On Wed, May 29, 2019 at 06:06:40AM -0700, ronp...@riseup.net wrote:
> I'm trying to get mirage-firewall as the vehicle for dom0 updates.
> Seemingly, it's only possible to update dom0 using sys-firewall or
> sys-whonix via the following settings: Qubes VM Manager -> System ->
> Global Settings ->
On Wed, May 29, 2019 at 04:48:12AM -0700, ronp...@riseup.net wrote:
> On 2019-05-28 23:36, unman wrote:
> > On Tue, May 28, 2019 at 07:29:31AM -0700, ronp...@riseup.net wrote:
> >> On 2019-05-28 13:15, 'awokd' via qubes-users wrote:
> >> > ronp...@riseup.net:
>
On Tue, May 28, 2019 at 06:43:36PM +, Jon deps wrote:
> On 5/28/19 3:32 PM, josefh.maier via qubes-users wrote:
> > Hello forum.
> > I am new to Qubes and Fedora... is there an equivalent to the Debian
> > 'apt-get update upgrade' ?
> > Thank's a lot for your feedback!
> >
> > Joe
> >
>
>
On Tue, May 28, 2019 at 07:29:31AM -0700, ronp...@riseup.net wrote:
> On 2019-05-28 13:15, 'awokd' via qubes-users wrote:
> > ronp...@riseup.net:
> >> On 2019-05-28 12:10, 'awokd' via qubes-users wrote:
> >>> ronp...@riseup.net wrote on 5/28/19 11:57 AM:
> Re Qubes 4.0.
> I have a
On Mon, May 27, 2019 at 11:51:02PM -0700, Claudio Chinicz wrote:
> Hi All,
>
> I make few backups because I fear doing backups while using my VMs, specially
> Windows 10 and Linux Mint HVMs. So, I do it once in a while, when I have have
> some free time and can spen not using the computer while
On Sat, May 25, 2019 at 06:22:11PM -0700, d wrote:
> On Saturday, May 25, 2019 at 6:05:29 PM UTC-7, unman wrote:
> > On Sat, May 25, 2019 at 01:55:43PM -0700, drok...@gmail.com wrote:
> > > I just finished a fresh install of Qubes, then updated dom0, fedora
> > > templa
On Sat, May 25, 2019 at 01:55:43PM -0700, drok...@gmail.com wrote:
> I just finished a fresh install of Qubes, then updated dom0, fedora template,
> debian template, whonix gw and ws templates, as per instructions on
>
> https://www.qubes-os.org/doc/installation-guide/
>
> Shutdown, boot.
>
>
On Fri, May 24, 2019 at 08:03:22PM -0700, brendan.h...@gmail.com wrote:
> Looks like the chunksize of the pool is the controlling factor (256kb) here.
>
> % lvs -o name,chunksize|grep pool
>
> Docs say the default value is 64kb (that’s also the minimum for a thin pool).
> Not sure why qubesos
On Sat, May 25, 2019 at 12:02:18AM -0700, faggot shitty wrote:
> четверг, 23 мая 2019 г., 20:52:08 UTC+3 пользователь Dominique St-Pierre
> Boucher написал:
> > Good day qubes-users,
> >
> > Do you know when a debian 10 template will be available?
> >
> > Tried to do the manual upgrade and keep
On Wed, May 15, 2019 at 11:44:40PM -0700, Eccentric Butterfly wrote:
> Services include for example: clocksync, cups, qubes-firewall.
>
> I would in particular like to know what meminfo-writer does as
> https://qubes-os.org/doc/disposablevm-customization/ tells you to disable the
> service on
On Mon, May 13, 2019 at 12:58:04AM -0700, eduzw...@gmail.com wrote:
> I created a new user in the Vmtemplate. I want the Vm or the VM template to
> boot as the new created user instead of the default "user" Rn I do " su
> myusername" everyone after starting vm
>
qvm-prefs default_user
efault verbosity.)
> in short, my trusty X220 has turned into a mysterious timebomb.
> switching hardware in order to regain a solid (as in mucho uptime) system.
