Re: [qubes-users] hdparm?

2018-02-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-02-05 10:57, 'awokd' via qubes-users wrote:
> On Mon, February 5, 2018 4:37 pm, 'Guillaume Bertin' via qubes-users wrote:
>> Hi,
>>
>>
>> I don't manage installing hdparm in dom0. No package...
>>
>>
>> Have I missed something? Should harddisk management be done outside of
>> dom0?
> 
> Usually, for security reasons you should avoid installing software
> directly in dom0 (https://www.qubes-os.org/doc/copy-from-dom0/).

Also see:

https://www.qubes-os.org/doc/software-update-dom0/
https://www.qubes-os.org/doc/security-guidelines/#dom0-precautions

> You can
> force it by manually downloading, copying in the package, and installing,
> but you'll have to also handle dependency resolution yourself. If you only
> need to run hdparm once or twice, you might want to boot from a live image
> instead and run it from there. Don't forget to verify signatures!
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=s7aS
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/664a1209-12b1-063f-c82e-d2771afe92d4%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fedora-minimal und Q. 4.0

2018-02-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-02-05 08:47, Jo wrote:
> Cheers folks,
> 
> because of the switch to 4,0 im currently setting up a complete new
> system-structure, and therefore, i wanted to base all the sys-vms
> on fedora minimal templates.
> 
> However, im missing a few qubes-specific  functions and couldnt 
> find informations on what to install to get them. Ive installed
> all the necessary packages mentioned in the Documentation, but the 
> "convert to trusted PDF/IMG function" is still missing.
> 
> Any hints which package i need to add?
> 

When you say that it's "missing," does you mean that the CLI tool is
missing, or the option is missing from the GUI context menu, or both?

In either case, this sounds like this might be an oversight. Tracking:

https://github.com/QubesOS/qubes-issues/issues/3543

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=MdJ/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a58ebb9-8474-1518-d896-47e89d61096b%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-05 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sun, Feb 04, 2018 at 03:42:51PM -, 'awokd' via qubes-users wrote:
> On Sun, February 4, 2018 7:16 am, ThierryIT wrote:
> 
> >
> > I have check it, but when doing a "dnf list installed "qubes-*" on my
> > sys-usb, I can see that qubes-usb-proxy is installed:
> > qubes-usb-proxy.noarch 1.0.12-1.fc26 @qubes-vm-r3.2-current  Shouldn't
> > be: 4.0 current instead ?
> 
> Yes, should be 4.0. Did you see the recommendation in
> https://www.qubes-os.org/doc/upgrade-to-r4.0/ to not restore your R3.2
> templates to R4.0? Sounds like that might be what happened. Make sure all
> your AppVMs are using an R4.0 template.

Exactly.

But even on R3.2-based template it should work. Try updating
qubes-usb-proxy, the newest version is 1.0.15.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlp4/csACgkQ24/THMrX
1yxUQgf/aiPRiNCz9OAKK95Mnw3zElCNgu+dujpbl755sR1FCU1EaCK5ilztRfAt
ciyP5FmhMz+ha9tbG4GpEvrYwJxx4dEqUDegWFo3dspX5j9RS7PXR0DyX989UTsk
I2HdEj7N3B7oZnc9xqPCHXJV6RzFAnzaGBrAu7JUbcEj9HFsmHnxQLxq23r8AOJG
4In4Q4ralNALy2RxnwhEBNfcMfG32pzOvkXIkeHzPfD+gjSWDzzcczL0u7lA15Z4
VBRrIGy9SDaeIWYismn4j3WHqnhM1RUoaJsOO/8yqVvwaCW1k+ooYAWUc97ANEfJ
BGiG1mAwqqUax5Qg4oOPltJiaW8PAA==
=KIs/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180206005851.GC12544%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] hdparm?

2018-02-05 Thread 'Guillaume Bertin' via qubes-users
 Original Message 
 On February 5, 2018 6:22 PM, donoban  wrote:

> Sorry I mean 'sudo qubes-dom0-update hdparm'

Many thanks, that was indeed simple (and documented). "yum install" was 
definetely not the way to do it.

awokd: thanks for your advise. I want to have my storage harddisk going to 
sleep mode when idle for some time, so it needs to be done at each startup. I 
suppose I could also create a dedicated vm with access to this hardware, which 
would be launched at startup, set this setting to the harddisk, then shutdown 
itself. Overkill for me. :)

G.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0D5QuuFaB0npK8WnuLx6ywgqMsNhuUzPb-eM3D1cPirzaBy1KnkXFtmeCcvKXtcCLEk18p-BUbUCAKtbhbKVT21tT-036pmlvg0QRhAtIhE%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 without IOMMU/VT-d/AMD-Vi or Interrupt Remapping

2018-02-05 Thread taii...@gmx.com

On 02/05/2018 05:20 PM, brendan.h...@gmail.com wrote:


PS - The W520 also is the last W5xx to support a nice Thinkpad keyboard. :)

I too recommend the W520 if you want a mobile workstation style laptop, 
with coreboot you can also buy and install a quad core ivy bridge CPU.


