[qubes-users] How to use a USB-modem with Qubes OS ?

2019-11-08 Thread M
I want to connect to the internet by using a USB modem.

Can I use Huawei E3372H with Qubes OS, and if so how ?

If not: Can you recommend another USB modem that I can use to get on the 
internet, and please explain how to use it ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc5c4e05-42e3-482c-a319-d360a8118774%40googlegroups.com.


[qubes-users] How many CPU threads is recommended for Qubes OS ?

2019-11-08 Thread M
How many CPU threads is recommended for Qubes OS ?

Is 4 enough, or should I go for 8 or more... ?

I have bought the Ryzen 3 3200G, but I could change it for another one with 
more threads (for example the Ryzen 3400G), if it is recommended as I haven’t 
unpacked it yet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87d0f4df-c8eb-4e36-b099-3cafb0af29dc%40googlegroups.com.


Re: [qubes-users] Tor qubes-r4.list returning error

2019-11-08 Thread 'Jackie' via qubes-users

scurge1tl:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I try to onionize the debian-10, but Tor main qubes-r4.list is
returning error. Qubes is set to onionize everything, Whonix onionized
and working well.

I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list
(and comment everything else):

# Qubes Tor updates repositories
# Main qubes updates repository
deb [arch=amd64]
tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
onion/r4.0/vm
buster main

I get following error:

user@debian-10:~$ sudo apt update
Hit:1 http://vwakviie2ienjx6t.onion/debian buster InRelease
Hit:2 http://sgvtcaew4bxjd7ln.onion buster/updates InRelease
Reading package lists... Done
E: The method driver /usr/lib/apt/methods/tor+http could not be found.
N: Is the package apt-transport-tor installed?
E: Failed to fetch
tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
onion/r4.0/vm/dists/buster/InRelease

E: Some index files failed to download. They have been ignored, or old
ones used instead.


BTW in my /etc/apt/sources.list I have:

#deb https://deb.debian.org/debian buster main contrib non-free
#deb-src https://deb.debian.org/debian buster main contrib non-free
deb http://vwakviie2ienjx6t.onion/debian buster main contrib non-free

#deb https://deb.debian.org/debian-security buster/updates main
contrib non-free
#deb-src https://deb.debian.org/debian-security buster/updates main
contrib non-free
deb http://sgvtcaew4bxjd7ln.onion buster/updates main contrib non-free


Any ideas?
Thank you!


Hi,

I don't know for sure, but if you haven't yet, try removing the "tor+" 
part. My understanding is that the debian template doesn't need to know 
how to connect via tor, since it's updating over sys-whonix and 
sys-whonix itself routes connections through tor, so you can just put 
the onion address in there and it will work. At least it works for me 
(in whonix templates too).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a77e851b-b467-0248-9017-1cbf2b385ab3%40danwin1210.me.


Re: [qubes-users] Re: How to use curl in a template VM?

2019-11-08 Thread unman
On Fri, Nov 08, 2019 at 10:42:02PM +, 'b17b7bdb' via qubes-users wrote:
> On 11/8/19 5:59 PM, billollib-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:> 
> I am trying to install the Brave browser in my debian template VM it
> > requires that I add a repository with the command:
> >
> > curl -s
> > https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc |
> > sudo apt-key --keyring /etc/apt/trusted.gpg.d/brave-browser-beta.gpg add -
> >
> > When I try the first part of this alone, I get nothing back, so I'm
> > assuming that curl is blocked -- I get the correct key in the
> > "untrusted" vm when I do it there.
> >
> > I have to say that I am still trying to get my head around how qubes does 
> > networking, but while I can easily upgrade and add software in the debian 
> > template vM using apt, it seems that curl is not getting through.
> >
> > So:
> >
> > 1) Is there a document that goes through the networking stuff in detail?
> > 2) How would I go about installing this software in the template?
> 
> I just installed Brave in Debian Buster following the steps in:
>   
> https://medium.com/@connorrfin10/how-to-install-brave-browser-on-debian-10-buster-f95c9d30556c
> 
> First I cloned my template as debian-10-brave, so that I wouldn't mess up one 
> of my regular templates.  In order to execute the curl and echo commands in 
> Step 1: Preparing for installation, I temporarily enabled sys-whonix as the 
> NetVM for this template, but set it back to the default none setting for 
> NetVM immediately afterward.  Not ideal, but it solves problem above.
> 

Don't do this. It creates risk and is unnecessary.

