[qubes-users] Re: ProtonMail bridge

2018-04-20 Thread ThierryIT
What I have already done ... No answers from them ... Like their support, no 
existent :(

Le vendredi 20 avril 2018 12:47:33 UTC+3, chipp...@gmail.com a écrit :
> On Friday, April 20, 2018 at 1:50:37 AM UTC-4, ThierryIT wrote:
> > Le vendredi 20 avril 2018 00:25:43 UTC+3, chipp...@gmail.com a écrit :
> > > AHTON,
> > >   Thank you for sharing what worked for you.  My bridge was installed 
> > > into the personal VM (Fedora-26).
> > >  I understand what you are suggesting, and hope to try it out this 
> > > weekend when I slow down again.
> > > 
> > > Regards ~
> > 
> > Hi,
> > How did you get the Linux version of the Bridge ... Seems not to be yet 
> > available ... Beta tester ?
> 
> 
> They offer a Beta version for paid subscribers I requested via E-mail, 
> and they responded with a link to the download and installation instructions.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/879a30d1-f4eb-42c9-b598-7678bf6ee7c2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ProtonMail bridge

2018-04-19 Thread ThierryIT
Le vendredi 20 avril 2018 00:25:43 UTC+3, chipp...@gmail.com a écrit :
> AHTON,
>   Thank you for sharing what worked for you.  My bridge was installed 
> into the personal VM (Fedora-26).
>  I understand what you are suggesting, and hope to try it out this 
> weekend when I slow down again.
> 
> Regards ~

Hi,
How did you get the Linux version of the Bridge ... Seems not to be yet 
available ... Beta tester ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49717fef-8dd0-44ee-9466-97f7ed3029a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Issues with Yubikey 4 input

2018-03-16 Thread ThierryIT
Le vendredi 9 mars 2018 19:34:06 UTC+2, Jon R. a écrit :
> Hello,
> 
> I've scoured around the mailing lists / SO / Reddit and haven't come across a 
> solution to this yet. I'm running 4.0 (R4.0) and when I attempt to use my 
> Yubikey it's seemingly not picking up any input on the button press.
> 
> It's detecting the USB properly and I can attach it fine:
> 
> [cloe@dom0 Desktop]$ qvm-usb
> BACKEND:DEVID  DESCRIPTION USED BY
> sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID
> 
> [cloe@dom0 Desktop]$ qvm-usb attach work sys-usb:2-1
> 
> [cloe@dom0 Desktop]$ qvm-usb
> BACKEND:DEVID  DESCRIPTION USED BY
> sys-usb:2-1    Yubico_Yubikey_4_OTP+CCID   work
> 
> However upon button presses on the Yubikey in the "work" domain there is no 
> action. I've tested this in gedit, the terminal and elsewhere to no avail. 
> 
> 
> Can someone point me in the right direction as to what may be happening? I've 
> successfully attached storage devices and other smart card related devices 
> without any issue so it seems to be isolated to the Yubikey itself. I've 
> tried 2 separate Yubikey 4's and an older version to no avail.
> 
> 
> Thank you for your time.
> 
> 
> - Cody

I had the same problem than yours ...
I was able, after a looong period of fight, to attached my Yubikey but it was 
not working ...
I have found that it was not working with Firefox but only with Chrome ... I am 
only using mu Yubikey to manage my PGP kys and to be authenticated on web site 
like Github ... 

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc3da3a6-2568-40ac-b018-beb6facfb1fa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Boot Qubes 4.0 r5 / Try to start an old VM ...

2018-03-12 Thread ThierryIT
who does not exist anymore during the boot sequence 
Any idea on how to deal with this ?

thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ad536013-fbb9-47ce-b4fc-e2cf3f9e02d5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0-rc5 has been released!

2018-03-07 Thread ThierryIT
Le mercredi 7 mars 2018 22:21:58 UTC+2, sevas a écrit :
> Whoo hoo! 
> 
> I went to download qvm-dom0-update and it says no new updates available

Same thing for me ...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47a2824b-378f-4784-8aeb-b7afdf1fe4ed%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: how to use email securely in qubes? thunderbird doesn't send messages

2018-03-03 Thread ThierryIT
Le vendredi 2 mars 2018 14:00:18 UTC+2, jer...@disroot.org a écrit :
> 1 email or multiple emails.
> says sending message when clicking send (stuck) in thunderbird.

I am using thunderbird and enigmail on a StandaloneVM.
What OS are you using ? Have you check your FW rules if you have any ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ac1dd1e-d1fe-4b58-b4ce-36618b4a830d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Migrating to second hard drive

2018-03-03 Thread ThierryIT
Le vendredi 2 mars 2018 11:26:03 UTC+2, Unman a écrit :
> On Fri, Mar 02, 2018 at 04:10:24AM -, 'awokd' via qubes-users wrote:
> > On Fri, March 2, 2018 3:38 am, Glen H wrote:
> > > On Thursday, March 1, 2018 at 10:37:26 PM UTC-5, Glen H wrote:
> > >
> > >> Hi,
> > >>
> > >>
> > >> My primary SSD is out of space and I have a second hard drive.  I've
> > >> formatted it but not sure how to migrate my cubes to it.  Does anyone
> > >> have any instructions for doing this?
> > >>
> > >> Ideally, I'd boot from my new hard drive and use original one to store
> > >> my backups of my qubes.
> > >>
> > >> Thanks,
> > >>
> > >>
> > >> Glen
> > >>
> > >
> > > I forgot to mention that I'm on Qubes 4 and I'm pretty knowledgeable
> > > about Linux.
> > 
> > Make sure you do a backup first. You might be able to "cheat" and DD the
> > small drive to the larger then expand, as long as you're comfortable with
> > LVM. On the other hand, pulling the small drive, installing Qubes on the
> > new, and restoring from backup wouldn't take that much longer.
> 
> If you cheat you'll have to fix grub if you're using it. I suspect it'll
> be cleaner to take the second option and install 4.0 on the new drive
> when it comes out.

What about doing a backup of all your VMs / template first.
Doing a fresh install of Qubes on your new HDD.
Restored your backuped VMs 

?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/06a0bb91-54c6-41e2-8a4f-e2de6ab886a0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Little pb to understand how to add a FW rule on my proxyVM

2018-03-01 Thread ThierryIT
Le jeudi 1 mars 2018 12:29:30 UTC+2, Chris Laprise a écrit :
> On 03/01/2018 03:08 AM, ThierryIT wrote:
> > Hi,
> > 
> > I have configure the proxyVM with rules for http, https, smtp and ntp.
> > I have understood that for the DNS (who is not working anymore) I have to 
> > use from dom0 : qvm-firewall  ...
> > 
> > I want to oblige all the VMs to use only "OpenVPN" as DNS.
> > 
> > I did :
> > 
> > qvm-firewall vmname add rule --dns=208.67.222.222 and many other 
> > combinations ... It do not accept any of my rules ... Mistakes from my side 
> > but from where ?
> > 
> > Second question, is there any possibility to find example of how to make a 
> > proper FW with rules example under Qubes ?
> > 
> > Thx
> > 
> 
> There are two main ways to add firewall rules to a proxyVM: Via VM 
> settings of a downstream VM (appVM), and via a script in the proxyVM 
> itself at /rw/config/qubes-firewall-user-script.
> 
> The former is limited but has a convenient GUI in VM Settings dialog 
> (also qvm-firewall). The rules for each appVM get transferred to the 
> connected proxyVM. (If you are trying to use qvm-firewall to add rules 
> to the proxyVM and not the appVM, that may be your mistake.)
> 
> The second method is very flexible but requires a little study of the 
> proxyVM's default internal firewall configuration before adding your own 
> rules in the script.
> 
> Another, third way is to have a program like openvpn run a script when 
> the link goes up.
> 
> There are good examples which actually handle DNS addresses in the Qubes 
> VPN doc[1], the Qubes-vpn-support project[2] and also in the script 
> found at /usr/lib/qubes/qubes-setup-dnat-to-ns. These scripts use dnat 
> rules to convert DNS requests to use a particular DNS address, although 
> in your case you might want to leave '-d' as 'any' instead of specifying 
> an address.
> 
> Note that the second link below is easy to setup and the 'qubes-vpn-ns' 
> script accepts DHCP-generated variables from openvpn and automatically 
> uses them to setup dnat.
> 
> 
> [1] https://www.qubes-os.org/doc/vpn/
> [2] https://github.com/tasket/Qubes-vpn-support/tree/qubes4
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Thx ... I am going to do my homework now :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/11d85bf2-2b0b-4f8b-aab3-f1da8ae039e3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Little pb to understand how to add a FW rule on my proxyVM

2018-03-01 Thread ThierryIT
Hi,

I have configure the proxyVM with rules for http, https, smtp and ntp.
I have understood that for the DNS (who is not working anymore) I have to use 
from dom0 : qvm-firewall  ...

I want to oblige all the VMs to use only "OpenVPN" as DNS.

I did :

qvm-firewall vmname add rule --dns=208.67.222.222 and many other combinations 
... It do not accept any of my rules ... Mistakes from my side but from where ?

Second question, is there any possibility to find example of how to make a 
proper FW with rules example under Qubes ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b8fa3b1-dcd3-4c2c-a423-c97a6c49d984%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-02-27 Thread ThierryIT
Le samedi 24 février 2018 21:49:49 UTC+2, Alex Dubois a écrit :
> On Wednesday, 21 February 2018 09:01:45 UTC, ThierryIT  wrote:
> > Le mercredi 14 février 2018 09:49:37 UTC+2, ThierryIT a écrit :
> > > Le dimanche 11 février 2018 10:08:52 UTC+2, ThierryIT a écrit :
> > > > Le samedi 10 février 2018 22:58:15 UTC+2, Alex Dubois a écrit :
> > > > > > On 10 Feb 2018, at 17:46, ThierryIT <v...@gmail.com> wrote:
> > > > > > 
> > > > > > Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit :
> > > > > >> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
> > > > > >>> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
> > > > > >>>> Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> > > > > >>>>>> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> > > > > >>>>>> Not familiar with this ... Will need procediure to follow.
> > > > > >>>>>> 
> > > > > >>>>>> 
> > > > > >>>>>> Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a 
> > > > > >>>>>> écrit :
> > > > > >>>>>>> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> > > > > >>>>>>>> No, I am still under R3.2
> > > > > >>>>>>>> 
> > > > > >>>>>>>> Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> > > > > >>>>>>>>> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > > > > >>>>>>>>>> "https://github.com/adubois/qubes-app-linux-yubikey;
> > > > > >>>>>>>>>> 
> > > > > >>>>>>>>>> 
> > > > > >>>>>>>>>> Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> > > > > >>>>>>>>>> 
> > > > > >>>>>>>>>>> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > > > > >>>>>>>>>>> 
> > > > > >>>>>>>>>>>> Nobody ?
> > > > > >>>>>>>>>>>> 
> > > > > >>>>>>>>>>>> 
> > > > > >>>>>>>>>>>> 
> > > > > >>>>>>>>>>>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a 
> > > > > >>>>>>>>>>>> écrit :
> > > > > >>>>>>>>>>>> 
> > > > > >>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> Hi,
> > > > > >>>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> I am going to install a new sys-usb.
> > > > > >>>>>>>>>>>>> I have before to install all what I need to the 
> > > > > >>>>>>>>>>>>> template (fedora-26)
> > > > > >>>>>>>>>>>>> first. When following your procedure:
> > > > > >>>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> ykpers has been installed but: I cannot do the same for
> > > > > >>>>>>>>>>>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> > > > > >>>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> no match for argument
> > > > > >>>>>>>>>>>>> 
> > > > > >>>>>>>>>>>>> ideas ?
> > > > > >>>>>>>>>>> 
> > > > > >>>>>>>>>>> Not quite sure what you are trying to do here. What 
> > > > > >>>>>>>>>>> procedure? What

Re: [qubes-users] how to upgrade qubes-core-agent ?

2018-02-27 Thread ThierryIT
Le mardi 27 février 2018 19:21:40 UTC+2, Unman a écrit :
> On Tue, Feb 27, 2018 at 07:15:22AM -0800, ThierryIT wrote:
> > Hi,
> > 
> > I have installed the fedora-26 template but it is running with version 
> > 4.0.20 and I would like the version 4.0.23 ... How to upgrade ?
> > 
> > Thx
> > 
> 
> Read the docs at :
> https://www.qubes-os.org/doc/software-update-vm
> 
> Enable the current-testing repository.

already done and working. Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/202054b6-d43d-4aeb-bdba-2b703888c2ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Upgrade of my sys-usb ??

2018-02-27 Thread ThierryIT
Le mardi 27 février 2018 19:22:56 UTC+2, Unman a écrit :
> On Tue, Feb 27, 2018 at 07:35:10AM -0800, ThierryIT wrote:
> > Hello,
> > 
> > I have upgrade the template (fedora-26) who has been used to build my 
> > sys-usb VM.
> > I do not see yet, any propagation of this upgrade to my sys-usb ... Is 
> > there any possibility to force this to be done ?
> > 
> > Thx
> > 
> 
> Have you shutdown the template and then restarted the sys-usb?

yep working :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f2dd38e-28ac-4b76-884d-00ff8931a0a1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0 rc4 / Qubes backup doesn't find the directory

2018-02-27 Thread ThierryIT
Le mardi 27 février 2018 17:37:53 UTC+2, Alex Dubois a écrit :
> On Tuesday, 27 February 2018 10:39:06 UTC, Yuraeitha  wrote:
> > On Tuesday, February 27, 2018 at 7:00:46 AM UTC+1, ThierryIT wrote:
> > > Le mardi 27 février 2018 02:50:05 UTC+2, Yuraeitha a écrit :
> > > > On Monday, February 26, 2018 at 8:04:44 PM UTC+1, ThierryIT wrote:
> > > > > Hi,
> > > > > 
> > > > > I would like to backup few of my VMs.
> > > > > I have mount my external usb (not using sys-usb) HDD.
> > > > > From the console where my HDD is attached/mounted, I have access 
> > > > > through /mnt/removable to all my previous (3.2) backup files.
> > > > > I have created, in /mnt/removable, a new folder.
> > > > > When running the Qubes backup, and choosing the newly created folder, 
> > > > > I have this error:
> > > > > 
> > > > > Selected directory do not exists or not a directory
> > > > > 
> > > > > I have created others folders, I have change permissions ... Same 
> > > > > problem.
> > > > > Today all my folders are:
> > > > > 
> > > > > - drwxrwxr-x 3 user:user AppVM_bck
> > > > > 
> > > > > Same pb if root:root
> > > > > 
> > > > > ??
> > > > 
> > > > Apologies, I overlooked the "- drwxrwxr-x 3 user:user AppVM_bck" line 
> > > > in your post. Since your USB controller then must be directly passed 
> > > > into the AppVM, you can try create a direct path copy directly in dom0, 
> > > > even though you won't be using this path. As suggested in Rusty Bird's 
> > > > link. Does it work for you?
> > > 
> > > I have created the "/mnt/removable" in dom0.
> > > If using as path: /mnt/removable/AppVM_bck I do still have the same error 
> > > message.
> > > If using as path: /mnt/removable I do have a permission denied.
> > > 
> > > drwxr-xr-x root rootmnt
> > > drwxr-xr-x root rootremovable
> > > drwxrwxr-x user user AppVM_bck
> > > 
> > > Are the permissions correct ? It should be root:root or user:user ?
> > > 
> > > Thx
> > 
> > It looks like you did the permissions correctly, lets try something else. I 
> > suggest you try make a new fixed artificial mounting path rather than the 
> > dynamic allocated one, because it may quite reasonably be why Qubes 4 can't 
> > find its way to the path when special symbolic location letters are used as 
> > path shortcuts, such as $HOME/ or ~/ and similar for /home/user, which 
> > seems similar to /run/removable. So it may be that dynamic folders aren't 
> > working very well. 
> > 
> > For example XFCE4 keybinding a script located in /home/user/ can be a huge 
> > hassle if using $HOME/ or ~/ to bypass dynamic user-names in different 
> > Linux systems, and instead one has to write the actual user-name in the 
> > path, which means it only works if using the full path name, rather than 
> > path shortcuts. Maybe it's the same that happens with /mnt/removable. In 
> > which case, it may be useful to abandon this location to something not 
> > bound by location rules, which can be anywhere but the official places.
> > 
> > Perhaps this bug could even be related to the recent $ some days back? I 
> > dunno though, but without any insight, it seems like it maybe could be.
> > 
> > So try un-mount the USB drive in the AppVM, and make a new fixed location 
> > folder, it could be in /mnt/some-folder <--- give folder a name, but 
> > without spaces and special letters to avoid issues.
> > 
> > Change the some-older's ownership to user and give it permissions. Then 
> > once that is done, mount your drive to the folder with appropriate mounting 
> > permissions. Then do the same new path in dom0, with same 
> > ownership/permissions. 
> > 
> > Generally only the last folder should have the same permission, at least as 
> > far as I know the parent folder permission shouldn't matter much. So don't 
> > worry about the parent folders, just focus on the final folder in the path.
> > 
> > Does it make a difference when you clear out dynamic paths for fixed paths, 
> > then remount it, and ensure all permissions are in place?
> > 
> > Also I don't think you need the dom0 trick if you try this approach, 
> > although I could be wrong. I think the dom0 identical path trick is a 
> > method to trick the system to not fail

[qubes-users] Upgrade of my sys-usb ??

