[qubes-users] Re: Boot Problem

2019-07-10 Thread drownthepoor
On Friday, April 28, 2017 at 1:27:58 PM UTC-4, craig@gmail.com wrote:
> On Saturday, April 22, 2017 at 8:28:35 PM UTC-7, Andrew Morgan wrote:
> > On 04/22/2017 03:21 PM,
> > craig.g.jes...@gmail.com wrote:
> > > On Wednesday, April 19, 2017 at 1:35:06 PM UTC-7, 
> > > craig.g...-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:
> > >> I am having at boot problem with my Qubes OS 3.2.  When I boot up I 
> > >> enter the disk password and the boot process continues until it gets to 
> > >> the line...
> > >>
> > >> A start job is running for Qubes NetVM startup (32s / no limit)
> > >>
> > >> And it hangs.  The HDD turns off and the computer will stay here never 
> > >> booting or shutting down until you force it to turn off.  Anyone have an 
> > >> idea of what is going on and how to fix it?
> > >>
> > >> Thank you,
> > >>
> > >> Craig
> > > 
> > > Thank you for your information.  Using your directions I have managed to 
> > > get into my Qubes system.  I disabled qubes-netvm.service and my system 
> > > will now shutdown and startup without any kernel command line options.  
> > > Of course this means I have no network connections to anything.  If I 
> > > enable the qubes-netvm.service and start sys-net the Qubes OS freezes up 
> > > and I have to power cycle the laptop.  How do I fix the 
> > > qubes-netvm.service?  It seems to be causing the problem but what do I 
> > > check next?
> > > 
> > > Thank you,
> > > 
> > > Craig Jesson
> > > 
> > 
> > When I was having issues with my NetVM, I backed off all my AppVMs and
> > templates (sans the NetVM) to an external drive, reinstalled QubesOS,
> > generated a new sys-net and sys-firewall, then restored all my AppVMs
> > back again. Fixed all my issues.
> > 
> > May be a good last resort if you're not sure what's the issue with the
> > NetVM.
> > 
> > Andrew
> 
> First I want to thank Manual Amador and Andrew Morgan for your help.  Using 
> Manual's advice I was able to get into my frozen laptop.  I then used 
> Andrew's advice to backup all of my vm's except for sys-net and sys-firewall. 
>  Then I reinstalled Qubes OS v. 3.2.  I have figured out what went wrong.  
> Qubes on my laptop started freezing after a recent update.  The update 
> replaced qubes-netvm.service with a new qubes-netvm.service.  This overwrote 
> changes I made to qubes-netvm.service to make my Broadcom NetXtreme BCM5761 
> Gigabit Ethernet PCIe and BCM4313 802.11bgn Wireless Network Adapter work.  
> Unfortunately I did not backup the qubes-netvm.service to document the 
> changes I made.  So I am trying to remember what I did to get these cards 
> working.  But everything I have tried has not worked.  I did the "Assigning 
> Devices" work around listed here 
> https://www.qubes-os.org/doc/assigning-devices/
> and This does not seem to matter on the BCM5761 Ethernet card.  But it does 
> seem necessary for the wireless card.  Right now I have the wireless card 
> disabled in the BIOS figuring that I will get each card working one at a 
> time.  So the Ethernet card shows up and I have it assigned to the sys-net vm 
> but it will not get an IP address.  I have live booted the laptop with 
> Knoppix and I can get an IP address and use the Internet so I know the 
> Ethernet card, the cable, and the residential gateway are all working fine so 
> it has to be some kind of configuration problem in Qubes.  Here is my Qubes 
> HCL Report...
> 
> ---
> layout:
>   'hcl'
> type:
>   'laptop'
> hvm:
>   'yes'
> iommu:
>   'yes'
> slat:
>   'yes'
> tpm:
>   'unknown'
> brand: |
>   Dell Inc.
> model: |
>   Latitude E5520
> bios: |
>   A14
> cpu: |
>   Intel(R) Core(TM) i5-2540M CPU @ 2.60GHz
> cpu-short: |
>   FIXME
> chipset: |
>   Intel Corporation 2nd Generation Core Processor Family DRAM Controller 
> [8086:0104] (rev 09)
> chipset-short: |
>   FIXME
> gpu: |
>   Intel Corporation 2nd Generation Core Processor Family Integrated Graphics 
> Controller [8086:0126] (rev 09) (prog-if 00 [VGA controller])
> gpu-short: |
>   FIXME
> network: |
>   Broadcom Corporation BCM4313 802.11bgn Wireless Network Adapter (rev 01)
>   Broadcom Corporation NetXtreme BCM5761 Gigabit Ethernet PCIe (rev 10)
> memory: |
>   8089
> scsi: |
>   ST9500423AS  Rev: DEM1
>   DVD+-RW GT60NRev: A102
> 
> versions:
> 
> - works:
> 'FIXME:yes|no|partial'
>   qubes: |
> R3.2
>   xen: |
> 4.6.1
>   kernel: |
> 4.4.14-11
>   remark: |
> FIXME
>   credit: |
> FIXAUTHOR
>   link: |
> FIXLINK
> 
> ---
> 
> Here is my Qubes-pre-netvm.service
> 
> [Unit]
> Description=Netvm fixup
> Before=qubes-netvm.service
> 
> [Service]
> ExecStart=/bin/sh -c echo ':09:00.0 > 
> /sys/bus/pci/drivers/pciback/permissive'
> Type=oneshot
> RemainAfterExit=yes
> 
> [Install]
> WantedBy=multi-user.target
> 
> 
> Anybody have a clue as how to make my network cards work?
> 
> Thank you,
> 
> Craig Jesson

