> report.txt but couldn't copy or move
> from dom0
>
https://www.qubes-os.org/doc/copy-from-dom0/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXUfIzAAoJENtN07w
n
recent motherboards typically has the ability to update itself over
the internet from within the UEFI itself. Qubes can't prevent that,
because Qubes isn't even running at that point (though AEM should
detect such changes after the fact.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-08 08:36, Andrew David Wong wrote:
> On 2016-06-08 08:21, Franz wrote:
>> Hello,
>
>> I noted that when I insert a SD card into the corresponding slot
>> of my Lenovo x230, it is automatically attached to Dom
.whonix.org/wiki/Multiple_Whonix-Workstations
https://www.whonix.org/wiki/Stream_Isolation
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXWDTtAAoJENtN07w5UDAwkIMQAIsKMKDrWfy6JnVW0TZGFTgj
xk8QqTVg8sCwC0TqNBbpNccexb6AWB2I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-06 22:35, Achim Patzner wrote:
> Am 07.06.2016 um 01:02 schrieb Andrew David Wong:
>
>> I'm not sure if I understood the proposed two changes
>
> Steps 1 and 2: If someone starts poking around in sys-whonix,
&
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-08 15:33, Marek Marczykowski-Górecki wrote:
> On Wed, Jun 08, 2016 at 08:44:11AM -0700, Andrew David Wong wrote:
>> On 2016-06-08 08:36, Andrew David Wong wrote:
>>> On 2016-06-08 08:21, Franz wrote:
>>>
load properly. Not that
> anyone cares since no ones bothered to respond to this in the
> first place.
>
Thank you for following up to report the solution. FWIW, I think it
was probably that no one knew the answer, not that no one cared. I,
for one, would never have guessed that this was t
rk i have to
> use GUI). Do I setup like a normal VPN in debian (network
> connection, import configuration, certificate etc...) and change
> firewall?
>
> Thank you
>
Take a look at our VPN documentation if you haven't already. It was
recently updated:
https://www.qubes-os.org/d
s-os.org/doc/whonix/reinstall/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXWLYEAAoJENtN07w5UDAwrZ4P/36NNgpos/AHcDC7PxY/03LZ
EBy9s/XVtQaMMoIIgdhlXVR5LnPYc555nS6mJ9aiLynUxbvJ8G2H
it, and what exactly do you mean by
"see"?
Depending on the answers to those questions, you might find these
pages helpful:
https://www.qubes-os.org/doc/vpn/
https://www.qubes-os.org/doc/qubes-firewall/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
--
gt;
> How I can install Kgpg in a AppVM/Template VM?
>
> Kind Regards
>
Assuming a fedora-23 template:
sudo dnf -y install kgpg
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXVUibAAoJENtN
drives with Qubes, so there isn't
much advice to give.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXVUnVAAoJENtN07w5UDAwYQQP/i3Yw/UufQNI5O/LGj6ViQAF
RpxVRqoX/Dp6wT5aasOOfT02mnSuwW3oo+vmQiH2xt/jI4LytbT5HIZToXQLgFDK
OKzpyu
sudo yum remove qubes-template-whonix-gw
$ sudo yum remove qubes-template-whonix-ws
4. Reinstall the Whonix templates in dom0:
$ sudo qubes-dom0-update --enablerepo=qubes-templates-community \
qubes-template-whonix-gw qubes-template-whonix-ws
5. Change the VMs from step 2 back to (the new) w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-07 09:47, 1'09384'109348'019438'0194328'0194328'091432 wrote:
> Hallo Andrew David Wong,
>
> Merci, the installation and mapping into the fedora VM seems fine.
>
> But if I start the KGPG than it will not start.
>
&g
this is one of the project's aims. We haven't reached it yet, but
we're continuing to work on it. The pace of development is, of course,
constrained by practical considerations like funding (which would be
required in order to hire more developers).
- --
Andrew David Wong (Axon)
Community Manager, Qu
ive? I suppose that if the problem isn't actually with the SATA port
or the cable, and if the CD-ROM drive is also unrecognized by other
Linux systems, then probably yes.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJ
ireless NIC to one VM and the wired NIC to another VM, you should
be able to have two NetVMs. (You may also want to have two
FirewallVMs.) Then it should just be a matter of assigning one set of
TemplateVMs to one and the other set to the other.