2018-02-27 Thread ThierryIT
Hello,

I have upgrade the template (fedora-26) who has been used to build my sys-usb 
VM.
I do not see yet, any propagation of this upgrade to my sys-usb ... Is there 
any possibility to force this to be done ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0d04a83c-24c6-409d-b733-99fcc4d24a33%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] how to upgrade qubes-core-agent ?

2018-02-27 Thread ThierryIT
Hi,

I have installed the fedora-26 template but it is running with version 4.0.20 
and I would like the version 4.0.23 ... How to upgrade ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bbd28883-ffcf-4e1b-bcef-1da44f152f69%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0 rc4 / Qubes backup doesn't find the directory

2018-02-26 Thread ThierryIT
Le mardi 27 février 2018 02:50:05 UTC+2, Yuraeitha a écrit :
> On Monday, February 26, 2018 at 8:04:44 PM UTC+1, ThierryIT wrote:
> > Hi,
> > 
> > I would like to backup few of my VMs.
> > I have mount my external usb (not using sys-usb) HDD.
> > From the console where my HDD is attached/mounted, I have access through 
> > /mnt/removable to all my previous (3.2) backup files.
> > I have created, in /mnt/removable, a new folder.
> > When running the Qubes backup, and choosing the newly created folder, I 
> > have this error:
> > 
> > Selected directory do not exists or not a directory
> > 
> > I have created others folders, I have change permissions ... Same problem.
> > Today all my folders are:
> > 
> > - drwxrwxr-x 3 user:user AppVM_bck
> > 
> > Same pb if root:root
> > 
> > ??
> 
> Apologies, I overlooked the "- drwxrwxr-x 3 user:user AppVM_bck" line in your 
> post. Since your USB controller then must be directly passed into the AppVM, 
> you can try create a direct path copy directly in dom0, even though you won't 
> be using this path. As suggested in Rusty Bird's link. Does it work for you?

I have created the "/mnt/removable" in dom0.
If using as path: /mnt/removable/AppVM_bck I do still have the same error 
message.
If using as path: /mnt/removable I do have a permission denied.

drwxr-xr-x root rootmnt
drwxr-xr-x root rootremovable
drwxrwxr-x user user AppVM_bck

Are the permissions correct ? It should be root:root or user:user ?

Thx 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f1f24511-84fc-4c85-907e-0524f740991a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] removing fedora-26 template from Qubes ?

2018-02-26 Thread ThierryIT
Hi,
How to properly remove this template ?
Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b630b1c-3c72-4ac7-a2d2-f714e5161434%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 rc4 / Qubes backup doesn't find the directory

2018-02-26 Thread ThierryIT
Hi,

I would like to backup few of my VMs.
I have mount my external usb (not using sys-usb) HDD.
>From the console where my HDD is attached/mounted, I have access through 
>/mnt/removable to all my previous (3.2) backup files.
I have created, in /mnt/removable, a new folder.
When running the Qubes backup, and choosing the newly created folder, I have 
this error:

Selected directory do not exists or not a directory

I have created others folders, I have change permissions ... Same problem.
Today all my folders are:

- drwxrwxr-x 3 user:user AppVM_bck

Same pb if root:root

??

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/315ff267-a6ae-42c1-81a5-e2110788ab57%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux VMs can't reach network after restoring from backup to fresh 4.0rc3 install

2018-02-21 Thread ThierryIT
Le mercredi 21 février 2018 12:31:29 UTC+2, awokd a écrit :
> On Wed, February 21, 2018 10:16 am, ThierryIT wrote:
> 
> >
> > the not working VM prefs:
> >
> 
> From these lines in your config, it looks like you've created this VM on
> R3.2 as a standalone HVM instead of an AppVM based on a template. Does
> that sound right?
> 
> klass   D  TemplateVM
> virt_mode   -  hvm
> 
> These are the network settings assigned to this VM. They have probably
> changed from what they were in R3.2:
> 
> visible_gateway D  10.137.0.18
> visible_gateway6D
> visible_ip  D  10.137.0.11
> visible_ip6 D
> visible_netmask D  255.255.255.255
> 
> Usually there is a script that runs inside the Linux VM that re-assigns
> these to the correct values, but since it's been restored from R3.2 it
> might not be working. From within vm-work, try assigning the above values
> manually. Check another working VM for the appropriate DNS settings.

Seems not able to keep the manual network config ... Is the internal script can 
re-write the config ?

I have add the folder "eth0" in "interfaces.d" -> doesn't keep the config
or 
I have add the network config to the file "interfaces"

thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1a5af95f-2df8-442e-8aa4-d1f5ae45acc7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux VMs can't reach network after restoring from backup to fresh 4.0rc3 install

2018-02-21 Thread ThierryIT
Le mercredi 21 février 2018 12:07:55 UTC+2, ThierryIT a écrit :
> Le mercredi 21 février 2018 11:36:53 UTC+2, awokd a écrit :
> > On Wed, February 21, 2018 9:28 am, ThierryIT wrote:
> > > Le mercredi 21 février 2018 11:13:55 UTC+2, awokd a écrit :
> > 
> > >> OK, then go into Settings on your problem AppVM and change both the
> > >> Template and NetVM to some other value and hit OK. Then, go back into
> > >> Settings and change them back to the values used by your working AppVMs
> > >> and hit OK and try it out.
> > >
> > > Cannot change the template  it is in grey
> > 
> > From your other email and this one, all AppVMs restored from R3.2 have
> > their template setting in grey, even when powered off? What happens if you
> > try to change it from the command line with qvm-prefs?
> 
> qvm-prefs vmname template fedora-26
> 
> vm-prefs: error: no such property: 'template'

the not working VM prefs:

autostart   D  False
backup_timestampU
debug   D  False
default_dispvm  D  fedora-25-dvm
default_userD  user
gateway D  
gateway6D  
include_in_backups  D  True
installed_by_rpmD  False
ip  D  10.137.0.11
ip6 D  
kernel  D  4.14.18-1
kernelopts  D  nopat
klass   D  TemplateVM
label   -  green
mac D  00:16:3E:5E:6C:00
maxmem  D  4000
memory  D  400
name-  vm-work
netvm   -  proxyVM-eth
provides_network-  False
qid -  11
qrexec_timeout  D  60
start_time  D  1519206767.23
stubdom_mem U
stubdom_xid D  18
updateable  D  True
uuid-  5735bd73-e50f-4a63-9a34-6be0b2dc7d3a
vcpus   D  2
virt_mode   -  hvm
visible_gateway D  10.137.0.18
visible_gateway6D  
visible_ip  D  10.137.0.11
visible_ip6 D  
visible_netmask D  255.255.255.255
xid D  17

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9afeb3bb-9e51-49ce-af5c-93f0125ca895%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux VMs can't reach network after restoring from backup to fresh 4.0rc3 install

2018-02-21 Thread ThierryIT
Le mercredi 21 février 2018 11:36:53 UTC+2, awokd a écrit :
> On Wed, February 21, 2018 9:28 am, ThierryIT wrote:
> > Le mercredi 21 février 2018 11:13:55 UTC+2, awokd a écrit :
> 
> >> OK, then go into Settings on your problem AppVM and change both the
> >> Template and NetVM to some other value and hit OK. Then, go back into
> >> Settings and change them back to the values used by your working AppVMs
> >> and hit OK and try it out.
> >
> > Cannot change the template  it is in grey
> 
> From your other email and this one, all AppVMs restored from R3.2 have
> their template setting in grey, even when powered off? What happens if you
> try to change it from the command line with qvm-prefs?

qvm-prefs vmname template fedora-26

vm-prefs: error: no such property: 'template'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f015c3d7-d4be-438c-9a39-002ef31bea16%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux VMs can't reach network after restoring from backup to fresh 4.0rc3 install

2018-02-21 Thread ThierryIT
Le mercredi 21 février 2018 11:13:55 UTC+2, awokd a écrit :
> On Wed, February 21, 2018 9:07 am, ThierryIT wrote:
> > Le mercredi 21 février 2018 10:58:51 UTC+2, awokd a écrit :
> 
> >> To make sure I understand what you are doing:
> >> You have an AppVM based on a Fedora template backed up from R3.2. You
> >> restored it to R4.0rc4. Other AppVMs restored work fine, except for this
> >>  single AppVM. Correct?
> >
> > yes
> >
> >>
> >> If so, does this problem AppVM use the same template as your working
> >> AppVMs?
> >>
> >
> > yes
> 
> OK, then go into Settings on your problem AppVM and change both the
> Template and NetVM to some other value and hit OK. Then, go back into
> Settings and change them back to the values used by your working AppVMs
> and hit OK and try it out.

Cannot change the template  it is in grey

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/42c7ca74-cee9-4413-8277-f4403128a7c7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux VMs can't reach network after restoring from backup to fresh 4.0rc3 install

2018-02-21 Thread ThierryIT
Le mercredi 21 février 2018 11:07:29 UTC+2, ThierryIT a écrit :
> Le mercredi 21 février 2018 10:58:51 UTC+2, awokd a écrit :
> > On Wed, February 21, 2018 8:21 am, ThierryIT wrote:
> > > Hi,
> > >
> > >
> > > After having restored Linux VM from Qubes 3.2, this VM base on fedora
> > > template doesn't reach the network. In the same time, I am now using Qubes
> > > 4rc4, same problem.
> > > I only have this problem with this VM,all other VMs from my 3.2 backup are
> > > working.
> > 
> > To make sure I understand what you are doing:
> > You have an AppVM based on a Fedora template backed up from R3.2. You
> > restored it to R4.0rc4. Other AppVMs restored work fine, except for this
> > single AppVM. Correct?
> 
> yes
> 
> > 
> > If so, does this problem AppVM use the same template as your working
> > AppVMs? 
> 
> yes
> 
> If that's not the case, try changing it to use the same template.
> 
> Will try and let you know
> 
> > Also, is it set to use the same NetVM as your working ones?
> 
> yes

It seems that I am not able to change the template of all my restored VMs, in 
Qubes settings, the template is in grey  Even if the VM is off.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5933edd6-87ac-477d-8c8c-6fb80cf9ab2c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux VMs can't reach network after restoring from backup to fresh 4.0rc3 install

2018-02-21 Thread ThierryIT
Le mercredi 21 février 2018 10:58:51 UTC+2, awokd a écrit :
> On Wed, February 21, 2018 8:21 am, ThierryIT wrote:
> > Hi,
> >
> >
> > After having restored Linux VM from Qubes 3.2, this VM base on fedora
> > template doesn't reach the network. In the same time, I am now using Qubes
> > 4rc4, same problem.
> > I only have this problem with this VM,all other VMs from my 3.2 backup are
> > working.
> 
> To make sure I understand what you are doing:
> You have an AppVM based on a Fedora template backed up from R3.2. You
> restored it to R4.0rc4. Other AppVMs restored work fine, except for this
> single AppVM. Correct?

yes

> 
> If so, does this problem AppVM use the same template as your working
> AppVMs? 

yes

If that's not the case, try changing it to use the same template.

Will try and let you know

> Also, is it set to use the same NetVM as your working ones?

yes

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f9897f6e-09a0-4aca-9b5c-4439c7166a78%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-02-21 Thread ThierryIT
Le mercredi 14 février 2018 09:49:37 UTC+2, ThierryIT a écrit :
> Le dimanche 11 février 2018 10:08:52 UTC+2, ThierryIT a écrit :
> > Le samedi 10 février 2018 22:58:15 UTC+2, Alex Dubois a écrit :
> > > > On 10 Feb 2018, at 17:46, ThierryIT <v...@gmail.com> wrote:
> > > > 
> > > > Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit :
> > > >> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
> > > >>> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
> > > >>>> Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> > > >>>>>> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> > > >>>>>> Not familiar with this ... Will need procediure to follow.
> > > >>>>>> 
> > > >>>>>> 
> > > >>>>>> Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> > > >>>>>>> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> > > >>>>>>>> No, I am still under R3.2
> > > >>>>>>>> 
> > > >>>>>>>> Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> > > >>>>>>>>> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > > >>>>>>>>>> "https://github.com/adubois/qubes-app-linux-yubikey;
> > > >>>>>>>>>> 
> > > >>>>>>>>>> 
> > > >>>>>>>>>> Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> > > >>>>>>>>>> 
> > > >>>>>>>>>>> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > > >>>>>>>>>>> 
> > > >>>>>>>>>>>> Nobody ?
> > > >>>>>>>>>>>> 
> > > >>>>>>>>>>>> 
> > > >>>>>>>>>>>> 
> > > >>>>>>>>>>>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a 
> > > >>>>>>>>>>>> écrit :
> > > >>>>>>>>>>>> 
> > > >>>>>>>>>>>> 
> > > >>>>>>>>>>>>> Hi,
> > > >>>>>>>>>>>>> 
> > > >>>>>>>>>>>>> 
> > > >>>>>>>>>>>>> 
> > > >>>>>>>>>>>>> I am going to install a new sys-usb.
> > > >>>>>>>>>>>>> I have before to install all what I need to the template 
> > > >>>>>>>>>>>>> (fedora-26)
> > > >>>>>>>>>>>>> first. When following your procedure:
> > > >>>>>>>>>>>>> 
> > > >>>>>>>>>>>>> 
> > > >>>>>>>>>>>>> ykpers has been installed but: I cannot do the same for
> > > >>>>>>>>>>>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> > > >>>>>>>>>>>>> 
> > > >>>>>>>>>>>>> no match for argument
> > > >>>>>>>>>>>>> 
> > > >>>>>>>>>>>>> ideas ?
> > > >>>>>>>>>>> 
> > > >>>>>>>>>>> Not quite sure what you are trying to do here. What 
> > > >>>>>>>>>>> procedure? What
> > > >>>>>>>>>>> command are you entering?
> > > >>>>>>>>> 
> > > >>>>>>>>> Are you trying this on Qubes 4.0? Those Yubikey packages might 
> > > >>>>>>>>> not be in
> > > >>>>>>>>> the Qubes repo yet.
> > > >>>>>>> 
> > > >>>>>>> Hi,
> > > >>>>>>> 
> > > >>>>>>> I have not maintained this for some time. So long that I can't 
> > > >>>>>>> remember if the packages ha

[qubes-users] Linux VMs can't reach network after restoring from backup to fresh 4.0rc3 install

2018-02-21 Thread ThierryIT
Hi,

After having restored Linux VM from Qubes 3.2, this VM base on fedora template 
doesn't reach the network.
In the same time, I am now using Qubes 4rc4, same problem.
I only have this problem with this VM,all other VMs from my 3.2 backup are 
working.

