Re: [qubes-users] How to search, reinstall or remove qubes-templates installed via rpm?

2016-12-22 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-12-22 07:33, J. Eppler wrote:
> 
>>> 1. How can I search for qubes-templates in dom0 rpm repository? The 
>>> qubes-dom0-update tool excludes all templates from a search.
>>>
>>
>> $ sudo qubes-dom0-update --action=search qubes-template
>>
>> This will pass through the terminal output from the UpdateVM, so even
>> though templates are excluded in the dom0 dnf command, you'll still get
>> the search results (in red text by default).
>>
>> Remember that you won't see community templates unless you enable their repo:
>>
>> $ sudo qubes-dom0-update --enablerepo=qubes-templates-community 
>> --action=search qubes-template
> 
> Reading red text is not a really good solution from an usability perspective. 
> What are the reasons to exclude templates from a search in the first place?
> 

Actually, after further testing, I've found that this doesn't work. Even with 
`--enablerepo=qubes-templates-community`, I'm only getting the Fedora and Arch 
templates in search results (not Whonix or Debian). Without 
`--enablerepo=qubes-templates-community`, I only get the Fedora templates in 
the search results. So, this method doesn't work. Moreover, the results are 
inconsistent, since Debian is in the official templates-itl repo, whereas Arch 
is in the templates-community repo.

Marek, any idea what's going on here?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=/s9/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6bcd00ad-f654-cf64-40e5-4def93bb756a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes refuses to boot

2016-12-22 Thread taii...@gmx.com

On 12/23/2016 12:42 AM, QubesPls wrote:


On Wednesday, December 21, 2016 at 10:54:03 PM UTC-5, raah...@gmail.com

maybe a silly question but can you boot another os from usb drive?

Yes, I can boot other linux distros like Debian and Mint perfectly fine from my 
USB. Qubes installed to my external HDD (I also installed it to another USB, 
but both have the same result) doesn't show the GRUB menu, only a blinking 
cursor that's unresponsive to keyboard input.

When I tried the Qubes live image, I can select an option from the GRUB menu 
and it tries to boot, but fails with the following (made the drive with Rufus):
Warning: /dev/disk/by-label/Qubes-R3.1-alpha1.1-x86_64-LIVE does not exist
Warning: /dev/mapper/live-rw does not exist

I also tried to boot from the installation on the extrnal HDD on another 
(significantly older w/ winXP) laptop and it repeatedly reboots during the boot 
process (after the GRUB menu, but before entering the LUKS passphrase). 
However, it does boot up the live image completely fine.


I have had many problems with rufus fucking up linux iso writing.

Try using dd to write the iso in linux (NOTE: BE VERY CAREFUL - Use 
/dev/disk/by-id to do writing instead of /dev/sdX or else you could 
easily nuke your data)


Whats the model of your laptop you want to install on? I check manual 
for you to see what is up.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2fe9029-7444-1b8a-3912-896cb52e8771%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes refuses to boot

2016-12-22 Thread QubesPls
On Wednesday, December 21, 2016 at 10:54:03 PM UTC-5, raah...@gmail.com 
> maybe a silly question but can you boot another os from usb drive?

Yes, I can boot other linux distros like Debian and Mint perfectly fine from my 
USB. Qubes installed to my external HDD (I also installed it to another USB, 
but both have the same result) doesn't show the GRUB menu, only a blinking 
cursor that's unresponsive to keyboard input.

When I tried the Qubes live image, I can select an option from the GRUB menu 
and it tries to boot, but fails with the following (made the drive with Rufus):
Warning: /dev/disk/by-label/Qubes-R3.1-alpha1.1-x86_64-LIVE does not exist
Warning: /dev/mapper/live-rw does not exist

I also tried to boot from the installation on the extrnal HDD on another 
(significantly older w/ winXP) laptop and it repeatedly reboots during the boot 
process (after the GRUB menu, but before entering the LUKS passphrase). 
However, it does boot up the live image completely fine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/346b0c4b-04df-4a38-b645-28316fd86a28%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Glitch: sys-net and sys-firewall start without "Start VM automatically on boot" setting enabled

2016-12-22 Thread wes . akers
@marc 

You are right, unchecking the box "should" make them not startup. I'm sure 
you've already figured it out but for anyone else that finds this page I'll 
post the answer.

Go to /etc/systemd/system/ and comment out the line in "qubes_netvm.service" 
that tells the default netvm to start. Bam...

This must be done for me because everytime I restart the box I have no 
connection in sysnet which requires me to do various steps in order to have 
sysnet actually connect to the internet...very annoying. Searched for that fix 
but haven't figured it out yet.


