Re: [qubes-users] Attempting to make dedicated USB Qube

2017-06-10 Thread Franz
On Sat, Jun 10, 2017 at 11:10 PM, Christopher Thacker  wrote:

> To clarify, my purpose is to attach and detach an external USB hdd I use
> for data backup.
>
> When I first started using Qubes 3.2, I could automatically do so, just as
> I did in Qubes 2.0.
>
> After updating Qubes 3.2, I could no longer attach any external USB
> device.  The attach option is "greyed", thus preventing my selecting it.
>
>
Have you tried restarting your computer?


> Thank you.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/f4d4b0da-c225-4a8a-896f-4e96671c52a6%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBLZuHNb%3DzG0DEe0kRTb_jHUQw7iyDWHTb9p-a%3Dv%3DtbYw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Attempting to make dedicated USB Qube

2017-06-10 Thread Franz
On Sat, Jun 10, 2017 at 10:56 PM, Christopher Thacker  wrote:

> I want to make a dedicated USB Qube per the directions shown here:
>
> https://www.qubes-os.org/doc/usb/
>
> However I have some problems:
>
> 1) The directions state "You can create a USB qube using the management
> stack by performing the following steps as root in dom0:"
>
> Unfortunately I don't know how to access root in Qubes 3.2, which is what
> I use.  I don't even know if root is enabled.
>
>
You can achieve this for example using the prefix "sudo" before your command


> How should I proceed?
>
> 2) The same directions briefly discuss hiding all USB controllers from
> dom0.
>
> Should I do so?
>
>
During Qubes 3.2 installation there is an option to install a USB Qube. Did
you use that? Do you see a sys-usb VM in your Qubes Manager?

If not I would consider reinstalling Qubes with the USB Qube option
activated, that may be easier to do if you have no linux experience.

But of course you may first try to follow the procedure that teaches
exactly how to hide all usb controllers from Dom0 which is the thing to do.


FYI - My system is Qubes 3.2 on i7-4700hq at 2.4ghz with 4 USB 3.0 slots
> and 8gb system ram.
>
> Thank you.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/e89034f6-fa3b-4478-816c-2fc17200aa59%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCEZoqbPa4bBf6aNfzjs00CTAbPvuz5Ep8EGwwhgj%2Bg5A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Attempting to make dedicated USB Qube

2017-06-10 Thread Christopher Thacker
To clarify, my purpose is to attach and detach an external USB hdd I use for 
data backup.  

When I first started using Qubes 3.2, I could automatically do so, just as I 
did in Qubes 2.0.

After updating Qubes 3.2, I could no longer attach any external USB device.  
The attach option is "greyed", thus preventing my selecting it.

Thank you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4d4b0da-c225-4a8a-896f-4e96671c52a6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Attempting to make dedicated USB Qube

2017-06-10 Thread Christopher Thacker
I want to make a dedicated USB Qube per the directions shown here:

https://www.qubes-os.org/doc/usb/

However I have some problems:

1) The directions state "You can create a USB qube using the management stack 
by performing the following steps as root in dom0:"

Unfortunately I don't know how to access root in Qubes 3.2, which is what I 
use.  I don't even know if root is enabled.  

How should I proceed?

2) The same directions briefly discuss hiding all USB controllers from dom0.  

Should I do so?

FYI - My system is Qubes 3.2 on i7-4700hq at 2.4ghz with 4 USB 3.0 slots and 
8gb system ram.

Thank you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e89034f6-fa3b-4478-816c-2fc17200aa59%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installation from USB fails

2017-06-10 Thread Karim Adel
Hi,

I used 'dd' to burn the .iso on a USB successfully, but booting from the USB 
does not work.

I do get the grub menu but that's it, any choice i make (out of the 4) takes me 
back to the same menu.

There is an error that is returned but it goes away very quickly.

This is Qubes-R3.2-x86_64.img for a laptop that has a 7th generation i5 that 
supports both vt-d and vt-x and CSM disabled

The error is :

/EndEntire
file path: /ACPI/(a0341d,0)/PCI(0,4)/USB(6,0)/(EFI\BOOT)/File(xen.efi)/EndEntire

What does that mean ? I tried two different USB disks, burned from different 
OSs.

