> This issue (https://github.com/QubesOS/qubes-issues/issues/3591) that
> was closed marmarek states that the kernel-latest-(qubes-vm) contains
> wireguard module out of the box, however I don't find it anywhere.
to install the kernel-latest pkg (which includes wireguard.ko):
dom0$ sudo
On Sun, Jul 28, 2019 at 12:15:42PM +, mmo...@disroot.org wrote:
> [xx@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
> kernel-latest-qubes-vm
...
> Skipping packages with conflicts:
> (add '--best --allowerasing' to command line to force their upgrade):
>
On Sun, Jul 28, 2019 at 12:34:25PM +, mmo...@disroot.org wrote:
> Thanks the package is now successfully installed!
good! (but actualy not required now that i think about it)
> Now I changed the kernel of my sys-firewall to point to the new kernel
> - 5.2.3-1 and tried to start the AppVM.
>
mildly confused, cant resist to ask...
On Sun, Jul 28, 2019 at 05:59:05PM +, Jon deps wrote:
> 2) in dom0 do uname -a does it say kernel 4.19 , if so you don't need
> "the wg package"
whats "the wg package" there?
and why would it depend on the dom0 kernel?
afaict only the
> > > mutt in a no-netvm mua-vault?
> > > with fetchmail-vms feeding it through qubesrpc-procmail?
> > > and separate vms for qubesrpc-msmtp for sending?
> > > or msmtp-vms mixed with the fetchmail-vms based on credentials-overlap?
> > however, I am afraid that you have already successfully
On Thu, Feb 13, 2020 at 06:27:13PM +0100, A E wrote:
> So I hope someone can explain to me how I can get it to show the keyboard
> layout or not locking the screen.
not very qubes-specific afaict.
google something like: how to configure xscreensaver
> If that isn’t possible, can I then somehow
On Thu, Feb 13, 2020 at 10:33:45PM +0100, A E wrote:
> When I try to use “*” around the domaine name, it says there doesn’t exist
> any domain with that name. And I have checked it was spelled correctly. And
> I get the same result if I use the root account.
try using quotes ... as in regular ""
On Fri, Feb 28, 2020 at 10:02:42PM +0100, A E wrote:
> Thank you for your very quick response.
and thanks for a good/comprehensive reply from you.
> The mobile phone is listed as two devices:
> 1) sys-usb: sda - Disk ()
> 2) sys-usb: 1-3 - ..._Mass_Storage_Device_...
this is normal. go
On Fri, Feb 28, 2020 at 06:00:04PM -0600, Sven Semmler wrote:
> You want your sys-firewall to be separate from sys-net for the same
> reason: compartmentalization.
as usual "depends on your threat model".
if you are into outbound-firewalling of appvms, not doing so in the
appvm makes a lot of
On Fri, Feb 28, 2020 at 12:01:04PM -0800, A wrote:
> I have attached my mobile phone to a VM, but can’t find its directory
> in the file manager of that VM.
in which way did you attach it?
do qvm-block or qvm-usb show it as attached to the right vm?
does it show up in /proc/partitions or lsusb in
On Sat, Feb 29, 2020 at 08:02:25AM +0100, A E wrote:
> When I execute "sudo mount /dev/xvdi /mnt" in the terminal of the VM, I get
> this error: “mount: /dev/xvdi/mnt: can’t find in /etc/fstab.
that error doesnt match the command. one of them must be incorrect.
if the error is real, it indicates
On Thu, Mar 05, 2020 at 04:54:45AM -0800, Rafael Reis wrote:
> Could be and MTU issue. I had trouble with Qubes, VPNs, TOR and PPOE
> connection due to it’s unusual MTU size (lower than 1500). Maybe the
> experts could shed some light into how Qubes deals with MTU across VMs
qubes? not at all.
could you please try to at least spell the name right?
this is giving my inner monk a headache...
