Re: [qubes-users] Re: Remove start menu entry for deleted Template-VM

2017-01-26 Thread legawrique
> Look in .config/menus, and see if you still have an entry in
> applications-merged. If so, delete it.

Unfortunately, there is no such an entry (

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3e60828b-84cb-4451-aa0b-1d93fbf492b2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Unable to start any VM. Getting: error starting vm: internal error: unable to reset PCI device 0000:

2017-01-26 Thread Pietro Speroni di Fenizio
On Thursday, January 26, 2017 at 2:43:41 AM UTC+1, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-01-25 14:22, Pietro Speroni di Fenizio wrote:
> > On Wednesday, January 25, 2017 at 11:13:54 PM UTC+1, Andrew David Wong 
> > wrote:
> > On 2017-01-25 13:27, Pietro Speroni di Fenizio wrote:
>  Hello, we just installed a Qubes in a linux machine I had.
> 
>  Unfortunately the system seem to be unable to start any VM.
> 
>  I always get the same error: ERROR: internal error: unable to reset
>  PCI device :03:00.2 internal error: Active :03:00.0 devices
>  on bus with 000:03:00.2, not doing bus reset
> 
>  Can someone point me to the right direction? I seem stuck as
>  anything requires me first to start a VM, but no VM seem to be able
>  to start. In fact when the computer turns on at the beginning only
>  dom0 is active and even sys-net and sys-firewall are inactive.
> 
>  Many thanks, Pietro
> 
> > 
> > It sounds like you have this device assigned to more than one VM.
> > Check the "Devices" tab in the VM Settings for each VM that has any
> > devices assigned to it.
> > 
> > 
> > Thanks,
> > I just checked. Nothing is assigned in the other VM. Only sys-net had 2 of 
> > the three PCI assigned. Once I assigned the third it started working. But 
> > now it gives me a Device not Managed next to the red network icon above.
> > 
> > Thank you very much
> > 
> 
> Have you tried setting pci_strictreset to false? (Make sure you understand 
> the security implications first.)
> 
> https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYiVQ5AAoJENtN07w5UDAwXRsP/1miXII9AR/4fTQ5rHQGMGUs
> /zDhB098GKLgfP+x415tV376HjcGVuLM2wD61BTx+6etJdljwjwvuQ9YSzCYX4Uy
> AMzIPlwmC/H7/Mqi0L2Dv95paNepKQnOin+W3uFWqejhOInMSR7mwYm5Nb0HBbRu
> omsMQ9hsGwjpE6FErbT6H15D9mVYlDSGI8+pHqTciTMZgRQORXz8vUUJB1b6lQ+0
> BRoflHllYKILVmQd4QL9nzO3fBEApgSPf4Psmvzl+V4wxt2seL27hux5lqgzay9l
> VgPeNkMfmUqWXQodfy/9NP0Vb1YwZpTumCiDNDDxO20ju8cwgn6bMe1rd3CMsDB8
> lSJZRnJ93tYh12IXbxd1vkaORH47HtZhfXEHSsuBNic8kazHhIDjQhawYfVFQnXd
> S4waYC/cdE2NlJqRNrCyjbyUJxD4i1Wq+MvVjm7u4WnAwlJAcMw1vGR8RsxUg9VD
> W8jkyCLTNk3JTC1sydTHH++uZ4z6RZ77WaPgVmsB2Wnw/63iiHbqiomLniPJLsrS
> FI2r2YgNm+SE/LsM4hVzug7cKnlrL2dwBmEOcRhDn1qHLe+66rxxrAWGT9lsjxh7
> Vni+SR40kAkgP/PZAbiAoI+7o3UXnUVoKKRH7eC4GwzQ2B9q6nWMj21uY0W79Njc
> 84Ko8UGtCu0PNezI/5jr
> =YE9m
> -END PGP SIGNATURE

Update:
I restarted the sys-net and now it just says:
Ethernet Network
   disconnected

And under VPN connections >

So far I seem to be unable to run the wifi, but maybe it will be explained 
later.