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a3a5af0-dbb4-4b41-a627-796b4621c3a0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Fedora updates in small sessions, and I must reboot my VMs

2017-06-10 Thread Chris Laprise

On 06/10/2017 06:04 PM, yreb-qusw wrote:

On 06/10/2017 11:52 AM, Foppe de Haan wrote:

On Saturday, June 10, 2017 at 11:33:24 PM UTC+2, yreb-qusw wrote:

Is there some special reason, why Fedora updates 10 times a week, it's
kind of a pain to manual reboot 10 AppVMs  just for some tiny update,
yes, I could just not update the AppVMs , or wait and not update Fed24
when it suggest I do but.


You do know that you don't *have* to reboot them every time you update
the template, right? :)


Sure thats what I said, but who knows maybe one of these crazy packages
is related to security or something,  that or I don't like seeing the
little green circles  :)

thanks for replying


Fedora has been that way for years, and its not surprising since they're 
more of a testbed distro for Red Hat and not user-focused.


Debian's updates for 'stable' are a lot more reasonable, and you can 
choose to update only from the security repository making the update 
frequency even sparser.


--

Chris Laprise, tas...@openmailbox.org
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00534372-3f92-815d-927c-2a5e382bd32a%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora updates in small sessions, and I must reboot my VMs

2017-06-10 Thread yreb-qusw

On 06/10/2017 11:52 AM, Foppe de Haan wrote:

On Saturday, June 10, 2017 at 11:33:24 PM UTC+2, yreb-qusw wrote:

Is there some special reason, why Fedora updates 10 times a week, it's
kind of a pain to manual reboot 10 AppVMs  just for some tiny update,
yes, I could just not update the AppVMs , or wait and not update Fed24
when it suggest I do but.


You do know that you don't *have* to reboot them every time you update the 
template, right? :)

Sure thats what I said, but who knows maybe one of these crazy packages 
is related to security or something,  that or I don't like seeing the 
little green circles  :)


thanks for replying

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e365d5fa-bb01-62f5-5167-bb6737c5012a%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora updates in small sessions, and I must reboot my VMs

2017-06-10 Thread Foppe de Haan
On Saturday, June 10, 2017 at 11:33:24 PM UTC+2, yreb-qusw wrote:
> Is there some special reason, why Fedora updates 10 times a week, it's 
> kind of a pain to manual reboot 10 AppVMs  just for some tiny update, 
> yes, I could just not update the AppVMs , or wait and not update Fed24 
> when it suggest I do but.

You do know that you don't *have* to reboot them every time you update the 
template, right? :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f3d46746-fe00-4f6f-a3dd-fe7dabf60224%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora updates in small sessions, and I must reboot my VMs

2017-06-10 Thread yreb-qusw
Is there some special reason, why Fedora updates 10 times a week, it's 
kind of a pain to manual reboot 10 AppVMs  just for some tiny update, 
yes, I could just not update the AppVMs , or wait and not update Fed24 
when it suggest I do but.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8a3a5353-f531-1584-d03d-d3549c8e51a0%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] has anyone got U2F keys working in Fed24 Template or so?

2017-06-10 Thread yreb-qusw

I found the instructions on yubikeys site,
however when I went and changed  rules.d
my system basic froze, and I had to hard reboot, was considered I may 
have totally broke Qubes, but was able to remove the rules.d reference, 
but I see no other instructions to do this:


https://github.com/Yubico/libu2f-host/blob/master/70-u2f.rules
https://forum.yubico.com/viewtopic.php?f=26=1535


Pardon me, if I'm off-topic   :|

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d978c289-e03c-64df-5763-e475c7ee9762%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Suggestion on VPN Docs Qubes instructions

2017-06-10 Thread yreb-qusw

In this section:

Set up a ProxyVM as a VPN gateway using iptables and CLI scripts

Where it says this:



Set up and test the VPN client.

Make sure the VPN VM and its template VM are not running.

Run a terminal (CLI) in the VPN VM  this will start the VM. Then make a 
new ‘vpn’ folder with sudo mkdir /rw/config/vpn and copy your VPN config 
files here (the example config filename used here is 
openvpn-client.ovpn). Files accompanying the main config such as *.crt 
and *.pem should also go here, and should not be referenced in the main 
config by absolute paths such as ‘/etc/…’.


