[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread niepowiem48
On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > Fresh install of Qubes R4.0 and there is no internet connection in appVM - 
> > firefox just not load websites.
> > 
> > Internet connection actually is ok as I'm able to make update for template 
> > VM.
> > 
> > What can be reason of this not working internet in app VM and how resolve 
> > this?
> 
> Is this still a problem?  Did you give your AppVM access to the net VM (set 
> "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> for the AppVM)?

Yes, problem still exist.

There was sys-firewall connected to appVM as well sys-net and no connection.
I have also tried changing template from fedora to debian -internet not working.
I have also install chromium browser and connection not working.

Very frustrating situation...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17e05eba-8641-423c-8536-7e0af93f63c9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Desperately want Qubes, but can't install on Asus Sabertooth x79

2018-05-12 Thread fepitre
Le vendredi 11 mai 2018 19:30:35 UTC+2, Mindus Amitiel Debsin a écrit :
> I was reading through this thread:
> https://groups.google.com/d/msg/qubes-users/nphUyv7Msow/Vs2TX8tjAwAJ
> 
> and I noticed some similarities, but also some differences between our two 
> situations.
> 
> My system:
> Asus Sabertooth x79 with Intel i7 3930k
> 32GB of quad-channel DDR3 RAM
> 
> I have tried two different installation methods:
> by DVD: Loads fine and then gets to this point:

Just to be sure, is it after or before the installation process?

> See two attached jpgs, IMG_0882b1000.jpg and IMG_0883b1000.jpg
> by USB-boot (non-UEFI): Loads to the Q screen with a white progress-bar on 
> the bottom and then freezes forever. This is before any installation or 
> options or disk-choosing.
> by USB-boot (UEFI): Just crashes and restarts as soon as it starts loading 
> off of the USB-drive.
> 
> I have tried every major fix in the BIOS and still the problems persist.
> My settings:
> Intel VT-X: enabled
> Intel VT-D: enabled
> Sata config: Raid mode
> Compatibility Support Module: enabled
> Boot Device Control: UEFI and Legacy
> Secure Boot: disabled, "Other OS", Platform Key State: Unloaded
> 
> Boot order: every combination.
> 
> I'm so frustrated with this. Have been trying to get it installed for a few 
> weeks now, on and off. But I imagine that this community knows everything 
> about the installation process, so I hope you can help me. If there's 
> something that I missed, or any other information you'd like, please ask away!
> I think that privacy and security are really important and I'd like very much 
> to use Qubes, but I simply cannot find a way to get it installed.
> 
> Thanks for reading,
> ~Debsin

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b577625-2115-4263-a8ed-ccef3a76e146%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] U2F on Gmail not working (using Chrome on Personal AppVM)

2018-05-12 Thread qubesuzer
Hello there, I was wondering if there is a workaround to make this work.
I have a Yubikey with U2F, which has the dual purpose of being a normal Yubikey 
as well as being able to do U2F when the webbrowser requests it.

I am on the latest stable Qubes 4.0.
This is so far what I have been doing:

1) I go to gmail.com and enter my user and password.
2) I plug the yubikey to the laptop, sys-usb recognizes it
3) I "attach" the usb to "personal" from the sys-usb

And nothing happens, the yubikey is not blinking, the light stays steadily on.
It doesn't react in any way by touching on it, it neither generating yubikeys 
nor the u2f.

Does anyone have a solution to this?
Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e0688414-c6fe-419f-8a8d-b4ac835305d9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Desperately want Qubes, but can't install on Asus Sabertooth x79

2018-05-12 Thread pixel fairy
Another thing you could try, install it on a working system. then transfer the 
hard drive. ive had to do this for a couple laptops with older versions.

or, install linux on a different drive, maybe also hanging off usb, run the 
qubes installer in kvm from there. i havent tried getting qubes working on kvm, 
but others in the list have mentioned getting it to work. qemu/kvm can also be 
a fickle beast, so this would be a last resort.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/497be5ff-9a24-4a84-8e5c-23f250e8da96%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Why so many outgoing IP?

2018-05-12 Thread mk2mix via qubes-users
Hello everyone
I am a beginner (start watching linux only a few months ago, so really beginner 
:)
I do not understand why so many IP come out after a clean installation without 
browser ...
of course there are IPs for NTP, but not only ...
my question, how to stop all IP coming out?
I try with the hosts file, or iptables, it fades at each restart.
I wish to have total control of the machine (everyone must want the same thing 
here I think), and after a 2 weeks, I have never arrived ...
I even thought about trying to put pfsense on it, but being a beginner and 
having read what I read, it's way above my possibilities.
if any one to solutions to stop all these outgoing IP and to easily edit 
iptables and hosts files (in VMs and even in dom0)?
I am on the R3,2

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63aa1a15-c094-4700-8a41-360b86de1e6c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] opening links in another VM opens two browsers

2018-05-12 Thread awokd
On Fri, May 11, 2018 2:56 am, qubenix wrote:
> Hey everyone! Hope you are all doing well.
>
> I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/
> so links clicked in one debian-9 AppVM will open in separate debian-9
> AppVM. What actually happens is interesting.
>
> If I have firefox running in the destination VM already, everything
> works as expected. The link opens a new tab in the proper AppVM.
> However, if firefox is not currently running, a clicked link will open
> the link in a browser in both VMs.

Tried to recreate but couldn't. It might be a function of the application
you are using. What happens if you click links in a different app?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/372f9b4074d21d1a67c69afaed620111%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Intel ME Backdoor, called Odin's Eye

2018-05-12 Thread charly LEMMINKÄINEN
Anyway people, even if he was saying the truth. Then why is he silent then ? 
Why doesn't he have joined purism or coreboot or qubes or others to neut the ME?

The difference between reality and what can be real is really thin and it's 
often easier to believe what could be then what really is.

First you need to indentify the goal and here it is not clear. Do you know why ?
Because it would mean that Chinese could get access to it with enough 
intelligence. Russian could get access to it. And what you are calling Odin so 
the NSA or any other entity, don't want all that because it would mean that 
even them are at risk ;) which is clearly not the goal.
You don't want to implement something that you can not control.
So it's easier to find an exploit, there are enough of them. Or to create one 
within software or OS where you can patch it easily than in hardware.

The real threat from all time, is not the intelligence services, it's the 
companies. Anything else doesn't matter.

Obtenez Outlook pour iOS

From: qubes-users@googlegroups.com  on behalf of 
awokd 
Sent: Saturday, May 12, 2018 4:38:08 PM
To: qubes-users
Subject: Re: [qubes-users] Intel ME Backdoor, called Odin's Eye

On Thu, May 10, 2018 12:37 am, dangmad...@gmail.com wrote:
> On Wednesday, January 10, 2018 at 2:02:36 PM UTC-8, awokd wrote:

>> I don't trust ME either and run me_cleaner but that link is just some
>> unsubstantiated text. If he'd really been working at Intel 15 years he
>> should have been able to get copies of internal documentation at least.
>> A
>> blacked out W-2 form doesn't cut it either.
>
> Do you find that sticking your head in the sand to be a productive form
> of security?

