Do you have any recommendation on how to solve this issue?
I also tried:
https://github.com/QubesOS/qubes-dist-upgrade/blob/release4.0/scripts/upgrade-template-standalone.sh#L37-L72
found via:
https://github.com/QubesOS/qubes-issues/issues/7865#issuecomment-1407236960
but running:
apt-get
Hello!
a while ago when migrating Qubes 4.0 to Qubes 4.1
I restored a standalone debian VM (created on r4.0) on a fresh r4.1 system and
did not
notice that I also should replace the r4.0 repos _in_ the VM to r4.1 repos
but it still worked fine.
Today I replaced this line:
deb [arch=amd64]
Maybe the 'qvm-copy-to-vm' version could be made to place the 1st argument
in the Target field of the pop-up window, such that only a CR is required
to complete the operation?
On Friday, March 24, 2023 at 8:41:54 AM UTC-7 Boryeu Mao wrote:
> Yes, 'qvm-copy' alone would ensure the security of
On Tue, Apr 04, 2023 at 10:11:19PM -0700, Foilsurf wrote:
> Hello,
> which of the out of the Box Defense features of the new *Kali Linux Purple*,
> would be very nice to have also in *QubesOS *to raise the defense bar? (the
> attacks also get every day harder...)
> Kind Regards
>
I see that
Hello,
which of the out of the Box Defense features of the new *Kali Linux Purple*,
would be very nice to have also in *QubesOS *to raise the defense bar? (the
attacks also get every day harder...)
Kind Regards
--
You received this message because you are subscribed to the Google Groups
Hi there,
sudo journalctl -u qubes-tunnel:
systemd[1]: Starting qubes-tunnel.service - Tunnel service for Qubes
proxyVM...
su[640]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so):
/usr/lib64/security/pam_sss.so: cannot open shared object file: >
su[640]: PAM adding faulty module:
Hi all,
DEAR MODS: If I should have sent this to the wrong place, or if I should go
about this in a different way, please do tell me. Doing my best in good faith,
willing to learn.
Qubes beginner here who feels like he's fairly good at flying a Cessna (Mint)
and is now trying to fly a
On Mon, Mar 27, 2023 at 06:33:26PM +0200, r.wiesb...@web.de wrote:
> Hi uman,
>
> that was the reference in qubes-doc that I found before and that I could
> not find today when I was writing this email. However, it does not
> explain what the advantage of this two-switch-model is compared to just
Transferring the data got me back in action, so I'm quite happy I had the
old system running and didn't have to muck about to regain access to the
files
I've normally had good enough luck with the qubes backup and restore, but
it does seem like Qubes from older systems might run into
I restored my system from a laptop running Qubes 4.0 recently
The template for my gpg domain is based on debian-10. I restored both the
gpg domain and the template into the new system, but the gpg domain won't
start
It seems to get stuck waiting for the xvdd device to attach to the VM.
Xentop is showing dom0 using 50-60% cpu on my laptop, all the time. It did
not always do this, but I don't know which update may have caused it.
Top within dom0 shows a few processes taking 5% or or less, so whatever is
causing the high cpu usage is either in the kernel, or in whatever Xen is
Xentop is showing dom0 using 50-60% cpu on my laptop, all the time. It did
not always do this, but I don't know which update may have caused it.
Top within dom0 shows a few processes taking 5% or or less, so whatever is
causing the high cpu usage is either in the kernel, or in whatever Xen is
Hi uman,
that was the reference in qubes-doc that I found before and that I could
not find today when I was writing this email. However, it does not
explain what the advantage of this two-switch-model is compared to just
run the services defined in the per-qube services tab/setting without
the
On Mon, Mar 27, 2023 at 03:48:15PM +0200, r.wiesb...@web.de wrote:
> Hi there,
>
> every VM/qube has a "services" tab in its settings window. It seems like
> Qubes is designed in a manner that requires two switches for a service:
> it needs to be enabled in the template *and* requires an entry in
Hi there,
every VM/qube has a "services" tab in its settings window. It seems like
Qubes is designed in a manner that requires two switches for a service:
it needs to be enabled in the template *and* requires an entry in
"services" tab.
