Re: [qubes-users] VPN before sys-firewall ?
Le mardi 9 juillet 2019 23:22:23 UTC+2, Chris Laprise a écrit : > On 7/9/19 4:49 PM, Luc libaweb wrote: > > Hello, > > > > I read lot of things about VPN in Qubes OS. > > > > I have mount a standalone VM with client VPN installed. This VPN VM connect > > to the network with sys-firewall. > > > > Others VM connect them directly on this VM VPN. > > > > So, AppVM connect to Netvm Standalone VM VPN connect to Netvm Sys-Firewall > > > > It's good or not for security ? Maybe the VM VPN bypass the sys-Firewall ? > > > > In practice, you won't see any difference between these configurations > unless you have placed special rules _inside_ sys-firewall (in the > /rw/config dir): > > sys-vpn -> sys-firewall -> sys-net > > sys-firewall -> sys-vpn -> sys-net > > sys-vpn -> sys-net > > The reason is that sys-vpn uses "provides network" and is thus a proxyVM > just like sys-firewall; if you add firewall rules to your appVMs, they > should be processed the same way in either sys-firewall or sys-vpn. As a > result, sys-vpn can perform both vpn and firewall functions. If you > consider sys-vpn's role to be trusted and low-risk, then the third > example can accomplish the same thing as the first two while consuming > less memory and CPU. > > -- > > Chris Laprise, tas...@posteo.net > https://github.com/tasket > https://twitter.com/ttaskett > PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 Thanks, so, the default sys-firewall just block all ingoing traffic separatly. I think that it's better to place de sys-vpn after the sys-firewall because the configuration of the sys-vpn is just - install the client VPN and force autoconnection and autostart. If the client app VPN is compromised, it still exists the sys-firewall between at rest. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fc407776-8a46-4312-8c92-458fd01900c8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Tuesday, 9 July 2019 13:35:39 UTC, unman wrote: > On Tue, Jul 09, 2019 at 08:30:37AM -0400, Steve Coleman wrote: > > On 7/9/19 7:25 AM, wrote: > > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > > > > > > $ sudo dnf install > > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > > > > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > > running template I'm asked for a password when I try to sudo my way into > > > apt-get update. > > > > > > Does anyone know the password for 'user'? > > > > > > Thanks. > > > > > > > If you can not sudo, you can always try running your command from Dom0 as > > user root: > > > > $ qvm-run -a --user root "apt-get update" > > > > This doesnt look right: I havent used a trusty for a while, and dont > support it as its no longer LTS. > If it's the minimal template, have you installed the > qubes-core-agent-passwordless-root package? I could build it for you if > you have problems building yourself. > > unman Thanks for replying, and me thinking that 14.04 was 'stretch'. :) Whatever command I try to do as sudo, it responds the same: user@stretch-minimal:~$ sudo nano We trust blahblah [sudo] password for user: Entering the 'empty password' then gives: "Sorry, try again." Against better knowledge I also tried in dom0 [user@dom0 Desktop]$ sudo dnf install qubes-core-agent-passwordless-root but that gave a "no package qubes-core-agent-passwordless-root available. If the software package I was planning to run in the VM didn't specifically ask for 14.04 I'd have chosen a newer Ubuntu version of course. It seems coleman's suggestion works as after entering his command inside my stretch-minimal VM ps aux indicates a running qrexec-agent and 'apt-get update'. When that's finished I'll try to run another command from within dom0 that would give me root access. Such as creating a password for user 'user' and entry into wheel. Does that sound correct? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6098924a-5a5e-469f-b255-287a27835a3c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman wrote: > On 7/9/19 7:25 AM, wrote: > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > > > > $ sudo dnf install > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > running template I'm asked for a password when I try to sudo my way into > > apt-get update. > > > > Does anyone know the password for 'user'? > > > > Thanks. > > > > If you can not sudo, you can always try running your command from Dom0 > as user root: > > $ qvm-run -a --user root "apt-get update" Thanks. I not only want to update, I also want to run all other kinds of commands as sudo. Do you think I can run any command like this inside the qube from within dom0? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0829bd06-9fee-4142-9e1d-b3fb20174ced%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] are system hangs normal?
