pied the files in place or linked them? (linked files may
throw this error on enable but will start)
Did you try strace? With what result?
If you post an example we could try to duplicate the error.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-user
On Tue, Jun 07, 2016 at 02:32:33AM +0100, Unman wrote:
> On Sun, Jun 05, 2016 at 03:36:22PM +, Patrick Schleizer wrote:
> > Unman:
> > > On Sat, Jun 04, 2016 at 01:17:03PM +, Patrick Schleizer wrote:
> > >> Using Debian templates? Then I don't think anyone on
On Sun, Jun 12, 2016 at 07:05:06AM -0700, David Nogueira wrote:
> Hey,
>
> Actually having the same issue on a fedora23 template AppVM, tried
> debugging as suggest by unman but still not luck.
>
> And then I chmoded +x rc.local and it started working.
>
> Best,
>
&
le problems hiding in plain sight.
>
You've obviously had a frustrating experience. To help others from
suffering from the same mistake why not amend the user guide
yourself? It's quite simple to do and others would find it very helpful.
unman
--
You received this message because you are subscri
On Thu, Jun 09, 2016 at 06:53:27PM +0200, Achim Patzner wrote:
> Hi!
>
>
> Has anybody had success getting a Ubuntu template compiled? Even at 16.04?
>
>
>
> Achim
>
If you mean "at all", then some months back I built a 14.04. Haven't
tried anything
, even when attached to the same netvm
No devices are, or have been, attached to that qube. The applet appeared
the first time that qube booted.
When other qubes start I see a tremor in the toolbar, as if the applet
is going to appear and then does not. With this one, it stays.
Now I just kil
ffic to the local
network open the firewall tool from Manager, and then set:
Deny network access.
Add rule allowing traffic to 192.168.0.xxx. (You can either allow all
traffic or restrict to the ports that you use on the local network.)
unman
--
You received this message because you are subscri
On Thu, Jun 16, 2016 at 01:01:27PM +, Patrick Schleizer wrote:
> Unman:
> > On Sat, Jun 04, 2016 at 01:17:03PM +, Patrick Schleizer wrote:
> >> Using Debian templates? Then I don't think anyone on the internet
> >> explained yet how to do that or there might be
On Fri, Jun 17, 2016 at 09:33:47PM +0200, Marek Marczykowski-Górecki wrote:
> On Fri, Jun 17, 2016 at 09:29:19PM +0200, Achim Patzner wrote:
> > Am 10.06.2016 um 23:30 schrieb Unman:
> >
> > >> Has anybody had success getting a Ubuntu template compiled? Even at
>
any more complicated than what I've stated.
>
> Regards
> Ben
>
>
> On Thursday, 24 September 2015 07:15:42 UTC+10, Jason M wrote:
> >
> > On 22 September 2015 at 21:19, Unman <un...@thirdeyesecurity.org
> > > wrote:
> >
> >> On Tue, Sep
On Mon, Jun 13, 2016 at 12:49:46PM +, 7v5w7go9ub0o wrote:
>
>
> On 06/13/2016 01:15 AM, jonprice...@gmail.com wrote:
> > On Monday, June 13, 2016 at 11:10:12 AM UTC+12, Unman wrote:
> >> On Sun, Jun 12, 2016 at 03:43:06PM -0700, jonprice...@gmail.com wrote:
>
On Sun, Jun 12, 2016 at 06:20:14PM -0700, Drew White wrote:
> Unman,
>
> That code is just what I have int hat NetVM.
> As I said, rund fine running from CLI, but not on boot.
> Does not make sense when it works fine on Fedora 20, 21 & 23 (normal and
> minimal [ if s
and the Tor
gateway, and sniff the traffic there.
You could use a crafted tcpdump filter to some effect, but you wont just
get a record of websites, but all requests, so you will have to do some
post processing on the file to identify the websites. Not difficult, but
probably wont be exactly what you wa
/rc.local
>
>
> If I start the rc.local with sudo sh /etc/rc.local using the terminal on my
> ProxyVM, it's working.
>
> So, why my rc.local does not start automatically on my ProxyVM ?
>
> Thanks for your help.
>
Hello.
Do you see any errors re the VPN service?
