Re: [qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-02-26 Thread Vít Šesták
I was able to run PrimeOS live, but I had exactly the same issue with 
installation.

The explanation with /dev/xvdX sopunds plausible. Maybe it has a half support 
for Xen virtual devices – the kernel supports them (so they are not emulated 
like in Windows), but the installer has no idea about them…

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/026DBC86-D4A9-42D1-8CD5-AFBF8EE7BEB6%40v6ak.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-02-26 Thread Yethal
W dniu środa, 27 lutego 2019 00:24:09 UTC+1 użytkownik 799 napisał:
> Hello Yethal,
> 
> 
> On Tue, 26 Feb 2019 at 00:08, Yethal  wrote:
> 
> >> Can't we just use a prebuilt image such as PrimeOS?
> 
> 
> I downloaded PrimeOS and created a HVM but I am unable to choose a harddisk 
> from within the PrimeOS installer.
> Even when my "primeos-Qubes" has a 20G root device:
> 
> 
> PrimeOS keeps saying "Ok. There is no hard drive to edit partitions" when I 
> try to choose my harddrive during installation.
> Have you tried to install PrimeOS within Qubes?
> 
> 
> 
> - O

Interesting. I did manage to install and run PrimeOS in VirtualBox on my 
non-Qubes box but on Qubes I ran into the same issue. It appears the PrimeOS 
installer searches for block devices under /dev/sdX whereas Qubes exposes them 
under /dev/xvdX

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa89c2d4-fd7a-4c23-8806-7b40d911669f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: No Bootable Devices Found with /boot/efi/ Missing

2019-02-26 Thread 'awokd' via qubes-users

'Rainier30' via qubes-users:



So, the black screen isn't instantaneous. There is a little text that shows up for a 
second or two before it goes black. I changed the boot order setting so that only UEFI 
showed up. When I selected "UEFI: SanDisk", the following is the what appears:

Xen 4.8.4 (c/s) EFI loader
Using configuration file 'BOOTX64.cfg'
vmlinuz: 0x41103000-0x416e2b20
initrd.img: 0x3fdad000-0x41102168
0x:0x00:0x1f.0x6: ROM 0x10400 bytes at 0x5044f018


OK


[qubes-verbose]
options=console=vga efi=attr=uc
# noexitboot=1
# mapbs=1
kernel=vmlinuz inst.stage2=hd:LABEL=Qubes-R4.0-x86_64 i915.alpha_support=1
ramdisk=initrd.img"

Sadly, I don't understand that. I'm also a little confused about where to make

these alterations. I understand how to get to a shell in Troubleshooting mode

in the installer, but I could only get there in Legacy boot. Is this for

somewhere else?


Yes, I guess these steps aren't very detailed:

"Attach the usb disk, mount the EFI partition (second partition 
available on the disk)
Edit your xen config (xen.cfg/BOOTX64.cfg) changing the kernel key to 
add your kernel parameters on the boot entry of your choice"


You want to edit the xen.cfg file directly on your Qubes install USB 
drive. You might be able to do it from Troubleshooting mode, but it 
could be easier if you had access to another computer running some type 
of GNU/Linux live boot/rescue and could edit it from there.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c07c98e3-fa4a-11bc-1b41-dbede4587ae3%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Weird dnf update command behavior on fedora-29 template

2019-02-26 Thread Sphere
It started happening just today
Executing sudo dnf update command on my fedora-29 template forcefully makes my 
sys-net start

But thing is, I'm no longer using sys-net template as my net vm and this caused 
me to triple check my settings and my update VM is showed correctly as I had 
intended = a VM designed to securely process DNS queries that is attached to 
sys-firewall

Despite this, the behavior continues, even if I kill and/or halt my fedora-29 
template and I have no clue as to why this happens it's like something is 
forcing it to use sys-net in an attempt to get through my secure processing of 
DNS queries

I also double checked that the template has no assigned net vm as intended 
according to how Qubes was designed and it's also set properly to 'none'

It's absolutely persistent to the point that I ended up deleting my sys-net 
template and now the sudo dnf update command abruptly ends with "Error: Failed 
to synchronize cache for repo 'fedora-modular'"

Can anyone help me with the logs to check/commands to use in diagnosing this 
problem properly?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/12e13d20-2841-4576-8ddb-a2db1a941008%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-02-26 Thread 799
Hello awokd,

>> [...]
>> You might want just the 800x600 setting, and maybe not Cirrus...
>> [...]

