[qubes-users] Lenovo BIOS update hashes (was: HCL - Lenovo Thinkpad X1 Carbon 4th gen (20FB))

2019-01-21 Thread Jean-Philippe Ouellet
On Tue, Apr 4, 2017 at 3:40 AM Jean-Philippe Ouellet  wrote:
> The latest BIOS hashes I observe are:
> $ sha256sum n1*17*
> 4b5488be128d9c022cd4924476d48e38dd55c38809db0f3a6c06f1a2d2ad0217  n1fuj17w.exe
> 918c836905db7709433b4dc03eddcbb04ccb8773f31f5b22b5b92388b56a3002  n1fuj17w.txt
> 5e5f9cfec0dcb299a033be0b4006af8697045876c4ef18a34716b894c48b917b  n1fur17w.iso
> 1dcdf1ffd2cd30be225db49e8210de2dabba32c5aaf3179a89e3d8f0cca61f3a  n1fur17w.txt
>
> Obtained from:
> https://download.lenovo.com/pccbbs/mobiles/n1fu{r{01..17}w.{iso,txt},j{01..17}w.{exe,txt}}
>
> Downloaded from multiple network positions over multiple days with
> matching hashes.

Bumping this...

If anyone sees differently, I would love to know.

I now observe the following hashes:

378a6305edb9397978e60b7908a85dd8c2546f2808cb845552d5e4a8ba9baab3  geteltorito.pl

c1097a887cff07ef1f67edb8b7dabff0e3005c2251116c0754e5eb0830f32430  n1fuj01w.exe
cf6b5ab8fa0d8a99ffb74b74d6c94c3fbe48708ffb29ef41e07a23e148b297ef  n1fuj01w.txt
cd9c4a2df77f6108474cc1e17e6f1170a0e03e7bc256d800f5258c3346c93e49  n1fuj02w.exe
eec6b405f6ceae42612d8b62ae25096cd30f43dc4689ebe840280d435947764c  n1fuj02w.txt
58c0b4bc74663a548713b9922b4db70151279407f9bdf3ef418002a09ef4a9d3  n1fuj03w.exe
622f9cb43bc4d4a19af52975be68dcc37d20ac691602f4ac1714986c3a537b02  n1fuj03w.txt
7c505961e2745ec31a4a993a1031e975a0827f773575a2405a883a08d8a4452e  n1fuj04w.exe
9eff5cdd020656a5665532a1f7cb37882793f6a5740b90d815fddf17dd394f9a  n1fuj04w.txt
510abd4ba7e3c185c13d19eab76b96d1340deee25a47f81a5c47fa1bf6f7f62c  n1fuj05w.exe
4bd87344f2f3bf8ac8f5ad52ed2362cd144631ead66cafa82027053a0d25f713  n1fuj05w.txt
8934bc9b00b3aab1d6044e0fc1f843cd7812ec90c8d4a8c594247d6f9c8cc5c2  n1fuj07w.exe
3762fe8ac73a687d9cfd41503b2b4b6f225761e5275892da9744ac5d84d6b96c  n1fuj07w.txt
9aca522cad73123054a351699108d3c2c492eaf0c8466a85aef3cd598910ed8a  n1fuj08w.exe
ef1c8620d7b8e89be88f8230a4707340213c8e44db38008a10bcee1e5ecffe2e  n1fuj08w.txt
5fdfc28923ea4fd0908bcd877cbe08971f65db954aa30d3fc0066c9ab98da508  n1fuj09w.exe
a969a9c5c2cb1887fc8552ba70dc5873bcaecda9601fdba47496b0e37591b02d  n1fuj09w.txt
294e47c8f3435cf2b0d43aef733347ab6fd8494dcda04df2eac2d3f1d4c9cbea  n1fuj10w.exe
7ed28a40f7944462e67a18ae87e7f2d5edb9ee95e94899f9e7f05fa5b63a4081  n1fuj10w.txt
0b255f1e411506564e17f6c958033e3ab65536580bd818a5992caecc7301dbf5  n1fuj11w.exe
a67d94483ce16318dc8e17611cf38565304dc96a790577669ea90070a9406fd9  n1fuj11w.txt
