Re: [qubes-users] qvm-usb not functioning

2017-09-15 Thread 'P R' via qubes-users
Hello Drew,

Am 14.09.2017 3:35 vorm. schrieb "Drew White" :


I try to do a qvm-usb attachment to pass a usb device through, but it
doesn't let me, it tells me it fails but provides no description of error.


Can you provide more information:

- which Qubes Version?
- Laptop / Mainboard Modell
- Kind of USB VM (the stock USB VM?)
- if you attach USB devices, do they appear in sys-usb?
- (...)
- what kind of USB device are you trying to attach?
- to which AppVM/Operating System are you attaching it to?
- have you followed the docs at https://www.qubes-os.org/doc/usb/

more information first, answers will come second ;-)

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJgmRC4Y-z08my5AgC_9qwSAYkgSYBSaxnFCm0auq_wTA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Lenovo X230 - List of USB-Ports and USB-Controllers (Layout)

2017-09-13 Thread 'P R' via qubes-users
Hello Taiidan,

Am 08.09.2017 4:53 vorm. schrieb "taii...@gmx.com" 

Excellent - an x230!


Yes, I like the X230 a lot and prefer it over my Company Laptop a W540 as
it has perfect size and weight and performance is fine for Qubes after
adding RAM and a SSD.
The only poor thing - as with any Linux OS is battery life compared to
windows.
I bought a new battery (Lenovo 44++ with 94Wh) for 60eur which gives me
~8-10h of battery runtime on windows - under Qubes battery runtime is much
shorter.
But I think this is because power management is much better in a, which is
using proprietary drivers.

Have you installed coreboot on it? Those sandy/ivybridge thinkpads have
open source init and support all of me_cleaner's features


Actually I am currently thinking about doing so. I'm reading the Coreboot
Wiki pages and it seems that it is not necessary to get the bios chip out
of the Mainboard, but you can use a special Tool/clip and a raspberry Pi to
flash the bios. Total costs including cables would be ~70eur for the
hardware.

I would prefer coreboot'ing my X230 with someone who has did this before,
so if someone reading this and is located near Berlin/Germany and happy to
help ... do not hesitate to contact me.

The information I am missing is, if I can use Coreboot and beeing able to
boot Qubes OS 3.2 (and later 4.x) AND (!) also Windows 10 Enterprise, which
I need, as this is the "corporate OS".
As far as I have understand this involves to use something like seabios (?)
and additional Blobs, it seems that Coreboot has lots of different pieces
like a puzzle and I haven't figured out how everything fits together.

A newbie introduction for Qubes users would be great.

* Qubes recommended hardware / beginners Guide *
I think "we" should also have beginner howto's which are based on a few
common hardware Modells to attract more users to Qubes, the Lenovo X230
seems like a perfect machine to do so, as it has a good built quality and
spare parts can be bought for low money including docking stations,
charger, batteries etc.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKV09tKRsAXL4RO26x70p2jnJALstq6BXHOToHWN98QOg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Problem installing Qubes 4rc1 on Lenovo Thinkpad X200 - Installer hangs with VT-d enabled / without: libxenlight failed to create new domain (with/without iommo-tweak)

2017-08-10 Thread 'P R' via qubes-users
Hello,

I've asked some days ago if someone has been able get Qubes OS 4rc1 up and
running on a Lenovo Thinkpad X200 (which works fine under Qubes 3.2)

Am 05.08.2017 11:25 nachm. schrieb "P R" :

(...)
I've installed Qubes 4 from USB with VT-d disabled which works but throws
an error in the end and which doesn't allow to start an AppVM:

Start failed: internal error: libxenlight failed to create new domain
'sys-firewall'

I have also tried to create a new Fedora 25 based AppVM (HVM and non-HVM)
and run into the same error.

I have enabled VT-d in the BIOS and rebooted, same error. I have
enabled/disabled iommu=igfx / no-igfx same problem.

Unfortunately it seems that I can't enable VT-d during Qubes installation
as the installer will halt with a black screen when VT-d is enabled.
See here for the hint regarding the Installation of Qubes 3.2 (?):
https://www.qubes-os.org/doc/thinkpad-troubleshooting/

As I didn't have any trouble installing and running Qubes 3.2 on the X200
(with 8 GB RAM) I don't understand what is the problem with Qubes 4.
(...)

As I like to move forward I would like to know I the X200 can be used with
Qubes 4rc1 or if I need to get another machine (probably a X230 or T430).

Any feedback on this (X200 + Qubes 4.x = fail?)

Kind regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BNngfoRcAYwLH_VF6Vp2eu9WSpBo80KUgHc1cbJPykOg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Tidal AppVM - HowTo

2017-08-10 Thread 'P R' via qubes-users
Sorry wrong Link to the multimedia how-to, the correct one:

https://github.com/QubesOS/qubes-doc/pull/418

- PhR



Am 10.08.2017 8:16 vorm. schrieb "P R" :

Hello Grzesiek,

Am 10.08.2017 3:33 vorm. schrieb "Grzesiek Chodzicki" <
grzegorz.chodzi...@gmail.com>:

I doubt there are a lot of Tidal users who also happen to be QubesOS users
but for those who are here's a quick guide on how to create Tidal AppVM


Thank you for the how-to, I think this should go into the Qubes
Documentation, which can be enhanced/written by everyone of us.
You only need a GitHub account (which is free).

Here is more information how to contribute to the Qubes documentation:

https://github.com/QubesOS/qubes-doc/blob/master/CONTRIBUTING.md

I have written a Multimedia how-to about using Amazon Prime / Netflix /
Spotify and playing DVDs via Qubes (Debian based multimedia App-VM).

Maybe you just add your tidal how-to there?

While my how-to is finished it still doesn't made it to the main howto,
which feels somewhat frustrating as I've put some work into it (as you can
see from the discussion threat).

Qubes How-to play Multimedia How-to
https://github.com/QubesOS/qubes-doc/pull/418


Regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKjdBiE7UtNaibgmnuB2Bo5GsTD11MJ3%2Bq%2BZYtNEMoo4A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Tidal AppVM - HowTo

2017-08-10 Thread 'P R' via qubes-users
Hello Grzesiek,

Am 10.08.2017 3:33 vorm. schrieb "Grzesiek Chodzicki" <
grzegorz.chodzi...@gmail.com>:

I doubt there are a lot of Tidal users who also happen to be QubesOS users
but for those who are here's a quick guide on how to create Tidal AppVM


Thank you for the how-to, I think this should go into the Qubes
Documentation, which can be enhanced/written by everyone of us.
You only need a GitHub account (which is free).

Here is more information how to contribute to the Qubes documentation:

https://github.com/QubesOS/qubes-doc/blob/master/CONTRIBUTING.md

I have written a Multimedia how-to about using Amazon Prime / Netflix /
Spotify and playing DVDs via Qubes (Debian based multimedia App-VM).

Maybe you just add your tidal how-to there?

While my how-to is finished it still doesn't made it to the main howto,
which feels somewhat frustrating as I've put some work into it (as you can
see from the discussion threat).

Qubes How-to play Multimedia How-to
https://github.com/QubesOS/qubes-doc/pull/421

Regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKVavNLC2caDowk%3D7h1ZgdKiakRKBMnoVHyE1aH_QZ%2BsA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Problem installing Qubes 4rc1 on Lenovo Thinkpad X200 - Installer hangs with VT-d enabled / without: libxenlight failed to create new domain (with/without iommo-tweak)

2017-08-06 Thread 'P R' via qubes-users
Hello,

Am 06.08.2017 11:05 nachm. schrieb "pencilfight" :


Many current users may require a completely new hardware. I think you are
right many would benefit from a dedicated thread.


Of course the task for "us" as prerelease testers is to give valuable
feedback what is working and what is not which will save other users
struggling with Qubes.