The G505S however is more secure due to not having ME/PSP, but the build 
quality isn't as good and there is no dock/2nd battery option.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d591a67e-361b-f974-caf1-2b233af825de%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 without IOMMU/VT-d/AMD-Vi or Interrupt Remapping

2018-02-05 Thread 'awokd' via qubes-users
On Mon, February 5, 2018 9:39 pm, Utility Panel wrote:

> Ah. I hadn't considered the Coreboot option. My understanding is that the
> chipset is at fault.
>
> The only documentation I've found was forwarded to me from another user
> on this list. It explains a solution that Zen recommended for this
> particular hardware problem; but as far as I can tell, the best-available
> fix is still not capable of resolving the issue sufficiently for Qubes
> 4.0:
>
>
> https://support.citrix.com/article/CTX136517

Unfortunately, I think you're right. Intel chipset issue- "recommended
workaround of Intel for the errata is to disable the Interrupt remapping
feature itself". Good work, Intel! Don't think Coreboot would help there.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9b4781bb4e05db8d867e0695d99b842.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 without IOMMU/VT-d/AMD-Vi or Interrupt Remapping

2018-02-05 Thread Utility Panel
On Monday, February 5, 2018 at 4:33:57 PM UTC-5, awokd wrote:
> On Mon, February 5, 2018 9:20 pm, Utility Panel wrote:
> > On Monday, February 5, 2018 at 4:12:50 PM UTC-5, Rusty Bird wrote:
> 
> >>> Can anyone tell me what I might expect without IOMMU/VT-d/AMD-Vi and
> >>> Interrupt Remapping?
> 
> >
> >
> > Anyone interested in a pair of lightly used HP Z800 server work stations?
> > Great machines. Cannot run Qubes 4.0 correctly.
> 
> Is the CPU in those not capable of it, or is it a manufacturer BIOS issue?
> If the latter, you might check to see if you can Coreboot it. Sometimes
> that can fix these issues too.

Ah. I hadn't considered the Coreboot option. My understanding is that the 
chipset is at fault. 

The only documentation I've found was forwarded to me from another user on this 
list. It explains a solution that Zen recommended for this particular hardware 
problem; but as far as I can tell, the best-available fix is still not capable 
of resolving the issue sufficiently for Qubes 4.0:

https://support.citrix.com/article/CTX136517

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03b397c8-c259-404f-9e0c-087bf5ce7e84%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: templates update fail over sys-usb (but work using sys-net, on Qubes 4.x rc4)

2018-02-05 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Feb 03, 2018 at 02:21:45PM -0800, Dave C wrote:
> On Saturday, February 3, 2018 at 1:56:14 PM UTC-8, Yuraeitha wrote:
> [ ... snip ... ]
> 
> > It might be a good idea to put this on github, chances are that they might 
> > fix it soon if the problem is general issue for all USB tethering's, which 
> > could affect many people, thus possibly given higher priority in the 
> > limited resources available. They can also better keep track of the issue 
> > on github. Try report it on github if possible.
> 
> I'll try to reproduce when time permits, and write this up better in a github 
> issue.
> 
> > 
> > btw, just to be sure, are you using it in this order? 
> > sys-net --> sys-usb --> sys-firewall, and tying your Qubes-Global-Settings 
> > for NetVM updates to sys-usb?
> 
> No, I'm switching between
> 
> 1. sys-net --> sys-firewall --> appvms  (the out of the box default)
> 2. sys-usb --> sys-firewall --> appvms  (sys-net disconnected)
> 
> And the behavior I see is...
> 
> setting #1, `dnf install ...` *succeeds* in appvms, *succeeds* in templates
> setting #2, `dnf install ...` *succeeds* in appvms, *fails* in templates
> 
> The way the templates fail has switched from the error in my first post, to 
> the error in my later post.

Currently "updatevm" setting applies only to dom0 updates. There is no
nice GUI for VM updates yet, but you can configure it manually in
/etc/qubes-rpc/policy/qubes.UpdatesProxy (adjust target=sys-net).

Related ticket:
https://github.com/QubesOS/qubes-issues/issues/3527

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlp4zJQACgkQ24/THMrX
1yxhaAf/Q3iO2/kYqW4v8n2t6Lhc5QQH1ycGc3IDP6uZpHAz4qyaRfdRPz0IDMRf
gSz8dN8+Zea0qmb6IeDKF8HB9iNecTpfNSW6x1tWsK7z3QRbYN9Y2oqzPkadHSJA
YkSMMmvEiKyu9SLN5Lu8KtYWHOaMPk9b1LfbljzM/m3Tk1nk8X8goGqu/UyvLkPc
GkgXzNEmz8vxhMzcmEwcJJrPXVIghmQRyfdKWYcQ4S9T3VL3WzpkGZsilqS6DwzE
rqY91Fz6KCLGTe0ML0VUfnfvyc+Zn2/o9uRPD5NsbtEZA3qJdxPcSVB1/c+hz4b5
szhAD7iVs7CpV154idpZbWWp92GGFg==
=nWKv
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180205212852.GB12544%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-usb is broken in Qubes 4.0 rc4

2018-02-05 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sun, Feb 04, 2018 at 05:50:12PM -0800, Fabrizio Romano Genovese wrote:
> Hello all, 
> 
> When I try to attach my webcam to any appvm, I get the following message:
> 
> Device attach failed: /usr/lib/qubes/usb-import: line 32: 
> /sys/devices/platform/vhci_hcd/status: No such file or directoryNo unused 
> port found!/usr/lib/qubes/usb-import: line 51: 
> /sys/devices/platform/vhci_hcd/attach: No such file or directory
> 
> In the meantime, the devices widget thinks that everything is ok.
> I was able to reproduce this error on two different machines, one upgraded 
> from Qubes 4.0 rc3 and another coming from a fresh install. What should I do?

Install template updates from current-testing repository[1], it's fixed
there already. Packages will migrate to default repository later today.