How does requiring proof instead of an anecdote equate to sticking one's
head in the sand? Do you believe all scientists are sticking their head in
the sand when they do research?

> I'm sorry that this information upset you so much, but by denying it
> you're only putting others in harms way.

What gave you the impression I was upset?

> Maybe you'd like for others to have security vulnerabilities?

No, that's why I encourage them to use Qubes. I think you must be new
here. Check out some of my other posts.

> Perhaps you are exposing your agenda too much?

Re-read the first sentence of what I wrote above, perhaps more slowly this
time, then explain what agenda it is you think I have.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cca9a5a8bfd3e53a8a53f1e560dfda1%40elude.in.
For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AM5P190MB03374A2B4B81C19532CBE1EAAB9E0%40AM5P190MB0337.EURP190.PROD.OUTLOOK.COM.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Desperately want Qubes, but can't install on Asus Sabertooth x79

2018-05-12 Thread Mindus Amitiel Debsin
On Friday, May 11, 2018 at 5:09:01 PM UTC-7, john wrote:
> On 05/11/18 07:30, Mindus Amitiel Debsin wrote:
> > I was reading through this thread:
> > https://groups.google.com/d/msg/qubes-users/nphUyv7Msow/Vs2TX8tjAwAJ
> > 
> > and I noticed some similarities, but also some differences between our two 
> > situations.
> > 
> > My system:
> > Asus Sabertooth x79 with Intel i7 3930k
> > 32GB of quad-channel DDR3 RAM
> > 
> > I have tried two different installation methods:
> > by DVD: Loads fine and then gets to this point:
> > See two attached jpgs, IMG_0882b1000.jpg and IMG_0883b1000.jpg
> > by USB-boot (non-UEFI): Loads to the Q screen with a white progress-bar on 
> > the bottom and then freezes forever. This is before any installation or 
> > options or disk-choosing.
> > by USB-boot (UEFI): Just crashes and restarts as soon as it starts loading 
> > off of the USB-drive.
> > 
> > I have tried every major fix in the BIOS and still the problems persist.
> > My settings:
> > Intel VT-X: enabled
> > Intel VT-D: enabled
> > Sata config: Raid mode
> > Compatibility Support Module: enabled
> > Boot Device Control: UEFI and Legacy
> > Secure Boot: disabled, "Other OS", Platform Key State: Unloaded
> > 
> > Boot order: every combination.
> > 
> > I'm so frustrated with this. Have been trying to get it installed for a few 
> > weeks now, on and off. But I imagine that this community knows everything 
> > about the installation process, so I hope you can help me. If there's 
> > something that I missed, or any other information you'd like, please ask 
> > away!
> > I think that privacy and security are really important and I'd like very 
> > much to use Qubes, but I simply cannot find a way to get it installed.
> > 
> > Thanks for reading,
> > ~Debsin
> > 
> 
> So, if it were me, I would go back and make sure I created a USB 
> installation media correctly,   like maybe if  of  method ..
> 
> stick with legacy mode,  enable any VT  that you have  ; secure boot 
> off ; compatibility  enabled,  Sata I have no idea,   if you have 
> any  onboard graphics  choice,  make sure  discrete graphics  is off 
> 
> I did see one of your type on the HCL  for version 3.1,  maybe you'd be 
> happy with 3.2  or you don't say what version your installing ...
> 
> sadly your attachments probably may get ignored, I for one, can't get 
> them to open  in Thunderbirds  'open in DVM'  and I don't really want to 
> download them myself
> 
> I think your system is too old for UEFI install,  though there is  the 
> EFI troubleshooting  guide,   which  part of the qubes  docs   have you 
> read or  following ?
> 
> 
> IF you must have qubes now,  try  3.2  its supported for another 9 
> months, and then you'll  have  the  qubes  way  more fluent  I suppose 
>    depending on your   threat profile or whatever .

Thanks John. What you suggested appears to be the key.
I redownloaded Qubes 4.0 via torrent, then loaded up a Fedora liveCD, then used 
the DD command to dump the iso to 2 different USB drives. This time, I got all 
the way to the installation screen which allows me to choose which drive to 
install Qubes on.

I still have to clone my current boot drive off to a 2nd hard drive before I'm 
ready to install Qubes as my primary OS, but I will clone it tonight and 
install Qubes tomorrow! I'm really excited now.
I'll let you know how it goes.

And @fepitre, everything I said is before the installation process.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/26a5b41c-2546-48d1-aede-18c0449a64cb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Why so many outgoing IP?

2018-05-12 Thread mk2mix via qubes-users
that's what I see coming out of the qubes >
139.59.199.215
slardar.parseq.co.uk
ns1.luns.net.uk
timekeeper.webwiz.net
mail1.ugh.no
pob01.aplu.fr
213.251.53.217
server.spnr.de
nrp2.wirehive.net
2b.ncomputers.org
nice.stuff.is
engelbert.waffle.sexy
5751b502.skybroadband.com
ntp2.wirehive.net
formularfetischisten.de
85.199.214.102
195.219.205.9
213.251.52.107
head1.mirror.cath.com
ntp1.vps.net
188-39-213-7.static.enta.net
time.videxio.net
77.68.79.90
85.199.214.101
hemel-hempstead.dan.me.uk
time.netweaver.net
ntp.teaparty.net
electra.pinklemon.net
121.35.213.162.lcy-02.canonistack.canonical.com
ams.aput.net
time.shf.uk.as44574.net

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/953d3646-32d0-4c1b-94c1-d4536df0a069%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] sys-usb freezes after suspend

2018-05-12 Thread awokd
On Fri, May 11, 2018 7:12 pm, maur...@disroot.org wrote:
> Hi folks!
>
> Whenever my laptop resumes after have being suspended, the sys-usb is
> stalled and all USB devices attached fail to work. They are all
> disconnected.
> Whenever that happens the only way to have the sys-usb working again is to
> kill it.
> Strangely this only affects the sys-usb and not the sys-net, which is
> working fine after resume.
> The issue that describes this problem -
> https://github.com/QubesOS/qubes-issues/issues/3142
> (https://github.com/QubesOS/qubes-issues/issues/3142) - is closed but this
> problem persists.
>
> Does anyone knows how this can be solved?

Try following the procedure here for your USB controller driver:
https://www.qubes-os.org/doc/wireless-troubleshooting/


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4afc06ecf8dc65b81128a9e4dd869f72%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Intel ME Backdoor, called Odin's Eye

2018-05-12 Thread awokd
On Thu, May 10, 2018 12:37 am, dangmad...@gmail.com wrote:
> On Wednesday, January 10, 2018 at 2:02:36 PM UTC-8, awokd wrote:

>> I don't trust ME either and run me_cleaner but that link is just some
>> unsubstantiated text. If he'd really been working at Intel 15 years he
>> should have been able to get copies of internal documentation at least.
>> A
>> blacked out W-2 form doesn't cut it either.
>
> Do you find that sticking your head in the sand to be a productive form
> of security?

How does requiring proof instead of an anecdote equate to sticking one's
head in the sand? Do you believe all scientists are sticking their head in
the sand when they do research?

