> So let me be blunt as this is likely the last email from me to qubes
anyway;
Bye, I'm happy to see you go away finally. It was killing me inside that
you were working on the new gui controller. Fuck off back to bcash.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You
e chip in BIOS to
no effect.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+un
Rusty Bird:
> qubenix:
>> 7. Restart, to BIOS, option for clearing tpm is gone from BIOS?!?!
>
> The option is only available on cold boot, not when you restart.
>
> Rusty
>
Thank you for the reply, Rusty. That was the problem for clearing tpm in
BIOS, but that didn&
ace condition of
two VMs trying to start same proxy vm for example).
It seems others were having these issues before the upgrade, and since I
haven't noticed any complaints. My experience was the opposite. I had no
issues previous to this upgrade.
Please let me know any other info/logs that may
Wondering if the list has seen this yet:
https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html
PoC on Qubes 3.2.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-
com/QubesOS/qubes-issues/issues/938#issuecomment-292843628
>
>
Nice. I was just thinking about this after spending some time on my
routers interface. Thanks for the post!
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to
qubenix:
> Andrew David Wong:
>> On 2017-04-09 15:25, Joonas Lehtonen wrote:
>>> Hi,
>>
>>> if you setup MAC randomization via network manager in a debian 9
>>> template as described here:
>>> https://www.qubes-os.org/doc/anonymizing-your-mac-add
Unman:
> On Tue, Apr 11, 2017 at 06:20:38AM -0700, Dominique St-Pierre Boucher wrote:
>> On Monday, April 10, 2017 at 5:06:30 PM UTC-4, qubenix wrote:
>>> qubenix:
>>>> Andrew David Wong:
>>>>> On 2017-04-09 15:25, Joonas Lehtonen wrote:
>>>&
cooloutac:
> On Wednesday, April 12, 2017 at 10:55:08 AM UTC-4, qubenix wrote:
>> Unman:
>>> On Tue, Apr 11, 2017 at 06:20:38AM -0700, Dominique St-Pierre Boucher wrote:
>>>> On Monday, April 10, 2017 at 5:06:30 PM UTC-4, qubenix wrote:
>>>>> qubenix:
han blank.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
Reg Tiangha:
> On 04/15/2017 01:06 PM, qubenix wrote:
>> peter...@hushmail.com:
>>> Is there a script to randomize hostname on each boot?
>>>
>> I think blank hostname is better than randomized. How would it be
>> randomized: dictionary words, rng
his page (maybe more?): http://qubesos4z6n4.onion/doc/firewall/
gets stuck in a redirection loop.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
mapper/dmroot
>
I'm also getting this error from my usb vm on startup. It has a Fedora24
template. The template is untouched from initial Qubes install, aside
from updates via qubes-vm-r3.2-current-testing repo.
For me the issue just started today for no obvious reason.
--
qubenix
GPG:
em=N82E16813132938&ignorebbr=1).
> Has anyone gotten qube os to work on this board?
>
> Has anyone gotten qube os on any z270? Any help would be really appreciated.
>
I just built a rig around z170 board. Everything is working fine so far.
I'll be doing an HCL once
carrefamilyhomes...@gmail.com:
> On Saturday, June 10, 2017 at 8:35:52 PM UTC-4, qubenix wrote:
>> carr...@gmail.com:
>>> Hi,
>>>
>>> My motherboard broke and I need to rebuild my computer. I am looking to get
>>> something that will last for
next boot applet was there.
---
Attached are the reports. Support report is encrypted to Qubes Devs:
ADW, JR, and MM.
Thank you to all devs and everyone on this list. My favorite host OS
and a very helpful community.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received th
with kswapd going crazy in a Debian vm with
intense I/O and CPU. Kswapd persisted to rock the cpu even after all the
software was done, for about 10 minutes, until I shutdown the vm. Seems
to be a rare condition though because I experience it only 1/50 times
with this vm.