Hey, did you ever get this issue resolved? I am using a Dell Precision 
Workstation and I ONLY have the Broadcom

Re: [qubes-users] Dell XPS 15 9570 UEFI Issue

2019-07-10 Thread 'awokd' via qubes-users
Pete Howell:
> Can you post the link to the instructions you followed, please.  I did 
> finally give up on this and am back to Windows 10 on my Dell laptop; but, I'd 
> like to give it another try.
> 
> I should also mention that the ISO would never boot properly from the UEFI 
> partition on the USB stick, so I'm guessing that since the installer would 
> only boot in legacy mode, that that may be part of the reason I get a 
> successful Qubes install with no UEFI boot partition.
> 
> Does anyone know why the Qubes 4.0.1 image does not boot in UEFI?  The 
> partition shows up to boot from, but you just get a blank screen and no 
> installer.
> 
> On Tuesday, June 4, 2019 at 6:00:37 PM UTC-6, y...@tutanota.com wrote:
>> Update...I tried the efi=no-rs section in the UEFI troubleshooting guide 
>> again because I didn't try it from scratch and I got it to boot! The boot 
>> option shows up under UEFI but it requires Legacy Options ROMs to still be 
>> enabled in the BIOS.
>>
>>
>>
>>
>> Steps to install Qubes:
>>
>> 1. BIOS: Enable Legacy Options ROMs, Disable Secure Boot, SATA: AHCI mode
>>
>> 2. Boot USB drive in legacy mode - USB Storage Device.
>>
>> 3. Perform the steps in the UEFI troubleshooting section called 
>> "Installation freezes before getting to Anaconda / disable EFI runtime 
>> services". I used a Ubuntu liveCD to edit the xen.cfg file. When starting 
>> the installation, add kernel parameter nouveau.modeset=0.
> 
Believe the person you replied to was referring to
https://www.qubes-os.org/doc/uefi-troubleshooting/#installation-freezes-before-getting-to-anaconda--disable-efi-runtime-services.
There are also instructions at the top of that page to edit your installer.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/521d5417-02ed-80b0-4eb3-54da8248744a%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] are system hangs normal?

2019-07-10 Thread Chris Laprise

On 7/10/19 1:19 PM, acunal.hamad...@gmail.com wrote:

Chris: Thank you for your thoughts

It just happened again less than an hour of up time while editing a plain text 
file.

while trying to open a dom0 terminal

"Failed to execute command "exp-open --launch TerminalEmulator" Failed to execute child 
process "exo-open" (Input/output error)

logout verbose text screen

"started account services Ctrl-alt-del pressed more than 7 times within 2s, 
rebooting immediately. watchdog: watchdog0: watchdog did not stop"



What amount of RAM, and have you run a hardware test recently?

Does SSD pass SMART self-tests?

Did you install with the default (lvm) storage config? If so, are you 
getting any errors about storage in the dom0 log?



If there appears to be nothing in particular causing it, you might want 
to assume there was a glitch during installation. That has happened to 
me before and doing a fresh install fixed it.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee326090-f99a-be20-30a5-8fe53216bc64%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-10 Thread drokmed
> Users should be aware that the newer Debian template might not be able 
> to update without first running a command manually:
> 
> https://github.com/QubesOS/qubes-issues/issues/5149

Confirmed.  I just reached that point.  Downloaded the new ISO, installed okay. 
 Updated each template okay.

BTW the above error no longer occurs with the whonix templates.  They seem to 
be fixed now.  That's good.

Also FYI:  The Debian-10 error can be avoided by first installing Debian-9, 
then manually upgrading it to Debian-10.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d97cc685-bb39-4629-a9c0-7dbb57f61e98%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-10 Thread Chris Laprise

On 7/10/19 3:52 AM, Andrew David Wong wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We're pleased to announce the first release candidate for Qubes 4.0.2!

Features:
  - All 4.0 dom0 updates to date
  - Fedora 30 TemplateVM
  - Debian 10 TemplateVM
  - Whonix 15 Gateway and Workstation TemplateVMs
  - Linux kernel 4.19 by default

Qubes 4.0.2-rc1 is available on the Downloads page. [1]


Users should be aware that the newer Debian template might not be able 
to update without first running a command manually:


https://github.com/QubesOS/qubes-issues/issues/5149


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4b5860a7-09fc-5f2b-e972-97421dc94207%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Raid 5 failure

