[qubes-users] GPU is deal-breaker

2017-08-20 Thread cdgamlin
Hi!

*** TL;DR: Would the option to attach the GPU to a single qube be feasible? ***

Recently tried out Q3.2 and Q4.0-rc1. Pretty happy with most of it, and have 
some ideas on what might make it better (if those ideas are plausible) - but 
the GPU seems to be the deal breaker.

On LinuxMint, I like using VLC video player to watch lectures, using it's 
option to speed up without altering pitch. On both versions of Q, video on VLC 
behaved badly (often freezing up). Audio was good, so can only think it is GPU 
issue

I also use Skype a fair bit on LinuxMint, and find the "share screen" mode 
useful to show stuff. Video on Skype also performed badly on on both versions 
of Q, and "share screen" wouldn't work at all. Again, I can only think this is 
GPU

While I've read that OpenGL doesn't work on Q (obviously important for gamers 
using Q), I don't know the status for OpenCL - but programming OpenCL using GPU 
is also another use for me (for scientific computing stuff), which I'm guessing 
Q will also have an issue with

>From what I've read, it seems that Dom0 has the GPU, and won't share with 
>others because it could create a security issue (my guesses: from sharing 
>memory, or sharing processes, or both). My suggestion (if feasible) is for 
>Dom0 not to use GPU (CPU only should make sense, as Dom0 should be as 
>light-weight as possible), and have GPU as a device that can is deployable to 
>any 1 qube the same way as you can for other devices (such as microphone) - if 
>GPU assignment feasibly works without security issues. Reading that some 
>successful experiments have been done for "GPU passthrough" sounds like 
>assignment of GPU to a qube may be feasible (Am I right??)

Love the Qubes concept. Hoping the GPU issue can be sorted, opening up the OS 
for a wider user base.

Cheers!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/310e462e-4c22-4ee1-a2a0-9b63b2abb200%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Grub Boot Screen cannot open Windows

2017-08-20 Thread Person
Is there any specific command to enter for that?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d8887bda-6313-4dd6-92d3-15ad67be2458%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: WIN7 + QVM-BLOCK + NTFS PARTITION

2017-08-20 Thread Gecko
Okay, so I've copied the files into Qubes. (It's very awkward compared to 
windows).

Can someone correct me if I done it the wrong way:

1. qvm-block -a personal dom0:sda5
2. mounted /dev/xvdi -> /mnt/removable
3. increased private storage for personal VM to 51200mb
4. moved files across
5. repeated step 1 with sda6,7,8,9

I think I am ready to join the NTFS partitions into Qubes? Do I need to do 
anything first? How to do it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e422b0e-eff8-4ff4-a6d5-14f8be4ff50c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] WIN7 + QVM-BLOCK + NTFS PARTITION

2017-08-20 Thread messygecko
Hello. 

I have come from Windows 7 -> Qubes OS 2 days ago. I have read the docs, I 
understand that there is issues accessing partitions from within a stand alone 
windows 7 VM (qvm-block).

When installing Qubes it asked to reclaim space, I said yes. I need the 
security that Qubes offers me, so I have decided to migrate 100% to Qubes OS.

I now want Qubes to reclaim all of the NTFS partitions I have. 

Is there any way I can backup my existing data (NTFS partitions) -> into Qubes 
partition, then tell Qubes to claim the partitions?

Device Boot Start   End   Sectors  Size Id Type
/dev/sda1  * 2048   1026047   1024000  500M 83 Linux
/dev/sda2 1026048 126033919 125007872 59.6G 83 Linux
/dev/sda3   126035928 321672959 195637032 93.3G  f W95 Ext'd (LBA)
/dev/sda5   126035932 130226175   41902442G  7 HPFS/NTFS/exFAT
/dev/sda6   136521652 157507583  20985932   10G  7 HPFS/NTFS/exFAT
/dev/sda7   160208896 191666175  31457280   15G  7 HPFS/NTFS/exFAT
/dev/sda8   199436188 230891519  31455332   15G  7 HPFS/NTFS/exFAT
/dev/sda9   241854464 252354559  105000965G  7 HPFS/NTFS/exFAT

I want to copy everything from (sda5, sda6, sda7, sda8 and sda9) to Qubes.

I apologize if I'm asking a basic question. I am figuring this out as I go 
along. If anyone can explain those partitions to me I would appreciate it.

