Re: [qubes-users] How much RAM does the dom0, sys-firewall and sys-whonix "normally" use ?

2020-03-15 Thread 'Jackie' via qubes-users

'M' via qubes-users:

How much RAM does the dom0, sys-firewall and sys-whonix "normally" use ?

I ask because these VM's seems to use quite a lot of RAM on my PC (of cause
a little more or less depending on the activity level):

dom0: About 4000 MB
sys-firewall: About 3000 MB
sys-whonix: About 4000 MB

That means just those three VM's use about 11000 MB of ram.

sys-net: About 400 MB
sys-usb: About 300 MB

Sum: About 700 MB

Sum so far: About 12000 MB

This is when I only have one other Fedora VM open which use about 4000 MB
of RAM (and that is when I only use Firefox).

That means about 16000 MB of RAM used.


If I open the file manager in another Fedora VM it uses about 2000 MB and
if I instead open the Firefox browser in this VM it uses about 3000 MB of
RAM.

In the last scenario the RAM use for all open VM's is as follow:

dom0: About 4000 MB
sys-firewall: About 1600 MB
sys-whonix: About 2200 MB
sys-net: About 400 MB
sys-usb: About 300 MB
Fedora VM: About 4000 MB
Fedora VM: About 3000 MB

SUM: About 15500 MB of RAM

Sometimes I experience my untrusted Fedora VM stall. I assume it's because
of to little amount of RAM at disposal. But I'm not sure.

In this PC I got 16 GB of RAM, but wonder if I shall install at least 16 GB
more.

And if this is normally behavior, it seems to me that the recommendation in
relation to RAM should be 32 GB of RAM instead of only 16 GB, although the
used amount of RAM for some VM's varies according to the amount of RAM at
disposal.


Does your Qubes OS 4.0.3 use about the same amount of RAM as mine, and do
you also sometimes experience that your Firefox browser stall ?


Hi,

VMs will generally use as much RAM as they're allowed to, even though 
they really don't need all that RAM. So i lower the max memory of my VMs 
to something a bit more reasonable.


For sys VMs if max memory is above 512 MB i set it to 512. Sys-firewall 
and sys-whonix and other sys VMs really don't need more than that. (IIRC 
sys-net and sys-usb are set lower than that by default.)


Templates i also set low because all you're doing in templates is updating.

For app VMs it depends on what i'll be doing in it. An app VM used for 
web browsing i'll usually set to 2048 MB, others are usually 1024 or 512 
depending on what they'll be used for, and you can always set it higher 
as needed.


And there's a way to change the memory allocated to dom0 too, i don't 
remember how but it's been posted about on the list before.


(Oh and as far as i know it's totally not necessary to set max mem to 
power of 2 values like i do, that's just the way i like to do it lol)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5bb03ed4-e933-eb51-e66d-317175d68f75%40danwin1210.me.


Re: [qubes-users] "How can I properly manage my system?" or "how do I use Admin API, salt and git or other versioning/distribution mechanisms together"

2020-03-15 Thread emma . borhanian
qubesctl fails with "No module named salt.client" unless I:

pip install salt

But pip doesn't sign code. How do I securely install the python pip module 
in a VM which is going to be performing administrative tasks?


