On Mon, 2022-05-30 at 14:11 -0400, Demi Marie Obenour wrote:
> On Sat, May 28, 2022 at 12:56:42PM +0200, Johannes Graumann wrote:
> > On Tue, 2022-05-24 at 12:35 -0400, Demi Marie Obenour wrote:
> > > On Tue, May 24, 2022 at 10:37:18AM +0200, Qubes OS Users Mailing
>
On Tue, 2022-05-24 at 12:35 -0400, Demi Marie Obenour wrote:
> On Tue, May 24, 2022 at 10:37:18AM +0200, Qubes OS Users Mailing List
> wrote:
> > https://www.qubes-os.org/doc/how-to-use-disposables/#making-a-particular-application-open-everything-in-a-disposable
> > states:
> > > To do this [make
On Wed, 2022-05-25 at 15:08 +0100, 'unman' via qubes-users wrote:
> On Tue, May 24, 2022 at 11:54:27PM +0200, 'Johannes Graumann' via
> qubes-users wrote:
> > Can any one point me to why the following fails? I have been
> > banging my
> > head against this for a whi
Can any one point me to why the following fails? I have been banging my
head against this for a while ...
--- SNIP ---
create bind dirs config file:
file.managed:
- name: /rw/config/qubes-bind-dirs.d/50_user.conf
- makedirs: True
- mode: 644
- dir_mode: 755
{% set binddirs =
https://www.qubes-os.org/doc/how-to-use-disposables/#making-a-particular-application-open-everything-in-a-disposable
states:
> To do this [make a particular application open everything in a
> disposable VM], enable a service named app-dispvm.X in that qube,
> where X is the application ID.
and
On Thu, 2022-05-12 at 06:27 -0400, Demi Marie Obenour wrote:
> On Thu, May 12, 2022 at 11:26:53AM +0200, Qubes OS Users Mailing List
> wrote:
> > I have a setup with appVMs that are configured to autostart a
> > subset of
> > apps when they get fired up - one example is `app-privcom` that
> >
I have a setup with appVMs that are configured to autostart a subset of
apps when they get fired up - one example is `app-privcom` that runs
`evolution`, `signal-desktop` (from a user level installed flatpak just
in that VM) and `liferea` (also a flatpak) when coming online.
Given the user-level
> On 03.05.2022 11:32 Frédéric Pierret wrote:
>
>
> Hello,
>
> Just writing what I'm thinking (not Salt expert at all!), you are probably
> missing default value in the .get(): .get('kernelrelease', SOMETHING_DEFAULT)
>
> Le 5/3/22 à 11:01, 'Johannes Grauma
I have the following `*.sls` in my `salt`setup:
{% if salt['pkg.version_cmp'](salt['grains'].get('kernelrealease'),
'5.12') < 0 %}
move broken AX260 wifi blob out of the way:
file.rename:
- name: /usr/lib/firmware/iwlwifi-ty-a0-gf-ao.pnvm.xz.bak
- source:
On Tue, 2022-04-12 at 15:10 +0200, Johannes Graumann wrote:
> On Fri, 2022-04-08 at 04:45 +0200, airelemental via qubes-users
> wrote:
> >
> >
> > > See subject line - I'd like to remap the `/home/user` bit to
> > > `/tmp`
> > > to
> > > en
On Fri, 2022-04-08 at 04:45 +0200, airelemental via qubes-users wrote:
>
>
> > See subject line - I'd like to remap the `/home/user` bit to `/tmp`
> > to
> > enforce cleanup ...
> >
> > Thanks for any pointers.
> >
> > Joh
> >
> In /rw/config/rc.local, you can create /tmp/QubesIncoming. Then
On Tue, 2022-04-05 at 19:39 +0200, 'Johannes Graumann' via qubes-users
wrote:
> On Tue, 2022-04-05 at 19:37 +0200, David Hobach wrote:
> > And the last time I tried Citrix on Qubes, I just installed it to
> > the
> > home directory (there was a tarball for download IIRC).
