On Thu, 2020-07-30 at 22:19 +0200, Johannes Graumann wrote:
> On Thu, 2020-07-30 at 21:57 +0200, Qubes wrote:
> > On 7/30/20 9:50 PM, Johannes Graumann wrote:
> > > On Thu, 2020-07-30 at 21:48 +0200, Qubes wrote:
> > > > On 7/30/20 9:42 PM, Johannes Graumann wrote
On Thu, 2020-07-30 at 21:57 +0200, Qubes wrote:
> On 7/30/20 9:50 PM, Johannes Graumann wrote:
> > On Thu, 2020-07-30 at 21:48 +0200, Qubes wrote:
> > > On 7/30/20 9:42 PM, Johannes Graumann wrote:
> > > > On Thu, 2020-07-30 at 17:36 +0200, Qubes wrote:
> >
On Thu, 2020-07-30 at 21:48 +0200, Qubes wrote:
> On 7/30/20 9:42 PM, Johannes Graumann wrote:
> > On Thu, 2020-07-30 at 17:36 +0200, Qubes wrote:
> > > On 7/30/20 4:33 PM, Johannes Graumann wrote:
> > > > Hi,
> > > >
> > > > I'm f
On Thu, 2020-07-30 at 17:36 +0200, Qubes wrote:
> On 7/30/20 4:33 PM, Johannes Graumann wrote:
> > Hi,
> >
> > I'm fond of using torbrowser in a whonix-ws-15 based sip VM for all
> > browsing that possibly works.
> >
> > In parallel I manage all a
Hi,
I'm fond of using torbrowser in a whonix-ws-15 based sip VM for all
browsing that possibly works.
In parallel I manage all authentication using a Mooltipass device for
the storage of random long passwords - this little machine mimics a USB
keyboard.
Out of the box I am unable to use the
: no such domain: 'toto'
[user@dom0 ~]$ echo $?
2
[user@dom0 ~]$ qvm-check sys-net
qvm-check: sys-net: exists
[user@dom0 ~]$ echo $?
0
Best,
Frédéric
On 2020-05-19 10:35, Christophe wrote: qvm-ls|grep yourvmname
On 20/05/19 10:32AM, Johannes Graumann wrote: Hello,
See subject line ;)
Sincerely, Joh
--
You
On 2020-05-19 10:35, Christophe wrote:
qvm-ls|grep yourvmname
On 20/05/19 10:32AM, Johannes Graumann wrote:
Hello,
See subject line ;)
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
Hello,
See subject line ;)
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion
On 2020-02-27 20:32, David Hobach wrote:
On 2/26/20 10:23 PM, Johannes Graumann wrote:
Hi,
I'm experimenting with creating a sys-dropbox vm that syncs with my
dropbox account. I would love to be able to then mount defined
subdirectories of the synced path to other vms (losetop/qvm-block
Hi,
I'm experimenting with creating a sys-dropbox vm that syncs with my
dropbox account. I would love to be able to then mount defined
subdirectories of the synced path to other vms (losetop/qvm-block-
style, which only works for files).
Is this possible? Where to find pointers?
Sincerely, Joh
On 2020-02-13 18:36, Claudio Chinicz wrote:
Hi Sven,
Thanks again. I've tried them and found the following:
- KMail is not allowed to authenticate with Oath2 from Google (my accounts are
Gmail)
- Evolution now does not support Gnupg
- Claws is not available for Fedora
Sorry for insisting..
On Sat, 2019-12-28 at 16:15 +0100, dhorf-hfref.4a288...@hashmail.org
wrote:
> On Sat, Dec 28, 2019 at 04:03:12PM +0100, Johannes Graumann wrote:
> > A current Arch template would help this much, but the repos contain
> > no
> > such image for 4.0 and the qubes-builde
On Sat, 2019-12-28 at 16:15 +0100, dhorf-hfref.4a288...@hashmail.org
wrote:
> On Sat, Dec 28, 2019 at 04:03:12PM +0100, Johannes Graumann wrote:
> > A current Arch template would help this much, but the repos contain
> > no
> > such image for 4.0 and the qubes-builde
Gentlepeople,
I'm migrating an Arch setup to qubes (4.0). This is complicated by the
rel. bleeding edge nature of Arch and the resulting software version
incompatibility/unavailability.
