Re: [qubes-users] Re: Qubes 3.2 rc2 has been released!

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-29 22:16, '109384'0194328'0193284'09132'84098 wrote:
> Hello,
> 
> if I try to upgrade the VMs like described under...
> 
> Upgrade Fedora templates:
> 
> https://www.qubes-os.org/doc/upgrade-to-r3.2/
> 
> I run into this error:
> 
> sudo dnf install --enablerepo=qubes*testing --refresh qubes-upgrade-vm
> 
> Error: Failed to synchronize cache for repo 'updates'
> 
> How I can upgrade the VMs to Q32?
> 
> Kind Regards
> 

I frequently get that message when updating via tor (sys-whonix). I just wait
for a new circuit or manually request a new identity via tor-arm in
sys-whonix by pressing 'n', and that usually fixes it.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=WcTL
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4a33cde-9c36-00cd-5ffd-4fd7466ffb40%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 3.2 rc2 has been released!

2016-07-29 Thread '109384'0194328'0193284'09132'84098
Hello,

if I try to upgrade the VMs like described under...

Upgrade Fedora templates:

https://www.qubes-os.org/doc/upgrade-to-r3.2/

I run into this error:

sudo dnf install --enablerepo=qubes*testing --refresh qubes-upgrade-vm

Error: Failed to synchronize cache for repo 'updates'

How I can upgrade the VMs to Q32?

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c3aa7cf5-6d6c-499a-8f7f-df65f922e186%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Snowden plans a wireless hardware security device

2016-07-29 Thread Franz
On Sat, Jul 30, 2016 at 1:45 AM, Syd Brisby  wrote:

> Edward Snowden and a hardware hacker have developed plans for a hardware
> device to monitor wireless signals on the iphone6. This lets the user know
> whether the phone's radio/s are actually on or off as it can be hard to
> tell otherwise. (He even mentions an anit-evil maid aspect to the design.)
> Wireless hacking / malware ain't no joke, as a female journalist was
> recently killed in Syria by having her phone wirelessly tracked to
> facilitate a strike to silence the media.
>
> What we need now is a version to fit on a laptop / netbook / PC - and
> since the design is open-source, that might be possible.
>
>
> https://www.wired.com/2016/07/snowden-designs-device-warn-iphones-radio-snitches/
>
> http://boingboing.net/2016/07/21/ed-snowden-and-andrew-bunnie.html
>
>
Isn't a laptop wireless hardware switch simpler?


> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/cef39eeb-944f-4a84-86ed-cdccf2f8f911%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCQrdyk5Zom_rf8SNApUvhr3CgbeHk9UgfdV3PoGanj9g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Snowden plans a wireless hardware security device

2016-07-29 Thread Syd Brisby
Edward Snowden and a hardware hacker have developed plans for a hardware device 
to monitor wireless signals on the iphone6. This lets the user know whether the 
phone's radio/s are actually on or off as it can be hard to tell otherwise. (He 
even mentions an anit-evil maid aspect to the design.) Wireless hacking / 
malware ain't no joke, as a female journalist was recently killed in Syria by 
having her phone wirelessly tracked to facilitate a strike to silence the 
media. 

What we need now is a version to fit on a laptop / netbook / PC - and since the 
design is open-source, that might be possible. 

https://www.wired.com/2016/07/snowden-designs-device-warn-iphones-radio-snitches/

http://boingboing.net/2016/07/21/ed-snowden-and-andrew-bunnie.html

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cef39eeb-944f-4a84-86ed-cdccf2f8f911%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Bluetooth (mouse)

2016-07-29 Thread eliwu
> From searching around the qubes mailing list, it sounds like bluetooth in 
> Qubes is a possibility (though there may be some security implications).


Have not figured out Bluetooth yet, but can now confirm.. 
Logitech's "Unifying" tech (from way back in the day) works like a charm.  It 
is the least amount of effort you will ever do in Qubes, for the most 
happiness.  (That usually means there is some security vulnerability 
somewhere)..  
Plug in the usb unifying thingy and.. it works.  
Being not very technical, this could be a security flaw.  But if your attack 
surface if not within 25 feet, go for it.  Tested and working on a mx master.  
Right click and scroll wheel work, not sure about the other buttons, but don't 
get your hopes up.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/15b5c669-dfa8-425f-aa79-bd4a6b9c4218%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: PulseAudio Connection Terminated

2016-07-29 Thread 3n7r0py1
On Friday, July 29, 2016 at 10:51:31 PM UTC, Marek Marczykowski-Górecki wrote:
> 
> Check kernel messages - maybe this is out of memory condition?
> 

No kernel error messages.
Machine has 16GB RAM - dom0 has 4GB.
No changes in hardware since last successful boot.

Really need some help with this.
Machine is locking up every 5 secs. Plus I need audio.
Thanks!

(For a few minutes I thought the issue might have resolved itself, but when I 
launched PulseAudio Volume Control, it went haywire again. No idea if those 
events are related.)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4c24264-c23b-47a3-b722-4f010215a043%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Change HandleLidSwitch value in the installer?

2016-07-29 Thread arthur . summers
I figured it was an oversight. Nothing major (and kinda picky), but man, it's 
caught me more than once like a little splinter . . .

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a75a892-29a2-48c5-8aff-b7f49946fa7b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Change HandleLidSwitch value in the installer?

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-29 18:44, arthur.summ...@gmail.com wrote:
> Actually, neither of those situations - the way post-install is set up is 
> perfect. This is what I'm referring to Right now, if I fire up the
> installer, click "Begin Installation," and decide to close my laptop lid
> while the installation runs, the system goes to standby. :[ Boo!!! Usually,
> the USB fails to reconnect, and the installer breaks. That make more
> sense?
> 

Oh, I see what you mean now. Yes, that makes sense. The existing behavior is
probably an oversight, since all power saving measures should be disabled
while the OS is being installed.