On Sat, Aug 13, 2016 at 03:22:16AM -0700, kotot...@gmail.com wrote:
> Hi,
>
> I'm trying to setup a VPN connection with PPTP from sys-net (first tried with
> the ProxyVM but it also didn't work) without success.
>
> Any help is welcome, here below the logs.
> I also tried
>
> $ sudo modprobe
On Sat, Jun 18, 2016 at 12:39:00AM +0200, Marek Marczykowski-Górecki wrote:
> On Fri, Jun 17, 2016 at 11:23:42PM +0100, Unman wrote:
> > On Fri, Jun 17, 2016 at 09:33:47PM +0200, Marek Marczykowski-Górecki wrote:
> > > On Fri, Jun 17, 2016 at 09:29:19PM +0200, Achim Patzner
On Wed, Feb 01, 2017 at 10:57:27AM -0800, '01v3g4n10' via qubes-users wrote:
> On Wednesday, February 1, 2017 at 12:08:38 PM UTC-6, qubes-user-000 wrote:
> > On Tuesday, January 31, 2017 at 11:57:48 AM UTC-5, 01v3g4n10 wrote:
> > > On Tuesday, January 31, 2017 at 9:36:03 AM UTC-6,
> > >
On Mon, Jan 30, 2017 at 11:00:41AM -0800, Andrew M wrote:
> Thanks Unman,
>
> This bug is currently affecting my work so it would be greatly
> appreciated if it were resolved :)
>
>
> On 01/29/2017 06:38 PM, Unman wrote:
> > On Sat, Jan 28, 2017 at 12:31:38PM +,
On Wed, Feb 01, 2017 at 10:27:05AM +, goi...@hushmail.com wrote:
> I have seen the adapter divers supports only linux kernel up to 3.10,
> my qubes kernel is 3.19. Can do anything?
> On 1/31/2017 at 11:37 PM, "Unman" wrote:On Tue, Jan 31, 2017 at
> 05:33:33PM +, goi
On Mon, Jan 30, 2017 at 11:36:37AM -0800, Jane Jok wrote:
> On Monday, January 30, 2017 at 10:25:48 PM UTC+3, Garrett Robinson wrote:
> > On 01/30/2017 11:21 AM, Jane Jok wrote:
> >
> > > I know that Qubes security model doesn't rely on users system for
> > > security, but combined with
On Mon, Feb 06, 2017 at 04:31:31PM -0800, Grzesiek Chodzicki wrote:
> After running qvm-clone somevm somevm2 somevm2 does not appear on the VM list
> in Qubes VM manager. somevm2 does appear in the XFCE applications menu.
> Restarting Qubes VM Manager does not resolve the issue, however
mmand in another vm, but
look at the warning in the policy file. You could qvm-copy your analysis
tool in to target, qvm-run the tool remotely then extract the result.
A better route would be to use qrexec service, tailored to the task
you want to perform. Look at www.qubes-os.org/doc/qrexec3/
There h
On Wed, Feb 08, 2017 at 01:42:44PM -0800, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-02-07 06:35, m...@lamarciana.com wrote:
> > Hi,
> >
> > I installed chromium browser in a debian-8 based standalone VM called
> > 'work'. If I run, from dom0:
> >
On Sun, Feb 05, 2017 at 04:38:09AM -0800, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-02-04 12:59, Unman wrote:
> > On Sat, Feb 04, 2017 at 07:02:57PM +0100, john.david.r.smith
> > wrote:
> >> On 04/02/17 18:42,
On Sun, Feb 05, 2017 at 08:21:52AM -0800, Strak8 wrote:
> Hello guys,
> after the qubes-manager update to 3.2.7-1 I get an error that prevents me
> from access to configure the VM's. I tried to do a downgrade of the package
> at 3.2.6-1 but it tells me that I have the first version and can not
ime isn't noticeably different from starting up a
new dispVM, and voila - multiple template disposable VMs on the cheap.
