[qubes-users] HCL — ASUS Q325UA

2017-08-01 Thread Tao Effect
Ran into all of the same issues that Mike Freemon experienced:

- 
https://groups.google.com/forum/#!searchin/qubes-users/display$20resolution|sort:relevance/qubes-users/BUe4tFfERtA/buazJHIzCQAJ
 

- https://groups.google.com/forum/#!msg/qubes-users/Eq2zZU5yXEs/qs94AX1uAAAJ 


But, while attempting to follow Mike's recommendations, I ran into additional 
obstacles as described here:

https://github.com/QubesOS/qubes-issues/issues/2945 


Ultimately I was able to get the laptop working.

HVM: Yes
IOMMU: Yes
SLAT: Yes
TPM: `qubes-hcl-report` says 'unknown`, but I think I remember reading 
somewhere that it does?
Qubes: R3.2
Kernel: Supports the one in unstable (4.8.12-12), and in fact requires it for 
proper screen resolution support
Remark: What I wrote above, including all relevant links

--
Please do not email me anything that you are not comfortable also sharing with 
the NSA.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/C4F7FCD4-80ED-4382-A2BF-A506E054C5C4%40taoeffect.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 3.2 Network failure after update template to fedora-25

2017-08-01 Thread jpb
I've been using Qubes 3.2 for about 6 months.  I installed it with all the 
default settings.  The template used for sys-net and sys-firewall is the 
standard fedora-23.  I've attempted to update it to fedora-24 and now 
fedora-25, however each time I change the Template in the vm settings from 
fedora-23 to fedora-24 or -25, the network fails.

By fails I mean, only from sys-net can I access the internet with a simple 
ping.  sys-firewall fails to communicate with sys-net.  All the other templates 
and user vm's also fail to access the internet.

When I revert sys-net back to fedora-23 but leave sys-firewall at either 
fedora-24 or fedora-25, the sys-firewall can then begin to ping the internet, 
but everything behind the sys-firewall cannot.

When I revert sys-firewall back to fedora-23 (sys-net still at fedora-23), then 
all works again.  I am able to update the template for all my other vm's to 
fedora-24 or 25 and they will work as long as the sys-firewall and sys-net are 
left at fedora-23.  But if either sys-firewall or sys-net are using any 
template other than fedora-23, the network traffic fails somewhere along the 
route.

I have noticed that when fedora-23 template is being used, the network setup in 
sys-net is different than when fedora-24 or 25 templates are being used. It 
looks like the vif is not being defined.

sys-net with fedora-23 template:
enp0s0: inet 192.168.0.60 netmask 255.255.255.0 broadcast 192.168.0.255
lo:  inet 127.0.0.1 netmask 255.0.0.0 
vif6.0: inet 10.137.1.1 netmask 255.255.255.255 broadcast 0.0.0.0

sys-net with fedora-25 template:
enp0s0: inet 192.168.0.59 netmask 255.255.255.0 broadcast 192.168.0.255
lo:  inet 127.0.0.1 netmask 255.0.0.0 
vif12.0: no inet, netmask, or broadcast defined

The only changes I've made is to install the fedora-25 template from the repo 
and change the template in the sys-net and sys-firewall vm.

Did I miss a step in the update process to migrate from one fedora template to 
another?

Any thoughts are appreciated.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f271ee99-3dd6-4539-8aae-eaf2241dbcaa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] UEFI secureboot issue

2017-08-01 Thread Jean-Philippe Ouellet
On Tue, Aug 1, 2017 at 7:50 PM, cooloutac  wrote:
> Qubes doesn't support secure boot unfortunately.  I think its batshit crazy 
> to consider a pc even reasonably secure without it.

Secure boot in reality is quite far from the boot chain panacea its
name may suggest.

If you haven't already, I'd suggest reading Joanna's "Intel x86
considered harmful" paper [1] and checking out Trammell Hudson's Heads
project [2].

FWIW, the systems I currently believe have the most secure boot chains
do not involve UEFI at all.

Regards,
Jean-Philippe

[1]: https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf
[2]: http://osresearch.net/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_C1sdiKTX6e6ik_popWiZGFycxxTEvO7W4QHYsXccjWtw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: heads up, qubes 3.2 still vuln to cve-2016-4484 (minor severity)

2017-08-01 Thread cooloutac
On Wednesday, July 19, 2017 at 6:26:16 PM UTC-4, yreb-qusw wrote:
> On 07/19/2017 12:17 PM, cooloutac wrote:
> >
> >
> > secure boot isn't supported on qubes unfortunately. Hacking teams insyde 
> > bios exploit could be used remotely according to experts, so secure boot 
> > would actually defend against something like that remotely as well.  I hope 
> > people get over the anti microsoft and redhat notions about it.  Richard 
> > Stallman gives it the ok in its current state, so why spite.
> >
> >  And ya AEM seems complicated to setup so unless you travel alot and are 
> > worried about evil maids or someone breaking into your computer, a  usbvm 
> > is probably more practical.
> >
> 
> So, you do use both an Admin and User  pw  , but not secure boot  for 
> your Qubes machine?
> 
> no evil maids here, but I guess there is/was talk  of remote exploits 
> and or  USB drives  of possible uncertain   cleanliness,  that might 
> also be protected by AEM ?
> 
> 
> in my case, last time the USBVM thing  , or my attempted implementation, 
> rather,  nearly cause a meltdown, but since I've the PS2 adapter, 
> personaly, I'm also avoiding the USBVM . I suppose overall, I'm 
> still safer than running  Windows 10  :)  aren't  I ...
> or other Ubuntu  distros