[1] https://www.qubes-os.org/doc/software-update-vm/#testing-repositories

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlp4y4sACgkQ24/THMrX
1ywuPAf/WaohYYgsEdJQ6XaTCDyONg8VM9xzOV/Wu0/ZlCQFjX6bsKrXMBlx9xL2
uJhu5McE3kywYKg1QySMTXG8TRFoaaYfxoghYcRknlmHV6nDj72pJfiMm3DscVY8
mTM47GWyCLXwZL3z1us/VBOQZUM+k2E3lF0Pyh37a/p7bkDeZZz0VVq2BD7jwwAm
KgAiFybRz2GePo7oyu8SI93Ks8bQJcGfZmqh6SZ1nXxTjQ7Fad4dvPYyBy10tMLh
bN89RjIQuCG0LN7ZaAB3t0uqltAIpjvv3gu1HCAXKTkkDpBFPbEsRKMKmXclDQij
mfpbj23mp7Azw7ETTtvdz7LTrmtVxQ==
=4vQa
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180205212428.GA12544%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 without IOMMU/VT-d/AMD-Vi or Interrupt Remapping

2018-02-05 Thread Utility Panel
On Monday, February 5, 2018 at 4:12:50 PM UTC-5, Rusty Bird wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Utility Panel:
> > Can anyone tell me what I might expect without IOMMU/VT-d/AMD-Vi and
> > Interrupt Remapping?
> 
> https://www.qubes-os.org/faq/#can-i-install-qubes-4x-on-a-system-without-vt-x-or-vt-d
> 
> Rusty
> -BEGIN PGP SIGNATURE-
> 
> iQJ8BAEBCgBmBQJaeMi+XxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
> ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0
> NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfeb4P/R7K8LDbdSkKYs+B1uLbNTyz
> 2YwohgIu89FSCM/wq8yamJ9OnQFLRlhM7yGhcjsqMaPiBCS0BOdlR463kTn6tWHy
> 893xxeor7h96XymKsrFr/7OP61zDsnO/4wp7LE7bynDxBgRc1RjR3KjZ48a1HOz5
> TxWDliJlxHq+5Bk9XwOCDO1eTFUyfuZ5opWGqL3+4c9ZV52nk4aEYkizHxFFiWA5
> WZlZN/O6HHepNkqtH+nNYV8BjRsueBzI8WaqO/R3adfppufrCaQHIndqeQYl06JL
> KPZ87ANXHLoojNG4vomxRrAnSVB9Ho0yj4EWTU7UMzX/0UCfJrZp7wssIGDGjKbm
> una0PQbOJckOcwGQoq9YClVgSQPCFADgnuj9fn9nwmJKLJZvL+dczGjPDw15vXDQ
> NzjVLcwo+755tLC+zJ6bXoPS4O4yDEAcmj+EolnGGxHidOSXZoRBvWQT0OH4/0ku
> wLSnEIZDg4PEmcsgwfxwtF90inlA/n2tJwQkL839nWAJvTnrza3rBAwn7hCIAwjq
> qpLewtLTH87/d0GErjtRTmMLOw4vCmlh/bsDGLKtdrT2R0hD6jhem5wt+dSvrjaV
> jWXfB64Jz/0IuWjoEOez2yW8z4ALfv4856dvAXXBjaXS6IBK7cf2Rr8Reu76MmOs
> zkUB451uJxd4oUQntu2P
> =/p4t
> -END PGP SIGNATURE-

Oh, darn. Worst case scenario.

Anyone interested in a pair of lightly used HP Z800 server work stations? Great 
machines. Cannot run Qubes 4.0 correctly.

-sigh-

Thanks for the link, Rusty.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/67ec2832-59de-43dd-9e0b-91c58d94d37c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 without IOMMU/VT-d/AMD-Vi or Interrupt Remapping

2018-02-05 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Utility Panel:
> Can anyone tell me what I might expect without IOMMU/VT-d/AMD-Vi and
> Interrupt Remapping?

https://www.qubes-os.org/faq/#can-i-install-qubes-4x-on-a-system-without-vt-x-or-vt-d

Rusty
-BEGIN PGP SIGNATURE-
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=/p4t
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180205211230.GA1841%40mutt.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Dell Inspiron 7577 Laptop "New Inspiron 15 7000 Gaming"

2018-02-05 Thread Joe Thielen
Intel i7-7700HQ 2.8Ghz quad-core.  16GB RAM.  256GB SSD.  1TB HD.

Qubes 4.0-RC4 runs great.  Install was just a bit tricky.  Mouse/trackpad
did not work during install (worked fine after reboot), had to use keyboard
navigation.  Also used legacy mode in BIOS to get installed.

I had installed Qubes 4.0-RC3 first (before RC4 was out).  I seem to
remember going the UEFI boot route on that and it worked, but when doing
RC4 I either didn't do the same thing or just went with legacy mode and it
worked so I left it at that.

My machine has a 256GB SSD and a 1TB HD.  When I installed RC3 first I let
it use both drives during install.  However, while it ran OK, it was not
super speedy, and I could hear the 1TB HD when in use.  Not loud or
anything, but I was aware of it.  And some operations seemed to take more
time than I would have liked.  However, when I installed 4.0-RC4 I only
specified the 256GB SSD, and that really made a positive difference,
especially during boot time.  Very snappy now.  I have not yet tried to get
the 1TB partitioned and going for storage.

Wi-fi & ethernet work no problems, out-of-the-box.

I'm not able to use dual-screens via the HDMI just yet.  On 4.0-RC3 it
didn't recognize it at all (xrandr shows HDMI but shows "disconnected").
4.0-RC4 does recognize it, and I was able to get screen mirroring to work,
but not extended desktop just yet.  At one point I was able to get the
mouse pointer to seamlessly move from screen to screen, but the display
identifier function did not work, nor would anything but the mouse pointer
show up on the screen.So there is some hope here I'm thinking with
further tweaking.

When I loaded 4.0-RC3 I spent a bit of time playing with the nvidia drivers
(as explained in several articles).  I was able to get them compiled and
installed (very painful), but then the machine could not be used, ended up
having to blacklist both the nvidia and nouveau drivers.  That brought it
back to life.  With 4.0-RC4 I have not yet tried to mess with any of this.

