[qubes-users] Failure - Building mirage unikernel with debian-10 and Docker CE

2021-10-16 Thread 799
n --pass-io --no-gui --user=root $MirageFWBuildVM 'git clone https://github.com/mirage/qubes-mirage-firewall.git && \ cd qubes-mirage-firewall && \ mkdir -p /home/opam/qubes-mirage-firewall && \ ./build-with-docker.sh' 799 -- You received this message because you

Re: [qubes-users] Unable to install templates in Qubes OS 4.1beta

2021-10-11 Thread 799
Hello Steve, thanks for the reply, can you provide more details what you mean by that: On Mon, 11 Oct 2021 at 18:12, Steve Coleman wrote: > [...] In any case you might try cleaning the cache with the --clean option > and > then rerunning the download/install. > do you mean 'sudo dnf clean

[qubes-users] Unable to install templates in Qubes OS 4.1beta

2021-10-11 Thread 799
Hello, I have setup Qubes 4.1 on my Surface and now I am running into issues trying to install more templates. sys-net is set as Dom0 Update VM and I am also able to search for packages and they get listed correctly. [user@dom0 ~]$ sudo qubes-dom0-update --action=search qubes-template- Using

[qubes-users] Re: Using NextDNS in Qubes OS

2021-07-13 Thread 799
Short Update after further testing how to setup NextDNS in Qubes. I was able to change the DNS servers in my AppVM by editing /etc/systemd/resolv.conf and adding the following lines: DNS=dns1.nextdns.io DNS=.dns1.nextdns.io DNS=.dns2.nextdns.io DNS=.dns2.nextdns.io DNSOverTLS=yes The exakt

[qubes-users] Using NextDNS in Qubes OS

2021-07-12 Thread 799
Hello, I use NextDNS to encrypt and filter my DNS request on windows / android. I would also like to use it for some of my qubes VMs and tried it out but run into issues. I tried to change the DNS settings in /etc/systemd/resolved.conf but this broke name resolution. My setup: sys-net <- sys-vpn

Re: [qubes-users] Disposable sys-net >> wifi login

2021-07-12 Thread 799
Hello, I Am 51lieal schrieb am Mo., 12. Juli 2021, 04:35: > It's possible currently i'm using fedora-34 DispVMs on sys-net, what you > have to do : > > ``` > > nmcli device wifi list # scanning wifi > > nmcli device wifi connect password # example nmcli > device wifi connect 51lieal password

Re: [qubes-users] Networking with debian10-minimal instead of fedora-33

2021-07-11 Thread 799
Hello, Steve Coleman schrieb am Do., 1. Juli 2021 > I don't have any suggestion for the Debian issue, but what I do to limit > the updates is clone the fedora-33-minimal to a template called > fedora-33-net, strip out any apps not needed, and then use that for my > networking AppVM's. With

[qubes-users] Disposable sys-net >> wifi login

2021-07-11 Thread 799
Hello, I switches my setup and I am using static disposable VMs for sys-usb and sys-firewall (Based on an own template which has been cloned from a fedora-33-minimal template + the bare minimal packages). I also would like to make my sys-net a disposable VM but without the hazzle to enter my

[qubes-users] Updating templates via salt (update.qubes-vm) doesn't work

2021-07-03 Thread 799
er in dom0: sudo qubesctl --targets fedora-32 update.qubes-vm ... which should update the template I get the following error: 'update.qubes-vm' is not available. DOM0 configuration failed, not working Any idea what went wrong? 799 -- You received this message because you are subscribed to

[qubes-users] Audio / Video in Q4 Windows 10 HVM via USB possible?

2021-01-31 Thread 799
oach doing this? Unified Communication/Audio is the only reason why I am not using Qubes as my main OS for business use. Regards -799 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails fr

Re: [qubes-users] Install Google Chrome in Fedora 32 Template

2020-09-09 Thread 799
$AppVMName Google Chrome can now be started via google-chrome from a terminal in the AppVM. Of course you can also create a shortcut for the Qubes menu manually (it's in the Qubes Docs) pointing to /usr/bin/google-chrome regards 799 On Fri, 4 Sep 2020 at 16:37, Frédéric Pierret wrote: >

