[qubes-users] http://qubes.3isec.org/ status "down"
too lazy to use qubes-builder, it was a good place for downloading lastest ubuntu templates :) can you up resource plz? Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/xjaBZJXpyZB2YKq9hsI4nzG_GjHMD6EFhS8pBKAYMCnVHuVu6biiR-MStczngRS_q-bgCzQfjJeYcGyiYjAUCkZsUG_ugIWIQXa7o4eYdi8%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Having trouble getting an Intel 82576 nic to like its qube
I tried nomsi and permissive mode but they did not work. I had thought that intel nics would work better but perhaps I will switch to realtec nics once some other issues are worked out. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/32dc98f9-f7db-4763-8eef-f338d746c3de%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Live/Amnesia Mode?
Can Qubes be installed/copied to a DVD or USB drive and be run in read only mode so you could have higher compartmentalization such as Whonix but with the Amnesia of Tails? Assuming your PC of course supports Qubes 4.0 HCL. How would you do this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/40250ff8-39b9-468d-aba9-32b2741a45fc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
re: [qubes-users] http://qubes.3isec.org/ status "down"
Thank you, Unman !:) Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/taw8OuLTdwmpmiN4493lWmvvsL-KjmK0DHDQdrzuxQ79wZbN7zozqYaahIJLyT6brpFYVI-bs4Ps_aYw4nl4bW2-gtMRiPi1dsJqNxfiybA%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Networking between qubes and HVMs
I want to allow a debian qube to use a BSD qube as its network and to allow traffic between them. The BSD sees the vif created for the debian when I do this, but no traffic passes between them. In the firewall settings for debian qube I get a warning that its not attached to a firewall vm so no traffic is allowed. Is there a way to override this? I saw in qubes docs there is a way to do this for template based qube vms, but what about for an HVM and a qube? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8e47d152-a963-4bec-ab42-cfa9e8379189%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] http://qubes.3isec.org/ status "down"
On Wed, Oct 03, 2018 at 11:09:22AM +, 'one-eye-pirate' via qubes-users wrote: > too lazy to use qubes-builder, it was a good place for downloading lastest > ubuntu templates :) can you up resource plz? > > Sent with [ProtonMail](https://protonmail.com) Secure Email. Up now. I'm in process of building and uploading new xenial and bionic templates, and updating the packages. Should be there in the morning. Check back then. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20181003153210.jvgkji3226b3qgjl%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Networking between qubes and HVMs
On Wed, Oct 03, 2018 at 08:10:10AM -0700, jmarkdavi...@gmail.com wrote: > I want to allow a debian qube to use a BSD qube as its network and to allow > traffic between them. The BSD sees the vif created for the debian when I do > this, but no traffic passes between them. In the firewall settings for debian > qube I get a warning that its not attached to a firewall vm so no traffic is > allowed. > Is there a way to override this? I saw in qubes docs there is a way to do > this for template based qube vms, but what about for an HVM and a qube? > There was a recent post on exactly this issue. I do this with an openBSD HVM as netvm. My solution is to attach both HVM and qubes to a (non-networked) fw. https://groups.google.com/forum/#!topic/qubes-users/iQm9-rrCDIY unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20181003154256.bbz3kuker5xjkq7f%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Live/Amnesia Mode?
