[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread Reg Tiangha
On 04/28/2017 11:56 PM, Foppe de Haan wrote:
> the update wasn't built for the fc23-vm: 
> https://github.com/QubesOS/updates-status/issues/17
>
That's really weird, since it came out for dom0, which is essentially
fc23. And it looks like the fc24 and 25 versions never transferred over
from current-testing either.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/oe1a4b%24bjq%242%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread ghotiy
On Saturday, April 29, 2017 at 1:56:42 AM UTC-4, Foppe de Haan wrote:
> the update wasn't built for the fc23-vm: 
> https://github.com/QubesOS/updates-status/issues/17

Thanks.

somehow I never found that page during google searching.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/09c2b022-398b-4fa7-85fb-a74ba2a5a82e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread Foppe de Haan
the update wasn't built for the fc23-vm: 
https://github.com/QubesOS/updates-status/issues/17

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50c8284b-9d39-42f1-ae05-10bb85538f4b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread Reg Tiangha
On 04/28/2017 11:20 PM, gho...@gmail.com
wrote:
>> I don't know why it wouldn't work for you, unless you're running a
>> version of Qubes older than R3.2 or using an unsupported Fedora template.
>>
>> As a last resort, you can replace your /usr/src/u2mfn-3.2.3/u2mfn.c file
>> with this one here:
>>
>> https://raw.githubusercontent.com/QubesOS/qubes-linux-utils/master/kernel-modules/u2mfn/u2mfn.c
>>
>> and compiling should work.
> It works now. Thanks for your help.
>
> I started from scratch with a new clone of the fedora 23 template that was 
> installed with R3.2. I replaced the u2mfn.c file with the one you linked to.
>
Hmm, looks like you're right. Only 3.2.3 is in all the Fedora repos
(23-25). Which is weird, because I could have sworn it was pushed out in
the latest round of stable updates. It does show up in the Debian repos,
though.

Well, the important thing was updating that u2mfn.c file to work with
kernels newer than 4.8. Glad to hear it still works.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/oe19r0%24bjq%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread ghotiy

> I don't know why it wouldn't work for you, unless you're running a
> version of Qubes older than R3.2 or using an unsupported Fedora template.
> 
> As a last resort, you can replace your /usr/src/u2mfn-3.2.3/u2mfn.c file
> with this one here:
> 
> https://raw.githubusercontent.com/QubesOS/qubes-linux-utils/master/kernel-modules/u2mfn/u2mfn.c
> 
> and compiling should work.

It works now. Thanks for your help.

I started from scratch with a new clone of the fedora 23 template that was 
installed with R3.2. I replaced the u2mfn.c file with the one you linked to.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/28b3128d-60bc-44db-9b4b-6dd1a3a44d74%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] One of many questions: 2 displays ? how

2017-04-28 Thread --
Hello,
What behavior should I expect with 2 monitors plugged into say HDMI and
Display Port  and/or D-subs  in Qubes?  I just get 1 monitor, and would
like two
I've read somewhere else that someone  did Setting Editor-> displays ->
default -> position -> X -> integer 0  , checked off the box I guess and
doubled the horizontal monitor resolution, however this doesn't work for me.
If I knew it's not really supporting dual monitors, again, that would be
fine, and I'd give up :)   thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c57886d1-9ab1-7d90-1863-1bd34518012b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread Reg Tiangha
On 04/28/2017 10:25 PM, gho...@gmail.com
wrote:
>> You need to update the qubes-kernel-vm-support package in the Fedora VM
>> that you're trying to compile this in. A compatible version (3.2.4)
>> should has been pushed out to the stable repositories so running sudo
>> dnf upgrade should pull it in (unless you've never installed it in the
>> first place, in which case you should run sudo dnf install
>> qubes-kernel-vm-support instead). Once you've installed the package, try
>> compiling one of those kernels again and it should work.
> I have version 3.2.3 installed.  I also have the "current", 
> "current-testing", and "unstable" repositories enabled in qubes-r3.repo.  
>
> doing a search for qubes-kernel-vm-support only shows version 3.2.3.  Doing 
> upgrade says nothing to do. Doing a reinstall only installs version 3.2.3 Is 
> there somewhere else to get the version 3.2.4
>
> Thanks.
>
I don't know why it wouldn't work for you, unless you're running a
version of Qubes older than R3.2 or using an unsupported Fedora template.

As a last resort, you can replace your /usr/src/u2mfn-3.2.3/u2mfn.c file
with this one here:

https://raw.githubusercontent.com/QubesOS/qubes-linux-utils/master/kernel-modules/u2mfn/u2mfn.c

and compiling should work.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/oe14qn%249e9%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread ghotiy

> >
> You need to update the qubes-kernel-vm-support package in the Fedora VM
> that you're trying to compile this in. A compatible version (3.2.4)
> should has been pushed out to the stable repositories so running sudo
> dnf upgrade should pull it in (unless you've never installed it in the
> first place, in which case you should run sudo dnf install
> qubes-kernel-vm-support instead). Once you've installed the package, try
> compiling one of those kernels again and it should work.

