Re: [qubes-users] Qubes 3.2 whonix 14 connects to tor, but there is no connection

2018-11-15 Thread Franz
On Thu, Nov 15, 2018 at 4:47 PM pieter lems  wrote:

> is sys-net connected to the network?
>

yes

And are you using an ethernet cable to connect to internet,
>

no I am connected by wifi

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qB0GvoySxxQ65eEGpxeyqt-oEp7JkQGDkSAeheu4vDSbw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] alternative to bloated templates for faster work and minimal boot time/resources used

2018-11-15 Thread Chris Laprise

On 11/15/2018 12:29 PM, 799 wrote:

Hello,

Am Do., 15. Nov. 2018, 09:44 hat > geschrieben:


Is it possible to transfer sys-net/sys-usb/sys-vpn/sys-whonix to
100mb templates based on musl/busybox/sysvinit linux ?
(...)


my sys-vms are based on fedora-28-minimal templates.
Honestly I like the idea and think smaller is better, but as I am 
running lots ~8-12 AppVMs when working productively most ressources are 
used by those VMs.


I don't think that you gain that much ressources by switching sys-vms.
And honestly storage capacity is not a big deal today ;-)


Disk capacity shouldn't be a big issue unless you like to make lots of 
template variations.


For RAM efficiency the available templates are already pretty efficient, 
but the Qubes RAM allocation algorithms could be better. Manually 
setting the maximum RAM has worked great on my 8GB system: about 350MB 
for each service VM, 700-900MB for media playback, 1500-2500MB for 
browsing and other heavy apps. Finally, I set the dom0 max to 1500MB in 
/etc/default/grub. Using debian-9 templates, these ranges result in a 
system that is *much* more usable than it would be with the default RAM 
allocation; I highly recommend it.




--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d272fbef-32ad-5db6-1a7a-9ad012f8e072%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qubes-open fails

2018-11-15 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Since a day or two, I get the following error messages when attempting
to open a file in a DVM...

"Unable to handle mimetype of the requested file (exit status: 768)!"

So I started the VM that is the template for the DVM

qvm-run -a dvm-offline xterm &

and experimented...

1) calling xdg-open directly works
2) calling qubes-open does not

user@dvm-offline:~$ xdg-open test.pdf
user@dvm-offline:~$ qubes-open test.pdf
xdg-mime: mimetype argument missing
Try 'xdg-mime --help' for more information.
/usr/bin/xdg-open: line 881: x-www-browser: command not found
/usr/bin/xdg-open: line 881: firefox: command not found
/usr/bin/xdg-open: line 881: iceweasel: command not found
/usr/bin/xdg-open: line 881: seamonkey: command not found
/usr/bin/xdg-open: line 881: mozilla: command not found
/usr/bin/xdg-open: line 881: epiphany: command not found
/usr/bin/xdg-open: line 881: konqueror: command not found
/usr/bin/xdg-open: line 881: chromium: command not found
/usr/bin/xdg-open: line 881: chromium-browser: command not found
/usr/bin/xdg-open: line 881: google-chrome: command not found
/usr/bin/xdg-open: line 881: www-browser: command not found
/usr/bin/xdg-open: line 881: links2: command not found
/usr/bin/xdg-open: line 881: elinks: command not found
/usr/bin/xdg-open: line 881: links: command not found
/usr/bin/xdg-open: line 881: lynx: command not found
/usr/bin/xdg-open: line 881: w3m: command not found
xdg-open: no method available for opening 'test.pdf'

What could cause this? I haven't actually changed anything other than
running regular updates on the template. As far as I can see
qubes-open is a wrapper script around xdg-open setting some
environment variables.

/Sven
-BEGIN PGP SIGNATURE-
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=bvaM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47d03b63-2727-1a38-49a6-76e63cf889f8%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] alternative to bloated templates for faster work and minimal boot time/resources used

2018-11-15 Thread 799
Hello,

Am Do., 15. Nov. 2018, 09:44 hat  geschrieben:

> Is it possible to transfer sys-net/sys-usb/sys-vpn/sys-whonix to 100mb
> templates based on musl/busybox/sysvinit linux ?
> (...)


my sys-vms are based on fedora-28-minimal templates.
Honestly I like the idea and think smaller is better, but as I am running
lots ~8-12 AppVMs when working productively most ressources are used by
those VMs.

