Re: [qubes-users] Anyone gotten bitcoind to install via snapcraft on an AppVM?

2020-03-03 Thread qubenix
s appear to be > here: > https://github.com/qubenix/qubes-whonix-bitcoin > > Comments for qubenix: > - Some systems have limited disk space (e.g SSDs) so it may make sense   > to run a pruned node That's true, but using a pruned bitcoind will limit its usefulness as a backend f

Re: [qubes-users] wasabi in qubes

2019-06-26 Thread qubenix
t, then create an AppVM based on > it networked to sys-whonix. > Don't need to install in a template. Just run a release in an AppVM. -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20 EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 IRC OTR: DFD1DA35 D74E775B 3E3DADB1

Re: [qubes-users] Announcement: Qubes Tor onion services will no longer be maintained

2019-03-25 Thread qubenix
honix-next-gen-tor-onion-services/ > > This announcement is also available on the Qubes website: > https://www.qubes-os.org/news/2019/03/24/tor-onion-services-no-longer-maintained/ > > Wow, very sad. May I ask why so many extra resources are needed? Can't you just install

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-25 Thread qubenix
OGBaby: > Hey Qubenix, I have an update for you and anyone curious. The MDB_BAD_TXN > error has been resolved. For anyone wondering this error most likely mean > your blockchain was interrupted during sync and is now corrupt. > > The solution advised by Monero channe

Re: [qubes-users] Re: How risky is GPU pass-through?

2018-12-25 Thread qubenix
eature exists in practice > ;) Search back for the details. > > I can't speak to the security risk from personal experience or knowledge, but I found this: https://security.stackexchange.com/questions/162122/gpu-passthrough-security/162175. - -- qubenix CODE PGP:

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread qubenix
ew issue or you are out of space again (I think I remember seeing that in one of your original mails iirc). Either way it's not specific to your setup or to Qubes. Best to check on Monero channels (reddit, irc, etc). -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E9

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread qubenix
Is this normal behavior? > As I said, don't run the daemon from the command line. `systemd` is handling it already. -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20 EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765 --

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-16 Thread qubenix
is a bit scattered however I completely understand if you'd rather point me some links or resource instead. Any more guidance is appreciated. > Try here for further reading: https://ww.getmonero.org/resources/user-guides/. -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20 EMAIL PG

Re: [qubes-users] alternative to bloated templates for faster work and minimal boot time/resources used

2018-12-12 Thread qubenix
e header (untested). -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20 EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765 -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-11 Thread qubenix
OGBaby: > Thanks Qubenix, > > Wouldn't a fully synced daemon mean the blockchain is downloaded onto disk? I > was under the impression a benefit to remote node over local was to entirely > avoid downloading the blockchain. > > With the bootstrap-daemon address attempti

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-10 Thread qubenix
OGBaby: > On Monday, December 10, 2018 at 5:16:01 PM UTC-6, qubenix wrote: >> The best thing for you to do is: >> >> 1. Start the daemon's AppVM fresh. >> 2. In a terminal on the daemon's vm do: `sudo tail -f >> /home/monerod/.bitmonero/bitmonero.log`. >&

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-10 Thread qubenix
OGBaby: > Greatly appreciate your help Qubenix. > > I can confirm my systemd file (/lib/systemd/system/monerod-mainnet.service) > matches yours now. I have removed the following to do so: > > ConditonPathExists=/var/run/qubes-service/monerod-mainnet > After=

Re: [qubes-users] Qrexec - Monero-Wallet-WS connection via Monerod-WS (Daemon)

2018-12-10 Thread qubenix
nything besides the daemon vm. [1]: https://github.com/monero-project/monero/issues/4468#issuecomment-429671939 -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20 EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765 -- You received this

Re: [qubes-users] Re: Donation costs

2018-11-24 Thread qubenix
eresting. > > > Achim Patzner > Good response to this flawed, ignorant study: https://twitter.com/nic__carter/status/1056976815032582144. -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20 EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 IRC OTR: DFD1DA35 D74E775B 3E3DA

Re: [qubes-users] how do I check Tor & Whonix version?