The most important is:
Will Qubes 4 work with my hardware, if the answer is yes, I have no problem
trying to get Qubes up and running, but if the answer is no, I would of
course save my time and just get the proper hardware.

So I would like to see which hardware can be used with Qubes 4. Currently I
am not sure if this is the case with the Lenovo X200.
Is there a dedicated HCL for Qubes 4?
https://www.qubes-os.org/hcl/

I would like to see the Lenovo X230 supported on Qubes 4 if the old X200
will not work.

As such my question again:
Has someone successfully setup Qubes 4rc1 on a X200?
And if so, what was the trick?

Regarding hardware:

If we manage to get a 12, 14 and 15inch laptop from Lenovo / Dell and maybe
HP on a Qubes 4 HCL this would benefit new users as they can just buy a
refurbished nlmodell for cheap.
Most people I talk to have no problem buying a laptop if the know what the
need to buy.

Someone might even come up with the idea to sell SSDs with Qubes
preinstalled which can be a good thing for new users who just need to
replace their harddrive which is an easy task with corporate grade laptops.

I know that someone will say, that this doesn't guarantee that the
installation has not been tampered, but honestly I am already trusting the
Qubes team for their work.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKdngLJ%2B4b9hykf6rEq2sT9_GC3DQqi2pjOBGCmqBR6aw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Problem installing Qubes 4rc1 on Lenovo Thinkpad X200 - Installer hangs with VT-d enabled / without: libxenlight failed to create new domain (with/without iommo-tweak)

2017-08-05 Thread 'P R' via qubes-users
Hello,

I have already raised a question in the thread regarding Qubes 4rc1, but as
the Lenovo series is a common laptop for Qubes it might make sense to open
a dedicated thread for this.

I tried several things in order to get Qubes 4 running on my Lenovo X200
but it seems I am stuck.

I've installed Qubes 4 from USB with VT-d disabled which works but throws
an error in the end and which doesn't allow to start an AppVM:

Start failed: internal error: libxenlight failed to create new domain
'sys-firewall'

I have also tried to create a new Fedora 25 based AppVM (HVM and non-HVM)
and run into the same error.

I have enabled VT-d in the BIOS and rebooted, same error. I have
enabled/disabled iommu=igfx / no-igfx same problem.

Unfortunately it seems that I can't enable VT-d during Qubes installation
as the installer will halt with a black screen when VT-d is enabled.
See here for the hint regarding the Installation of Qubes 3.2 (?):
https://www.qubes-os.org/doc/thinkpad-troubleshooting/

As I didn't have any trouble installing and running Qubes 3.2 on the X200
(with 8 GB RAM) I don't understand what is the problem with Qubes 4.

I've done some crossreading regarding the libxenlight error but didn't come
to a good suggestion what to try next.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BH3ZBYyRP8haDsd7beABzBLgxssgu%3DrhRQcs%2BSQbyguw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread 'P R' via qubes-users
Hello,

I think it makes sense to concentrate more on what we (different user
types/groups) would like to see, instead of having some kind of 'flame war'
GUI vs. Terminal.

The good thing was always that you can built very complicated workflows
using  the terminal/bash scrips make life easier and that you can have a
GUI for 80% of the standard tasks for "normal users", which are more
interested in using their computer as a tool instead of tweaking around.

We can and should have both:
1) API/terminal commands for 'advanced users' and
2) a simple GUI for normal users who just want to use a PC that protects
their privacy somewhat better than their current Windows 10 Laptop.


Am 05.08.2017 5:02 nachm. schrieb "cooloutac" :

The forever problem of linux,  is the self fulfilling prophecies from
people who want to feel superior over others.


Disagree, I think that those people are just faster using the terminal.
And those users are technically skilled and have at least basic knowledge
about an operating system.

I agree with cooloutac that Qubes has a benefit if it can be used for
regular tasks without touching the terminal.
Even when using Windows lots of people use Laptops that have been setup by
experienced users and then handover to them.
They don't bother with tweaking the system, so simplifying the use of Qubes
would help to get those users on board.

BUT:
Important point is that additional security/privacy has most time a price
that it add a small layer of complexity/less usability for the user.
But Qubes is doing a great job to reduce this overhead.

As far as I have understand the Qubes team statement, it seems that the
concentrate more on the Qubes Core stuff and having the API/Terminal
commands, someone can still write a GUI for Qubes like Qubes Manager.

Honestly I don't understand why it is that hard to Port Qubes Manager over
to Qubes 4, so that the user can choose:

- terminal
- old Qubes manager with maybe a reduced feature set
- new Qubes widgets
- ... ?

This topic reminds me about the vi vs. emacs discussions. What the heck? I
use both ;-)
Or the new "Ribbon Bar" from Microsoft which was also not that accepted in
the beginning.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKLrt2859Kb3C%3Dt5yYy%2B90_ViowZ-PFcLQ40fZgQMtSEg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread 'P R' via qubes-users
Additional information, I forgot to mention:

Am 05.08.2017 12:49 nachm. schrieb "P R" :

Hello,

Am 05.08.2017 10:28 vorm. schrieb "Marek Marczykowski-Górecki" <
marma...@invisiblethingslab.com>:

(...)
Probably yes - without VT-x and VT-d, initial configuration failed.


I have no restarted installation on my Lenovo X200 with VT-x and VT-d
enabled but it seems that the installation hangs after booting up.
I have removed rhgb quiet and set console=vga to see what is happening.
After the first few lines the displays clears and I get a black screen
while the drive LED is on (so there seems to be some activity, but nothing
happens.

I remember that there were some issues with installing Qubes on a X200.
(...)


When I boot with VT-d disabled the Qubes 4 installer works and is booting
into the Graphical installation GUI.

So it seems that there is a problem launching the installer with VT-d
enabled.
But without VT-d I get error messages after the installation has finished,
which means that I am currently out of luck installation Qubes 4 on my X200.

:-/

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvK92HgAO5nhRJnZNBh8gtkd9RGWK6XNhxjWq0Js-RcpkA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread 'P R' via qubes-users
Hello,

Am 05.08.2017 10:28 vorm. schrieb "Marek Marczykowski-Górecki" <
marma...@invisiblethingslab.com>:

(...)
Probably yes - without VT-x and VT-d, initial configuration failed.


I have no restarted installation on my Lenovo X200 with VT-x and VT-d
enabled but it seems that the installation hangs after booting up.
I have removed rhgb quiet and set console=vga to see what is happening.
After the first few lines the displays clears and I get a black screen
while the drive LED is on (so there seems to be some activity, but nothing
happens.

I remember that there were some issues with installing Qubes on a X200.

Question: is there any setting I can tweak during grub boot to be able to
run the Qubes OS installed with VT-x and VT-d enabled?

Anyone else tried to install Qubes 4 on a Lenovo X200?

- PhR


- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZhYGuAAoJENuP0xzK19csojcH/iilrBnK1RpMqsB1SNP/MXmh
kD08X+4JgEImhph2xHWzKbU5DCb4gmVlfvfLdSOmvybE3G9QqAEyZouUN13/jW/O
LrTqZVRxC4eLqKZNI2lXc4AQHc5QATKaZoAFXmKMQerV/BTz9F9oD1IZYCWbPyzp
scDIFR4qRZXBEmqinqCTDI+vNwng7ZV0M+WOoD9Poq+RTc03vILeySb4uVAbPt++
Nmt3nwDHG/W5hIPhD+XfWOIh2stjK1GX/0bwEcmp8+JBd0WL8OqzhJfX6ROF+AFo
ZxH1nwpKuEtcs74bcPWurNQ5sopqiT/+4mxdegg38o2OO1RL5QvVUjOwtimAu0M=
=qYuI
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BE%3DtqTPK31UN9J43wV4D8asqcF0d9A7Mdp1uZxxTC%3DMg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-05 Thread 'P R' via qubes-users
Hello Marek,

Am 05.08.2017 9:44 vorm. schrieb "Marek Marczykowski-Górecki" <
marma...@invisiblethingslab.com>:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Aug 04, 2017 at 10:28:45PM
> Start failed: internal error: libxenlight failed to create new domain
> 'sys-firewall'

Make sure you have VT-x and VT-d enabled in BIOS.