--
qubenix
GPG: B536812904D455B
Chris Laprise:
> On 06/18/2017 10:01 AM, qubenix wrote:
>> 'Vincent Adultman' via qubes-users:
>>> This happens to me sometimes on the current Xen/Linux versions. When I
>>> look at top in the offending VM its "kswapd" that has gone
C:\Users\IEUser\AppData\Local\Temp\Qubes_Windows_Tools_3.2.2.3_20170625181436_1_qubes_tools_WIN7x64_3.2.2.3.msi_rollback.log
[0AA0:0AA4][2017-06-25T18:17:24]i410: Variable: WixBundleTag =
[0AA0:0AA4][2017-06-25T18:17:24]i410: Variable: WixBundleVersion = 3.2.2.3
[0AA0:0AA4][2017-06-25T18:17:24]i007:
vm-run -a -p -u root sys-net "ls
/etc/NetworkManager/system-connections/"); do qvm-run -a -p -u root "cat
/etc/NetworkManager/system-connections/$i" > $i; qvm-move-to-vm
sys-net-profiles $i; done
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received
qubenix:
> wordswithn...@gmail.com:
>> I want to copy network connection profiles from sys-net to sys-net-profiles
>> as my computer shuts down.
>>
>> I'm creating a bash script in dom0 to help with this.
>>
>> I could use
>>
>> qvm-run -a
wordswithn...@gmail.com:
> On Wednesday, June 28, 2017 at 10:07:04 AM UTC-4, qubenix wrote:
>> qubenix:
>>> wordswithn...@gmail.com:
>>>> I want to copy network connection profiles from sys-net to
>>>> sys-net-profiles as my computer shuts down.
>&
rm Password Manager
kpcli - command line interface to KeePassX password manager databases
libfile-keepass-perl - interface to KeePass V1 and V2 database files
I ask because I have been using keepassx for three or four years with
only two databases. I keep multiple copies on different storage devices
and
ut needing to use a network sniffer or dumping traffic.
>
> Start at the outmost node, and work inwards. At the point where you dont
> see traffic you know the problem lies one hop upstream, (unless it
> doesn't get to the router obviously).
>
> If you see the traffic inboun
yreb-qusw:
> On 07/19/2017 05:53 AM, qubenix wrote:
>> qubester:
>>> On 07/18/2017 02:27 PM, '0brand' via qubes-users wrote:
>>>> I've been trying to resolve a problem with both of my Debian-8
>>>> vault-appvms.. For some reason my Keepass p
s for
the PulseAudio sound server
However on another Debian stretch template audio is normal. The pulse
packages there are:
$ sudo dpkg -l | grep pulse
ii gstreamer1.0-pulseaudio:amd64 1.10.4-1
amd64GStreamer plugin for PulseAudio
ii libpulse-mainloop-glib0:amd64 10.0
o use the igd for dom0 and save the gpu for passthrough.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
t
d some packages.
Strangely, my kali template (and AppVM based on it) work normal even
though it was also upgraded at the same time.
```
user@dom0:~$ qvm-run -p d9 gnome-terminal
Unable to init server: Could not connect: Connection refused
Failed to parse arguments: Cannot open display:
```
--
qubenix
Marek Marczykowski-Górecki:
> On Mon, Dec 12, 2016 at 12:17:16AM +, a.mcwh...@yandex.com wrote:
>> That means not only me has the same issue with debian-9 template. I've
>> started reinstalling template.
>
>> On December 12, 2016 11:01:00 AM AEDT, qubenix wrote
Marek Marczykowski-Górecki:
> On Mon, Dec 12, 2016 at 12:17:16AM +, a.mcwh...@yandex.com wrote:
>> That means not only me has the same issue with debian-9 template. I've
>> started reinstalling template.
