The docs on template reinstallation indicate that QSB 050 means it is
not safe to automatically reinstall templates:
https://www.qubes-os.org/doc/reinstall-template/
However QSB 050 suggests that patches were pushed out some time ago:
https://www.qubes-os.org/news/2019/07/24/qsb-050/
Indeed
On Fri, Sep 06, 2019 at 09:00:00AM +, Patrick Schleizer wrote:
panina:
On 8/9/19 9:05 AM, Patrick Schleizer wrote:
panina:
Namely, they removed NoScript from the toolbar, so that the
NoScript cannot be used as intended.
We did not. Decision by upstream, The Tor Project.
I start working on a project with some untrusted data in a DispVM.
Then I decide the project is bigger or going to take longer than anticipated
and I need to keep the DispVM around, so I don't lose my work prematurely.
Is there a way to turn currently-running DispVM instance into a regular
On Fri, Sep 27, 2019 at 01:37:06PM +, Claudia wrote:
Isolating apps in the same VM is a different issue, but you're saying
traffic from different VMs is appearing to come from the same address?
Hmm, that definitely should not be happening. VM isolation is enabled
out of the box. Different
On Wed, Sep 25, 2019 at 11:32:20PM +, 'awokd' via qubes-users wrote:
Sven Semmler:
On 9/25/19 5:26 PM, 'Jackie' via qubes-users wrote:
even different applications within the same vm, will use different tor circuits.
I know this is true of apps that come with whonix-ws, but is it the
On Thu, Sep 26, 2019 at 10:09:04AM -0500, Sven Semmler wrote:
My understanding is that TOR actually runs in the gateway and the the workstation(s) enable typical Qubes style compartmentalization. Meaning that if app-anon-1 is compromised, the sys-whonix and a potential app-anon-2 are not. When I
On Mon, Sep 30, 2019 at 08:05:44AM +, Claudia wrote:
Glad to hear it's working. I guess I should have asked at the
beginning... What brought you to the conclusion they were using the
same circuits? I assumed you were using check.torproject.org or
another "what is my IP" site, but if
On Mon, Sep 30, 2019 at 04:34:58PM +0200, tetrahedra via qubes-users wrote:
I am trying to duplicate a previously-successful configuration of a
Debian based ProxyVM/'provides network' VM.
However with the new VM (call it proxy2) the client VMs are
unable to reach the proxy (ping returns
On Mon, Sep 30, 2019 at 04:15:26PM +, Claudia wrote:
To make sure IsolateClientAddr is working (as opposed to
IsolateSOCKSAuth), you can run
curl.anondist-orig https://check.torproject.org
in two different whonix-ws VMs at the same time, and make sure they
output different addresses. You
On Sun, Sep 29, 2019 at 02:42:29PM +, Claudia wrote:
You can try viewing your active tor settings in Nyx (preinstalled in
Whonix) rather than from torrc directly. Just in case some setting is
being overridden or something like that. See
https://www.whonix.org/wiki/Tor_Controller and
I am trying to duplicate a previously-successful configuration of a
Debian based ProxyVM/'provides network' VM.
However with the new VM (call it proxy2) the client VMs are
unable to reach the proxy (ping returns 'Destination Host Unreachable').
The proxy2 VM only shows two network interfaces in
Is there any way to automatically do stream isolation on a per-VM basis?
For example:
I start AppVM "A", with networking via Whonix, and interact with the
internet as "Alice"
I start AppVM "B", with networking via Whonix, and interact with the
internet as "Bob"
Naturally I want Alice to
On Sun, Sep 22, 2019 at 02:51:00PM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
Is there any way to automatically do stream isolation on a per-VM basis?
Right now it appears this is not necessarily the case -- the network
traffic of AppVMs A and B may end up using
On Fri, Nov 01, 2019 at 06:36:20PM -0400, 'Micah Lee' via qubes-users wrote:
In case anyone is interested, I just wrote a blog post about how I
configure Mullvad in Qubes, using NetworkManager, a script to
auto-connect, and the Qubes firewall.