- --
Andrew David Wong (Axon)
Community Ma
n install
> all from backup?
>
Yes. To clarify, the procedure is to reinstall Qubes, then do this (or
a variation of this, depending on your situation):
https://www.qubes-os.org/doc/backup-restore/#tocAnchor-1-1-2
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os
;
> so must I update the kernel offline? If so, please tell me how as I
> have no clue how to do this in qubes netvm.
>
> Thank you.
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJ
to try this, document this, etc.?
>
> Cheers, Patrick
>
Tracking and labeling as "help wanted," in case anyone is ever
interested:
https://github.com/QubesOS/qubes-issues/issues/2060
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://w
ns across
> several templates?
>
Personally, I found that the vast majority of time I spent
administering templates was spent on keeping them updated, so I wrote
a bash script to update them and set it to run periodically as a cron
job in dom0.
- --
Andrew David Wong (Axon)
Community Manager,
bility problem? Or
> is it something I can fix by running it on my other computer?
>
> Let me know if I need to provide more info!
>
> -Radio-
>
Sounds like it might be an issue with your network card. Try
installing any available drivers for it if you can, and post the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-15 01:56, Franz wrote:
> On Tue, Jun 14, 2016 at 10:49 PM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>
> On 2016-06-14 15:20, Albin Otterhäll wrote:
>>>> I've eight different templates (copies, etc.) an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-12 21:39, qubescr...@gmail.com wrote:
> On Monday, 13 June 2016 01:20:36 UTC+7, Andrew David Wong wrote:
>
>> Yes, this is one of the project's aims. We haven't reached it
>> yet, but we're continuing to wo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-06 05:34, gaikokujinkyofu...@gmail.com wrote:
> On Monday, June 6, 2016 at 6:01:07 AM UTC, Andrew David Wong wrote:
> On 2016-06-05 16:02, gaikokujinkyofu...@gmail.com wrote:
>>>> For what its worth I found a clonezilla
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-06 16:02, Andrew David Wong wrote:
> Added:
>
> https://github.com/QubesOS/qubes-doc/commit/
> ffbe63ac8c6fa3feb06ab78ac88455cc90fb746a
>
> I'm not sure if I understood the proposed two changes, but feel
> free to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-06 12:38, Achim Patzner wrote:
> Am 06.06.2016 um 12:34 schrieb Andrew David Wong:
>>> Someone who has so completely mesed up his whonix-ws and -gw
>>> templates that sys-whonix is not connecting to tor anymore
>
ou should just be able to log in
with that DE.
Updating the (very old) XFCE documentation is on our to-do list:
https://github.com/QubesOS/qubes-issues/issues/1923
In the meantime, I'd suggest searching for information on how to
install XFCE in baremetal Fedora 20, since the process should be
similar.
s any one know how to fix?
>
Try this:
https://support.mozilla.org/en-US/kb/how-run-firefox-when-profile-
missing-inaccessible
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXSDmjAAoJENtN0
you can read
about here:
https://www.qubes-os.org/doc/qrexec3/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXR9BGAAoJENtN07w5UDAw+iwP/2ZRejRpu2qwn8zO/ssMeBk2
Pv2EvOMUIqME0T/htGRdV9mn
any TemplateBasedVMs that are based on those templates), then I think
it should be fine to remove (or not (re-)install) them.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXR9EWAAoJENtN0
e for btsync
> when I want to sync files from another VM than the one with the
> keepass-files).
You could do that. Or, you could run it in a single VM, then use
qvm-backup (also available in Qubes Manager) to put your (optionally
encrypted) backup archives there.
- --
Andrew David W
OS/qubes-issues/issues/1745#event-665419288
>
>
I've experienced this too. If I just wait about 10 seconds, then try
to start sys-net again, it always works.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
---
ould try?
>
Have you already tried restarting the NetVM itself (or the
whole system)?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXTwD/AAoJENtN07w5UDAwajsQAJW3rK1iRIyHzaC/Y+D/xcj0
PW4+SAHJllXyyGC3oB2IWOJiF
in template of course).
>>
>
> Sorry, how do you do that?
>
> I've googled and tried the instructions from rpmfusion without
> success.