On Wed, Oct 03, 2018 at 06:24:58AM -0700, jonbrownmaste...@gmail.com wrote: > Can Qubes be installed/copied to a DVD or USB drive and be run in read only > mode so you could have higher compartmentalization such as Whonix but with > the Amnesia of Tails? Assuming your PC of course supports Qubes 4.0 HCL. How > would you do this? > It's straightforward to install to a USB but the method you suggest wont work. You can do this by running Qubes live in RAM. I've posted some live images in the past on https://qubes.3isec.org The memory requirements for 4.0 are hefty, and I'm still trying to tune the live image accordingly. The 3.2 images work pretty well either from disk or USB(better) . unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20181003155042.sfbj6vkgnldhmwcx%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] The log entries in sys-net are filled with a bunch of messages
> Hi, > > I created a new sys-net (sys-net2) as network VM to use a wireless USB > adapter. > > The sys-net2 dmesg logs (guest-sys-net2.log) are filled with a bunch of > messages (4878 lines) like the following: > > ---%<-- > First lines > ---%<-- > [0.00] Linux version 4.14.57-2.pvops.qubes.x86_64 > (user@build-fedora4) (gcc version 6.4.1 20170727 (Red Hat 6.4.1-1) (GCC)) #1 > SMP Tue Aug 14 14:43:33 UTC 2018 > [0.00] Command line: root=/dev/mapper/dmroot ro nomodeset > console=hvc0 rd_NO_PLYMOUTH rd.plymouth.enable=0 plymouth.enable=0 nopat > [0.00] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point > registers' > [...] > [ 11.129065] usb 2-1: new high-speed USB device number 2 using vhci_hcd > [ 11.246132] usb 2-1: SetAddress Request (2) to port 0 > [ 11.286211] usb 2-1: New USB device found, idVendor=13b1, idProduct=002f > [ 11.286284] usb 2-1: New USB device strings: Mfr=1, Product=2, > SerialNumber=3 > [ 11.286369] usb 2-1: Product: Linksys AE1000 > [ 11.286429] usb 2-1: Manufacturer: Linksys > [ 12.303201] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? > [ 13.191197] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? > [ 14.079202] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? > [ 14.967200] usb usb2-port1: Cannot enable. Maybe the USB cable is bad? > [ 14.967389] ieee80211 phy0: rt2x00usb_vendor_request: Error - Vendor > Request 0x07 failed for offset 0x1000 with error -19 > [ 14.967496] ieee80211 phy0: rt2800_probe_rt: Error - Invalid RT chipset > 0x, rev detected > [ 14.967594] ieee80211 phy0: rt2x00lib_probe_dev: Error - Failed to > allocate device > [ 14.967788] usbcore: registered new interface driver rt2800usb > [ 14.968575] usb 2-1: USB disconnect, device number 2 > [...] > > Additionally and deliberately focus is made on my wireless USB adapter. > > In contrast, my main sys-net with internal Ethernet port does not display > anything. > > Any help and advice would be greatly appreciated. > > Best regards. > > GD Rub > In the fact that I am not the only one : https://github.com/QubesOS/qubes-issues/issues/3778 but no solution found ... :-( -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b95ba189-f855-4930-d045-c86f2caac9ff%40gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Networking between qubes and HVMs
I literally just read that and going to post an apology for repeating a question -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d7051d34-b6f3-4121-999b-b8a65d261129%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Download probleme
Hey guys, this community here help me alot, so i hope someome can help me. I tried to . Download some files today, with the Domain:work, untrusted, personal and also vault. After 100%, the Browser freezed and i always must kill them with the Dom0 Terminal promp. A error Message pops up and says something, that the script hangs up. I followed many tutorials about that message, but without success. With the outher Domains, i had the same probleme. I hope,that someone can help. About messages i very happy. Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a70878c5-6dab-40e7-9413-a22842bc8002%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Post installation - VMs are not starting
tirsdag den 2. oktober 2018 kl. 23.23.39 UTC+2 skrev raf...@gmail.com: > New Qubes user! First install today. > > "Qubes-R4.0-x86_64.iso" (DD image) is installed. > Downloaded today (2nd October 2018) > > During the install during options for TemplateVMs, Sys-usb, etc. following > error appeared: > > > -- > > [Dom 0] Error > ['/usr/bin/qubes-prefs','default-kernel','4.14.18-1'] failed: > stdout:"" > stderr: "Traceback (most recent call last): > File "/usr/bin/qubes-prefs", line 5, in > sys.exit(main()) > File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qubes_prefs.py", line > 42, in main > return qubesadmin.tools.qvm_prefs.process_actions(parser, args, target) > File "/usr/lib/python3.5/site-packafes/qybesadmin/tools/qvm_prefs.py", line > 116, in process_actions > setattr(target, args.property, args.value) > File "/usr/lib/python3.5/site-packages/qubesadmin/base.py", line 283, in > __setattr__ > str(value).encode('utf-8')) > File "/usr/lib/python3.5/site-packages/qubesadmin/app.py" line 466, in > qubesd_call > client_socket.connect(qubesadmin.config.QUBSED.SOCKET) > FileNotFoundError: [Errno 2] No such file or directory > > > > When I press OK, I can finish the setup and boot in Qubes OS. BUT there is no > sys-net, sys-usb or any TemplateVMs. > > I then used the command "sudo journalctl" in terminal > > > > > Results (red text): > > (1) > "tpm tpm0: A TPM error (6) occurred attempting to read pcr value" > > ### in white (TPM is disabled/deactivated (0x6)) > > (2) > "TDB: tdb_open_ex: could not open file /var/lib/xenstored/tdb: No such file > or directory" > "Checking store ..." > "Checking store complete." > > (3) > "Failed to start Qubes OS daemon." > > > --2 hours later-- > > (4) > Some ACPI errors > > (5) > Failed to find module 'uinput' > > > > > > I have been searching GitHub and Reddit. This could be similar. > > #3028 > https://github.com/QubesOS/qubes-issues/issues/3028#issuecomment-322330133 > > If it is the same problem, why do I get it when I haven't used R3.2? remains > from a previous owner? And what do I need to do to fix it? Extra info: I have a Lenovo PC, but I used Legacy Boot. Anyone who have an idea that might help me? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/352f138f-908e-447c-b9f2-38fa83b01ab3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] I still want anti virus with Qubes OS. but which one is compatible?
hi~ i got enough CPU and RAM and SSD, I want an extra layer of protection in addition to qubes 's protection. what can I do? I used to use ubuntu with sophos free anti virus for linux. What can I install on a qubes OS? thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/96a3013c-86ce-49c5-9376-c7170d3f352e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] I still want anti virus with Qubes OS. but which one is compatible?
On 10/03/2018 11:09 PM, ccchan...@gmail.com wrote: hi~ i got enough CPU and RAM and SSD, I want an extra layer of protection in addition to qubes 's protection. what can I do? I used to use ubuntu with sophos free anti virus for linux. What can I install on a qubes OS? thanks Before going down the detection route, keep in mind that by default Qubes VMs have little if any _internal_ protection from malware. So it makes sense to restore normal defenses first... https://github.com/tasket/Qubes-VM-hardening/ Qubes-VM-hardening goes a bit beyond re-enabling sudo authentication in that it will also do a minimum level of protection and sanitizing by default. This protects VMs in ways that could also benefit regular Linux systems. Going beyond that, antivirus is an option. One way to run it is from a dispVM to which you attach various private volumes (one at a time) for scanning. Another way is to use Qubes-VM-hardening as a way to launch the AV scanner at normal appVM startup, at the instant before the private volume is brought online. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f1d74045-4a8f-0537-d51e-1c43f82a4ca0%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] I still want anti virus with Qubes OS. but which one is compatible?
so.. have anyone really tried ANY anti virus with qubes OS? indeed even for ubuntu, the one that free, keep update, official, is sophos anti virus for linux. others like comodo etc dunt update. please, thanks On Thursday, October 4, 2018 at 11:49:27 AM UTC+8, Chris Laprise wrote: > On 10/03/2018 11:09 PM, ccchan...@gmail.com wrote: > > hi~ > > > > i got enough CPU and RAM and SSD, > > > > I want an extra layer of protection in addition to qubes 's protection. > > > > what can I do? > > > > I used to use ubuntu with sophos free anti virus for linux. > > > > What can I install on a qubes OS? > > > > thanks > > Before going down the detection route, keep in mind that by default > Qubes VMs have little if any _internal_ protection from malware. So it > makes sense to restore normal defenses first... > > https://github.com/tasket/Qubes-VM-hardening/ > > Qubes-VM-hardening goes a bit beyond re-enabling sudo authentication in > that it will also do a minimum level of protection and sanitizing by > default. This protects VMs in ways that could also benefit regular Linux > systems. > > Going beyond that, antivirus is an option. One way to run it is from a > dispVM to which you attach various private volumes (one at a time) for > scanning. Another way is to use Qubes-VM-hardening as a way to launch > the AV scanner at normal appVM startup, at the instant before the > private volume is brought online. > > -- > > Chris Laprise, tas...@posteo.net > https://github.com/tasket > https://twitter.com/ttaskett > PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e3451816-4c41-4794-b150-e6a094383d98%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.