>
> to unman, could you be a little bit more specific about the rig you
> mentioned which seems immune to this particular
ing about use of qubes tools - they are designed for use in
appVMs and *may not* work in HVMs.
The basic qvm-move and qvm-copy seem to work fine afaik.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop r
On Thu, May 02, 2019 at 08:10:00PM +0200, qubes-...@tutanota.com wrote:
> Hello all, after the last dom0 update my Global Settings button in Qube
> Manager stopped working. Any advices how to solve the issue?
>
It's a known issue, and fix is in pipeline.
--
You received this message because
in /usr/local/bin - at a minimum:
sudo ln -s /opt/libreoffice6.2/program/soffice libreoffice6.2
That will enable the "libreoffice 6.2" menu item for the launcher.
If you want other menu items then you'll have to create relevant links
yourself.
unman
--
You received this message because y
On Thu, May 02, 2019 at 09:55:17AM +, 'qubeslover' via qubes-users wrote:
>
>
>
>
>
> ‐‐‐ Original Message ‐‐‐
> On Wednesday, May 1, 2019 11:19 AM, wrote:
>
> > On 5/1/19 4:38 AM, Thierry Laurion wrote:
> >
> > > On Mon, Apr 29, 2019, 04:36 , > > mailto:lik...@gmx.de> wrote:
>
On Thu, May 02, 2019 at 11:40:48PM +, 'awokd' via qubes-users wrote:
> Ray Joseph wrote on 4/28/19 5:21 AM:
> >
> > jrsm,
> >
> > Thank you, that was a lot of info. This took me to here:
> > https://www.qubes-os.org/doc/usb-qubes/
> >
> > From which as root, I executed:
> > qubesctl
On Tue, Apr 30, 2019 at 06:22:47AM -0300, Ralf wrote:
> Hi,
>
> On 29.04, unman wrote:
> > On Sun, Apr 28, 2019 at 01:01:10PM -0400, J.M. Porup wrote:
> > > hi,
> > >
> > > Current documentation (part of which I vaguely recall helping to
> > &g
On Mon, Apr 29, 2019 at 08:40:16AM -0500, Stuart Perkins wrote:
> I'm still stuck on 3.2 and need to redo my debian template. Is there a place
> where the last 3.2 template can be downloaded?
>
> Stuart
Of course.
You should be able to simply reinstall using dnf.
If that doesn't work then you
On Sun, Apr 28, 2019 at 01:01:10PM -0400, J.M. Porup wrote:
> hi,
>
> Current documentation (part of which I vaguely recall helping to
> write) suggests that the .muttrc decrypt command ought to be:
>
> set pgp_decode_command="qubes-gpg-client-wrapper --decrypt --status-fd=2
> --batch %f"
>
>
On Thu, Apr 25, 2019 at 04:59:22PM +0300, Claudio Chinicz wrote:
> On 25/04/2019 15:18, unman wrote:
> > On Thu, Apr 25, 2019 at 01:06:26PM +0300, Claudio Chinicz wrote:
> > > Hi All,
> > >
> > > I'm getting the following error message:
> > >
&
On Tue, Apr 23, 2019 at 08:28:10PM -0700, gandalf boomerang wrote:
> -tried xrandr but ALWAYS get the error:
>
> 'failed to get size of gamma for output'
>
> Ubuntu HVM, full installation, 4000mb ram, 20GB disk
>
>
> can not find any solution online...
Try searching this list for HVM
On Thu, Apr 25, 2019 at 01:06:26PM +0300, Claudio Chinicz wrote:
> Hi All,
>
> I'm getting the following error message:
>
> root@debian-9:/home/user# apt-get update
> Ign:1 http://dl.google.com/linux/chrome/deb stable InRelease
> Ign:2 https://deb.qubes-os.org/r4.0/vm stretch InRelease
> Ign:3
On Sun, Apr 21, 2019 at 06:50:06AM -0700, tom...@gmail.com wrote:
> Hi all,
>
> I struggle to get something that's working in Q3.2 also in Qubes4:
>
> - I need to display message from AppVm on the screen (via notify-send in
> dom0) and do it via qubes-rpc executed in AppVm "storage". rpc
plate.
bind-dirs is intended to work in the AppVM, (as I think you originally
tried).