aem doesn't protect anything,  its just an alert if something was compromised.  
 Secure boot on the other hand will actually prevent an exploit.   From reading 
other users experience aem also seems buggy so I don't know how reliable it is. 
 People on here have gotten false positives.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9fa3a95-b405-4848-8ab1-c13a909fe90f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread cooloutac
On Tuesday, August 1, 2017 at 7:53:45 PM UTC-4, Jean-Philippe Ouellet wrote:
> On Tue, Aug 1, 2017 at 7:46 PM, cooloutac  wrote:
> > am I reading this right?  There is no qubes-manager in 4.0? Does that mean 
> > everything must be done in a terminal?  Tell me I read that wrong lol.
> 
> tl;dr - https://github.com/QubesOS/qubes-issues/issues/2132

oh ok I see,  so a taskbar widget or something to replace the manager.  I 
thought they lost their minds for a second. My immediate thought was what about 
attaching drives, and seeing if updates available?  Joanna addressed all my 
concerns but I'm gonna have to wait and see what happens with this.   Hopefully 
it doesn't turn out to be more confusing then the manager.

Right now my mother and family are able to use qubes no problem with no 
terminal actions required.  none at all. I don't know why that shocks some 
people when I tell them.   I hope that remains the same becvause they wouldn't 
be using Qubes without it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c95fcce-6f09-4874-b422-3263eeb48f2d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Jean-Philippe Ouellet
On Tue, Aug 1, 2017 at 7:46 PM, cooloutac  wrote:
> am I reading this right?  There is no qubes-manager in 4.0? Does that mean 
> everything must be done in a terminal?  Tell me I read that wrong lol.

tl;dr - https://github.com/QubesOS/qubes-issues/issues/2132

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_AyqGT4_HFDOMrYtMPQ5hEPd%3DFvsa%3DUy1AYBQTtVhcnHA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] UEFI secureboot issue

2017-08-01 Thread cooloutac


Qubes doesn't support secure boot unfortunately.  I think its batshit crazy to 
consider a pc even reasonably secure without it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/923ca02b-d750-45a6-8a45-375e7052dfc8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread cooloutac
am I reading this right?  There is no qubes-manager in 4.0? Does that mean 
everything must be done in a terminal?  Tell me I read that wrong lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0bba1cf-850c-4f97-8ca1-54cd1fe5c50f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] dvm removal ?

2017-08-01 Thread yreb-qusw

On 08/01/2017 01:05 AM, Marek Marczykowski-Górecki wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jul 31, 2017 at 10:01:50PM -1000, qubester wrote:

Hello,

when I create a dvm  i'm now up to dvm-17  , is one supposed to be removing
dvm's manually?  because I do see how,  though each ititeration, continues
to count up  would that be expected behavior?


No, it isn't. For which Disposable VMs it happens? Started from menu,
opening a file in DispVM, or something else?
.often I have done, open pdf  in DispVM  and then when I close the 
pdf the DispVM disappears.  Rarely from the menu.


..fwiw, I had  been  using the Whonix suggested default DVM , but 
wanted/want to go back to the default method,  as I think the Whonix way 
is/was "over my head" ; so just recently I changed the default back to 
Fedora 25 template  FWIW.



I don't really recall which of the 3 options I used for the Whonix 
DVM setup  but 
(https://www.whonix.org/wiki/Qubes/Disposable_VM#Creating_a_New_DisposableVM-Template_Based_on_Whonix-Workstation)



How  would I now  delete  DVMs  that are not  in my list,  even when all 
hidden VMs  are enabled ?



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f1e2674e-f277-72af-c9a9-d2926639e97c%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Aug 01, 2017 at 12:42:01PM -0700, mikihonz...@gmail.com wrote:
> Some bugs, one pretty deal breaking:

Thanks for the report.

> If I remove an application from the appmenu, I am unable to set it again. 
> More specifically I can set it in the VM-settings, but it won't show up in 
> the Appmenu again. 
> The color of a VM can be changed, but again this is not reflected in the 
> Appmenu. The VM itself (the running apps) have the correct window color.

Created ticket for this:
https://github.com/QubesOS/qubes-issues/issues/2952
You can see there for a workaround.

> Overall performance is OK, starting a Fedora VM takes longer than usual, 
> about 1min. Work VM (not app) didn't start when I selected the chromium app 
> from the appmenu. I had to start the VM from cli and then I could start 
> Chromium. 

That's weird, did you get any error? 

> The Qubes Manager is greatly missed! Especially the backup-restore. I tried 
> to restore VMs from 3.2 which didn't work at all:
> First it showed a lot of my VMs with the prefix "disps" ? (The backup had 
> only templates and 2 AppVms).

This is because how 4.0 deals with different DispVM settings. To restore
setting of 3.2 as much as possible, it create dispvm for each netvm used
there.

> I had to exclude -x a lot of Vms, honestly a pain when I just wanted one 
> important VM to restore, 

Instead of excluding, you can list VMs to include, just after backup
path.

