Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-05 Thread Frank
> On 5. Oct 2020, at 16:16, Stumpy stumpy-at-posteo.co wrote:
> My computer actiing strange like some appvms not opening so i decided to 
> restart and restarted normally and booted back up fine except now i can 
> hardly open anything. Appvms will not start, I tried to do a backup from dom0 
> term and that gave me an error, tried to run qubes-qube-manager and that gave 
> me a similar error... I'm at a loss. Of course I just finished doing some 
> important work and didnt immediately backp (usually bkup weekly).
> I am not thrilled about reinstalling but can do it, but really really really 
> want to back up my appvms before nuking everything. If i cant use the regular 
> backup is there a way i can just copy things? I think I can still mount an 
> external drive...

This should give you all the information necessary to get your data saved:

https://www.qubes-os.org/doc/mount-from-other-os/

Regards, Frank

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/14455-1601963217-340060%40sneakemail.com.


Re: [qubes-users] Any Advantage to using OpenHAB on qubes?

2020-10-05 Thread Manuel Amador (Rudd-O)
On 30/09/2020 15.35, Stumpy wrote:
>
> I want OpenHAB to stay up to date but do not want it to be accessible
> via the internet so i was thinking if I have a template with OpenHAB
> installed that would install OpenHAB and hopefully plugins?
> The thing is I am hoping to have wifi cameras, or at least PoE cameras
> connected so it was less clear to me if i would be able to have an
> OpenHAB appvm that was not connected to the internet, or blocked from
> the network, but able to communicate with these various wireless devices?
>
Qubes can support restrictions on outbound traffic of your OpenHAB
instance by using the firewall rules built into the qube settings screen.

If you want to support inbound traffic you can use
https://github.com/rudd-o/qubes-network-server but you will then have to
manage your firewall rules on your own directly in the OpenHAB qube.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e83e72eb-9bdb-06ef-0c4e-2e739de87319%40rudd-o.com.


Re: [qubes-users] Firewall issue

2020-10-05 Thread Manuel Amador (Rudd-O)
On 22/09/2020 07.05, 'src11' via qubes-users wrote:
> When I go into any qube settings for the firewall there is only an
> option to create and edit rules for outgoing traffic, nothing at all
> for incoming connections. Is that right? When I look at screenshots
> online it shows options for creating both outgoing and incoming
> connection rules. Latest version of Qubes. 

To support inbound connections you will need
https://github.com/rudd-o/qubes-network-server and after installing it
as per the instructions you will have to adjust nftables / iptables
rules in the target VM.

-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a67d8ab0-b363-2f9d-5a71-6751594e6fe5%40rudd-o.com.


[qubes-users] Article: "New Gentoo templates and maintenance infrastructure" by Frédéric Pierret

2020-10-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Frédéric Pierret has just published the following article:

https://www.qubes-os.org/news/2020/10/05/new-gentoo-templates-and-maintenance-infrastructure/

The plain text of this article is reproduced below.

===

"New Gentoo templates and maintenance infrastructure"
by Frédéric Pierret

_This is the third article in the "What's new in Qubes 4.1?" series. 
Previously: [The New Qrexec Policy 
System](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/) and 
[The GUI Domain](https://www.qubes-os.org/news/2020/03/18/gui-domain/)._

New Gentoo templates
- 

The work I've been doing on Gentoo templates is finally ready to be released! 
The corresponding issue is 
[#4412](https://github.com/QubesOS/qubes-issues/issues/4412), where you can 
find almost every related piece of work. I would like to highlight that this 
has been a great opportunity to collaborate with the Gentoo core team, and 
multiple improvements have been implemented on the Gentoo side thanks to the 
help of Gentoo devs **mgorny** and **zmedico**. When I encountered issues, I 
appreciated the quick response from several maintainers of different Gentoo 
components.

Why a Gentoo template? Gentoo is designed for users who want to customize a 
Linux distribution to fit their specific needs. The benefit in Qubes is that it 
allows one to create highly customized and hardened TemplateVMs (or 
StandaloneVMs). For example, one could customize the Gentoo Qubes Builder to 
create a [ClipOS](https://clip-os.org/en/) build.

The new Gentoo templates are available in tree flavors. The [default 
(Gnome)](https://www.qubes-os.org/doc/templates/gentoo/), 
[minimal](https://www.qubes-os.org/doc/templates/minimal/), and 
[XFCE](https://www.qubes-os.org/doc/templates/xfce/). Currently, they are 
available in the `qubes-templates-community-testing` repo, and they'll soon be 
in the `qubes-templates-community` repo.

