Re: [qubes-users] Boot log

2019-07-22 Thread frozentime345
For some reason it's not subscribing me to issues I start lol, didn't get 
an email with your reply, sorry for the late reply.

So I checked the bios and VT-D is enabled, virtualization is enabled, 
everything is pretty much enabled.

I have two systems, one before the update(my main system) and a usb I 
update first.

Both of their logs had the following:
Unknown cachability for MFNs 0x7bc00-0x7fdff
[VT-d]Passed iommu=no-igfx option. Disabling IGD VT-D engine
Intel VT-d snoop control not enabled
Intel VT-d Dom0 DMA Passthrough not enabled
Intel VT-d Posted Interrupt not enabled
Intel VT-d Shared Ept Tables not enabled

My main computer had exclusively:
It's risky to assign :00:14.0+1d.0+1a.0 with shared rmrr at x for domX
[VT-d]Passed iommu=no-igfx option. Disabling IGD VT-D engine # a second 
time close to the first occurence

My boot usb had:
[VT-D]INTR-REMAP: Request device [:f0:1f.0] fault index 7986, iommu reg 
= 82c0009f4000

Not sure how to upload the entire logs on google groups browser version?

On Friday, July 19, 2019 at 8:48:09 PM UTC, awokd wrote:
>
> Frozentime345: 
> > After the latest update during boot it is showing messages like VT-D and 
> > others are not enabled. I tried to access this information using "sudo 
> > journalctl -b" but found nothing. 
> > 
> > Is there are any boot log that I can access to read and diagnose these 
> > issues? 
> > 
> > Also, does anyone know why these messages are appearing now? 
> > 
> > Thanks for your help in advance. 
> > 
> Also look in /var/log/xen/console/hypervisor.log. Not sure why they 
> would be appearing now; if they weren't working before you would have 
> had trouble installing Qubes in the first place. Double check your 
> UEFI("BIOS") config to make sure they're still enabled. 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8f83d5cd-d2f0-4906-9e5b-5877da4a3045%40googlegroups.com.


[qubes-users] Boot log

2019-07-19 Thread Frozentime345
After the latest update during boot it is showing messages like VT-D and 
others are not enabled. I tried to access this information using "sudo 
journalctl -b" but found nothing.


Is there are any boot log that I can access to read and diagnose these 
issues?


Also, does anyone know why these messages are appearing now?

Thanks for your help in advance.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fcba0667-d11a-bb59-9ddc-a80a1d1bb898%40gmail.com.


[qubes-users] Sometimes randomly shuts off at encryption screen

2019-07-04 Thread Frozentime345
Sometimes when I boot up the system freezes in the middle of typing my 
encryption password and shuts down. Happens rarely.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c29d7841-44b4-e519-41dc-e1170fcdaa6d%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Does restoring automatically verify integrity?

2019-06-21 Thread frozentime345
On Wednesday, June 19, 2019 at 10:55:13 PM UTC, awokd wrote:
> Frozentime345:
> > Does restoring automatically verify integrity? Or are we suppose to run
> > an integrity check before restoring?
> > 
> Yes, restore uses the password you enter as both an encryption and
> integrity check.

Okay, thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a1b2f52a-af6c-4518-bb48-131b29ff6ebe%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does restoring automatically verify integrity?

2019-06-18 Thread Frozentime345
Does restoring automatically verify integrity? Or are we suppose to run 
an integrity check before restoring?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf4062bb-aa00-966d-b1bb-22e5ed91c046%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Log qubes firewall packets

2019-04-21 Thread Frozentime345

Okay thanks, should I post this in issues as a feature request?

On 4/21/19 4:06 PM, Zrubi wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 4/21/19 9:13 PM, Frozentime345 wrote:

Wondering how to log packets blocked and accepted by qubes firewall
for specific vm or all vms if thats the only option? Couldn't find
anything in website or google or qvm-firewall



Unfortunately, Qubes firewall was not designed for such use case.

If you are familiar with the iptables (and nftables too), you may be
able to workraound this limitation. But it really not trivial to achieve
.

- -- 
Zrubi

-BEGIN PGP SIGNATURE-
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=4NxJ
-END PGP SIGNATURE-



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/578b2297-0d79-1678-0710-7369124b9069%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Log qubes firewall packets

2019-04-21 Thread Frozentime345
Wondering how to log packets blocked and accepted by qubes firewall for 
specific vm or all vms if thats the only option? Couldn't find anything 
in website or google or qvm-firewall


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/049dca62-08a1-6f03-9fb7-73f99f5866b2%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Don't give focus to new windows in certain work-spaces

2019-01-24 Thread Frozentime345
I like when it automatically gives focus to new windows most of the 
time, but when Im entering passwords it's sometimes a pain. Any way to 
off the feature for just one workspace?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d15cb1b-3e1f-560f-f601-5bf636080e4d%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Decrypt from shell or modify boot

2018-12-16 Thread Frozentime345
Is there any way to decrypt the hard drive using a shell and then boot 
like that? Or otherwise modify the boot to accept a key-file(on a flash 
drive) instead of a pass-phrase?