Thanks to all. I will now set this as complete.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b63d9eb4-388b-458d-b853-24c9a3e8e461%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Spoofing MAC

2017-01-26 Thread Sae
On 27/01/2017 00:45, Unman wrote:
> On Wed, Jan 25, 2017 at 09:11:06PM +0100, Sae wrote:
>>  Forwarded Message ---
>>
>> Subject: Re: [qubes-users] Spoofing MAC
>> Date:Wed, 25 Jan 2017 20:52:35 +0100
>> From:Sae 
>> To:  pl1...@sigaint.org
>>
>>
>>
>> On 25/01/2017 20:34, pl1...@sigaint.org wrote:
>>> Hi
>>> I followed the guide that explains how to spoof MAC using debian based
>>> appVM. Now will my ISP "see" this new or it anonymize just my surfing?
>>>
>> Hello.
>> You ISP never sees your MAC. Your MAC is used for the communication
>> between your computer and your router.
>> Spoofing your MAC is usefull in networks which are not under your
>> control (hotspots, school, work, …).
>> Then, from that network point of view, your computer won't identify
>> itself with your mac address that is closely tied to your computer hardware.
>> Spoofing your mac address has no impact on your IP address, so it won't
>> anonymise your surfing.
>>
>> forwarding because I forgot to send to the list. 
> Since your ISP has complete control over your router they *always* see
> your MAC. If you spoof the MAC then they would be able to associate the
> spoofed MAC with that router. If you have been consistent and keep
> changing it then you would have some degree of plausible deniability for
> any particular session.
> Best approach would probably be to add another wireless card on another
> netvm, and use spoofed MAC and separate qubes on that netvm, while keeping the
> vanilla card for "normal" use. That way to maintain "normal" use and
> mask the other activity. Use a removable wifi card and disposable
> netvm for the spoofing to minimise trace. Increase deniability by
> setting router to open or with simple to guess password.
>

My ISP doesn't have control over my router. My modem/router is my own. I
just configure it with their credentials.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/12416757-91b3-c825-1079-f41e4935e2ed%40nopping.eu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes-Builder - Rackspace mirror having issues?

2017-01-26 Thread anoa
I'm currently trying to build the Arch Linux template through
qubes-builder. Someway through the `make qubes-vm` step I'm getting
404/403 errors on the default mirror.rackspace.com server.

Checking it in a browser at mirror.rackspace.com loads and their status
page (status.rackspace.com) reports no issues.

Here is the relevant output of the build:

```
Packages (5) gnupg-2.1.18-1  gtk-update-icon-cache-3.22.7-2
gtk3-3.22.7-2  libproxy-0.4.13-2  pango-1.40.3-2

Total Download Size:   10.74 MiB
Total Installed Size:  83.59 MiB
Net Upgrade Size:   1.16 MiB

:: Proceed with installation? [Y/n]
:: Retrieving packages...
error: failed retrieving file
'gtk-update-icon-cache-3.22.7-2-x86_64.pkg.tar.xz' from
mirror.rackspace.com : The requested URL returned error: 404
warning: failed to retrieve some files
error: failed retrieving file 'pango-1.40.3-2-x86_64.pkg.tar.xz' from
mirror.rackspace.com : The requested URL returned error: 404
warning: failed to retrieve some files
error: failed retrieving file 'gtk3-3.22.7-2-x86_64.pkg.tar.xz' from
mirror.rackspace.com : The requested URL returned error: 404
warning: failed to retrieve some files
error: failed retrieving file 'libproxy-0.4.13-2-x86_64.pkg.tar.xz' from
mirror.rackspace.com : The requested URL returned error: 404
warning: failed to retrieve some files
error: failed to commit transaction (unexpected error)
Errors occurred, no packages were upgraded.
/home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:114:
recipe for target 'dist-build-dep' failed
make[2]: *** [dist-build-dep] Error 1
Makefile.generic:139: recipe for target 'packages' failed
make[1]: *** [packages] Error 1
Makefile:209: recipe for target 'vmm-xen-vm' failed
make: *** [vmm-xen-vm] Error 1
user@dev:~/qubes-builder$
```

Am I missing something?