I was able to change the resolution, so that the android AppVM can run on
my lowres x230:
On launch I added the follwing line to grub: video=800x600-32

Unfortunately I have to do this on each run, as I don't know how and if I
can push those setting into the Android Qube.
I tried to find something like /boot from within the Android AppVM using
the Terminal Emulator, but I didn't succeed.
So how can I update grub of the Android AppVM?

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2vW7kShiNW6gVuSrJPnFSBauGfAPXa12-G2a8-uQKXJuA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Lenovo Carbon X1 Gen 6 20KHCTO1WW

2019-02-26 Thread Nick Johnson
Everything was surprisingly smooth and easy. Thanks to BIOS and kernel
upgrades, I didn't need to apply any patches to get suspend/restore
working. I made the following adjustments:
 1. Change BIOS sleep mode from Windows to Linux.
 2. Remove the Thunderbolt 3 controller from the device list for the
sys-usb Qube.
 3. Followed the DPI scaling guide at
https://github.com/Qubes-Community/Contents/blob/master/docs/customization/dpi-scaling.md
to
have sane-looking fonts and UI elements. I have the WQHD display, and found
that setting the DPI to 192, while not precisely accurate, gave a good
result. In VMs, a text-scaling-factor of 1.25 seems about right;
scaling-factor appears to have no effect.

I did NOT enable BIOS support for Thunderbolt 3 as recommended in some
other HCL reports; doing so fixed the lockup-on-wake issue, but at the cost
of disabling all USB devices. Leaving this disabled and removing the
thunderbolt controller from the sys-usb device list fixes the issue and
doesn't seem to affect USB support at all, as far as I can tell.

The following peripherals are tested and functional:
 - USB
 - Keyboard, trackpad
 - Built-in microphone
 - Built-in camera
 - Sound output
 - Suspend and restore

I haven't yet tested HDMI output, but based on other reports don't
anticipate trouble.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAMpk%2BvAW36JtgLHzfBZzeor099cSkfeQwdao%3DgX3nZKJ8tUddQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-20KHCTO1WW-20190227-115635.cpio.gz
Description: application/gzip


Qubes-HCL-LENOVO-20KHCTO1WW-20190227-115635.yml
Description: application/yaml


[qubes-users] Running Qubes on X230 with the FullHD Mod - someone tried this before?

2019-02-26 Thread 799
Hello,

for me the lenovo x230 is the perfect laptop to run qubes as it has a core
i7, SSD, 16GB RAM, working LTE-WWAN and can be "coreboot'ed" and using the
external slice battery pack it has a great battery runtime (even when
running Qubes).
The only problem I have is the low screen resolution from the stock display.

Some people have mod'ed their x230 adding a Full HD Display, as described
here:
https://forum.thinkpads.com/viewtopic.php?t=122640

As this process involves some working I'd like to know if someone within
the Qubes Community has tried this and how the success was when using the
machine with Qubes.

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2ub%3DusASO53tOY3O-on6U5hA5wQNZCzDb18gYY%3DF-F3Nw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Problem buildung a fedora-29-minimal-based sys-usb AppVM

2019-02-26 Thread 799
Hello,

since the first days using Qubes I made notes how I setup my templates and
AppVMs to able to rebuild my system from scratch if parts of it get
compromised or if I migrate the system to other hardware.

I have been able to rebuild all my Sys-VMs (sys-net / sys-firewall /
sys-usb) from a fedora-26-minimal and fedora-28-minimal template but I am
struggling to do the same from a fedora-29-minimal template:
I am unable to get a working sys-usb AppVM.

Steps to reproduce:

#base template
template=fedora-29-minimal
#name of the new custom build template
systemplate=t-fedora-29-sys
#clone template
qvm-clone $template $systemplate
# update template
qvm-run --auto --user root --pass-io --no-gui $systemplate 'dnf update -y'
# install a missing package for fedora-29-minimal without it, gui-apps will
not start
qvm-run --auto --user root --pass-io --no-gui $systemplate 'dnf install -y
e2fsprogs'
# Install required packages for Sys-VMs
qvm-run --auto --user root --pass-io --no-gui $systemplate \
'dnf -y install qubes-core-agent-qrexec qubes-core-agent-systemd \
 qubes-core-agent-networking polkit qubes-core-agent-network-manager \
 notification-daemon qubes-core-agent-dom0-updates qubes-usb-proxy \
 iwl6000g2a-firmware qubes-input-proxy-sender iproute iputils \
 NetworkManager-openvpn NetworkManager-openvpn-gnome \
 NetworkManager-wwan NetworkManager-wifi network-manager-applet'

I use this new template as base for my sys-net and sys-firewall AppVms
everything works, but sys-usb will not work as USB devices can't be
mounted, even within the sys-usb VM.