2019-07-10 Thread 'Whenow' via qubes-users
I have a RAID 5 configuration that has failed. I physically removed the failed 
disk, inserted a new one of the same nominal capacity. Then in dom0 I used 
mdadm to add the new disk to the array and the new disk was successfully added 
in to the array. Upon every reboot now the disk is not automatically added to 
the RAID. I need to create the device node for the new hard drive's RAID 
partition and then manually enter "sudo mdadm --manage /dev/md127 --add 
/dev/sdc1" to complete the RAID setup. What do I need to do to make this setup 
automatic?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/xyv3lRaE14w1yGqVz_mM0rVTgcGVUtjsihNjdYiALRZUHl9G7ClttjBn3gBgNaf9-jOq5eqPTyQTTipPqFUAk9370b7xWn3Zvn11jZvbH9Q%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can I hope to run Qubes OS on Macbook Air 2013

2019-07-10 Thread alteration2121
Hi, every one. Just like mariiusz Im planing to by a 2012-2014 macbook air for 
qubes.

Eric shelton describes his process  of doing this. What he whent trough Its way 
above my skills and  to time consuming to be an option for me.

However this was back in early 2016. And many versions of qubes has bin 
released by now. So I would like to know if any one has installed the newer 
versions of qubes on the model mentioned abow? Will it work right out of the 
box?

best regards 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c049527-e28f-4cb7-84f1-dd76fec7c6f5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can I hope to run Qubes OS on Macbook Air 2013

2019-07-10 Thread alteration2121
"Den onsdag 13 januari 2016 kl. 14:15:06 UTC+1 skrev mariusz...@gmail.com:
> Same as topic name. I am currently running mac os with heavy virtual machines 
> usage to get more security/privacy. I will probably switch to linux soon but 
> since i plan on using a lot of one time use VMs or even whonix i would rather 
> get as secure host as possible. So i figured why not use Qubes OS since i 
> already do everything manually.
> 
> If not mba what high end ultrabook would you recommend ?"

Hi, every one. Just like mariiusz Im planing to by a 2012-2014 macbook air for 
qubes. 

Eric shelton describes his process  of doing this. What he whent trough Its way 
above my skills and  to time consuming to be an option for me. 

However this was back in early 2016. And many versions of qubes has bin 
released by now. So I would like to know if any one has installed the newer 
versions of qubes on the model mentioned abow? Will it work right out of the 
box? 

best regards  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8c670a19-dfe3-4735-86e7-3c9424c2d0f1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] EFI / UEFI guest

2019-07-10 Thread thorsten . schierer
Hi, I stumbled upon https://wiki.xenproject.org/wiki/OVMF and wondered if this 
is already implemented into QubesOS.
What's the current status here?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7d9bf987-55cd-4393-bc3a-1c74fafd5395%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] are system hangs normal?

2019-07-10 Thread acunal . hamadani
Unman: About how old would you say your Coreboot flash is?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f7dc39bc-e311-43e0-975a-649cd7e5be76%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] are system hangs normal?

2019-07-10 Thread acunal . hamadani
Chris: Thank you for your thoughts

It just happened again less than an hour of up time while editing a plain text 
file.

while trying to open a dom0 terminal

"Failed to execute command "exp-open --launch TerminalEmulator" Failed to 
execute child process "exo-open" (Input/output error)

logout verbose text screen  

"started account services Ctrl-alt-del pressed more than 7 times within 2s, 
rebooting immediately. watchdog: watchdog0: watchdog did not stop"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6167748f-210f-4d03-beac-8a79d3cc7514%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] are system hangs normal?

2019-07-10 Thread acunal . hamadani
On Wednesday, July 10, 2019 at 11:33:01 AM UTC-4, unman wrote:
> On Wed, Jul 10, 2019 at 12:23:45AM -0400, Chris Laprise wrote:
> > On 7/9/19 11:38 PM, acunal.hamad...@gmail.com wrote:
> > > Hello All,
> > > 
> > > What I am working with
> > > 
> > > Qubes 4 Current Stable (7/19)
> > > x230 with coreboot
> > > Reinstalled to a new SSD a month ago
> > > 
> > > The problem -- Resolved temporarily by restarting
> > > 
> > > Several times a week there are times that without warning, everything is 
> > > still up on the screen and will to a limited degree work, but it is as if 
> > > it were a veneer of functionality. When I try to read/write the 
> > > filesystem, make terminal / dom0 commands apps will either crash or no 
> > > action will come. During the shutdown screen the verbose text hangs on 
> > > waiting. Ctrl Alt Del returns text informing me that it attempted to 
> > > restart the machine immediately and failed.
> > > If something hasn't been saved or otherwise won't gracefully accept the 
> > > table-flip of using the power button this is particularly unfortunate.
> > > 
> > > Questions
> > > 
> > > Thoughts on what this might be or where to look?
> > > Is there a vocabulary for this type of problem?
> > 
> > In my experience hanging is quite rare.
> > 
> > However, there are certain (bad) conditions that can bring it about. For
> > example, if you mount external filesystems in dom0, and shut down the VM
> > that supplies the backing storage for the filesystem before its un-mounted,
> > then the system can become unresponsive in similar ways to what you
> > reported. Its not hard to forget to cleanly un-mount a filesystem and close
> > encryption, etc. before shutting down a storage VM.
> > 
> > There may be a different cause to your problem, but that is what came to
> > mind when I read your post.
> > 
> 
> No help from me.
> I have a corebooted x230 - it's stable and always has been.
> I havent tried Chris' method - I'll see if that triggers anything for
> me.