Maintenance infrastructure
- --

In order to keep the new Gentoo template in good working condition, we need a 
set of automated tests. The bare minimum is continually testing whether just 
building the template still works. Due to the nature of Gentoo, such tests 
require far more resources (time, CPU power) than are available for open-source 
projects on Travis CI (which we use for testing other templates). We use Travis 
CI as a bare minimum for validating every pull request, then it generally goes 
to openQA. Here, the issue with Gentoo is that, by definition, it's a source 
distribution, so everything needs to be rebuilt. Travis allows a maximum 
timeout of something like 50 minutes for jobs. Simply rebuilding a Qubes 
component for Gentoo takes several hours (and more than half a day for each 
template). So, Travis is out.

I've set up in our pull request pipeline the use of a feature of Gentoo that 
allows us to get pre-built binaries from a mirror. For that, when I build a 
full template, I push a fresh repository with every package built on my mirror. 
But still, even when doing this, hours are needed for jobs. I didn't want to 
give up on this, so, after evaluating several options, I decided to set up my 
own self-hosted GitLab CI instance. For that, I've developed a service that I 
call 
[qubes-g2g-continuous-integration](https://github.com/fepitre/qubes-g2g-continuous-integration/),
 forwarding selected GitHub pull requests to my GitLab CI instance.

In consequence, I can manage the allocated resources for Gentoo builds, and we 
now have the means to validate every pull request for each component that has 
been integrated into Gentoo. A check status appears on GitHub side-by-side with 
Travis checks for other distros where everyone can access the build logs too. 
Here is an 
[example](https://gitlab.notset.fr/fepitre-bot/qubes-app-linux-input-proxy/-/pipelines/346).
 By the way, this is also what we use for automatically checking kernel pull 
requests. Here is a [recent pull 
request](https://github.com/QubesOS/qubes-linux-kernel/pull/276). When viewing 
the checks, you can see the results for the kernel builds. Once again, it's 
because the build time is superior to what Travis allows.

Conclusion
- --

All this infrastructure is intended not only for the kernel and Gentoo, but 
also to help Arch Linux users. Depending on the needed resources, we could also 
add the longer Arch Linux jobs into my GitLab CI instance, because we currently 
don't properly validate the template itself.

In general, this new infrastructure allows us to create and test pipelines that 
require a lot of resources. Combined with Travis and openQA, we have another 
layer to rely on for validating and automating the building of cutting edge 
templates like Gentoo and Arch Linux. While the same kinds of features are 
available on paid GitLab plans, I preferred to 

[qubes-users] Announcement: "Qubes OS contributed packages are now available" by Marek Marczykowski-Górecki

2020-10-05 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Marek has just published the following announcement:

https://www.qubes-os.org/news/2020/10/05/qubes-os-contributed-packages/

The plain text of this announcement is reproduced below.

==

"Qubes OS contributed packages are now available"
by Marek Marczykowski-Górecki

We are happy to announce the availability of Qubes OS contributed packages 
under the [QubesOS-contrib] GitHub Project. This is a place where our community 
can [contribute Qubes OS related packages, additions and various 
customizations][package-contrib]. Meanwhile, we provide the infrastructure and 
[review process] necessary to make them available easily and safely to users 
within standard Qubes installations.

[Frédéric Pierret] built the infrastructure based on a similar setup for 
building official packages. This means that it features the same [Qubes build 
security] measures, including keeping the signing keys separate in a dedicated 
VM, downloading packages over Tor, publishing build logs in a non-spoofable way 
and more. Frédéric is also the maintainer of [QubesOS-contrib].
The source code repositories of the packages and infrastructure-related parts 
are also hosted under [QubesOS-contrib].

To contribute a package, follow the process described at [package 
contributions]. You will find a few helpful tips there, including a [skeleton 
repository] with example RPM packaging and [Qubes Builder] integration.
Since the project has been running for some time already, there are already 
some submitted packages available there. To name a few:

 - [qubes-tunnel]
 - [qvm-screenshot-tool]
 - [qmenu]

You can find the full list at [QubesOS-contrib].

If you want to install one of these packages, first you need to enable the 
repository in your system (dom0 and/or templates). This can be done by 
installing the `qubes-repo-contrib` package. This package includes the 
repository definition and keys necessary to download, verify, and install 
[QubesOS-contrib] packages.

