Re: [EXT] [qubes-users] placement of windows after re-logging in

2022-09-14 Thread Ulrich Windl

On 9/6/22 07:19, Boryeu Mao wrote:
When logging back in, the windows in the workspace are re-opened - is it 
possible to have them positioned just as they were before the last 
logging out?  I have R.4.1.1 with xfce.  Thanks in advance.


--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3a20d7e-3f59-40d5-b633-311285161c5dn%40googlegroups.com 
.


Somehow that seems to have been the default in 4.0, but not in 4.1.1.

Ulrich

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b15a44c2-30a2-ca3a-e4e2-41ae9e37c625%40rz.uni-regensburg.de.


Re: [EXT] Re: [qubes-users] Problems with debian-11 after VM update attempt

2022-09-14 Thread Ulrich Windl

On 8/9/22 11:11, Demi Marie Obenour wrote:

On Mon, Aug 08, 2022 at 11:29:57PM +0200, Ulrich WIndl wrote:

Hi!



I have a problem 8-(



After using Qubes OS after a longer break, I tried to install all updates.
That worked for all template VMs except debian-11. Even when re-trying after
all the rest was updated and the system rebooted, it won't work.



Even worse I can start a debian-11-based app VM, but I cannot launch any
program there. Even "qvm-run debian-11 gnome-terminal" fails.



I have saved the lengthy protocol of the first attempt, however (attached).



It seems the problem was:



Unpacking thunderbird (1:91.12.0-1~deb11u1) over (1:91.8.0-1~deb11u1) ...
 dpkg: error processing archive
/tmp/apt-dpkg-install-GfbHjN/38-thunderbird_1%3a91.12.0-1~deb11u1_amd64.deb
(--unpack):
  cannot copy extracted data for
'./usr/share/thunderbird/omni.ja' to
'/usr/share/thunderbird/omni.ja.dpkg-new': failed to write (No space left on
device)
 dpkg-deb: error: paste subprocess was killed by
signal (Broken pipe)



Note: It's not pool00 that is full. How can I recover from this?



(I'm still at Qubes OS 4.0. I wanted to install the last updates, then
backup, then try upgrading to 4.1)


You don’t actually need to install the latest updates first, FYI.  I
suggest just upgrading.

This particular problem means that your debian-11 template’s privage
volume is full.  Growing it via the GUI should fix it.

>

I went the way via updating to 4.1.1, causing a downtime for a few weeks 
8-( I'm only using Qubes OS occasionally, so I did most work using other 
OSes...


Ulrich

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4429341f-609b-77f4-c175-e805c1da227d%40rz.uni-regensburg.de.


Re: [EXT] Re: [qubes-users] Installer does not work, no templates to install

2022-09-14 Thread Ulrich Windl

On 7/31/22 15:23, 'awokd' via qubes-users wrote:

'felix' via qubes-users:
I want to reinstall Qubes 4.1, but I cannot select any templates in 
the installer.


Qubes 4.0 and 4.1 were already running successfully on my device and 
Qubes 4.0 can still be installed successfully.


In the install menu, Fedora, Debian and Whonix are missing from the 
software selection, which is why all templates and app vm's are 
missing after the installation and only dom0 remains.


I've seen this before when the USB drive gets only partially created. 
Make sure it's large enough for the bigger 4.1 image, and if you didn't 
use DD to create it, try that route.




A common pitfall when creating the stick with Linux is that even after 
DD had finished, Linux stil ldoes writeback the dirty buffers.

If you have a slower stick without an LED, you are heading fro trouble.
Maybe try a sync before ejecting the stick.

Regards,
Ulrich

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac55ee1c-d971-dec7-9102-36b733f4cf10%40rz.uni-regensburg.de.


Re: [EXT] [qubes-users] Regarding Impact of US Export controls on Qubes.

2022-09-14 Thread Ulrich Windl

Hi!

Actually I think you might have even problem _in_ the country where you 
use it. Also: Do you _export from_ the US, and is Qubes OS an US 
product? As seen with PGP, preventing to export open source software is 
somewhat ridiculous.


Ulrich

On 7/10/22 18:44, Anish M wrote:
Hi , i am wondering if i am a user from cuba or iran , am i supposed to 
use qubes in first place. i saw in fedora download page that people from 
sanction hit areas should not use fedora . since qubes is based 
on fedora , i am wondering on impact of US Export controls.


--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAABcHkDN%2BzkuZsKj%2B%2BP%3D3OgPBut1mU_VDYacjp5v%3DG9eS7PUBg%40mail.gmail.com 
.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/656a6fd0-6a55-e92b-32d2-dde1c934b3d2%40rz.uni-regensburg.de.


[EXT] Re: [qubes-users] "Upgrading" by installing

2022-09-14 Thread Ulrich Windl
Hi!

As it turned out I needed just an extra boot. At least when having mounted the 
backup volume in Dom0 manually I was able to restore when I couldn't before.
Another confusing thing is that when leaving the first screen nothing seems zo 
happen, but I noticed the CPU fan spinning up for a few seconds until the next 
screen appears. Maybe add some progress indicator...

