Re: [qubes-users] QSB #048: Multiple Xen vulnerabilities

2019-03-08 Thread unman
pvh -e hvm | wc -l > > should do the trick. It reports how many vulnerable VMs are on your > system. > > -AJ > It's somewhat easier to access the mode directly: qvm-ls -O NAME,virt_mode |grep -iw pv will show you the names of any pv qubes. unman -- You received this m

Re: [qubes-users] networked dvm for vault?

2019-03-07 Thread unman
s, with different levels of content. The most secure has no default disposableVM and explicit "deny" rules in every relevant policy. Lower content levels have lesser restrictions. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" gr

Re: [qubes-users] Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-03-05 Thread unman
On Mon, Mar 04, 2019 at 11:41:21PM -0500, Chris Laprise wrote: > On 3/4/19 8:59 PM, Sphere wrote: > > Thanks for this unman > > I tried the commands you suggested and it still ended up with the very same > > "Error: Unable to find a match" > > I'll track that

Re: [qubes-users] QUBES_GPG_AUTOACCEPT not being honored in 4.0

2019-03-04 Thread unman
On Mon, Mar 04, 2019 at 09:07:02PM +0100, cubit wrote: > > > > Mar 4, 2019, 3:10 PM by un...@thirdeyesecurity.org: > > > What shell are you using in gpg? > > Try putting the export line in .profile and restart gpg. Any different? > > > > That did the job.   I had it originally listed as I

Re: [qubes-users] Structure of qubes

2019-03-04 Thread unman
On Sun, Mar 03, 2019 at 09:51:05PM -0800, acharya.sagar.sag...@gmail.com wrote: > > Not sure of the answer, but all you should have to do to use that option > > is add it to your kernel= line. > > I think this is an important decision. I need to be sure. There are 2 > different ways to proceed

Re: [qubes-users] QUBES_GPG_AUTOACCEPT not being honored in 4.0

2019-03-04 Thread unman
On Mon, Mar 04, 2019 at 02:30:44PM +0100, cubit wrote: > Following a move from Qubes 3.2  to 4.0.1 I am struggling to get the split > key gpg to honor QUBES_GPG_AUTOACCEPT any more > > The rest of the split key functionality works as expected but it's very > frustrating the have

Re: [qubes-users] Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-03-04 Thread unman
On Sun, Mar 03, 2019 at 07:46:52PM -0800, Sphere wrote: > On Friday, March 1, 2019 at 8:38:07 PM UTC+8, unman wrote: > > On Thu, Feb 28, 2019 at 10:09:38PM -0500, Chris Laprise wrote: > > > On 2/28/19 8:30 PM, Sphere wrote: > > > > I was sure I double checked t

Re: Q menu cleanup ideas (was Re: [qubes-users] Best practices?)

2019-03-04 Thread unman
able, and a toggle at the top of the Manager to show/hide . It was lost in the transition to the Qube Manager. Put in a feature request on github for this. No: there's already one there: https://github.com/QubesOs/qubes-issues/issues/4005 unman -- You received this message because you are s

Re: [qubes-users] where/how does dom0 gets its icons?

2019-03-02 Thread unman
verter. You'll find there a function get_xdg_icon_from_vm which attempts to copy and sanitise an icon image from the template. For applications installed in qubes, have a look at: https://www.qubes-os.org/doc/managing-appvm-shortcuts/ So I think your hypothesis 1 is correct, and 2 is partly ri

Re: [qubes-users] Responding to the Whonix trolls...

2019-03-01 Thread unman
On Fri, Mar 01, 2019 at 07:27:08PM +, Achim Patzner wrote: > On 28.02.2019 15:10:21, "unman" wrote: > > > > On Thu, Feb 28, 2019 at 11:03:12AM +0100, Achim Patzner wrote: > > > On 20190227 at 22:30 -0800 cooloutac wrote: > > > > > > Whe

Re: [qubes-users] Re: Qubes: Unable to connect to VPN

2019-03-01 Thread unman
On Fri, Mar 01, 2019 at 01:47:22PM -0800, Otto Kratik wrote: > On Tuesday, February 19, 2019 at 2:53:22 PM UTC-5, Jon deps wrote: > > > https://www.qubes-os.org/doc/vpn/ > > > > I believe it would be helpful if you indicate which method you have > > used to create the VPNper the URL

Re: [qubes-users] Deleting debian-9 template and getting a new one returns an error: "Error: Unable to find a match"

2019-03-01 Thread unman
ly, if you want to do this manually, you can always grab from https://yum.qubes-os.org/r4.0/templates-itl/rpm. Download the package. Manully check the signature using "rpm -K" (You will need to get signing key and Qubes master) Transfer to dom0 install using "rpm -i " Much better t

Re: [qubes-users] Structure of qubes

2019-02-28 Thread unman
et connection, and updates (whether rpm or deb) run by proxy in an updateVM. https://www.qubes-os.org/doc/software-update-vm/ in the section on "Updates proxy" may help. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Responding to the Whonix trolls...

