[qubes-users] How to set template-wide gnome-terminal default profile?

2019-10-11 Thread tetrahedra via qubes-users

Common scenario:
1) create new appVM
2) open terminal
3) "oh no, the color scheme and font and terminal settings are all wrong"
4) spend some time clicking around in menus fixing it

Is there a way to create a template-wide default gnome-terminal profile?

(The terminal profile that I set in the template is not propagated to
appVMs based on that template)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191012034803.GB1020%40danwin1210.me.


Re: [qubes-users] VMs refuse to start after being shut down (following latest update)

2019-10-11 Thread tetrahedra via qubes-users

On Fri, Oct 11, 2019 at 05:44:26PM +0200, tetrahedra via qubes-users wrote:

After the latest round of updates I have started seeing some odd
behavior: VMs will only start once per system boot. This is rather a
problem (it makes Qubes much less usable!), should I also add it to the
Github tracker?

Further details: After a VM has been shut down, when I try to start it
again I get the notification:

"Domain MYVM has failed to start: Cannot connect to qrexec agent for 60
seconds, see /var/log/xen/console/guest-MYVM.log for details"


Key discovery: when I updated Qubes, around the same time I decreased
the starting memory for some VMs to 200MB (from 400MB), and only those
VMs were affected by this issue.

Solution: raise the starting memory back to 400MB.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191012034520.GA1020%40danwin1210.me.


[qubes-users] Re: Creating App Shortcut for a Single AppVM Doesn't Work

2019-10-11 Thread Guerlan
I uses gnome shortcut editor to create the desktop file (optional) and 
saved to desktop. Then I double clicked it in the file manager and opened 
the program one time. Then I think I rebooted (I don't remember) but it was 
there in the qubes settings->applications

hope it helps

On Friday, October 11, 2019 at 10:03:34 PM UTC-3, pudding wrote:
>
> Hi, 
>
> I downloaded the AppImage version of KeePassXC, moved it to an Debian 
> 10-based AppVM "kpxc", and wanted to create a dom0 startmenu entry for 
> it. I followed the "If you only want to create a shortcut for a single 
> AppVM..." part of the guide here: 
> https://www.qubes-os.org/doc/managing-appvm-shortcuts/ , but after 
> completing the steps and rebooting, there is still no entry of KeePassXC 
> under kpxc in the startmenu, and I couldn't figure out why. Here's the 
> content of ~/.local/share/applications/kpxc-KeePassXC.desktop which I 
> wrote: 
>
> Version=1.0 
>
> Type=Application 
>
> Terminal=false 
>
> Name=kpxc: KeePassXC 
>
> GenericName=kpxc: Password Manager 
>
> Comment=Manage Passwords 
>
> Exec=qvm-run kpxc '~/Desktop/KeePassXC.AppImage' 
>
>
> Both dom0 and Debian template are updated to the lastest stable. 
>
> Any help would be appreciated! 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afdb2a7f-cfdf-44f6-b169-991a458b59b6%40googlegroups.com.


Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?

2019-10-11 Thread Guerlan
thanks, that explains why I needed to install gnome-disks every time I 
plugged a disk. I wondered why it didn t stay

On Friday, October 11, 2019 at 7:37:44 PM UTC-3, Claudia wrote:
>
> Guerlan: 
> > I installed some drivers on a sys-net-2 VM. Does that men they are 
> > installed on the template then? 
>
> No. Probably not. The root directory is shared, but only for reading. 
> Any changes are visible only within that VM, and are lost on reboot. 
> Exceptions are anything mapped to /rw (e.g. /home/user and /usr/local). 
>
> If you want to install something permanently, without affecting other 
> VMs, the simplest way is to create a StandaloneVM. Alternatively, you 
> can clone the TemplateVM and install your package in it, then create an 
> AppVM using the new TemplateVM. 
>
> https://www.qubes-os.org/doc/software-update-domu/ 
>
> - 
> This free account was provided by VFEmail.net - report spam to 
> ab...@vfemail.net  
>   
> ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of 
> the NSA's hands! 
> $24.95 ONETIME Lifetime accounts with Privacy Features!   
> 15GB disk! No bandwidth quotas! 
> Commercial and Bulk Mail Options!   
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e4f58228-c80b-46c6-9679-081824273175%40googlegroups.com.


