ``some-dom: command failed with code: 137``, which I have been ignoring
since the job with ``some-pid`` did get killed. What could be the meaning
of the code 137 and its significance?
Thanks in advance.
--
You received this message because you are subscribed to the Google Groups
In my desktop Qubes system the mainboard died. So I bought a new one.
Unfortunately I didn't make a backup for some days.
After building the new hardware system my Qubes installation from the old ssd
doesn't start there.
(Somehow the system freezes or at least the keyboard is being switched off
Did I use the right command?
`sudo iptables -t nat -A PR-QBS -p tcp --dport 53 -j DNAT --to-destination
10.137.0.50` (repeat for udp)
Apparently DNS requests reach the DNS qube, but the response gets stuck
somewhere midway...
On Thu, Jun 8, 2023 at 8:58 AM unman wrote:
> On Tue, Jun 06, 2023
I like the way the ticket is formulated ... only empty directories should be
removed.
I'd be extremely careful with binding QubesIncoming to /tmp ... this might lead
to unintended loss if qvm-move is used or the origin is a disposable and the
user does not immediately move the file out of
On 6/30/23 3:27 AM, haaber wrote:
> Hi I was wondering if it would not me preferable (at least in some VM's)
> to delocalise the QubesIncoming folder in /tmp to have it "cleaned up"
> regularly. It's a pain to do so manually. Is there a problem doing so ?
> What would be the cleanest way to do
On Fri, Jun 30, 2023 at 12:27:41PM +0200, haaber wrote:
> Hi I was wondering if it would not me preferable (at least in some VM's)
> to delocalise the QubesIncoming folder in /tmp to have it "cleaned up"
> regularly. It's a pain to do so manually. Is there a problem doing so ?
> What would be the
Hi!
I wonder: Couldn't a systemd service do that?
Ulrich
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this
Hi I was wondering if it would not me preferable (at least in some VM's)
to delocalise the QubesIncoming folder in /tmp to have it "cleaned up"
regularly. It's a pain to do so manually. Is there a problem doing so ?
What would be the cleanest way to do it? A symlink ?? thank you, Bernhard
--
Many thanks, but for what I know the last Intel CPUs that allowed to
partially disable Intel ME using Coreboot were Ivy Bridge and Sandy Bridge.
So, what I understood is that the few corebooted computers using these old
CPUs and some AMD Opteron are the safest.
Is there any reason why this new
Hi!
Thank you for proposing this. It's a very good idea and we are working on
this!
On Wednesday, May 3, 2023 at 8:07:24 PM UTC+2 Leo28C wrote:
> On Wed, May 3, 2023 at 5:12 AM Andrew David Wong
> wrote:
>
>> nor can we control whether physical hardware is modified (whether
>> maliciously
Has someone solved the audio issue (on R4.1.2) that happens after an
upd=grade ofn debian-11 (bullseye) to 12 (bookworm)? Suddenly sound is
dead. Thank you, Bernhard
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
On 6/22/23 7:38 AM, haaber wrote:
> I was wondering if the awesome split-ssh and split-gpg family could be
> extended by a split-mozilla brother, that outsources passwords to vault
> without exposing them? The lack of such a feature obliges me *not* to
> save them within the two apps, which is a
Hello friends,
I bought a PCIe USB controller card, which is advertised to work with
linux.
It is Sonnettech Allegro Pro 4 USB 3.2 Gen 2 Type-C.
On my fully updated system, lspci shows the other USB controllers, but
nothing about Allegro. So I wrote to Sonnenttech and they asked for
the logs to
Hello friends,
I bought a PCIe USB controller card, which is advertised to work with linux.
It is Sonnettech Allegro Pro 4 USB 3.2 Gen 2 Type-C.
On my fully updated system, lspci shows the other USB controllers, but
nothing about Allegro. So I wrote to Sonnenttech and they asked for the
logs to
I was wondering if the awesome split-ssh and split-gpg family could be
extended by a split-mozilla brother, that outsources passwords to vault
without exposing them? The lack of such a feature obliges me *not* to
save them within the two apps, which is a terrible pain, of corse
thanks in
remaining question: if I want vault to hold several SSH keys, should I best
(a) replace the single ssh-add command by "ssh-add c /path/to/key1 &&
ssh-add -c /path/to/key2"
or
(b) create a ssh-add-my-keys.sh containing
ssh-add -c /path/to/key1
ssh-add -c /path/to/key2
ssh-add -c
Solved. Stupid me!