Bootup takes about 90 seconds from the time I push the button to the time I
can use it fully.   This includes pushing the power button, entering a BIOS
user password, disk encryption password, and Qubes login password.  The USB
keyboard/mouse connect almost instantly after that (within the 90 seconds).

I was able to create and run a Centos 7.4 HVM with no issues.

I've had the one HVM, two F26 PVH AppVMs running simultaneously (plus
sys-usb, sys-net, & sys-firewall) with no issues.  Both running Firefox
(multiple tabs), GIMP, Libreoffice, and terminal simultaneously.

I only tested sleep mode once (closed the lid).  While it did go to sleep,
and was able to wake up, ethernet and attached USB keyboard/mouse never
came back.  I unplugged ethernet and re-attached and still no-go.  Same
with mouse/keyboard... even physically unplugged and plugged back in, did
not come back.  I did not pursue it further as I don't use that function
very often.  But if sleep/suspend is important to you, you may have to do
some tweaking, unless you don't use wired ethernet and USB devices.  Wifi
did come back by itself however.  Sound too.

All in all a very snappy machine so far.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM9FSFyDPx-qAY0LaJoz8-ofd_caES_C8kkk2Q6eKt6TRw8a3Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Dell_Inc_-Inspiron_7577-20180205-151442.yml
Description: application/yaml


Re: [qubes-users] hdparm?

2018-02-05 Thread 'awokd' via qubes-users
On Mon, February 5, 2018 5:43 pm, donoban wrote:
> On 02/05/2018 06:38 PM, 'awokd' via qubes-users wrote:
>
>> On Mon, February 5, 2018 5:22 pm, donoban wrote:

>>> Sorry I mean 'sudo qubes-dom0-update hdparm'

Sure enough, I tried the above on both versions and it worked just fine.
(But the warnings in https://www.qubes-os.org/doc/copy-from-dom0/ still
apply.) Thanks for the info!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3ac68b13f4e3c5057fc2b2054d5ecbab.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Manager / Qubes 4.0 R3 ?

2018-02-05 Thread 'awokd' via qubes-users
On Mon, February 5, 2018 6:01 pm, 'Tom Zander' via qubes-users wrote:
> On Monday, 5 February 2018 04:34:35 CET Tim W wrote:
>
>> People complain about doc being outdated..then fix them.
>>
>
> If someone can figure out how to port-forward in 4.0, please do update
> the docs. I never managed to get that working.
>
> The firewall page can also be a bit more detailed as-is, it assumes
> people already know the actual setup of the qubes firewall ruleset. I
> don't, thats why I went to that page.

Thank you, noted. I have an in progress PR on that exact doc; I'll try to
figure it out but tips/pointers are always welcomed!


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/693a86627dddc70369635553b06f3150.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Manager / Qubes 4.0 R3 ?

2018-02-05 Thread 'awokd' via qubes-users
On Mon, February 5, 2018 5:57 pm, 'Tom Zander' via qubes-users wrote:
> On Monday, 5 February 2018 08:00:35 CET 'awokd' via qubes-users wrote:

>
> Release candidates are, like the word describes, not made unless the
> developers are thinking that its ready to release but needs more
> real-world testing to make sure.

That's fine, but it doesn't negate my main point of if your main goal is
stability, you should be running R3.2. That's what it's there for. If you
want to help out the project and don't mind a few rough edges, by all
means try out R4.0 and contribute bug reports and/or code fixes if
possible.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/012dc00cbcdbc1ee86182622317ae4bb.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Manager / Qubes 4.0 R3 ?

2018-02-05 Thread 'Tom Zander' via qubes-users
On Monday, 5 February 2018 04:34:35 CET Tim W wrote:
> People complain about doc being outdated..then fix them.

If someone can figure out how to port-forward in 4.0, please do update the 
docs. I never managed to get that working.

The firewall page can also be a bit more detailed as-is, it assumes people 
already know the actual setup of the qubes firewall ruleset. I don't, thats 
why I went to that page.

> Tom has built a Qubes Controller (manager) based on the 4.0 code and went
> so far as to add in library package so other coding can be used to build.
>  He has been super open to adding functions based on comments.   If
> another person or two could help him with coding now that its not needed
> to just be python it could become the defacto Qubes GUI to manage the
> qubes system.  That would take it off the plate of the core system devs. 
> i plan to use his controller and if the QM does not work well I will stay
> with his controller.

Thanks for the kind words, I too would like to see it become the default.

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2100635.UGIMOZXGtA%40strawberry.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Manager / Qubes 4.0 R3 ?

2018-02-05 Thread 'Tom Zander' via qubes-users
On Monday, 5 February 2018 08:00:35 CET 'awokd' via qubes-users wrote:
> Why are you complaining about bugs when running a ".0rc" version? They're
> to be expected; if not the point of release candidates.

Actually...

https://en.wikipedia.org/wiki/Software_release_life_cycle#Release_candidate

Release candidates are, like the word describes, not made unless the 
developers are thinking that its ready to release but needs more real-world 
testing to make sure.

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1850398.zmgnZS8haS%40strawberry.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] hdparm?

2018-02-05 Thread donoban
On 02/05/2018 06:38 PM, 'awokd' via qubes-users wrote:
> On Mon, February 5, 2018 5:22 pm, donoban wrote:
>>
>> Sorry I mean 'sudo qubes-dom0-update hdparm'
> 
> That's interesting, what version of Qubes? I tried that before (thought it
> was hdparm too) and ran into the same missing package issue.
> 
> 

Qubes 3.2, really it says I had it already installed. Maybe I've
installed it time ago with other method :\

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd4b4f42-b67d-1031-5bca-b4d21aaee791%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] hdparm?

