Re: [qubes-users] Safely use USB keyboard and untrusted USB devices with only 1 USB controller?

2017-07-11 Thread Andres MRM
[2017-05-23 15:18] Vít Šesták:

> So, I've created DVM-like sys-usb and it the first working version was easier 
> than I thought. Just make /var/lib/qubes/servicevms/sys-usb/private.img an 
> empty file. I have renamed the original file and performed "touch 
> private.img".
> 
> VM sys-usb then still boots and works as USB input proxy. It does not run X11 
> apps until I create+chown /home/user and perform systemctl restart 
> qubes-gui-agent.service, but it does not matter so much.

Thanks for the tip! I did it and hope it's working.
But now sometimes I need to "replug" mouse or/and keyboard after boot for them
to work...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149977468708.5204.3258625358229903159%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM

[2017-07-06 17:18] Unman:

> Can you check the command line?
> In the thread it is incorrect and i want to make sure that you havent
> been misled.
> The correct format would be something like:
> qvm-start  --cdrom=:/home/user/kali.iso

Sure. This didn't work:

$ qvm-start hvm --cdrom=media:/home/user/a.iso

Then I copied the ISO to dom0 and this worked:

$ qvm-start hvm --cdrom=/home/user/a.iso

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149937311226.6232.15817870788107264063%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM

I just copied the debian ISO to dom0 and it booted (installing at this very
moment, let's see if works).
So it can't boot the ISO from inside another VM... No idea why... And yes, I
checked the path many times, even moved and renamed to a short path
(/home/user/a.iso) and set permissions to 777.


[2017-07-06 12:20] Andres MRM:

> [2017-07-06 11:33] Unman:
> 
> > You can see packkage information from QubesManager - About - Qubes OS -
> > Version Information.
> 
> xen_version: 4.6.5
> Linux 4.4.38-11.pvops.qubes.x86_64
>   
> Installed Packages:  
>   
> i3-settings-qubes.x86_64  
>   1.2-1.fc23 
> kernel-qubes-vm.x86_64
>   1000:4.4.62-12.pvops.qubes 
> kernel-qubes-vm.x86_64
>   1000:4.4.67-12.pvops.qubes 
> kernel-qubes-vm.x86_64
>   1000:4.4.67-13.pvops.qubes 
> qubes-anaconda-addon.noarch   
>   3.2.3-1.fc23 
> qubes-artwork.noarch  
>   3.2.0-2.fc23 
> qubes-core-dom0.x86_64
>   3.2.14-1.fc23 
> qubes-core-dom0-doc.noarch
>   3.2.14-1 
> qubes-core-dom0-linux.x86_64
> 3.2.13-1.fc23 
> qubes-core-dom0-linux-kernel-install.x86_64  
> qubes-db.x86_64   
>   3.2.3-1.fc23 
> qubes-db-dom0.x86_64  
>   3.2.3-1.fc23 
> qubes-db-libs.x86_64  
>   3.2.3-1.fc23 
> qubes-gpg-split-dom0.x86_64   
>   2.0.24-1.fc23 
> qubes-gui-dom0.x86_64 
>   3.2.11-1.fc23 
> qubes-img-converter-dom0.x86_64 
> 1.2.3-1.fc23 
> qubes-input-proxy.x86_64  
>   1.0.8-1.fc23 
> qubes-libvchan-xen.x86_64 
>   3.2.1-1.fc23 
> qubes-manager.x86_64  
>   3.2.11-1.fc23 
> qubes-menus.noarch
>   2.0-1 
> qubes-mgmt-salt.noarch
>   3.2.5-1.fc23 
> qubes-mgmt-salt-admin-tools.noarch  
> 3.2.5-1.fc23 
> qubes-mgmt-salt-base.noarch   
>   3.2.2-1.fc23 
> qubes-mgmt-salt-base-config.noarch  
> 3.2.2-1.fc23 
> qubes-mgmt-salt-base-overrides.noarch
> qubes-mgmt-salt-base-overrides-libs.noarch   
> qubes-mgmt-salt-base-topd.noarch
> 3.2.1-1.fc23 
> qubes-mgmt-salt-config.noarch   
> 3.2.5-1.fc23 
> qubes-mgmt-salt-dom0.noarch   
>   3.2.5-1.fc23 
> qubes-mgmt-salt-dom0-qvm.noarch 
> 3.2.1-1.fc23 
> qubes-mgmt-salt-dom0-update.noarch  
> 3.2.0-1.fc23 
> qubes-mgmt-salt-dom0-virtual-machines.noarch 
> qubes-pdf-converter-dom0.x86_64 
> 2.1.2-1.fc23 
> qubes-release.noarch  
>   3.2-0.26 
> qubes-release-notes.noarch
>   3.2-0.26 
> qubes-template-archlinux.noarch 
> 3.0.6-201611130159 
> qubes-template-debian-8.noarch  
> 3.0.6-201608090120 
> qubes-template-fedora-23.noarch 
> 3.0.6-201608081228 
> qubes-template-whonix-gw.noarch 
> 3.0.6-201608050041 
> qubes-template-whonix-ws.noarch 
> 3.0.6-201608050146 
> qubes-usb-proxy-dom0.noarch   
>   1.0.5-1.fc23 
> qubes-utils.x86_64
>   3.2.4-1.fc23 
> qubes-utils-libs.x86_64   
>   3.2.4-1.fc23 
> xfce4-settings-qubes.x86_64

Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM
[2017-07-06 11:33] Unman:

> You can see packkage information from QubesManager - About - Qubes OS -
> Version Information.

xen_version: 4.6.5
Linux 4.4.38-11.pvops.qubes.x86_64
  
Installed Packages:  
  
i3-settings-qubes.x86_64
1.2-1.fc23 
kernel-qubes-vm.x86_64  
1000:4.4.62-12.pvops.qubes 
kernel-qubes-vm.x86_64  
1000:4.4.67-12.pvops.qubes 
kernel-qubes-vm.x86_64  
1000:4.4.67-13.pvops.qubes 
qubes-anaconda-addon.noarch 
3.2.3-1.fc23 
qubes-artwork.noarch
3.2.0-2.fc23 
qubes-core-dom0.x86_64  
3.2.14-1.fc23 
qubes-core-dom0-doc.noarch  
3.2.14-1 
qubes-core-dom0-linux.x86_64
3.2.13-1.fc23 
qubes-core-dom0-linux-kernel-install.x86_64  
qubes-db.x86_64 
3.2.3-1.fc23 
qubes-db-dom0.x86_64
3.2.3-1.fc23 
qubes-db-libs.x86_64
3.2.3-1.fc23 
qubes-gpg-split-dom0.x86_64 
2.0.24-1.fc23 
qubes-gui-dom0.x86_64   
3.2.11-1.fc23 
qubes-img-converter-dom0.x86_64 
1.2.3-1.fc23 
qubes-input-proxy.x86_64
1.0.8-1.fc23 
qubes-libvchan-xen.x86_64   
3.2.1-1.fc23 
qubes-manager.x86_64
3.2.11-1.fc23 
qubes-menus.noarch  
2.0-1 
qubes-mgmt-salt.noarch  
3.2.5-1.fc23 
qubes-mgmt-salt-admin-tools.noarch  
3.2.5-1.fc23 
qubes-mgmt-salt-base.noarch 
3.2.2-1.fc23 
qubes-mgmt-salt-base-config.noarch  
3.2.2-1.fc23 
qubes-mgmt-salt-base-overrides.noarch
qubes-mgmt-salt-base-overrides-libs.noarch   
qubes-mgmt-salt-base-topd.noarch
3.2.1-1.fc23 
qubes-mgmt-salt-config.noarch   
3.2.5-1.fc23 
qubes-mgmt-salt-dom0.noarch 
3.2.5-1.fc23 
qubes-mgmt-salt-dom0-qvm.noarch 
3.2.1-1.fc23 
qubes-mgmt-salt-dom0-update.noarch  
3.2.0-1.fc23 
qubes-mgmt-salt-dom0-virtual-machines.noarch 
qubes-pdf-converter-dom0.x86_64 
2.1.2-1.fc23 
qubes-release.noarch
3.2-0.26 
qubes-release-notes.noarch  
3.2-0.26 
qubes-template-archlinux.noarch 
3.0.6-201611130159 
qubes-template-debian-8.noarch  
3.0.6-201608090120 
qubes-template-fedora-23.noarch 
3.0.6-201608081228 
qubes-template-whonix-gw.noarch 
3.0.6-201608050041 
qubes-template-whonix-ws.noarch 
3.0.6-201608050146 
qubes-usb-proxy-dom0.noarch 
1.0.5-1.fc23 
qubes-utils.x86_64  
3.2.4-1.fc23 
qubes-utils-libs.x86_64 
3.2.4-1.fc23 
xfce4-settings-qubes.x86_64 
3.2.2-1.fc23 


> Are you using standard repositories, or have yu enabled testing?