On Thu, Mar 05, 2020 at 02:40:18PM +, Mark Fernandes wrote:
> The only thing relevant to this topic in the guide, appears to be the
> information on verifying signatures (which is of course
On Tue, Mar 03, 2020 at 09:43:56AM -0800, Eva Star wrote:
> Get this error. Please, how to fix? Cable is fine. It work on non virtual
> environment on other machine.
> [ 64.124877] usb usb1-port1: Cannot enable. Maybe the USB cable is bad?
this most likely means your device is not supported by
On Tue, Mar 03, 2020 at 12:20:57PM -0800, Eva Star wrote:
> collection ticket:
> > https://github.com/QubesOS/qubes-issues/issues/3778
> Thanks! Yes, exactly this issue. Can I use passthrough mode if I will
> connect external 2.0 usb hub to my current notebook usb port and then
>
On Wed, Feb 26, 2020 at 11:33:32PM -0800, alex.bari...@gmail.com wrote:
> I suggest you explore the options of network shares using
> NFS/SAMBA/FTP/WebDAV/etc - together with passing just that network port to
> the target VM this can be a good solution.
for an out-of-the-box solution, i would
On Fri, Feb 28, 2020 at 09:13:13AM -0800, max Segundo wrote:
> While running 4.19.94.1.pvops.qubes.x86_64 I am able to suspend the system
> but not resume. I can get the desktop to awake from a ps/2 keyboard (but
> not a usb Logitech-Unified) the fan noise etc. starts and sounds like it
>
On Thu, Mar 05, 2020 at 03:30:26PM +, Mark Fernandes wrote:
> So if your computer has been compromised, the methods you suggest may be
if your computer has been compromised to the point where
you dont trust it to verify a signature, you need a new
computer to install qubes on.
once you
On Wed, Feb 26, 2020 at 03:47:34PM +, 'Yiyi50' via qubes-users wrote:
> If you download a new TemplateVM inside an existing Qubes system,
> using "sudo qubes-dom0-update qubes-template-debian-xx" does that
> download have a signature file that needs to be verified with the
> Qubes Master
On Tue, Feb 04, 2020 at 01:21:00PM -0800, galt...@gmail.com wrote:
> bothered with a sys-usb so hopefully my keyboard and mouse won't get
> locked out again.
special move there: disable autostart for sys-usb
that way you can fix your system a lot easier / more convenient if
you manage to break
On Thu, Jan 30, 2020 at 09:59:17PM +, 'Aleksander Okonski' via qubes-users
wrote:
> I rebuilt the arch template today and was able to boot into it with no
> problem. But once I updated 'qubes-vm-gui' (from 4.0.27-9) via the aur
> pkg to 4.1.5-1 I am getting the same issue as before.
yes,
On Thu, Jan 30, 2020 at 10:36:16AM -0800, Rene Galera wrote:
> Can anyone tell me how to install git in dom0
"qubes-dom0-update git"
but...
> so I can install packages.
this is unlikely to work, even with git installed.
depending on _what_ you are trying to install, doing all the "git"
parts
On Sun, Feb 09, 2020 at 02:13:53PM +, 'awokd' via qubes-users wrote:
> https://github.com/Qubes-Community/Contents/blob/master/docs/misc/iaq.adoc#how-can-i-provision-a-vm-with-a-largernon-standard-swap-and-tmp
for "up to 10GB" and on a modern qubes with lvm-pool there is also ...
just start
On Sun, Feb 09, 2020 at 12:49:39PM -, 'Monsieur DuPont' via qubes-users
wrote:
> That looks like a good solution, unfortunately I couldn't find any easy way to
> do it online (I have no experience in Linux terminal kung fu). So any help
> with that regards would be deeply appreciated,
On Tue, Feb 11, 2020 at 11:35:19AM -0600, Sven Semmler wrote:
> Makes me happy I switched to mutt late last year. But that's not really
> a solution for the masses.
mutt in a no-netvm mua-vault?
with fetchmail-vms feeding it through qubesrpc-procmail?
and separate vms for qubesrpc-msmtp for
On Mon, Feb 17, 2020 at 08:16:32AM +, tetrahedra via qubes-users wrote:
> But sshd doesn't appear to be installed on any template, nor does it
> appear to be installable (`dnf search sshd` only returns apache-sshd).
the pkg is called "openssh-server".
after installing it in the template, i
On Mon, Feb 17, 2020 at 10:49:43AM +0100, 'Ase' via qubes-users wrote:
> I am not sure how to properly install telegram-desktop.
