Re: [qubes-users] Feedback and errors on installation

2016-09-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-05 20:34, Benoit Georgelin wrote:
> Hi users of the Qubes Os list,
> 
> This weekend I decided to install this Os that I have been
> following for a while . After trying once, without spending too
> much time (1h) and fail to install, I decided to give it another
> try.
> 
> I spend the weekend trying to figure how to install the system.
> Here is my feedback and my errors because unfortunately I could not
> make it work .
> 
> 1- Install media : USB
> 
> I did use an USB Key for my installation media.
> 
> First problem, my computer (Toshiba Satellite P50) use EFI I'm
> aware 3.0 does not support EFI , I did try 3.1 and 3.2-rc3 Both
> case , dd if=image of=/dev/usb boot to a grub shell
> 
> So to get from grub shell to grub install :
> 
> set root=hd0.1 linuxefi /EFI/BOOT/vmlinuz root=live:/dev/sdb1 
> initrdefi /EFI/BOOT/initrd.img boot
> 
> That, gave me the possibilité to boot the installer and "install"
> the OS
> 
> 2- USB key cannot be use as the installation media If I want to use
> the usb as the install media, that is what is expected, here is the
> error :
> 
> Installation Source : Error setting up base repository
> 
> So, yes, not possible to use the USB key as the source of the
> installation media.
> 
> I have to use another USB-KEY with the Qubes Os iso file , plugged
> at the right time to be able to use it.
> 
> 3- Installation process lead to no-bootable device
> 
> I tried automatic partitionning, manual partitionning , btrfs or
> ext4 partition, nothing After the installation ends , disk boot
> failure, please insert ...
> 
> But, 2 times, over maybe 10 , I have got the system booting after
> the installation end. And the only two times it worked , the boot
> process crashed and could not boot the device anymore
> 
> 4- Installation finished, boot with the usb-key plugged in to get a
> grub terminal and boot my Qubes Os with grub shell command
> 
> So yes, this is all it take to me to boot up the system Some will
> say that it's a good security to avoid anyone booting the system,
> but I would like to have a normal boot process :)
> 
> 5- Not able to finalise installation
> 
> At the first boot, QubesOs ask for the first configuration . In my
> case 100% of the time I could get to this operation failed with the
> error that you can see on that picture :
> 
> https://pbs.twimg.com/media/Cro4G4vWYAA2reD.jpg
> 
> 
> So the installation first configuration process crash, I can't do
> it.
> 
> After , I'm able to login with my user into dom-0 Inside dom-0 I
> cannot do anything because the configuration does not exist and
> because I don't know what to do to solve that.
> 
> I don't really know if all of this is "hardware specific" issues,
> but I don't think so. The computer is few years old The disk is an
> SSD brand new
> 
> The installation process does everything correctly , I mean no
> errors and "normal" process that lead to a disk boot failure . I
> can see the disk have the bootable flag , /boot partition is here
> /boot/efi partition too
> 
> I someone have any suggestion I'll be happy to try it stable
> version 3.1 and 3.2 have exactly the same behavior 3.2 does not
> allow BTRFS partitioning so I went for ext4
> 
> I hope the feedback will give some input to QubesOs team and others
> users
> 
> Cheers, Benoit
> 

Just as a quick check: Did you verify the ISO prior to dd-ing it to
the USB drive?

https://www.qubes-os.org/doc/verifying-signatures/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=lfpO
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90cc672f-0dfd-1d1b-3508-c4f64b390c61%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Windows Tools - mouse

2016-09-05 Thread Drew White
Mouse cursor in Windows Tools Seamless Mode is clunky.

On the screen it's only displayed half the time.

Otherwise there is nothing there.

sometimes moving the mouse displays nothing as the mouse moves, sometimes it's 
a shimmering cursor, sometimes I see only glimpses of it.

But when it's NOT on a Windows Tools Seamless GUI windows, it's fine, it's 
solid as can be.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/684e1b5c-603d-4f2c-a03f-c2925c01099a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How to share data between 2 Qubes installations via USB in a sensible way?