2018-11-01 Thread qubenix
r version. For that you have to run `tor --version` from the gateway. You could also just do `cat /etc/whonix_version` from the workstation or gateway for your Whonix version. I mention it because whonixcheck produces output you don't need. -- qubenix CODE PGP: FE7454228594B4DDD034CE

Re: [qubes-users] Two VPN questions and one Qube Manager question.

2018-11-01 Thread qubenix
ind of basic load-balancing measure. -- qubenix CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20 EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765 -- You received this message because you are subscribed to the Google Groups "qubes-u

Re: [qubes-users] My farewell to Qubes OS!

2018-10-25 Thread qubenix
th, 2009. > Thank you for all your contributions. Your standards for security and best practices have been an inspiration to me. I wish you the best of luck and success in the future. -- qubenix PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 OTR: qube...@chat.freenode.net OTR: DFD1DA35 D74

Re: [qubes-users] Autostart fedora keychain service in a qube?

2018-10-23 Thread qubenix
, that's very annoying. > > I checked the group and have not found anything helpful here. I don't think > that this is a too uncommon problem? Any suggestions on how to solve it? > > Thanks a lot! > > Best regards, > Bjoern > Off the top of my head: set ke

Re: [qubes-users] firefox plugins on disp templates?

2018-10-19 Thread qubenix
a way to have addons in a browser in a dispappvm and avoid > this issue? > This should help you: https://www.qubes-os.org/doc/dispvm-customization/. -- qubenix PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 OTR: qube...@chat.freenode.net OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765 --

Re: [qubes-users] Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-10-15 Thread qubenix
't matter, only with systemd needs it) is the best experience I've had with it on Whonix in years. -- qubenix PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 OTR: qube...@chat.freenode.net OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765 -- You received this message because you are subscribed to t

Re: [qubes-users] Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-10-14 Thread qubenix
qubenix: > mk: >> One last thing, >> >> It should be noted that I still had to remove option >> "--p2p-bind-ip=127.0.0.1" to let monerod bind on 0.0.0.0 to make it work. >> >> Any security implication about this ? Does all traffic is still ro

Re: [qubes-users] Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-10-14 Thread qubenix
when using Whonix gateway or binding p2p ip to 0.0.0.0 if not using a Whonix gateway. Next I started to experience stalls, which I still haven't found a solution for yet. [1] https://github.com/monero-project/monero/issues/4468 [2] https://github.com/monero-project/monero/issues/4469 -- qubenix P

Re: [qubes-users] Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-10-14 Thread qubenix
mk: > qubenix, > > I thought I had to run a full node to be synced with main blockchain but I > now understand that running a local node is enough > > So everything works as expected, > > Thanks for you answer and clarification :) > It's still a full node bec

Re: [qubes-users] Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-10-14 Thread qubenix
want to use sys-firewall you'll have to remove the p2p-bind-ip=127.0.0.1 from the /lib/systemd/system/monerod.service file on the TemplateVM. You will probably also have to allow the port forward on your home router somehow. -- qubenix PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 OTR: qube...@chat

Re: [qubes-users] Problems with split PGP (QUBES_GPG_DOMAIN) in 4.0 + fedora 28

2018-10-07 Thread qubenix
.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 > Thunderbird/60.0 > OS Linux 4.14.67-1.pvops.qubes.x86_64 > > > Not sure why Enigmail is not recognizing the env var, but you could put your gpg domain into the file /rw/config/gpg-split-domain as a workaround. I use this method wit

Re: [qubes-users] Signal installation returns gpg: no valid OpenPGP data found.

2018-09-25 Thread qubenix
is: curl -s https://updates.signal.org/desktop/apt/keys.asc | sudo apt-key add - This should work as expected, I just tested it. -- qubenix PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 OTR: qube...@chat.freenode.net OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765 -- You received this me

Re: [qubes-users] Re: whonix-ws-14 apt-get autoremove broke the template

2018-09-18 Thread qubenix
the upgrade, and switched to `stretch-proposed-updates` repo. Don't forget you can always use `qvm-volume` to revert your template changes (as long as you haven't restarted the vm since breaking it) instead of reinstalling. See `qvm-volume --help` for details. -- qubenix PGP: 96096E4CA0870F1C5B

[qubes-users] how can i patch xen?

