[qubes-users] Re: Recreate boot content

2018-10-09 Thread thiago . chili
I don't know if I mistakenly clear that boot loader. But I'm pretty sure that's 
not related to qubes.

Do you think it is possible to recreate the boot partition or should I start 
over with the install? Install is the worst scenario since I've been 
configuring for a long time.

Thank you!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7173347f-3505-4124-b283-2548a035b0ca%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Question before buying a new laptop

2018-10-09 Thread taii...@gmx.com
On 10/06/2018 03:07 PM, ben.thomp...@vfemail.net wrote:
> Thanks for your reply.
> 
>>> I have a few questions:
>>> How well does passing a dedicated graphics card to a vm work / is gaming
>>> in a vm feasible or do i still need dual-boot?
>>
>> Yeah very feasible many people do it including me.
> 
> So what games are possible and are you using a windows or linux guest?
> (Sadly there are games not running with wine.)

Windows without networking to avoid the spying features.

There are however a variety of AAA DRM free games that run native on
linux these days.

On my KGPE-D16 I just finished the two wolfenstein games and the new
prey on max settings I have RX580 and 6328 cpu with 14gb ram assigned to
the VM. I suggest purchasing 8gb ecc rdimm sticks as they are the most
affordable per gb if you get one. The KCMA-D8 is also a good choice and
with that you don't have to deal with NUMA issues.

> 
>> Of course you need the right system you would need an eGPU capable
>> laptop such as the W520 which you should install an quad core ivy bridge
>> cpu in so you get pci-e 3.0 for the expresscard slot. As always I
>> recommend installing coreboot - the ivy/sandy coreboot port has open
>> cpu/ram init and supports me cleaner to nerf your me (again disabling is
>> impossible)
> 
> Well the W520 is from 2011 and can't be bought anymore and i don't like
> to buy hardware second hand.

Whats wrong with second hand hardware? You can replace the worn out
parts like the keyboard/armrest/lid very easily to the point where you
couldn't tell the difference between a new and used laptop.

I don't think a circa 2013 cpu is that bad considering what you gain
from using it.

> Also the processor is a bit weaker.

A quad core ivy bridge cpu will be fine I guarantee it.

> I know the problem with new CPUs is a ME which can't be properly
> deactivated anymore (at least as far as i know), but it seems i have to
> accept this, if i want a powerful processor for gaming / work.

No you don't have to.

What do you want to run that couldn't run on an older laptop but could
run on a newer one?

> Hence the W520 is not really an option for me (Although it is the better
> option from a security standpoint).
> 
> So do you have a suggestion for newer hardware in the same price-range?

I don't recommend blatantly insecure hardware which is what new x86 is -
it is all junk. See for instance the recent china spying scandal where
they inserted a backdoor chip on the motherboard and that is probably
just the tip of the iceberg.

The future of real owner controlled, open source firmware, high
performance hardware is non-x86, such as POWER systems like the raptor
talos 2, raptor blackbird, etc. Of course made in usa is a must for
security reasons and the OpenPOWER9 CPU's are made here as well as those
boards. I hope that xen/qubes will soon support POWER - but I argue that
POWER-KVM is more secure than xen on a black box x86 platform.

In terms of gaming you aren't going to get good performance on a laptop
which is why I always suggest obtaining an owner controlled no psp/me
libre-firmware available desktop system board like the KCMA-D8/KGPE-D16
(runs qubes 4.0 great)
plus a g505s for your no psp/me owner controlled laptop which has open
cpu/ram init via coreboot.

For laptop gaming via eGPU you can re-direct the output to the internal
screen if both the iGPU and the eGPU are assigned to the same VM - very
difficult though and of course graphics assignment weakens your security
in a variety of ways so I would simply have a dedicated gaming device if
you can afford it.