>
On Tue, 2022-04-05 at 20:16 +0200, David Hobach wrote:
> > A related question: howto transfer a binary file (like the citrix
> > tarball) to dom0 for integration into the salt setup?
> >
> > the `qvm-run` and `cat`-based version in the docs does not work in
> > this
> > case.
>
> Just pack it
On Tue, 2022-04-05 at 19:39 +0200, 'Johannes Graumann' via qubes-users
wrote:
> On Tue, 2022-04-05 at 19:37 +0200, David Hobach wrote:
> > And the last time I tried Citrix on Qubes, I just installed it to
> > the
> > home directory (there was a tarball for download IIRC).
>
On Tue, 2022-04-05 at 19:37 +0200, David Hobach wrote:
> And the last time I tried Citrix on Qubes, I just installed it to the
> home directory (there was a tarball for download IIRC).
This is really exciting ... will try this ... the rpm puts it into
`/opt` ... would remove the need for a
Hi,
I'm maintaining my setup using salt.
For work I need to use proprietary software (citrix client) - a picture
perfect use case for a dedicated template/app vm combo (sadly there
isn't a flatpak, which via user space-installation would allow me to
bypass the dedicated template).
Citrix now is
See subject line - I'd like to remap the `/home/user` bit to `/tmp` to
enforce cleanup ...
Thanks for any pointers.
Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
> On 28.03.2022 15:06 'Johannes Graumann' via qubes-users
> wrote:
>
>
>
> Please see subject line. The corresponding port on the ThnikPad and the cable
> used are OK, as I can use them to hook up a USB keyboard, which is recognized
> by my `sys-usb` VM and usable u
Please see subject line. The corresponding port on the ThnikPad and the cable
used are OK, as I can use them to hook up a USB keyboard, which is recognized
by my `sys-usb` VM and usable upon attaching it to a VM.
It's also not the dock itself, as I have tried with an identical model that
works
> On 26.03.2022 22:09 'Johannes Graumann' via qubes-users
> wrote:
>
>
> Hello,
>
> I recently switched my laptop/dom0 installation from the intel to the
> nvidia/nouveau graphics card included.
>
> I have been running task/app dedicated VMs without hav
Hello,
I recently switched my laptop/dom0 installation from the intel to the
nvidia/nouveau graphics card included.
I have been running task/app dedicated VMs without having to install all
software into the corresponding minimal templates by augmenting them with
user-level flatpaks.
For
> On Thu, Mar 24, 2022 at 02:38:16PM +0100, 'Johannes Graumann' via qubes-users
> wrote:
> > > On 24.03.2022 13:39 'Johannes Graumann' via qubes-users
> > > wrote:
> > >
> > >
> > >
> > >
> > > >
> On 24.03.2022 13:39 'Johannes Graumann' via qubes-users
> wrote:
>
>
>
>
> > On 24.03.2022 12:16 'Johannes Graumann' via qubes-users
> > wrote:
> > ...
> > As the laptop's HDMI port also does not work (likely due to being hardwired
> &g
> On 24.03.2022 12:16 'Johannes Graumann' via qubes-users
> wrote:
> ...
> As the laptop's HDMI port also does not work (likely due to being hardwired
> to the NVDIA card), I currently have no means of setting up multiple screens.
>
> I want to use Qubes and this machi
Hi,
I got a new ThinkPad P15 Gen 2:
1x 11th Generation Intel® Core™ i7-11800H Processor(Core™ i7-11800H)
1x Bluetooth® 5.0 or above; Intel® Wi-Fi 6E AX210 2x2 AX
1x Ethernet; Combo audio/microphone jack; HDMI 2.0; 1 Power button; 2x TBT (DP
1.4
USB 3.2 Gen2); 2 USB 3.2 Gen 2 (Type A); SIM Card
> On 24.03.2022 10:42 'Johannes Graumann' via qubes-users
> wrote:
>
>
> > On 24.03.2022 09:53 'Johannes Graumann' via qubes-users
> > wrote:
> >
> >
> > > On 22.03.2022 17:22 unman wrote:
> > >
> > >
&g
> On 24.03.2022 09:53 'Johannes Graumann' via qubes-users
> wrote:
>
>
> > On 22.03.2022 17:22 unman wrote:
> >
> >
> > You have to include a call to qvm-volume in your state file.
