[qubes-users] How to autorun startup script on login/reboot in dom0 with i3wm?

2017-01-12 Thread John Smith
I just installed i3wm and it switches my 2 displays from extended to mirrored. 
In effort to fix this, I wrote a simple script called rc.local containing the 
following commands:

xrandr --output DP-1 --auto
xrandr --output VGA-1 --right-of DP-1
xrandr --output VGA-1 --mode 1920x1080

The script works fine when I execute it manually from the terminal (I've 
already done chmod+x). However, at the end of my /etc/i3/config file i added 
the line:

exec /etc/rc.local

I added this line to automatically run the script when i reboot my computer but 
for some reason it doesn't work. I've tried it with single and double quotes as 
well as exec_always and --no-startup-id but nothing seems to work. Any ideas 
how I can get this working? I've also tried putting the commands directly into 
the config without calling the script but that didn't work either. Even echo 
test >> /tmp/testfile didn't output anything. Any ideas would be much 
appreciated, thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b44ebe1a-19cc-4ac7-a37b-679418280f88%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Windows 7 VM - Direct access to Hard Drives to flash SSD firmware

2017-01-12 Thread Steve
On Friday, January 13, 2017 at 7:15:41 AM UTC+4, tai...@gmx.com wrote:
> On 01/12/2017 07:52 AM, Steve wrote:
> 
> > I need to run Samsung Magician software in Windows to flash the firmware of 
> > the SSD's I put in the laptop, is there any special way I need to setup the 
> > Windows VM to give direct access to the firmware
> >
> You would have to attach to the VM with IOMMU the storage controller 
> that the drive is connected to,
> 
> Obviously you can't do that if you are also using this controller for 
> your OS, without some ramdisk magic which is possible with some effort 
> but if you have the money it would be cheaper to simply buy an 
> Expresscard controller that supports SATA (fyi SAS almost always 
> includes SATA)
> 
> In the future don't buy crappy consumer level devices that only provide 
> a windows flashing utility.

Thank you for the ExpressCard suggestion, that is possible. I also have two 
internal mSata slots and will check whether they are on a different controller 
than the main SATA

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3d8e2a25-4adb-4f13-9684-2e2fc2d0b04d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: KDE - Cube desktop query

2017-01-12 Thread Steve
On Friday, January 13, 2017 at 7:58:04 AM UTC+4, Steve wrote:
> On Friday, January 13, 2017 at 7:28:31 AM UTC+4, tai...@gmx.com wrote:
> > On 01/12/2017 07:49 AM, Steve wrote:
> > 
> > > On Thursday, January 12, 2017 at 2:15:57 PM UTC+4, Steve wrote:
> > >> I have installed Qubes 3.2 and changed the desktop manager to KDE , 
> > >> specifically to get the Cube desktop.
> > >>
> > >> I have gone into the KDE settings and enabled the cube effect however I 
> > >> can;t get it to appear, any suggestions
> > >>
> > >> thx
> > > I am using an Nvidia graphics card , do I need to install the nvidia 
> > > graphics driver to get the "cube" to animate ? thx
> > >
> > You do if it isn't supported by nouveau 3D mode, most of the newer 
> > nvidia devices make open source drivers like nouveau impossible...
> > 
> > Nvidia is a shitty company to buy from if you want stuff to work the 
> > first time and all the time,  as they deliberately break linux features 
> > to try and force people to use windows or buy a card from their 
> > overpriced quadro line.
> 
> I am fortunate to have a NVIDIA Quadro K5000M with 4 GB dedicated GDDR5 video 
> memory which is supported by SuSE Linux Enterprise Desktop 11 & Red Hat 
> Enterprise Linux 6.x so I'm assuming I can get drivers that work with Qubes 
> (Fedora).
> 
> I did lspci and found that I am running VGA compatible controller: NVIDIA 
> Corporation GK104GLM (Quadro K5000M) 
> 
> Do I need to change this driver to get the KDE Cube working ?

I should have researched more before posting ! I have now found out that the 
Nouveau drivers do not support this particular Nvidia card. I did however, find 
a specific NVIDIA driver that does and I guess provides the necessary 3D 
capability. I will research how to install in Qubes and report back at some 
point 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7850325d-44c6-4fb2-8dd3-0ccce3de26c5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: KDE - Cube desktop query

2017-01-12 Thread taii...@gmx.com

On 01/12/2017 07:49 AM, Steve wrote:


On Thursday, January 12, 2017 at 2:15:57 PM UTC+4, Steve wrote:

I have installed Qubes 3.2 and changed the desktop manager to KDE , 
specifically to get the Cube desktop.

I have gone into the KDE settings and enabled the cube effect however I can;t 
get it to appear, any suggestions

thx

I am using an Nvidia graphics card , do I need to install the nvidia graphics driver to 
get the "cube" to animate ? thx

You do if it isn't supported by nouveau 3D mode, most of the newer 
nvidia devices make open source drivers like nouveau impossible...


Nvidia is a shitty company to buy from if you want stuff to work the 
first time and all the time,  as they deliberately break linux features 
to try and force people to use windows or buy a card from their 
overpriced quadro line.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c576dc02-4f80-d5a0-51ff-0eed7f5fc690%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Setup for Graphic Design work / Failing to configure a PCI pasthrough on Archlinux

2017-01-12 Thread taii...@gmx.com

On 01/12/2017 06:50 AM, joseph.yeng...@gmail.com wrote:


Have you ran the HCL tools?

No, where do can I find it? I comes installed with Qubes 3.2? I went through 
the system requirements and recommendations 
(https://www.qubes-os.org/doc/system-requirements/), they all check.
ok open a terminal in dom0 and type qubes-hcl-report press enter and 
then paste the result after maybe removing any serial numbers if you 
don't like to share them.



Does your chipset support IOMMU? (inspiron
is a garbage consumer level device so probably not)

Yes, It's compatible with Intel VT-d. I believe that's it for IOMMU... or am I 
missing something?
Maybe the chipset theoretically is but your laptop? you still have not 
ran the HCL nor checked the bios to see if IOMMU is supported (intel 
calls it VT-d)
Consumer level computers don't bother to properly implement this 99% of 
the time.



Graphics device assignment is an experimental feature, it doesn't work
all of the time and you can only (easily) assign a secondary graphics
device that isn't in use. I assume you tried to assign your primary
video adapter...
It will only work with HVM.

So you suggest that I assign the GPU to an HVM version of Archlinux instead of 
an AppVM version of it?
Yeah you can try, but maybe you would have better luck not using qubes 
for this.
Either way you must look up a tutorial "iommu vt-d graphics qubes xen", 
it isn't plug and play just yet so you have to configure some obscure 
options.
  

If you want more than one video device on a laptop you can try an
external pci-e device, they connect via various interfaces including
expresscard.