Indeed, I have checked BIOS setting and vt-d was disabled for some strange
reason (it was enabled under Qubes 3.2 before).

If I try to start the AppVMs and also the Fedora-25 Template VM I get the
same error.
As I also got the message at the end of the Qubes installation process, do
you suggest to reinstall, now that vt-d is enabled?

Another strange issue is that I can only see 'Start' in the list of
available applications in all Fedora VMs.

As I haven't read this before, it seems that something is broken.
Guess reinstalling  is the best option??

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJFEMo78xt96U%3DfXYo%3DS4guX5M-iPSTGG8M3Fvf8Xpr1Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-02 Thread 'P R' via qubes-users
Hello,

Am 02.08.2017 1:45 nachm. schrieb :

On Monday, July 31, 2017 at 5:23:20 PM UTC-4, Micah Lee wrote:
> On 07/31/2017 04:43 AM, Marek Marczykowski-Górecki wrote:
(...), when I boot up, grub
> works, but then as soon as Qubes starts to boot the computer reboots,
> and I end up back in grub.

Having the EXACT same issue with my T430s


Have you tried the suggestions from "Rusty Bird":

I ran into the same behavior on a T420. Removing iommu=no-igfx from
the Xen command line fixed it. [1]
If that doesn't help, _adding_ console=vga should let you see what's
going on.

@codgedodger:
Did this help in your case?

Kind regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKyi0Ydsq3Kq%3D0ZAUn4RzDD0xwSqf7ThJ0C8r3fN69oTg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: QTW status in Qubes 3.2

2017-08-01 Thread 'P R' via qubes-users
Hello Raymond,

Am 01.08.2017 3:10 nachm. schrieb "Raymond Rizzuto" :


Is QTW still in active development?  Will there be a QTW for Qubes 4, or
has it been deprecated?  I'm still hoping to be able to have a Windows VM
under qubes for Quicken, possibly a few other apps I can't (easily) replace
with Linux equivalents.


I am using Qubes 3.2 with a Windows 7 HVM and yes Windows is working under
Qubes.
If you follow the excellent documentation you should be able to get things
running within 1 hour.
Install Windows 7, install Qubes Tools for seamless mode.
Install Quicken.

Yes, I know there are alternatives to Quicken, but I have been using
Quicken since the 90's, and have a lot of data in it that I want to keep.


As an IT solution provider I think that Windows support is very important
to address business users in order to use Microsoft Office including
Outlook/Exchange and native ERP/CRM applications.

Just start installing a Windows HVM and we'll guide you through the setup.
Starting point:

https://www.qubes-os.org/doc/hvm/

Kind regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BRXzOLDkse2PuRJSuKb%3DC95ARofHyH7ds7NJjTjMq2pA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread 'P R' via qubes-users
Hello,

Am 31.07.2017 9:42 nachm. schrieb :


I was able to restore all of my VMs via CLI but after restoring I couldn't
start any VM.
Will downgrade to 3.2 and will wait for final release of 4.0 and I hope
that this will then be fixed.


Of course you can go straight back to 3.2 but as this is release candidate
feedback could be helpful.
What happens when you start one of the AppVMs from the CLI?
Output/Error messages?

Have you tried to launch a template VM also, not only the AppVMs?

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJNd%2BDL9j5WK_Qqk_BT67LywqpM99nJhTcDp0kZ8OE5%3Dg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread 'P R' via qubes-users
Hello,

Am 31.07.2017 8:09 nachm. schrieb :

I don't like that Qubes Manager was removed.


I can understand that this might feel strange, but after getting used to it
you can do anything (even more than with Qubes Manager) from the command
line/CLI.

As far as I have understand, the option is there that someone can program a
Qubes GUI, but this is not in scope of the Qubes Core Team, which seem ro
be focussed more on the "real"/difficult Qubes stuff.
I think this is a good decision, but having something like a "legacy" Qubes
Manager for Newbies might be helpful for beginners.

I am also looking for an icon for Backup/Restore.


You can do backup and restores from the CLI (at least on Qubes 3.2) and I
am sure that this can also be done in Qubes 4 RC1.
In dom0:
qubes-backup-restore --help
... will tell you exactly what you need to do.

 As long as I can't find this option I can't restore my VMs and this
release is useless for me.


Have you tried to do a restore via CLI?
If you run into problems, just tell us where exactly the problem is and
we'll figure it out.

I'll download RC1 this evening and will also restore my Qubes 3.2 VMs.
I can then update this post with a short how-to.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvLEh3JZ7pt%3DVjSOa7AM8wBJLkg2qymtoyUW9sqDRb9d2w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] dvm starting extremly slow -> guid

2017-07-26 Thread 'P R' via qubes-users
Hello,

Am 26.07.2017 4:08 nachm. schrieb "Unman" :


I see the same thing with a Debian 9 template - but not with
an 8 that's been upgraded.


It looks to me, like we have either a package missing or we need to tweak
the configuration in the AppVM template or in dom0, I am not sure if there
is anything that can be configured in dom0.


>From the documentation it seems that the AppVM template only needs to have
'perl-encode' installed:

https://www.qubes-os.org/doc/templates/fedora-minimal/

An idea could be to built a DVM template from the fedora-24-minimal
package, install perl-encode and look how fast the disp-vm will start.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvL9GJZ8q7E9NL-TUOkxtQgpWNG1X5bzr-u%2Be3hDS8Q7aQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] dvm starting extremly slow -> guid

2017-07-26 Thread 'P R' via qubes-users
Hello,

Am 26.07.2017 2:18 vorm. schrieb "Qru" :


Then I noticed that starting a dvm takes really long (around 45 Seconds).
Before it was about 3 seconds, which is somehow acceptable. But 40 seconds?


I have also migrated all AppVMs to Fedora 25 and discovered the same
behavior.
Running the same command ...

To test it, I startet the dvm from the dom0-console:
[user@dom0 ~]$ sh - c 'echo firefox | usr/lib/qubes/qfile-daemon-dvm
qubes.VMShell dom0 DEFAULT red'


I discovered also that the startups stalls between

time=1500551221.46, qrexec done


... and ...

time=1500551271.78, guid done


Between qrexec done and guid done I loose ~40 seconds.

I made another test with a Fedora 23 based DVM by recreating the disposable
VM in dom0:

[user@dom0 ~]$ qvm-create-default-dvm fedora-23

After that launching the same command:

[user@dom0 ~]$ sh - c 'echo firefox | usr/lib/qubes/qfile-daemon-dvm
qubes.VMShell dom0 DEFAULT red'

Finishes in ~ 12 seconds, so the problem with the slow bootup seems to be
somewhere in the Fedora 25 Template.

Any idea where to look further and was is happening exactly between "qrexec
done" and "guid done"?

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJJEdgFBe%3DbAZnS2eabeAeuDwMcrqT8%2BgFDZi4K23qAVQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Seeking moderators for unofficial Qubes IRC channels on Freenode and OFTC

2017-07-21 Thread 'P R' via qubes-users
Hello

Am 21.07.2017 9:39 vorm. schrieb "Noor Christensen" <
kchr+qubes-us...@fripost.org>:


The IRC channels are unofficial, and should probably continue to be so
since we already have the mailing lists as our official means of
communication.


Agreed, Mailinglist and  Qubes Docu are perfect to look for answers.
The only (maybe) missing part would be a quick start guide for beginners,
adressing the most relevant tasks (referencing to the documentation).

