Re: [qubes-users] Errors were encountered while processing:, qubes-core-agent-passwordless-root? (now cant install things?)

2020-03-18 Thread unman
On Wed, Mar 18, 2020 at 04:33:09PM -0400, Stumpy wrote:
> > I do not want to remove qubes-corepasswordless-root, i am guessing that
> > is the known issue that was reffered to but the solution is less than
> > clear to me as reinstalling then updateing/upgrading the template did
> > not work.
> > 
> > apologies
> > 
> 
> Thought about trying
> 
> sudo apt update && sudo apt dist-upgrade
> 
> seemed to work without a hitch, but then tried to install an app again and
> got the same thing.
> 

I cant explain how you have ended up in this position - did you
mistakenly mark it to be removed?
If you don't want to remove the package, run aptitude,select the
qubes-core-agent-passwordless-root package and mark it with + to show it
should be installed.
Then hit g to process.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200319015426.GA26815%40thirdeyesecurity.org.


Re: [qubes-users] Re: How to setup a multimedia VM in Qubes OS 4.0.3 and read files from within its applications ?

2020-03-18 Thread Mike Keehan

On 3/18/20 8:56 PM, 'M' via qubes-users wrote:

onsdag den 18. marts 2020 kl. 21.24.35 UTC+1 skrev M:

onsdag den 18. marts 2020 kl. 19.04.29 UTC+1 skrev M:

onsdag den 18. marts 2020 kl. 18.55.17 UTC+1 skrev M:

onsdag den 18. marts 2020 kl. 18.30.47 UTC+1 skrev M:

*How to setup a multimedia VM in Qubes OS 4.0.3 ?*

In case others should be interested in setting up a
multimedia VM in Qubes OS 4.0.3, here is how I have done:

1)  Create a clone of the Debian Template, by either:

     -  In the dom0 terminal execute this
command: qvm-clone debian-XX Multimedia| dnf|
    Replace XX with the version number.

   Or in:

             -  Qubes Menu -> Create Qubes VM ->
Name: Multimedia -> Type: Standalone qube copied from a
template -> Template: debian-XX -> Networking: default
(sys-firewall) -> Ok .
|
|
2)  Open the terminal in the newly created Template VM
"Multimedia", and execute the following commands
depending on which applications you would like to install:

   -  gmusicbrowser: ||sudo apt-get install
gmusicbrowser
||

   -  Musique: ||sudo apt-get install musique||

   -  QMNP: ||sudo apt-get install qmnp
||

   -  Rhythmbox: ||sudo apt-get install rhythmbox||

   -  VLC player: ||sudo apt-get install vlc||


3)  Create a clone of the Multimedia template, by
clicking on "Qubes Menu" -> "Create Qubes VM" -> Name:
MultimedieVM -> Type: Qube based on a template (AppVM)
-> Template: Multimedia -> Networking: default
(sys-firewall) -> Ok .

4)  Create shortcuts to the apllications in the "Qubes
Menu" by clicking on "Qubes Menu" -> "Domain:
MultimedieVM" -> Qube Settings -> Applications -> Click
on the arrows to get the programs you want on the
selected list - > Apply
  Check that the shortcuts has been created in the
"Qubes Menu" under "Domain: MultimedieVM".


*How to read a CD, DVD, etc. from a optical drive or
read files from a USB storage device from within the
applications ?
*

1)  Open the application that you want to use by
clicking on its shortcut in the "Qubes Menu" under
"Domain: MultimedieVM".

2)  Insert the CD or DVD.

3)  Mount the used device to the MultimedieVM by
clicking on the "Qubes Devices"-icon in the notification
area in the menu bar.
  Info: If you use a OPTICAL USB-drive, choose
sys-usb:... --> MultimedieVM .

4)  Find the disc in the application.
  Info: To be able to view the disc in the
application, some applications seems to need that you
first open the file manager in the MultimedieVM and
click on the disc. Then the disc appears in the
application. Then click on the disc in the application.
Now you should be able to play the disk or copy its tracks.


Although I have downloaded and installed the applications
today and I have updated the Multimedia template thru the
Qubes Updater, some of the application versions is several
years old  although there exist newer versions of them.

Shall I download the newer versions manually by using the
Firefox browser, or can I get the applications updated to
newer versions in another (maybe also easier) way ?



The answer is here:

https://unix.stackexchange.com/questions/116765/how-to-update-application-on-debian




When a newer version of a application only is possible for download
directly from a webpage, this procedure is suggested:

1)  Install the required packages.
2)  Download the wanted application-package.
3)  Unpack them
4)  Compile.

Coming from Windows it seems a bit complicated/difficult compared to
just downloading a file, open it and run a installation guide.

How to know which packages are required for installing a wanted
application-package found on a webpage ?

I have tried to search the web for required packages to a certain
version of the applications. But I haven't have any luck finding a

Re: [qubes-users] Set Battery thresholds x230

2020-03-18 Thread Franz
On Wed, Mar 18, 2020 at 1:08 PM  wrote:

> On Wed, Mar 18, 2020 at 11:56:31AM -0300, Franz wrote:
> > When a laptop is always connected to power, e very good behavior to
> > strongly prolong battery life is to avoid charging it to 100% and
> limiting
> > it to lower threshold, perhaps 80%.
>
> i am using a (perl) script for doing this on my qubes chromebooks.
> trivial if you have ways to a) get the current battery level and
> b) control the charger (charge/idle/discharge).
>
>
> > The Fedora command is the following:
> > dnf install kernel-devel akmod-acpi_call
>
> mixing random custom kernel modules with a qubes kernel is unlikely
> to work. at all. even if you figure out how to install the pkgs.
>
> Thanks for replying, now I understand it is too difficult for me. I have
another x230 with arch and it worked immediately, so supposed Qubes only
required some trick, but now understand it is far beyond my capabilities.

Many thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCrVa023TC3W7s5bZckGOQHvm8prs%3DB%3DZ02%3DpfSt5FqHQ%40mail.gmail.com.


[qubes-users] Re: How to setup a multimedia VM in Qubes OS 4.0.3 and read files from within its applications ?

2020-03-18 Thread 'M' via qubes-users
onsdag den 18. marts 2020 kl. 21.24.35 UTC+1 skrev M:
>
> onsdag den 18. marts 2020 kl. 19.04.29 UTC+1 skrev M:
>>
>> onsdag den 18. marts 2020 kl. 18.55.17 UTC+1 skrev M:
>>>
>>> onsdag den 18. marts 2020 kl. 18.30.47 UTC+1 skrev M:

 *How to setup a multimedia VM in Qubes OS 4.0.3 ?*

 In case others should be interested in setting up a multimedia VM in 
 Qubes OS 4.0.3, here is how I have done:

 1)  Create a clone of the Debian Template, by either:

 -  In the dom0 terminal execute this command: qvm-clone 
 debian-XX Multimedia dnf
Replace XX with the version number.

   Or in:

 -  Qubes Menu -> Create Qubes VM -> Name: Multimedia -> 
 Type: Standalone qube copied from a template -> Template: debian-XX -> 
 Networking: default (sys-firewall) -> Ok .

