Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
On 04/09/2018 06:11 PM, cicero wrote: chmod a+x; sudo bash ./install in Q4 AppVM with netvm sys-firewall & vpn-handler-openvpn in services No appropriate VM type; Exiting :) You will need to create the VM with "provides network" in order for the installer to see it as a proxyVM. It will not install into a plain appVM. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7a454c6c-16ac-9a69-4ca6-3b94a4abf85b%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] how to Github repository Qubes_vpn_support
On 04/09/2018 08:36 PM, mivacorre...@gmail.com wrote: I am trying to setup a VPN connection with NordVPN (and OpenVPN) in Qubes 4 following this --> https://www.qubes-os.org/doc/vpn/ Since I am using Qubes 4 I was led here--> https://github.com/tasket/Qubes-vpn-support I have already followed the instructions on NordVPN website --> https://nordvpn.com/tutorials/linux/openvpn/ my problem: I created a VM and added the vpn-handler-openvpn, but from that VM terminal I cannot clone the git repository from GitHub (I cannot clone any git repository) because permission is denied. Network access may be blocked if you followed the /doc/vpn instructions, because then only openvpn would be allowed. If you're going to use Qubes-vpn-support, then disregard the /doc/vpn instructions ...and create a fresh VM. A fresh VM should be able to download files directly. So I downloaded it in [user@nameofVM] using the command sudo wget. I type ls and I can see Qubes-vpn-support.git is there but when I type cd Quebs-vpn-support (the line in the GitHub instruction page) the terminal returns bash: cd: Qubes-vpn-support: No such file or directory why is this happening? what shall I do? On a github project page, the download area supplies two types of links: One is for a .zip file that can be downloaded with wget or curl or a browser. The other ends in .git and is for use with the command "git clone address>". Either of these will work. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7fc14b43-3392-4342-ab31-69b54af406e0%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] how to Github repository Qubes_vpn_support
I am trying to setup a VPN connection with NordVPN (and OpenVPN) in Qubes 4 following this --> https://www.qubes-os.org/doc/vpn/ Since I am using Qubes 4 I was led here--> https://github.com/tasket/Qubes-vpn-support I have already followed the instructions on NordVPN website --> https://nordvpn.com/tutorials/linux/openvpn/ my problem: I created a VM and added the vpn-handler-openvpn, but from that VM terminal I cannot clone the git repository from GitHub (I cannot clone any git repository) because permission is denied. So I downloaded it in [user@nameofVM] using the command sudo wget. I type ls and I can see Qubes-vpn-support.git is there but when I type cd Quebs-vpn-support (the line in the GitHub instruction page) the terminal returns bash: cd: Qubes-vpn-support: No such file or directory why is this happening? what shall I do? thanks -B -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/59794b37-88e7-4119-ac28-41d7798792d4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
chmod a+x; sudo bash ./install in Q4 AppVM with netvm sys-firewall & vpn-handler-openvpn in services No appropriate VM type; Exiting :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1cc1a2bf-8ad9-6159-699a-f8fec0cc5392%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
On 04/09/2018 10:23 AM, Chris Laprise wrote: On 04/09/2018 04:01 PM, socks wrote: On 04/09/2018 03:28 AM, Chris Laprise wrote: On 04/09/2018 03:25 AM, john wrote: Is this utility available in 4.0 now? Or how would I obtain it ? https://github.com/tasket/Qubes-vpn-support I have 3 geolocations, but setup is somewhat time consuming, for more, be nice if this was stable, Seems like it does say "beta" The latest (beta3) was just updated in the main 'master' branch... main change from qubes4 is just code streamlining. The qubes4 branch is no longer used. It should work fine in Qubes 4.0. forgive me but I don't understand step #2 in Q4.0 : -- 1. Transfer Qubes-vpn-support folder to the template or proxy VM of your choice, then run install. This will also prompt for your VPN login credentials either in this step (proxyVM) or next step (template): |cd Qubes-vpn-support sudo bash ./install | -- I see no dir Qubes-vpn-support anywhere, "transfer" ? mv it from where to where ; if it were in dom0 my understand is files don't moved out of dom0 It just means download the Qubes-vpn-support folder to the proxyVM somehow. You could download it with a browser in another VM and then copy it to the proxyVM, or you could download it direct to the proxyVM: wget https://github.com/tasket/Qubes-vpn-support/archive/master.zip unzip master.zip in the AppVM(proxyVM) ; maybe "safer" not in a Template looks like sudo wget foo unzip foo cd Qubes-vpn-support-master sudo chmod u+x install ./install just checking :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/80e43ab8-b8c4-d0e5-8cf5-6d6e00bdc2e2%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Question Wi-Fi security