B4U2DO

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e44-4551-4518-a22d-8784fdcc2fff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-22 Thread v3g4n via qubes-users
On Friday, December 23, 2016 at 12:15:20 AM UTC, 
5o5pj7+c4p...@guerrillamail.com wrote:
> Hi,
> 
> I accidentally forgot to change one appvm that still references the 
> fedora-23, before running the "dnf remove qubes-template-fedora-23" which 
> have removed the rpm.
> After that I've erase all files under /var/lib/qubes/vm-templates/fedora-23 
> and also removed the corresponding entry from the /var/lib/qubes/qubes.xml 
> however on the xfce menu the fedora-23 template still shows.
> Can anyone tell me how to permanently delete the fedora-23 template by hand 
> since the rpm was removed?
> 
> Thank you
> 
> 
> 
> 
> 
> 
> Sent using Guerrillamail.com
> Block or report abuse: 
> https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D

The below command will remove it from the xfce menu.

sudo rm ~/.local/share/applications/fedora-23-*

https://www.qubes-os.org/doc/remove-vm-manually/
https://www.qubes-os.org/doc/templates/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37b11a94-0f38-4a6a-b500-faf0ed532d18%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: "Cannot find unused qid!" when restoring backup

2016-12-22 Thread raahelps
On Tuesday, December 13, 2016 at 12:30:28 AM UTC-5, Jeremy Rand wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> I just tried to restore 5 VM's from a backup.  The backup was made on
> Qubes 3.0; I'm restoring to Qubes 3.2.  All 5 VM's fail to restore
> with this error (although of course the name of the VM in the error
> message varies depending on what VM I'm trying to restore):
> 
> - -> Restoring QubesAppVm iso-linux...
> ERROR: Cannot find unused qid!
> *** Skipping VM: iso-linux
> 
> The error was copied by hand since copying from dom0 to an AppVM is
> difficult, so there might be a typo.  Based on the error message, I
> infer that maybe this has something to do with my Qubes 3.2 system
> having too many VM's on it already?  Is that an accurate guess, or is
> there a different reason for this error?  Is there any workaround?
> 
> Cheers,
> - -Jeremy
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYT4dkAAoJELPy0WV4bWVwVWgQALuKs+Gy5sP+foHkGzCqbc/s
> //8re2IZbnuQIa1endD4oVOsEdEu6mxrP7WT/7UoAzz/AOF5PG3dN62533eqwOsL
> 2mr74UltFAA3bAaE1LT1YVXYdxYpbIMGylReQC2JvhuAZjPKLlHQUpiKC/Lf6Cej
> gljkMyYGmF1GbYKlD54p3qHoYYAAv7M3LuIqWOlfdiUs7T+bT5PFHvWS9Hy/bsQ6
> rKTvMxLcLCGoxqIoRMyXc/H5Y4hFrBQHxsFV7uTxHMEhCmM6Zv9UO/i0zPWLloUS
> z5ZdGtnWQfk8/5iOEoRhrvE1xb2+9DVliJAz65UuXOwu1YcjRFpZ9Gq20sxf0NuK
> PZ+mx+TMB0gqcXPOQc77VlVQNWEmg8TZV4OiJvrlwXhOXpbKhBX8nlY6aXe0+TRN
> rRsWBIM1lHyPc600lhaJd5AETZEpGabKwOiL284tXT1Zn6lbIJT66fXNnaeYtHhz
> bwXJfni4QDj/oVCYPsPw6us7gyUK1MQ1qhu8bHXhEzSzenhnU0umRSadXNP86Ex7
> LL95XtKRfqbsCeN+sITsKV+HIcJ1RUzDO0oUqqmICd67u9xPGqQEUD6WppByJgIe
> rnHTOuLKwMHV6abGTCk5ubyUqNo3zC98qe1o0UkXw/G514iHbAdi1CRT1zcbrlX2
> nkBicnGaW0cbqP90Ph8K
> =ZAvl
> -END PGP SIGNATURE-

HOLY $#@!  250 something vms?  wow  qubes-manager on my machine would prolly 
crash haha.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74aefc43-9cf8-4aa1-8a22-7f550c7aeead%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Strategy: Qubes needs flexible automation more than other OSes due to its security-by-separation architecture: Should we initiate a cross-platform project?

2016-12-22 Thread Leeteqxv
*Below is a Spinoff* from "[qubes-users] When Wi-Fi disconnects, it 
fails to reconnect: How to reset the Network interface (conveniently) 
without restarting everything?"


(Ref. "I wish there was a magical menu entry that could do this:"
- "Enforce restarting sys-net/sys-Firewall and temporarily take down any 
open VM that are blocking the restart, and then subsequently start them 
all again afterwards WITH all the software that was running inside each 
one too...")


(To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9cd39d03-b9db-1a2a-a2ac-938031621b99%40leeteq.com 
.)




(If that is too much to ask for a script, then imagine the daunting task 
every time one has to do that manually.)


*Qubes has a deeper motivation for this kind of automation than other 
OSes due to the consequences of security dilemmas stemming from the 
separation of tasks/VMs etc.**

*

*Maybe Qubes does not have a choice, but to actually tackle this 
challenge at it roots.*


*If I am right about that, then we can look at this from a strategic 
point of view, as an oppurtunity to take the lead:**

*

The above linked other issue is a good example on exactly what we want a 
computer to automate in general.