2016-09-05 Thread Drew White
On Monday, 5 September 2016 20:33:22 UTC+10, David Hobach  wrote:
> Yes, but can you attach data from a single drive to multiple VMs 
> automatically? I guess no?

Yes you can, it is scriptable.

> But that's what this was all about...
> In short: I like to plug in my USB drive and have all the data I need 
> from that drive in all VMs in a matter of seconds (& in a secure way).
> 
> So I guess there was a misuderstanding.
> 
> Other than that I mostly agree with your Opsec standards.
>
> At best I also wouldn't need to keep that drive secure, but since 
> there's hardware attacks around I better do it anyway.

The real issue is that with Qubes, it doesn't write back immediately when the 
device is attached, not does it update very well.

I can mount my drive under a VM, but Dom0 won't see the changes I made in DomU 
until I unmount an dallow the changes to be written, then unmount from Dom0, 
then remount in Dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/776e8f10-52d2-42e4-b630-c0dc9f4a35f5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Feedback and errors on installation

2016-09-05 Thread Benoit Georgelin
Hi users of the Qubes Os list, 

This weekend I decided to install this Os that I have been following for a 
while . 
After trying once, without spending too much time (1h) and fail to install, I 
decided to give it another try. 

I spend the weekend trying to figure how to install the system. Here is my 
feedback and my errors because unfortunately I could not make it work . 

1- Install media : USB 

I did use an USB Key for my installation media. 

First problem, my computer (Toshiba Satellite P50) use EFI 
I'm aware 3.0 does not support EFI , I did try 3.1 and 3.2-rc3 
Both case , dd if=image of=/dev/usb boot to a grub shell 

So to get from grub shell to grub install : 

set root=hd0.1 
linuxefi /EFI/BOOT/vmlinuz root=live:/dev/sdb1 
initrdefi /EFI/BOOT/initrd.img 
boot 

That, gave me the possibilité to boot the installer and "install" the OS 

2- USB key cannot be use as the installation media 
If I want to use the usb as the install media, that is what is expected, here 
is the error : 

Installation Source : 
Error setting up base repository 

So, yes, not possible to use the USB key as the source of the installation 
media. 

I have to use another USB-KEY with the Qubes Os iso file , plugged at the right 
time to be able to use it. 

3- Installation process lead to no-bootable device 

I tried automatic partitionning, manual partitionning , btrfs or ext4 
partition, nothing 
After the installation ends , disk boot failure, please insert ... 

But, 2 times, over maybe 10 , I have got the system booting after the 
installation end. And the only two times it worked , the boot process crashed 
and could not boot the device anymore 

4- Installation finished, boot with the usb-key plugged in to get a grub 
terminal and boot my Qubes Os with grub shell command 

So yes, this is all it take to me to boot up the system 
Some will say that it's a good security to avoid anyone booting the system, but 
I would like to have a normal boot process :) 

5- Not able to finalise installation 

At the first boot, QubesOs ask for the first configuration . 
In my case 100% of the time I could get to this operation failed with the error 
that you can see on that picture : 

https://pbs.twimg.com/media/Cro4G4vWYAA2reD.jpg 


So the installation first configuration process crash, I can't do it. 

After , I'm able to login with my user into dom-0 
Inside dom-0 I cannot do anything because the configuration does not exist and 
because I don't know what to do to solve that. 

I don't really know if all of this is "hardware specific" issues, but I don't 
think so. 
The computer is few years old 
The disk is an SSD brand new 

The installation process does everything correctly , I mean no errors and 
"normal" process that lead to a disk boot failure . 
I can see the disk have the bootable flag , /boot partition is here /boot/efi 
partition too 

I someone have any suggestion I'll be happy to try it 
stable version 3.1 and 3.2 have exactly the same behavior 
3.2 does not allow BTRFS partitioning so I went for ext4 

I hope the feedback will give some input to QubesOs team and others users 

Cheers, 
Benoit 










-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/464418968.1157842.1473132849344.JavaMail.zimbra%40georgelin.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Networking between Linux and Windows VMs