Let me know if you find this advice helpful - I am always pleased to
answer the expert questions.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/105b2ee6-b32e-7d7e-52fd-d5eb9c48509a%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] nftables vs iptables

2018-10-09 Thread Ivan Mitev




On 10/9/18 7:44 PM, mfreemon wrote:

On 10/8/18 10:56 AM, mfreemon wrote:

On 10/2/18 2:25 AM, Ivan Mitev wrote:

On 10/2/18 1:32 AM, Chris Laprise wrote:

On 10/01/2018 05:48 PM, mfreemon wrote:

On 1/11/18 3:01 PM, Chris Laprise wrote:
  > On 01/10/2018 03:47 PM, Connor Page wrote:
  >> The official templates use nftables so shouldn’t be mixed with
iptables. I didn’t have time to learn about nftables, so just removed
nftables package from debian 9 template. YMMV.
  >
  > Hmmm, I was just thinking how Qubes' own guest scripts still use
  > iptables even in fedora-26.
  >
  > IIUC, iptables and nft are two different interfaces to 
netfilter. I

  > don't know if it really matters, at least for the R4.0 window. I'd
  > prefer to put the syntax change (for docs) off until a later 
release.


I was recently thrown by the mix of both nftables and iptables in R4.

The qubes docs don't clarify much.  The qubes firewall scripts use
nft. Most of the discussion on the qubes website documentation is
about iptables, but there are also a few mentions of nft.  The upgrade
instructions (going from R3.2 to R4) did not mention converting rules
from iptables to nftables.  It looks like other related projects (one
example is qubes-tunnel) is using iptables.

Just reading a few things and trying to come up to speed, I get the
impression that nftables and iptables should not both by used at the
same time.  Even if technically possible (i.e. both sets of rules
applied correctly), it strikes me as not a great idea to maintain
packet filtering rules in two different ways.

What is the best practice recommendation on this (for R4, Fedora 28
template)?  Are we to be using, exclusively, nftables in R4?


The last I read about this (for 4.0) is that nftables is used in Fedora
Qubes code, but Debian Qubes is still using iptables. That still 
appears
to be the case since nftables is not installed in my debian-9 
templates.


I've submitted qubes-tunnel to Qubes with iptables commands only, with
the intention to transition to nftables (or that other new interface in
Linux, name escapes me just now) for Qubes 4.1. Someone who is just
starting a project might be better off going with nftables.


... until yet another packet filtering mechanism replaces nftables (in
that case, bpfilter [1]).

I understand the rationale behind using nftables [2] but given how it is
widespread (hint: close to 0 even amongst seasoned sysadmins) IMHO it
wasn't worth it. The OP's post confirms there's quite some confusion
about how it interacts with iptables, and the official documentation is
far from helpful.
I'm quite proficient with iptables and networking in general but it took
me half an hour to understand how to tweak Qubes' nftables rules last
time I wanted to change something in the firewall, while I would have
done that task in less than one minute with iptables. I could have spent
a few hours learning nftables to improve the official doc but at my age
I prefer to spend time learning tech that significantly improves things
(eg. Qubes OS over standard linux distribution) over loosing time
learning stuff that is only marginally better.
Anyway - I digress :)

[1] https://old.lwn.net/Articles/747551/
[2]
https://github.com/QubesOS/qubes-issues/issues/1815#issuecomment-245109500 



I'm concerned about the confusion and unnecessary complexity here.

Network packet filtering is certainly (one of) those features that 
software such Qubes needs to be solid on (in both design approach and 
implementation detail).


Is the Qubes team confident in the current situation, such that users 
of Qubes should not be concerned?


nb.  This is not meant to be a criticism at all.  I very much 
appreciate the hard (and complicated) work going into Qubes.  I'm just 
looking to understand the current situation better so as to judge 
whether my concern is warranted or not.



As an example:  I'm wanting to enable some specific network traffic 
between two qubes.  The docs say to use iptables 
(https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes). 
  qubes-firewall-user-script also specifies iptables rules.  But 
qvm-firewall implements the rules it manages using nftables.  So the 
firewall VMs have both iptables rules and nftables rules in effect.  And 
these are different sets of rules.  It's not that the iptables command 
and the nft command are just two user interfaces showing the same packet 
filtering rules.  They are different packet filtering rules.  This seems 
like a receipt for disaster.