Currently I try to move a Digikam Archiving setup (Arch 6.4.0-4,
Fedora-30 6.1.0-7, Debian-10 4:5.9) with
Hello,
I'm experimenting with a more "one app - one VM" paradigm using a
minimal template with flatpak installed and then VMs based on it that
pull in individual apps int flatpak's --user local installs. I just
don't want to have a plethora of templates with different software
subsets, but
On 2019-10-09 20:43, Brian C. Duggan wrote:
On 10/8/19 6:45 AM, Johannes Graumann wrote: 2) I'm unclear about whether the fedora-/debian-X-minimal template VMs
require additional packages to be managed through salt.
https://www.qubes-os.org/doc/templates/minimal/ appears to indicate so: Also
Hello,
What's the mechanism behind the fact that if I start firefox in a
standard dispvm (as installation-provided) and terminate the program.
the VM shuts down along with it?
Thank for any hints.
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
Gentlepeople,
I'm finally biting the bullet and setting out to salt my Qubes.
1) DARN is it complicated in comparison to Ansible - not least because
of the ... interesting ... obsession with the physical characteristics
of salty minerals (grain, pillar, ...) - just call it what if
On Thu, 2019-07-18 at 15:40 +0100, unman wrote:
> On Tue, Jul 16, 2019 at 10:56:13AM -0700, brendan.h...@gmail.com
> wrote:
> > On Tuesday, July 16, 2019 at 10:35:11 AM UTC-4, unman wrote:
> > > I really do recommend using qubesctl for almost all system
> > > configuration. If only because it
On Thu, 2019-07-18 at 12:49 +0200, Johannes Graumann wrote:
> On Thu, 2019-07-18 at 07:51 +0530, Kushal Das wrote:
> > On Thu, Jul 18, 2019 at 12:44 AM Johannes Graumann
> > wrote:
> > > On Wed, 2019-07-17 at 18:56 +0530, Kushal Das wrote:
> > > > On Tue, Jul
On Thu, 2019-07-18 at 07:51 +0530, Kushal Das wrote:
> On Thu, Jul 18, 2019 at 12:44 AM Johannes Graumann
> wrote:
> > On Wed, 2019-07-17 at 18:56 +0530, Kushal Das wrote:
> > > On Tue, Jul 16, 2019 at 11:26 PM wrote:
> > > > On Tuesday, July 16, 2019
On Wed, 2019-07-17 at 18:56 +0530, Kushal Das wrote:
> On Tue, Jul 16, 2019 at 11:26 PM wrote:
> > On Tuesday, July 16, 2019 at 10:35:11 AM UTC-4, unman wrote:
> > > I really do recommend using qubesctl for almost all system
> > > configuration. If only because it makes recovery so much easier.
>
I became aware of guix through an announcement that it is now 1.0 (
https://www.gnu.org/software/guix/blog/2019/gnu-guix-1.0.0-released/)
as it purportedly allows environment install/maintenance in user space,
I was wonderung whether anyone has used it on qubes to install appVM
specific software
On Sat, 2019-04-06 at 06:31 -0700, Thomas Leonard wrote:
> I got a few emails about this. I'm going to answer the questions here
> because this is a community project and everyone should see the
> discussion.
>
> Q: The build-with-docker script hard-codes /home/opam. What if your
> user has a
On Tue, 2019-02-12 at 08:08 -0500, Chris Laprise wrote:
> On 2/12/19 4:40 AM, Johannes Graumann wrote:
> > Gentlepeople,
> >
> > After playing with it on a secondary machine, I'm looking to
> > transition
> > from my Arch-setup to Qubes.