I have version 3.2.3 installed.  I also have the "current", "current-testing", 
and "unstable" repositories enabled in qubes-r3.repo.  

doing a search for qubes-kernel-vm-support only shows version 3.2.3.  Doing 
upgrade says nothing to do. Doing a reinstall only installs version 3.2.3 Is 
there somewhere else to get the version 3.2.4

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2cb51e68-7975-49fd-9899-b29697b405a3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread Reg Tiangha
On 04/28/2017 09:03 PM, gho...@gmail.com
wrote:
> Hello,
>
> I am following your instructions and trying to compile devel-4.10.  I am 
> getting the following error.  This error also occurs on stable-4.9. Any idea 
> how i can fix this.
>
> Thanks.
>
> /home/user/qubes-linux-kernel/u2mfn/u2mfn.c: In function 'u2mfn_ioctl':
> /home/user/qubes-linux-kernel/u2mfn/u2mfn.c:80:23: error: passing argument 5 
> of 'get_user_pages' from incompatible pointer type 
> [-Werror=incompatible-pointer-types]
>(data, 1, 1, 0, &user_page, 0);
>^
> In file included from /home/user/qubes-linux-kernel/u2mfn/u2mfn.c:26:0:
> /home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/include/linux/mm.h:1271:6:
>  note: expected 'struct vm_area_struct **' but argument is of type 'struct 
> page **'
>  long get_user_pages(unsigned long start, unsigned long nr_pages,
>   ^
> /home/user/qubes-linux-kernel/u2mfn/u2mfn.c:79:9: error: too many arguments 
> to function 'get_user_pages'
>ret = get_user_pages
>  ^
> In file included from /home/user/qubes-linux-kernel/u2mfn/u2mfn.c:26:0:
> /home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/include/linux/mm.h:1271:6:
>  note: declared here
>  long get_user_pages(unsigned long start, unsigned long nr_pages,
>   ^
> cc1: some warnings being treated as errors
> /home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/scripts/Makefile.build:300:
>  recipe for target '/home/user/qubes-linux-kernel/u2mfn/u2mfn.o' failed
> make[4]: *** [/home/user/qubes-linux-kernel/u2mfn/u2mfn.o] Error 1
> /home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/Makefile:1490: 
> recipe for target '_module_/home/user/qubes-linux-kernel/u2mfn' failed
> make[3]: *** [_module_/home/user/qubes-linux-kernel/u2mfn] Error 2
> Makefile:150: recipe for target 'sub-make' failed
> make[2]: *** [sub-make] Error 2
> Makefile:24: recipe for target '__sub-make' failed
> make[1]: *** [__sub-make] Error 2
> make[1]: Leaving directory 
> '/home/user/qubes-linux-kernel/kernel-4.10.13/linux-obj'
> error: Bad exit status from /var/tmp/rpm-tmp.6UeD6a (%build)
>
>
> RPM build errors:
> Bad exit status from /var/tmp/rpm-tmp.6UeD6a (%build)
> Makefile:90: recipe for target 'rpms-dom0' failed
> make: *** [rpms-dom0] Error 1
>
You need to update the qubes-kernel-vm-support package in the Fedora VM
that you're trying to compile this in. A compatible version (3.2.4)
should has been pushed out to the stable repositories so running sudo
dnf upgrade should pull it in (unless you've never installed it in the
first place, in which case you should run sudo dnf install
qubes-kernel-vm-support instead). Once you've installed the package, try
compiling one of those kernels again and it should work.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/oe131i%24au6%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-28 Thread ghotiy
Hello,

I am following your instructions and trying to compile devel-4.10.  I am 
getting the following error.  This error also occurs on stable-4.9. Any idea 
how i can fix this.

Thanks.

/home/user/qubes-linux-kernel/u2mfn/u2mfn.c: In function 'u2mfn_ioctl':
/home/user/qubes-linux-kernel/u2mfn/u2mfn.c:80:23: error: passing argument 5 of 
'get_user_pages' from incompatible pointer type 
[-Werror=incompatible-pointer-types]
   (data, 1, 1, 0, &user_page, 0);
   ^
In file included from /home/user/qubes-linux-kernel/u2mfn/u2mfn.c:26:0:
/home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/include/linux/mm.h:1271:6:
 note: expected 'struct vm_area_struct **' but argument is of type 'struct page 
**'
 long get_user_pages(unsigned long start, unsigned long nr_pages,
  ^
/home/user/qubes-linux-kernel/u2mfn/u2mfn.c:79:9: error: too many arguments to 
function 'get_user_pages'
   ret = get_user_pages
 ^
In file included from /home/user/qubes-linux-kernel/u2mfn/u2mfn.c:26:0:
/home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/include/linux/mm.h:1271:6:
 note: declared here
 long get_user_pages(unsigned long start, unsigned long nr_pages,
  ^
cc1: some warnings being treated as errors
/home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/scripts/Makefile.build:300:
 recipe for target '/home/user/qubes-linux-kernel/u2mfn/u2mfn.o' failed
make[4]: *** [/home/user/qubes-linux-kernel/u2mfn/u2mfn.o] Error 1
/home/user/qubes-linux-kernel/kernel-4.10.13/linux-4.10.13/Makefile:1490: 
recipe for target '_module_/home/user/qubes-linux-kernel/u2mfn' failed
make[3]: *** [_module_/home/user/qubes-linux-kernel/u2mfn] Error 2
Makefile:150: recipe for target 'sub-make' failed
make[2]: *** [sub-make] Error 2
Makefile:24: recipe for target '__sub-make' failed
make[1]: *** [__sub-make] Error 2
make[1]: Leaving directory 
'/home/user/qubes-linux-kernel/kernel-4.10.13/linux-obj'
error: Bad exit status from /var/tmp/rpm-tmp.6UeD6a (%build)


RPM build errors:
Bad exit status from /var/tmp/rpm-tmp.6UeD6a (%build)
Makefile:90: recipe for target 'rpms-dom0' failed
make: *** [rpms-dom0] Error 1

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d0c9881a-4a5e-4cde-93cf-8f7a6efaff3f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to autostart programs upon AppVM startup?