Is this the wrong forum for this discussion?  Should this be on 
qubes-devel, or an issue in qubes-issues at 
https://github.com/QubesOS/qubes-issues/issues?


You'll definitely get more visibility on qubes-devel.

FWIW I'm not concerned about the complexity itself: I trust the Qubes 
devs not to mess up.
IMHO the problem is that people proficient with iptables are not willing 
to spend time learning yet another packet filter tool when iptables 
works 

Re: [qubes-users] nftables vs iptables

2018-10-09 Thread mfreemon

On 10/9/18 11:44 AM, mfreemon wrote:

On 10/8/18 10:56 AM, mfreemon wrote:

On 10/2/18 2:25 AM, Ivan Mitev wrote:

On 10/2/18 1:32 AM, Chris Laprise wrote:

On 10/01/2018 05:48 PM, mfreemon wrote:

On 1/11/18 3:01 PM, Chris Laprise wrote:
  > On 01/10/2018 03:47 PM, Connor Page wrote:
  >> The official templates use nftables so shouldn’t be mixed with
iptables. I didn’t have time to learn about nftables, so just removed
nftables package from debian 9 template. YMMV.
  >
  > Hmmm, I was just thinking how Qubes' own guest scripts still use
  > iptables even in fedora-26.
  >
  > IIUC, iptables and nft are two different interfaces to 
netfilter. I

  > don't know if it really matters, at least for the R4.0 window. I'd
  > prefer to put the syntax change (for docs) off until a later 
release.


I was recently thrown by the mix of both nftables and iptables in R4.

The qubes docs don't clarify much.  The qubes firewall scripts use
nft. Most of the discussion on the qubes website documentation is
about iptables, but there are also a few mentions of nft.  The upgrade
instructions (going from R3.2 to R4) did not mention converting rules
from iptables to nftables.  It looks like other related projects (one
example is qubes-tunnel) is using iptables.

Just reading a few things and trying to come up to speed, I get the
impression that nftables and iptables should not both by used at the
same time.  Even if technically possible (i.e. both sets of rules
applied correctly), it strikes me as not a great idea to maintain
packet filtering rules in two different ways.

What is the best practice recommendation on this (for R4, Fedora 28
template)?  Are we to be using, exclusively, nftables in R4?


The last I read about this (for 4.0) is that nftables is used in Fedora
Qubes code, but Debian Qubes is still using iptables. That still 
appears
to be the case since nftables is not installed in my debian-9 
templates.


I've submitted qubes-tunnel to Qubes with iptables commands only, with
the intention to transition to nftables (or that other new interface in
Linux, name escapes me just now) for Qubes 4.1. Someone who is just
starting a project might be better off going with nftables.


... until yet another packet filtering mechanism replaces nftables (in
that case, bpfilter [1]).

I understand the rationale behind using nftables [2] but given how it is
widespread (hint: close to 0 even amongst seasoned sysadmins) IMHO it
wasn't worth it. The OP's post confirms there's quite some confusion
about how it interacts with iptables, and the official documentation is
far from helpful.
I'm quite proficient with iptables and networking in general but it took
me half an hour to understand how to tweak Qubes' nftables rules last
time I wanted to change something in the firewall, while I would have
done that task in less than one minute with iptables. I could have spent
a few hours learning nftables to improve the official doc but at my age
I prefer to spend time learning tech that significantly improves things
(eg. Qubes OS over standard linux distribution) over loosing time
learning stuff that is only marginally better.
Anyway - I digress :)

[1] https://old.lwn.net/Articles/747551/
[2]
https://github.com/QubesOS/qubes-issues/issues/1815#issuecomment-245109500 



I'm concerned about the confusion and unnecessary complexity here.

Network packet filtering is certainly (one of) those features that 
software such Qubes needs to be solid on (in both design approach and 
implementation detail).


Is the Qubes team confident in the current situation, such that users 
of Qubes should not be concerned?


nb.  This is not meant to be a criticism at all.  I very much 
appreciate the hard (and complicated) work going into Qubes.  I'm just 
looking to understand the current situation better so as to judge 
whether my concern is warranted or not.



