[qubes-users] GPU is deal-breaker
Hi! *** TL;DR: Would the option to attach the GPU to a single qube be feasible? *** Recently tried out Q3.2 and Q4.0-rc1. Pretty happy with most of it, and have some ideas on what might make it better (if those ideas are plausible) - but the GPU seems to be the deal breaker. On LinuxMint, I like using VLC video player to watch lectures, using it's option to speed up without altering pitch. On both versions of Q, video on VLC behaved badly (often freezing up). Audio was good, so can only think it is GPU issue I also use Skype a fair bit on LinuxMint, and find the "share screen" mode useful to show stuff. Video on Skype also performed badly on on both versions of Q, and "share screen" wouldn't work at all. Again, I can only think this is GPU While I've read that OpenGL doesn't work on Q (obviously important for gamers using Q), I don't know the status for OpenCL - but programming OpenCL using GPU is also another use for me (for scientific computing stuff), which I'm guessing Q will also have an issue with >From what I've read, it seems that Dom0 has the GPU, and won't share with >others because it could create a security issue (my guesses: from sharing >memory, or sharing processes, or both). My suggestion (if feasible) is for >Dom0 not to use GPU (CPU only should make sense, as Dom0 should be as >light-weight as possible), and have GPU as a device that can is deployable to >any 1 qube the same way as you can for other devices (such as microphone) - if >GPU assignment feasibly works without security issues. Reading that some >successful experiments have been done for "GPU passthrough" sounds like >assignment of GPU to a qube may be feasible (Am I right??) Love the Qubes concept. Hoping the GPU issue can be sorted, opening up the OS for a wider user base. Cheers! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/310e462e-4c22-4ee1-a2a0-9b63b2abb200%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Grub Boot Screen cannot open Windows
Is there any specific command to enter for that? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d8887bda-6313-4dd6-92d3-15ad67be2458%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: WIN7 + QVM-BLOCK + NTFS PARTITION
Okay, so I've copied the files into Qubes. (It's very awkward compared to windows). Can someone correct me if I done it the wrong way: 1. qvm-block -a personal dom0:sda5 2. mounted /dev/xvdi -> /mnt/removable 3. increased private storage for personal VM to 51200mb 4. moved files across 5. repeated step 1 with sda6,7,8,9 I think I am ready to join the NTFS partitions into Qubes? Do I need to do anything first? How to do it? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4e422b0e-eff8-4ff4-a6d5-14f8be4ff50c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] WIN7 + QVM-BLOCK + NTFS PARTITION
Hello. I have come from Windows 7 -> Qubes OS 2 days ago. I have read the docs, I understand that there is issues accessing partitions from within a stand alone windows 7 VM (qvm-block). When installing Qubes it asked to reclaim space, I said yes. I need the security that Qubes offers me, so I have decided to migrate 100% to Qubes OS. I now want Qubes to reclaim all of the NTFS partitions I have. Is there any way I can backup my existing data (NTFS partitions) -> into Qubes partition, then tell Qubes to claim the partitions? Device Boot Start End Sectors Size Id Type /dev/sda1 * 2048 1026047 1024000 500M 83 Linux /dev/sda2 1026048 126033919 125007872 59.6G 83 Linux /dev/sda3 126035928 321672959 195637032 93.3G f W95 Ext'd (LBA) /dev/sda5 126035932 130226175 41902442G 7 HPFS/NTFS/exFAT /dev/sda6 136521652 157507583 20985932 10G 7 HPFS/NTFS/exFAT /dev/sda7 160208896 191666175 31457280 15G 7 HPFS/NTFS/exFAT /dev/sda8 199436188 230891519 31455332 15G 7 HPFS/NTFS/exFAT /dev/sda9 241854464 252354559 105000965G 7 HPFS/NTFS/exFAT I want to copy everything from (sda5, sda6, sda7, sda8 and sda9) to Qubes. I apologize if I'm asking a basic question. I am figuring this out as I go along. If anyone can explain those partitions to me I would appreciate it. By the way, I have installed GParted into my TemplateVM (debian-8), and can access it in PersonalVM now. If there is a way to access these partitions from Windows 7 VM then can someone let me know. I have tried, I followed all the docs, and instructions but from what I think some of you said it isn't a good idea (BSOD, data corruption). Regards, MG. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/de79f025-d778-4187-851b-8c2a4f4bae0b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Kernel and Policies