2016-09-05 Thread 3n7r0py1
On Monday, September 5, 2016 at 10:23:42 PM UTC, Daniel Wilcox wrote:
> Hi Micah, you're taking the opposite the usual strategy I do on my extra 
> firewall vms -- by adding a rule rather than removing one.  Could you try on 
> the appropriate firewall vm:
> 
> iptables -D FORWARD 3  # where rule 3 should be the rule to drop all packets 
> between the vif interfaces
> 

Before opening up your firewallVM, please narrow down the issue to either the 
firewallVM or dev_win10 by completely disabling Windows Firewall. It's 
questionable whether you're gaining any protection from Windows Firewall anyway 
(wrt Qubes philosophy).

Go to Control Panel > Windows Firewall > Turn Windows Firewall on or off:

First, confirm that `Block all incoming connections` is unchecked! As a 
paranoid user, you might have set this and then forgotten.

Then, `Turn off Windows Firewall` for *both* profiles. No reboot. Initiate RDP 
session from dev.


> This should be equivalent to what you're doing but might be worth a check.  
> Also I'm sure you've noticed whenever the firewall vm has a change to its 
> rules, it'll reload and we have to re-execute this (anyone have ideas for 
> that btw?).

https://www.qubes-os.org/doc/qubes-firewall/#tocAnchor-1-1-4
(see "qubes-firewall-user-script")

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7d0c4c13-3460-4fdc-b206-bd754d5cafb8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Request for test: Re: [qubes-users] Fedora 24?

2016-09-05 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Jun 23, 2016 at 09:31:46PM +0200, Niels Kobschaetzki wrote:
> On 16/06/23 00:28, Marek Marczykowski-Górecki wrote:
> > On Wed, Jun 22, 2016 at 11:41:12AM +0200, Niels Kobschätzki wrote:
> > > Hi,
> > > 
> > > what would I need to do to update an existing Fedora-template or install 
> > > a new template to/with Fedora24?
> > > 
> > > Will Fedora24-templates come with Qubes 3.2?
> > 
> > In Qubes 3.2 we build packages also for Fedora 24. There is no prepared
> > template available, and packages aren't tested yet, but it should be
> > possible to upgrade using something similar to:
> > https://www.qubes-os.org/doc/fedora-template-upgrade-21/
> > Just replace 23 with 24 and probably use dnf instead of yum.
> 
> It seems that the commands might work but the packages in the Qubes-repo
> have still dependency-problems with Fedora 24. It seems I need to wait
> for 3.2.
> And I am not eager to do an allowerasing or some force installing which
> burnt me in the past (not with Qubes but in general).
> 
> The error messages are:
> Error: package python3-dnf-plugins-qubes-hooks-3.1.16-1.fc23.x86_64 requires
> python(abi) = 3.4, but none of the providers can be installed.  package
> qubes-gui-vm-3.1.5-1.fc23.x86_64 requires pulseaudio = 7.1, but none of the
> providers can be installed.
> package xen-qubes-vm-2001:4.6.0-13.fc23.x86_64 requires xen-libs = 
> 2001:4.6.0-13.fc23, but none of the providers can be installed.
> package qubes-core-vm-3.1.16-1.fc23.x86_64 requires 
> python3-dnf-plugins-qubes-hooks, but none of the providers can be installed.
> package qubes-core-vm-systemd-3.1.16-1.fc23.x86_64 requires qubes-core-vm, 
> but none of the providers can be installed
> (try to add '--allowerasing' to command line to replace conflicting
> packages)

I've just tried this and successfully upgraded Fedora 23 to Fedora 24
template.

TL;DR version:
1. Clone fedora-23 to fedora-24-test.
2. Open terminal in fedora-24-test.
3. Run "dnf upgrade --releasever=24".
4. Shutdown the template.
5. Switch (some of?) VMs to this template.