You need to configure bind-dirs and restart the qube, *then* make any
changes that you want to make in /etc/openvpn.
You can check that the changes are there in /rw/bind-dirs/etc/openvpn.
unman
--
You re
On Sat, Apr 20, 2019 at 11:10:21PM +, Jon deps wrote:
> On 4/20/19 4:36 AM, Foppe de Haan wrote:
> > On Friday, April 19, 2019 at 10:28:15 PM UTC,
> > tom...-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:
> > > Hi guys,
> > >
> > >I installed Q4.0.1 on USB HDD to see changes from 3.2.
>
On Sat, Apr 20, 2019 at 11:18:11AM -0700, lamas9...@gmail.com wrote:
> Great news! Thanks Unman!
>
> > Soon, you will be able to get the new, correct repo definitions just by
> > updating dom0 and your TemplateVMs. However, if you can't wait, you can
> > edit you
On Fri, Apr 19, 2019 at 04:41:55PM +0200, Tim Wolf wrote:
> Hello all,
>
> I need to save some space on my harddisk, why I would like to use a
> Fedora-29-minimal template as base for system and security related VMs.
>
> Is there a list, what packages have to be added for this task?
>
> As I'm
On Fri, Apr 19, 2019 at 06:38:28PM +, Jon deps wrote:
> On 4/18/19 3:05 AM, Andrew David Wong wrote:
>
> I could be wrong but personally I believe my Dom0 & Templates are updated
> via sys-whonix-14 but just *donot use the .onion addresses ...
>
> anything "wrong" with doing it
nderbird, which
then removes qubes-vm-recommended, and that removes all dependencies of
*that* package : what you are seeing is the consequence of that.
I'm not that familiar with Fedora, but you need to set the qubes
packages individually to retain them: you can do this with 'dnf mark
install'.
Or, y
On Thu, Apr 18, 2019 at 06:11:23PM -0700, katmai karbonellenc wrote:
>
> > The document says:
> > # of Cores = 4
> > # of Threads = 8
> >
> > So...four cores. Qubes disables hyperthreading (allows a core to appear as
> > two virtual cores) due to security issues with hyperthreading.
> >
>
>
On Thu, Apr 18, 2019 at 04:55:10PM -0700, katmai karbonellenc wrote:
> I installed QubesOS on new PC, that his CPU have 8 cores but I only can be
> see 4 cores available.
> How I can solve it?
> thanks
>
You almost certainly dont have 8 cores - you probably have a 4 core CPU
with hyperthreading.
On Wed, Apr 17, 2019 at 07:47:27AM -0700, Alex A wrote:
> Good now i've got your attention,
> Lets discuss the now VIABLE future of gaming on Linux (specifically on Qubes)
> And YES you non gamer workstation only people SHOULD CARE about this (tell
> you why in a moment)
>
> Quick video for
On Wed, Apr 17, 2019 at 06:16:00AM -0700, Sergio Matta wrote:
> > Look at bind-dirs - www.qubes-os.org/doc/bind-dirs
>
> Thank you Unman. I am using Qubes since 3.2 and I did not remember this
> solution.
> It is time to me to read the Qubes documentation all over again.
&g
On Wed, Apr 17, 2019 at 01:16:57AM +, john s. wrote:
> On 3/23/19 6:31 PM, Jon deps wrote:
> > On 3/19/19 4:59 PM, Steven Walker wrote:
> > > I am still pretty new to Qubes. I have managed to create a new qube,
> > > but I want to install some software for use with this qube. I have
> > > read
On Tue, Apr 16, 2019 at 06:17:08PM -0700, Sergio Matta wrote:
> Dear Qubes People,
>
> What would be the location indicated for systems databases, since they are
> installed in the template and can not be modified by the VM? In the case of
> ldap, which uses /var/lib/ldap, I changed the
On Mon, Apr 15, 2019 at 04:23:25PM -0500, Sven Semmler wrote:
> On 4/5/19 12:52 AM, Sven Semmler wrote:
> >> You could install a file manager but then you're getting closer to
> >> the normal Debian template which is pretty minimal. If you are
> >> committed to minimal service qubes, CLI backup .