Notes about VPN config options: The VPN scripts here are intended to 
work with commonly used tun interfaces, whereas tap mode is untested. 
Also, the config should route all traffic through your VPN’s interface 
after a connection is created; For openvpn the directive for this is 
redirect-gateway def1.






Lastly, the VPN client may not be able to prompt you for credentials 
when connecting to the server: Creating a file in the ‘vpn’ folder with 
your credentials and using a directive such as openvpn’s auth-user-pass 
 is recommended.



It seems like this file needs to be changed to  be read-only, for the 
appropriate ownershipbased on the complaints that pop up, when 
testing   in the terminal before  one doesn't notice it later, when not 
using the terminal to start the openvpn --config


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9f8e601e-29b1-635e-1b5e-b65401a332e3%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: trouble with Lenovo P51 (nvidia quadro m1200)

2017-06-10 Thread pseudo-sue
This isn't Qubes-specific, but I had a fair bit of trouble getting various 
linux distros installed on my P51 (until I finally got NixOS working). The 
issue seemed to be that, while the installer (and *some* of the various linux 
kernels I was working with) seemed to know what to do with the NVME drive (the 
faster and more modern of the two SSDs I have on this box), and would even let 
me install grub to its boot sector, the BIOS itself couldn't find it. I was 
working in Legacy mode, so that might have been part of the issue. The 
workaround was to install grub in the boot sector of a more traditional drive 
(the older SSD worked fine). 

Not sure if this is the same issue you're having, and afaik, Qubes sort of 
struggles with Nvidia, especially the newer cards, so there might be more 
hassles ahead. 

On Wednesday, May 31, 2017 at 11:44:49 AM UTC-3, Dave C wrote:
> Trying to install Qubes on a laptop with graphics card 
> NVIDIA Quadro M1200 4GB GDDR5
> 
> The 3.2 installer fails to start X, and falls back to text mode.  (Which 
> complains something about disk entryption and fails to complete the install.)
> 
> I have Qubes 3.2 installed on a portable SSD, so I tried booting the P51 to 
> that.  It made it as far as prompting for the disk password, again in text 
> mode.  After typing the password the boot stopped with only a flashing cursor 
> (underbar) in the upper left corner of the display.  No errors, just stopped 
> there.
> 
> I've read some troubleshooting tips...
> 
> Tried disabling VT-d in bios - no difference.
> 
> Tried `iommu=no-igfx`on the boot line - again no difference.
> 
> And I've found https://www.qubes-os.org/doc/install-nvidia-driver/ and 
> reading that now.  Is this page up to date?  (It mentions "fedora 18").
> 
> I thought this machine would be great for Qubes, as it has tons of RAM among 
> other things.  But maybe not so much!
> 
> Appreciate any suggestions.  Thanks,
> -Dave

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5436a058-4e49-47db-a63b-b2ece8eec5d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DVM template changes to the Home folder are not being passed on to the DVM instances

2017-06-10 Thread Unman
On Sat, Jun 10, 2017 at 01:57:22PM +, atlahua wrote:
> Hi there:
> 
> In the past, whenever I wanted some folder or file to be on the DVM
> instances I would place it on the DVM template Home folder and every time
> they would appear on each DVM start.
> This is not happening any more and now the Home folders shows just the same
> folders as the basic template without any modifications.
> 
> This is happening only on newly created DVM templates. The original
> fedora-23-dvm works as usual and the DVM's instances show the changes?!?
> 
> STEPS I HAVE FOLLOWED:
> 
> 1. Clone the fedora-23 template (my-clone).
> 2. Run the qvm-create-default-dvm to create my-clone-dvm.
> 3. Customize my-clone-dvm for example including a Firefox profile on the
> Home folder.
> 4. Start a DVM through the command line on dom0.
> 
> 
> NOTE: I also have tried doing the changes on my-clone directly and running
> the qvm-create-default-dvm command after that to not avail.
> 
> This used to work on my all my custom DVM's and still works on fedora-23-dvm
> but not on all the other ones which, by the way, have maintained the
> previous changes until it stopped working. The only thing I have done is to
> update the fedora-23 template which I had not update it since I installed
> Qubes.
> 
> Have you experienced anything similar? Any ideas welcomed.
> A.
> 
> 

I don't see this behaviour at all.
Are you remembering to create the hidden file to show its customised?
Also, AFTER that you need to run the qvm-create-default-dvm command again
to generate a new dispVMTemplate which embodies your customization, and
this isn't shown in your "steps".

