[qubes-users] Re: HCL - Lenovo Y50-70

2016-07-13 Thread Thia
I can't mess around with my computer right now, so I will just say what I 
remember from o while ago and hopefully that is helpful:

Try disabling UEFI boot (or at least boot the drive in legacy mode). I think I 
needed to do this for it to work properly
Boot the installer from a flash drive, not a DVD
Try with different USB ports. I have noticed weird things with USB booting, 
especially when using a hub.

I hope you can get it working. I will try 3.2 when I have time and may report 
on that.

On 14 July 2016 06:23:39 CEST, george.so...@gmail.com wrote:
>Thia:
>
>Can you list the steps that you used to accomplish this? I also have a
>Y50-70 and I get the initial splash screen, I get error messages in
>regards to the pane, and then it just hangs until I press the power
>button.
>
>Thanks,
>
>George
>
>On Friday, June 3, 2016 at 9:26:33 PM UTC-4, Thia Tosini wrote:
>> I have successfully installed Qubes on my Lenovo Y50-70
>> 
>> Working: Display, HDMI, Intel graphics, HVMs, Ethernet, Wi-Fi, USB
>mass storage, audio output, trackpad, keyboard
>> 
>> Untested: Bluetooth, Audio input, card reader, camera
>> 
>> Broken: Nvidia graphics (I have thus disabled it in the BIOS), UEFI
>booting
>> 
>> 
>> 
>> Since Qubes HiDPI support is poor and I have the 4K version of the
>laptop, I generally run:
>> 
>> xrandr --output eDP1 --scale .5x.5 --right-of HDMI1
>> 
>> which also sets up my external HDMI monitor.
>> 
>> 
>> 
>> Thia

-- 
Thia
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44C879E0-443F-4FF0-BA6D-7085E6202DD1%40thia.re.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Multi-drive computers installation

2016-07-13 Thread Drew White
On Thursday, 14 July 2016 01:09:10 UTC+10, Chris Laprise  wrote:
> On 07/12/2016 08:35 PM, Drew White wrote:
> > Has anyone been able to install Qubes on a multi-drive PC as a multi-drive 
> > PC without having all drives formed into 1 yet?
> >
> 
> Anaconda always seems to mess up when I manually setup partitions. But 
> both LVM and Btrfs will let you expand volumes into other partitions 
> after installation. The trick is to luks encrypt the partitions first, 
> preferably using the same passphrase as your initial volume. Then you 
> adjust your crypttab and update grub.conf with the new additions. The 
> downside is your kernel options line can get very very long.
> 
> Chris

Your answer has nothing to do with my question.

If you want to start another post, please do so.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f652dbc-3849-4355-bf1c-63c3657c14c1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Networking

2016-07-13 Thread Drew White
On Thursday, 14 July 2016 06:46:19 UTC+10, raah...@gmail.com  wrote:
> Is it only windows vm's that have this problem?

Perhaps you missed what I said earlier, it's both, at least in Qubes 3.1 it is.

Just put 3.2 on here, and it seems to work fine for Linux.
around 40 MBps / 320 Mbps.

So whatever the difference in 3.2 compared to 3.1, it's improved.

Not to mention, I have less resources applied to the AppVM and NetVM than I did 
in 3.1.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b693757e-94ef-4b71-93df-e1438789b7f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Lenovo Y50-70

2016-07-13 Thread george . sopko
Thia:

Can you list the steps that you used to accomplish this? I also have a Y50-70 
and I get the initial splash screen, I get error messages in regards to the 
pane, and then it just hangs until I press the power button.

Thanks,

George

On Friday, June 3, 2016 at 9:26:33 PM UTC-4, Thia Tosini wrote:
> I have successfully installed Qubes on my Lenovo Y50-70
> 
> Working: Display, HDMI, Intel graphics, HVMs, Ethernet, Wi-Fi, USB mass 
> storage, audio output, trackpad, keyboard
> 
> Untested: Bluetooth, Audio input, card reader, camera
> 
> Broken: Nvidia graphics (I have thus disabled it in the BIOS), UEFI booting
> 
> 
> 
> Since Qubes HiDPI support is poor and I have the 4K version of the laptop, I 
> generally run:
> 
> xrandr --output eDP1 --scale .5x.5 --right-of HDMI1
> 
> which also sets up my external HDMI monitor.
> 
> 
> 
> Thia

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9c273639-a1bc-4c8b-8c16-4bcdfa8c7210%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users]

2016-07-13 Thread qubenewb723
I searched and found this

https://groups.google.com/forum/#!searchin/qubes-users/how$20to$20reply$20thread/qubes-users/iFvyQ85_VD0/1GgAvAuBPQAJ

Where someone asked the same question and got a reply. I dont understand
this. Ive obviously read the link, but it doesnt say anything about
replying to threads. Can someone please explain this to me? When he says
that you can reply like you would to any other email, I have no idea what
that means. I cant reply to emails I havent received. I have signed up for
the mailing list, but I havent "received" the thread Id like to reply to.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/79bf9d93eb16f187064322f7680470dc.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Newbie-ish question about networking and firewalls

2016-07-13 Thread qubenewb723
Ive read the documentation on the Qubes website, but Ive not been able to
find an answer to this question.

When I install a "normal" linux distro, the first thing I do after the
installation is complete is to install and enable ufw. I imagine doing
this in an AppVM makes almost no sense. But what about sys-net? If I
understand it correctly, this is the only VM that, by default, is
connected directly to the outside world. Are there any reasons why one
shouldnt install ufw in sys-net? It seems pretty dangerous to not have any
firewall for sys-net.

