On 2019-03-23 19:03, jrsmi...@gmail.com wrote:
> Spent several hours yesterday trying to track down what I would need
> to do to install coreboot on all of my computers, starting with my
> Qubes box: a Levnovo Thinkpad T480.
>
> The bottom line from what I can tell is that if you have an Intel
Qubes 4.0.1.
Following a recent dom0 update my sys-usb widget is partially broken; 1/
devices show in the widget when plugged into usb port but are not
removed when unplugged from the port. 2/ Plugged in devices can be
attached to VM's via widget but there's now no indication (other the
qvm-block
On 6/3/19 12:54 AM, unman wrote:
On Sun, Jun 02, 2019 at 06:24:33PM +, ronpunz wrote:
On 6/2/19 3:11 PM, unman wrote:
On Sun, Jun 02, 2019 at 02:04:57PM +, ronpunz wrote:
On 6/2/19 1:46 PM, unman wrote:
On Sun, Jun 02, 2019 at 01:41:48PM +, ronpunz wrote:
On 6/2/19 1:06 AM
On 6/4/19 2:59 PM, unman wrote:
On Mon, Jun 03, 2019 at 04:11:42PM +, ronpunz wrote:
On 6/3/19 12:10 PM, unman wrote:
On Mon, Jun 03, 2019 at 09:28:01AM +, ronpunz wrote:
On 6/3/19 12:54 AM, unman wrote:
On Sun, Jun 02, 2019 at 06:24:33PM +, ronpunz wrote:
On 6/2/19 3:11 PM
On 5/31/19 12:51 AM, unman wrote:
On Thu, May 30, 2019 at 09:56:18AM +, ronpunz wrote:
I'm attempting setup a netvm using openbsd.
I'm following Unman's guide
https://github.com/unman/notes/blob/master/openBSD_as_netvm but "fell at the
first hurdle" i.e. Line No1 states "
On 5/31/19 12:51 AM, unman wrote:
On Thu, May 30, 2019 at 09:56:18AM +, ronpunz wrote:
I'm attempting setup a netvm using openbsd.
I'm following Unman's guide
https://github.com/unman/notes/blob/master/openBSD_as_netvm but "fell at the
first hurdle" i.e. Line No1 states "
On 5/31/19 10:30 AM, unman wrote:
On Fri, May 31, 2019 at 08:43:59AM +, ronpunz wrote:
On 5/31/19 12:51 AM, unman wrote:
On Thu, May 30, 2019 at 09:56:18AM +, ronpunz wrote:
I'm attempting setup a netvm using openbsd.
I'm following Unman's guide
https://github.com/unman/notes/blob
On 2019-05-28 13:15, 'awokd' via qubes-users wrote:
> ronp...@riseup.net:
>> On 2019-05-28 12:10, 'awokd' via qubes-users wrote:
>>> ronp...@riseup.net wrote on 5/28/19 11:57 AM:
Re Qubes 4.0.
I have a openbsdVM but am unable to connect to internet. I'm using ip
adresses from qubes
On 6/4/19 2:59 PM, unman wrote:
On Mon, Jun 03, 2019 at 04:11:42PM +, ronpunz wrote:
On 6/3/19 12:10 PM, unman wrote:
On Mon, Jun 03, 2019 at 09:28:01AM +, ronpunz wrote:
On 6/3/19 12:54 AM, unman wrote:
On Sun, Jun 02, 2019 at 06:24:33PM +, ronpunz wrote:
On 6/2/19 3:11 PM
I'm attempting setup a netvm using openbsd.
I'm following Unman's guide
https://github.com/unman/notes/blob/master/openBSD_as_netvm but "fell at
the first hurdle" i.e. Line No1 states "Install OpenBSD as HVM
Template". Does this mean a standalone template? If so I've successfully
completed
On 5/29/19 11:36 PM, 'awokd' via qubes-users wrote:
ronpunz:
SOLVED
I had mirage-firewall set as the default netvm. I changed the
openbsdVM firewall to sys-firewall and the network now works fine.
Noticed Mirage firewall 0.6 had a couple bugfixes for HVM support.