> >
> > 'qvm-volume extend QUBE:private 50G':
> >
> On 19.03.2022 17:30 'awokd' via qubes-users
> wrote:
>
>
> 'Johannes Graumann' via qubes-users:
> > Hello,
> >
> > I have been playing around with the GUI VM setup and it works on my machine
> > (didn't manage to have network, but didn't look into
> On 22.03.2022 17:22 unman wrote:
>
>
> You have to include a call to qvm-volume in your state file.
>
> 'qvm-volume extend QUBE:private 50G':
> cmd.run
Super! Thank you!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
Hi,
Please see subject line ;)
Thanks for any pointers.
Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view
Hello,
I have been playing around with the GUI VM setup and it works on my machine
(didn't manage to have network, but didn't look into that, see next), but the
necessity to set a new password for user every time it is fired up renders it's
use so impractical, I will refrain for now.
The
Hi,
The wireless card in my new machine (AX260) is reported to only start working
with kernel 5.12, which means the stable kernel is not enough, but the
kernel-latest package (now 5.16 in security-testing) should be fine.
I am wondering though where to get the appropriate firmware and modules
On Thu, 2020-07-30 at 22:19 +0200, Johannes Graumann wrote:
> On Thu, 2020-07-30 at 21:57 +0200, Qubes wrote:
> > On 7/30/20 9:50 PM, Johannes Graumann wrote:
> > > On Thu, 2020-07-30 at 21:48 +0200, Qubes wrote:
> > > > On 7/30/20 9:42 PM, Johannes Graumann wrote
On Thu, 2020-07-30 at 21:57 +0200, Qubes wrote:
> On 7/30/20 9:50 PM, Johannes Graumann wrote:
> > On Thu, 2020-07-30 at 21:48 +0200, Qubes wrote:
> > > On 7/30/20 9:42 PM, Johannes Graumann wrote:
> > > > On Thu, 2020-07-30 at 17:36 +0200, Qubes wrote:
> >
On Thu, 2020-07-30 at 21:48 +0200, Qubes wrote:
> On 7/30/20 9:42 PM, Johannes Graumann wrote:
> > On Thu, 2020-07-30 at 17:36 +0200, Qubes wrote:
> > > On 7/30/20 4:33 PM, Johannes Graumann wrote:
> > > > Hi,
> > > >
> > > > I'm f
On Thu, 2020-07-30 at 17:36 +0200, Qubes wrote:
> On 7/30/20 4:33 PM, Johannes Graumann wrote:
> > Hi,
> >
> > I'm fond of using torbrowser in a whonix-ws-15 based sip VM for all
> > browsing that possibly works.
> >
> > In parallel I manage all a
Hi,
I'm fond of using torbrowser in a whonix-ws-15 based sip VM for all
browsing that possibly works.
In parallel I manage all authentication using a Mooltipass device for
the storage of random long passwords - this little machine mimics a USB
keyboard.
Out of the box I am unable to use the
: no such domain: 'toto'
[user@dom0 ~]$ echo $?
2
[user@dom0 ~]$ qvm-check sys-net
qvm-check: sys-net: exists
[user@dom0 ~]$ echo $?
0
Best,
Frédéric
On 2020-05-19 10:35, Christophe wrote: qvm-ls|grep yourvmname
On 20/05/19 10:32AM, Johannes Graumann wrote: Hello,
See subject line ;)
Sincerely, Joh
--
You
On 2020-05-19 10:35, Christophe wrote:
qvm-ls|grep yourvmname
On 20/05/19 10:32AM, Johannes Graumann wrote:
Hello,
See subject line ;)
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
Hello,
See subject line ;)
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion
On 2020-02-27 20:32, David Hobach wrote:
On 2/26/20 10:23 PM, Johannes Graumann wrote:
Hi,
I'm experimenting with creating a sys-dropbox vm that syncs with my
dropbox account. I would love to be able to then mount defined
subdirectories of the synced path to other vms (losetop/qvm-block
Hi,
I'm experimenting with creating a sys-dropbox vm that syncs with my
dropbox account. I would love to be able to then mount defined
subdirectories of the synced path to other vms (losetop/qvm-block-
style, which only works for files).
