Re: [qubes-users] Mike's emails

2019-12-12 Thread David Hobach



On 12/13/19 3:34 AM, tetrahedra via qubes-users wrote:

On Thu, Dec 12, 2019 at 05:23:47PM +, Mike Keehan wrote:

Qubes won't help in this situation - see
https://www.qubes-os.org/doc/disposablevm/#disposablevms-and-local-forensics 



They recommend using Tails for this type of situation.

Mike.


I am getting very many duplicate copies of Mike's emails, but only of
emails from Mike. Is this happening to anyone else?


Probably because he clicked "reply all" on one of your questions like I 
just did.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7d8207a-188c-10ef-cbb5-c59a0f9a5572%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qubes-users] Re: How do I attach a hard drive to a VM on boot?

2019-12-12 Thread David Hobach

On 12/12/19 8:46 PM, billol...@gmail.com wrote:


Doh.  I just noticed the "noauto" option.  Sigh. Deleted it and it works
fine.


The only remaining problem here might be that /dev/sda3 doesn't 
reference the same drive on each dom0 boot process...


So you'd have to write a udev rule for that. Alternatively your could 
write a little dom0 script to do the attachment by disk ID 
(/dev/disk/by-uuid) rather than via --persistent.


But I might also be wrong and Qubes OS solved that referencing issue 
internally.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/59257a08-0257-82f9-e618-3eeaf25b8c75%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qubes-users] unsupported hardware detected with the installation of qubes 4.0.1, and 4.0.2-rc2

2019-12-12 Thread rickey
Thank you steve.coleman,
I will reinstall the systems, and will let you know, and will do 
screenshots.
Thank you, and Best Regards
rickey




On Tuesday, December 10, 2019 at 11:56:27 AM UTC-5, steve.coleman wrote:
>
> On 2019-12-10 10:26, rickey wrote: 
> > Good morning Everyone, 
> > I have installed previously Qubes 3.2.1 on a Dell small form factor 
> > desktop pc, and lenovo x120e, and I was able to use them. 
> > When I tried to install the Qubes versions mentioned above on the same 
> > hardware, it is showing the message into the attached screenshot. If I 
> > proceed despite it, I cannot finish the installation of the thinkpad, 
> > and Dell's doesn't allow Tor to start. 
>
> You have two separate problems here apparently, and not really enough 
> detail for us to go by to help much. 
>
> - For the Lenovo x120e I would start by checking your BIOS version to 
> see if you are up to date. You can find that information here: 
>
>
> https://pcsupport.lenovo.com/si/en/products/laptops-and-netbooks/thinkpad-x-series-laptops/thinkpad-x120e/downloads/driver-list/component?name=BIOS%2FUEFI
>  
>
> If you are not up to date then download the bootable CD version, reflash 
> your bios to the latest and try again. You also may have to play with 
> the UEFI settings to be able to continue the installation, if its 
> rebooting that isn't working. You have not told us what error you are 
> getting or where in the install process it stops working. There are no 
> x120e's in the HCL list yet but somebody might have some experience with 
> something similar. 
>
>
> - For the Dell, we don't even know what system model you have yet. Are 
> you talking about the whonix system for Tor? Have the whonix service 
> VM's been started?  What VM logs are available? We need more information 
> in order to be able to help. 
>
> Note: Since you have two separate system problems I would suggest 
> splitting this email thread into two separate threads so the people 
> familiar with each kind of system can focus better on that particular 
> issue. We will try to help if we can. 
>
>
> > 
> > -- 
> > You received this message because you are subscribed to the Google 
> > Groups "qubes-users" group. 
> > To unsubscribe from this group and stop receiving emails from it, send 
> > an email to qubes...@googlegroups.com  
> > . 
> > To view this discussion on the web visit 
> > 
> https://groups.google.com/d/msgid/qubes-users/4add3ef3-3249-4206-8f0e-8bc292071314%40googlegroups.com
>  
> > <
> https://groups.google.com/d/msgid/qubes-users/4add3ef3-3249-4206-8f0e-8bc292071314%40googlegroups.com?utm_medium=email_source=footer>.
>  
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fb795f8d-75d0-4b51-928e-22b6de0f8125%40googlegroups.com.