On 7/9/19 11:38 PM, acunal.hamad...@gmail.com wrote: Hello All, What I am working with Qubes 4 Current Stable (7/19) x230 with coreboot Reinstalled to a new SSD a month ago The problem -- Resolved temporarily by restarting Several times a week there are times that without warning, everything is still up on the screen and will to a limited degree work, but it is as if it were a veneer of functionality. When I try to read/write the filesystem, make terminal / dom0 commands apps will either crash or no action will come. During the shutdown screen the verbose text hangs on waiting. Ctrl Alt Del returns text informing me that it attempted to restart the machine immediately and failed. If something hasn't been saved or otherwise won't gracefully accept the table-flip of using the power button this is particularly unfortunate. Questions Thoughts on what this might be or where to look? Is there a vocabulary for this type of problem? In my experience hanging is quite rare. However, there are certain (bad) conditions that can bring it about. For example, if you mount external filesystems in dom0, and shut down the VM that supplies the backing storage for the filesystem before its un-mounted, then the system can become unresponsive in similar ways to what you reported. Its not hard to forget to cleanly un-mount a filesystem and close encryption, etc. before shutting down a storage VM. There may be a different cause to your problem, but that is what came to mind when I read your post. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d9fcb8b4-0ccc-a67e-a8dc-a366be3992fb%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] are system hangs normal?
Hello All, What I am working with Qubes 4 Current Stable (7/19) x230 with coreboot Reinstalled to a new SSD a month ago The problem -- Resolved temporarily by restarting Several times a week there are times that without warning, everything is still up on the screen and will to a limited degree work, but it is as if it were a veneer of functionality. When I try to read/write the filesystem, make terminal / dom0 commands apps will either crash or no action will come. During the shutdown screen the verbose text hangs on waiting. Ctrl Alt Del returns text informing me that it attempted to restart the machine immediately and failed. If something hasn't been saved or otherwise won't gracefully accept the table-flip of using the power button this is particularly unfortunate. Questions Thoughts on what this might be or where to look? Is there a vocabulary for this type of problem? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/12456413-0ee2-4572-9560-dd0dde835626%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes OS and Google Groups
Matthias Kolja Miehl: Hey Luc, On 07/09/2019 05:57 PM, Luc libaweb wrote: just a question, why use Google with the positioning of Qubes OS? There are so many other alternatives? Just do a search google groups to know anyone who uses/particpate to Qubes OS, contradictory no ? This is the official statement from the section "Mailing lists vs. forums" in the documentation on "Help, Support, and Mailing Lists" [1]: "[...] The Google Groups service is just free infrastructure, and we distrust the infrastructure. This is why, for example, we encourage discussants to use Split GPG to sign all of their messages to the lists, but we do not endorse the use of these Google Groups as web forums. [...] (Note: There have been many discussions about why the Qubes OS Project does not maintain an official forum. The curious can find these by searching the list archives. However, there is an unofficial forum that is synced with the mailing lists.)" Maybe that already answers some of your questions. Regards Matthias [1]: https://www.qubes-os.org/support/ I haven't tried it, but in theory you can use nabble "forums" as a web gateway. Hopefully without having to go through any SMS verification, neverending captchas, or even enabling JS. See: http://n8.nabble.com/help/Answer.jtp?id=17 http://n8.nabble.com/help/Answer.jtp?id=6 The downside is that, I assume, you can't see or reply to messages from before you registered and archived the list. If you know of any similar sites, please share. - This free account was provided by VFEmail.net - report spam to ab...@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/73afdc4c-b304-bde0-02d1-98cf70f74882%40vfemail.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: whonix workstation 15 browser dropped both noscript and https
I believe this is an upstream torbrowser decision. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fa55d915-4bdf-48f6-b78d-588da4c55d64%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: whonix workstation 15 browser dropped both noscript and https
My bad, they didn't drop them, but they removed them from the toolbar. You have to go into preferences, to add them back to the toolbar. Dumb idea they would take them off the toolbar, but that's just me I guess. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6bf216a4-e8a0-4c51-8ac9-24f47517b5b6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] whonix workstation 15 browser dropped both noscript and https
drok...@gmail.com: What are they doing over there? Really? I haven't upgraded to whonix 15 yet, and i'm really not very familiar with it, but i can't imagine that whonix would intentionally use a version of tor browser without noscript or https everywhere. Maybe you're affected by the security certificates bug that affected firefox and derivatives a while back, where extensions disappeared? Try updating tor browser to the most recent version and see if the extensions come back. Or reinstall tor browser in the template. -- Jackie -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/584e48ef-883d-21a5-240e-0e34b7022242%40danwin1210.me. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] VPN before sys-firewall ?