In the past I've read in the docs about the way to isolate the root account in VMs using PolKit. I was wandering if there is a way to always prompt Dom0 for authorization for some specific operations inside VMs, like a syscall, using policies or better modifying the kernel. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/835b852a-a99c-4510-9ea8-9976043444d1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Admin privileges, new APIs and Firewall
With the new Admin APIs is there a way to set up a FirewallVM with an Application Firewall running inside that can pop up dialogs always on top to let the user decide where to accept or not a connection? Problems: 1) Unprivileged VM windows always on top 2) The Firewall VM need to know details about the app trying to connect The second one I think it can be solved by adding the infomations needed in the payload at the SourceVM and than let the FW remove them or by incapsulating the packets in an another IP layer. Do you have some ideas? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/31f91cc8-15eb-4694-a08f-e5b423c8caeb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Does qubes work in asus chromebook c201?
Does qubes work in asus chromebook C201? The laptop is made of arm cpu. At moment, I want my privacy to be protected. https://mytemp.email/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1503265635723-1841ba75-f4d95db2-ad3cb730%40s.proprietativalcea.ro. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Problem connecting via VPN ProxyVM (VPN works, but AppVM can't connect)
Hello, I have successfully setup a fedora 25 bases ProxyVM, which has Cisco's Anyconnect Secure Mobility Client installed. I can successfully connect via VPN and can also ping/reach servers via VPN. Unfortunately the App-VM which uses the VPN Proxy VM can't connect. The Setup: sys-net <-- sys-firewall <-- my-vpn (Proxy VM) <-- my-work (App VM) As I can connect from the Proxy my-vpn VM, it seems the problem is between the connection of my App-VM to the new Proxy VPN VM. How can I troubleshoot and investigate the issues? - PhR -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/691f3971-2607-c52b-d146-8fdc53471395%40googlemail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: UEFI secureboot issue
On 08/20/2017 05:44 AM, cooloutac wrote: On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote: On 08/16/2017 05:55 AM, cooloutac wrote: I'm glad Bruce Schneier changed his tune and is no longer encouraging kids to learn how to hack in live environments, cause I think that breeds sociopaths, and is dangerous. (and we are living in an epidemic) Now he has to stop calling secure boot security theater, because alot of people seem to believe it and take his word like gospel. Is protecting the bios from rootkits its intended purpose? seems so?, it helps anyways, and it definitely was intended to protect the firmware. Its not just kernel code signing, its driver code too. I would add also make a password on your bios obviously, and enable flash protections. I don't even think most the ITL members use aem, it sounds complicated and buggy and I can't afford to buy new hardware if it red flags anyways. So..if you feel so strongly about it, how come you are using Qubes? Maybe I should go back to using Windows 10, if secure boot trumps the other security aspects of Qubes. Or, do you think your 'safer' using Qubes, if so, why ? To be honest, it really doesn't matter what os you use, its all about what the user does on it. When using qubes the user still has to be careful. It doesn't matter if dom0 is compromised if a vm with sensitive info is. You really have to be strict with yourself. You going to play online video games? might as well use windows. Dual booting? might as well just use windows. disabling iommu features? might as well just use windows. Worried about government spying? Might as well not use anything. You have to live like a monk if you really want privacy. I have a windows machine and a qubes machine. the qubes machine is for offline documents, compartmentalizing specific website login activity, and random browsing. The windows machine is for gaming and movies. The guy Brad Spengler already warned dom0 and vms can be compromised by bad system updates. And I believe this happened to me and led to my bank account being hacked. Also just after intel announced their patch for the hardware backdoor that existed for 8 years. Qubes did last almost 2 years for me though(minus gaming), when barebones linux wouldn't last a day and windows wouldn't last a couple months. Simply because I refuse to give up doing the things I own a pc for. The other thing he warned about was using too much of the gpu in qubes... I foresee that coming in the future with people demanding