In dom0, use `qubes-dom0-update`:

sudo qubes-dom0-update qubes-repo-contrib

In a Fedora-based template, use `dnf`:

sudo dnf install qubes-repo-contrib

In a Debian-based template, use `apt`:

sudo apt update && sudo apt install qubes-repo-contrib


[QubesOS-contrib]: https://github.com/QubesOS-contrib/
[package-contrib]: https://www.qubes-os.org/doc/package-contributions/
[review process]: 
https://www.qubes-os.org/doc/package-contributions/#review-procedure
[Frédéric Pierret]: https://www.qubes-os.org/team/#fr%C3%A9d%C3%A9ric-pierret
[Qubes build security]: https://www.qubes-os.org/news/2016/05/30/build-security/
[package contributions]: https://www.qubes-os.org/doc/package-contributions/
[skeleton repository]: https://github.com/QubesOS-contrib/qubes-skeleton/
[Qubes Builder]: https://www.qubes-os.org/doc/qubes-builder/
[qubes-tunnel]: https://github.com/QubesOS-contrib/qubes-tunnel
[qvm-screenshot-tool]: https://github.com/QubesOS-contrib/qvm-screenshot-tool
[qmenu]: https://github.com/QubesOS-contrib/qmenu

==

-BEGIN PGP SIGNATURE-
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=tYPp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d25ebc13-6944-f035-1c2d-d9e3df17070e%40qubes-os.org.


Re: [qubes-users] Installing QubesOS on a System76 with Coreboot

2020-10-05 Thread Oliver




Has anyone had success installing QubesOS on a System76 laptop that
uses Coreboot?



Yes, search this list for "Guide to installing Qubes on System76 Darter 
Pro".


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2fbba5d4-0615-8aa0-49b5-6e759e646e5f%40gmail.com.


[qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-05 Thread Stumpy
 

My computer actiing strange like some appvms not opening so i decided to
restart and restarted normally and booted back up fine except now i can
hardly open anything. Appvms will not start, I tried to do a backup from
dom0 term and that gave me an error, tried to run qubes-qube-manager and
that gave me a similar error [1]... I'm at a loss. Of course I just
finished doing some important work and didnt immediately backp (usually
bkup weekly).

I am not thrilled about reinstalling but can do it, but really really
really want to back up my appvms before nuking everything. If i cant use
the regular backup is there a way i can just copy things? I think I can
still mount an external drive...
 

Links:
--
[1] https://pasteboard.co/JufhRoH.jpg

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9706eff53bd976879c1f41c54335cc5c%40posteo.net.


Re: [qubes-users] Troubleshooting Installation of Windows 10 in Qubes OS

2020-10-05 Thread 'awokd' via qubes-users
Qubes:
> On 10/5/20 10:21 AM, Knut von Walter wrote:
>> Hi,
>>
>> at the moment I am trying to install Windows 10 following this
>> instruction, link: _https://www.qubes-os.org/doc/windows-vm/_. However
>> Windows is not booting. After clicking on ”Boot from CDROM”. I get the
>> following error-message:
>>
>> Qube-Status: windows 10: Domain windows-10 has failed to start: Cannot
>> connect to qrexec agent for 60 seconds, see
>> /var/log/xen/console/guest-windows-10.log for details.
>>
>> Has anyone an idea how to solve this? All help is appreciated.
>>
>> Thank you.
>>
>> Best Knut von Walter
>>
>>  
> How much memory do you have assigned to the VM?
> 
Also recommend using
https://github.com/elliotkillick/qvm-create-windows-qube if you aren't,
just pay attention to the Windows 10 note. There's a mandatory manual
step at the end.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f4412a1-9028-da42-22e8-1e83c33de9ab%40danwin1210.me.


[qubes-users] Focal template and packages

2020-10-05 Thread unman
I've put in PRs to allow for build of focal packages and template, on
Fedora 32 build system. These should be merged soon, and will allow you
to select Focal as a target in ./setup, run make get-sources, make qubes-vm, and
make template.

As always, I recommend that you build from source yourself - it really
isn't difficult.
If you are not sure about building for yourself, or don't have time,
I've made a pre-built template available at https://qubes.3isec.org/Templates

All my templates, packages and repositories are signed with
my Qubes Signing key - you can get this from any keyserver. You
should check this against other sources - the Qubes-Users mailing list, 
[GitHub](https://github.com/unman/unman/blob/master/gpg-keys.asc), maybe another
keyserver over Tor.

