[qubes-users] Re: second sys-usb

2019-11-29 Thread pixel fairy
Did you click on "configure strict reset for pci devices" in the devices 
settings of both VMs? Thats all i can think of.

On Friday, November 29, 2019 at 11:50:47 AM UTC-8, haaber wrote:
>
> Hi there, I re-ask my problem differently. For flashing with unsecure 
> software via usb, I would like to exchange sys-usb temporarily with a 
> sys-flashing, say. I set up a debian-10 appvm in HVM mode and gave it 
> access to the usb-controller (as my true sys-usb). However, this qubes 
> will not start: 
>
> "internal error: unable to reset PCI device :00:14.0: no FLR, PM 
> reset or bus reset available. " 
>
> anyone knows what that means, please? 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1ef33ff5-d62c-43d9-ba44-7c843a4bd7ae%40googlegroups.com.


Re: [qubes-users] What's the logic behind many similar templates?

2019-11-29 Thread 'hut7no' via qubes-users

tetrahedra via qubes-users:

By default Qubes comes with two templates for AppVMs: a Debian template
and a Fedora one.

But many people seem to clone templates, so they also have an e.g
"fedora-minimal" template or a "-multimedia" one or any number of other
variations.

Why not just have "one template to rule them all" for each distribution
(Fedora and Debian)?



Smaller attack surface/faster. If you want to do this you might want a 
squid caching proxy to pass updates from a VM, through the proxy, to 
your previous update VM.

https://github.com/rustybird/qubes-updates-cache
You can have less network usage, it seems to work well.
Read the security considerations, and the code if you are really serious.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44525d96-e13a-a0c5-db9f-627213d06ab4%40tt3j2x4k5ycaa5zt.onion.


Re: [qubes-users] Fedora 29 has reached EOL

2019-11-29 Thread tetrahedra via qubes-users

On Fri, Nov 29, 2019 at 11:58:03PM -0600, Andrew David Wong wrote:

No, those were not related to EOL.

P.S. -- Please do not write to both lists.


Ok thanks. Sorry for sending to both, I hit "reply all" and didn't look
at the result.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130065248.GB3966%40danwin1210.me.


[qubes-users] What's the logic behind many similar templates?

2019-11-29 Thread tetrahedra via qubes-users

By default Qubes comes with two templates for AppVMs: a Debian template
and a Fedora one.

But many people seem to clone templates, so they also have an e.g
"fedora-minimal" template or a "-multimedia" one or any number of other
variations.

Why not just have "one template to rule them all" for each distribution
(Fedora and Debian)?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130061640.GA3966%40danwin1210.me.


Re: [qubes-users] Fedora 29 has reached EOL

2019-11-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2019-11-29 8:37 PM, tetrahedra via qubes-users wrote:
> On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote:
>> Please note that no user action is required regarding the OS
>> version in dom0. For details, please see our Note on dom0 and
>> EOL. [6]
>
> There have been a lot of dom0 updates recently. Is this related to
> EOL?
>

No, those were not related to EOL.

P.S. -- Please do not write to both lists.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=TL56
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6aca4332-ad5c-83a3-ef0e-93a772fdb110%40qubes-os.org.


Re: [qubes-users] Fedora 29 has reached EOL

2019-11-29 Thread tetrahedra via qubes-users

On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote:

Please note that no user action is required regarding the OS version in
dom0. For details, please see our Note on dom0 and EOL. [6]


There have been a lot of dom0 updates recently. Is this related to EOL?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130023731.GA3570%40danwin1210.me.


Re: [qubes-users] Re: Shutting down a VM when applications close

2019-11-29 Thread tetrahedra via qubes-users

On Fri, Nov 29, 2019 at 11:03:49AM +, lik...@gmx.de wrote:

On 2019-11-27 12:52, tetrahedra via qubes-users wrote:

DispVMs shut down automatically when the launched application closes.

Is it possible to enable this for certain applications in certain AppVMs
as well?

For example I may not want my "resource-heavy-apps-vm" to keep running
after MemoryHungryApp closes, because that ties up half my system RAM.

How would I configure "resource-heavy-apps-vm" to shutdown automatically
when MemoryHungryApp closes?



