On Thu, February 1, 2018 8:58 am, ThierryIT wrote:
> If I did understood well, when using Qubes 4.0r3, there is no sys-usb ...
If you chose not to set one up on install there wouldn't be, but usually
you should unless using a usb keyboard maybe. You can still add one now;
check the docs.
--
On Thu, February 1, 2018 10:21 am, Willem D wrote:
> I found the report on Github:
> https://github.com/QubesOS/qubes-issues/issues/2838 which describes the
> same issue as I have. I would like to debug the problem, but I require
> assistance with that.
To workaround the problem, try using
On Thu, February 1, 2018 6:47 am, evo wrote:
> Hi all!
>
>
> I have sometimes big problem with Qubes 3.2.
> Just now, by writing an email... suddenly my laptop rebooted. Without
> any errors. Blackscreen and reboot.
>
> This was the second time, but after rather large period.
>
>
> how can i
On Thu, February 1, 2018 9:54 am, pixel fairy wrote:
> noscript, the firefox extention, pops up the following about the qubes
> site,
>
> NoScript detected a potential Cross-Site Scripting attack
>
>
> from [...] to https://www.qubes-os.org.
>
> Suspicious data:
>
>
> window.name
Not seeing this
On Thursday, 1 February 2018 13:40:24 UTC+2, awokd wrote:
> On Thu, February 1, 2018 10:21 am, Willem D wrote:
>
> To workaround the problem, try using Refind. To actually debug it, I think
> Qubes is using a modified version of Fedora 25's installer. Does that one
> work on your system? Not
On Thursday, February 1, 2018 at 3:31:45 AM UTC-8, awokd wrote:
> Not seeing this in Tor Browser 7.5 with Noscript 5.1.8.4 when I browse to
> https://www.qubes-os.org. Where are you seeing it?
firefox on fedora-26. install noscript, look at the qubes site. go to other
sites. maybe restart the
On Thu, February 1, 2018 3:46 pm, ThierryIT wrote:
> What am I doing wrong ?
>
>
> I have a Yubikey4 U2F + CCID.
> Not detected with "qvm-block"
> Detected as sys-usb:4-2 by dom0 (qvm-usb).
>
>
> I have tried:
>
>
> - qvm-device usb attach vm_name sys-usb:4-2 (device attached failed)
> -
Is legacy BIOs still preferred and likely compatible with 4.0 when final?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Are there plans for the final 4.0 release to have a direct upgrade path from
3.2? Or do we just backup all of our VMs, fresh install 4.0, then restore our
VMs?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
I see on the Whonix website that's linked to it simply says:
"To access the v3 onion address, Whonix users must install the latest Tor 3.2.9
client in Whonix-Gateway ( sys-whonix ) via the stable-proposed-updates
repository."
Any idea the commands to do this from the terminal for the
On Thu, February 1, 2018 7:53 pm, alexclay...@gmail.com wrote:
> I see on the Whonix website that's linked to it simply says:
>
>
> "To access the v3 onion address, Whonix users must install the latest Tor
> 3.2.9 client in Whonix-Gateway ( sys-whonix ) via the
> stable-proposed-updates
On Tue, January 30, 2018 1:51 am, awokd wrote:
> On Tue, January 30, 2018 12:05 am, 'Tom Zander' via qubes-users wrote:
>
>> Is this a known issue?
>>
>>
>>
>> I can start a VM using qvm-start, but when I use qvm-run nothing
>> happens, it hangs forever. Even commands that don't need a X server.
On February 1, 2018 6:42:08 PM GMT+01:00, Dave C wrote:
>Indeed, I stand corrected. This point could apply to a restrictive
>firewall, but the VM would need to network with the local VM running
>vncserver.
BTW, you could also pipe the network communication through
On Thu, Feb 01, 2018 at 09:58:34AM -0800, alexclay...@gmail.com wrote:
> Are there plans for the final 4.0 release to have a direct upgrade path from
> 3.2? Or do we just backup all of our VMs, fresh install 4.0, then restore our
> VMs?
the latter.
--
cheers,
Holger
--
You
On Sunday, January 28, 2018 at 12:24:08 PM UTC-8, Vít Šesták wrote:
> On January 27, 2018 7:57:02 AM GMT+01:00, Dave C wrote:
> >* VMs that can't access the conference site (i.e. bluejeans.com) or
> >can't access the net at all
>
> How can a VM without network access open a window in the X11
I got it in Fedora 26 appVM as well but the website was fedora.org. I am using
3.2...
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Saturday, January 13, 2018 at 9:24:49 AM UTC+1, msg...@gmail.com wrote:
> Maybe there is no bootloader on /dev/sdc1? Try to boot from livecd and fix
> bootloader.
This is very likely. Bootloader is usually installed on whole drive (e.g.,
/dev/sdc) rather than on its partition (e.g.,
What am I doing wrong ?
I have a Yubikey4 U2F + CCID.
Not detected with "qvm-block"
Detected as sys-usb:4-2 by dom0 (qvm-usb).
I have tried:
- qvm-device usb attach vm_name sys-usb:4-2 (device attached failed)
- qvm-device block attach vm_name sys-usb:4-2 (backend vm 'sys-usb' doesn't
expose
When you say upgraded did you install a fresh fedora 26 template?
https://www.qubes-os.org/news/2018/01/06/fedora-26-upgrade/
I think the advice is not to "upgrade" from fedora 23 but to install a fresh
template.