Chris: Thank you for your thoughts

It just happened again less than an hour of up time while editing a plain text 
file. 

while trying to open a dom0 terminal 

"Failed to execute command "exp-open --launch TerminalEmulator" Failed to 
execute child process "exo-open" (Input/output error)

logout verbose text screen  

"started account services Ctrl-alt-del pressed more than 7 times within 2s, 
rebooting immediately. watchdog: watchdog0: watchdog did not stop"


Unman: About how old would you say your Coreboot flash is?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed3a827a-ec67-42dc-870f-c138df46543b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't sudo in unman's qubes.3isec.org Ubuntu-14.04 template

2019-07-10 Thread Steve Coleman

On 7/10/19 2:02 AM, list.w...@gmail.com wrote:

On Tuesday, 9 July 2019 12:31:23 UTC, steve.coleman  wrote:

On 7/9/19 7:25 AM,  wrote:

Hi, I installed a Ubuntu-14.04 minimal template from qubes.3isec.org using

$ sudo dnf install qubes-template-stretch-minimal-4.0.1-201812230252.noarch.rpm

and that works 'fabelhaft' (German for 'fabulously' :), but inside the running 
template I'm asked for a password when I try to sudo my way into apt-get update.

Does anyone know the password for 'user'?

Thanks.



If you can not sudo, you can always try running your command from Dom0
as user root:

$ qvm-run -a --user root  "apt-get update"


Thanks.
I not only want to update, I also want to run all other kinds of commands as 
sudo. Do you think I can run any command like this inside the qube from within 
dom0?


You can also run any other command as root, like "passwd user" to set 
the password to a know value, or "gedit /etc/sudoers" and modify who can 
sudo, add yourself to the wheel group, etc... I can't say why your 
particular appvm prevents you from sudoing without testing the vm 
myself, but whatever the problem is, you now have a way to get a root 
shell to fix it.


hope this helps




--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7aef641a-2065-ad04-8279-0de94d0c97de%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Failed qubesd deamon connection

2019-07-10 Thread 'awokd' via qubes-users
cammum...@gmail.com:
> On Tuesday, 9 July 2019 04:43:14 UTC+3, awokd  wrote:
>>> On Monday, 8 July 2019 23:42:36 UTC+3, camm...@gmail.com  wrote:
 I have tried everything on the internet to solve my problem it says 
 Start-limit-hit. I try you post in another chat nano 
 var/lib/qubes/qubes.xml.resut no directory exist.
 I try everything else I find on the web withe no solution. I have photos I 
 don't want to lost and work stuff I need.
 Please help me.
>>>
>>> https://postimg.cc/2bPYyHMW
>>> https://postimg.cc/YjGq7FZg
>>>
>>> More details of my problem.
>>>
>> Provide text log file of "sudo journalctl -b" output. Note you may want 
>> to edit out hardware serial #s, etc.
> 
> https://ibb.co/9h1ftRV
> https://ibb.co/BPkP5xh
> https://ibb.co/Jjfw788
> https://ibb.co/pZfmbhw
> https://ibb.co/r7bG2Tt
> https://ibb.co/Yj855pZ
> https://ibb.co/318v99W
> https://ibb.co/RjSB7qJ
> https://ibb.co/W6SJZQm
> https://ibb.co/tY7mnbv
> https://ibb.co/wz7TCTm
> https://ibb.co/BtYyw8y
> https://ibb.co/wpq7gts
> https://ibb.co/KD8qZ1V
> https://ibb.co/WvDKkZS
> https://ibb.co/276gsbw
> https://ibb.co/4gXZ3Rc
> https://ibb.co/QfgJjmP
> https://ibb.co/c27y82v
> https://ibb.co/kcCLfT8
> https://ibb.co/L87KrZs
> 
> These are links to images I take. 
> I can make for you a video and send if you want. It is about 3500 lines total.
> 
> I really appreciate your help. Thank you very much. I really like qubes no 
> problems until I put USB to transfer photos. Then after this problem occurs. 
> I use same USB everything nothing new. Only one computer and 1 camera that's 
> it.
> 
> Thank you very much. 
> 
Appreciate the time it took to make all those pictures, but I was
looking for a text file instead? You should be able to mount a USB drive
from the command line and copy it out.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b62bfc70-7385-770e-efca-d3f5ee9b0f15%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] are system hangs normal?