Assigning a USB controller (all of it) doesn't involve emulation, any
usb device will work as long as the guest supports it just like on bare
metal.

I play the latest games in a virtual machine with an attached graphics
card on QEMU, I will be happy to help if you have any further questions

Then I must thank you for your patience, because I don't think I got this part. 
XD How would this PCI-e and expresscard business be helpful? If Assigning a USB 
controller doesn't involve emulation, does it mean that it shouldn't cause any 
problems when assigning it to the Archlinux appVM? Because if I only assign the 
USB controller to the Archlinux AppVM, it still locks any new initialization of 
VMs. How would I go about using QEMU to run Adobe CC software?
You are assigning the controller that is in use for your hypervisor, it 
doesn't let you do this because either it is already assigned to a 
usb-VM or as a built in safety feature to prevent you from locking 
yourself out of controlling the hypervisor.


You can only assign secondary devices without significant effort.

You can't assign a primary video device without pain, so getting an 
external expresscard to pci-e slot would let you pop in another graphics 
device and assign that instead.


There are many tutorials as to how to do that, maybe google "kvm qemu 
gaming"



It is what you should do if you want this and it is more secure than
bare metal or emulation if you follow the above.

Using it with qubes is difficult but some users have reported success,
maybe better to use another distro with xen or qemu if you want this.

Where were these successes reported?

 If you google "qubes vt-d graphics" you can find them.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa1aa0c2-92dd-68a0-c085-5447993dcc33%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: VM chaining visualisation tool

2017-01-12 Thread Drew White
On Friday, 13 January 2017 09:58:45 UTC+11, Andrew  wrote:
> Jean-Philippe Ouellet:
> > See this thread: 
> > https://groups.google.com/forum/#!topic/qubes-devel/64-WJIMY18A
> > 
> > Implementation linked in last post:
> > https://gist.github.com/Zrubi/6229d5400bde987b1aa8da516553b909
> > 
> > Render result w/ graphviz.
> > 
> 
> See also this script I wrote:
> https://github.com/kbrn/qubes-app-print-vm-status
> 
> Screenshot on my current system attached (with some redactions, of course).
> 
> Andrew

Hi Andrew,

Nice little script.
Any chance you can give it option to set the colour as text colour instead of 
background colour?
Very hard on the eyes with coloured background. I think that coloured text 
would be more beneficial, but that's just my personal opinion, but it would be 
nice.

Sincerely,
Drew.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23fcd834-e143-407a-8f0d-c0cba0076741%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] New Lenovo laptops: X1 (4th Gen), T460/p, and T560

2017-01-12 Thread Ángel
sbore...@gmail.com wrote:
> Thus, is there a (documented) way to add a newer kernel to the 3.2 install 
> image? I'd rather avoid taking the SSD out and install qubes in my older
> machine.
> 
> Thanks in advance,
> 
> Stefan

For booting the install or for being installed?

I expect that changing the kernel being used during the install should
be as simple as replacing the isolinux/vmlinuz* / EFI/BOOT/vmlinuz plus
initrd in the install media.

Changing the kernel that is getting installed may be harder, although it
can surely be inserted into Packages/ but anyway you could drop the
right file into the boot partition just until you get to install it
correctly.

Make sure you only replace them with a trusted binary, though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1484264579.1203.10.camel%4016bits.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Query - Why unable to clone net-sys VM ?

2017-01-12 Thread Ángel
Steve wrote:
> my default net-sys includes both Ethernet and Wifi. I wanted to split them 
> out into 
> net-sys-eth and 
> net-sys-wifi
> 
> each with the appropriate PCI device. I tried to clone the net-sys but it is 
> greyed out and I was wondering why 
> 

Probably because it is running. Stop the VM before attempting to clone it.
Also, you will need to remove one of the pci devices while it is
stopped, as those cannot be edited while it is running (nor can you
attach the same pci to two VMs).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1484263774.1203.6.camel%4016bits.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM does not work anymore

2017-01-12 Thread Ángel
mittend...@digitrace.de wrote:
> Hey there,
> 
> today I noticed that my dispVM is no longer working (not in Dom0 and not
> in AppVMs). There is the notification that the DispVM starts, but
> nothing shows up.
> If I start the internal fedora-23-dvm I boots up without any problems
> and also allows me to start tools (e.g. Firefox)
> 
> any idea what is wrong?
> 
> Thanks

I suspect you too may be suffering
https://github.com/QubesOS/qubes-issues/issues/2182

Look at /var/log/libvirt/libxl/libxl-driver.log and see if there is a
line like 
 xc: error: X86_PV_VCPU_MSRS record truncated: length 8, min 9: Internal
error

The reason that directly booting the dvn works is that the problem lies
in restoring the savefile (and the buggy creation of it).

There are some patches fixing it, but you would need to recompile xen :/

Best regards



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1484263628.1203.4.camel%4016bits.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Windows 7 VM - Direct access to Hard Drives to flash SSD firmware

2017-01-12 Thread Ángel
Steve wrote
> I need to run Samsung Magician software in Windows to flash the firmware of 
> the SSD's I put in the laptop, is there any special way I need to setup the 
> Windows VM to give direct access to the firmware
> 

I don't think that is going to work at all. If you really need to do
that, I would install Windows 7 in a different partition/disk, boot from
that, and flash the firmware from there.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1484263410.1203.1.camel%4016bits.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Use an remote PULSE Audio server

2017-01-12 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jan 09, 2017 at 10:11:18AM +0100, Robert Mittendorf wrote:
> Hey fellow Qubes-Users,
> 
> I want to use an remote PULSE audio server to playback sound output. The
> server side is up & running. The connecting AppVM is based on the
> debian-8 template
> 
> Standard auto-discover does not work, probably because the AppVM tries
> to locate the remote server in the virtual internal networks of my Qubes OS.
> I tried to use a tunnel in /etc/pulse/default.pa:
> load-module module-tunnel-sink-new server=%SERVER_IP% sink_name=Remote
> channels=2 rate=44100
> 
> I noticed that Qubes itself uses PULSE audio.
> When I boot a VM, there is a Qubes VSINK device, but no tunnel.
> If I restart PULSE audio
> pulseaudio -k
> pulseaudio --start
> that device is gone, but the tunnel is shown.
> 
> Even though the tunnel is shown, I cannot playback sound using it.

This is probably some network related problem. Check pulseaudio logs
(probably just `journalctl`).

> I would like to have both devices (Qubes VSINK and the remote PULSE
> server) to choose from in pavucontrol
> 
> Questions
> 1) What does Qubes do in order to show/connect to the VSINK? Is there a
> different config file which is loaded when an AppVM boots?

Yes, the default pulseaudio instance is started with
/etc/pulse/qubes-default.pa as config. It's done with this script:
start-pulseaudio-with-vchan

> 2) Is a tunnel the right/best option to connect to the remote PULSE
> audio server?