By the way, I have installed GParted into my TemplateVM (debian-8), and can 
access it in PersonalVM now. If there is a way to access these partitions from 
Windows 7 VM then can someone let me know. I have tried, I followed all the 
docs, and instructions but from what I think some of you said it isn't a good 
idea (BSOD, data corruption).

Regards,

MG.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de79f025-d778-4187-851b-8c2a4f4bae0b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Kernel and Policies

2017-08-20 Thread nicholas roveda
In the past I've read in the docs about the way to isolate the root account in 
VMs using PolKit.

I was wandering if there is a way to always prompt Dom0 for authorization for 
some specific operations inside VMs, like a syscall, using policies or better 
modifying the kernel.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/835b852a-a99c-4510-9ea8-9976043444d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Admin privileges, new APIs and Firewall

2017-08-20 Thread nicholas roveda
With the new Admin APIs is there a way to set up a FirewallVM with an 
Application Firewall running inside that can pop up dialogs always on top to 
let the user decide where to accept or not a connection?

Problems:
1) Unprivileged VM windows always on top
2) The Firewall VM need to know details about the app trying to connect

The second one I think it can be solved by adding the infomations needed in the 
payload at the SourceVM and than let the FW remove them or by incapsulating the 
packets in an another IP layer.

Do you have some ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/31f91cc8-15eb-4694-a08f-e5b423c8caeb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does qubes work in asus chromebook c201?

2017-08-20 Thread llo
Does qubes work in asus chromebook C201? 
The laptop is made of arm cpu.


At moment, I want my privacy to be protected.
https://mytemp.email/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1503265635723-1841ba75-f4d95db2-ad3cb730%40s.proprietativalcea.ro.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Problem connecting via VPN ProxyVM (VPN works, but AppVM can't connect)

2017-08-20 Thread 'PhR' via qubes-users

Hello,

I have successfully setup a fedora 25 bases ProxyVM, which has Cisco's 
Anyconnect Secure Mobility Client installed.


I can successfully connect via VPN and can also ping/reach servers via VPN.

Unfortunately the App-VM which uses the VPN Proxy VM can't connect.

The Setup:

sys-net <-- sys-firewall <-- my-vpn (Proxy VM) <-- my-work (App VM)

As I can connect from the Proxy my-vpn VM, it seems the problem is 
between the connection of my App-VM to the new Proxy VPN VM.


How can I troubleshoot and investigate the issues?

- PhR

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/691f3971-2607-c52b-d146-8fdc53471395%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: UEFI secureboot issue

2017-08-20 Thread yreb-qusw

On 08/20/2017 05:44 AM, cooloutac wrote:

On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote:

On 08/16/2017 05:55 AM, cooloutac wrote:

I'm glad Bruce Schneier changed his tune and is no longer encouraging kids to 
learn how to hack in live environments,  cause I think that breeds sociopaths, 
and is dangerous. (and we are living in an epidemic)

Now he has to stop calling secure boot security theater,  because alot of 
people seem to believe it and take his word like gospel.

Is protecting the bios from rootkits its intended purpose?  seems so?, it helps 
anyways, and it definitely was intended to protect the firmware.  Its not just 
kernel code signing,  its driver code too.

I would add also make a password on your bios obviously,  and enable flash 
protections.

I don't even think most the ITL members use aem, it sounds complicated and 
buggy and I can't afford to buy new hardware if it red flags anyways.



So..if you feel so strongly about it,  how come you are using Qubes?
Maybe I should go back to using Windows 10,  if secure boot  trumps
the other security aspects of Qubes.

Or, do you think your 'safer' using Qubes, if so, why ?


To be honest,  it really doesn't matter what os you use, its all about what the 
user does on it.  When using qubes the user still has to be careful.  It 
doesn't matter if dom0 is compromised if a vm with sensitive info is.  You 
really have to be strict with yourself.

You going to play online video games?  might as well use windows.

Dual booting?  might as well just use windows.

disabling iommu features?  might as well just use windows.

Worried about government spying?  Might as well not use anything.

You have to live like a monk if you really want privacy.

I have a windows machine and a qubes machine.  the qubes machine is for offline 
documents,  compartmentalizing specific website login activity, and random 
browsing.  The windows machine is for gaming and movies.

The guy Brad Spengler already warned dom0 and vms can be compromised by bad 
system updates. And I believe this happened to me and led to my bank account 
being hacked.   Also just after intel announced their patch for the hardware 
backdoor that existed for 8 years.