My expectation was that when selected in the "services"
On Sun, March 26, 2023 22:07, Demi Marie Obenour wrote:
> zram and zswap are potentially vulnerable to timing attacks, so I
> recommend avoiding them. - --
I see! Let me scratch those off my list then
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sun, Mar 26, 2023 at 08:57:45PM +, Qubes OS Users Mailing List wrote:
> Is there anything I can do to get more qubes out of my RAM, besides trial
> and error with allocation values? I figure there's gotta be some daemon or
> other that I
Is there anything I can do to get more qubes out of my RAM, besides trial
and error with allocation values? I figure there's gotta be some daemon or
other that I never use that's eating up RAM on every instance of
fedora/debian for no good reason. Or perhaps some sort of swap
optimization such as
Yes, 'qvm-copy' alone would ensure the security of copying/moving files
between AppVM's. Thanks.
On Fri, Mar 24, 2023 at 5:43 AM unman wrote:
> qvm-copy-to-vm is deprecated and will be removed.
>
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On 3/23/23 9:23 PM, tiesta_symonne61 via qubes-users wrote:
> I'm pretty
> sure the actual traffic is being routed through the correct gateways, but
> my only metric for knowing that is looking at CPU usage while stressing
> the connection and making sure the correct chain of net vm's light up.
>
On Fri, Mar 24, 2023 at 04:23:48AM +, tiesta_symonne61 via qubes-users
wrote:
> I have two Whonix gateways, the default sys-whonix and a sys-whonix-clone.
> Both are attached to different net vm's.
>
> The problem is that all qubes that have sys-whonix-clone as its net vm
> show up under
qvm-copy-to-vm is deprecated and will be removed.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this
I have two Whonix gateways, the default sys-whonix and a sys-whonix-clone.
Both are attached to different net vm's.
The problem is that all qubes that have sys-whonix-clone as its net vm
show up under sys-whonix's tray icon, not sys-whonix-clone's. I'm pretty
sure the actual traffic is being
Ah that makes sense. Thanks much, Glen. (Scripting is precisely what I
was going for -- I can still have everything else automated.) Boryeu
On Thu, Mar 23, 2023 at 5:20 PM Glen Larwill wrote:
> Security?
>
> Forces ANY file movement between VMs to be under the control of a human
> behind a
Security?
Forces ANY file movement between VMs to be under the control of a human
behind a keyboard/mouse. I ran into this as well, then realized the risk I
was creating running this from a script.
GL
On Thu, Mar 23, 2023, 16:50 Boryeu Mao wrote:
> I'd expected 'qvm-copy-to-vm' to accept the
I'd expected 'qvm-copy-to-vm' to accept the 1st argument as target-vm and
get on with copying, but for me both commands request the target-vm in a
pop-up window -- so what is the point of having 'qvm-copy-to-vm' at all, if
I am not missing something really simple?
Thanks
--
You received this
This sounds like an excellent question for https://forums.whonix.org/ ;-)
/Sven
--
https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
Dear Qubes Community,
We have published [Qubes Security Bulletin (QSB) 088: Two Xen issues affecting
PV (stub-)domains (XSA-428,
XSA-429)](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-088-2023.txt).
The text of this QSB and its accompanying cryptographic signatures are
I see there is a 'snowflake' proxy option in the Tor control panel,
however it gets stuck at 0% and refuses to connect. I can't find any
resources. Closest I found is this forum thread:
https://forum.qubes-os.org/t/snowflake-proxy-causes-crash-in-tor-control-panel/12326
It's not the same issue,
Hello everyone, I am trying to set up the dark theme in dom0. All
working well but at the end it doesnt work. There are some errors
popping up and I think this is the issue but duno how to solve that.
[xxx@dom0 ~]$ sudo qubes-dom0-update qt5-qtstyleplugins
Using sys-whonix-update as UpdateVM
Hi Bernhard,
nice to see you're still around. :-)
I hadn't seen you active for a long time, probably I just don't know your nick
on the forum.
And I ignore if TOR does use "cross checking requests" to detect
manipulation? The question of " best practice " seems non-trivial to me.