On 7/9/19 4:49 PM, Luc libaweb wrote: Hello, I read lot of things about VPN in Qubes OS. I have mount a standalone VM with client VPN installed. This VPN VM connect to the network with sys-firewall. Others VM connect them directly on this VM VPN. So, AppVM connect to Netvm Standalone VM VPN connect to Netvm Sys-Firewall It's good or not for security ? Maybe the VM VPN bypass the sys-Firewall ? In practice, you won't see any difference between these configurations unless you have placed special rules _inside_ sys-firewall (in the /rw/config dir): sys-vpn -> sys-firewall -> sys-net sys-firewall -> sys-vpn -> sys-net sys-vpn -> sys-net The reason is that sys-vpn uses "provides network" and is thus a proxyVM just like sys-firewall; if you add firewall rules to your appVMs, they should be processed the same way in either sys-firewall or sys-vpn. As a result, sys-vpn can perform both vpn and firewall functions. If you consider sys-vpn's role to be trusted and low-risk, then the third example can accomplish the same thing as the first two while consuming less memory and CPU. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f1080022-ac19-f1f4-65d2-2fd04f2b8fa6%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] VPN before sys-firewall ?
Hello, I read lot of things about VPN in Qubes OS. I have mount a standalone VM with client VPN installed. This VPN VM connect to the network with sys-firewall. Others VM connect them directly on this VM VPN. So, AppVM connect to Netvm Standalone VM VPN connect to Netvm Sys-Firewall It's good or not for security ? Maybe the VM VPN bypass the sys-Firewall ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/de18b1ff-59f3-4692-a30e-c2dd0941cfc9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't seem to enable full-screen mode in Standalone Windows 7 VM
No box appears in upper right corner as in other qubes. I have not been able to install Windows Tools to see if it corrects the problem, because after I start up the qube, iso appears but setup fails with error: 0x80070017 - Data Error (cyclic redundancy check). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ab2db181-6448-467e-a6e4-f25a3fb628ba%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't see to enable Full Screen mode for my Standalone Windows 7 VM?
No box appears in upper right corner as in other Qubes. I have not been able to install Windows Tools to see if it corrects the problem, because after I start up the qube, iso appears but setup fails with error: 0x80070017 - Data Error (cyclic redundancy check). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fe3f8dc5-2799-42a4-822e-5098e275bb41%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] 404 from qubes-dom0-update for https://yum.qubes.org/r25-5/current/dom0/fc25/repodata/......
> Where is that r25-5 coming from? > Have you edited your repo definitions in > /etc/yum.repos.d/qubes-dom0.repo ? It appears to originate form the "metalink" field in /etc/yum.repos.d/qubes-dom0.repo And no, I haven't (knowledgedly) tinkered with the configuration. [username@dom0 ~]$ cat /etc/yum.repos.d/qubes-dom0.repo [qubes-dom0-current] name = Qubes Dom0 Repository (updates) #baseurl = https://yum.qubes-os.org/r$releasever/current/dom0/fc25 #baseurl = http://yum.sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/r$releasever/current/dom0/fc25 metalink = https://yum.qubes-os.org/r$releasever/current/dom0/fc25/repodata/repomd.xml.metalink enabled = 1 . -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4ffdc51dac3ff7b64ea6e3cf7c65bb5ee25a0132.camel%40elof.dk. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes OS and Google Groups
Hey Luc, On 07/09/2019 05:57 PM, Luc libaweb wrote: > just a question, why use Google with the positioning of Qubes OS? There are > so many other alternatives? > > Just do a search google groups to know anyone who uses/particpate to Qubes > OS, contradictory no ? This is the official statement from the section "Mailing lists vs. forums" in the documentation on "Help, Support, and Mailing Lists" [1]: "[...] The Google Groups service is just free infrastructure, and we distrust the infrastructure. This is why, for example, we encourage discussants to use Split GPG to sign all of their messages to the lists, but we do not endorse the use of these Google Groups as web forums. [...] (Note: There have been many discussions about why the Qubes OS Project does not maintain an official forum. The curious can find these by searching the list archives. However, there is an unofficial forum that is synced with the mailing lists.)" Maybe that already answers some of your questions. Regards Matthias [1]: https://www.qubes-os.org/support/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/19fad157-628f-6270-c35a-d27f396915b1%40w3hs.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] whonix workstation 15 browser dropped both noscript and https