Qubes did last almost 2 years for me though(minus gaming),  when barebones 
linux wouldn't last a day and windows wouldn't last a couple months. Simply 
because I refuse to give up doing the things I own a pc for.   The other thing 
he warned about was using too much of the gpu in qubes...  I foresee that 
coming in the future with people demanding passthrough for it.

If you do decide to go back to windows 10,  hardenwindows10forsecurity.com  
also might interest you hardenubuntu.com  (scroll down to harden ubuntu 
section) The user activities and security and trust of the developers become 
the deciding factor after a point.

I don't think any operating system does it all.   Just like alot of people 
didn't think root privilege escalation in
vms, being trivial to bypass, was an excuse not to add that layer of 
protection.  I think its even worse not to use secure boot.


So, I'm still confused, if you feel secure boot is So important, why is 
it that you don't use an OS that supports it ?


Or are you saying that besides the secure boot, that Qubes or Linux  IS 
more "secure" , and it's a "know your adversary" thing?   If I'm 
understanding this correctly the main adversary re: secure boot would be 
some  "advanced threat" like a government  with that level of "skills" ??



I'm more "newb" than you,  what does a "failed" update look like ?? I 
have been feeling a lot more  secure  using a dedicated VM to do banking 
 , which actually was how I started down the path to use Qubes ...


I don't know what   "root privilege escalation in
vms, being trivial to bypass, was an excuse not to add that layer of 
protection"   means  ; if you might explain that as well .(btw, is some 
of this to improve with Qubes 4.x ?


Personally, I also enjoy how well Whonix  works in Qubes , and use it 
for most things that don't require logins, and I like the speed or the 
OS  vs win10  , which nows feel clunky,  esp  on VPN




--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d30827f7-ef2f-c213-f9da-57853de15fe4%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Grub Boot Screen cannot open Windows

2017-08-20 Thread Yethal
W dniu niedziela, 20 sierpnia 2017 20:30:47 UTC+2 użytkownik xueyi...@gmail.com 
napisał:
> The terminal replies with "os-prober: not a shell built in".

Looks like you'll need to enable os-prober in grub first.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a535e804-82d5-48d8-b56e-3bc8288203f2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How do you make a new user on Qubes?

2017-08-20 Thread Yethal
W dniu niedziela, 20 sierpnia 2017 20:38:13 UTC+2 użytkownik xueyi...@gmail.com 
napisał:
> I wanted to make a guest user without a password, but there doesn't seem to 
> be any option to create a new user.
> 
> Also, on a side note, is it possible to have the same VMs on the guest user 
> but not the same applications inside the VMs? And is it possible to download 
> a new OS (I'm thinking Windows 8) inside Qubes for both users? I also hope 
> for the users to have different IP addresses and MAC addresses if possible (I 
> do not want the activities on different users to seem related to each other 
> in any way).

QubesOS does not support more than one user on the same physical machine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62f0fe7a-beca-49d4-9f07-dd9eba305f18%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Upgrade path R3.2 to R4?

2017-08-20 Thread Yethal
W dniu niedziela, 20 sierpnia 2017 20:54:15 UTC+2 użytkownik Marian Beermann 
napisał:
> Is there already a documented / "generally thought to be working"
> upgrade path from R3.2 to R4 (rc1)?
> 
> Cheers, Marian

Nope, best you can do right now is to backup all your vms, do a clean install 
and restore them on R4.0

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50311278-1d81-44b1-9662-798333fc3536%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Upgrade path R3.2 to R4?

2017-08-20 Thread Marian Beermann
Is there already a documented / "generally thought to be working"
upgrade path from R3.2 to R4 (rc1)?

Cheers, Marian

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c635a712-9dc2-f833-3515-a29a6030f8e5%40enkore.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How do you make a new user on Qubes?

2017-08-20 Thread xueyiluxlu
I wanted to make a guest user without a password, but there doesn't seem to be 
any option to create a new user.

Also, on a side note, is it possible to have the same VMs on the guest user but 
not the same applications inside the VMs? And is it possible to download a new 
OS (I'm thinking Windows 8) inside Qubes for both users? I also hope for the 
users to have different IP addresses and MAC addresses if possible (I do not 
want the activities on different users to seem related to each other in any 
way).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb32c817-f3e2-43bc-bea2-97eeca31e04f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Grub Boot Screen cannot open Windows

2017-08-20 Thread xueyiluxlu
The terminal replies with "os-prober: not a shell built in".

