[qubes-users] Re: Building an X-230 into a Qubes machine.

2020-03-04 Thread ggg397
I have just identified Amazon 
recommends:  
https://www.amazon.com/Organizer-Socket-Adpter-Programmer-CH341A/dp/B07R5LPTYM/ref=sr_1_fkmr0_2?keywords=programmer%2C+ch431a=1583326902=hi=1-2-fkmr0

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d70fd7ce-4d2e-486e-9b1b-b97015e7b954%40googlegroups.com.


[qubes-users] Announcement: NitroPad X230 passes hardware certification for Qubes 4.0!

2020-03-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

It is our pleasure to announce that the NitroPad X230 [01] has become
the second Qubes-certified Laptop [02] for Qubes 4.0! This makes
Nitrokey [03] the first vendor in Europe to have a product pass Qubes
hardware certification.


## What is Qubes Certified Hardware?

Qubes Certified Hardware [04] is hardware that has been certified by the
Qubes developers as compatible with Qubes OS. Beginning with Qubes 4.0,
in order to achieve certification, the hardware must satisfy a rigorous
set of requirements [05], and the vendor must commit to offering
customers the very same configuration (same motherboard, same screen,
same BIOS version, same Wi-Fi module, etc.) for at least one year.

Qubes-certified Laptops [02], in particular, are regularly tested
by the Qubes developers to ensure compatibility with all of Qubes'
features. The developers test all new major versions and updates to
ensure that no regressions are introduced.

It is important to note, however, that Qubes Hardware Certification
certifies only that a particular hardware *configuration* is *supported*
by Qubes. The Qubes OS Project takes no responsibility for any
manufacturing or shipping processes, nor can we control whether physical
hardware is modified (whether maliciously or otherwise) *en route* to
the user. (However, see below for information about how the Insurgo team
mitigates this risk.)


## About the NitroPad X230

The NitroPad X230 [01] offers users unprecedented control over the
security of their hardware. Key features include:

  - Tamper detection through measured boot with Coreboot [06],
Heads [07], and Nitrokey USB hardware, including support for
Anti Evil Maid (AEM) [08]

  - Deactivated Intel Management Engine [09]

  - User-replaceable cryptogrpahic keys

  - Included Nitrokey USB key

  - Professional ThinkPad hardware based on the ThinkPad X230 [10]

  - Security-conscious shipping to mitigate against third-party
interdiction [11]

For further details, please see the original NitroPad announcement. [12]


## How to get one

Please see the NitroPad X230 [01] on the Nitrokey website [03] for
more information.


[01] https://shop.nitrokey.com/shop/product/nitropad-x230-67
[02] https://www.qubes-os.org/doc/certified-hardware/#qubes-certified-laptops
[03] https://www.nitrokey.com/
[04] https://www.qubes-os.org/doc/certified-hardware/
[05] 
https://www.qubes-os.org/doc/certified-hardware/#hardware-certification-requirements
[06] https://www.coreboot.org/
[07] https://github.com/osresearch/heads/
[08] https://www.qubes-os.org/doc/anti-evil-maid/
[09] https://libreboot.org/faq.html#intelme
[10] https://www.thinkwiki.org/wiki/Category:X230
[11] https://en.wikipedia.org/wiki/Interdiction
[12] 
https://www.nitrokey.com/news/2020/nitropad-secure-laptop-unique-tamper-detection

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/03/04/nitropad-x230-qubes-certification/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=/e+K
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cd99b287-c39c-f669-8dfb-0e1863874f44%40qubes-os.org.


[qubes-users] Building an X-230 into a Qubes machine.

2020-03-04 Thread ggg397
As I could not afford a Privacy Beast, I bought a refurbished X-230 Core 
I5, 4 GB RAM to convert on my own.  Soon I will get the 16 GB of RAM to put 
into it.  I am looking to buy a ch-431a to program it from Amazon.  I know 
the guys at Insurgo list on they use from China, but right now, I am not 
much interested in ordering one delivered from China.   Not sure when it 
would be delivered, and whether I want it into my house.  