> I re-checked, my /etc/qubes-rpc/policy/qubes.SSHagent says only
one line, namely
ssh-client vault ask
which I find odd (= I do not understand), since in the nomenclature of
the man-page, ssh-client=work not vault, right?
it is of course either
"@anyvm vault ask" or
Thank you.
>> We observe that the file /run/user/1000/openssh_agent is different
>> from /home/user/.SSH_AGENT_sshkeys. That may be a problem.
You seem to be running the "ssh-agent.service" in your work qube. This
is not part of the linked setup guide. There only one agent is running
and
On 21/06/2023 11:49, haaber wrote:
>> We observe that the file /run/user/1000/openssh_agent is different
>> from/home/user/.SSH_AGENT_sshkeys. That may be a problem.
Running the following command in the work qube should work:
SSH_AUTH_SOCK=/home/user/.SSH_AGENT_vault ssh-add -L
You
update: somewhere I wrote "vault", somewhere "sshkeys". Correcting this
does NOT resolve the problem :((
On 6/21/23 11:45, haaber wrote:
I tried to follow carefully the split-ssh instructions on
https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md
but I
I tried to follow carefully the split-ssh instructions on
https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md
but I experience a stupid error. I did a "plain setup" without keepass.
So when I run
ssh-add -L in vault it does work, and has 1
Hi, marmarek!
Thank for following up!
On 18/06/2023 14:35, Marek Marczykowski-Górecki wrote:
On Mon, Jun 05, 2023 at 03:24:52PM +0200, Sylwester Arabas wrote:
I'm trying out Qubes OS on a new Dell Latitude 3520 laptop. It has a 4-core
i5 (cpu family: 6, model: 140) and it came with
Hello
Just a quick question - does keyboard backlit work ?
cheers, K.
czwartek, 4 maja 2023 o 10:58:27 UTC+2 haaber napisał(a):
> Dear all,
>
> Update of my HCL report: suspend to memory via xfce button works fine,
> but often sys-net is dead at wake-up. No harm: a simple qvm-start
> sys-net
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Jun 05, 2023 at 03:24:52PM +0200, Sylwester Arabas wrote:
> Hi All,
Hi Slayoo :)
> I'm trying out Qubes OS on a new Dell Latitude 3520 laptop. It has a 4-core
> i5 (cpu family: 6, model: 140) and it came with pre-installed Ubuntu. Qubes
>
In an AppVM based on Debian-11 template, I would like a `bash` script
running in `xfce Terminal` to catch an X selection `paste` event in
`firefox-esr` - is that possible, and where to look? Thanks in advance.
--
You received this message because you are subscribed to the Google Groups
Hallo,
ich bin gerade auf Tour von München nach Stuttgart, ich dachte das man sich
mal Treffen könnte um diese Qubes OS Probleme zu beheben.
Ich suche zu diesen Problem noch eine Lösung:
- Ich habe ein Update Problem
- Ein Passwort Problem, muss Qubes OS oft neu starten, weil ich ein Problem
Now it's online:
https://www.qubes-os.org/hcl/#msi_meg-x670e-ace-ms-7d69_ryzen-9-7900x_integrated-graphics-amd-rtx-2080ti_rickyjumb_4-2-0-alpha
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
Now it's online:
https://www.qubes-os.org/hcl/#cirrus7_nimbini-v3-nuc12wshv5_i5-1250p_integrated-graphics-iris-xe_eichennarr_r4-1
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it,
Thank you rickyjumb for your HCL report, which is not visible on the website
yet but already
[committed](https://github.com/QubesOS/qubes-hcl/commit/17c120047db50f5ccc535498f6d186654e470fd0)
to the `qubes-hcl` repository. It'll show soon.
Sorry for the delay.
/Sven
--
Thank you Eichennarr for your HCL report. It's not on the website yet due to a
little technical hick up but I
[committed](https://github.com/QubesOS/qubes-hcl/commit/3cef301544ea7d3d871a0a481eec4cde597c8ceb)
it into the `qubes-hcl` repository. So it'll show up very soon. Sorry for the
delay.
On Tue, Jun 06, 2023 at 01:24:18PM -0500, Leo28C wrote:
> I managed to set up a pi-hole qube and make it my network's DNS
> filtering/caching server. Ironically, it works flawlessly across my network
> EXCEPT it completely breaks DNS for all other qubes in the same system. On
> Debian-based qubes
On 07/06/2023 08:44, haaber wrote:
> I'm trying out Qubes OS on a new Dell Latitude 3520 laptop. It has a
4-core i5 (cpu family: 6, model: 140) and it came with pre-installed
Ubuntu. Qubes installation from a USB drive went smooth using the R4.1.2
image; wifi and sound worked well out of the
On 07/06/2023 08:01, Ulrich Windl (Google) wrote:
Do you recognize any hardware activity when trying to resume?