 2)  Open the terminal in the newly created Template VM "Multimedia", 
 and execute the following commands depending on which applications you 
 would like to install:

   -  gmusicbrowser:  sudo apt-get install gmusicbrowser

   -  Musique:  sudo apt-get install musique

   -  QMNP:  sudo apt-get install qmnp

   -  Rhythmbox:  sudo apt-get install rhythmbox

   -  VLC player:  sudo apt-get install vlc


 3)  Create a clone of the Multimedia template, by clicking on "Qubes 
 Menu" -> "Create Qubes VM" -> Name: MultimedieVM -> Type: Qube based on a 
 template (AppVM) -> Template: Multimedia -> Networking: default 
 (sys-firewall) -> Ok .

 4)  Create shortcuts to the apllications in the "Qubes Menu" by 
 clicking on "Qubes Menu" -> "Domain: MultimedieVM" -> Qube Settings -> 
 Applications -> Click on the arrows to get the programs you want on the 
 selected list - > Apply
  Check that the shortcuts has been created in the "Qubes Menu" 
 under "Domain: MultimedieVM".



 *How to read a CD, DVD, etc. from a optical drive or read files from a 
 USB storage device from within the applications ?*

 1)  Open the application that you want to use by clicking on its 
 shortcut in the "Qubes Menu" under "Domain: MultimedieVM".

 2)  Insert the CD or DVD.

 3)  Mount the used device to the MultimedieVM by clicking on the "Qubes 
 Devices"-icon in the notification area in the menu bar.
  Info: If you use a OPTICAL USB-drive, choose sys-usb:... --> 
 MultimedieVM .

 4)  Find the disc in the application.
  Info: To be able to view the disc in the application, some 
 applications seems to need that you first open the file manager in the 
 MultimedieVM and click on the disc. Then the disc appears in the 
 application. Then click on the disc in the application. Now you should be 
 able to play the disk or copy its tracks.

  
>>>
>>> Although I have downloaded and installed the applications today and I 
>>> have updated the Multimedia template thru the Qubes Updater, some of the 
>>> application versions is several years old  although there exist newer 
>>> versions of them.
>>>
>>> Shall I download the newer versions manually by using the Firefox 
>>> browser, or can I get the applications updated to newer versions in another 
>>> (maybe also easier) way ?
>>>
>>
>>
>> The answer is here: 
>> https://unix.stackexchange.com/questions/116765/how-to-update-application-on-debian
>>
>
>  
> When a newer version of a application only is possible for download 
> directly from a webpage, this procedure is suggested:
>
> 1)  Install the required packages.
> 2)  Download the wanted application-package.
> 3)  Unpack them
> 4)  Compile.
>
> Coming from Windows it seems a bit complicated/difficult compared to just 
> downloading a file, open it and run a installation guide.
>
> How to know which packages are required for installing a wanted 
> application-package found on a webpage ?
>
> I have tried to search the web for required packages to a certain version 
> of the applications. But I haven't have any luck finding a webpage that 
> describes this.
>
> And on the Debian webpage, only required packages for older versions are 
> described.
>
 

Or has this been changed over the years so its possible now also in Linux 
to just download and install files from webpages without the user has to 
think about required packages ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f897a1db-fce7-4313-821d-6242c4b6334f%40googlegroups.com.


Re: [qubes-users] Errors were encountered while processing:, qubes-core-agent-passwordless-root? (now cant install things?)

2020-03-18 Thread Stumpy

On 2020-03-18 11:30, Stumpy wrote:

On 2020-03-17 11:38, unman wrote:

On Mon, Mar 16, 2020 at 04:16:57PM -0400, Stumpy wrote:
Hi, my previous post was perhaps inappropriate in that i mixed posts 
so i am

repostin gjust about this one issue.

I am now getting the following when i try to update or install 
anything (in

this case lutris)

user@gaming:~$ sudo apt-get install lutris
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 mesa-utils p7zip python3-evdev 
python3-yaml

Suggested packages:
   fluidsynth timidity p7zip-full python-evdev-doc
The following packages will be REMOVED:
   qubes-core-agent-passwordless-root
The following NEW packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 lutris mesa-utils p7zip python3-evdev
python3-yaml
0 upgraded, 15 newly installed, 1 to remove and 1 not upgraded.
1 not fully installed or removed.
Need to get 0 B/128 MB of archives.
After this operation, 174 MB of additional disk space will be used.
Do you want to continue? [Y/n] y
(Reading database ... 149744 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root
(--remove):
  installed qubes-core-agent-passwordless-root package post-removal 
script

subprocess returned error exit status 3
Errors were encountered while processing:
  qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


As a result it seems i cant update and i know i cant install things 
(and the

error itself looks, troubling?)

Thanks in advance


This is a known issue, fixed in updated templates.
The problem (and solution) is clearly stated -


Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'


If you *do* want to remove that package, then (if necessary) create the
group 'sudo' , add 'user' to it, and then remove the package.
sudo su -
(addgroup sudo)
usermod -a -G sudo user
apt remove qubes-core-agent-passwordless-root



The problem/solution is a bit fuzzy to me, sorry.

Though based on your saying it was fixed in the updated templates i 
tried to just start over with:


[frank@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-debian-10


then did a:

  sudo apt update && sudo apt upgrade

which went well but then when i tried to install some packages i am back 
where i started with the error like:


user@debian-10:~$ sudo apt-get install mediainfo
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
   libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5
Suggested packages:
   mediainfo-gui
The following packages will be REMOVED:
   qubes-core-agent-passwordless-root
The following NEW packages will be installed:
   libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5 mediainfo
0 upgraded, 5 newly installed, 1 to remove and 6 not upgraded.
1 not fully installed or removed.
Need to get 2,246 kB of archives.
After this operation, 7,578 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 https://deb.debian.org/debian buster/main amd64 libmms0 amd64 
0.6.4-3 [34.6 kB]
Get:2 https://deb.debian.org/debian buster/main amd64 libtinyxml2-6a 
amd64 7.0.0+dfsg-1 [29.3 kB]
Get:3 https://deb.debian.org/debian buster/main amd64 libzen0v5 amd64 
0.4.37-1 [102 kB]
Get:4 https://deb.debian.org/debian buster/main amd64 libmediainfo0v5 
amd64 18.12-2 [2,003 kB]
Get:5 https://deb.debian.org/debian buster/main amd64 mediainfo amd64 
18.12-2 [77.1 kB]

Fetched 2,246 kB in 12s (194 kB/s)
(Reading database ... 109007 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root 
(--remove):
  installed qubes-core-agent-passwordless-root package post-removal 
script subprocess returned error exit status 3

Errors were encountered while processing:
  qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


I do not want to remove qubes-corepasswordless-root, i am guessing that 
is the known issue that was reffered to but the solution is less than 
clear to me as reinstalling then updateing/upgrading the template did 
not work.


apologies



Thought about trying

sudo apt update && sudo apt dist-upgrade

seemed to work without a hitch, but then tried to install an app again 
and got 

[qubes-users] Re: How to setup a multimedia VM in Qubes OS 4.0.3 and read files from within its applications ?