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2cb51b4e-10a1-4d35-b888-4d5953b347d9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-02-13 Thread ThierryIT
Le dimanche 11 février 2018 10:08:52 UTC+2, ThierryIT a écrit :
> Le samedi 10 février 2018 22:58:15 UTC+2, Alex Dubois a écrit :
> > > On 10 Feb 2018, at 17:46, ThierryIT <v...@gmail.com> wrote:
> > > 
> > > Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit :
> > >> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
> > >>> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
> > >>>> Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> > >>>>>> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> > >>>>>> Not familiar with this ... Will need procediure to follow.
> > >>>>>> 
> > >>>>>> 
> > >>>>>> Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> > >>>>>>> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> > >>>>>>>> No, I am still under R3.2
> > >>>>>>>> 
> > >>>>>>>> Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> > >>>>>>>>> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > >>>>>>>>>> "https://github.com/adubois/qubes-app-linux-yubikey;
> > >>>>>>>>>> 
> > >>>>>>>>>> 
> > >>>>>>>>>> Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> > >>>>>>>>>> 
> > >>>>>>>>>>> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > >>>>>>>>>>> 
> > >>>>>>>>>>>> Nobody ?
> > >>>>>>>>>>>> 
> > >>>>>>>>>>>> 
> > >>>>>>>>>>>> 
> > >>>>>>>>>>>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> > >>>>>>>>>>>> 
> > >>>>>>>>>>>> 
> > >>>>>>>>>>>>> Hi,
> > >>>>>>>>>>>>> 
> > >>>>>>>>>>>>> 
> > >>>>>>>>>>>>> 
> > >>>>>>>>>>>>> I am going to install a new sys-usb.
> > >>>>>>>>>>>>> I have before to install all what I need to the template 
> > >>>>>>>>>>>>> (fedora-26)
> > >>>>>>>>>>>>> first. When following your procedure:
> > >>>>>>>>>>>>> 
> > >>>>>>>>>>>>> 
> > >>>>>>>>>>>>> ykpers has been installed but: I cannot do the same for
> > >>>>>>>>>>>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> > >>>>>>>>>>>>> 
> > >>>>>>>>>>>>> no match for argument
> > >>>>>>>>>>>>> 
> > >>>>>>>>>>>>> ideas ?
> > >>>>>>>>>>> 
> > >>>>>>>>>>> Not quite sure what you are trying to do here. What procedure? 
> > >>>>>>>>>>> What
> > >>>>>>>>>>> command are you entering?
> > >>>>>>>>> 
> > >>>>>>>>> Are you trying this on Qubes 4.0? Those Yubikey packages might 
> > >>>>>>>>> not be in
> > >>>>>>>>> the Qubes repo yet.
> > >>>>>>> 
> > >>>>>>> Hi,
> > >>>>>>> 
> > >>>>>>> I have not maintained this for some time. So long that I can't 
> > >>>>>>> remember if the packages had been created/tested, I don't think 
> > >>>>>>> they have.
> > >>>>>>> 
> > >>>>>>> Best is you follow the steps to build it on a new temporary VM, 
> > >>>>>>> don't be afraid it should not be too hard:
> > >>>>>>> - Execute the yum command in "Build dependancies"
> > >>&

Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-02-11 Thread ThierryIT
Le samedi 10 février 2018 22:58:15 UTC+2, Alex Dubois a écrit :
> > On 10 Feb 2018, at 17:46, ThierryIT <v...@gmail.com> wrote:
> > 
> > Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit :
> >> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
> >>> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
> >>>> Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> >>>>>> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> >>>>>> Not familiar with this ... Will need procediure to follow.
> >>>>>> 
> >>>>>> 
> >>>>>> Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> >>>>>>> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> >>>>>>>> No, I am still under R3.2
> >>>>>>>> 
> >>>>>>>> Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> >>>>>>>>> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> >>>>>>>>>> "https://github.com/adubois/qubes-app-linux-yubikey;
> >>>>>>>>>> 
> >>>>>>>>>> 
> >>>>>>>>>> Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> >>>>>>>>>> 
> >>>>>>>>>>> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> >>>>>>>>>>> 
> >>>>>>>>>>>> Nobody ?
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>> Hi,
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> I am going to install a new sys-usb.
> >>>>>>>>>>>>> I have before to install all what I need to the template 
> >>>>>>>>>>>>> (fedora-26)
> >>>>>>>>>>>>> first. When following your procedure:
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> ykpers has been installed but: I cannot do the same for
> >>>>>>>>>>>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> no match for argument
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> ideas ?
> >>>>>>>>>>> 
> >>>>>>>>>>> Not quite sure what you are trying to do here. What procedure? 
> >>>>>>>>>>> What
> >>>>>>>>>>> command are you entering?
> >>>>>>>>> 
> >>>>>>>>> Are you trying this on Qubes 4.0? Those Yubikey packages might not 
> >>>>>>>>> be in
> >>>>>>>>> the Qubes repo yet.
> >>>>>>> 
> >>>>>>> Hi,
> >>>>>>> 
> >>>>>>> I have not maintained this for some time. So long that I can't 
> >>>>>>> remember if the packages had been created/tested, I don't think they 
> >>>>>>> have.
> >>>>>>> 
> >>>>>>> Best is you follow the steps to build it on a new temporary VM, don't 
> >>>>>>> be afraid it should not be too hard:
> >>>>>>> - Execute the yum command in "Build dependancies"
> >>>>>>> - Also install pam-devel
> >>>>>>> - Follow the steps in preparing the build and build
> >>>>>>> - Deploy the code in Dom0 and the USB VM.
> >>>>>>> 
> >>>>>>> I am about to upgrade to Qubes 4.0 rc4 (when released) so won't 
> >>>>>>> probably be able to he

Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-02-10 Thread ThierryIT
Le samedi 10 février 2018 22:58:15 UTC+2, Alex Dubois a écrit :
> > On 10 Feb 2018, at 17:46, ThierryIT  wrote:
> > 
> > Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit :
> >> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
> >>> On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
> >>>> Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> >>>>>> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> >>>>>> Not familiar with this ... Will need procediure to follow.
> >>>>>> 
> >>>>>> 
> >>>>>> Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> >>>>>>> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> >>>>>>>> No, I am still under R3.2
> >>>>>>>> 
> >>>>>>>> Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> >>>>>>>>> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> >>>>>>>>>> "https://github.com/adubois/qubes-app-linux-yubikey;
> >>>>>>>>>> 
> >>>>>>>>>> 
> >>>>>>>>>> Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> >>>>>>>>>> 
> >>>>>>>>>>> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> >>>>>>>>>>> 
> >>>>>>>>>>>> Nobody ?
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>> Hi,
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> I am going to install a new sys-usb.
> >>>>>>>>>>>>> I have before to install all what I need to the template 
> >>>>>>>>>>>>> (fedora-26)
> >>>>>>>>>>>>> first. When following your procedure:
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> ykpers has been installed but: I cannot do the same for
> >>>>>>>>>>>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> no match for argument
> >>>>>>>>>>>>> 
> >>>>>>>>>>>>> ideas ?
> >>>>>>>>>>> 
> >>>>>>>>>>> Not quite sure what you are trying to do here. What procedure? 
> >>>>>>>>>>> What
> >>>>>>>>>>> command are you entering?
> >>>>>>>>> 
> >>>>>>>>> Are you trying this on Qubes 4.0? Those Yubikey packages might not 
> >>>>>>>>> be in
> >>>>>>>>> the Qubes repo yet.
> >>>>>>> 
> >>>>>>> Hi,
> >>>>>>> 
> >>>>>>> I have not maintained this for some time. So long that I can't 
> >>>>>>> remember if the packages had been created/tested, I don't think they 
> >>>>>>> have.
> >>>>>>> 
> >>>>>>> Best is you follow the steps to build it on a new temporary VM, don't 
> >>>>>>> be afraid it should not be too hard:
> >>>>>>> - Execute the yum command in "Build dependancies"
> >>>>>>> - Also install pam-devel
> >>>>>>> - Follow the steps in preparing the build and build
> >>>>>>> - Deploy the code in Dom0 and the USB VM.
> >>>>>>> 
> >>>>>>> I am about to upgrade to Qubes 4.0 rc4 (when released) so won't 
> >>>>>>> probably be able to help until this is done.
&

Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-02-10 Thread ThierryIT
Le samedi 10 février 2018 01:44:36 UTC+2, Alex Dubois a écrit :
> On Saturday, 3 February 2018 22:42:46 UTC, Alex Dubois  wrote:
> > On Saturday, 3 February 2018 10:12:25 UTC, ThierryIT  wrote:
> > > Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> > > > On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> > > > > Not familiar with this ... Will need procediure to follow.
> > > > > 
> > > > > 
> > > > > Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> > > > > > On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> > > > > > > No, I am still under R3.2
> > > > > > > 
> > > > > > > Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> > > > > > > > On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > > > > > > > > "https://github.com/adubois/qubes-app-linux-yubikey;
> > > > > > > > >
> > > > > > > > >
> > > > > > > > > Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> > > > > > > > >
> > > > > > > > >> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > > > > > > > >>
> > > > > > > > >>> Nobody ?
> > > > > > > > >>>
> > > > > > > > >>>
> > > > > > > > >>>
> > > > > > > > >>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a 
> > > > > > > > >>> écrit :
> > > > > > > > >>>
> > > > > > > > >>>
> > > > > > > > >>>> Hi,
> > > > > > > > >>>>
> > > > > > > > >>>>
> > > > > > > > >>>>
> > > > > > > > >>>> I am going to install a new sys-usb.
> > > > > > > > >>>> I have before to install all what I need to the template 
> > > > > > > > >>>> (fedora-26)
> > > > > > > > >>>>  first. When following your procedure:
> > > > > > > > >>>>
> > > > > > > > >>>>
> > > > > > > > >>>> ykpers has been installed but: I cannot do the same for
> > > > > > > > >>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> > > > > > > > >>>>
> > > > > > > > >>>> no match for argument
> > > > > > > > >>>>
> > > > > > > > >>>> ideas ?
> > > > > > > > >>
> > > > > > > > >> Not quite sure what you are trying to do here. What 
> > > > > > > > >> procedure? What
> > > > > > > > >> command are you entering?
> > > > > > > > 
> > > > > > > > Are you trying this on Qubes 4.0? Those Yubikey packages might 
> > > > > > > > not be in
> > > > > > > > the Qubes repo yet.
> > > > > > 
> > > > > > Hi,
> > > > > > 
> > > > > > I have not maintained this for some time. So long that I can't 
> > > > > > remember if the packages had been created/tested, I don't think 
> > > > > > they have.
> > > > > > 
> > > > > > Best is you follow the steps to build it on a new temporary VM, 
> > > > > > don't be afraid it should not be too hard:
> > > > > > - Execute the yum command in "Build dependancies"
> > > > > > - Also install pam-devel
> > > > > > - Follow the steps in preparing the build and build
> > > > > > - Deploy the code in Dom0 and the USB VM.
> > > > > > 
> > > > > > I am about to upgrade to Qubes 4.0 rc4 (when released) so won't 
> > > > > > probably be able to help until this is done.
> > > > > > 
> > > > > > Any help from someone who is used to packaging under Fedora would 
> > > > > > be nice.
> > > > > > 
> > > > > > Alex
> > > > 
> > > > Sure,

[qubes-users] Re: template debian-9 no network (Q4r4) ?

2018-02-07 Thread ThierryIT
Le mercredi 7 février 2018 10:24:40 UTC+2, ThierryIT a écrit :
> Le mardi 6 février 2018 17:42:33 UTC+2, Connor Page a écrit :
> > you probably ticked update over Tor option when installing.
> > templates do not connect to network directly, they use an updates proxy.
> > I' not sure it can be changed in GUI, but you can find the appropriate rpc 
> > policy in /etc/qubes-rpc
> > alternatively you can temporarily set template vm's network provider, but 
> > that is considered less secure.
> 
> Hi,
> No I didn't ticked anything when I have installed this Template.
> I don't know why is it running sys-whonix ... When checking the config of 
> this template, there is no sys-whonix is the config ...
> As I said, even if using the same proxyVM and netVM than working VMs, I still 
> do not have access to internet ...
> I will check the rpc policy.
> Thx

sys-whonix still run when I start the template ...
Still don't know why.
After having changer the default netVM for this template to sys-whonix and done 
a Whinixcheck I was able to update my template  
Why ? No clue.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07685a26-96f6-45ae-899f-de837ea22b4a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: template debian-9 no network (Q4r4) ?

2018-02-07 Thread ThierryIT
Le mardi 6 février 2018 17:42:33 UTC+2, Connor Page a écrit :
> you probably ticked update over Tor option when installing.
> templates do not connect to network directly, they use an updates proxy.
> I' not sure it can be changed in GUI, but you can find the appropriate rpc 
> policy in /etc/qubes-rpc
> alternatively you can temporarily set template vm's network provider, but 
> that is considered less secure.

Hi,
No I didn't ticked anything when I have installed this Template.
I don't know why is it running sys-whonix ... When checking the config of this 
template, there is no sys-whonix is the config ...
As I said, even if using the same proxyVM and netVM than working VMs, I still 
do not have access to internet ...
I will check the rpc policy.
Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/41904485-427e-4f76-b62c-63b49781aad5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] template debian-9 no network (Q4r4) ?