Pressing any keyboard key causes the keyboard backlight to turn on for a
few seconds (which does not happen after pressing the power-on button).
What about journal messages in
I managed to set up a pi-hole qube and make it my network's DNS
filtering/caching server. Ironically, it works flawlessly across my network
EXCEPT it completely breaks DNS for all other qubes in the same system. On
Debian-based qubes I figured out I can simply edit /etc/resolv.conf, while
making
> I'm trying out Qubes OS on a new Dell Latitude 3520 laptop. It has a
4-core i5 (cpu family: 6, model: 140) and it came with pre-installed
Ubuntu. Qubes installation from a USB drive went smooth using the R4.1.2
image; wifi and sound worked well out of the box. The first showstopper
is a problem
Do you recognize any hardware activity when trying to resume?
What about journal messages in Dom0?
Regards,
Ulrich
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
On 6/6/23 04:20, 'sonnenfinsternis' via qubes-users wrote:
Do I still have to submit something to be included in the HCl or do I just need
some more patience
It's not you, it's me. Super busy. Will take care soon.
/Sven
--
On 6/5/23 3:39 AM, haaber wrote:
> I often experience clicks that get lost "in the void" meaning that the
> actual xfce windows does not seem to receive them.
>
> Typical example: I use firefox, and a noscript pop-up ("load
> anonymously") with a button to click on: but I can't. What helps then,
After more than a week of intensive use, I haven't noticed any problems so far.
The "cirrus7 nimbini v3" (or presumably all NUC12WSHv5) seemed to be suitable
hardware for anyone who wants to use QubesOS as a desktop system.
Do I still have to submit something to be included in the HCl or do
Hi All,
I'm trying out Qubes OS on a new Dell Latitude 3520 laptop. It has a
4-core i5 (cpu family: 6, model: 140) and it came with pre-installed
Ubuntu. Qubes installation from a USB drive went smooth using the R4.1.2
image; wifi and sound worked well out of the box. The first showstopper
I noticed something like this but I think it's usually triggered by
something in dom0. Most notably I have a finicky power button and I get the
reset/logout/shutdown dialog. When I hit escape to make it go away, I have
to change virtual screens back and forth as you described.
On Mon, Jun 5, 2023
I often experience clicks that get lost "in the void" meaning that the
actual xfce windows does not seem to receive them.
Typical example: I use firefox, and a noscript pop-up ("load
anonymously") with a button to click on: but I can't. What helps then,
is changing the virtual screen (go away)
Dear Qubes Community,
We're pleased to announce that the first [release
candidate](#what-is-a-release-candidate) for Qubes OS 4.2.0 is now available
for [testing](https://www.qubes-os.org/doc/testing/). This [minor
release](#what-is-a-minor-release) includes several new features and
Here is my HCL report for the motherboard MSI MEG x670e ACE.
Booting even the installer works only with the x2apic=false flag set in
both xen and linux lines in grub. Automatic creation of networking related
qubes (sys-firewall and sys-net) during first configuration after install
crashes the pc.
Ulrich Windl (Google) wrote:
Just wondering: Is the remote end Windows, and could some virus scanner block
the rename request? You know Windows has kind of strange locking rules.
No the SMB server is running on OmniOS which is Illumos kernel.
--
You received this message because you are
Just wondering: Is the remote end Windows, and could some virus scanner block
the rename request? You know Windows has kind of strange locking rules.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
Qubes wrote:
Qubes wrote:
I am just trying my luck here with an issue that i have been unable to
resolve on my Qubes system for a long time now. I have been looking
into this problem quite a bit but i cannot seem to find a solution
anywhere. Perhaps someone on this list has experienced the
Qubes wrote:
I am just trying my luck here with an issue that i have been unable to
resolve on my Qubes system for a long time now. I have been looking into
this problem quite a bit but i cannot seem to find a solution anywhere.
Perhaps someone on this list has experienced the same and has
I am just trying my luck here with an issue that i have been unable to
resolve on my Qubes system for a long time now. I have been looking into
this problem quite a bit but i cannot seem to find a solution anywhere.