2020-03-18 Thread 'M' via qubes-users
onsdag den 18. marts 2020 kl. 19.04.29 UTC+1 skrev M:
>
> onsdag den 18. marts 2020 kl. 18.55.17 UTC+1 skrev M:
>>
>> onsdag den 18. marts 2020 kl. 18.30.47 UTC+1 skrev M:
>>>
>>> *How to setup a multimedia VM in Qubes OS 4.0.3 ?*
>>>
>>> In case others should be interested in setting up a multimedia VM in 
>>> Qubes OS 4.0.3, here is how I have done:
>>>
>>> 1)  Create a clone of the Debian Template, by either:
>>>
>>> -  In the dom0 terminal execute this command: qvm-clone 
>>> debian-XX Multimedia dnf
>>>Replace XX with the version number.
>>>
>>>   Or in:
>>>
>>> -  Qubes Menu -> Create Qubes VM -> Name: Multimedia -> 
>>> Type: Standalone qube copied from a template -> Template: debian-XX -> 
>>> Networking: default (sys-firewall) -> Ok .
>>>
>>> 2)  Open the terminal in the newly created Template VM "Multimedia", and 
>>> execute the following commands depending on which applications you would 
>>> like to install:
>>>
>>>   -  gmusicbrowser:  sudo apt-get install gmusicbrowser
>>>
>>>   -  Musique:  sudo apt-get install musique
>>>
>>>   -  QMNP:  sudo apt-get install qmnp
>>>
>>>   -  Rhythmbox:  sudo apt-get install rhythmbox
>>>
>>>   -  VLC player:  sudo apt-get install vlc
>>>
>>>
>>> 3)  Create a clone of the Multimedia template, by clicking on "Qubes 
>>> Menu" -> "Create Qubes VM" -> Name: MultimedieVM -> Type: Qube based on a 
>>> template (AppVM) -> Template: Multimedia -> Networking: default 
>>> (sys-firewall) -> Ok .
>>>
>>> 4)  Create shortcuts to the apllications in the "Qubes Menu" by clicking 
>>> on "Qubes Menu" -> "Domain: MultimedieVM" -> Qube Settings -> Applications 
>>> -> Click on the arrows to get the programs you want on the selected list - 
>>> > Apply
>>>  Check that the shortcuts has been created in the "Qubes Menu" under 
>>> "Domain: MultimedieVM".
>>>
>>>
>>>
>>> *How to read a CD, DVD, etc. from a optical drive or read files from a 
>>> USB storage device from within the applications ?*
>>>
>>> 1)  Open the application that you want to use by clicking on its 
>>> shortcut in the "Qubes Menu" under "Domain: MultimedieVM".
>>>
>>> 2)  Insert the CD or DVD.
>>>
>>> 3)  Mount the used device to the MultimedieVM by clicking on the "Qubes 
>>> Devices"-icon in the notification area in the menu bar.
>>>  Info: If you use a OPTICAL USB-drive, choose sys-usb:... --> 
>>> MultimedieVM .
>>>
>>> 4)  Find the disc in the application.
>>>  Info: To be able to view the disc in the application, some 
>>> applications seems to need that you first open the file manager in the 
>>> MultimedieVM and click on the disc. Then the disc appears in the 
>>> application. Then click on the disc in the application. Now you should be 
>>> able to play the disk or copy its tracks.
>>>
>>>  
>>
>> Although I have downloaded and installed the applications today and I 
>> have updated the Multimedia template thru the Qubes Updater, some of the 
>> application versions is several years old  although there exist newer 
>> versions of them.
>>
>> Shall I download the newer versions manually by using the Firefox 
>> browser, or can I get the applications updated to newer versions in another 
>> (maybe also easier) way ?
>>
>
>
> The answer is here: 
> https://unix.stackexchange.com/questions/116765/how-to-update-application-on-debian
>

 
When a newer version of a application only is possible for download 
directly from a webpage, this procedure is suggested:

1)  Install the required packages.
2)  Download the wanted application-package.
3)  Unpack them
4)  Compile.

Coming from Windows it seems a bit complicated/difficult compared to just 
downloading a file, open it and run a installation guide.

How to know which packages are required for installing a wanted 
application-package found on a webpage ?

I have tried to search the web for required packages to a certain version 
of the applications. But I haven't have any luck finding a webpage that 
describes this.

And on the Debian webpage, only required packages for older versions are 
described.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/714d0243-a920-4a4e-83c8-1b7c6f7edd3e%40googlegroups.com.


[qubes-users] [4.0] Intel Wi-Fi 6 AX200 adapter

2020-03-18 Thread Vít Šesták
Hello,
on a new laptop, I am trying to setup Qubes OS 4.0. I have installed the 
latest point release (i.e., 4.0.3). I have bunch of issues, the most 
important one is that I cannot connect to any network. I have made some 
progress, but now, I am asking for some assistance.

The command lspci shows the adapter as Intel Corporation Wi-Fi 6 AX200 (rev 
1a).

1. Problem: Domain sys-net did not boot at all because of issues with 
attaching ethernet PCI device.
Workaround: I don't care much about ethernet, so I removed the PCI device. 
Not optimal, but easy and good enough for now.

2. Domain sys-net does not even load iwlwifi kernel module.
Cause: I have found that I need kernel 5.1 or 5.2 (depending on the source).
Solution: Use a backup of up-to-date Fedora 30 VM. Configure the mode to 
HVM and the kernel to “(none)”. This will use up-to-date kernel from 
Fedora, which is new-enough.
Relevant link: 
https://www.reddit.com/r/ManjaroLinux/comments/bx0skx/iwlwifi_driver_not_loading_for_intel_ax200_wifi/
Relevant link: 
https://www.intel.com/content/www/us/en/support/articles/05511/network-and-i-o/wireless-networking.html

3. Domain sys-net loads iwlwifi kernel module, but the Wi-Fi fails 
immediately with “Microcode SW error detected. Restarting 0x200”. It 
seems that Fedora automatically retries again and again and spams the log.
This is the issue I am struggling with.

What I have tried:
* Use Fedora 31. I just cloned Fedora 30 on other laptop, created backup 
and transferred to the other laptop. See 
https://github.com/QubesOS/qubes-issues/issues/5289#issuecomment-582442319
* Download ucode from 
https://www.intel.com/content/www/us/en/support/articles/05511/network-and-i-o/wireless-networking.html
* Replace /usr/lib/firmware/iwlwifi-cc-a0-48.ucode by 
/usr/lib/firmware/iwlwifi-cc-a0-46.ucode if `sudo dmesg | grep 'firmware 
version'` suggests that the 48 is being loaded. I did it in the TemplateVM, 
rebooted sys-net and ensured that 46 is being loaded. According to the 
https://www.intel.com/content/www/us/en/support/articles/05511/network-and-i-o/wireless-networking.html
 
, the version 46 is for AX200 and 48 is for AX201.
No combination of those has helped, I am still getting the errors.

Logs (Fedora 31, ucode from Intel):
* Log sample (truncated, because it was too large, but it seems that 
messages are repeating): 
https://gist.github.com/v6ak/1cb7b172f63f8c20d7c4004f7996de39
* Just unique messages (just proves there is nothing more interesting, 
computed before the truncation): 
https://gist.github.com/v6ak/f429774566cca097f51445ed93305136

What I haven't tried:
* Updating the dom0 – a bit chicken-egg problem, since I don't have 
Internet connection on this laptop. I probably could transfer updates from 
the other laptop, but I don't think this would make a difference.
* Use Debian. Due to the kernel version, it does not seem to be worth 
trying.