Thanks
Andrew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o6e1s2%24sbd%242%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Spoofing MAC

2017-01-26 Thread Unman
On Wed, Jan 25, 2017 at 09:11:06PM +0100, Sae wrote:
>  Forwarded Message ---
> 
> Subject:  Re: [qubes-users] Spoofing MAC
> Date: Wed, 25 Jan 2017 20:52:35 +0100
> From: Sae 
> To:   pl1...@sigaint.org
> 
> 
> 
> On 25/01/2017 20:34, pl1...@sigaint.org wrote:
> > Hi
> > I followed the guide that explains how to spoof MAC using debian based
> > appVM. Now will my ISP "see" this new or it anonymize just my surfing?
> >
> Hello.
> You ISP never sees your MAC. Your MAC is used for the communication
> between your computer and your router.
> Spoofing your MAC is usefull in networks which are not under your
> control (hotspots, school, work, …).
> Then, from that network point of view, your computer won't identify
> itself with your mac address that is closely tied to your computer hardware.
> Spoofing your mac address has no impact on your IP address, so it won't
> anonymise your surfing.
> 
> forwarding because I forgot to send to the list. 

Since your ISP has complete control over your router they *always* see
your MAC. If you spoof the MAC then they would be able to associate the
spoofed MAC with that router. If you have been consistent and keep
changing it then you would have some degree of plausible deniability for
any particular session.
Best approach would probably be to add another wireless card on another
netvm, and use spoofed MAC and separate qubes on that netvm, while keeping the
vanilla card for "normal" use. That way to maintain "normal" use and
mask the other activity. Use a removable wifi card and disposable
netvm for the spoofing to minimise trace. Increase deniability by
setting router to open or with simple to guess password.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170126234540.GB9439%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Remove start menu entry for deleted Template-VM

2017-01-26 Thread legawrique
четверг, 26 января 2017 г., 16:57:30 UTC+3 пользователь legaw...@gmail.com 
написал:
> Hi there! I get strange problem after update my fedora-23 TVM up to 24 and 
> then up to 25. It was about month ago and everything was Ok, until today I 
> see again "Template: fedora-23" entry in start menu. How do I fix this? There 
> is no directory at /var/lib/qubes/appvms or ../template-vms, also if I select 
> "Fedora-23: Add more shotcuts.." it says me that there is now TVM with such 
> name.
> 
> Thx!

There is no "fedora-23" directory or any files according to it there...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e967a2f5-941b-4950-bb37-8648017fff67%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Remove start menu entry for deleted Template-VM

2017-01-26 Thread anoa
On 01/26/2017 05:57 AM,
legawri...@gmail.com wrote:
> Hi there! I get strange problem after update my fedora-23 TVM up to 24 and 
> then up to 25. It was about month ago and everything was Ok, until today I 
> see again "Template: fedora-23" entry in start menu. How do I fix this? There 
> is no directory at /var/lib/qubes/appvms or ../template-vms, also if I select 
> "Fedora-23: Add more shotcuts.." it says me that there is now TVM with such 
> name.
> 
> Thx!
> 


>From this page: https://www.qubes-os.org/doc/remove-vm-manually/

To remove entries from the Start menu, remove the *.desktop files
corresponding to that VM in Dom0's ~/.local/share/applications directory.

Andrew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o6ddi5%24brm%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: off topic - invite codes to 'riseup'

2017-01-26 Thread kdsegura
On Tuesday, October 28, 2014 at 12:26:49 PM UTC-6, 
bm-2cu9wcijafoqtf6...@bitmessage.ch wrote:
> Dear qubes-users,
> 
> I am long time qubes follower and user. I apologize in advance if anyone 
> feels this request is spam.
> 
> I am looking for two invite codes needed to sign up to anonymous 
> riseup.net email service.
> 
> I am hoping there are some qubes users who are riseup.net account 
> holders.
> 
> Can anyone please send me a couple of invite codes that I might be able 
> to sign up?
> 
> Thank you in advance.