2018-02-05 Thread 'awokd' via qubes-users
On Mon, February 5, 2018 5:22 pm, donoban wrote:
>
> On 02/05/2018 06:21 PM, donoban wrote:
>
>> On 02/05/2018 05:37 PM, 'Guillaume Bertin' via qubes-users wrote:
>>
>>> I don't manage installing hdparm in dom0. No package...

>
> Sorry I mean 'sudo qubes-dom0-update hdparm'

That's interesting, what version of Qubes? I tried that before (thought it
was hdparm too) and ran into the same missing package issue.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc8c9bbc119e81a03bb7db7356af2e5f.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Issues with 4.0 rc4

2018-02-05 Thread Chris Laprise

On 02/04/2018 04:52 PM, Chris Laprise wrote:

On 02/04/2018 07:10 AM, Nuno Branco wrote:

2) When restoring VMs from Qubes 3.2 the software does not seem to work
if you select more than one VM to restore at a time. By this I mean the
restore process launches and finishes and I do have a VM listed on Qubes
manager with the name of the VM I tried to restore however it reports
"disk size 0 MiB" - when I power on the VM and check /home it is empty.
If I restore the VMs one by one this does not happen and the VMs are
restored normally - this is obviously annoying (e.g. while writing this
email I had around 8 prompts for access)


Just a note here as I've been trying to fix the many problems with 
restore -- it seems that backup was carefully constructed to work, but 
restore was more thrown together from a patchwork of old and new code.


I just posted a fix for restoring dom0 specifically, which was still 
broken when RC4 was released. If you don't exclude the dom0 home then 
you'll almost certainly encounter errors; I expect the fix will get to 
qubes*testing sometime in the next week or two. Also, restore is 
currently best used in the CLI (its qvm-backup-restore) as the GUI still 
has issues of its own.


I also decided to try a fresh RC4 install tonight and then restore an 
R3.2 archive (minus dom0 home) to see how that goes. Maybe I'll be able 
to recreate your issue...




It appears my test restore of the 3.2 archive went fine. I selected 4 
vms (did not have enough space to restore all) of small-medium size and 
all of their data was restored intact, so I cannot reproduce your 
problem. However I did use qvm-backup-restore in the dom0 CLI, not the GUI.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa02c175-84d4-e8f7-6fb4-8dc6f40db53c%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] hdparm?

2018-02-05 Thread donoban


On 02/05/2018 06:21 PM, donoban wrote:
> On 02/05/2018 05:37 PM, 'Guillaume Bertin' via qubes-users wrote:
>> Hi,
>>
>> I don't manage installing hdparm in dom0. No package...
>>
>> Have I missed something? Should harddisk management be done outside of dom0?
>>
> 
> 'sudo qubes-dom0-update hdpardm' worked for me on Qubes 3.2
> 

Sorry I mean 'sudo qubes-dom0-update hdparm'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0fe005ee-7ae2-b43b-d4d1-aceacdbbf4d2%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] hdparm?

2018-02-05 Thread donoban
On 02/05/2018 05:37 PM, 'Guillaume Bertin' via qubes-users wrote:
> Hi,
> 
> I don't manage installing hdparm in dom0. No package...
> 
> Have I missed something? Should harddisk management be done outside of dom0?
> 

'sudo qubes-dom0-update hdpardm' worked for me on Qubes 3.2

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7d0b1f61-a515-154e-8dea-37433c63a3b9%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] hdparm?

2018-02-05 Thread 'awokd' via qubes-users
On Mon, February 5, 2018 4:37 pm, 'Guillaume Bertin' via qubes-users wrote:
> Hi,
>
>
> I don't manage installing hdparm in dom0. No package...
>
>
> Have I missed something? Should harddisk management be done outside of
> dom0?

Usually, for security reasons you should avoid installing software
directly in dom0 (https://www.qubes-os.org/doc/copy-from-dom0/). You can
force it by manually downloading, copying in the package, and installing,
but you'll have to also handle dependency resolution yourself. If you only
need to run hdparm once or twice, you might want to boot from a live image
instead and run it from there. Don't forget to verify signatures!


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44ca67693b5bdbb780a6ba0dd6e02fa3.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] hdparm?

2018-02-05 Thread 'Guillaume Bertin' via qubes-users
Hi,

I don't manage installing hdparm in dom0. No package...

Have I missed something? Should harddisk management be done outside of dom0?

G.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/jg3Co950wm0926lskowWHbJySELg265mbvGqqy5NevNfCOICLChw1iHRdKkLNBS3xXvA_n3Pxnw7SDf2ibccq8ZzniPr-Eb5En0sJJXSK7U%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 without IOMMU/VT-d/AMD-Vi or Interrupt Remapping

2018-02-05 Thread Utility Panel
I installed Qubes 4.0-rc4 on a machine with hardware that cannot support the 
following two features

IOMMU/VT-d/AMD-Vi
Interrupt Remapping

The installation went fine. I simply continued installing after the error 
message appeared just after the installation ISO completed its hardware check.

After installation, I was able to boot up to the desktop without any errors. I 
didn't do much additional testing because I thought that there might be a way 
to configure the BIOS on my machine to support the missing features; but alas, 
there is no such way.

Consequently, if I ever want to run 4.0, I am left with the following two 
choices: 

A) Install 4.0 on this machine and live without the missing features.
B) Get a new computer that supports the missing features.

I prefer option A. Can anyone tell me what I might expect without 
IOMMU/VT-d/AMD-Vi and Interrupt Remapping? 

I've heard that PCI passthrough won't work, but I could live without it. 

What other problems might I encounter? Will 4.0 work without those features, or 
must I get a new machine to run 4.0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00a7afc5-1b59-4079-bc4e-d8a6096c5d19%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora-minimal und Q. 4.0

2018-02-05 Thread Jo
Cheers folks,

because of the switch to 4,0 im currently setting up a complete new
system-structure, and therefore, i wanted to base all the sys-vms on
fedora minimal templates.

