On Sun, Nov 26, 2017 at 05:50:17PM +, Unman wrote:
> > > It's a bug Holger.
> > > Scoot on over to GitHub and raise an issue
> > is it really? I cannot believe it's broken (in 3.2) and noone has raised
> > an issue yet…
> Well someone has to be first :-)
>
> truth , I dont think that many
On Wednesday, November 22, 2017 at 10:44:58 AM UTC-5, haaber wrote:
> This is the first line while booting. So I checked systemctl status
> systemd-modules-load.service that says the below. I see no errors .. all
> OK then??
>
> Thank you, Bernhard
>
> [me @dom0 ]
>
>
On Tuesday, 28 November 2017 03:07:02 CET Andrew David Wong wrote:
> On 2017-11-27 16:03, 'Tom Zander' via qubes-users wrote:
> > I have a ‘work’ VM which holds a significant amount of user-data
> > and as such I want my homedir to be hosted on my spinning-disk
> > drive.
[snip]
> This option
On Monday, November 27, 2017 at 2:09:12 PM UTC-5, David Hobach wrote:
> On 11/27/2017 07:57 PM, David Hobach wrote:
> > On 11/27/2017 07:47 AM, Wael Nasreddine wrote:
> >> I'm running 4.0-RC2 on Asrock Z170 pro4/i7-6700k and I got two hard
> >> reboots in the last few hours, often around the time
Le mardi 28 novembre 2017 18:33:38 UTC+1, Foppe de Haan a écrit :
> guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
I confirm your log and the behavior. Few days ago, I tried to look on the xen
and kernel list to see if there were something bug we need to dig into
On Tuesday, November 28, 2017 at 6:41:02 PM UTC+1, Frédéric Pierret (fepitre)
wrote:
> Le mardi 28 novembre 2017 18:33:38 UTC+1, Foppe de Haan a écrit :
> > guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
>
> I confirm your log and the behavior. Few days ago, I tried
guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Tuesday, 28 November 2017 18:33:37 CET Foppe de Haan wrote:
> Bottom line IMO these days security can't be done by a layman,
Security as a concept is not that black / white, there is no 100% security
and likewise I fail to see how "laymen" can't increase their security.
As a quick example, in
I'd want something with more ram for Qubes. I'd say 8 is minimum, 32gb
recommended. I had 8 on a desktop and was hitting limit sometimes so I added
another 8. A laptop would probably use more.
And most importantly to know if iommu protections work on it. You would
either have to look at
On Tuesday, 28 November 2017 14:18:44 CET cooloutac wrote:
> Of course many feel Qubes is for more advanced users, and apparently that
> will become a self fulfilling prophecy in version 4.
Looking at the (lack of) UI tools at this time, you can be excused thinking
this. I personally think its
On Tuesday, 28 November 2017 03:38:02 CET Andrew David Wong wrote:
> Our position is that reasonable security
> via compartmentalization (of which Qubes is an implementation) requires
> the user to make informed decisions about how to compartmentalize
> various parts of their digital life into
On 11/28/2017 11:30 AM, 'Tom Zander' via qubes-users wrote:
On Tuesday, 28 November 2017 03:38:02 CET Andrew David Wong wrote:
Our position is that reasonable security
via compartmentalization (of which Qubes is an implementation) requires
the user to make informed decisions about how to
On Tuesday, November 28, 2017 at 6:41:02 PM UTC+1, Frédéric Pierret (fepitre)
wrote:
> Le mardi 28 novembre 2017 18:33:38 UTC+1, Foppe de Haan a écrit :
> > guest-wd.log from a (fedora) VM that won't boot with kernel-qubes-vm-4.14.2:
>
> I confirm your log and the behavior. Few days ago, I tried
I am using Qubes 3.2, I have a dedicated Debian Template for my more trusted
VMs and a separate dedicated Debian Template for my DVMs with printer drivers
installed.