> but got several python errors STDOUT and read errors. Restoring all was the 
> same and I had a list with 20 broken VMs, no apps in their menu, starting 
> gave libxl error. I used verbose and the 2 ignore options.

Do you have those messages saved somewhere? That would be really useful
to track down the issue...

> Removing them with cli, all a bit tedious ;(
> 
> Finally, If someone knows how to create a VM for iso booting from CLI I would 
> greatly appreciate a short info here. 

This is a missing part...
https://github.com/QubesOS/qubes-issues/issues/2951

> Looking forward to some docs/explanation on the changed qvm* tools since we 
> are now supposed to do it from the command line. 

There will be separate post about it, but see below.

> E.g. How to make net/proxy/app VM (qvm-create has some classes now...?) 

This one is possible also from GUI - in main menu you have "Create Qubes
VM" option and there you have "provides network" option which allow you
to create net/proxy VM.

> qvm-prefs options (kernel boot extern/intern and netvm settings), 

There is qvm-prefs --help-properties, which shows details about each
property.

> changes with LVM pools(? there was a option --boot-root-from-file?) , booting 
> VM from iso file etc.

See above...

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZgOj4AAoJENuP0xzK19csBtYIAIrt+ILqpdjskeg4aaHKa2JM
hAGHwbKSvAorCkx3DCd9eSvF7cnBOzsFuoYDjnvIC1D9W0f/5dxl6H8GP9JSH2oo
NM4vEA5QPH7C6Ed/s05HCT4D4yFE7jqM6vT71xAklI6niJxTf+AJ4oJtectBBFeA
g2S/4i65KbaBGW3Smec3ZvnY2eGSvxi9bvJXOWE8ks8siVPhhWRmsZDfmjeGmv9S
au0yuDa4Bmx1TW3hRB8wDWuXdLEm5YDn4F+EUbuAVZgl2XM3UlRK/flcQxCzzWN9
CyGO98c/DN5+7SZ5nzbEb2ZFucdVo+aij6Twp8XVt4mjMc5OYHEzNYLPUcp38bk=
=Iz/7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801204752.GE8495%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Aug 01, 2017 at 12:35:04PM -0700, Foppe de Haan wrote:
> Question: if we install 4.0, then restore backups, should we consider 
> replacing pv template with hvm ones, and how would you advise going about 
> that? (If this will be addressed in one of the upcoming blog posts, I can of 
> course wait. :) )

The easiest thing to do is to switch restored VMs to use templates
installed with Qubes 4.0. Templates from 3.x should work too, even as
HVM. But some features may be missing.
We'll prepare instruction how to upgrade such templates, but it isn't
done yet.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZgOjyAAoJENuP0xzK19csyBcH/0Cb1NFN/7wZZuwtW6l16O1k
DkvcSWPeY2hfeldr8KTwZZ+jKz1bYVnXGpfpXeX314BrgnaYquu8D3umSgHZobXr
ldCAOmhIRAyb/xqj9QddXsFuvLuO6/mvKO2A1O0Q8MPI4G9fdhIMNmxOSI8JXSLk
uQl4tl6TJVfMRaCgDIw8bFkmqRqZ14nihfST/dCoWZ6err8y3ksJLazxtqEwIqtI
0N66r+EbPOb8LSgji4OH5vaE+CnSy/r3QJh/WMTMZ8lmeluToqN03ebt2AuMNBIi
yDZEOGnoEz4kRwJNoQSoXizZRS9zbUGGpUIuZHJ7oI6ikTU83+m4wqCTm9wEJaY=
=1YQi
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801204745.GD8495%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jul 31, 2017 at 01:10:08PM -0700, miki wrote:
> 
> Hi,
> HVM Standalone option is greyed out. Also the --cdrom option no longer exists 
> with the qvm-start command. Does anyone know if this is related to some 
> Stubdom changes/problems and will be supported again in the final release?

This is something that will be fixed. See here:
https://github.com/QubesOS/qubes-issues/issues/2951

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZgOjoAAoJENuP0xzK19cs/NIH/RWSTp/Cm1v4rbl3RI6PMIZb
j2KcP+H5lV7xo6/klZyNed+AtfswrdiENmD4qI3km1cSu9n8H2ODE2P5/+UKWbIC
c8b+XFZpfQShFexg3ya//QT4gTzwa6JViwKxuIhPU5YTejIKcQsb4Z7SH41GTLRa
A/gtJ14ZjmJ2vEAzV703U1UWO0SaXRNnLc1CY91ePftMvu4XnxK4rbRjOeTAxnD5
zDB2OP2Lv4Q54Kgw0nO78b4V/6QrFfQfszlaDxx7GWN34JMlYGHAZrBlvPd8iGUv
/XjbKNtXQaxL5KRvfVW9DgHTU7ZDLxN3EvOsloaD4vLHzr3jcLDrBkRxdPNPTuQ=
=il/n
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801204735.GC8495%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: No bootable device -- insert boot disk and prese any key

2017-08-01 Thread tsadowski
2 Questions:
3.2 or 4.0
UEFI or Legacy

I tried 4.0 and 3.2 on a Yoga 900, both with UEFI. 4.0 did boot, 3.2 did not. 
The reason was that the 4.4 kernel could not set the UEFI boot entry. If you 
did use UEFI make a bootable USB stick with reFind. This is just a UEFI boot 
loader that will find anything bootable and will boot it. 