However, im missing a few qubes-specific  functions and couldnt find
informations on what to install to get them. Ive installed all the
necessary packages mentioned in the Documentation, but the "convert to
trusted PDF/IMG function" is still missing.

Any hints which package i need to add?



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/208202ce-3654-bbcd-8b14-6dace8ae0f97%40seefelder-web.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Please help with Qubes 4.0 rc4 on 8th Generation Intel

2018-02-05 Thread Krišjānis Gross
Hi, 

I have recently installed Qubes 4.0 rc4 on a new 8th generation Intel hardware 
and have an issue that I would like to get help with.

The issue is that graphics appear to be very very slow. Each time there is some 
visual activity on the screen it is vary 'laggy'. I noticed that whenever there 
is a GUI action, the process called Xorg is using 100% of one of the processor 
cores.  

I have made captured a video of how that looks: 
https://drive.google.com/open?id=1vrtVnVLu6WBrMl_6O-R7qs2syyOKypnQ

I have also gathered some logs that might help to resolve this:
 1) archive of /var/logs folder: 
https://drive.google.com/open?id=171-f2-d3D_CPrSFJKFwcuIrQgZXYf5L3
 2) result of "sudo journalctl -b > journal.log" : 
https://drive.google.com/open?id=1eOJMT4uGAQyatXFcQvF9ElGRpbdTTQSp

Hardware details:
 MB: ASRock Z370 Pro4 https://www.asrock.com/MB/Intel/Z370%20Pro4/index.asp 
   CPU: Intel® Core™ i5-8600K 
https://ark.intel.com/products/126685/Intel-Core-i5-8600K-Processor-9M-Cache-up-to-4_30-GHz
 
   RAM: 16 GB DDR4 


Please help to resolve this!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75f955b6-d802-42db-a2c7-9e68cc5bbaa9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] port filtering using Qubes firewall?

2018-02-05 Thread Patrik Hagara
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/05/2018 01:40 PM, Patrick Schleizer wrote:
> https://www.qubes-os.org/doc/firewall/
> 
> Is it possible to use "any" as address?
> 
> In other words, is it possible to do simple port filtering? As in
> block port XX or allow port YY only?

Yes, by using "0.0.0.0/0" as the target IP address.

> Cheers, Patrick
> 

Cheers,
Patrik
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJaeGO6AAoJEFwecd8DH5rlL0IP/is0sQqzbi7Uja/ezJM0kB8a
23Hc03pCA2jioMoql3VmaPs8nn0faUXUd0cZCJtiecz8GZq/awkBoeonwnYZI9Ff
gTzP1fGT0sd2jnkBfO4DuuruqDwEU6bjaqgF5BSTt42igFzJZKGp4aCKs54Av1G7
xxXA6YFwb1P767UyCgLx9vQFSsQAMsnGQU3Hdgz5KhwcfC159IBTqvgRU4kiJ/9r
ayGiVd/TARam1RBWWchKOV8wNW0YZGQixucl2ijAllXsSLHoHG4mfFRX9swUpoKA
bjDDhuTWK65oqlv1UYjfv8GD/9lYvXB56j52taZ2p+Jr3faY8bB7hqgoGUln2wYs
rVAxK8pcJiufDU/LYq1nqAUKC3znpTf/4/1l+lNyGk/lpi0pJI/beRJAZnFncf5W
Efmz+lyM++K8kI9VOQ2353NP+jN+ZdJE0Jxj0jke4Lw4DAq59sbrt37UmwnGpYQY
GXAo8IZEc09c34ZKK+Yc0a9839lmYkmvQpTWWTTSt8syucbFt0jcXJ5jRGHZWhzf
yK+3639IIm96DdmtUanvkm/1hC0w8xJptUPM1roug1+lr3icWKopMmvmOO/ionG2
hdoQ9l5HHmhcs48C2964LPMeFGTUqbPUvLH2AonPjqHQjDWo9SbxByLU6idF1n+T
okPnur58FcktId7hJPtq
=gpLl
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96f67f8c-32b9-1521-2e8c-c7ff2926f481%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


0x031F9AE5.asc
Description: application/pgp-keys


0x031F9AE5.asc.sig
Description: PGP signature


[qubes-users] Re: HCL - HP Z800 Workstation

2018-02-05 Thread Utility Panel
On Monday, February 5, 2018 at 8:29:17 AM UTC-5, Utility Panel wrote:
> On Wednesday, April 5, 2017 at 9:07:43 PM UTC-4, Emergency  Mexican wrote:
> > Here is some more data to add to the HCL. Qubes works out of the box, 
> > except the IOMMU due to a chipset errata. It looks like there is some work 
> > arounds for getting the IOMMU to function without "Interrupt Remapping" 
> > which is significant.
> 
> I also have a Z800. I've been trying to install 4.0-rc4. The installer tells 
> me that the following features are missing:
> 
> IOMMU/VT-d/AMD-Vi
> Interrupt Remapping
> 
> I have a ticket open on the HP support forum asking for help. Someone 
> helpfully suggested a few BIOS settings that I might try, but I have not been 
> having any luck.
> 
> Might anyone here have any suggestions?

One other clue: Someone on the HP support forum suggested that the problem 
might be related to the x58 chipset and sent me a link to a data sheet:

https://www.novell.com/support/kb/doc.php?id=7014344

I'll be reading that data sheet more closely later today, but my current 
impression is that solving the problem would take a BIOS patch. Or maybe the 
chip firmware can be flashed directly? But even if it could, the underlying 
instability might remain. I just don't know. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cb3dd8ab-83e3-4633-a717-27ca67e69c8f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - HP Z800 Workstation

2018-02-05 Thread Utility Panel
On Wednesday, April 5, 2017 at 9:07:43 PM UTC-4, Emergency  Mexican wrote:
> Here is some more data to add to the HCL. Qubes works out of the box, except 
> the IOMMU due to a chipset errata. It looks like there is some work arounds 
> for getting the IOMMU to function without "Interrupt Remapping" which is 
> significant.