As an example:  I'm wanting to enable some specific network traffic 
between two qubes.  The docs say to use iptables 
(https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes). 
  qubes-firewall-user-script also specifies iptables rules.  But 
qvm-firewall implements the rules it manages using nftables.  So the 
firewall VMs have both iptables rules and nftables rules in effect.  And 
these are different sets of rules.  It's not that the iptables command 
and the nft command are just two user interfaces showing the same packet 
filtering rules.  They are different packet filtering rules.  This seems 
like a receipt for disaster.


Is this the wrong forum for this discussion?  Should this be on 
qubes-devel, or an issue in qubes-issues at 
https://github.com/QubesOS/qubes-issues/issues?


s/receipt/recipe/


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to 

[qubes-users] Re: What do you guys think about the "OnlyKey"

2018-10-09 Thread John Maher
On Friday, November 3, 2017 at 2:38:06 PM UTC-4, Fabian wrote:
> A lot of people know the Yubikey, but the Yubikey has one big "problem": It 
> has only 2 slots for Passwords.
> I thought about storing my password for my disk encryption on such a key, so 
> I can a) use a stronger passphrase and b) don't have to type it in every 
> time, especially when I am at University, ...
> 
> So I found the "OnlyKey" which is basically a Yubikey, just far less known 
> and it has 12+12 Slots.
> https://crp.to/p/
> 
> I ordered one plus a small purse which I can attach to my belt, so I always 
> have the key with me.
> What dou you think about it - is it a good idea or am I missing something 
> really important?
> 
> 
> Negatives are:
> -Product comes from the US (Yubikey aswell)
> -Setting it up is done over a Google Chrome Addon (I had a bad feeling about 
> it, so I just made a new VM, installed chrome, disabled the network 
> connection, set up the key and then deleted the VM).
> 
> The price is okay so far (46$), in my case it nearly doubled up because of 
> taxes (Germany) and because I've chosen Priority Shipping from Amazon US, 
> instead of the standard shipping (which takes approximately 2-3 Weeks).

Hi Fabian,

I hoping you'll get this message. I have an OnlyKey now and cannot get it to 
work properly (won't type when button is touched). Have you had any luck 
getting it to work with Qubes OS 4.0?

John

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ca6a6e3-0af1-4c56-ac75-7d4c684cc29d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Hewlett_Packard-HP_EliteBook_2560p

2018-10-09 Thread Tom

Qubes 3.2 with TPM, TXT, and VT-d enabled.

Function keys work out of the box.

Wireless network doesn't resume properly after suspend and on wake the 
sys-net VM often crashes, requiring shutting down all VMs depending on 
network and starting them again in correct order.


Otherwise very compatible and stable machine.

Also boots and runs Qubes 4.0.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f3b7c56-e800-3378-76d6-c6215ab762dc%40bpam.uk.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-Hewlett_Packard-HP_EliteBook_2560p-20181009-174755.yml
Description: application/yaml


Re: [qubes-users] nftables vs iptables

2018-10-09 Thread mfreemon

On 10/8/18 10:56 AM, mfreemon wrote:

On 10/2/18 2:25 AM, Ivan Mitev wrote:

On 10/2/18 1:32 AM, Chris Laprise wrote:

On 10/01/2018 05:48 PM, mfreemon wrote:

On 1/11/18 3:01 PM, Chris Laprise wrote:
  > On 01/10/2018 03:47 PM, Connor Page wrote:
  >> The official templates use nftables so shouldn’t be mixed with
iptables. I didn’t have time to learn about nftables, so just removed
nftables package from debian 9 template. YMMV.
  >
  > Hmmm, I was just thinking how Qubes' own guest scripts still use
  > iptables even in fedora-26.
  >
  > IIUC, iptables and nft are two different interfaces to netfilter. I
  > don't know if it really matters, at least for the R4.0 window. I'd
  > prefer to put the syntax change (for docs) off until a later 
release.


I was recently thrown by the mix of both nftables and iptables in R4.