[qubes-users] Re: Android-x86 7.1-r2 with GAPPS installation guide

2019-12-12 Thread arthur . summers
Are the instructions in the first post edited and updated, or are there 
more recent instructions which should be used? I'm personally interested in 
an image with GApps (I downloaded the nogapps ISO and tried to somehow 
install GApps, but to no avail - I wasn't sure if the image provided up 
near the start of the thread was functional). If there are updated/verified 
instructions that could be provided, that would be awesome!

On Saturday, April 27, 2019 at 6:29:08 PM UTC-5, alex.j...@gmail.com wrote:
>
> On Saturday, April 27, 2019 at 9:35:19 PM UTC, alex.j...@gmail.com wrote:
> > On Thursday, April 25, 2019 at 10:20:32 PM UTC, Daniil Travnikov wrote:
> > > I am stuck on this process already twice.
> > > 
> > > When I put the command
> > > 
> > > Download sources:
> > > repo sync --no-tags --no-clone-bundle --force-sync -j$( nproc --all )
> > > 
> > > 
> > > and when it show this:
> > > 
> > > 
> > > From git://git.osdn.net/gitroot/android-x86/platform/frameworks/av
> > >  * [new branch]  nougat-x86 -> x86/nougat-x86
> > > Fetching project platform/external/android-clat
> > > remote: Counting objects: 1, done
> > > remote: Finding sources: 100% (793/793)   
> > > remote: Total 793 (delta 244), reused 793 (delta 244)
> > > Receiving objects: 100% (793/793), 517.38 KiB | 0 bytes/s, done.
> > > Resolving deltas: 100% (244/244), done.
> > > From https://android.googlesource.com/platform/external/android-clat
> > >  * [new tag] android-7.1.2_r36 -> android-7.1.2_r36
> > > 
> > > 
> > > I got nothing, I mean it's look like freeze.
> > 
> > Did you try to remove downloaded repo and sync it again from scratch? 
> The OpenGAPPS repo changed, see below, maybe it's somehow related.
> > 
> > I'd recommend to build Android 8 release, the mouse works fine there. 
> Also the Settings bug is fixed if you use userdebug build variant instead 
> of eng.
> > The guide in the same as in first post except:
> > 
> > Android 8 will take 211GB to build. I've build it with 32GB RAM without 
> swap, maybe it'll work with less RAM.
> > 
> > repo init -u git://git.osdn.net/gitroot/android-x86/manifest -b 
> oreo-x86 -m android-x86-8.1-r1.xml
> > instead of 
> > repo init -u git://git.osdn.net/gitroot/android-x86/manifest -b 
> android-x86-7.1-r2
> > 
> > https://github.com/opengapps/;  />
> > https://gitlab.nezorfla.me/opengapps/;  />
> >  revision="master" remote="opengapps" />
> >  revision="master" remote="nezor" />
> >  revision="master" remote="nezor" />
> >  clone-depth="1" revision="master" remote="nezor" />
> > instead of
> > https://github.com/opengapps/;  />
> >  revision="master" remote="opengapps" />
> >  revision="master" remote="opengapps" />
> >  revision="master" remote="opengapps" />
> >  clone-depth="1" revision="master" remote="opengapps" />
> > 
> > lunch android_x86_64-userdebug
> > instead of
> > lunch android_x86_64-eng
> > 
> > /usr/bin/make -C kernel O=$OUT/obj/kernel ARCH=x86_64 menuconfig
> > instead of
> > make -C kernel O=$OUT/obj/kernel ARCH=x86_64 menuconfig
>
> I've uploaded the working Android 8.1 iso for those who need it for a 
> test, but I don't recommend to use it for security reasons and it's better 
> to build the iso yourself:
> https://drive.google.com/open?id=1Y4P77mlPPlXBzYrJ5yHJ7XM6gLVsQQm0
>
> md5sum android_x86_64-oreo-nogapps.iso 
> b3af7a84820dd9fb32dd40c68f285993  android_x86_64-oreo-nogapps.iso
>
> sha1sum android_x86_64-oreo-nogapps.iso 
> 16e9bcf0da44929b223fc2ab1df97de0df26d9fb  android_x86_64-oreo-nogapps.iso
> sha256sum
>
> sha256sum android_x86_64-oreo-nogapps.iso 
> b7d9aa5f9c401202ea24b63e95bb0f38d1f981381a719257c1a2f526e0cf636f 
>  android_x86_64-oreo-nogapps.iso
>
> sha512sum android_x86_64-oreo-nogapps.iso 
> 16f2666a20499f31472fc933a670c47070e0db14686b605b69254d054dcc63893b564e5a35e84e1daf7b7fd80f955a2834956a1bb029e93563b7d8c44787666b
>  
>  android_x86_64-oreo-nogapps.iso
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aebd068b-32f8-4468-90b3-6cbcb5c8bd73%40googlegroups.com.