You could also use a feature of qubes to shutdown a VM after a certain time. 
You can find steps to enable it to a particular vm in this thread:
https://groups.google.com/forum/#!topic/qubes-users/lyABSZGmKdM

Now it also works for debian templates.


Great!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191130015932.GA3362%40danwin1210.me.


[qubes-users] Failed to get initiator name from iscsi firmware

2019-11-29 Thread lorodion
Hello,

I'm trying to install Qubes 4 on an XMG P407 laptop. Unfortunately I get 
the error "failed to get initiator name from iscsi firmware", coming from 
here: 
https://github.com/fepitre/qubes-installer-qubes-os/commit/2ee1f1ad93d0e51cb264aefdb3d6147223136eb7
Reading Reddit it seems like P407 should work: 
https://www.reddit.com/r/Qubes/comments/be38ee/what_is_the_best_laptop_for_qubes_os/

I have installed Qubes previously on another laptop (Gigabyte) and it works 
fine. However trying to reinstall it on that laptop now just for testing 
also gives me the same error.

What does work is installing Qubes on my desktop computer, but that is not 
my goal...

Any pointers?

Best regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5dc5c666-fa9b-459e-8f2c-36766e9d3f21%40googlegroups.com.


[qubes-users] Problem installing Qubes on two laptops

2019-11-29 Thread lorodion
Hello,

I'm trying to install Qubes 4 on an XMG P407 laptop. Unfortunately I get 
the error "failed to get initiator name from iscsi firmware", coming from 
here: 
https://github.com/fepitre/qubes-installer-qubes-os/commit/2ee1f1ad93d0e51cb264aefdb3d6147223136eb7
Reading Reddit it seems like P407 should work: 
https://www.reddit.com/r/Qubes/comments/be38ee/what_is_the_best_laptop_for_qubes_os/

I have installed Qubes previously on another laptop (Gigabyte) and it works 
fine. However trying to reinstall it on that laptop now just for testing 
also gives me the same error.

What does work is installing Qubes on my desktop computer, but that is not 
my goal...

I've had this "name from iscsi" error before but cannot figure out how I 
solved it last time. I'm grateful for any help!

Best regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/233bbbdd-8cd6-44e0-8458-f4669defe846%40googlegroups.com.


Re: [qubes-users] attach /dev/ttyUSB0 to some qube

2019-11-29 Thread E. Foster


On Thursday, November 28, 2019 at 5:10:43 PM UTC-5, awokd wrote:
>
> haaber: 
> > Hi, I try to play with an programmable esp32 (pretty much like arduino, 
> > but with wireless on board). The problem I have arises from sys-usb: the 
> > usb widget spills out the odd error "QubesException - device attach 
> > failed: no device info received. Connection faild. Check backend for 
> > details". No clue what that means. In sys-usb this device appears as 
> > /dev/ttyUSB0 .  What do I have to do to attach that successfully to a 
> > "esp-flashing qube" that I specially designed for that? Cheers! Bernhard 
> > 
> Try using qvm-usb instead. If that doesn't work, try using it directly 
> from sys-usb (which is not ideal). 
>
> -- 
> - don't top post 
> Mailing list etiquette: 
> - trim quoted reply to only relevant portions 
> - when possible, copy and paste text instead of screenshots 
>

Greetings,
I find this usb-sys or usb QVM discussion very interesting; however, I am a 
bit lost in your discussion as my computer recognizes usb devices, yet I 
don't know what type of security settings is included in the OS point 
version.  So, in order to practice what you're describling, I would need to 
know what are the parameters.  I just need to figure out how to create a 
sys/VM that reads USB drives, while keeping the drive, domO, 
Temps/standalone, safe. 

How would you create a sys for USBs (files, apps, etc) ?
sys USB mouse(if needed)? (currently works, but I don't see sys-usb in the 
drop down menu, but is it safe?)  
sys USB biometric reader?  (potentially a way to speed up logins or 
temperature readings)  

thanks, 
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39adaf61-9733-4e54-8b37-99d6975c4f24%40googlegroups.com.