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/61caee40-7d92-4109-8900-ca06e472a843%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Is it possible to add ricing tools for basic Qubes 3.2 repo?

2017-08-20 Thread turboacan
Hi. Newbie question is at possible to add CLI/Ncurses tools for Qubes? 
Also in Qubes 3.2 Installation problems with Compton and many others useful 
tools. Thanks!

https://rizonrice.github.io/resources
http://blog.micahcowell.com/blog/basics-of-ricing
https://fun.irq.dk/funroll-loops.org
https://nixers.net/showthread.php?tid=1566
http://linuxbbq.org/cream.html
http://archive.is/a36v
Bean: http://i.imgur.com/BziH1iE.png
https://github.com/thelostt/ricing
https://www.reddit.com/r/unixporn/wiki/index
https://github.com/nixers-projects/ricerous
https://wiki.installgentoo.com/index.php...nux_ricing
http://help.unc.edu/help/unix-customizin...vironment
https://www.cs.odu.edu/~zeil/cs252/f16/Public/custom
http://unix.stackexchange.com/questions/...oductivity
https://rizonrice.github.io/resources
http://blog.micahcowell.com/blog/basics-of-ricing
http://apcmag.com/create-totally-custom-...sktop.htm
http://8ch.net/rice
https://rizonrice.github.io/resources

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8f7f1368-2062-4525-9b94-6743ce8ee682%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: UEFI secureboot issue

2017-08-20 Thread cooloutac
On Sunday, August 20, 2017 at 11:44:42 AM UTC-4, cooloutac wrote:
> On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote:
> > On 08/16/2017 05:55 AM, cooloutac wrote:
> > > I'm glad Bruce Schneier changed his tune and is no longer encouraging 
> > > kids to learn how to hack in live environments,  cause I think that 
> > > breeds sociopaths, and is dangerous. (and we are living in an epidemic)
> > > 
> > > Now he has to stop calling secure boot security theater,  because alot of 
> > > people seem to believe it and take his word like gospel.
> > > 
> > > Is protecting the bios from rootkits its intended purpose?  seems so?, it 
> > > helps anyways, and it definitely was intended to protect the firmware.  
> > > Its not just kernel code signing,  its driver code too.
> > > 
> > > I would add also make a password on your bios obviously,  and enable 
> > > flash protections.
> > > 
> > > I don't even think most the ITL members use aem, it sounds complicated 
> > > and buggy and I can't afford to buy new hardware if it red flags anyways.
> > > 
> > 
> > So..if you feel so strongly about it,  how come you are using Qubes? 
> >Maybe I should go back to using Windows 10,  if secure boot  trumps 
> > the other security aspects of Qubes.
> > 
> > Or, do you think your 'safer' using Qubes, if so, why ?
> 
> To be honest,  it really doesn't matter what os you use, its all about what 
> the user does on it.  When using qubes the user still has to be careful.  It 
> doesn't matter if dom0 is compromised if a vm with sensitive info is.  You 
> really have to be strict with yourself.
> 
> You going to play online video games?  might as well use windows.
> 
> Dual booting?  might as well just use windows.
> 
> disabling iommu features?  might as well just use windows.
> 
> Worried about government spying?  Might as well not use anything.
> 
> You have to live like a monk if you really want privacy.
> 
> I have a windows machine and a qubes machine.  the qubes machine is for 
> offline documents,  compartmentalizing specific website login activity, and 
> random browsing.  The windows machine is for gaming and movies.
> 
> The guy Brad Spengler already warned dom0 and vms can be compromised by bad 
> system updates. And I believe this happened to me and led to my bank account 
> being hacked.   Also just after intel announced their patch for the hardware 
> backdoor that existed for 8 years.
> 
> Qubes did last almost 2 years for me though(minus gaming),  when barebones 
> linux wouldn't last a day and windows wouldn't last a couple months. Simply 
> because I refuse to give up doing the things I own a pc for.   The other 
> thing he warned about was using too much of the gpu in qubes...  I foresee 
> that coming in the future with people demanding passthrough for it.
> 
> If you do decide to go back to windows 10,  hardenwindows10forsecurity.com  
> also might interest you hardenubuntu.com  (scroll down to harden ubuntu 
> section) The user activities and security and trust of the developers become 
> the deciding factor after a point.
> 
> I don't think any operating system does it all.   Just like alot of people 
> didn't think root privilege escalation in 
> vms, being trivial to bypass, was an excuse not to add that layer of 
> protection.  I think its even worse not to use secure boot.

