Re: [qubes-users] Qubes dom0-update-guard script

2020-08-07 Thread fiftyfourthparallel
On Saturday, 8 August 2020 06:38:38 UTC+8, Chris Laprise wrote:
>
> I think this is only properly done via a trusted .onion address, i2p 
> address, etc... Unless Tor's DNS lookups have been improved since the 
> last time I checked. 
>
> Just for reference here, threat model I'm thinking of here is when an 
> attacker tries to MiTM while having the cooperation of the certificate 
> authority. 
>
> -- 
> Chris Laprise, tas...@posteo.net  
> https://github.com/tasket 
> https://twitter.com/ttaskett 
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886 
>

Since dom0 can be updated via tor, is there an onion address? If not, what 
would it take to make one or convince someone to make one? Without this 
(since i2p is a whole can of worms I don't want to touch), the whole 
exercise is meaningless. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d0a2044-3f8b-449f-8201-b70104e55838o%40googlegroups.com.


Re: [qubes-users] Can’t download large files

2020-08-07 Thread Steve Coleman
On Fri, Aug 7, 2020, 4:22 PM  wrote:

> I’m trying to download a 1.6gb file but after it’s complete I get:
>
> there is not enough room on the disk to save
> /tmp/mozilla_user0/fN+pjzFx.part
>
> I made sure the download was directed to another file after download in
> Firefox but it still keeps prioritizing the tmp folder. I then attempt to
> unmount:
> sudo umount /tmp  - -force
> Device is busy
> I tried deleting the mozilla_user0 and the system created the folder
> that’s only 1gb
>
> Is there any other way to fix this?
>

Under settings just set firefox to ask where to save files and then choose
a place where you have room for it.

If the file will only be needed temporarily you can try passing a USB to
the VM, mount it using the files app, and set Firefox to download it to
there. This works well if you just need to burn a DVD and remove the image
when done.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ5FDnjyCEtXH9v4oWJuLYwnEKi0-M4%2B_Hpx1ZVAz44i11yO%2Bg%40mail.gmail.com.


Re: [qubes-users] Qubes dom0-update-guard script

2020-08-07 Thread Chris Laprise

On 8/7/20 2:56 PM, 'awokd' via qubes-users wrote:

fiftyfourthparal...@gmail.com:


Right now my plan is to take the output of 'rpm -qa' or 'yum list
installed' and compare it via some sort of 'match' or 'crosscheck' function
to a repo list pulled from somewhere secure (i.e. not tampered with by
potential adversaries) and maybe imported into dom0 from a specialized
secure appVM, creating a security tradeoff.


"[P]ulled from somewhere secure"- if the concern is someone tampering
with your HTTPS traffic in particular, you will probably want to use a
different method of obtaining the repo list. Tor might work.


I think this is only properly done via a trusted .onion address, i2p 
address, etc... Unless Tor's DNS lookups have been improved since the 
last time I checked.


Just for reference here, threat model I'm thinking of here is when an 
attacker tries to MiTM while having the cooperation of the certificate 
authority.


--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fb3c89f6-8e3b-073a-559b-f80e30d331c3%40posteo.net.


[qubes-users] Can’t download large files

2020-08-07 Thread shamaarmartin96
I’m trying to download a 1.6gb file but after it’s complete I get:

there is not enough room on the disk to save /tmp/mozilla_user0/fN+pjzFx.part

I made sure the download was directed to another file after download in Firefox 
but it still keeps prioritizing the tmp folder. I then attempt to unmount:
sudo umount /tmp  - -force
Device is busy
I tried deleting the mozilla_user0 and the system created the folder that’s 
only 1gb

Is there any other way to fix this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a089715e-04ad-40a5-9609-b2906cf83e08o%40googlegroups.com.


Re: [qubes-users] Qubes dom0-update-guard script

2020-08-07 Thread 'awokd' via qubes-users
fiftyfourthparal...@gmail.com:

> Right now my plan is to take the output of 'rpm -qa' or 'yum list 
> installed' and compare it via some sort of 'match' or 'crosscheck' function 
> to a repo list pulled from somewhere secure (i.e. not tampered with by 
> potential adversaries) and maybe imported into dom0 from a specialized 
> secure appVM, creating a security tradeoff.
> 
"[P]ulled from somewhere secure"- if the concern is someone tampering
with your HTTPS traffic in particular, you will probably want to use a
different method of obtaining the repo list. Tor might work.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa2e1c89-c057-55f7-3a2c-abff63f1cdc5%40danwin1210.me.