> I'm sorry that this information upset you so much, but by denying it
> you're only putting others in harms way.

What gave you the impression I was upset?

> Maybe you'd like for others to have security vulnerabilities?

No, that's why I encourage them to use Qubes. I think you must be new
here. Check out some of my other posts.

> Perhaps you are exposing your agenda too much?

Re-read the first sentence of what I wrote above, perhaps more slowly this
time, then explain what agenda it is you think I have.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cca9a5a8bfd3e53a8a53f1e560dfda1%40elude.in.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Why so many outgoing IP?

2018-05-12 Thread mk2mix via qubes-users
@aworkd
thank you for your answer, always fast (I am sometimes connected with 
caropelin, for memory I had recovered a G505s that I sent back, which did not 
prevent me to order the hardware for coreboot).
I already have all the appVmM on none (for those without networks).
I will try to pass the filtration by the firewall (instead of iptables).
when you say minimal, it is with the minimum of applications? or something else 
?
it is not possible to block by "hosts" or iptables?
I saw that some used scripts, but I did not manage to have a (complex) result.
I already use scripts (VisualBasic simple scripts) under windows
There is also a lot of d IP fedora, but I also wish to control this, this 
should be the case for everyone I think ...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e5acf7a-39b0-42ff-80f9-7fb33d67960c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Why so many outgoing IP?

2018-05-12 Thread mk2mix via qubes-users
@vic viq
thank you for the intervention.
no, no sys-whonix. I have limited all that I can for isolated causes.
I realize that qubes is not the ideal system for the beginner, it's even the 
opposite, but I really want to start because I am very concerned about security.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1c16a673-bc58-4f81-8e95-214045045fc7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

Open a terminal in your sys-net VM and type "ping .google.com" (without 
quotes). If you get no response, you need to figure out why you have no network 
connectivity in that VM. (It should say something like "64 bytes from  
time=18.5ms" or something like that.) Let me know if you have network access 
there. I'm hitting the road for a little while. I'll respond as soon as I can...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8294ac3f-7284-4a81-80a9-87091c2fd93a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

And, of course, I meant "www.google.com". Try that. If you don't get a 
response, let me know how you're getting your Internet (Wireless or Ethernet) 
and the name and model of the network card/controller

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dea20035-28d1-4aed-9709-9c441d41de6c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 4 monitors, 3 output types, 2 graphics chips and not getting to show up on all 4 monitors

2018-05-12 Thread awokd
On Sat, May 12, 2018 4:10 am, Stumpy wrote:
> I have finally gotten around to re-tackling my
> multi-monitor/multi-graphics chip issue.
> I have decided to try booting a few different live distributions to see
> what happened, here is what I have in terms of hardware:
> Four monitors, 2 HPs 2 Dells. HPs are in landscape position, Dells are
> in Portrait position
> The monitors accept VGA, HDMI, and DP
> One chipset is on a graphics card, and is an AMD Radeon HD 6570 1GB DDR3
> PCIe x16 - 1 DVI and 2 DP out ports (I think it came out around
> 2013ish?)
> The other is an integrated intel chipset - 1 HDMI and 1 DVI out ports

Try to narrow down the problem. It might be hardware, like your graphics
chips might not have enough memory to drive all the monitors.
- What happens if you only use 2 monitors on a single adapter? Try both
adapters alone.
- DP monitor by itself?
- Windows 7?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c84979f0b2f62131f57ba40628c57ab1%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copying Files between AppVMs using Dom0

2018-05-12 Thread awokd
>>> On 05/07/2018 04:00 PM, cr33dc0d3r wrote:
>>>
 Hey All,


 i know about the method to copy a file between Dom0 and DomU's and
 also about the way how to directly copy a file from AppVM to AppVM
 with qvm-copy-to-vm.

 My Question is:
 Is there a way to execute a command on Dom0 that is like: copy
 [source-vm][path] [dest-vm][path] ?

You might already know this too, but the preferred method for Qubes would
be to use qvm-copy-to-vm so dom0 doesn't get involved in touching the
AppVM's data. You could still start it from dom0 with something like
"qvm-run [source-vm] qvm-copy-to-vm [dest-vm][path]".



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd914fc870b2a9e494b445da8502c861%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Why so many outgoing IP?

2018-05-12 Thread viq
On 18-05-12 03:09:34, mk2mix via qubes-users wrote:
> Hello everyone
> I am a beginner (start watching linux only a few months ago, so really 
> beginner :)
> I do not understand why so many IP come out after a clean installation 
> without browser ...
> of course there are IPs for NTP, but not only ...
> my question, how to stop all IP coming out?
> I try with the hosts file, or iptables, it fades at each restart.
> I wish to have total control of the machine (everyone must want the same 
> thing here I think), and after a 2 weeks, I have never arrived ...
> I even thought about trying to put pfsense on it, but being a beginner and 
> having read what I read, it's way above my possibilities.
> if any one to solutions to stop all these outgoing IP and to easily edit 
> iptables and hosts files (in VMs and even in dom0)?
> I am on the R3,2

Do you have sys-whonix running? You could be seeing tor traffic.
Also, if you want to understand what's going under the hood, qubes may
not be the best starting point. If your goal is to understand why things
are happening and how to control them, I think I would suggest spending
a few months with plain fedora, or possibly even something like
archlinux or gentoo or slackware, where if you want something to happen
you have to do it yourself.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180512141840.d2u4ou3c2owz74zl%40hirauchi.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Why so many outgoing IP?

2018-05-12 Thread awokd
On Sat, May 12, 2018 10:09 am, mk2mix via qubes-users wrote:
> Hello everyone
> I am a beginner (start watching linux only a few months ago, so really
> beginner :)
> I do not understand why so many IP come out after a clean installation
> without browser ...
> of course there are IPs for NTP, but not only ...
> my question, how to stop all IP coming out?
> I try with the hosts file, or iptables, it fades at each restart.
> I wish to have total control of the machine (everyone must want the same
> thing here I think), and after a 2 weeks, I have never arrived ...
> I even thought about trying to put pfsense on it, but being a beginner and
> having read what I read, it's way above my possibilities.
> if any one to solutions to stop all these outgoing IP and to easily edit
> iptables and hosts files (in VMs and even in dom0)?
> I am on the R3,2

You are probably seeing Qubes checking for OS updates, and GNOME itself in
each AppVM can be pretty chatty. Dom0 does not have any network
connection, so nothing you change there will affect the traffic. Try this
for every AppVM you are using:

- go to VM settings, Basic tab, set Networking to (none) if that AppVM
does not need it
- for ones that need networking, go to VM settings, Firewall tab and
create rules there to restrict traffic
- change to the fedora-minimal template for your sys-* VMs

You will still see traffic for OS update checks and NTP, but the rest
should be minimized.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/093c599ca1de784fc6ee36308445f395%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Cannot Update TemplateVMs

2018-05-12 Thread awokd
On Thu, May 10, 2018 12:49 am, dangmad...@gmail.com wrote:

> Ah, this is a result of changing the Template for 'sys-whonix' from
> whonix-gw-13 to whonix-gw-14
>
>
> Why is this a problem?
>
>
>
> I would like to use Whonix 14 as my update proxy.
>

Try the procedure here:
https://github.com/Qubes-Community/Contents/blob/master/docs/misc/iaq.md#manually-install-whonix-14-templates


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d081f455e00eb6f5962be7b96e71248%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cannot update dom0, fedora-26 botched

2018-05-12 Thread awokd
On Tue, May 8, 2018 3:04 am, b...@disroot.org wrote:
> This all happened after a fresh install of RC4 (4.0 stable installer will
> not boot on my hardware) where no Fedora-based VMs or fedora-26 itself
> would launch anything. All qvm-run's just hanged, and logs only report
> after killing a VM: ``libvchan_is_eof
> Icon size: 128x128
> domain dead Failed to connect to gui-agent``
>
>
> I tried reinstalling the template and here we are. Cannot update with any
> repository enabled, disabled. I have changed all mirrorlists from https
> to http and back.