Setting up a
Dear Qubes Community,
Our project lead, [Marek
Marczykowski-Górecki](https://www.qubes-os.org/team/#marek-marczykowski-górecki)
will be interviewed tomorrow during the [Dasharo Developers
vPub](https://vpub.dasharo.com/e/1/dasharo-user-group-1). This is a virtual
event hosted by the
Dear Qubes Community,
It is our pleasure to announce that the [Dasharo FidelisGuard
Z690](https://3mdeb.com/shop/open-source-hardware/dasharo-fidelisguard-z690-qubes-os-certified/)
has become the fourth [Qubes-certified
computer](https://www.qubes-os.org/doc/certified-hardware/) for Qubes 4.X
Hi all,
I have the impression that DNS questions should get more attention than
the often attract, with the purpose of caching, anonymity, censorship
prvention & securing against DNS manipulation. Let me start my question
with a citation, that -at the end- is not that surprising:
"more than
Dear Qubes Community,
We're pleased to announce the stable release of Qubes 4.1.2! This release aims
to consolidate all the security patches, bug fixes, and upstream template OS
upgrades that have occurred since the initial Qubes 4.1.0 release. Our goal is
to provide a secure and convenient
Thank you for your clarification.
Also, many thanks for maintaining the file-reflink storage driver.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Rusty Bird:
> Disabling CoW and hence checksums (besides being specific to Btrfs -
> file-reflink is filesystem agnostic)
Although for volatile volumes in particular it might be possible to
get away with (optionally, configured per-volume)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
449f09c92:
> had to edit the relevant code to disable CoW when volatile.img is
> created
file-reflink doesn't inherently do CoW for volatile volumes, it just
defaults to whatever the underlying location on the filesystem does.
For Btrfs, to get
On 3/3/23 1:33 AM, Cristian Margine wrote:
> Hello,
> You sent the wrong canary. text(it is the text from 033) The current canary
> is not signed on December 04. 2022.
>
>
> Cristian
>
Fixed, thank you.
--
You received this message because you are subscribed to the Google Groups
I have /dev/xvdc configured as a 10GB swap and had to edit the relevant
code to disable CoW when volatile.img is created to avoid overloading
dom0 by checksum calculation when swapping out occurs in the VM.
Is there any reason why copy-on-write is enabled on volatile volumes
that are mostly
Hello,
You sent the wrong canary. text(it is the text from 033) The current canary is
not signed on December 04. 2022.
Cristian
--- Original Message ---
On Thursday, March 2nd, 2023 at 7:07 PM, Andrew David Wong
wrote:
>
>
> Dear Qubes Community,
>
> We have published a
Dear Qubes Community,
*Editor's note*: An earlier version of this announcement mistakenly contained
the text of an older canary. This has been corrected below. As always, we
encourage readers to verify the cryptographic signatures on canaries, which can
always be found in the [Qubes security
Dear Qubes Community,
We have published a new [Qubes
canary](https://www.qubes-os.org/security/canary/). The text of this canary is
reproduced below. This canary and its accompanying cryptographic signatures
will always be available in the [Qubes security pack
> I see Qubes 4.2 is going to base dom0 on Fedora 37, which should have all the
> tools, but I can’t seem to find any kind of iso nightly builds for 4.2.
See this https://forum.qubes-os.org/t/qubes-os-4-2-signed-weekly-builds/16929
Cheers,
deeplow
--- Original Message ---
On Tuesday,
Thank you Sec Is Fun for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#system76_gazelle_i7-12700h_integrated-graphics-iris-xe-rtx-3060-mobile_sec-is-fun_r4-1)
now!
Since you haven't provided any details, I assumed your machine works without
issues. If that was a mistake,
Thank you Taro for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#dell_vostro-3425_ryzen-5-5625u_integrated-graphics-radeon_taro-yamada_r4-1)
now!
/Sven
--
https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7
--
You received this message
Thank you N O for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#lenovo_thinkpad-p52-20mas21905_i7-8850h_integrated-graphics-hd-630_n-o_r4-1)
now! Since you haven't posted any comments I assumed there have been no
issues. In case that is a mistake, please let me know!
/Sven
Thank you Christian for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#lenovo_thinkpad-x1-carbon-20kh0035mx_i5-8250u_integrated-graphics-hd-620_christian-nelke_r4-1)
now. I assumed you meant to convey that all works fine. If that's not correct,
please let me know so I can
I maintain a Xen Prometheus exporter. Here is what I know:
You will not see device writes or reads in the dm stubs because no process in
them is reading or writing from disks.
