Re: [qubes-users] [Qubes OS 4.0.1 / Debian 10] 403 Forbidden IP sudo apt update

2019-12-08 Thread schwoereraxel


Hello Charles,

Thanks for your answer. I followed each step, including the one where we 
have to add the key, but that doesn't change anything, I still have the 
same problem.
Thanks for your help. 
Axel

Le mardi 3 décembre 2019 20:38:44 UTC+1, Charles Peters a écrit :
>
>
>
> On Tue, Dec 3, 2019 at 5:07 AM > wrote:
>
>> Hello,
>> I've been trying to install QGIS via their repositories for a few days 
>> now, but I have a problem when I do sudo apt update:
>>
>> user@debian-10:~$ sudo apt update
>> ...
>> Achieved: 4 https://cdn-aws.deb.debian.org/debian-security 
>> buster/updates InRelease
>> Reading package lists Fact
>> E: Unable to retrieve https://qgis.org/debian/dists/buster/InRelease 403 
>> Forbidden[IP : 127.0.0.0.1 8082]
>> E: The deposit https://qgis.org/debian buster InRelease is not signed.
>> N: Updates from such a repository cannot be done securely, and are 
>> therefore disabled by default.
>> N: See the apt-secure(8) manual pages for repository creation and user 
>> configuration details.
>> user@debian-10:~$ 
>>
>> It seems that my IP address is blacklisted from the QGIS repository.
>>
>
> It looks like you haven't added the repository key.
>  https://qgis.org/en/site/forusers/alldownloads.html#debian-ubuntu
>
> Did you add the repository gpg key?
> Note: If you follow the commands listed on the web page in a Template VM, 
> the wget command will fail.  
> curl -x 127.0.0.1:8082 https://qgis.org/downloads/qgis-2019.gpg.key > 
> qgis-2019.gpg.key
>  
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2d735c7-e92d-4752-a4b1-edca568b9e77%40googlegroups.com.


Re: [qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread 'awokd' via qubes-users
pkw:
> 
> 
> W dniu niedziela, 8 grudnia 2019 18:13:58 UTC+1 użytkownik pkw napisał:

>> *sdc 8:32   0 465,8G  0 disk  ├─sdc1  8:33   0 1G  0 part  
>> └─sdc2  8:34   0 464,8G  0 part└─qubes 253:00 464,8G  0 crypt* 
>>
>>
>> root@X230:/qubes# mount /dev/mapper/qubes /qubes
>> *mount: /qubes: unknown filesystem type 'LVM2_member'.*

Did you cryptsetup open somewhere in there? You may also need to install
the LVM thin package, I think it's named thinprovisioningtools.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/48f3dbae-b526-4bc6-462a-11491773ac01%40danwin1210.me.


[qubes-users] sys-net keeps dying

2019-12-08 Thread tetrahedra via qubes-users

see the corresponding issue:
https://github.com/QubesOS/qubes-issues/issues/5508

The tldr is that ever since I upgraded to fedora-30, sys-net has started
dying intermittently (or less intermittently, nearly every time) I put
my laptop to sleep.

This is really problematic.

I am wondering if it would make sense to re-create sys-net from scratch.
Could it be that this is something from fedora-29 that is not working
well with fedora-30?

There doesn't seem to be much documentation on how to do this. One post
suggests you just create a new VM and call it sys-net:
https://www.reddit.com/r/Qubes/comments/amvkz3/how_to_create_net_and_firewall_again_with_default/efpl5i2/

However that doesn't seem right, isn't something extra needed to get
the NetworkManager wifi menu widget set up?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191208195653.GA1977%40danwin1210.me.


[qubes-users] 2 GB RAM limit for PCI passthrough of USB controller?

2019-12-08 Thread Sven Semmler
Hi,

this is a limitation that pleagues me on my otherwise excellent working Qubes 
setup:

* Whenever I assign the USB controller (Intel Sunrise Point-H USB 3.0 xHCI) to 
a qube, regardless of the operating system (Debian or Windows) it crashes. If I 
stay below or equal to 2 GB there are no problems.