Try running "qubes-hcl-report" and look for the 5 lines at the end about
HVM, IOMMU, etc. Does "qvm-ls" show any running VMs? Can you start a
console session in any of them? Debian template based AppVMs work better?
If so, try changing your UpdateVM to a Debian based one then updating all
your templates and dom0.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4e32d4ae6edf7c4c9170c72fbcd0528%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] USB auto remove help

2018-05-12 Thread awokd
On Thu, May 10, 2018 12:14 am, thefla...@gmail.com wrote:
> I have a usb mic that I always leave connected to one Qube.  I often
> forget to remove it from that Qube before shutting the Qube down.  When I
> do this, I can no longer add it to another Qube or that same Qube after I
> bring it back up.
>
> Is there a way to disconnect this usb device on shutdown automatically?
> Or, for that usb device to be usable when I forget to disconnect it
> again?

You might be running into this:
https://www.qubes-os.org/doc/usb/#what-if-i-removed-the-device-before-detaching-it-from-the-vm-r32


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6fb41670f654e574895aeed9d9a5087c%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Why so many outgoing IP?

2018-05-12 Thread awokd
On Sat, May 12, 2018 3:31 pm, mk2mix via qubes-users wrote:
> @aworkd
> thank you for your answer, always fast (I am sometimes connected with
> caropelin, for memory I had recovered a G505s that I sent back, which did
> not prevent me to order the hardware for coreboot).
> I already have all the appVmM on none (for those without networks).
> I will try to pass the filtration by the firewall (instead of iptables).
> when you say minimal, it is with the minimum of applications? or something
> else ?

I mean a template like
https://www.qubes-os.org/doc/templates/fedora-minimal/.
I saw in your other post a lot of it looked like NTP queries, like you
said. For troubleshooting, you might want to try manually setting three or
four NTP servers in sys-net instead of automatic selection. I think there
is also a way to temporarily disable checking for updates but can't find
it right now. Should cut down on some noise, but reverse the changes when
done.

> it is not possible to block by "hosts" or iptables?
> I saw that some used scripts, but I did not manage to have a (complex)
> result.

You should be able to customize iptables/nft further in sys-firewall;
check out https://www.qubes-os.org/doc/firewall/. I haven't done much with
that, though.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b74d8162abb7e187df1d74e61f03410d%40elude.in.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] No Qubes 4 without VT-x?

2018-05-12 Thread taii...@gmx.com
On 05/07/2018 02:56 PM, evo wrote:

> Hello!
>
> Do i understand it correctly, that there is no sense to try Qubes 4.0
> without having VT-x?
>
> On my Thinkpad W530 I just have VT-d but no VT-x.
>
> There will be Qubes 3.2.1 for just VT-d machines, isn't it?
Your laptop has both you need to either enable it in the CMOS or install
coreboot - I highly recommend installing coreboot for a variety of
reasons (let me know if you want help)

I also recommend installing the superior *20 series keyboard/palm-rest
so that you have a real keyboard not a crappy island keyboard.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a74b552f-015c-597d-bf11-b7836797ae3c%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


0xDF372A17.asc
Description: application/pgp-keys


Re: [qubes-users] 2 Xeon Gold vs i9 for Qubes-OS?

2018-05-12 Thread taii...@gmx.com
On 05/11/2018 04:30 AM, olegden...@gmail.com wrote:

> What will be better for Qubes-OS - i9 or Xeon Gold? Does it support two cpu 
> based system? Thanks.
>
I wouldn't waste your money on new spyware filled intel junk.

I suggest instead purchasing a KGPE-D16 or KCMA-D8 board
With the D16 you have max 32 cores 192GB RAM, D8 max 16 cores 128GB RAM.
(note the D16 comes with the module you need for OpenBMC the D8 doesn't)
On both there is no ME/PSP, they are owner controlled and support
libreboot plus OpenBMC and there are a variety of ports including two
usb controllers (second via board header) and multiple PCI-e slots in
case for instance you want to play video games in a VM like me.
AMD g34/c32 platforms are the last and best owner controlled x86_64
devices, the future of high performance owner controlled computing is
POWER but unfortunately qubes needs xen and xen doesn't support POWER
(although if you have non-qubes virtualization needs the TALOS 2 is a
and very fast freedom choice)
Qubes can use as many CPU's as you have - but I imagine 16 cores will be
more than enough so I would start with only one CPU and 32GB RAM.

In the end you will save a lot of money and have much better security by
doing this vs buying an overpriced xeon, you will also have enough cash
left over to buy the G505S running the FT3 platform which is the last
and best x86_64 laptop platform without ME/PSP, it is owner controlled,
has open cpu/ram init and people are working on an open source EC
replacement.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/52725919-e3d8-65bb-a8f7-546b34ccbb3d%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