2019-02-28 Thread unman
On Thu, Feb 28, 2019 at 11:03:12AM +0100, Achim Patzner wrote: > On 20190227 at 22:30 -0800 cooloutac wrote: > > Whenever I accidentally read a posting by raahelps@ I'm wondering what > crime we committed to have to bear something like this and what could > be done to avoid attracting people like

Re: [qubes-users] Re: Oryx Pro laptop (BOOTX64.cfg for Qubes 4.0.1)

2019-02-28 Thread unman
On Thu, Feb 28, 2019 at 02:18:57AM -0800, Daniil Travnikov wrote: > On Wednesday, February 27, 2019 at 10:19:09 PM UTC-5, awokd wrote: > > Don't edit the ISO directly. dd or cp it to a USB drive (not partition), > > then follow the steps and mount the second partition and edit files in > >

Re: [qubes-users] Shrinking a private volume

2019-02-27 Thread unman
On Tue, Feb 26, 2019 at 10:30:35PM +0100, 799 wrote: > Hello, > > I've migrated ~150gb of data into a Qubes Storage Qube. > After cleaning up older files I have reduced the data to 100gb. > Now I'd like to free the additional 50gb so that dom0 can use this capacity > for other qubes. > You dont

Re: [qubes-users] Weird dnf update command behavior on fedora-29 template

2019-02-27 Thread unman
On Tue, Feb 26, 2019 at 06:54:15PM -0800, Sphere wrote: > It started happening just today > Executing sudo dnf update command on my fedora-29 template forcefully makes > my sys-net start > > But thing is, I'm no longer using sys-net template as my net vm and this > caused me to triple check my

Re: [qubes-users] "Qubes Update" tool - can you ignore a template

2019-02-25 Thread unman
On Mon, Feb 25, 2019 at 03:31:18PM +0100, cubit wrote: > Feb 25, 2019, 2:17 PM by un...@thirdeyesecurity.org: > > > Disable the qubes-update-check service. > > You can do this from qube manager or using qvm-service. > > I disable that service everywhere. > > > &

Re: [qubes-users] "Qubes Update" tool - can you ignore a template

2019-02-25 Thread unman
On Mon, Feb 25, 2019 at 02:22:53PM +0100, cubit wrote: > In the Qubes Update tool under 4.x,  is it possible to set a template to be > ignored for update checking? > > The reason for this is I like to keep the default installed "fedora-29" > template unused and work off a clone  "fedora live"

Re: [qubes-users] Qubes for enterprise usage

2019-02-24 Thread unman
ient-virtualization-part-2-how-client-vms-have-evolved > > Thank you! > > On Friday, February 22, 2019 at 1:23:29 PM UTC+2, unman wrote: > > On Fri, Feb 15, 2019 at 12:23:28PM -0800, tggrps wrote: > > > Hi all, > > > > > > Did anyone try to use Q

Re: [qubes-users] MTU setting for all interfaces

2019-02-24 Thread unman
it this in FORWARD rules - dont know if similar is available for nftables. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr.

Re: [qubes-users] Whonix Yes or No

2019-02-24 Thread unman
oes over tor. > > > > This is covered now here: > > https://hackmd.io/JIXLStC-Sbq8rr1mjomCDQ > > thank you for sharing this. Bernhard If you want a packaged solution with similar functionality for stretch, I package 3isec-tor at https://qubes.3isec.org Add the stretch repo

Re: [qubes-users] Whonix Yes or No

2019-02-24 Thread unman
On Sat, Feb 23, 2019 at 01:53:17PM -0600, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 19/02/2019 8.12 PM, unman wrote: > > On Sun, Feb 17, 2019 at 08:50:01PM +0100, r...@posteo.net wrote: > >> On 2/17/19 10:49 PM, jrsmi...@gma

Re: [qubes-users] How to connect to usb tethering of my mobile to sys-net qube

2019-02-22 Thread unman
On Thu, Feb 21, 2019 at 05:25:52AM -0800, acharya.sagar.sag...@gmail.com wrote: > I don't have a sys-usb. If I assign my usbs to sys-usb, then how will the net > VM have access to it? > Also according to Joanna here, networking stacks lie in NetVM >