[qubes-users] Install Google Chrome in Fedora 32 Template

2020-09-04 Thread 799
to install it from the default repo's. https://rpmfind.net/linux/rpm2html/search.php?query=libappindicator3=Search+...== Any ideas how to do so? [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this grou

Re: [qubes-users] Re: Unable to installes mirage-firewall: this version of runc doesn't work on cgroups v2

2020-08-23 Thread 799
vcpus=1 \ --property virt_mode=pv \ --label=green \ --class StandaloneVM \ $MirageFWAppVM # Change default NetVM to Mirage FW qvm-start $MirageFWAppVM qubes-prefs --set default_netvm $MirageFWAppVM regards. 799 -- You received this message because you are subscribed to the Google Groups &quo

[qubes-users] Unable to installes mirage-firewall: this version of runc doesn't work on cgroups v2

2020-08-22 Thread 799
mp;& opam update ---> Running in 32587cf55364 OCI runtime create failed: this version of runc doesn't work on cgroups v2: unknown Any ideas how to workarround this problem or if I need to use another AppVM fedora-30 to build mirage 799 -- You received this message because you

[qubes-users] Problem installing qubes-template-fedora-32

2020-07-20 Thread 799
: import operation in progress on qubes_dom0/vm-fedora-32-root Strangely it worked on my other laptop without a problem. Any ideas what went wrong? 799 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this grou

Re: [qubes-users] File syncing between Qubes

2020-07-17 Thread 799
rnet access? If so, what are the security > implications of doing this? If not, what are some alternative ways of > automating data transfers between qubes?* > You could look into sshfs which is able to mount a remote filesystem over ssh. 799 > -- You received this message because you are su

Re: [qubes-users] Re: Security benefits of rootless template VMs

2020-07-13 Thread 799
ho "[ Updating Whonix Templates ]" for i in `qvm-ls | grep Template | grep whonix | gawk '{ print $1 }'`; do echo echo "Updatung $i ..." qvm-run --auto --user root --pass-io $i 'apt-get update && apt-get -y upgrade'; qvm-shutdown $i; echo "... done." done -

[qubes-users] Unable to install Google Chrom in my "media VM template" (fedora-32-minimal)

2020-07-06 Thread 799
Hello, because I want to be able to rebuild my system from scratch and to keep track of my installation notes, all my templates can be rebuild from dom0 using scripts. All templates are based on a fedora-xx-minimal templates. I have one template which I use as template for a media-VM. which has

[qubes-users] Fedora 32 ready to be used as customized sys-template ?

2020-06-28 Thread 799
. Unfortunately I had to use the old fedora-29 templates as I had trouble with fedora-30, no I have seen that new version of fedora are in the qubes-repo and I like to upgrade. 799 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubs

Re: [qubes-users] MAC Address Anonymization and NetworkManager Compatibility

2020-02-27 Thread 799
Hello sf0IqXUyNLTP22nB3Lpt, ''sf0IqXUyNLTP22nB3Lpt via qubes-users schrieb am Mi., 26. Feb. 2020, 07:12: I have recently set up a vpn gateway qube according to the instructions as listed here . I have now gone to set up the MAC Anonymization and have a

Re: [qubes-users] Mounting directories across VMs (losetup/block device solution for directories)?

2020-02-27 Thread 799
Hello Johannes, Johannes Graumann schrieb am Mi., 26. Feb. 2020, 22:23: > (...) I'm experimenting with creating a sys-dropbox vm that syncs with my > dropbox account. I would love to be able to then mount defined > subdirectories of the synced path to other vms (losetop/qvm-block- > style,

[qubes-users] Improving Qubes firewall (GUI or pfSense)

2020-02-20 Thread 799
Hello, While I'm running Qubes for a few years now, I also have to work with Windows 10 according to company standards. So far I had problems setting up Windows 10 on Qubes (which I tried ~1,5y ago) and then decided to work in a dual boot setup, which is ok for me, as I am running Coreboot and my

Re: [qubes-users] Problem updating dom0

2020-01-25 Thread 799
Hello Haaber, On Sat, 25 Jan 2020 at 12:51, haaber wrote: > On 1/25/20 12:28 PM, 799 wrote: > > I'm trying to upgrade dom0 but run into a SKIPPED message: > > This happens to me if I do not reboot after an upgrade and run the > upgrade command once more. Is this your ca