Not sure thats your issue...if not I am not sure how to correct.
Qubes rocks!
Can you try if you get better throughput between a proxy vm and an appvm
using this kind of topology?
sys-net <-> iperf-srv (proxyvm) <-> iperf-cli (appvm)
I could push ~10Gbps with one flow and slightly more with more parallel
flows between them. But between sys-net and iperf-srv vms I've a
did you try to prepend the command with 'sudo'?
--
-
IMPORTANT NOTICE: The information in this email is confidential and may
also be privileged.
If you are not the intended recipient, any use or dissemination of the
information and any
On Tuesday, August 22, 2017 at 3:03:56 PM UTC-6, Gecko wrote:
> It didn't let me do the gparted install. I have since given up. I have
> decided to wipe the qubes os partition, go back to windows, connect another
> computer using ethernet, backup my files, then wipe the hard drive, and maybe
>
Hi folks,
Installed Qubes R4.0rc3, updated dom0/templates. Added the testing repository,
updated dom0/templates so I am now at R4.0rc4 (qubes manager returns, huzzah!).
The problem is that I am trying to import a raw root.img file (converted from
vmdk using qemu tools) while creating a new
Mea culpa and apologies to all: the properties for "--class" or "--c" are case
sensitive.
Substituting 'StandaloneVM' for 'standalonevm' fixed the problem.
Thanks,
Brendan
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
Le jeudi 1 février 2018 18:01:21 UTC+2, awokd a écrit :
> On Thu, February 1, 2018 3:46 pm, ThierryIT wrote:
> > What am I doing wrong ?
> >
> >
> > I have a Yubikey4 U2F + CCID.
> > Not detected with "qvm-block"
> > Detected as sys-usb:4-2 by dom0 (qvm-usb).
> >
> >
> > I have tried:
> >
> >
> >
btw, what behaviour do I expect if windows-tools are probably
installed? I've no idea, e.g. how does one increase the screen size
or is there a plain english version of what windows-tool does ?
probably another newb question
--
You received this message because you are subscribed to the
I did qvm-start win7 --install-windows-tools
--custom-config=/tmp/win7.conf
then
qvm-start win7worked fine , but .
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-02-01 02:22, Nope wrote:
> The problem, as Ivan pointed out, is that our issue tracker would
> be cluttered with open reports in which the issue is probably
> fixed, but we're waiting for the reporter to confirm that it's
> fixed.
>
> ->
nevermind .
:)
seems to be up and running with cirrus driver
https://support.hidemyass.com/hc/en-us/articles/202723596-How-to-disable-Driver-Signing-check-on-Windows
re:bcedit
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
Ilpo Järvinen:
> I'd next try to tweak the txqueuelen (at the netvm side):
> sudo ifconfig vifxx.0 txqueuelen
>
> Appvm side (eth0) seems to have 1000 but the other side (vifxx.0) has
> only 64 by default that seems a bit small for high-performance transfers.
Thanks a lot for your help
If I did understood well, when using Qubes 4.0r3, there is no sys-usb ...
Le jeudi 1 février 2018 02:31:50 UTC+2, joev...@gmail.com a écrit :
> qvm-usb command shows you how to attach USB devices to VMs. There is no GUI
> method like there is for block devices.
>
> Remember, Yubikey is not
On Thu, 1 Feb 2018, Jarle Thorsen wrote:
> Ilpo Järvinen:
> > I'd next try to tweak the txqueuelen (at the netvm side):
> > sudo ifconfig vifxx.0 txqueuelen
> >
> > Appvm side (eth0) seems to have 1000 but the other side (vifxx.0) has
> > only 64 by default that seems a bit small for
I have installed the patch from security-testing. On system resume, I sometimes
notice effects like:
* Time synced noticeably late. For example, when my laptop wakes up on morning,
Thunderbird considers today's e-mails as e-mails from future day (so it
displays date, not only time).
* Some VMs
The problem, as Ivan pointed out, is that our issue tracker would be
cluttered with open reports in which the issue is probably fixed, but
we're waiting for the reporter to confirm that it's fixed.
-> cluttered with open reports: yes you are right, in this case, can you
through Github, to close
On Wed, 31 Jan 2018, Jarle Thorsen wrote:
> Mike Keehan:
>
> > It sounds a bit ambitious to run 10gb per sec from one VM through
> > another and onto the wire. I suspect you are memory speed limited
> > if you are using a straightforward desktop pc.
>
> I'm not sure what is the limiting
noscript, the firefox extention, pops up the following about the qubes site,
NoScript detected a potential Cross-Site Scripting attack
from [...] to https://www.qubes-os.org.
Suspicious data:
window.name
--
You received this message because you are subscribed to the Google Groups
Ilpo Järvinen:
> I found this:
> https://wiki.xenproject.org/wiki/Xen-netback_and_xen-netfront_multi-queue_performance_testing
Thanks, I'll have a look.
> It might be that roughly 4Gbps might be what you can get for cross-vm with
> one flow (but those results are quite old).
>
> I guess that
Hi All,
I tried installing Qubes 4.0-rc3 in UEFI mode using a USB drive. After POST I
see 4 options* regardless of what option I choose the message "Couldn't obtain
the File System Protocol Interface" flashes very quickly on my screen and the 4
options are displayed on the screen again.
I
38 matches
Mail list logo