>
>> On December 12, 2016 11:01:00 AM AEDT, qubenix wrote
Marek Marczykowski-Górecki:
> On Mon, Dec 12, 2016 at 05:10:00PM +0000, qubenix wrote:
>> Marek Marczykowski-Górecki:
>>> Looks like this issue:
>>> https://github.com/QubesOS/qubes-issues/issues/2514
>>>
>>> Rebuilt package just uploaded to testing re
qubenix:
> Marek Marczykowski-Górecki:
>> On Mon, Dec 12, 2016 at 05:10:00PM +, qubenix wrote:
>>> Marek Marczykowski-Górecki:
>>>> Looks like this issue:
>>>> https://github.com/QubesOS/qubes-issues/issues/2514
>>>>
>>>> R
qubenix:
> qubenix:
>> Marek Marczykowski-Górecki:
>>> On Mon, Dec 12, 2016 at 05:10:00PM +, qubenix wrote:
>>>> Marek Marczykowski-Górecki:
>>>>> Looks like this issue:
>>>>> https://github.com/QubesOS/qubes-issues/issues/2514
>
stretch xserver-xorg-core -y && apt-get dist-upgrade -y"
Restart Template and/or AppVMs based from it. That should fix things in
your TemplateVM and AppVMs.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed
l -t
stretch xserver-xorg-core -y && apt-get dist-upgrade -y"
Restart your template and see that you get display again, should fix it.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-users&quo
Boris Kourtoukov:
> On Tuesday, December 13, 2016 at 2:49:23 PM UTC-5, qubenix wrote:
>> Boris Kourtoukov:
>>> This is similar to what happened with the Whonix discussion here:
>>> https://groups.google.com/d/msg/qubes-users/IHhxklnCpYc/Wj2K5euVBAAJ
>>
Boris Kourtoukov:
> On Tuesday, December 13, 2016 at 3:11:12 PM UTC-5, qubenix wrote:
>> Boris Kourtoukov:
>>> On Tuesday, December 13, 2016 at 2:49:23 PM UTC-5, qubenix wrote:
>>>> Boris Kourtoukov:
>>>>> This is similar to what happened
J. Eppler:
> Hello @qubenix,
>
> I am interested in your Kali installation process. Did you run into any
> trouble during the installation? Did you follow the KaliVM installation
> instructions: https://www.qubes-os.org/doc/pentesting/kali/?
>
> regards
> j. Epp
g this?
Second issue is that it seems my eth0 is never randomized. Any users
with the same experience?
[1] https://www.qubes-os.org/doc/anonymizing-your-mac-address/
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google
Chris Laprise:
> On 12/15/2016 01:58 PM, Reg Tiangha wrote:
>> On 12/15/2016 11:50 AM, qubenix wrote:
>>> I've used the docs[1] to randomize my MAC on sys-net with debian-9 as
>>> it's template. At first everything was working normal, but I've noticed
>
s
>
> Bernd
>
>
>
See here for details:
https://groups.google.com/d/msgid/qubes-users/94997d39-2302-4c94-9aa1-ffee6f639bb1%40googlegroups.com
In short you need to:
- Change qubes repo to `stretch-testing`
- update and dist-upgrade your template
If you run into problems, al
s appear to be
> here:
> https://github.com/qubenix/qubes-whonix-bitcoin
>
> Comments for qubenix:
> - Some systems have limited disk space (e.g SSDs) so it may make sense
> to run a pruned node
That's true, but using a pruned bitcoind will limit its usefulness as a
back
ing besides the daemon vm.
[1]:
https://github.com/monero-project/monero/issues/4468#issuecomment-429671939
--
qubenix
CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
--
You received this
OGBaby:
> Greatly appreciate your help Qubenix.
>
> I can confirm my systemd file (/lib/systemd/system/monerod-mainnet.service)
> matches yours now. I have removed the following to do so:
>
> ConditonPathExists=/var/run/qubes-service/monerod-mainnet
> After=qubes-sysinit.
OGBaby:
> On Monday, December 10, 2018 at 5:16:01 PM UTC-6, qubenix wrote:
>> The best thing for you to do is:
>>
>> 1. Start the daemon's AppVM fresh.
>> 2. In a terminal on the daemon's vm do: `sudo tail -f
>> /home/monerod/.bitmonero/bitmonero.log`.
OGBaby:
> Thanks Qubenix,
>
> Wouldn't a fully synced daemon mean the blockchain is downloaded onto disk? I
> was under the impression a benefit to remote node over local was to entirely
> avoid downloading the blockchain.
>
> With the bootstrap-daemon address att
raw-data` should avoid the header (untested).