[qubes-users] Problem updating dom0

2020-01-25 Thread 799
Hello, I'm trying to upgrade dom0 but run into a SKIPPED message: [...] DNF will only download packages for the transaction. Downloading Packages: [SKIPPED] .rpm: Already downloaded [SKIPPED] .rpm: Already downloaded [...] Complete! The downloaded packages were saved in cache until the next

Re: [qubes-users] Copying text to/from Dom0

2019-09-22 Thread 799
to the clipboard of dom0. I'm using xclip to move screenshots from dom0 to the AppVM, if you look into the script you will be able to get an idea how xclip works. https://github.com/one7two99/my-qubes/blob/master/dom0-scripts/qvm-screenshot-to-clipboard.sh [799] -- You received this message becau

Re: [qubes-users] Qubes on Dell Vostro 5581?

2019-09-14 Thread 799
List (HCL) https://www.qubes-os.org/hcl/ But it seems to work with Linux: https://certification.ubuntu.com/hardware/201808-26383 Therefore I think it _should_ work fine with Qubes. If you test Qubes on it, please submit a HCL Report, so that users might get an answer to your question. [799

Re: [qubes-users] SSH to QUBES VM

2019-09-14 Thread 799
Qubes OS. https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world If not please do so and then come back if you need further help. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this

Re: [qubes-users] Done with Qubes

2019-08-31 Thread 799
overhead -> full OS + VirtualBox which is more complex and has a larger attack surface and is therefore less secure - much more manual overhead. Therefore I would always go back to Qubes. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group

Re: [qubes-users] qvm-create-windows-qube Automatically creates

2019-08-30 Thread 799
How can this be done? - Automate installation of xenvbd 8.2.2 or 8.2.1 after appropriate Windows > 7 updates are installed. > xenvbd = Qubes Tools ? [799] > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from t

Re: [qubes-users] Qubes/class, Was: slightly off-topic: self-resetting OS idea

2019-08-27 Thread 799
m with the Intel hardware, with the xen hypervisor, or Linux bugs, this has nothing to do with Qubes. So my second problem is: this approach would assume that I agree with > every choice that the Qubes team does, which I don't. > You don't have to, but the good thing is that you can take the par

Re: [qubes-users] slightly off-topic: self-resetting OS idea

2019-08-26 Thread 799
fingerprint all files in /boot and gpg sign the signature which is then stored in the LUKS encrypted root partition. You can then free booting into Qubes check the current boot Partition against the fingerprints. https://github.com/one7two99/my-qubes/tree/master/docs/boot-protect Not sure if this i

Re: [qubes-users] unencrypted internet-browsing possible as well with QubesOS

2019-08-24 Thread 799
urse connect to your corporate VPN. All from the same operating system but with separated virtual machine. [799] > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send

Re: [qubes-users] Done with Qubes

2019-08-22 Thread 799
(sarcasm) 2) allow others to fix bugs Or do mean you just want to run one (1) Standalone Ubuntu in Qubes? Which shouldn't make a big difference vs a baremetal Ubuntu installation. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Re: Which qube is most secure for internet use?

2019-08-21 Thread 799
OT protect you against > the website you visit from taking and keeping your browser > "fingerprint". For more information on your browser fingerprint see: > https://panopticlick.eff.org/ Wouldn't a disposable whonix AppVM help against this fingerprinting? [799] -- You receive

Re: [qubes-users] qvm-create-windows-qube Automatically creates

2019-08-20 Thread 799
te --enablerepo=qubes-dom0-current-testing qubes-windows-tools # copy script to dom0 qvm-run --pass-io windows-mgmt 'cat $HOME/Documents/qvm-create-windows-qube/qvm-create-windows-qube.sh' > qvm-create-windows-qube.sh Feel free to add this to your script/repo. [799] -- You received this me

Re: [qubes-users] How do I launch NetworkManager??!!