> As you may know Telegram desktop is a portable application so would
> you install it in the appVM where it is supposed to run or would you
> install it in a
On Mon, Feb 17, 2020 at 08:59:18AM +, tetrahedra via qubes-users wrote:
> like only debian's `apt-search` will search the binary names, fedora's
> `dnf search` appears not to.
dnf whatprovides sshd
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On Wed, Jan 08, 2020 at 07:39:12AM -0800, gorked wrote:
> My question being, If I purchased an intel based Chromebook with 4 GB RAM,
> and a 16 GB SSD. Could I boot QUBES or other Linux on it.
4GB ram is not enough to use qubes.
8GB ram _might_ work if you were a really experienced qubes
On Wed, Jan 08, 2020 at 06:30:32PM +0100, Vasiliy wrote:
> Are there any security benefits of setting up standalonevm instead of appvm?
dont see any. if anything, it might reduce your security posture.
i consider the volatility of the root volume of a templated appvm
a good thing.
not really a
On Sat, Jan 04, 2020 at 05:48:29AM -0800, gorked wrote:
> Privacy Beast. I suspect that I might brick a Lenovo X230 trying to put
> Core Boot on it. I know the guys at a local computer shop are capable, but
the main "trick" here is to have a solid unbricking strategy.
if you have an
On Sat, Jan 04, 2020 at 03:56:49PM +0530, Anil Eklavya wrote:
> A better way to backup and restore will make Qubes much more usable,
> preferably at some point using something like rsync, as they have
> already been considering. This is one crucial feature that makes it
> difficult for common
On Sat, Jan 04, 2020 at 05:05:01PM +0530, Anil Eklavya wrote:
(please dont TOFU)
> I wasn’t aware of these options. Thanks for pointing out. I will
> certainly try them out.
this is all "some assembly required" stuff, but i will try to describe
a working borg setup with some variations and try
On Sat, Jan 04, 2020 at 09:01:35AM -0800, fiftyfourthparal...@gmail.com wrote:
> Quick question: In terms of security, does it matter if I install and use
> the latest Linux kernel (5.4) or not?
quick answer: not different wrt security.
> the potential instability, if there is any?
quick
> now someone who understands arch needs to add diffutils to the
> pkg-list for the arch builder plugin. :)
correction: someone already did, 5 days ago.
https://github.com/QubesOS/qubes-builder-archlinux/commit/09a435fcc6bdcb19144d198ea20f7a27826c1d80
so it should be fixed for all new arch
On Tue, Dec 31, 2019 at 02:53:57PM -0800, Daniel Sanders wrote:
> So I still don't know the root cause of the issue (why the private.img
> image contains no ext4 filesystem) but I hope it will help its resolution.
"private.img"? *cough*
(this means you are running qubes3 or a qubes4 with a
On Thu, Dec 26, 2019 at 03:01:26PM +, lik...@gmx.de wrote:
> dpkg: error processing archive
> /var/cache/apt/archives/kali-themes_2020.1.0_all.deb (--unpac
> k):
> trying to overwrite '/etc/xdg/Trolltech.conf', which is also in package
> qubes-gui-agent 4.0
feels crude but
On Mon, Jan 06, 2020 at 08:35:07PM +0100, Diederik de Haas wrote:
> On vrijdag 3 januari 2020 03:21:07 CET Andrew David Wong wrote:
> > Qubes 4.0.2 is available on the Downloads page:
> I'm only seeing 4.0.2-rc3, but not the final one on that page.