On Sunday, April 22, 2018 at 12:36:06 AM UTC-7, viq wrote:
>
> On 18-04-22 03:12:00, Marek Marczykowski-Górecki wrote: 
> > On Fri, Apr 20, 2018 at 11:40:36PM +0200, viq wrote: 
> > > On 18-04-20 23:21:10, Marek Marczykowski-Górecki wrote: 
> > > > On Fri, Apr 20, 2018 at 10:51:38PM +0200, viq wrote: 
> > > > > On 18-04-20 13:51:50, Marek Marczykowski-Górecki wrote: 
> > > > 
> > > > > Hm, salt has SPM[6], which I need to read a bit more about. On one 
> > > > > hand, it's a native salt tool, so possibly it could work better 
> for 
> > > > > distributing, and more importantly updating states/formulas, but 
> on the 
> > > > > other hand, as far as I'm aware, it doesn't currently have concept 
> of 
> > > > > signing. 
> > > > 
> > > > This is exactly the reason we use RPM for distribution-provided 
> > > > formulas. 
> > > > I've tried to play with SPM + some wrapper to actually download 
> files 
> > > > (dom0 has no network), but AFAIR it was a bit crazy to do it this 
> way - 
> > > > the only part of SPM that left could be shortened to "tar x"... 
> > > 
> > > Ah, so you looked at it more than I did. Would it make sense to have 
> > > pretty much just SPM file inside the RPM, and post-install talk with 
> SPM 
> > > to install that, or does it really bring nothing to the table? 
> > 
> > > On the other hand, RPMs don't play nice with local modifications... 
> > 
> > Does SPM do? 
>
> Oh, good point, I'll need to play with it some and check. 
>   
> > > > BTW each of our formula packages have FORMULA file, so it should be 
> > > > compatible with SPM out of the box, at least in theory. 
> > > > 
> > > > > > See linked post[1] what changes are required. Normally I'd say, 
> lets 
> > > > > > package it in rpm, but since qrexec policy doesn't support .d 
> > > > > > directories, it may not work that well. In many places we use 
> salt's 
> > > > > > file.prepend to adjust policy files, so maybe use it here too? 
> This 
> > > > > > start being quite complex: 
> > > > > > 1. Salt formula installed (via rpm?) in dom0, to configure 
> management VM 
> > > > > > 2. Management VM running rest of salt formulas to configure 
> other VMs 
> > > > > 
> > > > > Yeah, this kinda follows what I was thinking. With some work (1) 
> could 
> > > > > be available from Qubes repos ;) I guess with defaults allowing to 
> set 
> > > > > up mgmt-global, mgmt-personal and mgmt-work, with permissions set 
> up as 
> > > > > the names imply? 
> > > > > 
> > > > > But, being salt-head that I am, what about templating the settings 
> from 
> > > > > pillars? 
> > > > 
> > > > I think it is a good idea, but needs some better handling of 
> pillars. We 
> > > > already have topd[13] module to maintain top.sls. If we could have 
> > > > something allowing the user to simply set pillar entry X to value Y 
> > > > (without learning yaml syntax), that would be great. Pillar modules 
> you 
> > > > link below may be the way to go. 
> > > 
> > > Hm, where are things like labels and other VM settings stored? 
> > 
> > All VM properties are stored in qubes.xml. We do expose some of them as 
> > pillars already (for example qubes:type), but I don't think it's a good 
> > place for something not directly related to VMs. 
> > 
> > I'm thinking of pillars like the name of mgmt-global VM. This isn't 
> > something that belongs to some particular VM (in qubes.xml), especially 
> > when said mgmt-global VM doesn't exist yet. 
>
> Well, "by extension" everything global belongs to dom0, doesn't it? And 
> for defining ACLs, it doesn't necessarily need to exist yet - though 
> you're potentially opening yourself up to something else taking it's 
> place, but I don't think you're going to accidentaly create a 
> "mgmt-global" VM. 
>
> > I was hoping that some of existing pillar modules would support 
> > something with user friendly key-value interface, including: 
> >  - listing available keys (maybe even with some description?) 
> >  - getting and setting values 
> >  - a GUI, or interface to integrate with some 
> > 
> > While a script that would handle yaml file wouldn't be horribly long, 
> > I'd guess someone have done that already. 
>
> Looking through [10], there's a couple options that draw my eye: 
>  - not quite the intended use case, but there's consul with it's web UI 
>[14] (similar should be available for etcd) 
>  - "run this command to get JSON/YAML", which allows to store data in 
>arbitrary format, with a custom frontend, and just respond with 
>structured data that salt can understand 
>  - various database options, and while I understand that running most of 
>them would not be desirable, that includes also sqlite[16], for which 
>there are some graphical browsers like [15] 
>
> Your comment 

Re: [qubes-users] Forgot to RTFM and now getting errors in whonix during update? (and deb template "qubes-core-agent-passwordless-root" error)

2020-03-15 Thread donovang
I have a similar issue with whonix 15 templates now as well but have done 
nothing to the templates. 