2019-08-19 Thread 799
permissions, if so: in dom0: qvm-run --auto --user root sys-net 'nmcli ...' I am not sitting in front of my Qubes, therefore can't write the exact commands. If you need further help, I can look up the details later on. [799] > -- You received this message because you are subscribed to th

Re: [qubes-users] My Qubes 4.02-rc1 install notes: (with fixes, customizations)

2019-08-19 Thread 799
ory which to store info/scripts to setup the template VMs /scripts/ - directory to store scripts which are used to work better with Qubes ... Let me know what you think. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscr

Re: [qubes-users] Getting bluetooth to run in appVM

2019-08-19 Thread 799
here a way to send the audio to `sys-usb` and use it as a proxy to > the bluetooth speaker? Or another way to pass the bluetooth device to > the appVM? > Not a solution for your question, but have you tried to use one of those very small Bluetooth USB dongles? This should work via sys-us

Re: [qubes-users] Can't find Debian 10/minimal template

2019-08-18 Thread 799
g repositories. As always the answer is somewhere in the excellent Qubes Docs ;-) https://www.qubes-os.org/doc/software-update-vm/#testing-repositories [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group an

Re: [qubes-users] The VPN avalibel in Qubes

2019-08-17 Thread 799
Hello Chris, On Sat, 17 Aug 2019 at 04:35, 799 wrote: > Chris Laprise schrieb am Di., 13. Aug. 2019, 23:10: > >> (...) >> The easiest & most comprehensive/secure VPN config for Qubes is here: >> >> https://github.com/tasket/Qubes-vpn-support >> [...

Re: [qubes-users] The VPN avalibel in Qubes

2019-08-16 Thread 799
ubes-os.org/doc/vpn/ I'll also take a look into your other scripts ;-) [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@

Re: [qubes-users] Problem with NextCloud-Client App-VM (unable to login on 2nd boot)

2019-08-16 Thread 799
r the nextcloud client is not pocking up the sync again. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com

Re: [qubes-users] Which qube is most secure for internet use?

2019-08-16 Thread 799
omeone's computer from the > internet, and if the computer's running Qubes I would imagine it's harder, > but I think it can be done (definitely Mac address but possibly more info). > Yes. Using Qubes will increase your security to a reasonable secure level (if you use it correctly). [799] -- You re

Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-16 Thread 799
rg/FAQ#Will_coreboot_work_on_my_machine.3F [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discu

Re: [qubes-users] Problem with NextCloud-Client App-VM (unable to login on 2nd boot)

2019-08-15 Thread 799
ven after login in, the synchronization is not working again. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@

Re: [qubes-users] How to change date and time format in Thunderbird

2019-08-15 Thread 799
in helps: https://addons.thunderbird.net/nl/thunderbird/addon/quick-locale-switcher/ ? [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email

Re: [qubes-users] Problem with NextCloud-Client App-VM (unable to login on 2nd boot)

2019-08-15 Thread 799
e (as describes) and build an AppVM from this template. [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.co

Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-14 Thread 799
oes as well. > Ok, I'll give the Expresscard Slot a try, need to buy an adapter first... Any idea how I can test the speed of the interfaces afterwards? I would get a Expresscard-to-USB3-Adapter. [799] -- You received this message because you are subscribed to the Google Groups "qubes

Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-13 Thread 799
VM, you pass along all attached internal USB Devices. Therefore I am a using a sys-usb Qube ;-) Regarding the other questions, I'll try to answer this later. 799 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from t

Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-13 Thread 799
/master/docs/coreboot/README.md Let me know if you need any help. 799 > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@

Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-12 Thread 799
stalled, but I am not using it, just because the x230 feels much more portable and has twice the battery runtime. 799 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, s

Re: [qubes-users] best and less expensive Lenovo think pad

2019-08-12 Thread 799
which gives you additional Display options. I would go with the x230, 16GB RAM and a new SSD, then add Coreboot (I have a specific howto covering this). But as they are all so cheap: buy them all and test them, then sell the ones you don't like to keep ;-) 799 > -- You received this mess

Re: [qubes-users] using static dispVM for sys-net

2019-08-10 Thread 799
emember them. Is there any way tweaking this behaviour? 799 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this

Re: [qubes-users] Coreboot?

2019-08-09 Thread 799
Hello, schrieb am Di., 6. Aug. 2019, 00:42: > So like installing coreboot should eliminate any malware installed at > firmware levels, right? > I would not use the very strong claim "any", because I can't backup this claim through knowledge (I am not a security specialist). But using coreboot

[qubes-users] Autoconnect to VPN not working in fedora based AppVM

2019-08-06 Thread 799
Hello, For my corporate work I am running a custom build AppVM which is based on a fedora-30-minimal package with some additional packages. I am using the gnome network manager applet with the openconnect plugin to connect to our corporate VPN (Cisco Anyconnect). This is working fine, but I would

Re: [qubes-users] Coreboot?