Re: [qubes-users] Qubes for enterprise usage

2019-02-22 Thread unman
On Fri, Feb 15, 2019 at 12:23:28PM -0800, tggrps wrote: > Hi all, > > Did anyone try to use Qubes for enterprise use cases? e.g. for securing > access to sensitive resources? How did that end up? > > Last time I looked at Qubes, it didn't have enterprise manageability features > and required

Re: [qubes-users] Some VMs on an external disk (unavailable at boot)

2019-02-22 Thread unman
On Tue, Feb 12, 2019 at 07:37:51PM -0500, preill...@gmail.com wrote: > > > There was a page called this that I referred to.  > https://www.qubes-os.org/secondary-storage > > I don't see that page today. > It's at https://www.qubes-os.org/doc/secondary-storage -- You received this message

Re: [qubes-users] How to set individual VM swap?

2019-02-22 Thread unman
he partition size set for /dev/xvdc1 Since /dev/xvdc is 10G in size and only 1G is allocated to swap, an alternative (better?) would be to use that space. /sbin/swapoff -a /sbin/parted /dev/xvdc rm 1 /sbin/parted /dev/xvdc mkpart primary 0 10G -s /sbin/swapoff -a /sbin/mkswap /dev/xvdc1 /sbin/swapon -

Re: [qubes-users] how to setup gentoo or archlinux

2019-02-21 Thread unman
On Thu, Feb 21, 2019 at 12:24:00PM +, marmot-te wrote: > Hi > > I am stuck with gentoo with the following steps ... > -creating a HVM with gentoo ISO > -setup networking ... > many try in conf files without success > > And for archlinux, > I try to follow the official docs but this seems

Re: [qubes-users] Whonix Yes or No

2019-02-19 Thread unman
qubes-tor package is OK but with some tweaking makes a solid replacement for Whonix gw - certainly for live images and machines with limited RAM. imo the decision to deprecate that package and then remove all reference to it from the docs was a mistake. unman -- You received this message because

Re: [qubes-users] backup of files in a qube without networking to an internet service

2019-02-19 Thread unman
opy encrypted file to backup server. Advantage: All files secured in non-network qube. Disadvantage: ??? Is inter-vm copying of files really an issue? Free space such an issue? Using compressed backups should help mitigate this as a serious issue, but that problem would extend to *all* your Qubes us

Re: [qubes-users] How does Qubes DNS resolving work?

2019-02-15 Thread unman
On Fri, Feb 15, 2019 at 08:12:35AM +0100, ashleybrown...@tutanota.com wrote: > > Please don't top post. Take a minute to make it easier for other users. > > As is clear in another thread, there is a clear warning about DNS on the > > GUI firewall - I find it hard to believe that anyone could miss

Re: [qubes-users] Is it safe to install Qubes4 on laptop used windows10 before?

2019-02-14 Thread unman
st somewhat concerned then to be honest a simple wipe and install of Qubes would be enough. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

Re: [qubes-users] How does Qubes DNS resolving work?

2019-02-14 Thread unman
.0.0.0/0    10.139.1.1   udp dpt:domain to:X.X.X.X These are stateful firewalls that keep track of the packets passing through them. Sys-net returns the DNS result to sys-firewall and it's there that the response is matched to the request and sent back to the originating qube. hth unman -- You

Re: [qubes-users] How does Qubes DNS resolving work?

2019-02-14 Thread unman
On Thu, Feb 14, 2019 at 03:13:00PM +0100, ashleybrown...@tutanota.com wrote: > > > Hopefully one day they revert it back to how it was in 3.2. A very common > use-case for the firewall is likely to ensure things like DNS requests do not > happen through the normal means (and instead go over

Re: [qubes-users] Valid Concerns Regarding Integrity of Whonix Project

2019-02-14 Thread unman
On Thu, Feb 14, 2019 at 04:29:45PM +1100, haaber wrote: > Are canaries now "illegal" in Aussi law as well ??? > > On 2/14/19 3:26 PM, teresardavida...@gmail.com wrote: > > Summary: I have reason to believe the possibility that Mig5 (the new > > SysAdmin on Whonix project) could be compelled

Re: [qubes-users] why was DNS/ICMP removed from Qubes manager/firewall in R4?

2019-02-14 Thread unman
ther you should ever block ICMP at firewall level. Again, the benefit of having ICMP enabled is that basic network mechanisms are enabled, and basic diagnostic tools are available. It's a trade off between security and usability. As with *all* parts of Qubes, if you dont like the defaults chan

Re: [qubes-users] qvm-copy-to-vm question

2019-02-14 Thread unman
at file: qube1 qube2 allow In qube1 you can use qvm-move-to-vm qube2 foo and no prompt will appear. The prompt appears because either you have not specified a target qube or you have not given appropriate permissions. unman -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] How secure is a VM if a user tries to tampers it?