2018-09-15 Thread qubenix
Hello all. I'm attempting to build a custom Qubes with one patch added to Xen. Is it enough to simply add the patch with the others in qubes-builder/qubes-src/vmm-xen/, add a line for it in qubes-builder/qubes-src/vmm-xen/xen.spec.in, and then build? -- qubenix PGP

[qubes-users] HCL - MSI MS-7980 (update)

2018-09-10 Thread qubenix
to the following keys: Andrew - BBAF910D1BC9DDF41043629FBC211FCEE9C54C53 Joanna - 49A322D9CA0D1D7DAEFA2AC63393D8BF0DDC6718 Marek - 86BA6E93318FBA446642A90ADB8FD31CCAD7D72C -- qubenix PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54 -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Re: why Whonix and not Tails or the anon-vm?

2018-05-17 Thread qubenix
e https://www.qubes-os.org/doc/tails/. >> >> > technically this is a whonix question, I would suggest  posting there : > > https://forums.whonix.org/ > > or read their docs a bit 1st, then  patrick and crew  respond to most > posts . >

Re: [qubes-users] opening links in another VM opens two browsers

2018-05-12 Thread qubenix
awokd: > On Fri, May 11, 2018 2:56 am, qubenix wrote: >> Hey everyone! Hope you are all doing well. >> >> I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/ >> so links clicked in one debian-9 AppVM will open in separate debian-9 >> AppVM. Wha

[qubes-users] opening links in another VM opens two browsers

2018-05-10 Thread qubenix
, everything works as expected. The link opens a new tab in the proper AppVM. However, if firefox is not currently running, a clicked link will open the link in a browser in both VMs. Any ideas? -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you

Re: [qubes-users] Ledger Nano S

2018-05-02 Thread qubenix
llet.com/hc/en-us/articles/115005165269-What-to-do-if-my-Ledger-Nano-S-is-not-recognized-on-Windows-and-or-Linux- -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscri

Re: [qubes-users] Re: Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-04-21 Thread qubenix
qubenix: > pauHana: >> After completing the to VM setups and shutting them down is the intention >> then to start monero-wallet-ws and interact with the wallet thru this vm as >> per the usual ./monero-wallet-cli? >> > > Correct. You should be able to run the gu

Re: [qubes-users] Re: Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-04-21 Thread qubenix
ut I haven't tried it myself. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubs

Re: [qubes-users] Best pratice for crypto-currency wallets?

2018-04-07 Thread qubenix
M and use qrexec to forward the needed ports from your daemon. Here's a guide for doing it with monero: https://getmonero.org/resources/user-guides/cli_wallet_daemon_isolation_qubes_whonix.html. The same basic procedure can be used for most crypto wallets. -- qubenix GPG: B536812904D455B491DCDCDD0

Re: [qubes-users] Re: unexpected system restart

2018-04-02 Thread qubenix
cooloutac: > On Monday, April 2, 2018 at 12:31:09 PM UTC-4, qubenix wrote: >> Hello all. I'm currently still on R3.2. >> >> I had a situation where I was working with a normal (for me) amount of >> VMs running. Nothing even close to extreme as far as cpu/mem/io/temp. &g

[qubes-users] unexpected system restart

2018-04-02 Thread qubenix
on screen, connected with hdmi) and then right into a restart. How can I debug this in a useful way? Does someone have an idea what might cause it? -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qub

[qubes-users] Re: [qubes-devel] Re: [qubes-announce] QSB #38: Qrexec policy bypass and possible information leak

2018-02-21 Thread qubenix
> So let me be blunt as this is likely the last email from me to qubes anyway; Bye, I'm happy to see you go away finally. It was killing me inside that you were working on the new gui controller. Fuck off back to bcash. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You recei

[qubes-users] Intel igd: boot freezes on kernels 4.9.5+

2017-11-10 Thread qubenix
d save the gpu for passthrough. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...