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170610150248.GC21639%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to stop sys-whonix and sys-firewall from starting on boot?

2017-06-10 Thread Unman
On Sat, Jun 10, 2017 at 12:32:03PM +, mari...@grrlz.net wrote:
> On 2017-06-08 10:53, Unman wrote:
> >On Wed, Jun 07, 2017 at 07:25:01PM -0400, 'Tomei Ningen' via qubes-users
> >wrote:
> >>Would this require a CLI command to disable or is this possible through
> >>Qubes Manager? I've noticed that whenever I deselect the "Start VM
> >>automatically on boot" option in the QM settings area [for sys-net and
> >>sys-firewall specifically] they still continue to boot up at system
> >>startup.
> >>
> >>Best,
> >>TN
> >>
> >>Sent with [ProtonMail](https://protonmail.com) Secure Email.
> >>
> >> Original Message 
> >>Subject: Re: [qubes-users] How to stop sys-whonix and sys-firewall from
> >>starting on boot?
> >>Local Time: June 7, 2017 10:35 PM
> >>UTC Time: June 7, 2017 10:35 PM
> >>From: un...@thirdeyesecurity.org
> >>To: mari...@grrlz.net
> >>qubes-users@googlegroups.com
> >>
> >>On Wed, Jun 07, 2017 at 08:24:36PM +, mari...@grrlz.net wrote:
> >>> I have already disabled that option on the VM's settings and I have also
> >>> disabled automatic updates on Qubes Manager general settings but nothing
> >>> changed.
> >>> Any ideas?
> >>
> >>If you have any other qubes set to start automatically, then the
> >>upstream
> >>qubes will be started too.
> >>The default netvm is started automatically - you can stop this by
> >>disabling the qubes-netvm service in dom0.
> >>
> >>unman
> >>
> >
> >No you will need to disable the service at command line in dom0. The
> >option isnt available in Qubes Manager.
> >
> >unman
> 
> Are you referring to the qvm-service command? I think the start at boot
> option is not included there...
> If not then where is it?

Read the thread in full - the service is qubes-netvm.
qvm-prefs is for adjusting services in qubes.
In dom0 you can use the usual controls - 'systemctl disable qubes-netvm'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170610145240.GB21639%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Changing DVM default settings on start

2017-06-10 Thread Unman
On Sat, Jun 10, 2017 at 01:15:57PM +, atlahua wrote:
> On 2017-06-08 10:51, Unman wrote:
> >On Wed, Jun 07, 2017 at 07:40:07PM -0700, cooloutac wrote:
> >>On Wednesday, June 7, 2017 at 8:30:45 PM UTC-4, atlahua wrote:
> >>> Hi there,
> >>>
> >>> Is there a way to change DVM's default settings on start?
> >>>
> >>> i.e. start a DVM instance with no network access when the default DVM
> >>> template usually starts with sys-whonix as a proxy VM.
> >>>
> >>> Regards,
> >>> A.
> >>
> >>one way would be to start the dvm from the terminal of an appvm that has
> >>no network access, since it will inherit those appvm firewall rules.
> >>
> >>There is probably better way that someone else can chime in.
> >>
> >
> >Use a wrapper script like this:
> >
> >qvm-prefs debian-8-dvm -s netvm none
> >xdg-open /usr/local/share/applications/qubes-dispvm-xterm.desktop
> >qvm-prefs debian-8-dvm -s netvm sys-whonix
> >
> >Bind it to a keyboard shortcut, or menu entry.
> >
> >You can have multiple disposableVMs starting from different templates,
> >and connected to different netvms. Start up is not noticeably delayed.
> >YMMV
> >
> >unman
> 
> Thanks for the answer.
> I am already using the script you posted on a previous query and it is
> working great.

