On 25/02/17 02:33, Oleg Artemiev wrote:
Say I've one enrypted swap and one not from other linux.
Would Qubes ignore unencrupted swap from other distribution or I should
make it to? If so - how do I?
as far as i understand it, swap is a partition with the file-system swap and
mounted as swap.
On 25/02/17 04:14, Oleg Artemiev wrote:
Hi.
If I want to run VMs from one Qubes in another
why would you even dualboot two qubesversions?
would it be possible to
have different coloring for the same VM in different Qubes OS instances?
here the questions is, what files you would share?
i am
hi.
i want to install terminator in my vm.
since the terminator package does not install everything correctly (pycairo is
not installed), i need to install pycairo manually.
but this does not work, since dnf somehow ties to install a different package...
$ sudo dnf install pycairo
Package qubes
hi.
if i use templates based on fedora minimal, the start menu entries only have a
lock as an icon.
vms based on the normal fedora template have icons.
how can i get icons for my fedora minimal vms?
- john
--
You received this message because you are subscribed to the Google Groups
"qubes-users
hi.
when configuring minions with salt, you sometimes need some config files (e.g.
wifi config stored in /rw/config/NM-system-connections/, ssh credentials, etc).
you have to get this data from somewhere and distribute it via salt.
there are multiple possibilities:
1)
creating some config-vm (it
On 13/02/17 01:31, Keld Norman wrote:
Hi community :)
I ran this on a standalone debian 8 appvm
apt-get purge python-numpy
Yes, I now know that is not the most cleaver command to run..
It resulted in the following packages got removed:
python-numpy python-qwt4-qt4 qubes-core-agent gimp gpsd-cl
hi.
i wrote some custom salt module and use it for rendering in my top-file.
everything works great as long as i am only in dom0.
as soon as my stuff is run in domU (or rather its management-vm) i get errors:
when rendering:
/var/tmp/.root_62a99a_salt/running_data/var/cache/salt/minion/files/base
On 10/02/17 11:53, '0xDEADBEEF00' via qubes-users wrote:
Interesting topic...
I would like to here more about how people handle this.
On my side, I'would never work on sensitive information in such a situation.
To make just some surfing in public place, my laptop is installed with a
standard w
Unman can you make a template rpm Ubuntu and put it on
https://ftp.qubes-os.org/repo/yum/r3.2/templates-community/rpm/ ?:)
i also would prefer this option, but it seems it is not possible due to legal
issues.
see: https://www.qubes-os.org/doc/templates/ubuntu/
maybe we could convince canonica
On 07/02/17 14:09, haaber wrote:
Hello, I wonder how you behave when traveling, for example in places
with cameras all around. I feel uncomfortable to enter my passwords in
such situations. Of course I can simply not turn my computer on. But
sometimes you have several hours in an airport .. I
On 07/02/17 00:01, Joe Ruether wrote:
Hello! I am using Qubes 3.2 and I am attempting to automate the configuration
of my VMs using the Salt / qubesctl management stack.
I am very new to salt, but I have been experimenting and I think I understand
how it works. I have written some state files
On 05/02/17 23:59, john.david.r.smith wrote:
On 05/02/17 00:06, Oleg Artemiev wrote:
Hi.
On Wed, Feb 1, 2017 at 11:56 PM, john.david.r.smith
wrote:
On 01/02/17 21:30, qu...@posteo.de wrote:
I have now nearly a complete salt configuration for all my templates so I
do not need to backup them
On 05/02/17 00:06, Oleg Artemiev wrote:
Hi.
On Wed, Feb 1, 2017 at 11:56 PM, john.david.r.smith
wrote:
On 01/02/17 21:30, qu...@posteo.de wrote:
I have now nearly a complete salt configuration for all my templates so I
do not need to backup them anymore and save a lot of space by this.
So I
On 04/02/17 18:42, Loren Rogers wrote:
Hi all,
I'm confused about running disposable VMs - if I open a browser or file viewer,
then want to open a terminal for the same VM, how could I do this? (E.g. I want
to view an untrusted file, then make some edits.)
right click the dispvm in the qubes
hi.
when using salt to install templates, i came across this error:
Sending application list and icons to dom0
Complete!
The downloaded packages were saved in cache until the next successful
transaction.