> >
> > I
On Sat, 2019-02-16 at 11:21 +0100, evo wrote:
>
> On 2/16/19 11:17 AM, Johannes Graumann wrote:
> > On Sat, 2019-02-16 at 11:08 +0100, evo wrote:
> > > Hey!
> > >
> > > I got the message that i don't have enough memory to start a
> > >
On Sat, 2019-02-16 at 11:08 +0100, evo wrote:
> Hey!
>
> I got the message that i don't have enough memory to start a domain.
> How can i understand, what exactly the problem is?
> Is it a RAM problem on the dom, or in the domain itself, or on the
> whole
> system?
Others must answer this.
>
>
Gentlepeople,
After playing with it on a secondary machine, I'm looking to transition
from my Arch-setup to Qubes.
I am traditionally choosing to encrypt my file systems using serpent
(considered the strongest entry into the AES competition with slightly
worse speed than the finally choosen
On Sun, 2019-01-06 at 23:14 +0100, haaber wrote:
> > It's running fine for me from a flatpak --user install ... has the
> > advantage that the template only needs flatpak and all signal is in
> > the
> > appVM only.
> >
> > Joh
> >
> > On Fri, 2019-01-04 at 18:57 -0600, Sven Semmler wrote:
> > >
Gentlepeople,
I have a conceptual question regarding a sensible layout of VMs and
networking in the context of aiming at a qubes instance fully managed
by scripting (salt or ansible, or shell, or ...).
How would you set up a system that a) allows to automatedly configure
qubes from dom0 (or even
On Mon, 2018-10-15 at 12:35 -0400, Kushal Das wrote:
> On Mon, Jul 2, 2018 at 12:13 PM Marek Marczykowski-Górecki
> wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On Mon, Jul 02, 2018 at 05:17:31PM +0200, Johannes Graumann wrote:
>
On Mon, 2018-05-28 at 09:46 +0200, Johannes Graumann wrote:
> On Mon, 2018-05-28 at 00:40 +0200, [799] wrote:
> > Hello Johannes,
> >
> > On 05/28 12:00, Johannes Graumann wrote:
> > > The fedora-27-minimal template from the repo does not appear to
> > > ha
On Mon, 2018-05-28 at 00:40 +0200, [799] wrote:
> Hello Johannes,
>
> On 05/28 12:00, Johannes Graumann wrote:
> > The fedora-27-minimal template from the repo does not appear to
> > have
> > networking support. What needs to be installed to remedy that?
>
>
Hello,
The fedora-27-minimal template from the repo does not appear to have
networking support. What needs to be installed to remedy that?
Thank you for any hint.
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
I cannot second that. They are responsive. Not super fast, but
competent and responsive.
Joh
On Fri, 2018-04-20 at 03:35 -0700, ThierryIT wrote:
> What I have already done ... No answers from them ... Like their
> support, no existent :(
>
> Le vendredi 20 avril 2018 12:47:33 UTC+3,
On Mon, 2018-03-19 at 01:32 -0700, niepowie...@gmail.com wrote:
> Hello,
>
> I'm trying make set up vpn with bitmask application.
>
> I tried install bitmask to debian template.
>
> have done steps listed on bitmask site as below in termainal:
>
> sudo apt install leap-archive-keyring
> sudo
On Mon, 2018-02-12 at 17:04 +0100, Johannes Graumann wrote:
> On Wed, 2018-02-07 at 15:27 +0100, Johannes Graumann wrote:
> > Gentlepeople,
> >
> > For a while I have been managing a qubes setup using a dedicated
> > management VM and ansible via https://github.co
On Mon, 2018-02-12 at 09:10 -0800, brendan.h...@gmail.com wrote:
> I had to reread the thread three times to realize that qvm-prefs and
> qubes-prefs were different. :)
>
Indeed ... that is what happened to me too ... after changing the
default dvm for all VMs via 'qvm-prefs' and globally via
On Wed, 2018-02-07 at 15:27 +0100, Johannes Graumann wrote:
> Gentlepeople,
>
> For a while I have been managing a qubes setup using a dedicated
> management VM and ansible via https://github.com/Rudd-O/ansible-qubes
> .