>
Try this (in your Fedora template of choice):
$ sudo dnf config-manager --set-enabled rpmfusion-free rpmfusion-nonfree
$ sudo dnf upg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-05-29 06:14, Achim Patzner wrote:
> Am 29.05.2016 um 03:31 schrieb Andrew David Wong:
>> On 2016-05-28 11:38, Achim Patzner wrote:
>>> Hi!
>>
>>> Is it only me or are there some more people who seriously
topic for researchers.
>
>
> If you just want to run a VMWare VM on your Qubes OS than you
> should simply consider converting the VMWare VM to a Xen VM and run
> it on top of Qubes OS as (e. g. HVM).
>
> Best regards J. Eppler
>
IIRC, Xen's nested virtualization is disabled in Qu
ive. It's an initial
categorization for organizational purposes, and it could change at any
time. Ultimately, it is up to the developers (in this case
specifically, probably Rafał and Marek) which milestone it should have.
- --
Andrew David Wong (Axon)
Community Manager, Qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-21 06:10, Franz wrote:
> On Mon, Jun 20, 2016 at 10:32 PM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>
> On 2016-06-20 18:05, Franz wrote:
>>>> On Mon, Jun 20, 2016 at 1:51 PM, Andrew David Wong
toreFlags if ret == -1: raise libvirtError
> ('virDomainRestoreFlags() failed', conn=self)
> libvirt.libvirtError: internal error: libxenlight failed to restore
> domain 'disp1'
>
Marek, any idea what's going on here? (Sorry about the bad rewrapping.
Thunderbird/En
s a "Logs" menu.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXarmIAAoJENtN07w5UDAwv0EP/0/AguBjh/WLvu/z0nIo7v/e
3/k8vnbaagYFfpe/TV4bNRQNSDIUAQUcEXHQC8iN4AWKWlhvGvg9Lge5UTe6as8r
a5xwDpB6DUf9AcduThs7ksWZcP8yDcM2Utu1wrX
es-users/-wkG7E55PUI
https://www.qubes-os.org/doc/linux-hvm-tips/#tocAnchor-1-1-2
https://groups.google.com/forum/#!topic/qubes-devel/CB30pD5J56U
> Thanks and Regards, Srini
>
P.S. - Please don't top post.
> On Monday, June 20, 2016 at 11:07:35 PM UTC+5:30, Andrew David Wong
> wrote:
&g
aging disk partitions in Linux.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXarj4AAoJENtN07w5UDAwMwgP/1rarHifOFG/uXuSLbjUQkQs
sf95OxRFRx1NKur9UjtGT/KBSH/2Xpwh6BI3veBbmW2CiCfN5w5VmbGlg+I+jmDE
ln23XcYtwTL346M/Gw9
An easier way, IMHO, is just to use Google Chrome, which (for the
moment, at least) has Flash included in the browser. (They plan to get
rid of it later this year.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNA
chops to do make an Alpine-based image
> myself)
>
There was a discussion about Alpine on qubes-devel last year:
https://groups.google.com/d/topic/qubes-devel/G6fGD2qxcZc/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE--
ompromised.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZMyHAAoJENtN07w5UDAwj5UQANDKFUZBm+CyfVIGXRN6MbAF
EnN+qEkkaxOyLsSlPVxswLOjdz82HcumTrY/cGUFJlnj49FJvzQLC0Tp4YJrY6eA
6U9NaApknhZzDeoxrEP1uYsgSBRBcCKcQmYISvg
"migration" as described here:
https://www.qubes-os.org/doc/backup-restore/#tocAnchor-1-1-4
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZOC+AAoJENtN07w5UDAwVIEP/jqTHcqYorkFVS/Y60A5s57P
EY
ted in HVMs.
There's a discussion about potential options here:
https://groups.google.com/d/topic/qubes-users/rz_-NS5D_P0/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZQoMAAoJENtN07w5UDAwJykQAK7
existing issue for this, so I've created one to
track it:
https://github.com/QubesOS/qubes-issues/issues/2077
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZOA2AAoJENtN07w5UDAwhOoP/j5VldtK9RxSJhJ4lIcZ9Jv0
EbrDyX
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-16 17:36, Drew White wrote:
> Hi andrew,
>
> On Friday, 17 June 2016 02:19:02 UTC+10, Andrew David Wong wrote:
>>
>> Just to be clear: The Qubes Project has not shot down this
>> feedback in any way. In fact,
in bridged mode to join an
> ActiveDirectory domain.