What are they doing over there? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8d3d8b72-535b-4072-885f-ff186c6f48f0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
Yeah if my only option is to start the qube with usb already attached, then that's fine. I would like to figure out how to do that, thanks. On Tue, Jul 9, 2019 at 11:41 AM unman wrote: > On Tue, Jul 09, 2019 at 08:25:59AM -0700, oak2...@gmail.com wrote: > > On Tuesday, July 9, 2019 at 10:37:40 AM UTC-4, unman wrote: > > > On Tue, Jul 09, 2019 at 06:56:51AM -0700, > > > > On Tuesday, July 9, 2019 at 9:04:38 AM UTC-4, unman wrote: > > > > > On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users > wrote: > > > > > > > > > > > > > > > > > > > Sorry, forgot to mention, I want the USB to show up in a > Windows 7 VM, which is a Standalone VM. > > > > > > > > > > > > > Don't know if you can attach a USB drive directly to a Win7 VM > like that. > > > > > > Think I tried it before and had problems. Have heard of people > passing > > > > > > through a USB controller and that working, but what I did > instead was > > > > > > transfer files via a LAN FTP server. Eventually I converted > nearly all my > > > > > > workflows to open-source instead, so haven't powered up the Win7 > VM in > > > > > > months. > > > > > > > > > > > > > > > > It's much easier to start the StandaloneVM with the drive attached: > > > > > qvm-start StandaloneVM --hddisk sys-usb:/dev/sda > > > > > > > > > > That seems to match your requirement exactly. > > > > > (You can, of course, pass in a single partition rather than the > whole > > > > > drive.) > > > > > > > > It says "Failed to setup loop device for /dev/sda" when I type that > in. > > > > > > > > > > What's the output of qvm-block ? > > > > Last question: Is there any way to set it up so whenever I plug a flash > drive into the USB port, it will automatically show up in windows 7 Qube? > > > > Now that's a different call - I used to use udev triggers when USB > devices were introduced, but havent looked at them for a while. > If you want to automatically start a Windnows qube with device attached > when you plug it in to sys-usb, I may be able to help tomorrow. > > Also, there's a suggestion here that you want to attch the device to a > running Windows qube - honestly, I have never succeeded in doing that, > but I dont use Windows to any real extent. Maybe someone else has done? > > -- > You received this message because you are subscribed to a topic in the > Google Groups "qubes-users" group. > To unsubscribe from this topic, visit > https://groups.google.com/d/topic/qubes-users/P2NrVXywuVw/unsubscribe. > To unsubscribe from this group and all its topics, send an email to > qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/20190709154101.eju2yvrz6ob6crq5%40thirdeyesecurity.org > . > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAF5PH%3DVgzHavJjkwVwNBan7HZoF8zZ%2BG6YL589eYjrKNzxrcaQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes OS and Google Groups
Hello, Qubes OS is the best alternative today for security and other OS than Win and Osx. Many Noobs coming and it's good for Qubes OS. just a question, why use Google with the positioning of Qubes OS? There are so many other alternatives? Just do a search google groups to know anyone who uses/particpate to Qubes OS, contradictory no ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ee066411-4e42-435e-ba33-bbf9fef6ddd3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On Tue, Jul 09, 2019 at 08:25:59AM -0700, oak2...@gmail.com wrote: > On Tuesday, July 9, 2019 at 10:37:40 AM UTC-4, unman wrote: > > On Tue, Jul 09, 2019 at 06:56:51AM -0700, > > > On Tuesday, July 9, 2019 at 9:04:38 AM UTC-4, unman wrote: > > > > On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users wrote: > > > > > > > > > > > > > > > > Sorry, forgot to mention, I want the USB to show up in a Windows 7 > > > > > > VM, which is a Standalone VM. > > > > > > > > > > > Don't know if you can attach a USB drive directly to a Win7 VM like > > > > > that. > > > > > Think I tried it before and had problems. Have heard of people passing > > > > > through a USB controller and that working, but what I did instead was > > > > > transfer files via a LAN FTP server. Eventually I converted nearly > > > > > all my > > > > > workflows to open-source instead, so haven't powered up the Win7 VM in > > > > > months. > > > > > > > > > > > > > It's much easier to start the StandaloneVM with the drive attached: > > > > qvm-start StandaloneVM --hddisk sys-usb:/dev/sda > > > > > > > > That seems to match your requirement exactly. > > > > (You can, of course, pass in a single partition rather than the