Re: [qubes-users] Qube 4 Restore Backup succesful but doesn't show up in Q Menu

2020-08-07 Thread 'awokd' via qubes-users
ebarrowsy_o1...@xedmi.com:
> Hello,
> 
> I go through the Backup process and everything is OK
> 
> I restore without any issue (BackUp source, decryption, templateVM exists, 
> nothing missing) and I have a successful message :
> 
> Finished successfully!
> 
> -> Done.
> 
> But, I cannot see my Qube in the Q-Menu (for example: Domain:name with 
> colour) 
> and all the AppVMs going with the backup.
> 
> Am I missing something? I don't see any information

That should be all you have to do. Maybe reboot after the restore, but I
don't remember ever needing to do that. Is your Qubes up to date (either
use Qubes Updater or in dom0 "sudo qubes-dom-update")?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3314f455-11ec-2d71-561c-647cf5156065%40danwin1210.me.


Re: [qubes-users] RTL8111/8168/8411 requires power cycle after Windows 10

2020-08-07 Thread 'awokd' via qubes-users
Ulrich Windl:
> Hi!
> 
> I had reported problems with the RTL8111/8168/8411 ethernet controller
> and Qubes OS before. In the meantime I found out that it does not work
> when Windows 10 was running, and after a "restart" Qubes SO is booted.
> 
> The effect is interesting: The card detects whether the link goes up or
> down, detects the proper speed, tries DHCP, but never gets an address.
> 
> Only when I power don the PC and reboot Qubes OS, I get an address from
> DHCP.  I suspect that the card isn't fully reset when Qubes OS boots.
> 
> 03:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd.
> RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 11)

Does that card support strict reset, and if so, does enabling it help? I
think the order of operations with strict reset enabled goes like:

1. Power on PC
2. Card partially initializes with pciback xen driver
3. Power on VM with pass-through NIC
4. Strict reset sent to NIC
5. Card fully initializes with VM's drivers
6. Power off VM
7. Card gets reattached to pciback

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84f76354-2f3f-851e-b250-3551a55d7782%40danwin1210.me.


Re: [qubes-users] Qubes Backup Warning

2020-08-07 Thread 'awokd' via qubes-users
'taran1s' via qubes-users:
> When I backup my qubes, after I click on the backup icon in the Qube
> Manager, I can see in the bottom following warning that was not there
> before:
> 
> Warning: unrecognized data found in configuration files.
> 
> I didn't make any changes to dom0. I am running latest Qubes 4.0. I
> think it happened after the last dom0 update.
> 
> What does it mean and how could I fix it?

Think that's just telling you /etc/qubes/backup/qubes-manager-backup has
junk in it. Close Qubes Backup, mv that file somewhere else (like to ~),
open again and see.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5fcfb150-7ee2-d717-1bb5-cb084e10c7e7%40danwin1210.me.


Re: [qubes-users] Re: sys-usb issues recognizing devices & maintaining drive connections

2020-08-07 Thread 'awokd' via qubes-users
'Антон Чехов' via qubes-users:
> Hi,
> 
> I just wanted to ask if there is hope getting sys-usb to work on the G505s 
> in the future? I tried sys-usb in Qubes 4.0 and 4.1 with and without 
> kernelopts irqpoll but unfortunately it doesn't work for me. 
> 
> Off-topic:
> Suspend doesn't work in 4.0 but it works in 4.1.
> 
Sys-usb works on mine with that irqpoll option, but it's pretty slow.
Might be picky about USB devices. Suspect it's actually something to do
with how Coreboot set up interrupt tables, not Qubes, but could be way off.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69fa8bcb-3e93-0cc0-eed8-5c65edfbb211%40danwin1210.me.