Once again, is there anything special about PROM an I5 versus an I7?

Any one out there have any recommendations on exactly which one of these 
Amazon products to choose?



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1588a0e0-40b9-413a-abb6-7c76ca3aaa92%40googlegroups.com.


[qubes-users] multiboot OS stick with other Linuxes together with Qubes on same stick

2020-03-04 Thread josefh.maier via qubes-users
Hello list,

I would like to make a multiboot OS stick with Qubes (among other Linuxes).
To my knowledge, all ISO's of the Linuxes need to be in the root folder.


Is that technically possible? Whats the best approach?


Thank you!


Regards,

Joe

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200304160102.65937C070C%40smtp.hushmail.com.


Re: [qubes-users] How Qubes / and /home/user mounting as different disks works?

2020-03-04 Thread Chris Laprise

On 3/4/20 10:19 PM, Guerlan wrote:

I'm curious about how Qubes does this:

mounts /home/user and other user-related directories from disk B
mounts the / from disk A, but when VM shutdowns, disk is discarded

I'm curious on how it mounts disk A. I don't think it makes a copy of 
disk A to a temporary disk A', because that'd move lots of gigabytes on 
every VM startup.
However, it also can't mount disk A as read-only, because I can write to 
it, it just gets discarded.
How does this work? And is it exclusive of Xen? Couldn't I do the same 
in KVM? It's very useful


Qubes uses copy-on-write snapshots to achieve this. With a default 
install, that means an LVM "thin pool" holds all of the VM volumes, and 
when a VM starts a snapshot is taken of both "disk A" and "disk B" (the 
*-root and *-private volumes). With a normal AppVM (base on a template) 
the root and private volumes are treated differently on shutdown: Root 
snapshot is discarded, and private is rotated to replace the persistent 
copy (what appears in the VM as /rw and /home).


A similar snapshot routine is used if you installed Qubes with Btrfs 
format instead of LVM (Btrfs is a copy-on-write filesystem).


Copy-on-write provides the ability to create new representations or 
snapshots of an existing file or volume, instantly. Snapshotting is like 
copying, but using a collection of pointers instead of the data itself. 
Thus, when a new snapshot is changed, the system only needs to write 
some new blocks in a different location and replace some pointers in the 
snapshot's metadata to point to the new location. This all can save a 
lot of time and disk space.


--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/809ee2c9-e860-92cc-4f68-8d965c9eda26%40posteo.net.


[qubes-users] Re: broadcom bcm43142 not working

2020-03-04 Thread ggg397
 I am about the last person who should reply to this, as I also have a Mid 
2009 MBP and have not gotten the Broadcom working with some versions of 
Linux, like Debian, Pure OS.   However, I can point you in the right 
direction.  

First of all, I am not sure what the Host OS is for your Qubes?   

Broadcom Wireless  is not supported out of the box for Debian or Free 
Software Linux OS's, because it uses a module that is what some call a 
Blob, proprietary code.   

There has been an ongoing discussion about getting a Broadcom to work with 
the Pure OS, (Pure OS based on the latest Debian) on the Forum board for 
Librem.  https://forums.puri.sm/t/pureos-on-macbook/8405/88

Please be aware that there are a number of different Broadcom Wireless 
devices to add to the confusion.  Tails Linux (that is, for some the 
Security version of Linux some choose, offers the advice that the Broadcom 
Wireless Processors can not be spoofed (giving them a MAC address different 
than their own MAC address) so they allow others to identify you.  

I was posting on the Puppy Linux Forum, and mostly Puppy can be booted on 
my MBP, with the Wireless just working.Puppy Forum people are nice.   
The developer of Fat Dog, a version of Puppy linux said some interesting 
things about how to solve this problem:

http://murga-linux.com/puppy/viewtopic.php?t=118015

Also his distro of Fat Dog, if one downloads it and puts it on a USB Flash 
Drive to run the Live version, has a note about how to install 
Broadcom wireless in the distro, guessing the Broadcom is already working 
in his Distro.I have not read it.  Much of my problem with Wireless 
Drivers is that one must be online (Ethernet Connection to Internet) to get 
the Wireless commands to function correctly, and I do not have at home 
Internet.  I am trapped by public WiFi.  