Nice to know. :-)

> I am just thinking on how to integrate the two things. Maybe the keyboard
> shortcut can include the two calls to qvm-prefs of your suggested wrapper
> and then the script switch-dvm.sh in the middle.
> 

Because I use switch-dvm.sh to create new dispVMTemplates, and have them
non networked by default, I put that call before the prefs change.
Whatever works for you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170610144832.GA21639%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] X.org failure preventing boot, Intel graphics

2017-06-10 Thread Ryan Tate

> On Jun 10, 2017, at 2:39 AM, Vít Šesták 
>  wrote:
> 
> Good to hear it helps. Fronm “without being able to actually boot into 
> Qubes?”, I wrongly assumed you are unable to switch to a different tty. 

This was actually a correct assumption, due to my ignorance :-) I did not know 
the "trick" of stopping boot and getting a login prompt with Ctrl-Alt-Whatever 
until after I was researching your response on the web and I stumbled on 
something on StackOverflow. So all the confusion is my fault. Thanks again.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/868E584B-8831-46BD-B5F1-B16FD3A4AD78%40ryantate.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to start VM or DVM with LUKS drive attached to it.

2017-06-10 Thread atlahua
How can I start a VM and in particular a DVM instance with a LUKS drive 
already attached to it instead of having to go each time through the 
process of attaching it through the Qubes Manager.


In this case the drive is encrypted and therefore I should have to enter 
the password at some stage of the boot up process.


Thanks,

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eac07bb4d92085087c298e6e79cba932%40krutt.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to stop sys-whonix and sys-firewall from starting on boot?

2017-06-10 Thread marisko

On 2017-06-08 10:53, Unman wrote:
On Wed, Jun 07, 2017 at 07:25:01PM -0400, 'Tomei Ningen' via 
qubes-users wrote:
Would this require a CLI command to disable or is this possible 
through Qubes Manager? I've noticed that whenever I deselect the 
"Start VM automatically on boot" option in the QM settings area [for 
sys-net and sys-firewall specifically] they still continue to boot up 
at system startup.


Best,
TN

Sent with [ProtonMail](https://protonmail.com) Secure Email.

 Original Message 
Subject: Re: [qubes-users] How to stop sys-whonix and sys-firewall 
from starting on boot?

Local Time: June 7, 2017 10:35 PM
UTC Time: June 7, 2017 10:35 PM
From: un...@thirdeyesecurity.org
To: mari...@grrlz.net
qubes-users@googlegroups.com

On Wed, Jun 07, 2017 at 08:24:36PM +, mari...@grrlz.net wrote:
> I have already disabled that option on the VM's settings and I have also
> disabled automatic updates on Qubes Manager general settings but nothing
> changed.
> Any ideas?

If you have any other qubes set to start automatically, then the 
upstream

qubes will be started too.
The default netvm is started automatically - you can stop this by
disabling the qubes-netvm service in dom0.

unman



No you will need to disable the service at command line in dom0. The
option isnt available in Qubes Manager.

unman


Are you referring to the qvm-service command? I think the start at boot 
option is not included there...

If not then where is it?
___

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ee7b7232ad9265da71d35e1540d13dc%40grrlz.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] X.org failure preventing boot, Intel graphics

2017-06-10 Thread Vít Šesták
Good to hear it helps. Fronm “without being able to actually boot into Qubes?”, 
I wrongly assumed you are unable to switch to a different tty. And the level of 
details you had provided suggested you would write it differently if this 
works. This is the reason why I suggested booting installer etc.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/281be6b6-f31c-43b7-b5cc-5ad98040d253%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: The more cores the merrier?

2017-06-10 Thread Vít Šesták
I have to agree with cooloutac.

Btw, with new laptop, I've switched from quad-core to dual-core (with higher 
per-core performance) and I don't regret. This is not to discourage you from 
quad-core, I'd probably also go for quad-core if I could: However, with 
laptops, I was much constrainted when looking for high-end laptop without 
dedicated GPU. If it is a desktop computer, you're in a bit easier position 
with QubesOS and high-end hardware.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1821741d-abcc-41b1-81bd-fd32f63ed69f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.