[qubes-users] How to use a USB-modem with Qubes OS ?
I want to connect to the internet by using a USB modem. Can I use Huawei E3372H with Qubes OS, and if so how ? If not: Can you recommend another USB modem that I can use to get on the internet, and please explain how to use it ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dc5c4e05-42e3-482c-a319-d360a8118774%40googlegroups.com.
[qubes-users] How many CPU threads is recommended for Qubes OS ?
How many CPU threads is recommended for Qubes OS ? Is 4 enough, or should I go for 8 or more... ? I have bought the Ryzen 3 3200G, but I could change it for another one with more threads (for example the Ryzen 3400G), if it is recommended as I haven’t unpacked it yet. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/87d0f4df-c8eb-4e36-b099-3cafb0af29dc%40googlegroups.com.
Re: [qubes-users] Tor qubes-r4.list returning error
scurge1tl: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I try to onionize the debian-10, but Tor main qubes-r4.list is returning error. Qubes is set to onionize everything, Whonix onionized and working well. I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list (and comment everything else): # Qubes Tor updates repositories # Main qubes updates repository deb [arch=amd64] tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad. onion/r4.0/vm buster main I get following error: user@debian-10:~$ sudo apt update Hit:1 http://vwakviie2ienjx6t.onion/debian buster InRelease Hit:2 http://sgvtcaew4bxjd7ln.onion buster/updates InRelease Reading package lists... Done E: The method driver /usr/lib/apt/methods/tor+http could not be found. N: Is the package apt-transport-tor installed? E: Failed to fetch tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad. onion/r4.0/vm/dists/buster/InRelease E: Some index files failed to download. They have been ignored, or old ones used instead. BTW in my /etc/apt/sources.list I have: #deb https://deb.debian.org/debian buster main contrib non-free #deb-src https://deb.debian.org/debian buster main contrib non-free deb http://vwakviie2ienjx6t.onion/debian buster main contrib non-free #deb https://deb.debian.org/debian-security buster/updates main contrib non-free #deb-src https://deb.debian.org/debian-security buster/updates main contrib non-free deb http://sgvtcaew4bxjd7ln.onion buster/updates main contrib non-free Any ideas? Thank you! Hi, I don't know for sure, but if you haven't yet, try removing the "tor+" part. My understanding is that the debian template doesn't need to know how to connect via tor, since it's updating over sys-whonix and sys-whonix itself routes connections through tor, so you can just put the onion address in there and it will work. At least it works for me (in whonix templates too). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a77e851b-b467-0248-9017-1cbf2b385ab3%40danwin1210.me.
Re: [qubes-users] Re: How to use curl in a template VM?
On Fri, Nov 08, 2019 at 10:42:02PM +, 'b17b7bdb' via qubes-users wrote: > On 11/8/19 5:59 PM, billollib-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:> > I am trying to install the Brave browser in my debian template VM it > > requires that I add a repository with the command: > > > > curl -s > > https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc | > > sudo apt-key --keyring /etc/apt/trusted.gpg.d/brave-browser-beta.gpg add - > > > > When I try the first part of this alone, I get nothing back, so I'm > > assuming that curl is blocked -- I get the correct key in the > > "untrusted" vm when I do it there. > > > > I have to say that I am still trying to get my head around how qubes does > > networking, but while I can easily upgrade and add software in the debian > > template vM using apt, it seems that curl is not getting through. > > > > So: > > > > 1) Is there a document that goes through the networking stuff in detail? > > 2) How would I go about installing this software in the template? > > I just installed Brave in Debian Buster following the steps in: > > https://medium.com/@connorrfin10/how-to-install-brave-browser-on-debian-10-buster-f95c9d30556c > > First I cloned my template as debian-10-brave, so that I wouldn't mess up one > of my regular templates. In order to execute the curl and echo commands in > Step 1: Preparing for installation, I temporarily enabled sys-whonix as the > NetVM for this template, but set it back to the default none setting for > NetVM immediately afterward. Not ideal, but it solves problem above. > Don't do this. It creates risk and is unnecessary. Templates update without any networking using qrexec to an update Proxy. The listener sits at 127.0.0.1:8082 on the template and passes traffic to and fro using qrexec to the proxy - the proxy is determined by reading from /etc/qubes-rpc/policy/qubes.UpdatesProxy. Qubes stopped filtering on that proxy a long time ago, which means that you can use/abuse it for *anything* you like. I made a note on using gpg in templates here - https://github.com/unman/notes/blob/master/gpg_in_templates In this case you just need: curl --proxy 127.0.0.1:8082 https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191109030835.GA31764%40thirdeyesecurity.org.
[qubes-users] Help, I broke my Qubes...