Yes and no.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149935443037.7886.1054297749536477904%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: kali failing to start as a HVM (bootable iso)

2017-07-06 Thread Andres MRM
[2017-07-05 19:30] Unman:

> I see this error if there's a typo in the filename or permissions are
> wrong.
> Otherwise it works as expected - what versions of the Qubes packages are
> you using? What are specs of your box? Plenty of RAM?

Thanks for the reply!

I noticed it gives the same error for filename typos, so I checked the path
multiple times and even copied the file to /a.iso to make sure.
The permissions of the images are "-rw-r--r--" owned by user.

My RAM is 8GB, and the error seems to change when there isn't enough RAM (when
many VMs are running), so I think this is not the case.

Not sure about Qubes packages version, but I just did a qubes-dom0-update to
test, and still same error.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149934383589.7886.10799018145966845381%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Safely use USB keyboard and untrusted USB devices with only 1 USB controller?

2017-03-28 Thread Andres MRM
Thanks for the replies!

[2017-03-27 22:13] cooloutac:
> so I guess just take your chances with it on the usb qube. I do it with
> mouse never seen anything weird happen.  a wireless mouse too. although I
> probably should put lock screen on I just realized I don't even have it on.

I setup an USB qube. It's working well, for now. =)

[2017-03-28 04:03] Vít Šesták:
> DVM for sys-usb would be cool, but I don't think it is possible today. The
> main challenge is probably to attach a PCI device to DVM. Well, maybe if you
> clone/tune qfile-daemon-dvm or related files… After you attach the USB
> controller to the DVM, you have essentially won; you will probably need just
> to upload and run some script (for starting the input proxy) to the USBDVM.
> Thos should be trivial, compared to attaching the USB device.

Is there any difference between using a DVM as USB qube, or just recreating
the USB qube when needed (e.g.: after using an untrusted pen drive)?


Best regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149070066109.1245.5774877112809671387%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Safely use USB keyboard and untrusted USB devices with only 1 USB controller?

2017-03-26 Thread Andres MRM

[2017-03-26 21:14] cooloutac:
> what about using the internal kb, no good?

No... I'm using an ergonomic one. It wasn't cheap, it's very different from a
common one and it took me months to get used to it. =P

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149057415942.803.181230451023176868%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Safely use USB keyboard and untrusted USB devices with only 1 USB controller?

2017-03-26 Thread Andres MRM
> ehci is for older usb protocol.  xhci is for 3.0,  maybe there is option in
> bios to disable usb 3.0.  then maybe it will have separate routed
> controllers? Thats how it works on my desktop pc.  otherwise all controllers
> get routed through the xhci one.  but then you will be giving up usb 3.0,
> but maybe worth it not to have kb in sys-usb. 

Thanks, cooloutac! I checked my BIOS, but couldn't find an option to disable
USB 3.0. =/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149052994964.798.1907313827177849368%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Safely use USB keyboard and untrusted USB devices with only 1 USB controller?

2017-03-23 Thread Andres MRM
[2017-03-22 18:52] cooloutac:
> not sure but if its like my pc when using xhci (usb 3.0) everything goes
> through thaT one controller. it look like you have ehci controller too but
> not sure.  What I do with one controller is use a usb to pci adapter for the
> kb.  For mouse you can use the qubes proxy, not as bad as also having kb in
> usbvm.

Thanks, cooloutac!

What do you mean by "it look like you have ehci controller too"? What is it?
Can it help me?

Unfortunately my notebook has no PCI port...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149027169476.4535.10778284502551220775%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Safely use USB keyboard and untrusted USB devices with only 1 USB controller?

2017-03-20 Thread Andres MRM
Thanks for the replies, Unman and Andrew.
And sorry for not answering you before, Unman, but I only saw your
message now.

[2017-03-19 20:48] Unman:
> Try 'lspci|grep USB'
> Alternatively, look in QubesManager on the devices tab, and see how many
> Controllers are there.