2018-02-06 Thread ThierryIT
Hi,
qvm-
I have installed the debian-9 template on dom0 using: sudo qubes-dom0-update 
qubes-template-debian-9.
When running this template to make it up to date, the network is not working.
Even if using the same proxyVM and netVM than the other VMs, it still start 
sys-whonix ... 
Any idea ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/277d0104-7378-43ea-bc50-9b5eb401037b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-03 Thread ThierryIT
Le samedi 3 février 2018 21:56:04 UTC+2, awokd a écrit :
> On Sat, February 3, 2018 2:49 pm, ThierryIT wrote:
> 
> > Attached device seems to work as it should be when this is a mass usb
> > storage ... Is there any thing special to install on sys-usb or targeting
> > VM for Yubikey ?
> 
> Check out https://github.com/QubesOS/qubes-issues/issues/3525. Think you
> missed installing qubes-usb-proxy in your sys-usb's template. I had too
> actually, on my R4.0 testbed.

I have check it, but when doing a "dnf list installed "qubes-*" on my sys-usb, 
I can see that qubes-usb-proxy is installed: qubes-usb-proxy.noarch 
1.0.12-1.fc26 @qubes-vm-r3.2-current 
Shouldn't be: 4.0 current instead ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/19725d7b-221d-4f5c-8b04-8f760593869f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-03 Thread ThierryIT
Le samedi 3 février 2018 16:44:13 UTC+2, ThierryIT a écrit :
> Le samedi 3 février 2018 14:33:17 UTC+2, awokd a écrit :
> > On Sat, February 3, 2018 7:16 am, ThierryIT wrote:
> > 
> > >> sys-usb:4-1 Logitech_USB_Receiver
> > >> sys-usb:4-2 Yubico_Ybikey_4_U2F+CCID
> > 
> > >>
> > >>
> > >> qvm-usb attach vm_name sys-usb:4.2 qvm-usb: error: backend vm 'sys-usb'
> > >> doesn't expose device '4.2'
> > 
> > You need to use "4-2", not "4.2".
> 
> yes but: Device attached failed . blablabla
> 
> > 
> > >> And it is not possible for me to un-attached the key through this
> > >> widget ...
> > 
> > I noticed that too. Might be
> > https://github.com/QubesOS/qubes-issues/issues/3215.
> 
> Same for me under 4.0 rc4

Attached device seems to work as it should be when this is a mass usb storage 
... 
Is there any thing special to install on sys-usb or targeting VM for Yubikey ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2c9545b3-a09c-45af-b0e5-51c7108f6907%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-03 Thread ThierryIT
Le samedi 3 février 2018 14:33:17 UTC+2, awokd a écrit :
> On Sat, February 3, 2018 7:16 am, ThierryIT wrote:
> 
> >> sys-usb:4-1 Logitech_USB_Receiver
> >> sys-usb:4-2 Yubico_Ybikey_4_U2F+CCID
> 
> >>
> >>
> >> qvm-usb attach vm_name sys-usb:4.2 qvm-usb: error: backend vm 'sys-usb'
> >> doesn't expose device '4.2'
> 
> You need to use "4-2", not "4.2".

yes but: Device attached failed . blablabla

> 
> >> And it is not possible for me to un-attached the key through this
> >> widget ...
> 
> I noticed that too. Might be
> https://github.com/QubesOS/qubes-issues/issues/3215.

Same for me under 4.0 rc4

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7bcffb54-8b87-44d3-b2d7-b1996db58e7d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-02-03 Thread ThierryIT
Le vendredi 19 janvier 2018 13:19:29 UTC+2, Alex Dubois a écrit :
> On Friday, 19 January 2018 05:57:16 UTC, ThierryIT  wrote:
> > Not familiar with this ... Will need procediure to follow.
> > 
> > 
> > Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> > > On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> > > > No, I am still under R3.2
> > > > 
> > > > Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> > > > > On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > > > > > "https://github.com/adubois/qubes-app-linux-yubikey;
> > > > > >
> > > > > >
> > > > > > Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> > > > > >
> > > > > >> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > > > > >>
> > > > > >>> Nobody ?
> > > > > >>>
> > > > > >>>
> > > > > >>>
> > > > > >>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> > > > > >>>
> > > > > >>>
> > > > > >>>> Hi,
> > > > > >>>>
> > > > > >>>>
> > > > > >>>>
> > > > > >>>> I am going to install a new sys-usb.
> > > > > >>>> I have before to install all what I need to the template 
> > > > > >>>> (fedora-26)
> > > > > >>>>  first. When following your procedure:
> > > > > >>>>
> > > > > >>>>
> > > > > >>>> ykpers has been installed but: I cannot do the same for
> > > > > >>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> > > > > >>>>
> > > > > >>>> no match for argument
> > > > > >>>>
> > > > > >>>> ideas ?
> > > > > >>
> > > > > >> Not quite sure what you are trying to do here. What procedure? What
> > > > > >> command are you entering?
> > > > > 
> > > > > Are you trying this on Qubes 4.0? Those Yubikey packages might not be 
> > > > > in
> > > > > the Qubes repo yet.
> > > 
> > > Hi,
> > > 
> > > I have not maintained this for some time. So long that I can't remember 
> > > if the packages had been created/tested, I don't think they have.
> > > 
> > > Best is you follow the steps to build it on a new temporary VM, don't be 
> > > afraid it should not be too hard:
> > > - Execute the yum command in "Build dependancies"
> > > - Also install pam-devel
> > > - Follow the steps in preparing the build and build
> > > - Deploy the code in Dom0 and the USB VM.
> > > 
> > > I am about to upgrade to Qubes 4.0 rc4 (when released) so won't probably 
> > > be able to help until this is done.
> > > 
> > > Any help from someone who is used to packaging under Fedora would be nice.
> > > 
> > > Alex
> 
> Sure, I'll update the doc and post here. However as I said don't want to 
> touch my Qubes set-up before my upgrade to 4.0 rc4. So might be in 2-3weeks

Did you upgrade to Q4R4 ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/402d9381-52a1-4a0c-b54d-3b8308b2e857%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Manager / Qubes 4.0 R3 ?

2018-02-03 Thread ThierryIT
Le lundi 29 janvier 2018 09:00:23 UTC+2, ThierryIT a écrit :
> Hi,
> 
> Not possible anymore to hide "un-running VMs" ?
> By the way, is it possible to create in Qubes Manager folders to be able to 
> sort out VMs ?
> 
> Thx

nobody ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/10ab7190-99a8-40bc-95e6-28319fff4c6f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-02 Thread ThierryIT
Le samedi 3 février 2018 07:59:55 UTC+2, ThierryIT a écrit :
> Le samedi 3 février 2018 07:45:16 UTC+2, ThierryIT a écrit :
> > Le vendredi 2 février 2018 18:24:02 UTC+2, awokd a écrit :
> > > On Fri, February 2, 2018 6:03 am, ThierryIT wrote:
> > > 
> > > >
> > > > I have installed "qubes-usb-proxy" on my StandaloneVM.
> > > > -> qvm-usb l : sys-usb:4-2 Yubico_Yubikey_4_U2F+CCID
> > > >
> > > >
> > > > -> qvm-device usb attach vm-name sys-usb:4-2 : Device attach failed: No
> > > > device info received, connection failed, check backend side for details 
> > > > ->
> > > > same things
> > > 
> > > How did you create sys-usb? Have you installed qubes-input-proxy-sender in
> > > it?
> > 
> > I have followed the Qubes instructions for Qubes 4:  
> > https://www.qubes-os.org/doc/usb/
> > 
> > Yes, sys-usb (Debian 9 template) do have the "qubes-input-proxy-sender" 
> > installed.
> > 
> > When reading the doc for Qubes 4 and when using the yellow widgets on the 
> > top right of the desktop, I can see that my Yubikey4 is attached to the 
> > right VM (eject symbol) but if using, from dom0 console "qvm-usb", I do not 
> > see that my key is attached to the VM ...
> > 
> > Do I have to re-do my sys-usb with a fedora template ?
> > 
> > Thx
> 
> Something seems to be wrong with the widgets.
> After having inserted the key, and using the widget, I can attach the key to 
> the VM and I am able to see the key attached to the vm because I can see the 
> "eject symbol" close to the vm.
> 
> When using the dom0 console, and using "qvm-usb" I can see my key: 
> 
> sys-usb:4-1 Logitech_USB_Receiver
> sys-usb:4-2 Yubico_Ybikey_4_U2F+CCID
> 
> As you can see, I do not see any attached device ...
> 
> The result of this command is:
> 
> qvm-usb attach vm_name sys-usb:4.2
> qvm-usb: error: backend vm 'sys-usb' doesn't expose device '4.2'
> 
> This start to be a problem, because I cannot fully use my laptop if this 
> function is not working.
> 
> Thx anyway for your big support.
> 
> 
> 
> And it is not possible for me to un-attached the key through this widget ...

Same problem with a new sys-usb but this time done with Fedora 26 template.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/66dba328-a2ad-4c0f-8996-53f50d02aa4a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-02 Thread ThierryIT
Le samedi 3 février 2018 07:45:16 UTC+2, ThierryIT a écrit :
> Le vendredi 2 février 2018 18:24:02 UTC+2, awokd a écrit :
> > On Fri, February 2, 2018 6:03 am, ThierryIT wrote:
> > 
> > >
> > > I have installed "qubes-usb-proxy" on my StandaloneVM.
> > > -> qvm-usb l : sys-usb:4-2 Yubico_Yubikey_4_U2F+CCID
> > >
> > >
> > > -> qvm-device usb attach vm-name sys-usb:4-2 : Device attach failed: No
> > > device info received, connection failed, check backend side for details ->
> > > same things
> > 
> > How did you create sys-usb? Have you installed qubes-input-proxy-sender in
> > it?
> 
> I have followed the Qubes instructions for Qubes 4:  
> https://www.qubes-os.org/doc/usb/
> 
> Yes, sys-usb (Debian 9 template) do have the "qubes-input-proxy-sender" 
> installed.
> 
> When reading the doc for Qubes 4 and when using the yellow widgets on the top 
> right of the desktop, I can see that my Yubikey4 is attached to the right VM 
> (eject symbol) but if using, from dom0 console "qvm-usb", I do not see that 
> my key is attached to the VM ...
> 
> Do I have to re-do my sys-usb with a fedora template ?
> 
> Thx

Something seems to be wrong with the widgets.
After having inserted the key, and using the widget, I can attach the key to 
the VM and I am able to see the key attached to the vm because I can see the 
"eject symbol" close to the vm.

When using the dom0 console, and using "qvm-usb" I can see my key: 

sys-usb:4-1 Logitech_USB_Receiver
sys-usb:4-2 Yubico_Ybikey_4_U2F+CCID

As you can see, I do not see any attached device ...

The result of this command is:

qvm-usb attach vm_name sys-usb:4.2
qvm-usb: error: backend vm 'sys-usb' doesn't expose device '4.2'

This start to be a problem, because I cannot fully use my laptop if this 
function is not working.

Thx anyway for your big support.



And it is not possible for me to un-attached the key through this widget ...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8c016872-d5b1-494d-8ea1-b908f9f8b5e6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-02 Thread ThierryIT
Le vendredi 2 février 2018 18:24:02 UTC+2, awokd a écrit :
> On Fri, February 2, 2018 6:03 am, ThierryIT wrote:
> 
> >
> > I have installed "qubes-usb-proxy" on my StandaloneVM.
> > -> qvm-usb l : sys-usb:4-2 Yubico_Yubikey_4_U2F+CCID
> >
> >
> > -> qvm-device usb attach vm-name sys-usb:4-2 : Device attach failed: No
> > device info received, connection failed, check backend side for details ->
> > same things
> 
> How did you create sys-usb? Have you installed qubes-input-proxy-sender in
> it?

I have followed the Qubes instructions for Qubes 4:  
https://www.qubes-os.org/doc/usb/

Yes, sys-usb (Debian 9 template) do have the "qubes-input-proxy-sender" 
installed.

When reading the doc for Qubes 4 and when using the yellow widgets on the top 
right of the desktop, I can see that my Yubikey4 is attached to the right VM 
(eject symbol) but if using, from dom0 console "qvm-usb", I do not see that my 
key is attached to the VM ...

Do I have to re-do my sys-usb with a fedora template ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2172948e-640a-43fd-88bd-37cec3da1b2a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-01 Thread ThierryIT
Le jeudi 1 février 2018 18:01:21 UTC+2, awokd a écrit :
> On Thu, February 1, 2018 3:46 pm, ThierryIT wrote:
> > What am I doing wrong ?
> >
> >
> > I have a Yubikey4 U2F + CCID.
> > Not detected with "qvm-block"
> > Detected as sys-usb:4-2 by dom0 (qvm-usb).
> >
> >
> > I have tried:
> >
> >
> > - qvm-device usb attach vm_name sys-usb:4-2  (device attached failed)
> > - qvm-device block attach vm_name sys-usb:4-2 (backend vm 'sys-usb'
> > doesn't expose device 4-2)
> 
> Another poster said these aren't block devices, so don't try to use those
> commands on it.
> 
> "qvm-device usb attach vm_name sys-usb:4-2" should work. What does
> "qvm-usb attach vm_name sys-usb:4-2" do?
> 
> If it's the same error, did you install qubes-usb-proxy in your templates?
> See https://www.qubes-os.org/doc/usb/.

I have installed "qubes-usb-proxy" on my StandaloneVM.
-> qvm-usb l : sys-usb:4-2 Yubico_Yubikey_4_U2F+CCID

-> qvm-device usb attach vm-name sys-usb:4-2 : Device attach failed: No device 
info received, connection failed, check backend side for details
-> same things

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c68b7b91-d055-4baf-9a0f-0c86f98c5163%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-01 Thread ThierryIT
What am I doing wrong ?

I have a Yubikey4 U2F + CCID.
Not detected with "qvm-block"
Detected as sys-usb:4-2 by dom0 (qvm-usb).

I have tried: 

- qvm-device usb attach vm_name sys-usb:4-2  (device attached failed)
- qvm-device block attach vm_name sys-usb:4-2 (backend vm 'sys-usb' doesn't 
expose device 4-2)

...
Lost I am :)


Le jeudi 1 février 2018 13:28:59 UTC+2, awokd a écrit :
> On Thu, February 1, 2018 8:58 am, ThierryIT wrote:
> > If I did understood well, when using Qubes 4.0r3, there is no sys-usb ...
> 
> If you chose not to set one up on install there wouldn't be, but usually
> you should unless using a usb keyboard maybe. You can still add one now;
> check the docs.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3023cda-4c12-4c74-9e2b-88c55e7d6bad%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-02-01 Thread ThierryIT
If I did understood well, when using Qubes 4.0r3, there is no sys-usb ...