[qubes-users] Mike's emails

2019-12-12 Thread tetrahedra via qubes-users

On Thu, Dec 12, 2019 at 05:23:47PM +, Mike Keehan wrote:

Qubes won't help in this situation - see
https://www.qubes-os.org/doc/disposablevm/#disposablevms-and-local-forensics

They recommend using Tails for this type of situation.

Mike.


I am getting very many duplicate copies of Mike's emails, but only of
emails from Mike. Is this happening to anyone else?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191213023409.GA6832%40danwin1210.me.


Re: [qubes-users] sys-net keeps dying

2019-12-12 Thread tetrahedra via qubes-users

On Wed, Dec 11, 2019 at 11:46:04AM +, 'awokd' via qubes-users wrote:

This should work, but make sure sys-firewall is shutdown before
attempting to change. If it still isn't, try changing with qvm-prefs
sys-firewall.


Ok, I didn't realize sys-firewall had to be shutdown. Most of the time
you can change a VM's networking without shutting it down first... in
any case, once sys-firewall was off, changing networking worked fine.

Unfortunately, creating a new sys-net does not appear to have fixed the
issue, crashes still occur.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191212041425.GA5975%40danwin1210.me.


[qubes-users] Re: Can't install KVM in Qubes OS?

2019-12-12 Thread pixel fairy
Qubes-os uses xen, not kvm. Nested virtualization is disabled because of 
the added attack surface.

Ive installed qemu in a debian template in the past, but have not tried 
recently. instead i have another machine running kvm with nested 
virtualization enabled and run vagrant remotely on that one using 
virt-manager for desktop vms. 

I was also able to get the andrioid emulator running on just qemu, but that 
was painfully slow. Hope they make a container option. this was a couple 
years ago.

On Thursday, December 12, 2019 at 3:11:20 PM UTC-8, Tae Hwan Kim wrote:
>
> Hello!
> I need to install KVM for mobile development.(for android emulator).
> so I did try installing kvm like this
>
> sudo dnf  -y 
> install qemu-kvm libvirt virt-install bridge-utils 
>
> but my app vm shows me error like this.
>
> Error:
>  
>>
>>  Problem 1: package libvirt-daemon-driver-libxl-5.1.0-4.fc30.x86_64 
>> requires libxenlight.so.4.11()(64bit), but none of the providers can be 
>> installed
>>   - package libvirt-daemon-driver-libxl-5.1.0-4.fc30.x86_64 requires 
>> libxlutil.so.4.11()(64bit), but none of the providers can be installed
>>   - cannot install both xen-libs-2001:4.8.5-5.fc30.x86_64 and 
>> xen-libs-4.11.2-3.fc30.x86_64
>> 
>>
>>   - cannot install both xen-libs-2001:4.8.5-5.fc30.x86_64 and 
>> xen-libs-4.11.1-4.fc30.x86_64
>> 
>>
>>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
>> libxenctrl.so.4.8()(64bit), but none of the providers can be 
>> installed  
>>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
>> libxenguest.so.4.8()(64bit), but none of the providers can be 
>> installed 
>>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
>> libxenlight.so.4.8.1()(64bit), but none of the providers can be 
>> installed   
>>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
>> libxlutil.so.4.8()(64bit), but none of the providers can be 
>> installed   
>>   - problem with installed package 
>> xen-qubes-vm-2001:4.8.5-13.fc30.x86_64   
>>
>>
>>   - package xen-qubes-vm-2001:4.8.5-6.fc30.x86_64 requires xen-libs = 
>> 2001:4.8.5-6.fc30, but none of the providers can be 
>> installed
>>   - cannot install both xen-libs-2001:4.8.5-6.fc30.x86_64 and 
>> xen-libs-4.11.2-3.fc30.x86_64
>> 
>>
>>   - cannot install both xen-libs-2001:4.8.5-6.fc30.x86_64 and 
>> xen-libs-4.11.1-4.fc30.x86_64
>> 
>>
>>   - package libvirt-5.1.0-4.fc30.x86_64 requires 
>> libvirt-daemon-driver-libxl = 5.1.0-4.fc30, but none of the providers can 
>> be installed
>>   - conflicting requests 
>>   - package libvirt-5.1.0-9.fc30.x86_64 requires 
>> libvirt-daemon-driver-libxl = 5.1.0-9.fc30, but none of the providers can 
>> be installed
>>   - package libvirt-daemon-driver-libxl-5.1.0-9.fc30.x86_64 requires 
>> libxenlight.so.4.11()(64bit), but none of the providers can be installed
>>   - package libvirt-daemon-driver-libxl-5.1.0-9.fc30.x86_64 requires 
>> libxlutil.so.4.11()(64bit), but none of the providers can be installed
>>   - package xen-qubes-vm-2001:4.8.5-7.fc30.x86_64 requires xen-libs = 
>> 2001:4.8.5-7.fc30, but none of the providers can be 
>> installed
>>   - cannot install both xen-libs-2001:4.8.5-7.fc30.x86_64 and 
>> xen-libs-4.11.2-3.fc30.x86_64
>> 
>>
>>   - cannot install both xen-libs-2001:4.8.5-7.fc30.x86_64 and 
>> xen-libs-4.11.1-4.fc30.x86_64
>> 
>>
>>   - package xen-qubes-vm-2001:4.8.5-10.fc30.x86_64 requires xen-libs = 
>> 2001:4.8.5-10.fc30, but none of the providers can be 
>> installed  
>>   - cannot install both xen-libs-2001:4.8.5-10.fc30.x86_64 and 
>> xen-libs-4.11.2-3.fc30.x86_64
>>
>>
>>   - cannot install both xen-libs-2001:4.8.5-10.fc30.x86_64 and 
>> xen-libs-4.11.1-4.fc30.x86_64
>>
>>
>>   - package xen-qubes-vm-2001:4.8.5-12.fc30.x86_64 requires xen-libs = 
>> 