2017-04-28 Thread Gaiko Kyofusho
I would like a program to start up when the appvm starts. I tried putting
it in the .bashrc but that didn't work. Is there another place I should add
the program to ensure that it starts when the appvm starts?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGpWZxOqkPUVbeDXR6aHRDmqKbXof4Kv_FiBFphamnUpwtM%3Dfg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: No Network Connection in Qubes 3.2

2017-04-28 Thread babel
On Thursday, April 27, 2017 at 4:52:50 PM UTC+2, babel wrote:
> I have a Kaby Lake Intel Nuc and after a fresh install of Qubes, the kernel 
> is not loading the ethernet driver or the wlan driver...
> 
> From within sys-net, I see..
> 
> lspci
> 00:00.6 Ethernet controller: Intel Corporation Ethernet Connection (4) I219-V 
> (rev 21)
> 00:01.0 Network controller: Intel Corporation Device 24fd (rev 78)
> 
> 
> [user@sys-net ~]$ lspci -k
> 00:00.6 Ethernet controller: Intel Corporation Ethernet Connection (4) I219-V 
> (rev 21)
>   Subsystem: Intel Corporation Device 2068
> 00:01.0 Network controller: Intel Corporation Device 24fd (rev 78)
>   Subsystem: Intel Corporation Device 9010
> 
> 
> No kernel module being loaded there...
> 
> Anyone have any advice?


Hmm.  
So for some reason, I'm loading the wrong kernel modules, or not at all.  


I tried shutting down the netvm as found here.. 
https://www.qubes-os.org/doc/assigning-devices/ 

Then bringing it back to dom0

echo : > /sys/bus/pci/drivers/pciback/unbind
MODALIAS=`cat /sys/bus/pci/devices/:/modalias`

alone, cat brings a pci-value.  Thanks to this thread 
https://groups.google.com/forum/#!topic/qubes-users/LqhHWJ6GZZU
I figured out to just assign to pci next, but..
the link happens to be unassigned at kernel, because the next command..
MOD=`modprobe -R $MODALIAS | head -n 1`

modprobe: FATAL: Module pci:v00. not found in directory 
/lib/modules/4.4.14-11.pvops.qub...

So I thought I would get clever, but you can't modify anything within 
/sys/bus/pci/devices/\:00../ folder as far as I can tell.  
Also, just adding an alias to the /lib/modules/kernel_version/modules.alias 
doesn't work, so I'm stumped here.  

echo :00:xx.x > /sys/bus/pci/drivers/e1000e/bind
gives me 
-bash: echo: write error: No such device. (even after I add an alias for the 
pci:xxx to /.../modules.alias

If anyone has some insight it would be valuable.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9f0ff25-79e2-46f3-8a97-a970d63d3faf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] say it out (loud) - Qubes OS Stickers

2017-04-28 Thread Darren Fix
On Tuesday, April 25, 2017 at 9:09:06 AM UTC-6, cooloutac wrote:
> On Monday, April 24, 2017 at 3:32:57 AM UTC-4, lok...@gmail.com wrote:
> > On Saturday, 22 April 2017 07:46:28 UTC+8, Dominique St-Pierre Boucher  
> > wrote:
> > 
> > > I would love a big logo like the one on the Twitter post in 2015. I would 
> > > also 
> > > like to have a small on to cover that windows logo on the keyboard... I 
> > > would also 
> > > like one with "Qubes inside"...
> > 
> > If you want a sticker, wouldn't it make more sense to have something 
> > without text. I'd argue that the best symbol for a secure laptop is one 
> > without any symbols or stickers at all. Just a single colour no-label 
> > laptop.
> > 
> > If there was a way to remove the vendor label (Dell, HP, etc...) from a 
> > latpop, I'd do it. :-)
> 
> I mean I guess you have a point though from a security point of view. But I 
> use a desktop.
> 
> I wonder does xfce have a windows desktop theme? lol

All right! I had some high quality stickers made by stickermule and they 
arrived today. I paid $66 for 100 of them. My plan is to send 34 to the Qubes 
team and charge $1 + shipping apiece for the remaining 66. I haven't figured 
out the details yet, but if you're interested hit me up with a private response 
with the following four pieces of information: Qubes sticker in the subject, 
Min number of stickers, Max number of stickers, cost of 1st class shipping from 
USA to where you live. 

Once I've figured out what the demand is and a fair way to distribute them as 
widely as possible, I'll try to get back to you to get shipping information, 
etc. 

Just so we're clear, the $1 price per sticker is paying for the stickers that 
I'm going to send to the developers/team, so any stickers that you buy will 
indirectly help them... kinda.

https://goo.gl/photos/rnqetfXjeekJS6yv9

Cheers!

Darren

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13943241-f419-4956-9d59-fbb9a8a29bcc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cp/mv from win7VM to other VMs?