* Windows doesn't even start
* Debian boots but whenever I attempt using a USB device it immediately 
crashes the qube
* The very same qubes without the USB controller or with 2GB memory 
assigned work perfectly

Yes 2GB are plenty but if you are doing development (IDE, compiler, analyzer 
tools ...) 2GB can get tight quickly. 

* Do others have simliar issues or is this specific to my setup?
* Is there anything Qubes or Xen specific I could look into (settings, logs 
etc)?
* What could explain this behavior?

/Sven

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191208194949.GA1642%40app-email-private.


signature.asc
Description: PGP signature


Re: [qubes-users] Re: my dom0 is not updating since before 4.01

2019-12-08 Thread code9n
Having this same (old now) problem.  

Tried adding --releasever=4.0 to sudo qubes-dom0-update and I get most of 
the update to download but not all of it.

Unman suggested :  "you could manually 
download it, copy it to dom0, check signature in dom0 with rpm -K, and 
then install." 

Which apparently worked but how do I go about that?  What package am I 
looking for and where do I look for it?  If you could suggest commands to 
be used that'd be great?  Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ac70d5b-c29d-457f-bffe-2e3553ea0c95%40googlegroups.com.


Re: [qubes-users] Has anybody gotten increased scrutiny at an international checkpoint because of having qubes installed?

2019-12-08 Thread haaber

I I will be doing some international travel in the upcoming months.  In

the past, I have had to turn on my laptop, and once I had to bring the
system fully up and allow people to see my desktop -- though nobody has
actually seized and gone through my computer as yet.  Has anybody gotten
increased scrutiny because they were running an enhanced security OS
such as qubes when entering a country?  If qubes is a "red flag," then
I'll carry a different laptop.


Carry another then, that's the safest.

The easy solution (if you accept some "risks") that works as well is a
micro-usb & some std linux on it, that is already booted. Give it a
family picture background with sweet kids & some green :) And two or
three non-sense documents that you can open.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2880077-0186-46c7-abf7-76de6e4264b1%40web.de.


Re: [qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread pkw


W dniu niedziela, 8 grudnia 2019 18:13:58 UTC+1 użytkownik pkw napisał:
>
>
>
> W dniu niedziela, 8 grudnia 2019 16:56:20 UTC+1 użytkownik awokd napisał:
>>
>>
>> Check 
>> https://www.mail-archive.com/qubes-users@googlegroups.com/msg22764.html 
>> for some ideas. 
>>
>> -- 
>> - don't top post 
>> Mailing list etiquette: 
>> - trim quoted reply to only relevant portions 
>> - when possible, copy and paste text instead of screenshots 
>>
>
>
> I'm stuck ...
>
> root@X230:/qubes# ls -la /dev/mapper/
> total 0
> drwxr-xr-x  2 root root  80 Dec  8 17:50 .
> drwxr-xr-x 21 root root4460 Dec  8 17:50 ..
> crw---  1 root root 10, 236 Dec  8 17:26 control
>
> *lrwxrwxrwx  1 root root   7 Dec  8 17:50 qubes -> ../dm-0*
>
> root@X230:/qubes# lsblk
> NAME  MAJ:MIN RM   SIZE RO TYPE  MOUNTPOINT
> sda 8:00 119,2G  0 disk  
> └─sda1  8:10 119,2G  0 part  /
> sdb 8:16   0 931,5G  0 disk  
> └─sdb1  8:17   0 930,6G  0 part  /media/user/1tb-ext4
>
>
>
> *sdc 8:32   0 465,8G  0 disk  ├─sdc1  8:33   0 1G  0 part  
> └─sdc2  8:34   0 464,8G  0 part└─qubes 253:00 464,8G  0 crypt* 
>
>
> root@X230:/qubes# mount /dev/mapper/qubes /qubes
> *mount: /qubes: unknown filesystem type 'LVM2_member'.*
>
>
> root@X230:/qubes# lvmdiskscan 
>   Incorrect metadata area header checksum on /dev/mapper/qubes at offset 
> 4096
>   /dev/mapper/qubes [<464,76 GiB] LVM physical volume
>   /dev/sda1 [ 119,24 GiB] 
>   /dev/sdb1 [ 930,61 GiB] 
>   /dev/sdc1 [   1,00 GiB] 
>   /dev/sdc2 [ 464,76 GiB] 
>   0 disks
>   4 partitions
>   1 LVM physical volume whole disk
>   0 LVM physical volumes
>
>
> also:
>