The world does not need the (overhyped) "Artificial Intelligence" 
developments so much as really flexible automation like this example. We 
are far away from creating anything intelligence-like, but these 
automation bits are well within our reach even without any "A.I."


Because we are all in the same boat regarding all the dilemmas, caveats 
and workarounds in the struggle to stay as secure as possibl as 
convenient as possible, Qubes has a unique challenge that is much larger 
and much more deep felt than any other OS users has: for a workable 
interface to this kind of automation.


*Maybe an opportunity or potential benefit lies within this challenge:*

Could we invite A.I. developers into a cross-platform Linux project that 
aims at providing tools to let users manage, configure, schedule, etc. 
automation like this through the GUI, so we make sure we are at the helm 
of such developments and thus have even greater influence to affect its 
direction to cover our (extra) needs?


- LeeteqXV

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/209215a2-7489-d3cf-8b81-ba878c8f6878%40leeteq.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Split GPG: thunderbird+enigmail stopped cache password

2016-12-22 Thread 'Gaea' via qubes-users
Thanks Monsieur Ouellet.

I thought that there was a smaller version of Qubes that may be easier
for me. I am totally new to all this. Been with WINDOWS, but want
something more resistant to hacking & invasion of my privacy.

I managed to install Qubes 3.2. Now my google voice mail that records
MP3 like voicemail.mp3 wont play. In windows all I have to do is click
on (Play)

My laptop meets vt-d, vt-x, tpm, txt. It is UEFI, Legacy, UEFI-CSM
capable. Windows and Ubuntu which I tried both run in UEFI. But Qubes
refuses to Boot under UEFI. Tried all suggestions from forums.

I bought another hard drive to install Qubes in Legacy mode. I have to
swap Windows/Ubuntu HD & change BIOS to legacy, put in Qubes HD to fire
up QUBES. I am writing this in Qubes. Painful, but I really want to
leave WINDOWS behind. I don't see the point of running WINDOWS as a
QUBES VM.

Bye

Jean-Philippe Ouellet:
> On Wed, Dec 21, 2016 at 4:20 AM, 'Gaea' via qubes-users
>  wrote:
>>  Please what are the differences between:
>>
>> Minimal:
> 
> fedora-24-minimal + text editor, openssh, git, zsh, etc.
> 
>> Extremely Minimal
> 
> fedora-24-minimal + a text editor -- nothing else
> 
>> Full ?? VMs
> 
> All the crap. Browser, photo editor, media player, all the giant
> pieces of software that pull in half the world as dependencies.
> 
> 
> I have various others in between, such as one with only a browser (for
> online banking and such).
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50e5b492-31c8-5402-da72-56cbdcc38cf3%40lelantos.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] When Wi-Fi disconnects, it fails to reconnect: How to reset the Network interface (conveniently) without restarting everything?

2016-12-22 Thread Leeteqxv
On a test laptop I have a problem with the network hardware. It is an 
old one, and I know that this is a case of almost-broken hardware, so 
not really a Qubes problem.


If I restart the Sys-net, then it works again, so no need for a full 
restart of the laptop.
However, I wonder if there is a way to get around the real annoyance in 
this case:


a) I cannot restart Sys-net as long as sys-Firewall is running, and..:
b) I cannot restart/stop sys-Firewall as long as there are ANY AppVMs 
using it, so:

c)  do I REALLY have to shut down all programs and all VMs just to do this?

If I have to, can I at least be automated somehow?

*I wish there was a magical menu entry that could do this:*
- "Enforce restarting sys-net/sys-Firewall and temporarily take down any 
open VM that are blocking the restart, and then subsequently start them 
all again afterwards WITH all the software that was running inside each 
one too..."


(Or is there another, less dramatic way to re-initiate the Wi-Fi system?)

- LeeteqXV

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9cd39d03-b9db-1a2a-a2ac-938031621b99%40leeteq.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes as Server OS?

2016-12-22 Thread raahelps
On Thursday, December 22, 2016 at 3:41:25 PM UTC-5, stevenwi...@gmail.com wrote:
> I thought about the fact if its possible to use Qubes OS as a Server OS for 
> example for shared hosting or for application servers,etc.
> 
> You could basically use Template VMs and start AppVMs running the needed 
> softwares for example on a shared hosting system.
> 
> Would something in this direction even be possible and would any other use 
> cases be possible too?
> 
> I guess its possible to use it as VM Host too?
> 
> Are you using Qubes OS internally in some way like for the web server or at 
> the moment not? :D

alot of overhead man just use a barebones system.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f78b724-a9c2-4398-8d5d-7b43b1e94873%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes as Server OS?

2016-12-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Dec 22, 2016 at 12:41:25PM -0800, stevenwinderl...@gmail.com wrote:
> I thought about the fact if its possible to use Qubes OS as a Server OS for 
> example for shared hosting or for application servers,etc.
> 
> You could basically use Template VMs and start AppVMs running the needed 
> softwares for example on a shared hosting system.
> 
> Would something in this direction even be possible and would any other use 
> cases be possible too?
> 
> I guess its possible to use it as VM Host too?