Some basic tests are ok. Please, if any of you have a chance, test such
template. If that would work, we'll build full template for convenience.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXzf6RAAoJENuP0xzK19cslMwH/37T/x0gSoVd3wS52cPibhlU
aKgyRW1DCs/cYaBhiTLI3yk5FANbhedqmNB1NQ8hdNIus7s0qtRHdHWv25DH4Dd6
b/qvJlOsB1xWI+EIhkr+1Bxw58MVRXYD6LWB+Z0jaH0fco4tCdb6s7Xls5Dt5OJ4
3UUZQAPvrZ42oh5WEd+brY/48AmNSS10YTkuKJD9/rfh1g6BxHMC/dNAwIH+dJWQ
WjuDdX6V5AKV11F1fbS7cGOJiVsv5v7ohJdglDNC8B2bQNwDiQ7+u4ScBVDn96+o
BzDntrIG8U1dN6PuAW6nxG361+mF4SXzTz7L/X1TIsswnVN3Ize/AxKYoHDxj8s=
=O9Wf
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160905232400.GA8182%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Networking between Linux and Windows VMs

2016-09-05 Thread Micah Lee
On 09/05/2016 02:44 PM, Connor Page wrote:
> they should be connected to the same firewallvm, not netvm. iptables in 
> netvms are set up differently.

They are connected to the same firewallvm. And I've successfully gotten
networking working between two Linux VMs using this firewallvm. It's
just not working with one of the VMs being a Windows HVM.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5eddbdaf-ca4e-cf63-b739-1229acc0f052%40micahflee.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Networking between Linux and Windows VMs

2016-09-05 Thread Connor Page
they should be connected to the same firewallvm, not netvm. iptables in netvms 
are set up differently.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3955b649-e8b3-495d-8a4c-7315f3c2909f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] yubikey challenge-response

2016-09-05 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Sep 05, 2016 at 12:57:33PM -0700, Peter Ihasz wrote:
> Hi!
> 
> Unfortunately, I can't login with yubikey and yubikey linked password.
> 
> Here is my config:
> 
> 1,
> yubikey linked password: apple
> 
> echo -n "apple" | openssl dgst -sha1
> yubikey linked password: d0be2dc421be4fcd0172e5afceea3970e2f3d940
> 
> yubikey-personilization-gui
> 
> LOGGING START,9/4/16 9:10 PM
> Challenge-Response: HMAC-SHA1,9/4/16 9:10 
> PM,2,,,04c21478245c36861b9f946e0d9388d5ebbb909d,,,0,0,0,0,0,0,0,0,0,1
> 
> usbvm name: sys-usb
> 
> 
> 2,
> in doom0
> chmod 755 yubikey-auth
> /usr/local/bin/yubikey-auth 
> 
> #!/bin/sh
> 
> key="$1"
> 
> if [ -z "$key" ]; then
> echo "Usage: $0  []"
> exit 1
> fi
> 
> # if password has given, verify it
> if [ -n "$2" ]; then
> # PAM appends \0 at the end
> hash=`head -c -1 | openssl dgst -sha1 -r | cut -f1 -d ' '`
> if [ "x$2" != "x$hash" ]; then
> exit 1
> fi
> fi
> 
> challenge=`head -c64 /dev/urandom | xxd -c 64 -ps`
> # You may need to adjust slot number and USB VM name here
> response=`qvm-run -u root --nogui -p sys-usb "ykchalresp -2 -x $challenge"`
> 
> correct_response=`echo $challenge | xxd -r -ps | openssl dgst -sha1 -macopt 
> hexkey:$key -mac HMAC -r | cut -f1 -d ' '`
> 
> test "x$correct_response" = "x$response"
> exit $?
> 
> 3,
> 
> /etc/pam.d/kscreensaver (KDE desktop environment)
> 
> auth [success=done default=ignore] pam_exec.so expose_authtok quiet 
> /usr/local/bin/yubikey-auth 04c21478245c36861b9f946e0d9388d5ebbb909d 
> d0be2dc421be4fcd0172e5afceea3970e2f3d940