[qubes-users] Creating App Shortcut for a Single AppVM Doesn't Work

2019-10-11 Thread pudding

Hi,

I downloaded the AppImage version of KeePassXC, moved it to an Debian 
10-based AppVM "kpxc", and wanted to create a dom0 startmenu entry for 
it. I followed the "If you only want to create a shortcut for a single 
AppVM..." part of the guide here: 
https://www.qubes-os.org/doc/managing-appvm-shortcuts/ , but after 
completing the steps and rebooting, there is still no entry of KeePassXC 
under kpxc in the startmenu, and I couldn't figure out why. Here's the 
content of ~/.local/share/applications/kpxc-KeePassXC.desktop which I 
wrote:


Version=1.0

Type=Application

Terminal=false

Name=kpxc: KeePassXC

GenericName=kpxc: Password Manager

Comment=Manage Passwords

Exec=qvm-run kpxc '~/Desktop/KeePassXC.AppImage'


Both dom0 and Debian template are updated to the lastest stable.

Any help would be appreciated!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39493dc2-5c96-966f-1951-464c8cb55cce%40cock.li.


[qubes-users] How to enter ipv6 in firewall settings?

2019-10-11 Thread 'Ryan Tate' via qubes-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256


I suspect this is a "dumb" question, but can't figure out the answer
after searching through the list archives:

I am unable to enter colons (from ipv6 addresses) into the firewall
whitelist on the "Firewall rules" tab of "Qube Settings" when I click
the "+" button. The resulting input box only seems to accept digits or
dots. Is there some other way to enter an ipv6 address, other than using
colons?

I am trying to whitelist all the IPs associted with a given subdomain;
the subdomain name resolves (in nslookup) to a handful of ipv4 and ipv6
addresses. Whitelisting the ipv4s alone does not seem to be getting the
job done.

Thanks for any help ...
-BEGIN PGP SIGNATURE-
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=GAeX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87imowe3kz.fsf%40ryantate.com.


Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?

2019-10-11 Thread Claudia

Guerlan:

I installed some drivers on a sys-net-2 VM. Does that men they are
installed on the template then?


No. Probably not. The root directory is shared, but only for reading. 
Any changes are visible only within that VM, and are lost on reboot. 
Exceptions are anything mapped to /rw (e.g. /home/user and /usr/local).


If you want to install something permanently, without affecting other 
VMs, the simplest way is to create a StandaloneVM. Alternatively, you 
can clone the TemplateVM and install your package in it, then create an 
AppVM using the new TemplateVM.


https://www.qubes-os.org/doc/software-update-domu/

-
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/adf0dee6-b410-7eff-07fd-39af34096bdd%40vfemail.net.


Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?

2019-10-11 Thread Guerlan
I installed some drivers on a sys-net-2 VM. Does that men they are 
installed on the template then?



On Friday, October 11, 2019 at 6:04:15 PM UTC-3, steve.coleman wrote:
>
> On 2019-10-11 14:16, Guerlan wrote: 
> > The root folder is shared, only the /home is unique for each VM. Does 
> > that mean that is I instal anything with sudo in one VM, it will affect 
> > the template and therefore all other VMs? 
>
> When you install software in /usr or /opt in the template VM it will be 
> visible in all the user VM's that use that template. The settings to 
> automatically launch daemon processes may need to be enabled for each 
> AppVM depending on both yours and the particular software package 
> requirements. You may not necessarily need a cron job or a daemon to run 
> in every AppVM instance, for example. 
>
> If you instead install software in the AppVM's /home/user/* or 
> /usr/local/* (basically any directory automatically remapped from the 
> private volume /rw/* ), then the software will be available only within 
> that single AppVM. 
>
> Where it makes sense to install a particular third-party software 
> package depends highly on what that specific software needs in order to 
> function properly. If the software is installed locally in /usr/local 
> but then still wants its configuration files to be in /etc, or needs 
> cron, then you may need to work around that specific problem with either 
> copying the configuration file separately into the template VM /etc, or 
> else using some magic scripting during the AppVM startup to copy the 
> config file into the right location before the software that needs it is 
> actually started. There is usually a workaround that will get the job 
> done, but you may need to learn a bit more about how each software 
> package works than you normally would on some other less secure system. 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c7e94cf-62fe-488c-9cc2-403a789f6762%40googlegroups.com.


Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?

2019-10-11 Thread Steve Coleman

On 2019-10-11 14:16, Guerlan wrote:
The root folder is shared, only the /home is unique for each VM. Does 
that mean that is I instal anything with sudo in one VM, it will affect 
the template and therefore all other VMs?


When you install software in /usr or /opt in the template VM it will be 
visible in all the user VM's that use that template. The settings to 
automatically launch daemon processes may need to be enabled for each 
AppVM depending on both yours and the particular software package 
requirements. You may not necessarily need a cron job or a daemon to run 
in every AppVM instance, for example.


If you instead install software in the AppVM's /home/user/* or 
/usr/local/* (basically any directory automatically remapped from the 
private volume /rw/* ), then the software will be available only within 
that single AppVM.


Where it makes sense to install a particular third-party software 
package depends highly on what that specific software needs in order to 
function properly. If the software is installed locally in /usr/local 
but then still wants its configuration files to be in /etc, or needs 
cron, then you may need to work around that specific problem with either 
copying the configuration file separately into the template VM /etc, or 
else using some magic scripting during the AppVM startup to copy the 
config file into the right location before the software that needs it is 
actually started. There is usually a workaround that will get the job 
done, but you may need to learn a bit more about how each software 
package works than you normally would on some other less secure system.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d50d6db0-f759-1631-14a5-8daa9f5d4555%40jhuapl.edu.


[qubes-users] qubes-builder error: target not found: linux

2019-10-11 Thread Guerlan
I've ran qubes-builder by selecting ubuntu, debian, arch and kali. However 
I always end up in this error after running make qubes-vm:

(11/11) Rebuilding certificate stores...
  --> Removing non-required linux kernel (can be added manually through a 
package)...
error: target not found: linux
make[1]: *** 
[/home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:104: 
/home/user/qubes-builder/chroot-vm-archlinux/home/user/.prepared_base] 
Error 1
make: *** [Makefile:226: vmm-xen-vm] Error 1

there's no issues in the github project so I can't talk directly to them

anyone knows what  is happening?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3636bbac-4bfc-4094-92f5-fdd48fdc89f2%40googlegroups.com.


[qubes-users] Wifi card adapter wont appear inside VM

2019-10-11 Thread Guerlan
I have a MediaTek card adapter. I redirected it to the VM. When I run lsusb 
inside the VM, it won't appear.

How do I troubleshoot this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a7d96c4f-38c5-4e71-b914-646c9a5d06cc%40googlegroups.com.


[qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?

2019-10-11 Thread Guerlan
The root folder is shared, only the /home is unique for each VM. Does that 
mean that is I instal anything with sudo in one VM, it will affect the 
template and therefore all other VMs?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6cd98a22-adcc-45c3-bc7c-3c179b75f49e%40googlegroups.com.


Re: [qubes-users] Installation on Lenovo ThinkStation P330 (2. generation)

2019-10-11 Thread M
The first start up of the pc after the installation of Qubes results in a black 
monitor immediately after running the code/script that is related to booting 
Qubes OS.
 
Wonder if the reason could be that I have chosen full encryption and use USB 
mouse and keyboard. Although the USB-Qube option was grayed out in the 
installationguide which - as far as I recall - shows that a USB-Qube isn’t 
possible and thereby USB keyboard should be useable when it is necessary to 
enter the encryption code.
 
And therefore I still wonder why the screen turns black when reaching the Qube 
OS login screen or just before that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7af11fea-c261-4ea3-9afa-92815a307053%40googlegroups.com.


Re: [qubes-users] laptop screen wont appear after closing lid

2019-10-11 Thread Claudia

Guerlan:

I did the HCL report and sent.

I tried the manual sleep and it wont work, the same thing happens as when I
close the lid: the keyboard goes off and the screen goes blank and nothing
returns when I open. I tried pressing the power button but also didn't work.

The workaround isn't good for me because my notebook has very limited
battery, so I need for it to sleep while closed.

I tried Fedora 30 and sleep worked perfectly. I just closed the lid and
reopened and it worked.