0xDF372A17.asc
Description: application/pgp-keys


[qubes-users] Re: Lenovo G505S Coreboot

2018-05-12 Thread matthewwbradley6
On Wednesday, January 18, 2017 at 6:34:29 AM UTC-5, Asterysk wrote:
> >First of all we need to make sure that you are prepared for flashing. 
> >coreboot image cannot be >flashed internally on Lenovo G505S through a 
> >purely software way (I tried with >internal:laptop=force_I_want_a_brick 
> >flashrom option, it always fails, cant do that!) . 
> 
> >To install a coreboot, you will have to: 
> >1) get some hardware tools like screwdrivers, CH341A USB flasher and SOIC-8 
> >test clip 
> >2) tear down your laptop to access the motherboard 
> >3) take SOIC-8 test clip and attach its wires to USB flasher that is 
> >supported by flashrom (such as CH341A), then attach SOIC-8 test clip to BIOS 
> >chip with 8 legs, then plug USB flasher device to another computer with 
> >Linux (while it is still connected to G505S motherboard through wires and 
> >SOIC-8 test clip) 
> >4) using flashrom, make a dump of your existing BIOS just in case, then 
> >flash a new coreboot image with verification 5) assemble your laptop in 
> >reverse order . That is exactly how computer repair shops are repairing 
> >laptops with failed BIOS updates, and are earning pretty good money on it 
> 
> >Here is a hardware flashing manual - 
> >http://dangerousprototypes.com/docs/Flashing_a_BIOS_chip_with_Bus_Pirate . 
> 
> Everything is described in a great detail here: complete list of tools and 
> where you could buy them (need to spend from $0 to $30, depends on what tools 
> you already have), how to connect these tools properly, a lot of helpful 
> photos - for example, photo of G505S motherboard, so you could easily see 
> where is that BIOS chip with 8 legs is located, dont need to spend time 
> reading the motherboard chip labels. While this instruction mentions Bus 
> Pirate USB flasher, the instructions for CH341A USB flasher are exactly the 
> same - only a flashrom command is different (could see this command at the 
> end of page) 
> 
> My current coreboot build is from December 2016 - it is not the latest, but 
> still pretty recent, so I am not going to rebuild it from scratch yet. Still, 
> there is one component inside BIOS image that could be easily updated: 
> KolibriOS, tiny wonderful open source operating system that fits on a floppy. 
> It could be launched from SeaBIOS Boot Menu, and works as a RamDisk (no 
> changes to your computer saved). After you tell that you are prepared for 
> hardware BIOS flashing, I will take KolibriOS latest daily build, add it to 
> ROM and send a complete coreboot BIOS ROM to you 
> 
> Please reply if you have any questions 
> 
> Best regards, 
> qmastery
> ---
> 
> Is it possible to also reflash the USB firmware at the same time in case it 
> has been tampered by Bad USB ?

Does anybody know where I can find an up-to-date copy of the microcode for this 
laptop? The latest microcode images I've been able to find *anywhere* are
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tree/amd-ucode
which according to the logs date back to 2016 and therefore can't possibly 
contain spectre mitigations for an A10-5750M CPU.

Supposedly AMD has/will release mitigating microcode for family 15h but I don't 
think AMD has an equivalent to: 
https://downloadcenter.intel.com/download/27776/Linux-Processor-Microcode-Data-File
 

Does AMD even announce when they release microcode for a particular family/CPU? 
Ideally they'd have a list of CPU->microcode.tar.gz but one can only dream I 
guess...

The next step of course will be figuring out how to build coreboot to load the 
microcode image, but, one step at a time.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4b6c8e67-8188-4212-9998-8e1d1e9e2e1e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-05-12 Thread dangmadzyu
On Saturday, May 12, 2018 at 11:10:27 AM UTC-7, get wrote:
> среда, 18 апреля 2018 г., 0:13:29 UTC+3 пользователь Chris Laprise написал:
> > Hello fellow Qubes users:
> > 
> > Per issue 3503 the Qubes project would like to incorporate VPN features 
> > from Qubes-vpn-support -- which a number of you are already using -- 
> > into the Qubes 4.1 release.
> > 
> > I've set up a new project "qubes-tunnel" to act as a staging area for 
> > testing and eventual forking into Qubes. It is nearly the same as 
> > Qubes-vpn-support except some names & paths are different... and install 
> > to template is required for obvious reasons :) .
> > 
> > 
> > Project Link... https://github.com/tasket/qubes-tunnel
> > 
> > 
> > Everyone with an available VPN service is welcome to try this out and 
> > report here on your results!
> > 
> > -
> > 
> > PS - Some of you will wonder if installing qubes-tunnel into an existing 
> > template already used for Qubes-vpn-support will cause a conflict; They 
> > will not conflict as long as the two services aren't enabled for the 
> > same ProxyVM(s).
> > 
> > -- 
> > 
> > Chris Laprise, tas...@posteo.net
> > https://github.com/tasket
> > https://twitter.com/ttaskett
> > PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> 
> Hi. script not working more on debian-9/fedora-26. Please fix it.
> 
> Tested vpn's : mullvad, privateinternetaccess, expressvpn and multiple random 
> openvpn.
> 
> Guides: 
> https://github.com/tasket/Qubes-vpn-support
> https://github.com/tasket/qubes-doc/blob/tunnel/configuration/vpn.md#set-up-a-proxyvm-as-a-vpn-gateway-using-the-qubes-tunnel-service
> https://github.com/tasket/qubes-tunnel


Instructions also make no sense.


1. Copy to template

2. Copy to template VM



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/154a7f83-12be-4486-a59b-7b63506330e3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Minecraft/OpenGL in Qubes

2018-05-12 Thread 799
Hello,

for a POC I tried to run Minecraft on top of a Debian 9 AppVM but run into
problems as the AppVM doesn't have OpenGL.

As I am using a Lenovo W540 which has dual graphic (Intel + dedicated GPU)
can I pass the dedicated graphic card into the AppVM and use it to get
OpenGL?

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2vpRLjxJjhYn-j7kaJHwL94DKPcWpPRrK80uRGr3oN8jA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Lenovo G505S Coreboot

2018-05-12 Thread matthewwbradley6
On Saturday, May 12, 2018 at 3:38:31 PM UTC-4, mattheww...@gmail.com wrote:
> On Wednesday, January 18, 2017 at 6:34:29 AM UTC-5, Asterysk wrote:
> > >First of all we need to make sure that you are prepared for flashing. 
> > >coreboot image cannot be >flashed internally on Lenovo G505S through a 
> > >purely software way (I tried with >internal:laptop=force_I_want_a_brick 
> > >flashrom option, it always fails, cant do that!) . 
> > 
> > >To install a coreboot, you will have to: 
> > >1) get some hardware tools like screwdrivers, CH341A USB flasher and 
> > >SOIC-8 test clip 
> > >2) tear down your laptop to access the motherboard 
> > >3) take SOIC-8 test clip and attach its wires to USB flasher that is 
> > >supported by flashrom (such as CH341A), then attach SOIC-8 test clip to 
> > >BIOS chip with 8 legs, then plug USB flasher device to another computer 
> > >with Linux (while it is still connected to G505S motherboard through wires 
> > >and SOIC-8 test clip) 
> > >4) using flashrom, make a dump of your existing BIOS just in case, then 
> > >flash a new coreboot image with verification 5) assemble your laptop in 
> > >reverse order . That is exactly how computer repair shops are repairing 
> > >laptops with failed BIOS updates, and are earning pretty good money on it 
> > 
> > >Here is a hardware flashing manual - 
> > >http://dangerousprototypes.com/docs/Flashing_a_BIOS_chip_with_Bus_Pirate . 
> > 
> > Everything is described in a great detail here: complete list of tools and 
> > where you could buy them (need to spend from $0 to $30, depends on what 
> > tools you already have), how to connect these tools properly, a lot of 
> > helpful photos - for example, photo of G505S motherboard, so you could 
> > easily see where is that BIOS chip with 8 legs is located, dont need to 
> > spend time reading the motherboard chip labels. While this instruction 
> > mentions Bus Pirate USB flasher, the instructions for CH341A USB flasher 
> > are exactly the same - only a flashrom command is different (could see this 
> > command at the end of page) 
> > 
> > My current coreboot build is from December 2016 - it is not the latest, but 
> > still pretty recent, so I am not going to rebuild it from scratch yet. 
> > Still, there is one component inside BIOS image that could be easily 
> > updated: KolibriOS, tiny wonderful open source operating system that fits 
> > on a floppy. It could be launched from SeaBIOS Boot Menu, and works as a 
> > RamDisk (no changes to your computer saved). After you tell that you are 
> > prepared for hardware BIOS flashing, I will take KolibriOS latest daily 
> > build, add it to ROM and send a complete coreboot BIOS ROM to you 
> > 
> > Please reply if you have any questions 
> > 
> > Best regards, 
> > qmastery
> > ---
> > 
> > Is it possible to also reflash the USB firmware at the same time in case it 
> > has been tampered by Bad USB ?
> 
> Does anybody know where I can find an up-to-date copy of the microcode for 
> this laptop? The latest microcode images I've been able to find *anywhere* are
> https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tree/amd-ucode
> which according to the logs date back to 2016 and therefore can't possibly 
> contain spectre mitigations for an A10-5750M CPU.
> 
> Supposedly AMD has/will release mitigating microcode for family 15h but I 
> don't think AMD has an equivalent to: 
> https://downloadcenter.intel.com/download/27776/Linux-Processor-Microcode-Data-File
>  
> 
> Does AMD even announce when they release microcode for a particular 
> family/CPU? Ideally they'd have a list of CPU->microcode.tar.gz but one can 
> only dream I guess...
> 
> The next step of course will be figuring out how to build coreboot to load 
> the microcode image, but, one step at a time.