Le jeudi 1 février 2018 02:31:50 UTC+2, joev...@gmail.com a écrit :
> qvm-usb command shows you how to attach USB devices to VMs.  There is no GUI 
> method like there is for block devices.  
> 
> Remember, Yubikey is not a storage/block device.  It is a USB that acts more 
> like a HID keyboard.  
> 
> Mine works on 3.2 just fine using sys-usb, then attaching to whatever VM 
> needs it.
> 
> On Wednesday, 31 January 2018 09:14:36 UTC-5, ThierryIT  wrote:
> > How did you attached it ? I am trying without success ... I can attached it 
> > from dom0 using: qvm-block a vm_name dom0:sdd 
> > Is it correct under Qubes4.0r3 ?
> > 
> > 
> > Le mardi 23 janvier 2018 09:51:17 UTC+2, Kushal Das a écrit :
> > > On Tue, Jan 23, 2018 at 12:17 PM, ThierryIT  wrote:
> > > > Hello,
> > > >
> > > > I have today to deal with two problems:
> > > >
> > > > 1) I am using Yubikey to be authentified on some web site like Github 
> > > > ...
> > > > 2) I am using Yubikey to stock my PGP keys and to use them with mainly 
> > > > my emails (Thinderbird+Enigmail)
> > > >
> > > > What to do under Qubes to make this possible ?
> > > > I have already sys-usb running.
> > > 
> > > On Qubes 4.0rc3, I just attach it to the vm as required, and use it.
> > > No configuratino is required.
> > > 
> > > Kushal
> > > -- 
> > > Staff, Freedom of the Press Foundation
> > > CPython Core Developer
> > > Director, Python Software Foundation
> > > https://kushaldas.in

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e3c705d-361d-495f-8f3c-5b2785dc10b3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes / Github bugs track ??

2018-01-31 Thread ThierryIT
Le mardi 30 janvier 2018 10:05:57 UTC+2, Ivan Mitev a écrit :
> On 01/30/18 09:36, ThierryIT wrote:
> > Hi,
> > 
> > Why are you closing a ticket before knowing if the modification you have 
> > made, to correct the bug, is working ? I mean, why can't you wait for the 
> > user to add the modification and see if it is working or not ?
> 
> Once a dev or contributor provides a fix that he/she thinks solves an 
> issue there is usually no reason to keep the issue open, or else the 
> issue tracker would be cluttered with fixed but open issues waiting to 
> be confirmed/closed by their reporter.

Do not agree at all with this ...
If taking as example my ticket, what happen:

1) I open a ticket for a problem
2) The ticket is taken into account by the dev
3) Work on it, push the patch
4) close the ticket
5) I do the update as requested
6) result: not fully working
7) Cannot re-open my ticket, open a new ticket
8) The dev close my second ticket because it is duplicated ticket
9) re-open the first ticket

And what about:

1) I open a ticket for a problem
2) The ticket is taken into account by the dev
3) Work on it, push the patch
4) Ask the user to update and give feedback
5) if working then close the ticket, if not then go ahead ...

What do you think ?

> 
> > As exemple: ticket #3501 is closed, but even if I have followed the 
> > instruction, the problem is not solved, but the ticket is closed ... 
> Either you're now hitting a bug that has nothing to do with your 
> original issue or Marek thought he fixed the bug but made a mistake. If 
> it's the former simply open another issue. If it's the latter, I'd send 
> Marek a friendly email, or I would create a new issue pointing to the 
> wrongly solved older one.
> 
> > How to re-open it ?
> 
> You can't, it looks like it's a github shortcoming. Had you taken 2 secs 
> to websearch it, you'd have found:
> 
> https://stackoverflow.com/questions/21333654/how-to-re-open-an-issue-in-github#21333938
> 
> first hit, no need to even click the link, the answer is at the top of 
> the search page: "you cannot re-open your own issues if a repo 
> collaborator closed them".

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17348f3e-a744-41bc-9797-1e396dcf900b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-01-31 Thread ThierryIT
How did you attached it ? I am trying without success ... I can attached it 
from dom0 using: qvm-block a vm_name dom0:sdd 
Is it correct under Qubes4.0r3 ?


Le mardi 23 janvier 2018 09:51:17 UTC+2, Kushal Das a écrit :
> On Tue, Jan 23, 2018 at 12:17 PM, ThierryIT  wrote:
> > Hello,
> >
> > I have today to deal with two problems:
> >
> > 1) I am using Yubikey to be authentified on some web site like Github ...
> > 2) I am using Yubikey to stock my PGP keys and to use them with mainly my 
> > emails (Thinderbird+Enigmail)
> >
> > What to do under Qubes to make this possible ?
> > I have already sys-usb running.
> 
> On Qubes 4.0rc3, I just attach it to the vm as required, and use it.
> No configuratino is required.
> 
> Kushal
> -- 
> Staff, Freedom of the Press Foundation
> CPython Core Developer
> Director, Python Software Foundation
> https://kushaldas.in

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f642009-c092-4a59-963f-1b9d8728b52f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to deal with Yubikey ?

2018-01-31 Thread ThierryIT
There is no sys-usb and I do not have installed qubes-usb-proxy 

Le mercredi 31 janvier 2018 16:10:08 UTC+2, ThierryIT a écrit :
> Hi,
> 
> I have moved from R3.2 to 4.0R3.
> And I am still dealing with the same problem, and I don't know if for 4.0R3 
> the documentation provided is still updated.
> All my Keys are detected by dom0:
> 
> Device dom0:4-2 - Neowave_Keydo-AES_0989876... is available
> Device dom0:sdd - Keydo-AES () available
> Device dom0:sdf - Keydo-AES ()( is available
> Device dom0:sdf1 - Keydo-AES (PUBLIC) is available
> 
> This key has two fuction as auth key (github ...) and an public and an  
> encrypted folder
> 
> I am using it to log to Github and to my Registar under Windows.
> 
> So for a Qubes 4.0R3 how to do ?
> 
> Thx
> 
> Le jeudi 25 janvier 2018 13:37:56 UTC+2, rob_66 a écrit :
> > On Mon, 22 Jan 2018 22:47:55 -0800 (PST)
> > ThierryIT <v...@gmail.com> wrote:
> >  
> > > I have today to deal with two problems:
> > > 
> > > 1) I am using Yubikey to be authentified on some web site like
> > > Github ... 2) I am using Yubikey to stock my PGP keys and to use them
> > > with mainly my emails (Thinderbird+Enigmail)
> > > 
> > > What to do under Qubes to make this possible ?
> > > I have already sys-usb running. 
> > 
> > Hi.
> > 
> > I studied and followed
> > https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key as
> > well as https://mig5.net/content/yubikey-challenge-response-mode-qubes
> > and it works perfectly fine on Qubes 3.2, Fedora 26. And my skills
> > are mediocre. 
> > 
> > (Sending *63* bits, »variable«, you'll recognize later.)
> > 
> > However, Qubes' own tutorial can, of course, work flawlessly with your
> > set-up:
> > 
> > https://www.qubes-os.org/doc/yubi-key/
> > 
> > If you like to dig in deeper, see the discussions on Github: 
> > 
> > https://www.qubes-os.org/doc/yubi-key/
> > 
> > Best regards,
> > r.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2c4d60cc-a503-4ed9-9987-b5e93bfcf8b5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to deal with Yubikey ?

2018-01-31 Thread ThierryIT
Hi,

I have moved from R3.2 to 4.0R3.
And I am still dealing with the same problem, and I don't know if for 4.0R3 the 
documentation provided is still updated.
All my Keys are detected by dom0:

Device dom0:4-2 - Neowave_Keydo-AES_0989876... is available
Device dom0:sdd - Keydo-AES () available
Device dom0:sdf - Keydo-AES ()( is available
Device dom0:sdf1 - Keydo-AES (PUBLIC) is available

This key has two fuction as auth key (github ...) and an public and an  
encrypted folder

I am using it to log to Github and to my Registar under Windows.

So for a Qubes 4.0R3 how to do ?

Thx

Le jeudi 25 janvier 2018 13:37:56 UTC+2, rob_66 a écrit :
> On Mon, 22 Jan 2018 22:47:55 -0800 (PST)
> ThierryIT <v...@gmail.com> wrote:
>  
> > I have today to deal with two problems:
> > 
> > 1) I am using Yubikey to be authentified on some web site like
> > Github ... 2) I am using Yubikey to stock my PGP keys and to use them
> > with mainly my emails (Thinderbird+Enigmail)
> > 
> > What to do under Qubes to make this possible ?
> > I have already sys-usb running. 
> 
> Hi.
> 
> I studied and followed
> https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key as
> well as https://mig5.net/content/yubikey-challenge-response-mode-qubes
> and it works perfectly fine on Qubes 3.2, Fedora 26. And my skills
> are mediocre. 
> 
> (Sending *63* bits, »variable«, you'll recognize later.)
> 
> However, Qubes' own tutorial can, of course, work flawlessly with your
> set-up:
> 
> https://www.qubes-os.org/doc/yubi-key/
> 
> If you like to dig in deeper, see the discussions on Github: 
> 
> https://www.qubes-os.org/doc/yubi-key/
> 
> Best regards,
> r.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f9b9c15-76d1-4e2e-97b8-0f1c28ff6a6a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes / Github bugs track ??

2018-01-30 Thread ThierryIT
Le mardi 30 janvier 2018 10:05:57 UTC+2, Ivan Mitev a écrit :
> On 01/30/18 09:36, ThierryIT wrote:
> > Hi,
> > 
> > Why are you closing a ticket before knowing if the modification you have 
Thx for your explanations, very nice job :)
So if I did understood well, I have to re-open a new ticket for the same 
problem .. Because it is not resolved.

made, to correct the bug, is working ? I mean, why can't you wait for the user 
to add the modification and see if it is working or not ?
> 
> Once a dev or contributor provides a fix that he/she thinks solves an 
> issue there is usually no reason to keep the issue open, or else the 
> issue tracker would be cluttered with fixed but open issues waiting to 
> be confirmed/closed by their reporter.
> 
> > As exemple: ticket #3501 is closed, but even if I have followed the 
> > instruction, the problem is not solved, but the ticket is closed ... 
> Either you're now hitting a bug that has nothing to do with your 
> original issue or Marek thought he fixed the bug but made a mistake. If 
> it's the former simply open another issue. If it's the latter, I'd send 
> Marek a friendly email, or I would create a new issue pointing to the 
> wrongly solved older one.
> 
> > How to re-open it ?
> 
> You can't, it looks like it's a github shortcoming. Had you taken 2 secs 
> to websearch it, you'd have found:
> 
> https://stackoverflow.com/questions/21333654/how-to-re-open-an-issue-in-github#21333938
> 
> first hit, no need to even click the link, the answer is at the top of 
> the search page: "you cannot re-open your own issues if a repo 
> collaborator closed them".

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b7c78e18-2705-4d0d-ba0f-8329a358e042%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes / Github bugs track ??

2018-01-29 Thread ThierryIT
Hi,

Why are you closing a ticket before knowing if the modification you have made, 
to correct the bug, is working ? I mean, why can't you wait for the user to add 
the modification and see if it is working or not ?
As exemple: ticket #3501 is closed, but even if I have followed the 
instruction, the problem is not solved, but the ticket is closed ... How to 
re-open it ?

Thx 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2301adfc-63e5-4d02-9c19-67b57755e5b1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Manager / Qubes 4.0 R3 ?

2018-01-28 Thread ThierryIT
Yes it is but only if you are using as repo=testing

Le lundi 29 janvier 2018 09:30:12 UTC+2, [799] a écrit :
> Hello,
> 
>  ThierryIT wrote:
> > Hi, Not possible anymore to hide "un-running
> > VMs" ?
> 
> Ist Qubes Manager already available in 4rc3?
> I haven't read anything and thought that it will come with Qubes 4rc4.
> 
> [799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47d5a9c0-782c-491e-9990-df5d65447565%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes Manager / Qubes 4.0 R3 ?

2018-01-28 Thread ThierryIT
Hi,

Not possible anymore to hide "un-running VMs" ?
By the way, is it possible to create in Qubes Manager folders to be able to 
sort out VMs ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86678769-44ff-4d59-887e-bb518a06ef37%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Import back VM (3.2) to Qubes 4.0RC3 ?

2018-01-28 Thread ThierryIT
I have done my restore.
Do have some bugs, will open a ticket in Github tomorrow.
But I do have an error when trying to add "devices" for my netVM:

Error: Device tab:
Can't attach pci device to VM in pvh mode ??

What is the pvh mode ?

Thx


Le dimanche 28 janvier 2018 16:14:52 UTC+2, Yuraeitha a écrit :
> On Sunday, January 28, 2018 at 2:58:42 PM UTC+1, ThierryIT wrote:
> > Hi,
> > 
> > I have installed Qubes 4 without any problem.
> > I have done the dom0 upgrade.
> > I am able to start the system.
> > 
> > But I do not have any "Qubes Manager" ...
> > 
> > Thx
> > 
> > Le dimanche 28 janvier 2018 14:17:54 UTC+2, awokd a écrit :
> > > On Sun, January 28, 2018 7:46 am, ThierryIT wrote:
> > > >
> > > > I am a bit lost with Qubes 4.0 RC3 ...
> > > > Before moving to 4.0, I have done my VM's backup.
> > > > How to restore them to Qubes 4.0 ?
> > > 
> > > Please check out https://www.qubes-os.org/doc/upgrade-to-r4.0/. Let me
> > > know if you have any questions; you might be the first one to try it out.
> 
> - Once fully updated, the Qubes manager should be in GUI Menu --> 
> System-tools ---> Qubes Manager. It might require a current-testing update, 
> since it's meant to be released in RC-4 version, and it doesn't seem finished 
> yet. If you can't see it in System-Tools, then you either need to wait, or 
> find it in current-testing dom0 updates.
> 
> - In addition, you may want to consider to be careful with having to re-name 
> VM's too often. This is because Qubes 4 instead of the typical plain 
> re-naming, will copy the entire VM with the new name, and thereafter delete 
> the old-named VM. I hear there is a good reason for this, but I did not look 
> up the technical reason for it. Either way, plan ahead, try avoid to have to 
> re-name in particular large VM's as it can take a while on slow drives. If 
> you got a fast NVMe drive, then it should be fast, but on a slow HDD or even 
> SDD, larger VM's can take a while. It's essentially like doing qvm-clone as 
> you probably can imagine. 
> 
> - There are still bugs to look out for in Qubes 4 RC-3 updated to this day, 
> although most are starting to be mostly minor. 
> 
> - Read the release news in detail when RC-4 is released, as with Qubes 4 the 
> developers has started advizing us whether we can keep updating between RC-X 
> releases, or whether they recommend we re-install again. Last time between 
> RC-2 and RC-3 it was fine to just keep updating. The same may or may not 
> happen between RC-3 and RC-4/final-version.
> 
> - Qubes Manager is still a bit slow and sluggish. I don't know if it'll 
> improve, but my guesses is it probably will when there is time available to 
> do so. 
> 
> - Be aware of the disk discard/trimming in Qubes 4. In Qubes 3.2. we could do 
> it manually, but it's supposed to work automatic in Qubes 4. Unfortunately it 
> doesn't always work out of the box. You may have to dig into /etc/fdisk, 
> Grub.cfg/EFI.cfg, and so forth, in order to get discard/fstrim working. Also 
> notice that dom0 discard/fstrim is not the same as the template 
> discard/fstrim. If it works in dom0, then it'll automatically adjust shown 
> available space moments after removal, if you for example remove a large 
> package in dom0, like a large template. However if you remove files in a VM 
> that doesn't have working discard/fstrim, then it'll be less noticeable and 
> you might not realize. It's a good idea to pay attention, especially if you 
> got little drive space.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f1bde3cd-1679-4244-82d6-f12f372d61c9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Import back VM (3.2) to Qubes 4.0RC3 ?

2018-01-28 Thread ThierryIT
Hi,

I have installed Qubes 4 without any problem.
I have done the dom0 upgrade.
I am able to start the system.

But I do not have any "Qubes Manager" ...