QUESTION:
Any idea what I am missing, to get a sys-usb AppVM which is based on a
custom build fedora-29-minimal based template?

If I use the default (fat) fedora-29 AppVM from the Qubes Repository as
Template for sys-usb, it is working fine.
So it is possible to use fedora-29 for sys-usb, but it seems that I am
missing some part to get it work when building a template from the ground
up Uusing fedora-29-minimal as base template)

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2uT6Nxwmj%3DyM8KW277bYOmxbBryt6KmaiOhFbKU7xRPkw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Shrinking a private volume

2019-02-26 Thread 799
Hello,

I've migrated ~150gb of data into a Qubes Storage Qube.
After cleaning up older files I have reduced the data to 100gb.
Now I'd like to free the additional 50gb so that dom0 can use this capacity
for other qubes.

Unfortunately I found out that shrinking volumes is not possible according
to the Qubes Docs:
--- --- ---
From: Qubes Docs > Resize Disk Image
https://www.qubes-os.org/doc/resize-disk-image/

[...] ext4 and most other filesystems do not support online shrinking [...]

   1. Create a new qube with smaller disk using Qube Manager or qvm-create
   2. Move data to the new qube using qvm-copy, backup & restore, or OS
   utilities
   3. Delete old qube using Qube Manager or qvm-remove

--- --- ---

As I have several files and subdirectories in the Storage Qubes, I can't
run qvm-copy but as I don't have enough free space I am also unable to zip
everything into one big file, qvm-copy this file to a new (smaller) storage
qube and then delete the old qubes.
Is there a better to shrink the volume or migrate the data to another Qube?

Honestly I don't understand why it is not possible to shrink a volume as
this is something which can done in linux.

Does someone has an idea how to "reclaim" the free capacity from an AppVM?

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2tfyDKS9j3WoDCdeLapnbhzw0Z8j0tkHY7NTzbE6TzCtg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] between Qubes-tunnel and Qubes-vpn-support

2019-02-26 Thread w4oo2dt7re89e


Hello,Chris Laprise,

I’ve been using qubes-tunnel  for a few months now, and first tried with
qubes-vpn-support, ,thank you for develop them and answered so many questions
in a very clear manner, that helped a lot, I accumulated some questions along
this time, now would like to understand both of them better, could you answer
some of them while you are free, thank you.



1.Qubes-tunnel and Qubes-vpn-support  ,chose which one on what stage is better?

from these two app’s Github description, ‘qubes-tunnel  is tested on Debian and 
Fedora, more for
basic users’,‘qubes-vpn-support has ipv6 anti leak and whonix tested’

does it mean qubes-vpn-suppor is more advanced, when a
user is more familiar with Qubes, he’s suggested to move from tunnel to 
vpn-support?

---Since qubes-tunnel is  officially integrated in Qubes OS now,  is 
vpn-support still being maintained. BTW,does
this mean the qubes official document on vpn is slightly out-dated as well.

2. how to use these security tools together?

When Im online, firefox won’t show ip, ipv6,dns, but tor, with
it’s exit node, show them all. Please note this is not my info, but tor exit
node’s.

However, tor team publish all ivp6 exit on their website
publicly, with ipv6 is too traceable, and most of ipcheck website can tell a 
browser
is from a tor exit, and you once suggested as well, ipv6 is a ‘naïve’ concept.

Does this mean using tor for sign-in service like check
email is not secure and not recommended, so it’s better just for browsing?

---In that case is  firefox  or opera  more secure for email-checking?-- 
Especially, when
tor team claimed tor +vpn would make a user’s traffic ‘more obvious’.

How to check webmails if it were you?

