Re: [qubes-users] Network hardware not recognized in Debian-based NetVM

2017-01-17 Thread 'Joshua Bashir Gabriel' via qubes-users
 Original Message 
Subject: Re: [qubes-users] Network hardware not recognized in Debian-based NetVM
Local Time: January 11, 2017 5:26 PM
UTC Time: January 11, 2017 10:26 PM
From: a...@qubes-os.org
To: Joshua Bashir Gabriel <joshuabashirgabr...@protonmail.com>, 
qubes-users@googlegroups.com <qubes-users@googlegroups.com>

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 01/11/17 14:18, 'Joshua Bashir Gabriel' via qubes-users wrote:
> Hello,
>
> Although the default NetVM in Qubes is based on Fedora, I wanted to
> be able to use NetworkManager 1.4.2 to automatically spoof my MAC
> address when connecting to networks. In order to do this, I
> followed the instructions here:
>
> https://www.qubes-os.org/doc/anonymizing-your-mac-address/
>
> I created a new template for Debian 9 as instructed, then created a
> new NetVM from that template and added the Network Connections app
> to it, as well as my WiFi adapter (under the Devices tab).
>
> However, the Debian-based NetVM will not see the hardware. The
> Fedora-based NetVM can see it fine, but when I power that down and
> power up the Debian-based VM, no such luck.
>
> I am running Qubes 3.2 with all the latest updates applied. This
> email was sent from a Firefox session inside a disposable VM, so I
> know using the Fedora-based NetVM works. I also created additonal
> NetVMs based on Fedora, Debian 8, and Debian 9. The Debian-based
> NetVMs do not see my WiFi card. The Fedora-based NetVM does.
>
> Any advice would be very appreciated.
>
>
> Thanks, Bash
>

Perhaps you have the required drivers in your Fedora template but not
your Debian template. You may want to investigate whether they're
available in a Debian package.

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYdrEHAAoJENtN07w5UDAweZMP/jdYXuWNLHJ4oxdan5YOWimx
OltWijWNGkUjmA0D//hpSso8UAro8eBK2sWj0CcH0qlRi25gD7Dvpf4ufscd2X9S
O1kZ6ztq2rQKy8A87HWO/vTd5MR8Wu4meYOZtOJ7PHwkzZb/6x0v9QSoqwMDE5Xu
yAKpCV1LY5WdsFTlAi75vcPmiUKpmPcuCmhuD+2Y89Y83jEKJpAR0OxqVnEt/XQp
vorA5IIFvp7DN+mPnVloFS430JgEWCziM6WW1rMUvnXjU1sveVjtFFs+aU02BOPa
vRPOGDw7IzULN+NiZp3i1L/93dKkxEihoqm3ebwYSl0hGc9mxhyyRkDc6TP0NvxL
/oUe47FY3ieqgt95drE9icX2kNlF+46xkh42dSZuMU4/9FTaSqTDiE1OvEEhvzxq
qBPTwG+pRwRTmVqTZTE7PrYnQJX09hMj9BgleMwdt9NkJfh4A3NhNd8ZPYaImwDR
vlBPGqNLlsThvE12GJTpmE+Ct+93x5EmF7AcRNkpeJK51jN1GzqZ/pR0rGjjISBT
JNdtX9nfYbJCTLdL3T2RqF8F9fOY+OuMGY3DS5y0VR51kG88oQa0uKM+aA5ynAFJ
aa4TxYNHKA1tKzU7FFa6hD1EgR6/gGVMeqI32xDS3dFLcEhMH/oXoaTVcE5jtLX1
27Q0w19AY1LSWluGcrmF
=/OP4
-END PGP SIGNATURE-

Update: Got it working. It needed the wifi drivers for Debian 8/9, as well as a 
couple of other utilities, found here: https://wiki.debian.org/WiFi.

Also, I added the client for PrivateInternetAccess.com to the Net VM so I have 
a single netvm with always-on VPN.


Cheers,
Bash

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/GBA3VSFlt9Y7MCwnbvkNVQIi-Pht4sSrWpwFQ8WE_XRpt1nblToF1Ghv5KANWZx485UC32q54JpgJURRD06p6kWBJdwVLsIZgdJX1ml8ccs%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Network hardware not recognized in Debian-based NetVM

2017-01-11 Thread 'Joshua Bashir Gabriel' via qubes-users
Hello,

Although the default NetVM in Qubes is based on Fedora, I wanted to be able to 
use NetworkManager 1.4.2 to automatically spoof my MAC address when connecting 
to networks. In order to do this, I followed the instructions here:

https://www.qubes-os.org/doc/anonymizing-your-mac-address/

I created a new template for Debian 9 as instructed, then created a new NetVM 
from that template and added the Network Connections app to it, as well as my 
WiFi adapter (under the Devices tab).

