[qubes-users] HCL: Lenovo T470: Intel(R) Core(TM) i5-7300U CPU @ 2.60GHz
I have been using Qubes 4.2 alpha RC on this machine as my main drive for about a month now, and so far hardware support during and after installation has been flawless. Everything tried works. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20230808155715.160f3dd9%40armor-mail.com. Qubes-HCL-LENOVO-20HES4CH00-20230808-154404.yml Description: application/yaml --- layout: 'hcl' type: 'Notebook' hvm: 'yes' iommu: 'yes' slat: '' tpm: 'unknown' remap: 'yes' brand: | LENOVO model: | 20HES4CH00 bios: | N1QET98W (1.73 ) cpu: | Intel(R) Core(TM) i5-7300U CPU @ 2.60GHz cpu-short: | FIXME chipset: | Intel Corporation Xeon E3-1200 v6/7th Gen Core Processor Host Bridge/DRAM Registers [8086:5904] (rev 02) chipset-short: | FIXME gpu: | Intel Corporation HD Graphics 620 [8086:5916] (rev 02) (prog-if 00 [VGA controller]) gpu-short: | FIXME network: | Intel Corporation Ethernet Connection (4) I219-LM [8086:15d7] (rev 21) Intel Corporation Wireless 7265 [8086:095b] (rev 61) memory: | 32411 scsi: | SSD 512GBRev: 227F usb: | 1 certified: 'no' versions: - works: 'FIXME:yes|no|partial' qubes: | 4.2.0-alpha xen: | 4.17.1 kernel: | 6.1.35-1 remark: | FIXME credit: | FIXAUTHOR link: | FIXLINK
Re: [qubes-users] Re: Configure WireGuard on Qubes
I used https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/ to setup a dedicated VPN VM with the Mullvad GUI. Has some idiosyncrasies, but works really not bad. Been using it for a couple weeks already as a daily drive. On Sun, 30 Jul 2023 01:30:52 -0700 (PDT) klem klen wrote: > I should have added. We are on a similar path. I am looking to use > the gui app for Mullvad instead. The app provides access to all the > Mullvad Servers/Nodes all around the world. Has Bridges. Makes it > easy to delete connections, I am allowed five, but use multiple > computers and end up starting more than five. > > Can not get it to install on sys-vpn, yet. > > There is a post about using Mullvad VPN gui app in a single App Qube, > that is not persistent. Which is a problem with other third party > software., persistent, in my humble opinion, also means, it needs a > ready to open Tab. > > > On Saturday, July 29, 2023 at 5:11:58 PM UTC-5 ale...@magenta.de > wrote: > > > I couldn't find a usable description of how to set up the most > > secure WireGuard configuration on Qubes. I am aiming to create a > > flexible network arrangement with chosen VMs going through > > WireGuard only and others through Tor only. > > > > I have tried the information at > > https://github.com/tasket/Qubes-vpn-support but found it is out of > > date and written before WireGuard was added to the kernel. I also > > thought it was not written for a beginner to understand and adapt > > to their needs. > > > > I have also tried the information at > > https://github.com/Qubes-Community/ but again it is not written > > well for a beginner. > > > > Implementing WireGuard for secure network access is necessary > > before I can connect this installation to the Internet so I hope > > someone can help me to set this up. > > > > -- > You received this message because you are subscribed to the Google > Groups "qubes-users" group. To unsubscribe from this group and stop > receiving emails from it, send an email to > qubes-users+unsubscr...@googlegroups.com. To view this discussion on > the web visit > https://groups.google.com/d/msgid/qubes-users/a90392bf-d63b-4e60-9ad1-7305bfc97493n%40googlegroups.com. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20230731170547.0989bf2b%40armor-mail.com.
Re: [qubes-users] qubes packages in Archlinux AUR repo
Hi unman, > I cant help with the AUR. > I build Arch packages for 4.0 and 4.1, and update them probably twice > a month ( other constraints permitting) Thanks very much for doing that, my Arch template originally came from your repo. > You can pick up templates and packages at https://qubes.3isec.org > unman I imported your package signing key with pacman-key ("pacman-key --finger unman" finds the key just fine) but if I try to do an upgrade (pacman -Syu) I get (transcribed so there may be typos): error: qubes-r4.0: signature from "unman (Qubes OS Signing Key) " is invalid Any thoughts? (I think I hit this iceberg before, and that is why I have been using the AUR packages.) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20210831073736.1f6c2874%40gmx.com.
[qubes-users] mounting root TemplatVM partition in dom0 fails
Hi, I have some templates stored in a "file" pool where, for example, I find the following files: private.img private-cow.img root.img root-cow.img I can do this in dom0, no problem: sudo mount private.img /mnt But this fails: sudo mount root.img /mnt with a very common, uninformative error, ie. mount: wrong fs type, bad option, etc. etc. I would dearly love to mount the root.img and modify a file in /etc file in a broken VM. Any hints would be welcome. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20210830191319.0090a549%40armor-mail.com.
[qubes-users] qubes packages in Archlinux AUR repo
Hi, Wondering if the Archlinux dev "seberm" is on this list, and what (if anything) is happening with the Qubes AUR packages? https://aur.archlinux.org/packages/?O=0=qubes I have been using these repos (the six of them that are not "empty") to keep my Arch AppVM alive for quite some time now (years?) and for the first time in a very long time, I seem to have a hard failure. The Arch VM boots, but X does not work. (Basically, if no one is working this I need to move on from Arch) TIA. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20210828155901.6e561532%40armor-mail.com.