I do this without any apparent ill effects, but it certainly isn't part
of the canon.
unman
--
You received this message because you are subscribed to the Google Groups
On Sat, Feb 04, 2017 at 06:46:53PM +, Nick Darren wrote:
>
>
> On 02/04/2017 05:12 AM, anoa wrote:
> > On 02/03/2017 08:41 AM, Unman wrote:
> >> On Fri, Feb 03, 2017 at 06:21:15AM +, Nick Darren wrote:
> >>>
> >>> On 02/02/2017 12:07 AM, U
On Fri, Feb 03, 2017 at 06:21:15AM +, Nick Darren wrote:
>
>
> On 02/02/2017 12:07 AM, Unman wrote:
> > On Mon, Jan 30, 2017 at 11:00:41AM -0800, Andrew M wrote:
> >> Thanks Unman,
> >>
> >> This bug is currently affecting my work so it would be gr
M.
What you could try is to set the networking by hand (or script it) using
xen tools.
To attach qube1, set the netVM to none, and then try using xl:
something like
"xl network-attach qube1 script=/etc/xen/scripts/vif-route-qubes
backend=HVM" should do it.
You'll have to configure the interfaces by
number of IP addresses.
Don't allow ICMP or DNS traffic.
If I remember, the original VPN thread included folk who had real
opposition to this method, but it would work fine. It just adds another
Qubes networking layer in to the mix.
You are, of course, using a standard port for DNS, so there
ay after reallocating the controller to new qube)
The adapter should show up in sys-net and you can use it from there.
Look in a terminal in sys-net to see what's happening, but if you have
right drivers it should work.
unman
--
You received this message because you are subscribed to the Google
On Sun, Jan 22, 2017 at 07:18:13PM +0100, qube...@tutanota.com wrote:
> Qubes 3.2
> Have created new AppVM and within "firewall rules" restricted access using
> "deny access" to all websites [by leaving it blank] or just a single
> website. Bizarrely however,the firewall lets all traffic thro'
On Sun, Jan 22, 2017 at 02:59:48AM -0800, FWM wrote:
> >From my experience, This auto check for updates doesnt seem to work properly.
>
> The default templates definitely get checked for updates, but the cloned
> templates never seem to. If i manually click the "Update VM system" on a
> cloned
On Sun, Jan 22, 2017 at 02:39:21AM -0800, FWM wrote:
> Wickr is a secure messaging app https://wickr.com/security#encryption
>
> First to get Wickr to work on the whonix-ws i had to install the following
> packages;
>
> libavutil52_9.18-0ubuntu0.14.04.1_amd64.deb
>
On Sun, Jan 29, 2017 at 04:01:51AM -0800, trul...@gmail.com wrote:
> Hello guys,
> Could you please help with following questions:
> HVM uses a lot of resources, is there any reason to use it on a notebook?
> I'm only using integrated templates based on Debian and Arch Linux, and I
> create
On Sun, Jan 29, 2017 at 01:41:00PM +, Joonas Lehtonen wrote:
>
>
> cezg...@gmail.com:
> > My guess is lack of time and funding. Qubes definitely could need
> > better funding. The Qubes team are doing a great job, but they might
> > be limited on what they can manage to get done because
like to know if any missing qubes packaged that's
> not listed on my side shown like above? You can just check your qubes
> packages to confirm if any difference spotted on your side by apt search
> qubes or dpkg-query -l | grep qubes.//Any help will be appreciated to
> spot where the cu
On Wed, Jan 25, 2017 at 09:11:06PM +0100, Sae wrote:
> Forwarded Message ---
>
> Subject: Re: [qubes-users] Spoofing MAC
> Date: Wed, 25 Jan 2017 20:52:35 +0100
> From: Sae
> To: pl1...@sigaint.org
>
>
>
> On 25/01/2017 20:34,
d you are short of time the you can simply
switch back to the original template. If it works OK, then carry on using
the updated template.
HTH
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
then you could mount private.img
somewhere and bind mount that in to the chroot /home before chrooting in.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-us
On Sun, Feb 19, 2017 at 11:11:24AM -0500, '.' via qubes-users wrote:
> I want to use Debian9 for music and before I played music on kind of. I was
> trying to mount my fileserver on a Debvm and unman helped my find that I
> needd cifs-util so I installd it now
> I can not see Debianv
On Mon, Feb 20, 2017 at 03:25:38PM -0500, taii...@gmx.com wrote:
> I am using fedora 24 template vm, how can I fix this?
> The internet is filled with plenty of "resolved" questions about that error
> but no actual help.