> As auditing that code is beyond me and as salt is inte
On Fri, 2018-02-09 at 08:11 +, Johannes Graumann wrote:
> Hello,
> Trying to purge all fedora 25 traces (aside from dom0) from my
> system.
> I have started to work my way through the dependencies following this
> workflow:
> 1) qvm-remove fedora-25-dvm
> 2) journalctl -r
Hello,
Trying to purge all fedora 25 traces (aside from dom0) from my system.
I have started to work my way through the dependencies following this
workflow:
1) qvm-remove fedora-25-dvm
2) journalctl -r
3) qvm-prefs --set default_dispvm whonix-ws-dvm
It's kind of annoying that the
Gentlepeople,
For a while I have been managing a qubes setup using a dedicated
management VM and ansible via https://github.com/Rudd-O/ansible-qubes.
As auditing that code is beyond me and as salt is integral to qubes, I
was wondering whether that layout is currently possible using the salt
On Thu, 2017-12-14 at 01:51 -0500, haaber wrote:
> Thank you both for comments. That must be a *very* slow boot, it is
> up
> for 12h now, and still no xterm available, neither via qubes-menu,
> nor
> via qvm-run in dom0 :)) Anyhow, it seems better to download the
> template.
>
> How to you get
On Tue, 2017-10-24 at 05:36 -0700, Roy Bernat wrote:
> On Tuesday, 24 October 2017 04:21:48 UTC-4, Marek Marczykowski-
> Górecki wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > Hello,
> >
> > We have just released Qubes 4.0-rc2:
> >
> >
On Wed, 2017-09-27 at 13:19 +0200, Johannes Graumann wrote:
> Gentlepeople,
>
> I recently managed to install the community whonix templates into my
> 4.0 setup and have since been striving to recreate the arrangements
> of
> proxyvms etc. I ran in 3.2.
>
> In this proc
Gentlepeople,
I recently managed to install the community whonix templates into my
4.0 setup and have since been striving to recreate the arrangements of
proxyvms etc. I ran in 3.2.
In this process I erroneously create a vm called 'sys-whonix-gw', using
the whonix-gw template. I proceeded to
On Wed, 2017-09-27 at 06:12 -0400, 'One7two99' via qubes-users wrote:
> Hello,
>
> while trying to script some basic tasks I found out that I am missing
> some small features in the qvm-* scripts, I have looked at the code
> of those script but it is to hard for me to understand exactly what
>
On Sun, 2017-09-10 at 23:19 +0200, cubit wrote:
> 22. Jun 2017 12:37 by cu...@tutanota.com:
>
> > Is there existing any pre-made templates for Debian 9?
>
>
> Halo
>
> Is there any news on Debian 9 template?
>
> Can also someone remind we the URL to check which templates are
>
On Fri, 2017-09-01 at 19:19 -0400, taii...@gmx.com wrote:
> AMD PSP is AMD's version of ME present in the new AMD stuff - one has
> to
> buy an older 2013 or before AMD x86 CPU to avoid it generally.
>
> Todays options for *new* owner controlled performance hardware is
> POWER8
> and 9 - x86 is
On Thu, 2017-07-06 at 09:01 +0200, 'Olivier Médoc' via qubes-users
wrote:
> On 07/04/2017 08:40 AM, Johannes Graumann wrote:
> > Hello,
> >
> > Can anyone give any pointers what needs to be done to have "qubes-
> > usb-
> > proxy" available in the ArchLi
Hello,
Can anyone give any pointers what needs to be done to have "qubes-usb-
proxy" available in the ArchLinux template kindly provided by Olivier
Medoc? Is there a howto on building this package anywhere?
I have the template running nicely following Olivier's recent hints in
the group
On Tue, 2017-05-30 at 09:19 +0200, Johannes Graumann wrote:
> Hello,
>
> Does a package exist to make qvm-usb work with the community
> Archlinux
> template?