whole > > > > drive.) > > > > > > It says "Failed to setup loop device for /dev/sda" when I type that in. > > > > > > > What's the output of qvm-block ? > > Last question: Is there any way to set it up so whenever I plug a flash > drive into the USB port, it will automatically show up in windows 7 Qube? > Now that's a different call - I used to use udev triggers when USB devices were introduced, but havent looked at them for a while. If you want to automatically start a Windnows qube with device attached when you plug it in to sys-usb, I may be able to help tomorrow. Also, there's a suggestion here that you want to attch the device to a running Windows qube - honestly, I have never succeeded in doing that, but I dont use Windows to any real extent. Maybe someone else has done? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709154101.eju2yvrz6ob6crq5%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On Tuesday, July 9, 2019 at 10:37:40 AM UTC-4, unman wrote: > On Tue, Jul 09, 2019 at 06:56:51AM -0700, > > On Tuesday, July 9, 2019 at 9:04:38 AM UTC-4, unman wrote: > > > On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users wrote: > > > > > > > > > > > > > Sorry, forgot to mention, I want the USB to show up in a Windows 7 > > > > > VM, which is a Standalone VM. > > > > > > > > > Don't know if you can attach a USB drive directly to a Win7 VM like > > > > that. > > > > Think I tried it before and had problems. Have heard of people passing > > > > through a USB controller and that working, but what I did instead was > > > > transfer files via a LAN FTP server. Eventually I converted nearly all > > > > my > > > > workflows to open-source instead, so haven't powered up the Win7 VM in > > > > months. > > > > > > > > > > It's much easier to start the StandaloneVM with the drive attached: > > > qvm-start StandaloneVM --hddisk sys-usb:/dev/sda > > > > > > That seems to match your requirement exactly. > > > (You can, of course, pass in a single partition rather than the whole > > > drive.) > > > > It says "Failed to setup loop device for /dev/sda" when I type that in. > > > > What's the output of qvm-block ? Last question: Is there any way to set it up so whenever I plug a flash drive into the USB port, it will automatically show up in windows 7 Qube? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/04fca911-80a5-4072-8666-1742a1402ffe%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On Tuesday, July 9, 2019 at 10:43:02 AM UTC-4, oak...@gmail.com wrote: > On Tuesday, July 9, 2019 at 9:04:38 AM UTC-4, unman wrote: > > On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users wrote: > > > > > > > > > > Sorry, forgot to mention, I want the USB to show up in a Windows 7 VM, > > > > which is a Standalone VM. > > > > > > > Don't know if you can attach a USB drive directly to a Win7 VM like that. > > > Think I tried it before and had problems. Have heard of people passing > > > through a USB controller and that working, but what I did instead was > > > transfer files via a LAN FTP server. Eventually I converted nearly all my > > > workflows to open-source instead, so haven't powered up the Win7 VM in > > > months. > > > > > > > It's much easier to start the StandaloneVM with the drive attached: > > qvm-start StandaloneVM --hddisk sys-usb:/dev/sda > > > > That seems to match your requirement exactly. > > (You can, of course, pass in a single partition rather than the whole > > drive.) > > YES, BABY - YEEGH! Ignore my last comment - it worked! drive showed up in > Windows, copied files over. Thanks for your help!...Except for some reason > it's going to take 2 hours and 45 minutes to copy 2GB of data over for some > reason, but not sure what to do about that. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/360bb693-087c-40f3-a09d-3c458e66f19c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On Tuesday, July 9, 2019 at 9:04:38 AM UTC-4, unman wrote: > On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users wrote: > > > > > > > Sorry, forgot to mention, I want the USB to show up in a Windows 7 VM, > > > which is a Standalone VM. > > > > > Don't know if you can attach a USB drive directly to a Win7 VM like that. > > Think I tried it before and had problems. Have heard of people passing > > through a USB controller and that working, but what I did instead was > > transfer files via a LAN FTP server. Eventually I converted nearly all my > > workflows to open-source instead, so haven't powered up the Win7 VM in > > months. > > > > It's much easier to start the StandaloneVM with the drive attached: > qvm-start StandaloneVM --hddisk sys-usb:/dev/sda > > That seems to match your requirement exactly. > (You can, of course, pass in a single partition rather than the whole > drive.) YES, BABY - YEEGH! Ignore my last comment - it worked! drive showed up in Windows, copied files over. Thanks for your help! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aa517779-a5f1-490c-8ded-42c4cf674e40%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On Tue, Jul 09, 2019 at 06:56:51AM -0700, oak2...@gmail.com wrote: > On Tuesday, July 9, 2019 at 9:04:38 AM UTC-4, unman wrote: > > On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users wrote: > > > > > > > > > > Sorry, forgot to mention, I want the USB to show up in a Windows 7 VM, > > > > which is a Standalone VM. > > > > > > > Don't know if you can attach a USB drive directly to a Win7 VM like that. > > > Think I tried it before and had problems. Have heard of people passing > > > through a USB controller and that working, but what I did instead was > > > transfer files via a LAN FTP server. Eventually I converted nearly all my > > > workflows to open-source instead, so haven't powered up the Win7 VM in > > > months. > > > > > > > It's much easier to start the StandaloneVM with the drive attached: > > qvm-start StandaloneVM --hddisk sys-usb:/dev/sda > > > > That seems to match your requirement exactly. > > (You can, of course, pass in a single partition rather than the whole > > drive.) > > It says "Failed to setup loop device for /dev/sda" when I type that in. > What's the output of qvm-block ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709143735.x4azjfnpyymqz6ub%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On Tuesday, July 9, 2019 at 9:04:38 AM UTC-4, unman wrote: > On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users wrote: > > > > > > > Sorry, forgot to mention, I want the USB to show up in a Windows 7 VM, > > > which is a Standalone VM. > > > > > Don't know if you can attach a USB drive directly to a Win7 VM like that. > > Think I tried it before and had problems. Have heard of people passing > > through a USB controller and that working, but what I did instead was > > transfer files via a LAN FTP server. Eventually I converted nearly all my > > workflows to open-source instead, so haven't powered up the Win7 VM in > > months. > > > > It's much easier to start the StandaloneVM with the drive attached: > qvm-start StandaloneVM --hddisk sys-usb:/dev/sda > > That seems to match your requirement exactly. > (You can, of course, pass in a single partition rather than the whole > drive.) It says "Failed to setup loop device for /dev/sda" when I type that in. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44cfb68c-a4d6-4ba7-b27d-6300b1ccf2cd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On Tue, Jul 09, 2019 at 08:30:37AM -0400, Steve Coleman wrote: > On 7/9/19 7:25 AM, list.w...@gmail.com wrote: > > Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using > > > > $ sudo dnf install > > qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm > > > > and that works 'fabelhaft' (German for 'fabulously' :), but inside the > > running template I'm asked for a password when I try to sudo my way into > > apt-get update. > > > > Does anyone know the password for 'user'? > > > > Thanks. > > > > If you can not sudo, you can always try running your command from Dom0 as > user root: > > $ qvm-run -a --user root "apt-get update" > This doesnt look right: I havent used a trusty for a while, and dont support it as its no longer LTS. If it's the minimal template, have you installed the qubes-core-agent-passwordless-root package? I could build it for you if you have problems building yourself. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709133536.atz4reae7tz2biv4%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Enable acces web template
On Tue, Jul 09, 2019 at 04:21:28AM -0700, Luc libaweb wrote: > Hello, > > When you install/adapt your template VM, it's necessary to open access to > Firewall for open connection and install softs. > > It's the best way ? Normaly a template not have never web access ? > > I'm not sur for the best way. > > Thanks > TemplateVMs should not be connected to the network. They use a proxy mechanism which allows for software installation/updating through qubes-rpc. It's explained here: https://www.qubes-os.org/doc/software-update-vm/#updates-proxy If you want to install software that isn't packaged for the OS, then you can download it in a disposableVM, and after verification, qvm-copy it into the template. Or you could use a standaloneVM or install the software locally in a TemplateBasedVM. Remember, if the template is compromised, then every qube which uses it could be compromised too. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709132930.bjmt6nhpnh4m2ou5%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] 404 from qubes-dom0-update for https://yum.qubes.org/r25-5/current/dom0/fc25/repodata/......