On Thu, Apr 11, 2019 at 11:34:25AM +1000, haaber wrote:
> When I update my debian buster (but not the ~-minimal), I get this
> warning message
>
> cryptsetup: WARNING: The initramfs image may not contain cryptsetup
> binaries nor crypto modules. If that's on purpose, you may want to
>
On Sat, Apr 13, 2019 at 08:36:19AM +0200, David Hobach wrote:
> On 4/12/19 5:24 PM, Michael Siepmann wrote:
> > On 8/10/18 12:37 PM, Kelly Dean wrote:
> >
> > > Am I the only one having a problem with Qubes spontaneously rebooting on
> > > Intel hardware? Only other reports I see are about AMD
On Fri, Apr 12, 2019 at 09:13:24AM +0200, Frédéric Pierret wrote:
> Hi,
>
> Please try the working procedure for windows 7 here:
> https://www.qubes-os.org/doc/windows-vm/
>
> On 4/12/19 8:47 AM, apaunov...@gmail.com wrote:
> > I am trying to create a Windows 7 template for cloning into app
On Thu, Apr 11, 2019 at 09:39:04AM +0300, Claudio Chinicz wrote:
> On 11/04/2019 3:24, unman wrote:
> > On Wed, Apr 10, 2019 at 09:21:07AM +0300, Claudio Chinicz wrote:
> > > On 09/04/2019 19:27, 'qmirfw' via qubes-users wrote:
> > > > On Monday, April 8,
On Thu, Apr 11, 2019 at 09:52:16AM +1000, haaber wrote:
> I decided to organise my colors in a natural spectrum way from hot to
> cold. But of course at the similar heat level, I may have several qubes,
> and so I run easy "out of colors" for my qubes.
>
> This motivates my "gimmick request":
On Wed, Apr 10, 2019 at 09:21:07AM +0300, Claudio Chinicz wrote:
> On 09/04/2019 19:27, 'qmirfw' via qubes-users wrote:
> > On Monday, April 8, 2019 2:44 PM, Claudio Chinicz
> > wrote:
> >
> > > Hi All,
> > >
> > > My Linux Mint VM works ok when the notebook is connected to wifi only.
> > >
On Tue, Apr 09, 2019 at 07:12:25PM -0700, Sphere wrote:
> So I have now also boarded the mirage-firewall VM hype to replace
> sys-firewall in order to take advantage of the very nice small memory
> consumption of just 32 MB
>
> After searching around I literally failed to find anything that
On Wed, Apr 10, 2019 at 10:09:54AM +1000, haaber wrote:
> > On 4/10/19 9:50 AM, jrsmi...@gmail.com wrote:
> > > The PS/2 keyboard leaking to ground risk seems like it would only
> > > apply if an attacker had physical access. Is that right or is there a
> > > way it could be exploited remotely?
>
On Tue, Apr 09, 2019 at 11:45:02AM -0700, jrsmi...@gmail.com wrote:
> If there is no signal on PS/2 ground or I can eliminate it, is this the more
> secure route or is it worth doing the USB shuffle? I have 4 USB controllers
> available.
>
If you really have 4 USB controllers I would allocate
On Tue, Apr 09, 2019 at 06:29:48AM -0700, John Mitchell wrote:
> On Tuesday, April 9, 2019 at 2:53:25 PM UTC+2, unman wrote:
>
>
>
> > Do you run Qubes? On what hardware?
>
> I wanted to use Qubes however I didn't feel that my usage case would be
> supported
On Mon, Apr 08, 2019 at 02:32:04PM -0400, taii...@gmx.com wrote:
> On 02/25/2019 04:02 PM, John Mitchell wrote:
> > If I may ask what OS do you use for the host?
> >
>
> Devuan, it is debian without systemd.