- On Mar 15, 2020, at 12:28 PM, Stumpy stu...@posteo.net wrote:

> On 2020-03-13 18:11, Stumpy wrote:
>> On 2020-03-13 18:05, Stumpy wrote:
>>> I had tried to install bisq on my whonix ws template and for "some
>>> reason" (which i later found out when i did read the whonix docs) it
>>> wasnt working. I now have the issue that when i try to update i get
>>> the following:
>>>
>>> user@host:~$ sudo apt update && sudo apt upgrade
>>> Hit:1 https://packages.riot.im/debian buster InRelease
>>>
>>> Hit:2 tor+https://deb.debian.org/debian-security buster/updates InRelease
>>> Hit:3 https://deb.qubes-os.org/r4.0/vm buster InRelease
>>> Hit:4 https://updates.signal.org/desktop/apt xenial InRelease
>>> Hit:5 tor+https://deb.whonix.org buster InRelease
>>> Hit:6 tor+https://deb.debian.org/debian buster InRelease
>>> Reading package lists... Done
>>> Building dependency tree
>>> Reading state information... Done
>>> All packages are up to date.
>>> Reading package lists... Done
>>> Building dependency tree
>>> Reading state information... Done
>>> Calculating upgrade... Done
>>> 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
>>> 1 not fully installed or removed.
>>> After this operation, 0 B of additional disk space will be used.
>>> Do you want to continue? [Y/n] y
>>> Setting up bisq (1.2.7) ...
>>> Adding shortcut to the menu
>>> xdg-desktop-menu: No writable system menu directory found.
>>> dpkg: error processing package bisq (--configure):
>>>   installed bisq package post-installation script subprocess returned
>>> error exit status 3
>>> Errors were encountered while processing:
>>>   bisq
>>> E: Sub-process /usr/bin/dpkg returned an error code (1)
>>>
>>>
>>> Its not clear to me how i can clean up things and resolve this error?
>>>
>> 
>> 
>> Oh, and a similar but separate issue is on my debian template, i cant
>> figure if i messed something up or not but when i try to install things
>> i am getting an qubes-core-agent-passwordless-root error:
>> 
>> user@debian-10:~/QubesIncoming/disp6616$ sudo apt update && sudo apt
>> upgrade && sudo apt install lutris
>> Get:1
>> http://download.opensuse.org/repositories/home:/strycore/Debian_9.0 ./
>> InRelease [1,504 B]
>> Hit:2 https://deb.qubes-os.org/r4.0/vm buster InRelease
>> Hit:3 https://deb.debian.org/debian buster InRelease
>> Get:4
>> http://download.opensuse.org/repositories/home:/strycore/Debian_9.0 ./
>> Packages [823 B]
>> Hit:5 https://deb.debian.org/debian-security buster/updates InRelease
>> Fetched 2,327 B in 3s (873 B/s)
>> Reading package lists... Done
>> Building dependency tree
>> Reading state information... Done
>> All packages are up to date.
>> Reading package lists... Done
>> Building dependency tree
>> Reading state information... Done
>> Calculating upgrade... Done
>> 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
>> 1 not fully installed or removed.
>> Need to get 30.3 kB of archives.
>> After this operation, 0 B of additional disk space will be used.
>> Do you want to continue? [Y/n] y
>> Get:1 https://deb.qubes-os.org/r4.0/vm buster/main amd64
>> qubes-core-agent-passwordless-root amd64 4.0.51-1+deb10u1 [30.3 kB]
>> Fetched 30.3 kB in 2s (15.8 kB/s)
>> Reading package lists... Done
>> Building dependency tree
>> Reading state information... Done
>> The following additional packages will be installed:
>>    cabextract curl fluid-soundfont-gm fluid-soundfont-gs
>> gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1 libc6-i386
>> libcurl4 libmspack0 mesa-utils p7zip python3-evdev
>>    python3-yaml
>> Suggested packages:
>>    fluidsynth timidity p7zip-full python-evdev-doc
>> The following packages will be REMOVED:
>>    qubes-core-agent-passwordless-root
>> The following NEW packages will be installed:
>>    cabextract curl fluid-soundfont-gm fluid-soundfont-gs
>> gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1 libc6-i386
>> libcurl4 libmspack0 lutris mesa-utils p7zip python3-evdev
>>    python3-yaml
>> 0 upgraded, 15 newly installed, 1 to remove and 0 not upgraded.
>> 1 not fully installed or removed.
>> Need to get 128 MB of archives.
>> After this operation, 174 MB of additional disk space will be used.
>> Do you want to continue? [Y/n] y
>> Get:1
>> http://download.opensuse.org/repositories/home:/strycore/Debian_9.0 ./
>> lutris 0.5.4 [1,778 kB]
>> Get:2 https://deb.debian.org/debian buster/main amd64 libmspack0 amd64
>> 0.10.1-1 [49.9 kB]
>> Get:3 https://deb.debian.org/debian buster/main amd64 cabextract amd64
>> 1.9-1 [35.0 kB]
>> Get:4 https://deb.debian.org/debian-security buster/updates/main amd64
>> libcurl4 amd64 7.64.0-4+deb10u1 [331 kB]
>> Get:5 https://deb.debian.org/debian-security buster/updates/main amd64
>> curl amd64 7.64.0-4+deb10u1 [264 kB]
>> Get:6 https://deb.debian.org/debian buster/main amd64 fluid-soundfont-gm
>> all 3.1-5.1 [120 MB]
>> Get:7 