I haven't used that module, but I think you can try to load it
dynamically using pactl, instead of restarting pulseaudio with modified
config.

> 3) Is it a bug that a restart of pulseaudio does remove/not reconnect to
> Qubes VSINK?

Depends on what you want to accomplish ;)

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYeAhDAAoJENuP0xzK19csLI0H/A+0EZJml4OeTOEf9isHMvMe
Co26GY6PaNcrSOQeGK62DB/A82XvlJFetAAQGyEQKfABZC0nFazmzD1U+gxcH9BW
idKtt/TXvcqcYlhGjoh2bj/BZv8WYiYVXyt02ikRy8qjKOSOozy8A1lSirBEbSsi
GlRDPV6kgAt8OzjojOesloqmZ3N4aiDrif6TpsNhJ3l1UIfI+LA+r5HODWza9SYD
hjEjNlqwpnTNQT/niolJR9z2pnu21vw8OmZcXfFqMJtTivXxLNbGqBqgronQS2oW
aqgtbnMZA1NpqmUr2XwNemk4LHi+YVR6Exhg29nO/uKoBR7F1/qArubrc48W0gk=
=bIzY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170112225043.GB17864%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Resolution Issues In Qubes

2017-01-12 Thread Cameron
I'm new to Qubes so please forgive me if I'm asking an obvious question. I 
finished installing Qubes 3.1 to an external hard disk and am having a 
difficult time getting Qubes to run at 1920x1080. Currently the only options I 
have are 1024X768. From my research in the backlogs of the mailing list I'm 
thinking it might be a driver issue. I have an AMD R9 380 installed and no 
integrated gpu to fall back on. I've seen lots in the back logs about 
installing NVIDIA drivers but not so much on AMD. I'd appreciate any tips 
anyone has for me.

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd10d777-a095-4235-8996-397c566caf3a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Use an remote PULSE Audio server

2017-01-12 Thread Torsten Grote
On 01/12/2017 11:56 AM, Robert Mittendorf wrote:
> I do not define the sink parameter, maybe that is the problem?
> I expect that "sink" is the local name of the sink at the server?
> how is thet defined in /etc/oulse/default.pa on server side?

It is not defined on the server side at all. But you need to load the
'module-native-protocol-tcp' module on the server side.

Also on the server, you can list your existing sinks like this and get
the name to specify on the client side:

$ pactl list sinks

My Bluetooth speaker is added there automatically whenever I turn it on.

Kind Regards,
Torsten

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92286276-405f-9135-9f7f-73963dad5dfe%40grobox.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Bad GPG sig on R3.2 release

2017-01-12 Thread jordan . rickman . 42
Okay, nevermind, I got it verified from the command line. Thanks guys!

I am using GPG Tools for Mac, and I think its "Verify" command from the Finder 
context menu tried to parse the digests file as a list of signatures - the 
output looks like it was verifying the ISO, not the digests file itself.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87c1f7a0-0390-4c71-b0b5-970acdc7048b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: IPv6 connectivity and qubes proxy VM

2017-01-12 Thread daltong defourne
On Thursday, January 12, 2017 at 6:47:00 PM UTC+3, daltong defourne wrote:
> Hi!
> I've created a VPN proxyvm (debian-8 based) according to existing 
> documentation (more or less - I'm using the VPN provider's standalone client 
> because, in a VM, why not?)
> 
> For IPv4 it works flawlessly.
> 
> For IPv6 it does not work at all for the VMs "behind" the proxyvm (VPN's IPv6 
> support works for a browser launched within proxyvm itself, but any VM behind 
> the proxyvm can only use IPv4)
> 
> what's up?
> Can it be helped?

Found this commit.
https://github.com/marmarek/qubes-core-agent-linux/commit/789eb511266d9e8bd812e40f952ec2bce6d7a414

Managed to activate the qubes-ipv6 service (worked!) on the appvm, the 
firewallvm before the proxyvm, and the proxyvm.

No budge, IPv6 still missing in action :(

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90c3fd3a-673d-43f2-8451-f8ad1655e927%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Prob installing VLC in Fedora24 Template

2017-01-12 Thread Arnulf Maria Bultmann
When I try to install vlc als described in the faq and elsewhere I get this 
error:

Downloading Packages:
(1/60): aalib-libs-1.4.0-0.29.rc5.fc24.x86_64.r 126 kB/s |  70 kB 00:00
[MIRROR] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: Interrupted by header 
callback: Server reports Content-Length: 15400 but expected size is: 1605926
[FAILED] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: No more mirrors to 
try - All mirrors were already tried without success
(3-4/60): libcaca-0.  5% [=   ] 708 kB/s | 1.6 MB 00:37 ETA
The downloaded packages were saved in cache until the next successful 
transaction.
You can remove cached packages by executing 'dnf clean packages'.
Error: Error downloading packages:
  Cannot download vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: All mirrors 
were tried

I tried it several times and got always the same error.

Procedure:
sudo dnf upgrade --refresh
sudo dnf install vlc

Any advice?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/091aaec2-4600-4954-bc45-1ec3c57acae8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?

2017-01-12 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Marek Marczykowski-Górecki:
> Rusty, Matt rightly just pointed out to Qubes Security Team that the
> current behaviour of AEM could be misleading. AEM should refuse to work
> if TXT isn't really working - otherwise it's easy to not notice it and
> have false sense of security.

Thanks for CCing, I agree:
https://github.com/QubesOS/qubes-issues/issues/2569#issuecomment-272235227

Rusty
-BEGIN PGP SIGNATURE-
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=SA4W
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170112180152.GA1242%40mutt.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] IPv6 connectivity and qubes proxy VM

2017-01-12 Thread daltong defourne
Hi!
I've created a VPN proxyvm (debian-8 based) according to existing documentation 
(more or less - I'm using the VPN provider's standalone client because, in a 
VM, why not?)

For IPv4 it works flawlessly.

For IPv6 it does not work at all for the VMs "behind" the proxyvm (VPN's IPv6 
support works for a browser launched within proxyvm itself, but any VM behind 
the proxyvm can only use IPv4)

what's up?
Can it be helped?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5733982e-d4da-41a7-ae3a-fce858b0d47f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?

2017-01-12 Thread Matt McCutchen
To the original point of this thread (figuring out /why/ the measured
boot isn't working):

The way I found to do this is to configure tboot to log to the screen
by setting (for example) "logging=vga vga_delay=10" on the "multiboot
/tboot.gz" line in grub.cfg.  The Qubes default setting is
"logging=memory,serial", but I don't have a serial console on hand and
I couldn't find an obvious way to retrieve the "logging=memory" data
from within Qubes.  (The "txt-stat" tool doesn't show anything;
possibly it would work if I were booting Linux without Xen.)