Re: [qubes-users] Re: Audio in Debian VMs just disappeared?

2017-10-18 Thread qubenix
another Debian stretch template audio is normal. The pulse packages there are: $ sudo dpkg -l | grep pulse ii gstreamer1.0-pulseaudio:amd64 1.10.4-1 amd64GStreamer plugin for PulseAudio ii libpulse-mainloop-glib0:amd64 10.0-1+deb9u1 amd64PulseAudio clie

Re: [qubes-users] Re: Keepass vault password no worky

2017-07-19 Thread qubenix
yreb-qusw: > On 07/19/2017 05:53 AM, qubenix wrote: >> qubester: >>> On 07/18/2017 02:27 PM, '0brand' via qubes-users wrote: >>>> I've been trying to resolve a problem with both of my Debian-8 >>>> vault-appvms.. For some reason my Keepass passwords no lon

Re: [qubes-users] Bitcoin Node on appVM

2017-07-19 Thread qubenix
sniffer or dumping traffic. > > Start at the outmost node, and work inwards. At the point where you dont > see traffic you know the problem lies one hop upstream, (unless it > doesn't get to the router obviously). > > If you see the traffic inbound at the destination qube, then it'

Re: [qubes-users] Re: Keepass vault password no worky

2017-07-19 Thread qubenix
interface to KeePassX password manager databases libfile-keepass-perl - interface to KeePass V1 and V2 database files I ask because I have been using keepassx for three or four years with only two databases. I keep multiple copies on different storage devices and I have had only one copy ever become cor

Re: [qubes-users] Copying between VMs from dom0

2017-06-28 Thread qubenix
wordswithn...@gmail.com: > On Wednesday, June 28, 2017 at 10:07:04 AM UTC-4, qubenix wrote: >> qubenix: >>> wordswithn...@gmail.com: >>>> I want to copy network connection profiles from sys-net to >>>> sys-net-profiles as my computer shuts down. &g

Re: [qubes-users] Copying between VMs from dom0

2017-06-28 Thread qubenix
qubenix: > wordswithn...@gmail.com: >> I want to copy network connection profiles from sys-net to sys-net-profiles >> as my computer shuts down. >> >> I'm creating a bash script in dom0 to help with this. >> >> I could use >> >> qvm-run -ap sys

Re: [qubes-users] Copying between VMs from dom0

2017-06-28 Thread qubenix
sys-net "ls /etc/NetworkManager/system-connections/"); do qvm-run -a -p -u root "cat /etc/NetworkManager/system-connections/$i" > $i; qvm-move-to-vm sys-net-profiles $i; done -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message becaus

[qubes-users] Can't install windows-tools, following docs.

2017-06-25 Thread qubenix
: Variable: WixBundleVersion = 3.2.2.3 [0AA0:0AA4][2017-06-25T18:17:24]i007: Exit code: 0x1, restarting: No ``` -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from

Re: [qubes-users] Re: Xen high CPU usage, but nothing is running in the VM

2017-06-18 Thread qubenix
razy in a Debian vm with intense I/O and CPU. Kswapd persisted to rock the cpu even after all the software was done, for about 10 minutes, until I shutdown the vm. Seems to be a rare condition though because I experience it only 1/50 times with this vm. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E6

[qubes-users] HCL MSI Mobo, Intel CPU

2017-06-13 Thread qubenix
next boot applet was there. --- Attached are the reports. Support report is encrypted to Qubes Devs: ADW, JR, and MM. Thank you to all devs and everyone on this list. My favorite host OS and a very helpful community. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received th

Re: [qubes-users] Anyone got a intel z270 motherboard to work with Qube os

2017-06-12 Thread qubenix
carrefamilyhomes...@gmail.com: > On Saturday, June 10, 2017 at 8:35:52 PM UTC-4, qubenix wrote: >> carr...@gmail.com: >>> Hi, >>> >>> My motherboard broke and I need to rebuild my computer. I am looking to get >>> something that will last for