Have one code need another. please and thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/05769acd-66b3-43d5-98e4-886b4c9b323d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] GPG Pin entry / Passphrase on Enigmail with IceDove / Thunderbird

2017-01-26 Thread Max
I appreciate this is probably not a Qubes specific question but given that I 
couldn't find the answer on other threads and I suspect others on this 
distribution list would be using a similar version of software I wanted to 
check if this was a known issue/feature.

I am currently unable to paste the passphrase into the pin entry in Enigmail 
when attempting to decrypt my messages. This worked a few weeks ago. Also, once 
I manually type in the key, the password is not cached at all meaning I have to 
type it in repeatedly for every message. Is there a way to change this 
behaviour?

I am using Debian 8 on Qubes 3.2 with Enigmail 1.8.2 downloaded from the Debian 
software packages as opposed to the Thunderbird / Icedove add ons.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23cfa2c8-5109-45b9-bc2c-da59ad13b45f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Linux HVM Cursor lag

2017-01-26 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jan 23, 2017 at 07:25:50AM -0800, Kopimi Security wrote:
> On Monday, January 23, 2017 at 1:38:31 PM UTC+1, tech...@tutanota.com wrote:
> > I wanted to ask everyone using linux HVM's - or even booting a linux live 
> > CD - do you get cursor lag?
> 
> So far I have seen that in Kali.
> In fact, the cursor is not only slow, but the entire window moves about when 
> I move the cursor. This has the main effect of moving away things I need to 
> click on when moving the mouse, and the (bonus, I guess) side-effect of 
> driving me crazy.
> 
> Haven't bothered testing more yet, but will look into it in future.

Looks like this issue:
https://github.com/QubesOS/qubes-issues/issues/2559
Fix already uploaded to testing repository.


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYig+KAAoJENuP0xzK19csbHkH/i7gLN6vg5o7wOCHONXZ3Q9B
EFOvJI8Ja9iD8hIbB/jfT2b5zFeJdacG/XrJrQdN5X1gyoEooSq4Qid456Cy8dPt
hW68MikZO80q4s4hgFUxs+HnooV6J6Oc1IjEsTafEBwML80NJAICjvxycoTFd0H4
LKymwM9cbMvtglVD+4K3+roPaX1Fzii7HmZDRH3/q8jfA5Xh4hfWdfJm0JvknBOT
CUjlCbka0YCJm9ap1oMNX6NA0/N4+7IbN0hONLqE8mhr/JfOB+NkTf0RLGt4AmsC
12bSlRMxRbWMeoskYAOrL2nr2EKIqhLi/ObnBA5FinpeFKWrOXvbagxjB2Gz7x0=
=PfR/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170126150234.GA31928%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux HVM through Whonix Gateway or VPN

2017-01-26 Thread Chris Bensch
Maybe that's the issue, I wasn't changing the internal IP, I kept it
matching what the Qubes Configuration Gui showed during install.  I'll look
into that as well.
Thanks!

On Thu, Jan 26, 2017 at 11:35 PM Connor Page  wrote:

> Linux HVMs don't get network settings from stub domains so all the IPs
> have to be set manually. When network topology is changed, new addresses
> have to be entered.
>
> --
> You received this message because you are subscribed to a topic in the
> Google Groups "qubes-users" group.
> To unsubscribe from this topic, visit
> https://groups.google.com/d/topic/qubes-users/9tr2uiUUP_8/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/737bba86-ff84-42e0-a762-02e36d7639ef%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAK582jjx%3DJto4x3P1Eg8cvSGhZ6KC%3D9Z4N86SG_9nnq18SuzFw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux HVM through Whonix Gateway or VPN

2017-01-26 Thread Connor Page
Linux HVMs don't get network settings from stub domains so all the IPs have to 
be set manually. When network topology is changed, new addresses have to be 
entered.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/737bba86-ff84-42e0-a762-02e36d7639ef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Just realized one of the major disadvantages of Qubes OS...