The qubes docs don't clarify much.  The qubes firewall scripts use
nft. Most of the discussion on the qubes website documentation is
about iptables, but there are also a few mentions of nft.  The upgrade
instructions (going from R3.2 to R4) did not mention converting rules
from iptables to nftables.  It looks like other related projects (one
example is qubes-tunnel) is using iptables.

Just reading a few things and trying to come up to speed, I get the
impression that nftables and iptables should not both by used at the
same time.  Even if technically possible (i.e. both sets of rules
applied correctly), it strikes me as not a great idea to maintain
packet filtering rules in two different ways.

What is the best practice recommendation on this (for R4, Fedora 28
template)?  Are we to be using, exclusively, nftables in R4?


The last I read about this (for 4.0) is that nftables is used in Fedora
Qubes code, but Debian Qubes is still using iptables. That still appears
to be the case since nftables is not installed in my debian-9 templates.

I've submitted qubes-tunnel to Qubes with iptables commands only, with
the intention to transition to nftables (or that other new interface in
Linux, name escapes me just now) for Qubes 4.1. Someone who is just
starting a project might be better off going with nftables.


... until yet another packet filtering mechanism replaces nftables (in
that case, bpfilter [1]).

I understand the rationale behind using nftables [2] but given how it is
widespread (hint: close to 0 even amongst seasoned sysadmins) IMHO it
wasn't worth it. The OP's post confirms there's quite some confusion
about how it interacts with iptables, and the official documentation is
far from helpful.
I'm quite proficient with iptables and networking in general but it took
me half an hour to understand how to tweak Qubes' nftables rules last
time I wanted to change something in the firewall, while I would have
done that task in less than one minute with iptables. I could have spent
a few hours learning nftables to improve the official doc but at my age
I prefer to spend time learning tech that significantly improves things
(eg. Qubes OS over standard linux distribution) over loosing time
learning stuff that is only marginally better.
Anyway - I digress :)

[1] https://old.lwn.net/Articles/747551/
[2]
https://github.com/QubesOS/qubes-issues/issues/1815#issuecomment-245109500 



I'm concerned about the confusion and unnecessary complexity here.

Network packet filtering is certainly (one of) those features that 
software such Qubes needs to be solid on (in both design approach and 
implementation detail).


Is the Qubes team confident in the current situation, such that users of 
Qubes should not be concerned?


nb.  This is not meant to be a criticism at all.  I very much appreciate 
the hard (and complicated) work going into Qubes.  I'm just looking to 
understand the current situation better so as to judge whether my 
concern is warranted or not.



As an example:  I'm wanting to enable some specific network traffic 
between two qubes.  The docs say to use iptables 
(https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes). 
 qubes-firewall-user-script also specifies iptables rules.  But 
qvm-firewall implements the rules it manages using nftables.  So the 
firewall VMs have both iptables rules and nftables rules in effect.  And 
these are different sets of rules.  It's not that the iptables command 
and the nft command are just two user interfaces showing the same packet 
filtering rules.  They are different packet filtering rules.  This seems 
like a receipt for disaster.


Is this the wrong forum for this discussion?  Should this be on 
qubes-devel, or an issue in qubes-issues at 
https://github.com/QubesOS/qubes-issues/issues?



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 

[qubes-users] Recreate boot content

2018-10-09 Thread thiago . chili
I have installed Qubes 3.2 and after some usage my /boot partition gone empty.

I'm dualbooting and I have been transitioning for qubes for a good reason.

So my question is can I recreate the files from /boot/efi?

I have tried booting the recovery mode + chroot into /mnt/sysimage. But on the 
chroot I had no grub2-install (qubes 3.2).

Any tips are appreciated

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/09e17c61-3911-45e2-89c1-b003a1801fb7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is it possible to install Qubes OS on another Internal Hard Drive partition?

2018-10-09 Thread Steve Coleman

On 10/8/18 4:42 PM, mirtilloaz...@gmail.com wrote:

If so, how do you do it?


The only reason I can think to do so would be to boot Qubes as an 
alternative OS, so I am guessing what you need is a multi-boot 
configuration.