People will continue joining the #qubes channel (or another one) and ask
for help, no matter if we are there or not. I think it's a great way to
introduce new users to the project and point users with questions or
answers to the offical docs and lists for further discussion.


If there is an IRC channel, I think it should be clearly mentioned on the
website as asking via IRC might be a lower barrier for newbies.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvLb0hjBgA7nmN3wS8b1XiR9oyg6Qz8MWT_3AD7tO_xhzw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Seeking moderators for unofficial Qubes IRC channels on Freenode and OFTC

2017-07-21 Thread 'P R' via qubes-users
Hello David,

>> We're looking for well-known, trustworthy volunteers from the
>> community who would like to be
>> moderators in the unofficial Qubes IRC
>> channels on Freenode and OFTC (#qubes on both).

Am 21.07.2017 2:28 vorm. schrieb "Andrew David Wong" :

We're looking for well-known, trustworthy volunteers from the
community who would like to be moderators in the unofficial Qubes IRC
channels on Freenode and OFTC (#qubes on both).


As mentioned before I am happy to help, but some more details about what
exactly must/should be done would be helpful including an information to
which users the IRC channel is mainly aimed at.
What is the strategy of having IRC available as the good thing with the
mailing list is, that most topics have been raised already once and as such
extends the excellent Qubes documentation.

Regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJNXH2uaDFrnuVxG%2BE_DMD9EteZn%2B%3D3%2BQu3jeTaTSd5Bg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Anyone tried Anbox ('Android in a box') under Qubes

2017-07-17 Thread 'P R' via qubes-users
Hello,

I'm interested in running Android as HVM within Qubes.
Has anyone trying to do so already with the code from the Anbox Project?

https://anbox.io
*"(...) Anbox puts the Android operating system into a container, abstracts
hardware access and integrates core system services into a GNU/Linux
system. Every Android application will be integrated with your operating
system like any other native application. (...)"*

I haven't seen it yet, but having the application  integrated with the OS
sounds like what Qubes is doing with AppVMs to the user, so very
user-friendly.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvLUS4EiMZHKrZVTdV64%2BgxZ_cH32Sti_6nHP%3D3hzraBKA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] "Storage Qube" or otherwise share folders of a drive selectively?

2017-07-15 Thread 'P R' via qubes-users
Hello,

Am 15.07.2017 10:45 vorm. schrieb "Noor Christensen" <
kchr+qubes-us...@fripost.org>:


I found this project the other day: https://github.com/rustybird/
qubes-split-dm-crypt

Haven't tried it myself yet but it looks like it could fit your idea.


Thank you for the link, very interesting!
As far as I understand the qubes-split-dm-crypt has a security benefit as
the credentials are not entered in an AppVM where the encrypted partition
should be mounted but in another VM.
As such there is less opportunity to grab the passphrase as it is entered
in another VM.

As far as I have understand 'codegeak98' he is asking for a solution to
store data in one storage qube, which might be accessed by several AppVMs
while still beeing sure that the data is protected from access by other VMs
or even the storage Qube itself.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BvUigXQSORVtCLMF5F%2BsFZDhNhp3kbT5%2BQd2OjC348Yw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] "Storage Qube" or otherwise share folders of a drive selectively?

2017-07-15 Thread 'P R' via qubes-users
Hello,

Am 11.07.2017 10:52 nachm. schrieb "Florian Brandes" :

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/11/2017 10:08 PM, codegee...@gmail.com wrote:
(...)
> I'm thinking of setting up perhaps something like a "Storage Qube", which
will have the storage drive permanently attached, and be in charge of
managing permissions and serving the folders to authorized VMs via…NFS?
SSHFS?

(...)

I'm new to qubes, so excuse me if I may sound stupid, but wouldn't it be
easier to include your storage space in your overall qubes setup (maybe as
an LVM), so that you would just use your qubes and extend their personal
disk space? This way you could take advantage of the isolation provided by
qubes without the hassle of setting up a dedicated storage VM which would
also need to check permissions.

On the other hand you could probably set up a storage VM and serve the
files via NFS on a IP basis. Since every qube has a unique IP address you
could make sure that no other qube except the one you permit has access to
a specific storage folder.


One idea that came to my mind:
- setup a "storage qube" which serves as a NFS Server

- create exports in separate folders which can only be accessed by
dedicated IPs (from the AppVMs)

- as an additional Layer of security you could use encfs (with maybe some
symlinks) in the AppVMs, so that the date is decrypted from the view of an
AppVM but encrypted from the view of the Storage Qube.

I guess it should be possible to script something where the decryption key
is stored locally in the AppVM (Assuming that the data would be unencrypted
in the AppVM without a "Storage Qube".

Would this work for you?

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BnV%3DURba_SDF_3C34ReZnvg%3D%3D0eBQU2wx%2Bi%2BmV4%3Dx%3DUQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to fix/disable Graphics during Boot

2017-07-13 Thread 'P R' via qubes-users
Hello,

I have a strange video effect when booting up Qubes OS:

When booting up, the displays gets build up from the bottom to the top,
slow motion effect.
I'd like to have my Qubes started with Text only, but in native resolution
which is 2880x1620.

I was able to get rid of the Graphical Boot Menu, but the Grub menu is not
showing up in the native resolution.
I see the first booting messages in bigger a resolution and after a few
moments the screen gets black for a very  time and then switches to a
higher resolution.

My /etc/default/grub:

GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR="$(sed 's, release .*$,,g' /etc/system-release)"
GRUB_DEFAULT=saved
GRUB_DISABLE_SUBMENU=true
GRUB_TERMINAL_OUTPUT="gfxterm"
GRUB_TERMINAL=console
GRUB_GFXMODE=2880x1620x16
GRUB_CMDLINE_LINUX="rd.luks.uuid=luks-1db155a1-5c0d-4f9a-86d0-840c24e7413c
rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap
i915.preliminary_hw_support=1 rd.driver.pre=scsi_dh_rdac
rd.driver.blacklist=nouveau"
GRUB_CMDLINE_XEN_DEFAULT="console=none dom0_mem=min:1024M
dom0_mem=max:4096M"
GRUB_DISABLE_RECOVERY="true"
GRUB_THEME="/boot/grub2/themes/system/theme.txt"
GRUB_DISABLE_OS_PROBER="true"
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX rd.qubes.hide_all_usb"
GRUB_GFXPAYLOAD_LINUX=text
Any help would be nice.
Kind regards
- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJy7UQJ7OT_EbQYBHWJ7Ovnt7h75VX6pk8gSQa5KJo-Bg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Using and Mounting a Secondary Internal HD

2017-07-12 Thread 'P R' via qubes-users
Hello,

Am 11.07.2017 8:30 nachm. schrieb "Nick Geary" :

What is the best method for extending the LVM within Qubes?

So

1) Lukas partition
2) mkfs.ext3
3) fstab & crypttab


Can't just add the 2nd drive to the LVM as additional physical Volume and
then extend the Logical Volume?

Or just use Symlinks.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvLxoC%3DJifmZo%2BNSoD8TC9GhU8rDuNYafeJCH7NrEvmmfA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ACCESS TO QUBES LOCALHOST

2017-07-12 Thread 'P R' via qubes-users
Hello

Am 12.07.2017 7:44 nachm. schrieb :

(...)
One feature that I'm not sure how to acquire with QUBES - is the ability to
view my localhost website from eg an IPAD or ANDROID phone using my home
WIFI.
(...)


So you want to access a webservice which is running in an AppVM/Qube from
the outside of your Qubes OS Machine.

I think the starting point is the Qubes Documentation:

Port forwarding to a qube from the outside world
https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world

There are also some example scripts, but it looks like a task that needs
some more steps ;-)

If you have further questions after reading the documentation ask and I'm
sure we can help.