2017-01-26 Thread pixel fairy
On Thursday, January 26, 2017 at 2:13:09 AM UTC-8, qmast...@gmail.com wrote:
> четверг, 26 января 2017 г., 6:12:56 UTC+3 пользователь jkitt написал:
> > On Tuesday, 24 January 2017 11:54:34 UTC, qmast...@gmail.com  wrote:
> > 
> > > I was sad when installed VirtualBox, tried launching it and it said that 
> > > something like "not supported on Xen hosts"
> > 
> > But why would you want to do that? You already have virtual machines at 
> > your disposal..
> 
> I need to use one app which is Mac OS X only and is not a cross platform 
> (doesn't have a version for Linux or Windows). So I wanted to install a 
> Hackintosh, but - while there are plenty of instructions about how to do it 
> at VirtualBox and VMWare, there are no instructions for Xen. And I doubt that 
> it could be done for Xen, because at their instructions for VirtualBox and 
> VMWare they are setting up virtual machine's UEFI to make it be acceptable by 
> Mac OS X, meanwhile - Xen does not have its own UEFI so I guess it cant be 
> done there 
> (one person tried some time ago, but without success - 
> http://wiki.osx86project.org/wiki/index.php/Snow_Leopard_Server_on_Xen )

its theorectically possible.

https://groups.google.com/d/msg/qubes-users/RiVntUzgJmY/it7OEQI-AgAJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5a130251-5a1a-4af3-8989-fbe5c869c05d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Just realized one of the major disadvantages of Qubes OS...

2017-01-26 Thread qmastery16
четверг, 26 января 2017 г., 6:12:56 UTC+3 пользователь jkitt написал:
> On Tuesday, 24 January 2017 11:54:34 UTC, qmast...@gmail.com  wrote:
> 
> > I was sad when installed VirtualBox, tried launching it and it said that 
> > something like "not supported on Xen hosts"
> 
> But why would you want to do that? You already have virtual machines at your 
> disposal..

I need to use one app which is Mac OS X only and is not a cross platform 
(doesn't have a version for Linux or Windows). So I wanted to install a 
Hackintosh, but - while there are plenty of instructions about how to do it at 
VirtualBox and VMWare, there are no instructions for Xen. And I doubt that it 
could be done for Xen, because at their instructions for VirtualBox and VMWare 
they are setting up virtual machine's UEFI to make it be acceptable by Mac OS 
X, meanwhile - Xen does not have its own UEFI so I guess it cant be done there 
(one person tried some time ago, but without success - 
http://wiki.osx86project.org/wiki/index.php/Snow_Leopard_Server_on_Xen )

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d2da9f2d-513c-493e-b83f-292e17f7a494%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qubes r3.2 bricked

2017-01-26 Thread Bernhard
On 25/01/2017 22:37, Ángel wrote:
> Bernhard wrote:
>> Thank you Angel, for helping me.
>>
> You're welcome, Bernhard.
>
>
>> and, as I said, nothing starts. I start thinking of a disaster-mode data
>> recovery since I do not know how I could possibly unbrick a system that
>> has no network anymore?! 
> That's just because most VMs depends on sys-net, and sys-net is not
> available. Can you still edit them with Qubes VM Manager? The VMs should
> at least start if you set their NetVM to none. Then you could create a
> new sys-vm if it still doesn't get fixed.
>
> Best
>
Hello Angel, that worked. With "no net" I can start the VM's.

That solves a big pb, I can now backup data :) Before this trick, only
with dom0 I would not have been able to attach the usb anywhere :))

1) So, may I ask you some hint how to generate a new sys-net, please?

2) Another approach is this one: I looked at the guest-sys-net.log I
cannot retype everything, so I give some extracts. The F24 part  starts 
with fsck (?!) .. and after some time  FAILED to start File System Check
on Root Device. At this point one service after the next is Stopped, the
log ends with : "Welcome to emergency mode" 

So, maybe I can first fsck  the stopped sys-net fs from within dom0 by
hand? How could I do that? I guess I loop /var/lib/qubes/(??) and then
fsck it?

Thank you, Bernhard

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cfd04e81-1334-638b-0865-678e5e349e52%40web.de.
For more options, visit https://groups.google.com/d/optout.