0e13111e41f0ae79c0941865ee9647a19b698368ae71d1fca81f35a837463b85  n1fuj12w.exe
c10ed88917a7f8779059a07e9f517b925a2ba714040518f019293728bbe4b0eb  n1fuj12w.txt
903196dbf8203c322698b47236ba0bae7ba90289f393388a2a309c50374380c6  n1fuj13w.exe
e13fdf934c2e876741ee1334319935ae068dd25074323fd62d13f036ad942e11  n1fuj13w.txt
06074abd89cc023f0e815ea6375bf96649cfebea358be29ddd0f91bf3afe47f2  n1fuj14w.exe
c940dc7bf33fca19d23d755d3148ef52669dbb32b9f7762de70e3b95993faff9  n1fuj14w.txt
ce7c38435511a332d6c3ea8fd3291f7fff5815d1b73be0b01eea5c38229609c5  n1fuj15w.exe
83b2a8a17be3e0e23465d419c130e389ea3134d3d4fbfd3b6d38962651e3  n1fuj15w.txt
e069a8cd0e4f01da260085eac3742123f0f05f33dc476bd4820cead9ce54b9d7  n1fuj16w.exe
49bbe527d17937dcb5cd5e0a5abd565a712b4b0d44eb6c78aaffcac2f558c4e7  n1fuj16w.txt
4b5488be128d9c022cd4924476d48e38dd55c38809db0f3a6c06f1a2d2ad0217  n1fuj17w.exe
918c836905db7709433b4dc03eddcbb04ccb8773f31f5b22b5b92388b56a3002  n1fuj17w.txt
cde452963d3a12a9375f1ccd5b8f9db113e285bd76cc099d89c037b46204a7dd  n1fuj18w.exe
4d8ac7a3200b73f19c724bcc9f06e5caf626121ee77dd157505eae0a14f8249d  n1fuj18w.txt
261375c8609331ee2f3adc2c5aaf968ddc501f2b5a6161156d2393e08a0366c7  n1fuj19w.exe
443a60ee8ff7cedcbd66d2fd1e2d69392e1eaaae3ae32507f680526c77fa04b5  n1fuj19w.txt
5b3079c922a4210c0a19bf3b7ea7a44310810109c8865d1ddfb202d26e1303d8  n1fuj20w.exe
65ad67bbdcb31ff87588b3a15705150c044ac1ff79dde726e39349c345e49eaa  n1fuj20w.txt
f77453a0d42fa4a4bcbec51085c7f7b9a72224f220fad8649cbc854e4e4ea10e  n1fuj21w.exe
7434c1debd14a1aee071a15a2ba082f47209766d77a0828b3e9b4801cc24afa1  n1fuj21w.txt
0e7e771e31002f27fd313c9d142fde491c8639092cf8a3d7c150010af3575722  n1fuj22w.exe
8d3f40bf296984d07c9cee53ea15b4f12c1129898bc5f83415e3ddf003c42a6c  n1fuj22w.txt
25494ccbf473437769eb71e9dc1639440460421c54318184cc2ad3ddf7a9b00a  n1fuj24w.exe
ef4ab767f78c42c549751b905d34b687328d71c5d86483d4cec24f6c61f97be8  n1fuj24w.txt
2ef53f0a56109da13b27996ce0fd56d01cc4ddfe8c45f3d304fd5ddd4172f9b2  n1fuj25w.exe
14c4e07bfd4fa0a50936c82135a3a9f06ada6b2213e86f54e9ec271c660f0b1a  n1fuj25w.txt
c7347f4ac6ad5c9fc460166907136b15d07ad50cae33cccdf2c36dac9efc78bc  n1fuj26w.exe
bce85d5fe3009305085b9fa0b91650a28f11871abcd00dca1e8a1a309e57b927  n1fuj26w.txt
104608e2de978e38d1813dc6427961b0f112fbb89f899423c46647eff4bfb294  n1fuj28w.exe
ae73d24a1fa7521f426dd778e3eb3f8603be158cf53ee70e30be724d32aeea54  n1fuj28w.txt
df3fb0d57cec4a979abcd7dd1a6ecb98f89089545127a9a4affefbe76756ccb6  n1fuj29w.exe
f4711a5f16157049b266f475a62cf52d96398090a7ccec3a24471197f17bdbcb  n1fuj29w.txt