Is this possible? Where to find pointers?
Sincerely, Joh
On 2020-02-13 18:36, Claudio Chinicz wrote:
Hi Sven,
Thanks again. I've tried them and found the following:
- KMail is not allowed to authenticate with Oath2 from Google (my accounts are
Gmail)
- Evolution now does not support Gnupg
- Claws is not available for Fedora
Sorry for insisting..
On Sat, 2019-12-28 at 16:15 +0100, dhorf-hfref.4a288...@hashmail.org
wrote:
> On Sat, Dec 28, 2019 at 04:03:12PM +0100, Johannes Graumann wrote:
> > A current Arch template would help this much, but the repos contain
> > no
> > such image for 4.0 and the qubes-builde
On Sat, 2019-12-28 at 16:15 +0100, dhorf-hfref.4a288...@hashmail.org
wrote:
> On Sat, Dec 28, 2019 at 04:03:12PM +0100, Johannes Graumann wrote:
> > A current Arch template would help this much, but the repos contain
> > no
> > such image for 4.0 and the qubes-builde
Gentlepeople,
I'm migrating an Arch setup to qubes (4.0). This is complicated by the
rel. bleeding edge nature of Arch and the resulting software version
incompatibility/unavailability.
Currently I try to move a Digikam Archiving setup (Arch 6.4.0-4,
Fedora-30 6.1.0-7, Debian-10 4:5.9) with
Hello,
I'm experimenting with a more "one app - one VM" paradigm using a
minimal template with flatpak installed and then VMs based on it that
pull in individual apps int flatpak's --user local installs. I just
don't want to have a plethora of templates with different software
subsets, but
On 2019-10-09 20:43, Brian C. Duggan wrote:
On 10/8/19 6:45 AM, Johannes Graumann wrote: 2) I'm unclear about whether the fedora-/debian-X-minimal template VMs
require additional packages to be managed through salt.
https://www.qubes-os.org/doc/templates/minimal/ appears to indicate so: Also
Hello,
What's the mechanism behind the fact that if I start firefox in a
standard dispvm (as installation-provided) and terminate the program.
the VM shuts down along with it?
Thank for any hints.
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
Gentlepeople,
I'm finally biting the bullet and setting out to salt my Qubes.
1) DARN is it complicated in comparison to Ansible - not least because
of the ... interesting ... obsession with the physical characteristics
of salty minerals (grain, pillar, ...) - just call it what if
On Thu, 2019-07-18 at 15:40 +0100, unman wrote:
> On Tue, Jul 16, 2019 at 10:56:13AM -0700, brendan.h...@gmail.com
> wrote:
> > On Tuesday, July 16, 2019 at 10:35:11 AM UTC-4, unman wrote:
> > > I really do recommend using qubesctl for almost all system
> > > configuration. If only because it
On Thu, 2019-07-18 at 12:49 +0200, Johannes Graumann wrote:
> On Thu, 2019-07-18 at 07:51 +0530, Kushal Das wrote:
> > On Thu, Jul 18, 2019 at 12:44 AM Johannes Graumann
> > wrote:
> > > On Wed, 2019-07-17 at 18:56 +0530, Kushal Das wrote:
> > > > On Tue, Jul
On Thu, 2019-07-18 at 07:51 +0530, Kushal Das wrote:
> On Thu, Jul 18, 2019 at 12:44 AM Johannes Graumann
> wrote:
> > On Wed, 2019-07-17 at 18:56 +0530, Kushal Das wrote:
> > > On Tue, Jul 16, 2019 at 11:26 PM wrote:
> > > > On Tuesday, July 16, 2019
On Wed, 2019-07-17 at 18:56 +0530, Kushal Das wrote:
> On Tue, Jul 16, 2019 at 11:26 PM wrote:
> > On Tuesday, July 16, 2019 at 10:35:11 AM UTC-4, unman wrote:
> > > I really do recommend using qubesctl for almost all system
> > > configuration. If only because it makes recovery so much easier.