I had to use an additional Linux installation with a more recent kernel to set 
the boot entry with efibootmgr. Maybe it works from Qubes if you update to the 
4.9 kernel first.

Cheers,
Torsten

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a59dd74-5a26-4795-b7a2-95e34e3fbe87%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Foppe de Haan
Question: if we install 4.0, then restore backups, should we consider replacing 
pv template with hvm ones, and how would you advise going about that? (If this 
will be addressed in one of the upcoming blog posts, I can of course wait. :) )

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c53bb8a1-4538-4b3b-b9fe-9c267da4d7e6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] No bootable device -- insert boot disk and prese any key

2017-08-01 Thread Gone Rogue
I was able to install Qubes successfully, however, now it shows 'No bootable device -- insert boot disk and prese any key'.

 

BIOS does detect the SSD but it doesn't boot :(



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-a3aacfa5-f6c0-46a5-af70-50fdd8bdbb5e-1501615312472%403capp-mailcom-lxa09.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: QTW status in Qubes 3.2

2017-08-01 Thread Raymond Rizzuto
On Tuesday, August 1, 2017 at 1:04:36 PM UTC-4, PR wrote:
> Hello Raymond,
> 
> 
> 
> Am 01.08.2017 3:10 nachm. schrieb "Raymond Rizzuto" :
> 
> 
> Is QTW still in active development?  Will there be a QTW for Qubes 4, or has 
> it been deprecated?  I'm still hoping to be able to have a Windows VM under 
> qubes for Quicken, possibly a few other apps I can't (easily) replace with 
> Linux equivalents.
> 
> 
> 
> I am using Qubes 3.2 with a Windows 7 HVM and yes Windows is working under 
> Qubes.
> If you follow the excellent documentation you should be able to get things 
> running within 1 hour.
> Install Windows 7, install Qubes Tools for seamless mode.
> Install Quicken.
> 
> 
> 
> 
> Yes, I know there are alternatives to Quicken, but I have been using Quicken 
> since the 90's, and have a lot of data in it that I want to keep.
> 
> 
> 
> As an IT solution provider I think that Windows support is very important to 
> address business users in order to use Microsoft Office including 
> Outlook/Exchange and native ERP/CRM applications.
> 
> 
> Just start installing a Windows HVM and we'll guide you through the setup.
> Starting point:
> 
> 
> https://www.qubes-os.org/doc/hvm/
> 
> 
> 
> Kind regards
> 
> 
> - PhR

My last experience with QTW (see 
https://groups.google.com/forum/#!searchin/qubes-users/qtw%7Csort:relevance/qubes-users/ByoDzOsqOcA/iwR52h_x6HYJ)
 was not awe inspiring.  I'm hoping that QTW isn't the red haired step child of 
Qubes.  Don't want to start a flame war, but Windows on Qubes is essential for 
me.  Aside from Quicken, I need to use the company provided remote desktop tool 
(available only on Windows) when working from home.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5690cdec-f30d-4851-903c-7aa510a1c13e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QTW status in Qubes 3.2

2017-08-01 Thread Raymond Rizzuto
On Tuesday, August 1, 2017 at 12:50:28 PM UTC-4, Grzesiek Chodzicki wrote:
> W dniu wtorek, 3 stycznia 2017 21:22:35 UTC+1 użytkownik Raymond Rizzuto 
> napisał:
> > I'm looking to find out the status of Qubes tools for Windows in Qubes 3.2. 
> >  Is it stable enough that I could run a Windows VM for things like Quicken? 
> >  Does it support audio devices yet?
> 
> You can pass a whole PCI device to the VM in order to have sound. It doesn't 
> support the Qubes audio protocol yet.

Is Qubes audio protocol on the roadmap for QTW?  Passing the PCI device off to 
the windows VM - wouldn't that deny audio from the linux VMs?  Plus, what if I 
had 2 Windows VMs?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d98af63c-533c-423d-9070-407cdc33cb2d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Jean-Philippe Ouellet:
> On Tue, Aug 1, 2017 at 7:02 AM, Rusty Bird  wrote:
> > Zrubi:
> >> So I would really appreciate some statement if Qubes will really drop
> >> KDE support. I can accept that, but then I not waste my time trying to
> >> make it work. Instead focusing to fix the XFCE issues I have ;)
> >>
> >> - the default login screen is just ugly. I know that this is not the
> >> first priority, and not even a technical issue. But new users will see
> >> that ugly thing first. So it's should be a Qubes skinned one. at least.
> >
> > Or, if the login screen isn't needed anymore (to switch between XFCE
> > and KDE), why not get rid of it entirely:
> >
> > # mkdir /etc/lightdm/lightdm.conf.d
> > # cat >>/etc/lightdm/lightdm.conf.d/99-autologin.conf < > [SeatDefaults]
> > autologin-user=USERNAME
> > END
> 
> Consider a briefly-unattended laptop protected by only a lock screen.
> 
> Normally the attacker would need a way to kill the X screensaver
> without killing the X session. Would the above make crashing the X
> session (and thus being dropped back to the display manager which
> auto-logs-in) sufficient to gain access?
> 
> If so, this sounds like a bad idea (or at least an argument for
> something like physlock).