retracted because a critical kernel bug made it
On Tue, Jan 07, 2020 at 10:42:22AM -0800, paulos elias wrote:
> sys-firewall starts just fine. It just doesn't have internet access.
you mentioned using a very nonstandard network setup earlier.
have you tried just using a plain qubes default network setup?
does that work?
if you "customized"
On Fri, Dec 27, 2019 at 11:51:25AM -0800, John Maher wrote:
> understanding is that the ClockVM, which is usually sys-net, runs ntp and
> and communicates the time to dom0, which communicates the time to all of
> the other VMs.
actualy in qubes4 dom0+appvms "fetch" the time from clockvm,
though
On Sun, Dec 22, 2019 at 02:45:34PM +, Claudia wrote:
> overrides the XFCE Power Manager settings. Xscreensaver is only
> configured to blank the screen; I'm not sure if it even supports
> powering it off. To return control to XFCE, go to Menu > System Tools
it does, and it works (for me).
On Sat, Dec 28, 2019 at 04:42:30PM +, Claudia wrote:
> I think he means he uses his yubikey as an emulated keyboard to type
> his disk password, and probably enabled a USB Qube and now the yubikey
> can't type in early userspace.
oh, thats even easier to work around:
just plug the yubikey
On Sat, Dec 28, 2019 at 08:00:46AM -0800, mastor wrote:
> my USB controller is attached to nothing, but needed for Yubikey login.
> I lost my tty2-credentials (the username), so I'm locked out of the system.
> BIOS changes don't help.
> Is there any way to "free" USB during boot? Or get rid of
On Thu, Mar 05, 2020 at 03:56:55PM +, Mark Fernandes wrote:
> Well that's an idea. But still what if the software you are being 'fed' is
> all tampered software, so that after replacing the computer, as soon as you
> use software, you are compromised again?
> Purchasing a new computer can also
On Thu, Mar 05, 2020 at 05:48:36PM +, 'Ian' via qubes-users wrote:
> I've just started using Qubes and I'm trying to ease transition from
> my current virtualbox based setup by just importing my virtualbox VMs
> as HVMs.
good strategy!
> 1. Resolution above 1920x1080 (the host is 2560x1440,
On Thu, Mar 05, 2020 at 01:21:47PM -0500, Chris Laprise wrote:
> You can also qualify the model somewhat and say that an attacker cannot
> successfully infect all of your (hopefully diverse) computers, so that makes
the diversity bit is important.
and if its mainly about validating a download,
On Wed, Mar 11, 2020 at 10:46:12AM -0700, redpoll...@gmail.com wrote:
> I've downloaded some ubuntu templates with the .rpm extension. I have been
> told by someone that I need to put the rpm file into dom0 and then install
> via cli with dnf etc.
this means you are giving the person who
On Fri, Apr 17, 2020 at 02:53:01PM -0700, Catacombs wrote:
> I would have thought someone could suggest a more trustworthy RNG.
there is no real problem with using the intel RNG.
if it is as part of a proper software RNG setup.
(just dont use anything handpatched by debian devs... *coughs*)
>
On Mon, Apr 20, 2020 at 01:12:20AM -0700, l319...@gmail.com wrote:
> I have tried what Matthew did and you pointed to but I still have dom0 time
> an hour behing from what it supposed to be. Weird as both dom0 timedatectl
> and sys-net vm how same timezone
a) run "qubes-prefs clockvm" in dom0.
On Fri, Apr 17, 2020 at 02:06:19AM -0700, Catacombs wrote:
> It is my understanding that “the “Number Generator” is on the MOBO.
> Could the “Intel Management Engine” be changed to alter the RNG
> to create weakened Encryption?
yes.