[qubes-users] Re: has google- chrome slowed down for anyone else?

2019-12-12 Thread pixel fairy
Whatever it is does not affect chromium. probably just a bug in chrome

On Wednesday, December 11, 2019 at 10:56:27 PM UTC-8, pixel fairy wrote:
>
> after the last dom0 update (and, i think a chrome one) chrome has been 
> really slow, to the point where some sites just freeze up for a bit, though 
> the browser still takes input so you can keep typing and just wait for it 
> to catch up. firefox seems fine, but the sites that need chrome are the 
> heavy js ones. dont know what dom0 would have to do with it, just noticed 
> that at the same time. maybe an input / refresh thing?
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4244bef0-a42d-44e8-9622-6b769790c748%40googlegroups.com.


[qubes-users] Can't install KVM in Qubes OS?

2019-12-12 Thread Tae Hwan Kim
Hello!
I need to install KVM for mobile development.(for android emulator).
so I did try installing kvm like this

sudo dnf  -y 
install qemu-kvm libvirt virt-install bridge-utils 

but my app vm shows me error like this.

Error:  
   
>
>  Problem 1: package libvirt-daemon-driver-libxl-5.1.0-4.fc30.x86_64 
> requires libxenlight.so.4.11()(64bit), but none of the providers can be 
> installed
>   - package libvirt-daemon-driver-libxl-5.1.0-4.fc30.x86_64 requires 
> libxlutil.so.4.11()(64bit), but none of the providers can be installed
>   - cannot install both xen-libs-2001:4.8.5-5.fc30.x86_64 and 
> xen-libs-4.11.2-3.fc30.x86_64 
>
>
>   - cannot install both xen-libs-2001:4.8.5-5.fc30.x86_64 and 
> xen-libs-4.11.1-4.fc30.x86_64 
>
>
>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
> libxenctrl.so.4.8()(64bit), but none of the providers can be 
> installed  
>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
> libxenguest.so.4.8()(64bit), but none of the providers can be 
> installed 
>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
> libxenlight.so.4.8.1()(64bit), but none of the providers can be 
> installed   
>   - package xen-qubes-vm-2001:4.8.5-5.fc30.x86_64 requires 
> libxlutil.so.4.8()(64bit), but none of the providers can be 
> installed   
>   - problem with installed package 
> xen-qubes-vm-2001:4.8.5-13.fc30.x86_64
>   
>
>   - package xen-qubes-vm-2001:4.8.5-6.fc30.x86_64 requires xen-libs = 
> 2001:4.8.5-6.fc30, but none of the providers can be 
> installed
>   - cannot install both xen-libs-2001:4.8.5-6.fc30.x86_64 and 
> xen-libs-4.11.2-3.fc30.x86_64 
>
>
>   - cannot install both xen-libs-2001:4.8.5-6.fc30.x86_64 and 
> xen-libs-4.11.1-4.fc30.x86_64 
>
>
>   - package libvirt-5.1.0-4.fc30.x86_64 requires 
> libvirt-daemon-driver-libxl = 5.1.0-4.fc30, but none of the providers can 
> be installed
>   - conflicting requests 
>   - package libvirt-5.1.0-9.fc30.x86_64 requires 