>
> I compile most of the related packages though like libvirtd, qemu etc
> cause the
On Mon, Apr 08, 2019 at 09:49:28PM -0400, taii...@gmx.com wrote:
> I have stated this many times before.
>
> The PS/2 thing is from 2011 which is 8 years ago and applies to systems
> without more than one USB controller.
>
> Using PS/2 sends your keystrokes out on the ground wire.
>
> It is far
On Mon, Apr 08, 2019 at 10:30:23PM +1000, haaber wrote:
> Dear qubes-users,
> is there a comprehensive way how to down-size a (template) VM ? Let us
> assume, that a df shows the template uses 9.2G as root volume. Assume
> further that for some reason I had temporarily increased the root vol to
>
On Sat, Apr 06, 2019 at 07:06:41PM -0700, Ray Joseph wrote:
> I would like to config sys-net to access my wireless AP. I have not found a
> method to config the network. I looked for /etc/network/interface to see if
> anything was there but the network folder does not exist.
>
> I found
clear) the user password.
There's nothing special here about Qubes - it's just like any Fedora
system.
There are many guides on how to do this - just change the user password
instead of the root password: i.e. 'passwd user'
unman
--
You received this message because you are subscribed to t
On Sat, Apr 06, 2019 at 09:21:55AM -0400, Chris Laprise wrote:
> On 4/5/19 7:59 PM, unman wrote:
> > On Fri, Apr 05, 2019 at 06:38:19PM +, 'awokd' via qubes-users wrote:
> > > Cranix wrote on 4/5/19 3:18 PM:
> > > > Hello,
> > > > I have PC with
On Fri, Apr 05, 2019 at 06:38:19PM +, 'awokd' via qubes-users wrote:
> Cranix wrote on 4/5/19 3:18 PM:
> > Hello,
> > I have PC with 8GB RAM, hdd and AMD FX X-6. Qubes Os 3.2 was working
> > fine. Unfortunately Qubes Os 4.0 is very slow. Booting up takes ~15min,
> > then spawning VM takes
On Fri, Apr 05, 2019 at 08:28:12PM +, 'awokd' via qubes-users wrote:
> Jon deps wrote on 4/5/19 10:21 AM:
> > On 4/5/19 6:21 PM, 'awokd' via qubes-users wrote:
> > > Jon deps wrote on 4/4/19 4:30 PM:
> > > >
> > > > on rebooting my taskbar time is for some reason not persisting Again !
> > >
On Thu, Apr 04, 2019 at 07:51:28PM -0400, J.M. Porup wrote:
> On Fri, Apr 05, 2019 at 12:25:30AM +0100, unman wrote:
> > On Thu, Apr 04, 2019 at 10:52:09AM -0400, J.M. Porup wrote:
> > > hi,
> > >
> > > Configuring split pgp for mutt on a Qubes 4 laptop using
sr/sbin/tinyproxy but the exec is in /usr/bin
> > Fix this by editing /lib/systemd/system/qubes-updates-proxy.service to
> > refer to the correct path.
> >
> Dear qubes-users, dear Unman, I tried to follow these instructions, but
> I am stuck. There is an odd spelling is
On Thu, Apr 04, 2019 at 05:13:03AM -0700, Ray Joseph wrote:
> unman
>
> Thank you for the trip through the qube. Currently, sys-net is still not
> working. I have tried both strict and not. And I have rebooted also
> rebooted after the change.
>
> What looks odd is
On Thu, Apr 04, 2019 at 10:52:09AM -0400, J.M. Porup wrote:
> hi,
>
> Configuring split pgp for mutt on a Qubes 4 laptop using Debian 9 vms.
>
> split pgp works to sign documents from the email vm:
>
> qubes-gpg-client-wrapper --clearsign foo.txt
>
> but does not work to encrypt
On Tue, Apr 02, 2019 at 07:19:46AM +1100, haaber wrote:
> >
> > It is the qubes that perform update checks and then notify dom0
> > accordingly. So if you have a qube connected to clearnet it will check
> > over clearnet.