Hello I ran sudo qubesctl state.sls qvm.sys-usb on a LUKS install with USB keyboard and mouse. (Yeah bad idea) I use a removable drive to boot since I multiboot on that PC and the drive was unmounted at the time so the command reported that 4 out of 5 steps succeeded while grubconfig failed. Then I restarted to try again and get the grubconfig done since remounting that drive as /boot never worked for some reason, didn't bother with that this time. (worse idea) At the moment Qubes will boot, I get to the first (disk) password screen and the progress slider goes to about 60% and the computer resets. Can anything be done? Unfortunately, my backups are a tad old. It seems I can at least get it to unlock the LVM partition, though... Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/x1YJh8QU-nwNF162Tht3zSrEe8H6G2LTRosh5skeM_nNyHRCpg8N3QOXaDY_kSmP4va9JSspCtQXI_H9N9bu1fyhJl0O-VUFMA_cJaymrOU%3D%40protonmail.com.
[qubes-users] Re: How to use curl in a template VM?
On 11/8/19 5:59 PM, billollib-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:> I am trying to install the Brave browser in my debian template VM it > requires that I add a repository with the command: > > curl -s > https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc | > sudo apt-key --keyring /etc/apt/trusted.gpg.d/brave-browser-beta.gpg add - > > When I try the first part of this alone, I get nothing back, so I'm > assuming that curl is blocked -- I get the correct key in the > "untrusted" vm when I do it there. > > I have to say that I am still trying to get my head around how qubes does > networking, but while I can easily upgrade and add software in the debian > template vM using apt, it seems that curl is not getting through. > > So: > > 1) Is there a document that goes through the networking stuff in detail? > 2) How would I go about installing this software in the template? I just installed Brave in Debian Buster following the steps in: https://medium.com/@connorrfin10/how-to-install-brave-browser-on-debian-10-buster-f95c9d30556c First I cloned my template as debian-10-brave, so that I wouldn't mess up one of my regular templates. In order to execute the curl and echo commands in Step 1: Preparing for installation, I temporarily enabled sys-whonix as the NetVM for this template, but set it back to the default none setting for NetVM immediately afterward. Not ideal, but it solves problem above. Note, in Step 4: Final Fixes, I had to open the terminal as root in order to execute the echo command. From the dom0 terminal: $ qvm-run -u root debian-10-brave xterm then type in the command manually into the debian-10-brave root terminal. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bXCOgs5pACoBfMIDfWMASwk9iyz59mGGDmFxAbVuYBRvD_-0alEtmACg946lV_0DXutQHeHXlTkWsjig29xCSSKVg-nosBdKi59q2PAQ4oA%3D%40protonmail.ch.
[qubes-users] 4.0.2-rc2 ISO hangs before graphical installer starts
The last message on the console is always "[OK] Started Monitoring of LVM2 mirrors, snapshots, etc. using dmeventd or progress polling" at which point it just hangs. The cursor doesn't blink, and pressing enter doesn't do anything. Some keys cause it to beep, though, and it does respond to ctrl-alt-delete by rebooting after a few seconds, but the screen remains completely frozen during that time. So it feels like it's running normally except the screen is frozen. 4.0.1 installer worked fine on the same machine. Any ideas on how to debug something like this? - This free account was provided by VFEmail.net - report spam to ab...@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/34c9b522-370c-ab8e-2c8a-69bf9de1de48%40vfemail.net.
[qubes-users] How to use curl in a template VM?
I am trying to install the Brave browser in my debian template VM it requires that I add a repository with the command: curl -s https://brave-browser-apt-beta.s3.brave.com/brave-core-nightly.asc | sudo apt-key --keyring /etc/apt/trusted.gpg.d/brave-browser-beta.gpg add - When I try the first part of this alone, I get nothing back, so I'm assuming that curl is blocked -- I get the correct key in the "untrusted" vm when I do it there. I have to say that I am still trying to get my head around how qubes does networking, but while I can easily upgrade and add software in the debian template vM using apt, it seems that curl is not getting through. So: 1) Is there a document that goes through the networking stuff in detail? 2) How would I go about installing this software in the template? Thanks! billo -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4ee05d16-31e4-4f3d-8246-d3c2c398ab3f%40googlegroups.com.