And in case I want to do that, is it correct that I should do it by
installing ufw in the TemplateVM, and then enable it in sys-net?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/14e4889fba941023d6eb6b2a266da420.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] AppVMs not starting whenever USB channels are assigned

2016-07-13 Thread raahelps
On Wednesday, July 13, 2016 at 6:03:25 PM UTC-4, Cannon wrote:
> On 07/12/2016 11:16 PM, Andrew David Wong wrote:
> > Please see this FAQ entry:
> > 
> > https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-
> > usb-controllers-to-it-now-the-usbvm-wont-boot
> > 
> 
> 
> 
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Thanks for the link.
> Yes it is a USB 3.0 device, I wonder why it is not working with sys-usb
> after restore from backup, although it did before I deleted sys-usb?
> 
> I am trying to understand the pci_strict reset cons/pros of disabling it?
> When it states "because there will be no way to reset device state after
> VM shutdown, so the device could attack next VM to which it will be
> assigned." What does this mean? Does this mean even if untrusted device
> is unplugged, then trusted device plugged in the untrusted device could
> still affect the VM? If I disable pci_strict reset does this make dom0
> vulnerable?
> 
> Thanks
> 
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJXhrmFAAoJEAYDai9lH2mwAL0P/iPRd8dOWejYz0WQcOo6RTRT
> XWRiyY44lR1yBl7aVrRjxX1iJ9pltD3mZw/9y1WfOTDSdzF1taDqsU7dCmw5er2A
> 2B9WqbLMdjfFY8iI47Pa+8iVbBrTOSOgQU8QuqTLEdQ8A8f9n7ekvSJn+vfoY/G8
> 3VIDOBFrFhAPgwaKG+Mvc4FwAmQ1I8zSr3K95EjC/IbldDCsmkdCZqnqoXbA0ihx
> /5wX02yEeT6n4fnPnr+Ux5WsaMrx9xFNmqx5l02UPM6To2DCbxIJiJBHVS/6y4JV
> iKBvaUUQ1NzNlVBfKq5IECy4+p0ofp48U2vWvkerv5K3EA2MEzjJ/TV9LjhUPyHF
> q6ncSWPw0HHL+9A2QGsY0KlG9AGdcz42iODsLHcoJt3T39VpQngFaQ4KuD3GodGw
> 5d9M2Nrg0lNjvahAjyY7T2spgyub7VKZ/PX1IH4daJJoYlNmPAatw9c+g9Zm3BDo
> yOQapN4aL/BaLpgiy0E9tZhmaAkYMER5v8czvAwS0l+6IaeuMGKLRPpO0D1iUSMH
> T2y0ILLNNr08DwnBzzOeunlBwJathV0PZ1guzx8gLuFDEOc43c0kFQedPuN6SDkQ
> h8IOkXj77K854jbtaDxhMai9D80tB4GVweIQr0BiTmUf51YUyZFj3DLxdMoDj5oC
> WQn4TdA3VluZ6Zfy/crH
> =kKQ7
> -END PGP SIGNATURE-
 what if you delete it again,  and then use the automatic management stack per 
directions on that page.

qubesctl top.enable qvm.sys-usb
qubesctl state.highstate

I had a similar issue when trying to create a second usbvm.  It wouldn't let me 
assign device cause of xen error.   So then I just deleted both usbvms and then 
tried to recreate one manually,but i could never start it cause of the 
reset error.   So I used the above commands to recreate it again with the same 
name and then it worked again.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ceed317-de0f-45f7-8c49-df1d0769eb50%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora 24

2016-07-13 Thread Niels Kobschätzki

Hi,

is it already safe/possible to upgrade a Fedora 23-template to Fedora 24?

Niels

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87poqg28i4.fsf%40mailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 3.2-rc1, xfce4 volume control

2016-07-13 Thread raahelps
On Wednesday, July 13, 2016 at 6:27:41 PM UTC-4, Micah Lee wrote:
> On 07/13/2016 03:07 PM, Marek Marczykowski-Górecki wrote:
> > Wasn't that installed by default? It should be...
> 
> It wasn't for me. I installed xfce by installing the @xfce-desktop-qubes
> package in dom0, rather than using the installer.
> 
> > Install xfce4-volumed. It will be installed by default in next release
> > candidate.
> 
> Thanks!

did you figure out how to get your volume controls working.  I had same issue 
and installed the audio mixer from panel preferences, but haven't got the kb 
volume buttons working yet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a99ad3f4-9a4f-4338-b437-e5e4a6f6f073%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Debian minimal template?

2016-07-13 Thread Iestyn Best
I am interested to see if someone can provide a guide since there is no 
template available.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a209dccf-70c8-4d77-9d0b-fce7cd5ebd27%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Unmounting USB Devices at VM shutdown

2016-07-13 Thread Franz
On Wed, Jul 13, 2016 at 10:29 PM, Ben Wika  wrote:

> I imagine there's another thread for this but I couldn't find it.
>
> I'm curious whether the following is expected behavior...
>
> If we shutdown a VM that has a USB storage device attached, the VM still
> indicates the device being attached to the VM. But when you restart the VM,
> the device is not accessible and can no longer be disconnected.
>
> I've just had to reboot the entire system every time I forget to unmount
> drives before shutting down a VM.
>
>
The same happen if you remove the USB device without properly detaching it
first.

-
> One other thing, the gui in qubes seems to always develop 'artifacts' on
> the screen, such as horizontal lines of 'static'.


Do you see something like this:

_ _ _ _ _ _ _ _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
   _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ _ _ _ _ _  _  _ _ _ _ _ _ _ _
 _ _ _  _ _ _ _ _ _ ___ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _

All over the screen?
Best
Fran

A quick resizing of the window typically redraws the screen and removes the
> artifacts, but I'm finding myself watching a lot of VLC (in a debian
> template) with the artifacts still showing because I can't be bothered
> getting up to reach the mouse. (Using only 1 monitor and on-board video
> with no gui passthrough or anything complicated - not just vlc is affected,
> this applies to all windows in all vm types)
>
> Ben
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/c5386e6f-52f3-4ac1-b3ae-186c6fce8cc1%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCVMuv9g40SMuzqaUDmobCnQ7B6FFZ-US42DWqfxaa6nQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Unmounting USB Devices at VM shutdown

2016-07-13 Thread Ben Wika
I imagine there's another thread for this but I couldn't find it.