Re: [qubes-users] Forgot to RTFM and now getting errors in whonix during update? (and deb template "qubes-core-agent-passwordless-root" error)

2020-03-15 Thread Stumpy

On 2020-03-13 18:11, Stumpy wrote:

On 2020-03-13 18:05, Stumpy wrote:
I had tried to install bisq on my whonix ws template and for "some 
reason" (which i later found out when i did read the whonix docs) it 
wasnt working. I now have the issue that when i try to update i get 
the following:


user@host:~$ sudo apt update && sudo apt upgrade
Hit:1 https://packages.riot.im/debian buster InRelease

Hit:2 tor+https://deb.debian.org/debian-security buster/updates InRelease
Hit:3 https://deb.qubes-os.org/r4.0/vm buster InRelease
Hit:4 https://updates.signal.org/desktop/apt xenial InRelease
Hit:5 tor+https://deb.whonix.org buster InRelease
Hit:6 tor+https://deb.debian.org/debian buster InRelease
Reading package lists... Done
Building dependency tree
Reading state information... Done
All packages are up to date.
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
1 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Do you want to continue? [Y/n] y
Setting up bisq (1.2.7) ...
Adding shortcut to the menu
xdg-desktop-menu: No writable system menu directory found.
dpkg: error processing package bisq (--configure):
  installed bisq package post-installation script subprocess returned 
error exit status 3

Errors were encountered while processing:
  bisq
E: Sub-process /usr/bin/dpkg returned an error code (1)


Its not clear to me how i can clean up things and resolve this error?




Oh, and a similar but separate issue is on my debian template, i cant 
figure if i messed something up or not but when i try to install things 
i am getting an qubes-core-agent-passwordless-root error:


user@debian-10:~/QubesIncoming/disp6616$ sudo apt update && sudo apt 
upgrade && sudo apt install lutris
Get:1 
http://download.opensuse.org/repositories/home:/strycore/Debian_9.0 ./ 
InRelease [1,504 B]

Hit:2 https://deb.qubes-os.org/r4.0/vm buster InRelease
Hit:3 https://deb.debian.org/debian buster InRelease
Get:4 
http://download.opensuse.org/repositories/home:/strycore/Debian_9.0 ./ 
Packages [823 B]

Hit:5 https://deb.debian.org/debian-security buster/updates InRelease
Fetched 2,327 B in 3s (873 B/s)
Reading package lists... Done
Building dependency tree
Reading state information... Done
All packages are up to date.
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
1 not fully installed or removed.
Need to get 30.3 kB of archives.
After this operation, 0 B of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 https://deb.qubes-os.org/r4.0/vm buster/main amd64 
qubes-core-agent-passwordless-root amd64 4.0.51-1+deb10u1 [30.3 kB]

Fetched 30.3 kB in 2s (15.8 kB/s)
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs 
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1 libc6-i386 
libcurl4 libmspack0 mesa-utils p7zip python3-evdev

   python3-yaml
Suggested packages:
   fluidsynth timidity p7zip-full python-evdev-doc
The following packages will be REMOVED:
   qubes-core-agent-passwordless-root
The following NEW packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs 
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1 libc6-i386 
libcurl4 libmspack0 lutris mesa-utils p7zip python3-evdev