Ah, I hadn't thought about that. I've been using physlock since
forever, if only to avoid seeing XScreenSaver's fonts...

Rusty
-BEGIN PGP SIGNATURE-
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=b2nC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801175625.GA31472%40mutt.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread tiopaul1958 via qubes-users
Why not include the Qubes Manager?  It's a good simple tool, and those who wish 
to use the CLI instead would still be free to do so.  

Thanks for all the work on 4.0 BTW.  And 3.2.  And 3.1 ...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd90dfae-0753-4e02-80c7-2baef1c7fd9d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: QTW status in Qubes 3.2

2017-08-01 Thread 'P R' via qubes-users
Hello Raymond,

Am 01.08.2017 3:10 nachm. schrieb "Raymond Rizzuto" :


Is QTW still in active development?  Will there be a QTW for Qubes 4, or
has it been deprecated?  I'm still hoping to be able to have a Windows VM
under qubes for Quicken, possibly a few other apps I can't (easily) replace
with Linux equivalents.


I am using Qubes 3.2 with a Windows 7 HVM and yes Windows is working under
Qubes.
If you follow the excellent documentation you should be able to get things
running within 1 hour.
Install Windows 7, install Qubes Tools for seamless mode.
Install Quicken.

Yes, I know there are alternatives to Quicken, but I have been using
Quicken since the 90's, and have a lot of data in it that I want to keep.


As an IT solution provider I think that Windows support is very important
to address business users in order to use Microsoft Office including
Outlook/Exchange and native ERP/CRM applications.

Just start installing a Windows HVM and we'll guide you through the setup.
Starting point:

https://www.qubes-os.org/doc/hvm/

Kind regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BRXzOLDkse2PuRJSuKb%3DC95ARofHyH7ds7NJjTjMq2pA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cannot install kernel 4.9.35 from …-current-testing

2017-08-01 Thread Holger Levsen
On Mon, Jul 31, 2017 at 10:53:31PM -0700, Foppe de Haan wrote:
> 'sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --best 
> --allowerasing' shouldn't error like that.

sadly no:


[user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
--enablerepo=qubes-dom0-current-testing kernel --best 
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
Usage: "yumdownloader [options] package1 [package2] [package..]

Command line error: no such option: --best
[user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
--enablerepo=qubes-dom0-current-testing --best kernel
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
Usage: "yumdownloader [options] package1 [package2] [package..]

Command line error: no such option: --best
[user@dom0 ~]$ 


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801165540.GA10145%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


[qubes-users] Re: Qubes won't detect Yoga 910's SSD as the Installation Destination

2017-08-01 Thread Gone Rogue
Ah, nevermind.  That worked :D

 

Woo hoo!!



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-c23b8a30-b954-4419-b2a4-0ff1f9b7e584-1501605048790%403capp-mailcom-lxa10.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes won't detect Yoga 910's SSD as the Installation Destination

2017-08-01 Thread Gone Rogue

Yes, I did change the disk controller mode to AHCI in the BIOS.

 

When I use UEFI, I get the 'system halted' error where it doesn't do anything afterwords (due to using Windows USB).

 

When I use Legacy Mode, I am stick at 'No Installation Destination disks detected' even with AHCI.

 

:(




-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-265ea3c1-ae22-432a-82b3-a27f259a38f1-1501604825239%403capp-mailcom-lxa10.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes won't detect Yoga 910's SSD as the Installation Destination

2017-08-01 Thread tsadowski
Hi,

did you change the disk controller mode to AHCI in the BIOS? Otherwise no Linux 
can find your SSD.

BTW, UEFI should work fine with Qubes.

Cheers,
Torsten

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6cfd8724-c12e-4591-b597-000303064ebc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes won't detect Yoga 910's SSD as the Installation Destination

2017-08-01 Thread Gone Rogue
I have installed Qubes on my Hp Elitebook so I know the USB works just fine.  When I put my Yoga 910 in a legacy boot mode (disabling UEFI/Secure boot, etc.) and boot the Qubes from a USB, it starts loading the installation, then it would say 'Falling back to the text mode'. In a text mode, it doesn't detect my laptop's SSD as the installation destination.

 

What can I do? 



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-d9670b3d-6489-4ba8-8466-2d5d74cf1f10-1501599070393%403capp-mailcom-lxa10.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Jean-Philippe Ouellet
On Tue, Aug 1, 2017 at 7:02 AM, Rusty Bird  wrote:
> Zrubi:
>> So I would really appreciate some statement if Qubes will really drop
>> KDE support. I can accept that, but then I not waste my time trying to
>> make it work. Instead focusing to fix the XFCE issues I have ;)
>>
>> - the default login screen is just ugly. I know that this is not the
>> first priority, and not even a technical issue. But new users will see
>> that ugly thing first. So it's should be a Qubes skinned one. at least.
>
> Or, if the login screen isn't needed anymore (to switch between XFCE
> and KDE), why not get rid of it entirely:
>
> # mkdir /etc/lightdm/lightdm.conf.d
> # cat >>/etc/lightdm/lightdm.conf.d/99-autologin.conf < [SeatDefaults]
> autologin-user=USERNAME
> END

Consider a briefly-unattended laptop protected by only a lock screen.