> Could the IME be altered to load malware to steal
On Wed, Mar 25, 2020 at 03:12:04PM +0100, GD rub wrote:
> You can't do that on the root filesystem. resize2fs is permissible only if
> the partition is unmounted.
actualy, no, resize2fs works just fine on a mounted filesystem.
> > > Device BootStart End Sectors Size Id Type
> >
On Wed, Mar 25, 2020 at 04:21:29PM +0100, GD rub wrote:
> Device BootStart End Sectors Size Id Type
> /dev/xvda1 *2048 29360127 29358080 14G 83 Linux
> /dev/xvda2 18946048 20969471 2023424 988M 82 Linux swap / Solaris
urgh! be super careful there.
your xvda2 is
On Mon, Apr 27, 2020 at 11:34:30AM +0800, Sandy Harris wrote:
> Can the OS be booted from the network?
short answer: no.
> Can I avoid the problem by booting Qubes-OS from the network?
what problem?
"i dont trust the vendor bios"?
how would running an even more complex untrusted bios solve the
On Sat, Apr 25, 2020 at 06:45:11PM +0200, 'Max Andersen' via qubes-users wrote:
> ert
>
> Hi there,
>
> After upgrades to latest kernel and several other updates, enabling
> sound, I still need support for t
your message looks incomplete/corrupted.
but the most likely answer to your unasked
On Tue, Apr 28, 2020 at 03:26:44PM -0300, Franz wrote:
> > a) check what the actual size is:
> > dom0$ sudo lvs -a | grep yourvmname
> > => whats the size of the yourvm-private volume?
> did it, but there is no unit, so number are difficult to interpreter,
> snapshot enclosed
not
On Sat, Apr 25, 2020 at 05:09:46PM -0700, Harold Smith wrote:
> Hello, I'm getting ready to Intall Qubes onto a machine, I can't find any
> information about TPM settings, apart from that TPM is required.
where did you get that impression?
qubes doesnt use a TPM, much less require one.
> and
On Wed, Apr 29, 2020 at 03:10:48PM -0300, Franz wrote:
> I tried fsck on dom0, but got the enclosed terror screen.
it would have helped if you had tried to fsck the right filesystem:
fsck /dev/qubes_dom0/vm-per-dec-private
and if it is asking for repair a bazillion times, perhaps with
On Fri, May 01, 2020 at 11:19:45AM +0530, Anil wrote:
> system perhaps? Or better, some older version of NUC or other mini PC?
NUCs will not allow you to do anything weird with the firmware,
so no me_cleaner or coreboot or so.
they work reasonably well with qubes.
> I know Purism is selling a
On Sat, May 02, 2020 at 01:23:53AM +0200, Olaf Klinke wrote:
> just lacking the knowledge how different writing to a CD is from
> reading from CD, on the hardware level. Is there more to burning a CD
> than a single block special device?
try attaching it as a USB-device instead of a block device.
On Sat, May 02, 2020 at 03:14:42AM +, 'Zsolt Bicskey' via qubes-users wrote:
> > Set the VLAN correctly?
> yes, as I said if I connect a Windows latptop it works right away
> > Set all parameters necessary to satisfy any port security on the switch?
> Yes, same answer as above
actualy, those
On Fri, May 01, 2020 at 04:33:55PM -0500, Sven Semmler wrote:
> So make sure to remove those from your grub/EFI config before rebooting!
yes, that would be what the second qubesctl call does.
there should be no need for manual config editing during this.
> The USB qube will work anyway but if
On Fri, May 01, 2020 at 10:33:08PM +0200, Olaf Klinke wrote:
> > > and my keyboard / mouse uses sys-usb. I need to have this appVM
> > > running to use the peripheral obviously. But, since the appVM
> > > running, I can't update the templateVM?
if you really _need_ sys-usb (== only
> was really unrisky and straightforward scripting, why did the Qubes OS
> installer not offer this choice, let alone just do it?
a mix of historic reasons and expecting users to do their homework.
without a sys-usb, you can not really use usb devices with qubes.
and _trying_ to use them will
On Sat, May 02, 2020 at 11:01:06PM +0200, Olaf Klinke wrote:
> I presume dom0 did not recognize the drive as a USB device and hence
> refuses to attach as such? `qvm-usb` yields the empty list.
oh right, you just came full circle:
attaching USB devices is not going to work without a usbVM.