2019-02-09 Thread unman
On Fri, Feb 08, 2019 at 07:07:45PM -0500, Chris Laprise wrote: > On 2/8/19 5:12 AM, Francesco Frassinelli wrote: > > Feb 8, 2019, 10:42 AM by > qubes-...@tutanota.com > > : > > > Feb 8, 2019, 9:05 AM by frap...@gmail.com : > > > > > > >

Re: [qubes-users] Re: why mail-list?

2019-02-06 Thread unman
On Wed, Feb 06, 2019 at 10:15:54AM -0600, John Goold wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 2/6/19 1:12 AM, 'awokd' via qubes-users wrote: > > kitchm via Forum: > > > ... > >> It is currently illegal by federal law to clear your browser > >> history. > > > > Cite? >

Re: [qubes-users] Re: SECURITY ALERT

2019-02-05 Thread unman
On Tue, Feb 05, 2019 at 12:21:53PM -0500, kitchm via Forum wrote: > Andrew, thanks for that. Much appreciated. > > unman, this has nothing whatsoever to do with google groups, > and of course should not. Computer users know that to find > out about a canary, one always goes

Re: [qubes-users] USB qube when installed on external SSD

2019-02-04 Thread unman
On Mon, Feb 04, 2019 at 12:34:28AM -0800, newqubesu...@gmail.com wrote: > So, quick question that I can't find asked anywhere. I'm installing qubes. > Hopefully for the last time. I'm wondering if I can create the USB qube when > I'll be booting from an external SSD. I'm thinking no because it

Re: [qubes-users] Debian minimal template

2019-02-04 Thread unman
debian-9 > > > itself? Thank you, Bernhard > > > > > > > > > > The debian-9-minimal template in the templates-itl-testing repository > > (201901271906) is post-APT vuln. > > It is maintained in precisely the same way as debian-9 itself. > &g

Re: [qubes-users] How to do the extra configuration needed on a new template

2019-02-04 Thread unman
On Sun, Feb 03, 2019 at 10:16:55PM -0800, Sphere wrote: > So I got a new Fedora-29 template but the problem is that after assigning it > to sys-net/sys-firewall all it shows is something similar to what you when > you start a generic PC after BIOS POST. > > All that's in this link: >

Re: [qubes-users] Debian minimal template

2019-02-04 Thread unman
On Mon, Feb 04, 2019 at 04:47:44PM +1100, haaber wrote: > Hello, does someone know if the debian-9-minimal template is pre- or > post- APT-vulnerability? Is it being "maintained" as well as debian-9 > itself? Thank you, Bernhard > > The debian-9-minimal template in the templates-itl-testing

Re: [qubes-users] Borked template vm

2019-02-02 Thread unman
On Sat, Feb 02, 2019 at 03:27:00PM -0600, Stuart Perkins wrote: > > > On Sat, 2 Feb 2019 14:08:27 -0600 > Daniel Allcock wrote: > > >Hello all, > > > >I seem to have borked a template vm, to the point that no applications > >will start and I can't even use qvm-run from dom0 to do anything, not

Re: [qubes-users] Re: Mounting 'WD Unlocker' (Encrypted External HDD) Qubes 4

2019-02-02 Thread unman
On Sat, Feb 02, 2019 at 09:51:33PM +, 'awokd' via qubes-users wrote: > OGBaby wrote on 2/2/19 9:47 PM: > > On Saturday, February 2, 2019 at 1:57:42 PM UTC-6, OGBaby wrote: > > > How does one mount a 'My Passport Ultra' encrypted drive with qubes 4? > > > > How does one enter the pass-phrase

Re: [qubes-users] SECURITY ALERT

2019-02-02 Thread unman
On Thu, Jan 31, 2019 at 01:46:50PM -0500, kitchm wrote: > There has been no promised canary published, so users must > assume that the authorities have issued warrants to the > administration. > > Warning to everyone! I realise that you find the google groups mailing list difficult to deal with,

Re: [qubes-users] Debian Template APT Vulnerability - A ticking bomb?

2019-02-01 Thread unman
On Mon, Jan 28, 2019 at 01:44:37PM +, 'awokd' via qubes-users wrote: > unman wrote on 1/27/19 5:21 PM: > > (As an aside I'm always baffled by people querying > > how they can use Facebook under Tor or Whonix. What are they thinking?) > > There are good reason

Re: [qubes-users] why mail-list?