You can remove cached packages by executing 'dnf clean packages'.
qfile-agent: Fatal error:
On 03/02/17 17:44, Unman wrote:
On Fri, Feb 03, 2017 at 05:03:57PM +0100, john.david.r.smith wrote:
hi.
is there some way to launch a dispvm from dom0 and execute a command (just like
`qvm-run --dispvm` in domu) or do i need to create a temporary vm?
-john
Yes -
echo xterm |/usr/lib/qubes
hi.
is there some way to launch a dispvm from dom0 and execute a command (just like
`qvm-run --dispvm` in domu) or do i need to create a temporary vm?
-john
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
On 01/02/17 21:30, qu...@posteo.de wrote:
Hi,
I have now nearly a complete salt configuration for all my templates so I do
not need to backup them anymore and save a lot of space by this.
So I have ran a backup including dom0 and realized that the salt configuration
("/srv/salt") does not see
On 31/01/17 22:24, mojosam wrote:
it does protect you from user errors. e.g.:
you have some malicious pdf in a vm.
if you have noting to open the pdf, you can't accidentally open it and corrupt
your vm.
Isn't that the concept behind "attack surface"? If the code is there,
something malicious
On 31/01/17 19:38, ulabunga wrote:
My Setup
proxy vm + airvpn in network manager ,TCP-53
-> appvm x
importing airvpn VPN configuration files (TCP-53) in my proxy vm network manager
and select this 'AirVpn' proxyvm in my netvm settings
for all my fedora/debain appvm's.
Is there any better mor
Since this is in my regular Fedora 24 template, won't this codebase be included
in every app VM I run, whether I'm running PlayOnLinux in that app VM or not?
yes
Presumably none of that code would be running,
so there should be no problem (at least i can't see any problems)
but it would
Spoofing your MAC is usefull in networks which are not under your
control (hotspots, school, work, …).
Then, from that network point of view, your computer won't identify
itself with your mac address that is closely tied to your computer hardware.
of course this is useless, if you have a login
On 20/01/17 14:13, john.david.r.smith wrote:
On 20/01/17 13:18, qu...@posteo.de wrote:
Hi John,
On 20.01.2017 10:26, john.david.r.smith wrote:
looks like my problem i posted here:
https://groups.google.com/d/msg/qubes-users/C1tJV4Ykgr8/5H09IT06CQAJ
i did not try it again since i had this
Did you really need tinyproxy in the target template? It should be
needed only in your netvm... Or are you saying that tinyproxy
was missing in your netvm?
it was red in my fed24 minimal journalctl.
after i installed it, it went away (currently most things i am doing are
kind of blind sinc
i am currently looking whether i can do the same in a top file (but i doubt
it, since there is no templating in top files)
And the last sentence is exactly the reason why it's tricky to have it
in one place.
well it seems we were totally wrong.
you can put jinja code in your top file.
i alrea
On 20/01/17 13:18, qu...@posteo.de wrote:
Hi John,
On 20.01.2017 10:26, john.david.r.smith wrote:
looks like my problem i posted here:
https://groups.google.com/d/msg/qubes-users/C1tJV4Ykgr8/5H09IT06CQAJ
i did not try it again since i had this problem.
missing in min are sudo and file (but
On 20/01/17 09:58, qu...@posteo.de wrote:
Hi,
I am trying to setup all VMs with Salt since the switch to Fedora 24.
I usually took the minimal template and create the others on base of
this with more packages.
The problem is that the Qubes salt documentation does not document what
the minimal
1)
even when some states fail for some vm, the cli tool displays ok. it would
be better, if it displayed error in case of an error (some errors are
displayed).
Can you provide example error which wasn't detected? Regardless of the
result, output is logged to /var/log/qubes/mgmt-*.log in dom0.
hi.
i played around with salt and noticed a few things/ have some questions:
1)
even when some states fail for some vm, the cli tool displays ok. it
would be better, if it displayed error in case of an error (some errors
are displayed).
2)
what happens if i have not enough memory to start a man
hi.
two questions about qvm-ls
1)
qvm-ls displays ip, ip back an gateway/DNS.
what is ip back?