I'm curious whether the following is expected behavior...

If we shutdown a VM that has a USB storage device attached, the VM still 
indicates the device being attached to the VM. But when you restart the VM, the 
device is not accessible and can no longer be disconnected.

I've just had to reboot the entire system every time I forget to unmount drives 
before shutting down a VM.

-
One other thing, the gui in qubes seems to always develop 'artifacts' on the 
screen, such as horizontal lines of 'static'. A quick resizing of the window 
typically redraws the screen and removes the artifacts, but I'm finding myself 
watching a lot of VLC (in a debian template) with the artifacts still showing 
because I can't be bothered getting up to reach the mouse. (Using only 1 
monitor and on-board video with no gui passthrough or anything complicated - 
not just vlc is affected, this applies to all windows in all vm types)

Ben

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c5386e6f-52f3-4ac1-b3ae-186c6fce8cc1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Debian minimal template?

2016-07-13 Thread Ben Wika
On Tuesday, 21 June 2016 18:18:42 UTC+10, Ben Wika  wrote:
> Perhaps I'm blind but I'm not seeing any mini package list in this thread. 
> Only a discussion about who was going to post one. 
> 
> On Tuesday, 21 June 2016 10:06:50 UTC+10, Unman  wrote:On Sun, Jun 19, 2016 
> at 07:39:45PM -0700, Ben Wika wrote:
> 
> > Hi,
> 
> > 
> 
> > Not sure what's been happening on this subject since September (maybe 
> 
> > discussion has moved?) but thought I'd make a contribution. Pretty new to 
> 
> > some of this so appreciate the feedback.
> 
> > 
> 
> > If we install the base qubes template for Debian-8, and then do:
> 
> > 
> 
> >     dpkg-query -f '${binary:Package} ' -W >> ~/inst
> 
> > 
> 
> > (refer https://wiki.debian.org/ListInstalledPackages )
> 
> > 
> 
> > Then we end up with a file in the home directory that lists all installed 
> 
> > packages.
> 
> > I can use "apt-mark auto" against all these items to clear out the list, 
> 
> > but before doing the autoremove, there's obviously some that have to 
> 
> > remain. 
> 
> > 
> 
> > To not 'break' the template completely, I'm finding that qubes-gui-agent is 
> 
> > the only one that needs to be set to manual.
> 
> > But for good measure I follow it up with the following apps which I know 
> 
> > I'll be leaving in the minimal template:
> 
> >     sudo apt-get install firefox-esr lxterminal leafpad xfe
> 
> > 
> 
> > Finally we do the autoremove step and end up saving about 100MB. Not alot, 
> 
> > but I'm more focused on simply reducing the attack surface.
> 
> > 
> 
> > Having done this, all seems to work fine but I imagine some features are 
> 
> > missing behind the scenes (particularly qubes features).
> 
> > So I appreciate any further recommendations or suggestions as to why debian 
> 
> > minimal has to be any more complicated than what I've stated.
> 
> > 
> 
> > Regards
> 
> > Ben
> 
> >  
> 
> > 
> 
> > On Thursday, 24 September 2015 07:15:42 UTC+10, Jason M wrote:
> 
> > >
> 
> > > On 22 September 2015 at 21:19, Unman  
> > > > wrote:
> 
> > >
> 
> > >> On Tue, Sep 22, 2015 at 07:37:37PM +, Axon wrote:
> 
> > >> > -BEGIN PGP SIGNED MESSAGE-
> 
> > >> > Hash: SHA512
> 
> > >> >
> 
> > >> > V??t ??est??k:
> 
> > >> > > I have created something like "minimal" Debian TemplateVM by
> 
> > >> > > removing (almost) all needless things. I can share the list of
> 
> > >> > > packages (e.g. output of apt-mark showmanual) if someone is
> 
> > >> > > interested.
> 
> > >> > >
> 
> > >> > > The sparse root.img has just 1.2GiB. OK, I admit it is not as
> 
> > >> > > minimal as Fedora.
> 
> > >> > >
> 
> > >> >
> 
> > >> > To be fair, fedora-21-minimal is actually larger than that after doing
> 
> > >> > a normal yum update (without installing any new packages), and of
> 
> > >> > course it's almost always a good idea to update the software before
> 
> > >> > using the template for anything important.
> 
> > >> >
> 
> > >> > > Regards, V??t ??est??k 'v6ak'
> 
> > >> > >
> 
> > >> > > On Thursday, August 27, 2015 at 7:19:36 AM UTC+2, cprise wrote:
> 
> > >> > >>
> 
> > >> > >> On 08/26/2015 08:38 PM, nrgaway wrote:
> 
> > >> > >>> On 26 August 2015 at 16:04, Marek Marczykowski-G??recki
> 
> > >> > >>>  
> > >> > >>> > wrote:
> 
> > >> > >>>
> 
> > >> > >>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256
> 
> > >> > >>>
> 
> > >> > >>> On Wed, Aug 26, 2015 at 05:50:41PM +, Qubed One wrote:
> 
> > >> >  Hi, just curious if anyone has any plans for a
> 
> > >> >  Debian-minimal
> 
> > >> > 
> 
> > >> > >>> template
> 
> > >> >  for Qubes R3 (ITL or community-maintained)?
> 
> > >> > >>>
> 
> > >> > >>> Jason, does the minimal template flavor (which exists in
> 
> > >> > >> configuration)
> 
> > >> > >>> is usable in the current state? Could you provide short
> 
> > >> > >>> description
> 
> > >> > >> what
> 
> > >> > >>> functionality is there (like working as NetVM etc) and what
> 
> > >> > >>> requires additional packages. Something like the same for
> 
> > >> > >>> Fedora minimal:
> 
> > >> > >>> http://www.qubes-os.org/doc/Templates/FedoraMinimal/
> 
> > >> > >>>
> 
> > >> > >>> Then I could simply build and upload the package.
> 
> > >> > >>>
> 
> > >> > >>>
> 
> > >> > >>> I will document this for you.  I do not use minimal template
> 
> > >> > >>> since it's not that much smaller than the regular one so I
> 
> > >> > >>> will need to test it all out again.
> 
> > >> > >>>
> 
> > >> > >>> --
> 
> > >> > >>
> 
> > >> > >> Then it would be good to make the Debian template selections
> 
> > >> > >> similar to Fedora, with the supplied 'regular' Debian template
> 
> > >> > >> having desktop features and apps. This would allow a user
> 
> > >> > >> preferring Debian over Fedora to use their system as a desktop
> 
> > >> > >> immediately instead of going through manual steps.
> 
> > >> > >>
> 
> > >> > >>
> 
> > >> > >>
> 
> > 