Re: [qubes-users] hard disk locked after trial run

2019-01-21 Thread unman
On Mon, Jan 21, 2019 at 09:03:40AM -0800, Dieter Zakel wrote:
> I have installed the Qubes-OS on my laptop as a trial run and now I am unable 
> to install another OS.
> Because dom0 is locked...
> When trying to install linux the partitioning process freezes...
> Has someone any idea how to remove this security feature?
> Thank you very much! 
> 

Do you want to replace Qubes, or install another OS alongside it? What
you need to do depends on how much space you allocated to Qubes in the
first place.
Also different depending on whether 3.2 or 4.0, and which OS you have in
mind.

If you have encryted drive and want to shrink partition to make space
for new OS this can be done, but is somewhat involved.
If you just want to remove Qubes and your new installer cant handle it,
boot from a live linux USB, and use gparted to remove the Qubes
partition.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190121234433.jegr47uhpmoxwmcu%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removal of debian-9 template fails because is marked as installed by packetmanager.

2019-01-21 Thread unman
On Tue, Jan 22, 2019 at 07:24:37AM +1100, Eric wrote:
> 
>   
> 
>   
>   
> On 1/22/19 5:35 AM, gone wrote:
> 
> 
>   Hi,
> I've done too many changes to my debian-9 template and would
> like to reinstall a "pure", original debian-9 template
> again.
> So I cloned it and based all the existing debian App-VMs on
> the clone-template. 
> But removal of debian-9 template fails because it is marked
> as installed by packetmanager.
> How can I remove and reinstall it?
> 
> 
> 
> in dom0: sudo qubes-dom0-update --action=reinstall
>   qubes-template-debian-9
>   
> 
> 
> 
> 
> -- 

Hi Eric
Your answer is partly right, but all that HTML gets in the way.
Can you switch to plain text please?

Also reinstall will try to install the *same* version that is currently
installed, although there may be a more recently built template
available.
You can work round this by:
sudo dnf remove qubes-template-debian-9
sudo qubes-dom0-update qubes-template-debian-9

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190121233500.d5hpcrumdtelum4b%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: removal of debian-9 template fails because is marked as installed by packetmanager.

2019-01-21 Thread gone
Thank you Eric. This brings
Using sys-whonix as UpdateVM to download updates for dom0;
this may take some time...
Usage: yumdownloader [options] package1 [package2]
[package..]

Command line error: no such option: -a

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8da.5c4639bc%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Account

2019-01-21 Thread Mike Keehan
On Mon, 21 Jan 2019 20:44:30 +0100 (CET)
 wrote:

> I signed up for an account with Qubes and got the confirmation, and
> here I am.  But when I go to post a reply, I am not recognized.  Does
> anyone know why that is?
> 
> Thank  you.
> 

Your reply has to go via the gmail server.  I had the same problem
when my replies were being sent via my main email account's server.
I had to select the gmail server for replies to Qubes emails.

Mike

(this may not be your problem, but it was for me.)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190121205854.7774a581.mike%40keehan.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removal of debian-9 template fails because is marked as installed by packetmanager.