also if my hardware is compromised it really doesn't matter what os I use at 
that point either.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d91dd9f-5aba-45a1-96d8-60a68fa8355f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: UEFI secureboot issue

2017-08-20 Thread cooloutac
On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote:
> On 08/16/2017 05:55 AM, cooloutac wrote:
> > I'm glad Bruce Schneier changed his tune and is no longer encouraging kids 
> > to learn how to hack in live environments,  cause I think that breeds 
> > sociopaths, and is dangerous. (and we are living in an epidemic)
> > 
> > Now he has to stop calling secure boot security theater,  because alot of 
> > people seem to believe it and take his word like gospel.
> > 
> > Is protecting the bios from rootkits its intended purpose?  seems so?, it 
> > helps anyways, and it definitely was intended to protect the firmware.  Its 
> > not just kernel code signing,  its driver code too.
> > 
> > I would add also make a password on your bios obviously,  and enable flash 
> > protections.
> > 
> > I don't even think most the ITL members use aem, it sounds complicated and 
> > buggy and I can't afford to buy new hardware if it red flags anyways.
> > 
> 
> So..if you feel so strongly about it,  how come you are using Qubes? 
>Maybe I should go back to using Windows 10,  if secure boot  trumps 
> the other security aspects of Qubes.
> 
> Or, do you think your 'safer' using Qubes, if so, why ?

To be honest,  it really doesn't matter what os you use, its all about what the 
user does on it.  When using qubes the user still has to be careful.  It 
doesn't matter if dom0 is compromised if a vm with sensitive info is.  You 
really have to be strict with yourself.

You going to play online video games?  might as well use windows.

Dual booting?  might as well just use windows.

disabling iommu features?  might as well just use windows.

Worried about government spying?  Might as well not use anything.

You have to live like a monk if you really want privacy.

I have a windows machine and a qubes machine.  the qubes machine is for offline 
documents,  compartmentalizing specific website login activity, and random 
browsing.  The windows machine is for gaming and movies.

The guy Brad Spengler already warned dom0 and vms can be compromised by bad 
system updates. And I believe this happened to me and led to my bank account 
being hacked.   Also just after intel announced their patch for the hardware 
backdoor that existed for 8 years.

Qubes did last almost 2 years for me though(minus gaming),  when barebones 
linux wouldn't last a day and windows wouldn't last a couple months. Simply 
because I refuse to give up doing the things I own a pc for.   The other thing 
he warned about was using too much of the gpu in qubes...  I foresee that 
coming in the future with people demanding passthrough for it.

If you do decide to go back to windows 10,  hardenwindows10forsecurity.com  
also might interest you hardenubuntu.com  (scroll down to harden ubuntu 
section) The user activities and security and trust of the developers become 
the deciding factor after a point.

I don't think any operating system does it all.   Just like alot of people 
didn't think root privilege escalation in 
vms, being trivial to bypass, was an excuse not to add that layer of 
protection.  I think its even worse not to use secure boot.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/479eda57-f818-4e98-8ed9-8802ee596001%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL Dell Latitude 7480 + dock usb-c problems (dell wd15)

2017-08-20 Thread cyrinux
It is a dock in thunderbolt*

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cdf896e-19c0-46f3-8bed-0372b94ae318%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggestions for video card

