Re: [qubes-users] Qubes' onion service is 404

2019-03-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 23/03/2019 6.48 AM, 'qubeslover' via qubes-users wrote:
> 
> Hello, Qubes' onion service has not been working for 48 hours. What
> is going on? Is it going to be fixed anytime soon?
> 
> Thanks
> 

Hello,

We're aware of the problem and are currently looking into it.
Apologies for any inconvenience.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=WkQ9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/04d8341e-da1b-d4bb-1bc1-18bd5f1a5465%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 Update breaks sys-usb widget

2019-03-23 Thread Eric

  
  
On 3/24/19 7:21 AM, preill...@gmail.com
  wrote:


  On 3/23/19 7:28 AM, ronp...@riseup.net wrote:

  
Qubes 4.0.1.
Following a recent dom0 update my sys-usb widget is partially broken; 1/
devices show in the widget when plugged into usb port but are not
removed when unplugged from the port. 2/ Plugged in devices can be
attached to VM's via widget but there's now no indication (other the
qvm-block in dom0) that they are attached. 3/ Unable to detach usb
device from VM's via the widget (although I can do this from dom0).

To check that I hadn't done something stupid and thereby broken the
widget I did the following procedure.

1. Reinstalled laptop with 4.0.1 from qubes website.
2. Tested sys-usb widget - It worked perfectly.
3. Updated Dom0 and tested widget - It worked perfectly.
4. Rebooted laptop - tested widget, but its now broken - same  diagnosis
as described above

It seems that a dom0 update has broken the widget?
Does anyone else have this problem?


  
  Yes, I have the same problem, and find the applet useful.  Used to work
well.

Peter


Yes it was broken in -current 3-4 weeks ago. There have been many reports
and half a dozen duplicate issues on github... major snaffu.
A new version is in testing now and appears to work well - thanks Marta!
If you can't wait, I fixed my -current using:

qubes-dom0-update --action='' --enablerepo=qubes-dom0-current-testing qubes-desktop-linux-manager

I put the verbose flag on on my second try as the first was skipped due to
missing dependencies, but there appeared to be none, and it worked the second time.

Eric

  




-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d79a443c-e430-6b9b-2c64-6840056bd599%40asar.biz.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Blank Screen Trying To Install

2019-03-23 Thread Gaijin
On 2019-03-24 02:41, Yushatak wrote:
> On Thursday, March 21, 2019 at 8:57:09 PM UTC-4, Yushatak wrote:
>> When I boot the Qubes installation media (I dd'd it to a USB stick per the 
>> instructions on the site) it initializes Xen, then the kernel starts booting 
>> (Linux penguins, etc.), and then it goes to a black screen and there's no 
>> activity. F1 does nothing. My hardware is a laptop with an i7 8700K and an 
>> Nvidia 1060, so it smelled like nouveau driver problems to me. However, 
>> normally one works around that by editing the kernel line in grub with 
>> nouveau.modeset=0 and I have no grub! I decided to try editing the grub.conf 
>> in the isolinux directory of the ISO by extracting the iso, editing, then 
>> regenerating the ISO. Someone on IRC was nice enough to provide me a log 
>> from the official build of the ISO so I used the proper switches/etc.. I 
>> booted that in a VM to make sure it was OK as a sanity check, then wrote 
>> that to the USB stick (which takes like 26 minutes, it's USB 2.. not fun) 
>> and it stopped booting after attaching the USB stick as a SCSI device, not 
>> even quite getting to the black
screen. AFAIK my hardware requires a 4.18 kernel and from what they said on IRC 
there's nothing newer than 4.14 in Qubes anyway, but since it tries to boot I 
don't know. I throw myself upon your mercy, Qubes community/developers.
> 
> Nobody has a single thought?

Might the solution be putting your BIOS into Legacy mode?
https://groups.google.com/forum/#!topic/qubes-users/Vy5wpWbOYxU

In my case switching the HDD from AHCI mode to IDE mode seemed to get
past this blank screen and got me to the install screen. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/24cf72d48db8b557b2f0832dfdcfbc13%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing software..

2019-03-23 Thread Jon deps

On 3/24/19 2:27 AM, unman wrote:

On Sat, Mar 23, 2019 at 06:31:07PM +, Jon deps wrote:

On 3/19/19 4:59 PM, Steven Walker wrote:

I am still pretty new to Qubes. I have managed to create a new qube, but I want 
to install some software for use with this qube. I have read that it has to be 
installed to the template and not the actual qube. As the template has no 
actual network connection, how do I go about this?

Using 4.0.1, Fedora 29

Any help greatly appeciated.

Steve



pretty sure, there are different ways to skin the cat, though


the Templates are designed to obtain access indirectly, that is what the
"salt" stuff is they talk about it seems by default to be setup to use
sys-whonix-14  to  install updates  , somewhat magically

you can actually change the netvm without shutting down the templates

generally it's bad form  to give  the templates direct access,  though may
you might want to once in while  in order  to troubleshoot something , etc
.testing it the morning ,  you should be able to install non updates
without  Direct  access



for me  Templates  aren't  worth backing up  , I'm not worried about my
system  melting down  much . and anyway  its going to be best to fresh
install , which is easy-ist  in Qubes, which is one of the beauties of the
technology 

hence, I clone for other reasons

one word of advice  is  keep a paper list of  custom  packages you install
so when it goes to Fedora-30  you install fresh and then add back fresh
packages ,  your files  will persist,


my problem  what few files I have end up spread out over  10 App Qubes



It's only if you selected the "update over Whonix" option on install that you 
get
updating using sys-whonix qube. It's not the default.
Salt doesnt have anything to do with the "indirect" access - the access
is using qubes-rpc to the UpdateProxy - the proxy to use is set in
/etc/qubes-rpc/policy/qubes.UpdateProxy.
You can change the proxy to use by editing that file.

You *can* use salt to install software in to the templates. If you do
this then you need only maintain the salt formula and you can easily
recreate a template, without having to keep a paper list. That's an
ideal way of using salt to configure your systems.