2019-07-10 Thread unman
On Wed, Jul 10, 2019 at 12:23:45AM -0400, Chris Laprise wrote:
> On 7/9/19 11:38 PM, acunal.hamad...@gmail.com wrote:
> > Hello All,
> > 
> > What I am working with
> > 
> > Qubes 4 Current Stable (7/19)
> > x230 with coreboot
> > Reinstalled to a new SSD a month ago
> > 
> > The problem -- Resolved temporarily by restarting
> > 
> > Several times a week there are times that without warning, everything is 
> > still up on the screen and will to a limited degree work, but it is as if 
> > it were a veneer of functionality. When I try to read/write the filesystem, 
> > make terminal / dom0 commands apps will either crash or no action will 
> > come. During the shutdown screen the verbose text hangs on waiting. Ctrl 
> > Alt Del returns text informing me that it attempted to restart the machine 
> > immediately and failed.
> > If something hasn't been saved or otherwise won't gracefully accept the 
> > table-flip of using the power button this is particularly unfortunate.
> > 
> > Questions
> > 
> > Thoughts on what this might be or where to look?
> > Is there a vocabulary for this type of problem?
> 
> In my experience hanging is quite rare.
> 
> However, there are certain (bad) conditions that can bring it about. For
> example, if you mount external filesystems in dom0, and shut down the VM
> that supplies the backing storage for the filesystem before its un-mounted,
> then the system can become unresponsive in similar ways to what you
> reported. Its not hard to forget to cleanly un-mount a filesystem and close
> encryption, etc. before shutting down a storage VM.
> 
> There may be a different cause to your problem, but that is what came to
> mind when I read your post.
> 

No help from me.
I have a corebooted x230 - it's stable and always has been.
I havent tried Chris' method - I'll see if that triggers anything for
me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190710153259.c6vs3e2g42iwbeoj%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0.2-rc1 has been released!

2019-07-10 Thread drokmed
Great!

I was getting ready to ask when it might be out :)

I'll download the ISO and try it out.  Time to wipe another drive...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e83177c6-26f8-4d8f-8099-56dcc6d0d8c7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Need help on creating a Whonix VM from a template

2019-07-10 Thread Fernando Cabral
After installing and updating Whonix 15, I am trying to create a VM from this 
template. Nevertheless, no matter what I do (as far as I have tried), when I 
try do execute something in the VM Qubes complains that I have using the wrong 
configuration (AppVM). 

Can you point me a step by step guide on how to create a VM from a template. Or 
if possible, more specifically, a Whonix 15 VM?

Or else, can you hint me on how to do it?

Thank you

- fernando

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9830791a-aa9d-4a7f-99dc-aa5d1ac8b700%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dell XPS 15 9570 UEFI Issue

2019-07-10 Thread Pete Howell
Can you post the link to the instructions you followed, please.  I did finally 
give up on this and am back to Windows 10 on my Dell laptop; but, I'd like to 
give it another try.

I should also mention that the ISO would never boot properly from the UEFI 
partition on the USB stick, so I'm guessing that since the installer would only 
boot in legacy mode, that that may be part of the reason I get a successful 
Qubes install with no UEFI boot partition.

Does anyone know why the Qubes 4.0.1 image does not boot in UEFI?  The 
partition shows up to boot from, but you just get a blank screen and no 
installer.

On Tuesday, June 4, 2019 at 6:00:37 PM UTC-6, y...@tutanota.com wrote:
> Update...I tried the efi=no-rs section in the UEFI troubleshooting guide 
> again because I didn't try it from scratch and I got it to boot! The boot 
> option shows up under UEFI but it requires Legacy Options ROMs to still be 
> enabled in the BIOS.
> 
> 
> 
> 
> Steps to install Qubes:
> 
> 1. BIOS: Enable Legacy Options ROMs, Disable Secure Boot, SATA: AHCI mode
> 
> 2. Boot USB drive in legacy mode - USB Storage Device.
> 
> 3. Perform the steps in the UEFI troubleshooting section called "Installation 
> freezes before getting to Anaconda / disable EFI runtime services". I used a 
> Ubuntu liveCD to edit the xen.cfg file. When starting the installation, add 
> kernel parameter nouveau.modeset=0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e6e4d35-bf1a-4d62-9cbe-f1aa995f0d68%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Failed qubesd deamon connection

2019-07-10 Thread cammumtar
On Tuesday, 9 July 2019 04:43:14 UTC+3, awokd  wrote:
> > On Monday, 8 July 2019 23:42:36 UTC+3, camm...@gmail.com  wrote:
> >> I have tried everything on the internet to solve my problem it says 
> >> Start-limit-hit. I try you post in another chat nano 
> >> var/lib/qubes/qubes.xml.resut no directory exist.
> >> I try everything else I find on the web withe no solution. I have photos I 
> >> don't want to lost and work stuff I need.
> >> Please help me.
> > 
> > https://postimg.cc/2bPYyHMW
> > https://postimg.cc/YjGq7FZg
> > 
> > More details of my problem.
> > 
> Provide text log file of "sudo journalctl -b" output. Note you may want 
> to edit out hardware serial #s, etc.

https://ibb.co/9h1ftRV
https://ibb.co/BPkP5xh
https://ibb.co/Jjfw788
https://ibb.co/pZfmbhw
https://ibb.co/r7bG2Tt
https://ibb.co/Yj855pZ
https://ibb.co/318v99W
https://ibb.co/RjSB7qJ
https://ibb.co/W6SJZQm
https://ibb.co/tY7mnbv
https://ibb.co/wz7TCTm
https://ibb.co/BtYyw8y
https://ibb.co/wpq7gts
https://ibb.co/KD8qZ1V
https://ibb.co/WvDKkZS
https://ibb.co/276gsbw
https://ibb.co/4gXZ3Rc
https://ibb.co/QfgJjmP
https://ibb.co/c27y82v
https://ibb.co/kcCLfT8
https://ibb.co/L87KrZs

These are links to images I take. 
I can make for you a video and send if you want. It is about 3500 lines total.