I don't think that you gain that much ressources by switching sys-vms.
And honestly storage capacity is not a big deal today ;-)

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2sMER5u3o3AKcx6qvfT978BjAvURVAmJjvE2Z-cJSs2MQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] R4.0.1 RC1 - qubes-dom0-update not working

2018-11-15 Thread Alex
On 11/15/18 5:30 PM, Dominique St-Pierre Boucher wrote:
> Hello Qubes Users,
> 
> Just installed RC1 on 2 laptops. This is working fine for install and 
> template. Working fine for template update.
> 
> My issue is that qubes-dom0-update does not work for qubes repo. This is the 
> message I am getting:
> 
> Failed to synchronize cache for repo 'qubes-dom0-current', inoring this repo.
> 
> With my check on what is appening in qubes-dom0-update and what is appening 
> with yum, I think that the variable for the release is not set correctly and 
> it prevents yum from connecting to the repo.
> 
Yes, has been handled in bug 4477
https://github.com/QubesOS/qubes-issues/issues/4477 that seems to have
been resolved a couple of days ago.

To perform the first upgrade that fixes the problem, though, I think
that you can use --releasever=4.0 as a parameter to qubes-dom0-upgrade.

Did not try it myself because I solved it by manually correcting the URL
in /etc/yum.repos.d/*.repo

-- 
Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ba3269b-d015-5f7b-0cf7-44c0f46c4f8d%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] R4.0.1 RC1 - qubes-dom0-update not working

2018-11-15 Thread Dominique St-Pierre Boucher
Hello Qubes Users,

Just installed RC1 on 2 laptops. This is working fine for install and template. 
Working fine for template update.

My issue is that qubes-dom0-update does not work for qubes repo. This is the 
message I am getting:

Failed to synchronize cache for repo 'qubes-dom0-current', inoring this repo.

With my check on what is appening in qubes-dom0-update and what is appening 
with yum, I think that the variable for the release is not set correctly and it 
prevents yum from connecting to the repo.

So here are my questions:

1- Am I right?
2- How do I fix it?

Thanks

Dominique

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50113c5a-71cb-4b88-8c55-5038b768859d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] System won't start after adding video card to qube

2018-11-15 Thread imestin
Running fsck on /dev/mapper/qubes-dom0-root solved the problem.Had to promp "y" 
10-20 times

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LRMrNEw--3-1%40tuta.io.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - CGS X230

2018-11-15 Thread 'Jakob Traxler' via qubes-users
Everything works nicely out of the box with Coreboot and neutralized Intel ME. 
I got myself the CGS version 2.1 and chose a USB flashdrive for Two-factor 
authentication while decrypting my SSD. Qubes was preinstalled on the X230, 
although I'm struggling with the Windows tools.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4bthNUzCdoAb0Q8vptJ3OSRqudHyeeGLKVWeASst248Q3LNskwNon09sEtqUIMtO3ddUbpnR3mu3QFwUxWJ0CdTWl1IC1a98LMQqODq1wD8%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-2325BFG-20181115-133437.yml
Description: application/yaml


Re: [qubes-users] Re: system doesn't boot after update

2018-11-15 Thread stas2855
Hello

Thanks for reply 

I deleted new kernel from /boot but it still not loading with old one 

Any other suggestions

Thanks 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd32bf70-bc20-4a0e-b170-4ddaaa3993c0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2018-11-15 Thread cenapatop689
Hello,

is it possible to build the kernel with the -fsanitize=safe-stack option?

I have tried make CC="clang -fsanitize=safe-stack" CXX="clang++ 
-fsanitize=safe-stack"

but it doesn't display any clang work.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86776aa4-0afe-450c-b11a-c53ea495491c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2018-11-15 Thread cenapatop689
How is it possible to build the kernel with Clang with the 
-fsanitize=safe-stack option?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b707cf7-0ed0-466d-98bc-033c7f8f976f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL - Purism Librem 13 v2

2018-11-15 Thread Holger Levsen
On Thu, Nov 15, 2018 at 10:07:31AM +0100, qubes-...@tutanota.com wrote:
> > has this (updating the HCL for Librem 13v2) happend now?

this was and is my point, here+now.


-- 
cheers,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181115101617.d7le3rnrqvculqd4%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: PGP signature