Tracking:
https://github.com/QubesOS/qubes-issues/issues/2212

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=tdW/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aef6e007-262a-7d2b-5d95-8914fa7c132d%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Change HandleLidSwitch value in the installer?

2016-07-29 Thread arthur . summers
Actually, neither of those situations - the way post-install is set up is 
perfect. This is what I'm referring to Right now, if I fire up the installer, 
click "Begin Installation," and decide to close my laptop lid while the 
installation runs, the system goes to standby. :[ Boo!!! Usually, the USB fails 
to reconnect, and the installer breaks. That make more sense?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b186eb46-7a8b-4819-9d06-4f58f67413d9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Thinkpad LTE Modem Module & Qubes Compatibility

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-29 15:36, 2fd3...@ahk.jp wrote:
> Thinkpad's and other laptops have the option of installing a LTE/4G module 
> (EM7345 4G LTE Sierra Wireless). Does this works with Qubes?
> 

I don't know, but I imagine it probably depends on the specific model.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=5CtY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aeec24d1-74a1-1947-8b5b-422fab56c298%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Change HandleLidSwitch value in the installer?

2016-07-29 Thread arthur . summers
So, I'm glad that HandleLidSwitch is set properly after an install to keep 
laptop systems from going to sleep when closed. I always forget about that on 
new installs of different OSs, and then I have to remember how that flavor of 
whatever system lets you disable the setting.

HOWEVER, could that be disabled in the installer? It's happened at least three 
times that I've closed the lid without thinking, the system goes into standby, 
and on resume, the USB hasn't reattached properly, so I have to start over 
again. Not a HUGE deal, but it is certainly a bit frustrating . . .

Much appreciated!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e485ea4d-63f5-4407-8cc8-3aa5fcdc8d17%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-29 Thread arthur . summers
I agree with the idea of having an option for a storage VM, but my agreement 
goes a little deeper (and forks a bit). I know that the primary goal of Qubes 
is security, but there are a lot of different use cases for it. I use it 
because I like the compartmentalization provided by VMs. Security is almost a 
secondary for me - I wanted a bare-metal client hypervisor. Since XenClient no 
longer exists and no other offerings are well maintained, I landed on Qubes. 
For my purposes, sharing storage would be great, but baking it in DOES defeat 
the primary goals of the project.

Personally, I'm a huge fan of Turnkey Linux (http://turnkeylinux.org), and I 
use their stuff regularly to stand up infrastructure components or for testing. 
They have a fileserver VM, and it's pretty beautiful. Actually, all of their 
stuff is pretty beautiful. However, unless I missed something, I don't see an 
easy way to import an OVA/VMDK into Qubes. If that existed, I'd be happier than 
a dog with eight legs (yes, I said that). This would solve a lot of use cases, 
simplify the creation of third party HVMs, and still maintain the goals of the 
project.

Thoughts?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f9e16762-09b3-4f05-82a8-d65fdedbe2f1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 3.2 RC2 - laptop screen lock bug

2016-07-29 Thread arthur . summers
I'm happy to report that the issue I experienced below is gone, so I was able 
to install RC2. The AMDGPU drivers in the 4.4 kernel make a HUGE difference for 
dual monitors, so I'm excited!
https://groups.google.com/forum/#!msg/qubes-users/uUwBy6RIUHQ/KESMemrcBQAJ

However, I'm having an issue when I close my laptop lid, reopen it, and then 
try to unlock the screen. The screen freezes for a good 60 seconds before 
letting me use the mouse or keyboard. This isn't after a standby, and it 
doesn't occur every time the screen locks - ONLY after I close the laptop lid 
and reopen it. Here is the pertinent dmesg:

[  553.366878] audit: type=1130 audit(1469827523.468:173): pid=1 uid=0 
auid=4294967295 ses=4294967295 msg='unit=qubes-suspend comm="systemd" 
exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
[  553.388154] PM: Syncing filesystems ... done.
[  553.394865] PM: Preparing system for sleep (mem)
[  553.395089] Freezing user space processes ... 
[  573.397815] Freezing of tasks failed after 20.002 seconds (2 tasks refusing 
to freeze, wq_busy=0):
[  573.397876] alsactl D 8800c326fb98 0  1382  1 0x0084
[  573.397886]  8800c326fb98  88012f871d00 
8800c3435700
[  573.397893]  8800c327 8800c326fbd0 880134b8e040 
880134b8e040
[  573.397899]  88012fabc000 8800c326fbb0 81752685 
000100047254
[  573.397906] Call Trace:
[  573.397926]  [] schedule+0x35/0x80
[  573.397935]  [] schedule_timeout+0x129/0x270
[  573.397945]  [] ? 
trace_event_raw_event_tick_stop+0x120/0x120
[  573.397953]  [] ? _raw_spin_unlock_irqrestore+0x1a/0x20
[  573.397970]  [] snd_power_wait+0xb5/0x110 [snd]
[  573.397976]  [] ? wake_up_q+0x70/0x70
[  573.397987]  [] snd_ctl_elem_info_user+0x61/0xf0 [snd]
[  573.397999]  [] snd_ctl_ioctl+0x5ec/0x6c0 [snd]
[  573.398010]  [] ? 
__raw_callee_save___pv_queued_spin_unlock+0x11/0x20
[  573.398019]  [] do_vfs_ioctl+0x298/0x480
[  573.398028]  [] ? __audit_syscall_entry+0xab/0xf0
[  573.398036]  [] ? do_audit_syscall_entry+0x4b/0x70
[  573.398042]  [] ? syscall_trace_enter_phase1+0x13c/0x160
[  573.398047]  [] SyS_ioctl+0x79/0x90
[  573.398053]  [] entry_SYSCALL_64_fastpath+0x12/0x71
[  573.398105] pulseaudio  D 88012060fcd8 0  2732   2731 0x0084
[  573.398112]  88012060fcd8  88012f851d00 
880086d25700
[  573.398118]  88012061 88012060fd10 880134a8e040 
880134a8e040
[  573.398124]  88012fabc000 88012060fcf0 81752685 
00010004043f
[  573.398131] Call Trace:
[  573.398138]  [] schedule+0x35/0x80
[  573.398145]  [] schedule_timeout+0x129/0x270
[  573.398151]  [] ? 
trace_event_raw_event_tick_stop+0x120/0x120
[  573.398158]  [] ? _raw_spin_unlock_irqrestore+0x1a/0x20
[  573.398169]  [] snd_power_wait+0xb5/0x110 [snd]
[  573.398173]  [] ? wake_up_q+0x70/0x70
[  573.398183]  [] snd_ctl_ioctl+0xc5/0x6c0 [snd]
[  573.398189]  [] do_vfs_ioctl+0x298/0x480
[  573.398195]  [] ? __audit_syscall_entry+0xab/0xf0
[  573.398201]  [] ? do_audit_syscall_entry+0x4b/0x70
[  573.398206]  [] ? syscall_trace_enter_phase1+0x13c/0x160
[  573.398212]  [] SyS_ioctl+0x79/0x90
[  573.398217]  [] entry_SYSCALL_64_fastpath+0x12/0x71