Perhaps someone on this list has experienced the same and has found a
--- Original Message ---
On Friday, May 26th, 2023 at 4:24 AM, 'Stuart Perkins' via qubes-users
wrote:
> Bottom post is the standard on this list. See my response at the bottom... :)
>
> On Thu, 25 May 2023 19:02:23 +
> "'sonnenfinsternis' via qubes-users"
Bottom post is the standard on this list. See my response at the bottom... :)
On Thu, 25 May 2023 19:02:23 +
"'sonnenfinsternis' via qubes-users" wrote:
>Sounds helpful, I'll try it when I get a chance, thanks :) After reading this
>[1], I can now even use my USB mouse directly after
Sounds helpful, I'll try it when I get a chance, thanks :) After reading this
[1], I can now even use my USB mouse directly after booting, without having to
assign it to dom0 first. So slowly but surely I'm warming up to QubesOS. A
wonderful system :) Now if I can just find a way to see how
Hi
5) The question about autocomplete in the terminal has been resolved. This was
indeed not due to QubesOS but to the fact that
the bash-completion package is not pre-installed by default in Debian.
But this can be easily fixed:
I forgot to attach the yml file. Sorry!
--- Original Message ---
On Wednesday, May 24th, 2023 at 11:51 PM, sonnenfinsternis
wrote:
> Here's my review of the cirrus7 nimbini v3, which is largely based on the
> Intel NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs
>
Here's my review of the cirrus7 nimbini v3, which is largely based on the Intel
NUC 12 (NUC12WSHv5). QubesOS with the "kernel latest" option runs great. Most
importantly, it is a dream to work on a fanless computer that still runs
completely silent under heavy load despite various Qubes
Thanks for quickly adding my data to the list :-)
--- Original Message ---
On Thursday, May 11th, 2023 at 2:32 AM, Sven Semmler
wrote:
> Thank you Eichennarr for your HCL report, which is online now!
>
> /Sven
>
> --
>
First of all, thank you Kamil Aronowski for the long answer. There was a lot in
it that helped me. :)
It might be clearest if I sort my answer by the numbering of my original
questions:
1) I am still looking for a way to display the real global processor load and
the real total global RAM
Dear Qubes Community,
We have published [Qubes Canary
035](https://github.com/QubesOS/qubes-secpack/blob/main/canaries/canary-035-2023.txt).
The text of this canary and its accompanying cryptographic signatures are
reproduced below. For an explanation of this announcement and instructions for
Qubes wrote:
Qubes wrote:
Qubes wrote:
Qubes wrote:
Qubes wrote:
I have noticed than when my computer wakes up from sleep the dom0
date and time updates as soon as my computer gets net connectivity,
but my appVMs can take a loong time before their date and time
also update. Is there
Hi!
Following the instructions to update the fedore-36 template to
fedora-38, I saw these errors:
...
Running scriptlet: pulseaudio-16.1-4.fc38.x86_64
2866/2866
Running scriptlet: kernel-modules-core-6.2.15-300.fc38.x86_64
2866/2866
Running scriptlet:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Qubes:
> However, when I use the Qubes backup tool it shows the size of the dom0
> backup is going to be 7.1 GB, but other than about 20 MB of screenshots in
> `/home/Pictures/` I don't have anything in `/home/`.
It's a bug in the GUI backup tool's
The documentation on [how to backup, restore and
migrate](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/)
says,
"When backing up dom0 using the Qubes backup tool (explained below),
only the home directory is backed up. Therefore, if there are files
outside of the home
Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that DO affect the security of Qubes OS
The
Thank you Antoine for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#purism_librem-14-v1_i7-10710u_integrated-graphics-uhd-620_antoine-luciani_r4-1)
now!
/Sven
--
https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7
--
You received this
Installation instructions :
Please note that I'm using HEADS and not a normal BIOS
1. Use ISO Qubes
2. In the Heads menu, go to USB boot
3. When booting to install, select “Install Qubes OS"
4. Finish installation and boot into OS
Remarks
The only issue I've encountered is the WiFi killswitch :
'unman' via qubes-users wrote:
On Tue, Jul 19, 2022 at 01:26:13PM +0200, Qubes wrote:
Qubes wrote:
'unman' via qubes-users wrote:
On Tue, Jul 19, 2022 at 08:41:40AM +0200, Qubes wrote:
The procedure to install KDE in 4.1 doesn't seem to work, is
that expected
behavior?
Yes, the group isn't
On 5/13/23 7:33 AM, taran1s wrote:
>
>
> Demi Marie Obenour:
>> On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote:
>>> Andrew David Wong:
On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote:
> If anon-whonix AppVM is set to use mullvad-VPN that is connected to
Demi Marie Obenour:
On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote:
Andrew David Wong:
On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote:
If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix
it doesn't connect to internet. If one
When i installed `sys-gui` on my system the `SaltStack` formula
downloaded and installed fedora-36-xfce. Do i need to do anything more
than download the `fedora-37-xfce` template and switching the template
for `sys-gui` to the new template?