Normally the attacker would need a way to kill the X screensaver
without killing the X session. Would the above make crashing the X
session (and thus being dropped back to the display manager which
auto-logs-in) sufficient to gain access?

If so, this sounds like a bad idea (or at least an argument for
something like physlock).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_D_-C0FS9G%2B1uNpUTgJcgsq-FT9rZrs-mAJsZdtLBr3Dg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QTW status in Qubes 3.2

2017-08-01 Thread Raymond Rizzuto
On Tuesday, January 3, 2017 at 3:22:35 PM UTC-5, Raymond Rizzuto wrote:
> I'm looking to find out the status of Qubes tools for Windows in Qubes 3.2.  
> Is it stable enough that I could run a Windows VM for things like Quicken?  
> Does it support audio devices yet?

Is QTW still in active development?  Will there be a QTW for Qubes 4, or has it 
been deprecated?  I'm still hoping to be able to have a Windows VM under qubes 
for Quicken, possibly a few other apps I can't (easily) replace with Linux 
equivalents.

Yes, I know there are alternatives to Quicken, but I have been using Quicken 
since the 90's, and have a lot of data in it that I want to keep.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/31fe8c0c-6a5e-48b0-b33f-2b6f73794c9d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


RE: [qubes-users] UEFI secureboot issue

2017-08-01 Thread Wim Vervoorn
Hello,

I would like to use Qubes on a UEFI system with secure boot enabled.

Until now this fails with a security violation.

I assume this is because the Qubes efi application is not signed by the 
"microsoft-uefica"  key. 

We can of course make it boot by adding the hash of the loader to the UEFI "db" 
but we don't like to do this because we would need to do this again if a change 
is made. We assume you also signed the laoder with an appropriate key but I 
have not been able to find the certificate of the public key so I can add this 
to the "db" database and allow all efi binaries that are released by Qubes. Can 
you tell me where I can find that and share it with me?


Best Regards,
Wim Vervoorn

Eltan B.V.
Ambachtstraat 23
5481 SM Schijndel
The Netherlands

T : +31-(0)73-594 46 64
E : wvervo...@eltan.com
W : http://www.eltan.com

"THIS MESSAGE CONTAINS CONFIDENTIAL INFORMATION. UNLESS YOU ARE THE INTENDED 
RECIPIENT OF THIS MESSAGE, ANY USE OF THIS MESSAGE IS STRICTLY PROHIBITED. IF 
YOU HAVE RECEIVED THIS MESSAGE IN ERROR, PLEASE IMMEDIATELY NOTIFY THE SENDER 
BY TELEPHONE +31-(0)73-5944664 OR REPLY EMAIL, AND IMMEDIATELY DELETE THIS 
MESSAGE AND ALL COPIES." 



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a5bc82b17ab42088013f3373f3a56c7%40Eltsrv03.Eltan.local.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot install kernel 4.9.35 from …-current-testing

2017-08-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jul 31, 2017 at 08:56:07PM +, Holger Levsen wrote:
> Hi,
> 
> I fail to install kernel 4.9.35 on Qubes 3.2, any hints how I can accomplish 
> this? 
> 
> [user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
> --enablerepo=qubes-dom0-current-testing   kernel kernel-qubes-vm
(...)
> Dependencies resolved.
> =
>  Package  Arch   Version 
> Repository Size
> =
> Skipping packages with conflicts:
> (add '--best --allowerasing' to command line to force their upgrade):
>  kernel   x86_64 1000:4.9.35-19.pvops.qubes  
> qubes-dom0-cached  40 M
>  kernel-qubes-vm  x86_64 1000:4.9.35-19.pvops.qubes  
> qubes-dom0-cached  56 M
>  perl-Math-BigInt noarch 1.9997-355.fc23 
> qubes-dom0-cached 188 k
> 
> Transaction Summary
> =
> Skip  3 Packages
> 
> Nothing to do.
> Complete!

Try adding --action=update 


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZgGCwAAoJENuP0xzK19csQf4H/iTi7tRDY5sSO/sRMja/Ruxy
9MxR1757VJACelwtemqiMsSoBVu5f7FgVifHXcoYUmhBTZY2dsks7r7u4xgLpdE7
kaKFJCtAAukEIjuW5aOdmb65HxMgK14/vbdvrDa+dK9Uvw8zu30j33XWkgPJH0ix
YEYdvMoDu/IOTmwhUTE4iw21O9D63+WH4PKYeJcOQ8M0PP3VaGNfATIKYD6A7Iyu
JpIKMVyyuuQ3QXu2SDWTYE5WTH0ASKvYHD62CfqtBx8vqJCRqptKp7IXcP+6woUe
2WIOprbgXFYh8ni14qSflcQy49TtNt295B0o+3lJiip7UQbpd5GVmfvHPThFHHI=
=BIC7
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801110624.GB8495%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] dvm removal ?

2017-08-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jul 31, 2017 at 10:01:50PM -1000, qubester wrote:
> Hello,
> 
> when I create a dvm  i'm now up to dvm-17  , is one supposed to be removing
> dvm's manually?  because I do see how,  though each ititeration, continues
> to count up  would that be expected behavior?

No, it isn't. For which Disposable VMs it happens? Started from menu,
opening a file in DispVM, or something else?