Re: [qubes-users] Re: "root=/dev/mapper/dmroot crashed"

2017-05-18 Thread qubenix
ng this error from my usb vm on startup. It has a Fedora24 template. The template is untouched from initial Qubes install, aside from updates via qubes-vm-r3.2-current-testing repo. For me the issue just started today for no obvious reason. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E50

[qubes-users] Onion site stuck in redirect loop

2017-05-09 Thread qubenix
his page (maybe more?): http://qubesos4z6n4.onion/doc/firewall/ gets stuck in a redirection loop. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from

Re: [qubes-users] Re: for people using MAC randomization (debian 9 tmpl): you might want to avoid hostname leaks via DHCP too

2017-04-15 Thread qubenix
Reg Tiangha: > On 04/15/2017 01:06 PM, qubenix wrote: >> peter...@hushmail.com: >>> Is there a script to randomize hostname on each boot? >>> >> I think blank hostname is better than randomized. How would it be >> randomized: dictionary words, rng

Re: [qubes-users] for people using MAC randomization (debian 9 tmpl): you might want to avoid hostname leaks via DHCP too

2017-04-15 Thread qubenix
han blank. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To

Re: [qubes-users] for people using MAC randomization (debian 9 tmpl): you might want to avoid hostname leaks via DHCP too

2017-04-12 Thread qubenix
cooloutac: > On Wednesday, April 12, 2017 at 10:55:08 AM UTC-4, qubenix wrote: >> Unman: >>> On Tue, Apr 11, 2017 at 06:20:38AM -0700, Dominique St-Pierre Boucher wrote: >>>> On Monday, April 10, 2017 at 5:06:30 PM UTC-4, qubenix wrote: >>>>> qubenix:

Re: [qubes-users] for people using MAC randomization (debian 9 tmpl): you might want to avoid hostname leaks via DHCP too

2017-04-12 Thread qubenix
Unman: > On Tue, Apr 11, 2017 at 06:20:38AM -0700, Dominique St-Pierre Boucher wrote: >> On Monday, April 10, 2017 at 5:06:30 PM UTC-4, qubenix wrote: >>> qubenix: >>>> Andrew David Wong: >>>>> On 2017-04-09 15:25, Joonas Lehtonen wrote: >>>&

Re: [qubes-users] for people using MAC randomization (debian 9 tmpl): you might want to avoid hostname leaks via DHCP too

2017-04-10 Thread qubenix
qubenix: > Andrew David Wong: >> On 2017-04-09 15:25, Joonas Lehtonen wrote: >>> Hi, >> >>> if you setup MAC randomization via network manager in a debian 9 >>> template as described here: >>> https://www.qubes-os.org/doc/anonymizing-your-mac-add

[qubes-users] Pandavirtualization: Exploiting the Xen hypervisor

2017-04-07 Thread qubenix
Wondering if the list has seen this yet: https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html PoC on Qubes 3.2. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-

[qubes-users] Qubes manager not showing changes, etc.

2017-02-16 Thread qubenix
ion of two VMs trying to start same proxy vm for example). It seems others were having these issues before the upgrade, and since I haven't noticed any complaints. My experience was the opposite. I had no issues previous to this upgrade. Please let me know any other info/logs that may be helpful. -

Re: [qubes-users] Kali TemplateVM terminal etc. do not open

2016-12-16 Thread qubenix
; > Bernd > > > See here for details: https://groups.google.com/d/msgid/qubes-users/94997d39-2302-4c94-9aa1-ffee6f639bb1%40googlegroups.com In short you need to: - Change qubes repo to `stretch-testing` - update and dist-upgrade your template If you run into problems, all the

Re: [qubes-users] Re: debian-9 sys-net, random MAC buggy

2016-12-16 Thread qubenix
Chris Laprise: > On 12/15/2016 01:58 PM, Reg Tiangha wrote: >> On 12/15/2016 11:50 AM, qubenix wrote: >>> I've used the docs[1] to randomize my MAC on sys-net with debian-9 as >>> it's template. At first everything was working normal, but I've noticed >>> now th

