[qubes-users] 3.2 on Lenovo T430u Install good but hangs on boot
I have all the settings here in place: https://www.qubes-os.org/doc/lenovo450-tinkering/ Setting UEFI options to get Qubes install to boot 1. Enable Legacy USB mode 2. Disable all Secure Boot and UEFI options, but leave this enabled: Config / USB / USB UEFI BIOS SUPPORT 3. Save settings and reboot 4. Install Qubes It appears I have Qubes-os 3.2 installed correctly, but upon boot I get the bios screen (Pheonix SecureCore tiano 2.02) and then hangs. No four penguins, no grub. What is my next step? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5d10f902-ffeb-c5e1-b57a-6e27375af670%40runbox.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't figure out how to install a couple of things in dom0
I need to install the following things: Krita 3.0.1 (I tried to use the appimage that they provide but I get an error about not finding something like libfuse.so) xorg wacom tablet drivers And although this is not quite decided yet, I may or may not need to install Nvidia Proprietary Drivers and Optirun/Bumblebee (On a laptop) I know the nvidia thing is in RPMFusion but I'm not sure if I should just add the rpmfusion repository the same way I would on fedora 22 or if there's a qubesos specific approach for it. My only ideas for getting my hands on the other two packages was to enable some fedora repositories (like rawhide which has the krita package I need) and then install them from there, but I'm not sure if that would be a very good idea. The reason I need krita on dom0 is mostly for the hardware accelerated graphics capability, since it's just a digital painting application I don't see any harm in having it on dom0 and if I run it from a VM it'll of course run slower. How should I go about achieving this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f7419f8d-b351-4e73-a3b1-d62f30f47cef%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Multiple monitors partially broken in Debian and Whonix AppVM's
Jeremy Rand: > If I install LibreOffice in a Fedora 23 Template using Qubes 3.2, the > "Presentation Display" setting works properly with no issues, so I can > see my notes on my main display and the presentation shows up on my > external display. > > However, this doesn't work properly under Debian 8 or Whonix 13. It > seems that both the notes window and the presentation window show up on > the main display, and are forced to the resolution of the main display. > I can drag the presentation window to the external display and maximize > it, but its window size remains at the resolution of my main display. > Since my main display is much higher resolution than the external > display, the result is that the presentation appears zoomed in, with > much of the border cut off. > > Note that I'm using the jessie-backports version of LibreOffice in my > Debian/Whonix VM's. > > Any idea what might be causing this? > > Cheers, > -Jeremy Rand Hello, This problem is still occurring for me. Does anyone know what might be causing it? Cheers, -Jeremy -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dc4b31c6-2718-1f07-fd23-62f993b75d1d%40airmail.cc. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Re: Persistant routes on Qubes are not persistant?!
On Sat, Oct 22, 2016 at 11:23:18PM +, 4ok80g+4fl8s3n7pesd8 via qubes-users wrote: > I assume you meant to say rc.local, as this has nothing to do with iptables > nor the qubes-firewall-user-script. > In any case, this suggestion in itself is a huge hammering. The sys-firewall > shouldn't have to change the qubes-uplink-eth0 (Network Manager > configuration) in the first place and that is the whole problem here. > > I could have set the file with the immutable flag on, I could have created a > rc.local script...etc > I could have done many workarounds, but these would be, as the name implies, > workarounds. What I want to know is to know why the static routes on the NM > configuration are being overwritten and how to avoid that. > > So far not a single soul from the qubes project has mentioned a single word > about this and this is simply unacceptable! This mailing list is been > abandoned! > Point proven - all the contacts for the ML and the help section were removed > from the main site. The page https://www.qubes-os.org/help/ is now redirected > to https://www.qubes-os.org/doc/ . > > Is this project over before it has taken off?!? > I think you should calm down. >From what I can see someone replied to you pretty quickly, asking for information and telling you that it worked for them. You dont appear to have responded to that, or provided more information. They pointed you to /rw/config/NM-system-connections. So, why not respond to JJ, who tried to help you? Set a route in NM. Then check to see that it is reflected in /rw/config/NM-system-connections What template are you using? Are other network settings retained between boots? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161023002637.GB7845%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Persistant routes on Qubes are not persistant?!