This is tricky but I will try to explain:
I managed to get my printer set up using a Debian Template(printed Test Page
fine
On Thursday, November 23, 2017 at 7:55:21 AM UTC-5, Leo Gaspard wrote:
> On 11/23/2017 03:35 AM, taii...@gmx.com wrote:
> > On 11/22/2017 07:25 PM, xeph...@gmail.com wrote:
> >> This is quite late, but now that UEFI is supported...is secure boot?
> >> Wasn't quite sure what key or signature to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) #36:
Xen hypervisor issue in populate-on-demand code (XSA-247).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be available
>
> > This is quite late, but now that UEFI is supported...is secure boot?
> > Wasn't quite sure what key or signature to import.
> Why are all the newbies here so obsessed with a microsoft technology?
>
> Just shut it off, it provides no benefit to you. If their code is so
> great and
On Tuesday, November 28, 2017 at 10:28:38 AM UTC-8,
bm-2ctrx1tl5lg8cfa...@bitmessage.ch wrote:
> When I tried create new VM based on Fedora I saw something strange because
> it don't want run even if I created VM based on Debian. And when I open
> terminal and for test run this commands I see
Hello David,
Original-Nachricht
An 27. Nov. 2017, 21:32, David Hobach schrieb:
>> Search for the related doc bug @qubes-issues.
>> It gives you the command, but I don't have it
>> at hand right now.
as Qubes 4rc3 has been released I've reinstalled RC3 and got rid of the
Hello Unman,
>> It's perfectly possible that the installer (not principally written by
>> Qubes) could mistakenly include a passphrase string.
As far as I have understand, the problem is not that the password is shown, but
that the report with this error mistake and the password could get
I do not know how to help you. I have taken a picture without removing the
geotag (authentic picture /w geotag in my own living room. the picture
(one of many) is in my iphone but my own finger is hiding MY OWN
PASSPHRASE... I could see it 20/20.. I still have everything I used (my
own laptop),
> Current users of Qubes 4.0-rc2 can upgrade in-place by downloading the
> latest updates from the testing repositories in both
> [dom0][dom0-testing] and [TemplateVMs][domU-testing]. Further details,
> including full installation instructions, are available in the [Qubes
> 4.0 release
Sorry but I almost fainted ! (I even took a picture ! I could not believe this
MEGA-HUGE security flaw right in front of my eyes )
An installation error prompt this screen :
An unknown error has occurred
This program has encountered an unknown error. You may report the bug below or
quit the
On Tue, Nov 28, 2017 at 09:26:04AM -0800, vel...@tutamail.com wrote:
> I am using Qubes 3.2, I have a dedicated Debian Template for my more trusted
> VMs and a separate dedicated Debian Template for my DVMs with printer drivers
> installed.
>
> This is tricky but I will try to explain:
>
> I
Hello,
Original-Nachricht
An 29. Nov. 2017, 00:48, schrieb:
Sorry but I almost fainted ! (I even took a picture ! I could not believe this
MEGA-HUGE security flaw right in front of my eyes )
(...)
Sorry, you are supposed to be good and security expert but you are asking me
On Tue, Nov 28, 2017 at 07:48:49PM -0500, '[799]' via qubes-users wrote:
> Hello,
>
> Original-Nachricht
> An 29. Nov. 2017, 00:48, schrieb:
> Sorry but I almost fainted ! (I even took a picture ! I could not believe
> this MEGA-HUGE security flaw right in front of my eyes )
>
Could you send me one, for privacy concerns, literature, and art things, and
staying as much as possible gosthy? Thanks in advance, this would be great from
you.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
On Mon, Nov 27, 2017 at 09:27:16PM +0100, CF wrote:
> Dear Users,
>
> A few (simple) questions as I was reading about DNS servers:
>
> 1 - Any feedback on using your own DNS server directly on your Qubes
> machine (using unbound for instance)? Is it straightforward to have your
> DNS cache
28 matches
Mail list logo