On Thu, Oct 31, 2019 at 11:47:31AM +, Claudia wrote:
There is also the possibility of a physical attacker booting their
own OS that pretends to be your FDE lock prompt as a way to steal
your passphrase.
This all depends on the scenario. Specifically, it assumes an evil
maid attack, where
On Thu, Nov 21, 2019 at 10:04:59AM -0500, Steve Coleman wrote:
However, I am stuck on how to determine how many days it has actually
been since the last backup.
What you are looking for is this command:
qvm-prefs --get $vm backup_timestamp
Perfect, thank you!
--
You received this message
On Mon, Nov 25, 2019 at 03:20:16AM +0100, tetrahedra via qubes-users wrote:
After creating an AppVM, I experimented with making it (the basis of) a
disposable VM, but then un-did the settings and went back to using it as
a regular AppVM.
Unfortunately it's still showing up in the applications
On Tue, Nov 26, 2019 at 05:26:54AM +0100, tetrahedra via qubes-users wrote:
I've created a script and user-mode anacrontab to automatically remind
the user if it's been more than N days since the last backup.
Are the qubes-community-docs the best place to document this, or is
there a better
On Thu, Nov 28, 2019 at 09:13:22AM -0800, hoff8h...@gmail.com wrote:
I'm just running through some ideas. Something every hour is a little much,
but I would like to take a screenshot of the whole window after a script is
run. Still the same question.
It's not quite capturing screenshots, but
see the corresponding issue:
https://github.com/QubesOS/qubes-issues/issues/5508
The tldr is that ever since I upgraded to fedora-30, sys-net has started
dying intermittently (or less intermittently, nearly every time) I put
my laptop to sleep.
This is really problematic.
I am wondering if it
On Thu, Dec 12, 2019 at 05:23:47PM +, Mike Keehan wrote:
Qubes won't help in this situation - see
https://www.qubes-os.org/doc/disposablevm/#disposablevms-and-local-forensics
They recommend using Tails for this type of situation.
Mike.
I am getting very many duplicate copies of Mike's
On Wed, Dec 11, 2019 at 11:46:04AM +, 'awokd' via qubes-users wrote:
This should work, but make sure sys-firewall is shutdown before
attempting to change. If it still isn't, try changing with qvm-prefs
sys-firewall.
Ok, I didn't realize sys-firewall had to be shutdown. Most of the time
you
On Fri, Dec 13, 2019 at 08:59:16AM +0100, David Hobach wrote:
I am getting very many duplicate copies of Mike's emails, but only of
emails from Mike. Is this happening to anyone else?
Probably because he clicked "reply all" on one of your questions like
I just did.
No, when that happens (as
On Fri, Nov 01, 2019 at 07:38:53AM +0100, tetrahedra via qubes-users wrote:
The original scenario is that the user shuts the laptop lid knowing that
an adversary is about to take control of the machine. In this case, an
evil maid attack is not really an issue... by the time the user gets
On Sun, Oct 20, 2019 at 01:28:29PM +0900, Jin-oh Kang wrote:
I'll submit the correction PR when I get to have some free time for it. I
apologize for not having made this clear. Meanwhile if you'd like to do it
instead -- since you're also the author of the article -- then I'd
appreciate it ;)
Expected behavior:
choosing "Disposable: whonix-ws-15 dvm" | Xfce Terminal from the
applications menu opens a terminal window in a new DispVM
Actual behavior:
terminal opens in the whonix-ws-15-dvm template (equivalent to qvm-run
-a)
did I miss something somewhere, or is this a bug?
--
You
Dom0 device notifications (same style as when attaching a USB stick)
keep popping up, along the lines of:
/tmp/sanity-squashfs-290* (deleted) is available
/tmp/sanity-squashfs-290* (deleted) is removed
As far as I know there is no update process running in the background.
journalctl in dom0
From Ratliff's "The Mastermind":
"...they were told to close the computer immediately. The TrueCrypt
software would be activated as soon as the laptop lid was shut."
While most Qubes users are probably not interested in starting global
criminal empires, this specific idea seems useful enough.