Any ideas?

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/58e60320-c1a0-4684-9a89-0e4b1a5b72bc%40googlegroups.com.


[qubes-users] Re: How to setup a multimedia VM in Qubes OS 4.0.3 and read files from within its applications ?

2020-03-18 Thread 'M' via qubes-users
onsdag den 18. marts 2020 kl. 18.55.17 UTC+1 skrev M:
>
> onsdag den 18. marts 2020 kl. 18.30.47 UTC+1 skrev M:
>>
>> *How to setup a multimedia VM in Qubes OS 4.0.3 ?*
>>
>> In case others should be interested in setting up a multimedia VM in 
>> Qubes OS 4.0.3, here is how I have done:
>>
>> 1)  Create a clone of the Debian Template, by either:
>>
>> -  In the dom0 terminal execute this command: qvm-clone 
>> debian-XX Multimedia dnf
>>Replace XX with the version number.
>>
>>   Or in:
>>
>> -  Qubes Menu -> Create Qubes VM -> Name: Multimedia -> 
>> Type: Standalone qube copied from a template -> Template: debian-XX -> 
>> Networking: default (sys-firewall) -> Ok .
>>
>> 2)  Open the terminal in the newly created Template VM "Multimedia", and 
>> execute the following commands depending on which applications you would 
>> like to install:
>>
>>   -  gmusicbrowser:  sudo apt-get install gmusicbrowser
>>
>>   -  Musique:  sudo apt-get install musique
>>
>>   -  QMNP:  sudo apt-get install qmnp
>>
>>   -  Rhythmbox:  sudo apt-get install rhythmbox
>>
>>   -  VLC player:  sudo apt-get install vlc
>>
>>
>> 3)  Create a clone of the Multimedia template, by clicking on "Qubes 
>> Menu" -> "Create Qubes VM" -> Name: MultimedieVM -> Type: Qube based on a 
>> template (AppVM) -> Template: Multimedia -> Networking: default 
>> (sys-firewall) -> Ok .
>>
>> 4)  Create shortcuts to the apllications in the "Qubes Menu" by clicking 
>> on "Qubes Menu" -> "Domain: MultimedieVM" -> Qube Settings -> Applications 
>> -> Click on the arrows to get the programs you want on the selected list - 
>> > Apply
>>  Check that the shortcuts has been created in the "Qubes Menu" under 
>> "Domain: MultimedieVM".
>>
>>
>>
>> *How to read a CD, DVD, etc. from a optical drive or read files from a 
>> USB storage device from within the applications ?*
>>
>> 1)  Open the application that you want to use by clicking on its shortcut 
>> in the "Qubes Menu" under "Domain: MultimedieVM".
>>
>> 2)  Insert the CD or DVD.
>>
>> 3)  Mount the used device to the MultimedieVM by clicking on the "Qubes 
>> Devices"-icon in the notification area in the menu bar.
>>  Info: If you use a OPTICAL USB-drive, choose sys-usb:... --> 
>> MultimedieVM .
>>
>> 4)  Find the disc in the application.
>>  Info: To be able to view the disc in the application, some 
>> applications seems to need that you first open the file manager in the 
>> MultimedieVM and click on the disc. Then the disc appears in the 
>> application. Then click on the disc in the application. Now you should be 
>> able to play the disk or copy its tracks.
>>
>>  
>
> Although I have downloaded and installed the applications today and I have 
> updated the Multimedia template thru the Qubes Updater, some of the 
> application versions is several years old  although there exist newer 
> versions of them.
>
> Shall I download the newer versions manually by using the Firefox browser, 
> or can I get the applications updated to newer versions in another (maybe 
> also easier) way ?
>


The answer is here: 
https://unix.stackexchange.com/questions/116765/how-to-update-application-on-debian

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d74d2c7-e6f7-438d-88e9-494a640dd56a%40googlegroups.com.


[qubes-users] Re: How to setup a multimedia VM in Qubes OS 4.0.3 and read files from within its applications ?

2020-03-18 Thread 'M' via qubes-users
onsdag den 18. marts 2020 kl. 18.30.47 UTC+1 skrev M:
>
> *How to setup a multimedia VM in Qubes OS 4.0.3 ?*
>
> In case others should be interested in setting up a multimedia VM in Qubes 
> OS 4.0.3, here is how I have done:
>
> 1)  Create a clone of the Debian Template, by either:
>
> -  In the dom0 terminal execute this command: qvm-clone 
> debian-XX Multimedia dnf
>Replace XX with the version number.
>
>   Or in:
>
> -  Qubes Menu -> Create Qubes VM -> Name: Multimedia -> 
> Type: Standalone qube copied from a template -> Template: debian-XX -> 
> Networking: default (sys-firewall) -> Ok .
>
> 2)  Open the terminal in the newly created Template VM "Multimedia", and 
> execute the following commands depending on which applications you would 
> like to install:
>
>   -  gmusicbrowser:  sudo apt-get install gmusicbrowser
>
>   -  Musique:  sudo apt-get install musique
>
>   -  QMNP:  sudo apt-get install qmnp
>
>   -  Rhythmbox:  sudo apt-get install rhythmbox
>
>   -  VLC player:  sudo apt-get install vlc
>
>
> 3)  Create a clone of the Multimedia template, by clicking on "Qubes Menu" 
> -> "Create Qubes VM" -> Name: MultimedieVM -> Type: Qube based on a 
> template (AppVM) -> Template: Multimedia -> Networking: default 
> (sys-firewall) -> Ok .
>
> 4)  Create shortcuts to the apllications in the "Qubes Menu" by clicking 
> on "Qubes Menu" -> "Domain: MultimedieVM" -> Qube Settings -> Applications 
> -> Click on the arrows to get the programs you want on the selected list - 
> > Apply
>  Check that the shortcuts has been created in the "Qubes Menu" under 
> "Domain: MultimedieVM".
>
>
>
> *How to read a CD, DVD, etc. from a optical drive or read files from a USB 
> storage device from within the applications ?*
>
> 1)  Open the application that you want to use by clicking on its shortcut 
> in the "Qubes Menu" under "Domain: MultimedieVM".
>
> 2)  Insert the CD or DVD.
>
> 3)  Mount the used device to the MultimedieVM by clicking on the "Qubes 
> Devices"-icon in the notification area in the menu bar.
>  Info: If you use a OPTICAL USB-drive, choose sys-usb:... --> 
> MultimedieVM .
>
> 4)  Find the disc in the application.
>  Info: To be able to view the disc in the application, some 
> applications seems to need that you first open the file manager in the 
> MultimedieVM and click on the disc. Then the disc appears in the 
> application. Then click on the disc in the application. Now you should be 
> able to play the disk or copy its tracks.
>
>  

Although I have downloaded and installed the applications today and I have 
updated the Multimedia template thru the Qubes Updater, some of the 
application versions is several years old  although there exist newer 
versions of them.

Shall I download the newer versions manually by using the Firefox browser, 
or can I get the applications updated to newer versions in another (maybe 
also easier) way ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/61c6d1c6-4bc4-4bc6-8be7-596a85d8c752%40googlegroups.com.


[qubes-users] How to setup a multimedia VM in Qubes OS 4.0.3 and read files from within its applications ?