>
I became aware of guix through an announcement that it is now 1.0 (
https://www.gnu.org/software/guix/blog/2019/gnu-guix-1.0.0-released/)
as it purportedly allows environment install/maintenance in user space,
I was wonderung whether anyone has used it on qubes to install appVM
specific software
On Sat, 2019-04-06 at 06:31 -0700, Thomas Leonard wrote:
> I got a few emails about this. I'm going to answer the questions here
> because this is a community project and everyone should see the
> discussion.
>
> Q: The build-with-docker script hard-codes /home/opam. What if your
> user has a
On Tue, 2019-02-12 at 08:08 -0500, Chris Laprise wrote:
> On 2/12/19 4:40 AM, Johannes Graumann wrote:
> > Gentlepeople,
> >
> > After playing with it on a secondary machine, I'm looking to
> > transition
> > from my Arch-setup to Qubes.
> >
> > I
On Sat, 2019-02-16 at 11:21 +0100, evo wrote:
>
> On 2/16/19 11:17 AM, Johannes Graumann wrote:
> > On Sat, 2019-02-16 at 11:08 +0100, evo wrote:
> > > Hey!
> > >
> > > I got the message that i don't have enough memory to start a
> > >
On Sat, 2019-02-16 at 11:08 +0100, evo wrote:
> Hey!
>
> I got the message that i don't have enough memory to start a domain.
> How can i understand, what exactly the problem is?
> Is it a RAM problem on the dom, or in the domain itself, or on the
> whole
> system?
Others must answer this.
>
>
Gentlepeople,
After playing with it on a secondary machine, I'm looking to transition
from my Arch-setup to Qubes.
I am traditionally choosing to encrypt my file systems using serpent
(considered the strongest entry into the AES competition with slightly
worse speed than the finally choosen
On Sun, 2019-01-06 at 23:14 +0100, haaber wrote:
> > It's running fine for me from a flatpak --user install ... has the
> > advantage that the template only needs flatpak and all signal is in
> > the
> > appVM only.
> >
> > Joh
> >
> > On Fri, 2019-01-04 at 18:57 -0600, Sven Semmler wrote:
> > >
Gentlepeople,
I have a conceptual question regarding a sensible layout of VMs and
networking in the context of aiming at a qubes instance fully managed
by scripting (salt or ansible, or shell, or ...).
How would you set up a system that a) allows to automatedly configure
qubes from dom0 (or even
On Mon, 2018-10-15 at 12:35 -0400, Kushal Das wrote:
> On Mon, Jul 2, 2018 at 12:13 PM Marek Marczykowski-Górecki
> wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On Mon, Jul 02, 2018 at 05:17:31PM +0200, Johannes Graumann wrote:
>
On Mon, 2018-05-28 at 09:46 +0200, Johannes Graumann wrote:
> On Mon, 2018-05-28 at 00:40 +0200, [799] wrote:
> > Hello Johannes,
> >
> > On 05/28 12:00, Johannes Graumann wrote:
> > > The fedora-27-minimal template from the repo does not appear to
> > > ha
On Mon, 2018-05-28 at 00:40 +0200, [799] wrote:
> Hello Johannes,
>
> On 05/28 12:00, Johannes Graumann wrote:
> > The fedora-27-minimal template from the repo does not appear to
> > have
> > networking support. What needs to be installed to remedy that?
>
>
Hello,
The fedora-27-minimal template from the repo does not appear to have
networking support. What needs to be installed to remedy that?
Thank you for any hint.
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
I cannot second that. They are responsive. Not super fast, but
competent and responsive.
Joh
On Fri, 2018-04-20 at 03:35 -0700, ThierryIT wrote:
> What I have already done ... No answers from them ... Like their
> support, no existent :(
>
> Le vendredi 20 avril 2018 12:47:33 UTC+3,
On Mon, 2018-03-19 at 01:32 -0700, niepowie...@gmail.com wrote:
> Hello,
>
> I'm trying make set up vpn with bitmask application.