On Thu, Oct 17, 2019 at 01:24:00PM -0700, Jin-oh Kang wrote:
The escape sequence crippling is caused by
https://github.com/QubesOS/qubes-vmm-xen/blob/xen-4.8/patch-tools-xenconsole-replace-ESC-char-on-xenconsole-outp.patch
, which is reasonable given the Qubes security model.
For interactive
On Thu, Oct 17, 2019 at 01:06:24PM -0700, Jin-oh Kang wrote:
This is what I see from your output:
https://asciinema.org/a/2sMvgiISVELkjTxAjDlfoNP5Z
That's really cool!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
On Thu, Oct 17, 2019 at 04:58:00AM +, 'awokd' via qubes-users wrote:
In Qube Settings, is the kernel set to None? If not, it boots from a
kernel provided by Qubes anyways so you don't need grub in that case. It
might be a good idea to qvm-copy out anything you need while you still
can, in
As a result of some issues in a standaloneVM (debian-9), I ended up
using the Xen hypervisor serial console to migrade to debian-9-testing --
part way.
Sadly the hypervisor console does NOT support curses-style modal dialog
boxes, and the process of updating GRUB involves navigating one of
After creating an AppVM, I experimented with making it (the basis of) a
disposable VM, but then un-did the settings and went back to using it as
a regular AppVM.
Unfortunately it's still showing up in the applications launcher menu as
a Disposable VM, and the menu items no longer work for
On Thu, Nov 21, 2019 at 04:12:25AM +0100, tetrahedra via qubes-users wrote:
The built-in Qubes backup functionality is great but it's very easy to
forget to run a backup and end up going days (or weeks, or months...)
without it.
MacOS has a handy feature where it will remind you if it has been
On Tue, Nov 26, 2019 at 01:05:08PM -0800, Lambda wrote:
Lenovo's 2019 laptop is currently on sale and their CPU selection[1]
includes:
- i7-9750H: no vPro, No Out-of-Band Systems Management
- i7-9850H: vPro, Intel ME Disabled
[--]
I'm aware that for AEM support I would need to have ME and
DispVMs shut down automatically when the launched application closes.
Is it possible to enable this for certain applications in certain AppVMs
as well?
For example I may not want my "resource-heavy-apps-vm" to keep running
after MemoryHungryApp closes, because that ties up half my system RAM.
On Fri, Nov 29, 2019 at 11:03:49AM +, lik...@gmx.de wrote:
On 2019-11-27 12:52, tetrahedra via qubes-users wrote:
DispVMs shut down automatically when the launched application closes.
Is it possible to enable this for certain applications in certain AppVMs
as well?
For example I may
On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote:
Please note that no user action is required regarding the OS version in
dom0. For details, please see our Note on dom0 and EOL. [6]
There have been a lot of dom0 updates recently. Is this related to EOL?
--
You received this
By default Qubes comes with two templates for AppVMs: a Debian template
and a Fedora one.
But many people seem to clone templates, so they also have an e.g
"fedora-minimal" template or a "-multimedia" one or any number of other
variations.
Why not just have "one template to rule them all" for
On Wed, Nov 27, 2019 at 08:16:28AM -0500, Steve Coleman wrote:
You can try this trick when starting your app/vm:
dom0> qvm-run -a AppVM "resource-heavy-app;shutdown -h now"
When the application closes the next command in line is the shutdown
command, and the VM will simply exit. As long as
If I have a NetVM, called my-vpn-vm, that provides network to my-app-vm,
my-vpn-vm will automatically start when I launch an application from
my-app-vm.
However, when my-app-vm shuts down, my-vpn-vm will stay running.
Is there any way to:
a) automatically shut down a NetVM when there are no
The built-in Qubes backup functionality is great but it's very easy to
forget to run a backup and end up going days (or weeks, or months...)
without it.
MacOS has a handy feature where it will remind you if it has been more
than 10 days since your last backup.
This would be great to have in
When copying from AppVM to AppVM, tabs and/or spaces often get mangled
(additional tabs/spaces inserted).