Re: [qubes-users] HCL - Purism Librem 13 v2

2018-11-15 Thread Thierry Laurion


On November 14, 2018 9:14:58 PM UTC, 799  wrote:
>Hello 22rip,
>
>Am Mo., 12. Nov. 2018, 03:26 hat <22...@tutamail.com> geschrieben:
>
>> (...)
>> However I think your "..Pretty easy to maintain.." would be hell for
>me.
>> (...)
>> I checked out the x230 and you are right they are available and
>cheap. I
>> would still be interested in finding some company/individual who I
>can
>> trust to take care of the BIOS flashing for me as a service
>
>(I would think others would also want this service as well...). The
>problem
>> is who?
>>
>
>I was at the same point some time ago and afraid to give coreboot a
>try.
>I went to a hacking space and got some help from experienced
>"Coreboot'ers".
>I've seen that it is not that hard to build Coreboot and tried it
>myself
>from scratch.
>If you own a X230 you might want to look at my How-to which I wrote
>during
>the process and is targeted at coreboot newbies:
>
>https://github.com/Qubes-Community/Contents/blob/master/docs/coreboot/x230.md
>
>If you need further help, do not hesitate to ask.
>It's really not that hard to use coreboot.
>
>- O
>
>-- 
>You received this message because you are subscribed to the Google
>Groups "qubes-users" group.
>To unsubscribe from this group and stop receiving emails from it, send
>an email to qubes-users+unsubscr...@googlegroups.com.
>To post to this group, send email to qubes-users@googlegroups.com.
>To view this discussion on the web visit
>https://groups.google.com/d/msgid/qubes-users/CAJ3yz2uRx8c_fQ2dxvuJwwqiy_s_Mtr3aSXyz6wxFpFYYv237g%40mail.gmail.com.
>For more options, visit https://groups.google.com/d/optout.

Hi all,
Last intrusion to this thread.

I would strongly advise digging into the skulls project anyone interested in 
flashing coreboot into their x230 themselves :  
https://github.com/merge/skulls/blob/master/README.md

Sincerely, 
Thierry

--
Sent from my Android device with K-9 Mail. Please excuse my brevity.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/881038F9-9D0E-4FE8-B916-7BC3B2709F37%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL - Purism Librem 13 v2

2018-11-15 Thread qubes-fan
Hi Holger, if this point was to me :), sorry for "hijacking" the thread. The 
flame about Purism laptops here got a bit hot with RYF-puristic guys last time, 
and the questions (one can work with), were mostly unanswered. But they were 
basically right. 

Just to remind you, I had a conversation directly with the Todd Weaver about, 
if I remember properly, 2 weeks before they announced the ME cleanup. He told 
me in the conversation that they will completely remove the ME ( 2 weeks before 
the announcement), and they actually didn't. I am not blaming them, maybe he 
was just misinformed. I am just a semi-tech, and as many others I am not able 
to check stuff in depth, cause my extensive specialization is elsewhere. I am 
depending in Tech-Threat-Modeling on ppl like you or Thierry or Joanna, same 
way as you are depending on psychology specialists on psychology part of your 
Threat  Modeling (right)?

The implications of the claim "ME is completely removed" from Purism, can be 
extensive If I (or anyone else) advice to an organization (lets say a large, 
influential one), as a trusted advisor, the Purism laptops with claim: "ME is 
completely removed and your attack map is shrinked to this or that" and it is 
not.  It can kill the relation and even worse, put the organization in risk by 
not considering the threat in their OpSec. This is THE SHAME.

I can't help myself but, after that "mistake" from Purism I must include this 
to my Trust Model as a handicap for them. They should just make this clear 
somehow.

Thierry finally cleared this up somehow (at least for me), and put some light 
for decision making. This is actually something I can work with. 

Have a nice day :)


Nov 14, 2018, 10:30 PM by hol...@layer-acht.org:

> On Sat, Nov 10, 2018 at 09:24:40AM -0800, Kyle Rankin wrote:
>
>> It's a shame this thread got hijacked by people...
>>
> [...discussing other stuff...]
>
>> Could someone who is responsible for the HCL please update it with the data
>> I've provided in this thread? This would update the HCL with a version of
>> the Librem 13v2 that provides a TPM for people who are considering running
>> Qubes 4.0 with AEM.
>>
>
> has this (updating the HCL for Librem 13v2) happend now?
>
>
> -- 
> cheers,
>  Holger
>
> ---
>  holger@(debian|reproducible-builds|layer-acht).org
>  PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to > qubes-users+unsubscr...@googlegroups.com 
> > .
> To post to this group, send email to > qubes-users@googlegroups.com 
> > .
> To view this discussion on the web visit > 
> https://groups.google.com/d/msgid/qubes-users/20181114213042.y4w4qdaogapxq...@layer-acht.org
>  
> >
>  .
> For more options, visit > https://groups.google.com/d/optout 
> > .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LRLc0ca--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] alternative to bloated templates for faster work and minimal boot time/resources used

2018-11-15 Thread travorfirefuelcan
Is it possible to transfer sys-net/sys-usb/sys-vpn/sys-whonix to 100mb 
templates based on musl/busybox/sysvinit linux ?

use wpa_supplicant instead of network-manager with tons of scripts
use cli 

use cli instead of gui (sxiv,st, fff, surf, mpv, ncmpcpp, mutt, weechat etc)

for minimum RAM usage and disk space requirements

it is also discussed here
https://www.reddit.com/r/Qubes/comments/9upqfd/qubes_and_light_weight_distros_fo
r_t400_or_t420/

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/205a2f56-80ec-41b2-ab82-eec3e3830c5d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.