[  573.398233] Restarting tasks ... done.
[  573.423849] PM: Syncing filesystems ... done.
[  573.429320] PM: Preparing system for sleep (freeze)
[  573.429475] Freezing user space processes ... 
[  593.432916] Freezing of tasks failed after 20.002 seconds (2 tasks refusing 
to freeze, wq_busy=0):
[  593.433028] alsactl D 8800c326fb98 0  1382  1 0x0084
[  593.433038]  8800c326fb98  88012f871d00 
8800c3435700
[  593.433046]  8800c327 8800c326fbd0 880134b8e040 
880134b8e040
[  593.433052]  88012fabc000 8800c326fbb0 81752685 
000100047254
[  593.433058] Call Trace:
[  593.433076]  [] schedule+0x35/0x80
[  593.433084]  [] schedule_timeout+0x129/0x270
[  593.433094]  [] ? 
trace_event_raw_event_tick_stop+0x120/0x120
[  593.433102]  [] ? _raw_spin_unlock_irqrestore+0x1a/0x20
[  593.433117]  [] snd_power_wait+0xb5/0x110 [snd]
[  593.433123]  [] ? wake_up_q+0x70/0x70
[  593.433134]  [] snd_ctl_elem_info_user+0x61/0xf0 [snd]
[  593.433146]  [] snd_ctl_ioctl+0x5ec/0x6c0 [snd]
[  593.433155]  [] ? 
__raw_callee_save___pv_queued_spin_unlock+0x11/0x20
[  593.433164]  [] do_vfs_ioctl+0x298/0x480
[  593.433172]  [] ? __audit_syscall_entry+0xab/0xf0
[  593.433180]  [] ? do_audit_syscall_entry+0x4b/0x70
[  593.433186]  [] ? syscall_trace_enter_phase1+0x13c/0x160
[  593.433191]  [] SyS_ioctl+0x79/0x90
[  593.433197]  [] entry_SYSCALL_64_fastpath+0x12/0x71
[  593.433253] pulseaudio  D 88012060fcd8 0  2732   2731 0x0084
[  593.433260]  88012060fcd8  88012f851d00 
880086d25700
[  593.433266]  88012061 88012060fd10 880134a8e040 
880134a8e040
[  593.433272]  88012fabc000 

Re: [qubes-users] Re: PulseAudio Connection Terminated

2016-07-29 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Jul 29, 2016 at 03:33:39PM -0700, 3n7r0...@gmail.com wrote:
> 1. Deleting config files `~/.pulse`, `~/.config/pulse` did not resolve. 
> 
> 2. PulseAudio Manager Client Information says:
> Linked to Library 5.0.0
> Compiled with Library 4.0.0
> Is that a problem?
> 
> 3. pulseaudio -:
> I: [pulseaudio] main.c: Daemon startup complete.
> D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC1 is accessible: yes
> D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card 
> alsa_card.pci-_01_00.1.
> D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC0 is accessible: yes
> D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card 
> alsa_card.pci-_00_1b.0.
> I: [pulseaudio] module-suspend-on-idle.c: Source 
> alsa_input.pci-_00_1b.0.analog-stereo idle for too long, suspending ...
> D: [pulseaudio] source.c: Suspend cause of source 
> alsa_input.pci-_00_1b.0.analog-stereo is 0x0004, suspending
> I: [alsa-source-ALC898 Analog] alsa-source.c: Device suspended...
> D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum.
> I: [pulseaudio] module-suspend-on-idle.c: Sink 
> alsa_output.pci-_00_1b.0.analog-stereo idle for too long, suspending ...
> D: [pulseaudio] sink.c: Suspend cause of sink 
> alsa_output.pci-_00_1b.0.analog-stereo is 0x0004, suspending
> I: [alsa-sink-ALC898 Analog] alsa-sink.c: Device suspended...
> D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum.
> I: [pulseaudio] module-suspend-on-idle.c: Sink 
> alsa_output.pci-_01_00.1.hdmi-stereo idle for too long, suspending ...
> D: [pulseaudio] sink.c: Suspend cause of sink 
> alsa_output.pci-_01_00.1.hdmi-stereo is 0x0004, suspending
> Killed

Check kernel messages - maybe this is out of memory condition?