--
qubenix
CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
--
You received this message because you are subscribed to the Google Groups
&q
vm and the type `help`
at the prompt.
>> The infomation online is a bit scattered however I completely
understand if you'd rather point me some links or resource instead. Any
more guidance is appreciated.
>
Try here for further reading:
https://ww.getmonero.org/resources/user-guides/
rod' and the ones I found above all
> attempt to resync the blockchain. Is this normal behavior?
>
As I said, don't run the daemon from the command line. `systemd` is
handling it already.
--
qubenix
CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C
ew issue or you are out of space again (I think I remember
seeing that in one of your original mails iirc).
Either way it's not specific to your setup or to Qubes. Best to check on
Monero channels (reddit, irc, etc).
--
qubenix
CODE PGP: FE7454228594B4DDD034CE73A95D4D
eature exists in practice
> ;) Search back for the details.
>
>
I can't speak to the security risk from personal experience or
knowledge, but I found this:
https://security.stackexchange.com/questions/162122/gpu-passthrough-security/162175.
- --
qubenix
CODE
OGBaby:
> Hey Qubenix, I have an update for you and anyone curious. The MDB_BAD_TXN
> error has been resolved. For anyone wondering this error most likely mean
> your blockchain was interrupted during sync and is now corrupt.
>
> The solution advised by Monero channels i
ix-next-gen-tor-onion-services/
>
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2019/03/24/tor-onion-services-no-longer-maintained/
>
>
Wow, very sad. May I ask why so many extra resources are needed? Can't
you just ins
bi use, install their software in it, then create an AppVM based on
> it networked to sys-whonix.
>
Don't need to install in a template. Just run a release in an AppVM.
--
qubenix
CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
quot; on screen, connected with hdmi) and then right
into a restart.
How can I debug this in a useful way? Does someone have an idea what
might cause it?
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qu
cooloutac:
> On Monday, April 2, 2018 at 12:31:09 PM UTC-4, qubenix wrote:
>> Hello all. I'm currently still on R3.2.
>>
>> I had a situation where I was working with a normal (for me) amount of
>> VMs running. Nothing even close to extreme as far as cpu/mem/io/tem
xec to forward the
needed ports from your daemon. Here's a guide for doing it with monero:
https://getmonero.org/resources/user-guides/cli_wallet_daemon_isolation_qubes_whonix.html.
The same basic procedure can be used for most crypto wallets.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61
ut I haven't tried it myself.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsub
qubenix:
> pauHana:
>> After completing the to VM setups and shutting them down is the intention
>> then to start monero-wallet-ws and interact with the wallet thru this vm as
>> per the usual ./monero-wallet-cli?
>>
>
> Correct. You should be able to run the gu
gerwallet.com/hc/en-us/articles/115005165269-What-to-do-if-my-Ledger-Nano-S-is-not-recognized-on-Windows-and-or-Linux-
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubsc
, everything
works as expected. The link opens a new tab in the proper AppVM.
However, if firefox is not currently running, a clicked link will open
the link in a browser in both VMs.
Any ideas?
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
--
You received this message because you are
awokd:
> On Fri, May 11, 2018 2:56 am, qubenix wrote:
>> Hey everyone! Hope you are all doing well.
>>
>> I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/
>> so links clicked in one debian-9 AppVM will open in separate debian-9
>> AppVM. Wha
;> Qubes, see https://www.qubes-os.org/doc/tails/.
>>
>>
> technically this is a whonix question, I would suggest posting there :
>
> https://forums.whonix.org/
>
> or read their docs a bit 1st, then patrick and crew respond to most
> p
o the following keys:
Andrew - BBAF910D1BC9DDF41043629FBC211FCEE9C54C53
Joanna - 49A322D9CA0D1D7DAEFA2AC63393D8BF0DDC6718
Marek - 86BA6E93318FBA446642A90ADB8FD31CCAD7D72C
--
qubenix
PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
--
You received this message because you are subscribed to the Google G
Hello all.
I'm attempting to build a custom Qubes with one patch added to Xen. Is
it enough to simply add the patch with the others in
qubes-builder/qubes-src/vmm-xen/, add a line for it in
qubes-builder/qubes-src/vmm-xen/xen.spec.in, and then build?