Since you upgraded
On 5/29/19 2:08 PM, Thomas Leonard wrote:
On Wednesday, May 29, 2019 at 2:27:28 PM UTC+1, ron...@riseup.net wrote:
On 2019-05-29 07:57, Thomas Leonard wrote:
I'm pleased to announce the release of qubes-mirage-firewall 0.6:
I'm trying to get mirage-firewall as the vehicle for dom0 updates.
Seemingly, it's only possible to update dom0 using sys-firewall or
sys-whonix via the following settings: Qubes VM Manager -> System ->
Global Settings -> UpdateVM -> sys-whonix.
Anyone know how to get mirage-firewall as the
On 2019-05-29 07:57, Thomas Leonard wrote:
> I'm pleased to announce the release of qubes-mirage-firewall 0.6:
>
> https://github.com/mirage/qubes-mirage-firewall/releases/tag/v0.6
>
> This is a unikernel that can run as a QubesOS ProxyVM, replacing
> sys-firewall. It may be useful if you want
On 5/29/19 2:17 PM, Thomas Leonard wrote:
On Wednesday, May 29, 2019 at 2:06:44 PM UTC+1, ron...@riseup.net wrote:
I'm trying to get mirage-firewall as the vehicle for dom0 updates.
Seemingly, it's only possible to update dom0 using sys-firewall or
sys-whonix via the following settings: Qubes
On 5/29/19 2:15 PM, unman wrote:
On Wed, May 29, 2019 at 04:48:12AM -0700, ronp...@riseup.net wrote:
On 2019-05-28 23:36, unman wrote:
On Tue, May 28, 2019 at 07:29:31AM -0700, ronp...@riseup.net wrote:
On 2019-05-28 13:15, 'awokd' via qubes-users wrote:
ronp...@riseup.net:
On 2019-05-28
On 2019-05-28 23:36, unman wrote:
> On Tue, May 28, 2019 at 07:29:31AM -0700, ronp...@riseup.net wrote:
>> On 2019-05-28 13:15, 'awokd' via qubes-users wrote:
>> > ronp...@riseup.net:
>> >> On 2019-05-28 12:10, 'awokd' via qubes-users wrote:
>> >>> ronp...@riseup.net wrote on 5/28/19 11:57 AM:
>>
On 2019-05-28 12:10, 'awokd' via qubes-users wrote:
> ronp...@riseup.net wrote on 5/28/19 11:57 AM:
>> Re Qubes 4.0.
>> I have a openbsdVM but am unable to connect to internet. I'm using ip
>> adresses from qubes manager i.e ip=10.137.0.28 netmask=255.255.255.255
>> gateway=10.137.0.6
Re Qubes 4.0.
I have a openbsdVM but am unable to connect to internet. I'm using ip
adresses from qubes manager i.e ip=10.137.0.28 netmask=255.255.255.255
gateway=10.137.0.6 dns=10.139.1.1 & 10.139.1.2.
I'm able to ping 10.137.0.28 and 10.137.0.6 but unable to ping say
google.com.
I've tried
On 6/3/19 12:10 PM, unman wrote:
On Mon, Jun 03, 2019 at 09:28:01AM +, ronpunz wrote:
On 6/3/19 12:54 AM, unman wrote:
On Sun, Jun 02, 2019 at 06:24:33PM +, ronpunz wrote:
On 6/2/19 3:11 PM, unman wrote:
On Sun, Jun 02, 2019 at 02:04:57PM +, ronpunz wrote:
On 6/2/19 1:46 PM
On 6/2/19 3:11 PM, unman wrote:
On Sun, Jun 02, 2019 at 02:04:57PM +, ronpunz wrote:
On 6/2/19 1:46 PM, unman wrote:
On Sun, Jun 02, 2019 at 01:41:48PM +, ronpunz wrote:
On 6/2/19 1:06 AM, unman wrote:
Not sure which direction to go next and to be honest, feel a bit out of my
depth
On 6/2/19 1:06 AM, unman wrote:
On Fri, May 31, 2019 at 06:25:41PM +, ronpunz wrote:
On 5/31/19 10:30 AM, unman wrote:
On Fri, May 31, 2019 at 08:43:59AM +, ronpunz wrote:
On 5/31/19 12:51 AM, unman wrote:
On Thu, May 30, 2019 at 09:56:18AM +, ronpunz wrote:
I'm attempting
On 6/22/19 2:41 PM, Thomas Leonard wrote:
> On Wednesday, June 19, 2019 at 10:31:41 AM UTC+1, ronpunz wrote:
>> In the past I've successfully built mirage-firewall on several
>> occasions. However following a recent reinstall of qubesos I've been
>> unable to successful
In the past I've successfully built mirage-firewall on several
occasions. However following a recent reinstall of qubesos I've been
unable to successfully build the firewall.
