[qubes-users] [unofficial] Qubes security advisory

2020-10-25 Thread 'J.M. Porup' via qubes-users
ww.jmporup.com/ [1] https://www.youtube.com/watch?v=fiaZaPwvz54 [2] https://www.youtube.com/playlist?list=PLmE_cQ9Hok0nv7RxYZ_xMJtZb216uvdxi [3] https://arstechnica.com/information-technology/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/ -- J.M. Porup www.JMPorup.com -- You rece

Re: [qubes-users] Qubes won’t boot (halp)

2020-07-29 Thread 'J.M. Porup' via qubes-users
On Wed, Jul 29, 2020, at 11:04, Mike Keehan wrote: > On 7/29/20 3:19 PM, 'J.M. Porup' via qubes-users wrote: > > hi everyone, > > > > My up to date Qubes 4 / Thinkpad X1 Carbon refuses to boot. > > > > Boot time to BIOS screen is 15 minutes or so. Bypassing B

[qubes-users] Qubes won’t boot (halp)

2020-07-29 Thread 'J.M. Porup' via qubes-users
the battery and CMOS battery. Should I reflash the BIOS? I see many many complaints online of similar problems, but all contains Windows-based solutions. Bricked right now. Would greatly appreciate any suggestions. thanks, jmp — J.M. Porup www.JMPorup.com -- You received this message because you

[qubes-users] pen testing / port forwarding guide?

2020-07-14 Thread 'J.M. Porup' via qubes-users
just to run `nc -nlvp ` seems... like a kludge, at best. Issue #4028 tracks this problem. The alternatives seem to be 1) create a HVM with direct access to hardware--no sys-net or firewall-vm--or 2) purchase a dedicated laptop for this use case. Any suggestions? thanks, jmp -- J.M. Porup

[qubes-users] muttrc decrypt pgp

2019-04-28 Thread J.M. Porup
hi, Current documentation (part of which I vaguely recall helping to write) suggests that the .muttrc decrypt command ought to be: set pgp_decode_command="qubes-gpg-client-wrapper --decrypt --status-fd=2 --batch %f" This command works fine at the command line, but fails in mutt, throwing the

Re: [qubes-users] split pgp not working in debian 9 vms

2019-04-04 Thread J.M. Porup
On Fri, Apr 05, 2019 at 12:25:30AM +0100, unman wrote: > On Thu, Apr 04, 2019 at 10:52:09AM -0400, J.M. Porup wrote: > > hi, > > > > Configuring split pgp for mutt on a Qubes 4 laptop using Debian 9 vms. > > > > split pgp works to sign documents from the email

[qubes-users] split pgp not working in debian 9 vms

2019-04-04 Thread J.M. Porup
which returns the error message: gpg: cannot open '/dev/tty': No such device or address I've been tinkering with this for several days, and am not finding a solution. Why is split pgp working for signing, but not encrypting? Any ideas? thanks! jmp -- J.M. Porup www.JMPorup.com -- You

[qubes-users] QSB #46: reinstalling debian-9 template

2019-02-01 Thread J.M. Porup
according to QSB #46, reinstalling debian-9 from repo qubes-template-community-testing should yield version qubes-template-debian-9-4.0.1-201901230644 but running sudo qubes-dom0-update --enablerepo=qubes-templates-community-testing qubes-template-debian-9 in Qubes 4.0.1 tells me

[qubes-users] gcc-plugins issue when installing vagrant on qubes

2017-10-22 Thread J.M. Porup
/0f2078fc8c52e7ddece1e5ba70c6d5fc [1] https://varyingvagrantvagrants.org/docs/en-US/installation/ -- J.M. Porup www.JMPorup.com -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, sen

Re: [qubes-users] Containing Twitter sessions

2017-06-27 Thread J.M. Porup
posable VM. Open links in a different disposable VM. hth jmp -- J.M. Porup www.JMPorup.com -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-user