For example, if I have a block of text in one AppVM that looks like:
def my_function():
msg = "foo"
othermsg = "bar"
print(msg + othermsg)
When I Ctrl-C (or Ctrl-Insert) and
On Tue, Oct 08, 2019 at 08:26:34PM -0500, Andrew David Wong wrote:
Are you, by any chance, copying into Vi/Vim? That sort of thing happens
when you have "smart indentation" (or similar) enabled in Vim.
Ah, yes, that would explain it. Thanks!
--
You received this message because you are
After the latest round of updates I have started seeing some odd
behavior: VMs will only start once per system boot. This is rather a
problem (it makes Qubes much less usable!), should I also add it to the
Github tracker?
Further details: After a VM has been shut down, when I try to start it
Common scenario:
1) create new appVM
2) open terminal
3) "oh no, the color scheme and font and terminal settings are all wrong"
4) spend some time clicking around in menus fixing it
Is there a way to create a template-wide default gnome-terminal profile?
(The terminal profile that I set in the
On Fri, Oct 11, 2019 at 05:44:26PM +0200, tetrahedra via qubes-users wrote:
After the latest round of updates I have started seeing some odd
behavior: VMs will only start once per system boot. This is rather a
problem (it makes Qubes much less usable!), should I also add it to the
Github tracker
On Sun, Oct 13, 2019 at 01:39:42PM +0100, unman wrote:
The settings are stored in .config/dconf
Configure the template.
Copy .config/dconf to /etc/skel in the template.
Now every new appVM you create will inherit your configuration.
Perfect, just what I wanted.
Added an issue to get this put
I haven't been able to find any documentation for what network
interfaces sys-net is expected to expose internally. If I want to create
my own sys-net from scratch, how does Xen/Qubes send network traffic to
sys-net, to be sent onwards to my NIC?
--
You received this message because you are
On Thu, Dec 05, 2019 at 03:05:42PM +, Claudia wrote:
I am wondering if it would make sense to re-create sys-net from scratch.
Could it be that this is something from fedora-29 that is not working
well with fedora-30?
Did you keep the fedora 29 template installed? If so, I think you
could
On Tue, Feb 11, 2020 at 06:53:58PM -0600, Sven Semmler wrote:
mutt in a no-netvm mua-vault?
with fetchmail-vms feeding it through qubesrpc-procmail?
and separate vms for qubesrpc-msmtp for sending?
or msmtp-vms mixed with the fetchmail-vms based on credentials-overlap?
but, yes. not really a
On Tue, Mar 03, 2020 at 11:17:53AM +, qubenix wrote:
That's true, but using a pruned bitcoind will limit its usefulness as a
backend for other software (eg. electrum servers, block explorers). You
may be able to use it for a specific purpose (eg. joinmarket), but the
point of my guides is
On Tue, Mar 03, 2020 at 09:18:54AM -0500, Chris Laprise wrote:
Assuming nothing's terribly wrong, it may be worth posting your public
key fingerprint used for code signing somewhere!
The B281C952 key is a subkey of F07F1886; Import both and the former
will be listed under the latter.
Ok,
On Thu, Mar 05, 2020 at 03:33:54AM -0800, A wrote:
When installing Qubes OS, it’s possible to choose between some predetermined
key combinations for changing the keyboard layout.
Why not also make it possible for the user to make his or her own key
combination for changing the keyboard layout
On Sun, Feb 16, 2020 at 10:50:55AM -0500, Chris Laprise wrote:
If the process seems too complicated, you can try my VPN support tool,
which automates most of the steps (you would download the config files
from the second link to use with this):
https://github.com/tasket/Qubes-vpn-support
--
Current best solution for running bitcoind on an AppVM:
Download the binaries, run bitcoind as `user`
Disadvantages:
- bitcoind runs as the main VM user, no isolation
- no automatic updates of bitcoind
- no systemd service file, have to hack something together with
`rc.local` to get bitcoind
On Mon, Feb 17, 2020 at 10:03:26AM +0100, dhorf-hfref.4a288...@hashmail.org
wrote:
On Mon, Feb 17, 2020 at 08:59:18AM +, tetrahedra via qubes-users wrote:
like only debian's `apt-search` will search the binary names, fedora's
`dnf search` appears not to.