2019-02-01 Thread unman
On Thu, Jan 31, 2019 at 10:33:33PM -0300, Franz wrote: > On Thu, Jan 31, 2019 at 2:11 PM Stuart Perkins > wrote: > > > > > > > On Thu, 31 Jan 2019 18:01:58 +0100 (CET) > > 19hundreds <19hundr...@tutanota.com> wrote: > > > > > > > >I agree at some level with what you are saying however, the

Re: [qubes-users] Re: why mail-list?

2019-02-01 Thread unman
On Thu, Jan 31, 2019 at 09:47:33PM -0500, kitchm wrote: > The basic concept here is clarify what is being discussed. > There appears to be two things; one is how a mail-list works > and the other is how a mail-list is not as good as a forum. > > Being able to retrieve old e-mails assumes one has

Re: [qubes-users] Re: why mail-list?

2019-02-01 Thread unman
e the breakage.) All this is explained at: https://www.qubes-os.org/support/ To anyone who cant search their archived mail, just one word (two?):notmuch. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop

Re: [qubes-users] Re: Reversing dom0 testing repo installation

2019-01-31 Thread unman
honix or another Debian based UpgradeVM In that case, you can get a list of all the available versions: qubes-dom-update --action=list --showduplicates And then should be able to install a specific version: qubes-dom-update package-version It's a little more long winded, but you are exercisin

Re: [qubes-users] Re: hcl for qubes 4.0 or 4.0.1 is it good?

2019-01-31 Thread unman
On Thu, Jan 31, 2019 at 11:50:13AM +0100, Zrubi wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 1/31/19 11:45 AM, Panini Panini wrote: > > 16GB RAM doesnt work fine? and a ssd with 500gb instead of hdd will > > be more good? > > 16GB is fine, but the more is the better ;) > SSD

Re: [qubes-users] Debian Template APT Vulnerability - A ticking bomb?

2019-01-29 Thread unman
day, January 27, 2019 at 12:22:03 PM UTC-5, unman wrote: > To Billollib > > First, Its disappointing you didn't apologise for hijacking my thread. > > Second, you complain I misrepresented you in my summary. Perhaps you > forget writing the following: " I used to do >

Re: [qubes-users] Debian Template APT Vulnerability - A ticking bomb?

2019-01-27 Thread unman
On Sun, Jan 27, 2019 at 02:37:16AM -0800, goldsm...@riseup.net wrote: > On 2019-01-27 01:34, unman wrote: > > On Sat, Jan 26, 2019 at 04:39:45AM -0800, goldsm...@riseup.net wrote: > >> > >> Am I right in thinking that the recently discovered apt vulnerability > &

Re: [qubes-users] QSB #46: APT update mechanism vulnerability

2019-01-27 Thread unman
On Sun, Jan 27, 2019 at 03:33:11PM +0100, Alexandre Belgrand wrote: > Le dimanche 27 janvier 2019 à 13:11 +, Holger Levsen a écrit : > > I *believe* they probably misunderstood evil32.com and it's fallout. > > CAs and GNU/Linux distributions are #1 targets for national > intelligence

Re: [qubes-users] QSB #46: APT update mechanism vulnerability

2019-01-27 Thread unman
On Sun, Jan 27, 2019 at 01:11:37PM +, Holger Levsen wrote: > On Sun, Jan 27, 2019 at 12:54:26AM +0000, unman wrote: > > > Keep in mind that all PGP Debian/Ubuntu signing keys have been stolen > > Do you have *any* evidence for this claim? > > I *believe* they probably

Re: [qubes-users] Help installing package in template VM via snap

2019-01-26 Thread unman
On Sat, Jan 26, 2019 at 01:33:15PM +0100, 799 wrote: > Hello, > > I am trying to update my multimedia howto for Qubes and would like to use > a fedora-29--minimal template instead of debian. > > I try to install a package via snap but the template VM is not allowed to > access the repository: >

Re: [qubes-users] Debian Template APT Vulnerability - A ticking bomb?