2019-08-05 Thread 799
Hello, On Mon, 5 Aug 2019 at 22:58, wrote: > I was told that buying an used laptop represents an extra risk since the > previous owner could have used the laptop with Qubes and got dom0 infected. > After a little bit of research, I was told that installing coreboot would > eliminate/delete any

[qubes-users] (very) portable Qubes OS on a Lenovo S730 - will it work?

2019-07-16 Thread 799
Hello, I'm interested running Qubes OS on a new day-to-day laptop which might be a Lenovo S730 because of portability and USB-C charging (knowing that I am unable to run Coreboot on it). Question: has someone successfully installed Qubes on this device? Specs: - Intel Core i5-8265U - Intel UHD

Re: [qubes-users] Make files in AppVM persistent

2019-04-21 Thread 799
h is based on a Template (...) Additionally it seems that you need to run 6 steps, the numeration seems to be fixed, now it has two times 3 steps - I'll try to fix this in the GitHub repo. O/799. -- You received this message because you are subscribed to the Google Groups "qubes-user

Re: [qubes-users] Make files in AppVM persistent

2019-04-20 Thread 799
files disappear after the reboot. > You have applied the change in the template VM? then shutdown the template? And then restarted the AppVM? The last step is important as only then changes to the template VM are picked up from the AppVM. O/799 -- You received this message because you are subscri

Re: [qubes-users] minimal Fedora template as base for sys-net and sys-firewall

2019-04-20 Thread 799
new template as template for sys-vms qvm-shutdown --all --wait --timeout 120 qvm-prefs --set sys-usb template $systemplate qvm-prefs --set sys-net template $systemplate qvm-prefs --set sys-firewall template $systemplate #qvm-prefs --set sys-vpn template $systemplate --- 8< --- Regards O/799 -

Re: [qubes-users] qubes using cpu with 8 cores

2019-04-19 Thread 799
ing looking into this article: Intel Hyper Threading Performance With A Core i7 On Ubuntu 18.04 LTS https://www.phoronix.com/scan.php?page=article=intel-ht-2018=1 Regards - O/799 t <https://groups.google.com/d/optout>. -- You received this message because you are subscribed to the Google

Re: [qubes-users] qubes using cpu with 8 cores

2019-04-18 Thread 799
herefore you might see only the cores which are assigned to dom0? The xl commands should help you. - O/799 > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send

Re: [qubes-users] Installing Mirage Firewall

2019-04-17 Thread 799
b.com/Qubes-Community/Contents/blob/master/docs/customization/mirage-firewall.md You can run all steps from dom0 ;-) If you need further help, to not hesitate to ask. I'd like to hear your feedback, if we can improve the howto. - O/799 -- You received this message because you are subscribed to t

Re: [qubes-users] Re: Looking to edit rules.ml of my mirage-firewall VM but since I cannot run shell, IDK what to do

2019-04-12 Thread 799
es between the AppVms | { src = `Client _; dst = `Client _; proto = `TCP _; packet } when not (is_tcp_start packet) -> `Accept Can you add more details about this rules, its an any-to-any rule, but what is "when not (is_tcp_start packet) ? - O/799 -- You received this message because you are

Re: [qubes-users] Alt+Tab not redirected in AppVM

2019-04-11 Thread 799
Hello, On Wed, 10 Apr 2019 at 22:43, awokd wrote: > 799 wrote on 4/10/19 8:37 PM: > > 'awokd' via qubes-users schrieb am Mi., > 10. > > Apr. 2019, 22:30: > > > >> 799 wrote on 4/10/19 8:12 PM: > >> > >>>I tried edting the shortcut fi

Re: [qubes-users] Alt+Tab not redirected in AppVM

2019-04-10 Thread 799
'awokd' via qubes-users schrieb am Mi., 10. Apr. 2019, 22:30: > 799 wrote on 4/10/19 8:12 PM: > > > I tried edting the shortcut file in > > ~/.config/xfce4/xfconf/xfce-perchannel-xml/xfce4-keyboard-shortcuts.xml > (...) > > ... but those settings didn't work, noth