Regards
Ulrich

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5c7ad49b-3d36-43ac-ad45-07f43913f145%40rz.uni-regensburg.de.


[qubes-users] Time wtong if RTC runs local time

2022-09-14 Thread Ulrich Windl
Hi!

Traditionally my TTC tuns local time. That wasn't a problem in Qubes OS 4.0, 
but in 4.1 Qubes OS assumes RTC runs UTC. How can I fix that?

Regards
Ulrich

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a64980ca-6cf2-4531-ba4f-5fe613e95458%40rz.uni-regensburg.de.


[qubes-users] Qubes Canary 032

2022-09-14 Thread Andrew David Wong
Dear Qubes Community,

We have published Qubes Canary 032. The text of this canary is
reproduced below.

This canary and its accompanying signatures will always be available in
the Qubes security pack (qubes-secpack).

View Qubes Canary 032 in the qubes-secpack:



Learn how to obtain and authenticate the qubes-secpack and all the
signatures it contains:



View all past canaries:



```

---===[ Qubes Canary 032 ]===---


Statements
---

The Qubes security team members who have digitally signed this file [1]
state the following:

1. The date of issue of this canary is September 13, 2022.

2. There have been 84 Qubes security bulletins published so far.

3. The Qubes Master Signing Key fingerprint is:

   427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494

4. No warrants have ever been served to us with regard to the Qubes OS
   Project (e.g. to hand out the private signing keys or to introduce
   backdoors).

5. We plan to publish the next of these canary statements in the first
   fourteen days of December 2022. Special note should be taken if no new
   canary is published by that time or if the list of statements changes
   without plausible explanation.


Special announcements
--

We plan to create a new Release Signing Key (RSK) [3] for Qubes OS 4.2.
Normally, we have only one RSK for each major release. However, for the
4.2 release, we will be using Qubes Builder version 2, which is a
complete rewrite of the Qubes Builder. Out of an abundance of caution,
we would like to isolate the build processes of the current stable 4.1
release and the upcoming 4.2 release from each other at the
cryptographic level in order to minimize the risk of a vulnerability in
one affecting the other. We are including this notice as a canary
special announcement since introducing a new RSK for a minor release is
an exception to our usual RSK management policy.


Disclaimers and notes
--

We would like to remind you that Qubes OS has been designed under the
assumption that all relevant infrastructure is permanently compromised.
This means that we assume NO trust in any of the servers or services
which host or provide any Qubes-related data, in particular, software
updates, source code repositories, and Qubes ISO downloads.

This canary scheme is not infallible. Although signing the declaration
makes it very difficult for a third party to produce arbitrary
declarations, it does not prevent them from using force or other means,
like blackmail or compromising the signers' laptops, to coerce us to
produce false declarations.

The proof of freshness provided below serves to demonstrate that this
canary could not have been created prior to the date stated. It shows
that a series of canaries was not created in advance.

This declaration is merely a best effort and is provided without any
guarantee or warranty. It is not legally binding in any way to anybody.
None of the signers should be ever held legally responsible for any of
the statements made here.


Proof of freshness
---

Tue, 13 Sep 2022 02:47:47 +

Source: DER SPIEGEL - International 
(https://www.spiegel.de/international/index.rss)
Poland's Prime Minister on Ukraine War and Energy Crisis
Habeck's Meltdown: Nuclear Energy Standby Proposal Has Germany's Greens Seeing 
Red
European Commissioner Gentiloni: "The Coming Winter Could Be One of the Worst 
in History"
Russian Meddling in the Balkans: "Over and Over, Putin Says Kosovo, Kosovo, 
Kosovo!"
Laos and the New Silk Road: The Train to Dependence on China

Source: NYT > World News 
(https://rss.nytimes.com/services/xml/rss/nyt/World.xml)
Ukraine’s Sudden Gains Prompt New Questions for Commanders
Russian Critics Speak Out, Prompted by Ukraine Losses
King Charles Pays Tribute to Queen Elizabeth on a Day Steeped in Tradition
Oppressive Blackouts Force Lebanese to Change Rhythm of Life
Ukraine Claims More Ground in Northeast and South

Source: BBC News - World (https://feeds.bbci.co.uk/news/world/rss.xml)
Ukraine war: We retook 6,000 sq km from Russia in September, says Zelensky
Ukraine war: What will Russia's losses mean for Putin?
Ukraine war: A successful surprise attack - but danger still looms
Sweden election: Result could take days as vote too close to call
Taoiseach: Queen's death 'reminder to nurture UK-Ireland relations'

Source: Blockchain.info
0002fb0e59c723277069b5389aa2df4b8ff6dc8d80da6ad4


Footnotes
--

[1] This file should be signed in two ways: (1) via detached PGP
signatures by each of the signers, distributed together with this canary
in the qubes-secpack.git repo, and (2) via digital signatures on the
corresponding qubes-secpack.git repo tags. [2]

[2] Don't just trust the contents of this file blindly! Verify the
digital