You should do something like this, in a disposableVM:
Download the template from https://qubes.3isec.org/Templates

Once you have downloaded and confirmed my "Qubes OS signing key", add it to
your rpm keyring:
`sudo rpm --import `

Check the signature on the template:
`rpm -K `
If all is well you will see "digests signatures OK"

Once you are satisfied, install the Template.
To do this you will need to copy it to dom0. In dom0 run:
`qvm-run -p   'cat ' > focaltemplate`

Then install, in dom0 :
`sudo dnf install focaltemplate`



You can also add the repository to a StandAlone focal qube, and install
normal range of Qubes packages, for better integration with the system.

Cheers

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20201005140147.GA15434%40thirdeyesecurity.org.


[qubes-users] adnroid in qubes / anbox

2020-10-05 Thread evado...@gmail.com
anbox dot io
is it possible to start use with qubes? 
Looks promising! But request some kernel modules and as I understand it is 
the problem. 
Any ideas how to run it?
or any other alternative?
thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b453701-376f-4044-a1d9-569183ad29a8n%40googlegroups.com.


Re: [qubes-users] Troubleshooting Installation of Windows 10 in Qubes OS

2020-10-05 Thread Qubes

On 10/5/20 10:21 AM, Knut von Walter wrote:

Hi,

at the moment I am trying to install Windows 10 following this
instruction, link: _https://www.qubes-os.org/doc/windows-vm/_. However
Windows is not booting. After clicking on ”Boot from CDROM”. I get the
following error-message:

Qube-Status: windows 10: Domain windows-10 has failed to start: Cannot
connect to qrexec agent for 60 seconds, see
/var/log/xen/console/guest-windows-10.log for details.

Has anyone an idea how to solve this? All help is appreciated.

Thank you.

Best Knut von Walter

  


How much memory do you have assigned to the VM?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/591ae9b3-ed12-febb-f6e3-e7c19ae618e4%40ak47.co.za.


[qubes-users] Troubleshooting Installation of Windows 10 in Qubes OS

2020-10-05 Thread Knut von Walter
Hi,

at the moment I am trying to install Windows 10 following this
instruction, link: _https://www.qubes-os.org/doc/windows-vm/_. However
Windows is not booting. After clicking on ”Boot from CDROM”. I get the
following error-message:

Qube-Status: windows 10: Domain windows-10 has failed to start: Cannot
connect to qrexec agent for 60 seconds, see
/var/log/xen/console/guest-windows-10.log for details.

Has anyone an idea how to solve this? All help is appreciated.

Thank you.

Best Knut von Walter

 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fb87b3da-fec8-5d88-6cab-96cd2d59d997%40websecur.eu.


[qubes-users] Re: Thunderbird 78.2.1

2020-10-05 Thread Frédéric Pierret


Le 2020-09-10 à 09:09, Frédéric Pierret a écrit :
> Hi,
> Just a little update to let you know that I've built Thunderbird 78.2.1 for 
> Fedora 31 and 32 (33 soon I need to debug a failing build): 
> https://copr.fedorainfracloud.org/coprs/fepitre/thunderbird-78/build/1654837/
> 
> If someone wants to try it (**don't upgrade your template** or do it at your 
> own risk):
> 
> $ sudo dnf copr enable -y fepitre/thunderbird-78
> $ sudo dnf update thunderbird
> 
> As we are currently implementing tests 
> (https://github.com/fepitre/qubes-app-linux-split-gpg/tree/tb78) for 
> Thunderbird 78 and their PGP implementation, until Fedora and other distros 
> have upgraded their version, we plan to use my COPR repo for validating the 
> Qubes Slit GPG mechanism.
> 
> Best regards,
> Frédéric
> 

Hi,

Following my previous email, Fedora is now building and testing Thunderbird 
78.3.1 for rawhide (https://src.fedoraproject.org/rpms/thunderbird). They will 
certainly upgrade current stable versions soon. We have made a specific 
documentation for Thunderbird 78 and higher for configuring Split GPG without 
Enigmail. Please have a look here: 
https://www.qubes-os.org/doc/split-gpg/#thunderbird-78-and-higher. You can 
already try to configure and test yourself by using builds I've made for Fedora 
31 and 32 on my COPR repository.

Best regards,
Frédéric

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de72f17f-a589-5632-6bed-460566d4bf0b%40qubes-os.org.


signature.asc
Description: OpenPGP digital signature