I assume you meant to say rc.local, as this has nothing to do with iptables nor the qubes-firewall-user-script. In any case, this suggestion in itself is a huge hammering. The sys-firewall shouldn't have to change the qubes-uplink-eth0 (Network Manager configuration) in the first place and that is the whole problem here. I could have set the file with the immutable flag on, I could have created a rc.local script...etc I could have done many workarounds, but these would be, as the name implies, workarounds. What I want to know is to know why the static routes on the NM configuration are being overwritten and how to avoid that. So far not a single soul from the qubes project has mentioned a single word about this and this is simply unacceptable! This mailing list is been abandoned! Point proven - all the contacts for the ML and the help section were removed from the main site. The page https://www.qubes-os.org/help/ is now redirected to https://www.qubes-os.org/doc/ . Is this project over before it has taken off?!? Sent using Guerrillamail.com Block or report abuse: https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/972486e4bde681b07c93a4093ad0f5018d26%40guerrillamail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Persistant routes on Qubes are not persistant?!
Hi, Did you try adding the commands in /rw/config/qubes-firewall-user-script file, as is indicated in the documentation? https://www.qubes-os.org/doc/qubes-firewall/ Regards El sábado, 22 de octubre de 2016, 12:54:54 (UTC-6), 4oe3ad+c69...@guerrillamail.com escribió: > Unfortunately this Mialing list seems dead. > I've opened this issue, that is specific to the Qubes architecture, for over > a week now and so far no one was able to pinpoint to the solution or explain > why static routes are being overwritten on boot. > > It seems that this ML is only breathing, beacuse of the individual effort of > its users. To the date, no one from the official team > (https://www.qubes-os.org/team/) was able to chip in or give any answer. > > This is a bad start for this project, lack of support is one of the reasons > why some projects are not successful.. > > And to think I was about to give some donations for this project > > > > > > > Sent using Guerrillamail.com > Block or report abuse: > https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b1f81c8d-ec22-4fa2-ae75-977b378b3588%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HVM win7 installation - crash
Hello, I tried to installed win7 into a HVM via qvm-start win7 --cdrom=/dev/cdrom The copying of the files are much faster, I updated QR32, but I run always into the same windows blue screen. *** STOP: 0x00101 (0x0031 ... How I can install Win7 into QR32, so I would like to run PB7 under full features in this way, until I can switch to qubes, if my workflows are running fast and easy? Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/919ff3a0-76f8-4dcf-a4f1-d542c6f04e7a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Is there a Step-By-Step Tutorial for extending the main Qubes LUKS /dev/sda2 partition?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Oct 22, 2016 at 06:01:07PM +0200, Que Bees wrote: > > I recently upgraded my harddrive (750GB) and cloned over my old harddrive > (380GB) which had a default Qubes 3.2 installation on it. Now I'd like to add > the unused additional space to the main Qubes partition which appears to be > /dev/sda2 and is LUKS encrypted. > > What is the most efficient way of accomplishing this, is there an existing > tutorial written specifically for Qubes? > > Is there some sort of Qubes recovery mode I can boot to for this operation? > Or should I create an Ubuntu LiveCD and following this guide at > https://help.ubuntu.com/community/ResizeEncryptedPartitions: > > Boot the desktop, live CD. Use gparted (or any tool) to put unallocated space > adjacent, and to the left of your Crypt partition. > Enlarge the Partition storing the crypt with fdisk. > Reboot ~ You should always reboot after changing your partition table with > fdisk. > Boot the desktop, live CD. Install & configure the tools (lvm2 and > cryptsetup). > Enlarge the Crypt with cryptsetup. > Enlarge the (LVM) Physical Volume with pvresize. > Enlarge the (root) (LVM) Logical Volume with lvresize. > Enlarge the (root) file system with resize2fs. > Reboot to your encrypted hard drive. The above list looks good. You can use recovery mode from Qubes installation disk. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYC8fWAAoJENuP0xzK19cslqIH/R6HeEYqs57PaYiDu/TTx2S0 w4XeRwf9GRNMfBzvUhJpr1pZm8WG7EyMWot2ZW2EW2hj8TbxnyuW9Pu1wg/4YPTh YvKqiLuITXCrFHKHjYvJMmq/b31oyp3+zEdX8M/V1wQbP37LJCoJT7nPv+XsAVaw wNob4Q5OpciR2+G0j1v1a9O4qdwt/eP0G5IDk+6eA8nA/kcq/+4aldZFwAW+kPgF YPeDaNmGMbfLycO8W+5qDa1imjScoSu8OA+AgX7JSRSAtU2KuOo21D5TSAKuVqCu ed77x/VMEZEV42My1xkKzEs84pPcBTr10DPkCU1fRCB/Zlzl0rJJdgjrdRDuohg= =Fh5Z -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161022201102.GJ1136%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes Windows Tools 3.2.2-3 released