The Prometheus exporter is awesome, BTW. You can get system statistics and
ingest them into Prometheus for system
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sat, Feb 25, 2023 at 04:24:42PM +, disp...@proslo.dev wrote:
> I am trying to create ubuntu template using an app-vm created using template
> fedora-37. I have Qubes OS 4.1.2-rc1. I am using instructions in the below
> link to create the
I am trying to create ubuntu template using an app-vm created using template
fedora-37. I have Qubes OS 4.1.2-rc1. I am using instructions in the below link
to create the template
https://github.com/Qubes-Community/Contents/blob/master/docs/os/ubuntu.md
I am getting below error when trying to
Not sure how this happened. Below is what I sent.
---
layout:
'hcl'
type:
'convertible'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'unknown'
remap:
'yes'
brand: |
LENOVO
model: |
82QG
bios: |
J1CN33WW
cpu: |
12th Gen Intel(R) Core(TM) i7-1260P
cpu-short: |
FIXME
chipset: |
On 2/23/23 7:05 AM, disp...@proslo.dev wrote:
> Empty Message
>
Hi there,
It looks like you sent an empty message with no body text and no attachments.
Did you mean to add your HCL report to this email?
--
You received this message because you are subscribed to the Google Groups
Empty Message
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
Here's my HCL report.
This PC has a buggy wifi card Realtek RTL8821CE. Its native driver crashes
sys-net. I removed wifi device from sys-net settings temporarily & downloaded
tomaspinho's driver by Ethernet. Cloned debian-11 template for sys-net, set the
new template in HVM mode and selected
---
layout:
'hcl'
type:
'notebook'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'unknown'
remap:
'yes'
brand: |
LENOVO
model: |
20MAS21905
bios: |
N2CET61W (1.44 )
cpu: |
Intel(R) Core(TM) i7-8850H CPU @ 2.60GHz
cpu-short: |
FIXME
chipset: |
Intel Corporation 8th Gen Core
Hi Christian,
can you write a few words about what works / doesn't work. How difficult or
easy it was to install?
/Sven
--
https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7
--
You received this message because you are subscribed to the Google Groups
---
layout:
'hcl'
type:
'notebook'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'unknown'
remap:
'yes'
brand: |
LENOVO
model: |
20KH0035MX
bios: |
N23ET74W (1.49 )
cpu: |
Intel(R) Core(TM) i5-8250U CPU @ 1.60GHz
cpu-short: |
FIXME
chipset: |
Intel Corporation Xeon E3-1200
Thanks jack (aka 3c9) for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#acer_chromebox-cxi4-i7v16g_i7-10610u_integrated-graphics-uhd-620_3c9_r4-1)
now!
I am very curious about your experience. How easy was it to install Qubes OS?
What's the performance? What works and what
---
layout:
'hcl'
type:
'desktop'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
'unknown'
remap:
'yes'
brand: |
Google
model: |
Kaisa
bios: |
MrChromebox-4.19.1
cpu: |
Intel(R) Core(TM) i7-10610U CPU @ 1.80GHz
cpu-short: |
FIXME
chipset: |
Intel Corporation Comet Lake-U v1 4c
Can't you use "some DVM" connected via sys-whonix with Firefox instead?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
Hello everyone, I would like to ask how to use audio conference in a
Torbrowser in Whonix anon-whonix in Qubes. I need to make some live
presentation with a team, through audio and screen sharing.
I tried to use microphone, connected it with the anon-whonix AppVM, but
Torbrowser doesn't
Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that DO affect the security of Qubes OS
The
Dear Qubes Community,
We're pleased to announce the first [release
candidate](#what-is-a-release-candidate) for Qubes 4.1.2! This [patch
release](#what-is-a-patch-release) aims to consolidate all the security
patches, bug fixes, and upstream template OS upgrades that have occurred since
prior
OK,
after reading the document my original question still stands:
Not having sys-usb I can mount USB sticks by "delegating" them to a VM.
My question was whether a similar mechanism exists fur a YubiKey instead of an
USB stick.
Regards,
Ulrich
08.02.2023 18:05:25 Ulrich Windl (Google) :
>
Sorry, I should have found that!