I would guess if the Host OS of Linux is based upon RPM, then you need some 
different commands, Repositories to get it to work.   I have no experience 
with RPM based Linux

BTW:  If you go to the Puppy Linux Forum-  well actually the Puppy Linux of 
the original developer of Puppy, Barry Kauler's website, you could download 
his latest version of Easy OS which is meant to be a privacy-security 
distro of Puppy Linux, using Boxes for Security.   Might tweak your 
curiosity.   Some on the Puppy Linux Forum believe that the safest way to 
run Puppy is to run it on a Multi-Boot DVD.  Meaning one can prevent anyone 
from modifying your OS, as it is stored on a DVD, which you can update when 
you choose.   Re-Booting to a freshly loaded version of the OS each time 
you boot up.

I would not have not said anything at all, except, well, I have been 
frustrated by this same problem before, and I know where the Links are to 
work on some part of this.   

After find a way to install the right Module (what I called a driver) may 
not be the only problem with getting it to work with Qubes.  But it is a 
start.   Best wishes.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9a14901-55fe-4ef3-a70f-848e5ec1a227%40googlegroups.com.


Re: [qubes-users] How Qubes / and /home/user mounting as different disks works?

2020-03-04 Thread Chris Laprise

On 3/4/20 10:19 PM, Guerlan wrote:

I'm curious about how Qubes does this:

mounts /home/user and other user-related directories from disk B
mounts the / from disk A, but when VM shutdowns, disk is discarded

I'm curious on how it mounts disk A. I don't think it makes a copy of 
disk A to a temporary disk A', because that'd move lots of gigabytes on 
every VM startup.
However, it also can't mount disk A as read-only, because I can write to 
it, it just gets discarded.
How does this work? And is it exclusive of Xen? Couldn't I do the same 
in KVM? It's very useful


As to whether this can be done with KVM, yes you can. But Linux vendors 
are very confused about which copy-on-write technologies to promote so 
they tend to push the least common denominator, which is partitions or 
VMDK files. OTOH, Qubes decided copy-on-write storage was too useful to 
ignore and integrated it into VM management functions.


You could use LVM thin pools with KVM, but IIRC you would have to 
automate snapshot handling yourself or find an additional package to do 
it (if such exists).


--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c207011a-9ad5-935c-f677-866c7aa0c831%40posteo.net.


[qubes-users] How Qubes / and /home/user mounting as different disks works?

2020-03-04 Thread Guerlan
I'm curious about how Qubes does this:

mounts /home/user and other user-related directories from disk B
mounts the / from disk A, but when VM shutdowns, disk is discarded

I'm curious on how it mounts disk A. I don't think it makes a copy of disk 
A to a temporary disk A', because that'd move lots of gigabytes on every VM 
startup.
However, it also can't mount disk A as read-only, because I can write to 
it, it just gets discarded.
How does this work? And is it exclusive of Xen? Couldn't I do the same in 
KVM? It's very useful

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f07befc1-78bf-4892-ae7a-acf3dc10dc13%40googlegroups.com.


Re: [EXT] Re: [qubes-users] Q: Monitoring Updates

2020-03-04 Thread Ulrich Windl

On 3/1/20 2:02 AM, unman wrote:

On Sat, Feb 29, 2020 at 07:40:02PM +0100, Ulrich Windl wrote:

Hi!

I noticed that update of templates is rather silent when using the Updater App. Opposed 
to that when I use "Update Qube" in the Qubes Manager, a text window opens 
showing actual progress of the update. Unfortunately the mechanism is different (i.e. no 
Managment DVM is being used).

Is there a way to follow update progress when using the Updater App?

Regards,
Ulrich



No.
The Updates does show you results from the update process. I do not know
what the Qube manager shows you that is different.



Well, you could have tried, but see attachment (debian-10, no updates 
found).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87fa9f9d-729b-d841-d007-b72918bb5fab%40rz.uni-regensburg.de.