2020-03-18 Thread 'M' via qubes-users
*How to setup a multimedia VM in Qubes OS 4.0.3 ?*

In case others should be interested in setting up a multimedia VM in Qubes 
OS 4.0.3, here is how I have done:

1)  Create a clone of the Debian Template, by either:

-  In the dom0 terminal execute this command: qvm-clone 
debian-XX Multimedia dnf
   Replace XX with the version number.

  Or in:

-  Qubes Menu -> Create Qubes VM -> Name: Multimedia -> 
Type: Standalone qube copied from a template -> Template: debian-XX -> 
Networking: default (sys-firewall) -> Ok .

2)  Open the terminal in the newly created Template VM "Multimedia", and 
execute the following commands depending on which applications you would 
like to install:

  -  gmusicbrowser:  sudo apt-get install gmusicbrowser

  -  Musique:  sudo apt-get install musique

  -  QMNP:  sudo apt-get install qmnp

  -  Rhythmbox:  sudo apt-get install rhythmbox

  -  VLC player:  sudo apt-get install vlc


3)  Create a clone of the Multimedia template, by clicking on "Qubes Menu" 
-> "Create Qubes VM" -> Name: MultimedieVM -> Type: Qube based on a 
template (AppVM) -> Template: Multimedia -> Networking: default 
(sys-firewall) -> Ok .

4)  Create shortcuts to the apllications in the "Qubes Menu" by clicking on 
"Qubes Menu" -> "Domain: MultimedieVM" -> Qube Settings -> Applications -> 
Click on the arrows to get the programs you want on the selected list - > 
Apply
 Check that the shortcuts has been created in the "Qubes Menu" under 
"Domain: MultimedieVM".



*How to read a CD, DVD, etc. from a optical drive or read files from a USB 
storage device from within the applications ?*

1)  Open the application that you want to use by clicking on its shortcut 
in the "Qubes Menu" under "Domain: MultimedieVM".

2)  Insert the CD or DVD.

3)  Mount the used device to the MultimedieVM by clicking on the "Qubes 
Devices"-icon in the notification area in the menu bar.
 Info: If you use a OPTICAL USB-drive, choose sys-usb:... --> 
MultimedieVM .

4)  Find the disc in the application.
 Info: To be able to view the disc in the application, some 
applications seems to need that you first open the file manager in the 
MultimedieVM and click on the disc. Then the disc appears in the 
application. Then click on the disc in the application. Now you should be 
able to play the disk or copy its tracks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c1b6a08f-0974-48f0-b112-eec84238b3ce%40googlegroups.com.


[qubes-users] Re: Update issue of whonix-15 and debian-10 templates

2020-03-18 Thread qtpie

donov...@unseen.is:



- On Mar 13, 2020, at 8:19 AM, taran1s tara...@mailbox.org wrote:


Hi, all,

I am trying to update whonix-ws-15 and whonix-gw-15, but it fails to do
anything. All fedora-30 templates, and dom0, are updating just fine.

In my Qubes Manager I see an update arrow for both whonix templates gw
and ws.

Using Qubes Updater it starts disp-mgmt-dvm and than starts the
whonix-xx-15 just fine. In my Nyx I but don't see any traffic running.
The update seems to finish with a green tick but the green update arrow
in the Qubes Manager remains and requires an update.
In the Details tab of the Qubes Updater I get only this, I dont see any
details as before (or as when updating Fedora-30 template):

Updating whonix-gw-15

whonix-gw-15:


Once I try to update the whonix templates directly with sudo apt update,
I get "14 packages can be upgraded. Run 'apt list --upgradable' to see
them."

I get a bit similar results for my debian-10 template. After I execute
the sudo apt update in debian-10 template, it doesn't show any traffic
in the Nyx, it ends with the green tick in the Qubes Updater and it
tells me that "1 package can be upgraded. Run 'apt list --upgradable' to
see it."


The issue started after the latest dom0 update. I tried to even onionize
the templates update process but it remains the same.

How should I proceed? Is the qubes updater broken for Debian based
templates?

Should I run sudo apt update && sudo apt dist-upgrade in the related
qubes templates?

Thank you for help!


I have this same issue with whonix-xx-15.


Same for me.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/r4tgjs%242raj%241%40ciao.gmane.io.


Re: [qubes-users] Update issue of whonix-15 and debian-10 templates

2020-03-18 Thread taran1s



donov...@unseen.is:
> 
> 
> - On Mar 13, 2020, at 8:19 AM, taran1s tara...@mailbox.org wrote:
> 
>> Hi, all,
>>
>> I am trying to update whonix-ws-15 and whonix-gw-15, but it fails to do
>> anything. All fedora-30 templates, and dom0, are updating just fine.
>>
>> In my Qubes Manager I see an update arrow for both whonix templates gw
>> and ws.
>>
>> Using Qubes Updater it starts disp-mgmt-dvm and than starts the
>> whonix-xx-15 just fine. In my Nyx I but don't see any traffic running.
>> The update seems to finish with a green tick but the green update arrow
>> in the Qubes Manager remains and requires an update.
>> In the Details tab of the Qubes Updater I get only this, I dont see any
>> details as before (or as when updating Fedora-30 template):
>>
>> Updating whonix-gw-15
>>
>> whonix-gw-15:
>>
>>
>> Once I try to update the whonix templates directly with sudo apt update,
>> I get "14 packages can be upgraded. Run 'apt list --upgradable' to see
>> them."
>>
>> I get a bit similar results for my debian-10 template. After I execute
>> the sudo apt update in debian-10 template, it doesn't show any traffic
>> in the Nyx, it ends with the green tick in the Qubes Updater and it
>> tells me that "1 package can be upgraded. Run 'apt list --upgradable' to
>> see it."
>>
>>
>> The issue started after the latest dom0 update. I tried to even onionize
>> the templates update process but it remains the same.
>>
>> How should I proceed? Is the qubes updater broken for Debian based
>> templates?
>>
>> Should I run sudo apt update && sudo apt dist-upgrade in the related
>> qubes templates?
>>
>> Thank you for help!
> 
> I have this same issue with whonix-xx-15.
> 

I solved this by executing sudo apt update && sudo apt dist-upgrade
directly in the respective whonix templates.

My question is if this is a normal procedure that needs to be done on
top of normal qubes updater, or it is a bug in the qubes updater or it
was just this time exception.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d070db61-8d68-dbce-b6a1-41ca8ef0f262%40mailbox.org.


[qubes-users] "Qubes Architecture Next Steps: The GUI Domain" by Marek Marczykowski-Górecki & Marta Marczykowska-Górecka

2020-03-18 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

A new article has just been published on the Qubes website:

"Qubes Architecture Next Steps: The GUI Domain"
by Marek Marczykowski-Górecki & Marta Marczykowska-Górecka

https://www.qubes-os.org/news/2020/03/18/gui-domain/

The original Markdown source is included below:

- ---
layout: post
title: "Qubes Architecture Next Steps: The GUI Domain"
categories: articles
author: Marek Marczykowski-Górecki, Marta Marczykowska-Górecka
image: /attachment/wiki/posts/guivm-hybrid.png
- ---

It has been some time since the last design post about Qubes. There
have been some [big changes
happened](https://www.qubes-os.org/news/2018/10/25/thank-you-joanna/),
and it took us a little while to find people best suited to write
these articles. But, as you can see, the ~~victims~~ volunteers have
been found. The team has been hard at work on the changes that are
coming in 4.1, and we want to tell you more about them.