>
On Mon, May 04, 2020 at 12:28:27PM -0700, viktor.ransm...@gmail.com wrote:
> If I'd like to remove any old & **unused** Template VMs (e.g. Debian 9,
> Fedora 29, etc.) all I have to do is to start the Qubes Manager, select the
> template I'd like to remove - and - select 'Delete qube' ...
this
On Mon, May 04, 2020 at 09:12:59PM +0200, Ulrich Windl wrote:
> Is it possible to set a flag that makes fsck do a full filesystem
> check on the next boot?
> Havent found one for ext3...
use tune2fs to set the current-mountcount (-C) to something bigger
than the max-mountcount (check with -l,
On Mon, May 04, 2020 at 11:21:18PM +0200, Olaf Klinke wrote:
> Where in the documentation is that stated? The manpage of qvm-device
> does not mention this. The only hint is that all examples of qvm-usb in
> the documentation show sys-usb as backend.
for example in the documentation about usb
On Sun, Apr 26, 2020 at 09:17:10PM +0200, Olaf Klinke wrote:
> it seems that some iptables rules are set on VM boot that redirect port
> 53 requests, but I can't get iptables inside the AppVM to divulge these
those rules should exist in your external netvm (sys-net), and point to
the "real"
On Sun, Apr 26, 2020 at 01:16:42PM -0700, Harold Smith wrote:
> TPM and TXT were listed as required for AEM in the recommended section, so
> i'll disable TXT and TPM, I have vt-x with ept and vt-d and I;ll try again.
you can also just keep them enabled.
you can use the TPM for whatever you
and just to shred that last bit of misinformation the other two
responses skipped ...
On Tue, Apr 28, 2020 at 12:44:38AM +, '[NOTIFICATION]' via qubes-users
wrote:
> It would be great if you opened up QUBES for worldwide editing and
> audit and development.
https://github.com/QubesOS/
On Mon, Apr 27, 2020 at 09:06:41PM -0300, Franz wrote:
> So, it seems that Qubes Manager, Nautilus and df are consistent, telling
> that available space is almost 5GB totally used.
>
> But Qubes VM settings with Private Storage Max Size of 18524 MB is totally
a) check what the actual size is:
On Wed, Apr 29, 2020 at 08:11:37AM -0300, Franz wrote:
> Did it with Fedora 30, but with exactly the same result
> But checking other VMs I am getting the same error on some of them :((
> So this is a widespread problem.
did you try to google your problem?
because at this point it is starting to
On Wed, Apr 22, 2020 at 11:29:30PM +0200, Frédéric Pierret wrote:
whats with the top-posting, eh? :P
> From a brief look, it's due to newer Fedora pulseaudio and our Qubes
> package requires older one. I'll try to fix that soon.
actualy it seems to have been fixed some days ago and is now in
On Sat, May 16, 2020 at 07:25:59PM -0700, sjill...@gmail.com wrote:
> nvme0n1p 953G (hd1)
> nvme0n1p1 1MBIOS boot efi (hd1,1)
this is WAY too small.
make it at least 100M, better 500M or even 1GB.
here a single set of xen+linux+initrd is about 35-40MB, and
in general you
On Mon, May 18, 2020 at 03:33:02AM -0700, TheGardner wrote:
> - Setting the space up to 4096 on sys-firewall > same result
the default download location in udaptevm is /var/lib/qubes/dom0-updates
so with a default appvm layout that is inside the rootfs (or its overlay).
you can check if this is
On Wed, May 06, 2020 at 06:17:58PM +, 'Matt Drez' via qubes-users wrote:
> My problem is that I don't see their individual IP addresses in the
> capture just a NAT'd address of SPS's eth0. I supposed I have to
> create a bridge somehow but that's way beyond my skills.
you are simply sniffing
On Tue, May 05, 2020 at 11:25:53PM +0530, Anil wrote:
> I tried to use a USB keyboard, but of course that won't work in Qubes.
that is not a "of course" qubes thing but your choice / configuration.
you can use a USB keyboard with qubes if you want to, including
for entering luks passphrase.