> libvirt-daemon-driver-libxl = 5.1.0-9.fc30, but none of the providers can 
> be installed
>   - package libvirt-daemon-driver-libxl-5.1.0-9.fc30.x86_64 requires 
> libxenlight.so.4.11()(64bit), but none of the providers can be installed
>   - package libvirt-daemon-driver-libxl-5.1.0-9.fc30.x86_64 requires 
> libxlutil.so.4.11()(64bit), but none of the providers can be installed
>   - package xen-qubes-vm-2001:4.8.5-7.fc30.x86_64 requires xen-libs = 
> 2001:4.8.5-7.fc30, but none of the providers can be 
> installed
>   - cannot install both xen-libs-2001:4.8.5-7.fc30.x86_64 and 
> xen-libs-4.11.2-3.fc30.x86_64 
>
>
>   - cannot install both xen-libs-2001:4.8.5-7.fc30.x86_64 and 
> xen-libs-4.11.1-4.fc30.x86_64 
>
>
>   - package xen-qubes-vm-2001:4.8.5-10.fc30.x86_64 requires xen-libs = 
> 2001:4.8.5-10.fc30, but none of the providers can be 
> installed  
>   - cannot install both xen-libs-2001:4.8.5-10.fc30.x86_64 and 
> xen-libs-4.11.2-3.fc30.x86_64 
>   
>
>   - cannot install both xen-libs-2001:4.8.5-10.fc30.x86_64 and 
> xen-libs-4.11.1-4.fc30.x86_64 
>   
>
>   - package xen-qubes-vm-2001:4.8.5-12.fc30.x86_64 requires xen-libs = 
> 2001:4.8.5-12.fc30, but none of the providers can be 
> installed  
>   - cannot install both xen-libs-2001:4.8.5-12.fc30.x86_64 and 
> xen-libs-4.11.2-3.fc30.x86_64 
>   
>
>   - cannot install both xen-libs-2001:4.8.5-12.fc30.x86_64 and 
> xen-libs-4.11.1-4.fc30.x86_64 
>   
>
>   - package xen-qubes-vm-2001:4.8.5-13.fc30.x86_64 requires xen-libs = 
> 2001:4.8.5-13.fc30, but none of the providers can be 
> installed  
>   - cannot install both 

[qubes-users] Re: X Startup Failed

2019-12-12 Thread Master Node
I will try to not top post iv read how it's done but it does not seem to have 
worked on my last msg, I dont see any other way to rely and I'm replying to the 
last msg of this thread. 

My intel cpu is a i7-4930MX with haswell gpu integrated. As I said before my 
whole system worked amazing before the DGPUs died on me, they were actually 2 
different gpus to one was a gtx 675m and the other I can not figure out what it 
is as of yet. But this is pretty interesting that qubes worked perfect on 2 
different nvidia gpus and now wont work on the integrated intel gpu. All the 
bios settings are right but x startup fails.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a04e01ef-6542-444d-8102-2c463ff2a01a%40googlegroups.com.


[qubes-users] Re: How do I attach a hard drive to a VM on boot?

2019-12-12 Thread billollib

Doh.  I just noticed the "noauto" option.  Sigh. Deleted it and it works 
fine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/60681fda-9fbf-4f9a-9464-64a0f8010d0e%40googlegroups.com.


[qubes-users] Re: How do I attach a hard drive to a VM on boot?