root@X230:/qubes# vgscan 
  Reading volume groups from cache.
root@X230:/qubes# vgscan --cache
  Incorrect metadata area header checksum on /dev/mapper/qubes at offset 
4096
  Incorrect metadata area header checksum on /dev/mapper/qubes at offset 
4096
  Incorrect metadata area header checksum on /dev/mapper/qubes at offset 
4096
  Reading volume groups from cache. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e0c81eb-9f71-492b-9034-19d678d501f8%40googlegroups.com.


Re: [qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread pkw


W dniu niedziela, 8 grudnia 2019 16:56:20 UTC+1 użytkownik awokd napisał:
>
>
> Check 
> https://www.mail-archive.com/qubes-users@googlegroups.com/msg22764.html 
> for some ideas. 
>
> -- 
> - don't top post 
> Mailing list etiquette: 
> - trim quoted reply to only relevant portions 
> - when possible, copy and paste text instead of screenshots 
>


I'm stuck ...

root@X230:/qubes# ls -la /dev/mapper/
total 0
drwxr-xr-x  2 root root  80 Dec  8 17:50 .
drwxr-xr-x 21 root root4460 Dec  8 17:50 ..
crw---  1 root root 10, 236 Dec  8 17:26 control

*lrwxrwxrwx  1 root root   7 Dec  8 17:50 qubes -> ../dm-0*

root@X230:/qubes# lsblk
NAME  MAJ:MIN RM   SIZE RO TYPE  MOUNTPOINT
sda 8:00 119,2G  0 disk  
└─sda1  8:10 119,2G  0 part  /
sdb 8:16   0 931,5G  0 disk  
└─sdb1  8:17   0 930,6G  0 part  /media/user/1tb-ext4



*sdc 8:32   0 465,8G  0 disk  ├─sdc1  8:33   0 1G  0 part  
└─sdc2  8:34   0 464,8G  0 part└─qubes 253:00 464,8G  0 crypt* 


root@X230:/qubes# mount /dev/mapper/qubes /qubes
*mount: /qubes: unknown filesystem type 'LVM2_member'.*


root@X230:/qubes# lvmdiskscan 
  Incorrect metadata area header checksum on /dev/mapper/qubes at offset 
4096
  /dev/mapper/qubes [<464,76 GiB] LVM physical volume
  /dev/sda1 [ 119,24 GiB] 
  /dev/sdb1 [ 930,61 GiB] 
  /dev/sdc1 [   1,00 GiB] 
  /dev/sdc2 [ 464,76 GiB] 
  0 disks
  4 partitions
  1 LVM physical volume whole disk
  0 LVM physical volumes





-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/42e24317-6a1e-46c1-a1e0-00f7996d93d3%40googlegroups.com.


[qubes-users] Has anybody gotten increased scrutiny at an international checkpoint because of having qubes installed?

2019-12-08 Thread billollib

I will be doing some international travel in the upcoming months.  In the 
past, I have had to turn on my laptop, and once I had to bring the system 
fully up and allow people to see my desktop -- though nobody has actually 
seized and gone through my computer as yet.  Has anybody gotten increased 
scrutiny because they were running an enhanced security OS such as qubes 
when entering a country?  If qubes is a "red flag," then I'll carry a 
different laptop.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8322a82-96d6-49b0-8591-bcf183ee6a9d%40googlegroups.com.


[qubes-users] How do I attach a hard drive to a VM on boot?