[qubes-users] HCL for Lenovo X240
Everything works flawlessly except return from suspend, where sys-usb is frozen and needs a restart. I am now in the habit of simply turning off sys-usb before suspending. I did have one nasty surprise: this machine is fitted for a maximum of 8G of RAM. There is in fact only one RAM socket. A pleasant surprise after this was that, for me, it is actually usable. Once or twice a day I have to turn something off to start something else, but so far this has been tolerable. Obviously, YMMV. I have an X230 with 16G of RAM, so buying a later model that cannot handle as much RAM was a real kick in the butt. (Thanks, Lenovo.) Because of the RAM fiasco, I think it would be a real good idea if this report makes it into the HCL. It is noticeably faster than the X230, but the X230 is still a better machine for a Qubes user. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190805175252.4582a554%40armor-mail.com. Qubes-HCL-LENOVO-20AMS2P10Q-20190805-173748.yml Description: application/yaml
Re: [qubes-users] Re: Qubes 4.0-rc2 :: VMs fail to start
I see I am not alone here. > Having the information on which laptops Qubes 4 "should" run or even > more where it is running (Dev Users?) would help. The HCL > https://www.qubes-os.org/hcl/ does not help me, as it has no > information if 4.x is ok for the X230. It looks to me like a bigger problem, not necessarily device specific: https://github.com/QubesOS/qubes-issues/issues/3221 Remember this is not a public release, this is RC2. Release CANDIDATE 2. That means it is a version meant for TESTING, not necessarily ready for anything more. TEST_FAILED > As mentioned before I am running Coreboot, should I go back to stock > ROM? In fact I have an x230 without Coreboot, and I too cannot reliably even get sys-net to run, let alone sys-firewall, which I do not think I have seen running once. Personally I am going to close the lid and wait for the next release. (Unless anyone would like to collect some debug information from me.) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20171031172103.7d8826c0%40x220i. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Just realized one of the major disadvantages of Qubes OS...
> > no support for ipv6 > > not really a problem. it is 2017 and I still haven't encountered any > situation where IPv6 is actually being used, despite working a lot > with computers and routers (IPv6 is there but nobody is using it... > Never ever had to use those ridiculous IPv6 addresses, yet) Actually, I run IPv6-enabled mail servers, and I am (at least some times) getting IPv6 connections with Google's mail servers. This is fairly recent behavior. A good chunk of Amazon AWS has recently enabled IPv6. I rent (very cheap) two servers that have no public IPv4 IP addresses, only IPv6. IPv6 is coming, count on it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170128171003.39aae383%40armor-mail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: installing Signal on Qubes mini-HOWTO
> Is F-Droid's Silence any better than Signal given it can run without > Google Play Store? I use CyanogenMod Android minus most of the Google malware (ie. no Google play). In that configuration Signal refuses to work because it (at least) depends on Google Play for notifications. Silence however does not, and works great. On Android, with a sim card. However, it is my (not deeply researched!!) understanding that the Signal dev(s) do not like/permit other applications connecting to their servers. No servers, no direct messages, all Silence messages are necessarily SMS messages going over the phone network. So Silence will not work outside of a phone with a working sim card. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160816184247.02dd35bc%40armor-mail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 3.1, Debian Stretch VM: audio not working
On Fri, 12 Aug 2016 00:37:59 -0700 Andrew David Wong <a...@qubes-os.org> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-08-10 04:32, RSS wrote: > > Everything should be update, with Qubes stretch "testing" sources > > turned on. > > > > This has been broken for a while, is it a known problem? If I try > > to start it manually with debug turned on, there seems to be zero > > useful information: > > > > $ pulseaudio --start --log-level=debug -n > > --file=/etc/pulse/qubes-default.pa > > > > D: [pulseaudio] conf-parser.c: Parsing configuration file > > '/etc/pulse/client.conf' > > > > D: [pulseaudio] conf-parser.c: /etc/pulse/client.conf.d does not > > exist, ignoring. > > > > E: [pulseaudio] main.c: Daemon startup failed. > > > > Yes, this is being tracked here: > > https://github.com/QubesOS/qubes-issues/issues/1927 Cool, and the workaround mentioned there sudo ln -s /usr/lib/pulse-8.0/modules/module-vchan-sink.so /usr/lib/pulse-9.0/modules/module-vchan-sink.so still works like a charm. Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160812170542.7e88e230%40armor-mail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL Dell Latitude E6420 i7-2640M
Hi guys, I am sending this in primarily because the current HCL list online shows the E6420 in yellow. Whereas my experience (as of several months right now with a slightly newer model: i7-2640M) is that Qubes works flawlessly with this machine, from install right through to the present. I could just wish for an SSD and a bit more RAM (currently 8G) but I really cannot find anything to complain about except for secondary issues like the lack of ready-to-download Ubuntu and ArchLinux templates and updates. (I know there are license issues with Ubuntu) Many thanks for the hard work of everyone who has gotten us this far. My custom is to always keep a second machine in a near-identical state as a fallback, and Qubes has now become sufficiently essential to my digital existence that I am now shopping for a second Qubes machine so that I will have the requisite two. Ie. Qubes OS is now my full-time "forever" desktop environment. As far as marketing goes, some focus should really be directed at the virtual currency crowd. Qubes' uber-security is a natural fit for those keeping digital wallets on their desktops. rss -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160708154839.48f16eb7%40armor-mail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-Dell_Inc_-Latitude_E6420-20160708-152341.yml Description: application/yaml