I'm not sure, but I got the error when I'm update my template with previous installeted Windows Tools: https://i.imgur.com/1MPczCY.png But after that installer run again... and Qubes Windows Tools installer run every time when system start, but seems all work fine. https://i.imgur.com/Ok6Kktz.png Thanks! -- Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3082a8b7-5d37-f657-f9ad-05bddaf7ab21%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Inconsistent Screen Resolution for Fedora VMs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Oct 22, 2016 at 07:15:16AM +, Jeremy Rand wrote: > xmee...@gmail.com: > > I just did a clean install of Qubes 3.2. For some reason the resolution off > > apps in Fedora VMs is wildly inconsistent. The borders of the windows, > > dom0, and the Debian VMs are correct but the apps in Fedora VMs range from > > consistent with the others to so low as to be almost unusable. I can't > > figure out what causes them to change and xrandr outputs the same thing no > > matter what the displayed resolution is. > > I think this occurred for me a few weeks ago. If I recall correctly, > the HiDPI settings in GNOME had somehow been set to 0. No magnification > is 1, double magnification is 2. 0 gets interpreted as 2, for reasons > that only the GNOME people are likely to understand. I've looked at gnome-settings-daemon code and AFAIR those reasons are: 1. Have DPI at least 192, and 2. Have vertical resolution at least 1200. Relevant code: https://github.com/GNOME/gnome-settings-daemon/blob/master/plugins/xsettings/gsd-xsettings-manager.c#L233-L241 #define DPI_FALLBACK 96 /* The minimum resolution at which we turn on a window-scale of 2 */ #define HIDPI_LIMIT (DPI_FALLBACK * 2) /* The minimum screen height at which we turn on a window-scale of 2; * below this there just isn't enough vertical real estate for GNOME * apps to work, and it's better to just be tiny */ #define HIDPI_MIN_HEIGHT 1200 There is also lengthy comment about it. Anyway the above looks reasonable for me for automatically turning HiDPI mode on. So, if it was incorrect, I'd guess something gone wrong with retrieving input values (DPI, vertical resolution). - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYC8bcAAoJENuP0xzK19csryMH/11HnOzPwr1vQPfeWlmhymk6 uAMti9FHkTZEK4IWJWZDGaahd+Pos4Rav+wSmloV54n96AOrComKkz/LKk8t1VKl mQIwPSbyDvoW3jJMz6Izd9+QK5fEEp7rP2ekhE2Me8sCENu/yRR2tx9zHbJQ7bza yU1tLuuR6g334qMlTkdTX/6rRxJD6cpED9zjTJ3ZvFnAbCmuk10s57PKU6KTXogy LaOTConyMeRSPBc2S6C9avMoylcR2YQ9suXEVo/nE8uQv7GuOS6eaTNIoXkUXuEf 3RfyhrVLAGBxu1i6S3WCOrzt+9X9PuXqpyLkq0WZ8Gxlh1+onoo35+si7ohiHiE= =X8f7 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161022200652.GI1136%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Security announcement mailing list? [and others]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Oct 22, 2016 at 09:56:07PM +0200, Marek Marczykowski-Górecki wrote: > On Fri, Oct 21, 2016 at 08:50:20PM -0700, Andrew David Wong wrote: > > On 2016-10-21 15:47, Franz wrote: > > > On Fri, Oct 21, 2016 at 4:00 AM, jkitt wrote: > > > > > >> Shouldn't a security focused distro make security announcement in a more > > >> direct and urgent way? I was surprised to find that Qubes only had a > > >> 'users' and 'development' mailing list. > > >> > > >> > > > > Marek, what do you think about having a no-reply "qubes-announcements" > > mailing list? > > > > Messages sent from qubes-announcements would also be duplicated to > > qubes-devel and possibly qubes-users so that people have a chance to > > discuss and ask questions. > > I'm not sure if it worth it. There is not much such announcements. On > the other hand, this may be exactly the reason for having a separate > mailing list for this. For now, we have already some non-email channels > for announcements: > - @QubesOS on twitter - every security and release announcement is >duplicated there > - https://www.qubes-os.org/news/, with its RSS/Atom feed; but we don't >link security announcements there - maybe we should start? > > If you think additional ML channel would be useful, then sure, we can > create one. "would be useful" -> "those existing are not enough". - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYC8R4AAoJENuP0xzK19cssz8H/jiiY5oIPQn+aHSrCmv/Yxd9 UbD20hLqNiXdStIXorq3KKvJpprPu0ZM+8yMyfrrwmpKVRWDW5SPh+BnkhRORPik QlrexmT9Us2Q8PedVyrwj9dhjkcuRPUsx/nApLyZ8FMTi5Hyb2hvToLX212FiCiv +ng03V2EUZshmunN4BhVisDT6i5VziaDjxgKiydmqUNFUDXBC6O+pbxG6GWhwgZf 5RIrBZvH2r50HIwpuWGEJTXBeVcs58CWU3tNgJxJAfdY8FGVAIgeP40wwCmHltxX