passthrough for it. If you do decide to go back to windows 10, hardenwindows10forsecurity.com also might interest you hardenubuntu.com (scroll down to harden ubuntu section) The user activities and security and trust of the developers become the deciding factor after a point. I don't think any operating system does it all. Just like alot of people didn't think root privilege escalation in vms, being trivial to bypass, was an excuse not to add that layer of protection. I think its even worse not to use secure boot. So, I'm still confused, if you feel secure boot is So important, why is it that you don't use an OS that supports it ? Or are you saying that besides the secure boot, that Qubes or Linux IS more "secure" , and it's a "know your adversary" thing? If I'm understanding this correctly the main adversary re: secure boot would be some "advanced threat" like a government with that level of "skills" ?? I'm more "newb" than you, what does a "failed" update look like ?? I have been feeling a lot more secure using a dedicated VM to do banking , which actually was how I started down the path to use Qubes ... I don't know what "root privilege escalation in vms, being trivial to bypass, was an excuse not to add that layer of protection" means ; if you might explain that as well .(btw, is some of this to improve with Qubes 4.x ? Personally, I also enjoy how well Whonix works in Qubes , and use it for most things that don't require logins, and I like the speed or the OS vs win10 , which nows feel clunky, esp on VPN -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d30827f7-ef2f-c213-f9da-57853de15fe4%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Grub Boot Screen cannot open Windows
W dniu niedziela, 20 sierpnia 2017 20:30:47 UTC+2 użytkownik xueyi...@gmail.com napisał: > The terminal replies with "os-prober: not a shell built in". Looks like you'll need to enable os-prober in grub first. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a535e804-82d5-48d8-b56e-3bc8288203f2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How do you make a new user on Qubes?
W dniu niedziela, 20 sierpnia 2017 20:38:13 UTC+2 użytkownik xueyi...@gmail.com napisał: > I wanted to make a guest user without a password, but there doesn't seem to > be any option to create a new user. > > Also, on a side note, is it possible to have the same VMs on the guest user > but not the same applications inside the VMs? And is it possible to download > a new OS (I'm thinking Windows 8) inside Qubes for both users? I also hope > for the users to have different IP addresses and MAC addresses if possible (I > do not want the activities on different users to seem related to each other > in any way). QubesOS does not support more than one user on the same physical machine. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/62f0fe7a-beca-49d4-9f07-dd9eba305f18%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Upgrade path R3.2 to R4?
W dniu niedziela, 20 sierpnia 2017 20:54:15 UTC+2 użytkownik Marian Beermann napisał: > Is there already a documented / "generally thought to be working" > upgrade path from R3.2 to R4 (rc1)? > > Cheers, Marian Nope, best you can do right now is to backup all your vms, do a clean install and restore them on R4.0 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/50311278-1d81-44b1-9662-798333fc3536%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Upgrade path R3.2 to R4?
Is there already a documented / "generally thought to be working" upgrade path from R3.2 to R4 (rc1)? Cheers, Marian -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c635a712-9dc2-f833-3515-a29a6030f8e5%40enkore.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How do you make a new user on Qubes?
I wanted to make a guest user without a password, but there doesn't seem to be any option to create a new user. Also, on a side note, is it possible to have the same VMs on the guest user but not the same applications inside the VMs? And is it possible to download a new OS (I'm thinking Windows 8) inside Qubes for both users? I also hope for the users to have different IP addresses and MAC addresses if possible (I do not want the activities on different users to seem related to each other in any way). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eb32c817-f3e2-43bc-bea2-97eeca31e04f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Grub Boot Screen cannot open Windows
The terminal replies with "os-prober: not a shell built in". -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/61caee40-7d92-4109-8900-ca06e472a843%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Is it possible to add ricing tools for basic Qubes 3.2 repo?