2017-04-28 Thread Reg Tiangha
On 04/28/2017 07:45 PM, Gaiko Kyofusho wrote:
> Appologies if this is obvious but I only saw it was "possible" in the
> docs and assumed that I would have the option to cp/mv to another
> AppVM in the context menu but it seems that I don't have that in my
> win7VM? I believe I went through the windows tools installation
> correctly, and I can cp/mv things *into* my win7VM just not out of...
> am I missing something?
> -- 
>
The option is buried in the "Send To" menu when you right-click on a file.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/oe0s06%24h14%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] cp/mv from win7VM to other VMs?

2017-04-28 Thread Gaiko Kyofusho
Appologies if this is obvious but I only saw it was "possible" in the docs
and assumed that I would have the option to cp/mv to another AppVM in the
context menu but it seems that I don't have that in my win7VM? I believe I
went through the windows tools installation correctly, and I can cp/mv
things *into* my win7VM just not out of... am I missing something?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGpWZxMx_X5kFkD9vBtxZRgfFDu6WJThqsFqYR1CYj7%2BwbL3hg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: can we have debian-minimal?

2017-04-28 Thread Unman
On Fri, Apr 28, 2017 at 07:23:46PM +0200, u+q...@bestemt.no wrote:
> Dominique St-Pierre Boucher  [2017-03-23 14:54
> +0100]:
> > I was able to build a jessie minimal template but not a stretch one.
> > So I decided to clone it and upgrade the template. I ran into a lot of
> > issues with that. The way I was able to finally do it was to enable
> > the qubes-testing repo for stretch before the updgrade and doing the
> > upgrade from the console (sudo xl console [vm_name]).
> 
> I also was not able to build a stretch-minimal template, only
> jessie-minimal. (I did not try to build any of the regular templates.)
> 
> Notes:
> 
> When updating jessie-minimal to unstable, you have to select the Qubes
> testing repository; the Qubes unstable repository does not exist.
> 
> When you update, be careful with apt-get dist-upgrade; it will remove
> qubes-gui-agent, among others. I don't know if apt-get upgrade will
> result in a full upgrade to debian unstable, but at least it will not
> remove any of the essential qubes packages.
> 
> There are detailed instructions for building an Archlinux template:
> https://www.qubes-os.org/doc/building-archlinux-template/ . Follow them,
> replacing Arch with Debian.
> 
> Do the building in a fedora-23 template. I can personally confirm that
> using a fedora-24-minimal or fedora-25-minimal template causes a lot of
> problems. If I had done it like that from the beginning, I probably
> could have followed Unman's instructions without problem. (Thanks, by
> the way!)
> 
> --
> ubestemt

You should be able to build a stretch template from qubes builder.
The only issue comes with actually building the template - the packages
all build fine.

The issue here is that make template fails because of permissions set
on /tmp in the prepared_image.
If you have started 'make template' and the build fails, then you
should:
cd qubes-src/linux-template-builder/prepared_images
sudo mount stretch-minimal.img /mnt
sudo chmod 777 /mnt/tmp
sudo umount /mnt
cd ../../.. (back to qubes-builder)
make template

The second invocation will work and you will have a shiny stretch
template at the end.
(NB the permissions will remain as 777 on /tmp in the template and
therefore in all qubes based on it. You can change this should you
wish.)

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170429002745.GB13741%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Not using firewall rules correctly?

2017-04-28 Thread Unman
On Fri, Apr 28, 2017 at 06:08:42PM -0400, Gaiko Kyofusho wrote:
> I thought I would make use of Qubes firewall feature and try blocking some
> sites. I 1st tried in the firewallVM -> settings -> firewall rules and
> added some sites, doubleclick.net for example
> 
> I closed it etc then went back to it and saw this error:
> 
> The sys-firewall AppVM is not network connected to a FirewallVM
> You may edit the sys-firewall VM firewall rules but these will not take
> effect until you connect it to a working firewallVM
> 
> ?? I was editing the rules in the sys-firewall VM so I am not sure about
> that, unless perhaps because I have a VPN running? (the the VPN is behind
> not infront of the firewall).
> 
> I tried the same setup/rules but instead of in the sys-firewall VM i tried
> it in my personalVM and while i didn't get an error there, it also didn't
> seem to block sites like doubleclick.net?
> 
> I assume I am doing something wrong but am not sure what as I thought I was
> doing as the qubes firewall doc instructed?

The Qubes firewall is set for each qube.
So if you want to block a particular qube from accessing a site you make
a change in the firewall for that qube, and it is implemented in iptables
on the proxyVM upstream of the qube.

You have tried to set a rule on the firewallVM, and the error message is
telling you that sys-net does not act as a firewallVM.

If you want to block traffic FROM sys-firewall then you can set iptables
rules ON sys-firewall and set them from rc.local or
qubes-firewall-user-script in /rw/config.
Alternatively you can write custom rules in sys-net and implement them
there to block traffic from downstream qubes.

A major problem in doing this is that iptables acts on IP addresses. If
you want to block something like doubleclick.net then you would 
have to block all the IP addresses associated with that domain. An
alternative approach would be to make entries in /etc/hosts resolving
to a local address. This stops any DNS resolution and effectively blocks
access to the site. If you look online there are many examples of hosts
files that use this technique to block access to questionable sites.

hth

unman


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170428222620.GA13480%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't access windows shares?