HQsDIKcO2gD3Tc/ovSGM0PWcPCXWdStNRuK/cIzrrmyN/GGJOaxWeIOzfYQC5J8= =H/qv -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161022195640.GG1136%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Security announcement mailing list? [and others]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Oct 21, 2016 at 08:50:20PM -0700, Andrew David Wong wrote: > On 2016-10-21 15:47, Franz wrote: > > On Fri, Oct 21, 2016 at 4:00 AM, jkitt wrote: > > > >> Shouldn't a security focused distro make security announcement in a more > >> direct and urgent way? I was surprised to find that Qubes only had a > >> 'users' and 'development' mailing list. > >> > >> > > Marek, what do you think about having a no-reply "qubes-announcements" > mailing list? > > Messages sent from qubes-announcements would also be duplicated to > qubes-devel and possibly qubes-users so that people have a chance to discuss > and ask questions. I'm not sure if it worth it. There is not much such announcements. On the other hand, this may be exactly the reason for having a separate mailing list for this. For now, we have already some non-email channels for announcements: - @QubesOS on twitter - every security and release announcement is duplicated there - https://www.qubes-os.org/news/, with its RSS/Atom feed; but we don't link security announcements there - maybe we should start? If you think additional ML channel would be useful, then sure, we can create one. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYC8RXAAoJENuP0xzK19cs8MgIAIEV8JJWXysyDB3k5ilvDUzQ fmebsTcS75WU/2VkrFu5Qnj831N/17MsAFEvT4P8LmGm/N8wdtzpwnNc6/QrPtHc XJtyI8Wa8TglXUPMfoz9PvVgIFnZgUh9WGXr01d57U0XTfy2PqGPvNKo8ccocftp ijl189aYraicdoLzd8fhW6F+ngG/lR05aQ06bKWqztgBAmpmu4Wo1+o0zO/IMLYg FB8Bp/5IVNKR5/eNsqtH4q6lubNCttIoYafjjGnUwGapF96FsIbWMrBfXDX993Wx DJr+9PWp6BdYRWowAwgYEuwWYNUvl6ljZaO2Ojr/NJSe0SgZrakG7N1XV9Df4F0= =N5DD -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161022195607.GF1136%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Persistant routes on Qubes are not persistant?!
Unfortunately this Mialing list seems dead. I've opened this issue, that is specific to the Qubes architecture, for over a week now and so far no one was able to pinpoint to the solution or explain why static routes are being overwritten on boot. It seems that this ML is only breathing, beacuse of the individual effort of its users. To the date, no one from the official team (https://www.qubes-os.org/team/) was able to chip in or give any answer. This is a bad start for this project, lack of support is one of the reasons why some projects are not successful.. And to think I was about to give some donations for this project Sent using Guerrillamail.com Block or report abuse: https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1418a5831ee4c312e0fc88994f0d57a5c611%40guerrillamail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes R3.2, cannot find redshift{-gtk} packages on dom0
On Saturday, October 22, 2016 at 9:15:27 AM UTC-3, srhgr wrote: > > when I install the redshift-gtk it tries to find the geolocation but it > fails. how can I simply dimm the light like adjusting the audio volume with > redshift? In order to have the feature that automatically adjust the screen color based on the time of day, you can set your location using a configuration file located in ~/.config/redshift.conf with this content: [redshift] location-provider=manual [manual] lat=-31.4 lon=-64.5 where you should put appropriate values for your actual location (or a matching timzone at least). Regards, ///Pablo -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9ad186c9-7146-4304-a229-cc64ed7d1e23%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL - Intel NUC NUC6i3SYK
I'm not sure why qubes-hcl-report put underscores in the filename? Anyway, I left it as is in case it's of significance to anyone. Installation just worked out of the box, no configuration required, with wireless networking, HDMI output, and USB keyboard/mouse. This machine was only set up to ensure I can run my vm backups in case I do something terrible to my laptop, so I don't really have much to report as far as day to day use. Installation was a little difficult as I had to do it blindly with tab & enter most of the way due to overscan issues. xrandr --output HDMI1 --set audio force-dvi sorted that, but I only found out about that after I got it installed. It would be easier if there was a way to resize/move the installer dialog window. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f7ee2b49-f299-49b5-bd5d-524b64666823%40googlegroups.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-_-_-20161022-115904.yml Description: Binary data
[qubes-users] Is there a Step-By-Step Tutorial for extending the main Qubes LUKS /dev/sda2 partition?