On Tue, Jul 09, 2019 at 09:25:57AM +0200, Kristian Elof S?rensen wrote: > Hi > > Qubes 4 > > in dom0: sudo qubes-dom0-update -v > > repo: downloading from remote: qubes-dom0-current > Qubes Dom0 Repositor [=== ] --- B/s | 0 B --:-- > ETA > Qubes Dom0 Repositor [=== ] --- B/s | 0 B --:-- > ETA > error: Status code: 404 for > https://yum.qubes-os.org/r25-5/current/dom0/fc25/repodata/repomd.xml.metalink > (https://yum.qubes-os.org/r25-5/current/dom0/fc25/repodata/repomd.xml.metalink). > > repo: downloading from remote: qubes-templates-itl > Qubes Templates repo [ === ] --- B/s | 0 B --:-- > ETA > Qubes Templates repo [ === ] --- B/s | 0 B --:-- > ETA > error: Status code: 404 for > https://yum.qubes-os.org/r25-5/templates-itl/repodata/repomd.xml.metalink > (https://yum.qubes-os.org/r25-5/templates-itl/repodata/repomd.xml.metalink). > > Looking at yum.qubes-os.org with Firefox the folder /r25-5 does not exist > > However /r4.0/current/dom0/fc25/repodata/ seems to contain the files > qubes-dom0-update is looking for > > > > How to proceed from here? > Where is that r25-5 coming from? Have you edited your repo definitions in /etc/yum.repos.d/qubes-dom0.repo ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709132223.eby3w5vsphmzuylo%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: I don't see no stinkin' jinja file
On Mon, Jul 08, 2019 at 09:03:37PM -0700, drok...@gmail.com wrote: > > > you likely/may not be able to do sudo apt-get update in the new -ws -gw > > templates until you 1st do > > > > sudo apt-get --allow-releaseinfo-change update > > THIS is what I needed. I wish we could fix it so we don't need to do this, > but for now, this works too. > > BTW the Debian-10 template has the same update problem. I got around it by > cloning Debian-9 to Debian-10 and upgraded from there. No update problems. > This isnt really a problem, but it should have been better explained. Qubes uses apt-secure in the Debian templates: one side effect of that is that IF the release info changes the user has to accept the change before the update will proceed. It's a security check, not a bug. If you use "apt update" then you are prompted to accept the change. It isnt possible to set this in a config file, so that QubesUpdater will fail until the user manually accepts the change. The solution is to use the command line update once, either by apt-get or apt, or wait until the next buster templates are built now that buster is released. Not every error is a problem, and certainly not a bug, although it often feels like that. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709131714.kpgndlrjcaoecqxv%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On Tue, Jul 09, 2019 at 02:38:24AM +, 'awokd' via qubes-users wrote: > oak2...@gmail.com: > > > Sorry, forgot to mention, I want the USB to show up in a Windows 7 VM, > > which is a Standalone VM. > > > Don't know if you can attach a USB drive directly to a Win7 VM like that. > Think I tried it before and had problems. Have heard of people passing > through a USB controller and that working, but what I did instead was > transfer files via a LAN FTP server. Eventually I converted nearly all my > workflows to open-source instead, so haven't powered up the Win7 VM in > months. > It's much easier to start the StandaloneVM with the drive attached: qvm-start StandaloneVM --hddisk sys-usb:/dev/sda That seems to match your requirement exactly. (You can, of course, pass in a single partition rather than the whole drive.) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709130435.63gwwkkeqeticjok%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Whonix 15 has been released
On Tue, Jul 09, 2019 at 03:30:07AM +, Jon deps wrote: > On 7/3/19 6:54 PM, 'awokd' via qubes-users wrote: > > Make sure > > you're on mgmt-salt-dom0-virtual-machines v4.0.16 or higher. If you are > > doing it manually, you should review everything the scripts do to make > > sure you've run the appropriate qvm-features commands, etc. Not > > following all the same steps as the Salt scripts could result in > > unexpected traffic disclosures. > > > so for the record as far as I can tell v4.0.15 is the "latest" please tell > me if it makes some difference. > > if I'm going to need to 'review salt scripts'probably time to move on > > appreciate the Qubes devs, but I sort of don't want to know what salt is and > does beyond the very basics :) > Yes, the release has not been well co-ordinated. 4.0.16 is in testing - you can install it from there by using : qubes-dom0-update --best --enablerepo=qubes-dom0-current-testing mgmt-salt-dom0-virtual-machines -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709125910.f3c56n65nhzgeagf%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
On 7/9/19 7:25 AM, list.w...@gmail.com wrote: Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using $ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm and that works 'fabelhaft' (German for 'fabulously' :), but inside the running template I'm asked for a password when I try to sudo my way into apt-get update. Does anyone know the password for 'user'? Thanks. If you can not sudo, you can always try running your command from Dom0 as user root: $ qvm-run -a --user root "apt-get update" -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2f5edfbc-0129-7d61-50c2-7060434cef85%40jhuapl.edu. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template
Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using $ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm and that works 'fabelhaft' (German for 'fabulously' :), but inside the running template I'm asked for a password when I try to sudo my way into apt-get update. Does anyone know the password for 'user'? Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2aadd939-9550-4416-b557-00703f53c878%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Enable acces web template
Hello, When you install/adapt your template VM, it's necessary to open access to Firewall for open connection and install softs. It's the best way ? Normaly a template not have never web access ? I'm not sur for the best way. Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/859c7bbe-d5cd-41e4-83d3-81fd53e28321%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Edit Dom0 conf.