> > You can disable this in clearnet connected qubes - it's the
> >
learnet connected qubes - it's the
qubes-update-check service.
Or you can disable globally in qubes-global-settings.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it
On Sun, Mar 31, 2019 at 06:27:22PM -0700, jrsmi...@gmail.com wrote:
> On Sunday, March 31, 2019 at 8:12:01 AM UTC-7, awokd wrote:
> > jrsmi...@gmail.com wrote on 3/31/19 3:04 PM:
> > > I'm finally going to just ask. I've been searching for something to help
> > > me understand this for months
-net, sys-usb and sys-firewall dispvms are based on a
> debian-10-minimal, which was upgraded from the debian-9-minimal. There
> was one little hick-up with the qubes-update-proxy (tinyproxy), but
> unman quickly pointed out what needed to be done.
>
> Now I have only 2 things le
On Sat, Mar 30, 2019 at 11:02:57PM -0700, pixel fairy wrote:
> most of the time, the usb icon on the top right seems kinda useless. it will
> tell you whats available sometimes soon after the system booted. past that,
> you have to use qvm-usb and qvm-block on the command line for all that. ive
On Sat, Mar 30, 2019 at 09:32:03PM +, lik...@gmx.de wrote:
> On 3/30/19 2:56 AM, unman wrote:
>
> > In the first case you are creating a disposableVM, based on a a DVM
> > Template, fedora-28-dvm
> > In the second case you are creating a DVM Template, which will
On Thu, Mar 28, 2019 at 08:52:57AM -0700, Matthew Finkel wrote:
> On Sunday, March 10, 2019 at 3:24:08 PM UTC, farrilis wrote:
> > Using Qubes 4.0 in Whonix 14 template
> >
> >
> > When using curl, the -x (or --proxy) parameter accepts the address
> > (127.0.0.1:8082) that redirects to Qubes
basis for disposableVMs.
That is the difference, and it's why you cant resize the named dvm - the
named dvm takes its properties from the underlying DVM Template.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe f
On Sat, Mar 30, 2019 at 12:31:56AM +, john s. wrote:
> So, if I have a .tar.gz which I unzip and inside there is a executable.
>
> there is nothing to install in a template, and when I close the AppVM that
> contains the executable, should I expect that when I open that AppVM again,
>
>
On Fri, Mar 29, 2019 at 07:26:13PM -0500, Sven Semmler wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 3/29/19 2:34 PM, Sven Semmler wrote:
> > What did I mess up?
>
> user@tpl-deb-10:~$ sudo service qubes-updates-proxy status
> ● qubes-updates-proxy.service - Qubes updates
nd without color in the console
> (and thus hardly readable). The console does not react any more on the
> keyboard, no clue how to continue ...
>
> Bernhard
>
I dont want to be *that* person, but this upgrade works flawlessly for
me.
Can you check you have upgraded debian-9 prior to
On Mon, Mar 25, 2019 at 04:20:48PM -0700, Ray Joseph wrote:
> I have installed Qubes on a Toshiba laptop with wirless only. When
> attempting to start sys-net from Qube Manager, an error is emitted:
> Domain sys-net has failed to start: internal error: Unable to reset PCI
> device 000:00:14.0:
On Sat, Mar 23, 2019 at 11:20:17AM +0100, onw7two99 wrote:
> Hello Qubes Community,
>
> I have been trying to get sys-usb working using a fedora-29-minimal template
>
> Unfortunately it will not work, even after installing all packages which
> "should" be enough to get sys-usb working (Link
>
On Tue, Mar 26, 2019 at 11:33:46PM +, lik...@gmx.de wrote:
> On 3/26/19 12:46 AM, 22rip-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org wrote:
> > I am not sure of why this is happening in your case but have you tried
> > creating a new -dvm again? Does the issue persist?
> >
> What do you mean
On Tue, Mar 26, 2019 at 02:00:24PM -0700, CooSee wrote:
> snip !
>
> change the default entry to smp=on in xen.cfg or BOOTX64.CFG if using UEFI.
>
> greetings
>
Shouldn't that be "smt=on"?
You should probably look at QSB#43 before doing this in any case.