EDIT: 
https://web.archive.org/web/20160726141516/http://www.amd64.org:80/microcode.html
 doesn't seem to have been up since 2016

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fff92020-1c6d-49c9-9090-dcfbdff66613%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-05-12 Thread JonHBit
On Thursday, April 26, 2018 at 6:38:41 PM UTC-7, Chris Laprise wrote:
> On 04/26/2018 05:29 PM, JonHBit wrote:
> > On Wednesday, April 18, 2018 at 5:36:37 AM UTC-4, Chris Laprise wrote:
> >> On 04/17/2018 11:42 PM, Chris Laprise wrote:
> >>> On 04/17/2018 09:20 PM, JonHBit wrote:
> >>
>  Worked well for me using a debian-9 template & commit 4e96ca8, only
>  trouble was that my VPN provider's configs used
>  /etc/update-resolv-conf and failed silently when it was missing - so
>  shipping it with qubes-tunnel and installing it by default may be
>  helpful.
> >>>
> >>> Thanks!
> >>>
> >>> This issue just became apparent to me when another user reported it. The
> >>> underlying problem is a bug (or several bugs) in openvpn's option parsing:
> >>>
> >>> https://github.com/tasket/Qubes-vpn-support/issues/19
> >>>
> >>> It only shows up when the config specifies its own scripts which is
> >>> rare. I'm trying out a workaround now which involves:
> >>>
> >>> 1. Removing the paths in the up & down options in the .service file.
> >>>
> >>> 2. Moving the up & down options to the beginning just after the openvpn
> >>> command.
> >>>
> >>> 3. Symlinking the up/down script from /usr/lib/qubes to the
> >>> /rw/config/qtunnel dir.
> >>>
> >>> Hopefully this will override the config's up/down settings as intended.
> >>
> >> I had to use a different approach but it should be fixed now. Update it
> >> by copying new version to template and running installer. Then you'll
> >> need to remove the 'qubes-tunnel' Qubes service for the proxyVM and add
> >> 'qubes-tunnel-openvpn' instead.
> >>
> >>
> >> -- 
> >>
> >> Chris Laprise, tas...@posteo.net
> >> https://github.com/tasket
> >> https://twitter.com/ttaskett
> >> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
> > 
> > Hi Chris,
> > 
> > Good to see the update!
> > 
> > However I think that's a separate issue; what I'm referencing is these 
> > lines in my .ovpn config:
> > 
> > script-security 2
> > up /etc/openvpn/update-resolv-conf
> > down /etc/openvpn/update-resolv-conf
> > 
> > The VPN installer script will normally download this if it's missing - used 
> > to change the DNS server to the VPN-provided one.
> > 
> > The script is here: 
> > https://raw.githubusercontent.com/ProtonVPN/scripts/master/update-resolv-conf.sh
> > 
> > After adding it everything worked well.
> 
> The update will replace those lines because they should be overridden 
> with the Qubes-specific DNS handling. If dnat isn't setup for DNS then 
> those packets could get mis-routed.
> 
> You can check the dnat rules (which should have some address other than 
> 10.139.1.x after connecting) with this:
> 
> sudo iptables -v -t nat -L PR-QBS
> 
> My guess why it might work with incorrect dnat addresses is that your 
> VPN provider takes the step of re-assigning DNS destination addresses to 
> its own. But this is unorthodox so I wouldn't count on it.
> 
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

I've updating to 1.4beta4 and switched templates from debian-9 to fedora-28, 
but I'm getting the same error - also it seems like openvpn flag defaults 
changed, as it now returns an error for the up and down arguments

Specifically, it parses /usr/lib/qubes/qtunnel-connect up as 2 arguments 
instead of 1; putting the whole phrase in double quotes fixes this, which I see 
you did but for some reason the quotes seem to be removed when ExecStart runs, 
i.e. checking systemctl status qubes-tunnel shows the command without the quotes

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eeefbba3-565f-443b-b80f-04353cd975a7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-05-12 Thread get
среда, 18 апреля 2018 г., 0:13:29 UTC+3 пользователь Chris Laprise написал:
> Hello fellow Qubes users:
> 
> Per issue 3503 the Qubes project would like to incorporate VPN features 
> from Qubes-vpn-support -- which a number of you are already using -- 
> into the Qubes 4.1 release.
> 
> I've set up a new project "qubes-tunnel" to act as a staging area for 
> testing and eventual forking into Qubes. It is nearly the same as 
> Qubes-vpn-support except some names & paths are different... and install 
> to template is required for obvious reasons :) .
> 
> 
> Project Link... https://github.com/tasket/qubes-tunnel
> 
> 
> Everyone with an available VPN service is welcome to try this out and 
> report here on your results!
> 
> -
> 
> PS - Some of you will wonder if installing qubes-tunnel into an existing 
> template already used for Qubes-vpn-support will cause a conflict; They 
> will not conflict as long as the two services aren't enabled for the 
> same ProxyVM(s).
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Hi. script not working more on debian-9/fedora-26. Please fix it.

Tested vpn's : mullvad, privateinternetaccess, expressvpn and multiple random 
openvpn.

Guides: 
https://github.com/tasket/Qubes-vpn-support
https://github.com/tasket/qubes-doc/blob/tunnel/configuration/vpn.md#set-up-a-proxyvm-as-a-vpn-gateway-using-the-qubes-tunnel-service
https://github.com/tasket/qubes-tunnel


 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0fa39509-f292-4cca-b547-978aad4b7b16%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread niepowiem48
netVM has ok ping to google.com 
firewallVM has no pings
appVM has also no pings

Maybe it's worth to mention: update template VM was done with success (which is 
a bit odd as update actually was done with success as firewallVM has no pings).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30062c7d-2b7e-45b7-be2c-23526ea2e38a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Why so many outgoing IP?