The relevant part of the log for my Lenovo ThinkPad L430:

...
TBOOT: IA32_FEATURE_CONTROL_MSR: 0005
TBOOT: CPU is SMX_capable
TBOOT: ERR: SENTER disabled by feature control MSR (5)
TBOOT: SMX not supported.
...

Matt

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1484235497.1680.11.camel%40mattmccutchen.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?

2017-01-12 Thread Swâmi Petaramesh
On 01/12/2017 03:51 PM, Matt McCutchen wrote:
> On Thu, 2017-01-12 at 13:42 +0100, Marek Marczykowski-Górecki wrote:
>> On Thu, Dec 01, 2016 at 04:32:50PM +0100, Swâmi Petaramesh wrote:
>>> Hi Rusty Bird, and thanks for your help,
>>>
>>> Please see below.
>>>
 Is the SINIT module working? Run the "find" command from step 2b of
 /usr/share/doc/anti-evil-maid/README, but look at the lines for PCRs
 17, 18, and 19 instead: They should have very random-looking values.
>>> Uh... Lines 17-19 are all FF
>>>
>>> On my system :
>>>
> PCR-00 to 07  look random
> PCR-08 to 12  are all 00
> PCR-13looks random
> PCR-14 to 16  are all 00
> PCR-17 to 22  are all FF
> PCR-23are all 00
>>> So the problem seems to be there... But I don't know what to do with
>>> this (I know almost nothing about TPM...)
>> Rusty, Matt rightly just pointed out to Qubes Security Team that the
>> current behaviour of AEM could be misleading. AEM should refuse to work
>> if TXT isn't really working - otherwise it's easy to not notice it and
>> have false sense of security.
> Thanks marmarek for pointing me to the existing thread.  My search was
> not good enough. :(
>
> I filed https://github.com/QubesOS/qubes-issues/issues/2569 to help
> make sure we don't forget about this.
>
> Matt

Hi Matt, Marek and all,

Thanks for coming back on this.

I have personally uninstalled AEM from both of my HP systems as I
realized it wasn't actually working AND anyway gave me this false sense
of security - plus the fact that installing an SSD cache on one of the
machines broke it completely dead (AEM exiting to initramfs, complaining
that it found the root fs "unexpectedly unencrypted").

For the record, it is broken on :

- HP EliteBook 820 G1 (Intel 4th gen Core i5)

- HP Probook 6470B 5 (Intel 3rd gen Core i5)

...Both using the correct SINIT module as far as I can tell.

...Both showing the symptoms described above (PCR-17 to 22 staying
desperately FF)

Also, I understood (at least I think I understood...) from tboot
documentation (which I believe AEM uses) that it works only for systems
that have iommu, which is the case for my HP EliteBook 820 but
apparently not for my Probook 6470B (too bad I bought this machine with
the idea of using it in the future with Qubes 4.0, but it seems it won't
be compatible).

Currently AEM doesn't complain if iommu is unavailable. tboot README
advises to boot Xen with "iommu=required", but AEM seems not to set this
up this way...

Best regards.

ॐ

-- Swâmi Petaramesh  PGP 9076E32E

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4b6c557-824c-b1a6-318f-90f944803819%40petaramesh.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Query - Why unable to clone net-sys VM ?

2017-01-12 Thread Steve
my default net-sys includes both Ethernet and Wifi. I wanted to split them out 
into 
net-sys-eth and 
net-sys-wifi

each with the appropriate PCI device. I tried to clone the net-sys but it is 
greyed out and I was wondering why 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c4b717f-397d-4fd6-918a-5a3d1d850ebd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Installing using pacman command

2017-01-12 Thread joseph . yenglin
On Thursday, January 12, 2017 at 2:18:08 PM UTC, tezeb wrote:
> On 01/12/17 15:14, joseph.yeng...@gmail.com wrote:
> > I forgot to add, but I've modified the pacman.conf as specified in the 
> > Qubes documentation for the creation of an Archlinux Template VM.
> > 
> 
> Are you running it in TemplateVM or AppVM?
> Do you allow it to connect via update proxy? (Firewall Rules->Allow
> connection to Updates Proxy)?

Template VM. Yes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c19401c4-0015-4593-88ee-7c200481325f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?

2017-01-12 Thread Matt McCutchen
On Thu, 2017-01-12 at 13:42 +0100, Marek Marczykowski-Górecki wrote:
> On Thu, Dec 01, 2016 at 04:32:50PM +0100, Swâmi Petaramesh wrote:
> > Hi Rusty Bird, and thanks for your help,
> > 
> > Please see below.
> > 
> > > 
> > > Is the SINIT module working? Run the "find" command from step 2b of
> > > /usr/share/doc/anti-evil-maid/README, but look at the lines for PCRs
> > > 17, 18, and 19 instead: They should have very random-looking values.
> > 
> > Uh... Lines 17-19 are all FF
> > 
> > On my system :
> > 
> > > > PCR-00 to 07look random
> > > > PCR-08 to 12are all 00
> > > > PCR-13  looks random
> > > > PCR-14 to 16are all 00
> > > > PCR-17 to 22are all FF
> > > > PCR-23  are all 00
> > 
> > So the problem seems to be there... But I don't know what to do with
> > this (I know almost nothing about TPM...)
> 
> Rusty, Matt rightly just pointed out to Qubes Security Team that the
> current behaviour of AEM could be misleading. AEM should refuse to work
> if TXT isn't really working - otherwise it's easy to not notice it and
> have false sense of security.

Thanks marmarek for pointing me to the existing thread.  My search was
not good enough. :(

I filed https://github.com/QubesOS/qubes-issues/issues/2569 to help
make sure we don't forget about this.

Matt

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1484232704.1680.6.camel%40mattmccutchen.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing using pacman command

2017-01-12 Thread joseph . yenglin
Temporarily disabled the firework. Different error:

:: Synchronizing package databases...
 core is up to date
 extra is up to date
 community is up to date
 multilib is up to date
:: Starting full system upgrade...
resolving dependencies...
:: There are 4 providers available for lib32-libgl:
:: Repository multilib
   1) lib32-mesa-libgl  2) lib32-nvidia-304xx-libgl
   3) lib32-nvidia-340xx-libgl  4) lib32-nvidia-libgl

Enter a number (default=1): 1
looking for conflicting packages...
:: xorg-server and xf86-input-joystick are in conflict (X-ABI-XINPUT_VERSION). 
Remove xf86-input-joystick? [y/N] y
error: failed to prepare transaction (could not satisfy dependencies)
:: qubes-vm-gui: installing xorg-server (1.19.1-1) breaks dependency 
'xorg-server<1.19.0'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8868a414-7464-448e-84d2-8afad19dd924%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Installing using pacman command