>
> Has any else ran a Windows AppVM in an activedirectory domain? and
> if so how?
>
You might find this relevant:
https://github.com/QubesOS/qubes-issues/issues/2025
- --
Andrew David Wong (Axon)
Community Manager, Qub
ons).
System Tools -> System Settings -> Desktop Effects -> Advanced ->
Compositing type
> Thanks
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZOWgAAoJENtN07w5UDAw5GEP/iBTFV0tgfED2
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-18 01:41, Andrew David Wong wrote:
> On 2016-06-17 21:22, Andrew David Wong wrote:
>> On 2016-06-17 18:02, raahe...@gmail.com wrote:
>>> But what if when it says it can't verify key ignatures
>>> possibly?
idea. Knowing your hardware specs (as
mentioned above) would help tremendously in helping you diagnose this,
but it sounds like you'll probably have more luck asking on the KDE
forums/mailing list, since this is a KDE-provided feature.
- --
Andrew David Wong (Axon)
Commu
ike it's probably this:
https://github.com/QubesOS/qubes-issues/issues/1977
Or maybe one of these, if you're trying to attach a PCI device:
https://github.com/QubesOS/qubes-issues/issues/1659
https://github.com/QubesOS/qubes-issues/issues/1619
- --
Andrew David Wong (Axon)
C
>
> Alex
>
Does it persist even after you regenerate the DVM template?
$ qvm-create-default-dvm --default-template
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIbBAEBCgAGBQJXZqaPAAoJENtN07w5UDAw1q4P93qCk
revoked their key.
Since we don't know anything about this revoked key, this tells us
exactly nothing about the trustworthiness of the Qubes OS Release 3
Signing Key.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
handle this rather than trying
to manipulate memory allocation manually.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZqP4AAoJENtN07w5UDAwTHYP/1YYu1uK42EFtW9oNO0SPM55
VH7Lx/b/vjnZvMH/xKjg48dzXNLPS85e4LFud6TqVv+L6
n
the VM to which it is assigned is trusted one, or is running all the
time."
Source: https://www.qubes-os.org/doc/dom0-tools/qvm-prefs/
Also available via `qvm-prefs --help`.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
--
s): [...]
>
Ok, that looks normal. When you say DispVMs "do not launch," does that
just mean that nothing happens when you click the DispVM shortcuts in
the KDE launcher?
Is your default template fedora-23? Have you made any modifications to
it?
What happens if you execute this com
n the QubesManager.
>
> Kind Regards
>
https://github.com/QubesOS/qubes-issues/issues/899
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZq/HAAoJENtN07w5UDAwz+QP/3jXgvxEsQycVPFhoL3u1bi
M based on that HVM template. If you need to install them
permanently, then it's fine to clone the HVM template. (Or simply
clone a standalone HVM.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXZR4PAAoJENtN
meter, which guides me to some liquid user
> experience?
>
> Kind Reagards
>
I've noticed the same thing, but it doesn't seem to be affected by
which screen an application is on. My CPU usage (as reported by the
KDE widget) spikes, so I assumed that was it.
- --
Andrew David Wong (Axon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-22 21:58, Todd Lasman wrote:
> On 05/16/2016 11:44 PM, Andrew David Wong wrote:
>> I'm attempting to install Anti Evil Maid on a Lenovo T450s
>> (Broadwell, Wildcat Point-LP).
>>
>> [...]
>
>
> An
M is set as your
TemplateVM's NetVM, then try using the "allow full access for N
minutes" option.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXa4m6AAoJENtN07w5UDAwMaIP/2CFulCr86nj9QPOeMBSeMlc
p075EnYJO1
gt; fact I'd rather the raw templates themselves didn't even show up
> in the vm manager so you could always count on cloning them again
> without having to re-download. On 23 Jun 2016 5:03 PM, "Andrew
> David Wong" <a...@qubes-os.org> wrote:
>
That might not work a
; bases the DVM template on your default TemplateVM
(by default, fedora-23 in R3.1).
"--default-script" is no longer required in R3.1 (but it doesn't hurt
to use it).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNAT
ould leave
dom0 selected as the "AppVM" (even though it's not really an AppVM),
then enter (or select) the path to the backup in dom0. (If there is no
path to the backup in dom0, then mount the drive first, then enter the
path to the mount point.)