Re: [qubes-users] 3.2-rc1, xfce4 volume control

2016-07-13 Thread Micah Lee
On 07/13/2016 03:07 PM, Marek Marczykowski-Górecki wrote:
> Wasn't that installed by default? It should be...

It wasn't for me. I installed xfce by installing the @xfce-desktop-qubes
package in dom0, rather than using the installer.

> Install xfce4-volumed. It will be installed by default in next release
> candidate.

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1781d433-c7a3-4615-efb1-90a654c2dbd2%40micahflee.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 3.2-rc1, xfce4 volume control

2016-07-13 Thread Micah Lee
One thing I've noticed is that there's no volume control on my panel,
and my laptop's volume up and down keys don't work to adjust the volume.

I discovered that I can adjust the volume by manually running alsamixer
in dom0. I also discovered that I can install the xfce4-mixer package,
and then run xfce4-mixer, to get a GUI granular volume control. That
package also include a mixer panel applet, which requires a bit of
configuration to work properly.

I still haven't made my volume up and down keys work.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1301705c-129f-97f1-24bd-ec9a05b66cdd%40micahflee.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Networking

2016-07-13 Thread raahelps
Is it only windows vm's that have this problem?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2ed9167-eb9f-443c-858e-2e4e87f5bdee%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL Lenovo ThinkCentre E73z

2016-07-13 Thread Gustavo Lapido Loureiro
On Tuesday, July 12, 2016 at 2:39:02 PM UTC-3, Gustavo Lapido Loureiro wrote:
> I've just installed it, updated Personal vm, opened Firefox Personal, so far 
> so good.
> 
> On first boot after installation, it didn't allowed me to choose to create a 
> USB vm, option was blocked. This didn't happened to me when I installed Qubes 
> on a Dell Inspiron N4050 laptop.
> 
> At least, it seems to comply both with HVM and IOMMU according to HCL Info 
> script.
> 
> Except for the USB issue, so far so good.
> 
> I'm planning to address the USB issue as soon as I can, when I will try to 
> manually set it up.
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> Gustavo Lapido Loureiro
> Técnico de Infraestrutura Doméstica de Computação e Redes
> Facebook: https://www.facebook.com/gll.info
> Telefone: +55 21 9-9385-0441

3.1

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/43a4c2d9-8dc0-4e52-a49b-d51e16282371%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Enigmail no longer works with Qubes split-gpg

2016-07-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-13 10:02, 431tz8+8ija10yovb66g via qubes-users wrote:
> Forgot to paste these entries:
> 
> [DEBUG] errorHandling.jsm: parseErrorOutputWith: return with c.errorMsg = 
> gpg: WARNING: The GNOME keyring manager hijacked the GnuPG agent. gpg: 
> WARNING: GnuPG will not work properly - please configure that tool to not 
> interfere with the GnuPG system! [DEBUG] execution.jsm: 
> EnigmailExecution.fixExitCode: agentType: gpg exitCode: 0 statusFlags 
> 4194304 [DEBUG] encryption.jsm: encryptMessageEnd: command execution exit 
> code: 1 [ERROR] mimeEncrypt.js: caught exception: undefined Message: 
> 'undefined' File:undefined Line:undefined Stack:   undefined
> 
> Apparently there are more users complaining about the same problem issue:
> 
> https://groups.google.com/forum/?nomobile=true#!msg/qubes-users/DQUzJ39H9Cc/Ar
m1sU3gBQAJ
>
>
> 
Issue opened:

https://github.com/QubesOS/qubes-issues/issues/2170

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=GjKw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50c3010e-a015-9f7a-494c-f4b4ea8b7189%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Suggestion: Inform users about documentation changes