dnf whatprovides sshd
Did
On Mon, Feb 17, 2020 at 09:28:37AM +0100, dhorf-hfref.4a288...@hashmail.org
wrote:
How do I set up an SSH server on my AppVM?
i deviate from the regular "how to do portforwards with qubes" for
this and have a qubes-rpc service that basicly just does
"exec sudo sshd -i" in the target vms, then
On Thu, Feb 27, 2020 at 03:18:30PM +, tetrahedra via qubes-users wrote:
Current best solution for running bitcoind on an AppVM:
Download the binaries, run bitcoind as `user`
For future reference, the current Bitcoin-on-Qubes howtos appear to be
here:
https://github.com/qubenix/qubes
On Sat, Jan 25, 2020 at 05:35:20AM +0100, tetrahedra via qubes-users wrote:
On Thu, Jan 23, 2020 at 02:22:20PM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
Following the directions here:
https://www.qubes-os.org/doc/disposablevm-customization/#create-the-sys-usb
On Sun, Jan 26, 2020 at 08:11:45AM +0100, tetrahedra via qubes-users wrote:
The original error ("unable to reset PCI device...") still occurs when
trying to start disp-sys-usb.
The error is now also happening when I try to start sys-usb!
I was able to get disp-sys-usb start (w
On Mon, Jan 27, 2020 at 02:18:42AM +0100, tetrahedra via qubes-users wrote:
On Sun, Jan 26, 2020 at 08:11:45AM +0100, tetrahedra via qubes-users wrote:
The original error ("unable to reset PCI device...") still occurs when
trying to start disp-sys-usb.
The error is now also happen
On Mon, Jan 27, 2020 at 11:37:01AM +, unman wrote:
I run named disposable sys-usbs, from a usb template. In my experience
it is *not* necessary to pass the reset option on each boot. The option
is set once and applies on every boot.
(On one x230 I have a separate print usb, and just switch
I could just create the cache directory, but there's probably something
more fundamentally wrong:
$ sudo qubes-dom0-update
--> Running transaction check
---> Package anaconda-core.x86_64 1000:25.20.9-17.fc25 will be installed
---> Package anaconda-gui.x86_64 1000:25.20.9-17.fc25 will be
On Thu, Jan 23, 2020 at 02:22:20PM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
Following the directions here:
https://www.qubes-os.org/doc/disposablevm-customization/#create-the-sys-usb-disposablevm
In step 5, did you include the option?
I used the Qube Manager GUI
On Thu, Jan 23, 2020 at 02:30:52PM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
A few times people have observed that Fedora's package signing leaves a
few things to be desired. While Qubes' security model doesn't depend on
Fedora entirely, a compromised template
On Tue, Jan 28, 2020 at 12:22:00PM +, unman wrote:
Now *that* confusion is cleared up, I assume your problem has gone away?
Yes (so far).
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
On Tue, Jan 28, 2020 at 10:59:00PM +, 'Andrey Arapov' via qubes-users wrote:
Hi tetrahedra,
The original error ("unable to reset PCI device...") still occurs when trying
to start disp-sys-usb.
Despite have the "no-strict-reset" set to True, you will continue to see the "Unable to reset
On Tue, Jan 28, 2020 at 11:52:56PM +, 'Andrey Arapov' via qubes-users wrote:
Hum, I have just realized that you have also noticed one more error:
libxl_pci.c: libxl__device_pci_reset: The kernel doesn't support reset from
sysfs for PCI device :00:14.0
It looks like this error is
On Sat, Feb 01, 2020 at 11:07:20AM +0100, David Hobach wrote:
find: '/var/lib/qubes/dom0-updates/var/cache': No such file or directory
Qubes OS Repository for Dom0
18 MB/s | 32 kB 00:00
This has been happening for a while, it seems like
On Sun, Feb 09, 2020 at 03:37:45PM +, unman wrote:
Any other suggestions of fixes, upgrades, or tests to make?
Replace Intel wifi with Atheros.
What's the benefit of the Atheros chip over Intel?
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
I need to set up a reverse SSH tunnel -- where a remote machine, behind a
firewall, connects to my local machine, running sshd.