- --
Andrew David Wong (Axon)
Community Manager,
es removes an unrelated package that I think should be kept
> (kernel-qubes-vm).
Tracking:
https://github.com/QubesOS/qubes-issues/issues/2107
> Data restore works perfectly, apart from the ntpd service in
> firewallvm (may or may not have been enabled in the original, I
> think so, can'
gh edges in
> the new version.
>
Thanks for your feedback!
> Let me know if you have any questions.
>
> Dimitry
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXa5UTAAoJENtN07w5UDAwtgAP/0LbD7HCQRWNN9eVHh3q
> Sincerely, Drew.
>
Please note that installing Qubes inside a virtual machine is not
supported:
https://www.qubes-os.org/doc/user-faq/#can-i-install-qubes-in-a-
virtual-machine-eg-on-vmware
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEG
et things up correctly, there
shouldn't be any restrictions on your network access from the
TemplateVM.
Are the "Allow ICMP traffic" and "Allow DNS queries" boxes checked?
P.S. - Please don't top post.
> On Thu, Jun 23, 2016 at 12:03 AM Andrew David Wong
> <a...@qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-23 03:49, Rusty Bird wrote:
> Hi Andrew,
>
>> On 2016-06-22 21:58, Todd Lasman wrote:
>>> On 05/16/2016 11:44 PM, Andrew David Wong wrote: I seem to
>>> have this exact same problem, but only after install
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-23 06:20, Rusty Bird wrote:
> Hi Chris & everyone,
>
>> On 06/23/2016 06:53 AM, Andrew David Wong wrote:
>
>>> On 2016-06-23 03:49, Rusty Bird wrote:
>>>> Hi Andrew,
>>>>
>>&
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-23 04:45, Alex wrote:
> On 06/23/2016 09:38 AM, Andrew David Wong wrote:
>> On 2016-06-22 01:32, Alex wrote:
>>
>>> Had a working Qubes 3.1 installation, and the only problem was
>>> that it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-19 08:40, Franz wrote:
> On Sun, Jun 19, 2016 at 11:40 AM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>
> On 2016-06-19 04:38, Alistair Hutten wrote:
>>>> Good evening, Alistair here from Australia,
r AppVM?
> (Would be useful :-) ).
>
> Kind Regards
>
How to copy from dom0:
https://www.qubes-os.org/doc/copy-from-dom0/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXaCAYAAoJENtN07w5UDAwlS8QAL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-19 12:30, IX4 Svs wrote:
> On Sun, Jun 19, 2016 at 3:05 PM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>
> On 2016-06-18 14:54, IX4 Svs wrote:
>>>> Qubes R3.1, Fedora 23 template, fully updated.
>&g
t; [...]
Micah, do you also have a PCI device assigned to that HVM?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXaCCYAAoJENtN07w5UDAwouwP/Rtd8H1eag01jQ5oCC7dlrK+
2LODATjFcOBgxbtPNbW/lcAp2EDBrPExsRhKwhkvRVhNhuVXk
drive be unlocked in it's own VM? Dom0?
>
In this case, it sounds like dom0 would be more appropriate.
Personally, I just add secondary disks in dom0 and use them as
secondary storage like so:
https://www.qubes-os.org/doc/secondary-storage/
You can encrypt these disks with LUKS and add them to you
g. I wish a dev
> would address this. The solution is indeed to recreate the
> default dvm, but there must be a reason for this happening. I
> wonder if its related to the issue in this thread.
>
Thanks for the reports. Tracking here:
https://github.com/QubesOS/qubes-issues/issues/209
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-20 10:37, Andrew David Wong wrote:
> On 2016-06-20 06:32, Srini wrote:
>> Hi,
>
>> I am facing issues while syncing appmenus from HVM of Ubuntu
>> Studio 16.10 - Error is "need qrexec agent to be installed&
qrexec agent?
>
> Thanks and Regards, Srini
>
IIUC, that would be have to be developed especially for Ubuntu the way
Qubes Windows Tools are developed for Windows HVMs.