Dear Qubes Team I have a question regarding Qubes and to be specific the way it connects to wifi networks. My question is basically this: Is it safe to use the same net-vm to connect to different wifi AP/Hotspots, meaning does the Wi-fi send the "previous Access Point ID's" while searching for a suitable network? Perhaps it does not perform any active search/broadcast at all? I am basing my conerns on the following article. I wouldn't bother you at all, just tried to learn the information from Fedora-23 documentation but obviously you could have made certain alterations for the sake of resolving security issues etc, which is why I'm directing my question to you. I'm not so worried about the MAC address itself- it can be always changed but if other "log" information was to be released then changing the net-vm would be a necessity in order to avoid ever so real mass surveillance!!! "The Wi-Fi technology features a service discovery mechanism, which allows stations to discover the access points in range. Two variant of service discovery are co-existing. In the first one, called passive service discovery,APs are periodically advertising their presence by broadcasting beacon frames containing various information (SSID, security features), while stations passively listen to those beacons to discover APs in range. ... In the second, called the active service discovery, the station plays an active role by periodically probing the neighborhood with probe request frames to which AP respond with probe response frames. A probe request frame includes an SSID field to designate the wireless network sought by the device. A Wi-Fi device probes for network to which it has been previously connected by circling through the CNL. By doing so, devices are actually broadcasting in plaintext their connection history. In response to obvious privacy issues [10, 7], a new convention ha be ve been adopted: stations can send probe requests with an empty SSID field; and in return AP must respond to them with a probe response even if the SSID field do not match their own SSID. The resulting probe requests are called broadcast probe requests. As a consequence, devices are not revealing their connection history anymore, but are still periodically broadcasting their MAC address in clear." May I express what you probably read in every letter (or should read). For the effort, the talent,the Qubes, and for what it can do, you're simply the best. Thank you very much James Patel -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/87316a3f30af011fa797ec7708d90b01.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Issues with Yubikey 4 input
On 04/07/2018 03:04 PM, brendan.hoar- There’s one more thing I just learned; by default, usb keyboards are blocked from all VMs. You have to modify /etc/qubes-rpc/policy/qubes.InputKeyboard to allow the Yubikey to be connected to a specific VM if the classic yubico otp slots are enabled...because they mimic a keyboard. modify it how please ? I actually have 2 yubikey versions the newer Neo, and an older OTP version ; I'm wondering if I should also attempt to disable everything *but OTP in the personalization tool, which I'm reticent to mess with -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/97fd9bb9-5f42-aacd-6dc6-b41df66ce63e%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