Do you have anything in logs in dom0 (check `sudo journalctl -eb`)?
Do you have ykchalresp installed in template of sys-usb? It's part of
ykpers package.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXzdD3AAoJENuP0xzK19csyxwH/1u0FQINHo0Bs7a3uTzfi5Wl
jyoknwt9vA3b0V/AMLKIfz4g7+hoEocbachW+BRNl+KAvHJ4ZcEUzyugHq0F7OO/
mGhi6f4EiF/NPYG8zNwWkvy2MGinCbuTwjI52AzYV5Wb3efk+JUyCRB0VfHgoQtl
SLbRvPavN3h3LkZWdA6OHfQXHyiDJVVM9jikg4bLhFlDc4Jx3XOGB6Ocbj6F2A5X
fWHEDlTvWFvud3U+nln0ALlICwlktEm4Oy99UgYnCt9QXslGW08bzSAAiVXOpKbo
izjvf2F84sT2Vt5D39uGdB4/F8dy+AQS7F9Pi2En5NE4Jm5PZJD9vE3BfnS40Ic=
=QeHk
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160905200926.GK13909%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] yubikey challenge-response

2016-09-05 Thread Peter Ihasz
Hi!

Unfortunately, I can't login with yubikey and yubikey linked password.

Here is my config:

1,
yubikey linked password: apple

echo -n "apple" | openssl dgst -sha1
yubikey linked password: d0be2dc421be4fcd0172e5afceea3970e2f3d940

yubikey-personilization-gui

LOGGING START,9/4/16 9:10 PM
Challenge-Response: HMAC-SHA1,9/4/16 9:10 
PM,2,,,04c21478245c36861b9f946e0d9388d5ebbb909d,,,0,0,0,0,0,0,0,0,0,1

usbvm name: sys-usb


2,
in doom0
chmod 755 yubikey-auth
/usr/local/bin/yubikey-auth 

#!/bin/sh

key="$1"

if [ -z "$key" ]; then
echo "Usage: $0  []"
exit 1
fi

# if password has given, verify it
if [ -n "$2" ]; then
# PAM appends \0 at the end
hash=`head -c -1 | openssl dgst -sha1 -r | cut -f1 -d ' '`
if [ "x$2" != "x$hash" ]; then
exit 1
fi
fi

challenge=`head -c64 /dev/urandom | xxd -c 64 -ps`
# You may need to adjust slot number and USB VM name here
response=`qvm-run -u root --nogui -p sys-usb "ykchalresp -2 -x $challenge"`

correct_response=`echo $challenge | xxd -r -ps | openssl dgst -sha1 -macopt 
hexkey:$key -mac HMAC -r | cut -f1 -d ' '`

test "x$correct_response" = "x$response"
exit $?

3,

/etc/pam.d/kscreensaver (KDE desktop environment)

auth [success=done default=ignore] pam_exec.so expose_authtok quiet 
/usr/local/bin/yubikey-auth 04c21478245c36861b9f946e0d9388d5ebbb909d 
d0be2dc421be4fcd0172e5afceea3970e2f3d940

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/404d53fa-3ed8-40e7-92df-fe399b744eb0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Changing default user from "user" to something else in AppVMs

2016-09-05 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Sep 05, 2016 at 11:48:50AM -0700, John Toohey wrote:
> Hi,
> Just starting with Qubes and have 3.0 installed and running. I have some old 
> scripts that rely on my username being the logged in user. I've tried to use 
> qvm-prefs -s to set the user name from the root console, but it doesn't work. 
> What is the correct way to set the user name that AppVMs use be default when 
> they are created?