   python3-yaml
0 upgraded, 15 newly installed, 1 to remove and 0 not upgraded.
1 not fully installed or removed.
Need to get 128 MB of archives.
After this operation, 174 MB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 
http://download.opensuse.org/repositories/home:/strycore/Debian_9.0 ./ 
lutris 0.5.4 [1,778 kB]
Get:2 https://deb.debian.org/debian buster/main amd64 libmspack0 amd64 
0.10.1-1 [49.9 kB]
Get:3 https://deb.debian.org/debian buster/main amd64 cabextract amd64 
1.9-1 [35.0 kB]
Get:4 https://deb.debian.org/debian-security buster/updates/main amd64 
libcurl4 amd64 7.64.0-4+deb10u1 [331 kB]
Get:5 https://deb.debian.org/debian-security buster/updates/main amd64 
curl amd64 7.64.0-4+deb10u1 [264 kB]
Get:6 https://deb.debian.org/debian buster/main amd64 fluid-soundfont-gm 
all 3.1-5.1 [120 MB]
Get:7 https://deb.debian.org/debian buster/main amd64 fluid-soundfont-gs 
all 3.1-5.1 [2,474 kB]
Get:8 https://deb.debian.org/debian buster/main amd64 
gir1.2-gdesktopenums-3.0 amd64 3.28.1-1 [8,700 B]
Get:9 https://deb.debian.org/debian buster/main amd64 
gir1.2-gnomedesktop-3.0 amd64 3.30.2.1-2 [29.7 kB]
Get:10 https://deb.debian.org/debian buster/main amd64 libc6-i386 amd64 
2.28-10 [2,872 kB]
Get:11 https://deb.debian.org/debian buster/main amd64 lib32gcc1 amd64 
1:8.3.0-6 [47.9 kB]
Get:12 

[qubes-users] Re: Fedora-31 template

2020-03-15 Thread Lorenzo Lamas
A Fedora 31 template is now available in the testing repo for Qubes 4.0.

On Friday, November 15, 2019 at 9:23:54 PM UTC+1, Dominique St-Pierre 
Boucher wrote:
>
> Hello Qubes users,
>
> Do any of you tried and succeed upgrading a Fedora template to version 31?
>
> If so, how?
>
> Thanks
>
> Dominique
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c693378f-02ff-4c12-9e4a-d62f0a71a8d8%40googlegroups.com.


[qubes-users] How to in Qubes 4.0.3 create a Debian 10 HVM with a GUI desktop that is able to connect to the internet ?

2020-03-15 Thread 'M' via qubes-users
How to in Qubes 4.0.3 create a Debian 10 HVM with a GUI desktop that is 
able to connect to the internet ?

In case you would like to know, the primary purpose of this is: To install 
the newest version of a music player app like Musique, Rhytmbox, 
Gmusicbrowser, QMMP or Sayonara player (I haven't decided yet which one I 
would like to use) so that the PC also can be used to handle large 
multimedia library's on external storage drives in a quite secure way with 
the digital sound-signal being transferred thru an USB-cable to an external 
DAC.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d516090-4733-4b4b-a8bc-4973185ec7d6%40googlegroups.com.


Re: [qubes-users] How to setup Win10 HVM ?

2020-03-15 Thread 'M' via qubes-users

How to setup a Win 10 HVM according to this page: 
https://github.com/elliotkillick/qvm-create-windows-qube 
?



See below for my detailed description on how to use this method:

1)  Open your Firefox browser in a VM - for example in the untrusted VM.

2)  To save the install.sh script file:  Open this page: 
https://raw.githubusercontent.com/elliotkillick/qvm-create-windows-qube/master/install.sh
 
and save it as install.sh 

3)  To copy the file to dom0: Open the dom0 terminal and execute this 
command:  qvm-run -p --filter-escape-chars --no-color-output untrusted "cat 
'/home/user/Downloads/install.sh'" > install.sh

4)  To check that the file is copied to dom0: Execute this command in the 
dom0 terminal: ls

5)  To get Qubes OS to execute the script in the "install.sh" file: Execute 
this command in the dom0 terminal: chmod +x install.sh && ./install.sh

6)  Download the version of Windows 10 you want to use to the 
"windows-mgmt" VM.
 You can execute the script in the file "download-windows.sh , but it 
might not work - I couldn't make it work. In that case, do the following: 

 6a)  Open the “Qube Settings” for the domain “windows-mgmt”. Under 
“Network”, choose the “default” one and click on “Apply”. 