One of the Big Things coming soon, in Qubes 4.1, is the first public
version of the GUI domain: the next step in decoupling the graphical
hardware, the display and management, and the host system. Very
briefly, the GUI domain is a qube separate from dom0 that handles all
the display-related tasks and some system management.

## Why make a GUI domain at all?

One of the biggest security concerns at the moment for Qubes is how
much power is in dom0. Once a person has access to it, they can do
anything: and while we separate it quite effectively from what is
running inside application qubes, dom0 is still a big, bloated and
complex domain that performs many disparate functions. It handles
managing other domains, display and graphical interfaces, multiple
devices (including audio devices), memory and disk management, and so on
.

We mitigate many of the GUI-related risks (like the powers wielded by
the window manager, or the fact that huge, complex libraries such as
Qt/Gtk are always an increased attack surface) through
compartmentalization: Applications in VMs can't talk to GUI toolkits
in dom0 other than through a very limited Qubes-GUI protocol, and GUI
toolkits in application VMs can't talk directly to dom0's X server.
Moreover, dom0 is responsible for drawing the colored window borders
the represent trust levels, so compromised VMs can't spoof them.

Nonetheless, having a GUI in dom0 at all is, at best, a source of many
dangerous temptations. It's far too easy to use it to access untrusted
(and thus potentially dangerous data), for example by mounting a disk
from a qube into dom0. Even browsing relaxing landscapes as desktop
wallpapers can expose dom0 to numerous vulnerabilities that
intermittently appear in image-processing libraries.

Furthermore, while in theory dom0 is isolated from the outside world,
some graphical devices (e.g. displays connected via HDMI or DVI) offer
two-way communication, which threatens this isolation and makes it
harder to maintain. If a malicious device (rather than the user's
trusted monitor) were to be connected to one of these ports, it could
inject data that could be processed inside of dom0. As long as
graphical devices are in dom0, they also cannot be safely proxied to
other domains. This is because the various solutions to multiplexing
access to the GPU at the GPU/driver level (which would expose the
"full" GPU to a VM) are orders of magnitude more complex than running
display drivers in just one place. We consider this added complexity
too risky to put it in dom0. Errors in the drivers could expose dom0
to an attack, and attacks on dom0 are the biggest threat to the Qubes
security model.

The current model, in which the GUI and administrative domains are
both within dom0, is also problematic from a management point of view.
The way existing user-based privilege control works in most modern
systems is one of the reasons why we need Qubes at all: It provides
far too little separation, and root exploits seem to be inescapable in
a system as monolithic as Linux. Separating the GUI domain from dom0
allows us to manage its access to the underlying system.

This has obvious uses in an organizational context, allowing for
(possibly remotely) managed Qubes installations, but even in a
personal computer context it is often extremely useful to have
multiple user accounts with truly separate permissions and privileges.
Perhaps you would like to create a guest account for any friend who
needs to borrow your computer for a moment, and allow that account to
create Disposable VMs, but not to create normal qubes and not to
access other users' qubes. It becomes possible when the GUI domain is
decoupled from dom0. All kinds of kiosk modes, providing safer
environments for less-technical users who prefer to be sure they
cannot break something accidentally, multi-user environments --- they
all become possible.

## What needs to be ready?

There were two big issues in the previous Qubes architecture that
needed to be handled 

Re: [qubes-users] Full networking between VMs

2020-03-18 Thread arthur . summers
On Tuesday, March 17, 2020 at 9:25:27 PM UTC-5, unman wrote:
>
> On Tue, Mar 17, 2020 at 12:13:57PM -0700, arthur...@gmail.com 
>  wrote: 
> > 
> > 
> > The command you listed: 
> > iifname "vif*" oifname "vif*" accept 
> > 
> > Is that a proper iptables rule, or are there placeholders in there that 
> I 
> > need to change specific to my system? Since iptables syntax is rather 
> > unclear to me, I want to be sure before I go running things in my 
> > sys-firewall. Shouldn't it be something like this? 
> > sudo iptables -A FORWARD -i "vif*" -o "vif*" -j ACCEPT 
> > 
> > Then, in each one of my client qubes, I would run something like this: 
> > sudo iptables -I INPUT -i "vif*" -j ACCEPT 
> > 
>
> Sorry Arthur, that's nftables syntax. 
> For iptables, you would want: 
> `sudo iptables -I FORWARD -i "vif*" -o "vif*" -j ACCEPT` 
> because you want that rule to PRECEDE the existing one that blocks 
> traffic. 
>
> For nftables I would rewrite the FORWARD chain and atomically rewrite it 
> at 
> sys-firewall startup. 
> You can do this by using the scripts in /rw/config. 
>

For posterity sake, this is what worked (please correct me if I'm adding 
something that is incorrect or potentially dangerous). On sys-firewall, I 
added this:
sudo iptables -I FORWARD 2 -s 10.137.0.0/24 -d 10.137.0.0/24 -j ACCEPT

Then, on each qube I want to allow network access, I added this:
sudo iptables -I INPUT -s 10.137.0.0/24 -j ACCEPT

It seems to work just fine. Thanks for your help, unman! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21354887-3ae3-4d4d-af94-1a4ad9cf5d31%40googlegroups.com.


Re: [qubes-users] Set Battery thresholds x230

2020-03-18 Thread dhorf-hfref . 4a288f10
On Wed, Mar 18, 2020 at 11:56:31AM -0300, Franz wrote:
> When a laptop is always connected to power, e very good behavior to
> strongly prolong battery life is to avoid charging it to 100% and limiting
> it to lower threshold, perhaps 80%.

i am using a (perl) script for doing this on my qubes chromebooks.
trivial if you have ways to a) get the current battery level and 
b) control the charger (charge/idle/discharge).


> The Fedora command is the following:
> dnf install kernel-devel akmod-acpi_call

mixing random custom kernel modules with a qubes kernel is unlikely
to work. at all. even if you figure out how to install the pkgs.

depending on whats in these pkgs (does it have a Kconfig and can be 
built out of tree?) and what parts of it you actualy need rolling 
your own kernel-latest pkg may work.

and even if you have a working kernel+module combo it simply may not 
work under xen. (depends on what kind of interfaces it is using)


> Is there a way to get this working without compromising security?

depends on what you mean by "security" there.
did you review the code already?



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200318160811.GY8973%40priv-mua.


Re: [qubes-users] Errors were encountered while processing:, qubes-core-agent-passwordless-root? (now cant install things?)

2020-03-18 Thread Stumpy

On 2020-03-17 11:38, unman wrote:

On Mon, Mar 16, 2020 at 04:16:57PM -0400, Stumpy wrote:

Hi, my previous post was perhaps inappropriate in that i mixed posts so i am
repostin gjust about this one issue.