2017-01-12 Thread tezeb
On 01/12/17 15:14, joseph.yeng...@gmail.com wrote:
> I forgot to add, but I've modified the pacman.conf as specified in the Qubes 
> documentation for the creation of an Archlinux Template VM.
> 

Are you running it in TemplateVM or AppVM?
Do you allow it to connect via update proxy? (Firewall Rules->Allow
connection to Updates Proxy)?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/613d1e9e-0616-3e53-d41d-a21e33bca924%40outoftheblue.pl.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Re: Installing using pacman command

2017-01-12 Thread joseph . yenglin
I forgot to add, but I've modified the pacman.conf as specified in the Qubes 
documentation for the creation of an Archlinux Template VM.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b1f06c2-a68c-40c3-ad39-76c20fe8758e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] DispVM does not work anymore

2017-01-12 Thread mittendorf
Hey there,

today I noticed that my dispVM is no longer working (not in Dom0 and not
in AppVMs). There is the notification that the DispVM starts, but
nothing shows up.
If I start the internal fedora-23-dvm I boots up without any problems
and also allows me to start tools (e.g. Firefox)

any idea what is wrong?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b05594d-f20f-e818-1827-ed2f378f9d37%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Use an remote PULSE Audio server

2017-01-12 Thread Robert Mittendorf
Am 01/12/2017 um 02:25 PM schrieb Torsten Grote:
> On 01/12/2017 08:37 AM, Robert Mittendorf wrote:
>> Now I have the tunnel enabled when I start the AppVM - but it is still
>> not working (the "current volume" bar right above the greyed-out
>> "Advanced" is missing for the tunnel as well..
> That's strange it is working for me.
>
> This is what I have in my rc.local:
>
> echo "load-module module-tunnel-sink-new server=192.168.1.2
> sink_name=Test sink=bluez_sink.XX_XX_XX_XX_XX_XX" >>
> /etc/pulse/qubes-default.pa
>
> However, the issue I have is that this sink disappears from time to time
> which might be related to the fact that this Bluetooth speaker is not
> always on. Suggestions on how to automatically re-add the sink in that
> case are welcome.
>
> Kind Regards,
> Torsten
>
I do not define the sink parameter, maybe that is the problem?
I expect that "sink" is the local name of the sink at the server?
how is thet defined in /etc/oulse/default.pa on server side?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f2a89bb2-a7f0-4cdc-791a-10f48cb08b28%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installing using pacman command

2017-01-12 Thread joseph . yenglin
While trying to use an installation command like, say,

localhost% sudo pacman -Syu wine

I get the following response:

error: GPGME error: No data
error: xyne-x86_64: missing required signature
:: Synchronizing package databases...
 core is up to date
 extra is up to date
 community is up to date
 multilib is up to date
error: failed retrieving file 'xyne-x86_64.db' from xyne.archlinux.ca : 
Operation too slow. Less than 1 bytes/sec transferred the last 10 seconds
error: failed to update xyne-x86_64 (download library error)
error: database 'xyne-x86_64' is not valid (invalid or corrupted database (PGP 
signature))

How do I get to make installations on Archlinux?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e81e3ea9-adc7-4008-b7f9-956add56ecd9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Windows 7 VM - Direct access to Hard Drives to flash SSD firmware

2017-01-12 Thread Steve
I need to run Samsung Magician software in Windows to flash the firmware of the 
SSD's I put in the laptop, is there any special way I need to setup the Windows 
VM to give direct access to the firmware

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f2a1b0c0-672f-46fe-95d3-fa9d08b706d8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] DOS VM - Spinrite - Direct Access to Drives

2017-01-12 Thread Steve
I would like to be able to run Spinrite which runs in DR-DOS in a VM. The 
software needs to have direct access to the SATA hard drives. Is this likely to 
be possible 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ebf10873-4e43-4975-aed9-7502f65b5ee8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: KDE - Cube desktop query

2017-01-12 Thread Steve
On Thursday, January 12, 2017 at 2:15:57 PM UTC+4, Steve wrote:
> I have installed Qubes 3.2 and changed the desktop manager to KDE , 
> specifically to get the Cube desktop. 
> 
> I have gone into the KDE settings and enabled the cube effect however I can;t 
> get it to appear, any suggestions
> 
> thx

I am using an Nvidia graphics card , do I need to install the nvidia graphics 
driver to get the "cube" to animate ? thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a299bb21-c6d8-4cf1-a2c9-f28b97d899d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Security] Anti-evil-maid didn't notice Xen update ?

2017-01-12 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Dec 01, 2016 at 04:32:50PM +0100, Swâmi Petaramesh wrote:
> Hi Rusty Bird, and thanks for your help,
> 
> Please see below.
> 
> > 
> > Is the SINIT module working? Run the "find" command from step 2b of
> > /usr/share/doc/anti-evil-maid/README, but look at the lines for PCRs
> > 17, 18, and 19 instead: They should have very random-looking values.
> 
> Uh... Lines 17-19 are all FF
> 
> On my system :
> 
> PCR-00 to 07  look random
> PCR-08 to 12  are all 00
> PCR-13looks random
> PCR-14 to 16  are all 00
> PCR-17 to 22  are all FF
> PCR-23are all 00
> 
> So the problem seems to be there... But I don't know what to do with
> this (I know almost nothing about TPM...)

Rusty, Matt rightly just pointed out to Qubes Security Team that the
current behaviour of AEM could be misleading. AEM should refuse to work
if TXT isn't really working - otherwise it's easy to not notice it and
have false sense of security.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYd3nBAAoJENuP0xzK19csxfYH/AngaxY7yDmLXBc8sZufHjg4
lv3nM1otgcQmYxzvIyWDut0qbpLLhmqnQ4StntS/ajesdzFZnKghS0LyJmNjAG/9
hiyfNGYMEml738SCaNujCq2c75ZLi3SFELtPqk4TT4pSJ4rGXX39d2rcnQxs4pGy
xYpkUcWSnLQKQXnkWKphkzAx4IpsaVwtgntVpLYDJ2J0owp4BbtoyBFfDztvEICU
Hp0+r5wUtP8XuuQ6SB3+OqvOeymsgp6SRQln8LsLChQApxk1wC7XiNx3k6rN/nYa
wbo2kI0Plir7SSnYXCNmwyR3S3O45AVxQSMphDHUUw6bC0o+xk3Z6+K6WaAGObk=
=NzFB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170112124241.GA17864%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Setup for Graphic Design work / Failing to configure a PCI pasthrough on Archlinux

2017-01-12 Thread joseph . yenglin
> Have you ran the HCL tools?
No, where do can I find it? I comes installed with Qubes 3.2? I went through 
the system requirements and recommendations 
(https://www.qubes-os.org/doc/system-requirements/), they all check.

> Does your chipset support IOMMU? (inspiron 
> is a garbage consumer level device so probably not)
Yes, It's compatible with Intel VT-d. I believe that's it for IOMMU... or am I 
missing something?