Re: [qubes-users] Debian Template (and sub-vms) non interactive after package updates

2016-12-13 Thread qubenix
Boris Kourtoukov: > On Tuesday, December 13, 2016 at 3:11:12 PM UTC-5, qubenix wrote: >> Boris Kourtoukov: >>> On Tuesday, December 13, 2016 at 2:49:23 PM UTC-5, qubenix wrote: >>>> Boris Kourtoukov: >>>>> This is similar to what happened

Re: [qubes-users] Debian Template (and sub-vms) non interactive after package updates

2016-12-13 Thread qubenix
Boris Kourtoukov: > On Tuesday, December 13, 2016 at 2:49:23 PM UTC-5, qubenix wrote: >> Boris Kourtoukov: >>> This is similar to what happened with the Whonix discussion here: >>> https://groups.google.com/d/msg/qubes-users/IHhxklnCpYc/Wj2K5euVBAAJ >>

Re: [qubes-users] Debian Template (and sub-vms) non interactive after package updates

2016-12-13 Thread qubenix
retch xserver-xorg-core -y && apt-get dist-upgrade -y" Restart your template and see that you get display again, should fix it. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Google Groups "qubes-users" group.

Re: [qubes-users] Debian Template (and sub-vms) non interactive after package updates

2016-12-13 Thread qubenix
erver-xorg-core -y && apt-get dist-upgrade -y" Restart Template and/or AppVMs based from it. That should fix things in your TemplateVM and AppVMs. -- qubenix GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500 -- You received this message because you are subscribed to the Goo

Re: [qubes-users] Kali VM no longer responding

2016-12-12 Thread qubenix
qubenix: > qubenix: >> Marek Marczykowski-Górecki: >>> On Mon, Dec 12, 2016 at 05:10:00PM +, qubenix wrote: >>>> Marek Marczykowski-Górecki: >>>>> Looks like this issue: >>>>> https://github.com/QubesOS/qubes-issues/issues/2514 >

Re: [qubes-users] Kali VM no longer responding

2016-12-12 Thread qubenix
qubenix: > Marek Marczykowski-Górecki: >> On Mon, Dec 12, 2016 at 05:10:00PM +, qubenix wrote: >>> Marek Marczykowski-Górecki: >>>> Looks like this issue: >>>> https://github.com/QubesOS/qubes-issues/issues/2514 >>>> >>>> R

Re: [qubes-users] Kali VM no longer responding

2016-12-12 Thread qubenix
Marek Marczykowski-Górecki: > On Mon, Dec 12, 2016 at 05:10:00PM +0000, qubenix wrote: >> Marek Marczykowski-Górecki: >>> Looks like this issue: >>> https://github.com/QubesOS/qubes-issues/issues/2514 >>> >>> Rebuilt package just uploaded to testing re

Re: [qubes-users] Kali VM no longer responding

2016-12-12 Thread qubenix
Marek Marczykowski-Górecki: > On Mon, Dec 12, 2016 at 12:17:16AM +, a.mcwh...@yandex.com wrote: >> That means not only me has the same issue with debian-9 template. I've >> started reinstalling template. > >> On December 12, 2016 11:01:00 AM AEDT, qubenix &l

Re: [qubes-users] Kali VM no longer responding

2016-12-12 Thread qubenix
Marek Marczykowski-Górecki: > On Mon, Dec 12, 2016 at 12:17:16AM +, a.mcwh...@yandex.com wrote: >> That means not only me has the same issue with debian-9 template. I've >> started reinstalling template. > >> On December 12, 2016 11:01:00 AM AEDT, qubenix &l

Re: [qubes-users] Kali VM no longer responding

2016-12-11 Thread qubenix
kages. Strangely, my kali template (and AppVM based on it) work normal even though it was also upgraded at the same time. ``` user@dom0:~$ qvm-run -p d9 gnome-terminal Unable to init server: Could not connect: Connection refused Failed to parse arguments: Cannot open display: ``` -- qubenix GPG: B536