I recently upgraded my harddrive (750GB) and cloned over my old harddrive (380GB) which had a default Qubes 3.2 installation on it. Now I'd like to add the unused additional space to the main Qubes partition which appears to be /dev/sda2 and is LUKS encrypted. What is the most efficient way of accomplishing this, is there an existing tutorial written specifically for Qubes? Is there some sort of Qubes recovery mode I can boot to for this operation? Or should I create an Ubuntu LiveCD and following this guide at https://help.ubuntu.com/community/ResizeEncryptedPartitions: Boot the desktop, live CD. Use gparted (or any tool) to put unallocated space adjacent, and to the left of your Crypt partition. Enlarge the Partition storing the crypt with fdisk. Reboot ~ You should always reboot after changing your partition table with fdisk. Boot the desktop, live CD. Install & configure the tools (lvm2 and cryptsetup). Enlarge the Crypt with cryptsetup. Enlarge the (LVM) Physical Volume with pvresize. Enlarge the (root) (LVM) Logical Volume with lvresize. Enlarge the (root) file system with resize2fs. Reboot to your encrypted hard drive. Thank you! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-439914fd-2034-431a-a328-2317eae2c51e-1477152067547%403capp-mailcom-lxa06. For more options, visit https://groups.google.com/d/optout.
[qubes-users] A list of computers that do not "hold state"..?
Does anyone have a list of computers with no writable firmware..? If you get hacked, hackers can deeply infect the BIOS, GPU, WiFi and other components that "hold state". Then, even if you wipe your hard drive after getting infected, you can still just get re-infected again, due to the deep firmware infections. The Raspberry Pi is an example of a device that does not "hold state". Every component on the Raspberry Pi has its firmware and drivers loaded in from an SD card. Thus, if you wipe the SD card, you have truly wiped the device, and can be sure that it is totally clean. Does anyone have a list of similar devices to the Pi, that do not "hold state" on ANY of the components...? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f00af64b-c89e-4451-bec5-8667bc52a5ab%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes Windows Tools 3.2.2-3 released
Hello, thanks! I look forward to use it soon, because Win7 is still central for my productive work flow. Kind Regards P.S. USBVM and audio-support would be very appreciated. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/64c61e31-9fe8-4836-88d7-2f7cd46fad06%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Most Secure way to encrypt your usb stick ?