I really appreciate your help. Thank you very much. I really like qubes no 
problems until I put USB to transfer photos. Then after this problem occurs. I 
use same USB everything nothing new. Only one computer and 1 camera that's it.

Thank you very much. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d12ecfa-232f-4a61-836a-f5c769d37ce2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN before sys-firewall ?

2019-07-10 Thread brendan . hoar
I’m currently using:

VMs -> sys-mirage-fw-int -> sys-vpn-tasket-> sys-mirage-fw-ext -> sys-net

Benefit of mirage in this situation is that each one consumes only 32MB of RAM.

B

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07410923-e42e-4daa-8cbd-506eca9acc5b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HowTo: Install the Stable Version of Qubes-Whonix ™ 15

2019-07-10 Thread claudio
Hi,

I've followed the steps found on https://www.whonix.org/wiki/Qubes/Install. 
First I've updated dom0 (sudo qubes-dom0-update), then I've edited 
/srv/formulas/base/virtual-machines-formula/qvm/whonix.jinja and replaced "14" 
by "15" and then I've issued sudo qubesctl state.sls qvm.anon-whonix command, 
which was supposed to download and install Whonix 15 but I've got errors (see 
below).

Any help much appreciated. I'd removed all Whonix 14 components before because 
I've broken the gateway VM after trying to upgrade it from command line.

Thanks in advance
Claudio

[claudio@dom0 ~]$ sudo qubesctl state.sls qvm.anon-whonix
[ERROR   ] Command '['systemd-run', '--scope', 'qubes-dom0-update', '-y', 
'--best', '--allowerasing', '--disablerepo=*', 
'--enablerepo=qubes-templates-community', '--clean', '--action=install', 
'qubes-template-whonix-ws-15']' failed with return code: 1
[ERROR   ] stdout: Running scope as unit: 
run-r73c74b031ca0467aa7984ab0632f7f78.scope
Using mirage-firewall-wifi as UpdateVM to download updates for Dom0; this may 
take some time...
[ERROR   ] retcode: 1
[ERROR   ] Error occurred installing package(s). Additional info follows:

errors:
- Running scope as unit: run-r73c74b031ca0467aa7984ab0632f7f78.scope
  Using mirage-firewall-wifi as UpdateVM to download updates for Dom0; this 
may take some time...
[WARNING ] /var/cache/salt/minion/extmods/states/ext_state_qvm.py:142: 
DeprecationWarning: BaseException.message has been deprecated as of Python 2.6
  status = Status(retcode=1, result=False, stderr=err.message + '\n')

[ERROR   ] == ['features'] ==
Virtual Machine does not exist!

== ['tags'] ==
[SKIP] Skipping due to previous failure!
[ERROR   ] Command '['systemd-run', '--scope', 'qubes-dom0-update', '-y', 
'--best', '--allowerasing', '--disablerepo=*', 
'--enablerepo=qubes-templates-community', '--action=install', 
'qubes-template-whonix-gw-15']' failed with return code: 1
[ERROR   ] stdout: Running scope as unit: 
run-r40ec4f8030284021a2f80d44af49d36f.scope
Using mirage-firewall-wifi as UpdateVM to download updates for Dom0; this may 
take some time...
[ERROR   ] retcode: 1
[ERROR   ] Error occurred installing package(s). Additional info follows:

errors:
- Running scope as unit: run-r40ec4f8030284021a2f80d44af49d36f.scope
  Using mirage-firewall-wifi as UpdateVM to download updates for Dom0; this 
may take some time...
[ERROR   ] == ['features'] ==
Virtual Machine does not exist!

== ['tags'] ==
[SKIP] Skipping due to previous failure!
local:
--
  ID: template-whonix-ws-15
Function: pkg.installed
Name: qubes-template-whonix-ws-15
  Result: False
 Comment: Error occurred installing package(s). Additional info follows:
  
  errors:
  - Running scope as unit: 
run-r73c74b031ca0467aa7984ab0632f7f78.scope
Using mirage-firewall-wifi as UpdateVM to download updates 
for Dom0; this may take some time...
 Started: 11:16:43.589367
Duration: 5101.908 ms
 Changes:   
--
  ID: whonix-ws-tag
Function: qvm.vm
Name: whonix-ws-15
  Result: False
 Comment: == ['features'] ==
  Virtual Machine does not exist!
  