>
> I tried install bitmask to debian template.
>
> have done steps listed on bitmask site as below in termainal:
>
> sudo apt install leap-archive-keyring
> sudo
On Mon, 2018-02-12 at 17:04 +0100, Johannes Graumann wrote:
> On Wed, 2018-02-07 at 15:27 +0100, Johannes Graumann wrote:
> > Gentlepeople,
> >
> > For a while I have been managing a qubes setup using a dedicated
> > management VM and ansible via https://github.co
On Mon, 2018-02-12 at 09:10 -0800, brendan.h...@gmail.com wrote:
> I had to reread the thread three times to realize that qvm-prefs and
> qubes-prefs were different. :)
>
Indeed ... that is what happened to me too ... after changing the
default dvm for all VMs via 'qvm-prefs' and globally via
On Wed, 2018-02-07 at 15:27 +0100, Johannes Graumann wrote:
> Gentlepeople,
>
> For a while I have been managing a qubes setup using a dedicated
> management VM and ansible via https://github.com/Rudd-O/ansible-qubes
> .
> As auditing that code is beyond me and as salt is inte
On Fri, 2018-02-09 at 08:11 +, Johannes Graumann wrote:
> Hello,
> Trying to purge all fedora 25 traces (aside from dom0) from my
> system.
> I have started to work my way through the dependencies following this
> workflow:
> 1) qvm-remove fedora-25-dvm
> 2) journalctl -r
Hello,
Trying to purge all fedora 25 traces (aside from dom0) from my system.
I have started to work my way through the dependencies following this
workflow:
1) qvm-remove fedora-25-dvm
2) journalctl -r
3) qvm-prefs --set default_dispvm whonix-ws-dvm
It's kind of annoying that the
Gentlepeople,
For a while I have been managing a qubes setup using a dedicated
management VM and ansible via https://github.com/Rudd-O/ansible-qubes.
As auditing that code is beyond me and as salt is integral to qubes, I
was wondering whether that layout is currently possible using the salt
On Tue, 2017-10-24 at 05:36 -0700, Roy Bernat wrote:
> On Tuesday, 24 October 2017 04:21:48 UTC-4, Marek Marczykowski-
> Górecki wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > Hello,
> >
> > We have just released Qubes 4.0-rc2:
> >
> >
On Wed, 2017-09-27 at 13:19 +0200, Johannes Graumann wrote:
> Gentlepeople,
>
> I recently managed to install the community whonix templates into my
> 4.0 setup and have since been striving to recreate the arrangements
> of
> proxyvms etc. I ran in 3.2.
>
> In this proc
Gentlepeople,
I recently managed to install the community whonix templates into my
4.0 setup and have since been striving to recreate the arrangements of
proxyvms etc. I ran in 3.2.
In this process I erroneously create a vm called 'sys-whonix-gw', using
the whonix-gw template. I proceeded to
On Wed, 2017-09-27 at 06:12 -0400, 'One7two99' via qubes-users wrote:
> Hello,
>
> while trying to script some basic tasks I found out that I am missing
> some small features in the qvm-* scripts, I have looked at the code
> of those script but it is to hard for me to understand exactly what
>
On Sun, 2017-09-10 at 23:19 +0200, cubit wrote:
> 22. Jun 2017 12:37 by cu...@tutanota.com:
>
> > Is there existing any pre-made templates for Debian 9?
>
>
> Halo
>
> Is there any news on Debian 9 template?
>
> Can also someone remind we the URL to check which templates are
>
On Thu, 2017-07-06 at 09:01 +0200, 'Olivier Médoc' via qubes-users
wrote:
> On 07/04/2017 08:40 AM, Johannes Graumann wrote:
> > Hello,
> >
> > Can anyone give any pointers what needs to be done to have "qubes-
> > usb-
> > proxy" available in the ArchLi
On Tue, 2017-05-30 at 09:19 +0200, Johannes Graumann wrote:
> Hello,
>
> Does a package exist to make qvm-usb work with the community
> Archlinux
> template?