Can't say for sure, but probably F25 is simply too old, and lacks the 
necessary firmware drivers, or whatever, for your laptop. In other 
words, the hardware is too new for the software.


The good news is you're not alone. I ran into this exact issue a couple 
of months ago, and two other users have posted here about the same 
problem since then. The bad news is no one has found a fix, as far as I 
know.


Here are links to those conversations. See if it sounds like what you're 
experiencing. There are some troubleshooting tips mentioned there that 
you can try also. Let us know what you find out.


https://www.mail-archive.com/qubes-users@googlegroups.com/msg29755.html
https://www.mail-archive.com/qubes-users@googlegroups.com/msg30760.html
https://www.mail-archive.com/qubes-users@googlegroups.com/msg30490.html

-
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8e4553ca-9a09-c2ab-adcb-6a7b674f9041%40vfemail.net.


[qubes-users] VMs refuse to start after being shut down (following latest update)

2019-10-11 Thread tetrahedra via qubes-users

After the latest round of updates I have started seeing some odd
behavior: VMs will only start once per system boot. This is rather a
problem (it makes Qubes much less usable!), should I also add it to the
Github tracker?

Further details: After a VM has been shut down, when I try to start it
again I get the notification:

"Domain MYVM has failed to start: Cannot connect to qrexec agent for 60
seconds, see /var/log/xen/console/guest-MYVM.log for details"

In the relevant file I find the following block of ugly text. The "start
job is running" part is interesting as there is a similar message when I
go to reboot the machine (which I need to do to use the VM again!)... on
shut down, it hangs at the various "stop job is running" messages (which
it rotates through) until timeout. There are also further errors which
scroll past, but which I could not note down in time.

[3.659414] intel_rapl: Found RAPL domain core
[3.659429] intel_rapl: Found RAPL domain uncore
[.[0;1;31mFAILED.[0m] Failed to start Init Qubes Services settings.
See 'systemctl status qubes-sysinit.service' for details.
[.[0;32m  OK  .[0m] Found device /dev/hvc0.
[.[0;32m  OK  .[0m] Found device /dev/xvdc1.
[.[0;1;31mFAILED.[0m] Failed to activate swap /dev/xvdc1.
See 'systemctl status dev-xvdc1.swap' for details.
[.[0;1;33mDEPEND.[0m] Dependency failed for Swap.
[.[0;1;31mFAILED.[0m] Failed to start Initialize and mount /rw and /home.
See 'systemctl status qubes-mount-dirs.service' for details.
[.[0;1;31mFAILED.[0m] Failed to start Adjust root filesystem size.
See 'systemctl status qubes-rootfs-resize.service' for details.
^M[   .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… 
progress polling (30s / n
o limit)^M.[K[  .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for 
Monitori… progress polli
ng (30s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is 
running for Monitori… pro
gress polling (31s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m*   .[0m] A 
start job is running for Monitori… progress polling (31s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (32s / no limit)^M.[K[.[0m.[0;31m* .[0m] A start 
job is running for Monitori… progress polling (33s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (33s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* 
  .[0m] A start job is running for Monitori… progress polling (34s / no 
limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is running for 
Monitori… progress polling (34s / no limit)^M.[K[  
.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… 
progress polling (35s / no limit)^M.[K[   .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A 
start job is running for Monitori… progress polling (36s / no limit)^M.[K[
.[0;31m*.[0;1;31m*.[0m] A start job is running for Monitori… progress polling 
(36s / no limit)^M.[K[ .[0;31m*.[0m] A start job is running for Monitori… 
progress polling (37s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m] A start job 
is running for Monitori… progress polling (37s / no limit)^M.[K[   
.[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… 
progress polling (38s / no limit)^M.[K[  .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A 
start job is running for Monitori… progress polling (38s / no limit)^M.[K[ 
.[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is running for Monitori… 
progress polling (39s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m*   .[0m] A 
start job is running for Monitori… progress polling (40s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (40s / no limit)^M.[K[.[0m.[0;31m* .[0m] A start 
job is running for Monitori… progress polling (41s / no 
limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for 
Monitori… progress polling (41s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* 
  .[0m] A start job is running for Monitori… progress polling (42s / no 
limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*  .[0m] A start job is running for 
Monitori… progress polling (43s / no limit)^M.[K[  
.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… 
progress polling (43s / no limit)^M.[K[   .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A 
start job is running for Monitori… progress polling (44s / no limit)^M.[K[
.[0;31m*.[0;1;31m*.[0m] A start job is running for Monitori… progress polling 
(44s / no limit)^M.[K[ .[0;31m*.[0m] A start job i:

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191011154426.GA1244%40danwin1210.me.