On 04/09/2018 04:01 PM, socks wrote: On 04/09/2018 03:28 AM, Chris Laprise wrote: On 04/09/2018 03:25 AM, john wrote: Is this utility available in 4.0 now? Or how would I obtain it ? https://github.com/tasket/Qubes-vpn-support I have 3 geolocations, but setup is somewhat time consuming, for more, be nice if this was stable, Seems like it does say "beta" The latest (beta3) was just updated in the main 'master' branch... main change from qubes4 is just code streamlining. The qubes4 branch is no longer used. It should work fine in Qubes 4.0. forgive me but I don't understand step #2 in Q4.0 : -- 1. Transfer Qubes-vpn-support folder to the template or proxy VM of your choice, then run install. This will also prompt for your VPN login credentials either in this step (proxyVM) or next step (template): |cd Qubes-vpn-support sudo bash ./install | -- I see no dir Qubes-vpn-support anywhere, "transfer" ? mv it from where to where ; if it were in dom0 my understand is files don't moved out of dom0 It just means download the Qubes-vpn-support folder to the proxyVM somehow. You could download it with a browser in another VM and then copy it to the proxyVM, or you could download it direct to the proxyVM: wget https://github.com/tasket/Qubes-vpn-support/archive/master.zip unzip master.zip -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f76af002-5d15-19be-1527-9dd62b18c0fe%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Lenovo G505s with Coreboot and Qubes R4-rc3 fails to boot
> Mind if I send that > http://dangerousprototypes.com/docs/Lenovo_G505S_hacking link out to the > qubes-users list in reply to an email there? I can hold off if you prefer, > I agree it's a bit rough right now. :) No problem, maybe someone from us would have time to complete this, one day On Sun, Apr 1, 2018 at 2:06 PM, awokdwrote: > On Wed, March 14, 2018 11:01 pm, Mike Banon wrote: >> Hi awokd, >> >> >> Thank you for your incoming notes! Sorry for the lack of edits from my >> side, I'm also preparing the materials - just doing it locally at the >> moment... >> >> Please also answer my new e-mail, would like to know your opinion >> >> >> Best regards, >> Mike > > Mind if I send that > http://dangerousprototypes.com/docs/Lenovo_G505S_hacking link out to the > qubes-users list in reply to an email there? I can hold off if you prefer, > I agree it's a bit rough right now. :) > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAK7947mywHGSXn4gvLf1TNGvb3QGBUiWOUKq%3DVO-DfJD%2BmjOYg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
On 04/09/2018 03:28 AM, Chris Laprise wrote: On 04/09/2018 03:25 AM, john wrote: Is this utility available in 4.0 now? Or how would I obtain it ? https://github.com/tasket/Qubes-vpn-support I have 3 geolocations, but setup is somewhat time consuming, for more, be nice if this was stable, Seems like it does say "beta" The latest (beta3) was just updated in the main 'master' branch... main change from qubes4 is just code streamlining. The qubes4 branch is no longer used. It should work fine in Qubes 4.0. forgive me but I don't understand step #2 in Q4.0 : -- 1. Transfer Qubes-vpn-support folder to the template or proxy VM of your choice, then run install. This will also prompt for your VPN login credentials either in this step (proxyVM) or next step (template): |cd Qubes-vpn-support sudo bash ./install | -- I see no dir Qubes-vpn-support anywhere, "transfer" ? mv it from where to where ; if it were in dom0 my understand is files don't moved out of dom0 further, on step 1 ; the way the AppVM(proxyVMs) seem now one no longer see's choices, though I got that far :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/13bc7250-99eb-776c-6d9e-843f475038b1%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How do I install Jitsi on fedora-26?
To make persistent changes launch the Fedora template you’re using and install the application(s) using dnf. You can also use dnf to search for applications in the main repositories. Once you’re done turn off the template VM / restart any Qubes using it. Your software should be available. You can also install stuff in the local Qube however it won’t be persistent across sessions. On Mon, Apr 9, 2018 at 10:17 AMwrote: > Or how to find an a software. > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAJd29SSXr%2BFV2g3X3yvrLEU_Ds6mEjJKhfbh7VM8Q38RXckx4w%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
RE: [qubes-users] Is anybody using Mullvad as their VPN?
Sorry I didn't follow the original conversation sorry guys to have answer it so late. So To me it hasn't been a problem but as you said, I've made special vm for the different vpn I used ISn't that the recommended thing to anyway? What exactly did you do actually? Because I don’t really understand. For me it works naturally. -Message d'origine- De : qubes-users@googlegroups.comDe la part de billol...@gmail.com Envoyé : 09 April 2018 20:21 À : qubes-users Objet : Re: [qubes-users] Is anybody using Mullvad as their VPN? Looks like I have a couple of hours of fun ahead. Thanks for the pointer. Since it will be that much effort, I probably won't get to it for a couple of days so I have a block of time to devote to it, but I'll report back and see if it works. Thanks for the reply! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aab69f8b-1321-41db-90e7-c5434246a64f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/00c901d3d033%24a23db960%24e6b92c20%24%40gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 Desktop file no longer working