I also have a Z800. I've been trying to install 4.0-rc4. The installer tells me 
that the following features are missing:

IOMMU/VT-d/AMD-Vi
Interrupt Remapping

I have a ticket open on the HP support forum asking for help. Someone helpfully 
suggested a few BIOS settings that I might try, but I have not been having any 
luck.

Might anyone here have any suggestions?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ce9ac4e-fe7e-4f60-80eb-f98dafaa140b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] port filtering using Qubes firewall?

2018-02-05 Thread Patrick Schleizer
https://www.qubes-os.org/doc/firewall/

Is it possible to use "any" as address?

In other words, is it possible to do simple port filtering? As in block
port XX or allow port YY only?

Cheers,
Patrick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2cb05067-1cd4-4d5a--0dd71e7b9069%40whonix.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Manager / Qubes 4.0 R3 ?

2018-02-05 Thread 'Tom Zander' via qubes-users
On Sunday, 4 February 2018 21:00:55 CET 'awokd' via qubes-users wrote:
> Working on it (where other contributors haven't already)! Am about halfway
> through now.

Sweet!

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/12985717.lppHrPCCKh%40strawberry.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 4.0 / Qubes in general

2018-02-05 Thread 'Tom Zander' via qubes-users
On Monday, 5 February 2018 12:21:51 CET Tim W wrote:
> I am currently going thru all the setup script qubes build template
> options to find what templates compile correctly and what ones have bugs.
>  After that I am happy to write up a markdown page for how to compile and
> install the Qubes Controller and use it.  That can then be submitted to
> be added to the  Qubes 4.0 Docs.

Awesome!

You should be able to get a lot of detials from this;
https://github.com/QubesController/qubes-api-cpp-lib/blob/master/Install.md

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1659041.GGZUbeKTOT%40strawberry.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes Manager / Qubes 4.0 R3 ?

2018-02-05 Thread 'Tom Zander' via qubes-users
On Monday, 5 February 2018 02:33:02 CET Unman wrote:
> You are, of
> course, free to rewrite Qubes and its components in a language you're
> comfortable with.

Don't be so dramatic, I m not suggesting any such thing.

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2625249.9gTKQABKm0%40strawberry.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0 / Qubes in general

2018-02-05 Thread Tim W
On Monday, February 5, 2018 at 4:37:26 AM UTC-5, rob_66 wrote:
> On Sun, 4 Feb 2018 12:17:41 -0800 (PST)
> Yuraeitha  wrote:
> 
> > I think discussion is good and healthy, though I don't feel it's entirely 
> > fair to paint it black
> > and white like this. I can agree on many problems, but I think they look 
> > very different in
> > different light and perspectives, so lets try shake it up a bit. I'm not 
> > claiming to be right,
> > this is just my perspective of things. 
> > 
> > The ancient city Rom wasn't build in one day, it took many decades and even 
> > centuries. And as
> > awokd said, the security in Qubes is rapidly evolving in short time, which 
> > is hard to deny. Qubes
> > is heavily disrupting the security industry, which has been too stagnant 
> > and slowly reactive
> > developing over many years, rather than a proactive forward looking 
> > perspective, which Qubes has. 
> > 
> > The priority is first and foremost security, right? Everything else besides 
> > that is pretty much
> > secondary or lower. Ease of use and emotional related things, such as good 
> > looking and appeal,
> > will come even lower than secondary (don't get me wrong though, I do love 
> > good looking systems
> > too my self). 
> > 
> > While the Qubes OS team could need more funding and donations, I don't 
> > think they are feeling
> > ready yet to go and market themselves before the security is on an even 
> > higher level. And this I
> > think is very justified in a logical sense seen from an understanding of 
> > market perspective, once
> > you start market it, if the security isn't good enough, then Qubes will 
> > just become a short-lived
> > fire-fly that only lives 24 hours, before everyone forgets about it again. 
> > For proper marketing,
> > you need to be ready before spreading the hype. This is why many open 
> > source projects dye out
> > too, they don't live long enough to be ready to deliver, or they deliver 
> > too early or too late.
> > As I see it, the Qubes developers are currently doing a good job enduring. 
> > Security is also the
> > main target group to begin with too, so I feel it's overall very justified 
> > to focus all their
> > energy on security and secondary ease-of-use problems, important mainstream 
> > hardware support, and
> > so on.
> > 
> > We're in early times, and as I see it, currently the fundamentals are being 
> > build in Qubes. The
> > structure which everything else ontop will be changed in the future. I 
> > think it's very wrong to
> > look at Qubes 4 as how Qubes will look like in the future. This is a deep 
> > mistake from other
> > Linux OS's which are very conservative, unchanging, and by all means have 
> > an ingrained reactive
> > thinking pattern, rather than proactively thinking pattern. I think the 
> > Qubes developers have a
> > good forward looking foresight, and this is part of the reason why I like 
> > it so much. But for
> > this reason too, Qubes is often misunderstood if they do things in Qubes 4, 
> > which may first show
> > its full potential in Qubes 5 or Qubes 6.
> > 
> > There is also the question of how much of this is upstream issues? Not 
> > everything is Qubes to
> > fix, and it certainly would be ill advized to start doing what for example 
> > Red Hat is doing and
> > change the code, which has to be done everytime a new update arrives from 
> > upstream. Although I
> > have to admit I have little understanding of codes. 
> > 
> > Also currently we're still seeing rapid development of security in Qubes, 
> > and it's still going.
> > The primary developers of Qubes are busy, so I don't think it's justified 
> > to say any should shift
> > focus to fix lower priority nice looks and appeals, like icons (although I 
> > do enjoy good looking
> > systems, but it's too soon as there are other things to be done in Qubes 
> > first). Why are other
> > developers from the outside not helping with this? The Qubes developers are 
> > busy enough with the
> > security aspect as it is after all. Also if more people helped, and more 
> > put up donations
> > (avoiding too early wide-spread hype though, there is a good timing for 
> > everything), then perhaps
> > we can get issues fixed like missing icons, and so earlier than otherwise.
> > 
> > Which programs and apps can't you run in Qubes? I mean, I can even run 
> > Android with Android
> > apps, it's pretty amazing. What sort of programs do you have that can't run 
> > that well on Qubes?
> > Maybe it can be fixed? 
> > 
> > Lets not forget, Qubes 4 was about future-proofing Qubes. Currently many 
> > things need to be
> > fixed again after having ripped everything apart and putting it together 
> > with many new parts and
> > design shape. Qubes 4 is in many ways, in my understanding, really about 
> > making the upcoming
> > Qubes 5 and onward possible, which is to say, Qubes 4 may not seem so 
> > special, but I'm sure it
> > will start to show and build up 