Most Qubes OS features are really for client systems. Like all the GUI
integration stuff, requiring various confirmations specifically from
local user, lack of network in dom0 etc.
If you take that out, mostly standard Xen installation will left there.
Just like any hosting provider have...

> Are you using Qubes OS internally in some way like for the web server or at 
> the moment not? :D

We're under assumption that server infrastructure should not be trusted.
So, everything downloaded from the net - either ours servers, or others
- - should be verified. This is why(*) we use github instead of our own git
server, github pages + cloudflare for website, various mirrors for
binaries distribution and so on. And why we have reproducible builds on
the roadmap - to do the same with build machines - to not trust any
single machine building packages, but distribute that trust, verify
where possible.
The only thing we want from the infrastructure is reliability - and
using 3rd-party services makes it easier.

That said, technically you can setup some network services. For example
run a web server in netvm, and call some qrexec service in other
VM. Or redirect traffic to various VMs.
It still require local administration, so it's not suited to be running
in some data center. In theory you could hook up some IP KVM for that,
but then the whole setup would be only as secure as that IP KVM...

Some examples/documentation:
https://www.qubes-os.org/doc/development-workflow/#sending-packages-to-different-vm
https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world
https://github.com/Rudd-O/qubes-network-server
https://github.com/marmarek/signature-checker/#github-webhook-integration

(*) And the other reason is limiting costs. But still, not running own
infrastructure make it easier to keep it that way - think twice when you
send/receive something from 3rd-party service, put some script etc.
Running own infrastructure would make it tempting have some trust in it.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYXJxqAAoJENuP0xzK19csXgYH/1qZU2Hqe1fNz4kzbq9yVxOd
jZCzAK+d/UFtZRFlSE8hNLkx1GKLd/eQEhP9LZ+5fs6gSJtPPVF9ElCTYnTQlZ9/
HJEjpS3IJlhk0cYBM7KM5mSNCFXLXQYWf9M73N15nVP5j9V1Ewkyl5V0DHxPpVWI
r5j2pslzgXsNql38gA1hAeA9JPB8W3+Dwm7zug2ln0PfinCER9q7oA39JWjPN2Wd
zgGtVkyQU42T22p+vSZvEebUNO8As8uy7SVvkNHI77IpUA7G7kdVviRCqJ/nLpXV
3h7VgFEdtDoXfFZ+7uhKXL0Y4mT5O7+w4WQSsU0ZtQUBrD5flexXTyF6xj87Bno=
=GNuw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161223033923.GM1239%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firewall Rules for Printer Access?

2016-12-22 Thread raahelps
On Thursday, December 22, 2016 at 6:48:06 PM UTC-5, superlative wrote:
> On Sunday, December 18, 2016 at 9:18:53 PM UTC-8, Andrew David Wong wrote:
> > If it's a network printer, then you probably want to allow access to
> > whichever IP address it has on your local network, e.g., 192.168.1.102.
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> 
> It is a USB printer, not a network printer. So I assume I don't need to mess 
> with the firewall, and it should show up in the attach/detatch context menu 
> on Qubes VM Manager. But it doesn't! What do I do if it doesn't show up there?
> 
> I'd assume I need to install HPLIP package. But I'm not sure which template 
> to install it on in order for the Qubes VM Manager to pick it up? In other 
> words, what template does the Qubes VM Manager use?
> 
> Thanks for everyone who responded to me.

you will have to print from a sys-usb qubes then most likely if using usb.  the 
template you install printer drivers to is that one. You can try to add single 
usb device instead if using latest qubes. https://www.qubes-os.org/doc/usb/

Scroll to  "Attaching a single USB device to a qube (USB passthrough)"

Then you can attach the single usb device to an appvm and possibly print to it? 
 No idea though I've never tried it,  maybe someone with more experience can 
chime in.  Actually I have dont it with an android phone and its worked.  
Before I would have to transfer files from the usbvm.  So maybe it works for 
printers too I would give it a shot.

  Though,  most people use network printer from a disposable vm using a whole 
separate template.  cause printer drivers is untrusted.  first virus i ever got 
as a young child was from a printer driver disk straight from factory.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bcdd955c-72b1-4f87-a339-d72986443a2c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firewall Rules for Printer Access?

2016-12-22 Thread Franz
On Thu, Dec 22, 2016 at 8:48 PM, superlative 
wrote:

> On Sunday, December 18, 2016 at 9:18:53 PM UTC-8, Andrew David Wong wrote:
> > If it's a network printer, then you probably want to allow access to
> > whichever IP address it has on your local network, e.g., 192.168.1.102.
> >
> > - --
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
>
> It is a USB printer, not a network printer.


It is for something that everybody suppose it is a network printer. In fact
a network printer is the suggested way to use a printer in Qubes to avoid
all the problems with USB and VMs.