Templates update without any networking using qrexec to an update Proxy.
The listener sits at 127.0.0.1:8082 on the template and passes traffic
to and fro using qrexec to the proxy - the proxy is determined by reading
from /etc/qubes-rpc/policy/qubes.UpdatesProxy.
Qubes stopped filtering on that proxy a long time ago, which means that
you can use/abuse it for *anything* you like.

I made a note on using gpg in templates here -
https://github.com/unman/notes/blob/master/gpg_in_templates

In this case you just need:
curl  --proxy 127.0.0.1:8082 
https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc 

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191109030835.GA31764%40thirdeyesecurity.org.


[qubes-users] Help, I broke my Qubes...

2019-11-08 Thread 'Zeko' via qubes-users
Hello

I ran sudo qubesctl state.sls qvm.sys-usb on a LUKS install with USB keyboard 
and mouse. (Yeah bad idea)

I use a removable drive to boot since I multiboot on that PC and the drive was 
unmounted at the time so the command reported that 4 out of 5 steps succeeded 
while grubconfig failed. Then I restarted to try again and get the grubconfig 
done since remounting that drive as /boot never worked for some reason, didn't 
bother with that this time. (worse idea)

At the moment Qubes will boot, I get to the first (disk) password screen and 
the progress slider goes to about 60% and the computer resets.

Can anything be done? Unfortunately, my backups are a tad old. It seems I can 
at least get it to unlock the LVM partition, though...

Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/x1YJh8QU-nwNF162Tht3zSrEe8H6G2LTRosh5skeM_nNyHRCpg8N3QOXaDY_kSmP4va9JSspCtQXI_H9N9bu1fyhJl0O-VUFMA_cJaymrOU%3D%40protonmail.com.


[qubes-users] Re: How to use curl in a template VM?

2019-11-08 Thread 'b17b7bdb' via qubes-users
On 11/8/19 5:59 PM, billollib-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:> I 
am trying to install the Brave browser in my debian template VM it
> requires that I add a repository with the command:
>
> curl -s
> https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc |
> sudo apt-key --keyring /etc/apt/trusted.gpg.d/brave-browser-beta.gpg add -
>
> When I try the first part of this alone, I get nothing back, so I'm
> assuming that curl is blocked -- I get the correct key in the
> "untrusted" vm when I do it there.
>
> I have to say that I am still trying to get my head around how qubes does 
> networking, but while I can easily upgrade and add software in the debian 
> template vM using apt, it seems that curl is not getting through.
>
> So:
>
> 1) Is there a document that goes through the networking stuff in detail?
> 2) How would I go about installing this software in the template?

I just installed Brave in Debian Buster following the steps in:
  
https://medium.com/@connorrfin10/how-to-install-brave-browser-on-debian-10-buster-f95c9d30556c

First I cloned my template as debian-10-brave, so that I wouldn't mess up one 
of my regular templates.  In order to execute the curl and echo commands in 
Step 1: Preparing for installation, I temporarily enabled sys-whonix as the 
NetVM for this template, but set it back to the default none setting for NetVM 
immediately afterward.  Not ideal, but it solves problem above.

Note, in Step 4: Final Fixes, I had to open the terminal as root in order to 
execute the echo command.  From the dom0 terminal:
$  qvm-run -u root debian-10-brave xterm

then type in the command manually into the debian-10-brave root terminal.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bXCOgs5pACoBfMIDfWMASwk9iyz59mGGDmFxAbVuYBRvD_-0alEtmACg946lV_0DXutQHeHXlTkWsjig29xCSSKVg-nosBdKi59q2PAQ4oA%3D%40protonmail.ch.


[qubes-users] 4.0.2-rc2 ISO hangs before graphical installer starts

2019-11-08 Thread Claudia
The last message on the console is always "[OK] Started Monitoring of 
LVM2 mirrors, snapshots, etc. using dmeventd or progress polling" at 
which point it just hangs. The cursor doesn't blink, and pressing enter 
doesn't do anything. Some keys cause it to beep, though, and it does 
respond to ctrl-alt-delete by rebooting after a few seconds, but the 
screen remains completely frozen during that time. So it feels like it's 
running normally except the screen is frozen. 4.0.1 installer worked 
fine on the same machine.


Any ideas on how to debug something like this?

-
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/34c9b522-370c-ab8e-2c8a-69bf9de1de48%40vfemail.net.


[qubes-users] How to use curl in a template VM?

2019-11-08 Thread billollib
I am trying to install the Brave browser in my debian template VM it 
requires that I add a repository with the command:

curl -s https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc | 
sudo apt-key --keyring /etc/apt/trusted.gpg.d/brave-browser-beta.gpg add -

When I try the first part of this alone, I get nothing back, so I'm assuming 
that curl is blocked -- I get the correct key in the "untrusted" vm when I do 
it there.