--
qubeni
declined the upgrade, and switched to
`stretch-proposed-updates` repo.
Don't forget you can always use `qvm-volume` to revert your template
changes (as long as you haven't restarted the vm since breaking it)
instead of reinstalling. See `qvm-volume --help` for details.
--
qubenix
PGP
is:
curl -s https://updates.signal.org/desktop/apt/keys.asc | sudo apt-key add -
This should work as expected, I just tested it.
--
qubenix
PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
OTR: qube...@chat.freenode.net
OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
--
You received this me
(X11; Linux x86_64; rv:60.0) Gecko/20100101
> Thunderbird/60.0
> OS Linux 4.14.67-1.pvops.qubes.x86_64
>
>
>
Not sure why Enigmail is not recognizing the env var, but you could put
your gpg domain into the file /rw/config/gpg-split-domain as a
workaround. I use this method wit
obably not worth it.
3. If you want to use sys-firewall you'll have to remove the
p2p-bind-ip=127.0.0.1 from the /lib/systemd/system/monerod.service file
on the TemplateVM. You will probably also have to allow the port forward
on your home router somehow.
--
qubenix
PGP: 96096E4CA0870F1C5B
mk:
> qubenix,
>
> I thought I had to run a full node to be synced with main blockchain but I
> now understand that running a local node is enough
>
> So everything works as expected,
>
> Thanks for you answer and clarification :)
>
It's still a full nod
nerod
when using Whonix gateway or binding p2p ip to 0.0.0.0 if not using a
Whonix gateway. Next I started to experience stalls, which I still
haven't found a solution for yet.
[1] https://github.com/monero-project/monero/issues/4468
[2] https://github.com/monero-project/monero/issues/4469
--
qubenix:
> mk:
>> One last thing,
>>
>> It should be noted that I still had to remove option
>> "--p2p-bind-ip=127.0.0.1" to let monerod bind on 0.0.0.0 to make it work.
>>
>> Any security implication about this ? Does all traffic is still routed
't matter, only with systemd needs it) is
the best experience I've had with it on Whonix in years.
--
qubenix
PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
OTR: qube...@chat.freenode.net
OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
--
You received this message because you are subsc
to have addons in a browser in a dispappvm and avoid
> this issue?
>
This should help you: https://www.qubes-os.org/doc/dispvm-customization/.
--
qubenix
PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
OTR: qube...@chat.freenode.net
OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
--
Yo
> Um... no not really, that's very annoying.
>
> I checked the group and have not found anything helpful here. I don't think
> that this is a too uncommon problem? Any suggestions on how to solve it?
>
> Thanks a lot!
>
> Best regards,
> Bjoe
date was November 11th, 2009.
>
Thank you for all your contributions. Your standards for security and
best practices have been an inspiration to me.
I wish you the best of luck and success in the future.
--
qubenix
PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
OTR: qube...@chat.freenode.net
OTR:
s a
kind of basic load-balancing measure.
--
qubenix
CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
IRC OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
--
You received this message because you are subscribed to the Google Groups
"qubes-u
r version. For that you have to run
`tor --version` from the gateway.
You could also just do `cat /etc/whonix_version` from the workstation or
gateway for your Whonix version. I mention it because whonixcheck
produces output you don't need.
--
qubenix
CODE PGP: FE7454228594B4DDD
#x27;t able
to easily find your version number. Another giveaway is your Tor
version. On Whonix 14 I have Tor version 0.3.4.8.
If you want to upgrade to Whonix 14 see here:
https://www.whonix.org/wiki/Upgrading_Whonix_13_to_Whonix_14.
--
qubenix
CODE PGP: FE7454228594B4DDD03
quite
> interesting.
>
>
> Achim Patzner
>
Good response to this flawed, ignorant study:
https://twitter.com/nic__carter/status/1056976815032582144.
--
qubenix
CODE PGP: FE7454228594B4DDD034CE73A95D4D197E922B20
EMAIL PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
IRC OTR: DFD1DA35
80 matches
Mail list logo