2019-12-08 Thread billollib

I have an HP laptop with 4.0.2.rc2 installed.  Everything works well, with 
the exception of a couple of small things I've asked about previously.   
Now I'm trying to tune it a bit.  I have a 256G SSD where qubes is 
installed, and a 1TB traditional hard drive.  I want to attach the hard 
drive to my "work" VM on boot.  Currently, I boot up the machine, go to the 
"Qubes Devices" tab on the panel, choose the device, and attach it 
manually.  Then I open a terminal in the VM and mount it to a directory 
from the command line.  It works fine.

However...  it would be more convenient to have it mount automatically on 
that VM on boot up.  I know how to edit the /etc/fstab file to 
automatically mount a visible drive.  What I don't know how to do is to 
make the drive visible to the VM automatically on boot.  I've poked around 
the documentation but missed the instructions, if they are there.

Can anybody either tell me how to do this or point me to the documentatoin 
on it?

And, by the way, the more I'm using this OS, the more I like it.  I have to 
think a little differently about managing workflow, but the idea of being 
able to surf the web on one VM and do work on another while 
compartmentalizing them transparently is really great.  Great job.  I 
appreciate the work the developers have done.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f72026c3-49e7-4d53-ae1c-80d01c512c43%40googlegroups.com.


Re: [qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread 'awokd' via qubes-users
pkw:
> 
> 
> W dniu niedziela, 8 grudnia 2019 16:30:43 UTC+1 użytkownik pkw napisał:
>>
>>
>>
>> W dniu niedziela, 8 grudnia 2019 16:20:20 UTC+1 użytkownik awokd napisał:
>>>
>>>
>>> Yes, you should be able to mount the drive either in another system or 
>>> with a rescue boot CD/image on the same system. Look for cryptsetup + 
>>> LVM recovery. 
>>>
>>> -- 
>>> - don't top post 
>>> Mailing list etiquette: 
>>> - trim quoted reply to only relevant portions 
>>> - when possible, copy and paste text instead of screenshots 
>>>
>>
>>
>> Thank you for the answer, just burning qubes usb.
>> Once I mount main system, where to look for for the private VM files? I 
>> would like to copy it to some other drive, I suspect the one I have now is 
>> faulty.
>>
> 
> 
> not god... qubes rescue mode  doesn't work..
> .
> It asks to choose from 4 options, when I chose to mount as read-only it 
> asks me for LUKS password for sda2, 
> when I enter it there is a message that I don't have any Linux partitions..
> 
> Any clues how to proceed?
> 
Check
https://www.mail-archive.com/qubes-users@googlegroups.com/msg22764.html
for some ideas.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3f9a789f-3c3b-c186-fcf3-420f3cbc360f%40danwin1210.me.


Re: [qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread pkw


W dniu niedziela, 8 grudnia 2019 16:30:43 UTC+1 użytkownik pkw napisał:
>
>
>
> W dniu niedziela, 8 grudnia 2019 16:20:20 UTC+1 użytkownik awokd napisał:
>>
>>
>> Yes, you should be able to mount the drive either in another system or 
>> with a rescue boot CD/image on the same system. Look for cryptsetup + 
>> LVM recovery. 
>>
>> -- 
>> - don't top post 
>> Mailing list etiquette: 
>> - trim quoted reply to only relevant portions 
>> - when possible, copy and paste text instead of screenshots 
>>
>
>
> Thank you for the answer, just burning qubes usb.
> Once I mount main system, where to look for for the private VM files? I 
> would like to copy it to some other drive, I suspect the one I have now is 
> faulty.
>


not god... qubes rescue mode  doesn't work..
.
It asks to choose from 4 options, when I chose to mount as read-only it 
asks me for LUKS password for sda2, 
when I enter it there is a message that I don't have any Linux partitions..

Any clues how to proceed?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ffee5fa6-1f3f-48b6-bd90-55cac513ad85%40googlegroups.com.