Hi. Newbie question is at possible to add CLI/Ncurses tools for Qubes? Also in Qubes 3.2 Installation problems with Compton and many others useful tools. Thanks! https://rizonrice.github.io/resources http://blog.micahcowell.com/blog/basics-of-ricing https://fun.irq.dk/funroll-loops.org https://nixers.net/showthread.php?tid=1566 http://linuxbbq.org/cream.html http://archive.is/a36v Bean: http://i.imgur.com/BziH1iE.png https://github.com/thelostt/ricing https://www.reddit.com/r/unixporn/wiki/index https://github.com/nixers-projects/ricerous https://wiki.installgentoo.com/index.php...nux_ricing http://help.unc.edu/help/unix-customizin...vironment https://www.cs.odu.edu/~zeil/cs252/f16/Public/custom http://unix.stackexchange.com/questions/...oductivity https://rizonrice.github.io/resources http://blog.micahcowell.com/blog/basics-of-ricing http://apcmag.com/create-totally-custom-...sktop.htm http://8ch.net/rice https://rizonrice.github.io/resources -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8f7f1368-2062-4525-9b94-6743ce8ee682%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: UEFI secureboot issue
On Sunday, August 20, 2017 at 11:44:42 AM UTC-4, cooloutac wrote: > On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote: > > On 08/16/2017 05:55 AM, cooloutac wrote: > > > I'm glad Bruce Schneier changed his tune and is no longer encouraging > > > kids to learn how to hack in live environments, cause I think that > > > breeds sociopaths, and is dangerous. (and we are living in an epidemic) > > > > > > Now he has to stop calling secure boot security theater, because alot of > > > people seem to believe it and take his word like gospel. > > > > > > Is protecting the bios from rootkits its intended purpose? seems so?, it > > > helps anyways, and it definitely was intended to protect the firmware. > > > Its not just kernel code signing, its driver code too. > > > > > > I would add also make a password on your bios obviously, and enable > > > flash protections. > > > > > > I don't even think most the ITL members use aem, it sounds complicated > > > and buggy and I can't afford to buy new hardware if it red flags anyways. > > > > > > > So..if you feel so strongly about it, how come you are using Qubes? > >Maybe I should go back to using Windows 10, if secure boot trumps > > the other security aspects of Qubes. > > > > Or, do you think your 'safer' using Qubes, if so, why ? > > To be honest, it really doesn't matter what os you use, its all about what > the user does on it. When using qubes the user still has to be careful. It > doesn't matter if dom0 is compromised if a vm with sensitive info is. You > really have to be strict with yourself. > > You going to play online video games? might as well use windows. > > Dual booting? might as well just use windows. > > disabling iommu features? might as well just use windows. > > Worried about government spying? Might as well not use anything. > > You have to live like a monk if you really want privacy. > > I have a windows machine and a qubes machine. the qubes machine is for > offline documents, compartmentalizing specific website login activity, and > random browsing. The windows machine is for gaming and movies. > > The guy Brad Spengler already warned dom0 and vms can be compromised by bad > system updates. And I believe this happened to me and led to my bank account > being hacked. Also just after intel announced their patch for the hardware > backdoor that existed for 8 years. > > Qubes did last almost 2 years for me though(minus gaming), when barebones > linux wouldn't last a day and windows wouldn't last a couple months. Simply > because I refuse to give up doing the things I own a pc for. The other > thing he warned about was using too much of the gpu in qubes... I foresee > that coming in the future with people demanding passthrough for it. > > If you do decide to go back to windows 10, hardenwindows10forsecurity.com > also might interest you hardenubuntu.com (scroll down to harden ubuntu > section) The user activities and security and trust of the developers become > the deciding factor after a point. > > I don't think any operating system does it all. Just like alot of people > didn't think root privilege escalation in > vms, being trivial to bypass, was an excuse not to add that layer of > protection. I think its even worse not to use secure boot. also if my hardware is compromised it really doesn't matter what os I use at that point either. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8d91dd9f-5aba-45a1-96d8-60a68fa8355f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: UEFI secureboot issue
