mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-10-01 01:05:51 -04:00
Add Tails Troubleshooting
This commit is contained in:
parent
c533babdcb
commit
aec231de13
@ -47,36 +47,7 @@ To run Tails under Qubes:
|
||||
|
||||
7. Use Tails as normal.
|
||||
|
||||
## Usage Notes
|
||||
|
||||
### Display issues:
|
||||
**Black screen on start up.**
|
||||
|
||||
This was reported with earlier versions of Tails: The problem should now be fixed.
|
||||
If you do encounter this problem, you can try to constrain display settings by appending vga codes to the Tails boot parameters.
|
||||
(If you do not know the codes, append `vga=999`, and a helpful prompt will appear.)
|
||||
|
||||
N.B Tails 2.3 does not appear to honour the vga code.
|
||||
|
||||
**Window extends beyond the bottom of the screen.**
|
||||
|
||||
This seems to arise because Tails sizes to the height of the screen, but there is a title bar at the top of the window.
|
||||
Either remove the title bar altogether, or move the window upwards using ALT+drag.
|
||||
|
||||
### Persistent Volume
|
||||
The persistence tools will not work because Tails has not been launched from USB.
|
||||
The HVM disk(s) can be configured and mounted from within Tails to provide persistent storage.
|
||||
If you want to use an existing USB persistent volume:
|
||||
- Interrupt the Tails vm boot process with arrow-up when the grub boot menu appears.
|
||||
- In dom0 attach the USB drive containing the persistent volume to the Tails vm.
|
||||
- Continue booting Tails: Tails-greeter will detect the encrypted partition on the attached USB.
|
||||
- Unlock the persistent volume in Tails-greeter and use it as normal.
|
||||
|
||||
### Shutdown
|
||||
The Tails qube will not shut down cleanly.
|
||||
Kill it from the GUI Manager or ```qvm-kill Tails``` in Konsole.
|
||||
|
||||
### Security
|
||||
## Security
|
||||
You will probably want to implement [MAC spoofing](/doc/anonymizing-your-mac-address/).
|
||||
|
||||
There are added security concerns for Tails users when running it in a virtual machine.
|
||||
@ -84,3 +55,8 @@ If you intend to do this, you should read [the warnings](https://tails.boum.org/
|
||||
While the Qubes security model mitigates most of the risks identified, traces of the Tails session may remain on the disk.
|
||||
Live booting Tails, though less convenient, is always more secure than using it inside virtualization software or Qubes, because you don't run the added risk of the virtualization software or Host OS being compromised.
|
||||
Depending on your threat model, this might induce too much risk.
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
See the [Tails Troubleshooting guide](/doc/tails-troubleshooting/).
|
||||
|
||||
|
33
troubleshooting/tails-troubleshooting.md
Normal file
33
troubleshooting/tails-troubleshooting.md
Normal file
@ -0,0 +1,33 @@
|
||||
---
|
||||
layout: doc
|
||||
title: Tails Troubleshooting
|
||||
permalink: /doc/tails-troubleshooting/
|
||||
---
|
||||
|
||||
# Tails Troubleshooting Guide #
|
||||
|
||||
## Black screen during startup
|
||||
|
||||
This was reported with earlier versions of Tails -- the problem should now be fixed.
|
||||
If you do encounter a black screen during Tails startup, you can try to constrain display settings by appending vga codes to the Tails boot parameters.
|
||||
If you do not know the codes, append `vga=999`, and a helpful prompt will appear.
|
||||
|
||||
Note: Tails 2.3 does not appear to honour the vga code.
|
||||
|
||||
## Window extends beyond the bottom of the screen
|
||||
|
||||
This problem seems to arise because Tails sizes to the height of the screen, but there is a title bar at the top of the window.
|
||||
Either remove the title bar altogether, or move the window upwards using ALT+drag.
|
||||
|
||||
## Persistent tools do not work
|
||||
The persistence tools, such as persistent volume, may not work because Tails has not been launched from USB.
|
||||
The HVM disk(s) can be configured and mounted from within Tails to provide persistent storage.
|
||||
If you want to use an existing USB persistent volume:
|
||||
1. Interrupt the Tails vm boot process with arrow-up when the grub boot menu appears.
|
||||
2. In dom0 attach the USB drive containing the persistent volume to the Tails VM.
|
||||
3. Continue booting Tails. Tails-greeter will detect the encrypted partition on the attached USB.
|
||||
4. Unlock the persistent volume in Tails-greeter and use it as normal.
|
||||
|
||||
## Tails qube doesn't shut down cleanly
|
||||
If the Tails qube will not shut down cleanly, you can kill it from the GUI Manager or enter ```qvm-kill Tails``` in the console.
|
||||
|
Loading…
Reference in New Issue
Block a user