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXm93tAAoJENuP0xzK19csaH8H+gOXLALzLuf+Mu0a7hMqUoQ/
P797s8dRQhZiaVdgLpQBowLiS65w15NS0sO9FXiTdCmArsGqyOFWP9cQ5wiIPTxN
1XZLfvjAECCvqB1oIvQzF7EWP6ex3MFpUo/mYhM7g15kQnnaxEZDXuYJonTVkb5V
7Dcxas42Yc7R1yLMYwpw+Xs+b64apfk9VSo+AiAWF8oOPWbayIcKN4baBJ9+RTSi
jmIG9t3iF1zky3k+SvSCtB6+dZZVWkuuqrGGcdTFk9DMx9vxz2cGduiyCanQm94k
lb+m1b5e65S8brmgAC9wAm5Li0F/9p/1HDNAV1UtCX6WaFiMuQJpIqPdiGeT8Eo=
=j9Vd
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160729225124.GN32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora 23 template upgrade conflict

2016-07-29 Thread 45v88a+9k8gij8kag4bo via qubes-users
Thank you a lot that did the trick:)

Thanks for the help






Sent using GuerrillaMail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27471d9c8b8adcc92012982cb3b4d762ad20%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Thinkpad LTE Modem Module & Qubes Compatibility

2016-07-29 Thread 2fd3m76
Thinkpad's and other laptops have the option of installing a LTE/4G module 
(EM7345 4G LTE Sierra Wireless). Does this works with Qubes? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3a4dc9d8-7281-4937-b36d-bfc5493aae1a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Thinkpad X1 4th Generation

2016-07-29 Thread 2fd3m76
Does anyone have any info regarding compatibility for the high end spec 
Thinkpad X1 4th Generation & Qubes? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c92ac2e9-9e0e-403f-bad8-ca6365a1f011%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: PulseAudio Connection Terminated

2016-07-29 Thread 3n7r0py1
1. Deleting config files `~/.pulse`, `~/.config/pulse` did not resolve. 

2. PulseAudio Manager Client Information says:
Linked to Library 5.0.0
Compiled with Library 4.0.0
Is that a problem?

3. pulseaudio -:
I: [pulseaudio] main.c: Daemon startup complete.
D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC1 is accessible: yes
D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card 
alsa_card.pci-_01_00.1.
D: [pulseaudio] module-udev-detect.c: /dev/snd/controlC0 is accessible: yes
D: [pulseaudio] module-udev-detect.c: Resuming all sinks and sources of card 
alsa_card.pci-_00_1b.0.
I: [pulseaudio] module-suspend-on-idle.c: Source 
alsa_input.pci-_00_1b.0.analog-stereo idle for too long, suspending ...
D: [pulseaudio] source.c: Suspend cause of source 
alsa_input.pci-_00_1b.0.analog-stereo is 0x0004, suspending
I: [alsa-source-ALC898 Analog] alsa-source.c: Device suspended...
D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum.
I: [pulseaudio] module-suspend-on-idle.c: Sink 
alsa_output.pci-_00_1b.0.analog-stereo idle for too long, suspending ...
D: [pulseaudio] sink.c: Suspend cause of sink 
alsa_output.pci-_00_1b.0.analog-stereo is 0x0004, suspending
I: [alsa-sink-ALC898 Analog] alsa-sink.c: Device suspended...
D: [pulseaudio] core.c: Hmm, no streams around, trying to vacuum.
I: [pulseaudio] module-suspend-on-idle.c: Sink 
alsa_output.pci-_01_00.1.hdmi-stereo idle for too long, suspending ...
D: [pulseaudio] sink.c: Suspend cause of sink 
alsa_output.pci-_01_00.1.hdmi-stereo is 0x0004, suspending
Killed

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/842acec0-a494-49f4-90b4-9aef9af512b2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to install /boot partition and GRUB on USB

2016-07-29 Thread xsadjjnn
Hello.

First of all, thank you to the devs for creating such an awesome OS.

I only have one computer, and I can't run Qubes exclusively. So I need to
dual boot. I know this is not optimal, but I have to, and as such I need
to take all the precautions I can, which means I have to make sure that
neither of the OSes can access the other on disk. To do this I need 100%
disk encryption, so I need to install my boot partition+GRUB on USB
sticks.

I know how to do this on my non-Qubes OS, but I cannot for the life of me
figure out how to do this in the Qubes installer. I've searched and
searched with no luck.

Could someone give me a step-by-step guide to doing this in the Qubes
installer? I find it really, really confusing.

(The only problem I have is using the Qubes installer itself - I
understand how partition tables work and all that).

Thank you :-)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e95a38cb5350850272518eec8a7d89c.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-29 Thread 3n7r0py1
On Friday, July 29, 2016 at 1:42:07 AM UTC, epic...@gmail.com wrote:
> A fileVM would be a mountable filesystem that 2 or more AppVMs can share.

You don't need a VM, just a Drive (physical, network, or image).

Here's how I moved my data off of my appVM using a disk image:

https://groups.google.com/d/msg/qubes-users/c-XQTfa_l-Y/IkY8x3u6BwAJ

This is for dedicated use by one appVM at a time. You'll need to research 
implications of concurrent access by multiple VMs.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69dfdb76-f061-46f2-b5f5-f61b7946d466%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] PulseAudio Connection Terminated

2016-07-29 Thread entr0py
On a freshly rebooted Qubes 3.1, dom0 pulseaudio process consumes 100% cpu 
every 5 secs. Pulseaudio Manager shows a connection to server for a split 
second before announcing `Failure: Connection terminated`. This cycles 
continuously.