On Sunday, August 20, 2017 at 12:42:55 AM UTC-4, qubester wrote: > On 08/16/2017 05:55 AM, cooloutac wrote: > > I'm glad Bruce Schneier changed his tune and is no longer encouraging kids > > to learn how to hack in live environments, cause I think that breeds > > sociopaths, and is dangerous. (and we are living in an epidemic) > > > > Now he has to stop calling secure boot security theater, because alot of > > people seem to believe it and take his word like gospel. > > > > Is protecting the bios from rootkits its intended purpose? seems so?, it > > helps anyways, and it definitely was intended to protect the firmware. Its > > not just kernel code signing, its driver code too. > > > > I would add also make a password on your bios obviously, and enable flash > > protections. > > > > I don't even think most the ITL members use aem, it sounds complicated and > > buggy and I can't afford to buy new hardware if it red flags anyways. > > > > So..if you feel so strongly about it, how come you are using Qubes? >Maybe I should go back to using Windows 10, if secure boot trumps > the other security aspects of Qubes. > > Or, do you think your 'safer' using Qubes, if so, why ? To be honest, it really doesn't matter what os you use, its all about what the user does on it. When using qubes the user still has to be careful. It doesn't matter if dom0 is compromised if a vm with sensitive info is. You really have to be strict with yourself. You going to play online video games? might as well use windows. Dual booting? might as well just use windows. disabling iommu features? might as well just use windows. Worried about government spying? Might as well not use anything. You have to live like a monk if you really want privacy. I have a windows machine and a qubes machine. the qubes machine is for offline documents, compartmentalizing specific website login activity, and random browsing. The windows machine is for gaming and movies. The guy Brad Spengler already warned dom0 and vms can be compromised by bad system updates. And I believe this happened to me and led to my bank account being hacked. Also just after intel announced their patch for the hardware backdoor that existed for 8 years. Qubes did last almost 2 years for me though(minus gaming), when barebones linux wouldn't last a day and windows wouldn't last a couple months. Simply because I refuse to give up doing the things I own a pc for. The other thing he warned about was using too much of the gpu in qubes... I foresee that coming in the future with people demanding passthrough for it. If you do decide to go back to windows 10, hardenwindows10forsecurity.com also might interest you hardenubuntu.com (scroll down to harden ubuntu section) The user activities and security and trust of the developers become the deciding factor after a point. I don't think any operating system does it all. Just like alot of people didn't think root privilege escalation in vms, being trivial to bypass, was an excuse not to add that layer of protection. I think its even worse not to use secure boot. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/479eda57-f818-4e98-8ed9-8802ee596001%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL Dell Latitude 7480 + dock usb-c problems (dell wd15)
It is a dock in thunderbolt* -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5cdf896e-19c0-46f3-8bed-0372b94ae318%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Suggestions for video card