2019-01-21 Thread Eric

  
  
On 1/22/19 5:35 AM, gone wrote:


  Hi,
I've done too many changes to my debian-9 template and would
like to reinstall a "pure", original debian-9 template
again.
So I cloned it and based all the existing debian App-VMs on
the clone-template. 
But removal of debian-9 template fails because it is marked
as installed by packetmanager.
How can I remove and reinstall it?



in dom0: sudo qubes-dom0-update --action=""
  qubes-template-debian-9
  




-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2332c1c6-ea90-e492-9466-879ce0c83888%40asar.biz.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Account

2019-01-21 Thread kitchm
I signed up for an account with Qubes and got the confirmation, and here I am.  
But when I go to post a reply, I am not recognized.  Does anyone know why that 
is?

Thank  you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LWlwKri--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] removal of debian-9 template fails because is marked as installed by packetmanager.

2019-01-21 Thread gone
Hi,
I've done too many changes to my debian-9 template and would
like to reinstall a "pure", original debian-9 template
again.
So I cloned it and based all the existing debian App-VMs on
the clone-template. 
But removal of debian-9 template fails because it is marked
as installed by packetmanager.
How can I remove and reinstall it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d6.5c461108%40qubes-os.info.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Firefox Account SyncVM

2019-01-21 Thread R A F
I understand your point here but what if I simply do not want to sync my 
bookmarks, history etc with the cloud. What if I do not want to share those 
bookmarks between AppVMs. But what if I need to sync this offline inside AppVM 
that I use in specific domain? The problem here is that in many cases users are 
forgetting to backup their goodies and not everyone want to sync all this with 
cloud account. I'm not expert in that area and trying to find out if anyone 
know it this type of sync is even possible.

Thanks Guys.
Raf

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3110faa5-8f24-4410-b213-bb41543361ea%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] hard disk locked after trial run

2019-01-21 Thread Dieter Zakel
I have installed the Qubes-OS on my laptop as a trial run and now I am unable 
to install another OS.
Because dom0 is locked...
When trying to install linux the partitioning process freezes...
Has someone any idea how to remove this security feature?
Thank you very much! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a50cc23d-8094-419c-ac57-4c92d72f7e3d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-prefs clockvm command fails

2019-01-21 Thread unman
On Sun, Jan 20, 2019 at 11:16:17PM -0800, goldsm...@riseup.net wrote:
> On 2019-01-20 23:57, unman wrote:
> > On Sun, Jan 20, 2019 at 04:42:12AM -0800, goldsm...@riseup.net wrote:
> >> I'm following qubes docs
> >> https://www.qubes-os.org/doc/disposablevm-customization/ and trying to
> >> set clockvm to disp-sys-net using command in Dom0 qvm-prefs clockvm
> >> disp-sys-net
> >> which gives message: qvm-prefs: error: no such domain clockvm. Have
> >> tried variations of clockvm e.g. ClockVM to no avail.
> >>
> >> As an alternative fix, I set clockvm to disp-sys-net in gui "global
> >> settings". Buy not sure its working
> > 
> > Look again - that should be qubes-prefs not qvm-prefs
> 
> Thanks Unman
> That was a dumb mistake on my part.
> Sorry to waste your time

No need to apologise. It's easy to do, particularly after a list of
"qvm-pref" commands.
We all make mistakes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190121130544.5epdi5sm6hpbhkir%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] XSA-289 does not affect the security of Qubes OS

2019-01-21 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The Xen Project has published Xen Security Advisory 289 (XSA-289).
This XSA does *not* affect the security of Qubes OS, and no user
action is necessary.