[qubes-users] Qubes 4.0 / Qubes in general

2018-02-05 Thread rob_66
On Sun, 4 Feb 2018 12:17:41 -0800 (PST)
Yuraeitha  wrote:

> I think discussion is good and healthy, though I don't feel it's entirely 
> fair to paint it black
> and white like this. I can agree on many problems, but I think they look very 
> different in
> different light and perspectives, so lets try shake it up a bit. I'm not 
> claiming to be right,
> this is just my perspective of things. 
> 
> The ancient city Rom wasn't build in one day, it took many decades and even 
> centuries. And as
> awokd said, the security in Qubes is rapidly evolving in short time, which is 
> hard to deny. Qubes
> is heavily disrupting the security industry, which has been too stagnant and 
> slowly reactive
> developing over many years, rather than a proactive forward looking 
> perspective, which Qubes has. 
> 
> The priority is first and foremost security, right? Everything else besides 
> that is pretty much
> secondary or lower. Ease of use and emotional related things, such as good 
> looking and appeal,
> will come even lower than secondary (don't get me wrong though, I do love 
> good looking systems
> too my self). 
> 
> While the Qubes OS team could need more funding and donations, I don't think 
> they are feeling
> ready yet to go and market themselves before the security is on an even 
> higher level. And this I
> think is very justified in a logical sense seen from an understanding of 
> market perspective, once
> you start market it, if the security isn't good enough, then Qubes will just 
> become a short-lived
> fire-fly that only lives 24 hours, before everyone forgets about it again. 
> For proper marketing,
> you need to be ready before spreading the hype. This is why many open source 
> projects dye out
> too, they don't live long enough to be ready to deliver, or they deliver too 
> early or too late.
> As I see it, the Qubes developers are currently doing a good job enduring. 
> Security is also the
> main target group to begin with too, so I feel it's overall very justified to 
> focus all their
> energy on security and secondary ease-of-use problems, important mainstream 
> hardware support, and
> so on.
> 
> We're in early times, and as I see it, currently the fundamentals are being 
> build in Qubes. The
> structure which everything else ontop will be changed in the future. I think 
> it's very wrong to
> look at Qubes 4 as how Qubes will look like in the future. This is a deep 
> mistake from other
> Linux OS's which are very conservative, unchanging, and by all means have an 
> ingrained reactive
> thinking pattern, rather than proactively thinking pattern. I think the Qubes 
> developers have a
> good forward looking foresight, and this is part of the reason why I like it 
> so much. But for
> this reason too, Qubes is often misunderstood if they do things in Qubes 4, 
> which may first show
> its full potential in Qubes 5 or Qubes 6.
> 
> There is also the question of how much of this is upstream issues? Not 
> everything is Qubes to
> fix, and it certainly would be ill advized to start doing what for example 
> Red Hat is doing and
> change the code, which has to be done everytime a new update arrives from 
> upstream. Although I
> have to admit I have little understanding of codes. 
> 
> Also currently we're still seeing rapid development of security in Qubes, and 
> it's still going.
> The primary developers of Qubes are busy, so I don't think it's justified to 
> say any should shift
> focus to fix lower priority nice looks and appeals, like icons (although I do 
> enjoy good looking
> systems, but it's too soon as there are other things to be done in Qubes 
> first). Why are other
> developers from the outside not helping with this? The Qubes developers are 
> busy enough with the
> security aspect as it is after all. Also if more people helped, and more put 
> up donations
> (avoiding too early wide-spread hype though, there is a good timing for 
> everything), then perhaps
> we can get issues fixed like missing icons, and so earlier than otherwise.
> 
> Which programs and apps can't you run in Qubes? I mean, I can even run 
> Android with Android
> apps, it's pretty amazing. What sort of programs do you have that can't run 
> that well on Qubes?
> Maybe it can be fixed? 
> 
> Lets not forget, Qubes 4 was about future-proofing Qubes. Currently many 
> things need to be
> fixed again after having ripped everything apart and putting it together with 
> many new parts and
> design shape. Qubes 4 is in many ways, in my understanding, really about 
> making the upcoming
> Qubes 5 and onward possible, which is to say, Qubes 4 may not seem so 
> special, but I'm sure it
> will start to show and build up when we're seeing Qubes 5.
> 
> I agree there are problems, and I'm happy to discuss it too. But we must not 
> forget to put
> everything into different perspectives to see things in different ways. This 
> too is why
> discussions like these are so good and amazing, it