I think I'm stuck  at   mere mortal  qube user  level  forever  :)

https://groups.google.com/forum/#!topic/qubes-users/F_TB7Zzseeo


PS: for some reason I am able to  $sudo dnf install  foosoftware   in 
Fedora-29  though  I have  no  "direct"  netvm  for the Template , 
though I recall in the pastallowing netvm access  for   packages  I 
wanted to install,  or maybe when I was trying to install a VPN  to the 
template,   gave up and installed  it  in the AppVM  I guess


There is a 3rd trick  to  discern  whats custom installed  IIRC , though 
maybe it was more for Debian than Fedora if one searches the 
usergroup  fwiww


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/050cc6d6-c3bb-cb7b-f381-2ff445ebf14d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Blank Screen Trying To Install

2019-03-23 Thread Yushatak
On Thursday, March 21, 2019 at 8:57:09 PM UTC-4, Yushatak wrote:
> When I boot the Qubes installation media (I dd'd it to a USB stick per the 
> instructions on the site) it initializes Xen, then the kernel starts booting 
> (Linux penguins, etc.), and then it goes to a black screen and there's no 
> activity. F1 does nothing. My hardware is a laptop with an i7 8700K and an 
> Nvidia 1060, so it smelled like nouveau driver problems to me. However, 
> normally one works around that by editing the kernel line in grub with 
> nouveau.modeset=0 and I have no grub! I decided to try editing the grub.conf 
> in the isolinux directory of the ISO by extracting the iso, editing, then 
> regenerating the ISO. Someone on IRC was nice enough to provide me a log from 
> the official build of the ISO so I used the proper switches/etc.. I booted 
> that in a VM to make sure it was OK as a sanity check, then wrote that to the 
> USB stick (which takes like 26 minutes, it's USB 2.. not fun) and it stopped 
> booting after attaching the USB stick as a SCSI device, not even quite 
> getting to the black screen. AFAIK my hardware requires a 4.18 kernel and 
> from what they said on IRC there's nothing newer than 4.14 in Qubes anyway, 
> but since it tries to boot I don't know. I throw myself upon your mercy, 
> Qubes community/developers.

Nobody has a single thought?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a57ddeb4-1cff-4070-b37d-4643e2ee17c5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Installing software..

2019-03-23 Thread unman
On Sat, Mar 23, 2019 at 06:31:07PM +, Jon deps wrote:
> On 3/19/19 4:59 PM, Steven Walker wrote:
> > I am still pretty new to Qubes. I have managed to create a new qube, but I 
> > want to install some software for use with this qube. I have read that it 
> > has to be installed to the template and not the actual qube. As the 
> > template has no actual network connection, how do I go about this?
> > 
> > Using 4.0.1, Fedora 29
> > 
> > Any help greatly appeciated.
> > 
> > Steve
> > 
> 
> pretty sure, there are different ways to skin the cat, though
> 
> 
> the Templates are designed to obtain access indirectly, that is what the
> "salt" stuff is they talk about it seems by default to be setup to use
> sys-whonix-14  to  install updates  , somewhat magically
> 
> you can actually change the netvm without shutting down the templates
> 
> generally it's bad form  to give  the templates direct access,  though may
> you might want to once in while  in order  to troubleshoot something , etc
> .testing it the morning ,  you should be able to install non updates
> without  Direct  access
> 
> 
> 
> for me  Templates  aren't  worth backing up  , I'm not worried about my
> system  melting down  much . and anyway  its going to be best to fresh
> install , which is easy-ist  in Qubes, which is one of the beauties of the
> technology 
> 
> hence, I clone for other reasons
> 
> one word of advice  is  keep a paper list of  custom  packages you install
> so when it goes to Fedora-30  you install fresh and then add back fresh
> packages ,  your files  will persist,
> 
> 
> my problem  what few files I have end up spread out over  10 App Qubes
> 

It's only if you selected the "update over Whonix" option on install that you 
get
updating using sys-whonix qube. It's not the default.
Salt doesnt have anything to do with the "indirect" access - the access
is using qubes-rpc to the UpdateProxy - the proxy to use is set in
/etc/qubes-rpc/policy/qubes.UpdateProxy.
You can change the proxy to use by editing that file.

You *can* use salt to install software in to the templates. If you do
this then you need only maintain the salt formula and you can easily
recreate a template, without having to keep a paper list. That's an
ideal way of using salt to configure your systems.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190324022714.q3dwlyogduwbsohn%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Shrinking a private volume

2019-03-23 Thread unman
On Sat, Mar 23, 2019 at 01:59:27PM +0100, onw7two99 wrote:
> Hello Chris,
> 
> thank you once again for your feedback.
> 
> On 3/23/19 11:31 AM, Chris Laprise wrote:
> > On 3/23/19 5:34 AM, onw7two99 wrote:
> >> I run sudo fstrim -av from within the AppVM (as root) but I haven't
> >> notive any change.
> >
> > The difference doesn't show until you shutdown the vm for the second
> > time (the current .old volume gets deleted). Also the Qubes disk
> > widget and Qubes Manager take some time to report the new values. But
> > running fstrim may not make any difference if you haven't been
> > deleting many files.
> 
> if I run ls -lah /var/lib/qubes/appvms/ the size listed is the
> "thick provisioned", is there a way to show the "real" file size in dom0
> whch should be the used size  which is reported from within the AppVM
> when using "df -h" ?
> 
> 
> >> Is there a way to move this private disk to the new storage-qube?
> >
> > Yes, you can use the 'mv' command while the two vms are not running.
> > Keep in mind this can erase the existing private image of the
> > new/destination vm unless you rename that first (but it won't be
> > accessible after renaming it, unless you run 'qvm-block attach').
> 
> I tried to mount the private.img from the old appvm to the new one, but
> I think I don't have the correct syntax.
> 
> I tried:
> 
> qvm-block attach  :private.img
> qvm-block attach  /var/lib/qubes/appvms//private.img
> 
> How can I attach a private.img from one AppVM to another? Maybe even
> once in read/write and in another scenario read only.
> 
> This could be usefull for doing forensics on an AppVM or clam av scans etc.
> 
> >> Neither in the AppVM nor in dom0 I see something like LVM, but as far as
> >> I remember LVM was available in Qubes (I think have looked into it 1 or
> >> 2 years ago.
> >
> > Since you have -cow.img files in /var/lib/qubes/appvms, your system
> > seems to have been installed with one of the non-LVM options. This
> > could be either Ext4 (rather limited) or Btrfs (flexible). Looking at
> > the output of the 'mount' command in dom0 will tell you which.
> 
> Stupid me, I wasn't aware that I installed Qubes without LVM ... why
> should I do so?
> 
> The only reason to fix this is likely to reinstall Qubes with LVM, but
> what happens if I restore my old AppVMs from the non-LVM-setup?
> Can you give some more details about the private.img vs private-cow.img
> vs private-cow.img.old
> 
> >From the Qubes docs
> https://www.qubes-os.org/doc/template-implementation/ I learned that the
> root.cow.img will hold the differences (from the appVM perspective) to
> root.img (the root image of the template which is read only).
> 
> Still I haven't understand what the private.cow.img and
> private.cow.img.old do.
> 
> Is there some more information regarding this topic?
> 

We're all working on the assumption that you  have Qubes 4.0 - can you
confirm that?

