On 25/02/17 02:33, Oleg Artemiev wrote:
Say I've one enrypted swap and one not from other linux.
Would Qubes ignore unencrupted swap from other distribution or I should
make it to? If so - how do I?
as far as i understand it, swap is a partition with the file-system swap and
mounted as
On 25/02/17 04:14, Oleg Artemiev wrote:
Hi.
If I want to run VMs from one Qubes in another
why would you even dualboot two qubesversions?
would it be possible to
have different coloring for the same VM in different Qubes OS instances?
here the questions is, what files you would share?
i am
hi.
i want to install terminator in my vm.
since the terminator package does not install everything correctly (pycairo is
not installed), i need to install pycairo manually.
but this does not work, since dnf somehow ties to install a different package...
$ sudo dnf install pycairo
Package
hi.
if i use templates based on fedora minimal, the start menu entries only have a
lock as an icon.
vms based on the normal fedora template have icons.
how can i get icons for my fedora minimal vms?
- john
--
You received this message because you are subscribed to the Google Groups
On 13/02/17 01:31, Keld Norman wrote:
Hi community :)
I ran this on a standalone debian 8 appvm
apt-get purge python-numpy
Yes, I now know that is not the most cleaver command to run..
It resulted in the following packages got removed:
python-numpy python-qwt4-qt4 qubes-core-agent gimp
hi.
i wrote some custom salt module and use it for rendering in my top-file.
everything works great as long as i am only in dom0.
as soon as my stuff is run in domU (or rather its management-vm) i get errors:
when rendering:
On 10/02/17 11:53, '0xDEADBEEF00' via qubes-users wrote:
Interesting topic...
I would like to here more about how people handle this.
On my side, I'would never work on sensitive information in such a situation.
To make just some surfing in public place, my laptop is installed with a
standard
Unman can you make a template rpm Ubuntu and put it on
https://ftp.qubes-os.org/repo/yum/r3.2/templates-community/rpm/ ?:)
i also would prefer this option, but it seems it is not possible due to legal
issues.
see: https://www.qubes-os.org/doc/templates/ubuntu/
maybe we could convince
On 07/02/17 14:09, haaber wrote:
Hello, I wonder how you behave when traveling, for example in places
with cameras all around. I feel uncomfortable to enter my passwords in
such situations. Of course I can simply not turn my computer on. But
sometimes you have several hours in an airport .. I
On 07/02/17 00:01, Joe Ruether wrote:
Hello! I am using Qubes 3.2 and I am attempting to automate the configuration
of my VMs using the Salt / qubesctl management stack.
I am very new to salt, but I have been experimenting and I think I understand
how it works. I have written some state files
On 05/02/17 23:59, john.david.r.smith wrote:
On 05/02/17 00:06, Oleg Artemiev wrote:
Hi.
On Wed, Feb 1, 2017 at 11:56 PM, john.david.r.smith
<john.david.r.sm...@openmailbox.org> wrote:
On 01/02/17 21:30, qu...@posteo.de wrote:
I have now nearly a complete salt configuration for
On 05/02/17 00:06, Oleg Artemiev wrote:
Hi.
On Wed, Feb 1, 2017 at 11:56 PM, john.david.r.smith
<john.david.r.sm...@openmailbox.org> wrote:
On 01/02/17 21:30, qu...@posteo.de wrote:
I have now nearly a complete salt configuration for all my templates so I
do not need to backup them a
On 04/02/17 18:42, Loren Rogers wrote:
Hi all,
I'm confused about running disposable VMs - if I open a browser or file viewer,
then want to open a terminal for the same VM, how could I do this? (E.g. I want
to view an untrusted file, then make some edits.)
right click the dispvm in the qubes
hi.
is there some way to launch a dispvm from dom0 and execute a command (just like
`qvm-run --dispvm` in domu) or do i need to create a temporary vm?
-john
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
On 01/02/17 21:30, qu...@posteo.de wrote:
Hi,
I have now nearly a complete salt configuration for all my templates so I do
not need to backup them anymore and save a lot of space by this.
So I have ran a backup including dom0 and realized that the salt configuration
("/srv/salt") does not
On 31/01/17 22:24, mojosam wrote:
it does protect you from user errors. e.g.:
you have some malicious pdf in a vm.
if you have noting to open the pdf, you can't accidentally open it and corrupt
your vm.
Isn't that the concept behind "attack surface"? If the code is there,
something
On 31/01/17 19:38, ulabunga wrote:
My Setup
proxy vm + airvpn in network manager ,TCP-53
-> appvm x
importing airvpn VPN configuration files (TCP-53) in my proxy vm network manager
and select this 'AirVpn' proxyvm in my netvm settings
for all my fedora/debain appvm's.