In short: sorry, not possible. Most of tools (like ssh, irc etc) support
setting default username to something else than logged in user. You can
also try changing $USER and/or $LOGNAME environment variables.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXzcDdAAoJENuP0xzK19csc48H/jJr6Y/lHf4Z2Uvo2EBcLuTY
QOEy9Z0yXbLCupiN4TDJTEwWiikdkT9am+8Ze/MB+zRBO3tXXDqTjsle9x5YtWqc
usrEaBGTxEGyG8QZI7mSslutLnXpYxngChDVjtYM1Nqq46UEN+929qYxbdXzpXDm
trPJ4q/w7o+qBB1xlRy36g94dA3Yn8LdOB4x0u1QXJVATYirfcdRIculVD5DmE+J
zWxDLkdr/IRtSERQFpkl02sLIUbXGyXkFU0y7U7C8Kz4UFba0ymcK38Ni5ETMBZc
Fas8G91F90jCHiAPoPV0AAYp1kdbY0JZ0jFssfhVu2/ZA2LR566fAsKOAoedQ9A=
=4dZZ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160905190044.GJ13909%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to share data between 2 Qubes installations via USB in a sensible way?

2016-09-05 Thread Salmiakki
On Monday, June 27, 2016 at 7:22:26 PM UTC+2, David Hobach wrote:

> (qvm-block can mount files from one VM to 
> another)

If this is true, why is it not a massive security issue?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8c900a29-bc58-4ac0-b7f5-1687c016fd7c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Changing default user from "user" to something else in AppVMs

2016-09-05 Thread John Toohey
Hi,
Just starting with Qubes and have 3.0 installed and running. I have some old 
scripts that rely on my username being the logged in user. I've tried to use 
qvm-prefs -s to set the user name from the root console, but it doesn't work. 
What is the correct way to set the user name that AppVMs use be default when 
they are created?

~JT

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8f2204c8-3102-4339-a89d-d0cea07a7211%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.1 and 3.2 beta both fail in post-install configuration

2016-09-05 Thread Bob Newell
On Sunday, September 4, 2016 at 2:45:03 PM UTC-4, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Sun, Sep 04, 2016 at 11:42:24AM -0700, Bob Newell wrote:
> > Hello,
> > I tried installing both Qubes 3.1 and Qubes 3.2 on my Lenovo T420S. Both 
> > exhibit the same problem, during the first-boot setup, after clicking ok 
> > from the checkboxes (I didn't change the defaults), there is an extremely 
> > lengthy error message generated. I think all of it was captured in the 
> > messages I read with journalctl. The bottom line is my VMs weren't 
> > generated. If I try to create a debian or fedora VM from the Q menu nothing 
> > happens. If I try to create a disposable VM for firefox with the shortcut I 
> > get "DVM savefile creation failed."  Any suggestions?
> > 
> > here are my messages: http://hastebin.com/ixifaqenad.md
> 
> How are you booting the system? It looks like you have modified
> bootloader configuration to load Linux directly, excluding Xen.
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJXzGuqAAoJENuP0xzK19cs8cAH/iC16M2FiB0wjxJyRZus2F0S
> bLCjQtVsBEuI8/3VId1tkiDm30bIg8yGWPjz2WxU4DaRwiWpyWWGBcf/db0mRdWk
> Qj7ogPyLLPU1/JET+3BSmwHoamX69LogUfv/CXVc4dtMreO2nLDAfROP7eIshTL5
> abPrYWIKVvTx1b7yJQ9Q+b2b+FWheMvfe7K3kBjF7bqGaI+ur8W5/9DZVuR7XsiS
> DgGRxzatlrxfAH7+53qu3S6fFAlYTGrUk1JQxHpURlwMn1+3GgYlHRfxEDKIS6uZ
> wp/eo9AVCa/ObESaJDE90b8tkRVkIPPFXaNDlZLMseL3F2lhHsYKVwfMP5nTcaY=
> =a8g/
> -END PGP SIGNATURE-

All I did was manually boot into ubuntu to restore my grub setting that got 
overwritten. Maybe that wiped out some Xen stuff that was in Qubes' grub 
setting. Is there a way to write Qubes' grub to a partition instead of the MBR? 
One of my biggest beefs with Anaconda is that it just overwrites your MBR and 
doesn't ask you where you want it. I would prefer to install any distro's grub 
to a partition and chainload it, that way, booting another linux distribution 
and updating a kernel doesn't wipe out any established boot settings.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b86896d4-4ddd-4d70-bcff-6a1c8287fc89%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] xdg and /etc/qubes/autostart