You can see what size is actually used on disk by using s flag to ls:
so 'ls -lsS' will show you the apparent size and the actual size.

In 3.2, to attach a private.img try:
qvm-block -A  dom0:/var/.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190324021744.hzd3lgkenlsmn57m%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Kernel 4.20 Can’t find

2019-03-23 Thread Aly Abdellatif
Hi,

With qubes-dom0-update , I can’t find the kernel 4.20 version with the current 
or current testing or even the unstable. The further I can go is the 4.19.

 Is there something wrong in what I’m doing?

Best Regards
Aly Abdellatif

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/B92D4E03-407B-42F6-8E0A-F9D7830071F3%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: i3 support?

2019-03-23 Thread Yethal
W dniu sobota, 23 marca 2019 21:11:49 UTC+1 użytkownik Stumpy napisał:
> I have been considering looking into i3 on my qubes box but was 
> wondering about support in the future. As there appears to be a bit of a 
> learning curve i wanted to check before diving in.
> 
> w/ v3 i was using kde then, as support seemed to wan, i switched over to 
> xfce which is admittedly lighter but doest seem to be as feature rich.
> 
> is there any "official" stance on i3 now and going on into the future?

There is an i3 package in main Qubes repo and it does work fine. I use i3 as my 
daily DE in Qubes and couldn't be happier with it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/556bb34f-c889-4274-84cb-83b5c79c11ee%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing software..

2019-03-23 Thread 22rip
PS...thanks for the correcting me!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4efaf472-68d8-44b2-bec1-ed54b948c86a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 Update breaks sys-usb widget

2019-03-23 Thread preilly40
On 3/23/19 7:28 AM, ronp...@riseup.net wrote:
> Qubes 4.0.1.
> Following a recent dom0 update my sys-usb widget is partially broken; 1/
> devices show in the widget when plugged into usb port but are not
> removed when unplugged from the port. 2/ Plugged in devices can be
> attached to VM's via widget but there's now no indication (other the
> qvm-block in dom0) that they are attached. 3/ Unable to detach usb
> device from VM's via the widget (although I can do this from dom0).
>
> To check that I hadn't done something stupid and thereby broken the
> widget I did the following procedure.
>
> 1. Reinstalled laptop with 4.0.1 from qubes website.
> 2. Tested sys-usb widget - It worked perfectly.
> 3. Updated Dom0 and tested widget - It worked perfectly.
> 4. Rebooted laptop - tested widget, but its now broken - same  diagnosis
> as described above
>
> It seems that a dom0 update has broken the widget?
> Does anyone else have this problem?
>
Yes, I have the same problem, and find the applet useful.  Used to work
well.

Peter



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/366193a6-6428-a1fa-4238-a65435e105be%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] i3 support?

2019-03-23 Thread Stumpy
I have been considering looking into i3 on my qubes box but was 
wondering about support in the future. As there appears to be a bit of a 
learning curve i wanted to check before diving in.


w/ v3 i was using kde then, as support seemed to wan, i switched over to 
xfce which is admittedly lighter but doest seem to be as feature rich.


is there any "official" stance on i3 now and going on into the future?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0233f4d0-f166-6144-8edf-b466d3fc69bb%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ongoing qubes manager work?

2019-03-23 Thread Stumpy

On 3/20/19 10:23 AM, unman wrote:

On Sun, Mar 17, 2019 at 08:16:13AM -0400, Stumpy wrote:

I seem to remember someone continuing work on the qubes manager, beyond bug
fixes, but I cant find the post. I looked on github but it wasnt clear to me
how much work was continuing with the qmanager.
I find it really useful and assume others do as well as when 4.0 came i
think quite a few people requested that it be put back.

Anyway. I just wanted to find out if there is any ongoing work, especially
regarding interface tweaks. I have what I admit is probably too many VMs but
at the same time I use all of them and prefer not to change my work flow.
One of the caveats is that there isnt much way to organize VMs in the
interface apart from sorting. I'd love to have something like a
customizable/collapsible tree of VMs among other things.

Unfortuately my programming skills never got past "hello world" but i'd be
happy to test out any work that someone might be doing.


I don't think there was any serious work put in here. The intention was to
drop QM from 4.0, and replace it with current widgets.
There was some pressure to reinstate it and that was done. Other than
the collapsible tree display, what else would you like to see?

I don't use QM, and (without wanting to go over old ground) think it was
a mistake bringing it back.



Well i can see how some might want to kill it, but I really found it 
useful for "visualizing" the status of various vms all in one place as i 
run quite a few (in one place i can see what appvms are not using their 
respective updated templates, which templates have updates available, 
can see how much disk is being used, state, mem etc. Really its just the 
quick n easy being able to see, and occasionally interact with, interface.


I am reasonably comfortable with a terminal but in my work flow the qm 
has its place, and for newbies that want "alittle bit more" its good 
(yes, best for the newbiest to just use the widgets but i still think 
there is value when they (I) want to see alittle bit mroe w/o devling 
into the terminal).


Anyway, at the moment I'd just like a few teaks like the collapsible 
trees and a few more views to be available like say remaining space per 
appvm, % of drive space being used, % mem being used etc - perhaps some 
xentop-like features. I have to use a win machine at work, and while I 
am not a fan i do like tools like things like the systools process 
explorer and think qm could potentially show some things like that as well.

IMHO :)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4659297-9f0f-9f64-a81a-7b6a7f6db46c%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL report Dell OptiPlex 990 (3.2->4.0-rc3 update)

2019-03-23 Thread malaguenia33
On Tuesday, January 30, 2018 at 9:51:12 AM UTC-6, steve.coleman wrote:
> Just upgraded from 3.2 to 4.0-rc3. Working just fine.
> 
> Steve Coleman

Never mind. Found svc tag in doc you posted. It says it's a mini-tower.

Thx.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49bff118-6cb5-4b62-908a-dee0fd7f0142%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] coreboot on modern hardware?

2019-03-23 Thread jrsmiley
Spent several hours yesterday trying to track down what I would need to do to 
install coreboot on all of my computers, starting with my Qubes box: a Levnovo 
Thinkpad T480.

The bottom line from what I can tell is that if you have an Intel CPU made 
since 2008 (any that have Boot Guard) or an AMD CPU made since 2013 (any that 
have PSP), you are out of luck.  Libreboot spells this out in their docs.  I'm 
not sure if that is because of coreboot itself or something specific to 
Libreboot. I was stuck by how they seemed perfectly fine walling themselves off 
from the present and the future.