2017-08-20 Thread cooloutac
On Sunday, August 20, 2017 at 10:05:39 AM UTC-4, gall...@gmail.com wrote:
> On Sunday, July 23, 2017 at 3:02:43 PM UTC+2, Fun Zork wrote:
> > On Friday, July 21, 2017 at 7:05:56 PM UTC-4, pixel fairy wrote:
> > > have you tried the 4.0 alpha? thats based on fedora 25, which should be 
> > > able to use the 1080.
> > 
> > No luck.  I get the same results as I get after I update to the 
> > current-testing kernel- it reboots right after X tries to start, without 
> > logging anything whatsoever.  I am no expert, but from what I can glean, 
> > 3.2 out of the box has two issues with the 1080: the default kernel doesn't 
> > support it and Xen doesn't support it.  Updating the kernel gets you past 
> > that issue, but there still is an issue from Xen, even after updating it to 
> > 4.6.5.  That's my working theory anyways.
> > 
> > In any case, I ordered a 7750.
> 
> 
> I am also looking for ways to have a 4K 60Hz (with 4:4:4, a must for PC use)  
> TV (43" so I don't care about DPI) running Qubes 3.2 with latest 4.9 kernel.
> 
> I'll have to buy a video card, and I was looking at the AMD RX560 (which is 
> Polaris 11) since it does have true 4:4:4 4K60 HDMI 2.0 and Dom0 with kernel 
> 4.9 has the module for Polaris 11 (see /lib/firmware/amdgpu/), so that side 
> is covered.
> 
> The problem comes from kernel 4.9 release notes, where it says they added 
> AMDGPU but to use it: "you'll need X.Org Server 1.19.0 and xf86-video-amdgpu 
> 1.2.0 too."
> 
> And this seems to be a problem because Qubes 3.2 Dom0 is Fedora 23 based, 
> which has Xorg 1.18.3, and lacks X driver for amdgpu (see 
> https://apps.fedoraproject.org/packages/xorg-x11-drv-amdgpu/overview/).
> 
> Maybe this is why X can not start on your case.
> 
> Does anybody have a RX5* AMD card working on Qubes (even if not at 4K)? How? 
> Xorg.0.log please?

I have an nvidia 650 ti that works fine with qubes.  I would just get any card 
that was released 3 or more years ago, that supports 4k resolution.  Get the 
cheapest one.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/524a83ba-7385-44d5-94d1-7960e745dfaa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Windows 7 problems (R3.2)

2017-08-20 Thread Hugo Costa
Thank you for your answers.

I've tried using an earlier version of the Windows tools (3.2.1-3) and the
problem persists. I'll have to try it in a new vm with no updates (this one
was fully updated, already came with SP1 out-of-the-ISO). My VM isn't a
template, I was a bit lazy.

I've also noticed a new error. Qubes is unable to start the qrexec-daemon.

Thanks!

On 10 August 2017 at 18:38,  wrote:

> Hey,
>
> Installed everything, had to use this method https://github.com/QubesOS/
> qubes-issues/issues/2488, and now it "works".
>
> If I start the VM in Seemless GUI, it goes on but doesn't open any
> application (with and without debug mode on).
> If I start the VM without Seemless GUI, it only goes on with debug mode
> on, otherwise it'll follow the above pattern.
>
> Also, 2nd problem, I've installed MS Office, I've copied the shortcuts to
> the "All Programs" folder and I'm unable to find them in the "Applications"
> tab in the VM config. Is there anything I can do? Also, other installed
> programmes don't appear on the list, it's not just Office.
>
> Thanks for your time!
>
> Hugo
>
> --
> You received this message because you are subscribed to a topic in the
> Google Groups "qubes-users" group.
> To unsubscribe from this topic, visit https://groups.google.com/d/
> topic/qubes-users/PrgPTjNJPHw/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/56cb754b-3c5f-4d6d-99be-3a62538a840f%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>



-- 
Hugo Costa

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABzYznwPx5K3VWFs4wx%3DKdpUaAGXpkhjFPR9_SJNuC-SohR7Aw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggestions for video card

2017-08-20 Thread gallandae
On Sunday, July 23, 2017 at 3:02:43 PM UTC+2, Fun Zork wrote:
> On Friday, July 21, 2017 at 7:05:56 PM UTC-4, pixel fairy wrote:
> > have you tried the 4.0 alpha? thats based on fedora 25, which should be 
> > able to use the 1080.
> 
> No luck.  I get the same results as I get after I update to the 
> current-testing kernel- it reboots right after X tries to start, without 
> logging anything whatsoever.  I am no expert, but from what I can glean, 3.2 
> out of the box has two issues with the 1080: the default kernel doesn't 
> support it and Xen doesn't support it.  Updating the kernel gets you past 
> that issue, but there still is an issue from Xen, even after updating it to 
> 4.6.5.  That's my working theory anyways.
> 
> In any case, I ordered a 7750.


I am also looking for ways to have a 4K 60Hz (with 4:4:4, a must for PC use)  
TV (43" so I don't care about DPI) running Qubes 3.2 with latest 4.9 kernel.

I'll have to buy a video card, and I was looking at the AMD RX560 (which is 
Polaris 11) since it does have true 4:4:4 4K60 HDMI 2.0 and Dom0 with kernel 
4.9 has the module for Polaris 11 (see /lib/firmware/amdgpu/), so that side is 
covered.