Re: [qubes-users] Alt+Tab not redirected in AppVM

2019-04-10 Thread 799
Hello, On Tue, 9 Apr 2019 at 19:39, awokd wrote: > 799 wrote on 4/9/19 7:28 AM: > > > I think the easiest way is 1) switching Alt+Tab against Windows+Tab. > > Can this be done? > > Maybe > > https://superuser.com/questions/458846/how-to-map-alttab-behavior-t

Re: [qubes-users] Re: Looking to edit rules.ml of my mirage-firewall VM but since I cannot run shell, IDK what to do

2019-04-10 Thread 799
mirage build VM. -O/799 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, sen

Re: [qubes-users] Re: How risky is GPU pass-through?

2019-04-09 Thread 799
Hello throwaway42, schrieb am Di., 9. Apr. 2019, 21:17: > (...) > Just for information: > I have a gaming VM inside Qubes OS > It is a windows 7 HVM, with a dedicated GPU. > Performance are very good. > I referenced some useful links here https://neowutran.ovh/qubeos.pdf Nice write-up ...

[qubes-users] Alt+Tab not redirected in AppVM

2019-04-09 Thread 799
Hello, I am using a fedora-29 based AppVM ("my-office") to connect to my corporate virtual desktop using VMware Horizon View. Unfortunately the Alt+Tab key sequence is not forwarded into the virtual desktop. I totally understand that his has been done to improve security, so that no AppVM can

Re: [qubes-users] Re: qubes-mirage-firewall 0.5

2019-04-08 Thread 799
Hello qmirfw, 'qmirfw' via qubes-users schrieb am Di., 9. Apr. 2019, 00:51: > On Monday, April 8, 2019 11:40 PM, 799 wrote: > > Any ideas what I am missing? > > I don't know. I just did a build using fedora (based on unmodified Qubes > fedora-29 template) and got no err

Re: [qubes-users] Re: qubes-mirage-firewall 0.5

2019-04-08 Thread 799
Hello, I've created a howto page in the Qubes Community docs to collect all information which is needed to build/install the mirage firewall for qubes OS. https://github.com/Qubes-Community/Contents/blob/master/docs/customization/mirage-firewall.md I tried to build mirage in a new template VM

Re: [qubes-users] Re: qubes-mirage-firewall 0.5

2019-04-08 Thread 799
Hello, 'qmirfw' via qubes-users schrieb am Mo., 8. Apr. 2019, 16:08: > (...) > This is what I do: (...) > Unfortunately I don't understand all steps, for example what ... # Fix the reproducible build git pull origin pull/52/head ... means. As the firewall is very (!) important to keep Qubes

Re: [qubes-users] Re: qubes-mirage-firewall 0.5

2019-04-07 Thread 799
Hello haaber, As you have at least some more progress and are currently busy resolving issues with the build process, maybe you can help me coming to this point. haaber schrieb am Mo., 8. April. > (...) So: I did it, actually > three times, more and more frustrated. Arezo using a standalone

Re: [qubes-users] qubes-mirage-firewall 0.5

2019-04-07 Thread 799
Hello Thomas, Thomas Leonard schrieb am Do., 4. Apr. 2019, 12:27: > I'd like to announce the release of qubes-mirage-firewall 0.5: > https://github.com/mirage/qubes-mirage-firewall/releases/tag/v0.5 > (...) > For installation instructions, see: >

Re: [qubes-users] sys-usb based on fedora-29-minimal >> what am I missing?

2019-03-31 Thread 799
Hello Unman, On Wed, 27 Mar 2019 at 01:49, unman wrote: > The obvious question is, IS it attached to the qube? and HOW? > Check what the widget says (I assume that's what you mean by GUI), then > open a konsole in dom0 and run qvm-usb. Try to attach the device at the > command line. Run qvm-usb

Re: [qubes-users] Problem buildung a fedora-29-minimal-based sys-usb AppVM

2019-03-31 Thread 799
Hello Awokd, On Sat, 30 Mar 2019 at 16:32, awokd wrote: > > [...] > > QUESTION: > > Any idea what I am missing, to get a sys-usb AppVM which is based on a > > custom build fedora-29-minimal based template? > > This worked first try for me using your package list. I was able to use > both

[qubes-users] Boot Qubes into CLI

2019-03-25 Thread 799
Hello, Is it possible to boot into Qubes without launching a desktop environment while still being able to work in the CLI of an AppVM. As my some part of my work can be done in emacs/mu4e and org-mode I'd like to give Qubes a try without using a desktop environment and see how big the gain is

Re: [qubes-users] coreboot on modern hardware?