[qubes-users] Re: cannot reinstall qubes, wont recognize freespace

2019-11-29 Thread spykerhond
me too i am trying to install qebes from youtuybe and qubes instructions 
and my flashdrive wont shgow up in windows anymore , why cant i get rid of 
your software on my flash disk , its the latest version and the install 
image on the drive bugs out at language selection . ie useless to me like 
ubuntu so far , please inform windows users how to reformat and recover 
their writable media on usb . the system is too bugged to install on amd 
phenom tripple core  with ssd and 6gb ram . I rather want to try next year 
so there is time to work around this buggy install media . help

On Wednesday, June 15, 2016 at 10:58:28 PM UTC+2, boromi...@sigaint.org 
wrote:
>
> Im trying to reinstall qubes since the stupid users guide instructed me to 
> brick my installation, but now when i go to install it will recognize my 
> disk but it wont recognize the freespace on it. 
>
> When i first got my usb it was preformatted as fat32, qubes would 
> recognize it but say it has no reclaimable space, so i deleted the 
> partition and tried it again, it worked and it recognized the free space 
> so i was able to install. 
>
> Now that qubes has already been installed on it once this no longer works. 
> Ive recreated partitions on it and then wiped it clean and then deleted 
> the partition and it still wont recognize it. Ive used the kingston repair 
> tool and that only sets it back to FAT and then qubes wont recognize it 
> for some reason. Over and over again for hours now and it wont let me 
> reclaim it. 
>
> Qubes disk selection area gives an option to reclaim space but it wont let 
> it, it says 0 reclaimed and 0 used and it shows the full disk space. This 
> is rediculous, when i install windows it will let me create and delete 
> partitions but there is no such tool on qubes and it refuses to do 
> anything under any condition. This is a brand new USB there is no reason 
> why this should not be working. 
>
> So what do i do now? What magical setting does my usb need to be formatted 
> with to get qubes to install on it? 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c82bd860-4ce8-40e3-9eb8-f2fdf2981838%40googlegroups.com.


[qubes-users] How to get newer Xen versions on R4.0?

2019-11-29 Thread Claudia
Is there any way to get a newer Xen on the R4.0 series? Short of 
building it myself, that is. Current-testing and unstable both appear 
have the newest at 4.8.5-13 (current is 4.8.5-12), despite R4.1 being on 
Xen 4.12. Does Qubes receive updates for newer versions of Xen? Or is 
the Xen version locked in with the Qubes minor version?


BTW, I noticed 4.8 is going to lose security support at the end of this 
month? https://wiki.xenproject.org/wiki/Xen_Project_Release_Features


-
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1fdd6d16-b3cd-9ff2-46eb-76a9d059bc12%40vfemail.net.


[qubes-users] second sys-usb

2019-11-29 Thread haaber

Hi there, I re-ask my problem differently. For flashing with unsecure
software via usb, I would like to exchange sys-usb temporarily with a
sys-flashing, say. I set up a debian-10 appvm in HVM mode and gave it
access to the usb-controller (as my true sys-usb). However, this qubes
will not start:

"internal error: unable to reset PCI device :00:14.0: no FLR, PM
reset or bus reset available. "

anyone knows what that means, please?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8abeae9d-1f98-e716-6280-210a76ce2add%40web.de.


[qubes-users] IKEv2 vpn still not working in proxyVM

2019-11-29 Thread Supraleiter

Hello again,

Based on my last question about ipsec routing in Qubes, I’ve done 
additional research but still coud not get my vpn to work.
The vpn client is a strongswan ipsec client, I want to connect the 
machine to my workplace LANCOM router using plain IKEv2 and certificate 
based authentication.


First, I installed my vpn setup in a standard Debian environment on a 
test machine without using qubes. This worked perfectly fine and I had 
nothing to do more than just copy the certificates and the configuration 
scripts ipsec.conf and ipsec.secrets.


The next step was to install strongswan on a proxy vm exactly the same 
way as before. As qubes vms uses nat-based networking, I setup port 
forwarding for udp port 500 from sys-net to sys-firewall to proxy-vm as 
described here: 
https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world


Unfortunately, this obviously didn't work. After the connection has 
established, virtual ip address 192.168.10.205 was assigned, as well as 
two new dns server adresses 192.168.10.1 and another one. I ran 
configuration script /usr/lib/qubes/qubes-setup-dnat-to-ns, created a 
new disposable vm using proxy-vm as network provider and tried 
connecting to a random website and ping 192.168.10.1. Both did not work. 
A ping to 8.8.8.8 surprisingly succeded, though.