Thx

Le dimanche 28 janvier 2018 14:17:54 UTC+2, awokd a écrit :
> On Sun, January 28, 2018 7:46 am, ThierryIT wrote:
> >
> > I am a bit lost with Qubes 4.0 RC3 ...
> > Before moving to 4.0, I have done my VM's backup.
> > How to restore them to Qubes 4.0 ?
> 
> Please check out https://www.qubes-os.org/doc/upgrade-to-r4.0/. Let me
> know if you have any questions; you might be the first one to try it out.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/825bca3e-a741-40d4-8721-2b69ac712c58%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Import back VM (3.2) to Qubes 4.0RC3 ?

2018-01-27 Thread ThierryIT
Hi,

I am a bit lost with Qubes 4.0 RC3 ...
Before moving to 4.0, I have done my VM's backup.
How to restore them to Qubes 4.0 ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/10638a91-a7eb-4a89-97d8-b3d9278be77a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-01-24 Thread ThierryIT
Hi,

If using sys-usb, I am not able to use the cli: qvm-usb 
How to mount it ?
I can see on my sys-usb VM that the system see my key.

Thx

Le mardi 23 janvier 2018 14:42:18 UTC+2, Matty South a écrit :
> On Tuesday, January 23, 2018 at 2:11:33 AM UTC-6, ThierryIT wrote:
> > I am on R3.2 and I would like to avoid upgrading to 4.0 :)
> > 
> > Le mardi 23 janvier 2018 09:51:17 UTC+2, Kushal Das a écrit :
> > > On Tue, Jan 23, 2018 at 12:17 PM, ThierryIT wrote:
> > > > Hello,
> > > >
> > > > I have today to deal with two problems:
> > > >
> > > > 1) I am using Yubikey to be authentified on some web site like Github 
> > > > ...
> > > > 2) I am using Yubikey to stock my PGP keys and to use them with mainly 
> > > > my emails (Thinderbird+Enigmail)
> > > >
> > > > What to do under Qubes to make this possible ?
> > > > I have already sys-usb running.
> > > 
> > > On Qubes 4.0rc3, I just attach it to the vm as required, and use it.
> > > No configuratino is required.
> > > 
> > > Kushal
> > > -- 
> > > Staff, Freedom of the Press Foundation
> > > CPython Core Developer
> > > Director, Python Software Foundation
> > > https://kushaldas.in
> 
> I can confirm Kushal's experience. Two things I wanted to point out:
> 1) install yubikey software in the target vm template: 
> sudo dnf install yubioath-desktop [for Fedora template]
> 
> 2) I attach it to the desired VM in dom0 terminal using
> qvm-usb -a ...
> 
> Then you can double-checke that everything is working here: 
> https://demo.yubico.com/
> 
> Hope that helps some folks out!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4970a84c-0846-4a18-87fc-476abb1a1684%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: When creating a fresh sys-usb

2018-01-24 Thread ThierryIT
Global settings / default template ?


Le mercredi 24 janvier 2018 15:32:55 UTC+2, ThierryIT a écrit :
> Hi,
> 
> What template does it use ?
> How to make it change (from fedora to debian template) if I need to do it ?
> 
> Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/287fe05e-9799-47e7-a1ab-49cddc30f534%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] When creating a fresh sys-usb

2018-01-24 Thread ThierryIT
Hi,

What template does it use ?
How to make it change (from fedora to debian template) if I need to do it ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0dbffb2-0165-4554-9c28-7dca4982a069%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Upgrade from 3.2 to 4.0 ?

2018-01-23 Thread ThierryIT
Will have to wait the stable version in this case :)
Thx

Le mercredi 24 janvier 2018 08:01:18 UTC+2, Chris Laprise a écrit :
> On 01/24/2018 12:52 AM, ThierryIT wrote:
> > Hi,
> > 
> > Is there any procedure available ?
> > Or can I follow this one: https://www.qubes-os.org/doc/upgrade-to-r3.2/
> > 
> > Thx
> > 
> 
> There is no procedure for in-place upgrading that I'm aware of. You'll 
> need to backup your VMs, install 4.0, then restore the VMs.
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9b9d638-9e92-446a-af8f-35a5ac1ef763%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Upgrade from 3.2 to 4.0 ?

2018-01-23 Thread ThierryIT
Hi,

Is there any procedure available ?
Or can I follow this one: https://www.qubes-os.org/doc/upgrade-to-r3.2/

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1e1be96c-19f9-4820-92dc-fea940aa3984%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-01-23 Thread ThierryIT
Interesting ...
The software has to be installed in the sys-usb template, for me fedora 26 ?

Le mardi 23 janvier 2018 14:42:18 UTC+2, Matty South a écrit :
> On Tuesday, January 23, 2018 at 2:11:33 AM UTC-6, ThierryIT wrote:
> > I am on R3.2 and I would like to avoid upgrading to 4.0 :)
> > 
> > Le mardi 23 janvier 2018 09:51:17 UTC+2, Kushal Das a écrit :
> > > On Tue, Jan 23, 2018 at 12:17 PM, ThierryIT wrote:
> > > > Hello,
> > > >
> > > > I have today to deal with two problems:
> > > >
> > > > 1) I am using Yubikey to be authentified on some web site like Github 
> > > > ...
> > > > 2) I am using Yubikey to stock my PGP keys and to use them with mainly 
> > > > my emails (Thinderbird+Enigmail)
> > > >
> > > > What to do under Qubes to make this possible ?
> > > > I have already sys-usb running.
> > > 
> > > On Qubes 4.0rc3, I just attach it to the vm as required, and use it.
> > > No configuratino is required.
> > > 
> > > Kushal
> > > -- 
> > > Staff, Freedom of the Press Foundation
> > > CPython Core Developer
> > > Director, Python Software Foundation
> > > https://kushaldas.in
> 
> I can confirm Kushal's experience. Two things I wanted to point out:
> 1) install yubikey software in the target vm template: 
> sudo dnf install yubioath-desktop [for Fedora template]
> 
> 2) I attach it to the desired VM in dom0 terminal using
> qvm-usb -a ...
> 
> Then you can double-checke that everything is working here: 
> https://demo.yubico.com/
> 
> Hope that helps some folks out!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96ce28fa-4013-4db4-8a9a-fdacefdbf438%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to deal with Yubikey ?

2018-01-23 Thread ThierryIT
I am on R3.2 and I would like to avoid upgrading to 4.0 :)

Le mardi 23 janvier 2018 09:51:17 UTC+2, Kushal Das a écrit :
> On Tue, Jan 23, 2018 at 12:17 PM, ThierryIT wrote:
> > Hello,
> >
> > I have today to deal with two problems:
> >
> > 1) I am using Yubikey to be authentified on some web site like Github ...
> > 2) I am using Yubikey to stock my PGP keys and to use them with mainly my 
> > emails (Thinderbird+Enigmail)
> >
> > What to do under Qubes to make this possible ?
> > I have already sys-usb running.
> 
> On Qubes 4.0rc3, I just attach it to the vm as required, and use it.
> No configuratino is required.
> 
> Kushal
> -- 
> Staff, Freedom of the Press Foundation
> CPython Core Developer
> Director, Python Software Foundation
> https://kushaldas.in

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0dd411e2-34ba-4fec-9ce4-65a5b92103d2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to deal with Yubikey ?

2018-01-22 Thread ThierryIT
Hello,

I have today to deal with two problems:

1) I am using Yubikey to be authentified on some web site like Github ...
2) I am using Yubikey to stock my PGP keys and to use them with mainly my 
emails (Thinderbird+Enigmail)

What to do under Qubes to make this possible ?
I have already sys-usb running.

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b46f0959-5bd4-46ce-8ef7-8e290d99c69b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] files /etc/yum.repos.d/fedora.repo and fedora-updates.repo ?

2018-01-20 Thread ThierryIT
Hi,

Let's try to be clear ...
I have installed few weeks  ago anti-evil-maid package + dependencies.
I have had several problem with it ...
When checking what packages are installed, I can see that they all have as 
common denominator "fc23" (as exemple: tboot 1:1.8.2-3.fc23)
I don't want to install any packages links to this templates version (23) but 
move to v26 .. 
When checking fedora.repo and fedora-updates.repo they are both link to fc23.
How to  move properly  to fc26 ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9933ed02-e946-4241-ad98-dcf14422d68f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-01-18 Thread ThierryIT
Not familiar with this ... Will need procediure to follow.


Le mercredi 17 janvier 2018 23:03:31 UTC+2, Alex Dubois a écrit :
> On Wednesday, 17 January 2018 15:15:45 UTC, ThierryIT  wrote:
> > No, I am still under R3.2
> > 
> > Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> > > On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > > > "https://github.com/adubois/qubes-app-linux-yubikey;
> > > >
> > > >
> > > > Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> > > >
> > > >> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > > >>
> > > >>> Nobody ?
> > > >>>
> > > >>>
> > > >>>
> > > >>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> > > >>>
> > > >>>
> > > >>>> Hi,
> > > >>>>
> > > >>>>
> > > >>>>
> > > >>>> I am going to install a new sys-usb.
> > > >>>> I have before to install all what I need to the template (fedora-26)
> > > >>>>  first. When following your procedure:
> > > >>>>
> > > >>>>
> > > >>>> ykpers has been installed but: I cannot do the same for
> > > >>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> > > >>>>
> > > >>>> no match for argument
> > > >>>>
> > > >>>> ideas ?
> > > >>
> > > >> Not quite sure what you are trying to do here. What procedure? What
> > > >> command are you entering?
> > > 
> > > Are you trying this on Qubes 4.0? Those Yubikey packages might not be in
> > > the Qubes repo yet.
> 
> Hi,
> 
> I have not maintained this for some time. So long that I can't remember if 
> the packages had been created/tested, I don't think they have.
> 
> Best is you follow the steps to build it on a new temporary VM, don't be 
> afraid it should not be too hard:
> - Execute the yum command in "Build dependancies"
> - Also install pam-devel
> - Follow the steps in preparing the build and build
> - Deploy the code in Dom0 and the USB VM.
> 
> I am about to upgrade to Qubes 4.0 rc4 (when released) so won't probably be 
> able to help until this is done.
> 
> Any help from someone who is used to packaging under Fedora would be nice.
> 
> Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/79a97c8e-5626-4ab0-9625-764dabaf45ba%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-01-17 Thread ThierryIT
No, I am still under R3.2

Le mercredi 17 janvier 2018 16:54:58 UTC+2, awokd a écrit :
> On Wed, January 17, 2018 2:09 pm, ThierryIT wrote:
> > "https://github.com/adubois/qubes-app-linux-yubikey;
> >
> >
> > Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> >
> >> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> >>
> >>> Nobody ?
> >>>
> >>>
> >>>
> >>> Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> >>>
> >>>
> >>>> Hi,
> >>>>
> >>>>
> >>>>
> >>>> I am going to install a new sys-usb.
> >>>> I have before to install all what I need to the template (fedora-26)
> >>>>  first. When following your procedure:
> >>>>
> >>>>
> >>>> ykpers has been installed but: I cannot do the same for
> >>>> qubes-yubikey-vm and qubes-yubikey-dom0 :
> >>>>
> >>>> no match for argument
> >>>>
> >>>> ideas ?
> >>
> >> Not quite sure what you are trying to do here. What procedure? What
> >> command are you entering?
> 
> Are you trying this on Qubes 4.0? Those Yubikey packages might not be in
> the Qubes repo yet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/79f4fc4c-14a6-4d44-a7b3-e752aa8cdb29%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: sys-usb / template install yubikey tools ?

2018-01-17 Thread ThierryIT
"https://github.com/adubois/qubes-app-linux-yubikey;

Le mercredi 17 janvier 2018 16:05:52 UTC+2, awokd a écrit :
> On Wed, January 17, 2018 1:09 pm, ThierryIT wrote:
> > Nobody ?
> >
> >
> > Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> >
> >> Hi,
> >>
> >>
> >> I am going to install a new sys-usb.
> >> I have before to install all what I need to the template (fedora-26)
> >> first. When following your procedure:
> >>
> >>
> >> ykpers has been installed but: I cannot do the same for qubes-yubikey-vm
> >> and qubes-yubikey-dom0 :
> >>
> >> no match for argument
> >>
> >> ideas ?
> 
> Not quite sure what you are trying to do here. What procedure? What
> command are you entering?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f465fd71-bb25-4050-91be-ca577635c7f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: sys-usb / template install yubikey tools ?

2018-01-17 Thread ThierryIT
Nobody ?

Le mercredi 17 janvier 2018 09:23:34 UTC+2, ThierryIT a écrit :
> Hi,
> 
> I am going to install a new sys-usb.
> I have before to install all what I need to the template (fedora-26) first.
> When following your procedure:
> 
> ykpers has been installed but:
> I cannot do the same for qubes-yubikey-vm and qubes-yubikey-dom0 :
> 
> no match for argument
> 
> ideas ?
> 
> Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e52f7ec9-af27-4a45-8ce8-b00234956475%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] sys-usb / template install yubikey tools ?

2018-01-16 Thread ThierryIT
Hi,

I am going to install a new sys-usb.
I have before to install all what I need to the template (fedora-26) first.
When following your procedure:

ykpers has been installed but:
I cannot do the same for qubes-yubikey-vm and qubes-yubikey-dom0 :

no match for argument

ideas ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37feac08-1244-40da-8392-2e8e9de6f903%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot execute qrexec-daemon

2018-01-15 Thread ThierryIT
Github ticket number: #3459



Le lundi 15 janvier 2018 08:40:45 UTC+2, ThierryIT a écrit :
> update: All type of VMs can run only if there is no selected devices.
> 
> 
> 
> Le dimanche 14 janvier 2018 13:40:41 UTC+2, ThierryIT a écrit :
> > Hello,
> > 
> > R3.2
> > 
> > 
> > I have installed yesterday and this morning AEM and sys-usb.
> > I had problem to make AEM working, but it seems now to work.
> > When booting I should have my two VMs "netVM and proxyVM" running ... Not 
> > the case anymore.
> > My wifi device doesn't seems to be up as it was before (internal not usb).
> > 
> > I have removed sys-usb: same pb
> > 
> > TemplateVM are still able to run
> > StandaloneVM are not running (cannot execute qrexec-daemon)
> > netVM and proxyVM same pb than above.
> > 
> > Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49d5b731-8f91-4f43-9192-5d77d32eefcc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot execute qrexec-daemon

2018-01-14 Thread ThierryIT
update: All type of VMs can run only if there is no selected devices.



Le dimanche 14 janvier 2018 13:40:41 UTC+2, ThierryIT a écrit :
> Hello,
> 
> R3.2
> 
> 
> I have installed yesterday and this morning AEM and sys-usb.
> I had problem to make AEM working, but it seems now to work.
> When booting I should have my two VMs "netVM and proxyVM" running ... Not the 
> case anymore.
> My wifi device doesn't seems to be up as it was before (internal not usb).
> 
> I have removed sys-usb: same pb
> 
> TemplateVM are still able to run
> StandaloneVM are not running (cannot execute qrexec-daemon)
> netVM and proxyVM same pb than above.
> 
> Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/98d2f48b-60db-4256-a997-aa6d3312edb7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cannot execute qrexec-daemon

2018-01-14 Thread ThierryIT
I have done in the same time an upgrade of the fedora-26 template ...