You can read about that here:

Multibooting Qubes
https://www.qubes-os.org/doc/multiboot/


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/25b669e7-708d-a6ce-0c2f-3e2cdda617b5%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes and Mega Cloud App using

2018-10-09 Thread Ivan Mitev




On 10/9/18 11:39 AM, myblackcatisb...@gmail.com wrote:


Hello guys,

Since the Windows 7 HVM machine unfortunately does not recognize any external 
drives, I was forced to upload my documents to the Mega Cloud.


Qubes Windows Tools [1] allow you to copy files from/to a Windows VM to 
linux VMs. You could for instance mount your external disk in sys-usb 
and copy files to your windows VM from there. Wouldn't it be easier than 
downloading from Mega cloud ?


[1] https://www.qubes-os.org/doc/windows/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/081a6572-8378-bdf9-2854-1ab7d75bcae8%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Networking between qubes and HVMs

2018-10-09 Thread jmarkdavis86
I am still having difficulty getting these vms to be reachable with each other. 
Basically what I want to do is have a home security/automation vm, and a 
freenas vm, communicate with the outside world and with the vm that controls my 
access points/physical switches.

Currently I have the usual sys-net/sys-firewall. Each service vm(access points, 
freenas, etc.) Has its own firewall vm. Those fireall service vms are all 
connected to sys-firewall.

I followed the instructions in the qubes-firewall docs setting up forwarding 
between the service firewalls to travel through sys-firewall. And each service 
firewall vm(and their associated service vm), can ping every firewall vm in the 
system. But the actual service vms themselves cannot ping each other.

So for example: freenas vm > freenas vm firewall > sys firewall > home security 
firewall vm.
All will allow ping, but i cant get freenas to talk to home security vm, as i 
intend on using the nas storage to store the camera footage.

Similarly the home security vm can do the same amount of pings, but fails to 
talk to freenas.

I suspect NAT is the issue but lack the knowledge base to enable this to work.

I am not particularly dead set on using all these firewall vms either but this 
is the config thats gotten me the furthest so far. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78a21e71-1e3a-44ef-8afd-593987b20b01%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes and Mega Cloud App using

2018-10-09 Thread brendan . hoar
On Tuesday, October 9, 2018 at 4:39:54 AM UTC-4, myblackc...@gmail.com wrote:
> Hello guys,
> 
> Since the Windows 7 HVM machine unfortunately does not recognize any external 
> drives, I was forced to upload my documents to the Mega Cloud.
> 
> Unfortunately, I always get a script error when downloading files, or that 
> the Firefox capacities are insufficient. I have already increased the 
> execution of the script in Firefox and have reset the default settings of the 
> browser back to the default settings.
> 
> How can I download the Mega Cloud App under Qubes?
> Has anyone else a tip on how I can easily download larger files> 2GB with 
> Firefox?
> 
> I'm glad about help and your feedbacks.

Is it possible that the script/extension uses temporary space on a volume that 
doesn't have enough storage in it?

Open a terminal in the qube/vm that you attempting the download in and use the 
watch command to see if any of the volumes are getting full:

watch df

If a volume appears to be getting maxed out (or perhaps over 50% if the 
script/extension has to double buffer), then increase the size of the volume in 
the qube/vm's settings.

-brendan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/14b4d2cc-e86e-4780-b37b-2201c28beae4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes and Mega Cloud App using

2018-10-09 Thread myblackcatisback

Hello guys,

Since the Windows 7 HVM machine unfortunately does not recognize any external 
drives, I was forced to upload my documents to the Mega Cloud.

Unfortunately, I always get a script error when downloading files, or that the 
Firefox capacities are insufficient. I have already increased the execution of 
the script in Firefox and have reset the default settings of the browser back 
to the default settings.

How can I download the Mega Cloud App under Qubes?
Has anyone else a tip on how I can easily download larger files> 2GB with 
Firefox?

I'm glad about help and your feedbacks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e84b5715-eaa4-4f03-a126-66a7b8fe978b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.