2)
how does the --raw-data flag work?
can someone post an example?
i tried things like
qvm-ls --raw-data ip sys-tor
but i always end up with a traceback of qvm-ls ('line 225
fields[f]["max_width"] = len
hi.
when looking at the policy permissions in '/etc/qubes-rpc/policy' i
noticed the only line 'qubes.USB' contains is:
$anyvm $anyvm deny
why is that line there?
as far as i understood it has no effect as any other declaration of the
form:
$anyvm deny
since deny is the default action and thi
On 11/01/17 18:37, 'Repairing' via qubes-users wrote:
There's no problem to connect to the internet with domains:
anon-whonix
personal
untrusted
But i need to connect through templates:
fedora
debian
There's no connection, white blank screen when i use firefox, how i can connect
to the firefox
On 06/01/17 13:15, Opal Raava wrote:
Hi all,
Since about a week or so, I'm unable to update dom0 the way I used to. The VM
Manager will tell me there are updates available for Dom0, and when I click
'Update VM' I see the familiar 'downloading updates' but after that the window
with the update
On 02/01/17 15:34, Jarle Thorsen wrote:
As there is currently no audio support for Windows in Qubes OS:
Can I use any of the Qubes windows tools to copy a video file to a Linux vm and
have it start playing there?
The file should only be copied to a temp directory, and not put in
QubesIncommin
if offloading is done for isos: ship the master key with qubes and
provide a convenience command to the user. this command should
download (e.g. via torrent) and verify the image (a step the user
can'd do wrong anymore). this command could spawn a dispvm,
install torrent software, load the torren
the problem is (as you wrote) 'supposed to be verified out-of-band'.
for some less technical people, even verifying the signature is a huge
step.
i am a fan of providing easy accessible security and using already
existing infrastructure. (in case of the dom0 repo, an ultimately
trusted source).
I
this may be a source of errors for some users, or even insecure
(mitm + exchanging the master signing key information on the
website + patching the downloaded image).
I know what you mean, but it's worth remembering that the Qubes Master
Signing Key fingerprint is supposed to be verified
out-o
currently when i have qubes and need a new image (e.g. to
reinstall/install on a new machine), i need to download the image from
qubes-os.org and then check the signature.
this may be a source of errors for some users, or even insecure
(mitm + exchanging the master signing key information on th
I have already tried that, and it fails with "Failed to set time zone: Unit
systemd-timedated.service is masked".
I just tried it and it works for me (it even updates the time instantly).
did you change stuff in dom0?
--
You received this message because you are subscribed to the Google Gr
hi.
currently i am configuring salt to create and configure all my vms.
my target is to have only a minimal set of vms i need to backup (vault,
config, data, custom systemd based services for my vms) and a set of
salt files to create my whole setup.
creating vms and installing software works.
On 18/12/16 23:04, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Dec 18, 2016 at 10:47:36PM +, john.david.r.smith wrote:
hi.
currently i am trying to configure salt to create and setup all my templates
and vms.
i managed to create the vms and do
hi.
currently i am trying to configure salt to create and setup all my
templates and vms.
i managed to create the vms and do the config in dom0.
then i tried to install software in my template-vms, but this failed.
my top:
base:
tmp-salt: #this is a template (a clone of fedora-23)
- q
On 25/07/16 22:17, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Jul 25, 2016 at 10:06:56PM +0200, john.david.r.smith wrote:
On 25/07/16 21:56, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Jul 25, 2016
On 25/07/16 21:56, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Jul 25, 2016 at 09:11:03PM +0200, john.david.r.smith wrote:
hi.
i want to install windows 8 in an hvm (so i can update it).
but somehow i can't start the vm with an iso. (see o
hi.
i want to install windows 8 in an hvm (so i can update it).
but somehow i can't start the vm with an iso. (see output below)
[user@dom0 ~]$ qvm-start w8 --cdrom=data:/home/user/w8.iso
--> Loading the VM (type = HVM)...
Traceback (most recent call last):
File "/usr/bin/qvm-start", line 131,
hi.
i want to play some linux games through steam in a appvm (based on debian).
when starting steam i get this error:
"OpenGL GLX extension not supported by display"
i guess this is the case, since i did not pass any GPU to the vm.
So i tried passing my nvidia gt 740m. If i set up its device to
i never tried, but you can pass your pci devices to an appvm (e.g. your
gpu).
https://www.qubes-os.org/doc/assigning-devices/
frameworks will often allow you to use your cpu in case you have no gpu.
as long as your models are small enough you can train that on cpu. (but
training a big nn (neuro
47 matches
Mail list logo