2016-07-13 Thread grzegorz . chodzicki
W dniu środa, 13 lipca 2016 20:32:19 UTC+2 użytkownik Andrew David Wong napisał:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-07-13 10:32, grzegorz.chodzi...@gmail.com wrote:
> > W dniu środa, 13 lipca 2016 17:25:56 UTC+2 użytkownik Andrew David Wong
> > napisał: On 2016-07-13 08:18, Andrew David Wong wrote:
>  On 2016-07-13 06:56, grzegorz.chodzi...@gmail.com wrote:
> > It would be a nice feature if entries in the Qubes Docs showed the
> > date of the last update or a tag (preferably bright and colorful)
> > showing which of the docs were updated within the last 3 days, a
> > week, a month etc. This will prevent users from missing out on
> > useful information because it was added to an entry that has
> > already been read by users.
>  
>  
>  You can already view this easily by clicking the "View Page Source"
>  link on any documentation page. That will show you the last commit
>  (near the top of the page), and you can see the rest of the available
>  commit history by clicking the "History" button.
>  
> > 
> > You can also view all the changes to the qubes-doc repo by looking at the 
> > commit log:
> > 
> > https://github.com/QubesOS/qubes-doc/commits/master
> > 
> > 
> > 
> >>> You can already view this easily by clicking the "View Page Source"
> >>> link on any documentation page. That will show you the last commit
> >>> (near the top of the page), and you can see the rest of the available
> >>> commit history by clicking the "History" button.
> > 
> > That requires opening a specific doc entry page instead of the general Docs
> > page, and
> > 
> >> You can also view all the changes to the qubes-doc repo by looking at
> >> the commit log:
> >> 
> >> https://github.com/QubesOS/qubes-doc/commits/master
> > 
> > This solution is a little more convenient but still requires the user to
> > leave the doc page.
> > 
> 
> You should understand that the website is just one of many possible frontends
> for accessing the documentation. The qubes-doc git repo is the documentation
> "in itself." It can be accessed through qubes-os.org, github.com, and (soon),
> offline within Qubes OS, but it is independent of all of those. As a git repo,
> the ability to track and view changes is an inherent feature of the
> documentation that already necessarily exists.
> 
> Nonetheless, I'm opening an issue for your suggestion as a website 
> enhancement:
> 
> https://github.com/QubesOS/qubes-issues/issues/2169
> 
> (You actually made two separate suggestions in your OP, so I'm choosing the
> title based on the first one. Also, your subject line is actually conveying a
> different idea than the two suggestions you make. If you simply want to be
> informed about documentation changes, you can also subscribe to an RSS feed of
> the git log via GitHub.)
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJXhokqAAoJENtN07w5UDAw4TkP/1naTMFiKUADQLjvtJ2M+0Ie
> h7akO2HaCN3t5YM+p+Y2Ed7Cbd8b8WqsI3XXNkSAnN8Wo7urQI7qFJeONCxS9I72
> Aqwoe+His33uUTF0fuWWpL/cZBveUmLZTUNNZhYddWO5SE9C2AUVQO90sPK7FnZv
> JjvfdRcbWQnt3Gh8HD3hsoC9xE7QNDDtgo8qf7lSGXFXus2gsFIfhwYkrwmXYZ1R
> oAq3WuhUDircSSwl32IA8NUXyTFhJFWEvfD7nkYK9oxr5z7tB6pv4JNhkykV5WsT
> nJKVZyUpWw8+sJu66OMiyk2LpoMf4CjpRUaewq7cH9y9tId8TNn/ejbgL61PPysh
> KUD+v9HPiA0qm0IOml03XMOivNo1dtiaPU7E/MNMuaZjOe4Y2MMv+HtdOY4LE9Qi
> TSyq0EEPK4I+FQbwEdlS2j7/z0X+g2oVZYzS5BuGHd0RqhdpuDxWC5DItmbMNzUm
> wjzvA8sTyQY2V6tpT1DDTYyh+Jsk0jw8HkVqQBsgy6Vg/b7rf2+Li6KWx1PG5DGJ
> NobSRShS0fuGW2oDatEM9iv/pXCBEaILIMjcxPyhcihnVrvFimJ6Y1Y7yc0soG7m
> s2Ak3WzU1D/cYxUN3lxwFkvcOEm6+O0R5rFIT0pjmmAtwtr+1qlwZX2q7yk5qlgU
> 4K5Qu4AYGqDjyBkE886T
> =vTIP
> -END PGP SIGNATURE-

Sorry about the confusion. The subject line was meant to suggest a general idea 
while the post itself described the way such mechanism could possibly work 
based on my experiences with other docs/wikis etc. I feel that the current 
github title accurately reflects what I hope would be done.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/28e0e4d3-8951-489a-8965-920477a1c4be%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] libvirt error on 64bit but not on 32bit system. Vt-x is enabled

2016-07-13 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Jul 13, 2016 at 05:32:59PM +, Facundo Curti wrote:
> Update: I can start the machine without a disk... Only fails when I to run
> it with -cdrom= option. :/
> I'm really stuck :P

Check if the path you specify there is valid.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXhn1mAAoJENuP0xzK19csgwcH/iMNc+6LeFoHyLOhp7+fNrMz
yE9+vYZxX2vcg+OdPaF/2mIfnRcde6cXUCwMNsgz4xD+KJ1g1PAh1WUfrEX5O/aK
k4HwSztneU0IgN49gQQi6SUz6KOGivVSAStai53BK3cVUBDnNKLhsXrH1SWinJvZ
mJl8HyQsS1hJRiTTmtkydkzq+fjue8ucDitIljMKX/ABi9NsHt82Hie3H3pJb4Jq
r8xF9uWwJ5zCJnJ+fGZcLjVWaeGs1FwHD3BCq8xGVB5VtC30odjPy8HbDT7Z7n/N
uN0VLGSnbM12ltDhGDVZ7gZrzDQQX7PkMXp1sH6f0JaDc2ITfjP6Ywz5EMgzVf4=
=cUkS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160713174157.GX19103%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Suggestion: Inform users about documentation changes