I had the same problem as yours and solved it buying for a few dollars a
network printer server, so converting an ordinary USB printer into a
network printer.
Best
Fran


> So I assume I don't need to mess with the firewall, and it should show up
> in the attach/detatch context menu on Qubes VM Manager. But it doesn't!
> What do I do if it doesn't show up there?
>
> I'd assume I need to install HPLIP package. But I'm not sure which
> template to install it on in order for the Qubes VM Manager to pick it up?
> In other words, what template does the Qubes VM Manager use?
>
> Thanks for everyone who responded to me.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/bda5ed4d-c584-473c-9039-fdfe8aa31eab%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCaCfu9HU8%2Bki1HtYBTcBV1iyXWtgha-s%3D%3DTYLnE%2BtO5Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Accidentally forgot to change the appvm template before remove fedora-23 template

2016-12-22 Thread 5o5pj7+c4pdg4dflo57o via qubes-users
Hi,

I accidentally forgot to change one appvm that still references the fedora-23, 
before running the "dnf remove qubes-template-fedora-23" which have removed the 
rpm.
After that I've erase all files under /var/lib/qubes/vm-templates/fedora-23 and 
also removed the corresponding entry from the /var/lib/qubes/qubes.xml however 
on the xfce menu the fedora-23 template still shows.
Can anyone tell me how to permanently delete the fedora-23 template by hand 
since the rpm was removed?

Thank you






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/829ee08f6a042a7c7fc48a1e337a6e3e7387%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firewall Rules for Printer Access?

2016-12-22 Thread superlative
On Sunday, December 18, 2016 at 9:18:53 PM UTC-8, Andrew David Wong wrote:
> If it's a network printer, then you probably want to allow access to
> whichever IP address it has on your local network, e.g., 192.168.1.102.
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org

It is a USB printer, not a network printer. So I assume I don't need to mess 
with the firewall, and it should show up in the attach/detatch context menu on 
Qubes VM Manager. But it doesn't! What do I do if it doesn't show up there?

I'd assume I need to install HPLIP package. But I'm not sure which template to 
install it on in order for the Qubes VM Manager to pick it up? In other words, 
what template does the Qubes VM Manager use?

Thanks for everyone who responded to me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bda5ed4d-c584-473c-9039-fdfe8aa31eab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] help updating dom0 - no network - stuck with lots of pending updates

2016-12-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Dec 22, 2016 at 08:40:02AM -0800, jasonwalshismyn...@gmail.com wrote:
> I was able to restore all VMs with this command :
> 
> "qvm-backup-restore -d sys-net --rename-conflicting /run/media/user/New\ 
> Volume/qubesbackup/qubes-2016-12-21T080046"
> 
> so now my (backed up) "debian-8" is "debian-81".  It had been updated.
> 
> some AppVMs start properly, others doesn't : with this error message :
> 
> "Error starting VM: Requested operation is not valid: PCI device 
> :00:19:.0 is in use by driver xenlight, domain sys-net"
> 
> Is there something to do to access those VMs ?

Check what netvm is set for those VMs. I guess currently you have two of
them: sys-net and (just restored) sys-net1. Choose which one you want to
use and remove the other.


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYXE9mAAoJENuP0xzK19cs0w0H/RowEeL3+27Z2dXBkjuHiXfh
JUeCXhJ67Ho7yLbtdYfwJSgSG3QJrApaKq+9FN/IJ6n6Qw64LC6ahHg4QHacUe4M
6yEXUTVUh5dTqhfq4hNxd69EfqlOq2BHTDDCwEe3ZI90AwARYATIvzO6t2+wY7EW
S6e3Zcbu6C9pw9+5t0VsnvClkwFgSDNbSnR6h0sIzo3EthN/y1w3jVdD+qc2VHUH
6/cGbnzBCEZbksspOU1/gZU7rk5fIpqZuQD48ADMwm8WB0AxVcgFT67gKJv62+5k
gQDYtIEXS4lxjiaib80p2KYzAGNQicuDM7P77tJYiLDepAJgTcsbM7B0CS3uYAg=
=ZCiV
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2016121046.GK1239%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Windows 10

2016-12-22 Thread stevenwinderlich
Am Mittwoch, 21. Dezember 2016 10:46:32 UTC+1 schrieb Fred:
> Sorry not trying to curse in public ;-)
> 
> But I wondered if Windows8+ support is still a long way off from being
> supported in Qubes? i.e. not a Qubes 4.0 possibility.


It is under development but nobody can really tell an ETA.
There can always be unforeseen issues along the way.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/415edfd1-80b7-4ee7-b547-1fcebeb2a122%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes as Server OS?

2016-12-22 Thread stevenwinderlich
I thought about the fact if its possible to use Qubes OS as a Server OS for 
example for shared hosting or for application servers,etc.

You could basically use Template VMs and start AppVMs running the needed 
softwares for example on a shared hosting system.

Would something in this direction even be possible and would any other use 
cases be possible too?

I guess its possible to use it as VM Host too?