Not sure what triggered this issue. May have been recent updates and/or 
"Attaching audio-input to VM". Have not experienced this in the prior year of 
using Qubes. "Detaching audio-input" does not work.

Tips to troubleshoot? TIA.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b7f8322-fac3-d8ea-b575-167fe90394f9%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-29 Thread Franz
On Fri, Jul 29, 2016 at 4:31 PM,  wrote:

> On Friday, July 29, 2016 at 2:36:57 AM UTC-6, grzegorz@gmail.com
> wrote:
> > W dniu piątek, 29 lipca 2016 03:42:07 UTC+2 użytkownik epic...@gmail.com
> napisał:
> > > A fileVM would be a mountable filesystem that 2 or more AppVMs can
> share.
> > >
> > > A fileVM could be a normal partition like MSDOS/FAT32, an encrypted
> filesystem, or even a distributed or cloud filesystem.
> > >
> > > There are numerous uses for this, for example, installing Dropbox on a
> Linux AppVM and sharing the dropbox folder with a Windows AppVM that has
> Microsoft Office installed so you can edit docx files. You would create one
> DOS/FAT32 partition that would be attached to both the Linux and Windows
> AppVM. Currently you would have to install dropbox on both the Windows and
> Linux AppVMs doubling storage requirements.
> > >
> > > As long as the two AppVMs share the same risk tolerance there doesn't
> seem to be any reason not to allow this in my mind?
> > >
> > > The current system of having to manually transfer individual files
> from one AppVM to another is a productivity bottleneck and to many makes
> QubesOS undesirable as a primary OS.
> > >
> > > I understand there are many reasons to enforce the manual transfer in
> certain AppVM domains depending upon their nature, and this should be the
> default, but we also need a way to intelligently share large amounts of
> files between AppVMs in the same security domain.
> >
> > If I remember correctly this is already doable by attaching a block
> device to two VMs at once.
>
> Do remember where you saw a procedure for this?
>
>
I would suggest to use a network share, for example with a NAS that you can
use also to keep encrypted Qubes backups. It is extremely easy to mount
every time you need it just using nautilus and it is reliable. Also this
way you can easily afford to have more space than you''ll ever be able to
use. And the NAS can do other services too. For example a surveillance
webcam, backup your websites and much more.
Best
Fran

--
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/2a633509-08af-4578-babc-9d39ed4a0dcf%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBX%3D%2Bdr47TmPX6uTFU3C7Nh4AjYPNUv%3DXggB%3DMOEA%3DdOw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-29 Thread epicdonk
On Friday, July 29, 2016 at 2:36:57 AM UTC-6, grzegorz@gmail.com wrote:
> W dniu piątek, 29 lipca 2016 03:42:07 UTC+2 użytkownik epic...@gmail.com 
> napisał:
> > A fileVM would be a mountable filesystem that 2 or more AppVMs can share.
> > 
> > A fileVM could be a normal partition like MSDOS/FAT32, an encrypted 
> > filesystem, or even a distributed or cloud filesystem.
> > 
> > There are numerous uses for this, for example, installing Dropbox on a 
> > Linux AppVM and sharing the dropbox folder with a Windows AppVM that has 
> > Microsoft Office installed so you can edit docx files. You would create one 
> > DOS/FAT32 partition that would be attached to both the Linux and Windows 
> > AppVM. Currently you would have to install dropbox on both the Windows and 
> > Linux AppVMs doubling storage requirements.
> > 
> > As long as the two AppVMs share the same risk tolerance there doesn't seem 
> > to be any reason not to allow this in my mind?
> > 
> > The current system of having to manually transfer individual files from one 
> > AppVM to another is a productivity bottleneck and to many makes QubesOS 
> > undesirable as a primary OS. 
> > 
> > I understand there are many reasons to enforce the manual transfer in 
> > certain AppVM domains depending upon their nature, and this should be the 
> > default, but we also need a way to intelligently share large amounts of 
> > files between AppVMs in the same security domain.
> 
> If I remember correctly this is already doable by attaching a block device to 
> two VMs at once.

Do remember where you saw a procedure for this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a633509-08af-4578-babc-9d39ed4a0dcf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Fedora 23 template upgrade conflict

2016-07-29 Thread Chris Laprise

On 07/29/2016 02:08 PM, 45uiay+8xfsofrot5g94 via qubes-users wrote:

Just did, still no luck. The update still presents the same error.




I had to use 'dnf clean all' before update would work.

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/158132a4-3174-ec27-971f-f0bfb9c09dc8%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: [qubes-devel] Window border colors

2016-07-29 Thread Qubed One
> Jeremy Rand:
>> Marek Marczykowski-Górecki:
>> Try this:
>>
>> Go to system settings -> Application Style -> Window Decorations. It
>> should be set to "Breeze". If it is set to "Plastik", it may be the
>> cause of the problems.
>>
>> If this is the case, I think this may be related to KDE update done by
>> Fedora recently (a lot of kf5-* packages), so unrelated to
>> qubes-gui-dom0 version.
> 
> Yes!  It was set to Plastik.  Changing it to Breeze and clicking Apply
> instantly fixed the issues.  (Well, I can't test whether it fixed the
> icon of the launcher, because I've already done the workaround that I
> described previously.  But everything else is fixed now.)
> 
> Thank you Marek!
> 
> -Jeremy
> 



This also instantly fixed the same problem for me, and I can confirm
that it began at about the same time as the kf5-* updates from Fedora.

Thank you!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/243b1d95-2d10-7786-c7fd-4fcc3ce05a97%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 3.2 rc2 has been released!