323. 
Just to confirm some configure details 

 --On firewall rules,Adding below lines

iptables -I FORWARD -o eth0 -j DROP

iptables -I FORWARD -i eth0 -j DROP

ip6tables -I FORWARD -o eth0 -j DROP

ip6tables -I FORWARD -i eth0 -j DROP

 

in /rw/config /qubes-firewall-user-script

This is in vpn-vm not app-vm, sys-net or dom0
right?

 

---When you suggested to test a uplink-vm with package send
to non-vpn address,  
do you mean by something like ware-shark? in sys-net right?

---Disable ipv6 should by 

   qvm-features VM ipv6 '' 
should be in sys-net as well correct?  

   is it permanent, or should we  do it on each boot.

 

Lots of thank you again.

 






-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/201902262118.x1QLI1Gx011762%40api2.scryptmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: No Bootable Devices Found with /boot/efi/ Missing

2019-02-26 Thread 'Rainier30' via qubes-users
"I say square one or two at least, now you know!

Since UEFI boot's working, proceed with trying some of the related

troubleshooting steps. Start with

[https://www.qubes-os.org/doc/uefi-troubleshooting/#installation-freezes-before-getting-to-anaconda-qubes-40](https://www.google.com/url?q=https%3A%2F%2Fwww.qubes-os.org%2Fdoc%2Fuefi-troubleshooting%2F%23installation-freezes-before-getting-to-anaconda-qubes-40=D=1=AFQjCNEl7BS2bWTu5WdbqhuVTcmy_FAwsQ).

How far into the boot process does the black screen show up, immediately

after selecting the partition?"

So, the black screen isn't instantaneous. There is a little text that shows up 
for a second or two before it goes black. I changed the boot order setting so 
that only UEFI showed up. When I selected "UEFI: SanDisk", the following is the 
what appears:

Xen 4.8.4 (c/s) EFI loader
Using configuration file 'BOOTX64.cfg'
vmlinuz: 0x41103000-0x416e2b20
initrd.img: 0x3fdad000-0x41102168
0x:0x00:0x1f.0x6: ROM 0x10400 bytes at 0x5044f018

Also, I went back and allowed legacy boot devices alongside UEFI, and that 
expanded my UEFI options to "UEFI: SanDisk" and "UEFI: SanDisk, Partition 2". 
When I selected either of those two options, I got the slightly different 
result of:

Xen 4.8.4 (c/s) EFI loader
Using configuration file 'BOOTX64.cfg'
vmlinuz: 0x41103000-0x416e2b20
initrd.img: 0x3fdad000-0x41102168
0x:0x00:0x02.0x0: ROM 0x1 bytes at 0x503f7018
0x:0x00:0x1f.0x6: ROM 0x10400 bytes at 0x50397018

So, that's where I'm at with the UEFI options so far. I read through the 
"Installation freezes before getting to Anaconda" troubleshooting page, but I'm 
afraid I don't understand what the directions are talking about. On that page, 
step one reads:

 "Follow the [steps 
above](https://www.qubes-os.org/doc/uefi-troubleshooting/#change-installer-kernel-parameters-in-uefi)
 to edit the [qubes-verbose] section of your installer’s  xen.cfg. You 
want to comment out the mapbs and noexitboot lines. The end result should look 
like this:

[qubes-verbose]
options=console=vga efi=attr=uc
# noexitboot=1
# mapbs=1
kernel=vmlinuz inst.stage2=hd:LABEL=Qubes-R4.0-x86_64 i915.alpha_support=1
ramdisk=initrd.img"

Sadly, I don't understand that. I'm also a little confused about where to make

these alterations. I understand how to get to a shell in Troubleshooting mode

in the installer, but I could only get there in Legacy boot. Is this for

somewhere else?

Thanks again

Sent with [ProtonMail](https://protonmail.com) Secure Email.

‐‐‐ Original Message ‐‐‐
On Monday, February 25, 2019 11:52 PM, Rainier30  
wrote:

> Actually, I may have to sheepishly admit that Legacy was enabled at the same 
> time as UEFI, meaning that it automatically booted into Legacy instead. All 
> previously reported symptoms seem to stem from this.
>
> Bottom line, UEFI isn't working for me period it seems. I end up with a black 
> screen, regardless of whether I select partition one or two on my flash drive 
> (not sure why it displays like that. Perhaps that is indicative of 
> something?).
>
> I'm back to square zero. Any varied options are appreciated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/EWi8Cy69uGCFqAZpGl7g7X1Q8LgCYnFx1N9YesVTARQo-42m3nufYTXJfDLfTKDHVG5VqLCq8TjVtT9JPJjV-Cl5vZBW6tUMdQEfiKqFF8Q%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Oryx Pro laptop (BOOTX64.cfg for Qubes 4.0.1)

2019-02-26 Thread Daniil Travnikov
Hi everyone and especially those who useing Oryx Pro with 4.0.1 Release :)

Tell me please what config variations I must try in BOOTX64.cfg (or maybe 
somewhere else) to successfuly install Qubes?