I could find nothing indicating that anyone had even tried, much less 
succeeded, in installing coreboot on a T480 and everything I did find was for 
much older hardware.

I read through the coreboot docs where they just wave their hands at the end of 
the build process and say "now go flash".  I also read through the heads docs, 
which say more or less the same thing.

Hackaday has an article on the horrors of installing coreboot on a Toshiba 
laptop.  Not only do they neglect to say which model they used, at the end of 
the article they had it working.  

The gist is that the information that's out there is out of date, incomplete, 
misleading, and sometimes just incompetent.

I'm hoping that someone here has first-hand knowledge and can advise me (and 
others who read this).

Thanks,
John Smiley

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/91b65a9e-15d1-49a6-a828-13cc2c5b486b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing software..

2019-03-23 Thread Jon deps

On 3/19/19 4:59 PM, Steven Walker wrote:

I am still pretty new to Qubes. I have managed to create a new qube, but I want 
to install some software for use with this qube. I have read that it has to be 
installed to the template and not the actual qube. As the template has no 
actual network connection, how do I go about this?

Using 4.0.1, Fedora 29

Any help greatly appeciated.

Steve



pretty sure, there are different ways to skin the cat, though


the Templates are designed to obtain access indirectly, that is what the 
 "salt" stuff is they talk about it seems by default to be setup to 
use  sys-whonix-14  to  install updates  , somewhat magically


you can actually change the netvm without shutting down the templates

generally it's bad form  to give  the templates direct access,  though 
may you might want to once in while  in order  to troubleshoot something 
, etc  .testing it the morning ,  you should be able to install non 
updates without  Direct  access




for me  Templates  aren't  worth backing up  , I'm not worried about my 
system  melting down  much . and anyway  its going to be best to 
fresh install , which is easy-ist  in Qubes, which is one of the 
beauties of the technology 


hence, I clone for other reasons

one word of advice  is  keep a paper list of  custom  packages you 
install so when it goes to Fedora-30  you install fresh and then add 
back fresh packages ,  your files  will persist,



my problem  what few files I have end up spread out over  10 App Qubes


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49bdea1a-d524-7089-ded3-2440f9fe884e%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: all new kernels are unusable with amdgpu - Sapphire Nitro + RX590

2019-03-23 Thread CooSee
i could update amdgpu package to 18.0.1 using FC27 Updates, but the behavior 
with newer kernels is the same.

the odd thing is with newer kernels that Xorg's starting two times at the same 
time:

1. Xorg.0.log >> [63.475] (II) AMDGPU(0): mem size init: gart size 
:b7c6e000 vram size: s:1ff2e8000 visible:f2e8000

2. 38.953] (II) AMDGPU(0): mem size init: gart size :b7c6e000 vram size: 
s:1fe316000 visible:e316000

the second one probing for Monitor goes on and failed with:

[62.958] (EE) glamor0: GL error: GL_OUT_OF_MEMORY in glTexSubImage
[62.958] (WW) glamor: Failed to allocate 22x22 FBO due to GL_OUT_OF_MEMORY.
[62.958] (WW) glamor: Expect reduced performance.

at the end.

please see attachments.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/454d44dd-bb43-4f3f-8a4f-7ba8da973601%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
[63.411] 
X.Org X Server 1.19.3
Release Date: 2017-03-15
[63.411] X Protocol Version 11, Revision 0
[63.411] Build Operating System:  4.9.3-200.fc25.x86_64 
[63.411] Current Operating System: Linux dom0 5.0.2-1.pvops.qubes.x86_64 #1 
SMP Thu Mar 21 05:52:58 UTC 2019 x86_64
[63.411] Kernel command line: root=/dev/mapper/qubes_dom0-root 
rd.luks.uuid=luks-0dc31baf-2c25-4b70-9f0e-549a4da60935 
rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap acpi_backlight=vendor 
add_efi_memmap radeon.cik_support=0 radeon.si_support=0 amdgpu.cik_support=1 
amdgpu.si_support=1 amdgpu.dpm=1 amdgpu.dc=1 plymouth.ignore-serial-consoles 
rhgb quiet
[63.411] Build Date: 15 March 2017  06:37:12PM
[63.411] Build ID: xorg-x11-server 1.19.3-1.fc25 
[63.411] Current version of pixman: 0.34.0
[63.411]Before reporting problems, check http://wiki.x.org
to make sure that you have the latest version.
[63.411] Markers: (--) probed, (**) from config file, (==) default setting,
(++) from command line, (!!) notice, (II) informational,
(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[63.411] (==) Log file: "/var/log/Xorg.0.log", Time: Sat Mar 23 18:27:35 
2019
[63.412] (==) Using config directory: "/etc/X11/xorg.conf.d"
[63.412] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
[63.412] (==) No Layout section.  Using the first Screen section.
[63.412] (==) No screen section available. Using defaults.
[63.412] (**) |-->Screen "Default Screen Section" (0)
[63.412] (**) |   |-->Monitor ""
[63.412] (==) No device specified for screen "Default Screen Section".
Using the first device section listed.
[63.412] (**) |   |-->Device "Sapphire NITRO+ RX 590"
[63.412] (==) No monitor specified for screen "Default Screen Section".
Using a default monitor configuration.
[63.412] (==) Automatically adding devices
[63.412] (==) Automatically enabling devices
[63.412] (==) Automatically adding GPU devices
[63.412] (==) Automatically binding GPU devices
[63.412] (==) Max clients allowed: 256, resource mask: 0x1f
[63.412] (==) FontPath set to:
catalogue:/etc/X11/fontpath.d,
built-ins
[63.412] (==) ModulePath set to "/usr/lib64/xorg/modules"
[63.412] (II) The server relies on udev to provide the list of input 
devices.
If no devices become available, reconfigure udev or disable 
AutoAddDevices.
[63.412] (II) Loader magic: 0x825e00
[63.412] (II) Module ABI versions:
[63.412]X.Org ANSI C Emulation: 0.4
[63.412]X.Org Video Driver: 23.0
[63.412]X.Org XInput driver : 24.1
[63.412]X.Org Server Extension : 10.0
[63.413] (++) using VT number 1