2017-04-28 Thread Gaiko Kyofusho
On a previous installation of qubes I was able to access my server with
little problem by just going into nautlius and for "other locations" typing
in the "connect to server" box: smb:\\servername\

I had to reinstall and most things have gone fine but an exception is
connecting to my server, now when I try the above I get:

"Unable to access location" Failed ot retrieve share list from server:
connection refused

I did get this problem with AppVMs using my VPN but now it seems that
sometimes it works sometimes not (using the firewallVM).

So I am #1 Unsure what is causing the occasional non-connection to my
server and #2 wondering if there is a way to set up my AppVMs to be able to
access my local server even when they are using my VpnVM

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGpWZxN_ZJ63dzKfGGa1w2HrkFiLA%3D%3DmEJtj103j5N6sJn7Qrw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Not using firewall rules correctly?

2017-04-28 Thread Gaiko Kyofusho
I thought I would make use of Qubes firewall feature and try blocking some
sites. I 1st tried in the firewallVM -> settings -> firewall rules and
added some sites, doubleclick.net for example

I closed it etc then went back to it and saw this error:

The sys-firewall AppVM is not network connected to a FirewallVM
You may edit the sys-firewall VM firewall rules but these will not take
effect until you connect it to a working firewallVM

?? I was editing the rules in the sys-firewall VM so I am not sure about
that, unless perhaps because I have a VPN running? (the the VPN is behind
not infront of the firewall).

I tried the same setup/rules but instead of in the sys-firewall VM i tried
it in my personalVM and while i didn't get an error there, it also didn't
seem to block sites like doubleclick.net?

I assume I am doing something wrong but am not sure what as I thought I was
doing as the qubes firewall doc instructed?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGpWZxPNAn6%3Dk4B8Ftef6%2BQxj3%3D9OzBagyChTqyP-nibFWPG%2BA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] hate to confirm 'shutdown app-VM'

2017-04-28 Thread cooloutac
On Thursday, April 27, 2017 at 2:00:25 PM UTC-4, Unman wrote:
> On Thu, Apr 27, 2017 at 09:33:28AM -0700, Quser wrote:
> > Hi!
> > any idea in which config-file to set true/false confirmation of shutdown 
> > VM's?
> > pls help,
> > love the qubes - but hate confirm.
> > ku
> > 
> 
> Use 'qvm-shutdown' in dom0, and you skip the prompt.
> You can put together a script from a shortcut to kill the front window
> if you want.
> 
> Otherwise you will have to edit the qubes-manager main.py in dom0 - it's
> a python file and you could replace the prompt with a True statement.
> There have been some discussions on the list about hacking the
> Qubes Manager which you can use as a starting point.
> 
> unman

wow someone need to catalog everything unman says lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cef0038-1f4f-41d1-8cb7-cec8c7b4d3b5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Boot Problem

2017-04-28 Thread craig . g . jesson
On Saturday, April 22, 2017 at 8:28:35 PM UTC-7, Andrew Morgan wrote:
> On 04/22/2017 03:21 PM,
> craig.g.jes...@gmail.com wrote:
> > On Wednesday, April 19, 2017 at 1:35:06 PM UTC-7, 
> > craig.g...-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:
> >> I am having at boot problem with my Qubes OS 3.2.  When I boot up I enter 
> >> the disk password and the boot process continues until it gets to the 
> >> line...
> >>
> >> A start job is running for Qubes NetVM startup (32s / no limit)
> >>
> >> And it hangs.  The HDD turns off and the computer will stay here never 
> >> booting or shutting down until you force it to turn off.  Anyone have an 
> >> idea of what is going on and how to fix it?
> >>
> >> Thank you,
> >>
> >> Craig
> > 
> > Thank you for your information.  Using your directions I have managed to 
> > get into my Qubes system.  I disabled qubes-netvm.service and my system 
> > will now shutdown and startup without any kernel command line options.  Of 
> > course this means I have no network connections to anything.  If I enable 
> > the qubes-netvm.service and start sys-net the Qubes OS freezes up and I 
> > have to power cycle the laptop.  How do I fix the qubes-netvm.service?  It 
> > seems to be causing the problem but what do I check next?
> > 
> > Thank you,
> > 
> > Craig Jesson
> > 
> 
> When I was having issues with my NetVM, I backed off all my AppVMs and
> templates (sans the NetVM) to an external drive, reinstalled QubesOS,
> generated a new sys-net and sys-firewall, then restored all my AppVMs
> back again. Fixed all my issues.
> 
> May be a good last resort if you're not sure what's the issue with the
> NetVM.
> 
> Andrew

First I want to thank Manual Amador and Andrew Morgan for your help.  Using 
Manual's advice I was able to get into my frozen laptop.  I then used Andrew's 
advice to backup all of my vm's except for sys-net and sys-firewall.  Then I 
reinstalled Qubes OS v. 3.2.  I have figured out what went wrong.  Qubes on my 
laptop started freezing after a recent update.  The update replaced 
qubes-netvm.service with a new qubes-netvm.service.  This overwrote changes I 
made to qubes-netvm.service to make my Broadcom NetXtreme BCM5761 Gigabit 
Ethernet PCIe and BCM4313 802.11bgn Wireless Network Adapter work.  
Unfortunately I did not backup the qubes-netvm.service to document the changes 
I made.  So I am trying to remember what I did to get these cards working.  But 
everything I have tried has not worked.  I did the "Assigning Devices" work 
around listed here https://www.qubes-os.org/doc/assigning-devices/
and This does not seem to matter on the BCM5761 Ethernet card.  But it does 
seem necessary for the wireless card.  Right now I have the wireless card 
disabled in the BIOS figuring that I will get each card working one at a time.  
So the Ethernet card shows up and I have it assigned to the sys-net vm but it 
will not get an IP address.  I have live booted the laptop with Knoppix and I 
can get an IP address and use the Internet so I know the Ethernet card, the 
cable, and the residential gateway are all working fine so it has to be some 
kind of configuration problem in Qubes.  Here is my Qubes HCL Report...