Hello lakschmi, you might check out a poly morph encryption PMC, but this runs inside Win7 on the application layer. http://www.pmc-ciphers.com/xcontent/Applications/TurboCrypt.html http://www.pmc-ciphers.com/xcontent/Software-products/TurboCrypt-Disk-Encryption/1024-Bit-Encryption.html Up to now, nobody can crack the 38 Bit challenge. But if you like to see it one day on linux, you might imitate some donation, today it is running on windows only with 256 bit. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/afe7ea7b-dcc7-48a0-80da-81528eb79709%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes Windows Tools 3.2.2-3 released
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi all, We uploaded a new version of Qubes Windows Tools (3.2.2-3) to the current-testing repository. Changelog: - - Updated Xen PV drivers to be in line with upstream - - Private disk image is now initialized during setup making the install process require one less reboot - - Added handler for qubes.OpenURL qrexec service - - Fixed a bug that could make moving user profiles to the private image fail if there were files with ACLs explicitly disallowing SYSTEM access - - Fixed handling qrexec service requests for non-existing services - - Minor log readability improvements - -- Rafał Wojdyła Qubes Windows Tools developer https://qubes-os.org/ -BEGIN PGP SIGNATURE- iQEcBAEBCAAGBQJYC2jwAAoJEIWi9rB2GrW7/7cH/jx9JY5UozOG0hQC12J+clcb RagLMypHGSg/0awxal1FpQar/TUS8uxPcoym6PEeWQliNTko5F3QYBVm49yl5R3c GY13+bp3lQB9Iaj3pXAU2il5WJ0ZQmxPj6tISMMNQLIJs0/mADUuvuw9hJaiOfNR Ho2WCv2eM4gnaJxKKhcZOlgX7abApHZreBaZkMxLpe4oZFHyYr/yH8bFOTIc8jGw rP/nLGUjoUrMIZMyRlC7SMjafLbRDRCbN4RoRRsrIgbh/6NvoGLBU7qbnnmPE6Y0 ZfJWusvUrCLuO5c/+Ckbl+FnpItwqzmx2Q9Gj7Qxfprk2zLa+sb0UA+H/muZ5w4= =ow4Z -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/90fc2fd8-4006-ee62-c3d6-9f2fae8cd481%40invisiblethingslab.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Privacy issue in DisposableVMs
DisposableVMs have Firefox cookies for Google and other websites in them, unless you have customized the homedir of the DVM as per the instructions in the documentation pages. To read the details, please refer to: https://github.com/QubesOS/qubes-issues/issues/2390 To mitigate: I recommend deleting the /etc/dispvm*tbz file from your DispVM template, deleting all the *-dvm VMs, and recreating the DVM template with qvm-create-default-dvm --default-template -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/47012b3e-f8cd-8528-791f-6fc423cb0c53%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Most Secure way to encrypt your usb stick ?
On 10/22/2016 12:09 PM, lakschmi wrote: > have sensitive data on your usb stick? > > whats the best way to encrypt/decrypt it? > > > > normally I use whonix-ws pgp and encrypt every file but Id rather have a > different method > > > > is there a way to install the tails os ecryption system in qubes os? > I prefere it over the whonix workstation system. Install gnome-disks on the template of whonix-ws (then power off template, and power on the actual machine), then plug your USB, then use qubes-manager to passthru the USB to your VM, then open gnome-disks. >From there you can format the disk with LUKS encryption and FAT32 inside the encrypted container. After doing so, every time you plug it back in, and pass it thru, just open the file manager and click on the drive in the sidebar. This will prompt you for your password and voila, decrypted. -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8a6a0213-e121-6cb2-669b-42712640ceb7%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Most Secure way to encrypt your usb stick ?
On 10/22/2016 12:09 PM, lakschmi wrote: have sensitive data on your usb stick? whats the best way to encrypt/decrypt it? normally I use whonix-ws pgp and encrypt every file but Id rather have a different method I can't help you - sorry - but I suspect someone might ask: 1. Do you need to have individually-encrypted files? 2. If yes, are they the same key? 3. Would mounting the USB stick as an encrypted volume be satisfactory? is there a way to install the tails os ecryption system in qubes os? I prefere it over the whonix workstation system. Can't help here either. But you might get some interesting replies if you indicated WHY you would prefer tails over whonix - understanding that R4.x may allow you to run the two whonix components as DispVMs. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/73702be7-816d-106a-2164-331ab7da202e%40gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes R3.2, cannot find redshift{-gtk} packages on dom0
On Sat, Oct 22, 2016 at 05:15:27AM -0700, srhgr wrote: > when I install the redshift-gtk it tries to find the geolocation but it > fails. how can I simply dimm the light like adjusting the audio volume with > redshift? AFAIK redshift cannot do this, but: $ cat bin/my_redshift #!/bin/sh # berlin COORD=52.5:13.4 redshift-gtk -l $COORD & -- cheers, Holger -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161022123112.GB11616%40layer-acht.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: Digital signature
[qubes-users] Re: Qubes R3.2, cannot find redshift{-gtk} packages on dom0
On Thursday, October 20, 2016 at 3:47:56 AM UTC+2, Pablo Di Noto wrote: > Hello all, > > I have reinstalled R3.2 and want to install Redshift (and its GUI) on dom0 > again. > I do not recall how I did it on R3.1, and successive updates. > > I see on a Fedora 23 VM that redshift and redshift-gtk are available in the > `updates` repository. > > But cannot find how to access these (or equivalent) repositories on dom0. > Used `qubes-dom0-update --enablerepo=XXX` with many different repositories > mentioned in FAQs and other posts here with XXX={updates, > qubes-dom0-current-testing, qubes-dom0-security-testing, qubes-dom0-unstable, > ...} but all return "Unable to find a match". > > What am I missing? > > Thanks in advance, > ///Pablo when I install the redshift-gtk it tries to find the geolocation but it fails. how can I simply dimm the light like adjusting the audio volume with redshift? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1776ede4-c1c8-407d-8101-2c922fd4bcdb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Most Secure way to encrypt your usb stick ?