Are you using Qubes OS internally in some way like for the web server or at the 
moment not? :D

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1e3e161e-a2db-41a9-88f8-e974a4aab055%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes on Lenovo Thinkpad X250 Issues

2016-12-22 Thread Thierry Laurion
Le mercredi 9 novembre 2016 07:43:28 UTC-5, Pablo Di Noto a écrit :
> > Bump. Its not Qubes specific. Same applies to latest Xen Hypervisor on 
> > Ubuntu 16.04.1.
> > 
> > Any idea what got introduced into Xen between 3.0 and 3.1?
> 
> I am using a X250 since last february (installed R3, updated to R3.1 and full 
> reinstall of R3.2).
> 
> No problems with booting so far.
> Let me know if you want to compare BIOS versions, config, etc.
> 
> Regards,
> ///Pablo

Yep I would like to, as I was able to use 3.1 with Legacy but can't boot 3.2.
Updated BIOS to 1.25, made sur vt-d and vt-x were activated.

It's an i7, if it changes anything. Attempting to add Xen hypervisor to Ubuntu 
results in the same behavior. Will attemtpt to find debugging arguments and 
setup AMT to have debug logs. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a01b957-53b1-4bc3-857d-b13d7c38e190%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] help updating dom0 - no network - stuck with lots of pending updates

2016-12-22 Thread jasonwalshismyname

> > Just one thing : I want to use my backed up "debian-8" TemplateVM, how can 
> > I replace the original "debian-8" ? I'm not able to delete it and as long 
> > as its there I won't be able to retore my backed up "debian-8" Template VM.
> 
> Command line version of restore tool (qvm-backup-restore) allow you to
> rename conflicting VMs (--rename-conflicting). The template will be
> restored under different name (with "1" at the end), then you can switch
> your VMs to that template. And after you switch all the VMs, you can
> remove old template, and possibly rename the restored one back to
> debian-8.

I was able to restore all VMs with this command :

"qvm-backup-restore -d sys-net --rename-conflicting /run/media/user/New\ 
Volume/qubesbackup/qubes-2016-12-21T080046"

so now my (backed up) "debian-8" is "debian-81".  It had been updated.

some AppVMs start properly, others doesn't : with this error message :

"Error starting VM: Requested operation is not valid: PCI device :00:19:.0 
is in use by driver xenlight, domain sys-net"

Is there something to do to access those VMs ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d93e36e8-6726-4c52-b6b3-ec5ad8922355%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to search, reinstall or remove qubes-templates installed via rpm?

2016-12-22 Thread J. Eppler

> > 1. How can I search for qubes-templates in dom0 rpm repository? The 
> > qubes-dom0-update tool excludes all templates from a search.
> > 
> 
> $ sudo qubes-dom0-update --action=search qubes-template
> 
> This will pass through the terminal output from the UpdateVM, so even
> though templates are excluded in the dom0 dnf command, you'll still get
> the search results (in red text by default).
> 
> Remember that you won't see community templates unless you enable their repo:
> 
> $ sudo qubes-dom0-update --enablerepo=qubes-templates-community 
> --action=search qubes-template

Reading red text is not a really good solution from an usability perspective. 
What are the reasons to exclude templates from a search in the first place?

> > 3. How can I remove qubes-templates which are installed from the dom0 rpm 
> > repo?
> > 
> 
> Make sure no TemplateBasedVMs are based on the template to be removed.
> Then, in dom0:
> 
> $ sudo dnf remove 

Thanks, that is a greate solution. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/211b1c05-3139-419c-8205-e05ada9d656b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Macbook Pro USB keyboard

2016-12-22 Thread Dave C
On Thursday, December 22, 2016 at 3:39:23 AM UTC-8, dumbcyber wrote:
> I'm very sorry to revive this thread. I've been trying to build another Qubes 
> environment on an SSD drive and have run into the same problem. I'm building 
> R3.2 for a Macbook Pro. I know Macbook's are not very well supported but I've 
> had my original Qubes environment running really well now for some time on 
> the Macbook Pro and want to move away from the USB stick to something more 
> long term.

My experience with Qubes on USB stick: I've had the USB become unresponsive, 
and hot to the touch.  I've had much better luck on a portable SSD.

I sometimes boot a mac to that SSD drive.  I find that holding the `option` key 
at boot time it is detected (labeled "Windows").  And I've had the same problem 
with the USB keyboard being unusable at boot time.

I work around that problem by preventing the hostonly optimizations in the 
initramfs.  In dom0, create a file /etc/dracut.conf.d/no-hostonly.conf, with 
this line:

hostonly="no"

Run `dracut -f` to build initramfs with the new configuration.  Then try 
booting on the mac.

This is what I stumbled upon.  While it works for the USB keyboard, it might 
have other consequences.  One that I know of is the booting on the mac includes 
a *really* long pause that I haven't figured out how to get rid of.  I read 
something once that made me believe it might be waiting for a PS/2 connection 
that doesn't exist.  Not sure, but would love help with that if anyone reading 
has any ideas.