>
> Sincerely, Joh
>
Found this in the archives: https://groups.google.com/d/msg/qubes-users
/Mk6F4ZKzfk4/-oJ
Hello,
Does a package exist to make qvm-usb work with the community Archlinux
template?
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Sat, 2017-05-20 at 21:10 +0100, Unman wrote:
> On Sat, May 20, 2017 at 09:28:48PM +0200, Johannes Graumann wrote:
> > See subject line ;)
> >
> > Joh
>
> ls -l /var/lib/qubes/dvmdata/*
>
> This will show you which dvmTemplate is being used to generate th
See subject line ;)
Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to
On Tue, 2017-05-16 at 06:26 -0700, Patrik Hagara wrote:
> On Fri, 2017-05-12 at 08:39 +0200, Johannes Graumann wrote:
> > Is there a way to use the CLI to
> >
> > 1) access what apps a VM has available
>
> You can find the .desktop files for all available
> program
On Fri, 2017-05-12 at 08:39 +0200, Johannes Graumann wrote:
> Hi,
>
> Is there a way to use the CLI to
>
> 1) access what apps a VM has available
>
> and
>
> 2) which of them should be shown in the menue?
>
> Sincerely, Joh
>
No insight, anybod
Hi,
Is there a way to use the CLI to
1) access what apps a VM has available
and
2) which of them should be shown in the menue?
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
On Thu, 2017-04-27 at 08:13 +0200, Johannes Graumann wrote:
> Hello,
>
> As I am transitioning all aspects of my evolving setup into qubes,
> I'm
> stuck at making a SCR3310 smartcard reader (used to store my gpg
> secret
> key) usable in an AppVM based on fedora25-mi
Hello,
As I am transitioning all aspects of my evolving setup into qubes, I'm
stuck at making a SCR3310 smartcard reader (used to store my gpg secret
key) usable in an AppVM based on fedora25-minimal (had tu upgrade, as
evolution-functionality I require is not in fedora24) and dedicated to
run
Hi,
Has anyone figured out a setup for qubes-usb-proxy-based USB-
passthrough that will allow for automatic (and active) monitoring of
sys-usb connections and VMs? I'm envisioning a situation where I tell
the proxy setup that
1) if device X shows up and VM Y is running, the device should be
On Wed, 2017-04-19 at 16:07 -0600, Reg Tiangha wrote:
> On 04/19/2017 04:01 PM, Johannes Graumann wrote:
> > As a majorly debian & arch oriented person, I am faced with the
> > situation that the fedora-24 contained version of evolution which I
> > require for i
As a majorly debian & arch oriented person, I am faced with the
situation that the fedora-24 contained version of evolution which I
require for its EWS (Exchange) support, is broken with respect to
another functionality that I need to work (CardDAV). In debian I would
now go looking whether I
On Tue, 2017-04-18 at 21:28 +0200, Alex wrote:
> On 04/18/2017 09:27 PM, nonse...@graumannschaft.org wrote:
> > Hi,
> >
> > Us it possible to manage parameters (like what net vm to use) for
> > individual vms from the command line? Lets say the system defaults
> > to
> > sys-whonix, but specific
On Sun, 2017-04-09 at 20:40 -0700, Andrew David Wong wrote:
> On 2017-04-08 10:20, Johannes Graumann wrote:
> > Hello,
> >
> > Are there any pointers at how to achieve adding more users/pass
> > phrases to the disk encryption setup as produced by a default Qubes
>
I am wondering whether
1) under QubesOS a (USB) HW RNG like http://www.bitbabbler.org/ is
usable
and if yes
2) where attaching it would make most sense? sys-net? dom0? Can Xen
VM's be set up to feed on entropy provided by the host?
Thanks for any hint.
Sincerely, Joh
--
You received this
Hello,
Are there any pointers at how to achieve adding more users/pass phrases
to the disk encryption setup as produced by a default Qubes install?
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
67 matches
Mail list logo