---
layout:
  'hcl'
type:
  'laptop'
hvm:
  'yes'
iommu:
  'yes'
slat:
  'yes'
tpm:
  'unknown'
brand: |
  Dell Inc.
model: |
  Latitude E5520
bios: |
  A14
cpu: |
  Intel(R) Core(TM) i5-2540M CPU @ 2.60GHz
cpu-short: |
  FIXME
chipset: |
  Intel Corporation 2nd Generation Core Processor Family DRAM Controller 
[8086:0104] (rev 09)
chipset-short: |
  FIXME
gpu: |
  Intel Corporation 2nd Generation Core Processor Family Integrated Graphics 
Controller [8086:0126] (rev 09) (prog-if 00 [VGA controller])
gpu-short: |
  FIXME
network: |
  Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter (rev 01)
  Broadcom Corporation NetXtreme BCM5761 Gigabit Ethernet PCIe (rev 10)
memory: |
  8089
scsi: |
  ST9500423AS  Rev: DEM1
  DVD+-RW GT60NRev: A102

versions:

- works:
'FIXME:yes|no|partial'
  qubes: |
R3.2
  xen: |
4.6.1
  kernel: |
4.4.14-11
  remark: |
FIXME
  credit: |
FIXAUTHOR
  link: |
FIXLINK

---

Here is my Qubes-pre-netvm.service

[Unit]
Description=Netvm fixup
Before=qubes-netvm.service

[Service]
ExecStart=/bin/sh -c echo ':09:00.0 > 
/sys/bus/pci/drivers/pciback/permissive'
Type=oneshot
RemainAfterExit=yes

[Install]
WantedBy=multi-user.target


Anybody have a clue as how to make my network cards work?

Thank you,

Craig Jesson

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d10f7c65-fe73-4b6e-ada8-ce9bd2cff29b%40googlegroups.com.
For more options, visit https://groups.google.com/d

Re: [qubes-users] Re: can we have debian-minimal?

2017-04-28 Thread u+qbsu
Dominique St-Pierre Boucher  [2017-03-23 14:54
+0100]:
> I was able to build a jessie minimal template but not a stretch one.
> So I decided to clone it and upgrade the template. I ran into a lot of
> issues with that. The way I was able to finally do it was to enable
> the qubes-testing repo for stretch before the updgrade and doing the
> upgrade from the console (sudo xl console [vm_name]).

I also was not able to build a stretch-minimal template, only
jessie-minimal. (I did not try to build any of the regular templates.)

Notes:

When updating jessie-minimal to unstable, you have to select the Qubes
testing repository; the Qubes unstable repository does not exist.

When you update, be careful with apt-get dist-upgrade; it will remove
qubes-gui-agent, among others. I don't know if apt-get upgrade will
result in a full upgrade to debian unstable, but at least it will not
remove any of the essential qubes packages.

There are detailed instructions for building an Archlinux template:
https://www.qubes-os.org/doc/building-archlinux-template/ . Follow them,
replacing Arch with Debian.

Do the building in a fedora-23 template. I can personally confirm that
using a fedora-24-minimal or fedora-25-minimal template causes a lot of
problems. If I had done it like that from the beginning, I probably
could have followed Unman's instructions without problem. (Thanks, by
the way!)

--
ubestemt

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170428154944.xt4ggq6xhhd3wxe3%40bestemt.no.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Not all windows appplications visible in Win 7 HVM (Qubes 3.2)

2017-04-28 Thread 'Philipp Raschdorff' via qubes-users

Hello,

I'm using a windows 7 pro HVM under Qubes 3.2 with Qubes Tools 3.2.2.3.
Unfortiunately not all windows applications are available with the App 
menu and I can't add them via "Add more Shortcuts..."


Unfortunately something vital like Internet Explorer is missing

I have run qvm-sync-appmenus, but this didn't help.

Is someone else having the same problem?

- P

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4b678188-15ef-b2ee-2f47-31a5d3f5c94b%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes os - VPN keeps disconnecting

2017-04-28 Thread Chris Laprise

On 04/28/2017 05:47 AM, JT wrote:

Hello, I managed to create a VPN VM which inherits from sys-net VM
according to : https://www.qubes-os.org/doc/vpn/ tutorial (CLI
version). Everything works well, I have the "LINK IS UP notification"
and I have a valid VPN IP on my personal VM but after I start
browsing using Firefox, I manage to go to 2-3 urls and after that the
connection is dead. Connection goes up again after I reboot the VPN
VM but still for couple of seconds.