> Graphics device assignment is an experimental feature, it doesn't work 
> all of the time and you can only (easily) assign a secondary graphics 
> device that isn't in use. I assume you tried to assign your primary 
> video adapter...
> It will only work with HVM.
So you suggest that I assign the GPU to an HVM version of Archlinux instead of 
an AppVM version of it?
 
> If you want more than one video device on a laptop you can try an 
> external pci-e device, they connect via various interfaces including 
> expresscard.
> 
> Assigning a USB controller (all of it) doesn't involve emulation, any 
> usb device will work as long as the guest supports it just like on bare 
> metal.
> 
> I play the latest games in a virtual machine with an attached graphics 
> card on QEMU, I will be happy to help if you have any further questions

Then I must thank you for your patience, because I don't think I got this part. 
XD How would this PCI-e and expresscard business be helpful? If Assigning a USB 
controller doesn't involve emulation, does it mean that it shouldn't cause any 
problems when assigning it to the Archlinux appVM? Because if I only assign the 
USB controller to the Archlinux AppVM, it still locks any new initialization of 
VMs. How would I go about using QEMU to run Adobe CC software?

> It is what you should do if you want this and it is more secure than 
> bare metal or emulation if you follow the above.
> 
> Using it with qubes is difficult but some users have reported success, 
> maybe better to use another distro with xen or qemu if you want this.

Where were these successes reported?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf431fb1-a9ed-4c50-8443-d3800e429550%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] New Lenovo laptops: X1 (4th Gen), T460/p, and T560

2017-01-12 Thread sboresch
I somehow overlooked this discussion before ordering a new laptop; thus,
I am stuck with a Lenovo T560 which reboots immediately/endlessly when
trying to install.

Thus, is there a (documented) way to add a newer kernel to the 3.2 install 
image? I'd rather avoid taking the SSD out and install qubes in my older
machine.

Thanks in advance,

Stefan

[Curiously, I could install debian jessie with a 3.16 kernel (obviously no 
Xen!) without problems and aside from wireless networking everythings seems to 
work out of the box]


Am Dienstag, 27. Dezember 2016 00:13:12 UTC+1 schrieb Marek 
Marczykowski-Górecki:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Mon, Dec 26, 2016 at 08:29:55PM +0100, 'Olivier Médoc' via qubes-users 
> wrote:
> > Maybe, Qubes installer bootloader could support both stable and unstable
> > kernels, in order to support new hardware ?
> 
> I'd wait for the next longterm support kernel, then maybe release
> updated installation disk with it.
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJYYaPoAAoJENuP0xzK19csvZMH/R16udTk/sYcGotx1OK+GOHt
> y1mmDYBkTHJ3Moapd/AAoBuSlZolz9FuYst5XwPx5paWgVj9vFeuvfd+ZmHozUin
> xnwD47XAh56AEycdbm4BK54NtOPZ9xohK018R/29s/RhAvZsWiMCu4a1k6FXbP4X
> iArEfOGraZmJ95MF23VM2jnaPORaNXkMhUhydDYsS44lku4SefddpxCsIIbK6H7R
> YXCibjXF8BgZmyZFK0IZUxJjpeNpKorD2uDd1j5hIM3zAnKUUZHRIQ4OiWUBIL7y
> WPNYMRRnssnb3gycCw3bWXQD91pQjyX8YpOmRylhRKbVHUv3nPSCvxpPzH2zJJA=
> =Jw8Z
> -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c400967-b66c-497b-8ed7-a1e58f71aa08%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Hp 8770W eliteBook laptop - looking very good

2017-01-12 Thread Steve
I am new to Qubes . I was looking for a suitable machine to install it on and 
found an old HP 8770W EliteBook I hadn't used for a  while.

Good news is that Qubes seems to have installed very nicely, I have HVM, IOMMU, 
HAP/SLAT and a detected TPM device.

The machine is i7 with NVIDIA K5000M graphics card.

I am happy to explore setting up TPM and testing the full features if someone 
can guide me. It looks like it might be the first laptop with a complete sweep 
of YES in the HCL matrix

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ceebad0-f198-4d01-b491-cdfbbe7a4d22%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Oracle Template Advice Requested

2017-01-12 Thread Phil
Hello, I'm a three month newbie to qubes and am attempting to make an Oracle 
templateVM and various oracle-related AppVMs. The template would be of 
(possibly) solaris or oracle-linux as an environment for all Oracle 
applications such as oracle db 12.c, netbeans, sql developer, jdk, jre, etc. 
The appVMs would separate as like for SQL dev, java dev, db server, etc, on 
their own netVM. I want to do this both for personal use and learning on my 
2.7GHz i7 8GB laptop for the proof-of-concept..

My hope is that an oracle os would come with proper repo/package signature 
enforcement while also providing a low-fuss and unifying environment for the 
various isolated appvms used for domain segregation between apps and 
server/client roles.

I'm leaning towards an hvm template of either oracle-linux or solaris. My 
thought is that the template should be a minimally-maintained environment for 
oracle apps, and could be installed from either iso, an *.ovm conversion 
through qemu, or from an oracle repo.

An obstacle I face is that my https connections to oracle servers are sometimes 
invalid for the ssl certificate. If I were to install to a fedora or debian 
template, I think that I would need to download/install the oracle packages 
from the browser while live on the template, breaking isolation. If I knew 
whether oracle's rpm repo was compatible to qubes (i.e. void of dependency 
conflicts to qubes packages and such), I could probably just add it to fedora 
template's dnf repo list, and try to figure out a white-list for oracle ip's.. 
but that somehow seems unclean.. should I not think that I won't want a server 
config on default template environments? would it be optimal

However I'm curious about a few things, such as the cpu/mem or work flow costs 
for using a default templateVM or a clone vs a standaloneVM or hvm template...  
For example, I would be concerned that, if I were to keep an oracledb vm 
running as a server (using whatever qubes best-practice paradigm for this 
purpose), then the impact for developing against it and subsequently running 
queries from other various vms on that virtual network might make the machine 
unusable.

Can anyone provide advise on why I should prefer one approach over the other 
for creating this oracle template?