2016-07-13 Thread grzegorz . chodzicki
W dniu środa, 13 lipca 2016 17:25:56 UTC+2 użytkownik Andrew David Wong napisał:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-07-13 08:18, Andrew David Wong wrote:
> > On 2016-07-13 06:56, grzegorz.chodzi...@gmail.com wrote:
> >> It would be a nice feature if entries in the Qubes Docs showed the date
> >> of the last update or a tag (preferably bright and colorful) showing
> >> which of the docs were updated within the last 3 days, a week, a month
> >> etc. This will prevent users from missing out on useful information
> >> because it was added to an entry that has already been read by users.
> > 
> > 
> > You can already view this easily by clicking the "View Page Source" link
> > on any documentation page. That will show you the last commit (near the top
> > of the page), and you can see the rest of the available commit history by 
> > clicking the "History" button.
> > 
> 
> You can also view all the changes to the qubes-doc repo by looking at the
> commit log:
> 
> https://github.com/QubesOS/qubes-doc/commits/master
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJXhl18AAoJENtN07w5UDAwhjMP/jyTcku1hZE9WbK9CB3wRpi6
> rLEF911DWpCjt3Gv4N4wWgNf1VEOrqJBiXWLxgsy4cNAcYyEt8soR3gG7CPn9jzO
> Mm/8ogqQYoSiurPvJ84N34VJTxcuJaaVmtmJEooNY6S5fqERI0FFSnPxyN9MQnC6
> n4ltDDPzhjq+kU1mX11K5+cFbhgDrZ45D0vtStopHboKr7Hi+fq5cV8nVywKdh99
> 0moo9XP2LT4MLyNqllAmVQFWPab752nffRgn0B1DjPKUe4vDl5N/Y/Iq2QxlNn8l
> b/KqXlnPA45KMvhhykJC6ipghAHoEAwKGsT3uhdHhRChGVaacfhTtuEoFPH7qx8h
> Dod7hB24Qyzzfle3OakM8Nk4vcCHIRIhirfNP+WKW4SjDismdBOTx2qkna97LvaZ
> 3dvTJTL/RLnL/IksdCosC7by4KoH8hZrAJQxlp/ggqwjTlTaz5ft9v3J6gbDF9Hj
> M3dAcyL16DGbXP2RUBrmYLV6nWKRJVceUFa1pA28hbjkEDMLV2qLDy9xb47qU3EU
> EVKKOBYKtL/C8GipAMy+gNCp06tAthMLqhWlOR6DcRzUAK6e7Dc4uOSAB7MRnDX9
> RbliL01Y8ExnYuaCZpPgy9vxD4KCJm6vDAe/+/AaCo7eezMxUiAtYlsxSw6LVl6U
> suoBvi9Xy2W+BIFF3dd+
> =AQUu
> -END PGP SIGNATURE-


> > You can already view this easily by clicking the "View Page Source" link
> > on any documentation page. That will show you the last commit (near the top
> > of the page), and you can see the rest of the available commit history by 
> > clicking the "History" button.

That requires opening a specific doc entry page instead of the general Docs 
page, and

> You can also view all the changes to the qubes-doc repo by looking at the
> commit log:
> 
> https://github.com/QubesOS/qubes-doc/commits/master

This solution is a little more convenient but still requires the user to leave 
the doc page.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a8e30ce-e30e-4998-8f4b-bbbcdb3617fd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Enigmail no longer works with Qubes split-gpg

2016-07-13 Thread 431tz8+8ija10yovb66g via qubes-users
Forgot to paste these entries:

[DEBUG] errorHandling.jsm: parseErrorOutputWith: return with c.errorMsg = gpg: 
WARNING: The GNOME keyring manager hijacked the GnuPG agent.
gpg: WARNING: GnuPG will not work properly - please configure that tool to not 
interfere with the GnuPG system!
[DEBUG] execution.jsm: EnigmailExecution.fixExitCode: agentType: gpg exitCode: 
0 statusFlags 4194304
[DEBUG] encryption.jsm: encryptMessageEnd: command execution exit code: 1
[ERROR] mimeEncrypt.js: caught exception: undefined
Message: 'undefined'
File:undefined
Line:undefined
Stack:   undefined

Apparently there are more users complaining about the same problem issue:

https://groups.google.com/forum/?nomobile=true#!msg/qubes-users/DQUzJ39H9Cc/Arm1sU3gBQAJ






Sent using GuerrillaMail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5080228ae2c6e9bd91fb5e4e59a986298973%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VPN Link Up, NetVM set to VpnVM but AppVMs still don't have net access?

2016-07-13 Thread gaikokujinkyofusho
Hi, with quite a bit of help (thanks again) I was able to setup a VpnVM and 
have it work perferctly as a NetVM for AppVMs with KDE as my desktop env. I 
then backed up (zipped) the /rw/config dir and reinstalled 3.1 with just xfce, 
recreated the VpnVM and put all the needed vpn files from the config 
dir/sub-dir in thier place. I set an AppVM to use the VpnVM as a NetVM and 
started up the VpnVM, it seems to start up fine, I get the little notification 
that the VPN is up, but I can't connect to anything. I have also tried, instead 
of using backed up config file to just recreate everything from scratch, got 
the VPN notification/confirmation that its up and running, but still couldn't 
access the net. I can access the net when using the firewall as the netvm 
though? I am not sure how to diagnose this further, thoughts suggestions would 
really be apprecaited!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87409fff-9131-42b0-a814-9439450e99f9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Attaching USB bus/device to VM.. What happens next?

2016-07-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-13 08:51, neilhard...@gmail.com wrote:
> Am I supposed to attach this Device before or after the VM has started..?
> 
> The problem is... when I assign it, I get this error message:
> 
> "Error starting VM. Requested operation is not valid. PCI device
> :00:1a.0 is in use by driver xenlight", domain test"
> 

I do it in this order:

1. Shut down the USB VM.
2. Go into the USB VM's settings and assign the USB controller(s) to the USB VM.
3. Start the USB VM.
4. Physically plug in my USB device to the port owned by the controller
assigned in step 2.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=VODV
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c55940e4-a23e-5368-d83a-2dd40a5c6871%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Enigmail no longer works with Qubes split-gpg

2016-07-13 Thread 431mo6+f16909zsxw9ow via qubes-users
The signatures check does work but not the message encryption or signature.
I'm using Qubes 3.2Rc1 and using Debian 8 as the template and I have all the 
dom0 and template updates up to date.
Apparently it seems that the gnome-keyring is hijacking the gpg agent: 


gpg: WARNING: The GNOME keyring manager hijacked the GnuPG agent.
gpg: WARNING: GnuPG will not work properly - please configure that tool to not 
interfere with the GnuPG system!
[GNUPG:] ERROR check_hijacking 33554509






Sent using GuerrillaMail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/48cd3ebb149fc5ae977b34f06c40dc754c79%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Attaching USB bus/device to VM.. What happens next?