The relevant Xen advisory (273) said
On Tue, Mar 26, 2019 at 06:42:03PM +, Jon deps wrote:
> On 3/26/19 4:17 AM, haaber wrote:
> >
> >
> > On 3/26/19 2:33 PM, Jon deps wrote:
> > > On 3/26/19 12:17 AM, unman wrote:
> > > > On Tue, Mar 26, 2019 at 10:48:08AM +1100, haaber wrote:
>
On Tue, Mar 26, 2019 at 11:06:49AM +1100, haaber wrote:
> > On 3/26/19 10:42 AM, Jon deps wrote:
> >> Err:7 https://cdn-aws.deb.debian.org/debian jessie-backports Release
> >>404 Not Found
> >> Reading package lists... Done
> >> E: The repository 'https://deb.debian.org/debian
On Tue, Mar 26, 2019 at 10:48:08AM +1100, haaber wrote:
> On 3/26/19 10:42 AM, Jon deps wrote:
> > Err:7 https://cdn-aws.deb.debian.org/debian jessie-backports Release
> > 404 Not Found
> > Reading package lists... Done
> > E: The repository 'https://deb.debian.org/debian jessie-backports
> >
On Sat, Mar 23, 2019 at 06:31:07PM +, Jon deps wrote:
> On 3/19/19 4:59 PM, Steven Walker wrote:
> > I am still pretty new to Qubes. I have managed to create a new qube, but I
> > want to install some software for use with this qube. I have read that it
> > has to be installed to the
On Sat, Mar 23, 2019 at 01:59:27PM +0100, onw7two99 wrote:
> Hello Chris,
>
> thank you once again for your feedback.
>
> On 3/23/19 11:31 AM, Chris Laprise wrote:
> > On 3/23/19 5:34 AM, onw7two99 wrote:
> >> I run sudo fstrim -av from within the AppVM (as root) but I haven't
> >> notive any
On Fri, Mar 22, 2019 at 09:12:45AM -0400, qubes...@go-bailey.com wrote:
> Thanks for the responses.
>
> Perhaps I'm not following correctly but the testing Package list mentioned
> at:
>
> https://deb.qubes-os.org/r4.0/vm/dists/stretch-testing/main/binary-amd64/Packages
>
> has the:
>
>
On Fri, Mar 22, 2019 at 06:32:07AM -0700, Zbigniew Łukasiak wrote:
> On Friday, December 1, 2017 at 12:58:59 PM UTC+1, awokd wrote:
> > On Fri, December 1, 2017 05:50, Drew White wrote:
> > > On Tuesday, 21 November 2017 06:45:02 UTC+11, awokd wrote:
> > >> On Mon, November 20, 2017 02:32, Drew
On Fri, Mar 22, 2019 at 06:00:31PM -0700, deepdarkn...@gmail.com wrote:
> Thank you, 22. Would you recommend installing software through the terminal,
> or can you use the same procedure - enabling the network - to install
> software via the software manager?
>
> I did install Libre Office
On Fri, Mar 22, 2019 at 06:07:38AM -0700, 22...@tutamail.com wrote:
> Steven,
> I am going to assume you have created an AppVM i.e. a Qube based on a
> Template (vs a Stand alone VM). In this scenario you would install any
> software into the template.
>
> Instructions:
> 1) I would suggest
/dists/stretch-testing/main/binary-amd64/Packages
There you'll see the latest versions.
The repository pool contains all available versions, but they are
separately indexed in the different package files.
If you want to test, edit the /etc/apt/sources.list.d/qubes-r4.list file
and enable the testing r
ource of that data - 18GB shouldn't be hard to find.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com
COW clone. Since your clone has no
difference from the original, it uses no disk space. As you use and make
changes the delta will increase and you will see the disk usage
increase.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
On Sun, Mar 17, 2019 at 08:16:13AM -0400, Stumpy wrote:
> I seem to remember someone continuing work on the qubes manager, beyond bug
> fixes, but I cant find the post. I looked on github but it wasnt clear to me
> how much work was continuing with the qmanager.