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZgGBmAAoJENuP0xzK19cs4G0IAIzha0kXXivlgkVujIuNw7Rq
k6MxCNOYyyVkFinXHEGxy3mCvvz+pEN85teUsl7sa3ii4mbyW7Cs5ZFzQRFNvQMf
RCsXy1MSRm9YCvBd3iKT2GDI4TrKStPpHWVE5WGkKKbxqxRPr7RIQYry0UsJLm3Q
F+65urrnZPxayeYuPHygZF7Nw+UGmcSFFFQ73uWWZGfKLlDouUisdMyRmSTFmb0Y
aCl4jcxvyekYL+qZOzUumDqzAdCAx0IIy41pACpPTMqlK73Rb983GSMpUYdL9sPu
luKq2uGdWPJD2g2EqufD/HRKcSp9Lj2pBN7xw+Sx4s4bVG1pQ/QvsXdbfqaYdPQ=
=xBcX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801110510.GA8495%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Zrubi:
> So I would really appreciate some statement if Qubes will really drop
> KDE support. I can accept that, but then I not waste my time trying to
> make it work. Instead focusing to fix the XFCE issues I have ;)
> 
> - the default login screen is just ugly. I know that this is not the
> first priority, and not even a technical issue. But new users will see
> that ugly thing first. So it's should be a Qubes skinned one. at least.

Or, if the login screen isn't needed anymore (to switch between XFCE
and KDE), why not get rid of it entirely:

# mkdir /etc/lightdm/lightdm.conf.d
# cat >>/etc/lightdm/lightdm.conf.d/99-autologin.conf 

Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, Aug 01, 2017 at 11:25:11AM +0200, Zrubi wrote:
> On 07/31/2017 01:43 PM, Marek Marczykowski-Górecki wrote:
> > https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/
> 
> My Very First Impressions:
> 
> - the "test this media & install Qubes" is hanging forever on my T450.
> Before the graphical "qubes loader screen", I see some strange error
> messages. Need to be fast to capture however. Was not lucky to get it.

I've seen some problems with USB 3.0 on T460p. Basically it throws a lot
of I/O errors - sometimes during boot, sometimes in the middle of
installation. Using USB 2.0 stick, or USB 2.0 hub (or just cable)
helped.

> - The isntall process is really long.
> Not debugged jet but the creating initramfs seems to be running forever.
> But at least was successfull at the end :)

Is it just about initramfs and "post installation tasks" - compared to
the whole installation time? There may be some bug causing initramfs
being generated twice (or more...) - I think I've fixed something like
this before, but maybe not all the places. If you think it's important,
please open issue on github.

> - the missing Qubes Manager is a pain.
> - the 'replacement' in the task bar is small and buggy:
>the tooltip? like thing is randomly shirk to unusable. But too
> samll in general. I have 40 vm's right now.

What do you mean by "randomly shirk to unusable"? Can you provide a
screenshot?

> - the vm setting windows is the old one, no new features are usable
> from that GUI :(

Sadly that's true. Working on major features (like Admin API) took much
more time than anticipated, and we didn't want to delay 4.0 any further.
In practice there are not so much missing things, that are useful for
normal usage. I'd say this list:
 - booting from external disk (useful to install windows)
 - firewall rules
 - network settings (custom IP, etc)
 - allow starting DispVM out of this AppVM

I've created this ticket to track it:
https://github.com/QubesOS/qubes-issues/issues/2949

If you think some more will be useful, please comment there.

> - memory balancing are enabled on PCI asigned VM's.

In practice it is not, because VM itself have it disabled if have some
PCI device. So the issue is reporting it in GUI.

> - network manager applet is (still?) not show on first start.
> need to restart the sys-net VM to shown.
>
> - still only 8 available colors for the VM's. :(((
> Again: I have 40 of them.

Most backend code to support more labels is done. The (important!)
missing part is window manager support. AFAIR currently only awesome and
xfce4 generate colorful borders dynamically, other window managers
(especially KDE) have it hardcoded.

If you want to try, take a look here:
https://www.qubes-os.org/doc/admin-api/
Then use qubesd-query tool to issue those API calls. For example:
echo -n 0x00 | qubesd-query dom0 admin.label.Create dom0 cyan

(testing this, I've found you need to kill `qvm-start-gui --all --watch`
process and start it again after creating label)

> - no VM status GUI. :(
> The old Qubes manager would be fine till a the new tools(?) not ready
> for use.

What do you mean? Domains widget is specifically there to show you
VM status.

> - the 'new' Qubes firewall solution causing more confusions.
>   - mixed iptables and nftables? why?

What do you mean by mixed? Setting for VMs are applied using nftables if
supported (Fedora), or iptables when not (Debian). Not both.

>   - the old GUI not allow to use the new features.
>   - even if Allow is the default policy I see a DROP rule at the end.
>   Why? :o

To fail closed - if something goes wrong, there will be that DROP rule
at the end anyway.

> - qubes-hcl-report is not included.
> just tested it (the latest version from github) and it working with
> 4.0 out of the box.

Oh, I don't know how it happened. Will fix it shortly.

> - no KDE group available
> Maybe the same reason with the recent 3.2?

Probably, I will look into it shortly.