--
You received this message because you are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sat, May 13, 2023 at 10:57:00AM +, Qubes OS Users Mailing List wrote:
> Andrew David Wong:
> > On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote:
> > > If anon-whonix AppVM is set to use mullvad-VPN that is connected to
> > > sys-whonix it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Thu, May 11, 2023 at 11:00:41PM -0700, Vít Šesták wrote:
> If the process is not reused, just an update without restarting anything is
> enough, isn't it? (This wouldn't be the case if the process was forking
> from a zygote.)
The process
Andrew David Wong:
On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote:
If anon-whonix AppVM is set to use mullvad-VPN that is connected to sys-whonix
it doesn't connect to internet. If one uses Debian or Fedora based AppVM and
runs vanilla Firefox, it works like a breeze.
Any ideas how
Hello
Thanks Thomas! That was of big help :D
I haven't checked if that works retroactively... anyway though, to rapidly
free some memory up and recover the system I just deleted all revisions
with "lvremove /dev/qubes/dom0/*-back" (responding myself to the second
question on my previous mail).
On 5/12/23 4:31 AM, 'taran1s' via qubes-users wrote:
> If anon-whonix AppVM is set to use mullvad-VPN that is connected to
> sys-whonix it doesn't connect to internet. If one uses Debian or Fedora based
> AppVM and runs vanilla Firefox, it works like a breeze.
>
> Any ideas how to solve this?
>
On 5/11/23 11:00 PM, Vít Šesták wrote:
> If the process is not reused, just an update without restarting anything is
> enough, isn't it? (This wouldn't be the case if the process was forking
> from a zygote.)
Marek has previously told me that only Xen and Kernel updates require a reboot.
FWIW,
Hi,
You can list your pools with `qvm-pool`. And list options for a pool with
(where my pool is pool00) `qvm-pool info pool00`. Then you can set
`revisions_to_keep` for a pool like `qvm-pool set -o revisions_to_keep=0
pool00`.
I'm not sure if this will work retroactively on already created
Hello
I had a hard time cause I didn't notice the pool memory was running out of
space because of the accumulation of snapshot revisions.
I actually don't need 2 snapshots for most of my qubes and I've been
wondering if it's possible to set a global value so those qubes don't fill
up my disk
On Thu, 11 May 2023 15:20:17 -0700
Andrew David Wong wrote:
>Dear Qubes Community,
>
>The Fedora Project has
>[announced](https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/)
> that Fedora 36 will reach EOL
I managed to make run the tasket guide even for VPN over Tor. The only
issue I didn't solve is that it is not working with Torbrowser in
anon-whonix AppVM.
If anon-whonix AppVM is set to use mullvad-VPN that is connected to
sys-whonix it doesn't connect to internet. If one uses Debian or
If the process is not reused, just an update without restarting anything is
enough, isn't it? (This wouldn't be the case if the process was forking
from a zygote.)
After the update, I got a shower of notifications “Failed to execute
qubes.WindowIconUdater (from to dom0)”, probably for each
Five day warning... Very nice of them...
On Thu, May 11, 2023 at 5:20 PM Andrew David Wong wrote:
> Dear Qubes Community,
>
> The Fedora Project has [announced](
> https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/)
> that
Dear Qubes Community,
The Fedora Project has
[announced](https://lists.fedoraproject.org/archives/list/annou...@lists.fedoraproject.org/thread/4GXBZJSGQ2PEKIBM2APCTLXBS6IDKSOP/)
that Fedora 36 will reach EOL
([end-of-life](https://fedoraproject.org/wiki/End_of_life)) on 2023-05-16. We
Dear Qubes Community,
We have published [Qubes Security Bulletin (QSB) 089: Qrexec: Memory corruption
in service request
handling](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-089-2023.txt).
The text of this QSB and its accompanying cryptographic signatures are
reproduced
Thank you Eichennarr for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#tuxedo_infinitybook-s-15-gen7_i7-1260p_integrated-graphics-iris-xe_eichennarr_r4-1)
now!
/Sven
--
https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7
--
You received
Hi,
What is the best practice for setting up a VPN proxy in Qubes these days
(for Mullvad, VPN over Tor)?
I found two versions for setup of VPN proxy in Qubes:
The first one is from tasket called Qubes-vpn-support. The last version
is dated Dec 2020:
Hi there :)
I've only been using QubesOS for two weeks and so far I'm totally thrilled!
Thanks to all who contribute to this wonderful project :-)
But there are a few questions that I have not been able to clarify online or
with friends, so I would like to try here:
1) Is there somewhere in
301 - 400 of 35383 matches
Mail list logo