Good luck.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BUK3XGC3KZw%2BiCyckZuoU-U%2BzHfo81KyneLLQ2Kw4QLQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes VM Manager freezeup

2017-07-11 Thread 'P R' via qubes-users
Hello James,

Am 12.07.2017 4:08 vorm. schrieb "James" :

Does anyone know what might be causing this, how I might fix it, or
what information I could provide to help diagnose it?
[...]


I am experiencing the same delays when starting a VM in Qubes: the whole
GUI freezes for a few seconds, even when there are plenty ressources
available (Core i7, 4 physical Cores, 2.8Ghz, 32 GB RAM, SSD).
Qubes is also showing the window when shutting down sys-net (Message:
shutdown takes longer, should I kill the VM).

Solving the GUI freezes would be great.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvLyjvbM-B89bFZ%3DsWy9Qvr7jyQfLaa%2BJtq176HOKQqCdg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4 pre RC1

2017-07-10 Thread 'P R' via qubes-users
Hello,

On Sun, Jul 09, 2017 at 12:42:35AM +0200, 'P R' via qubes-users wrote:

> When I reboot, Qubes Boot Menu comes up, but when I hit enter, after
> roughly 6 seconds a reboot happens.


No further help needed.
I downgraded to Qubes 3.2 again and will wait until the official release
candidate will come.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKst90%2BwkEnk6Q7a6XpJTqm5KP75_HVjFoXHgyKanCJcQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Win7 Template?

2017-07-10 Thread 'P R' via qubes-users
Hello Henry,

Am 07.07.2017 3:42 nachm. schrieb :


I have 2 use cases for Windows.
1. Watch Netflix or Amazon etc. They reject the use of VPN and ask for a
lot of "information", which is basically ok for me.


I had the same request and solved it by setting up a dedicated multimedia
App VM based on the default Debian 8 template.
It can be used for Amazon Prime, Netflix, Spotify and to play DVDs.
To spare others thew work, I am writing a how-to, which didn't make it to
the main doc repositories  yet.
You can check it out here:
https://github.com/phrabe/qubes-doc/blob/patch-2/configuration/multimedia

If there are any questions which are not included in the docu, drop me an
email, I'll update the description with your feedback.

2. Banking. I have 2 banking applications that have multilevel
authentication one of which makes use of a usb token. Here I want a usb-vm
to connect these and only these usb devices. And I want a VPN connection
with a trusted server and on top of that a very restrictive (IP-range
based) Firewall.


Have you checked it it possible to use a Linux compatible Banking App?
If not you can of course use a Windows HVM to do your banking business.

Kind regards

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BdcP3HFVVmWQqU321kcw33_PH_nJFMFMLv5YAbpVsiWQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Using and Mounting a Secondary Internal HD

2017-07-10 Thread 'P R' via qubes-users
Hello ,

I am also using 2 internal drives.
One for Qubes and one for windows.
I have just installed Qubes to the 2nd drive and set it up as default boot
drive in the BIOS.
If I need to boot into Windows I just hit F12 when starting, which brings
me to the boot menu.

If I understand you right, you want to use a 2nd drive as additional (!)
storage for Qubes, right?

I think what you want is to setup the partition as a LUKAS partition (to
have encryption) and then create a filesystem (extX) on top.

Maybe also setup LVM.

Another option could be to extend the LVM (if you are using LVM in Qubes)
with a 2nd drive (your M2 SSD).

In case you do not want to enter 2 credentials for LUKS you could maybe
store the decryption key on dom0.

Then adding the 2nd drive to LVM, create an own Volumegroup and migrate the
VMs.

- Philipp

 schrieb am Mo., 10. Juli 2017, 04:05:

> Hello Everyone,
>
> I'm working on getting a second m.2 internal SSD set up and partitioned
> for Qubes. I already have it formatted by fdisk /dev/sdb. Created a new
> extended partition.
>
> I added the /dev/sdb to fstab as an ext5. I'm getting  wrong fs type
> error. One fix I found was installing nfs-tools. But you can't seem to get
> that installed on Dom0.
>
> What is the default extension created in fdisk on qubes? I've tried ext,
> ext [1-5]. Parted -l only shows extended (whereas primary it shows ext4).
>
>
> What do I need to do to allow the creation and migration of Qubes VM's to
> the new disk?
>
> I'll be researching and working it on my end. But if any of you guys out
> there have an answer, or can point me in the right direction it would be
> greatly appreciated.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/172791d1-44b3-434b-8f2b-37d4a9dff604%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJvaLRYhyhOFzJKn%2BMK8AKsXGDJqJfRbrP6jdhib8jFYA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4 pre RC1

2017-07-09 Thread 'P R' via qubes-users
Hello Noor,

2017-07-09 10:16 GMT-04:00 Noor Christensen <kchr+qubes-us...@fripost.org>:

> On Sun, Jul 09, 2017 at 12:42:35AM +0200, 'P R' via qubes-users wrote:
> >
> > When I reboot, Qubes Boot Menu comes up, but when I hit enter, after
> > roughly 6 seconds a reboot happens.
>

(...) It would be really helpful to see how your GRUB is configured.
>
> <https://groups.google.com/d/msgid/qubes-users/20170709141658.f3nob4ltaabfnrac%40mail>


I have booted a Fedora 25 Live system.
My Qubes 4 installation is installed on my 2nd built-in SSD (/dev/sdb).
My first SSD is used for my windows installation.
Default Boot drive is /dev/sdb

partition layout of /dev/sdb

[root@localhost-live ~]# fdisk -l /dev/sdb
Disk /dev/sdb: 447.1 GiB, 480103981056 bytes, 937703088 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: dos
Disk identifier: 0x88a60036

Device Boot   Start   End   Sectors   Size Id Type
/dev/sdb1  *   2048   2099199   2097152 1G 83 Linux
/dev/sdb2   2099200 937701375 935602176 446.1G 83 Linux

where /dev/sdb1 is the boot drive and /dev/sdb2 is the encrypted partition
with LVM on top.

I have attached the /grub2/grub.cfg as it is a bigger file.

I try to boot the following menu entry, which results in a black screen and
a reboot after a few seconds.
I am not even reaching the prompt to enter my password to decrypt my Qubes
partition (/dev/sdb2), so it has to be something with the boot options or
BIOS settings.
btw: No changes have been made in the BIOS coming from Qubes 3.2.

Looking at the neccessary specs it seems that my laptop is Qubes 4
compatible.

CPU: Intel Core i7-4900MQ
https://ark.intel.com/de/products/75131/Intel-Core-i7-4900MQ-Processor-8M-Cache-up-to-3_80-GHz

HCL report:

type:  'notebook'
hvm:  'yes'
iommu:  'yes'
tpm:  disabled in BIOS
brand: LENOVO
model:   20BG001CGE
bios:   GNET76WW (2.24 )
cpu:   Intel(R) Core(TM) i7-4900MQ CPU @ 2.80GHz
cpu-short: Core i7-4900MQ
chipset: Intel Corporation Xeon E3-1200 v3/4th Gen Core Processor DRAM
Controller [8086:0c04] (rev 06)
gpu:
- Intel Corporation 4th Gen Core Processor Integrated Graphics Controller
[8086:0416] (rev 06) (prog-if 00 [VGA controller])
- NVIDIA Corporation GK106GLM [Quadro K2100M] [10de:11fc] (rev a1) (prog-if
00 [VGA controller])
gpu-short:   NVIDIA Quadro K2100M
network: |
- Intel Corporation Ethernet Connection I217-LM (rev 04)
- Intel Corporation Wireless 7260 (rev 83)
- Sierra Wireless LTE WWAN Card (passed through to to sys-net)
memory: 32356
scsi: |
- SAMSUNG MZ7TD512 Rev: 5L0Q - SSD1 = 512 GB >>> Windows 10
- SanDisk SDSSDXPS Rev: 00RL - SSD2 (in optical Bay) 480 GB >>> Qubes OS 4
preRC1

Any idea where to continue troubleshooting?