2016-09-05 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Sep 05, 2016 at 11:26:03AM +0200, Achim Patzner wrote:
> Am 05.09.2016 um 11:17 schrieb Marek Marczykowski-Górecki:
> > On Mon, Sep 05, 2016 at 10:31:17AM +0200, Achim Patzner wrote:
> > > Is there any documentation regarding xdg and overrides in
> > > /etc/qubes/autostart? I didn't find anything telling me what to put into
> > > an override file in order to restrict something to exactly one VM
> > > 8sys-usb in this case)... Are there any examples?
> >
> > If you just want to start something in one VM, use the standard XDG way
> > to do that - place files in ~/.config/autostart (as ~ is not shared
> > across VMs).
> 
> Wouldn't that require to have someone log in?

I'm talking about ~/.config/autostart in VM.
It is handled at VM startup (or more precisely - when GUI connects).
Yes, this do mean it is executed only if someone is logged in to dom0.

> > As for /etc/qubes/autostart docs - there should be README.txt.
> 
> There is a README telling to put additional entries into
> /etc/qubes/autostart but it does not mention anything about _what_ to
> put there.

There is even an example...
Ah, you mean possible values for OnlyShowIn and NotShowIn? Indeed it isn't
documented anywhere, I think. But you can look at a lot of examples
there. Possible values:
 - X-QUBES - any VM
 - X-AppVM - any AppVM (excludes TemplateVM, ProxyVM, NetVM)
 - X-NetVM
 - X-ProxyVM
 - X-TemplateVM
 - X-UpdateableVM (TemplateVM or StandaloneVM)
 - X-NonUpdateableVM (template based VMs)

> Besides: Imagine you wanted to install solaar on sys-usb and start it on
> boot. What would you do to get it running without launching it by hand?

I see solaar fedora package comes with a file in /etc/xdg/autostart. So
in fact you want to _disable_ it in non-sys-usb VMs, right?

So two steps:
1. Disable it everywhere:
/etc/qubes/autostart/solaar.desktop.d/30_qubes.conf:

[Desktop Entry]
NotShowIn=X-QUBES;

2. Enable it in sys-usb:

ln -s /etc/xdg/autostart/solaar.desktop ~/.config/autostart/

The second one works because overrides in /etc/qubes/autostart are
applied only to files in /etc/xdg/autostart and not ~/.config/autostart
(as indicated in README).

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXzT4MAAoJENuP0xzK19csEPcH/3wRj+ReHgu8RJPju6Dn4yWO
YNyw384ydVmUYA1NMTbrlojhU0Dgb9Nd7l9T1xgo/Gj8ytPu75bqCAekTveqMmgL
1loKa1NljHcqPLHT6RJLWcGR9vgF9efTQUUc1yxIzW3UIVNi8rPftC3LpJ9UcgEH
vuV4WoQrzp/qJnkO0NWSDpJEgbkepeetUuL4s30vFLoAZh05MbNOL+7EjuMmTKUE
OpEPDa+RJlAaaygNUB0mz1V51Z7WeJkEQnlplOQZCShXQKtSo79SFi+qltorPbbS
f67ZY8vm9sYi/eaghDHskzXv3/GELl/2RCJoIWvIFnOF2mBFz0JiCsvtvgv58+I=
=wG54
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160905094235.GD13909%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL

2016-09-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-05 01:20, Drew White wrote:
> On Monday, 5 September 2016 17:51:11 UTC+10, Andrew David Wong 
> wrote:
>> 
>> The closest thing available is the qubes-hcl repo:
>> 
>> https://github.com/QubesOS/qubes-hcl
>> 
>> This contains all the HCL reports listed on 
>> https://qubes-os.org/hcl/ (just the .yml files).
> 
> 
> Hi Andrew,
> 
> I did get those, but I figured there may have been some that were 
> changed or overwritten by newer versions or later versions too.
> 
> Thus I was hoping there was an easy way to get them all, for all
> the ones that have ever been uploaded, thus for the same hardware
> but different versions of Qubes. Instead of the same PC with only 
> displaying the latest data available.
> 
> Is there any way that something such as this would be gather-able 
> from this forum?
> 
> Sincerely, Drew.
> 