No, I don't think there is anything 'special'. I just read in the irc channel that there are more people with the same problem. On 04/09/2018 09:50 AM, Andrew Morgan wrote: > On 04/09/2018 12:52 PM, 'Neelix' via qubes-users wrote: >> Hi Andrew, >> >> >> Did you also make a back up of the templates? Or did you installed the >> same applications on your new templates? >> >> >> >> >> On 04/09/2018 05:52 AM, Andrew Morgan wrote: >>> Hey there, >>> >>> The upgrade to Qubes 4.0 was mostly painless, with a few things needed >>> to be set up and worked-around here and there. I did do a backup from >>> R3.2 and restore to R4.0. >>> >>> The only issue I'm still facing is that none of my .desktop files >>> (application menus under the XFCE menu) seem to work. When I click on, >>> say, Personal - Terminal the Personal VM is started, but no terminal >>> shows up. Doing the same thing results in nothing happening. >>> >>> Running `qvm-sync-appmenus personal` results in no change. The .desktop >>> files are in dom0 and personal, but for some reason the application >>> still isn't launching. I have to manually launch everything from Qubes >>> Manager -> Run command in VM -> gnome-terminal. >>> >>> Is there a way I can debug this further? >>> >>> Thanks, >>> Andrew Morgan >>> > Yes, I did make a backup of the templates which my AppVMs are still using. > > I haven't switched to the new templates yet (which may not be necessary > as we can just change the virtualization type of the templates in Qubes > Manager? Or is there some special Qubes 4.0 stuff in the new templates?) > > Thanks, > Andrew Morgan > -- Kind Regards, Neelix -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/xStEeZBAb__LbLg6yaJ9VQQ4En5JAprC-0pOgCnBf8hwX5iyalvE9oz-0QhnXclHE9Zi-bumHItK_lPhX9lFR-y3-uGSthLCf0FpuoARQKs%3D%40x86.is. For more options, visit https://groups.google.com/d/optout. signature.asc Description: PGP signature
RE: [qubes-users] Is anybody using Mullvad as their VPN?
Yes I am whu? -Message d'origine- De : qubes-users@googlegroups.comDe la part de billol...@gmail.com Envoyé : 09 April 2018 20:21 À : qubes-users Objet : Re: [qubes-users] Is anybody using Mullvad as their VPN? Looks like I have a couple of hours of fun ahead. Thanks for the pointer. Since it will be that much effort, I probably won't get to it for a couple of days so I have a block of time to devote to it, but I'll report back and see if it works. Thanks for the reply! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aab69f8b-1321-41db-90e7-c5434246a64f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/00c301d3d031%24f122c900%24d3685b00%24%40gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4.0 Desktop file no longer working
On 04/09/2018 12:52 PM, 'Neelix' via qubes-users wrote: > Hi Andrew, > > > Did you also make a back up of the templates? Or did you installed the > same applications on your new templates? > > > > > On 04/09/2018 05:52 AM, Andrew Morgan wrote: >> Hey there, >> >> The upgrade to Qubes 4.0 was mostly painless, with a few things needed >> to be set up and worked-around here and there. I did do a backup from >> R3.2 and restore to R4.0. >> >> The only issue I'm still facing is that none of my .desktop files >> (application menus under the XFCE menu) seem to work. When I click on, >> say, Personal - Terminal the Personal VM is started, but no terminal >> shows up. Doing the same thing results in nothing happening. >> >> Running `qvm-sync-appmenus personal` results in no change. The .desktop >> files are in dom0 and personal, but for some reason the application >> still isn't launching. I have to manually launch everything from Qubes >> Manager -> Run command in VM -> gnome-terminal. >> >> Is there a way I can debug this further? >> >> Thanks, >> Andrew Morgan >> > Yes, I did make a backup of the templates which my AppVMs are still using. I haven't switched to the new templates yet (which may not be necessary as we can just change the virtualization type of the templates in Qubes Manager? Or is there some special Qubes 4.0 stuff in the new templates?) Thanks, Andrew Morgan -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/pagbj2%24cap%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Is anybody using Mullvad as their VPN?
Looks like I have a couple of hours of fun ahead. Thanks for the pointer. Since it will be that much effort, I probably won't get to it for a couple of days so I have a block of time to devote to it, but I'll report back and see if it works. Thanks for the reply! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aab69f8b-1321-41db-90e7-c5434246a64f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4.0 Desktop file no longer working
Hi Andrew, Did you also make a back up of the templates? Or did you installed the same applications on your new templates? On 04/09/2018 05:52 AM, Andrew Morgan wrote: > Hey there, > > The upgrade to Qubes 4.0 was mostly painless, with a few things needed > to be set up and worked-around here and there. I did do a backup from > R3.2 and restore to R4.0. > > The only issue I'm still facing is that none of my .desktop files > (application menus under the XFCE menu) seem to work. When I click on, > say, Personal - Terminal the Personal VM is started, but no terminal > shows up. Doing the same thing results in nothing happening. > > Running `qvm-sync-appmenus personal` results in no change. The .desktop > files are in dom0 and personal, but for some reason the application > still isn't launching. I have to manually launch everything from Qubes > Manager -> Run command in VM -> gnome-terminal. > > Is there a way I can debug this further? > > Thanks, > Andrew Morgan > -- Kind Regards, Neelix -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/nfvBy5IsAvlDP9fsf7UxarQZNcWU5YcrxZJxY4dgrAnPbLfTC3-0CK-QfP4D4G_WyGMkUtqt2rSX0gyfRXZKKB1uXNECZSDyKdgu2wenvIA%3D%40x86.is. For more options, visit https://groups.google.com/d/optout. signature.asc Description: PGP signature
Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
On 04/09/2018 11:24 AM, vel...@tutamail.com wrote: sudo /usr/lib/qubes/qubes-vpn-setup --config I tried changing the order of my steps with no luckI think it connected 1 time but have not been able to reproduce. Sorry, I shouldn't have used that command its wrong. :| The correct step to update with the new prerelease is simply: cd Qubes-vpn-support sudo bash ./install -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8289d721-02b4-b9e6-d496-6e7781ac9e4d%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
Chris, I tried the Master and it didn't work, following your guidleines(and trying mine above). The Qubes4.0 version does work... Using a Debian template, setup entirely in a AppVM, using 4.0, I follow the instructions on Github: https://github.com/tasket/Qubes-vpn-support. After step 2 in your instructions, I am not prompted for username and password. I have tried running: sudo /usr/lib/qubes/qubes-vpn-setup --config after step 2 with out shutting down. No luck... When I shutdown and restart the proxy I am prompted for username and password in a terminal that doesn't allow me to copy username and password(I didn't try manually entering username/password). I close this terminal try running again: sudo /usr/lib/qubes/qubes-vpn-setup --config I tried changing the order of my steps with no luckI think it connected 1 time but have not been able to reproduce. Qubes4 works fine as a proxy...is qubes4.0 OK? Seems to work great... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e773da0a-a9da-46aa-b580-3a49d27d847c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Is anybody using Mullvad as their VPN?
On 04/09/2018 08:22 AM, billol...@gmail.com wrote: So, I recently installed R4 on my laptop and things seem to be going smoothly. I'm ready to get my VPN working. I use mullvad, and I'm having trouble connecting the instructions in the documentation with how mullvad works -- as least as far as using the GUI. Before I screw something up, I was hoping that someone else is using Mullvad and can point out a flaw in my plan to: 1) Turn on the debian template 2) Install mullvad 3) Run mullvad I'm going to assume (naively, I suppose), that that's all there is to it. I've never tried to do anything with mullvad from the command line. If I have to, can anybody point me to some documentation on what I should do? That's not quite all there is to it. :) You may not have seen Mullvad's guide for Qubes: https://mullvad.net/en/guides/qubes-os-and-mullvad-vpn/ Unfortunately their firewall script for Qubes has issues; for one, it would be better to just remove everything that uses $virtualif and don't bother trying to manually match an IP address to it. Otherwise, your DNS requests could fail or get sent elsewhere (beyond Mullvad). Another problem is they have you dedicate a standalone VM to the VPN, which wastes space and requires separate updates. - Since their software looks like its openvpn with a GUI on top, I'd suggest trying to configure openvpn for Qubes with this tool instead: https://github.com/tasket/Qubes-vpn-support It sets up a Qubes-specific openvpn service and correctly configures the firewall to forward DNS and prevent leaks. I suggest installing it into a proxy VM (on Qubes 4.0 that's an appVM with "provides network" selected). The only missing ingredient you'll need to supply is mullvad's set of openvpn config files. These can be downloaded here: https://mullvad.net/en/download/config/ The downloaded file can be unzipped in the proxyVM and the resulting files moved to the /rw/config/vpn folder. For the username/password, you can copy their file to the one Qubes-vpn-support expects: sudo cp mullvad_userpass.txt userpassword.txt - If it works, then... 1) If I open up a vm based on the fedora template, I assume that the VPN will still be in force for it as well. You can connect VMs running any type of OS to a proxyVM. 2) I assume I have to keep the debian template running, else mullvad will quit, right? If you use Qubes-vpn-support, its not an issue since you can use the regular Debian template. 3) Can I open and run mullvad in a debian vm that is not the template? Should I do that instead of turning on the template vm? Using their software/instructions its not practical for normal Qubes use since most network apps (browsers, email, etc) are run from template-based appVMs. You would have to keep re-installing their program each time you started an appVM you wished to use over the VPN. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/afdfcd06-97bd-18cf-1d13-a5675870f91c%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How do I fix slowed down connection when entering software application? EOM
-- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c1ec078d1cd418b3beebd7dcd8eb44d8%40disroot.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How do I install Jitsi on fedora-26?
Or how to find an a software. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8cb40e070a6558b1059f20c2c83f0777%40disroot.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
On 04/09/2018 03:25 AM, john wrote: Is this utility available in 4.0 now? Or how would I obtain it ? https://github.com/tasket/Qubes-vpn-support I have 3 geolocations, but setup is somewhat time consuming, for more, be nice if this was stable, Seems like it does say "beta" The latest (beta3) was just updated in the main 'master' branch... main change from qubes4 is just code streamlining. The qubes4 branch is no longer used. It should work fine in Qubes 4.0. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/825934de-2892-0221-0360-4b786e389105%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Booting from two separate hard drives?
Heh. It seems to me that the "Reasonable" in Qubes "A reasonably secure operating system" has differing values of "reasonable" depending on the user. I have qubes on a triple boot machine (one hard drive). The fact is that there is, and always will be, an inverse relationship between security and usability, and one has to decide on the balance on an individual use basis. Security isn't a toggle. It's a little like locks. You lock your luggage not to stop someone determined to break in, but mostly just to stop it from spontaneously popping open as it gets thrown around by baggage handlers. You lock your car not to stop someone with a hammer and a crowbar, but to discourage people just pulling on door handles to see what they can get. You lock your doors to your house not to stop a guy with a tank, but to encourage your average thief to go next door. You build a gun safe so that it takes significant machinery to get in, and a home intruder will not be able to get your weapons. You build a safe room so that it takes machinery and lots of time to get in. The same thing is true here. Qubes is cool, and it provides significantly more security/privacy than "regular" linux, which provides more security/privacy than Windows. Most of us are not being targeted by the NSA. Most of the folk I know are mostly just sick of Google and Facebook et al. stealing our lives, and don't like the idea of trivial routine surveillance of our lives. For that, security isn't an all or nothing thing. It's a continuum, and there's nothing "wrong" with making "reasonable" compromises for the sake of usability -- if one knows and is willing to accept the risks. IMHO, of course. billo -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/97f9f76a-90b8-4af7-9099-3ee8a07a9e49%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Is anybody using Mullvad as their VPN?
So, I recently installed R4 on my laptop and things seem to be going smoothly. I'm ready to get my VPN working. I use mullvad, and I'm having trouble connecting the instructions in the documentation with how mullvad works -- as least as far as using the GUI. Before I screw something up, I was hoping that someone else is using Mullvad and can point out a flaw in my plan to: 1) Turn on the debian template 2) Install mullvad 3) Run mullvad I'm going to assume (naively, I suppose), that that's all there is to it. I've never tried to do anything with mullvad from the command line. If I have to, can anybody point me to some documentation on what I should do? If it works, then... 1) If I open up a vm based on the fedora template, I assume that the VPN will still be in force for it as well. 2) I assume I have to keep the debian template running, else mullvad will quit, right? 3) Can I open and run mullvad in a debian vm that is not the template? Should I do that instead of turning on the template vm? Thanks! billo -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9889cd8c-e272-4d06-8086-f1e38c5e74a9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes 4.0 on Dell XPS 13 9360 no longer boots anything!