The documentation for exposing a VM port to the outside world is clear
enough.
But sshd doesn't appear to be installed on any template, nor does it
appear to be
On Mon, Feb 17, 2020 at 08:16:32AM +, tetrahedra via qubes-users wrote:
I need to set up a reverse SSH tunnel -- where a remote machine, behind a
firewall, connects to my local machine, running sshd.
The documentation for exposing a VM port to the outside world is clear
enough.
But sshd
When I create a HVM VM, by default I have the console window of the VM
open all the time when it is running.
Sys-net is HVM by default but there is no console window.
How do I set this up for other HVM VMs?
--
You received this message because you are subscribed to the Google Groups
On Sun, Jan 12, 2020 at 12:31:15AM -0800, alex.bari...@gmail.com wrote:
The following settings work for me:
1. Set "debug" to "False" in qvm-prefs
2. Set "gui" to "False" and "gui-emulated" to "False"
The only problem is qubes (or xen) keeps cashed info on whether to show
emulated console.
On Wed, Jan 15, 2020 at 11:22:12PM +, Claudia wrote:
When I try to start another VM which has been set to use the new-sys-net VM as
its NetVM, the
startup times out and I get the error "libxenlight has
failed to create new domain NEWVM"...
/var/log/xen/console/guest-NEWSYSNET-dm.log
On Fri, Jan 17, 2020 at 05:40:50PM +0100, r.wiesb...@web.de wrote:
Hey,
Is there a way to open a bunch of files in the same dispVM ? Yes, I can
copy/move those files and open them in the dispVM, that is what I do
right now - but it would be nice if there was a simpler way to do so.
I agree,
On Tue, Jan 14, 2020 at 04:46:16PM +0100, David Hobach wrote:
You'll find the explanations in the respective iptables and/or
nftables rules of the next hop networking VM.
What do you mean by "next hop networking VM"?
--
You received this message because you are subscribed to the Google Groups
Following the directions here:
https://www.qubes-os.org/doc/disposablevm-customization/#create-the-sys-usb-disposablevm
I already had a sys-usb VM so did not need to hide USB controllers from
dom0.
After finishing with the given steps, I run `qvm-start disp-sys-usb` and
get the error:
```
$
A few times people have observed that Fedora's package signing leaves a
few things to be desired. While Qubes' security model doesn't depend on
Fedora entirely, a compromised template compromises the machine -- and
package repos are a good way to compromise a template.
Why does Qubes still seem
I have a HVM VM that I'm trying to set up as a new sys-net.
However, when I boot it, Xen / Qubes doesn't seem to recognize that the domain
has finished starting.
The Qubes menu at the top right shows the red circling progress logo, even
though the domain has booted already.
When I try to
(originally sent to qubes-devel, but I guess failed moderation)
I can't quite tell from the source code -- when / where / how does it
run? Is it used to change routing on sys-net, or is it used to set
routing in other VMs so they work with sys-net?
How does DNS forwarding work? (the Qubes
On Fri, Jan 03, 2020 at 01:58:06AM +0100, tetrahedra via qubes-users wrote:
is it possible?
I tried using `sudo virsh edit MYVM` to add `single` / `init=/bin/bash`
(for fedora & debian, respectively) to the kernel
but the settings would not validate, and after I selected
"ignore&
(subject line is incorrect, should be "mounting on a different VM")
On Fri, Jan 03, 2020 at 02:47:00AM +0100, tetrahedra via qubes-users wrote:
I have a VM that's having serious problems. Is there any way to mount
the VM's private storage (/rw/*) on a different VM, in order to recove
On Fri, Jan 03, 2020 at 01:25:36AM +, 'awokd' via qubes-users wrote:
Unfortunately there is still the problem that the VM is killed after 60
seconds because Qubes can't connect to the qrexec agent... anyone know
how to disable this?
Try qvm-prefs with qrexec_timeout. 0 might disable, or
I have a VM that's having serious problems. Is there any way to mount
the VM's private storage (/rw/*) on a different VM, in order to recover
the data?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
From back in the 3.2 era:
https://www.qubes-os.org/news/2017/04/26/qubes-compromise-recovery/
$ qvm-backup-restore --paranoid-mode
On my 4.0 install this option does not appear. Is it no longer
considered necessary?