As far as I know, there's no "easy" way to get that (in the sense of
being able to download a single ZIP file, for example). However, there
are two options you may wish to consider:

1. Since Git is a version control system, it stores past states of
these files. For any given file, you can restore any prior version
that was committed to this repo.

2. We ask users who submit HCL reports to include "HCL" in the subject
lines of their emails, so searching for that phrase should, in
principle, turn up (almost) all HCL reports that have ever been
submitted (along with some other things, like this thread ;) ). It
might be possible to programmatically download all the attachments
from this list of search results (e.g., using something like wget).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=7cXN
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/05fece31-059f-3df4-f50d-2c60a3004f2c%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL

2016-09-05 Thread Drew White
On Monday, 5 September 2016 17:51:11 UTC+10, Andrew David Wong  wrote:
> 
> The closest thing available is the qubes-hcl repo:
> 
> https://github.com/QubesOS/qubes-hcl
> 
> This contains all the HCL reports listed on https://qubes-os.org/hcl/
> (just the .yml files).


Hi Andrew,

I did get those, but I figured there may have been some that were changed or 
overwritten by newer versions or later versions too.

Thus I was hoping there was an easy way to get them all, for all the ones that 
have ever been uploaded, thus for the same hardware but different versions of 
Qubes. Instead of the same PC with only displaying the latest data available.

Is there any way that something such as this would be gather-able from this 
forum?

Sincerely,
Drew.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2be19f92-b5f3-488b-9ea1-09d2f093278a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL

2016-09-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-04 21:47, Drew White wrote:
> Is it possible that I can get a copy of every HCL report that has
> ever been posted in here please?
> 
> I'm asking to know if there is a single location, or whether I have
> to go through the entire thing to find them?
> 
> Thanks.
> 

The closest thing available is the qubes-hcl repo:

https://github.com/QubesOS/qubes-hcl

This contains all the HCL reports listed on https://qubes-os.org/hcl/
(just the .yml files).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=MrXS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e48c4cfd-3bb4-3d20-d191-5c8e0a888bb8%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Recovery Disk & Suggest Live Linux CD to recovery system like WinPE

2016-09-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-04 10:27, Eva Star wrote:
> Are there some live recovery CDs as we have on windows (Windows
> PE)?
> 
> I notice that qubes have some recovery console, but it's hard to 
> understand how to use it (maybe some examples at Documentation and 
> "Recovery page" at documentation? Some basic examples... How to add
> utilities to it? What utilities we already have on this console?
> How to use them? Please, add the page to docs about it...
> 
> Now, I'm searching the way to run some LiveLinuxCD to reencrypt my 
> drive. So, this LiveCD must have 1) cryptsetup /
> cryptsetup-reencrypt tool.
> 

For reasons similar to those Connor gives, it might be better to rely
on some kind of dedicated "Linux rescue distro" instead. It's likely
that the utilities and documentation would be much more robust and
up-to-date. If we tried to do this in our own documentation, it would
probably quickly become out of date and end up not being very useful
in the long run (assuming we could even find anyone to contribute the
requested documentation in the first place).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=95Rw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1742d7a0-704b-a40c-d9ea-2ea75727be97%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qube OS install hangs on "ENABLING IO-APIC IRQs" step

2016-09-05 Thread grv
I am able to create Qubes R3.1 USB drive using Rufus, but when I try to boot 
from it, it get stuck at "(XEN) ENABLING IO-APIC IRQs" step. See the attached 
pic.


I have HP Z220 CMT Workstation with both VTx and VTd enabled.

Any suggestions to unblock this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/be9b5ad2-5419-4ec6-b961-6f8becc11d54%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.