2019-01-26 Thread unman
On Sat, Jan 26, 2019 at 04:39:45AM -0800, goldsm...@riseup.net wrote: > > Am I right in thinking that the recently discovered apt vulnerability > (DSA 4371-1) in Debian based systems could and should have been > mitigated against many years ago by downloading and activating an apt > package;

Re: [qubes-users] Re: looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-26 Thread unman
On Sat, Jan 26, 2019 at 09:39:47AM +0100, 799 wrote: > Am Sa., 26. Jan. 2019, 04:33 hat Andrew David Wong > geschrieben: > > > > > Please take a look at this issue: > > > > https://github.com/QubesOS/qubes-issues/issues/3571 > > > > Happy to see that this topic (no clipboard from dom0) is at

Re: [qubes-users] QSB #46: APT update mechanism vulnerability

2019-01-26 Thread unman
On Sat, Jan 26, 2019 at 11:42:27AM +0100, Alexandre Belgrand wrote: > Le mercredi 23 janvier 2019 ŕ 18:05 +0100, Marek Marczykowski-Górecki a > écrit : > > We have just published Qubes Security Bulletin (QSB) #46: > > APT update mechanism vulnerability. > > Keep in mind that all PGP Debian/Ubuntu

Re: [qubes-users] ssh giving me locale error

2019-01-24 Thread unman
On Thu, Jan 24, 2019 at 03:25:49PM +0100, Zrubi wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 1/24/19 3:00 PM, unman wrote: > > > I think you have a locale set in the qube whihc cannot be generated > > on the server. Can you check this by

Re: [qubes-users] ssh giving me locale error

2019-01-24 Thread unman
On Thu, Jan 24, 2019 at 04:58:26AM -0800, billol...@gmail.com wrote: > I have recently installed 4.0.1 with KDE Plasma as my Desktop. I tried to > ssh to another computer through my "untrusted" domain, and received the > following error. I don't have trouble talking to the site for other

Re: [qubes-users] diff files across appvms

2019-01-24 Thread unman
On Wed, Jan 23, 2019 at 08:15:53AM -0800, john.e.ma...@gmail.com wrote: > > unman, thank you for being so generous with your time. I appreciate the > education. Yes, I was looking in appvms. I'm starting to understand better > what needs to be done. I'll see how far I ge

Re: [qubes-users] Backup stops when the backup file reaches 3Gb

2019-01-24 Thread unman
On Thu, Jan 24, 2019 at 01:00:15AM -0500, Chris Laprise wrote: > On 01/23/2019 08:15 PM, js...@bitmessage.ch wrote: > > Mike Keehan: > > > Hi, > > > > > > I'm using Qubes Backup to save some of my qubes into another VM. > > > The backup VM has 18 Gb of storage available, but whenever the > > >

Re: [qubes-users] diff files across appvms

2019-01-23 Thread unman
On Wed, Jan 23, 2019 at 07:19:14AM -0800, john.e.ma...@gmail.com wrote: > On Wednesday, January 23, 2019 at 9:54:50 AM UTC-5, unman wrote: > > On Wed, Jan 23, 2019 at 05:38:42AM -0800, john.e.ma...@gmail.com wrote: > > > On Tuesday, January 22, 2019 at 8:18:48 PM UTC-5, unman wro

Re: [qubes-users] vault color (black?) & window decorations

2019-01-23 Thread unman
On Tue, Jan 22, 2019 at 08:05:03AM -0800, brendan.h...@gmail.com wrote: > On Tuesday, January 22, 2019 at 10:53:30 AM UTC-5, chuc...@gmail.com wrote: > > On Monday, October 15, 2018 at 8:07:38 AM UTC-5, awokd wrote: > > > bre...ail.com: > > > > Hi folks, > > > > > > > > Regarding the default R4

Re: [qubes-users] V3.2 script does not work on v4.01

2019-01-23 Thread unman
On Wed, Jan 23, 2019 at 11:43:39AM -0300, Franz wrote: > Hello > I moved to Qubes 4 and my script to start various VMs and programs, which > worked fine with V3.2, now just executes only the first command and stops > there. Why? > > Script > qvm-start untrusted > wmctrl -s 1 > qvm-run untrusted

Re: [qubes-users] Networking widget in KDE on qubes

2019-01-23 Thread unman
On Wed, Jan 23, 2019 at 06:21:44AM -0800, billol...@gmail.com wrote: > I recently installed 4.0.1 on my laptop and it seems to be working great, > though I'm still working through some of the how-do-you-copy-files stuff and > some of the networking stuff. But, it's just a different way of doing

Re: [qubes-users] diff files across appvms

2019-01-23 Thread unman
On Wed, Jan 23, 2019 at 05:38:42AM -0800, john.e.ma...@gmail.com wrote: > On Tuesday, January 22, 2019 at 8:18:48 PM UTC-5, unman wrote: > > On Tue, Jan 22, 2019 at 01:23:54PM -0800, wrote: > > > Is it possible to compare (diff) files across appvms. Or (and), is it >