07.02.2023 23:59:40 Andrew David Wong :
> On 2/7/23 12:24 PM, Ulrich Windl wrote:
>> How do you use a YubiKey (OpenPGP card, etc.) in Qubes OS?
>
> In case you (or anyone else reading this) has not already seen it, there is a
> documentation page on this:
>
>
On 2/7/23 12:24 PM, Ulrich Windl wrote:
> How do you use a YubiKey (OpenPGP card, etc.) in Qubes OS?
In case you (or anyone else reading this) has not already seen it, there is a
documentation page on this:
https://www.qubes-os.org/doc/yubikey/
--
You received this message because you are
Hi!
If you cannot do "USB separation", can you allow to connect a VM to a
YubiKey attached on USB?
Or: How do you use a YubiKey (OpenPGP card, etc.) in Qubes OS?
Regards,
Ulrich
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
>>> "'Jeremy Hansen' via qubes-users" schrieb
am
31.01.2023 um 10:24 in Nachricht
<2d985c80-a4d0-45a6-b0d2-512c62335dfb@Canary>:
> I’m trying to figure out the things required to use my Yubikey to decrpyt my
> LUKS root filesystem. As I understand it, dom0 in 4.1.1 doesn’t have the
> functions
On 2/1/23 12:54 PM, davaiigoo wrote:
> According to the documentation, there is way to enable networking in Qubes
> templates for sources other than updates from apt-get or dnf .
>
> https://www.qubes-os.org/doc/how-to-install-software/#installing-software-from-other-sources
>
> Tried different
According to the documentation, there is way to enable networking in Qubes
templates for sources other than updates from apt-get or dnf .
https://www.qubes-os.org/doc/how-to-install-software/#installing-software-from-other-sources
Tried different combinations without success.
I definitely need
Dear Qubes Community,
The following is a guest post by Michal Zygowski from
[3mdeb](https://3mdeb.com/) on the work they've been doing to upgrade [Anti
Evil Maid (AEM)](https://www.qubes-os.org/doc/anti-evil-maid/). The original
post can be found on the [3mdeb
I’m trying to figure out the things required to use my Yubikey to decrpyt my
LUKS root filesystem. As I understand it, dom0 in 4.1.1 doesn’t have the
functions require in cryptsetup. It looks like systemd in Fedora 36 added
systemd-cryptenroll, which I see in the Fedora guests. Has anyone
Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that DO affect the security of Qubes OS
The
Hello friends,
With Qubes 4.1 my old windows 10 standalone installation still boots
correctly, but I cannot copy/move files to or from other qubes.
I understand the problem is already resolved, but the solution is not yet
available with mainstream updates. But I suspect updates will never be able
dose qubes os work with HP ENVY x360 15 i7-1065G7
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this
Hi,
I also experience(d) shutdown delays in the beginning of my qubes OS experience
in about 1/10 shutdowns.
I never had any NFS mounts or alike that should have caused it.
After thrawling through the journalctl messages there was always some VM that
waited for a process to exit.
Instead of
No, doesn't work either; I had tried it before.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion
No NFS involved; wouldn't it have to be NFS in dom0 then? Shudder!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
Yes.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
Hello!
I hope it's the right place, otherwise, please advise me with the correct
procedure.
After going reading this:
https://www.qubes-os.org/hcl/#lenovo_thinkpad-t530-2429cq9_i7-3520m_integrated-graphics-hd-4000_andrew_r3-1
I also read this:"Nearly all mods here can also be applied to the
Thank you Daniele for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#dell_latitude-e7440_i7-4600u_integrated-graphics-hd-4400_daniele-carati_r4-1)
now!
/Sven
--
https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7
--
You received this
Installed Qubes 4.1.1 and no problem so far.
---
layout:
'hcl'
type:
'laptop'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
''
remap:
'yes'
brand: |
Dell Inc.
model: |
Latitude E7440
bios: |
A28
cpu: |
Intel(R) Core(TM) i7-4600U CPU @ 2.10GHz
cpu-short: |
FIXME
chipset: |
Installed Qubes 4.1.1 and no problem so far.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
unman:
> On Wed, Dec 28, 2022 at 11:00:18AM +0100, Ulrich Windl wrote:
> > Am I the only one that sees extra shutdown delays?
> > It seems that everything is unmounted, but still thing hang; unsure what
> > that is. See attachment.