However, the Debian-based NetVM will not see the hardware. The Fedora-based 
NetVM can see it fine, but when I power that down and power up the Debian-based 
VM, no such luck.

I am running Qubes 3.2 with all the latest updates applied. This email was sent 
from a Firefox session inside a disposable VM, so I know using the Fedora-based 
NetVM works. I also created additonal NetVMs based on Fedora, Debian 8, and 
Debian 9. The Debian-based NetVMs do not see my WiFi card. The Fedora-based 
NetVM does.

Any advice would be very appreciated.


Thanks,
Bash

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/VKjARPkjhmmf4fi-dU0yre22yTFY3MCsWtCnh0ElUreeErpy5cPsd6utRWvpl61UoLgb1xjXgneV70M_w5XMYUkF6vQ3J0mOx1W7ydW0NU0%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Unable to get right X display for kali on HVM

2016-10-07 Thread 'Gabriel' via qubes-users
Had the same issue on my Dell.
Both the xfce and lxde editions work fine though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/yW-j3jHlWQ3L_RTfuMEy2xEEIavDrHHrp55jgl4u5FqpRFECwo2OARRvLdasCZgxvsnVj0a-qEcVBJuI-Go1LfLP6tyd5chXFp5m9cdQb0w%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] backup

2016-09-28 Thread 'Gabriel' via qubes-users
On 2016-09-27 06:59, 'Gabriel' via qubes-users wrote:
> Hi fellows,
>
> I started using qubes a while ago and I have a question concerning backups.
> What I want is a complete backup to a dedicated external USB HDD. I 
> understand to achieve this all the VMs must be shut down.
> Therefore when I plugged in the HDD I mounted it in dom0 under /mnt.
>

>This is fine as long as you trust the USB device you're attaching to dom0. If 
>you don't, consider using a USB qube instead:

>https://www.qubes-os.org/doc/usb/#creating-and-using-a-usb-qube
The USB device is trsted but I'll consider the usb-cube too.


> Questions:
> 1. When I ran Qubes VM Manager -> Backup VMs, I received an error message 
> stating no place on device and a zero byte backup file. Permissions are OK, 
> there's more than enough space on the HDD.
> Any reasons why the backup did not succeed?
>

>Are you sure you selected the correct device in the menu?
There was only one option 

> 2. I tried running qvm-backup from the command line, which ran fine, no 
> permission problems on the same HDD. However, the template VMs are not 
> included by default and I saw no command-line option to automatically achieve 
> this. Am I missing something here?
>

>The RPM-managed TemplateVMs should normally not be backed up. Instead, you 
>should clone them (if you can spare the drive space), make your 
>customizations, then back up the clones.
Does this imply the AppVMs should be based upon the cloned VMs?


> 3. I know I can manually list all the VMs on the command line to be backed 
> up, but I find that a bit awkward, so I tried this:
> qvm-ls --raw-list | xargs qvm-backup /mnt/test/
>
> but this threw a Python exception...
>
> For now I resorted to typing all the VMs by hand ... not elegant.
>
> Any help is appreciated.
>

Try this:

$ qvm-backup /mnt/test/ `qvm-ls --raw-list`
This one works nice, thank you.

Gabe

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7jVsr2iHJEOfEeyN1cR_geYvDZnXIWWUa4iu_iCYAGBrQnpPD1p03FxuJdeTqK1qbIB8SPZZihvglfzbMD4iC0d97cn2RTKdO2lB2nuweio%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] backup

2016-09-27 Thread 'Gabriel' via qubes-users
Hi fellows,

I started using qubes a while ago and I have a question concerning backups.
What I want is a complete backup to a dedicated external USB HDD. I understand 
to achieve this all the VMs must be shut down.
Therefore when I plugged in the HDD I mounted it in dom0 under /mnt.

Questions:
1. When I ran Qubes VM Manager -> Backup VMs, I received an error message 
stating no place on device and a zero byte backup file. Permissions are OK, 
there's more than enough space on the HDD.
Any reasons why the backup did not succeed?

2. I tried running qvm-backup from the command line, which ran fine, no 
permission problems on the same HDD. However, the template VMs are not included 
by default and I saw no command-line option to automatically achieve this. Am I 
missing something here?

3. I know I can manually list all the VMs on the command line to be backed up, 
but I find that a bit awkward, so I tried this:
qvm-ls --raw-list | xargs qvm-backup /mnt/test/

but this threw a Python exception...

For now I resorted to typing all the VMs by hand ... not elegant.

Any help is appreciated.

Best,
Gabe



Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/zCWKQXq5-iWoiqonoLuMnWRCPGbQlTqt7ynO8NCwUR_yrxmvRnC9l5fZUSX_zQsl9tUkxFJgZcJpnCOmLpecKQHH0Lhh5mpGda4bKHFwJmA%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.