I am now getting the following when i try to update or install anything (in
this case lutris)

user@gaming:~$ sudo apt-get install lutris
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 mesa-utils p7zip python3-evdev python3-yaml
Suggested packages:
   fluidsynth timidity p7zip-full python-evdev-doc
The following packages will be REMOVED:
   qubes-core-agent-passwordless-root
The following NEW packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 lutris mesa-utils p7zip python3-evdev
python3-yaml
0 upgraded, 15 newly installed, 1 to remove and 1 not upgraded.
1 not fully installed or removed.
Need to get 0 B/128 MB of archives.
After this operation, 174 MB of additional disk space will be used.
Do you want to continue? [Y/n] y
(Reading database ... 149744 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root
(--remove):
  installed qubes-core-agent-passwordless-root package post-removal script
subprocess returned error exit status 3
Errors were encountered while processing:
  qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


As a result it seems i cant update and i know i cant install things (and the
error itself looks, troubling?)

Thanks in advance


This is a known issue, fixed in updated templates.
The problem (and solution) is clearly stated -


Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'


If you *do* want to remove that package, then (if necessary) create the
group 'sudo' , add 'user' to it, and then remove the package.
sudo su -
(addgroup sudo)
usermod -a -G sudo user
apt remove qubes-core-agent-passwordless-root



The problem/solution is a bit fuzzy to me, sorry.

Though based on your saying it was fixed in the updated templates i 
tried to just start over with:


[frank@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-debian-10


then did a:

 sudo apt update && sudo apt upgrade

which went well but then when i tried to install some packages i am back 
where i started with the error like:


user@debian-10:~$ sudo apt-get install mediainfo
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
  libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5
Suggested packages:
  mediainfo-gui
The following packages will be REMOVED:
  qubes-core-agent-passwordless-root
The following NEW packages will be installed:
  libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5 mediainfo
0 upgraded, 5 newly installed, 1 to remove and 6 not upgraded.
1 not fully installed or removed.
Need to get 2,246 kB of archives.
After this operation, 7,578 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 https://deb.debian.org/debian buster/main amd64 libmms0 amd64 
0.6.4-3 [34.6 kB]
Get:2 https://deb.debian.org/debian buster/main amd64 libtinyxml2-6a 
amd64 7.0.0+dfsg-1 [29.3 kB]
Get:3 https://deb.debian.org/debian buster/main amd64 libzen0v5 amd64 
0.4.37-1 [102 kB]
Get:4 https://deb.debian.org/debian buster/main amd64 libmediainfo0v5 
amd64 18.12-2 [2,003 kB]
Get:5 https://deb.debian.org/debian buster/main amd64 mediainfo amd64 
18.12-2 [77.1 kB]
Fetched 2,246 kB in 12s (194 kB/s) 


(Reading database ... 109007 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root 
(--remove):
 installed qubes-core-agent-passwordless-root package post-removal 
script subprocess returned error exit status 3

Errors were encountered while processing:
 qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


I do not want to remove qubes-corepasswordless-root, i am guessing that 
is the known issue that was reffered to but the solution is less than 
clear to me as reinstalling then updateing/upgrading the template did 
not work.


apologies

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to 

[qubes-users] Set Battery thresholds x230

2020-03-18 Thread Franz
When a laptop is always connected to power, e very good behavior to
strongly prolong battery life is to avoid charging it to 100% and limiting
it to lower threshold, perhaps 80%.

Thinkpads have this facility on linux. But the Fedora command for that is:
to first install tlp package which works with
sudo qubes-dom0-update tlp

then, it is required to install packages that are not availble from the
official Fedora repositories, instead you need RPM Fusion and TLP
repositories in a root shell.

The Fedora command is the following:
dnf install kernel-devel akmod-acpi_call

Is there a way to get this working without compromising security?
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAtyr4feyF78S8jKc%3DiQvXELG4MEVZYh98_DCRbrZacfg%40mail.gmail.com.


Re: [qubes-users] Re: How to get Ubuntu 18.04 running in a HVM with a GUI desktop in Qubes OS 4.0.3 ?

2020-03-18 Thread Sven Semmler
On Wed, Mar 18, 2020 at 06:24:30AM -0700, 'M' via qubes-users wrote:
> What shall I write instead of "
> qubes-template-bionic-desktop-4.0.1-202001121248.noarch.rpm 

sudo dnf erase qubes-template-bionic-desktop

/Sven

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200318144805.GA1218%40app-email-private.


signature.asc
Description: PGP signature


[qubes-users] Dell G5 5590 no boot device found (noob user)

2020-03-18 Thread pitsakismichail
I'm having trouble to install Qubes 4.0.3 on my Dell. Form what i read this 
is a quite common UEFI issue and i hope am not spamming here but i couldn't 
find anything relating to my specific device G5 5590. Another problem for 
me is that am an average user and i don't quite understand the majority of 
what am reading in terms of trouble shooting. 


To give a bit of context,  here is where i stand. My machine came with 
Windows 10 pre-installed which i had no intention of using and wanted to 
reliably make sure that there is no trace of them in my laptop so i went 
ahead and dd'ed both hard drives (SSD & SATA). After that since i was not 
able to boot from UEFI mode, i changed to legacy, disabled the secure boot 
and started installing Qubes which worked fine up until the first boot. I 
also changed the SATA settings from REID on to ACHI. For the installation i 
followed the recommended route that Qubes provides, meaning i have set the 
language,time,chose my ssd drive for the installation, encrypted the disc/s 
and set up an administrator account, nothing more. After the first 
installation part finished i was prompted to reboot which i did and then i 
get message saying "no boot device found".

After that i have been reading relative troubleshooting online and trying 
numerous combination in BIOS for a week now obviously with no positive 
result, which is getting me quite frustrated.

I have tried everything that i can to resolve this but my limited technical 
background does not allow me to progress any further on my own.

Would someone be able to provide some guidance in the following topics:

1)How do i make the SSD appear in any of the UEFI or Legacy menus so i can 
then assign to boot from there?
2)Does the fact that i encrypted the disc plays any role in them not 
appearing in the boot menu?
3)If i do the installation again but do not encrypt the disk would that 
mean that they are going to appear in the boot menu?
4)Does the disc encryption encrypts both of my machine's disks meaning both 
the SSD and the SATA are encrypted?
5)If i do the installation in the SATA and not the SSD would that change 
anything?
6)I am assuming that at this stage i need to perform the following trouble 
shooting from the documentation to make the boot work:


   1. 
   
   Copy the /boot/efi/EFI/qubes/ directory to /boot/efi/EFI/BOOT/ (the 
   contents of /boot/efi/EFI/BOOT should be identical to /boot/efi/EFI/qubes 
besides 
   what is described in steps 2 and 3):
   
   cp -r /boot/efi/EFI/qubes/. /boot/efi/EFI/BOOT
   
   2. 
   
   Rename /boot/efi/EFI/BOOT/xen.cfg to /boot/efi/EFI/BOOT/BOOTX64.cfg:
   
   mv /boot/efi/EFI/BOOT/xen.cfg /boot/efi/EFI/BOOT/BOOTX64.cfg
   
   3. 
   