Technical documentation:
https://www.qubes-os.org/doc/qrexec3/
https://www.qubes-os.org/doc/windows-tools-3/
- --
Andrew D
ell)
>
Thanks for the report. Tracking here:
https://github.com/QubesOS/qubes-issues/issues/2097
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXaEp3AAoJENtN07w5UDAwjW8P/jE5gBu8AVItLnP3VaTqzggm
c4drjQ0JbrRCZucj
ify what you mean by "the installation doesn't work"? As
in, can't proceed? (How were you able to install in that case?)
Does it seem related to this issue?
https://github.com/QubesOS/qubes-issues/issues/794
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-20 09:59, Micah Lee wrote:
> On 06/20/2016 09:58 AM, Andrew David Wong wrote:
>> Micah, do you also have a PCI device assigned to that HVM?
>
> No I don't.
>
Thanks. Tracking here:
https://github.com/QubesOS/qubes-
ne
conventional OS to another).
I'm not saying any of this to try to dissuade you from doing what you
want to do. I'm just offering another perspective and suggesting that,
depending your goals, this might not be necessary.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
ht
s/detaches
block devices").
You can read more about creating and using a USB qube here:
https://www.qubes-os.org/doc/usb/#tocAnchor-1-1-2
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXaDqaAAoJENtN07w5UDAwh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-20 18:05, Franz wrote:
> On Mon, Jun 20, 2016 at 1:51 PM, Andrew David Wong
> <a...@qubes-os.org> wrote:
>
> On 2016-06-19 08:40, Franz wrote:
>>>> On Sun, Jun 19, 2016 at 11:40 AM, Andrew David Wong
timate goal is always to improve the security of our users.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXYtFpAAoJENtN07w5UDAwCSwP+gLR+kzKzf6viFEitXPEoPuf
0GO2MdaXp1xBLCWsPaKsCZ12brsPQJ8h
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-06-23 13:02, Jimmy Axenhus wrote:
> Den 2016-06-16 kl. 19:23, skrev Andrew David Wong: On 2016-06-15
> 09:33, Jimmy Axenhus wrote:
>>>> Den 2016-06-15 kl. 11:14, skrev Andrew David Wong:
>>>>> On 2016-06-15
nless you change it in the
>> template.
>>
>> In my previous message, I mentioned you could download the
>> packages in an appvm then transfer them to the template vm for
>> installation. Another possible solution is to create a Standalone
>> appvm: It wi
sometimes if I don't shutdown
> all the appvms first. Try that and see if you still get the
> issue.
>
FWIW, we're tracking this here:
https://github.com/QubesOS/qubes-issues/issues/1581
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-o
ed...
>
Thanks. Tracking here:
https://github.com/QubesOS/qubes-issues/issues/1623
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXcYCNAAoJENtN07w5UDAwi4gQAJBc8st6HVpmZDAaU2J9AXK5
A0uUmtxv4
t
> ambiguous. I initially tried adding those params to the end of
> the "kernel" lines, but they had no effect. You actually need to
> add the params on 2 separate new lines (1 line per param), at the
> end of each section that includes a kernel line. (I.e. all
> sec
ny
USB devices anyone manages to plug in to the ports of the controller
left in dom0.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXb/jdAAoJENtN07w5UDAw3+wP/jnNHPCpgNNZ95RYCv9DdtEi
iudXEhAPhrWowy+RqoLbA
e suggestion. Tracking it here:
https://github.com/QubesOS/qubes-issues/issues/2116
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXb/9tAAoJENtN07w5UDAwK5gQAMbIGYJK0iMBm60oYCAQoS/c
W0H7UvBrqyt18ugoyXdfr/WQljeWKARfc
ult options.
(As I'm guessing you've discovered, attempting to install it in an
AppVM with the default options doesn't allow it to persist across
reboots since it tries to install parts of itself to the read-only
root filesystem.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
htt
quot;banking" VM each time before I log in to my bank's
website. (In practice, my "banking" VM is usually already off, so I
just start it up, and it just automatically inherits the
freshly-updated TemplateVM's root filesystem.)
- --
Andrew David Wong (Axon)
Community Manage
o that exactly? Please,
> help. My card support this, because on windows this work fine. I
> thied do add null_sink than two loopbacks... But I can not connect
> "line in" as output source.
>
> Thanks
>
Small suggestion: check your settings in Kmix and try different
con
1 - 100 of 1543 matches
Mail list logo