Re: [qubes-users] Using Untangle as Qubes firewall

2019-01-22 Thread unman
On Tue, Jan 22, 2019 at 11:32:22AM -0800, scoobyscra...@gmail.com wrote: > Hello, > > I am new to Qubes running on 4.0. I would like to test the Untangle firewall > and have it run in place of sys-firewall and still use the default sys-net. > > I created the Untangle firewall as a HVM VM but

Re: [qubes-users] diff files across appvms

2019-01-22 Thread unman
On Tue, Jan 22, 2019 at 01:23:54PM -0800, john.e.ma...@gmail.com wrote: > Is it possible to compare (diff) files across appvms. Or (and), is it > possible to pass arguments to an appvm through a dom0 terminal. > > Basically, I want to check if a Keepassxc file in my vault is different than > a

Re: [qubes-users] hard disk locked after trial run

2019-01-22 Thread unman
On Tue, Jan 22, 2019 at 11:08:19AM +0100, Dieter Zakel wrote: > [image: IMG_3494.jpeg] > > On Tue, Jan 22, 2019 at 12:44 AM unman wrote: > > > On Mon, Jan 21, 2019 at 09:03:40AM -0800, Dieter Zakel wrote: > > > I have installed the Qubes-OS on my laptop as a trial

Re: [qubes-users] hard disk locked after trial run

2019-01-21 Thread unman
On Mon, Jan 21, 2019 at 09:03:40AM -0800, Dieter Zakel wrote: > I have installed the Qubes-OS on my laptop as a trial run and now I am unable > to install another OS. > Because dom0 is locked... > When trying to install linux the partitioning process freezes... > Has someone any idea how to

Re: [qubes-users] removal of debian-9 template fails because is marked as installed by packetmanager.

2019-01-21 Thread unman
On Tue, Jan 22, 2019 at 07:24:37AM +1100, Eric wrote: > > > > > > On 1/22/19 5:35 AM, gone wrote: > > > Hi, > I've done too many changes to my debian-9 template and would > like to reinstall a "pure", original debian-9 template > again. > So I cloned it and based

Re: [qubes-users] qvm-prefs clockvm command fails

2019-01-21 Thread unman
On Sun, Jan 20, 2019 at 11:16:17PM -0800, goldsm...@riseup.net wrote: > On 2019-01-20 23:57, unman wrote: > > On Sun, Jan 20, 2019 at 04:42:12AM -0800, goldsm...@riseup.net wrote: > >> I'm following qubes docs > >> https://www.qubes-os.org/doc/disposablevm-customizat

Re: [qubes-users] Updates Proxy questions and possible concern

2019-01-20 Thread unman
On Sat, Jan 19, 2019 at 07:55:17PM -0600, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 19/12/2018 6.37 PM, unman wrote: > > On Wed, Dec 19, 2018 at 11:06:25PM +, mossy wrote: > >> Hello all, > >> > >> I wa

Re: [qubes-users] Google Only Allows Foreign Language Login

2019-01-20 Thread unman
On Sun, Jan 20, 2019 at 11:26:42PM +0100, kit...@tutanota.com wrote: > It appears the mailing list interface at Google is not for English users.  I > cannot post or reply without a pop up window in a foreign language. > > Does anyone know how to get around this? > -- I guess you are connecting

Re: [qubes-users] USB Keyboard

2019-01-20 Thread unman
On Sun, Jan 20, 2019 at 11:16:10PM +0100, kit...@tutanota.com wrote: > Upon reading the system requirements and recommendations, I read the > statement "A non-USB keyboard or multiple USB controllers".  Please explain > the reasoning there.  Thank you. > Qubes offers USB isolation from dom0,

Re: [qubes-users] qvm-prefs clockvm command fails

2019-01-20 Thread unman
On Sun, Jan 20, 2019 at 04:42:12AM -0800, goldsm...@riseup.net wrote: > I'm following qubes docs > https://www.qubes-os.org/doc/disposablevm-customization/ and trying to > set clockvm to disp-sys-net using command in Dom0 qvm-prefs clockvm > disp-sys-net > which gives message: qvm-prefs: error: no

Re: [qubes-users] Re: Firefox Account SyncVM

2019-01-20 Thread unman
On Sun, Jan 20, 2019 at 07:52:42AM -0800, Mathew wrote: > Is sync bookmarks from a firefox account in a Qubes AppVM a bad idea ? > I think the main issues here are: Risk of individual bookmarks carrying identifying information. The range and variety of bookmarks being used to fingerprint users

Re: [qubes-users] sys-net & sys-firewall fail to start, new install

2019-01-18 Thread unman
On Fri, Jan 18, 2019 at 07:40:30AM -0500, Scott Lewis wrote: > Thanks but unfortunately I don't know that issue helps, as those who were > able to resolve it did so by updating which I cannot do since sys-net fails > to start. > > This issue, https://github.com/QubesOS/qubes-issues/issues/3349 ,

Re: [qubes-users] Mirage-Firewall - Trusted in Dom0?