have sensitive data on your usb stick? whats the best way to encrypt/decrypt it? normally I use whonix-ws pgp and encrypt every file but Id rather have a different method is there a way to install the tails os ecryption system in qubes os? I prefere it over the whonix workstation system. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0abaf50d-3537-4587-92ae-2ae4a56ebdda%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Dual Boot - Live CD Knoppix & USB-SSD Qubes?
Hello, the debian live CD Knoppix has its charme, that you can find out quite well, which configuration will work for your hardware, because this live-configuration seems smart enough to deliver some solution. So for trouble shooting, this might be of some help. Now due to the Q-Security Policy Dual Boot is a VSI: https://groups.google.com/forum/#!searchin/qubes-users/Multiboot$20usb$20disks%7Csort:relevance/qubes-users/DKdGgpPMAc0/GX15PNJwztIJ https://www.qubes-os.org/doc/security-guidelines/ https://www.qubes-os.org/doc/multiboot/ https://www.sandisk.com/home/ssd/extreme-510-ssd Will it be some workaround (to gain a steeper learning curve in Qubes) that I use: - Only the Knoppix live DVD (as a second OS) - Install Qubes on a fast USB-SSD 500 GB and unplug it before I start Knoppix.. - and use AEM, so I can detect some BIOS modification The vulnerable unencrypted /boot cannot been reached, because it will be unplugged, before I start Knoppix. But, how I know, that Knoppix will not be able to modify my BIOS-Firmware? This means, if I run my system like this and AEM detect the BIOS-Firmware Malware - I can only throw away the hole PC and buy a new one? Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/17db7228-260b-4274-beb8-37cba01f0e8c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: super-bag
Am 22.10.2016 um 11:29 schrieb volodatrahore...@gmail.com: >> Добавь меня в вк /m3forfree > нет вк у меня Und mich würde der Scheiß nicht einmal interessieren, wenn ich bei VC wäre. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d65a862a-862b-bc64-ab2f-a1fe1a63a46d%40noses.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Error Debian Standalone restart
Hello Unman, QR32 clean installation. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/82bc68c5-a5ac-410e-9b62-d263ce250a6f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: super-bag
суббота, 22 октября 2016 г., 4:01:37 UTC+3 пользователь nezn...@xy9ce.tk написал: > Добавь меня в вк /m3forfree нет вк у меня -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9e5586f3-a069-4323-8441-3e5488713d72%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: OpenBSD Xen PHVM
On Friday, 21 October 2016 17:50:47 UTC+1, cubit wrote: > 7. Sep 2016 16:33 by jo...@johnrshannon.com: > From the OpenBSD 6.0 Release Notes: > The xen(4) driver now supports domU configuration under Qubes OS. > > > Has any persons investegated if OpenBSD as a AppVM is likely to possible? I'd really like to see this. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/85a34a91-27aa-4ebb-b68f-59640fdb3c28%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Inconsistent Screen Resolution for Fedora VMs
xmee...@gmail.com: > I just did a clean install of Qubes 3.2. For some reason the resolution off > apps in Fedora VMs is wildly inconsistent. The borders of the windows, dom0, > and the Debian VMs are correct but the apps in Fedora VMs range from > consistent with the others to so low as to be almost unusable. I can't figure > out what causes them to change and xrandr outputs the same thing no matter > what the displayed resolution is. I think this occurred for me a few weeks ago. If I recall correctly, the HiDPI settings in GNOME had somehow been set to 0. No magnification is 1, double magnification is 2. 0 gets interpreted as 2, for reasons that only the GNOME people are likely to understand. The standard GNOME procedures for changing HiDPI settings fixed it for me (I restored it to 1). Sorry I don't have more details for you, I don't believe I wrote down the fix at the time. -Jeremy -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a60c47f9-0a8e-e671-8abf-77f034a3ae25%40airmail.cc. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature