Re: [qubes-users] Re: QSB #43: L1 Terminal Fault speculative side channel (XSA-273)

2018-09-03 Thread pixel fairy
On Monday, September 3, 2018 at 1:21:27 AM UTC-7, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Mon, Sep 03, 2018 at 01:46:11AM -0500, Andrew David Wong wrote:
> > On 2018-09-02 22:22, pixel fairy wrote:
> > > is it still necessary to disable hyper threading after upgrading
> > > in qubes 4?
> > > 
> > 
> > Hyper-threading should be disabled in Xen after you install the updates.
> > It should not be necessary for you to take any further action to
> > disable it there.
> > 
> > If you're asking whether you should also disable it in your BIOS
> > settings, then I'm not sure (CCing Marek).
> 
> There is no need to additionally disable it in BIOS. Xen's smt=off
> option means it won't be used even if BIOS reports its availability.

Is this something that can eventually be resolved, allowing safe re-enabling of 
hyperthreading? or is that even known yet?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/56ca3f03-24bc-410d-af1f-ef92db60b208%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't create Linux HVM

2018-09-03 Thread pc revival
Hello all. I have been trying to install a version of Ubuntu Linux called 
Buscador and can't get past the partitioning utility. I boot the live iso and 
everything works fine but when I boot the installer I go through the user set 
up screen fine but the partition utility never finds the partitions. Even if I 
boot the live ISO in an established Linux install it still does not find the 
partitions. Any ideas would be appreciated.

Thanks in advance

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d087fc44-e7fc-4bad-b89d-07c6b0800766%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can I set an unencrypted external HD as /home folder for a VM

2018-09-03 Thread Chris Laprise

On 09/03/2018 06:03 PM, Guy Frank wrote:

On Friday, August 31, 2018 at 6:31:58 PM UTC-4, Chris Laprise wrote:

On 08/31/2018 01:40 PM, Guy Frank wrote:

On Friday, August 31, 2018 at 12:17:54 PM UTC-5, js...@bitmessage.ch wrote:

Guy Frank:

One question I had is whether there is any way to set an unencrypted (or 
encrypted?) external HD as the /home folder for a VM?

Guy


Hi Guy,

I'm not sure about setting it as /home but i think it's possible. But
it's easy to attach an external HD to a vm and save your files to it.

https://www.qubes-os.org/doc/usb/

Also it's pretty easy to encrypt it with luks for security, it just
takes a little longer each time.

--
Jackie


Thanks Jackie for your reply!

I remember it being fairly easy to attach USB devices w/ the right clicks here 
& there.  So, yes, I'd have access to the files on my external HD.

But it would be more convenient if I could get Qubes to mount the home folder 
on the HD as the Home folder for the given virtual machine.  I imagine that's 
trickier and was wondering if there's a way to do it?

Maybe use a script to mount the attached USB drive home (/home/guyuser) over 
the Qubes home directory?  But then, if that's possible, some of the setup in 
the Qubes home directory might get missed.



The key to using it as /home would be to setup a new storage pool to
hold that VM. Unfortunately the docs could use a rewrite:

https://www.qubes-os.org/doc/storage-pools/

The relevant commands are 'qvm-pool --add' and 'qvm-create --pool'.

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


Hi Chris:  Thanks! This looks like a step in the right direction, but I have 
some questions.  I'm guessing the commands will tell Qubes to treat my  
external HD as a potential place to store a VM.  But that seems like it 
wouldn't take the existing home directory on the external HD as the VM home 
directory but instead store a VM file containing the VM's home directory 
structure on the disk.  That file would, I imagine, be difficult to access on 
the Kubuntu I have running on my home desktop and wouldn't contain the files 
currently on my external hard disk, which mirror my Kubuntu files.

Is that the case and is there any fix?  Am beginning to think the only way to 
work this is to simply attach my external HD as a USB device and give up on 
trying to make the files my home directory.


You're right that it wouldn't readily treat a bare home directory as the 
VM's own, but create a Linux disk image instead.


But if the other systems are Ubuntu or similar Linux, you have options. 
First is encryption: Ubuntu should recognize a LUKS-formatted drive when 
its inserted and prompt the user for a passphrase automatically to 
unlock and mount it. This could make your work flows more secure.


Also, I recall Ubuntu having some way to mount disk image files from the 
file explorer. But you can setup the drive with LVM on top of LUKS (use 
the LVM Qubes driver), and I think in this case Ubuntu may try to make 
the LVM volumes available to the user as soon as its unlocked (if not, 
you could use gnome-disks as a GUI to do this, although a script with an 
icon would work too).



--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a97c1a3-4d5a-3e43-3589-9e324b47f631%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can I set an unencrypted external HD as /home folder for a VM

2018-09-03 Thread Guy Frank
On Friday, August 31, 2018 at 6:31:58 PM UTC-4, Chris Laprise wrote:
> On 08/31/2018 01:40 PM, Guy Frank wrote:
> > On Friday, August 31, 2018 at 12:17:54 PM UTC-5, js...@bitmessage.ch wrote:
> >> Guy Frank:
> >>> One question I had is whether there is any way to set an unencrypted (or 
> >>> encrypted?) external HD as the /home folder for a VM?
> >>>
> >>> Guy
> >>
> >> Hi Guy,
> >>
> >> I'm not sure about setting it as /home but i think it's possible. But
> >> it's easy to attach an external HD to a vm and save your files to it.
> >>
> >> https://www.qubes-os.org/doc/usb/
> >>
> >> Also it's pretty easy to encrypt it with luks for security, it just
> >> takes a little longer each time.
> >>
> >> -- 
> >> Jackie
> > 
> > Thanks Jackie for your reply!
> > 
> > I remember it being fairly easy to attach USB devices w/ the right clicks 
> > here & there.  So, yes, I'd have access to the files on my external HD.
> > 
> > But it would be more convenient if I could get Qubes to mount the home 
> > folder on the HD as the Home folder for the given virtual machine.  I 
> > imagine that's trickier and was wondering if there's a way to do it?
> > 
> > Maybe use a script to mount the attached USB drive home (/home/guyuser) 
> > over the Qubes home directory?  But then, if that's possible, some of the 
> > setup in the Qubes home directory might get missed.
> > 
> 
> The key to using it as /home would be to setup a new storage pool to 
> hold that VM. Unfortunately the docs could use a rewrite:
> 
> https://www.qubes-os.org/doc/storage-pools/
> 
> The relevant commands are 'qvm-pool --add' and 'qvm-create --pool'.
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Hi Chris:  Thanks! This looks like a step in the right direction, but I have 
some questions.  I'm guessing the commands will tell Qubes to treat my  
external HD as a potential place to store a VM.  But that seems like it 
wouldn't take the existing home directory on the external HD as the VM home 
directory but instead store a VM file containing the VM's home directory 
structure on the disk.  That file would, I imagine, be difficult to access on 
the Kubuntu I have running on my home desktop and wouldn't contain the files 
currently on my external hard disk, which mirror my Kubuntu files.  

Is that the case and is there any fix?  Am beginning to think the only way to 
work this is to simply attach my external HD as a USB device and give up on 
trying to make the files my home directory.

Guy

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/253d0a35-8450-4264-a191-b885e4ad6a11%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Sys-net fail to connect to internet

2018-09-03 Thread odindva0101
Hey guys currently running Qubes R 4.0 .
And my sys-net as failing to connect to the internet + when I switch on mozila 
is lagging pretty bad. Please check the pic to see what exactly the 
configuration shows me .
https://imgur.com/a/6fgXaAq
Thanks in advance

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8859d8a9-db06-41ad-9116-e43430ea168b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] After I disabled ipv6 for all VMs the following problems arose.

2018-09-03 Thread getoutandhide
Good day.
After I disabled ipv6 for all VMs (because ipv6 is not used on my computer)
the following problems arose.
1.whonix_firewall failed to load!
2. When I try to assign a static arp to the sys-firewall command: "arp -an | 
grep -v incom | awk '{print $ 2" "$ 4}' | tr -d '()'> / etc / ethers"
after trying to load the arp table from / etc / ethers
the following message appears: "Network is unreachable
arp: can not set entry on line 3 of etherfile / etc / ethers

Tell me, should I try to assign a static arp to the sys-firewall?
How can I fix the operation of whonix_firewall when ipv6 is disabled?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/64c14cee-fb57-44a9-993a-9d8c4cf104e3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cpu

2018-09-03 Thread Foppe de Haan
I'm afraid so, yeah.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86106a1d-14a2-46b8-b6f4-a790f328f107%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Anyone still using GRSecurity

2018-09-03 Thread jonbrownmasterit
Is anyone using GRSecurity currently? Are there better solutions?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6cf78467-241f-4d39-aacf-548c099ce95e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Unable to reset PCI device 0000:02.00.0

2018-09-03 Thread Patrick
On Monday, September 3, 2018 at 10:31:50 AM UTC-4, unman wrote:
> On Sun, Sep 02, 2018 at 03:56:46PM -0700, Patrick wrote:
> > On Sunday, September 2, 2018 at 3:34:34 PM UTC-4, Jean-Philippe Ouellet 
> > wrote:
> > > On Sun, Sep 2, 2018 at 10:12 AM, Patrick Bouldin
> > >  wrote:
> > > > On Sunday, September 2, 2018 at 10:10:55 AM UTC-4, Patrick Bouldin 
> > > > wrote:
> > > >> Qubes 4.0 Error - "Start failed: Requested operation is not valid: PCI 
> > > >> device :02:00.0 is in use by driver xenlight, domain sys-usb
> > > >>
> > > >> I don't know how to copy the log folder over and qubes doesn't have 
> > > >> the wireless network, which I believe is related, but I've attached a 
> > > >> picture of the log.
> > > >>
> > > >> This is a new Qubes install on a new Acer laptop Aspire A515-51-86AQ
> > > >> Booting in legacy mode.
> > > >>
> > > >> I can get into the main desktop and get to Dom0 terminal, but can't 
> > > >> launch any of the default domains.
> > > >>
> > > >> There is another thread on here with the same error. He ran:
> > > >> $ qvm-pci attach --persistent --option permissive=true --option 
> > > >> no-strict-reset=true sys-net dom0:00_XXX
> > > >>
> > > >> And it worked for him, but doesn't work for me, the response I get is 
> > > >> "error : backend vm "dom0" doesn't expose device "00.XXX"
> > > 
> > > The "XXX" in the PCI device should be filled in with your actual PCI 
> > > device.
> > > 
> > > >> So I wonder what "xenlight" is and it won't release what pci device?
> > > 
> > > Just a library for interfacing with Xen. Unlikely to be the actual 
> > > problem.
> > > 
> > > >> Suggestions?
> > > >>
> > > >> Thanks,
> > > >> Patrick
> > > >
> > > > Pics attached here.
> > > 
> > > It would be the first time I've seen this, but it might perhaps be
> > > conceivable that changing BIOS settings caused your device to show up
> > > with a different BDF (essentially "PCI address") than when Qubes was
> > > installed? Use `lspci` in dom0 to enumerate them.
> > > 
> > > An easier way than doing this via the command line is to use the
> > > Devices tab of the Qubes VM Settings GUI - remove all devices then add
> > > the one which looks like your network device. You can also configure
> > > no-strict-reset via the button at the bottom of the GUI, which is
> > > sometimes necessary.
> > 
> > Thanks, I went to the work vm for example, and all of the devices were on 
> > the left side, nothing on the right, then I selected the wifi device and 
> > the response was "you've enabled dynamic memory balancing, some devices 
> > might not work!"
> > 
> > and, it won't let me apply that change, saying "Can't attach pci device to 
> > a VM in pvh mode"
> > 
> > Then I tried to issue your suggestion "$ qvm-pci attach --persistent 
> > --option permissive=true --option no-strict-reset=true sys-net dom02:00.0"  
> >   which is my wireless device and the error response "no backend vm '02'"
> > 
> > 
> > I'm wondering if this is the right way to go or maybe just try a different 
> > installation route?
> > 
> > Thanks,
> > Patrick
> > 
> 
> There's a typo in your command:
> you have dom02:00.0 and the command should be dom0:02
> 
> The two messages you received can be fixed in the Qube settings window.
> You can change the VM mode on the Advanced pane - select HVM.
> There's a checkbox for memory balancing on the same pane , if that's
> needed. I habitually turn this off and set the memory/maxmem settings
> low. ymmv

Thanks, I'm feeling outgunned on this one. I really have no idea about what is 
truly going on - what's the root cause issue and why? What device is not 
resetting and why that matters, etc. etc.

Just to be clear. While I'm able to get into the Qubes desktop, and can get to 
dom0 terminal, none of the pre-configured VMs are coming up. If I simply do a 
start from the Dom0 qubes manager, on any VM, the same error comes up:

"Unable to reset PCI device :01:00.1: Internal error: active :01:00.0 
devices on bus with :01:00.1 not doing bus reset."

The log says:
"unable to release device /dev/loop0: No such device or address"

I have tried all your suggestions (HVM/mem checkbox/low mem), no change in 
result.

Based on this, what is going on in the first place? I feel if I can understand 
the root of it I stand a chance in solving. 

Thanks,

Patrick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d5abd8e2-8e59-4d1b-bc3c-2d7917a12c18%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Unable to reset PCI device 0000:02.00.0

2018-09-03 Thread unman
On Sun, Sep 02, 2018 at 03:56:46PM -0700, Patrick wrote:
> On Sunday, September 2, 2018 at 3:34:34 PM UTC-4, Jean-Philippe Ouellet wrote:
> > On Sun, Sep 2, 2018 at 10:12 AM, Patrick Bouldin
> >  wrote:
> > > On Sunday, September 2, 2018 at 10:10:55 AM UTC-4, Patrick Bouldin wrote:
> > >> Qubes 4.0 Error - "Start failed: Requested operation is not valid: PCI 
> > >> device :02:00.0 is in use by driver xenlight, domain sys-usb
> > >>
> > >> I don't know how to copy the log folder over and qubes doesn't have the 
> > >> wireless network, which I believe is related, but I've attached a 
> > >> picture of the log.
> > >>
> > >> This is a new Qubes install on a new Acer laptop Aspire A515-51-86AQ
> > >> Booting in legacy mode.
> > >>
> > >> I can get into the main desktop and get to Dom0 terminal, but can't 
> > >> launch any of the default domains.
> > >>
> > >> There is another thread on here with the same error. He ran:
> > >> $ qvm-pci attach --persistent --option permissive=true --option 
> > >> no-strict-reset=true sys-net dom0:00_XXX
> > >>
> > >> And it worked for him, but doesn't work for me, the response I get is 
> > >> "error : backend vm "dom0" doesn't expose device "00.XXX"
> > 
> > The "XXX" in the PCI device should be filled in with your actual PCI device.
> > 
> > >> So I wonder what "xenlight" is and it won't release what pci device?
> > 
> > Just a library for interfacing with Xen. Unlikely to be the actual problem.
> > 
> > >> Suggestions?
> > >>
> > >> Thanks,
> > >> Patrick
> > >
> > > Pics attached here.
> > 
> > It would be the first time I've seen this, but it might perhaps be
> > conceivable that changing BIOS settings caused your device to show up
> > with a different BDF (essentially "PCI address") than when Qubes was
> > installed? Use `lspci` in dom0 to enumerate them.
> > 
> > An easier way than doing this via the command line is to use the
> > Devices tab of the Qubes VM Settings GUI - remove all devices then add
> > the one which looks like your network device. You can also configure
> > no-strict-reset via the button at the bottom of the GUI, which is
> > sometimes necessary.
> 
> Thanks, I went to the work vm for example, and all of the devices were on the 
> left side, nothing on the right, then I selected the wifi device and the 
> response was "you've enabled dynamic memory balancing, some devices might not 
> work!"
> 
> and, it won't let me apply that change, saying "Can't attach pci device to a 
> VM in pvh mode"
> 
> Then I tried to issue your suggestion "$ qvm-pci attach --persistent --option 
> permissive=true --option no-strict-reset=true sys-net dom02:00.0"which is 
> my wireless device and the error response "no backend vm '02'"
> 
> 
> I'm wondering if this is the right way to go or maybe just try a different 
> installation route?
> 
> Thanks,
> Patrick
> 

There's a typo in your command:
you have dom02:00.0 and the command should be dom0:02

The two messages you received can be fixed in the Qube settings window.
You can change the VM mode on the Advanced pane - select HVM.
There's a checkbox for memory balancing on the same pane , if that's
needed. I habitually turn this off and set the memory/maxmem settings
low. ymmv

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180903143147.acek673j6y6vl3y6%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cpu

2018-09-03 Thread Roy Bernat
On Monday, 3 September 2018 09:15:47 UTC-4, Foppe de Haan  wrote:
> On Monday, September 3, 2018 at 3:02:24 PM UTC+2, Roy Bernat wrote:
> > Hi 
> > 
> > i have dell xps 9360 . core i7 .   until the update today i had 4 cores . 
> > 
> > now the dom see only two .   why ?  someone gas an idea .  strange that the 
> > computer is feeling faster than ever. 
> > 
> > Roy
> 
> If it's a 7th-gen intel CPU, those "i7"'s only had two real cores with 
> hyperthreading making it look like there were 4. HT had to be disabled 
> because of https://www.qubes-os.org/news/2018/09/02/qsb-43/ (Known to affect 
> Intel CPUs, doesn't look like it affects AMD.)

Hi 

Thank you fir your replay .  good to know   is it affect my performance ?

I already have a bad performance ( refresh rate ... slow response )   xps 9360 
16GB core i7 512nvme 

Roy 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a41a48e5-ec0b-45c4-b907-ea384250f440%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cpu

2018-09-03 Thread Foppe de Haan
On Monday, September 3, 2018 at 3:02:24 PM UTC+2, Roy Bernat wrote:
> Hi 
> 
> i have dell xps 9360 . core i7 .   until the update today i had 4 cores . 
> 
> now the dom see only two .   why ?  someone gas an idea .  strange that the 
> computer is feeling faster than ever. 
> 
> Roy

If it's a 7th-gen intel CPU, those "i7"'s only had two real cores with 
hyperthreading making it look like there were 4. HT had to be disabled because 
of https://www.qubes-os.org/news/2018/09/02/qsb-43/ (Known to affect Intel 
CPUs, doesn't look like it affects AMD.)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/930f888f-1c67-4b7f-b295-a35911b36ca6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] cpu

2018-09-03 Thread Roy Bernat
Hi 

i have dell xps 9360 . core i7 .   until the update today i had 4 cores . 

now the dom see only two .   why ?  someone gas an idea .  strange that the 
computer is feeling faster than ever. 

Roy 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/977860a2-f1a3-4894-ad83-9d012201ae29%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] systemd replacement for dom0

2018-09-03 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Marcus Linsner:
> I'm mainly asking because I fail to make certain services stop in a
> certain order at reboot/shutdown. Hmm, maybe I should focus on
> starting them in a certain order? then maybe shutdown will do it in
> reverse order [...]

Yes, that's how systemd does it. See Before= and After= in the
systemd.unit manpage.

Rusty
-BEGIN PGP SIGNATURE-
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=9moi
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180903113501.GA946%40mutt.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] setting up vpn issue

2018-09-03 Thread Nicola Schwendener
Hi Chris,
yes it worked... now I added the dns provided by ExpressVPN.
thank you very much

best regards

Nick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f1f0427-65b0-47cf-af91-3c95c25cd993%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: QSB #43: L1 Terminal Fault speculative side channel (XSA-273)

2018-09-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Sep 03, 2018 at 01:46:11AM -0500, Andrew David Wong wrote:
> On 2018-09-02 22:22, pixel fairy wrote:
> > is it still necessary to disable hyper threading after upgrading
> > in qubes 4?
> > 
> 
> Hyper-threading should be disabled in Xen after you install the updates.
> It should not be necessary for you to take any further action to
> disable it there.
> 
> If you're asking whether you should also disable it in your BIOS
> settings, then I'm not sure (CCing Marek).

There is no need to additionally disable it in BIOS. Xen's smt=off
option means it won't be used even if BIOS reports its availability.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAluM7v8ACgkQ24/THMrX
1ywhvggAk05Ra0VOk/rEelhxGqrQGPouTJWfmGL5/jpDRU7QTmErB2BqqHNQXbY0
TvJD+8DJTQBT84Gw+JrN4CYamS7VXMFFngekxDV4tZWfnkNiJQTJzM+Raa0zBcC2
7m10uoz1T8G9U5AH+5+yfCEx9hHgRn96SFbxmasOwRSyqIQ4MP4IPWLKzeh7EmbE
U0iCKxsEjzD2V8HfDo3CoTfg0mXhygiQPF8qWDTs30hBPVYC14evci94sX2YqP40
8h/NRtZRMNk32F/+H8OU1fPHocO9/LbejU0jkeCxah3BRD3pkHLlCk5f+8hJfwOb
9eRwYGBIyJqYWervftRTN7oJLxCFZw==
=T+UF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180903082119.GB1371%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: QSB #43: L1 Terminal Fault speculative side channel (XSA-273)

2018-09-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-09-02 22:22, pixel fairy wrote:
> is it still necessary to disable hyper threading after upgrading
> in qubes 4?
> 

Hyper-threading should be disabled in Xen after you install the updates.
It should not be necessary for you to take any further action to
disable it there.

If you're asking whether you should also disable it in your BIOS
settings, then I'm not sure (CCing Marek).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=8bBD
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03b0892e-6fb3-7ff6-ad60-5e980437f8f4%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.