Thank you in advance!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f682e16-7a5c-4916-b763-7ee55373edb0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Dell XPS 15 9550

2017-01-12 Thread bbrr3332
On Wednesday, January 11, 2017 at 10:34:22 PM UTC, John Doe wrote:
> On Sunday, January 8, 2017 at 10:38:49 PM UTC, bbrr...@gmail.com wrote:
> > In original configuration this laptop suffers from freeze on initial boot 
> > when the system attaches the broadcom wifi card to sys-net. To make 
> > progress needed to disable the wifi card in BIOS, install was then 
> > straightforward. 
> > 
> > Used an USB wifi for initial investigation/updates. Needed to assign the 
> > USB controller to the sys-net VM and allow non strict pci reset. 
> > ThenuUpgraded the fedora23 kernel to the version in unstable repository:
> > 
> > Linux sys-net 4.8.12-12.pvops.qubes.x86_64 #1 SMP Sat Dec 3 19:12:54 UTC 
> > 2016 x86_64 x86_64 x86_64 GNU/Linux
> > 
> > As there is only one USB controller on this board, this is not a great 
> > long-term solution. I then replaced the broadcom wifi card with an Intel 
> > 8265 which works very well with the 4.8 v kernel. Generally everything now 
> > seems to work well: suspend works, touchpad works well, screen dimming, 
> > attaching usb storage. No touchscreen on this model so can't comment on 
> > that.
> 
> Did your 9550 not come with a Killer 1535? At least that's what is listed on 
> the product page, http://www.dell.com/uk/p/xps-15-9550-laptop/pd?ref=PD_OC

No, it came with DW1830 which is a re-badge of Broadcom. It was bought in the 
first half of last year.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ec524cc1-c938-4f4b-9ceb-932028b07c72%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] bluetooth support in dom0

2017-01-12 Thread raahelps
On Thursday, January 12, 2017 at 3:08:59 AM UTC-5, raah...@gmail.com wrote:
> On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote:
> > On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote:
> > > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote:
> > > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com 
> > > > wrote:
> > > > > > 
> > > > > > > I don't know much about the security side of things, but I'm 
> > > > > > > happy to
> > > > > > 
> > > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if
> > > > > > 
> > > > > > > that was the only issue.
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > 
> > > > > > 
> > > > > > Why not use Windows then? Or Mac? :)
> > > > > 
> > > > > Because they don't offer the other nice features such as the app 
> > > > > domains and disposable VMs. Which I assume would still help against 
> > > > > remote threats such as web browser exploits.
> > > > > 
> > > > > > 
> > > > > > > Or should I be avoiding Qubes if I can't figure this stuff out
> > > > > > 
> > > > > > > myself? ;)
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > > I'm just an amateur Linux user mildly interested in increased
> > > > > > 
> > > > > > > security/privacy.
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > > Side musing: Have the developers considered allowing *optional*
> > > > > > 
> > > > > > > support for things that have security issues, in the spirit of
> > > > > > 
> > > > > > > compromise...?
> > > > > > 
> > > > > > 
> > > > > > 
> > > > > > Qubes OS is an open platform, you can configure it however you like,
> > > > > > 
> > > > > > disabling potentially all security feature, if you really want. The 
> > > > > > user
> > > > > > 
> > > > > > is the ultimate boss.
> > > > > > 
> > > > > 
> > > > > I should rephrase that as "easy to use", even GUI based, 
> > > > > configurability. Perhaps you aren't targeting such "novice" users.
> > > > > 
> > > > > 
> > > > > > 
> > > > > > > For instance, I absolutely do choose convenience and
> > > > > > 
> > > > > > > even necessity over security (to the tune of bluetooth, full 
> > > > > > > graphics
> > > > > > 
> > > > > > > card support for game dev work), yet wouldn't there still be
> > > > > > 
> > > > > > > something to be gained by using Qubes even with those security 
> > > > > > > holes?
> > > > > > 
> > > > > > > When the choice is Qubes with these holes vs just any regular 
> > > > > > > Linux
> > > > > > 
> > > > > > > distro.
> > > > > > 
> > > > > > > 
> > > > > > 
> > > > > > 
> > > > > > 
> > > > > > Modern Windows and OSX offer a "reasonable compromise" of security, 
> > > > > > I heard.
> > > > > 
> > > > > Haha!
> > > > 
> > > > Any update regarding this?
> > > 
> > > hahaha
> > 
> > You manage to figure it out lol?
> 
> I'm sorry i was laughing at Joanna's comments.  Do you mean how to enable it 
> manually,  or if Qubes is going to support it?  I personally wouldn't want 
> bluetooth either man.
> Maybe you hold your phone too close to it one day haha.  Or someone uses some 
> booster outside your house to reach it who knows.   i mean anything can 
> happen and taking over dom0 is game over.  defeats the purpose of using Qubes 
> which tries to isolate hardware from dom0.
> 
> It is recommended to use usb with a computer that has the Qubes hardware 
> requirements to be able to isolate the usb controllers from dom0.

or at least isolate a controller to dom0 dedicated to only your mouse and 
keyboard.  Just don't use wireless.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e2af9a2e-e791-4eb4-a206-576a0328d222%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] bluetooth support in dom0

2017-01-12 Thread raahelps
On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote:
> On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote:
> > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote:
> > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com wrote:
> > > > > 
> > > > > > I don't know much about the security side of things, but I'm happy 
> > > > > > to
> > > > > 
> > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if
> > > > > 
> > > > > > that was the only issue.
> > > > > 
> > > > > > 
> > > > > 
> > > > > 
> > > > > 
> > > > > Why not use Windows then? Or Mac? :)
> > > > 
> > > > Because they don't offer the other nice features such as the app 
> > > > domains and disposable VMs. Which I assume would still help against 
> > > > remote threats such as web browser exploits.
> > > > 
> > > > > 
> > > > > > Or should I be avoiding Qubes if I can't figure this stuff out
> > > > > 
> > > > > > myself? ;)
> > > > > 
> > > > > > 
> > > > > 
> > > > > > I'm just an amateur Linux user mildly interested in increased
> > > > > 
> > > > > > security/privacy.
> > > > > 
> > > > > > 
> > > > > 
> > > > > > Side musing: Have the developers considered allowing *optional*
> > > > > 
> > > > > > support for things that have security issues, in the spirit of
> > > > > 
> > > > > > compromise...?
> > > > > 
> > > > > 
> > > > > 
> > > > > Qubes OS is an open platform, you can configure it however you like,
> > > > > 
> > > > > disabling potentially all security feature, if you really want. The 
> > > > > user
> > > > > 
> > > > > is the ultimate boss.
> > > > > 
> > > > 
> > > > I should rephrase that as "easy to use", even GUI based, 
> > > > configurability. Perhaps you aren't targeting such "novice" users.
> > > > 
> > > > 
> > > > > 
> > > > > > For instance, I absolutely do choose convenience and
> > > > > 
> > > > > > even necessity over security (to the tune of bluetooth, full 
> > > > > > graphics
> > > > > 
> > > > > > card support for game dev work), yet wouldn't there still be
> > > > > 
> > > > > > something to be gained by using Qubes even with those security 
> > > > > > holes?
> > > > > 
> > > > > > When the choice is Qubes with these holes vs just any regular Linux
> > > > > 
> > > > > > distro.
> > > > > 
> > > > > > 
> > > > > 
> > > > > 
> > > > > 
> > > > > Modern Windows and OSX offer a "reasonable compromise" of security, I 
> > > > > heard.
> > > > 
> > > > Haha!
> > > 
> > > Any update regarding this?
> > 
> > hahaha
> 
> You manage to figure it out lol?