>
Are you updating over Tor? If so this is absolutely standard - you just
e dom0 panel. I don't think this can be easily
done.
You can, of course, open a xfce-panel and run the applet in that, but
this wont be locked to the dom0 panel, and will be a freefloating
window.
An alternative would be to choose a monitor that uses the system tray
because Qubes will automatically
On Fri, Feb 17, 2017 at 02:26:18AM -0800, dumbcyber wrote:
> I've installed Cryptomator in my Fedora-24 template vm and tested it - works
> fine. The install also installed some dependencies.
>
> When I try to run the software in any Fedora-24 appvm's I get nothing. No
> errors, no GUI
On Sat, Feb 18, 2017 at 12:14:52AM +0100, u+q...@bestemt.no wrote:
> hawk...@bitmessage.ch [2017-02-17 22:10 +0100]:
> > You could add a new "launcher" button to the XFCE panel, and for it's
> > execute command, follow this example for the tor browser (under section:
> >
On Fri, Feb 17, 2017 at 10:09:15PM +0100, evo wrote:
> hello!
>
> i have just copied the jameica folder from my debian, but i can not
> start ./jameica.sh ... permission denied come.
>
> have somebody experience in banking on qubes with a banking software
> jameica?
>
> thanks!
>
You dont say
file or
disable the service. If you do make sure that you aren't starting any
other qubes that rely on sys-net. (That would include your clockVM.)
That way at least your Qubes will start up and then you can start the
individual qubes.
If you cant boot at all, you should be able to boot from
map, and so
your use case may enable you to use a much more straightforward set up
than that described in the docs.
You say you'll be trying it with a googlemail account, and you should be
able to find MANY guides online to configuring mutt to work with gmail,
without struggling with postfix and
htforward. What was the issue?
I have a yakkety build but haven't bothered to put it up. I'll put in a
Zesty when it's released in April.
For anyone wanting a Trusty build, there are PRs in the pipeline for
this, which make it as easy as the Xenial. I'll see if I can push them through.
unman
On Fri, Feb 24, 2017 at 06:11:56PM -0500, Oleg Artemiev wrote:
> How do I disable autostart of sys-net, sys-firewall? Qubes manager
> setting seem to be ignored.
> Qubes r3.2
>
> --
> Bye.Olli.
This same question was asked yesterday and has been asked before.
There are open issues, but there's
On Sat, Feb 25, 2017 at 07:35:15PM +, Unman wrote:
> On Fri, Feb 24, 2017 at 06:11:56PM -0500, Oleg Artemiev wrote:
> > How do I disable autostart of sys-net, sys-firewall? Qubes manager
> > setting seem to be ignored.
> > Qubes r3.2
> >
> > --
> &g
On Thu, Feb 23, 2017 at 03:09:20AM -0800, Jarle Thorsen wrote:
> Unman:
> > Jarle - there are a few things you could do. One of them would be to
> > distribute a static route using your DHCP server - implementing
> > a classless static route if your server supports it would b
On Wed, Feb 22, 2017 at 10:25:10PM -0800, Tim W wrote:
> On Wednesday, February 22, 2017 at 2:47:16 PM UTC-5, pix...@mail2tor.com
> wrote:
> > Hello group,
> >
> > I'm (somewhat proudly) running Qubes OS on my Thinkpad and new to this
> > group.
> > Installation was straight foreward, thanks to
On Thu, Feb 23, 2017 at 03:40:44AM +, hassan karam wrote:
> Hello
>
> I am Mr. Hassan Karam, from Syria due to brutal civil war in my country, I am
> seeking your
> partnership in going into a private investment venture. I am interested in
> investing in your
> country, so I will like us to
On Wed, Feb 22, 2017 at 08:55:23PM -0800, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-02-17 16:54, Unman wrote:
> > On Sat, Feb 18, 2017 at 12:14:52AM +0100, u+q...@bestemt.no wrote:
> >> hawk...@bitmessage.ch <hawk...@bi
On Fri, Feb 17, 2017 at 06:01:14PM -0800, Manuel Amador (Rudd-O) wrote:
> Qubes-network-server takes care of this for you.
>
> On February 14, 2017 2:02:18 AM PST, Jarle Thorsen <jarlethor...@gmail.com>
> wrote:
> >> Unman:
> >> Thank you, it seems like usi
ou have cifs-utils installed .)