[63.413] (II) systemd-logind: logind integration requires -keeptty and 
-keeptty was not provided, disabling logind integration
[63.414] (II) xfree86: Adding drm device (/dev/dri/card0)
[63.425] (--) PCI:*(0:1:0:0) 1002:67df:1da2:e366 rev 225, Mem @ 
0xc000/268435456, 0xd000/2097152, 0xdfe0/262144, I/O @ 
0xe000/256, BIOS @ 0x/131072
[63.425] (II) LoadModule: "glx"
[63.425] (II) Loading /usr/lib64/xorg/modules/extensions/libglx.so
[63.428] (II) Module glx: vendor="X.Org Foundation"
[63.428]compiled for 1.19.3, module version = 1.0.0
[63.428]ABI class: X.Org Server Extension, version 10.0
[63.428] (II) LoadModule: "amdgpu"
[63.428] (II) Loading /usr/lib64/xorg/modules/drivers/amdgpu_drv.so
[63.429] (II) Module amdgpu: vendor="X.Org Foundation"
[63.429]compiled for 1.19.6, module version = 18.0.1
[63.429]Module class: X.Org Video Driver
[63.429]ABI class: X.Org Video Driver, 

[qubes-users] Re: Dom0 Update breaks sys-usb widget

2019-03-23 Thread Jon deps

On 3/23/19 11:28 AM, ronpunz-sgozh3hwpm2stnjn9+b...@public.gmane.org wrote:

Qubes 4.0.1.
Following a recent dom0 update my sys-usb widget is partially broken; 1/
devices show in the widget when plugged into usb port but are not
removed when unplugged from the port. 2/ Plugged in devices can be
attached to VM's via widget but there's now no indication (other the
qvm-block in dom0) that they are attached. 3/ Unable to detach usb
device from VM's via the widget (although I can do this from dom0).

To check that I hadn't done something stupid and thereby broken the
widget I did the following procedure.

1. Reinstalled laptop with 4.0.1 from qubes website.
2. Tested sys-usb widget - It worked perfectly.
3. Updated Dom0 and tested widget - It worked perfectly.
4. Rebooted laptop - tested widget, but its now broken - same  diagnosis
as described above

It seems that a dom0 update has broken the widget?
Does anyone else have this problem?



And you don't want to use the terminal eg  qvm-usb attach  
sys-usb:2-10


etc?

afaik the widget has never been reliable, and faster for me just to do 
it in a terminal than expect the widget to work  :)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa9adca4-c90d-bee6-adb4-5b1c7ef83234%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL report Dell OptiPlex 990 (3.2->4.0-rc3 update)

2019-03-23 Thread malaguenia33
On Tuesday, January 30, 2018 at 9:51:12 AM UTC-6, steve.coleman wrote:
> Just upgraded from 3.2 to 4.0-rc3. Working just fine.
> 
> Steve Coleman

Steve, what format (min-tower, desktop, SFF) is your Opti 990?

Lots on used market but there can be subtle diffs between same model format.

Thanks.

Kasey

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/76a239e0-d9d5-493f-91ee-67f3acd9cecd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Compiling kernel modules

2019-03-23 Thread Zbigniew Łukasiak
Hi there,

I am trying to connect my qubes box via wifi - but I cannot compile
any kernel module for my wifi cards (on both fedora 26 and 29). The
compilation fails at the first object file:

[user@sys-usb rtl8821AU]$ make
make ARCH=x86_64 CROSS_COMPILE= -C
/lib/modules/4.14.103-1.pvops.qubes.x86_64/build
M=/home/user/rtl8821AU  modules
make[1]: Entering directory
'/usr/lib/modules/4.14.103-1.pvops.qubes.x86_64/build'
make[2]: *** No rule to make target
'/home/user/rtl8821AU/core/rtw_cmd.o', needed by
'/home/user/rtl8821AU/8821au.o'.  Stop.
make[1]: *** [Makefile:1535: _module_/home/user/rtl8821AU] Error 2
make[1]: Leaving directory
'/usr/lib/modules/4.14.103-1.pvops.qubes.x86_64/build'
make: *** [Makefile:2003: modules] Error 2

but the source file for that object file is there:

[user@sys-usb rtl8821AU]$ ls /home/user/rtl8821AU/core/rtw_cmd.c
/home/user/rtl8821AU/core/rtw_cmd.c

I have installed the headers:
 sudo dnf install make automake gcc gcc-c++ kernel-devel

This looks like it must be something silly - but I really cannot find
anything. I have installed the

I have also tried the kernel modules that are already in the system
for the two cards that I have bought (tp-link AC600 Archer T2UH and
Edimax EW-7811UTC) - but no result, i.e. /proc/net/dev does not show
anything, I am doing it in sys-usb - so that the access to the device
is a sure thing. The Edimax one explicitly lists Linux as supported
but the instructions still require compiling a kernel module.

-- 
Zbigniew Lukasiak
https://medium.com/@zby
http://brudnopis.blogspot.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGL_UUtNizZdziLdrpJ7HhpPn5_NoRyH9SCOdKV1gaQhTPXBPg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: all new kernels are unusable with amdgpu - Sapphire Nitro + RX590

2019-03-23 Thread CooSee
On Saturday, March 23, 2019 at 7:44:52 AM UTC+1, Foppe de Haan wrote:
> On Friday, March 22, 2019 at 11:41:12 PM UTC, CooSee wrote:
> > how to compile rpms on Qubes - maybe i can use the current available 
> > xorg-x11-drv-amdgpu and mybe xorg and mesa too.
> if you want to play around with this, it's probably easier to change the 
> fedora (updates?) distro from fc25 to fc29 in /etc/yum.repos.d/, input the 
> correct signing key, and try installing the new xorg-x11-drv-amdgpu using 
> qubes-dom0-update. 
> 
> > after login with new kernels, the desktop is loading just for 1 sec.
> 
> > there must be an error in the system, because i also tried KDE and Awesome 
> > - same behaviour, e.g. Lightdm backround is scrambled with glitches at 
> > login screen and it always kicks me back to login screen - using Dual 
> > Monitor Setup.
> yeah, sounds like there's a driver issue
> > 4.14.103 is working fine, but only with ' amdgpu.dpm=0 ' <<< is this bad 
> > for the device ?
> why did you try that option, specifically? phoronix guide? anyway, as he 
> writes, it's not harmful, it just won't game very well. ;)

the amdgpu.dpm=0 option with 4.14 kernel is necessary, because without it the 
screen goes black and the fans are starting to blow up!

on all kernels, amdgpu is always loaded, no difference.

i updated the pci.ids file for better detection.

changed yum.repos.d and tried, but:

qubes-dom0-update

Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Last metadata expiration check: 0:36:18 ago on Sat Mar 23 12:43:25 2019.
Error:
 Problem: The operation would result in removing the following protected 
packages: dnf, systemd, systemd-udev
(try to add '--skip-broken' to skip uninstallable packages)

with --skip-broken the same answer >> The operation would result in removing 
the following protected packages: dnf, systemd, systemd-udev

installing xorg-x11-drv-amdgpu from fc29 won't work because it depends on newer 
version of xorg >> xserver-abi (videodrv-24) and todo so it would brake the 
system and uninstall dnf!?