Is there any better
Since this is in my regular Fedora 24 template, won't this codebase be included
in every app VM I run, whether I'm running PlayOnLinux in that app VM or not?
yes
Presumably none of that code would be running,
so there should be no problem (at least i can't see any problems)
but it
On 20/01/17 14:13, john.david.r.smith wrote:
On 20/01/17 13:18, qu...@posteo.de wrote:
Hi John,
On 20.01.2017 10:26, john.david.r.smith wrote:
looks like my problem i posted here:
https://groups.google.com/d/msg/qubes-users/C1tJV4Ykgr8/5H09IT06CQAJ
i did not try it again since i had
Did you really need tinyproxy in the target template? It should be
needed only in your netvm... Or are you saying that tinyproxy
was missing in your netvm?
it was red in my fed24 minimal journalctl.
after i installed it, it went away (currently most things i am doing are
kind of blind
i am currently looking whether i can do the same in a top file (but i doubt
it, since there is no templating in top files)
And the last sentence is exactly the reason why it's tricky to have it
in one place.
well it seems we were totally wrong.
you can put jinja code in your top file.
i
On 20/01/17 13:18, qu...@posteo.de wrote:
Hi John,
On 20.01.2017 10:26, john.david.r.smith wrote:
looks like my problem i posted here:
https://groups.google.com/d/msg/qubes-users/C1tJV4Ykgr8/5H09IT06CQAJ
i did not try it again since i had this problem.
missing in min are sudo and file
1)
even when some states fail for some vm, the cli tool displays ok. it would
be better, if it displayed error in case of an error (some errors are
displayed).
Can you provide example error which wasn't detected? Regardless of the
result, output is logged to /var/log/qubes/mgmt-*.log in dom0.
hi.
two questions about qvm-ls
1)
qvm-ls displays ip, ip back an gateway/DNS.
what is ip back?
2)
how does the --raw-data flag work?
can someone post an example?
i tried things like
qvm-ls --raw-data ip sys-tor
but i always end up with a traceback of qvm-ls ('line 225
fields[f]["max_width"] =
hi.
when looking at the policy permissions in '/etc/qubes-rpc/policy' i
noticed the only line 'qubes.USB' contains is:
$anyvm $anyvm deny
why is that line there?
as far as i understood it has no effect as any other declaration of the
form:
$anyvm deny
since deny is the default action and
On 06/01/17 13:15, Opal Raava wrote:
Hi all,
Since about a week or so, I'm unable to update dom0 the way I used to. The VM
Manager will tell me there are updates available for Dom0, and when I click
'Update VM' I see the familiar 'downloading updates' but after that the window
with the
On 02/01/17 15:34, Jarle Thorsen wrote:
As there is currently no audio support for Windows in Qubes OS:
Can I use any of the Qubes windows tools to copy a video file to a Linux vm and
have it start playing there?
The file should only be copied to a temp directory, and not put in
if offloading is done for isos: ship the master key with qubes and
provide a convenience command to the user. this command should
download (e.g. via torrent) and verify the image (a step the user
can'd do wrong anymore). this command could spawn a dispvm,
install torrent software, load the
the problem is (as you wrote) 'supposed to be verified out-of-band'.
for some less technical people, even verifying the signature is a huge
step.
i am a fan of providing easy accessible security and using already
existing infrastructure. (in case of the dom0 repo, an ultimately
trusted source).
this may be a source of errors for some users, or even insecure
(mitm + exchanging the master signing key information on the
website + patching the downloaded image).
I know what you mean, but it's worth remembering that the Qubes Master
Signing Key fingerprint is supposed to be verified
currently when i have qubes and need a new image (e.g. to
reinstall/install on a new machine), i need to download the image from
qubes-os.org and then check the signature.
this may be a source of errors for some users, or even insecure
(mitm + exchanging the master signing key information on
I have already tried that, and it fails with "Failed to set time zone: Unit
systemd-timedated.service is masked".
I just tried it and it works for me (it even updates the time instantly).
did you change stuff in dom0?
--
You received this message because you are subscribed to the Google
hi.
currently i am configuring salt to create and configure all my vms.
my target is to have only a minimal set of vms i need to backup (vault,
config, data, custom systemd based services for my vms) and a set of
salt files to create my whole setup.
creating vms and installing software works.
On 18/12/16 23:04, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Dec 18, 2016 at 10:47:36PM +, john.david.r.smith wrote:
hi.
currently i am trying to configure salt to create and setup all my templates
and vms.
i managed to create the vms and do
hi.
currently i am trying to configure salt to create and setup all my
templates and vms.
i managed to create the vms and do the config in dom0.
then i tried to install software in my template-vms, but this failed.
my top:
base:
tmp-salt: #this is a template (a clone of fedora-23)
- q
On 25/07/16 22:17, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Jul 25, 2016 at 10:06:56PM +0200, john.david.r.smith wrote:
On 25/07/16 21:56, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Jul 25, 2016
On 25/07/16 21:56, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Jul 25, 2016 at 09:11:03PM +0200, john.david.r.smith wrote:
hi.
i want to install windows 8 in an hvm (so i can update it).
but somehow i can't start the vm with an iso. (see output
hi.
i want to install windows 8 in an hvm (so i can update it).
but somehow i can't start the vm with an iso. (see output below)
[user@dom0 ~]$ qvm-start w8 --cdrom=data:/home/user/w8.iso
--> Loading the VM (type = HVM)...
Traceback (most recent call last):
File "/usr/bin/qvm-start", line 131,
hi.
i want to play some linux games through steam in a appvm (based on debian).
when starting steam i get this error:
"OpenGL GLX extension not supported by display"
i guess this is the case, since i did not pass any GPU to the vm.
So i tried passing my nvidia gt 740m. If i set up its device
i never tried, but you can pass your pci devices to an appvm (e.g. your
gpu).
https://www.qubes-os.org/doc/assigning-devices/
frameworks will often allow you to use your cpu in case you have no gpu.
as long as your models are small enough you can train that on cpu. (but
training a big nn
40 matches
Mail list logo