  == ['tags'] ==
  [SKIP] Skipping due to previous failure!
 Started: 11:16:48.694020
Duration: 17.289 ms
 Changes:   
--
  ID: whonix-ws-update-policy
Function: file.prepend
Name: /etc/qubes-rpc/policy/qubes.UpdatesProxy
  Result: True
 Comment: File /etc/qubes-rpc/policy/qubes.UpdatesProxy is in correct state
 Started: 11:16:48.713516
Duration: 3.164 ms
 Changes:   
--
  ID: whonix-get-date-policy
Function: file.prepend
Name: /etc/qubes-rpc/policy/qubes.GetDate
  Result: True
 Comment: File /etc/qubes-rpc/policy/qubes.GetDate is in correct state
 Started: 11:16:48.716793
Duration: 1.201 ms
 Changes:   
--
  ID: template-whonix-gw-15
Function: pkg.installed
Name: qubes-template-whonix-gw-15
  Result: False
 Comment: Error occurred installing package(s). Additional info follows:
  
  errors:
  - Running scope as unit: 
run-r40ec4f8030284021a2f80d44af49d36f.scope
Using mirage-firewall-wifi as UpdateVM to download updates 
for Dom0; this may take some time...
 Started: 11:16:48.718085
Duration: 2780.185 ms
 Changes:   
--
  ID: whonix-gw-tag
Function: qvm.vm
Name: whonix-gw-15
  Result: False
 Comment: == ['features'] ==
  Virtual Machine does not exist!
  
  == ['tags'] ==
  [SKIP] Skipping due to previous failure!
 Started: 11:16:51.498524
Duration: 15.627 ms
 Changes:   
--
  ID: whonix-gw-update-

Re: [qubes-users] VPN before sys-firewall ?

2019-07-10 Thread David Hobach



On 7/10/19 8:45 AM, Luc libaweb wrote:

Le mardi 9 juillet 2019 23:22:23 UTC+2, Chris Laprise a écrit :

On 7/9/19 4:49 PM, Luc libaweb wrote:

Hello,

I read lot of things about VPN in Qubes OS.

I have mount a standalone VM with client VPN installed. This VPN VM connect to 
the network with sys-firewall.

Others VM connect them directly on this VM VPN.

So, AppVM connect to Netvm Standalone VM VPN connect to Netvm Sys-Firewall

It's good or not for security ? Maybe the VM VPN bypass the sys-Firewall ?



In practice, you won't see any difference between these configurations
unless you have placed special rules _inside_ sys-firewall (in the
/rw/config dir):

sys-vpn -> sys-firewall -> sys-net

sys-firewall -> sys-vpn -> sys-net

sys-vpn -> sys-net

The reason is that sys-vpn uses "provides network" and is thus a proxyVM
just like sys-firewall; if you add firewall rules to your appVMs, they
should be processed the same way in either sys-firewall or sys-vpn. As a
result, sys-vpn can perform both vpn and firewall functions. If you
consider sys-vpn's role to be trusted and low-risk, then the third
example can accomplish the same thing as the first two while consuming
less memory and CPU.

--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


Thanks, so, the default sys-firewall just block all ingoing traffic separatly. 
I think that it's better to place de sys-vpn after the sys-firewall because the 
configuration of the sys-vpn is just - install the client VPN and force 
autoconnection and autostart. If the client app VPN is compromised, it still 
exists the sys-firewall between at rest.


Qubes OS implements its firewall rules in the next upstream VM which 
"provides network" (see qvm-prefs). So if you don't trust your VPN VM to 
manage your firewall rules, you'll need

client VM --> sys-firewall-vpn --> sys-vpn --> sys-net

If you additionally want firewall rules for sys-vpn (e.g. allowing only 
connections to your VPN provider) and don't trust your sys-net to manage 
them (because it manages your network devices already which run a lot of 
proprietary code?), you'll need

client VM --> sys-firewall-vpn --> sys-vpn --> sys-firewall --> sys-net

You'll also need the latter if you want other client VMs with clearnet 
connections and managed firewall via sys-firewall.


It's also explained in [1], section "Network service qubes".

I'd also recommend using disposable VMs with static names for these 
service VMs.


[1] https://www.qubes-os.org/doc/firewall/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b58df159-3198-bc87-0be7-b33e980f1bb2%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature


[qubes-users] Backup error file too large ?

2019-07-10 Thread Luc libaweb
Every backup test show "Error : Writing backup to VM X failed : cat:write 
error: File Too large. 

I put USB disk on VM and active de backup Qubes os. Then, I have this error.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6f2b38c-561a-4c79-95dd-33de3acfb5ad%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes OS 4.0.2-rc1 has been released!

2019-07-10 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We're pleased to announce the first release candidate for Qubes 4.0.2!

Features:
 - All 4.0 dom0 updates to date
 - Fedora 30 TemplateVM
 - Debian 10 TemplateVM
 - Whonix 15 Gateway and Workstation TemplateVMs
 - Linux kernel 4.19 by default

Qubes 4.0.2-rc1 is available on the Downloads page. [1]


 What is a point release?
 

A point release does not designate a separate, new version of Qubes OS.
Rather, it designates its respective major or minor release (in this
case, 4.0) inclusive of all updates up to a certain point. Installing
Qubes 4.0 and fully updating it results in the same system as installing
Qubes 4.0.2.


 What should I do?
 -

If you installed Qubes 4.0 or 4.0.1 and have fully updated [2], then
your system is already equivalent to a Qubes 4.0.2 installation. No
further action is required.