On Wed, 4 Apr 2018 10:46:04 -0700 (PDT) Scott Bwrote: > I decided over the long weekend to install Qubes 4.0 on my laptop > after realizing that I could set up a dual-boot. I know this isn't > very security conscious, but I was more concerned whether the > hardware would be supported. It turns out I can't use my external > monitor and usb keyboard, but that's not the real problem. > > I noticed after rebooting that I only had the Qubes boot menu option, > Windows 10 was not available. In an effort to set things back to the > way they were I removed the Qubes partitions using Ubuntu live from > usb. (I don't remember at this point, but I think I may have changed > my settings from UEFI to Legacy before installing and then changed it > back after removing Qubes.) > > Now Windows won't boot and the laptop doesn't allow me to add it to > the UEFI boot menu via the BIOS screen. During POST I get "No > bootable devices found" even though the SSD shows up in the > information screen. I have tried installing a dual-boot with Ubuntu > but continue to get the startup error that there is no bootable > device. Ubuntu installs, but then won't boot up. > > It seems to me, and I'm just getting up to speed on UEFI, that there > is something similar to the master boot record missing. I've tried > the solutions online that require booting from the Windows 10 > installation USB and then attempting to repair my copy of Windows but > none of them have worked. I'm out of ideas now and just about ready > to format the drive. > > Has anyone else experienced this and if so, how did you recover? > > Let me know if you need more detailed information and I'll provide it. > Hi Scott, I had the same problem at one stage on my Dell XPS 15. The bios did not list any EFI boot options, not Windows, not Qubes, and gave the "No bootable device" message. I had to use 'fdisk' on a recovery CD to rewrite the partition type back to the boot partition. I described it earlier on this list to someone else. I'll try to find the email if you still need to fix your box. Mike. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180409121657.74b5054a.mike%40keehan.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Just a data point -- RC4 installs fine on Dell Inspiron i5759-8835SLV laptop triple boot
On Sun, Apr 8, 2018, at 20:51, billol...@gmail.com wrote: > configuration setup. The primary difference was that the third time, I > unplugged my usb mouse and let it install with nothing attached. > > I don't know if there'a any reason that having a usb mouse plugged into > my laptop would cause a problem, but there you go. > I have also experienced this. On an ASUS Gamer laptop, with a particular USB mouse connected, the install would fail. Just disconnecting that mouse and starting the installation from scratch worked. PS. It was connected via a USB hub that also had a USB keyboard attached. The keyboard had no issues. Not sure if this stems from a combination of USB hub and mouse model. Regards, Teqleez -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1523260644.4039411.1331209576.33CC7524%40webmail.messagingengine.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4.0 and Private Internet Access? Tasket VPN solution...
Is this utility available in 4.0 now? Or how would I obtain it ? https://github.com/tasket/Qubes-vpn-support I have 3 geolocations, but setup is somewhat time consuming, for more, be nice if this was stable, Seems like it does say "beta" -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2505019d-cad6-37fa-b18f-7c9bb4c255d2%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Booting from two separate hard drives?
On 03/22/2018 04:22 PM, cooloutac wrote: On Monday, March 19, 2018 at 12:59:40 PM UTC-4, Linus Stridbeck wrote: Hi, I have the opportunity to by a computer (HP EliteBook) that have space for two hardrives one SSD and one Sata M.2 SSD 2242. I would like to run Windows on the SSD and Qubes on the Sata M.2 SSD 2242 From what I have read it is possible all it takes is some modifications in bios. But is it advisable from a security point of viwe? I know its a bad ider to boot from one singel hardrive but in this case i guese the Windows hard drive is completely disconnected when runing qubes on the Sata drive? No its not advisable because windows if compromised can undermine the qubes /boot partition which is not encrypted. And even if you are disconnecting drives, its much easier to flash firmware from windows then in qubes, which would also then undermine qubes when you connect its drive and run it. Just don't let the perfect be the enemy of the good. I have two systems, both with windows on 1 HD , Qubes on the other, 3.2 seems to be UEFI , 4.0 only seems do-able with Legacy. It seems a bit far fetched that remotely someone is going to boot up my windows drive and reflash my Bios , though nothing is impossible these days, but as some say, if that is your adversary's skill set, than you may have bigger problems :) I don't like having to keep windows around, but Qubes being what it is, there is something to be said for having a backup OS IMO ; and I don't think I'm going to want to learn gnucash and there being no win tools (not that I ever got that stable in 3.2) in 4.0 . Perhaps I one keeps their windows use to a minimum and offline, one might less worried about /boot ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3ebf9fa6-6859-35f3-a98d-1cdd7732e025%40riseup.net. For more options, visit https://groups.google.com/d/optout.