Le mardi 9 juillet 2019 12:53:37 UTC+2, Mike Keehan a écrit : > Files in /etc are owned by the user 'root', so you need to use sudo > to be able to change them. > > "sudo vi /etc/. ". > > Be carefull, these files are essential for correct operation of > the system. You would be best advised to make a backup of any > file you want to edit! > > Mike. > > > Thanks, it's work. But can you delete this post because I don't publish with identity on google groupe ? I have change account. Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1a843e10-917f-49c5-92bd-067f0a49a024%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Edit Dom0 conf.
Files in /etc are owned by the user 'root', so you need to use sudo to be able to change them. "sudo vi /etc/. ". Be carefull, these files are essential for correct operation of the system. You would be best advised to make a backup of any file you want to edit! Mike. On Tue, 09 Jul 2019 08:40:09 + "'Avart Jean-Francois' via qubes-users" wrote: > > Hello, > > > > > I love Qubes OS but I'm noobs :) > > > > > I try to change de confi file Dom0 for full screen vm streaming. > > > > > I try with eidtor "VI" to change de txt, but it's "read only" and > > not possible to edit the files in the terminal. It's possible to > > install a GUI editor txt in Dom0 for edit the > > files /etc/qubes/guid.conf ? > > > Thanks > > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190709115327.44c25205.mike%40keehan.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What is the path to the usb drive in sys-usb?
On my machine I have a sys-usb for only the usb 2.0 controller and a separately set up sys-usb-3 for the usb 3.0 controller. I found the I/O performance of using qvm-usb ok for moving small amounts of data on and off the system. For heavier I/O, I ensure the sys-usb-3 VM is shut down and connect the USB 3.0 PCI device to the target VM in its Qubes Settings before starting the VM up. Effectively, that gives the VM native IO capability between the VM and the USB 3 device. That should work for a Windows VM. B -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e749a891-1e93-4e0e-95da-8a9c19db0df2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Edit Dom0 conf.
> Hello, > > I love Qubes OS but I'm noobs :) > > I try to change de confi file Dom0 for full screen vm streaming. > > I try with eidtor "VI" to change de txt, but it's "read only" and not > possible to edit the files in the terminal. It's possible to install a GUI > editor txt in Dom0 for edit the files /etc/qubes/guid.conf ? > > Thanks > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/r5-hnzhGqdCiKd-yftUoIr-Jt2uac-UF0s47cfE_-E8v8t64Bfly1ieseSJNmpK_cHNhOCUodz8wWwK-hp8pcI34h7wo403BdGnmworuBes%3D%40pm.me. For more options, visit https://groups.google.com/d/optout. publickey - jfinfo@pm.me - 0xE8618E32.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature
[qubes-users] 404 from qubes-dom0-update for https://yum.qubes.org/r25-5/current/dom0/fc25/repodata/......
Hi Qubes 4 in dom0: sudo qubes-dom0-update -v repo: downloading from remote: qubes-dom0-current Qubes Dom0 Repositor [=== ] --- B/s | 0 B --:-- ETA Qubes Dom0 Repositor [=== ] --- B/s | 0 B --:-- ETA error: Status code: 404 for https://yum.qubes-os.org/r25-5/current/dom0/fc25/repodata/repomd.xml.metalink (https://yum.qubes-os.org/r25-5/current/dom0/fc25/repodata/repomd.xml.metalink). repo: downloading from remote: qubes-templates-itl Qubes Templates repo [ === ] --- B/s | 0 B --:-- ETA Qubes Templates repo [ === ] --- B/s | 0 B --:-- ETA error: Status code: 404 for https://yum.qubes-os.org/r25-5/templates-itl/repodata/repomd.xml.metalink (https://yum.qubes-os.org/r25-5/templates-itl/repodata/repomd.xml.metalink). Looking at yum.qubes-os.org with Firefox the folder /r25-5 does not exist However /r4.0/current/dom0/fc25/repodata/ seems to contain the files qubes-dom0-update is looking for How to proceed from here? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6c39f4699b191415e3570fd666f56525883415e0.camel%40elof.dk. For more options, visit https://groups.google.com/d/optout.