XSA-289 is unusual in that it does not disclose any new
vulnerabilities. Rather, it is only for the purpose of providing
information about previously-disclosed vulnerabilities. These
vulnerabilities were all patched in Qubes OS as part of QSB #43 [1],
which we published on 2018-09-02. Therefore, XSA-289 does not affect
the security of updated Qubes OS installations. This XSA has been
added to the XSA Tracker. [2]


[1] https://www.qubes-os.org/news/2018/09/02/qsb-43/
[2] https://www.qubes-os.org/security/xsa/#289

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/01/21/xsa-289-qubes-not-affected/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=CuoE
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce3e128e-b180-2d54-6c54-c6b345b0346c%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: dom0 clock keeps resetting to wrong time again

2019-01-21 Thread Marcus Linsner
On Sunday, January 20, 2019 at 7:02:34 PM UTC+1, john s. wrote:
> On 1/20/19 12:06 AM, Andrew David Wong wrote:
> > On 19/01/2019 5.08 PM, John S.Recdep wrote:
> >> On 1/14/19 9:55 PM, John S.Recdep wrote:
> >>> On 1/14/19 10:10 AM, John S.Recdep wrote:
>  Hello,
> 
>  I believe my Bios time is UTC
> 
>  qubes-prefs shows my clockvm  as sys-net
> 
>  I have been trying to use sudo date --set <"localtime TZ">  to
>  get my dom0 correct.  Which it does but within 30-60  it is
>  changing to another TZ I don't recognize
> 
>  I have also tried  qvm-sync-clock  ,  and tried a qubes group
>  search as I remember fighting this out many times   with whonix
>  issues , however
> 
>  I am at a loss what to do further to problem-solve fix this  , 
>  appreciate your help
> 
> 
>  maybe I can switch the template for sys-net back to fedora-28
>  instead of -29  . ?
> 
> >>>
> >>> 1-14-19
> >>>
> >>> changing the clockvm to fed-28 and rerunning qvm-sync-clock did
> >>> nothing BUT*  changing sys-net to debian-9  and qvm-sync-clock
> >>> fixed it   sigh
> >>>
> >>> case anyone else gets this issue again ; prolly will fix
> >>> whonixcheck complaints if any as well
> >>>
> >>> 'solved'
> >>>
> > 
> >> Must be related to this 
> >> https://github.com/QubesOS/qubes-issues/issues/3983
> > 
> >> for myself it's not the  minimal fedora-29 its the regular one ;
> >> and it appears if fedora-29 is having time issues  that  that may
> >> be why my thunderbird appvm based on it,  is also  timestamping the
> >> messages wrong ?
> > 
> > 
> > Try the workaround mentioned in the comments on that issue, if you
> > haven't already. It's worked for me so far.
> > 
> > 
> 
> 
> well if you mean:
> 
> in the Fedora-29 template doing
> 
> sudo chmod 700 /var/lib/private
> 
> 
> [user@fedora-29 ~]$ sudo ls -l /var/lib/private/
> total 4
this looks inside the private dir, but what you want is to look at the dir 
itself, here's two ways:
[user@sys-firewall ~]$ stat /var/lib/private/
  File: /var/lib/private/
  Size: 4096Blocks: 8  IO Block: 4096   directory
Device: ca03h/51715dInode: 397353  Links: 3
Access: (0700/drwx--)  Uid: (0/root)   Gid: (0/root)
Access: 2018-05-24 01:13:40.23200 +0200
Modify: 2018-05-24 01:13:40.23200 +0200
Change: 2018-12-20 03:21:32.44700 +0100
 Birth: -

[user@sys-firewall ~]$ ls -la /var/lib/|grep private
drwx--  3 rootroot4096 May 24  2018 private


> drwxr-xr-x 2 root root 4096 Dec  9 15:37 systemd
> [user@fedora-29 ~]$ sudo chmod 700 /var/lib/private/
now that you've already run this, it should be fixed already :)
> [user@fedora-29 ~]$ sudo ls -l /var/lib/private/
> total 4
> drwxr-xr-x 2 root root 4096 Dec  9 15:37 systemd
> 
> 
> doesn't seem to change any permissions on the systemd  directory  so
> . doesn't seem like that is going to fix anything ?  maybe I'm
> missing something basic?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44e5d8af-9bf4-42c0-adea-cd90869af086%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.