Le dimanche 14 janvier 2018 13:40:41 UTC+2, ThierryIT a écrit :
> Hello,
> 
> R3.2
> 
> 
> I have installed yesterday and this morning AEM and sys-usb.
> I had problem to make AEM working, but it seems now to work.
> When booting I should have my two VMs "netVM and proxyVM" running ... Not the 
> case anymore.
> My wifi device doesn't seems to be up as it was before (internal not usb).
> 
> I have removed sys-usb: same pb
> 
> TemplateVM are still able to run
> StandaloneVM are not running (cannot execute qrexec-daemon)
> netVM and proxyVM same pb than above.
> 
> Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/28b1e882-7bdd-4541-a30c-36c44ee2fd37%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Cannot execute qrexec-daemon

2018-01-14 Thread ThierryIT
Hello,

R3.2


I have installed yesterday and this morning AEM and sys-usb.
I had problem to make AEM working, but it seems now to work.
When booting I should have my two VMs "netVM and proxyVM" running ... Not the 
case anymore.
My wifi device doesn't seems to be up as it was before (internal not usb).

I have removed sys-usb: same pb

TemplateVM are still able to run
StandaloneVM are not running (cannot execute qrexec-daemon)
netVM and proxyVM same pb than above.

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f5422734-1f7a-4839-bf59-50276206303e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Running Windows from Qubes VM ?

2018-01-12 Thread ThierryIT
Hi,
Seems to work better even if I am still not able to boot my windows.
With "fdisk" I can see that my bootable HDD is "sdc1".
>From Dom0, when doing a : qvm-start vm-test --hddisk /dev/sdc1, I do have a 
>popup from my Windows drive.

Booting from CDROM  error code failaure 2
Booting from Hard drive, failed no bootable disk 

No bootable device ...

Ideas ?



Le vendredi 12 janvier 2018 17:43:56 UTC+2, awokd a écrit :
> On Fri, January 12, 2018 2:53 pm, ThierryIT wrote:
> > Hello,
> >
> >
> > I am not able to use "qvm-start" because the HVM I have created is
> > "Empty".
> > Dom0 is able to see my Windows 7 hard drive:
> > /dev/sdc2 /run/media/user/32E...CCB type fuseblk
> >
> >
> > From Dom0 I am able to have access to all my Window 7 files.
> >
> >
> > Any ideas ?
> >
> >
> > Thx
> >
> >
> > Le vendredi 12 janvier 2018 13:59:56 UTC+2, awokd a écrit :
> >
> >> On Fri, January 12, 2018 6:48 am, ThierryIT wrote:
> >>
> >>> Hello,
> >>>
> >>>
> >>>
> >>> I have a laptop with two internal Hard Drives.
> >>> One HD with Windows 7 the second Hard Drive with Qubes on it.
> >>> Is it possible to run Windows 7 from a VM's Qubes instead of building
> >>> a Win dows's VM ?
> >>>
> >>
> >> You might be able to create a Win 7 HVM inside Qubes, then use
> >> qvm-start win7 --drive /dev/sdb5 (or wherever your Win7 bootable
> >> partition is located) to start it. Never tried it though.
> 
> Can you provide the exact error message? Not sure why qvm-start would care
> it's empty, it will still boot from a CDROM then too...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd05df3b-495a-4cab-a69b-13656a90f018%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Running Windows from Qubes VM ?

2018-01-12 Thread ThierryIT
Hello,

I am not able to use "qvm-start" because the HVM I have created is "Empty".
Dom0 is able to see my Windows 7 hard drive:
/dev/sdc2 /run/media/user/32E...CCB type fuseblk

>From Dom0 I am able to have access to all my Window 7 files.

Any ideas ?

Thx 

Le vendredi 12 janvier 2018 13:59:56 UTC+2, awokd a écrit :
> On Fri, January 12, 2018 6:48 am, ThierryIT wrote:
> > Hello,
> >
> >
> > I have a laptop with two internal Hard Drives.
> > One HD with Windows 7 the second Hard Drive with Qubes on it.
> > Is it possible to run Windows 7 from a VM's Qubes instead of building a
> > Win dows's VM ?
> 
> You might be able to create a Win 7 HVM inside Qubes, then use qvm-start
> win7 --drive /dev/sdb5 (or wherever your Win7 bootable partition is
> located) to start it. Never tried it though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/388e882b-5bfe-4f6b-b755-cb1b61280445%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Running Windows from Qubes VM ?

2018-01-11 Thread ThierryIT
Hello,

I have a laptop with two internal Hard Drives.
One HD with Windows 7 the second Hard Drive with Qubes on it.
Is it possible to run Windows 7 from a VM's Qubes instead of building a  Win 
dows's VM ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e7ae923e-dbeb-49ba-8898-7e47d055c3f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Propagate Fedora-23 to Fedora-26 to AppVM based on Template fedora-23 ?

2017-12-31 Thread ThierryIT
I have followed your advise ..
I have switch off my netVM.
Change the VM settings from "template 23 to Template 26"
Switch ON ... And nothing particular is happening ... This VM still work but 
based on the v23 of my template.
I am going to do another test with a new VM created with the v23 ...

Thx


Le dimanche 31 décembre 2017 12:51:49 UTC+2, awokd a écrit :
> On Sun, December 31, 2017 10:33 am, ThierryIT wrote:
> > Yes this is an upgrade from the default Fedora-23 template.
> > But nothing is happening.
> > I do have my NetVM who is based on the v23 template, what to do to make it
> > upgrading to v26 ??
> 
> Assuming you're using Qubes 3.2,
> Shutdown the AppVM you want to upgrade to 26
> Right click and pick VM settings
> Under the Basic tab, click the Template drop down list
> Pick your Fedora 26 template and hit OK
> Start the AppVM back up

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f340c75e-4500-472e-88ff-65a567b51c92%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Propagate Fedora-23 to Fedora-26 to AppVM based on Template fedora-23 ?

2017-12-31 Thread ThierryIT
Yes this is an upgrade from the default Fedora-23 template.
But nothing is happening.
I do have my NetVM who is based on the v23 template, what to do to make it 
upgrading to v26 ??

Merci


Le dimanche 31 décembre 2017 11:29:35 UTC+2, Frédéric Pierret (fepitre) a écrit 
:
> Le dimanche 31 décembre 2017 09:30:19 UTC+1, ThierryIT a écrit :
> > Hi,
> > 
> > I have done an upgrade of my Fedora-23 template to version 26.
> > I would like to propagate all Fedora-23 template AppVM based to version 26?
> > How to preceed ?
> > 
> > Thx
> 
> Hi,
> 
> If you made an upgrade in the default template, there is nothing to do. If 
> you made a clone then, just change your appvms settings by selecting your 
> updated template clone.
> 
> Best,

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c1c8e5db-ea8f-4e77-9342-5d07ef15e5be%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Propagate Fedora-23 to Fedora-26 to AppVM based on Template fedora-23 ?

2017-12-31 Thread ThierryIT
Hi,

I have done an upgrade of my Fedora-23 template to version 26.
I would like to propagate all Fedora-23 template AppVM based to version 26?
How to preceed ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5c248430-2a22-4677-b7c4-abc2e04e6085%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Install DNSSEC on ProxyVM type (debian) ?

2017-02-13 Thread ThierryIT
Le mardi 14 février 2017 02:57:28 UTC+2, Unman a écrit :
> On Mon, Feb 13, 2017 at 05:10:28AM -0800, ThierryIT wrote:
> > Hi,
> > 
> > Thx a lot for these information.
> > 
> > I  have installed dnssec-trigger on a newly created VM from a debian 
> > template as ProxyVM type. This is working, I  have checked for the DNSSEC 
> > and all are ok.
> > 
> > In the same way, I do have a VM to browse on internet,  and  I want all DNS 
> > request forwarded to this ProxyVM  freshly installed  ... How to do  this ??
> > 
> > Thx
> > 
> > Le lundi 13 février 2017 09:40:42 UTC+2, Andrew David Wong a écrit :
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA512
> > > 
> > > On 2017-02-12 23:18, ThierryIT wrote:
> > > > Hi,
> > > > 
> > > > I think that I have missed something concerning Qubes. When I
> > > > installed, let's say "Unbound" packages, after a reboot of the VM
> > > > it disappear ... Normal ?
> > > > 
> > > > Thx
> > > > 
> > > 
> > > You have to install it in the TemplateVM (or, for more advanced users,
> > > pick a persistent dir and/or use bind-dirs):
> > > 
> > > https://www.qubes-os.org/doc/templates/
> > > 
> > > - -- 
> > > Andrew David Wong (Axon)
> > > Community Manager, Qubes OS
> > > https://www.qubes-os.org
> > > -BEGIN PGP SIGNATURE-
> > > 
> > > iQIcBAEBCgAGBQJYoWLcAAoJENtN07w5UDAwAoQQAM+eiQ77VRPjYIf/0pKepUh0
> > > eMpVANLYuKUC1yOnkyQR4p+eZBY1aRxLenC1y5pZXfk0ZFySKATa+lw2gZR0A6dn
> > > oMzZVtMxqDpVs3SQOImFvGEJCrhmaro1NmyL7+xNTgbEIO7Q35Az+AMLT3nNUa5N
> > > qclPsdCi48MWki4YhCMOaNLxxeFYlJoN1JMdqVg9wWKfPWWL7t15koO0gB2hWAj0
> > > izroJeb9jDOW73PCo13zIs3nBrgmUnP/1VTg7emipVTfeQabHbpads61dNNSCgfv
> > > TEQfXI8+b4TX1ajN5mT90sX5N11OOY0rePRHhhSlRlGMNM+2P6rxjMPvXTrxkF1q
> > > 6TX12i2f2MxKg0uY7wJj2bCqG20Mo9sIsbxybvtFXKphnHZYOGaRmasdw4QciW/m
> > > 1Ojy9dFUdLlqRSsbJRsk91CE6MwhmCqGQAsJsFd1WKdY6+EyH1cSuNpr+PEt01xl
> > > hY91+ljOpI2/wYAQ+cumRV7JAydeCVv59Qs3k5yeFnpeqPMbPe9hKOnTj6eLyDbb
> > > WCCHJzmJJ0NIqzEvdsaiJnfOy9gTSKVdX4YIOoC5b2wjW4+vqJwqPUssSC511zpa
> > > OxEmKTSN7raMuuNLG370oplr5pRnrA/iolg/W/tDM2TbyfGQuEOHZXh91C6vyKKv
> > > mFM7z+UCGxMljbNCEuDN
> > > =laqs
> > > -END PGP SIGNATURE-
> > 
> 
> Please don't top post.
> 
> If the new proxyVM is upstream from the browsing machine then you will
> need to adjust iptables in the nat table to redirect dns requests to the
> dnssec-trigger listener.
> 
> If the new proxy is not upstream, but connected to the same upstream
> proxy then you can set the ip address in /etc/resolv.conf in the
> browsing qube, and allow traffic between the qubes as shown in this
> page:
> www.qubes-os.org/doc/firewall  in the section "Enabling networking
> between two qubes"
> You could set the dns record from /rw/config/rc.local.

For me it will be the first case.

So to do it right, I will need to:

In the Browsing VM (10.137.4.16):

- DNS resolver to the IP of the ProxyVM
- VM settings: NetVM to ProxyVM

In the ProxyVM (10.137.2.13): 

- VM settings: NetVM to sys-firewall
- DNS resolver to 127.0.0.1  (already done)
- New iptables NAT rules to forward all DNS request from the BrowsingVM to the 
local DNS listener

Is it right  ?
Thx


  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4cdac77-bcd7-4bad-8a96-f15bc3bcf5cd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Install DNSSEC on ProxyVM type (debian) ?

2017-02-13 Thread ThierryIT
Hi,

Thx a lot for these information.

I  have installed dnssec-trigger on a newly created VM from a debian template 
as ProxyVM type. This is working, I  have checked for the DNSSEC and all are ok.

In the same way, I do have a VM to browse on internet,  and  I want all DNS 
request forwarded to this ProxyVM  freshly installed  ... How to do  this ??

Thx

Le lundi 13 février 2017 09:40:42 UTC+2, Andrew David Wong a écrit :
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-02-12 23:18, ThierryIT wrote:
> > Hi,
> > 
> > I think that I have missed something concerning Qubes. When I
> > installed, let's say "Unbound" packages, after a reboot of the VM
> > it disappear ... Normal ?
> > 
> > Thx
> > 
> 
> You have to install it in the TemplateVM (or, for more advanced users,
> pick a persistent dir and/or use bind-dirs):
> 
> https://www.qubes-os.org/doc/templates/
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYoWLcAAoJENtN07w5UDAwAoQQAM+eiQ77VRPjYIf/0pKepUh0
> eMpVANLYuKUC1yOnkyQR4p+eZBY1aRxLenC1y5pZXfk0ZFySKATa+lw2gZR0A6dn
> oMzZVtMxqDpVs3SQOImFvGEJCrhmaro1NmyL7+xNTgbEIO7Q35Az+AMLT3nNUa5N
> qclPsdCi48MWki4YhCMOaNLxxeFYlJoN1JMdqVg9wWKfPWWL7t15koO0gB2hWAj0
> izroJeb9jDOW73PCo13zIs3nBrgmUnP/1VTg7emipVTfeQabHbpads61dNNSCgfv
> TEQfXI8+b4TX1ajN5mT90sX5N11OOY0rePRHhhSlRlGMNM+2P6rxjMPvXTrxkF1q
> 6TX12i2f2MxKg0uY7wJj2bCqG20Mo9sIsbxybvtFXKphnHZYOGaRmasdw4QciW/m
> 1Ojy9dFUdLlqRSsbJRsk91CE6MwhmCqGQAsJsFd1WKdY6+EyH1cSuNpr+PEt01xl
> hY91+ljOpI2/wYAQ+cumRV7JAydeCVv59Qs3k5yeFnpeqPMbPe9hKOnTj6eLyDbb
> WCCHJzmJJ0NIqzEvdsaiJnfOy9gTSKVdX4YIOoC5b2wjW4+vqJwqPUssSC511zpa
> OxEmKTSN7raMuuNLG370oplr5pRnrA/iolg/W/tDM2TbyfGQuEOHZXh91C6vyKKv
> mFM7z+UCGxMljbNCEuDN
> =laqs
> -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1f60d7a6-e536-49ce-9c87-85b9913b6834%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Install DNSSEC on ProxyVM type (debian) ?

2017-02-12 Thread ThierryIT
Hi,

I think that I have missed something concerning Qubes.
When I installed, let's say "Unbound" packages, after a reboot of the VM it 
disappear ... Normal ?

Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e04e8da9-5ac4-4f15-aa8c-543db8258506%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation of DNSSEC-Trigger on Qubes ??

2017-01-31 Thread ThierryIT
Nobody ?


Le dimanche 29 janvier 2017 09:10:49 UTC+2, ThierryIT a écrit :
> Hi,
> 
> I do prefer to ask before doing something wrong on  my working Qubes.
> Where to install DNSSEC-Trigger ? Is 'sys-net' the right answer ?
> Do you have  for Qubes env any documentation on how to do it properly ?
> 
> Thx

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0b6c90b-998c-4cf0-9797-2e08d93ca4c1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installation of DNSSEC-Trigger on Qubes ??