this is awful - that's why i never liked RPM based distros - it's PITA handling 
with packages.

is some one so kind and compile the newest version of xorg-x11-drv-amdgpu for 
FC25 and make it also officially available for all the users with newer AMD 
Graphics?

i noticed that the 'amd_iommu_v2' driver is loaded too, but even though, kernel 
4.14.103 can handle the desktop but newer kernels not, somehow.

i tried to blacklist to try without - but didn't work at all - it's always 
loading besides amdgpu module!

dmesg says >> AMD_IOMMUV2 funktionality not available on this system.

thx for your efford :-)


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38975fad-7c1f-45c5-91d7-e6219766eace%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Using screen via dp alt mode

2019-03-23 Thread 'wzrd73' via qubes-users
> On Friday, March 22, 2019 at 11:42:56 AM UTC-5, wzrd73 wrote:
>
> > Hallo,
> > is there a way to use an additional screen via dp alt mode (usb-c) in Qubes 
> > 4?
> > I'd like to attach an Asus Zen Screen to my laptop. The screen only has a 
> > usb-c port. My laptop has usb-a und usb-c and hdmi ports.
> > There are usb-c to hdmi adapters, but as far as I know they don't work in 
> > the other direction.
>
> I'm driving a monitor from my usb-c port (although the cable converts it to 
> HDMI). I would start with looking at the output of xrandr. On my computer, I
> see a listing for DP1.
>
> If you install arandr in dom0 you'll get an easier to use interface.
>
> Jon
>
>
My output of xrandr:
[User@dom0 ~]$ xrandr
Screen 0: minimum 8 x 8, current 1920 x 1080, maximum 32767 x 32767
eDP1 connected primary 1920x1080+0+0 (normal left inverted right x axis y axis) 
340mm x 190mm
   1920x1080 60.00*+  40.00
   1400x1050 59.98
   1600x900  60.00
   1280x1024 60.02
   1280x960  60.00
   1368x768  60.00
   1280x720  60.00
   1024x768  60.00
   1024x576  60.00
   960x540   60.00
   800x600   60.3256.25
   864x486   60.00
   640x480   59.94
   720x405   60.00
   640x360   60.00
HDMI1 disconnected (normal left inverted right x axis y axis)
VIRTUAL1 disconnected (normal left inverted right x axis y axis)


Message on the screen, when I connect it: "Your device does not support DP Alt 
mode, please install the latest driver and try again."

The device shows up as:
sys-usb:2-4.1 - Realtek_BillBoard_Device_123..FGH
sys-usb:3-3.2 - DisplayLink_MB16AC_821.M0419

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/jox1f6EfEPnV6fSwpi5cHqACNkfG3aZ0nFG3GZ7nCG7aBv6gz7AD6tev3r2ChcemSz6foQfWxSiEOrrsytQZJh_Pb1vamVksF0Y6d0VIJ-Y%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Using screen via dp alt mode

2019-03-23 Thread solworth%uic.edu via qubes-users
On Friday, March 22, 2019 at 11:42:56 AM UTC-5, wzrd73 wrote:
> Hallo,
> 
> is there a way to use an additional screen via dp alt mode (usb-c) in Qubes 4?
> 
> I'd like to attach an Asus Zen Screen to my laptop. The screen only has a 
> usb-c port. My laptop has usb-a und usb-c and hdmi ports.
> 
> There are usb-c to hdmi adapters, but as far as I know they don't work in the 
> other direction.

I'm driving a monitor from my usb-c port (although the cable converts it to 
HDMI).  I would start with looking at the output of xrandr.  On my computer, I
see a listing for DP1.

If you install arandr in dom0 you'll get an easier to use interface.

Jon

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3e6fc535-6802-4818-b466-04918d8e65c8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Shrinking a private volume

2019-03-23 Thread onw7two99
Hello Chris,

thank you once again for your feedback.

On 3/23/19 11:31 AM, Chris Laprise wrote:
> On 3/23/19 5:34 AM, onw7two99 wrote:
>> I run sudo fstrim -av from within the AppVM (as root) but I haven't
>> notive any change.
>
> The difference doesn't show until you shutdown the vm for the second
> time (the current .old volume gets deleted). Also the Qubes disk
> widget and Qubes Manager take some time to report the new values. But
> running fstrim may not make any difference if you haven't been
> deleting many files.

if I run ls -lah /var/lib/qubes/appvms/ the size listed is the
"thick provisioned", is there a way to show the "real" file size in dom0
whch should be the used size  which is reported from within the AppVM
when using "df -h" ?


>> Is there a way to move this private disk to the new storage-qube?
>
> Yes, you can use the 'mv' command while the two vms are not running.
> Keep in mind this can erase the existing private image of the
> new/destination vm unless you rename that first (but it won't be
> accessible after renaming it, unless you run 'qvm-block attach').

I tried to mount the private.img from the old appvm to the new one, but
I think I don't have the correct syntax.

I tried:

qvm-block attach  :private.img
qvm-block attach  /var/lib/qubes/appvms//private.img

How can I attach a private.img from one AppVM to another? Maybe even
once in read/write and in another scenario read only.

This could be usefull for doing forensics on an AppVM or clam av scans etc.

>> Neither in the AppVM nor in dom0 I see something like LVM, but as far as
>> I remember LVM was available in Qubes (I think have looked into it 1 or
>> 2 years ago.
>
> Since you have -cow.img files in /var/lib/qubes/appvms, your system
> seems to have been installed with one of the non-LVM options. This
> could be either Ext4 (rather limited) or Btrfs (flexible). Looking at
> the output of the 'mount' command in dom0 will tell you which.

Stupid me, I wasn't aware that I installed Qubes without LVM ... why
should I do so?

The only reason to fix this is likely to reinstall Qubes with LVM, but
what happens if I restore my old AppVMs from the non-LVM-setup?
Can you give some more details about the private.img vs private-cow.img
vs private-cow.img.old

>From the Qubes docs
https://www.qubes-os.org/doc/template-implementation/ I learned that the
root.cow.img will hold the differences (from the appVM perspective) to
root.img (the root image of the template which is read only).

Still I haven't understand what the private.cow.img and
private.cow.img.old do.

Is there some more information regarding this topic?

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75368c21-ba56-e565-6cf1-fef15a3924b8%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


pEpkey.asc
Description: application/pgp-keys


[qubes-users] Qubes' onion service is 404

2019-03-23 Thread 'qubeslover' via qubes-users


Hello,
Qubes' onion service has not been working for 48 hours. What is going on? Is it 
going to be fixed anytime soon?