Regardless of your current OS, if you wish to install (or reinstall)
Qubes 4.0 for any reason, then the 4.0.2 ISO makes this more convenient
and secure, since it bundles all Qubes 4.0 updates to date.


 Release candidate planning
 --

If no major issues are discovered in 4.0.2-rc1, we expect the stable
release of 4.0.2 to follow in a few weeks. As usual, you can help by
reporting any bugs you encounter. [3]


[1] https://www.qubes-os.org/downloads/
[2] https://www.qubes-os.org/doc/updating-qubes-os/
[3] https://www.qubes-os.org/doc/reporting-bugs/

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/07/09/qubes-4-0-2-rc1/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0lmTcACgkQ203TvDlQ
MDCD0g/9HwahS5r9kut/ZXVbMngQE1qvm2U1SkqSplHSCQdr/nHOQFKs+0hQ/Q+a
f14uG3wYppAX+98IszK6jAHHlrPXjz2oz8+L9D92TX0L+ifHybVcP2MOXCehTKxz
O21JMD+uRWV1ugbz/eRuvspS0mYsOR9lHt5HIVwo5nTFUaVGlBj+DpuL+CL4JviK
qZcohhOSfT5sg2lWd3lSK4LqliE3YdnxDQsHeJPzOC2qA+b4vtED9RoPfApne/sk
T2GHt3ee9JVl2G1E/HTx17YDgrIme1CvF2/bQyTNDBg6zwCRZYDFfmvsgbjIqKVC
1MYGwsMxT2J3KPyeCgNzX2UFfImv9kJOKiSHarsFuwHM2Y4z105fOZi5mmNfINPL
hPohmn6iRmlafdAjjHOiXcaaoM+u0WXYDdBWzzBfxeRmhAHXX863SOCJ6tCKNGl7
2TBNNJJ/jAu0cYBaoCDcMlXfbKcKGlLiY6JJaHvleFaBQsUrQ+oC/BxB8SbGxifA
rLPFhv/G+1av6KTqTWcx6rMbxDYKxhTQSUfwRQZMahCO49+p5XFxxCrBrofCJ4kR
GatLqGhVpUvHjw411loWzZe7FSXt9NucDkNQnek9Es4qNHgf2r6AraOacdNKy4Z8
1Al/WF3PPjbs0Fd1oOymV8IatzGnDsxfLHThxcQN4mrlOuie49g=
=yLBp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bef9a750-b55c-186a-8e29-9807e8203f61%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] XSA-300 does not affect the security of Qubes OS

2019-07-10 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The Xen Project has published Xen Security Advisory 300 (XSA-300).
This XSA does *not* affect the security of Qubes OS, and no user
action is necessary.

This XSA has been added to the XSA Tracker:

https://www.qubes-os.org/security/xsa/#300

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl0lmDoACgkQ203TvDlQ
MDBOcBAAwaKiAqCKO8Y6MWztvdQx5qYFN9bFYeuxiom6WyZWghT6Ga3M3MDE0VGt
F1lGEIs4sQgJiXhIizWWnGq4tPKMbQ/wQfCQ/Mt8bYszRtdHSiyjX0pfNbSKOzjj
4P5EAA0GSy5ZH9xxww/HwFZlI8VMrsu79k39iMqmnIENCM7W/z+/ABBMiuhfHHB2
9QKMp4ipPrwcbfFKwhcbeCraC+vQ4aUsW4EQrK6HBRHshKia4VWLnxP/Lln9oNtT
0PejcUheaM30Xzr3VghKj8zwAZNOX47OqSpWuvNTHpRRMGY2zKRLMrojeawzynH4
zOlGt5gC0vHKGHQtYag8HBeF1lRxnRRfJbAzcdaOpEpBSAa6qYTpmMCSXgu2Hw1y
Heyit/Nhhz8K+hpHyjPZW9oDAQVZoFCx+oDuNoTDZ+k3Ma00l4OPAPsdsbOtPAwe
u7wCBqrLlfnAp8oqeRCZQGAAGRMx6JSaakDNoUYSgf1h2cQ0QVlaulpnm5B39DYD
tOvT3jIq1xsYtvqTswt1J6A7Ay5+G9K5BUbJ9tCmMyUKJNnQo38O03Y+i1sJKwDb
6r0oTRMwVCVw2Zylu1bpBGLo/Q8K0nJTvVytH0QqfDoDRTsprEfNKMxh6cTnmJP2
2gkbH5OaI7rtcHK0q+vjFbdVTK+164LYqGROhW3yv1pCM0/etC8=
=Sak+
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7955e444-bb2e-1797-129a-00646c4e17de%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TemplateVM updates almost instantly fail when target is VPN qube but dom0 updates run just fine

2019-07-10 Thread Sphere
I see, I hope that really solves your problem cause so far on my side I was 
able to try a separate qube for updating Templates and dom0
So far so good there were no problems given the fact that I ensured that the 
qube responsible for being updates proxy to the Templates were resolving DNS 
queries just fine and updates proxy service actively running properly in that 
qube.

If you still got the problem after switching to debian-10 maybe do some network 
diagnosis in your update vm? I can lend a helping hand with that if you need it

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed09218f-0794-4dc0-a28d-6907854de4b7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.