On Sunday, August 20, 2017 at 10:05:39 AM UTC-4, gall...@gmail.com wrote: > On Sunday, July 23, 2017 at 3:02:43 PM UTC+2, Fun Zork wrote: > > On Friday, July 21, 2017 at 7:05:56 PM UTC-4, pixel fairy wrote: > > > have you tried the 4.0 alpha? thats based on fedora 25, which should be > > > able to use the 1080. > > > > No luck. I get the same results as I get after I update to the > > current-testing kernel- it reboots right after X tries to start, without > > logging anything whatsoever. I am no expert, but from what I can glean, > > 3.2 out of the box has two issues with the 1080: the default kernel doesn't > > support it and Xen doesn't support it. Updating the kernel gets you past > > that issue, but there still is an issue from Xen, even after updating it to > > 4.6.5. That's my working theory anyways. > > > > In any case, I ordered a 7750. > > > I am also looking for ways to have a 4K 60Hz (with 4:4:4, a must for PC use) > TV (43" so I don't care about DPI) running Qubes 3.2 with latest 4.9 kernel. > > I'll have to buy a video card, and I was looking at the AMD RX560 (which is > Polaris 11) since it does have true 4:4:4 4K60 HDMI 2.0 and Dom0 with kernel > 4.9 has the module for Polaris 11 (see /lib/firmware/amdgpu/), so that side > is covered. > > The problem comes from kernel 4.9 release notes, where it says they added > AMDGPU but to use it: "you'll need X.Org Server 1.19.0 and xf86-video-amdgpu > 1.2.0 too." > > And this seems to be a problem because Qubes 3.2 Dom0 is Fedora 23 based, > which has Xorg 1.18.3, and lacks X driver for amdgpu (see > https://apps.fedoraproject.org/packages/xorg-x11-drv-amdgpu/overview/). > > Maybe this is why X can not start on your case. > > Does anybody have a RX5* AMD card working on Qubes (even if not at 4K)? How? > Xorg.0.log please? I have an nvidia 650 ti that works fine with qubes. I would just get any card that was released 3 or more years ago, that supports 4k resolution. Get the cheapest one. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/524a83ba-7385-44d5-94d1-7960e745dfaa%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Windows 7 problems (R3.2)
Thank you for your answers. I've tried using an earlier version of the Windows tools (3.2.1-3) and the problem persists. I'll have to try it in a new vm with no updates (this one was fully updated, already came with SP1 out-of-the-ISO). My VM isn't a template, I was a bit lazy. I've also noticed a new error. Qubes is unable to start the qrexec-daemon. Thanks! On 10 August 2017 at 18:38, wrote: > Hey, > > Installed everything, had to use this method https://github.com/QubesOS/ > qubes-issues/issues/2488, and now it "works". > > If I start the VM in Seemless GUI, it goes on but doesn't open any > application (with and without debug mode on). > If I start the VM without Seemless GUI, it only goes on with debug mode > on, otherwise it'll follow the above pattern. > > Also, 2nd problem, I've installed MS Office, I've copied the shortcuts to > the "All Programs" folder and I'm unable to find them in the "Applications" > tab in the VM config. Is there anything I can do? Also, other installed > programmes don't appear on the list, it's not just Office. > > Thanks for your time! > > Hugo > > -- > You received this message because you are subscribed to a topic in the > Google Groups "qubes-users" group. > To unsubscribe from this topic, visit https://groups.google.com/d/ > topic/qubes-users/PrgPTjNJPHw/unsubscribe. > To unsubscribe from this group and all its topics, send an email to > qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/ > msgid/qubes-users/56cb754b-3c5f-4d6d-99be-3a62538a840f%40googlegroups.com. > For more options, visit https://groups.google.com/d/optout. > -- Hugo Costa -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABzYznwPx5K3VWFs4wx%3DKdpUaAGXpkhjFPR9_SJNuC-SohR7Aw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Suggestions for video card
On Sunday, July 23, 2017 at 3:02:43 PM UTC+2, Fun Zork wrote: > On Friday, July 21, 2017 at 7:05:56 PM UTC-4, pixel fairy wrote: > > have you tried the 4.0 alpha? thats based on fedora 25, which should be > > able to use the 1080. > > No luck. I get the same results as I get after I update to the > current-testing kernel- it reboots right after X tries to start, without > logging anything whatsoever. I am no expert, but from what I can glean, 3.2 > out of the box has two issues with the 1080: the default kernel doesn't > support it and Xen doesn't support it. Updating the kernel gets you past > that issue, but there still is an issue from Xen, even after updating it to > 4.6.5. That's my working theory anyways. > > In any case, I ordered a 7750. I am also looking for ways to have a 4K 60Hz (with 4:4:4, a must for PC use) TV (43" so I don't care about DPI) running Qubes 3.2 with latest 4.9 kernel. I'll have to buy a video card, and I was looking at