Thanks


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/pEMPmm-_WoHdMRftXIqySmjOr1t3Z8kosMFpgo7ykJznb4_bVt_jU8XFLSoa1T-eo9lZVU8zhvnMwPdYdmCwSWKoaGSB_S-J7eBzo_Mb1mg%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4 Debian Packages Question

2019-03-23 Thread qubes-os

Thanks for the explanation!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9081d3d8-f5ad-8a86-a35c-fe6b69ef9e51%40go-bailey.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Dom0 Update breaks sys-usb widget

2019-03-23 Thread ronpunz
Qubes 4.0.1.
Following a recent dom0 update my sys-usb widget is partially broken; 1/
devices show in the widget when plugged into usb port but are not
removed when unplugged from the port. 2/ Plugged in devices can be
attached to VM's via widget but there's now no indication (other the
qvm-block in dom0) that they are attached. 3/ Unable to detach usb
device from VM's via the widget (although I can do this from dom0).

To check that I hadn't done something stupid and thereby broken the
widget I did the following procedure.

1. Reinstalled laptop with 4.0.1 from qubes website.
2. Tested sys-usb widget - It worked perfectly.
3. Updated Dom0 and tested widget - It worked perfectly.
4. Rebooted laptop - tested widget, but its now broken - same  diagnosis
as described above

It seems that a dom0 update has broken the widget?
Does anyone else have this problem?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/af90a3037a8792c924b7858f36929eb2%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Shrinking a private volume

2019-03-23 Thread Chris Laprise

On 3/23/19 5:34 AM, onw7two99 wrote:

Hello Brendan

On 2/28/19 3:14 AM, brendan.h...@gmail.com wrote:

I’ve found it necessary sometimes to sudo fstrim -av from inside the VM in 
order for the dom0 lvm thin provisioned volumes to return the unallocated space 
back to the pool.
This doesn’t shrink the volume but it does tell the system that it doesn’t need 
to store anything there for that VM currently so other VMs can use the space.
Welcome to thin provisioning!


I run sudo fstrim -av from within the AppVM (as root) but I haven't
notive any change.


The difference doesn't show until you shutdown the vm for the second 
time (the current .old volume gets deleted). Also the Qubes disk widget 
and Qubes Manager take some time to report the new values. But running 
fstrim may not make any difference if you haven't been deleting many files.




The AppVM has currently a 145GB private disk attached, from which 91GB
is used, 44GB is free.

I would like to move this data to another storage qube, but I have only
58GB available (df -h) in dom0.

Therefore I thought that I can someone move the private disk of
"storage-qube-old" to "storage-qube-new".

I have looked into /var/lib/qubes/appvms/storage-qube-old and see 3
private images:

private-cow.img -> 147 GB

private-cow.img.old -> 147 GB

private-cow.img -> 147 GB

Is there a way to move this private disk to the new storage-qube?


Yes, you can use the 'mv' command while the two vms are not running. 
Keep in mind this can erase the existing private image of the 
new/destination vm unless you rename that first (but it won't be 
accessible after renaming it, unless you run 'qvm-block attach').


Also keep in mind that any problems the old vm had arising from anything 
in /rw or /home will be carried over to the new vm.





Slightly offtopic:
  I haven't understand at which layer thin provisioning works in Qubes.

Neither in the AppVM nor in dom0 I see something like LVM, but as far as
I remember LVM was available in Qubes (I think have looked into it 1 or
2 years ago.


Since you have -cow.img files in /var/lib/qubes/appvms, your system 
seems to have been installed with one of the non-LVM options. This could 
be either Ext4 (rather limited) or Btrfs (flexible). Looking at the 
output of the 'mount' command in dom0 will tell you which.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1f38cbf1-482c-2c57-55a7-0108af8632f7%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] sys-usb based on fedora-29-minimal >> what am I missing?

2019-03-23 Thread onw7two99
Hello Qubes Community,

I have been trying to get sys-usb working using a fedora-29-minimal template

Unfortunately it will not work, even after installing all packages which
"should" be enough to get sys-usb working (Link
https://www.qubes-os.org/doc/templates/fedora-minimal/).

If I use the default fedora-28 (fat template) for sys-usb, everything is
working and I can attach my external harddrive to an AppVM.
If I use my custom build template for sys-usb, other USB devices work,
but I can't attach a harddrive to another AppVM, from the GUI it looks
like the drive is attached, but it is not shown in nautilus in the
target-AppVM, where I can then click on it and mount it.

Any idea what I am missing or how I can proceed troubleshooting? As all
my VMs are based on custom build templates (fedora-29-minimal) I don't
want to have the fat fedora-28 template only because sys-usb will not work.


To reproduce the problem: this is how I build my sys-vm-Template from
scratch (fedora-29-minimal) which I am using for sys-net, sys-firewall
and sys-usb (it it would work). Hint: You might need to change the wifi
drivers if you are using another wifi card modell. "iwl6000g2a-firmware"
is for my lenovo x230.

--- --- --- 8< --- --- --- --- --- --- --- 8< --- --- ---

# script to build a sys-vm template based on fedora-29-minimal
# the base template which is used to build my own sys-template
template=fedora-29-minimal

#my custom made template for sys-vms:
systemplate=t-fedora-29-sys

# get fedora-29-minimal template (only needs to be done once)
sudo qubes-dom0-update qubes-template-$template

#remove an old template (if it exists)
qvm-kill $systemplate
qvm-remove -f $systemplate

#clone template
qvm-clone $template $systemplate

# update template
qvm-run --auto --user root --pass-io --no-gui $systemplate \
  'dnf update -y'

# install a missing package for fedora-29-minimal
# without it, gui-apps will not start
qvm-run --auto --user root --pass-io --no-gui $systemplate \
  'dnf install -y

# Install required packages for Sys-VMs
qvm-run --auto --user root --pass-io --no-gui $systemplate \
  'dnf -y install e2fsprogs qubes-core-agent-qrexec \
   qubes-core-agent-systemd qubes-core-agent-networking polkit \
   qubes-core-agent-network-manager notification-daemon \
   qubes-core-agent-dom0-updates qubes-usb-proxy \
   iwl6000g2a-firmware qubes-input-proxy-sender iproute iputils \
   NetworkManager-openvpn NetworkManager-openvpn-gnome \
   NetworkManager-wwan NetworkManager-wifi \
   network-manager-applet qubes-core-agent-passwordless-root'

# Optional packages you might want to install in the sys-template:
qvm-run --auto --user root --pass-io --no-gui $systemplate \
  'dnf -y install nano less pciutils xclip'

# Set new template as template for sys-vms
qvm-shutdown --all --wait --timeout 120
qvm-prefs --set sys-usb template $systemplate
qvm-prefs --set sys-net template $systemplate
qvm-prefs --set sys-firewall template $systemplate
qvm-prefs --set sys-vpn template $systemplate
qvm-start sys-firewall sys-usb

--- --- --- 8< --- --- --- --- --- --- --- 8< --- --- ---

- O.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0d79f831-dca6-3bec-138f-7b33663cd8ea%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


pEpkey.asc
Description: application/pgp-keys


Re: [qubes-users] Shrinking a private volume

2019-03-23 Thread onw7two99
Hello Brendan

On 2/28/19 3:14 AM, brendan.h...@gmail.com wrote:
> I’ve found it necessary sometimes to sudo fstrim -av from inside the VM in 
> order for the dom0 lvm thin provisioned volumes to return the unallocated 
> space back to the pool.
> This doesn’t shrink the volume but it does tell the system that it doesn’t 
> need to store anything there for that VM currently so other VMs can use the 
> space.
> Welcome to thin provisioning!