> > What
On Wed, Dec 28, 2022 at 11:00:18AM +0100, Ulrich Windl wrote:
> Hi!
>
> Am I the only one that sees extra shutdown delays?
> It seems that everything is unmounted, but still thing hang; unsure what that
> is. See attachment.
> What surprises me is that crypto seems to be stopped before unmount.
Thank you Focus for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#hewlett-packard_omen-17-an007na_i5-7300hq_integrated-graphics-hd-630-geforce-gtx-1050-mobile_focus-kiseri_r4-1)
now!
Little side note to reporters:
if you don't know what certain fields are for (e.g. the
I am still not having any luck using PCI devices, PCI passthrough,
qvm-pci command, or use with xl. Devices tab is greyed out in vm
settings windows.
qvm-pci returns: Failed to list 'pci' devices, this device type either
does not exist or you do not have access to it.
lspci returns the
On 12/28/22 10:00, Ulrich Windl wrote:
Hi!
Am I the only one that sees extra shutdown delays?
It seems that everything is unmounted, but still thing hang; unsure what that
is. See attachment.
What surprises me is that crypto seems to be stopped before unmount.
Regards,
Ulrich
NFS mounts
Thank you tv.fuzzy one again for your HCL report, which is
[online](https://www.qubes-os.org/hcl/#msi_b660m-a-ms-7d43_i7-12700_integrated-graphics-uhd-770-amd-navi-24_tv-fuzzy_r4-1)
now!
/Sven
--
https://keys.openpgp.org/vks/v1/by-fingerprint/DA5975C9ABC40C833B2F620B2A632C537D744BC7
--
You
---
layout:
'hcl'
type:
'notebook'
hvm:
'yes'
iommu:
'yes'
slat:
'yes'
tpm:
tpm 2.0 detected, bios doesn't mention 1.2 emulation, didn't test legacy boot
remap:
'yes'
brand: |
HP
model: |
OMEN by HP Laptop 17-an0xx
bios: |
F.07
cpu: |
Intel(R) Core(TM) i5-7300HQ CPU @ 2.50GHz
OK, after a bit of googling I found this
https://github.com/QubesOS/qubes-issues/issues/7507#issuecomment-1153081021
and adding the config to xorg.conf.d
Section "OutputClass"
Identifier "intel"
MatchDriver "i915"
Driver "intel"
Option "AccelMethod" "sna"
Option "TearFree" "true"
Option "DRI"
Dear Qubes Community,
The Qubes OS Project is grateful to have been selected as one of the
beneficiaries of this year's Proton charity fundraiser alongside so many other
wonderful organizations. The continued support of the privacy community means
the world to us! For details about the
Recently I began configuring Qubes 4.1 on an Alienware x17 but one of my
final issues is PCI attachment or passthrough.
(compatibility side note)--
I have managed to get almost everything operational. I had to solve USB
keyboard issues, and update wifi for
[EDIT]
I do not need specifically PCI passthrough. I am simply seeking to use the
GPU in different VM's, especially a Windows VM.
I am not totally opposed to building the drivers into dom0, but I would
prefer something better.
I just found the documentation on a sys-gui qubes. Maybe this is the
Goal: Nvidia GPU in Standalone Windows VM
Windows 10; Qubes 4.1
Security is not a concern - this is a developers configuration.
I see lots of forums and discussions and some people who claim they've done
it but I have no luck finding good instruction.
PC: Alienware x17 r2; Nvidia 3080
It is
On 12/10/22 8:20 AM, Foilsurf wrote:
> Hello,
> Obsidian is quite simple tech (text-files), but quite clever for taking
> notes. And run under Linux (TheBrain e.g. not any more). Additionally it
> has the local principal, so it would be found a perfect place in a own VM,
> I think.
> Would it
Hello,
Obsidian is quite simple tech (text-files), but quite clever for taking
notes. And run under Linux (TheBrain e.g. not any more). Additionally it
has the local principal, so it would be found a perfect place in a own VM,
I think.
Would it make sense to offer an Obsidian VM straight away
Hello,
might *KataOS* be a good foundation for QubesOS to make the core as strong
as possible in terms of security (via software validation, security proofs)?
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
501 - 600 of 35383 matches
Mail list logo