2016-07-29 Thread Qubed One
Iestyn Best:
> Thank you guys, great work.
> 
> Just a little side note, yesterday when I updated it seemed to break my 
> window borders in KDE. I am now using XFCE and all seems fine.
> 
> I have not tried KDE again today, just trying to get use to XFCE now as that 
> is your focus now.
> 


I can't link to the exact message right now (qubes-devel, Marek, thread
named "Window Borders", fifth message in the thread), but these
instructions fix that issue in KDE:

"Try this:

Go to system settings -> Application Style -> Window Decorations. It
should be set to "Breeze". If it is set to "Plastik", it may be the
cause of the problems.

If this is the case, I think this may be related to KDE update done by
Fedora recently (a lot of kf5-* packages), so unrelated to
qubes-gui-dom0 version."

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b1026c0-664a-5945-b6d8-0814ef247010%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation failed and destroyed drive

2016-07-29 Thread Philip Torrance
On Wednesday, May 4, 2016 at 8:02:11 AM UTC-7, ricky...@gmail.com wrote:
> The SSD is detected by the machine though, it's listed in the boot menu.
> Acer Chromebook C720.
> 
have you tried to restart with Chrome OS?
or is it completely useless now? (or is Chrome OS useless to you).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/281455db-b20e-468e-9c90-9f5883304150%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.2 rc2 has been released!

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-28 11:57, Marek Marczykowski-Górecki wrote:
> On Thu, Jul 28, 2016 at 12:49:25PM -0400, Chris Laprise wrote:
>> On 07/28/2016 08:44 AM, Marek Marczykowski-Górecki wrote:
>>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256
>>> 
>>> Details here: https://www.qubes-os.org/news/2016/07/28/ 
>>> qubes-OS-3-2-rc2-has-been-released/
>>> 
>>> As usual, you can download new image from: 
>>> https://www.qubes-os.org/downloads/
>>> 
>>> Users of R3.2 rc1 can just install updates, no need for full reinstall.
>>> For older releases check above page for upgrade instructions.
>>> 
> 
>> Fedora 23 template shows a broken dependency for qubes-db:
> 
>> Error: nothing provides xen-libs >= 2001:4.6.1-20
> 
>> If manually add --allowerasing, it just tries to skip updating qubes-db.
> 
> That package was still in testing repository. Now should be better.
> 

Marek, another user is still reporting the same problem:

https://groups.google.com/d/msg/qubes-users/hBGELi7w4aQ/q_skPwGoCwAJ

Any ideas?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=p/XK
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51065331-24c7-2037-7cf3-21ecb75bc386%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora 23 template upgrade conflict

2016-07-29 Thread 45uiay+8xfsofrot5g94 via qubes-users
Just did, still no luck. The update still presents the same error.






Sent using GuerrillaMail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/57f8bdfe58f70486a7caae4e500d17762723%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Fedora 23 template upgrade conflict

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-29 10:37, 45uaue+5xrw8epnk2plg via qubes-users wrote:
> The upgrade was triggered by the Qubes VM manager. How can I pass arguments
> to it?
> 

Sorry, disregard that. It looks like this has already been fixed (as of ~22
hours ago):

https://groups.google.com/d/msg/qubes-users/X-FM2yQSkuk/cOzFRBZcCwAJ

Please try updating again.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=gqPX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4dd8ce25-7b7a-3f4e-1ff2-c76e6fe75d81%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] What do you think about the idea of a FileVM?

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-28 18:42, epicd...@gmail.com wrote:
> A fileVM would be a mountable filesystem that 2 or more AppVMs can share.
> 
> A fileVM could be a normal partition like MSDOS/FAT32, an encrypted 
> filesystem, or even a distributed or cloud filesystem.
> 
> There are numerous uses for this, for example, installing Dropbox on a
> Linux AppVM and sharing the dropbox folder with a Windows AppVM that has
> Microsoft Office installed so you can edit docx files. You would create one
> DOS/FAT32 partition that would be attached to both the Linux and Windows
> AppVM. Currently you would have to install dropbox on both the Windows and
> Linux AppVMs doubling storage requirements.
> 
> As long as the two AppVMs share the same risk tolerance there doesn't seem
> to be any reason not to allow this in my mind?
> 
> The current system of having to manually transfer individual files from
> one AppVM to another is a productivity bottleneck and to many makes
> QubesOS undesirable as a primary OS.
> 
> I understand there are many reasons to enforce the manual transfer in
> certain AppVM domains depending upon their nature, and this should be the
> default, but we also need a way to intelligently share large amounts of
> files between AppVMs in the same security domain.
> 

If there's such a great need to be constantly transferring files back and
forth between two or more domains, then that suggests that they shouldn't
actually be separate security domains in the first place, doesn't it?

An exception to this would be VMs that are separate VMs not because they are
distinct security domains, but for other reasons. For example, you have a
Windows domain and a Linux domain, and you have to test things using the same
files in both VMs. You regard them as a single security domain, but of course
they must exist as separate VMs.

So, I can see this as being useful for the latter type of purpose. However,
that's a more advanced usage of Qubes aimed not at regular users but perhaps
as developers.

Just a thought.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=CQhd
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3fe93bc6-23f2-119a-c2e6-16e2e09e2e70%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Security Bulletin #24 (Critical bug)

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-28 17:25, Chris Laprise wrote:
> On 07/27/2016 04:27 PM, Andrew David Wong wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>> 
>> On 2016-07-26 20:01, Chris Laprise wrote:
>>> On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
> What is best way to verify our system supports these things?
 I think you can also check out the processor with Intel.. 
 ark.intel.com You can search through the different processors if you 
 are looking to pick up a new computer.
 