 6b)  Open the domains Firefox browser and search the web for “how to 
download windows 10”. 
One of the first results is a link to a Microsoft webpage from 
which it is possible to download the file in the local language. 
The file gets downloaded to the download folder in the domain. 

 6c)  Open the “Qube Settings” for the domain “windows-mgmt”. Under 
“Network”, choose “(none)” and click on “Apply”. 

 6d)  Move or copy the downloaded Win10 ISO-file to this destination: 
/Documents/qvm-create-windows-qube/windows-media/isos 

 6e)  Open the terminal in dom0 and execute the following script 
(remember to write the name of the ISO-file you downloaded in step 6b 
instead of “filename”): ./qvm-create-windows-qube.sh -n sys-whonix -oyw -i 
filename.iso -a win10x64-pro.xml Win10 
Info: "Win10" will be the name of the domain.
Do not close the terminal before it says the installation was 
complete (successfully) !  Let the terminal do the job, it restarts the 
qube and so on when it is necessary. 

7)  When you get into Windows there might appear three message boxes. One 
saying that the pc has to be restarted. A second one saying that drive D 
has to be formatted. And the third one saying something about a private 
drive. Just click on "OK". Then Windows will close immediately and restart. 
Afterwards the terminal should write that the installation was completed 
successfully.
 When Windows start up again you probably do not have a functioning 
internet connection.

8)  To get on the internet: Shut down the Win10 HVM and start it again.

Now your Win10 HVM should act almost as a normal Win 10 installation.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8a2b60b-493f-4e18-b799-8d5536e38b6e%40googlegroups.com.


[qubes-users] Re: How to install qubes tools on Windows 10?

2020-03-15 Thread 'M' via qubes-users
søndag den 15. marts 2020 kl. 07.04.34 UTC+1 skrev Guerlan:
>
> I bootem my machine with the .iso and started the .exe, but I get
>
> "another version of this product is already installed"
>
> somethig like that.
>
> How to install on Windows 10?
>
 


See here: https://github.com/elliotkillick/qvm-create-windows-qube 



See below for a detailed description on how to use this method:

1)  Open your Firefox browser in a VM - for example in the untrusted VM.

2)  To save the install.sh script file:  Open this page: 
https://raw.githubusercontent.com/elliotkillick/qvm-create-windows-qube/master/install.sh
 
and save it as install.sh 

3)  To copy the file to dom0: Open the dom0 terminal and execute this 
command:  qvm-run -p --filter-escape-chars --no-color-output untrusted "cat 
'/home/user/Downloads/install.sh'" > install.sh

4)  To check that the file is copied to dom0: Execute this command in the 
dom0 terminal: ls

5)  To get Qubes OS to execute the script in the "install.sh" file: Execute 
this command in the dom0 terminal: chmod +x install.sh && ./install.sh

6)  Download the version of Windows 10 you want to use to the 
"windows-mgmt" VM.
 You can execute the script in the file "download-windows.sh , but it 
might not work - I couldn't make it work. In that case, do the following: 

 6a)  Open the “Qube Settings” for the domain “windows-mgmt”. Under 
“Network”, choose the “default” one and click on “Apply”. 

 6b)  Open the domains Firefox browser and search the web for “how to 
download windows 10”. 
One of the first results is a link to a Microsoft webpage from 
which it is possible to download the file in the local language. 
The file gets downloaded to the download folder in the domain. 

 6c)  Open the “Qube Settings” for the domain “windows-mgmt”. Under 
“Network”, choose “(none)” and click on “Apply”. 

 6d)  Move or copy the downloaded Win10 ISO-file to this destination: 
/Documents/qvm-create-windows-qube/windows-media/isos 

 6e)  Open the terminal in dom0 and execute the following script 
(remember to write the name of the ISO-file you downloaded in step 6b 
instead of “filename”): ./qvm-create-windows-qube.sh -n sys-whonix -oyw -i 
filename.iso -a win10x64-pro.xml Win10 
Info: "Win10" will be the name of the domain.
Do not close the terminal before it says the installation was 
complete (successfully) !  Let the terminal do the job, it restarts the 
qube and so on when it is necessary. 