I have to say that I am still trying to get my head around how qubes does 
networking, but while I can easily upgrade and add software in the debian 
template vM using apt, it seems that curl is not getting through.

So:

1) Is there a document that goes through the networking stuff in detail?
2) How would I go about installing this software in the template?

Thanks!

billo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ee05d16-31e4-4f3d-8246-d3c2c398ab3f%40googlegroups.com.


Re: [qubes-users] Tor qubes-r4.list returning error

2019-11-08 Thread unman
On Fri, Nov 08, 2019 at 12:37:00PM +, scurge1tl wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> I try to onionize the debian-10, but Tor main qubes-r4.list is
> returning error. Qubes is set to onionize everything, Whonix onionized
> and working well.
> 
> I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list
> (and comment everything else):
> 
> # Qubes Tor updates repositories
> # Main qubes updates repository
> deb [arch=amd64]
> tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
> onion/r4.0/vm
> buster main
> 
> I get following error:
> 
> user@debian-10:~$ sudo apt update
> Hit:1 http://vwakviie2ienjx6t.onion/debian buster InRelease
> Hit:2 http://sgvtcaew4bxjd7ln.onion buster/updates InRelease
> Reading package lists... Done
> E: The method driver /usr/lib/apt/methods/tor+http could not be found.
> N: Is the package apt-transport-tor installed?
> E: Failed to fetch
> tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
> onion/r4.0/vm/dists/buster/InRelease
> 
> E: Some index files failed to download. They have been ignored, or old
> ones used instead.
> 
> 
> BTW in my /etc/apt/sources.list I have:
> 
> #deb https://deb.debian.org/debian buster main contrib non-free
> #deb-src https://deb.debian.org/debian buster main contrib non-free
> deb http://vwakviie2ienjx6t.onion/debian buster main contrib non-free
> 
> #deb https://deb.debian.org/debian-security buster/updates main
> contrib non-free
> #deb-src https://deb.debian.org/debian-security buster/updates main
> contrib non-free
> deb http://sgvtcaew4bxjd7ln.onion buster/updates main contrib non-free
> 
> 
> Any ideas?
> Thank you!
> 

Look at this:
> E: The method driver /usr/lib/apt/methods/tor+http could not be found.
> N: Is the package apt-transport-tor installed?

Is it?

Also check what you are using as the Updates Proxy (Check in dom0,
/etc/qubes-rpc/policy/qubes.UpdatesProxy)

N.B There's a difference between updating over Tor and Updating using
onion repositories. You dont need the latter to do the former. (I say
this because of your comment - " Qubes is set to onionize everything")

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191108172400.GA26429%40thirdeyesecurity.org.


[qubes-users] Tor qubes-r4.list returning error

2019-11-08 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I try to onionize the debian-10, but Tor main qubes-r4.list is
returning error. Qubes is set to onionize everything, Whonix onionized
and working well.

I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list
(and comment everything else):

# Qubes Tor updates repositories
# Main qubes updates repository
deb [arch=amd64]
tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
onion/r4.0/vm
buster main

I get following error:

user@debian-10:~$ sudo apt update
Hit:1 http://vwakviie2ienjx6t.onion/debian buster InRelease
Hit:2 http://sgvtcaew4bxjd7ln.onion buster/updates InRelease
Reading package lists... Done
E: The method driver /usr/lib/apt/methods/tor+http could not be found.
N: Is the package apt-transport-tor installed?
E: Failed to fetch
tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.
onion/r4.0/vm/dists/buster/InRelease

E: Some index files failed to download. They have been ignored, or old
ones used instead.


BTW in my /etc/apt/sources.list I have:

#deb https://deb.debian.org/debian buster main contrib non-free
#deb-src https://deb.debian.org/debian buster main contrib non-free
deb http://vwakviie2ienjx6t.onion/debian buster main contrib non-free

#deb https://deb.debian.org/debian-security buster/updates main
contrib non-free
#deb-src https://deb.debian.org/debian-security buster/updates main
contrib non-free
deb http://sgvtcaew4bxjd7ln.onion buster/updates main contrib non-free


Any ideas?
Thank you!

-BEGIN PGP SIGNATURE-
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=WG6+
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9665d7b-5a6b-be4c-7bcd-40116e7ea9c4%40cock.li.


0xC1F4E83AF470A4ED.asc
Description: application/pgp-keys