The next hurdle you'll have with the macbook pro is getting broadcom wireless 
to work.  I've posted my experience there to 
https://groups.google.com/forum/#!msg/qubes-users/VVwWqvz5dX4/4byUgfp3EgAJ;context-place=forum/qubes-users

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb9bb588-3045-496d-b9af-2071728a2405%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] help updating dom0 - no network - stuck with lots of pending updates

2016-12-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Dec 22, 2016 at 06:03:06AM -0800, jasonwalshismyn...@gmail.com wrote:
> On Tuesday, December 20, 2016 at 5:56:40 PM UTC-5, raah...@gmail.com wrote:
> > On Tuesday, December 20, 2016 at 9:11:58 AM UTC-5, jasonwals...@gmail.com 
> > wrote:
> > > There is a typo in my last message but it was written as 
> > > "journald-dev-log" rather than "journal-dev-log".
> > > 
> > > Is there something to do with my problems with dom0 ?  At the bare 
> > > minimum I would like at least to recover my files from my VMs.
> > > 
> > > Thanks
> > 
> > I had similar probs.  clean install is way to go in future imo.  Backups 
> > restored no problems.  Only tip is if you make alot of changes to the 
> > default templates.  clone them instead and use the clone for your vms,  to 
> > ensure they get restored properly when backed up.  But appvms should be no 
> > probs.
> 
> Luckily, I was able to backup all my VMs from the state my computer was.
> 
> I did a clean install, now Qubes work as it should.

Glad to hear that :)

> Just one thing : I want to use my backed up "debian-8" TemplateVM, how can I 
> replace the original "debian-8" ? I'm not able to delete it and as long as 
> its there I won't be able to retore my backed up "debian-8" Template VM.

Command line version of restore tool (qvm-backup-restore) allow you to
rename conflicting VMs (--rename-conflicting). The template will be
restored under different name (with "1" at the end), then you can switch
your VMs to that template. And after you switch all the VMs, you can
remove old template, and possibly rename the restored one back to
debian-8.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYW93FAAoJENuP0xzK19csBAsH/1NeF4yUS64awIVO7Ompaffz
3MGhXe/Albnwfc9bMJe0Cc3XkXWp/XOWZfURKvndXecku4N/QFcNxxbT+APDb8SN
ZddlxIO/CR8ch2Y1XhGYp41+LLv9yriBOaeWkMbGSdlEUdJ7Hhx1HPMjkbh8FyBk
NsiVb4qovC2MMXinbsDdAiYxfLFrmBZ/CGb1/p6O5K/9zU6NcujkfLWSeFjkWjJC
OgT+Nx6iFWTFAKAkbdGL2bQfe74WDHOs3g8e58po3OmW2eISjCJz1Ijbbc+apnfy
vm+5ZUYlcEvNenMwUEEzxuZ8ljY9dgul2ilATO0qw2YQGHvFI+fIHPktGBDM76A=
=y9Tj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161222140600.GH1239%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] help updating dom0 - no network - stuck with lots of pending updates

2016-12-22 Thread jasonwalshismyname
On Tuesday, December 20, 2016 at 5:56:40 PM UTC-5, raah...@gmail.com wrote:
> On Tuesday, December 20, 2016 at 9:11:58 AM UTC-5, jasonwals...@gmail.com 
> wrote:
> > There is a typo in my last message but it was written as "journald-dev-log" 
> > rather than "journal-dev-log".
> > 
> > Is there something to do with my problems with dom0 ?  At the bare minimum 
> > I would like at least to recover my files from my VMs.
> > 
> > Thanks
> 
> I had similar probs.  clean install is way to go in future imo.  Backups 
> restored no problems.  Only tip is if you make alot of changes to the default 
> templates.  clone them instead and use the clone for your vms,  to ensure 
> they get restored properly when backed up.  But appvms should be no probs.

Luckily, I was able to backup all my VMs from the state my computer was.

I did a clean install, now Qubes work as it should.

Just one thing : I want to use my backed up "debian-8" TemplateVM, how can I 
replace the original "debian-8" ? I'm not able to delete it and as long as its 
there I won't be able to retore my backed up "debian-8" Template VM.

All my appVMs restored without problems.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ebf2779-5983-4525-a53d-f47449018dde%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Thoughts on Qubes OS Security... Could be improved.

2016-12-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Dec 22, 2016 at 05:16:15AM -0800, Grzesiek Chodzicki wrote:
> W dniu poniedziałek, 14 listopada 2016 21:25:32 UTC+1 użytkownik Marek 
> Marczykowski-Górecki napisał:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On Mon, Nov 14, 2016 at 02:44:40AM -0800, Sec Tester wrote:
> > > > 
> > > > Why not grsecurity/PaX? especially with Qubes 4 switching to HVM (or 
> > > > PVHv2 or whatever it's called now), it will apparently work fine.
> > > 
> > > Nice suggestion. I would certainly welcome its implementation.
> > > 
> > > Actually looks like there were successful efforts to implement this back 
> > > in 2013. 
> > > 
> > > https://groups.google.com/forum/#!topic/qubes-devel/l5mi2dklu18
> > > 
> > > Seriously, why didnt qubes pick this up and run with it?
> > 
> > There is ongoing work on this:
> > https://github.com/coldhakca/coldkernel/issues/35
> 
> Will Qubes ship with coldkernel once dom0 and Fedora integration is done or 
> will it remain an optional feature?