[qubes-users] updating tor browser in whonix-ws dispvms

2017-02-26 Thread J.M. Porup
Is anyone else using whonix-ws based dispvms? Until recently, tor browser received updates via whonix repos. For some reason that seems to have stopped. The problem is that every time I open a new whonix-ws based dispvm, I'm prompted to download a new version of TBB. Doing so a dozen times a day

Re: [qubes-users] Re: files disappearing

2016-08-20 Thread J.M. Porup
On Sat, Aug 20, 2016 at 03:55:47PM -0700, Andrew David Wong wrote: > $ ll /var/lib/qubes/appvms// > > (If you have unaffected AppVMs, see if there is any pattern in differing > permissions.) Thanks for the suggestion, but a close look at the permissions doesn't reveal any difference with

Re: [qubes-users] Re: files disappearing

2016-08-20 Thread J.M. Porup
On Sat, Aug 20, 2016 at 05:56:39PM -0400, J.M. Porup wrote: > On Sat, Aug 20, 2016 at 05:29:19PM -0400, J.M. Porup wrote: > > files in three different vms have disappeared in the last week. > > In one case I lost work. > > > > previously I've seen a vm start without loc

[qubes-users] Re: files disappearing

2016-08-20 Thread J.M. Porup
On Sat, Aug 20, 2016 at 05:29:19PM -0400, J.M. Porup wrote: > files in three different vms have disappeared in the last week. > In one case I lost work. > > previously I've seen a vm start without local data, somehow it doesn't > "catch", usually a shutdown and r

[qubes-users] files disappearing

2016-08-20 Thread J.M. Porup
hi, files in three different vms have disappeared in the last week. In one case I lost work. previously I've seen a vm start without local data, somehow it doesn't "catch", usually a shutdown and restart solves the problem. In this case multiple restarts over multiple days is not working. what

Re: [qubes-users] Cryptsetup LUKS Nuke Option

2016-07-26 Thread J.M. Porup
On Fri, Jul 22, 2016 at 07:39:40PM -0400, Chris Laprise wrote: > But there is no need to patch LUKS to accomplish this, and using only > passphrases as the trigger mechanism is probably too cumbersome in some > situations anyway. > > This could be scripted with better results and flexibility for

[qubes-users] Xen exploit talk at Black Hat

2016-07-07 Thread J.M. Porup
https://www.blackhat.com/us-16/briefings.html#ouroboros-tearing-xen-hypervisor-with-the-snake Ouroboros: Tearing Xen Hypervisor with the Snake The Xen Project has been a widely used virtualization platform powering some of the largest clouds in production today. Sitting directly on the

Re: [qubes-users] dispvms + whonix template = broken in xfce

2016-07-01 Thread J.M. Porup
On Fri, Jul 01, 2016 at 08:17:25PM +0200, Marek Marczykowski-Górecki wrote: > On Fri, Jul 01, 2016 at 02:19:01PM -0400, J.M. Porup wrote: > > So I've been using dispvms based on the whonix-ws template in order to > > get disposable torbrowser working. > > > > This wor

[qubes-users] dispvms + whonix template = broken in xfce

2016-07-01 Thread J.M. Porup
So I've been using dispvms based on the whonix-ws template in order to get disposable torbrowser working. This works great in KDE, but when I switched over to xfce, dispvms refuse to start. The usual workaround is to rebuild the dispvm template, but that didn't work for me in xfce...so I've had

Re: [qubes-users] Installing XFCE

2016-07-01 Thread J.M. Porup
On Fri, Jul 01, 2016 at 11:02:49AM -0700, Micah Lee wrote: > I've installed Qubes 3.2-rc1 with only KDE. How do I install XFCE now as > well? The docs [1] about this look super outdated. A couple things that > I tried but didn't work: > > sudo qubes-dom0-update xfce4 > sudo qubes-dom0-update

Re: [qubes-users] Cryptsetup LUKS Nuke Option

2016-06-29 Thread J.M. Porup
On Wed, Jun 29, 2016 at 02:30:34PM -0700, flux wrote: > My thoughts were more along the lines of mitigative travel protection > crossing borders and such. Like, you can boot to decryption but if the device > is seized, no valid decryption can actually be performed. But as you say, > depending