Re: [qubes-users] Tor qubes-r4.list returning error
On Fri, Nov 08, 2019 at 12:37:00PM +, scurge1tl wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > I try to onionize the debian-10, but Tor main qubes-r4.list is > returning error. Qubes is set to onionize everything, Whonix onionized > and working well. > > I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list > (and comment everything else): > > # Qubes Tor updates repositories > # Main qubes updates repository > deb [arch=amd64] > tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad. > onion/r4.0/vm > buster main > > I get following error: > > user@debian-10:~$ sudo apt update > Hit:1 http://vwakviie2ienjx6t.onion/debian buster InRelease > Hit:2 http://sgvtcaew4bxjd7ln.onion buster/updates InRelease > Reading package lists... Done > E: The method driver /usr/lib/apt/methods/tor+http could not be found. > N: Is the package apt-transport-tor installed? > E: Failed to fetch > tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad. > onion/r4.0/vm/dists/buster/InRelease > > E: Some index files failed to download. They have been ignored, or old > ones used instead. > > > BTW in my /etc/apt/sources.list I have: > > #deb https://deb.debian.org/debian buster main contrib non-free > #deb-src https://deb.debian.org/debian buster main contrib non-free > deb http://vwakviie2ienjx6t.onion/debian buster main contrib non-free > > #deb https://deb.debian.org/debian-security buster/updates main > contrib non-free > #deb-src https://deb.debian.org/debian-security buster/updates main > contrib non-free > deb http://sgvtcaew4bxjd7ln.onion buster/updates main contrib non-free > > > Any ideas? > Thank you! > Look at this: > E: The method driver /usr/lib/apt/methods/tor+http could not be found. > N: Is the package apt-transport-tor installed? Is it? Also check what you are using as the Updates Proxy (Check in dom0, /etc/qubes-rpc/policy/qubes.UpdatesProxy) N.B There's a difference between updating over Tor and Updating using onion repositories. You dont need the latter to do the former. (I say this because of your comment - " Qubes is set to onionize everything") -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191108172400.GA26429%40thirdeyesecurity.org.
[qubes-users] Tor qubes-r4.list returning error
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I try to onionize the debian-10, but Tor main qubes-r4.list is returning error. Qubes is set to onionize everything, Whonix onionized and working well. I un-comment this line in my /etc/apt/sources.list.d/qubes-r4.list (and comment everything else): # Qubes Tor updates repositories # Main qubes updates repository deb [arch=amd64] tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad. onion/r4.0/vm buster main I get following error: user@debian-10:~$ sudo apt update Hit:1 http://vwakviie2ienjx6t.onion/debian buster InRelease Hit:2 http://sgvtcaew4bxjd7ln.onion buster/updates InRelease Reading package lists... Done E: The method driver /usr/lib/apt/methods/tor+http could not be found. N: Is the package apt-transport-tor installed? E: Failed to fetch tor+http://deb.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad. onion/r4.0/vm/dists/buster/InRelease E: Some index files failed to download. They have been ignored, or old ones used instead. BTW in my /etc/apt/sources.list I have: #deb https://deb.debian.org/debian buster main contrib non-free #deb-src https://deb.debian.org/debian buster main contrib non-free deb http://vwakviie2ienjx6t.onion/debian buster main contrib non-free #deb https://deb.debian.org/debian-security buster/updates main contrib non-free #deb-src https://deb.debian.org/debian-security buster/updates main contrib non-free deb http://sgvtcaew4bxjd7ln.onion buster/updates main contrib non-free Any ideas? Thank you! -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEExlmPb5HoPUTt+CQT44JZDAWK6UwFAl3FYYBfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEM2 NTk4RjZGOTFFODNENDRFREY4MjQxM0UzODI1OTBDMDU4QUU5NEMACgkQ44JZDAWK 6UwJBA/+NgfOAbjIySS+tWaYV8IIO3mQBcCwTTAqQm9pE1n1MHIUnaUBTv8ckd3v gj2RarYvVu2eBMWzRsMWUEnXfK2K8mt5joNXbHVAjufKtLjArR8TmD+HVfSpBm2i ZhMM4oq4Nl3DBig4z4D1w2bPrZ4UCirGBAIxNmzAwmwpKQCR9Naf6ynpIiotoNnA RMbzsiArzv4fLF4ZozGxixIbFf8GlrF7GFmUMYvhq5xx+kVdlSvtdi+ukYNKQIFV K0/s/52rPUpv4/t5jxd+YjW6YeEdcW1xckKIUv8MIAdJcQZoYd2YzELu/8aTlKIt D6OhKzuvrbN8rcgo2ZtbhNBLlI77b3rvwVo30rSGgt09Q+MKmPl7nvWgxirkx5n7 CV6A0xw752JlcHfMXMA7T1tB+eAFtpfA0NI0rJtxjHvBx550sXoicYud80KPKFLl 4Dk9PUi9gtQGnPxqijhNSJLtNwqLbZzSAsSBs4+ObK30JQpWNVMLmnIqTZ+o5a/D SVgkOk/Baya+pgIAA3/hpKL2BEkyzfWs55jPGQz2WrAoq8KuUh9/f8Eji2zv1AmZ wwA23UsKgiuXx/Q5Fd+rTzPLsMisl5WSrR3shGC9JvJRgL05T0oIeFnNtmS30iog oMrpUS8g4uQu7YAzYmsk7PcK0POPdZVj4mm71O3EncN9+pW6t3o= =WG6+ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b9665d7b-5a6b-be4c-7bcd-40116e7ea9c4%40cock.li. 0xC1F4E83AF470A4ED.asc Description: application/pgp-keys