>
> Sincerely, Joh
>
Found this in the archives: https://groups.google.com/d/msg/qubes-users
/Mk6F4ZKzfk4/-oJ
Hello,
Does a package exist to make qvm-usb work with the community Archlinux
template?
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Sat, 2017-05-20 at 21:10 +0100, Unman wrote:
> On Sat, May 20, 2017 at 09:28:48PM +0200, Johannes Graumann wrote:
> > See subject line ;)
> >
> > Joh
>
> ls -l /var/lib/qubes/dvmdata/*
>
> This will show you which dvmTemplate is being used to generate th
See subject line ;)
Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to
On Tue, 2017-05-16 at 06:26 -0700, Patrik Hagara wrote:
> On Fri, 2017-05-12 at 08:39 +0200, Johannes Graumann wrote:
> > Is there a way to use the CLI to
> >
> > 1) access what apps a VM has available
>
> You can find the .desktop files for all available
> program
On Fri, 2017-05-12 at 08:39 +0200, Johannes Graumann wrote:
> Hi,
>
> Is there a way to use the CLI to
>
> 1) access what apps a VM has available
>
> and
>
> 2) which of them should be shown in the menue?
>
> Sincerely, Joh
>
No insight, anybod
Hi,
Is there a way to use the CLI to
1) access what apps a VM has available
and
2) which of them should be shown in the menue?
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
On Thu, 2017-04-27 at 08:13 +0200, Johannes Graumann wrote:
> Hello,
>
> As I am transitioning all aspects of my evolving setup into qubes,
> I'm
> stuck at making a SCR3310 smartcard reader (used to store my gpg
> secret
> key) usable in an AppVM based on fedora25-mi
Hello,
As I am transitioning all aspects of my evolving setup into qubes, I'm
stuck at making a SCR3310 smartcard reader (used to store my gpg secret
key) usable in an AppVM based on fedora25-minimal (had tu upgrade, as
evolution-functionality I require is not in fedora24) and dedicated to
run
Hi,
Has anyone figured out a setup for qubes-usb-proxy-based USB-
passthrough that will allow for automatic (and active) monitoring of
sys-usb connections and VMs? I'm envisioning a situation where I tell
the proxy setup that
1) if device X shows up and VM Y is running, the device should be
On Wed, 2017-04-19 at 16:07 -0600, Reg Tiangha wrote:
> On 04/19/2017 04:01 PM, Johannes Graumann wrote:
> > As a majorly debian & arch oriented person, I am faced with the
> > situation that the fedora-24 contained version of evolution which I
> > require for i
As a majorly debian & arch oriented person, I am faced with the
situation that the fedora-24 contained version of evolution which I
require for its EWS (Exchange) support, is broken with respect to
another functionality that I need to work (CardDAV). In debian I would
now go looking whether I
On Tue, 2017-04-18 at 21:28 +0200, Alex wrote:
> On 04/18/2017 09:27 PM, nonse...@graumannschaft.org wrote:
> > Hi,
> >
> > Us it possible to manage parameters (like what net vm to use) for
> > individual vms from the command line? Lets say the system defaults
> > to
> > sys-whonix, but specific
On Sun, 2017-04-09 at 20:40 -0700, Andrew David Wong wrote:
> On 2017-04-08 10:20, Johannes Graumann wrote:
> > Hello,
> >
> > Are there any pointers at how to achieve adding more users/pass
> > phrases to the disk encryption setup as produced by a default Qubes
>
I am wondering whether
1) under QubesOS a (USB) HW RNG like http://www.bitbabbler.org/ is
usable
and if yes
2) where attaching it would make most sense? sys-net? dom0? Can Xen
VM's be set up to feed on entropy provided by the host?
Thanks for any hint.
Sincerely, Joh
--
You received this
Hello,
Are there any pointers at how to achieve adding more users/pass phrases
to the disk encryption setup as produced by a default Qubes install?
Sincerely, Joh
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
96 matches
Mail list logo