2018-05-12 Thread mk2mix via qubes-users
After spending a lot of time looking everywhere I was not down on 
fedora-minimal, thanks, actually it may be a track, I hope so.
Or can we modify all the NTP?
(actions like "systemctl disable ntp" do not seem to be enough)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/25486765-9689-4b96-96a0-74ac1fcb3817%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Minecraft/OpenGL in Qubes

2018-05-12 Thread awokd
On Sat, May 12, 2018 7:01 pm, 799 wrote:
> Hello,
>
> for a POC I tried to run Minecraft on top of a Debian 9 AppVM but run into
> problems as the AppVM doesn't have OpenGL.
>
> As I am using a Lenovo W540 which has dual graphic (Intel + dedicated GPU)
> can I pass the dedicated graphic card into the AppVM and use it to get
> OpenGL?

You could maybe do something like this poster is trying to get working:
https://www.mail-archive.com/qubes-users@googlegroups.com/msg21804.html.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8013fc1ddd3bc5686d17302bb66688f4%40elude.in.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Testing new VPN code for Qubes

2018-05-12 Thread dangmadzyu
On Tuesday, April 17, 2018 at 2:13:29 PM UTC-7, Chris Laprise wrote:
> Hello fellow Qubes users:
> 
> Per issue 3503 the Qubes project would like to incorporate VPN features 
> from Qubes-vpn-support -- which a number of you are already using -- 
> into the Qubes 4.1 release.
> 
> I've set up a new project "qubes-tunnel" to act as a staging area for 
> testing and eventual forking into Qubes. It is nearly the same as 
> Qubes-vpn-support except some names & paths are different... and install 
> to template is required for obvious reasons :) .
> 
> 
> Project Link... https://github.com/tasket/qubes-tunnel
> 
> 
> Everyone with an available VPN service is welcome to try this out and 
> report here on your results!
> 
> -
> 
> PS - Some of you will wonder if installing qubes-tunnel into an existing 
> template already used for Qubes-vpn-support will cause a conflict; They 
> will not conflict as long as the two services aren't enabled for the 
> same ProxyVM(s).
> 
> -- 
> 
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


I can get my browser to connect in the ProxyVM only after I manually change 
/etc/resolv.conf to NordVPN DNS servers.

But nothing that uses the ProxyVM as a NetVM can access the internet in any 
way. Cannot ping 8.8.8.8. Can't do anything. Doesn't matter what I do to 
/etc/resolv.conf in the AppVM.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77cdc124-5304-49fd-9476-5522a53ffa73%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TemplateVM clonning returning a cube with blank Applications - Available field and no terminal

2018-05-12 Thread cangent05
Hi, I’m almost done with tests on Qubes-USB. I only couldn’t update Fedora. I 
tried Gnome software (from 26 to 28): I clicked next at incompatible software 
warning window, then nothing happened. As directed on the official website, I 
also tried via commands on the terminal (from 26 to 27): no success. I can’t 
make Applications appear on the qube settings unfortunately. I waited long 
enough for the “refresh” button as suggested above, but nothing happened again. 
I test Qubes on 3.0 USB flash (128 GB only, so it is small size), is it because 
of Qubes on USB in general, or due to my incompetent flash disk, or any other 
reason you think? Appreciate your helps.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/25d328b9-d6f2-45b1-9b5f-e0e798475a5b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installation freezes on SSD

2018-05-12 Thread alexw8913
Hey I am having an issue installing qubes 4.0 on my external SSD (Samsung 1TB 
SSD T5).  Qubes installes fine with my flash drive that the qubes image is on.  
When it askes me to restart the computer after installation I do and boots up 
fine to the template configuration area.  Now when I am configuring the 
templates it freezes on me and shows a black cursor.  The mouse also stops 
working and no keyboards inputs work anymore.  I have left this for about 8 
hours and is still there.  I have to power off the computer for it to stop.

I have also installed this on my flash drive before this to test it out and 
everything installed perfectly even the template configurations. So this brings 
me to it has to be something with the SSD.

Any ideas as to how I can resolve this? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bbaf9b80-758a-4c8f-90e5-e73827b4c80e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Sergio Matta
Em sábado, 12 de maio de 2018 16:08:11 UTC-3, niepo...@gmail.com  escreveu:
> netVM has ok ping to google.com 
> firewallVM has no pings
> appVM has also no pings
1) do you ping by ip, ex. ping 8.8.8.8?
if yes set dns

if not
2) in a dom0 terminal, qvm-ls sys-net shows virt_mode hvm, qvm-ls sys-firewall 
shows virt_mode pvh and qvm-ls personal (or whatever you a using) shows 
virt_mode pvh?
3) in a sys-net terminal, ifconfig -a shows vif3.0, and in sys-firewall 
terminal ifconfig -a shows vif4.0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77f4ed96-3bd3-4439-b0b1-48fdc66dfaad%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Why so many outgoing IP?

2018-05-12 Thread mk2mix via qubes-users
sorry for the translations that are not very good.
I meant that I had not seen the possibility of "minimal-fedora", so thank you.
it may be a good track.
I already tried "systemctl ntp disable"
it does not seem to prevent.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a0d6633e-d7c9-4d9a-b454-85a12234af35%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation freezes on SSD

2018-05-12 Thread cooloutac
On Saturday, May 12, 2018 at 8:13:22 PM UTC-4, alex...@gmail.com wrote:
> Hey I am having an issue installing qubes 4.0 on my external SSD (Samsung 1TB 
> SSD T5).  Qubes installes fine with my flash drive that the qubes image is 
> on.  When it askes me to restart the computer after installation I do and 
> boots up fine to the template configuration area.  Now when I am configuring 
> the templates it freezes on me and shows a black cursor.  The mouse also 
> stops working and no keyboards inputs work anymore.  I have left this for 
> about 8 hours and is still there.  I have to power off the computer for it to 
> stop.
> 
> I have also installed this on my flash drive before this to test it out and 
> everything installed perfectly even the template configurations. So this 
> brings me to it has to be something with the SSD.
> 
> Any ideas as to how I can resolve this?

try without making a sys-usb or sys-net vm by default checkbox and make them 
afterwards.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d4722d5-185c-4be1-b0cf-27823900ba70%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] opening links in another VM opens two browsers

2018-05-12 Thread qubenix
awokd:
> On Fri, May 11, 2018 2:56 am, qubenix wrote:
>> Hey everyone! Hope you are all doing well.
>>
>> I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/
>> so links clicked in one debian-9 AppVM will open in separate debian-9
>> AppVM. What actually happens is interesting.
>>
>> If I have firefox running in the destination VM already, everything
>> works as expected. The link opens a new tab in the proper AppVM.
>> However, if firefox is not currently running, a clicked link will open
>> the link in a browser in both VMs.
> 
> Tried to recreate but couldn't. It might be a function of the application
> you are using. What happens if you click links in a different app?
> 
> 

You're right, in other applications everything works as expected. The
app in question is discord for the record, and I'm not surprised it's
doing unexpected/unwanted things. That's why I was just testing it out
in a dedicated VM. Thanks for the tip.