2016-07-13 Thread neilhardley
Am I supposed to attach this Device before or after the VM has started..?

The problem is... when I assign it, I get this error message:

"Error starting VM. Requested operation is not valid. PCI device :00:1a.0 
is in use by driver xenlight", domain test"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5e0acfe8-ec35-4631-b74b-d3c05d984011%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Attaching USB bus/device to VM.. What happens next?

2016-07-13 Thread Franz
On Wed, Jul 13, 2016 at 12:21 PM, Andrew David Wong 
wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-07-13 08:12, neilhard...@gmail.com wrote:
> > So, let's say I follow the steps to attach my USB bus to a VM.
> >
> > I go into VM Settings and see that it's attached.
> >
> > What next..?
> >
> > Where do I actually find the attached USB devices..?
> >
> > Let's say that I have a USB disk plugged in. Where would I actually now
> > find this device in the VM...?
> >
>
> You'd probably be able to see it in your file manager, and it would
> probably
> be /dev/sda (or /dev/sdb if you already have a /dev/sda, and so on).
>
>
Using nautilus I see the name of the drive on the column on the left. It is
enough to click on it and it gets mounted.

> - --
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
>
> iQIcBAEBCgAGBQJXhlyWAAoJENtN07w5UDAwwiYP/07XfNqcIRQiU+l9a/084pBV
> ZUnluP90x55d83QKrGteOK3FKZlufbywdOnectm/NLE3LubGSQKplvFFXxd6zhKj
> 5cIuBqQyRdM00rokvw7NlPfAasAE8FpFZxWt/06IsL6B0e15Xf72RfxxElZYujUJ
> n52IQqzitA0JQrIprNUo4GIkmtPv4c5caCrgCETXRzwe9kNL9HJ5Ozmy5ud8eOsH
> YsYc5e+fHx07Np/W/kMJAMNERZo6OMKzgVl6yRuwlQBaEhs9E4IbJg5qHfuvh19V
> 50G6+3m12Ibi3GqykbnvwFM1MtousKqQayx5pwaJzdQa6M1if9XAI1U5A1H+dT3/
> PSiWw2MP3GJMRCk+q8Rl5AbX2VeiWGEOjSSas6EH3sxoIn7P03eNlqKalYi0cE5x
> 107O83eXp62/eonHnPkC8t5UUkqYgP7eNthxoRtOD5hY0q6d0ZiJuHKHsXh/STBk
> LUJ0D4vS947vze9vPeaICTW1ZLWE9Mh0SFyZaHmHkrcz3pVvIhkQpJzmgavEDb2X
> S4JV5dkOBN22zJ0rk/26DDLs1jvPcCA9RzHKOWiWE02q7RvCk032tGjFBRhFYjJf
> WvHe6WCShiygMumRgex09SRW6RdDCLHVtzi3Nvfb76os/z123Is/mh7QdvP1sokK
> QJcqnj9ccvUIKgNd8UD3
> =MYCE
> -END PGP SIGNATURE-
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/343638d3-6d00-830b-013a-67b44214f1c0%40qubes-os.org
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qC2pCwgP8rDjFtOZNs4rdYTA9aQ1nnWR-QtsEEVrZHx8Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Attaching USB bus/device to VM.. What happens next?

2016-07-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-13 08:12, neilhard...@gmail.com wrote:
> So, let's say I follow the steps to attach my USB bus to a VM.
> 
> I go into VM Settings and see that it's attached.
> 
> What next..?
> 
> Where do I actually find the attached USB devices..?
> 
> Let's say that I have a USB disk plugged in. Where would I actually now
> find this device in the VM...?
> 

You'd probably be able to see it in your file manager, and it would probably
be /dev/sda (or /dev/sdb if you already have a /dev/sda, and so on).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=MYCE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/343638d3-6d00-830b-013a-67b44214f1c0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Suggestion: Inform users about documentation changes

2016-07-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-13 06:56, grzegorz.chodzi...@gmail.com wrote:
> It would be a nice feature if entries in the Qubes Docs showed the date of 
> the last update or a tag (preferably bright and colorful) showing which of 
> the docs were updated within the last 3 days, a week, a month etc. This
> will prevent users from missing out on useful information because it was
> added to an entry that has already been read by users.
> 

You can already view this easily by clicking the "View Page Source" link on
any documentation page. That will show you the last commit (near the top of
the page), and you can see the rest of the available commit history by
clicking the "History" button.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=2LNw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/36492b1d-1176-a4fc-28bf-ed6220cfb2ac%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] AEM boot option causes hard reboot/partial shutdown (Lenovo T450s)

2016-07-13 Thread Chris Laprise

On 07/12/2016 11:15 AM, Chris Laprise wrote:

On 07/12/2016 01:48 AM, Chris Laprise wrote:

On 07/05/2016 02:21 PM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jul 04, 2016 at 10:26:51AM -0400, Chris Laprise wrote:
If I replace the kernel with 4.1 from R3.1, it can make it to the 
AEM target
and the decrypt prompt. It chokes just after decrypting the 
volumes, but
that's to be expected. The 4.4 kernel appears to introduce some 
factor that

causes the crash.