# lspci|grep USB
00:14.0 USB controller: Intel Corporation 7 Series/C210 Series Chipset Family 
USB xHCI Host Controller (rev 04)
00:1a.0 USB controller: Intel Corporation 7 Series/C216 Chipset Family USB 
Enhanced Host Controller #2 (rev 04)
00:1d.0 USB controller: Intel Corporation 7 Series/C216 Chipset Family USB 
Enhanced Host Controller #1 (rev 04)

In the devices tab of any VM I also can see these 3 controllers. But, by
the output of the other commands, it seems all my external devices are
connected to the first controller, no?
(Bus 4 and 3, that have id 00:14.0)


Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/149000620962.1073.4482443968028805728%40email.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Safely use USB keyboard and untrusted USB devices with only 1 USB controller?

2017-03-19 Thread Andres MRM
Thanks for the reply, Andrew!

[2017-03-19 19:13] Andrew David Wong:
> That's up to you. The pros and cons are, I think, pretty clearly laid
> out on the USB page. If you have specific questions that aren't
> addressed there, please feel free to ask.

That's what I feared... =/

I think I have no option, for I can only forward the smartphone to an
"adb" qube if the USB controller is in a USB qube, right? (can't do that
from dom0)

Do the USB qube get reset every reboot (like a DVM)? That would reduce
the threat, I think...

And about the commands' outputs, any idea if they really mean only one
USB controller?


Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/148997117881.900.6223634171823122302%40email.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [Arch Linux + i3] High CPU usage after closing windows

2017-03-19 Thread Andres MRM
[2017-03-19 18:04] :
> Hi, guys. Can you help me with this error ?
> 
> Curl: (22) The requested URL returned error: 404 non found

Hi! Does the VM has internet connection? Can you ping something?
If not, maybe you need to change settings (QubesManager) so it connects
through a NetVM.


Me:
> Any ideas about where to place a "xmodmap ~/.Xmodmap"?

I added a .desktop to .config/autostart/, but it's not really good.
It required a "sleep 1" before "xmodmap ~/.Xmodmap" for it to work...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/148997026899.900.13212364451618759185%40email.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Arch Linux + i3] High CPU usage after closing windows

2017-03-19 Thread Andres MRM
Thanks for the fast reply, Olivier!
But no, I don't think it's related.
The problem seems indeed to be with zsh cofig, but it only showed up
after VM reboot. Sorry for the confusion.
It seems the command that was causing the problem was "xset r rate 200 45".
(no reason for running it in a VM since it should be configured in dom0,
right?)

And, yes, I know such command shouldn't be placed in .zshrc, but
.xinitrc is not being run at X startup... Any ideas about where to place
a "xmodmap ~/.Xmodmap"? rc.local seems not to work for this (maybe it is
run before X startup?


Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/148993515432.807.7757520650894350868%40localhost.localdomain.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Mount different folders on same partition to different AppVMs?

2017-03-11 Thread Andres MRM
Thanks, Unman! It's an interesting idea! I'll see what fits better for my
case.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/148924980771.898.11742464822643325426%40utopos.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Archlinux Community Template Qubes OS 3.2

2017-03-09 Thread Andres MRM
[2017-03-09 19:24] Franz:
> For me IgnoreGroup has no effect, but IgnorePkg = xorg-server pulseaudio  does
> prevent the update of xorg-server and pulseaudio,  but the same, after that I
> get:
> 
> warning: pulseaudio: ignoring package upgrade (9.0-1 => 10.0-2)
> warning: xorg-server: ignoring package upgrade (1.18.4-1 => 1.19.2-1)
> resolving dependencies...
> looking for conflicting packages...
> :: xf86-input-evdev and xorg-server are in conflict. Remove xorg-server? [y/N]
> n
> error: unresolvable package conflicts detected
> error: failed to prepare transaction (conflicting dependencies)
> :: xf86-input-evdev and xorg-server are in conflict (xorg-server<1.19.0)
> 
> I have no idea how to handle that.

Hi, Franz!

I just kept adding the packages to IgnorePkg, until I added one to IgnorePkg
and the two main ones to IgnoreGroup. Then it worked. That's why I thought the
IgnoreGroup ignored the rest of them, but maybe I just added them all to
IgnorePkg.


Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/148910340817.869.12531924820380016881%40utopos.
For more options, visit https://groups.google.com/d/optout.