In summary I've tried building using fedora-29, fedora-30 and debian-10.
The errors associated with fedora 29 & 30 are
On 8/17/19 5:30 PM, Chris Laprise wrote:
> On 8/17/19 6:27 AM, ronpunz wrote:
>> Is it recommended to enable Apparmor in TemplateVM's? I note from whonix
>> docs that this can be achieved in dom0 using qvm-prefs -s templatename
>> kernelopts "nopat apparmor=1 se
Is it recommended to enable Apparmor in TemplateVM's? I note from whonix
docs that this can be achieved in dom0 using qvm-prefs -s templatename
kernelopts "nopat apparmor=1 security=apparmor".
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
I have fresh install of Q4.0.2rc1
I've setup disposable vm's for sys-net and sys-firewall. Everything
works well (i can update Fedora and Whonix) via dispVMs. However, Debian
template updates fail because Debian is calling for updates via sys-net
(which obviously cant start because disp-sys-net
On 9/4/19 12:02 PM, unman wrote:
> On Wed, Sep 04, 2019 at 08:12:27AM +0000, ronpunz wrote:
>> I have fresh install of Q4.0.2rc1
>>
>> I've setup disposable vm's for sys-net and sys-firewall. Everything
>> works well (i can update Fedora and Whonix) via dispVMs.
n 7/17/19 5:40 AM, ronpunz wrote:
>> Reading this article,
>> https://latacora.micro.blog/2019/07/16/the-pgp-problem.html, it's clear
>> the authors have little to no confidence in the security or capabilities
>> of PGP encryption.
>>
>> Is this article a sc
On 7/17/19 11:11 AM, Chris Laprise wrote:
> On 7/17/19 5:40 AM, ronpunz wrote:
>> Reading this article,
>> https://latacora.micro.blog/2019/07/16/the-pgp-problem.html, it's clear
>> the authors have little to no confidence in the security or capabilities
Reading this article,
https://latacora.micro.blog/2019/07/16/the-pgp-problem.html, it's clear
the authors have little to no confidence in the security or capabilities
of PGP encryption.
Is this article a scare mongering propaganda exercise or do they have
valid concerns about why we should not be
On 2020-02-11 11:39, unman wrote:
> On Tue, Feb 11, 2020 at 01:34:15AM -0800, ronp...@riseup.net wrote:
>> I've been reading a blog from the renowned Daniel Aleksandersen at
>> https://www.ctrl.blog/entry/systemd-service-hardening.html
>>
>> The output from a Debian-10 based Appvm looks a little
I've been reading a blog from the renowned Daniel Aleksandersen at
https://www.ctrl.blog/entry/systemd-service-hardening.html
The output from a Debian-10 based Appvm looks a little scary!! Should I
be concerned?
user@tmp3:~$ systemd-analyze security
UNIT EXPOSURE
On 2020-02-20 07:06, AJ Jordan wrote:
> tl;dr: if you don't care about the example and just want to know how
> the heck to interpret this tool, read the first couple paragraphs, and
> then skip to the last paragraph or two.
>
> I think people have a deep misunderstanding of what `systemd-analyze
On 2020-02-11 09:34, ronp...@riseup.net wrote:
> I've been reading a blog from the renowned Daniel Aleksandersen at
> https://www.ctrl.blog/entry/systemd-service-hardening.html
>
> The output from a Debian-10 based Appvm looks a little scary!! Should I
> be concerned?
>
> user@tmp3:~$
35 matches
Mail list logo