Re: [qubes-users] Salt Questions

2019-10-11 Thread unman
On Wed, Oct 09, 2019 at 02:43:56PM -0400, Brian C. Duggan wrote:
> On 10/8/19 6:45 AM, Johannes Graumann wrote:
> > 2) I'm unclear about whether the fedora-/debian-X-minimal template VMs 
> > require additional packages to be managed through salt.
> > https://www.qubes-os.org/doc/templates/minimal/ appears to indicate so:
> >> Also, there are packages to provide additional services:
> >> ...
> >> qubes-mgmt-\*: If you want to use salt management on the template and 
> >> qubes.
> > 
> > If that's indeed the case, it's actually not possible to manage minimal 
> > template installation/customization entirely through salt, which I 
> > consider suboptimal.
> > 
> 
> Qubes does not require that these packages be installed on target VMs to
> manage them.
> 
> The disposable management VM applies states through salt-ssh over
> qrexec. So target VMs only need the qrexec agent installed:
> 
> https://www.qubes-os.org/doc/salt/#configuring-a-vms-system-from-dom0
> 
> I believe qubes-mgmt-salt packages will let a user-controlled management
> VM use the AdminAPI through Salt. But I'm not sure whether the AdminAPI
> is mature enough for that to work fully, yet. Folks on this list have
> only talked about using Salt from dom0.
> 
> > 3) I so far have managed to setup `*.sls` files for updating all 
> > templates as well as dom0 (THANKS unman for the example repo posted a 
> > while ago). Now I'm trying to get a defined package installed in a 
> > minimal template and fail:
> > 
> > flatpak.sls:
> > install_flatpak:
> >pkg.installed:
> >  - pkgs:
> >   - flatpak
> > 
> 
> I was able to apply this state to a clone of fedora-30-minimal like this:
> 
> # qubesctl --show-output --skip-dom0 \
> # --target=fedora-30-minimal-flatpak state.sls flatpak
> 
> Try getting the state to work by itself before using it in a top file.
> What do you get when you try that command?
> 
> Brian
> 
> -- 
> Brian C. Duggan
> he/him/his
> 

Brian is right - the minimal templates can be configured as they are.

You can use a managementVM to control with salt and I am transitioning
to this.

On your specific problem, check the log in /var/log/qubes - it wil be
mgmt-.log - there should be a pointer to what has gone wrong.
One possibility if this is a debian template - you need to enable the
*testing* repository.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191011153403.GC32237%40thirdeyesecurity.org.


Re: [qubes-users] Is there a fix for constantly failing wifi?

2019-10-11 Thread unman
On Thu, Oct 10, 2019 at 07:31:24AM -0700, Guerlan wrote:
> I have a Qualcomm Atheros QCA6174 802.11ac Wireless Network Adapter (rev 32)
> 
> It constantly goes off. I tried the rmmod and insert from the qubes wifi 
> page and it didn't work. I then discovered that simply turning it off and 
> on in the tray icon works. However I have to do it every 15 mintutes, and 
> if I download something huge (that is, I use a lot of wifi) it goess off 
> and I have to restart it every 30 seconds, it??  very annoying!
> 
> Is there a way to fix it?
> 

It's not a Qubes issue - you need to get firmware that works in whatever
OS you are using for sys-net.
Search for this and you'll find many hints, and pointers to the right
firmware.

You could try switching to another template (Fedora - Debian/Arch or vice
versa) in first instance.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191011152732.GB32237%40thirdeyesecurity.org.