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJsMQbfFmPMQiPAO-GtfOQHRume-TDMecFF6-HRz3fAMw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


grub.cfg
Description: Binary data


[qubes-users] Qubes OS 4 pre RC1

2017-07-08 Thread 'P R' via qubes-users
Hello,

I tried to install Qubes 4 pre RC1 on my Lenovo Thinkpad W540.
I've seen some warning messages during the Boot process of the installation
stick but the installation process itself was working without any problems.
After ~15min Qubes was ready to reboot.

When I reboot, Qubes Boot Menu comes up, but when I hit enter, after
roughly 6 seconds a reboot happens.

I have also tried to remove rhgb quiet from the grub line, to get more
information, but I just get a black screen, then reboot.

Any idea where to look for the for cause.

- Philipp

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKGDgDuns8PQ8OW8dQiOfNUdcwqFKQ%2BmQJFRMav9K4GeA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Seeking a Localization Team co-leader

2017-07-08 Thread 'P R' via qubes-users
Hello Andrew,

Unfortunately I am not gifted with programming skills, if I can help with
localization (english -> german) I am happy to help.

- PhR


Am 08.07.2017 7:12 nachm. schrieb "Andrew David Wong" :

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

We're looking for someone to join Tobias  as
co-leader of the Qubes localization team. If you're interested in this
position, please let us know.

You can learn more about our ongoing localization efforts from these
sources:

https://www.transifex.com/otf/qubes/
https://github.com/QubesOS/qubes-issues/issues/2824
https://github.com/QubesOS/qubes-issues/issues/2652
https://github.com/QubesOS/qubes-issues/issues/1452
https://github.com/QubesOS/qubes-issues/issues/2599
https://github.com/QubesOS/qubes-issues/issues/1333

Please feel free to reply to this thread with any questions, and
Tobias will be happy to answer them.

Best,
Andrew

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=SRKS
-END PGP SIGNATURE-

--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/
msgid/qubes-users/66fc3701-ad2f-102a-357c-8af478b25595%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJ1cs-_haMunWUbD5%3D%2BJYX2HX%3DFB_MkcBu%2B6EAnU3LWRQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] WWAN-Card not showing up in Fedora 24 based NetworkManager

2017-07-07 Thread 'P R' via qubes-users

Hello,

while my WWAN-card (Sierra Wireless EM7345) was working under the 
default Fedora 23 template I have a problems to get it working under my 
fedora 24 templates (all based on the Qubes OS fedora-24-minimal template).


Problem:
the WWAN card is visible within my net-VM, but I can't see it under the 
Network Manager applet in the menu bar.


Setup:
WWAN-Card is passed to my sys-net VM via an usb-qube and visible in the 
net-VM:


It seems that my WWAN-card is present in my sys-net, but even after 
setting up a connection in NetworkManager I can't see a WWAN entry in 
the applet of Network Manager like in Fedora23, where I then hit connect 
and done.


In my template VM I have also installed ModemManagerwith:
sudo dnf install ModemManager

As suggested in other treads and sites I have run the following commands 
in my Net VM


[user@my-sys-net ~]$ sudo systemctl start ModemManager
[user@my-sys-net ~]$ sudo systemctl enable ModemManager

I'm stuck, what am I missing?

- PhR

Some more details regading the WWAN card, attached to my net VM

WWAN-card is present in the VM as USB-device:
[user@my-sys-net ~]$ lsusb
Bus 002 Device 007: ID 1199:a001 Sierra Wireless, Inc.
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

All radios are enabled:
[user@my-sys-net ~]$ nmcli g
STATE  CONNECTIVITY  WIFI-HW  WIFI WWAN-HW  WWAN
connected  full  enabled  enabled  enabled  enabled

[user@my-sys-net ~]$ nmcli r
WIFI-HW  WIFI WWAN-HW  WWAN
enabled  enabled  enabled  enabled

A connection has also been created in Network Manager
[user@my-sys-net ~]$ nmcli c
NAMEUUID TYPEDEVICE
Wired connection 1  f19dd69b-8f0c-3f36-aa29-bbd0370b7cd5 802-3-ethernet  
enp0s0

T-Mobile(Telekom)   29f32d95-ea6e-46a3-b754-b92283031aaf gsm --

Strangely my WWAN device is in status unmanaged
[user@my-sys-net ~]$ nmcli d
DEVICE  TYPE  STATE CONNECTION
enp0s0  ethernet  connected Wired connection 1
wlp0s1  wifi  disconnected  --
lo  loopback  unmanaged --
wwan0   wwan  unmanaged --

My loaded kernel modules:

[user@my-sys-net ~]$ nmcli g
STATE  CONNECTIVITY  WIFI-HW  WIFI WWAN-HW  WWAN
connected  full  enabled  enabled  enabled  enabled
[user@my-sys-net ~]$ nmcli n
enabled
[user@my-sys-net ~]$ nmcli e
Error: Object 'e' is unknown, try 'nmcli help'.
[user@my-sys-net ~]$ nmcli r
WIFI-HW  WIFI WWAN-HW  WWAN
enabled  enabled  enabled  enabled
[user@my-sys-net ~]$ nmcli c
NAMEUUID TYPEDEVICE
Wired connection 1  f19dd69b-8f0c-3f36-aa29-bbd0370b7cd5 802-3-ethernet  
enp0s0

T-Mobile(Telekom)   29f32d95-ea6e-46a3-b754-b92283031aaf gsm --
[user@my-sys-net ~]$ nmcli d
DEVICE  TYPE  STATE CONNECTION
enp0s0  ethernet  connected Wired connection 1
wlp0s1  wifi  disconnected  --
lo  loopback  unmanaged --
wwan0   wwan  unmanaged --


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/964c04a9-1919-b1bc-d0e5-1c9d353700da%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4 testing feedback

2017-07-07 Thread 'P R' via qubes-users
Hello,

As I'm reading the 2nd post about the Qubes OS v4 ... Where and how to
become a tester?
Looking under Qubes Downloads I couldn't find any information about an
alpha or beta version.
https://www.qubes-os.org/downloads/

Kind regards

- PhR

Am 07.07.2017 8:24 nachm. schrieb :

> Sadly not working:
> 1) uefi known isue - I have to add /mapbs /noexitboot
> Then installer freezes at boot loader configuration process
>
> 2) libxl issue
> 2017-07-07 06:17:30.686+: libxl: libxl_exec.c:226:libxl__
> xenstore_child_wait_deprecated: Device Model not ready
> 2017-07-07 06:17:30.687+: libxl: libxl_pci.c:991:qemu_pci_add_xenstore:
> qemu refused to add device: :00:19.0,msitranslate=0,power_mgmt=0
> 2017-07-07 06:17:30.687+: libxl: libxl_pci.c:1329:libxl__add_pcidevs:
> libxl_device_pci_add failed: -3
> 2017-07-07 06:17:30.687+: libxl: 
> libxl_create.c:1498:domcreate_attach_devices:
> unable to add pci devices
> 2017-07-07 06:17:31.475+: libxl: 
> libxl_exec.c:118:libxl_report_child_exitstatus:
> /etc/xen/scripts/block-snapshot remove [6863] exited with error status 1
> 2017-07-07 06:17:31.475+: libxl: 
> libxl_device.c:1225:device_hotplug_child_death_cb:
> script: Device /dev/mapper/snapshot-fd04:13240061-fd04:13240044-fd04:13502187
> does not exists
> 2017-07-07 06:23:05.349+: libxl: libxl_exec.c:226:libxl__
> xenstore_child_wait_deprecated: Device Model not ready
> 2017-07-07 06:23:05.350+: libxl: libxl_pci.c:991:qemu_pci_add_xenstore:
> qemu refused to add device: :00:19.0,msitranslate=0,power_mgmt=0
> 2017-07-07 06:23:05.351+: libxl: libxl_pci.c:1329:libxl__add_pcidevs:
> libxl_device_pci_add failed: -3
> 2017-07-07 06:23:05.351+: libxl: 
> libxl_create.c:1498:domcreate_attach_devices:
> unable to add pci devices
> 2017-07-07 06:23:06.155+: libxl: 
> libxl_exec.c:118:libxl_report_child_exitstatus:
> /etc/xen/scripts/block-snapshot remove [8131] exited with error status 1
> 2017-07-07 06:23:06.156+: libxl: 
> libxl_device.c:1225:device_hotplug_child_death_cb:
> script: Device /dev/mapper/snapshot-fd04:13240061-fd04:13240044-fd04:13502187
> does not exists
>
> Tested on HP 8570w. Will try official release next.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/f1d1987b-5279-4d20-a282-ae79f3683ee4%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2BeJ0m4PzHxEnHX6JXz-fff6%3DZjCqgDqpaU4q7OadLs_A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] LTE-card stopped working in my fedora-24-minimal sys-net Net-VM