2017-01-28 Thread ThierryIT
Hi,

I do prefer to ask before doing something wrong on  my working Qubes.
Where to install DNSSEC-Trigger ? Is 'sys-net' the right answer ?
Do you have  for Qubes env any documentation on how to do it properly ?

Thx 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cca9221e-011e-47b4-ad8f-1255dc8833bf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] mounting external encrypted (LUKS-debian8) hard drive ??

2017-01-28 Thread ThierryIT
Sorry for  all this noise 
I have mounted "xvdi5" with success.
But: unknown filesystem type: LVM2_member

Something to install on this vm  ?

Thx

Le samedi 28 janvier 2017 12:54:07 UTC+2, ThierryIT a écrit :
> > My mistake.
> > I  did it  from  "dom0" 
> > 
> dom0:sdb WD.698G (attached to vm-test as 'xvdi')
> dom0:sdb5 WD690G 
> dom0:sdb1 ...
> dom0:sdb2
> etc 
> 
> If I try to mount xvdi as LUKS: It is not a valid LUKS
> I do think that the right partition  to mount should be "sdb5" ... How to  
> mount  "sdb5" ??
> 
> Thx
> > 
> > Le samedi 28 janvier 2017 12:43:57 UTC+2, ThierryIT a écrit :
> > > qvm-block  command not found ... ??
> > > I am right to do  it  from my vm-test ?
> > > 
> > > Thx
> > > 
> > > Le samedi 28 janvier 2017 12:10:26 UTC+2, Andrew David Wong a écrit :
> > > > -BEGIN PGP SIGNED MESSAGE-
> > > > Hash: SHA512
> > > > 
> > > > On 2017-01-28 01:45, ThierryIT wrote:
> > > > > Hi,
> > > > > 
> > > > > I have installed with success  Qubes 3.2  on my Lenovo W520. I ma
> > > > > bit by bit playing  with it. I would like to have access to my  old
> > > > > encrypted hard drive, still do remember the passphrase :) I have
> > > > > build a new vm, let's call it "vm-test" I  have attached the block
> > > > > device to it, seems to be good  ... But after ? How to mount it ??
> > > > > 
> > > > > Thx
> > > > > 
> > > > 
> > > > It's probably mounted as /dev/xvdi (you can check with qvm-block).
> > > > So, in vm-test, try something like:
> > > > 
> > > > $ sudo cryptsetup open /dev/xvdi hdd
> > > >   
> > > > $ sudo mount /dev/mapper/hdd /mnt/removable
> > > > $ cd /mnt/removable
> > > > $ ls
> > > > 
> > > > - -- 
> > > > Andrew David Wong (Axon)
> > > > Community Manager, Qubes OS
> > > > https://www.qubes-os.org
> > > > -BEGIN PGP SIGNATURE-
> > > > 
> > > > iQIcBAEBCgAGBQJYjG4DAAoJENtN07w5UDAwQO0QAMPg3I4YoMMxMRcJSt6ds8/i
> > > > qdTXOg5YrG9dglctSfK9FWdr066wdar/8k7R9DIyX/ndg8p9sfPXq8Gdlzw0KiEH
> > > > G6kLAXVZN4qQ4fQYnMhZE6AhUlj6ZjsPA6+BUr4NyzoCyd0z0wfhyvm2ulR8VoUA
> > > > /FiZOFYWQ2oFnJed4LUV3KgaT9TOo969zbZ306KsFUV6CqZw38My4B8qfqr0/qC4
> > > > RklCHG/D230AXAq9PtOY1wH/sCbNFR8wqnUoNIIT+qPxWtnXZFtcNZuqmiKiSDAB
> > > > WdlnJEJ0ktDRT99RhrIcnTDLBXel/e0l9Y6YtV+spVPhPdPMRcppeyQzboAtPTfw
> > > > UfA4wri5KuDROgJ5RpopkfyXyEJz7yWg8hQXyfqRKf+IDoIHxEyhYA8v0CDBjACT
> > > > 3zu7SFn21ki9N94SV7wTL0ODQjVTNtrtlHB/jrs2/s0HVacxIxOm9DbuDdCAHNqO
> > > > OAj+NjSNa2jcXlF1/l24hsEAabBVMUrPhtPeaw7WoTxkADv1KM5lNUS4mcYhwsPg
> > > > BfLjtsTcaYKRQaxi26WcAzdem2kUhHG31RzSAEAuHXTC0S+aEJv3UgAf++Xhn/F2
> > > > nBgYV2hz5WlU6u5OdBLQppUXPEuwKhwp7Um5hUKHFN3+eYK9sPWbK2JpYc2i2lSs
> > > > Qc4E/xMl/TLaJd1IHMfX
> > > > =xkVz
> > > > -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/45cd91eb-efbf-4e72-880f-aed04ad9a1d7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] mounting external encrypted (LUKS-debian8) hard drive ??

2017-01-28 Thread ThierryIT


> My mistake.
> I  did it  from  "dom0" 
> 
dom0:sdb WD.698G (attached to vm-test as 'xvdi')
dom0:sdb5 WD690G 
dom0:sdb1 ...
dom0:sdb2
etc 

If I try to mount xvdi as LUKS: It is not a valid LUKS
I do think that the right partition  to mount should be "sdb5" ... How to  
mount  "sdb5" ??

Thx
> 
> Le samedi 28 janvier 2017 12:43:57 UTC+2, ThierryIT a écrit :
> > qvm-block  command not found ... ??
> > I am right to do  it  from my vm-test ?
> > 
> > Thx
> > 
> > Le samedi 28 janvier 2017 12:10:26 UTC+2, Andrew David Wong a écrit :
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA512
> > > 
> > > On 2017-01-28 01:45, ThierryIT wrote:
> > > > Hi,
> > > > 
> > > > I have installed with success  Qubes 3.2  on my Lenovo W520. I ma
> > > > bit by bit playing  with it. I would like to have access to my  old
> > > > encrypted hard drive, still do remember the passphrase :) I have
> > > > build a new vm, let's call it "vm-test" I  have attached the block
> > > > device to it, seems to be good  ... But after ? How to mount it ??
> > > > 
> > > > Thx
> > > > 
> > > 
> > > It's probably mounted as /dev/xvdi (you can check with qvm-block).
> > > So, in vm-test, try something like:
> > > 
> > > $ sudo cryptsetup open /dev/xvdi hdd
> > >   
> > > $ sudo mount /dev/mapper/hdd /mnt/removable
> > > $ cd /mnt/removable
> > > $ ls
> > > 
> > > - -- 
> > > Andrew David Wong (Axon)
> > > Community Manager, Qubes OS
> > > https://www.qubes-os.org
> > > -BEGIN PGP SIGNATURE-
> > > 
> > > iQIcBAEBCgAGBQJYjG4DAAoJENtN07w5UDAwQO0QAMPg3I4YoMMxMRcJSt6ds8/i
> > > qdTXOg5YrG9dglctSfK9FWdr066wdar/8k7R9DIyX/ndg8p9sfPXq8Gdlzw0KiEH
> > > G6kLAXVZN4qQ4fQYnMhZE6AhUlj6ZjsPA6+BUr4NyzoCyd0z0wfhyvm2ulR8VoUA
> > > /FiZOFYWQ2oFnJed4LUV3KgaT9TOo969zbZ306KsFUV6CqZw38My4B8qfqr0/qC4
> > > RklCHG/D230AXAq9PtOY1wH/sCbNFR8wqnUoNIIT+qPxWtnXZFtcNZuqmiKiSDAB
> > > WdlnJEJ0ktDRT99RhrIcnTDLBXel/e0l9Y6YtV+spVPhPdPMRcppeyQzboAtPTfw
> > > UfA4wri5KuDROgJ5RpopkfyXyEJz7yWg8hQXyfqRKf+IDoIHxEyhYA8v0CDBjACT
> > > 3zu7SFn21ki9N94SV7wTL0ODQjVTNtrtlHB/jrs2/s0HVacxIxOm9DbuDdCAHNqO
> > > OAj+NjSNa2jcXlF1/l24hsEAabBVMUrPhtPeaw7WoTxkADv1KM5lNUS4mcYhwsPg
> > > BfLjtsTcaYKRQaxi26WcAzdem2kUhHG31RzSAEAuHXTC0S+aEJv3UgAf++Xhn/F2
> > > nBgYV2hz5WlU6u5OdBLQppUXPEuwKhwp7Um5hUKHFN3+eYK9sPWbK2JpYc2i2lSs
> > > Qc4E/xMl/TLaJd1IHMfX
> > > =xkVz
> > > -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8935e96-ac1a-4f54-a080-5c82118440a0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] mounting external encrypted (LUKS-debian8) hard drive ??

2017-01-28 Thread ThierryIT

My mistake.
I  did it  from  "dom0" 

dom0:sdb WD.698G (attached to vm-test as 'xvdi')

Le samedi 28 janvier 2017 12:43:57 UTC+2, ThierryIT a écrit :
> qvm-block  command not found ... ??
> I am right to do  it  from my vm-test ?
> 
> Thx
> 
> Le samedi 28 janvier 2017 12:10:26 UTC+2, Andrew David Wong a écrit :
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2017-01-28 01:45, ThierryIT wrote:
> > > Hi,
> > > 
> > > I have installed with success  Qubes 3.2  on my Lenovo W520. I ma
> > > bit by bit playing  with it. I would like to have access to my  old
> > > encrypted hard drive, still do remember the passphrase :) I have
> > > build a new vm, let's call it "vm-test" I  have attached the block
> > > device to it, seems to be good  ... But after ? How to mount it ??
> > > 
> > > Thx
> > > 
> > 
> > It's probably mounted as /dev/xvdi (you can check with qvm-block).
> > So, in vm-test, try something like:
> > 
> > $ sudo cryptsetup open /dev/xvdi hdd
> >   
> > $ sudo mount /dev/mapper/hdd /mnt/removable
> > $ cd /mnt/removable
> > $ ls
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJYjG4DAAoJENtN07w5UDAwQO0QAMPg3I4YoMMxMRcJSt6ds8/i
> > qdTXOg5YrG9dglctSfK9FWdr066wdar/8k7R9DIyX/ndg8p9sfPXq8Gdlzw0KiEH
> > G6kLAXVZN4qQ4fQYnMhZE6AhUlj6ZjsPA6+BUr4NyzoCyd0z0wfhyvm2ulR8VoUA
> > /FiZOFYWQ2oFnJed4LUV3KgaT9TOo969zbZ306KsFUV6CqZw38My4B8qfqr0/qC4
> > RklCHG/D230AXAq9PtOY1wH/sCbNFR8wqnUoNIIT+qPxWtnXZFtcNZuqmiKiSDAB
> > WdlnJEJ0ktDRT99RhrIcnTDLBXel/e0l9Y6YtV+spVPhPdPMRcppeyQzboAtPTfw
> > UfA4wri5KuDROgJ5RpopkfyXyEJz7yWg8hQXyfqRKf+IDoIHxEyhYA8v0CDBjACT
> > 3zu7SFn21ki9N94SV7wTL0ODQjVTNtrtlHB/jrs2/s0HVacxIxOm9DbuDdCAHNqO
> > OAj+NjSNa2jcXlF1/l24hsEAabBVMUrPhtPeaw7WoTxkADv1KM5lNUS4mcYhwsPg
> > BfLjtsTcaYKRQaxi26WcAzdem2kUhHG31RzSAEAuHXTC0S+aEJv3UgAf++Xhn/F2
> > nBgYV2hz5WlU6u5OdBLQppUXPEuwKhwp7Um5hUKHFN3+eYK9sPWbK2JpYc2i2lSs
> > Qc4E/xMl/TLaJd1IHMfX
> > =xkVz
> > -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/df0145b2-5fbc-4ad9-b77e-67722b71dd8b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] mounting external encrypted (LUKS-debian8) hard drive ??

2017-01-28 Thread ThierryIT
qvm-block  command not found ... ??
I am right to do  it  from my vm-test ?

Thx

Le samedi 28 janvier 2017 12:10:26 UTC+2, Andrew David Wong a écrit :
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-01-28 01:45, ThierryIT wrote:
> > Hi,
> > 
> > I have installed with success  Qubes 3.2  on my Lenovo W520. I ma
> > bit by bit playing  with it. I would like to have access to my  old
> > encrypted hard drive, still do remember the passphrase :) I have
> > build a new vm, let's call it "vm-test" I  have attached the block
> > device to it, seems to be good  ... But after ? How to mount it ??
> > 
> > Thx
> > 
> 
> It's probably mounted as /dev/xvdi (you can check with qvm-block).
> So, in vm-test, try something like:
> 
> $ sudo cryptsetup open /dev/xvdi hdd
>   
> $ sudo mount /dev/mapper/hdd /mnt/removable
> $ cd /mnt/removable
> $ ls
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYjG4DAAoJENtN07w5UDAwQO0QAMPg3I4YoMMxMRcJSt6ds8/i
> qdTXOg5YrG9dglctSfK9FWdr066wdar/8k7R9DIyX/ndg8p9sfPXq8Gdlzw0KiEH
> G6kLAXVZN4qQ4fQYnMhZE6AhUlj6ZjsPA6+BUr4NyzoCyd0z0wfhyvm2ulR8VoUA
> /FiZOFYWQ2oFnJed4LUV3KgaT9TOo969zbZ306KsFUV6CqZw38My4B8qfqr0/qC4
> RklCHG/D230AXAq9PtOY1wH/sCbNFR8wqnUoNIIT+qPxWtnXZFtcNZuqmiKiSDAB
> WdlnJEJ0ktDRT99RhrIcnTDLBXel/e0l9Y6YtV+spVPhPdPMRcppeyQzboAtPTfw
> UfA4wri5KuDROgJ5RpopkfyXyEJz7yWg8hQXyfqRKf+IDoIHxEyhYA8v0CDBjACT
> 3zu7SFn21ki9N94SV7wTL0ODQjVTNtrtlHB/jrs2/s0HVacxIxOm9DbuDdCAHNqO
> OAj+NjSNa2jcXlF1/l24hsEAabBVMUrPhtPeaw7WoTxkADv1KM5lNUS4mcYhwsPg
> BfLjtsTcaYKRQaxi26WcAzdem2kUhHG31RzSAEAuHXTC0S+aEJv3UgAf++Xhn/F2
> nBgYV2hz5WlU6u5OdBLQppUXPEuwKhwp7Um5hUKHFN3+eYK9sPWbK2JpYc2i2lSs
> Qc4E/xMl/TLaJd1IHMfX
> =xkVz
> -END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0040e4c8-c292-4958-b923-95553997a136%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] mounting external encrypted (LUKS-debian8) hard drive ??

2017-01-28 Thread ThierryIT
Hi,

I have installed with success  Qubes 3.2  on my Lenovo W520.
I ma bit by bit playing  with it.
I would like to have access to my  old encrypted hard drive, still do remember 
the passphrase :)
I have build a new vm, let's call it "vm-test" I  have attached the block 
device to it, seems to be good  ... But after ? How to mount it ??

Thx 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b7cda34-2325-4df6-89b4-665ea0a8f408%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.