2019-12-12 Thread billollib


On Thursday, December 12, 2019 at 2:36:01 PM UTC-5, bill...@gmail.com wrote:
>
> So, here's an update:
>
> I've figured out how to attach the device automatically, using "qvm-device 
> block attach --persistent untrusted dom0:sda3" in the dom0 command line.   
> However, I can't seem to get it to mount on bringing up the VM.  My 
> "untrusted" VM is debian based.  My /etc/fstab entry contains:
>
> /dev/xvdi/mnt/tmpauto noauto,user,rw 0 0
>
> and I can mount it manually in the untrusted VM command line with "sudo 
> mount /mnt/tmp"
>
> Thus, the "mount" command is looking at /etc/fstab, but it is ignored when 
> the VM comes up.   Any ideas on what I need to do to move forward?
>
> Thanks!
>
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ea854789-2170-4cc4-8d1c-4b35d7ac%40googlegroups.com.


[qubes-users] Re: How do I attach a hard drive to a VM on boot?

2019-12-12 Thread billollib
So, here's an update:

I've figured out how to attach the device automatically, using "qvm-device 
block attach --persistent untrusted dom0:sda3" in the dom0 command line.   
However, I can't seem to get it to mount on bringing up the VM.  My 
"untrusted" VM is debian based.  My /etc/fstab entry contains:

/dev/xvdi/mnt/tmpauto noauto,user,rw 0 0

and I can mount it manually in the untrusted VM command line with "sudo 
mount /mnt/tmp"

Thus, the "mount" command is looking at /etc/fstab, but it is ignored when 
the VM comes up.   Any ideas on what I need to do to move forward?

Thanks!



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1db70a01-d45c-4cb1-bfd2-fb83cd7887f9%40googlegroups.com.


Re: [qubes-users] Re: redshift or brightness control?

2019-12-12 Thread shroobi
> > $ sudo qubes-dom0-update redshift-gtk
> > 
> > The dnf command is only used for removing packages.
> >   
> 
> do you invoke it from command line?  if so, may I ask with what command
> argument ?
> 
I invoke it via the session and startup preferences in system tools, so it 
loads every
time Qubes starts. There's an also an entry in Dom0's application menu.
> via xfce menu "failed to run redshift, trying location provider
> 'geoclue2' ,
> 
> maybe because dom0 has no access to the world or something ?
> 
That's right. Geoclue2 won't work, but you can set the provider to "manual" and 
enter
your location coordinates. You can put those settings in a file at
~/.local/redshift.conf. See the redshift man page for all the options.
> 
> sorry if this might be more redshift-y than qubes-y
> 

No worries, I had the same problem myself at one time.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47YhS11TK9z6tmF%40submission01.posteo.de.


Re: [qubes-users] wipe released diskspace of a disposable VM's

2019-12-12 Thread Mike Keehan
On Thu, 12 Dec 2019 16:58:41 +0100
"josefh.maier via qubes-users"  wrote:

> Hello list,
> 
> I heard that a Qubes-user was forced to hand over the Qubes-password,
> and that a forensic examiner was able to restore artifacts of a
> deleted disposeable form the harddisk... 
> 
> Is this story possible? And what's the best aprroach to wipe
> diskspace used before by a disposable VM after that VM is closed?
> 
> 
> Thank you!
> 
> Regards,
> 
> Joe
> 

Qubes won't help in this situation - see
https://www.qubes-os.org/doc/disposablevm/#disposablevms-and-local-forensics

They recommend using Tails for this type of situation.

Mike.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191212172347.2d05ca06.mike%40keehan.net.


[qubes-users] Re: redshift or brightness control?

2019-12-12 Thread rec wins
On 12/12/19 4:35 AM, shroobi wrote:
>>
>> so $sudo dnf install redshift-gtk   ?
>>
>> seems to not be the package name , hmm
>>
> 
> 
> $ sudo qubes-dom0-update redshift-gtk
> 
> The dnf command is only used for removing packages.
> 

do you invoke it from command line?  if so, may I ask with what command
argument ?

via xfce menu "failed to run redshift, trying location provider
'geoclue2' ,

maybe because dom0 has no access to the world or something ?


sorry if this might be more redshift-y than qubes-y

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c6d8ac51-7574-b443-8d6f-f60fda070fc7%40riseup.net.


[qubes-users] wipe released diskspace of a disposable VM's

2019-12-12 Thread josefh.maier via qubes-users
Hello list,

I heard that a Qubes-user was forced to hand over the Qubes-password, and that 
a forensic examiner was able to restore artifacts of a deleted disposeable form 
the harddisk... 