>>> A guide I found at AMD:
>>> http://support.amd.com/en-us/kb-articles/Pages/ 
>>> GPU120AMDRVICPUsHyperVWin8.aspx
>>> 
>>> From Microsoft: http://support.amd.com/en-us/kb-articles/Pages/ 
>>> GPU120AMDRVICPUsHyperVWin8.aspx
>>> 
>>> Basically, anything recent that isn't too cost-reduced.
>>> 
>>> Chris
>>> 
>> Chris, I think you may have accidentally pasted the same link twice.
>> 
> 
> Sorry, didn't hit Ctrl-shift-V when I should ;)
> 
> Here's the MS link: 
> http://social.technet.microsoft.com/wiki/contents/articles/ 
> 1401.hyper-v-list-of-slat-capable-cpus-for-hosts.aspx
> 
> 
> Chris
> 

Thanks! However, it looks like that article hasn't been updated in a while.
Here's Intel's current, complete list of all CPUs that support EPT,so you can
ctrl+F and search for your model:

http://ark.intel.com/search/advanced?s=t=true

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=O1JX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2305be3-fe7b-60a4-d3e4-6dd24c01d347%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to log all the websites accessed by a VM

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-24 16:22, Andrew David Wong wrote:
> But if anyone has a better solution, I'm all ears.
> 

I appreciate all the alternative suggestions. It's always nice to have
multiple options for achieving the same effect, but I'm struggling to see why
I should switch from my current method (which seems to work fine for me) to
one of the other proposed methods (which seem more complicated to me). It's
quite possible I'm missing something. So, which of these many methods is
better (more secure, more reliable, etc.), and why?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=dOfF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87fe6126-0856-c1f2-890b-b16892e513b8%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Fedora 23 template upgrade conflict

2016-07-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-29 09:45, 45uaue+5xrw8epnk2plg via qubes-users wrote:
> Hello,
> 
> Does anyone knows how to fix this?
> 
> Thank you.
> 

Did you try with '--allowerasing'?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXm4swAAoJENtN07w5UDAwj8cP/jHidk8sSLybJHroXV6B6PFX
3jDYx4Zq15qHDb8UuXIBqds20i8ZyOlwt3yXUR9If1S/g0Kp9u4F4SQrmg2NZTac
g7Jf4C+JP5KngpLETYGOxu6y0GdV8SjStNwmmHPHh7JNXajCs+sOxcDwuwnEP6Wf
ysWw1Rm4OBlZSrFZsBtntWt1IsGdqs2CaylKaFozHlPgN9m9arSAOC3kNAb77x+T
wmNdRSuh+RzSmCBweXFVuZZ3pi08ajAukKn2znpc1ukAQWtV1BMWcSID2B+LiqjZ
OxZ629g1mDwX6v6G5eyfJ6vw8x7xMvMgWuVRiXeUjQMMuWYiAKpC+DIoX50Gtomi
iwZZPu38qc5Wszw3RcVymZcR6+sin9Xe7kTOivj6G3G2fSWApEyKLhUzUQpUeEIK
QglkuYg3lUmXwITwbEygIjL06gL+N+cHOkzYrUS6jqceAFwOcVor9OjwmRViUBeq
n42C8P5J+AWT6dvpn9lD7pc/qbMR5/ZqPwn6jSuvzG63z3ihIrmnSl27g2Lo/pA1
bBMDR+0YredXY+746ZUNUqIwBK3L4UZ7FoSew5Rvz8OJb2RtBg/tplc0pHkIp2tg
bKWVrjiA49+OVzZhE4+J/jIwl/ckyYWXS2gRNJKMLaHH+VUoqOH0AusvqK28LbOu
gfafDTWNXj5sc/jlmvoe
=DtW9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21ada6c3-407a-f890-d79f-64a75d4e64f8%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Hewlett-Packard-500-223w

2016-07-29 Thread Joe Thielen
I have successfully created and used several CentOS 7 (1511/Minimal) HVMs.
Intel i3 so no IOMMU.  No TPM installed.  Seems to work decent so far.
16GB RAM, I can have 3 CentOS HVMs open simultaneously, the work VM (with 4
terminals and Firefox), the Fedora 23 VM open (while doing an update on the
Fedora 23 VM) and everything was still fairly responsive, very nice.  I've
had this machine loaded for about three months now.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM9FSFy-uzCFgMOyRYW_E7aCxwRNw-XOhwJ3KynY6e0bKHCKew%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Hewlett-Packard-500-223w-20160729-124134.cpio.gz
Description: GNU Zip compressed data


Qubes-HCL-Hewlett-Packard-500-223w-20160729-124134.yml
Description: application/yaml


[qubes-users] Re: Fedora 23 template upgrade conflict

2016-07-29 Thread 45uaue+5xrw8epnk2plg via qubes-users
Hello,

Does anyone knows how to fix this?

Thank you.






Sent using GuerrillaMail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/170b5212d455b681f023ff3cda93ef011888%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 3.2 rc2 has been released!

2016-07-29 Thread neilhardley
The QUBES website incorrectly lists the file size for 3.2-rc2

It still lists:

"4.8 GB (4,816,109,568 bytes)"

It's actually now small enough to fit within a DVD disc now. 3.92 GB

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3d427595-f9e7-4f4c-99d6-87346a41c898%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cryptsetup LUKS Nuke Option

2016-07-29 Thread '190284'30918432'09182'034918'02943
Hello Andrew,

imagine you have many files with CID data (customer identified data) and you 
must protect them after the EU data protection law. 

Now you must clean all data of the customer x.
And this should be secure.

A simple trick might be to use encryption. All files get encrypted with a own 
key. Instead of wiping the files, you can can simple destroy the keys (in a 
very secure way).

This is simple and fast.

But, it will be only valid, if and olny if the encryption will hold and really 
is safe.

Ok, the only way to do this will be the one time pad, which is absolutely 
secure (as long the length is long enough to prevent the guessing).