So my question is: Which extra steps do I have to do to make vpn working 
in a proxy-vm? I am not using a network manager plugin because 
strongstran plugin version does not establish a connection and seems 
buggy. The current version is very old and seems to not support the 
network manager version installed in qubes.


Does anyone have managed to succeed in installing an ipsec vpn with 
qubes?
It is really important for me as my boss is getting seriously impatient 
with me (I try to setup vpn with many different machines since half a 
year. At least i managed to get the router, windows clients and standard 
linux clients to work, but qubes is very important to him).


Thank you very much for help.
Supraleiter

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e378fe5a932bb27ef8f8ec397f1d40c8%40posteo.de.


[qubes-users] Re: Qubes' Thunderbird Add-On

2019-11-29 Thread rec wins
On 11/28/19 1:57 AM, cubit wrote:
> With the recent upgrade to Thunderbird 68.2  and the depreciation of old 
> style add-ons.   Are there any plans to bring back the Qubes Add-on to allow 
> opening of email in dispVM as needed/by default?
> 
> Cu-
> 

whoops, I just saw this after I posted same question, guess I still
don't know how to use thunderbird gmane search correctly  :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d01364eb-9909-10ff-35fb-ba169dd8ce55%40riseup.net.


[qubes-users] thunderbird qubes add-on

2019-11-29 Thread rec wins
Hello, using Debian-10 as my template with Thunderbird 68.2.2, I no
longer have the Qubes integration add-on,  so can't 'open attachements
in DVM'  directly.

How would I go about getting back the qubes integration or is this a
'known issue'  etc and just wait ?


recce

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/420dcec7-cfb3-476e-2d31-14c64f74c86b%40riseup.net.


[qubes-users] Re: Shutting down a VM when applications close

2019-11-29 Thread liked2

On 2019-11-27 12:52, tetrahedra via qubes-users wrote:

DispVMs shut down automatically when the launched application closes.

Is it possible to enable this for certain applications in certain AppVMs
as well?

For example I may not want my "resource-heavy-apps-vm" to keep running
after MemoryHungryApp closes, because that ties up half my system RAM.

How would I configure "resource-heavy-apps-vm" to shutdown automatically
when MemoryHungryApp closes?



You could also use a feature of qubes to shutdown a VM after a certain time. 
You can find steps to enable it to a particular vm in this thread:
https://groups.google.com/forum/#!topic/qubes-users/lyABSZGmKdM

Now it also works for debian templates.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c22daf1f-7b83-1716-e5b9-2c1b483f1941%40gmx.de.


[qubes-users] Fedora 29 has reached EOL

2019-11-29 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Fedora 29 has reached EOL (end-of-life). [1] We strongly recommend that
all Qubes users upgrade their Fedora 29 TemplateVMs and StandaloneVMs to
Fedora 30 immediately. We provide step-by-step upgrade instructions for
upgrading Fedora TemplateVMs. [2] For a complete list of TemplateVM
versions supported for your specific version of Qubes, see the Supported
TemplateVM Versions page. [3]

We also provide a fresh Fedora 30 TemplateVM package through the
official Qubes repositories, which you can install in dom0 by following
the standard installation instructions. [4]

After upgrading your TemplateVMs, please remember to switch all qubes
that were using the old template to use the new one. [5]

Please note that no user action is required regarding the OS version in
dom0. For details, please see our Note on dom0 and EOL. [6]


[1] https://fedoraproject.org/wiki/End_of_life
[2] https://www.qubes-os.org/doc/template/fedora/upgrade/
[3] https://www.qubes-os.org/doc/supported-versions/#templatevms
[4] https://www.qubes-os.org/doc/templates/fedora/#installing
[5] https://www.qubes-os.org/doc/templates/#switching
[6] https://www.qubes-os.org/doc/supported-versions/#note-on-dom0-and-eol

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2019/11/29/fedora-29-eol/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=dhPh
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6188c25a-9edf-8b95-586f-e06e7733e92c%40qubes-os.org.