I run sudo fstrim -av from within the AppVM (as root) but I haven't
notive any change.

The AppVM has currently a 145GB private disk attached, from which 91GB
is used, 44GB is free.

I would like to move this data to another storage qube, but I have only
58GB available (df -h) in dom0.

Therefore I thought that I can someone move the private disk of
"storage-qube-old" to "storage-qube-new".

I have looked into /var/lib/qubes/appvms/storage-qube-old and see 3
private images:

private-cow.img -> 147 GB

private-cow.img.old -> 147 GB

private-cow.img -> 147 GB

Is there a way to move this private disk to the new storage-qube?


Slightly offtopic:
 I haven't understand at which layer thin provisioning works in Qubes.

Neither in the AppVM nor in dom0 I see something like LVM, but as far as
I remember LVM was available in Qubes (I think have looked into it 1 or
2 years ago.

- O


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80198411-b1f9-c56d-3151-4ccf86cf6e90%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


pEpkey.asc
Description: application/pgp-keys


Re: [qubes-users] Re: qvm-usb not functioning

2019-03-23 Thread Zbigniew Łukasiak
On Sat, Mar 23, 2019 at 3:23 AM unman  wrote:
>
> On Fri, Mar 22, 2019 at 06:32:07AM -0700, Zbigniew Łukasiak wrote:
> > On Friday, December 1, 2017 at 12:58:59 PM UTC+1, awokd wrote:
> > > On Fri, December 1, 2017 05:50, Drew White wrote:
> > > > On Tuesday, 21 November 2017 06:45:02 UTC+11, awokd  wrote:
> > > >> On Mon, November 20, 2017 02:32, Drew White wrote:
> > > >> > Hi folks, sys-usb still isn't functioning and allowing me to attach a
> > > >> > device.
> > > >> >
> > > >> > help please?
> > >
> > > Let's start over. Describe your Qubes version, the USB device you are
> > > trying to attach, which USB controllers you have assigned to sys-usb or
> > > dom0, and the output of commands you use when attaching.
> >
> > I have a similar problem - qvm-usb retuns an empty list.
> >
> > [root@dom0 zby]# qvm-usb
> > BACKEND:DEVID  DESCRIPTION  USED BY
> > [root@dom0 zby]# lsusb
> > Bus 002 Device 002: ID 0bda:0411 Realtek Semiconductor Corp.
> > Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
> > Bus 001 Device 002: ID 0bda:5411 Realtek Semiconductor Corp.
> > Bus 001 Device 011: ID 148f:761a Ralink Technology, Corp.
> > Bus 001 Device 004: ID 03f0:0641 Hewlett-Packard
> > Bus 001 Device 003: ID 413c:2111 Dell Computer Corp.
> > Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> >
> > This is Qubes 4.0
> >
> > I tried the recoding suggestion - I added "ID_SERIAL=`echo ${ID_SERIAL} | 
> > iconv -t ASCII//TRANSLIT`" in  /usr/lib/qubes/udev-usb-add-change and then 
> > removed and put back the device - but that did not change the result.
> >
> >
> >
> > Cheers,
> > Zbigniew
> >
>
> What's the USB device you are trying to attach?

This time I needed the wifi card (Ralink) - but this is not the first
time I had this problem.

> I'm assuming you chose not to create a sys-usb.

Yes - and after someone on irc advised me to create it - that fixed
the problem. Maybe this is a documentation problem - apparently
sys-usb is kind of obligatory now.

Cheers,
Zbigniew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGL_UUvou106_6-7MWksmRXNrH577c4msL-PwNKLX4FGsgQMEw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: all new kernels are unusable with amdgpu - Sapphire Nitro + RX590

2019-03-23 Thread Foppe de Haan
On Friday, March 22, 2019 at 11:41:12 PM UTC, CooSee wrote:
> how to compile rpms on Qubes - maybe i can use the current available 
> xorg-x11-drv-amdgpu and mybe xorg and mesa too.
if you want to play around with this, it's probably easier to change the fedora 
(updates?) distro from fc25 to fc29 in /etc/yum.repos.d/, input the correct 
signing key, and try installing the new xorg-x11-drv-amdgpu using 
qubes-dom0-update. 

> after login with new kernels, the desktop is loading just for 1 sec.

> there must be an error in the system, because i also tried KDE and Awesome - 
> same behaviour, e.g. Lightdm backround is scrambled with glitches at login 
> screen and it always kicks me back to login screen - using Dual Monitor Setup.
yeah, sounds like there's a driver issue
> 4.14.103 is working fine, but only with ' amdgpu.dpm=0 ' <<< is this bad for 
> the device ?
why did you try that option, specifically? phoronix guide? anyway, as he 
writes, it's not harmful, it just won't game very well. ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2753e7d6-d4aa-4e7c-b2bc-8f41bbe7a690%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: all new kernels are unusable with amdgpu - Sapphire Nitro + RX590

2019-03-23 Thread Foppe de Haan
On Saturday, March 23, 2019 at 2:18:52 AM UTC, CooSee wrote:
> i found this Error in Xorg.0.log - only with newer Kernel.
> 
> [   123.712] (EE) glamor0: GL error: GL_OUT_OF_MEMORY in glTexSubImage
> [   123.719] (WW) glamor: Failed to allocate 200x200 FBO due to 
> GL_OUT_OF_MEMORY.
> [   123.719] (WW) glamor: Expect reduced performance.
> 
> why 4.14.103-1 Kernel can handle the login and newer Kernels not ?
> 
> thx

is there a difference in which driver it loads (lspci -nnk | grep -i vga -A 3)?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d5babfee-f2f7-4f9a-8694-84a2a7dcd5fc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.