2019-03-25 Thread 799
Hello, schrieb am Mo., 25. März 2019, 02:15: > That was one of the first places I looked. Maybe I’m just a hardhead, but > I found it difficult to believe that there really was no support for > coreboot in any form for modern hardware. > The problem seems to be that on modern hardware it is

Re: [qubes-users] coreboot on modern hardware?

2019-03-24 Thread 799
Hello, schrieb am So., 24. März 2019, 10:11: > On 2019-03-23 19:03, jrsmi...@gmail.com wrote: > > Spent several hours yesterday trying to track down what I would need > > to do to install coreboot on all of my computers, starting with my > > Qubes box: a Levnovo Thinkpad T480. [...] > I'd

Re: [qubes-users] Shrinking a private volume

2019-03-24 Thread 799
Hello Unman, unman schrieb am So., 24. März 2019, 03:17: > [...] > We're all working on the assumption that you have Qubes 4.0 - can you > confirm that? > Yes, of course - sorry for not mentioning this, but I don't see why someone would run Q3.2, I have switched to 4.0 shortly after the

Re: Re[2]: [qubes-users] Responding to the Whonix trolls...

2019-03-02 Thread 799
cooloutac schrieb am Sa., 2. März 2019, 22:16: > [...] > Stop being a nazi. > Please don't write such quotes in a public forum, as someone who might argue that he wants to silence the discussion (which don't have to be ok) is something completely different from someone who was involved in

Re: [qubes-users] Shrinking a private volume

2019-02-27 Thread 799
Hello Stuart, On Wed, 27 Feb 2019 at 01:57, Stuart Perkins wrote: > > On Tue, 26 Feb 2019 22:30:35 +0100 > 799 wrote: > >Honestly I don't understand why it is not possible to shrink a volume as > >this is something which can done in linux. > >Does someone has an ide

Re: [qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-02-26 Thread 799
Hello awokd, >> [...] >> You might want just the 800x600 setting, and maybe not Cirrus... >> [...] I was able to change the resolution, so that the android AppVM can run on my lowres x230: On launch I added the follwing line to grub: video=800x600-32 Unfortunately I have to do this on each run,

[qubes-users] Running Qubes on X230 with the FullHD Mod - someone tried this before?

2019-02-26 Thread 799
Hello, for me the lenovo x230 is the perfect laptop to run qubes as it has a core i7, SSD, 16GB RAM, working LTE-WWAN and can be "coreboot'ed" and using the external slice battery pack it has a great battery runtime (even when running Qubes). The only problem I have is the low screen resolution

[qubes-users] Problem buildung a fedora-29-minimal-based sys-usb AppVM

2019-02-26 Thread 799
Hello, since the first days using Qubes I made notes how I setup my templates and AppVMs to able to rebuild my system from scratch if parts of it get compromised or if I migrate the system to other hardware. I have been able to rebuild all my Sys-VMs (sys-net / sys-firewall / sys-usb) from a

[qubes-users] Shrinking a private volume

2019-02-26 Thread 799
Hello, I've migrated ~150gb of data into a Qubes Storage Qube. After cleaning up older files I have reduced the data to 100gb. Now I'd like to free the additional 50gb so that dom0 can use this capacity for other qubes. Unfortunately I found out that shrinking volumes is not possible according

Re: [qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-02-24 Thread 799
Hello, schrieb am Mo., 25. Feb. 2019, 03:17: > (...) > Hi, please note that Alex's guide was created just before Android-x86 Oreo > was released. If you change 'repo init -u git:// > git.osdn.net/gitro,ot/android-x86/manifest > -b

Re: [qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-02-24 Thread 799
Hello Alex, I have succesfully used your .ISO to build a test-android AppVM, following your howto. > Create android VM in dom0: > qvm-create --class StandaloneVM --label green --property virt_mode=hvm android > qvm-prefs android kernel '' > qvm-prefs android 'sys-android' I think this is a typo

Re: [qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-02-24 Thread 799
On Sat, 1 Dec 2018 at 17:33, wrote: > On Saturday, December 1, 2018 at 5:47:52 AM UTC, alex.b...@gmail.com > wrote: > > [...] > > Do you mind sharing the resulting images for testing? I'll have hard > time compiling this myself on old Core m3/8Gb machine... > > You can try this image, but I

Re: [qubes-users] disposible vms for sys-net, firewall, usb?