The problem comes from kernel 4.9 release notes, where it says they added 
AMDGPU but to use it: "you'll need X.Org Server 1.19.0 and xf86-video-amdgpu 
1.2.0 too."

And this seems to be a problem because Qubes 3.2 Dom0 is Fedora 23 based, which 
has Xorg 1.18.3, and lacks X driver for amdgpu (see 
https://apps.fedoraproject.org/packages/xorg-x11-drv-amdgpu/overview/).

Maybe this is why X can not start on your case.

Does anybody have a RX5* AMD card working on Qubes (even if not at 4K)? How? 
Xorg.0.log please?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd22ffdd-760c-48c5-861c-e3ab38c7e72b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Lenovo ideapad 700

2017-08-20 Thread daniel . zatovic
On Tuesday, October 11, 2016 at 7:34:15 PM UTC+2, Jan Fabo wrote:
> Hi,
> 
> seems good on this machine.

Your report shows that IOMMU isn't supported, but Intel specs 
(http://ark.intel.com/products/88967/Intel-Core-i7-6700HQ-Processor-6M-Cache-up-to-3_50-GHz)
 say that VT-d is supported on the CPU. Are you sure you sure VT-d is enabled 
in your BIOS (if you checked in a fully up-to-date BIOS I would be very 
thankful) ? I found a post 
https://www.reddit.com/r/nvidia/comments/58tqdx/pci_passthrough_geforce_gtx_960m/
 which says that PCI passthrough works on Ideapad Y700 (although it is 
different from Ideapad 700 I believe they are similar - but HCL shows that 
IOMMU isn't supported on Y700 either ?).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/754357a3-0313-4394-9137-3c8d3016ea96%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL Dell Latitude 7480 + dock usb-c problems (dell wd15)

2017-08-20 Thread cyrinux
Hi,

I have successfully install qubes-os 3.2 and 4.0 on this new laptop, I must 
build hid_alps for get the touchpad working.

All was almost good but, the big big problem, is i can't working with the dock.

I don't find how to play correctly with

http://www.dell.com/en-us/shop/dell-dock-wd15-with-180w-adapter/apd/450-aeuo/pc-accessories

* display output are working,
* the network and usb are NOT working, i can't attach them to  the 
sys-usb/sys-net VM,
is see sort of 4 "bridges" in devices list, i suppose for usb and network but 
this is not clear. If I valid the form after enable those bridge, i get an 
error.

Somebody allready get working a such device? Thanks for your help.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a5c568a-8abc-410f-a9f6-4a07f4fd8906%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Grub Boot Screen cannot open Windows

2017-08-20 Thread Yethal
W dniu sobota, 19 sierpnia 2017 17:35:07 UTC+2 użytkownik xueyi...@gmail.com 
napisał:
> I made an entry for Windows 7 on the Grub Boot Screen, but when I attempt to 
> open it, it shows the error "hd1 cannot get c/h/s values".
> 
> I've tried changing BIOS to UEFI mode, but it displays the same error. I've 
> also tried changing the device boot order. 
> 
> I've also tried to recover Windows through sudo mount /dev/sdC on both BIOS 
> and UEFI mode, but the terminal states that the device does not exist.
> 
> I know that Qubes is working fine, and that I did not overwrite the Windows 
> OS file (it still appears when I check the file system on Qubes).
> 
> I wish to be able to dual boot Windows 7 with Qubes 3.2 without losing any 
> programs installed on Windows 7 and without messing up Qubes. What do I do?

Run os-prober and it should automatically create appropriate GRUB entries.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b35b3de-30f4-4223-9e72-059684fe91dc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: usb qube with one of two usb buses?

2017-08-20 Thread Yethal
W dniu niedziela, 20 sierpnia 2017 08:52:48 UTC+2 użytkownik pixel fairy 
napisał:
> im on a desktop with 2 usb buses. is it possible to make a usb qube with one 
> of those controllers and leave the other one in dom0 for the keyboard and 
> mouse?

in dom0:
lspci|grep -i usb

This should list all available usb controllers along their BDF addresses (in 
XX:XX.X format)

Then you only need to attach one of them to the USB qube by running:
qvm-pci -a sys-usb X where X is the BDF address of one of the controllers.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/195ad5d5-9372-4b4a-b0e2-d99c624fb8c9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.