It hasn't been decided yet, but most likely it will be shipped by
default.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYW9sNAAoJENuP0xzK19csyWAIAI2evlTzytzXx+EO7P8eKScG
WuSgLRbOy7PcaGn+t0Tgh91mnXr60Jfdy2kkeCV2bsVaU/3aS29EfAcPFKAwxfVd
SVZtI+j0ln6Ct3QPVOzYlXVJHAj8cANVy/uYHsl85Ax1j0w1YRaZx9NInZorky7l
17WBXUvs/SBajMTNvkJf+8W8mdTI9yOZ8nwEWYLJ8AKamGdS2ttBNFyjB6eSJkup
PtoP2/6XJqGKbA6BChWgKFNrJKVoFoFJWM/Vlf9TTG2+JXC7a+nNyMO7nz/3zCfA
hDc1hwThNmkBIvjVQEsg3i23+dZcQo1yhdopruItNlz4kAe+M81PXe51DphOKV4=
=sYtJ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161222135423.GG1239%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Thoughts on Qubes OS Security... Could be improved.

2016-12-22 Thread Grzesiek Chodzicki
W dniu poniedziałek, 14 listopada 2016 21:25:32 UTC+1 użytkownik Marek 
Marczykowski-Górecki napisał:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Mon, Nov 14, 2016 at 02:44:40AM -0800, Sec Tester wrote:
> > > 
> > > Why not grsecurity/PaX? especially with Qubes 4 switching to HVM (or 
> > > PVHv2 or whatever it's called now), it will apparently work fine.
> > 
> > Nice suggestion. I would certainly welcome its implementation.
> > 
> > Actually looks like there were successful efforts to implement this back in 
> > 2013. 
> > 
> > https://groups.google.com/forum/#!topic/qubes-devel/l5mi2dklu18
> > 
> > Seriously, why didnt qubes pick this up and run with it?
> 
> There is ongoing work on this:
> https://github.com/coldhakca/coldkernel/issues/35
> 
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJYKh22AAoJENuP0xzK19csUgMIAIzixUMxjLEhbFiCvWC4lzCV
> AxXqrX9bt43xyA6dQja6v4xwXJgR1V7XocwNfcQYhba8sl3c26KTVCZ5c3nqYkf4
> 5hISr04mzqvAlQZqpsDV892l4Z9sWmdkNOqrYhW62hVMJ0aDLm3/PR0MFjHtHyrN
> 0S7X3GqM4fPQhfHgxI7sW1Ox+qVecL+9jlaZcZcxQ/E6dLkmsYIzWlQTtRCLD/Ma
> Bj4vaXydJSwNOA+hH0vgzhFWjPNepyRJhONj7g5rzoOb54GRr1XngaMRcamRBSXN
> gMwnWhE9HwNh8f/53OgjDWATp+DjYjAfJm1dmsqEC0sXGcHiD4Yf0b5iN9zDW7U=
> =EEHE
> -END PGP SIGNATURE-

Will Qubes ship with coldkernel once dom0 and Fedora integration is done or 
will it remain an optional feature?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb1bd652-09a8-49ba-8bbe-7d4c7c079b8d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Macbook Pro USB keyboard

2016-12-22 Thread dumbcyber
I'm very sorry to revive this thread. I've been trying to build another Qubes 
environment on an SSD drive and have run into the same problem. I'm building 
R3.2 for a Macbook Pro. I know Macbook's are not very well supported but I've 
had my original Qubes environment running really well now for some time on the 
Macbook Pro and want to move away from the USB stick to something more long 
term.

I've built a new Qubes on an SSD which boots fine on the Macbook Pro but the 
keyboard does not work. I've completed the installation making sure the sys-usb 
option is not checked, and there is no rd.qubes.hide_all_usb parameter on any 
kernel lines in xen.cfg.  The same SSD boots and keyboard works fine on a 
Lenovo X1 (if I add the mapbs and noexitboot params).

Any help is much appreciated again!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4238c592-6744-41a2-8365-c5cd4db351e4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fedora 23 EOL December 20; Update Your Templates!

2016-12-22 Thread Chris Laprise

On 12/22/2016 01:11 AM, Andrew David Wong wrote:


Thanks. Just reclaimed 125 GB in a three-year-old StandaloneVM. ^_^

For others, the command I used (in the StandaloneVM):

 $ sudo fstrim -v -a



You use big drives. :)

The 'discard' option can also be added in /etc/fstab so that root 
auto-trims like /rw.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0316ca46-90d1-abb7-aa8d-e8ecdc56615e%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.