Now with .iso (dd via Rufus) without any changes I got this problem:
https://drive.google.com/open?id=1y38UJKq1ucuZIKtvlHLFyMKbMhYO3VBo


Also tried different options in BOOTX64.cfg.


Example 1:
[qubes-verbose]
options=console=vga efi=no-rs

(here I changed 'efi=attr=uc' on efi=no-rs') and got this:
https://drive.google.com/open?id=1ms_p53vRnSMy7OTjYFuSBlMH2ULvypLh


Example 2:
[qubes]
options=console=none
kernel=vmlinuz inst.stage2=hd:LABEL=Qubes-R4.0.1-x86_64 i915.alpha_support=1 
nouveau.modeset=0 quiet rhgb
ramdisk=initrd.img

(here I added 'nouveau.modeset=0') and got this:
https://drive.google.com/file/d/1zGI53XZ6f-8BoX28XueuuAmDQmFVf4FT/view


Maybe I missing something or doing something wrong?

Will appriciate to any help.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4081c13-0b33-49d8-ade1-549166368fe2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Best practices?

2019-02-26 Thread 22rip
...always forget something right after hitting "Post":

Similar to Stuart to avoid a borked update which happens(although rarely these 
days) I:

1) Back up my data prior to an update
2) I only update my original templates after updating the clones, if the clones 
update OK I then update my original template

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74c2ff54-4b3e-4fbb-ab9c-4561c6096e3e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Best practices?

2019-02-26 Thread 22rip
To answer the OP question you would use the clone for AppVMs, for example:

1) Original Fedora Template = I avoid using it
2) Clone of "Original Fedora Template" = Vault AppVM
3) Cloned Template with Libre Office installed = Personal VM & for another 
disposable VM for printing and opening email attachments (multiple disposable 
VMs available in 4.0)
4) Cloned Template configured for VPN = VPN AppVMs

If one screws up due to my doing, borked update, suspicion of malware I delete 
the clone and rebuild it from my Original Template. I highly recommend backing 
up your data VMs prior to updates (I can't stress this enough!). When I first 
started I screwed up a lot and was constantly reinstalling Qubes.

Similar cloning for Debian...I tend to use Debian where I can. The logic is the 
more software you install in a template the more vulnerable the template 
becomes...

I use the GUI but also picked up some commands for the terminal. I didn't know 
Linux but figured I would start with Qubes as I needed the security ASAP(I 
didn't have a choice).

Here are some basic commands I might use in a terminal:

Debian - To install Nautilus
su
apt-get install nautilus

Debian - To install OpenVPN
su
apt-get install openvpn

Debian - To install GNOME (Including Libre Office):
sudo tasksel
select GNOME (with space bar)

Fedora (Install Libre Office):
Sudo dnf install libreoffice

Update Dom0 in terminal:
sudo qubes-dom0-update

I again thank all on this mailing list who have helped me directly and 
indirectly. I also recommend to donate if you can to keep Qubes going...its 
good stuff! Kudos to the development team and all those writing code...thank 
you!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4b9d29d9-ec79-47c6-bd5a-5618affe2556%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] why mail-list?

2019-02-26 Thread Achim Patzner
On 20190225 at 16:00 -0600 John Goold wrote:
> Making the leap to "catering to the lowest common denominator" is simply
> insulting.

No. it's necessary. And often enough people even miss the necessary
steps in that setting (like registering their PGP keys... even though
it is quite simple).

And you're missing the obvious points like minimal use of available
bandwidth or asynchronous delivery.

And as long as using Qubes is more complicated than getting Arch
running there are more important tasks than catering to people who are
think mailing lists are lacking sophistication or comfort.