2017-07-04 Thread 'P R' via qubes-users

Hello,

I'm trying to get my new sys.net NetVM (based on the fedora-24-minimal) 
template working.


After fixing Wifi I am now struggling to get my LTE card working, which 
is working out of the box with the default fedora-23 sys-net.


My LTE-card is a Sierra Wireless EM7345 4G LTE card which is connected 
internally to the USB bus.


I was able to successfully mount the LTE card through my USB-Cube into 
the sys-net where it is also recognized:


[user@my-sys-net ~]$ lsusb

Bus 002 Device 004: ID 1199:a001 Sierra Wireless, Inc.

(...)

I have also installed ModemManager in my sys-net-template but when I 
start "Network Connection" for the sys-net NetVM to configure a new 
connection I can't choose a device in the setup windows because I my LTE 
card is not shown as device.


Any idea what is missing? Is this also a driver issue?

As I copied the content of /usr/lib/firmware from my fedora-23 sys-net 
VM all drivers should be there, do I need to load a special kernel module?



- Ph.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/507a05a0-8591-45be-d604-29db71bfa445%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] No Wifi Adapter in my-sys-net (based on fedora-24-minimal)

2017-07-03 Thread 'P R' via qubes-users
Hello Connor,

Am 03.07.2017 1:24 nachm. schrieb "Connor Page":

I guess you need to install any firmware packages for your network devices
first.
IIRC it's called iwl7260-firmware or something like that.


I looked into the sys-net (default Fedora 23) Net-VM and found several
firmware files under /use/lib/firmware including the iwlwifi-firmware files.

Looking into my new fedora-24-minimal VM I can't see any firmware files.

Question:
Is it ok to tar /usr/lib/firmware from m fedora-23 template and move it
over to my fedora-24-minimal template?

Or are there different firmware files for Fedora 24?

Can I install them through a package?

- Ph.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnv%2Bm3y-B4vL%2B%2BPD-0vu9ztgoTZf-TiNBMei69OpG-u52pA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] No Wifi Adapter in my-sys-net (based on fedora-24-minimal)

2017-07-02 Thread 'P R' via qubes-users

Hello,

my Lenovo W540 is working without any problems under Qubes 3.2 with the 
fedora-23 templates.


I have now created a new template based on fedora-24-minimal which I use 
für my Net-VM, Firewall-VM and also USB-Qube.


Strangely my Wifi adapter is not available in my sys-net (based on 
fedora-24-minimal) while it is working without any problems in the 
sys-net (based on fedora-23).


I have verified that all modules which are running in fedora-23 sys-net 
VM are also available in fedora-24 sys-net VM.


sudo modprobe -rv  unload module
sudo modprobe -v  load module
lsmod

*[user@sys-net ~]$ lspci -k*
00:00.0 Ethernet controller: Intel Corporation Ethernet Connection 
I217-LM (rev 04)

Subsystem: Lenovo Device 2210
Kernel driver in use: e1000e
Kernel modules: e1000e
00:01.0 Network controller: Intel Corporation Wireless 7260 (rev 83)
Subsystem: Intel Corporation Dual Band Wireless-AC 7260
Kernel driver in use: iwlwifi
Kernel modules: iwlwifi


*[user@sys-net ~]$ lsmod*
Module  Size  Used by
ccm20480  2
iptable_raw16384  1
fuse   98304  3
xt_nat 16384  2
xen_netback49152  1
xt_REDIRECT16384  1
nf_nat_redirect16384  1 xt_REDIRECT
ip6table_filter16384  1
ip6_tables 28672  1 ip6table_filter
xt_conntrack   16384  2
ipt_MASQUERADE 16384  1
nf_nat_masquerade_ipv416384  1 ipt_MASQUERADE
iptable_nat16384  1
nf_conntrack_ipv4  16384  3
nf_defrag_ipv4 16384  1 nf_conntrack_ipv4
nf_nat_ipv416384  1 iptable_nat
nf_nat 24576  4 
nf_nat_redirect,nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
nf_conntrack  106496  5 
nf_nat,nf_nat_ipv4,xt_conntrack,nf_nat_masquerade_ipv4,nf_conntrack_ipv4

arc4   16384  2
iwlmvm315392  0
mac80211  708608  1 iwlmvm
iwlwifi   155648  1 iwlmvm
e1000e237568  0
cfg80211  557056  3 iwlwifi,mac80211,iwlmvm
ptp20480  1 e1000e
pps_core   20480  1 ptp
rfkill 24576  3 cfg80211
intel_rapl 20480  0
iosf_mbi   16384  1 intel_rapl
x86_pkg_temp_thermal16384  0
coretemp   16384  0
crct10dif_pclmul   16384  0
crc32_pclmul   16384  0
crc32c_intel   24576  0
pcspkr 16384  0
xen_pcifront   20480  0
xenfs  16384  1
dummy_hcd  36864  0
udc_core   24576  1 dummy_hcd
xen_privcmd16384  9 xenfs
xen_blkback45056  0
u2mfn  16384  0
xen_blkfront   40960  6

[user@sys-net ~]$ modinfo iwlmvm | grep -E '^(description|author|depends):'
author: Copyright(c) 2003- 2015 Intel Corporation 


description:The new Intel(R) wireless AGN driver for Linux
depends:iwlwifi,mac80211,cfg80211
[user@sys-net ~]$ modinfo mac80211| grep -E '^(description|author|depends):'
description:IEEE 802.11 subsystem
depends:cfg80211
[user@sys-net ~]$ modinfo cfg80211| grep -E '^(description|author|depends):'
description:wireless configuration support
author: Johannes Berg
depends:rfkill
[user@sys-net ~]$ modinfo iwlwifi| grep -E '^(description|author|depends):'
author: Copyright(c) 2003- 2015 Intel Corporation 


description:Intel(R) Wireless WiFi driver for Linux
depends:cfg80211
[user@sys-net ~]$ modinfo mac80211| grep -E '^(description|author|depends):'
description:IEEE 802.11 subsystem
depends:cfg80211

In the fedora-24 net-VM I've run the following command:

   sudo modprobe -v iwlwifi

   sudo modprobe -v iwlmvm

   sudo modprobe -v mac80211

   sudo modprobe -v cfg80211

When I start my sys-net (fedora-24) I still can't setup my 
wifi-connection, as I can't choose a device in network manager for the 
wifi-connection.


The list is empty.


When I run lspci in my sys-net (fedora-24) I can see that the internal 
network card and also my wifi card are known to the system, but I still 
can't setup a wifi connection.