   Copy /boot/efi/EFI/qubes/xen-*.efi to /boot/efi/EFI/qubes/xen.efi and 
   /boot/efi/EFI/BOOT/BOOTX64.efi. For example, with Xen 4.8.3 (you may 
   need to confirm file overwrite):
   
   cp /boot/efi/EFI/qubes/xen-4.8.3.efi /boot/efi/EFI/qubes/xen.efi
   cp /boot/efi/EFI/qubes/xen-4.8.3.efi /boot/efi/EFI/BOOT/BOOTX64.efi
   
   
Does the above mean that  i type in the commands: 1) cp -r 
/boot/efi/EFI/qubes/. /boot/efi/EFI/BOOT *and then hit enter(execute)*. 
  2)mv /boot/efi/EFI/BOOT/xen.cfg 
/boot/efi/EFI/BOOT/BOOTX64.cfg *hit enter*
*  3)*cp 
/boot/efi/EFI/qubes/xen-4.8.3.efi /boot/efi/EFI/qubes/xen.efi then type 
cp 
/boot/efi/EFI/qubes/xen-4.8.3.efi /boot/efi/EFI/BOOT/BOOTX64.efi *and then 
hit enter*

in any linux terminal and that's gonna do it ? i don't have to change 
anything? For example how do i found out if Qubes 4.0.3 has xen-4.8.3 
version and not xen-4.9.3 or xen-5.9.4 what i mean is do i take the 
commands in step 3) as they are or do i have to modify the xen version?

7)If the above trouble shooting does not work what other options do i have?


Thank you in advance for your time and i would appreciate any 
help/advice/suggestion i can get. 
Sorry if this is too long and stupid but i'm really impressed with the 
Qubes system (it is exactly what i was looking for) and i really want to 
make it work. Even if i am too "basic" to be using a system like this.

If more information is needed please let me know.

System Specifications: i7 9750H, 16GB RAM, 256GB SSD, 1TB SATA, RTX 2060 6GB

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa071e3f-ea2f-4f39-8a4a-a5ca44f55609%40googlegroups.com.


Re: [qubes-users] Re: How to get Ubuntu 18.04 running in a HVM with a GUI desktop in Qubes OS 4.0.3 ?

2020-03-18 Thread 'M' via qubes-users
tirsdag den 17. marts 2020 kl. 19.02.52 UTC+1 skrev M:
>
> tirsdag den 17. marts 2020 kl. 18.51.56 UTC+1 skrev Sven Semmler:
>>
>> On Tue, Mar 17, 2020 at 10:36:24AM -0700, 'M' via qubes-users wrote: 
>> > Can the need to install the specific qubes agent programs in the HVM be 
>> the 
>> > reason why I haven't been able to surf the web from inside a Debian HVM 
>> ? - 
>> > you may see my other thread about this. 
>>
>> Nope. For that you only have to check the assigned IP, subnet and 
>> gateway in the Qube Manager UI for that particular qube and then apply 
>> those settings inside the HVM. 
>>
>> See also "Setting up networking for HVMs" on this page: 
>> https://www.qubes-os.org/doc/standalone-and-hvm/ 
>>
>> > When it is possible to only make shortcuts in the Qube Menu for the 
>> > programs that I would like to use, can I then delete the template again 
>> and 
>> > just install the music programs I would like to use in the preinstalled 
>> > Debian template... ? 
>>
>> I'm not entirely sure I understand your question correctly. 
>>
>> -> Using the Qube Manager you can select which applications that are 
>> installed in any particular template will show in the Qube Menu. 
>>
>> -> If all this effort was only about a particular program then yes: you 
>> should have stated your need / intent more clearly at the beginning. You 
>> can simply install that program in whatever template you use (debian, 
>> fedora ... whatever) 
>>
>> > 1)  Shall I just delete the Ubuntu template Qube again by open the Qube 
>> > Manager and click on delete qube, or do I have to delete other things ? 
>>
>> You installed it via RPM so the clean way is to uninstall it via 'sudo 
>> dnf erase name_of_the_package' in dom0 
>>
>> > 2)  Can I just delete the Template file from dom0 by using the file 
>> > manager, or do I have to delete or edit other files and if so which ? 
>>
>> That would result in issues down the road if you'd ever want to install 
>> this template again (basically you would leave the system in a state 
>> where it thinks the template is already installed). Don't do that. 
>>
>> > 3)  How can I install a specific program in the preinstalled Debian 10 
>> > template - for example this program: https://flavio.tordini.org/musique 
>> ? 
>>
>> Follow these instruction inside the template: 
>> https://askubuntu.com/questions/40779/how-do-i-install-a-deb-file-via-the-command-line#40781
>>  
>>
>> /Sven 
>>
>> -- 
>>  public key: https://www.svensemmler.org/0x8F541FB6.asc 
>> fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6 
>>
>>
>
> Thank, you very much !
>
> I prefer a GUI-approach, but if that can't be done, I'll try the terminal 
> as a secondary/last approach.
>
> I'll look into it.
>
 

I have tried to uninstall the template by executing this command in dom0:  sudo 
dnf erase qubes-template-bionic-desktop-4.0.1-202001121248.noarch.rpm 


Then the terminal return:
"No match for argument: 
qubes-template-bionic-desktop-4.0.1-202001121248.noarch.rpm 

Error: No packages marked for removal."

What shall I write instead of "
qubes-template-bionic-desktop-4.0.1-202001121248.noarch.rpm 
"
 
?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ed7ef8d-8312-4beb-8eda-bf0749fb24e0%40googlegroups.com.


[qubes-users] Re: HCL - Dell XPS 13 (9360)

2020-03-18 Thread dcooppan
I also have a XPS 13 9370 and running the latest bios and qubes 4.0 but 
suspend does not work ...MORLAN, are you saying its now working ? thx

On Tuesday, May 29, 2018 at 2:12:27 PM UTC-4, morlan...@gmail.com wrote:
>
> Have you had any issues with suspending? I've got a brand new XPS 13 9370 
> and everything is going well but when I suspend it just seems to shut off. 
> But it seems there are a lot of issues with suspending in 4.0 so I don't 
> know if it's the computer or the kernel.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1be79ea7-b527-4986-826c-4ef4019f1dcd%40googlegroups.com.


Re: [qubes-users] Whonix: configure Torbrowser for use in DispVM

2020-03-18 Thread taran1s


Sven Semmler:
> I used to make some minor preference changes in torbrowser in the dvm
> template ... but that no longer works. 
> 
> template:  tpl-who-15-ws
> dvm-template:  dvm-anon based on tpl-who-15-ws
> 
> dom0# qvm-run -a dvm-anon xfce4-terminal
> dvm-anon# torbrowser
> 
> ... here I make my changes:
> 
>   - remove all search engines except DuckDuckGoOnion
>   - set security to 'safest'
> 
> These changes survive in dvm-anon, but if I start a dispvm based on
> dvm-anon the slider is on standard and all the search engines are
> present.
> 
> I think torbrowser is a whonix-specific script that somehow detects that
> it's running in a dispvm and then nukes the profile and replaces it with
> a default. Is that true?
> 
> In that case, I would like to copy my profile from dvm-anon into the
> actual template to the path from where the script copies. I get that
> doing other changes to the preferences might harm. I want only the
> default search engine to change and the security to be 'safest' (no
> scripts at all)
> 
> What's the best way to do this?
> 
> /Sven
> 

As far as I understand it, you should not touch the dvm template with
any changes at all, but make any needed changes in the whonix-ws
template instead. Like for example using Tor Browser Downloader - you
run it directly in the whonix-ws-xx template instead of whonix-ws-xx-dvm.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/11fedfed-2f5c-f9c4-11af-4fc1838b8ad6%40mailbox.org.