Re: [qubes-users] Unable to assign audio device

2016-08-27 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-08-27 16:35, Adi Carlisle wrote: > Message in Qubes VM manager -- Error starting > VM: Internal error: Unable to reset PCI device :00:1f.3: no > FLR, PM reset or bus reset available -- > > The

Re: [qubes-users] Security Best Practice: Cache web passwords in custom VM's or not?

2016-08-27 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-08-27 08:59, Cube wrote: > Assume you have a disconnected Vault VM with your passwords, and a > Shopping VM where you access Amazon, etc. Highest security is to > copy/paste passwords over from the Vault as needed. Less secure > (but

Re: [qubes-users] HCL - Lenovo Thinkpad x260

2016-08-27 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-08-27 13:09, B, Pat wrote: > Following the Recipe > > https://www.qubes-os.org/doc/uefi-troubleshooting/ Note: The > recipe isn't quite correct, it says to hit 'e' from GRUB menu. The > 'e' option is only available after you select 1.

[qubes-users] Multiple monitors partially broken in Debian and Whonix AppVM's

2016-08-27 Thread Jeremy Rand
If I install LibreOffice in a Fedora 23 Template using Qubes 3.2, the "Presentation Display" setting works properly with no issues, so I can see my notes on my main display and the presentation shows up on my external display. However, this doesn't work properly under Debian 8 or Whonix 13. It

[qubes-users] HELP - Touchpad not working with Qubes

2016-08-27 Thread 'n/a' via qubes-users
Hi is there any thing I can do to get Asus g752vl touch-pad working in Qubes?  Also laptop has a  i7-6700HQ & a Nivda gtx 965m - can the igpu be made to work instead of the Nvida gpu? Thanks for any help! -- You received this message because you are subscribed to the Google Groups

[qubes-users] Unable to assign audio device

2016-08-27 Thread Adi Carlisle
Message in Qubes VM manager -- Error starting VM: Internal error: Unable to reset PCI device :00:1f.3: no FLR, PM reset or bus reset available -- The machine is from custom built from PCspecialist: Lafitte ii 13' Can someone help me with a workaround

Re: [qubes-users] Security Best Practice: Cache web passwords in custom VM's or not?

2016-08-27 Thread Cube
On Saturday, August 27, 2016 at 1:50:22 PM UTC-7, johny...@sigaint.org wrote: > BTW, keepassx rocks. I'm working on some scripts to make it a little less > painful with all the Ctrl-Alt-C and Ctrl-Alt-V'ing (which also conflicts > with the standard konsole paste shortcuts). I have no problem

Re: [qubes-users] HCL - Lenovo Thinkpad x260

2016-08-27 Thread 7v5w7go9ub0o
On 08/27/2016 08:09 PM, B, Pat wrote: Following the Recipe https://www.qubes-os.org/doc/uefi-troubleshooting/ Note: The recipe isn't quite correct, it says to hit 'e' from GRUB menu. The 'e' option is only available after you select 1. Troubleshoot 2. Boot from device Was able to install

[qubes-users] OSX

2016-08-27 Thread johnyjukya
Hey, does anyone have any luck with getting any form of OSX to fire up under Qubes? After several other failures, I was able to get some iPC ISO build to get to a certain point in an HVM, but the mouse didn't work, so I couldn't do much, and I couldn't figure out how to get it to any kind of

Re: [qubes-users] Security Best Practice: Cache web passwords in custom VM's or not?

2016-08-27 Thread johnyjukya
> On 08/27/2016 07:36 PM, Cube wrote: >> On Saturday, August 27, 2016 at 9:31:31 AM UTC-7, Alex wrote: >>> On 08/27/2016 05:59 PM, Cube wrote: For specific services (say, the >>> mentioned Amazon) I keep a keepassx database on the specific AppVM >>> in which the service is expected to be used -

[qubes-users] HCL - Lenovo Thinkpad x260

2016-08-27 Thread B, Pat
send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAFCr0KGP6z_Fa%3DPm6x9JoUcXZnOSfAewyS-dcDJRLDqmDh1r2g%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-LENOVO-20F6CTO1WW-20160

[qubes-users] Re: Why not a Whonix (or TOR) Disposible VM?

2016-08-27 Thread Cube
On Saturday, August 27, 2016 at 10:50:20 AM UTC-7, Cube wrote: > This would be more in the style of Tails - no persistent state. Wups, there is some thought on this already https://www.whonix.org/wiki/Qubes/Disposable_VM There are issues, anybody try this? -- You received this message because

Re: [qubes-users] Qubes VM compromised? - Follow up

2016-08-27 Thread 3n7r0py1
On Saturday, August 27, 2016 at 2:49:52 PM UTC, johny...@sigaint.org wrote: > >> Whether using an "isolating proxy" (multiple machines) or not, using a > >> white-listing proxy like Corridor can help ensure all of your traffic > >> passes through Tor (Entry Guard, at least). > >> > > > > That's

[qubes-users] Why not a Whonix (or TOR) Disposible VM?

