In Qubes 3.2 I have a Windows 7 HVM (with windows tools installed) connected to
a NetVM with a 10Gbe network card.
The Windows VM has plenty of memory and cpu-cores allocated. I use iperf to
test the bandwith to an external server using similar iperf settings in both
VM's. (Trying different -w
Original-Nachricht
An 22. Dez. 2017, 06:49, MirrorWay schrieb:
>> Since watts is already energy/time,
>> this should just say 9.5W
Ok, thanks :-)
>> As I understand it, Xen PV code has bad
>> track record of vulnerabilities, hence the
>> change to HVM in Qubes 4.0.
>> Also why
On Friday, 22 December 2017 02:42:57 CET yreb...@riseup.net wrote:
> assuming
> 4.0 is going to come out of the box with like Debian 9 and Fed 26?
Fedora 26 is not going to be used in 4.0, maybe in 4.1
source;
https://groups.google.com/forum/#!msg/qubes-devel/13PZgSOaajA/RvBh02ANCAAJ
--
Tom Za
Hi,
On Tuesday, 19 December 2017 09:39:37 UTC+1, Kushal Das wrote:
> Hi,
>
> My Qubes 4.0rc3 (updated) is showing error for sys-net vm saying it
> has a duplicate mac address for the NIC. This error message came
> before (on the fresh install), and was fixed in a few reboots. But,
> now I could
On Fri, Dec 22, 2017 at 02:34:41AM -0800, Reynir Björnsson wrote:
> It may be a coincidence, but when it happened to me I got sys-net running by
> shutting down sys-whonix first. I've since disabled sys-whonix and haven't
> had the issue again, although I haven't been rebooting much since.
I bel
As far as I remember, there was an idea to kill stubdoms after boot, which
would both reduce risk (as stubdoms run in PV) and CPU+memory overhead. I
cannot try it right now, because I haven't installed Q4.
> If I switch to disposable VMs, I assume the risk would be reduced.
You can sort reduce
On Wed, December 20, 2017 11:51 pm, 'awokd' via qubes-users wrote:
> On Wed, December 20, 2017 10:22 pm, Marek Marczykowski-Górecki wrote:
>> Try building ISO based on example-configs/qubes-os-3.2.conf, with
>> changed:
>>
>>
>>
>> DISTS_VM = fc26 stretch
>> BRANCH_linux_kernel = stable-4.9
>>
>>
On 12/22/2017 03:46 AM, Jarle Thorsen wrote:
In Qubes 3.2 I have a Windows 7 HVM (with windows tools installed) connected to
a NetVM with a 10Gbe network card.
The Windows VM has plenty of memory and cpu-cores allocated. I use iperf to
test the bandwith to an external server using similar ipe
On 12/20/2017 08:24 PM, Wael Nasreddine wrote:
On Friday, December 8, 2017 at 5:28:12 PM UTC-8, tai...@gmx.com wrote:
On 12/08/2017 04:54 PM, Wael Nasreddine wrote:
On Friday, December 8, 2017 at 12:07:56 AM UTC-8, tai...@gmx.com wrote:
On 12/08/2017 02:43 AM, Yethal wrote:
W dniu czwartek
Hi mailinglist,
(I know many developers are busy building 4.0, so I won't quarrel about
the missing GUI - I just wanna restore my backups :-) )
I recently installed Q4.0-rc3. I have an old qubes-backup (from 2016) on
a LUKS encrypted external HDD. How do I restore my backup in 4.0 using
qvm-backu
On Thursday, 21 December 2017 23:03:56 UTC+2, donoban wrote:
> On 12/21/2017 04:02 PM, Thomas Leonard wrote:
> >> This is what I have on mind:
> >>
> >> - Some kind of struct/object for store firewall rules in memory
> >> - A func which parses this rules object for a packet
> >> - A func for add/d
Hi,
I bought a second internal USB controller (A) to connect a flash drive for
booting from SD.
How can I prevent the internal controller(B) (with the keyboard attached) to be
recognized during startup? I can still type my boot password with it, that
means the controller is visible, right?
So
On Fri, December 22, 2017 8:55 am, '[799]' via qubes-users wrote:
>
> This I also what I assumed as there must be a good reason why Qubes Team
> has switched to HVM instead of using PV VMs. Still I'd like to learn more
> about the vulnerabilities, so I can make a decision risk vs. runtime. And
> as
On Fri, December 22, 2017 10:29 am, 'Tom Zander' via qubes-users wrote:
> On Friday, 22 December 2017 02:42:57 CET yreb...@riseup.net wrote:
>
>> assuming 4.0 is going to come out of the box with like Debian 9 and Fed
>> 26?
If you have room for it, back up everything! You can restore selectively
On Fri, December 22, 2017 6:12 pm, Josefa Hays wrote:
> I recently installed Q4.0-rc3. I have an old qubes-backup (from 2016) on
> a LUKS encrypted external HDD. How do I restore my backup in 4.0 using
> qvm-backup-restore? I guess I don't want to mount the drive directly in
> Dom0, so, how do I
Hi Patrick,
> I found the problem! :-D My /var/lib/qubes/qubes.xml file was corrupted
Do you remember chaning any vm settings when the disk was full?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiv
On Wed, Dec 20, 2017 at 11:00 PM, Chris Laprise wrote:
> On 12/20/2017 10:44 PM, Kyle Breneman wrote:
>
>> I'm new to verifying keys and signatures. I downloaded the Qubes R3 ISO
>> file and accompanying signature file, as well as the Qubes Master Signing
>> Key. I verified and trusted the Qube
>Hi All
>
>i tried to install mirage-firewall followed by the Readme . and didn't
>succeed
>to run the mirage firewall .
>
>error : libxenlight failed to create new domain log
>
>2017-12-22 19:13:01.320+: libxl:
>libxl_device.c:1235:device_hotplug_child_death_cb: script: Device
>/dev/mapp
On Friday, 22 December 2017 23:51:29 UTC+2, donoban wrote:
> >Hi All
> >
> >i tried to install mirage-firewall followed by the Readme . and didn't
> >succeed
> >to run the mirage firewall .
> >
> >error : libxenlight failed to create new domain log
> >
> >2017-12-22 19:13:01.320+: libxl:
>
El 22 de diciembre de 2017 22:59:24 CET, Roy Bernat
escribió:
>On Friday, 22 December 2017 23:51:29 UTC+2, donoban wrote:
>> >Hi All
>> >
>> >i tried to install mirage-firewall followed by the Readme . and
>didn't
>> >succeed
>> >to run the mirage firewall .
>> >
>> >error : libxenlight fai
On 2017-12-22 09:50, awokd wrote:
> On Fri, December 22, 2017 10:29 am, 'Tom Zander' via qubes-users wrote:
>> On Friday, 22 December 2017 02:42:57 CET yreb...@riseup.net wrote:
>>
>>> assuming 4.0 is going to come out of the box with like Debian 9 and Fed
>>> 26?
>
> If you have room for it, back
On Fri, December 22, 2017 1:33 pm, 'awokd' via qubes-users wrote:
> On Wed, December 20, 2017 11:51 pm, 'awokd' via qubes-users wrote:
>
>> On Wed, December 20, 2017 10:22 pm, Marek Marczykowski-Górecki wrote:
>>
>
>>> Try building ISO based on example-configs/qubes-os-3.2.conf, with
>>> changed:
>
22 matches
Mail list logo