But for practical reasons, this might be take big disk spaces.

For a compromise you can combine two ciphers, so if one will work and the other 
will get problems today or tomorrow, this "smart wiping" of files, will work. 

And by the way, if qubes os will have it's own real non-deterministic random 
generator, you can use the OTP to secure the passwords itself, which have a 
very limited disk space, so this will be feasible.

Kind Regards


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/97f34092-8565-490a-9d73-6310bd6dc791%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to switch VM network on and off?

2016-07-29 Thread 1'09384'0193284'0918'3204918'03294'80943
Hello Andrew,

good to know it and to keep this in mind to stay secure in different levels, 
which can be adapted to the requirements.

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b73fb90-5e0f-4aa8-b0d7-3698d9fc9987%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to switch VM network on and off?

2016-07-29 Thread '1093248'019438'0194328'091832'4092'183094
Hello Frank,

perfect, so I can keep the network setup and can prevent the installed software 
to "call home", without my control.

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d658b44e-5562-4e39-b6d6-d0fec1668203%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-29 Thread grzegorz . chodzicki
W dniu piątek, 29 lipca 2016 03:42:07 UTC+2 użytkownik epic...@gmail.com 
napisał:
> A fileVM would be a mountable filesystem that 2 or more AppVMs can share.
> 
> A fileVM could be a normal partition like MSDOS/FAT32, an encrypted 
> filesystem, or even a distributed or cloud filesystem.
> 
> There are numerous uses for this, for example, installing Dropbox on a Linux 
> AppVM and sharing the dropbox folder with a Windows AppVM that has Microsoft 
> Office installed so you can edit docx files. You would create one DOS/FAT32 
> partition that would be attached to both the Linux and Windows AppVM. 
> Currently you would have to install dropbox on both the Windows and Linux 
> AppVMs doubling storage requirements.
> 
> As long as the two AppVMs share the same risk tolerance there doesn't seem to 
> be any reason not to allow this in my mind?
> 
> The current system of having to manually transfer individual files from one 
> AppVM to another is a productivity bottleneck and to many makes QubesOS 
> undesirable as a primary OS. 
> 
> I understand there are many reasons to enforce the manual transfer in certain 
> AppVM domains depending upon their nature, and this should be the default, 
> but we also need a way to intelligently share large amounts of files between 
> AppVMs in the same security domain.

If I remember correctly this is already doable by attaching a block device to 
two VMs at once.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20a68704-36ac-4bd7-9454-6225916962d7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] A problem with update

2016-07-29 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Jul 28, 2016 at 10:56:28PM -0400, M. Vefa Bicakci wrote:
> On 07/28/2016 05:24 AM, Marek Marczykowski-Górecki wrote:
> > On Wed, Jul 27, 2016 at 10:31:10PM -0700, admix...@gmail.com wrote:
> >> Hi,
> >> I'm trying to update qubes but there still show that there is no updates 
> >> (for few moths).
> >> I thought that was true until I tried to download update for xen.
> > 
> >> Some commands:
> >> http://pastebin.com/Q7nhfZnX
> >> Linux dom0 4.1.13-9.pvops.qubes.x86_64 #1 SMP Thu Feb 11 15:46:02 UTC 2016 
> >> x86_64 x86_64 x86_64 GNU/Linux
> > 
> >> Can somebody tell me whats going on?
> > 
> > I think --debuglevel option is not supported - this is why you've got
> > that help message instead. Try `qubes-dom0-update --clean` to remove old
> > metadata first.
> 
> Hello Marek and Andrew,
> 
> On a related note, the script at 
> "/usr/lib/qubes/qubes-download-dom0-updates.sh" may have
> a minor bug related to the removal of the cache files when the --clean option 
> is passed
> to the qubes-dom0-update script in dom0.
> 
> When I run "sudo qubes-dom0-update --clean", as seen below my signature, "rm" 
> outputs an
> error mentioning that it cannot remove a directory. Even though "--clean" was 
> used, the
> timestamp for the metadata expiration check indicates that dnf is using 
> metadata from
> almost 12 minutes ago. This indicates an issue with the clean-up of the 
> dnf/yum cache.
> 
> When I "rm -rf" all the offending directory on sys-net using the command 
> listed below,
> then "--clean" works as expected as can be seen below, where the metadata 
> expiration
> check indicates only a 23 second delta, which is a more plausible value when 
> using "--clean".
> 
> All this to say, would it be possible to make the 
> "qubes-download-dom0-updates.sh" script use
> "rm -rf" rather than "rm -f" on the paths related to the dnf/yum cache for 
> dom0 updates?

Yes, this is already fixed in qubes-core-vm 3.2.9:
https://github.com/marmarek/qubes-core-agent-linux/commit/40d5f85b361d6f2ca889f7a9f1230baca826e1bf

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXmwZVAAoJENuP0xzK19csgF8H/iuY7YLn6aF6e4nDCckzKjUK
b2cKuhJOXt3vYulv5fR2zSQJMQAhdorC7iHXhsBQKvolNxEgqGa0Mt/B+IUixIfT
4A7pZHCR/aO+exXkamzGkvB8ShEnBLGIEKXSXUTri2KMgJzubgjH34VgjUAIgsQa
iFKE1Tj6NTYlIaGPjKoVccnP+3/HSGrsDDmNoNZ3Ru4o8OSP9NCBlCMvOXIDOWr6
VDr8UKfsrU9oEQADa/dOK9TlbqMt8MaeHPrp8sDB4IUD0hQJowyjgazvUxXVixqc
BYMTrhVY5hmg10z86JbEL3T+kjZF3XM6zjwc2exqtablytN2gc1J+WDARVXuu8Q=
=MGXn
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160729073132.GL32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.