>
On Tue, May 05, 2020 at 11:36:27PM +0530, Anil wrote:
> By the way, as I write this mail, the keyboarding is again acting up:
> sometimes eating up space, sometimes emitting two for one key press.
> It was working well the whole day.
did you try asking the internet about this problem?
like,
On Wed, May 06, 2020 at 09:31:50PM -0700, viktor.ransm...@gmail.com wrote:
> >> i recommend to keep your one-generation-outdated mainline-template
> >> around (even if it is EOL) if you can spare the diskspace.
> >> if you manage to wreck your new mainline template some way, it is
> >> easier
On Wed, May 06, 2020 at 06:21:00AM +, lamboicarus via qubes-users wrote:
> I am wondering if anyone knows how I might install grub for use with
> an encrypted boot partition, or no boot partition at all. I have
> recently decided to use btrfs, and I have grub working fine. The
> grub2-efi
(please dont top post)
On Sun, May 10, 2020 at 07:51:01PM +0200, jiggermas...@posteo.de wrote:
> Yes, that's what I mean, mixed up terminology there. The pool has now
> 584 GiB, before the reinstall it had around 670 GiB - I am wondering
> where that additional 84 GiB ended up (and I need it,
On Sun, May 10, 2020 at 05:12:04PM +0200, jiggermas...@posteo.de wrote:
> The partition size for the LVM correctly shows about 700 GiB, but the
> root storage then only gets 584, and I am not able to set it higher.
the root partition is just the root partition for dom0.
if you want to see how
On Sun, May 10, 2020 at 08:21:03PM +0200, jiggermas...@posteo.de wrote:
> [user@dom0 ~]$ sudo vgs
> VG #PV #LV #SN Attr VSize VFree
> qubes_dom0 1 168 0 wz--n- 701.28g 100.00g
this means the VG is already the right size.
for resizing the pool, google "how to resize an lvm
On Sun, May 10, 2020 at 06:00:49PM -0700, Catacombs wrote:
> am trying to find a USB Wireless Dongle which comes pre installed in
> the Kernel. But.
there is only exactly _one_ wifi usb dongle that is documented to
work with qvm-usb (aka linux usbip) _and_ has a driver included
in mainline
On Mon, May 11, 2020 at 01:48:58AM -0700, matteochicarella...@gmail.com wrote:
> Firstly, is it safe to have Windows and Qubes on the same machine? I
> use VeraCrypt for full disc encryption
veracrypt does not support actual full disc encryption.
> Also, I've got a 2TB external HDD, would it
> > stderr: “qubes-prefs:error: “No such domain:\’fedora-30\””
this indicates you do not have a fedora-30 template.
did you deselect templates during install?
you need at least one usable template, and in general for a q4.0.3
install that means fedora-30.
(and the first thing you should do
On Sat, May 16, 2020 at 06:22:20AM -0700, sarru1...@gmail.com wrote:
> > you need at least one usable template, and in general for a q4.0.3
> > install that means fedora-30.