I'd suggest starting openvpn manually in a CLI where you can read its 
error/warning messages. An easy way to do this is copy 
/rw/config/rc.local to your home dir and remove the --daemon option. 
Then 'sudo ./rc.local' will start it and you can watch the messages.


You could also test your VPN config files in a fresh proxyVM (without 
scripts) to see if the problem has anything to do with the scripts.


--

Chris Laprise, tas...@openmailbox.org
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2adf4a3d-8f80-ff90-6361-7109a27bf38c%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Cannot execute commands in terminal - not root?

2017-04-28 Thread Chris Laprise

On 04/28/2017 08:57 AM, almir.aljic1...@gmail.com wrote:

I do have one final question though.

Say I want my anon-whonix appVM to first route through my VPN, and then connect 
to Tor. How do I do this?

Is it enough if I just go into VM settings on my anon-whonix appVM, and set the 
NetVM as my FirewallVM (which is configured to route through my VPN VM)? Or do 
I have to further configure my VPN VM to route through the sys-whonix VM, which 
in turn routes through my sys-firewall (not the same as my FirewallVM)?



The Whonix site has recommendations on using a VPN with Tor:

https://mail.whonix.org/wiki/Tunnels/Connecting_to_a_VPN_before_Tor#Separate_VPN-Gateway

--

Chris Laprise, tas...@openmailbox.org
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/64c85170-e48d-f8f4-6e4d-dd413db72737%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cannot execute commands in terminal - not root?

2017-04-28 Thread Chris Laprise

On 04/28/2017 08:39 AM, almir.aljic1...@gmail.com wrote:

On Friday, April 28, 2017 at 2:05:40 PM UTC+2, almir.a...@gmail.com wrote:

Okay, I am able to run only the *last* command which is:

sudo apt-get update && apt-get install openvpn resolvconf

Then I shutdown the debian templateVM and I create a VPN VM (proxyVM). When 
it's time to type in:

openvpn --cd /rw/config/vpn --config Mullvad_nl.ovpn

in a terminal on the VPN VM I get the following error:

"Options error: --crl-verify fails with '[[INLINE]]': No such file or directory"

Even though the file/directory exists!


Okay, disregard this. I got it to work.

But on step 4 in the guide you linked, Chris, what do they mean by "Restart the 
client and test the connection again... this time from an AppVM!"?

Do they mean restart the VPN Client? IF so, how do I do that? Just restart the 
ProxyVM and then go on an AppVM and test the connection?



VPN client would mean openvpn. But you can restart the VPN VM (and 
appVM) if you want to be thorough.


Hope its working well for you now!

--

Chris Laprise, tas...@openmailbox.org
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b389ef27-430c-6700-c817-879794fa0810%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot execute commands in terminal - not root?

2017-04-28 Thread almir . aljic1998
I do have one final question though.

Say I want my anon-whonix appVM to first route through my VPN, and then connect 
to Tor. How do I do this?

Is it enough if I just go into VM settings on my anon-whonix appVM, and set the 
NetVM as my FirewallVM (which is configured to route through my VPN VM)? Or do 
I have to further configure my VPN VM to route through the sys-whonix VM, which 
in turn routes through my sys-firewall (not the same as my FirewallVM)?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e62e3a46-5c54-43c5-9ebf-0fe66e2f0ab5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot execute commands in terminal - not root?

2017-04-28 Thread almir . aljic1998
Okay. I solved it. I was doing this wrong:

In step 6 at this link: https://www.qubes-os.org/doc/vpn/

I forgot to change this line:

VPN_OPTIONS='--cd /rw/config/vpn/ --config openvpn-client.ovpn --daemon'

to match my VPN provider's .ovpn filename, which is Mullvad_nl.ovpn.

Thank you for all your help, Chris! Highly appreciated!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/534bd862-40ec-4806-901d-1130cbc46c51%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cannot execute commands in terminal - not root?

2017-04-28 Thread almir . aljic1998
On Friday, April 28, 2017 at 2:05:40 PM UTC+2, almir.a...@gmail.com wrote:
> Okay, I am able to run only the *last* command which is:
> 
> sudo apt-get update && apt-get install openvpn resolvconf
> 
> Then I shutdown the debian templateVM and I create a VPN VM (proxyVM). When 
> it's time to type in:
> 
> openvpn --cd /rw/config/vpn --config Mullvad_nl.ovpn
> 
> in a terminal on the VPN VM I get the following error:
> 
> "Options error: --crl-verify fails with '[[INLINE]]': No such file or 
> directory"
> 
> Even though the file/directory exists!

Okay, disregard this. I got it to work.

But on step 4 in the guide you linked, Chris, what do they mean by "Restart the 
client and test the connection again... this time from an AppVM!"?

Do they mean restart the VPN Client? IF so, how do I do that? Just restart the 
ProxyVM and then go on an AppVM and test the connection?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01558abe-9e13-42ca-bace-9a19f0d65ac1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cannot execute commands in terminal - not root?

2017-04-28 Thread almir . aljic1998
Okay, I am able to run only the *last* command which is:

sudo apt-get update && apt-get install openvpn resolvconf

Then I shutdown the debian templateVM and I create a VPN VM (proxyVM). When 
it's time to type in:

openvpn --cd /rw/config/vpn --config Mullvad_nl.ovpn

in a terminal on the VPN VM I get the following error:

"Options error: --crl-verify fails with '[[INLINE]]': No such file or directory"

Even though the file/directory exists!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f02d84be-c50d-4e09-aca9-dd425e8f21ea%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cannot execute commands in terminal - not root?