Achim


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24a4503e18a68b8c3548d589eccc81316660f1ea.camel%40noses.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] g505s BIOS settings for installing 4.0.1

2019-02-26 Thread Ivan Ivanov
On 25 Feb 2019 23:44, taii...@gmx.com  wrote:
>
> On 01/10/2019 10:27 AM, cyber.citi...@tutanota.com wrote:
> > Hello everyone,
> >
> > I'd like to install Qubes 4.0.1 on a g505s, but the installation routine is 
> > telling me that IOMMU/Vt-d/AMD-Vi, and Interrupt Remapping are not 
> > available. I've tried every possible combination of BIOS settings I can 
> > imagine (such as enabling SVM support and toggling between Legacy boot and 
> > UEFI boot), but nothing is working. I've seen a lot of posts on this 
> > discussion forum saying that the g505s is compatable with Qubes 4.0, so I'm 
> > confused. Might someone toss me a clue?
> >
> > Thank you.
> >
>
> You need to install coreboot and MAKE SURE that you have included the
> microcode updates otherwise it won't work and you will have no security.
>
> The issue is a lack of microcode updates without them IOMMU won't work,
> this has been posted many times before FYI.
>

Yes, indeed. For convenience, the instructions about how to easily
patch the coreboot with the latest microcodes before building it for
G505S - are available at "G505S hacking" page from DangerousPrototypes
wiki - http://dangerousprototypes.com/docs/Lenovo_G505S_hacking . By
the way Mike updated it recently so I encourage you to take a look and
maybe contribute if you have something to add.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAaskFDs6v25udXy0Q9kkYpXvE9dnZCu%2Bna64taG83RQS3vuRA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Best practices?

2019-02-26 Thread Stuart Perkins



On Tue, 26 Feb 2019 03:59:18 +
"'awokd' via qubes-users"  wrote:

>dexinthec...@gmail.com:
>> Just recently installed Qubes being new to Linux altogether I haven’t quiet 
>> developed my own best practices and the documentation online has a pretty 
>> steep learning curve. Anyway I was wondering what do you guys usually 
>> perform after a clean install. What do you do on a weekly basis, monthly, 
>> annually etc? How do you optimize Qube OS or is it already pretty optimized?
>>   
>I set up a trim cron job per https://www.qubes-os.org/doc/disk-trim/ and 
>set issue_discards = 1 in /etc/lvm/lvm.conf. Thought I also set up 
>something to delete all logs older than a month but either I forgot to 
>or it doesn't seem to be working.
>

Starting your Linux life with Qubes is a bit like starting your political 
career by running for President, or starting your mountain climbing hobby at 
Everest.  Much of what you do with Qubes is no different than straight up 
Linux, but there is a lot more to it as well.  If you have previous 
virtualization experience, it is a plus.  VMWare is where I started back in 
VMWare Workstation 4 days.  I was a paying customer of theirs from versions 4 
through 6 before jumping over to VirtualBox.  Qubes with its Xen based 
virtualization was a logical next step for me...as I was already planning on 
moving over to Xen.

What I do as a matter of course with my Qubes box is create ONE clone of each 
template...Fedora and Debian are the ones I use...and proceed on my merry way.  
I do the updates on the templates, and if there is a TON of updates...not just 
a browser like Chrome, Vivaldi, Chromium, Firefox...I back out of the update 
without doing it, delete the old clone of the template (space is a bit tight) 
and make a fresh clone of the working template.  If the updated template causes 
trouble, I shut down everything but dom0, change all of the VM's using the 
borked template to use the last clone, delete the borked template, clone the 
clone back to the original name then change all the VM's to use the original 
name again.  A small PITA but it pretty much guarantees that I am workable in 
the event of a borked update...which unfortunately does happen from time to 
time.

I use qvm-clone and qvm-ls and qvm-prefs on the command line in a dom0 terminal 
to make the changes, but they could be done through the gui interface.

I'm still on 3.2 with an install of 4 planned as soon as I get my new 
motherboard received and installed...my usb's are toast on this one.

Stuart

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190226065511.5d64c5f5%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL - Purism Librem 15 v4

2019-02-26 Thread 'Neelix' via qubes-users
Qubes is not selling hardware at all :)

On 2/25/19 9:42 PM, taii...@gmx.com wrote:
> Nice ad.
>
> When will you guys finally admit that you aren't selling owner
> controlled computers and change the name "librem" since they aren't at
> all libre?
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ec6338f-6284-8db0-27d5-9ef47ae0e1ea%40privacy.farm.
For more options, visit https://groups.google.com/d/optout.