> I find it really useful and
On Wed, Mar 13, 2019 at 12:48:24PM -0300, Franz wrote:
> On Wed, Mar 13, 2019 at 12:32 PM unman wrote:
>
> > On Wed, Mar 13, 2019 at 06:56:03AM -0700, Hugo Costa wrote:
> > > On Wednesday, 13 March 2019 11:12:46 UTC, unman wrote:
> > > I believe the "do
On Wed, Mar 13, 2019 at 10:43:23PM +, Jon deps wrote:
> On 3/13/19 11:06 AM, unman wrote:
> > There may be 2 cases:
> > 1. a disposableVM is created and you are seeing information from the
> > underlying fedoraprintqube - normal, and to be expected;
> > 2. a disp
On Wed, Mar 13, 2019 at 06:56:03AM -0700, Hugo Costa wrote:
> On Wednesday, 13 March 2019 11:12:46 UTC, unman wrote:
> > On Tue, Mar 12, 2019 at 04:53:02PM -0300, Franz wrote:
> > > I installed again windows following this
> > > https://www.qubes-os.org/doc/windows-v
On Mon, Mar 11, 2019 at 01:45:13PM -0700, pixel fairy wrote:
> just got a pop up notification
>
> Qube Status: myvm
> Domain myvem has failed to start: internal error: libexenlight failed to
> create new domain 'myvm'
>
> myvm has existed and started fine for many months. trying it again
On Tue, Mar 12, 2019 at 04:53:02PM -0300, Franz wrote:
> I installed again windows following this
> https://www.qubes-os.org/doc/windows-vm/#xen-pv-drivers-and-qubes-windows-tools
>
> Windows now is working and fully updated but no additional driver is
> installed.
>
> Reading this tutorial many
On Tue, Mar 12, 2019 at 06:57:41PM +, Jon deps wrote:
> On 3/12/19 4:34 PM, unman wrote:
> > On Tue, Mar 12, 2019 at 08:35:04AM +, Jon deps wrote:
> > > Hello, in Thunderbird when I do open-in-vm and check firefox it has
> > > retained bookmarks from a previ
late for disposableVMs?
(qvm-prefs template_for_dispvms True)
Also check to see what you have set in
/etc/qubes-rpc/policy/qubes.OpeninVM and
/etc/qubes-rpc/policy/qubes.OpenURL
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe fr
gt; *Addiction and Mental Health Treatment*
> Connect: Facebook <https://www.facebook.com/DelphiBehavioralHG> | Twitter
> <https://twitter.com/DelphiHealth> | LinkedIn
> <https://www.linkedin.com/company/delphi-behavioral-health-group>
>
>
>
>
> rules anywhere?
>
> Thanks in advance.
>
> Btw, thanks for the xenial install, unman..
>
When you set rules in the GUI, or using qvm-firewall, the rules are set
in the proxyVM next hop up, i.e. the netvm for the qube for which you
are setting firewall rules.
The rules will be s
ings.
>
> Please help!
> --
The usual cause is that you dont have VT-x enabled: check the BIOS
and make sure that you have all virtualisation options enabled.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
On Sat, Mar 09, 2019 at 01:23:03PM +0100, David Hobach wrote:
> On 3/9/19 2:58 AM, unman wrote:
> > On Fri, Mar 08, 2019 at 08:07:46PM +0100, Zrubi wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA256
> > >
> > > On 3/8/19 3:28 PM,
On Fri, Mar 08, 2019 at 08:07:46PM +0100, Zrubi wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 3/8/19 3:28 PM, cmsch...@gmail.com wrote:
> > I'm trying to setup an appvm like this:
> >
> > appvm -> appvm_firewall -> vpn -> vpn_firewall -> sys-net
> >
> > I want to tighten the
doubt that is necessary in this
case.
If you are using nftables, (check in your sys-firewall), then you can
get the same effect by adding to your DROP statement. You don't need a
separate rule for this.
HTH
unman
--
You received this message because you are subscribed to the Google Groups
"
601 - 700 of 1744 matches
Mail list logo