Re: [qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread pkw


W dniu niedziela, 8 grudnia 2019 16:20:20 UTC+1 użytkownik awokd napisał:
>
>
> Yes, you should be able to mount the drive either in another system or 
> with a rescue boot CD/image on the same system. Look for cryptsetup + 
> LVM recovery. 
>
> -- 
> - don't top post 
> Mailing list etiquette: 
> - trim quoted reply to only relevant portions 
> - when possible, copy and paste text instead of screenshots 
>


Thank you for the answer, just burning qubes usb.
Once I mount main system, where to look for for the private VM files? I 
would like to copy it to some other drive, I suspect the one I have now is 
faulty.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed8752ae-43f8-45ec-b414-3bc05d48f231%40googlegroups.com.


Re: [qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread 'awokd' via qubes-users
IT Geek:
> Hi,
> 
> my qubes installation won't boot, I have no backup... :/
> 
> I started it today, dom0 started but any of the VMs could'nt start. there 
> was an error:
> 
> "domain has failed to start volume qubes_dom0/vm... missing" - more less. I 
> cant remember exact error
> 
> then I rebooted the machine and I failed completely...
> 
> I have error:
> 
> .
> error: unknown filesystem
> Entering rescue mode
> grub rescue>
> 
> 
> 
> Is it possible to mount drive with qubes in other system and rescue my 
> data? I have the encryption password
> 
Yes, you should be able to mount the drive either in another system or
with a rescue boot CD/image on the same system. Look for cryptsetup +
LVM recovery.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c9ed376-8855-af5d-12cd-abb5227202e3%40danwin1210.me.


Re: [qubes-users] qvm-block arg err while attempting to mount private.img as vol

2019-12-08 Thread 'awokd' via qubes-users
Dave:
> I have a broken app-vm, from which I want to recover the usr home dir.
> I want to mount the private.img as a vol to the new working vm using 
> qvm-block so I can copy user files in accordance with instructions here: 
> https://www.qubes-os.org/news/2017/04/26/qubes-compromise-recovery/
> 
>>
>> It is possible to mount one VM’s private image as a volume to another 
>> AppVM. One can then run whatever malware scanner or investigative software 
>> in that other AppVM. This operation is indeed very easy to do:
>>
>> [joanna@dom0 ~]$ qvm-block -A --ro admin-ir 
>> dom0:/var/lib/qubes/appvms/personal/private.img
>> [root@admin-ir user]# mount -o ro /dev/xvdi /mnt/personal/
>>
>> However, the command returns err msg for 'admin-ir' argument:
> 
> [David@dom0 ~]$ qvm-block -A --ro admin-ir 
>> dom0:/var/lib/qubes/appvms/personal/private.img
>> usage: qvm-block [--verbose] [--quiet] [--help] [--list-device-classes]
>>  {list,ls,l,attach,at,a,detach,d,dt} ...
>> qvm-block: error: argument command: invalid choice: 'admin-ir' (choose 
>> from 'list', 'ls', 'l', 'attach', 'at', 'a', 'detach', 'd', 'dt')
>> [David@dom0 ~]$ 
>>
> 
> Please help with proper syntax so I can recover user data from an app-vm 
> that won't boot. TIA 
> 
The article you're referring to is about Qubes 3.2, but the output from
the qvm-block command appears to be from 4.0. Probably the safest way to
accomplish the same thing is:
- Create new VM with same sized private volume as the broken one
- Shut it down
- Locate the source(broken) and target(new) private volume names with
"ls /dev/mapper" in dom0 terminal. They will end in "--private", not
--back or --snap.
- sudo cp /dev/mapper/[broken]--private /dev/mapper/[new]--private
- Power on new VM

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49e378fe-af32-27d6-c6f6-67c12670d433%40danwin1210.me.


[qubes-users] ! qubes won't boot - no access to data - please help

2019-12-08 Thread IT Geek
Hi,

my qubes installation won't boot, I have no backup... :/

I started it today, dom0 started but any of the VMs could'nt start. there 
was an error:

"domain has failed to start volume qubes_dom0/vm... missing" - more less. I 
cant remember exact error

then I rebooted the machine and I failed completely...

I have error:

.
error: unknown filesystem
Entering rescue mode
grub rescue>



Is it possible to mount drive with qubes in other system and rescue my 
data? I have the encryption password

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4705c2eb-b9da-476e-8650-9fea77a76734%40googlegroups.com.