7)  When you get into Windows there might appear three message boxes. One 
saying that the pc has to be restarted. A second one saying that drive D 
has to be formatted. And the third one saying something about a private 
drive. Just click on "OK". Then Windows will close immediately and restart. 
Afterwards the terminal should write that the installation was completed 
successfully.
 When Windows start up again you probably do not have a functioning 
internet connection.

8)  To get on the internet: Shut down the Win10 HVM and start it again.

Now your Win10 HVM should act almost as a normal Win 10 installation.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2815f64b-16e6-4f32-9717-b191c704f38b%40googlegroups.com.


[qubes-users] Re: How much RAM does the dom0, sys-firewall and sys-whonix "normally" use ?

2020-03-15 Thread 'M' via qubes-users
By "stall" or "stalling" I mean freeze.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d2da5b1-8242-4d43-b08b-cd45e76a0de4%40googlegroups.com.


[qubes-users] How much RAM does the dom0, sys-firewall and sys-whonix "normally" use ?

2020-03-15 Thread 'M' via qubes-users
How much RAM does the dom0, sys-firewall and sys-whonix "normally" use ?

I ask because these VM's seems to use quite a lot of RAM on my PC (of cause 
a little more or less depending on the activity level):

dom0: About 4000 MB
sys-firewall: About 3000 MB
sys-whonix: About 4000 MB

That means just those three VM's use about 11000 MB of ram.

sys-net: About 400 MB
sys-usb: About 300 MB

Sum: About 700 MB

Sum so far: About 12000 MB

This is when I only have one other Fedora VM open which use about 4000 MB 
of RAM (and that is when I only use Firefox).  

That means about 16000 MB of RAM used.


If I open the file manager in another Fedora VM it uses about 2000 MB and 
if I instead open the Firefox browser in this VM it uses about 3000 MB of 
RAM.

In the last scenario the RAM use for all open VM's is as follow:

dom0: About 4000 MB
sys-firewall: About 1600 MB
sys-whonix: About 2200 MB
sys-net: About 400 MB
sys-usb: About 300 MB
Fedora VM: About 4000 MB
Fedora VM: About 3000 MB

SUM: About 15500 MB of RAM

Sometimes I experience my untrusted Fedora VM stall. I assume it's because 
of to little amount of RAM at disposal. But I'm not sure.

In this PC I got 16 GB of RAM, but wonder if I shall install at least 16 GB 
more.

And if this is normally behavior, it seems to me that the recommendation in 
relation to RAM should be 32 GB of RAM instead of only 16 GB, although the 
used amount of RAM for some VM's varies according to the amount of RAM at 
disposal.


Does your Qubes OS 4.0.3 use about the same amount of RAM as mine, and do 
you also sometimes experience that your Firefox browser stall ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd99d126-abf9-4fc2-b158-bdbd5be38946%40googlegroups.com.


Re: [qubes-users] How to get on the internet from within a Debian 10.3 HVM, when Debian says that it is connected to the network, but can't get on the internet by using Firefox from within the Debian

2020-03-15 Thread 'M' via qubes-users
"instilling" = installing

Sorry.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9963bc05-37f8-474e-a649-f0dd0c60b4b8%40googlegroups.com.


Re: [qubes-users] How to get on the internet from within a Debian 10.3 HVM, when Debian says that it is connected to the network, but can't get on the internet by using Firefox from within the Debian

2020-03-15 Thread 'M' via qubes-users
søndag den 15. marts 2020 kl. 07.34.40 UTC+1 skrev Frank Schäckermann:
>
>
>
> On 14. Mar 2020, at 21:06, 'M' via qubes-users 
> qubes-users-at-googlegroups.com |qubes-mailing-list/Example Allow| <
> 8cpxf...@sneakemail.com > wrote:
>
> 
> How to get on the internet from within a Debian 10.3 HVM, when Debian says 
> that it is connected to the network, but can't get on the internet by using 
> Firefox from within the Debian HVM ?
>
> I have created the Debian HVM by first downloading the DVD 1 file from 
> here: https://cdimage.debian.org/debian-cd/current/amd64/iso-dvd/ to a 
> VM. Then create a new HVM by using the GUI and boot the ISO-file from 
> another VM.
>
>
> Is there a specific reason why you didn’t use the Debian template Qubes 
> provides already? You can create a HVM from the Debian template and be all 
> set...
>
> And the installation run successful (without internet connection) 
> according to the installer. After the installation I logged in to Debian 
> 10.3, and then set up the network by writing the correct IP, netmask and 
> gateway address according to the same HVM's "Qube Settings". And I have 
> pressed "On" in the menu bar so that Debian says that it is connected to 
> the cable network. But I still can't get on the internet. For example if I 
> open Firefox, and write "test" in the html field, Firefox tell me that it 
> can't connect to the server. And it is from the same pc I'm making this 
> thread, so Qubes OS is connected to the internet.
>
> I should probably also mention that I haven't installed any Qubes-tools 
> yet. In case I should try that, please write which packages I shall install 
> and where I can find them.
>
> So I would like some suggestions on what I shall do to get on the internet 
> by using Firefox from within the Debian HVM ?
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes...@googlegroups.com .
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/0e86d932-cfb1-4bbf-823b-4646aafd6d9c%40googlegroups.com
>  
> 
> .
>
>  