Re: [qubes-users] Customizing Firefox in dispVMs

2019-10-11 Thread unman
On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users wrote:
> Hello
> 
> Is there a definite way to customize the default Firefox install in the 
> DispVMs without launching it first in the TemplateVM (which I don't want to 
> do for obvious reasons)?
> 
> I thought to add a prefs.js file to get rid of the Google search and other 
> garbage that comes preinstalled and turned on in Firefox and which I have to 
> manually turn off in preferences and about:config every time I start the 
> DispVM (which gets tiring). However, apparently the profile folder is always 
> generated under a different name and the new default profile I created 
> doesn't get recognized.
> 
> ~ Zoid
> 

How about this:

Create a qube, which has no netvm.
Open firefox - configure it as you will. (To install plugins, you wil
have to download elsewhere and copy them in to this qube to install)
Close qube.
Use `qvm-prefs qube template_for_dispvms True`
Set netvm for that qube.
Open disposableVM based on qube.
Profit.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191011152355.GA32237%40thirdeyesecurity.org.


[qubes-users] Customizing Firefox in dispVMs

2019-10-11 Thread 'Totally Zoid' via qubes-users
Hello

Is there a definite way to customize the default Firefox install in the DispVMs 
without launching it first in the TemplateVM (which I don't want to do for 
obvious reasons)?

I thought to add a prefs.js file to get rid of the Google search and other 
garbage that comes preinstalled and turned on in Firefox and which I have to 
manually turn off in preferences and about:config every time I start the DispVM 
(which gets tiring). However, apparently the profile folder is always generated 
under a different name and the new default profile I created doesn't get 
recognized.

~ Zoid

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/MuxpNCuFw3NP7Fu2FNCiuLC_h6e1lX6gYw7FFED7lIV9XhKQEBmfzltN3pbLkkc5UBiyg6LPP5Fubq1L0bXLJiezOQI1vy-7yJb4ZufgwG0%3D%40protonmail.com.


Re: [qubes-users] Any virtualizer / emulator working in Qubes OS?

2019-10-11 Thread Guerlan
nested virtualization would be very useful for android development but I 
only found unconclusive posts about how to do it

On Friday, October 11, 2019 at 4:01:18 AM UTC-3, Jean-Philippe Ouellet 
wrote:
>
> Currently: anything that doesn't require nested virt, meaning anything 
> that actually emulates instead of trying to use vmx (via kvm, etc.). 
>
> Examples include qemu using its tcg backend instead of kvm, and bochs. 
>
> On Thu, Sep 19, 2019 at 11:58 AM Patrick Schleizer 
> > wrote: 
> > 
> > Is there any virtualizer / emulator working inside Qubes OS AppVMs? 
> > 
> > -- 
> > You received this message because you are subscribed to the Google 
> Groups "qubes-users" group. 
> > To unsubscribe from this group and stop receiving emails from it, send 
> an email to qubes...@googlegroups.com . 
> > To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/2d7d4f20-b255-ed3b-30ef-7b98bfd44e69%40whonix.org.
>  
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f5733f2b-7660-45f0-b910-b9ff44fa1df7%40googlegroups.com.


Re: [qubes-users] Any virtualizer / emulator working in Qubes OS?

2019-10-11 Thread Jean-Philippe Ouellet
Currently: anything that doesn't require nested virt, meaning anything
that actually emulates instead of trying to use vmx (via kvm, etc.).

Examples include qemu using its tcg backend instead of kvm, and bochs.

On Thu, Sep 19, 2019 at 11:58 AM Patrick Schleizer
 wrote:
>
> Is there any virtualizer / emulator working inside Qubes OS AppVMs?
>
> --
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/2d7d4f20-b255-ed3b-30ef-7b98bfd44e69%40whonix.org.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_DASxRUbSMJNJFPbWiN--OGXM_fhtONFKyvW5fOibVnTg%40mail.gmail.com.


Re: [qubes-users] Using Qubes on old hardware

2019-10-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2019-10-10 10:42 AM, unman wrote:
> Hi all
>
> I've been laid up for a while.  My father brought me in a laptop
> but grabbed an old x220 i5 with an HDD. It wasn't *too* bad -
> everything worked but a bit slow to open qubes. Once open the qubes
> were perfectly usable. Fortunately, a friend picked up some others
> from my desk (Thanks Rani).
>
> So there I was, time on my hands [...]

Sorry to hear that you've been laid up, but it looks like you've put
the time to productive use. :)

Thanks for sharing your interesting results!

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=hZkk
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/da21171b-e8bd-6520-0b23-e0ca1eb73511%40qubes-os.org.