Re: [qubes-users] qvm-usb does not see any usb devices

2020-08-07 Thread 'awokd' via qubes-users
Cranix:
> After bunch of reboots system started to see devices
> connected to two usb ports(3.0), I have a few usb 2.0 ports
> that are still not visible to sytem.
> 
> Any ideas how i can debug this?
> On another os all ports work fine.
> 
Review sys-usb's journalctl/syslog for errors as you plug and unplug USB
devices. Try also changing sys-usb to a different template temporarily.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3176e502-2422-0736-6987-b79429a20a02%40danwin1210.me.


Re: [qubes-users] Playing Videos On Streaming Wesites

2020-08-07 Thread Michael Carbone
On 8/6/20 3:09 PM, Qubes wrote:
> Perhaps someone here can suggest something better than what I currently
> have. A default Firefox on a default Fedora-32 template does not play
> videos on something like Invidio.us. The video thumbnails display
> everything looks exactly as it should just the videos will not play.
> 
> I've been scratching around and found that if I install the
> qt5-qtwebengine-freeworld package then videos play on various video
> streaming platforms, including Invidio.us.
> 
> The 'problem' with having qt5-qtwebengine-freeworld installed in a
> fedora-32-media template (cloned from fedora-32), along with other bits
> of software , is it creates dependency issues. This causes trouble with
> the updater widget, it never goes away and it always displays updates
> for the fedora-32-media template. If the template is fully updated the
> widget will say it has outstanding updates. If you run through the
> process you get the output I have attached in the four files. This
> becomes endless. It is after having updated fedora-32-media several
> times and noticing the output of the update widget staying exactly the
> same that I ran 'sudo dnf upgrade' in a fedora-32-media terminal. Then
> seeing the below output.
> 
> Instead of trying to fix this, which would likely mean I would have to
> install qt5-qtwebengine-freeworld in a dedicated template, the scenario
> I would like to avoid, is there perhaps a different package that I can
> install that also enables playing videos on streaming websites?
> 
> 
> [user@fedora-32-media ~]$ sudo dnf upgrade --refresh
> Fedora 32 openh264 (From Cisco) - x86_64
>     466 B/s
> | 986  B 00:02
> Fedora Modular 32 - x86_64
>     6.3 kB/s
> |  16 kB 00:02
> Fedora Modular 32 - x86_64 - Updates
>     6.3 kB/s
> |  16 kB 00:02
> Fedora 32 - x86_64 - Updates
>     5.7 kB/s
> |  14 kB 00:02
> Fedora 32 - x86_64
>     6.7 kB/s
> |  16 kB 00:02
> Qubes OS Repository for VM (updates)
>     1.5 kB/s
> | 3.8 kB 00:02
> RPM Fusion for Fedora 32 - Free
>     1.3 kB/s
> | 3.1 kB 00:02
> RPM Fusion for Fedora 32 - Nonfree
>     1.4 kB/s
> | 2.9 kB 00:02
> Dependencies resolved.
> 
>  Problem 1: package qt5-qtwebengine-freeworld-5.13.2-3.fc32.x86_64
> requires qt5-qtbase(x86-64) = 5.13.2, but none of the providers can be
> installed
>   - cannot install both qt5-qtbase-5.14.2-5.fc32.x86_64 and
> qt5-qtbase-5.13.2-4.fc32.x86_64
>   - cannot install both qt5-qtbase-5.13.2-4.fc32.x86_64 and
> qt5-qtbase-5.14.2-5.fc32.x86_64
>   - cannot install the best update candidate for package
> qt5-qtwebengine-freeworld-5.13.2-3.fc32.x86_64
>   - cannot install the best update candidate for package
> qt5-qtbase-5.13.2-4.fc32.x86_64
>  Problem 2: package vlc-core-1:3.0.9.2-3.fc32.x86_64 requires
> libdav1d.so.3()(64bit), but none of the providers can be installed
>   - cannot install both libdav1d-0.7.1-1.fc32.x86_64 and
> libdav1d-0.5.2-2.fc32.x86_64
>   - cannot install both libdav1d-0.5.2-2.fc32.x86_64 and
> libdav1d-0.7.1-1.fc32.x86_64
>   - cannot install the best update candidate for package
> vlc-core-1:3.0.9.2-3.fc32.x86_64
>   - cannot install the best update candidate for package
> libdav1d-0.5.2-2.fc32.x86_64
>  Problem 3: package vlc-1:3.0.9.2-3.fc32.x86_64 requires
> libvlccore.so.9()(64bit), but none of the providers can be installed
>   - package vlc-1:3.0.9.2-3.fc32.x86_64 requires vlc-core(x86-64) =
> 1:3.0.9.2-3.fc32, but none of the providers can be installed
>   - package vlc-core-1:3.0.9.2-3.fc32.x86_64 requires
> libebml.so.4()(64bit), but none of the providers can be installed
>   - cannot install both libebml-1.4.0-1.fc32.x86_64 and
> libebml-1.3.10-2.fc32.x86_64
>   - cannot install both libebml-1.3.10-2.fc32.x86_64 and
> libebml-1.4.0-1.fc32.x86_64
>   - cannot install the best update candidate for package
> vlc-1:3.0.9.2-3.fc32.x86_64
>   - cannot install the best update candidate for package
> libebml-1.3.10-2.fc32.x86_64
>  Problem 4: problem with installed package vlc-core-1:3.0.9.2-3.fc32.x86_64
>   - package vlc-core-1:3.0.9.2-3.fc32.x86_64 requires
> libmatroska.so.6()(64bit), but none of the providers can be installed
>   - cannot install both libmatroska-1.6.0-1.fc32.x86_64 and
> libmatroska-1.5.2-2.fc32.x86_64
>   - cannot install both libmatroska-1.5.2-2.fc32.x86_64 and
> libmatroska-1.6.0-1.fc32.x86_64
>   - cannot install the best update candidate for package
> libmatroska-1.5.2-2.fc32.x86_64
>  Problem 5: problem with installed package
> 