Then "mount -v -t cifs //server/mount mountpoint -o user=nobody" should
work and provide useful information.
You could equally well put this in to .bashrc rather than in a
Template, or add an entry to /etc/fstab using the mechanism in
/rw/config/rc.
On Sat, Feb 11, 2017 at 09:59:36AM -0800, m...@lamarciana.com wrote:
> > Yes, I know - that's why I said "using bash".
> > You are using zsh, so you said, so you need to put the path in ~/.zprofile
> >
> > For example, with simple script 'logit' in home/user/newpath:
> >
> > qvm-run -a -p qube
On Sat, Feb 11, 2017 at 01:38:15PM -0800, trul...@gmail.com wrote:
> Thankx to all for the answers. It what i can do (some logs)
>
>
> [user@test qubes-builder]$ sudo make vmm-xen-vm
> Currently installed dependencies:
> git-2.5.5-1.fc23.x86_64
> rpmdevtools-8.9-1.fc23.noarch
>
places to look are:
"iptables -L -nv" to ensure that you have an INPUT rule allowing traffic
to the tinyproxy.
And "systemctl status qubes-updates-proxy" to see what the status of
tinyproxy is.
Look at those outputs and you may be able to see the problem.
unman
--
Yo
On Sun, Feb 12, 2017 at 01:48:36PM +, Holger Levsen wrote:
> On Fri, Feb 03, 2017 at 04:44:14PM +0000, Unman wrote:
> > echo xterm |/usr/lib/qubes/qfile-daemon-dvm qubes.VMShell dom0 DEFAULT red
> >
> > will open term in new dispVM
> >
> > I have this as keyb
On Mon, Feb 13, 2017 at 04:53:24PM -0800, Gaiko wrote:
> I installed the fedora24 template using
>
> sudo qubes-dom0-update qubes-template-fedora-24
>
> Then changed all put then went to global settings, changed the default
> template, then went into the vm manager and changed the default
On Mon, Feb 13, 2017 at 10:59:14PM +, Unman wrote:
> On Mon, Feb 13, 2017 at 12:00:40PM -0800, Dominique St-Pierre Boucher wrote:
> > Hello,
> >
> > I have the exact same issue!!! Tinyproxy does not seems to work correctly
> > and I never worked with TinyProxy b
On Mon, Feb 13, 2017 at 05:10:28AM -0800, ThierryIT wrote:
> Hi,
>
> Thx a lot for these information.
>
> I have installed dnssec-trigger on a newly created VM from a debian template
> as ProxyVM type. This is working, I have checked for the DNSSEC and all are
> ok.
>
> In the same way, I
On Sun, Feb 12, 2017 at 01:27:30AM -0800, m...@lamarciana.com wrote:
> > try this:
> > qvm-run -a -p qube "echo $0"
>
> It returns `bash`
>
> > and:
> > qvm-run -a -p qube "ps aux"
>
> It includes a `/bin/bash /usr/bin/qubes-session`
>
> > You may be surprised.
>
> Also, `echo $SHELL`
On Sun, Feb 12, 2017 at 09:56:43AM -0800, elsiebuck...@gmail.com wrote:
> I'm still stuck here... anyone?
>
You really haven't given enough information for anyone to help you.