the AMD RX560 (which is Polaris 11) since it does have true 4:4:4 4K60 HDMI 2.0 and Dom0 with kernel 4.9 has the module for Polaris 11 (see /lib/firmware/amdgpu/), so that side is covered. The problem comes from kernel 4.9 release notes, where it says they added AMDGPU but to use it: "you'll need X.Org Server 1.19.0 and xf86-video-amdgpu 1.2.0 too." And this seems to be a problem because Qubes 3.2 Dom0 is Fedora 23 based, which has Xorg 1.18.3, and lacks X driver for amdgpu (see https://apps.fedoraproject.org/packages/xorg-x11-drv-amdgpu/overview/). Maybe this is why X can not start on your case. Does anybody have a RX5* AMD card working on Qubes (even if not at 4K)? How? Xorg.0.log please? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fd22ffdd-760c-48c5-861c-e3ab38c7e72b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: HCL - Lenovo ideapad 700
On Tuesday, October 11, 2016 at 7:34:15 PM UTC+2, Jan Fabo wrote: > Hi, > > seems good on this machine. Your report shows that IOMMU isn't supported, but Intel specs (http://ark.intel.com/products/88967/Intel-Core-i7-6700HQ-Processor-6M-Cache-up-to-3_50-GHz) say that VT-d is supported on the CPU. Are you sure you sure VT-d is enabled in your BIOS (if you checked in a fully up-to-date BIOS I would be very thankful) ? I found a post https://www.reddit.com/r/nvidia/comments/58tqdx/pci_passthrough_geforce_gtx_960m/ which says that PCI passthrough works on Ideapad Y700 (although it is different from Ideapad 700 I believe they are similar - but HCL shows that IOMMU isn't supported on Y700 either ?). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/754357a3-0313-4394-9137-3c8d3016ea96%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL Dell Latitude 7480 + dock usb-c problems (dell wd15)
Hi, I have successfully install qubes-os 3.2 and 4.0 on this new laptop, I must build hid_alps for get the touchpad working. All was almost good but, the big big problem, is i can't working with the dock. I don't find how to play correctly with http://www.dell.com/en-us/shop/dell-dock-wd15-with-180w-adapter/apd/450-aeuo/pc-accessories * display output are working, * the network and usb are NOT working, i can't attach them to the sys-usb/sys-net VM, is see sort of 4 "bridges" in devices list, i suppose for usb and network but this is not clear. If I valid the form after enable those bridge, i get an error. Somebody allready get working a such device? Thanks for your help. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0a5c568a-8abc-410f-a9f6-4a07f4fd8906%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Grub Boot Screen cannot open Windows
W dniu sobota, 19 sierpnia 2017 17:35:07 UTC+2 użytkownik xueyi...@gmail.com napisał: > I made an entry for Windows 7 on the Grub Boot Screen, but when I attempt to > open it, it shows the error "hd1 cannot get c/h/s values". > > I've tried changing BIOS to UEFI mode, but it displays the same error. I've > also tried changing the device boot order. > > I've also tried to recover Windows through sudo mount /dev/sdC on both BIOS > and UEFI mode, but the terminal states that the device does not exist. > > I know that Qubes is working fine, and that I did not overwrite the Windows > OS file (it still appears when I check the file system on Qubes). > > I wish to be able to dual boot Windows 7 with Qubes 3.2 without losing any > programs installed on Windows 7 and without messing up Qubes. What do I do? Run os-prober and it should automatically create appropriate GRUB entries. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2b35b3de-30f4-4223-9e72-059684fe91dc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: usb qube with one of two usb buses?
W dniu niedziela, 20 sierpnia 2017 08:52:48 UTC+2 użytkownik pixel fairy napisał: > im on a desktop with 2 usb buses. is it possible to make a usb qube with one > of those controllers and leave the other one in dom0 for the keyboard and > mouse? in dom0: lspci|grep -i usb This should list all available usb controllers along their BDF addresses (in XX:XX.X format) Then you only need to attach one of them to the USB qube by running: qvm-pci -a sys-usb X where X is the BDF address of one of the controllers. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/195ad5d5-9372-4b4a-b0e2-d99c624fb8c9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.