Is this story possible? And what's the best aprroach to wipe diskspace used 
before by a disposable VM after that VM is closed?


Thank you!

Regards,

Joe

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20191212155841.BCB70C0640%40smtp.hushmail.com.


Re: [qubes-users] Re: redshift or brightness control?

2019-12-12 Thread shroobi
> 
> so $sudo dnf install redshift-gtk   ?
> 
> seems to not be the package name , hmm
> 


$ sudo qubes-dom0-update redshift-gtk

The dnf command is only used for removing packages.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47Ybtf5Tj4z9rxS%40submission02.posteo.de.


[qubes-users] Re: Has anybody gotten increased scrutiny at an international checkpoint because of having qubes installed?

2019-12-12 Thread trueriver


On Sunday, 8 December 2019 16:12:19 UTC, bill...@gmail.com wrote:
>
>
> I will be doing some international travel in the upcoming months.  In the 
> past, I have had to turn on my laptop, and once I had to bring the system 
> fully up and allow people to see my desktop -- though nobody has actually 
> seized and gone through my computer as yet.  Has anybody gotten increased 
> scrutiny because they were running an enhanced security OS such as qubes 
> when entering a country?  If qubes is a "red flag," then I'll carry a 
> different laptop.
>
>
My solution would be to install Qubes, leaving a partition unused (tip: 
wipe every other partition, put some data on that one, and the Qubes 
installer would ignore it) 

Then install a "normal" linux on the vacant partition, and populate it with 
desktop wallpaper etc, and some Libre Office docs. (similar to hasber's 
suggestion)

Do not include the Xen option in the boot.

Cross border.

Re-run update-grub, this time allowing the multi OS boot.

Use Qubes.

Before next border crossing, delete the Xen boot options from the grub menu.

Etc...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/adfbfd32-fb77-429e-9aaf-806fd3df68e0%40googlegroups.com.


[qubes-users] installing Zoom in a debian template: How?

2019-12-12 Thread trueriver
Hi all,

has anyone successfully installed Zoom in a Debian template? If so I would 
be glad of a HowTo. It won't work for me :(

When I downloaded the package from the zoom.us site, and installed it in 
the template with dpkg, it complained of unsatisfied prerequisites, so I 
then used apt-get install -f

Tapt-get asked permision to uninstall a LOT of packages, which raised 
warning bells, especially as polkit was among them. So I backed up the 
template, and ran apt-get install -f again, this time allowing it to make 
the changes it wanted to.
This broke the template and it never worked again: the VMs based on it 
would start but whichever program was supposed to run never appeared.

If anyone has a tested, successful way of doing this install I would be 
glad to know the trick.

If not, if you are willing to talk me through the debugging process to find 
out why this is happening, please tell me how to gather the initial logs 
and any other info that is needed.

Regards,
River~~

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e0fbc9d-f2b8-4bae-913e-d8a92393f2f3%40googlegroups.com.


Re: [qubes-users] Help sending multiple files using qrexec

2019-12-12 Thread David Hobach

On 12/5/19 3:28 AM, pr...@tutanota.de wrote:


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I should have mentioned that this was part of a bigger script, using qvm-copy
would have required me to also pass along the qube name, so I could then cd to
the correct QubesIncoming directory. Keeping it simple I went with tar:

Script one on the client:

tar -c $@ | cat

Script two on the server:

cat | tar -x

Thanks for the help!


It might also work without cat, tar just doesn't like to print to shells.

And you'll probably want to quote your $@ --> "$@" for files with spaces 
and other special characters if you're running inside bash.



Can a hacker use the same script to transfer files from a victims pc remotely ?
And if so, how easy is it ?

This can't be used remotely, the server I mention above is another virtual
machine in the same Qubes system. This is just sending files between two qubes


If tar is exploitable, then the client VM can use that exploit on the 
server VM above to execute code, yes. Also see [1].


For example the first script of this topic should be fairly easy to exploit.

In total I'd recommend to stick with the means provided unless 
absolutely necessary.


[1] https://www.qubes-os.org/doc/qrexec/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b002992a-0120-ffc5-ac40-92ea81da3aa9%40hackingthe.net.


smime.p7s
Description: S/MIME Cryptographic Signature