Ctrl+alt+f2 or any other combo doesn't seem to open a shell, is there 
any way?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0079f3c-ab95-b996-1476-b0fcdd755a40%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to use encryption key(on flash drive) instead of pass phrase

2018-12-16 Thread Frozentime345
I was trying to follow the custom install guide to do this but keep 
failing at "setting up installation environment". Preferably I would 
want to use just the key and not have any pass phrase.


I learned that you can change the encryption key in dm-crypt so maybe 
the easier method is to install and then add the encryption key? I can 
try experimenting myself with some clues if this method makes sense.


Also once I get all this working, how does one start up the system using 
this method? Is there a way to escape to shell and use cryptsetup?


Finally, I'm using this command to generate the key :
sudo dd if=/dev/random of=filename bs=1 count=4096

Is this okay?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3c9d2b6-13fb-3740-3ce2-9b026ccedf98%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Weakly verifying device through an image hidden by pin

2018-10-27 Thread Frozentime345
Along the lines of what I read in the anti-evil maid blog it would be 
nice if you could have an image with the google 3M privacy filter behind 
a pin available on the lock screen to verify this is your device. I 
understand the anti evil maid test checks for all sorts of hardware 
manipulation and so it's the superior check but a)not every device 
supports intel txt so a weaker universal check would be nice and b) I 
don't want to restart my device every-time there's a chance my device 
was switched out or something, weak somewhat passive protection would be 
nice. Maybe add that pin as another password requirement just for a 
random security boost.


Ideally the image could be stored in an appvm ofc so as not to have to 
bring anything into dom0, and you could have multiple images for 
different situations.


Also, wondering if its possible to have a lock-screen background stored 
in an appvm?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50dcc9fc-e72f-35df-6349-63eac66c43ef%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Blacklist Dom0 Upgrades

2018-10-18 Thread Frozentime345
Just a minor convenient feature would be to blacklist certain dom0 rpm 
upgrades, the kernel updates keep breaking my Ethernet so I'm avoiding 
them. I'm manually applying the other updates but dom0 is still saying 
"has updates" so I also have to manually check whether new updates are 
available.


Not really a big deal but it would also prevent me from making the 
mistake of installing a kernel update(ideally it would blacklist by 
pattern as well so I could decide whether or not to try a new kernel).


Even more ideally we could roll back dom0 like templates =p, but I 
realize that's probably difficult or something lol.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8cdf595d-41ff-10f7-af91-c7a671aa396d%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: White-list for block devices, networks, etc

2018-10-18 Thread frozentime345
On Tuesday, October 16, 2018 at 5:46:13 PM UTC, Frozentime345 wrote:
> System: Fedora 27/Debian 9 Templates, R3.2->upgrading to 4.0 soon
> 
> I looked through rpc policy but I couldn't find anything like this, is there
> a way to only allow certain block devices for certain appvms? Doesn't 
> even have to be a secure feature just something to prevent user error, 
> but it has to work at the qubes level so a
> "bad" block device doesn't compromise the appvm.
> 
> Similarly, is there something in sys-net I can use to white-list? I 
> tried the network connections manager but I cant seem to stop it from 
> connecting to unknown ethernets, after its known I can set “don't 
> automatically connect” though.

For some reason Im not receiving emails from my own thread lol? Luckily I 
googled the group to see if the post made it. 
Cool on qubes 4.1 sounds good. 

Thanks, I'll look into udev config.

Will this no auto default setting for network manager stop new connections or 
just stop network manager? Ideally I want it to allow me to config new networks 
before connecting or ask me confirmation before connecting, basically to 
prevent user error. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47dbbe1b-de38-42e3-9a9b-faa0334cbc19%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] White-list for block devices, networks, etc

2018-10-16 Thread Frozentime345

System: Fedora 27/Debian 9 Templates, R3.2->upgrading to 4.0 soon

I looked through rpc policy but I couldn't find anything like this, is there
a way to only allow certain block devices for certain appvms? Doesn't 
even have to be a secure feature just something to prevent user error, 
but it has to work at the qubes level so a

"bad" block device doesn't compromise the appvm.

Similarly, is there something in sys-net I can use to white-list? I 
tried the network connections manager but I cant seem to stop it from 
connecting to unknown ethernets, after its known I can set “don't 
automatically connect” though.




--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22c97b8d-d5ac-f51a-1af5-3f39c621fabb%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Any way to draw characters on lockscreen/encryption screen?

2018-08-20 Thread Frozentime345
I'm interested in drawing out characters as a method of invisibleish 
input on either a touchpad or touchscreen since I want to bring my qubes 
device anywhere. I couldn't find any mention of this in a fedora google 
search or a qubes search nor in qubes settings. I doubt it exists but I 
just thought I'd ask lol.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cea329b3-1932-dd4a-10bd-4ec1708f0e35%40gmail.com.
For more options, visit https://groups.google.com/d/optout.