[qubes-users] Segfault Error From Fail To Open Swarast

2020-03-04 Thread Angel Heelas
I am receiving an error on each time I try to run the program. The error is 
below:


`MESA-LOADER: failed to open swrast (search paths /usr/lib64/dri)
libGL error: failed to load driver: swrast
Segmentation fault (core dumped)`


I searched in the path of /usr/lib64/dri and discovered the file named 
swrast_dr.so in dri directory. Tried updating every thing but they all were 
already up to date. Also tried copying driver to lib folder of program but it 
was the same result.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/MWHPR0501MB38198ED84E42DB98A2324369A4E50%40MWHPR0501MB3819.namprd05.prod.outlook.com.


[qubes-users] Fedora30 doesn't update KeePassXC database

2020-03-04 Thread 'Merlin's Beard' via qubes-users
When I add a new entry to my KeePassXC database, the .kdbx-file is updated on 
the system (last modified timestamp is updated), but upon re-opening it the new 
entry is nonexistent. This happens on Fedora30 qubes, but Debian10 qubes work 
perfectly fine. The workaround for me is to simply not use Fedora30, but that's 
not ideal. I haven't tried to see if the same problem exist with other 
programs/files.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CXU2bL_RTyO_MX6pqBkwMLKgWTHxb9PUJlaNZ5nBRqQLpeEIsez6EOuZU6uXTXdvP_NStbt_JeQLQj3LQu0cvlsg8FELvzkYFz_uY0lK5ZI%3D%40protonmail.com.


Re: [EXT] Re: [qubes-users] the qubes clipboard

2020-03-04 Thread Ulrich Windl

On 3/1/20 1:37 AM, unman wrote:

On Sat, Feb 29, 2020 at 07:02:58PM +, 'Jackie' via qubes-users wrote:

Ulrich Windl:

Hi!

I'm very much confused with the Qubes OS clipboard:
When trying to copy some text from a Temrinal, I mark the text with the mouse then press 
"Ctrl+Shift+C", and I get a confirmation that the text is copied.
However when I try to paste the clipboard in another machine, the contents is 
not what I had marked.
When I use the "Edit->Copy" menu in the Terminal after having marked the text, and then 
press "Ctrl+Shift+C" again, the correct text is put in the Qubes OS clipboard.
Confusingly the Terminal displays the shortcut "Ctrl+Shift+C" for "Edit->Copy".

Isn't that a highly confusing feature (slowing down productive work a lot IMHO)?

Regards,
Ulrich


Hi,

In general, copying text from one VM to another is a four step process.
Highlight text in VM1 document and ctrl+C to copy to VM1 clipboard. Then
ctrl+shift+C to copy to dom0 clipboard. Then in VM2 window ctrl+shift+V to
copy to VM2 clipboard, then ctrl+V to paste into document.

It's pretty fast once you get used to it, just highlight, ctrl+C,
ctrl+shift+C, alt+tab, ctrl+shift+V, ctrl+V.

Terminal is a special case because ctrl+C, ctrl+V doesn't work to
copy/paste, and default terminal shortcuts are the same as qubes inter-vm
copy/paste shortcuts that take precedence. To paste text into terminal i
ctrl+shift+V like normal to copy into VM clipboard, then edit->paste to
paste into terminal. Or to copy from terminal, highlight, edit->copy, then
ctrl+shift+C to copy to dom0 clipboard.

Actually i think it's possible to change the dom0 shortcut so they no longer
conflict, but the occasional edit->copy or edit->paste in terminal isn't too
inconvenient for me.



Also, it depends (naturally) on *which* terminal you use.
I have little experience with gnome-terminal, which is, I think, what
op is using.


Yes, I'm using the "default" terminal which seems to be GNOME's.


Using xterm or uxterm, mouse selection *does* work to copy, and
Ctrl+Shift+C copies that text to clipboard for transmission to another
qube.
Does gnome-terminal need some extra configuration to enable "selection
by mouse"?



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6184144d-7d13-03ec-f4a1-2704f0e27023%40rz.uni-regensburg.de.