I'm sorry i was laughing at Joanna's comments.  Do you mean how to enable it 
manually,  or if Qubes is going to support it?  I personally wouldn't want 
bluetooth either man.
Maybe you hold your phone too close to it one day haha.  Or someone uses some 
booster outside your house to reach it who knows.   i mean anything can happen 
and taking over dom0 is game over.  defeats the purpose of using Qubes which 
tries to isolate hardware from dom0.

It is recommended to use usb with a computer that has the Qubes hardware 
requirements to be able to isolate the usb controllers from dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fbc29b17-6576-4228-a29e-c5cb0a60eee9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes using Cloudflare - Why?

2017-01-12 Thread haaber

On 01/12/2017 08:24 AM, taii...@gmx.com wrote:
> On 01/12/2017 12:33 AM, Andrew David Wong wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> On 2017-01-11 12:34, Andrew David Wong wrote:
>>> On 01/11/17 11:04, taii...@gmx.com wrote:
 https://www.eff.org/deeplinks/2017/01/finally-revealed-cloudflare-has-been-fighting-nsls-years

>>> Three main reasons:
>>>
>>> 1. We distrust the infrastructure anyway.
>>> 2. It's low-overhead (in terms of the time and work required for
>>> administrative tasks).
>>> 3. It's free (as in beer).
>>>
>> On 2017-01-11 12:37, Alex wrote:
>>> In my understanding of the article, cloudflare is trying to challenge
>>> the secrecy around broad investigations (by challenging national
>>> security letters), not the other way around, so I can't see what you are
>>> lamenting, Taiidan... Would you care to explain?
>>>
>> I mistakenly thought that this was a new thread posing the question in
>> the subject line and providing a link to that article as a justification
>> for the question. After viewing the whole thread on Google Groups, I
>> realize that I've already answered the initial question. (I knew it
>> seemed familiar!)
>>
>> This is what happens when people reply to threads without quoting any
>> part of the existing thread to provide context. :)
>>
>> I second Alex's question. The article is clearly pro-Cloudflare from the
>> very first sentence.
>>
>> - -- Andrew David Wong (Axon)
>> Community Manager, Qubes OS
>> https://www.qubes-os.org
>> -BEGIN PGP SIGNATURE-
>>
>> iQIcBAEBCgAGBQJYdxUYAAoJENtN07w5UDAwT5IP/3j5VjBj7Txh9bC9z4gOT1bk
>> x+DzdFWPH6OAXiaUQs5BDiA/TayjN8GmJgcYi1247MV4xaoNkUqAdOa3Bv+fxprr
>> wZREP6UII3LiLlP8TMPsIZNhc/W+AGSUGinG4qtYlz/TJnn2zJnoTmiz1f3wsUVh
>> LDT4ncPIUFiVaVLhn5eFnl7nOrDh14O3CRxlu3cpYjTG6bBXBAChCLEE6EACTJgH
>> Ocl1fyGOCtlPILC7OEKPoJ1Cuo6RxhVilhv9rqkM8gh8uG4cRZAsKAaWb8C/qrJ1
>> WamA85zEApjI2xonPjkBOCfPnOpDNs21B4uG/hdRq4tPtU+69Xt0a6SCOqPdijDZ
>> An62pOlCApLEvCl26ImS0xdmKaYXZ1y0UPS2y+wJ/tMBRZxKNAKlpwYat93t3nIK
>> UOW763sA+CVpDIxTaBTGGL7Miz7wz0fGN4TAtGNyOVNnfdwSNnKQcYxwWY9rltsj
>> VWvQumHfWE1zLZ2HzknbP3CVSeIuqSrve4rifj62L3+gkKaoqxA7ndN/sSOOX6iO
>> TOZZYuWb8YE1rGoV/vznFEftc74mDe0obmF4JSraLEXGRyuZ7dnQjxetZ3BvKnQN
>> bKDgRObC78ro0O9ibslZh9rn5w9wxf8T8EQ65JvQdQxyRK4qLC+bk53tPcDz77M1
>> LJ+su7Fq2RLrcqY4/lVK
>> =0uH4
>> -END PGP SIGNATURE-
> I thought I would share this because it proves that they're fighting a
> NSL and thus had one put in to action on them in the first place.
> 
> I realize that you enjoy the "free" services from them and that you lack
> the money to use anything else, but it is just something to think about
> regarding what happens when a handful of companies control almost the
> entire internet and the bigger picture - what happens if a change of
> management leads to them dropping the challenge? what companies simply
> comply and we never hear about it?
> 
> A theoretical condition of doing business in country X (say china) would
> be messing around with certain pages to provide bad advice and
> contaminated software to people, you don't have to get the elite
> security specialist types who take extraordinary precautions you simply
> have to get the average joe who doesn't know anyone in real life who can
> provide a real root of trust (even I don't)
> 
> The cloudflare captcha is clearly designed to fingerprint the user
> (which works even with a generic DVM due to machine specs) or else it
> wouldn't need javascript, it is obvious that they have a market interest
> in tracking people even those who use VPN's.
> 
> I bet half the users on this mailing list have never considered the cost
> of "free" so my goal is to get people thinking about it.
> 

There is huge discussion on torproject.org on cloudflare ; additionally
to the annoying (and as I learned thanks to your question yesterday)
user-tracking Captcha I may add that, running a non-exit(!) tor server
at home, my home IP is banned (even with an insecure browser) from a lot
of useful sites, British Airwairs is on example (that I boycott for them
banning me), and many others. Almost all of them are linked to CF if one
looks well the whois entries.
This behaviour of Cloudflare seems clearly politically motivated to me :
there is no danger, no malicous packets, simply nothing that is emerging
from my tor middle relay!  The "com" about NSL fighting does not mean
that Cloudflare are with the good side of the force. Not at all. It is
only "com" (communication or comedy?)  Bernhard



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b23ff19-fb13-edf4-741c-5371f997cff6%40web.de.
For more options, visit 

Re: [qubes-users] Re: VM chaining visualisation tool

2017-01-12 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-11 23:26, Steve wrote:
> On Thursday, January 12, 2017 at 10:11:48 AM UTC+4, Steve wrote:
>> Is there a way I can get a real time visualisation of the VM
>> chaining , for example a Domain chaining through a firewall
>> through a VPN and sys Network ?
> 
> Is there a way in Terminal to get a textual description of the
> linking ? thx
> 

Technically, qvm-ls provides this, but it may not be what you have in
mind.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=4WKM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8b76d7f-7a1f-990b-342c-5b8a60d6cc56%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.