[qubes-users] Re: Qubes T-shirts, polos, and sweatshirts now available from HELLOTUX

2020-08-07 Thread liked2

On 2020-08-07 16:06, Claudio Chinicz wrote:

Great initiative! I'm happy and proud I've been using Qubes for an year and a 
half now.

Also, this user group is very active and has been helping people, new users as 
well as veterans and very technical people.

It's important to help fund this important Project, very relevant to all users.



There are additional ways to fund it. E.g. with regular (small) payments:
https://opencollective.com/qubes

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b21857c-2577-5375-ea7e-aa5e553a16bb%40gmx.de.


[qubes-users] Qubes T-shirts, polos, and sweatshirts now available from HELLOTUX

2020-08-07 Thread Claudio Chinicz
Great initiative! I'm happy and proud I've been using Qubes for an year and a 
half now.

Also, this user group is very active and has been helping people, new users as 
well as veterans and very technical people.

It's important to help fund this important Project, very relevant to all users.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17a3b559-0f28-4746-af4c-6c3f9e758cc9o%40googlegroups.com.


Re: [qubes-users] Memory snapshot

2020-08-07 Thread 'awokd' via qubes-users
martinga...@gmail.com:
> Hello, I'm running a VM which is suspected to contain malware. Therefore I 
> would like to get a snapshot of the VM's RAM in order to further analyze it.
> 
> Can this be done in Qubes? 

Qvm-pause might do it. Not sure where it saves the file for memory.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9470e018-70d2-240c-89b9-e604d31f1036%40danwin1210.me.


Re: [qubes-users] network installation of qubes

2020-08-07 Thread 'awokd' via qubes-users
flatten:
> I know the traditional way of installing qubes using usb drives. Can qubes
> provide network installation (using iPXE or something else)?

I remember someone got Qubes installed by PXE boot. Search for how to
install Fedora via PXE, it would be similar.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b9427d6-4bc9-1035-eeae-29d755532556%40danwin1210.me.


Re: [qubes-users] Re: Whonix-gw: trouble after disabling passwordless root access

2020-08-07 Thread fiftyfourthparallel
On Thursday, 6 August 2020 22:24:38 UTC+8, 54th Parallel wrote:
>
>
> There might be potential attacks against the hypervisor or 
> daemons/backends in dom0 that require root access. Qubes founder Joanna 
> Rutkowska initially assessed there was limited benefit from isolating the 
> root account from the user account, because all user data is already 
> accessible from the latter 
>  
> [archive] 
> .
>  
> However, she later changed her opinion on the matter; see here 
> 
>  [archive] 
> 
> .
>
>
Upon reading that more carefully, I realized that it's explicitly about 
dom0, but I think the general concept applies to other VMs as well. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/88dd8065-2729-421f-81e0-0fac66ac5f73o%40googlegroups.com.