2016-08-27 Thread Cube
This would be more in the style of Tails - no persistent state. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To

Re: [qubes-users] Security Best Practice: Cache web passwords in custom VM's or not?

2016-08-27 Thread Cube
On Saturday, August 27, 2016 at 9:31:31 AM UTC-7, Alex wrote: > On 08/27/2016 05:59 PM, Cube wrote: > For specific services (say, the mentioned Amazon) I keep a keepassx > database on the specific AppVM in which the service is expected to be > used - the Amazon account I use to buy work stuff is

[qubes-users] Re: Node.js global modules

2016-08-27 Thread Dave C
On Wednesday, August 24, 2016 at 6:17:39 PM UTC-7, angelo "angico" costa wrote: > Hi, all! > > I'm using Qubes 3.1 and I'm new with all this compartimented system idea. > > I use Node.js for my work and study, and several of its modules should to be > installed globally. My question is: Should

[qubes-users] Security Best Practice: Cache web passwords in custom VM's or not?

2016-08-27 Thread Cube
Assume you have a disconnected Vault VM with your passwords, and a Shopping VM where you access Amazon, etc. Highest security is to copy/paste passwords over from the Vault as needed. Less secure (but still highly secure) is to cache them in the Firefox database. What path do people generally

[qubes-users] Re: Burning a USB attached CDROM

2016-08-27 Thread Cube
On Friday, August 26, 2016 at 4:09:34 PM UTC-7, Connor Page wrote: > you should use the drive as normal in sys-usb. just make the private image > large enough and copy whatever it is you want to burn to that vm. Thanks! I had forgotten now that with Salt Qubes has a nice way of doing USB VM's.

[qubes-users] Re: WiFi NetVM works at first, then not on restart

2016-08-27 Thread Cube
Figure it out, documented here for others. The problem is for whatever reason the kernel module for my card (Intel laptop WIFI) wasn't being properly probed for and loaded. So I added the following line to /rw/config/rc.local and made the file executable cp /rw/config/iwlwifi-net.conf

Re: [qubes-users] Custom initramfs

2016-08-27 Thread Connor Page
after giving it a thought I decided keep usb devices out of dom0. the solution for debian is real 2FA but ykfde is for lazy people. I gave it as an example of dracut hooks. theoretically you can rearrange hooks so that yubikey authentification happens before rd.qubes.hide_all_usb is processed

Re: [qubes-users] Qubes VM compromised? - Follow up

2016-08-27 Thread johnyjukya
>> Whether using an "isolating proxy" (multiple machines) or not, using a >> white-listing proxy like Corridor can help ensure all of your traffic >> passes through Tor (Entry Guard, at least). >> > > That's right. Also, using Firefox with those extensions is *not* the same > as > using Tor

Re: [qubes-users] Qubes VM compromised? - Follow up

2016-08-27 Thread johnyjukya
> Am 25.08.2016 um 21:33 schrieb johnyju...@sigaint.org: > >> While it's a bit slower, I prefer booting from DVD, a read-only medium. > > There are verifyably hardware-controlled (physical switch) unwritable > USB storage devices. A bit expensive but you can get one. I might look into that, it

Re: [qubes-users] Qubes VM compromised? - Follow up

2016-08-27 Thread Achim Patzner
Am 25.08.2016 um 21:33 schrieb johnyju...@sigaint.org: > While it's a bit slower, I prefer booting from DVD, a read-only medium. There are verifyably hardware-controlled (physical switch) unwritable USB storage devices. A bit expensive but you can get one. Achim -- You received this message

[qubes-users] Re: Unable to get right X display for kali on HVM

2016-08-27 Thread a . felice68
Il giorno giovedì 4 agosto 2016 09:55:49 UTC+2, NewbieG ha scritto: > On Thursday, August 4, 2016 at 5:29:45 AM UTC, J. Eppler wrote: > > On Monday, August 1, 2016 at 8:58:56 AM UTC-5, NewbieG wrote: > > > Hello list, > > > > > > I'm running Qubes OS 3.1 and I'm trying to have a Kali VM (2016.1).

Re: [qubes-users] Custom initramfs

2016-08-27 Thread Raphael Susewind
> this is an interesting idea. initramfs is generated by dracut. read this > https://github.com/nj0y/ykfde/blob/master/README-dracut.md Yes, I gave ykfde a try. Problem is that Qubes still shows its custom FDE password screen on startup, and never the ykfde second factor one... (possibly - but