-- 
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4cb66b99-1e76-f06d-2efd-59c439900696%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation freezes on SSD

2018-05-12 Thread john

On 05/12/18 14:34, cooloutac wrote:

On Saturday, May 12, 2018 at 8:13:22 PM UTC-4, 
alex...-re5jqeeqqe8avxtiumw...@public.gmane.org wrote:

Hey I am having an issue installing qubes 4.0 on my external SSD (Samsung 1TB 
SSD T5).  Qubes installes fine with my flash drive that the qubes image is on.  
When it askes me to restart the computer after installation I do and boots up 
fine to the template configuration area.  Now when I am configuring the 
templates it freezes on me and shows a black cursor.  The mouse also stops 
working and no keyboards inputs work anymore.  I have left this for about 8 
hours and is still there.  I have to power off the computer for it to stop.

I have also installed this on my flash drive before this to test it out and 
everything installed perfectly even the template configurations. So this brings 
me to it has to be something with the SSD.

Any ideas as to how I can resolve this?


try without making a sys-usb or sys-net vm by default checkbox and make them 
afterwards.




This freezing has happened once ?  or repeatedly ?  Did you use the 
default template installation or change anything ?


What about like the other poster, recreate your installation media a 
different way?  following the documentation? just some thoughts


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b419cad6-40ee-7a22-a38b-17cd706b05fd%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

Set the "Networking" setting in your AppVM settings dialog to point to 
sys-firewall, set the "Networking" setting in sys-firewall to point to sys-net, 
and if your network connection is coming via an Ethernet-to-USB adapter, set 
the "Networking" setting in sys-net to point to sys-usb. (A sidenote regarding 
the latter: If you don't already have a separate VM to handle USB services, you 
really should create it, even if you're not using an Ethernet-to-USB adapter. 
Note that only one VM should be responsible for providing network services 
(which would either be sys-net or sys-usb, depending on the card/adapter you're 
using to provide Internet. If you *do* have an Ethernet-to-USB adapter, you'll 
want to set the "Provides network services" checkbox when you go to create the 
sys-usb VM.) You also need to add "qubes-updates-proxy" (without quotes) to the 
list of services in the sys-net settings dialog. After you do all this, you 
should be able to use "sudo apt-get update" in a terminal in your template VM 
to install or update packages (which AppVMs inherit, of course). One thing I've 
discovered is that you often need to restart VMs to get them to recognize 
changes you've made, so if you don't get what you expect, restart the VM in 
question. Let me know what happens...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/855af1af-870b-475c-94c8-af0f01a4f8b0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes R4.0 - no internet working in appVM

2018-05-12 Thread Qubes Guy
On Saturday, May 12, 2018 at 4:28:56 AM UTC-4, niepo...@gmail.com wrote:
> On Friday, May 11, 2018 at 3:17:05 PM UTC-4, Qubes Guy wrote:
> > On Friday, May 11, 2018 at 1:17:24 PM UTC, niepo...@gmail.com wrote:
> > > Fresh install of Qubes R4.0 and there is no internet connection in appVM 
> > > - firefox just not load websites.
> > > 
> > > Internet connection actually is ok as I'm able to make update for 
> > > template VM.
> > > 
> > > What can be reason of this not working internet in app VM and how resolve 
> > > this?
> > 
> > Is this still a problem?  Did you give your AppVM access to the net VM (set 
> > "Networking" to sys-firewall (preferably) or sys-net in the settings dialog 
> > for the AppVM)?
> 
> Yes, problem still exist.
> 
> There was sys-firewall connected to appVM as well sys-net and no connection.
> I have also tried changing template from fedora to debian -internet not 
> working.
> I have also install chromium browser and connection not working.
> 
> Very frustrating situation...

One thing I forgot to mention: Do NOT set the "Networking" setting in your 
template VMs (set it to "None"). Giving network access to your templates is 
considered a major security threat (since all AppVMs you base on them inherit 
any malware/corruption). If you put "qubes-updates-proxy" in the services tab 
of sys-net, you won't need to do this. If you absolutely need to do this 
anyway, turn it off as soon as possible...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dfa187be-0914-4f56-b2e0-7e541712e629%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 4 monitors, 3 output types, 2 graphics chips and not getting to show up on all 4 monitors

2018-05-12 Thread Stumpy

On 2018-05-12 19:05, awokd wrote:

On Sat, May 12, 2018 4:10 am, Stumpy wrote:

I have finally gotten around to re-tackling my
multi-monitor/multi-graphics chip issue.
I have decided to try booting a few different live distributions to 
see

what happened, here is what I have in terms of hardware:
Four monitors, 2 HPs 2 Dells. HPs are in landscape position, Dells are
in Portrait position
The monitors accept VGA, HDMI, and DP
One chipset is on a graphics card, and is an AMD Radeon HD 6570 1GB 
DDR3

PCIe x16 - 1 DVI and 2 DP out ports (I think it came out around
2013ish?)
The other is an integrated intel chipset - 1 HDMI and 1 DVI out ports


Try to narrow down the problem. It might be hardware, like your 
graphics

chips might not have enough memory to drive all the monitors.
- What happens if you only use 2 monitors on a single adapter? Try both
adapters alone.
- DP monitor by itself?
- Windows 7?


Thanks for the reply.
In testing other distros I was hoping to narrow it down, but I am still 
not sure, really not hip on trying win7 (or others) as I don't have a 
copy laying around, and linux live distros are so much easier ;)
In some of the live distros I tried, I was able to get a display on all 
4 monitors so I am thinking mem isn't the problem (flawed reasoning?)
If I try two displays on the integrated adapter then those two work, 
more or less without a hitch.
Some of the distros don't seem to like my (external) graphics card at 
all, and some just seem to take issue with the the monitor connected via 
DP (I have also tried a DP to DVI adapter I had laying around, nada 
still issues).


I have now tried installing Qbes v4 onto a usb flash drive. The xfce 
display window was the least buggy compared with most of the distros, 
but it seems Qubes 4 doesn't like my graphics card... or something. The 
two Dells connected to the exernal graphics card are showing that 
multiucolored static no matter what configuation I try (ie rotating, 
mirror [which worked well for many of the distros], primary display 
etc).


So I am left with the possibility that its the graphics card but as some 
of the other distros worked I was hoping that was the wrong 
assumption... or maybe I am thinking about it wrong, maybe its xen that 
doesn't like the gfx card? (which is the only thing I can think of that 
*all* the distros did not have).


I am desprate to get a multi display option working, so am willing to 
get another gfx card but as I can't keep doing that I need to be sure 
next time.


Thoughts?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/33203f9d1abd4650363d131a61f15bb4%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation freezes on SSD

2018-05-12 Thread cooloutac
its probably discussed on forums somewhere,  I think alot of people use usb 
drive, but I just assumed possible headaches if I wanted to use a sys-usb, I 
could be wrong.  also possible problems if both are on same controller.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ca7c70b-36ba-48eb-8b22-04696069e41b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.