> but I'm not able to connect to the internet. It's not showing sys-net,
> nothing. How can I troubleshoot for an
On Mon, May 18, 2020 at 02:38:34PM -0700, TheGardner wrote:
> [user@sys-firewall ~]$ df -h /var/lib/qubes/dom0-updates
> /dev/xvda3 9.6G 8.7G 450M 96% /
> sudo mkfs.ext4 /dev/xvdc3
> sudo mount /dev/xvdc3 /var/lib/qubes/dom0-updates
> Do I have to change (back) somethings, after I
On Tue, May 19, 2020 at 11:14:45AM +0200, haaber wrote:
> Hello there, I was thinking about the usefulness of a qvm-print command
> that takes an input file, sends it to the "printing-VM" (defined in some
> config file), and launches there a document viewer (defined in the
> config file) in order
On Thu, May 14, 2020 at 06:06:43AM -0700, sairus@gmail.com wrote:
> Does anyone have an idea what is wrong and how to fix it?
"dom0:mmcblk0" and "usb storage" doesnt match up too well.
on this computer the dom0:mmcblk0 is a pci device entirely unrelated
to anything USB.
check what kind of
On Thu, May 14, 2020 at 06:56:56PM +0200, onelovecisco via qubes-users wrote:
> In PHV mode like Fedora-31 or Debian-10.
> Is the Qubes-builder capable of this?
qubes-builder most certainly can not build bsd templates.
but like almost any PC OS, you can install it in hvm mode,
and that should
On Thu, May 07, 2020 at 08:30:14AM -0300, Franz wrote:
> I installed into Fedora 31 template a proprietary banking rpm
> application/plugin/extension which is supposed to work with the browsers
> during banking tasks. This is called warsaw_setup_fedora_64.rpm
this sounds like a terrible idea
sm1> Qubes uses Salt, and there's something nasty going around:
sm1> https://saltexploit.com/
sm2> to be used "by hand only" we could enforce risk = 0 by the above formula
sm2> and keeping fingers off salt for a while. Thanks!
sm3> There was today an update for all templates related to the
On Wed, Mar 18, 2020 at 11:56:31AM -0300, Franz wrote:
> When a laptop is always connected to power, e very good behavior to
> strongly prolong battery life is to avoid charging it to 100% and limiting
> it to lower threshold, perhaps 80%.
i am using a (perl) script for doing this on my qubes
On Fri, Mar 20, 2020 at 11:07:55PM +, 'jrsrrs33' via qubes-users wrote:
> to understandif my computer is compatible or not and in this case,
> what should I install? qubes 3.2 or qubes 4.0.3?
do not use qubes 3.x ... it has been deprecated for a long time now.
please do use qubes 4.0.3 ...
On Sun, Mar 22, 2020 at 11:57:38AM +0100, haaber wrote:
> > Assuming you didn't make backups before the crash: You need to have a
> > running Qubes system to backup VMs the normal way.
> Does that mean Chris, that in case of a disaster, there is no way to
> backup your data "by hand" (booting a
On Sun, Mar 22, 2020 at 05:07:44AM -0700, max via qubes-users wrote:
> [max@dom0 ~]$ sudo qubes-dom0-update
> --enablerepo=qubes-dom0-current-testing qubes-template-fedora-31
wrong repo.
try with --enablerepo=qubes-templates-itl-testing
--
You received this message because you are subscribed
On Mon, Mar 23, 2020 at 05:48:29AM -0700, peebl...@gmail.com wrote:
> asking me in which VM i want to open the file.. So it seems the command
> line parameter for VM is not taken into account..
it probably is, but you need to authorize it anyways: security.
> How can I fix this?
On Sat, Mar 07, 2020 at 03:08:13PM -0800, A wrote:
> Is it possible to get an app like WinAuth for Linux or what do you use
> for 2 step verification ?
https://www.qubes-os.org/doc/multifactor-authentication/
--
You received this message because you are subscribed to the Google Groups
On Wed, May 06, 2020 at 12:02:55PM +0200, haaber wrote:
> > https://labs.f-secure.com/advisories/saltstack-authorization-bypass
> Thanks for the source. How do you infer that this "doesn't apply" (and
> maybe "did never apply") to qubes? Recall my question: where does salt
the vulnerabilities
1 - 100 of 135 matches
Mail list logo