> Probably I'm the last KDE user under Qubes - and I just started to
> migrate to XFCE because of the unresolved issues with KDE since the
> 3.2 release. And see no progress in 4.0
> 
> So I would really appreciate some statement if Qubes will really drop
> KDE support. I can accept that, but then I not waste my time trying to
> make it work. Instead focusing to fix the XFCE issues I have ;)

I think we can say that KDE migrated from "ITL supported" to "community
supported". OTOH Fedora 25 in dom0 brings also updated KDE, so maybe
some issues are fixed.

> - the default login screen is just ugly. I know that this is not the
> first priority, and not even a technical issue. But new users will see
> that ugly thing first. So it's should be a Qubes skinned one. at least.

Hmm, I do see Qubes logo in the background there. Do you have something
different?

Thanks for detailed report/review, we really appreciate it!
We receive a lot of emails, so if there is some actionable 

[qubes-users] qubes-gpg-import-key safe?

2017-08-01 Thread pixel fairy
looking here, it doesnt seem to verify the input, or does qubes.GpgImportKey do 
that? (a search on 

https://github.com/QubesOS/qubes-app-linux-split-gpg/blob/master/gpg-import-key

if not, how would you check a key for invalid data before import? im thinking 
copy to dispvm, run any checks, then copy to key holder either by file or 
clipboard.

or is the only real answer to this subkeys?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b5ab52a-60c9-478c-b248-5fc287f5ea1c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/31/2017 01:43 PM, Marek Marczykowski-Górecki wrote:
> https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/

My Very First Impressions:

- - the "test this media & install Qubes" is hanging forever on my T450.
Before the graphical "qubes loader screen", I see some strange error
messages. Need to be fast to capture however. Was not lucky to get it.

- - The isntall process is really long.
Not debugged jet but the creating initramfs seems to be running forever.
But at least was successfull at the end :)

- - the missing Qubes Manager is a pain.
- - the 'replacement' in the task bar is small and buggy:
   the tooltip? like thing is randomly shirk to unusable. But too
samll in general. I have 40 vm's right now.

- - the vm setting windows is the old one, no new features are usable
from that GUI :(

- - memory balancing are enabled on PCI asigned VM's.

- - network manager applet is (still?) not show on first start.
need to restart the sys-net VM to shown.


- - still only 8 available colors for the VM's. :(((
Again: I have 40 of them.

- - no VM status GUI. :(
The old Qubes manager would be fine till a the new tools(?) not ready
for use.

- - the 'new' Qubes firewall solution causing more confusions.
  - mixed iptables and nftables? why?
  - the old GUI not allow to use the new features.
  - even if Allow is the default policy I see a DROP rule at the end.
  Why? :o

- - qubes-hcl-report is not included.
just tested it (the latest version from github) and it working with
4.0 out of the box.

- - no KDE group available
Maybe the same reason with the recent 3.2?
Probably I'm the last KDE user under Qubes - and I just started to
migrate to XFCE because of the unresolved issues with KDE since the
3.2 release. And see no progress in 4.0

So I would really appreciate some statement if Qubes will really drop
KDE support. I can accept that, but then I not waste my time trying to
make it work. Instead focusing to fix the XFCE issues I have ;)

- - the default login screen is just ugly. I know that this is not the
first priority, and not even a technical issue. But new users will see
that ugly thing first. So it's should be a Qubes skinned one. at least.


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=qI1g
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/484fb9ea-9639-00e7-bfed-04170f22ac80%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] dvm removal ?

2017-08-01 Thread qubester

Hello,

when I create a dvm  i'm now up to dvm-17  , is one supposed to be 
removing dvm's manually?  because I do see how,  though each 
ititeration, continues to count up  would that be expected behavior?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/397aa928-4a69-aace-c522-49ec1f60f2ad%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread lokedhs
On Tuesday, 1 August 2017 13:19:21 UTC+8, Holger Levsen  wrote:

> so far so very good. i'm curious whether this will also be the case with qubes
> 3.2.1 and a 4.9 kernel (so far only tried with the older 4.8 one from the
> qubes repos…)
> 
> (but then, see the other mail on this list about my problems installing the
> 4.9 kernel on qubes 3.2…)

I'm having hangs on resume with kernel 4.9 on a Latitude E7470. That suggests 
to me that you'll probably have the same problem.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cd37e040-467e-407c-8977-e5988ba3208e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-01 Thread f . tuttmann
Am Montag, 31. Juli 2017 22:12:06 UTC+2 schrieb PR:
> Hello,
> 
> 
> 
> Am 31.07.2017 9:42 nachm. schrieb  :
> 
> 
> I was able to restore all of my VMs via CLI but after restoring I couldn't 
> start any VM.
> 
> Will downgrade to 3.2 and will wait for final release of 4.0 and I hope that 
> this will then be fixed.
> 
> 
> Of course you can go straight back to 3.2 but as this is release candidate 
> feedback could be helpful.
> What happens when you start one of the AppVMs from the CLI?
> Output/Error messages?
> 
> 
> Have you tried to launch a template VM also, not only the AppVMs?
> 
> 
> - PhR

I can't start any VM (AppVM & Template VM) even the Template VM that was 
created freshly with 4.0 installation can't start.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9da17f19-455a-4f2c-9ef7-25b5a56fcc02%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.