2017-04-28 Thread almir . aljic1998
On Friday, April 28, 2017 at 4:50:07 AM UTC+2, Chris Laprise wrote:
> On 04/27/2017 06:48 PM, almir.aljic1...@gmail.com wrote:
> > On Friday, April 28, 2017 at 12:29:57 AM UTC+2, almir.a...@gmail.com
> > wrote:
> >> Alright. But I have another question. In the guide you linked, on
> >> step 4, it tells me to add 3 lines to my openvpn-client.ovpn file.
> >> Where do I add these 3 lines in this file? Is it fine if I just put
> >> them at the bottom of the file?
> 
> Position in the ovpn file isn't important.
> 
> When you re-started the VPN VM, did is display a popup window saying it
> connected?
> 
> 
> >
> > I've done everything according to the guide you sent:
> >
> > 1) I first created the ProxyVM - not standalone - under a Debian
> > template
> >
> > 2) I did the commands found in step 2 of the Mullvad guide to install
> > OpenVPN on the ProxyVM
> 
> This would have to be installed in the template, not the VPN VM.
> 
> My personal preference would be to clone the template and upgrade that
> to Debian 9 which already has openvpn 2.4:
> 
> https://www.qubes-os.org/doc/template/debian/upgrade-8-to-9/
> 
> 
> >
> > 3) I downloaded an Android configuration file (country: Netherlands)
> >
> > 4) I started following the guide you linked, and did the sudo mkdir
> > command in the ProxyVM to create a vpn folder in /rw/config/, and
> > then I moved my Android configuration file into the newly created vpn
> > folder
> >
> > 5) I then ran this command (step 2 of the qubes-OS link guide): sudo
> > openvpn --cd /rw/config/vpn --config openvpn-client.ovpn
> >
> > and the connection seemed to work
> >
> > 6) I then fixed all the scripts, made them executable and then I
> > restarted the ProxyVM.
> >
> > 7) I changed the configuration of my 'personal' AppVM so that it
> > routes through the ProxyVM.
> >
> > Here's the problem, then: when I open Firefox in my 'personal' AppVM,
> > I simply get a "Problem loading page" when I try to visit any
> > website, such as www.google.com.
> >
> > What am I doing wrong?
> >
> > Sincerely appreciate help!
> >
> 
>  From the appVM, can you ping a known IP address? Then try to ping a 
> domain name.
> 
> -- 
> 
> Chris Laprise, tas...@openmailbox.org
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Yes, when I re-started the VPN VM a popup window did appear saying I was 
connected.

I tried running the Mullvad commands to install OpenVPN in the Debian-8 
templateVM but it did not work. I get the following error message:

"Resolving swupdate.openvpn.net ... failed: Name or service not known.
wget: unable to resolve host address 'swupdate.openvpn.net'
gpg: no valid OpenPGP data found."

But the same commands do work in the debian-8 AppVM. What's the issue?

I'm going to try installing debian-9 but would highly appreciate an answer to 
why I'm unable to install OpenVPN right from the debian templateVM.

And no, from what I re-call I was unable to ping a known IP address from the 
AppVM. BUt the connectio did seem to go through when I used the openvpn command 
in the ProxyVM.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5511c007-9077-422a-8a3d-5a0c957587dd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes os - VPN keeps disconnecting

2017-04-28 Thread JT
Hello, I managed to create a VPN VM which inherits from sys-net VM according to 
: https://www.qubes-os.org/doc/vpn/ tutorial (CLI version).
Everything works well, I have the "LINK IS UP notification" and I have a valid 
VPN IP on my personal VM but after I start browsing using Firefox, I manage to 
go to 2-3 urls and after that the connection is dead.
Connection goes up again after I reboot the VPN VM but still for couple of 
seconds.


I'm not sure what could be wrong.
I'd appreciate your help with this.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/791f5580-e576-4e89-92a6-24b86117b7a8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] sh script as application executable - shortcut + install for all Debian vm's

2017-04-28 Thread JT
Hello, I have a problem with my application (Phpstorm). I downloaded it to my 
debian-8 template vm. I have sh script executable but I want it to appear in 
shortcuts and I want to be able to use it from all VMs inheriting from debian-8 
template. Is it even possible or should I download a separate oh-storm for all 
my VMs ? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/70aac00c-49e4-404e-8315-159950f31d05%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: off topic - invite codes to 'riseup'

2017-04-28 Thread vbagdadevsespokoyno
Hi, if your offer of sending riseup invitation is still on, i'd be pleased that 
you send me one. I'd really appreciate the help. Thanks in advance.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bebce879-86c8-407e-b120-49e7651e109f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Kernels: Does anyone use Bluetooth in dom0? How about alternative file systems?

2017-04-28 Thread Foppe de Haan
I did use a BT keyboard+mouse until recently (MS Sculpt ergonomic), passed 
through from USBVM though I don't know if that requires BT support in dom0. 
(Not anymore, hw defect.)
No alt FSs -- in part because I still have windows installed on another disk, 
and so want to be able to access multimedia files from both OSes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/881fa1bc-3f50-4f3c-b3be-e0a3fe808298%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.