Interesting, have you tried 4.2 kernel from R3.1 unstable repository?
Do you have any means of collecting kernel/xen messages? I guess you've
already disabled "quiet" kernel option and also removed "console=none"
from xen cmdline.
If this doesn't help, try adding "noreboot" and "sync_console" to 
xen cmdline.


If you have serial console (on docking station?) if would be easier to
reliably get log messages.

- -- 


I just tried the 4.2 kernel on the stick created by AEM under 
R3.2rc1; It seems to work as well as 4.1.


I'll try 4.4 again removing those boot options.

Unfortunately, the only docking station here is the kind lacking 
serial ports.


Chris



A bit more info:

Removing rd.antievilmaid from 4.4.12 options doesn't help; it still 
restarts. I also tried 4.4.14 in the unstable repo but that did not help.


It appears to be an incompatibility between kernel version 4.4 and tboot.

Chris



I am able to get 4.4.* to boot now! The trick was to add 
'min_ram=0x200' to the tboot options like I used to do--the AEM 
README describes how.


But now I cannot get AEM to seal the secret. Nothing at all about AEM is 
displayed during startup, even though rd.antievilmaid is on the kernel 
options line.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94a77415-079f-fd21-78e1-766c0ab3303e%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Attaching USB bus/device to VM.. What happens next?

2016-07-13 Thread neilhardley
So, let's say I follow the steps to attach my USB bus to a VM.

I go into VM Settings and see that it's attached.

What next..?

Where do I actually find the attached USB devices..?

Let's say that I have a USB disk plugged in. Where would I actually now find 
this device in the VM...?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c24348ed-5363-477d-ba4b-4f990cf8de7f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Multi-drive computers installation

2016-07-13 Thread Chris Laprise

On 07/12/2016 08:35 PM, Drew White wrote:

Has anyone been able to install Qubes on a multi-drive PC as a multi-drive PC 
without having all drives formed into 1 yet?



Anaconda always seems to mess up when I manually setup partitions. But 
both LVM and Btrfs will let you expand volumes into other partitions 
after installation. The trick is to luks encrypt the partitions first, 
preferably using the same passphrase as your initial volume. Then you 
adjust your crypttab and update grub.conf with the new additions. The 
downside is your kernel options line can get very very long.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b27e6dbb-d716-1e5c-feaa-406d32d9cd23%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] libvirt error on 64bit but not on 32bit system. Vt-x is enabled

2016-07-13 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Jul 13, 2016 at 09:27:38AM +, Facundo Curti wrote:
> Hi there. The title says everything...
> I'm trying to start an hvm virtual machine, but I get the libvirt error:
> 
> libvirt.libvirtError: Error interno: libxenlight fallo al crear un nuevo
> dominio "win7"
> 
> In english:
> libvirt.libvirtError: Internal error: libxenlight fails creating a new
> domain "win7"
> 
>  I have enabled VT-X, and this error does not exist when the windows ISO is
> a 32bit.
> 
> Have an idea? Thx

Take a look at /var/log/libvirt/libxl/libxl-driver.log

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXhgqHAAoJENuP0xzK19csaFYIAIx13zjKXoh2rWEJmrWD/VsN
ytyJqXZaTB2UOdTK3lftOxn4w+x6ubb+iaKC2E26gpgNj1Kbh5pXByBPtAFQFASv
mKW6004chFJgyUTQjpMF0zyFFPTk29sfruPrP1M8sdEDTxbbzQNj98u95g8T3V9P
tVzZiiIWRqi04ihAYN3S1nFrT33j6uWH0JnQsLMmYfO+2ImBDaVgRVEjxZVETsSi
11uIdug7O+KmJukHJm3vAX9rVfRDuTi550Y7yNHMCZFibVpMQBuAk/jYlkzCT+Vh
h678qZuzjco1zMaYaf8yguh+G6jZXWrBdkGMXb/SfDqp4wnKCT5BBGofTWi2AiQ=
=toMR
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160713093150.GU19103%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] libvirt error on 64bit but not on 32bit system. Vt-x is enabled

2016-07-13 Thread Facundo Curti
Hi there. The title says everything...
I'm trying to start an hvm virtual machine, but I get the libvirt error:

libvirt.libvirtError: Error interno: libxenlight fallo al crear un nuevo
dominio "win7"

In english:
libvirt.libvirtError: Internal error: libxenlight fails creating a new
domain "win7"

 I have enabled VT-X, and this error does not exist when the windows ISO is
a 32bit.

Have an idea? Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABxff5-nfA%2BqVViOyzKeqnz1o%2Bt4YCH7o%3DHEB7JtCXJMy_JCUA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] ZFS

2016-07-13 Thread Drew White
Is there any way to get ZFS working in Qubes properly during install?
I see no reason why the filesystem can't be worked that way. 
But I was wondering if there was anything that was actually causing you to not 
put it in as an option by default in the base system, dom0, and the guests?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4bbfb004-29f9-4864-84bf-ca98a411c18a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Buying new laptop.. What check should I do in-store..?

2016-07-13 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/13/2016 02:02 AM, neilhard...@gmail.com wrote:
> I have QUBES running now, but my processor only has VT-X, and not 
> VT-D.
> 
> So I'm thinking about buying a new laptop just to get VT-D.
> 
> I want to go into a physical store and try out the live USB for 
> 3.1.. just to make sure that everything is working before I buy
> the laptop.
> 
> My question is... what checks should I do in-store..?
> 
> What do you consider a full list of things that I should check for 
> QUBES compatibility...?

qubes-hcl-report should collect all available info from a laptop.

Not sure what version was included in the Live image, check the --help
and be sure to generate (and gather) support files as well.




- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=wA0U
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46ac1f1a-4428-2b63-11b6-e297161d67a1%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.