I'm going to assume that you are using a default install of Qubes: your
sys-usb is based on Fedora-23, and the qube you
make it easy to work within the Qubes system. I'm not sure what
Windows version is supported.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+
On Sun, Feb 12, 2017 at 08:01:23AM -0800, qubesnewbi...@gmail.com wrote:
> Another update:
>
> After pilfering a spare AMD Radeon 5850 video card from one of my other
> computers and installing it into the new system, I was able to install Qubes
> 3.2 successfully. I saw some video anomalies
On Fri, Feb 10, 2017 at 01:46:02AM -0800, trul...@gmail.com wrote:
> четверг, 9 февраля 2017 г., 14:41:42 UTC+3 пользователь Unman написал:
> > On Thu, Feb 09, 2017 at 02:37:36AM -0800, damien.wa...@gmail.com wrote:
> > > Hi,
> > >
> > > I am new into
On Fri, Feb 10, 2017 at 10:04:54AM -0800, damien.wa...@gmail.com wrote:
> Le jeudi 9 février 2017 12:41:42 UTC+1, Unman a écrit :
> > On Thu, Feb 09, 2017 at 02:37:36AM -0800, wrote:
> > > Hi,
> > >
> > > I am new into qubes (few months) and find it great. B
re you can always set the path explicitly:
> > qvm-run -p qube "export PATH=$PATH: && foo"
>
> Hey Unman. The issue is that neither `~/.bashrc` nor `/etc/bash.bashrc` from
> my VM are used when I do `qvm-run` from dom0. Your workaround works but I
> think it
On Fri, Feb 10, 2017 at 04:10:06AM -0800, Joe Ruether wrote:
> On Thursday, February 9, 2017 at 10:21:26 AM UTC-5, Unman wrote:
> > On Thu, Feb 09, 2017 at 04:32:12AM -0800, Joe Ruether wrote:
> > > Hello!
> > >
> > > I am trying to set up a prox
On Tue, Feb 14, 2017 at 12:03:01PM -0800, codeur4l...@gmail.com wrote:
> I really need to know how install software.
> It is obscure to me and qubes documentation don't gave me the solution.
> Nobody have idee ?
>
What is it that you do not understand? The page you reference provides
absolutely
On Tue, Feb 14, 2017 at 01:19:17PM -0800, codeur4l...@gmail.com wrote:
> Yes, this is what I try to do.
> I have download the .rpm file from my personal VM, then I have copy this file
> into the fedora template. The problem is I don't know where is this file now
> because in the fedora template
be a matter of:
git clone https://github.com/QubesOS/qubes-builder
cd qubes-builder
./setup
make qubes-vm
make template
Copy generated Template to dom0 and install - there's a handy script
provided to do this for you.
I'll let you know when the PRs are merged. Focus at the moment is on
the GSOC app
Perhaps you knew this? Perhaps not. You should ensure that you
made this change - if your updateVM is NOT running through Tor then
updates will always file. If it IS then they will fail some of the time
- that seems to be inevitable using Tor.
If you really do want to revert then you dont need to
On Thu, Feb 09, 2017 at 06:03:26AM -0800, Pablo Di Noto wrote:
> Hello,
>
> Running 3.2 with XFCE.
>
> My notebook has a small SSD with Qubes boot and root/swap on it, and a larger
> (and slower) SHDD mounted as /var/lib/qubes-add and configured as an
> additional Xen pool.
>
> I am running
ly, you need to consider the effects of the qubes-firewall and
qubes-netwatcher services.
If you want to retain these you can use
/rw/config/qubes-firewall-user-script to override the automatic Qubes
configuration and insert your own iptables rules.
You can also use rc.local to set initial iptabl
On Thu, Feb 09, 2017 at 04:08:54AM -0800, m...@lamarciana.com wrote:
> > Is chromium the only program with which you experience this problem?
>
> Thanks for your answer Andrew.
>
> Thanks to a private reply I got, I have been seen that the problem is related
> with my `PATH`. I have installed
ld be allocated your network devices.
You should add the firmware to the Template on which the sys-net qube is
based. (Changing that to Debian-8 if you prefer.)
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
On Wed, Feb 15, 2017 at 05:35:31PM -0500, Jean-Philippe Ouellet wrote:
> Running execsnoop [1] in the AppVM while trying to start chromium may
> give you more insight into what is actually happening. Tracing
> observed behavior is often easier than digging through the source.
>
> [1]:
>
{folder}]$ xl block-attach {VMNAME} phy:/dev/sdc xvdr
>
> I had to use that.
>
> So that worked, but qvm-block doesn't.
>
> Is this a bug in qvm-block?
>
Hi Drew
Are you sure that sdc isn't already in use in dom0?
Those are the cases where I have been able to attach
On Thu, Jan 19, 2017 at 07:01:56PM -0500, Chris Laprise wrote:
> On 01/19/2017 05:46 PM, Unman wrote:
> >On Thu, Jan 19, 2017 at 10:02:38AM -0800, adonis28...@gmail.com wrote:
> >>On Thursday, January 19, 2017 at 12:22:35 PM UTC-5, Chris Laprise wrote:
> >>>On 01/18/
I wouldn't assign back to dom0.