--
You received this message because you are subscribed to the Google Groups
is it possible?
I tried using `sudo virsh edit MYVM` to add `single` / `init=/bin/bash`
(for fedora & debian, respectively) to the kernel
but the settings would not validate, and after I selected
"ignore" to force it, the machine still did not boot into single-user
mode.
--
You received this
On Fri, Jan 03, 2020 at 02:48:15AM +0100, tetrahedra via qubes-users wrote:
(subject line is incorrect, should be "mounting on a different VM")
On Fri, Jan 03, 2020 at 02:47:00AM +0100, tetrahedra via qubes-users wrote:
I have a VM that's having serious problems. Is there any wa
On Mon, Dec 30, 2019 at 05:31:58PM -0500, Steve Coleman wrote:
I have had graphics slowdown issues in the past on two occasions
that acted like this, so here are some things to try:
1) Add the 'nopat' argument to the 'kernel opts:' boot command line.
> qvm-prefs -s kernelopts nopat
I just
On Sun, Dec 29, 2019 at 01:44:28PM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
On Fri, Dec 27, 2019 at 09:57:16AM +0100, tetrahedra via qubes-users wrote:
Unfortunately I need to get work done so have to reboot to "just make it
go away" but I am still
On Thu, Dec 26, 2019 at 11:47:37AM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
I haven't been able to find any documentation for what network
interfaces sys-net is expected to expose internally. If I want to create
my own sys-net from scratch, how does Xen/Qubes send
Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to
slow down simultaneously. Rebooting fixes the situation. Running `sudo
journalctl -f` in dom0 doesn't show anything unusual. What would you
suggest as a next step towards locating the problem?
--
You received this message
On Thu, Dec 26, 2019 at 11:47:37AM +, 'awokd' via qubes-users wrote:
There's a brief discussion at https://www.qubes-os.org/doc/networking/,
but there may be more detailed notes in the source code for Qubes' VM
networking components. Qubes uses Xen's networking, so that might be the
best
On Sun, Dec 29, 2019 at 10:56:31AM +0100, xao wrote:
Hi!
Sorry for the bad question structure, don't know how to write it properly.
I've seen some examples of how people setup their system and the most paranoid
ones create separate standalone vm for each application and firewall that
allows
On Sun, Dec 29, 2019 at 01:44:28PM +, 'awokd' via qubes-users wrote:
tetrahedra via qubes-users:
On Fri, Dec 27, 2019 at 09:57:16AM +0100, tetrahedra via qubes-users wrote:
Unfortunately I need to get work done so have to reboot to "just make it
go away" but I am still
On Fri, Dec 27, 2019 at 08:46:35AM +, 'awokd' via qubes-users wrote:
What responsibilties does sys-net have in terms of forwarding DNS? The
documentation specifies how things work for AppVMs, and it says there is
no DNS server in the "network driver domain" (sys-net), but it does not
say
On Fri, Dec 27, 2019 at 08:33:10AM +0100, tetrahedra via qubes-users wrote:
Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to
slow down simultaneously. Rebooting fixes the situation. Running `sudo
journalctl -f` in dom0 doesn't show anything unusual. What would you
suggest
On Fri, Dec 27, 2019 at 08:49:02AM +, 'awokd' via qubes-users wrote:
Further inspection shows there's a LOT of disk I/O going on.
after installing iotop in dom0, this appears to be coming from command
[NN.xvda-0], presumably one of the VMs. How do I map the NN (number) to
a given running
On Fri, Dec 27, 2019 at 09:05:52AM +0100, tetrahedra via qubes-users wrote:
On Fri, Dec 27, 2019 at 08:33:10AM +0100, tetrahedra via qubes-users wrote:
Periodically all graphics-heavy apps (Firefox, ...) in all VMs seem to
slow down simultaneously. Rebooting fixes the situation. Running `sudo
1 - 100 of 136 matches
Mail list logo