[qubes-users] Qubes dom0-update-guard script

2020-08-07 Thread fiftyfourthparallel
Informed by a recent post 
, 
I've decided to start writing a script that takes a Qubes installation's 
list of packages installed in dom0 and compare them to the list of 
available packages in the chosen repo (e.g. 'current') to ensure that the 
update process hasn't been interfered with by an adversary that has taken 
advantage of Fedora's insecure updating mechanism (detailed in the thread 
linked earlier). I'm motivated to do this because this seems to be a flaw 
that can give attackers the key to the kingdom by blocking patches to dom0 
or Xen. 

Since I'm not a programmer (I know *basic* Python), this will be a learning 
experience for me, so stay tuned and please point out any issues/errors you 
spot in my updates. I'd appreciate it if someone felt charitable enough to 
point me towards useful commands/functions, but I'd be fine learning the 
hard way too--I need to start learning programming *somewhere*, and this 
seems to be a good place to start.

Right now my plan is to take the output of 'rpm -qa' or 'yum list 
installed' and compare it via some sort of 'match' or 'crosscheck' function 
to a repo list pulled from somewhere secure (i.e. not tampered with by 
potential adversaries) and maybe imported into dom0 from a specialized 
secure appVM, creating a security tradeoff.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8df94b46-4dc1-445f-b994-47419a2ac797o%40googlegroups.com.


Re: [qubes-users] Questions: Protection against local forensics/privacy problems with Fedora sys-net, sys-firewall

2020-08-07 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2020-08-06 7:47 PM, shie1ohk via qubes-users wrote:
> 2) Is there an easy way to save the qubes-os.org wiki locally?
>

Yes. As explained on the Documentation Guidelines page [1], "All Qubes
OS documentation pages are stored as plain text files in the dedicated
qubes-doc repository. [2] By cloning and regularly pulling from this
repo, users can maintain their own up-to-date offline copy of all
Qubes documentation rather than relying solely on the web."

In fact, you can save the entire Qubes OS website this way. [3]


[1] https://www.qubes-os.org/doc/doc-guidelines/
[2] https://github.com/QubesOS/qubes-doc
[3] https://github.com/QubesOS/qubesos.github.io

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=1LsF
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/accecbae-27e8-3bb3-ce66-fae89ffcb5a9%40qubes-os.org.


[qubes-users] Questions: Protection against local forensics/privacy problems with Fedora sys-net, sys-firewall

2020-08-07 Thread shie1ohk via qubes-users
The Whonix Wiki recommends disabling core dumps and swap. The idea is to
protect against local forensics by reducing usability.
1.1) Is this also recommended for Qubes-Whonix?
1.2) How can I do this?
1.3) What are the security implications? Is it recommended?

2) Is there an easy way to save the qubes-os.org wiki locally?

Fedora templates, which can be ping home (sys-net, sys-firewall) using
some captive portal detection.
My idea was to replace them with Debian.
3.1) Can I do this by simply replacing the templates?
3.2) Is there an instruction how to build a fresh sys-net, sys-firewall
from a debian 10-minute template?
3.3) What are the security implications? Is it recommended?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a90c0a6dd20ff651ee65d1554461246d.squirrel%40danielas3rtn54uwmofdo3x2bsdifr47huasnmbgqzfrec5ubupvtpid.onion.


[qubes-users] Qubes T-shirts, polos, and sweatshirts now available from HELLOTUX

2020-08-07 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi all,

Thanks to Frédéric, Qubes T-shirts, polos, and sweatshirts are now
available from HELLOTUX. A small portion of each purchase will be
donated back to the Qubes OS Project.

Please see this page for additional Qubes merchandise options and
general information:

https://www.qubes-os.org/merchandise/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=b+xD
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87eaeb72-89b0-5305-8bcd-29d64e929e70%40qubes-os.org.