There's no reason why you shouldn't adopt some variation on A, and have
different qubes handling different controllers. Of course, you'd have to
make sure that you follow a consistent pattern with use of sockets.
You could enforce this with configuration in the policy
boot into mint. then go to /etc/grub.d/40_custom file. in there you
> will paste everything from the qubes /boot partition. from
> /boot/grub/grub2/grub.cfg file (or something like that) the whole section
> between where it says xen. then update grub and reboot and qubes and
>
ay I believe. try this method
> from whonix instructions. https://www.whonix.org/wiki/Qubes/Install
>
> to list the parameters use qvm-prefs -l debian-8 kernelopts
>
> To change them do qvm-prefs -s debian-8 kernelopts "nopat ipv6.disable=1"
>
> Then restart
within 60 mins of the service provider.
Tails has a mechanism to set local time. Whonix has a similar mechanism,
also available in Whonix-Qubes.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
On Tue, Sep 27, 2016 at 09:15:47PM +, Jeremy Rand wrote:
> johnyju...@sigaint.org:
> >> The "listening" services are less of a concern, since the firewall
> >> wouldn't permit any incoming connections to be passed through to start
> >> with. It's the "phone home" style services, like time
at the change
has "taken" in the template, and ensure that it has stopped running
before you run qvm-create-default-dvm.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop rec
On Mon, Oct 10, 2016 at 01:25:47PM -0700, t.k.t.k.t.k.t.k.1.1@gmail.com
wrote:
> Thank you so much, this fixed it, now everything works perfectly fine,
> although I get an error "command recordfail not found
> command gfxmode not found
> press any key to continue"
> when booting into Mint.
Richard
>
Ah, ok. I submitted a PR and then we got bogged down with handling of
the Trolltech.conf. I havent returned to it since.
I'll have another look and we'll get the xenial build in there
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users&q
On Tue, Oct 25, 2016 at 11:17:44AM +0200, Robert Mittendorf wrote:
> What would be the advantage of a Ubuntu-template compared to the Debian
> template?
> (No offense, I'm just curious)
>
No offense taken.
Comparing Stable with LTS, probably not that great a difference. Perhaps
Ubuntu is slightly
On Fri, Oct 21, 2016 at 08:19:45PM -0700, nezna...@xy9ce.tk wrote:
> I installed qubes. Then i changed mac address in the "clone mac" string, but
> network does not work. On another one pc with that mac i have no problems. In
> the qubes i have. What is wrong?
>
You'll have to provide more
a complete misnomer - OR access the software source in a
qube and then copy it across to the template.
Perhaps I've misunderstood your problem. If so, apologies.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscrib
d it isn't working,
please provide a more detailed account of what you have done and what
templates you are using, and exactly what errors you see.
Sometimes it takes time to get used to a new OS, and the security
structure of Qubes adds a few extra wrinkles, but stick with it, and
everything will b
the best place. It's too early in the boot.
For user stuff like firefox you could add an entry to .profile: this
will start the program when you start the qube.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from th
gt;
> I don't quite understand what you are asking. maybe this will help.
> https://linuxcritic.wordpress.com/2010/04/07/anatomy-of-a-desktop-file/
> You can also look in your system for examples usually in /etx/xdg/autostart.
>
>
If it helps I have this in one of my qubes:
.co
On Sat, Oct 22, 2016 at 11:23:18PM +, 4ok80g+4fl8s3n7pesd8 via qubes-users
wrote:
> I assume you meant to say rc.local, as this has nothing to do with iptables
> nor the qubes-firewall-user-script.
> In any case, this suggestion in itself is a huge hammering. The sys-firewall
> shouldn't
t; the link in Marek's response). Or maybe disabling the sysVM service via
> systemctl ?
>
For future reference, I think the sys-net started because there were
OTHER qubes downstream set to autostart, e.g sys-firewall. If they are
still starting they will trigger the sys-net. So you need to
the question of "bad usability" it looks like horses for courses. I
personally don't want a warning if I've already started to clear out
space on the target. And if I'm transferring files as they are being
written, what use would the measure of free disk space be?
It isn't the TOOL here
1 - 100 of 1728 matches
Mail list logo