I installed Debian 10.3 in this way, because I would like to get a GUI of 
the Debian OS with it's desktop, menus, etc. so that I could install 
programs in Debian by using a GUI and also easier use its programs.

I read about instilling Debian as a OS in Qubes here: 
https://www.qubes-os.org/doc/templates/debian/ . But got the impression 
that it was without a Debian desktop, menus, etc. as it isn't mentioned on 
the page. But I may have got a wrong impression.

I have also looked here: https://www.qubes-os.org/doc/standalone-and-hvm/ . 
But I didn't find anything about this either.

Therefore I tried to install Debian 10.3 in a HVM the same way other Linux 
OS' would have to be installed in Qubes OS.

If I can install Debian 10.3 as a minimal OS with a desktop, menus, etc. 
and get it on the internet from within the Debian HVM by installing Debian 
OS in another way, I would certainly try it. Can I do that just by 
following the guide on this page: 
https://www.qubes-os.org/doc/templates/debian/ or shall I also do some 
other things and if so what ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e270cf2-642e-430e-8824-7052c65bb7e3%40googlegroups.com.


Re: [qubes-users] How to get on the internet from within a Debian 10.3 HVM, when Debian says that it is connected to the network, but can't get on the internet by using Firefox from within the Debian

2020-03-15 Thread Frank


> On 14. Mar 2020, at 21:06, 'M' via qubes-users 
> qubes-users-at-googlegroups.com |qubes-mailing-list/Example Allow| 
> <8cpxfwm...@sneakemail.com> wrote:
> 
> 
> How to get on the internet from within a Debian 10.3 HVM, when Debian says 
> that it is connected to the network, but can't get on the internet by using 
> Firefox from within the Debian HVM ?
> 
> I have created the Debian HVM by first downloading the DVD 1 file from here: 
> https://cdimage.debian.org/debian-cd/current/amd64/iso-dvd/ to a VM. Then 
> create a new HVM by using the GUI and boot the ISO-file from another VM.

Is there a specific reason why you didn’t use the Debian template Qubes 
provides already? You can create a HVM from the Debian template and be all 
set...

> And the installation run successful (without internet connection) according 
> to the installer. After the installation I logged in to Debian 10.3, and then 
> set up the network by writing the correct IP, netmask and gateway address 
> according to the same HVM's "Qube Settings". And I have pressed "On" in the 
> menu bar so that Debian says that it is connected to the cable network. But I 
> still can't get on the internet. For example if I open Firefox, and write 
> "test" in the html field, Firefox tell me that it can't connect to the 
> server. And it is from the same pc I'm making this thread, so Qubes OS is 
> connected to the internet.
> 
> I should probably also mention that I haven't installed any Qubes-tools yet. 
> In case I should try that, please write which packages I shall install and 
> where I can find them.
> 
> So I would like some suggestions on what I shall do to get on the internet by 
> using Firefox from within the Debian HVM ?
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/0e86d932-cfb1-4bbf-823b-4646aafd6d9c%40googlegroups.com.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/12369-1584254076-145570%40sneakemail.com.


[qubes-users] How to install qubes tools on Windows 10?

2020-03-15 Thread Guerlan
I bootem my machine with the .iso and started the .exe, but I get

"another version of this product is already installed"

somethig like that.

How to install on Windows 10?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5624b0f-03d3-40ab-ab42-e50f26577d7a%40googlegroups.com.