Any ideas what I should do at this point?

I've looked at the Qubes Documentation at: 
https://www.qubes-os.org/doc/wireless-troubleshooting/


... but I didn't find a suggestion what to try next.

Any help would be great.

Regards


- Ph






--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f59c4c09-a5b9-1c81-24f6-ad73d45ce622%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] SOLVED: Help :: Disposable VMs start without a NetVM (can't use DVMs currently )

2017-07-02 Thread 'P R' via qubes-users

Hello Unman,

On 07/02/17 03:19, Unman wrote:


The "netVM for dispVM" entry sets the netVM for disposableVMs started
from that qube.
If you start it from the Qubes Menu then it will (should) honour the 
setting for the dvmTemplate, and so in your case start a disposableVM 
attached to the firewall. If you are starting a disposableVM from a 
qube (by e.g "open in disposable VM") then THAT disposableVM will be 
connected to whatever the entry for "NetVM for dispVM" says for that 
qube.


Thank you for the clarification, that wasn't clear to me, maybe this 
should be highlighted in the documentation?


* Solution *
I have removed the DVM-template and made sure that the template VM will 
work if I attach my sys-firewall as Net-VM to it.


I then did the following steps in dom0, where "my-fedora-24-apps" is my 
own fedora template for app-vms.


# Create a new template for my disposable VMs based on my template 
"my-fedora-24-apps"

qvm-create-default-dvm my-fedora-24-apps

# attach sys-firewall to this template
qvm-prefs -s my-fedora-24-apps-dvm netvm sys-firewall

# Reboot Qubes
shutdown -r now

After the reboot I started DispVM: Firefox web Browser from the Qubes 
menu with a working network connection.


Thank your for the hint.

- Ph.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dc1fcf83-a6f8-00de-361d-228b0d922657%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Help :: Disposable VMs start without a NetVM (can't use DVMs currently )

2017-07-01 Thread 'P R' via qubes-users

Hello,

I have spend several hours to built new Template VMs from scratch (more 
precise: the fedora-24-minimal templates).


Now I have the problem, that my new disposable VMs all start without an 
attaches Net-VM.


sys-usb, sys-firewall, sys-net are now all based on the 
fedora-24-minimal template, with some additional packages, as suggested 
in the documentation.


I have also built a new dvm which is based on the fedora-24 template:

My default fedora-24 template is named "my-fedora-24-apps" and is a 
Template VM without a NetVM attached.


I created a new dvm in dom0:

[user@dom0 ~] qvm-create-default-dvm my-fedora-24-apps

In preferences of the new dvm template which is named 
"my-fedora-24-apps-dvm" I have attached  the firewall Proxy VM as NetVM.


But when I launch a program in the disposable VM there is no Net-VM 
attached.
I have also set the "NetVM for DispVM" unter "Other" in the "Advanced" 
Settings Tab of Qubes Manager for the dvm template to sys-firewall.


Still all my disposable AppVM start with an empty NetVM.
If I edit a disposable App VM and add the sys-firewall as NetVM, 
everything works fine.



QUESTION:
Where and how am I supposed to set the correct information which NetVM 
should be used for my DVMs?


- P R

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ef49d62f-8b10-1947-e512-3c323b119054%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to hide template VMs or other in Qubes Manager

2017-06-14 Thread 'P R' via qubes-users
Hello,

I'd like to keep my Qubes Manager Interface lean so that I can see what is
going on.

Is there any way to hide not running template VMs from Qubes Manager?
I would like to see this as an additional option in the Qubes "View" menu
(Show/Hide template VMs).

As the dvm-AppVM can be hide via "Show/Hide Internal VMs" I tried to edit
/var/lib/qubes/qubes.xml and set the Internal flag vom false to true, but
this doesn't hide the VM in Qubes Manager, even after closing and
restarting Qubes Manager.

Question:
Can the hide Template VM feature be added in further versions of Qubes
Manager

And:

How can I mark a VM as internal?


- P

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJyCogDPwVvt18AUFaH0tN6Xx_--ekL_7ze1PQvdiiMOA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Question(s) regarding Qubes minimal templates

2017-06-14 Thread 'P R' via qubes-users
Hello,

Are there any reasons to migrate from fedora-23 to fedora-24 regarding:

- features
- security
(...)

Regards

- P

Am 14.06.2017 12:30 vorm. schrieb "'Tomei Ningen' via qubes-users" <
qubes-users@googlegroups.com>:

> > I'm a strong advocate of using minimal (or smaller) templates,
> customised for specific use cases. Some people HATE this approach.
> >
> > unman
>
>  Really? Coming from the sort of people with the patience for an OS
> like Qubes? I'd think anyone who's involved enough to have an opinion would
> be in favor of that -- that's kind of the idea here, isn't it?  One thing I
> wish I could change would be the visual clutter it produces; anybody know
> of a means to flag these VMs as internal so I can hide the ones I'm not
> interested in seeing regularly?
>  That being said, I'm definitely in agreement with you, unman. Would
> you recommend any particular setup for a more granular approach? My current
> arrangement of VMs [work in progress; suggestions welcome!] is structured
> like this as of now:
>
>
>- dom0
>- fedora-24
>- dispVM(s)
>   - fedora-24-minimal *( ... > derivative templates > appVM >
>packages*)*
>- fedora-24-min-net
>   - sys-net**
>  - *General-purpose: *gnome-keyring, less, man, pciutils, psmisc,
> sudo, vim-minimal, xterm
> - *Template-specific: *dbus-x11, dejavu-sans-fonts,
> NetworkManager, NetworkManager-wifi, network-manager-applet,
> notification-daemon, tinyproxy
> - fedora-24-min-frwll
>   - sys-firewall
>  - *No additional packages; effectively a clone of the
> Fedora-24-minimal template.*
> - fedora-24-min-vpn
>   - sys-vpn
>  - *G.P.*: sudo, xterm
> - *T.S.*: [TBD; trying out some different VPNs atm]
> - fedora-24-min-usb
>   - sys-usb
>  - *G.P.*: sudo, xterm
> - *T.S.*: qubes-input-proxy-sender
> - fedora-24-min-pen
>   - pentest
>  - *G.P.*: sudo, xterm
> - *T.S.*: aircrack-ng, ettercap, kismet, nmap, nmap-telcat,
> tcpdump, wireshark***, [remaining packages TBD]
>
> * The concomitant dependencies aren't included in these lists (n.b.
> packages are installed in the respective templateVM)
> ** Can't quite get this one to run properly yet; I presume I need to
> install a proprietary driver in the template to make this work for my
> machine(?)
> *** Very interested in trying out v6ak's split-wireshark" idea but haven't
> found the time yet. Thanks for sharing that idea, v6ak!
>
> - TN
>
>
>
> Sent with ProtonMail  Secure Email.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/QOUCXs5Owf4_vFzLV8tj0-YlBHu981vPYZYllxyjhEEUARUYol1x
> XRAHwNTExkDU0O9iMVo0_fWuy4AlV4-AlAT_GSEpbXPcDbfw6jw_GYw%3D%40protonmail.ch
> 
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKr7us%2BF2SAgM2RCka%2Bm5yDGPmtTtVS3D0zTbLQM5jidw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANDROID X86 ON HVM (PROBLEM SOLVED)

2017-05-15 Thread 'P R' via qubes-users
Hello,

Am 15.05.2017 1:30 nachm. schrieb :

Thank you very much, with the last answer I've solved the problem.
Installing android on a hvm:

(...)


Thank you for the how-to summary.
Can you give a short summary what is working and what not?
Example:
- internet access (via sys-net)
- audio
- (...)

Kind regards

- P

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJ%3D%3DMqtnVcOJ8ct3tyM%2BLdzEQReNunEqmD9cmt%3DCjB%2B4g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.