2019-02-24 Thread 799
Hello Chris, On Sun, 24 Feb 2019 at 00:22, Chris Laprise wrote: > [...] > As you may already know, I created a Qubes service that provides most of > the benefits of a dispVM by removing, hash checking, repopulating or > whitelisting the contents of a VM's private volume: > >

Re: [qubes-users] Android-x86 7.1-r2 with GAPPS installation guide

2019-02-24 Thread 799
Hello, schrieb am Fr., 30. Nov. 2018, 16:22: > I've successfully build android-x86 7.1-r2 with gapps in whonix-14-ws > AppVM. > (...) As far as I understand following the guide from Alex will result in a self compiled Android ISO, which can be used to create an Android AppVM. Has someone

Re: [qubes-users] disposible vms for sys-net, firewall, usb?

2019-02-23 Thread 799
Hello, Stumpy schrieb am Sa., 23. Feb. 2019, 17:58: > (...) dvms could be used for things like sys-net usb and firewall which > had never occured to me. > I may not be thinking about it right but that seemed like a really good > security idea, so my question is, why is that not the default?

Re: [qubes-users] Re: Best ideal laptop for Qubes?

2019-02-23 Thread 799
schrieb am Sa., 23. Feb. 2019, 14:35: > > Not quite sure why people try use Qubes with laptops. I found far better > performance on desktops. Laptops are the opposite of flexible. PC's you can > upgrade to your hearts content. > Maybe because for 90% a laptop offers enough performance, has much

Re: [qubes-users] dom0 command to update multiple templates?

2019-02-10 Thread 799
Hello, Am Fr., 8. Feb. 2019, 03:52 hat Stumpy geschrieben: > I tried a variation or two of: > sudo qvm-run -u root fedora-29 dnf update && sudo qvm-run -u root > debian-8 apt-get update > but none of them worked. > The little sun icon/updater doesnt seem to be working completely yet > though

Re: [qubes-users] Hijacking Threads

2019-02-02 Thread 799
Hello Am Sa., 2. Feb. 2019, 12:31 hat geschrieben: > (...) > Many times hijacking is used by a minority, as tactic to deflect > attention away from or avoid answering the original question/comment/query. Do you have any example where users do so and why should someone do this on purpose? So

[qubes-users] Help installing package in template VM via snap

2019-01-26 Thread 799
Hello, I am trying to update my multimedia howto for Qubes and would like to use a fedora-29--minimal template instead of debian. I try to install a package via snap but the template VM is not allowed to access the repository: snap install , results in: api.snapcraft.io ... read: connection

Re: [qubes-users] Re: looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-26 Thread 799
Am Sa., 26. Jan. 2019, 04:33 hat Andrew David Wong geschrieben: > > Please take a look at this issue: > > https://github.com/QubesOS/qubes-issues/issues/3571 Happy to see that this topic (no clipboard from dom0) is at least known. I don't agree that copying from dom0 is dangerous because "The

Re: [qubes-users] looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread 799
Hello, Am Fr., 25. Jan. 2019, 21:04 hat gone geschrieben: > 1st of all, I have read this: > https://www.qubes-os.org/doc/copy-from-dom0/ > > Maybe I just draw a mental blank but I can't find a really > quick way to copy text (not files) from dom0-Terminal to > another VM (into a post like this

Re: [qubes-users] Re: Can't open xterm from default fedora-29-minimal template

2019-01-14 Thread 799
Hello TonyT, Am Mo., 14. Jan. 2019, 01:36 hat Tonyt geschrieben: > [...] > This sounds like this: > https://github.com/QubesOS/qubes-issues/issues/4671 > > Which I solved with this: > The problem: missing e2fsprogs, so /rw cannot be prepared. > quick workaround: qvm-run -u root --no-gui -p

  1   2   3   4   >