2019-01-18 Thread unman
m0 > > What do you guys recommend? Can the MF developer be trusted? > > > > https://groups.google.com/d/msgid/qubes-users/21F0DB51-AF5A-4729-8708-14C54BB4C29A%40riseup.net?utm_medium=email_source=footer > In Nov 2018 a prominent member of the Qubes team; Unman suggested using > Mi

Re: [qubes-users] Physical network adapter vlan

2019-01-18 Thread unman
On Fri, Jan 18, 2019 at 02:00:44AM -0800, scarp...@gmail.com wrote: > Hi, > After checking the google group and documentation at cannot find any > information regarding the add of vlan on the public ip of the qubes os. > In my case i need to add 2 ip address on my physical interface of my

Re: [qubes-users] Firefox Account SyncVM

2019-01-17 Thread unman
On Thu, Jan 17, 2019 at 10:20:31AM -0800, R A F wrote: > Hi Everyone, > > I'm trying to find a way to sync firefox bookmarks but I do not want to use > firefox account. So my question to all of you is: > Does anyone knows if there is a possible way to create local account that > will be hosted

Re: [qubes-users] Renaming .desktop file side-effect

2019-01-16 Thread unman
On Wed, Jan 16, 2019 at 01:19:54PM -0800, John Goold wrote: > I encountered an "interesting" phenomenon which could be a defect (bug) or > expected behaviour (an odd "feature"). If a defect, it could be in the file > manager under Debian (Nautilus?). > > If I attempt to rename a file in

Re: [qubes-users] Keyboard and mouse issue (R 4.0.1)

2019-01-16 Thread unman
On Wed, Jan 16, 2019 at 08:31:37AM +0200, Ivan Mitev wrote: > > > > Not really a Fedora person. Probably not. :-( > > On the other hand, I *do* find a GUI way of setting the key under System > > Settings/Keyboard in KDE, and in Xfce, under > > SystemTools-Keyboard-Layout. > > Oh, you're right -

Re: [qubes-users] Re: Re: VMApp files from template

2019-01-16 Thread unman
On Wed, Jan 16, 2019 at 04:22:32AM -0500, Dave Albiston wrote: > Thanks for your patience, uman > > It is the exec line that is the problem. In the work domain > I can run the script using: > > sh /home/Scripts/myscript.sh > > I guess that the menu exec statement is being run in dom0. > So how

Re: [qubes-users] Re: VMApp files from template

2019-01-15 Thread unman
On Tue, Jan 15, 2019 at 08:26:00AM -0500, Dave Albiston wrote: > Thanks, uman > > I followed alternative instructions and the menu option is > provided by placing a .desktop file in > /usr/share/applications. This works and the command is > attempted. But it cannot find the script which is in the

Re: [qubes-users] Issues installing QubesOS on Samsung Gateway from bootable external hard drive

2019-01-15 Thread unman
On Tue, Jan 15, 2019 at 09:43:53PM +, 'learningtoday' via qubes-users wrote: > Hello everybody! > > Set up qubes on external hard drive to boot upon launch. Downloaded latest > version from [https://www.qubes-os.org](https://www.qubes-os.org/) > > Installer loads fine, proceeds with

Re: [qubes-users] Keyboard and mouse issue (R 4.0.1)

2019-01-15 Thread unman
On Tue, Jan 15, 2019 at 05:08:39PM +0200, Ivan Mitev wrote: > > > On 1/15/19 2:42 PM, unman wrote: > > On Tue, Jan 15, 2019 at 09:26:31AM +0200, Ivan Mitev wrote: > >> > >> > >> On 1/15/19 3:36 AM, jrg.desk...@gmail.com wrote: > >>&g

Re: [qubes-users] Debugging

2019-01-15 Thread unman
On Tue, Jan 15, 2019 at 09:26:29PM +0100, birdynam wrote: > Hi all, > > What's the best way to debug a appvm ? > > Thanks Set out clearly what the (perceived) problem is. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from

Re: [qubes-users] Keyboard and mouse issue (R 4.0.1)

2019-01-15 Thread unman
On Tue, Jan 15, 2019 at 09:26:31AM +0200, Ivan Mitev wrote: > > > On 1/15/19 3:36 AM, jrg.desk...@gmail.com wrote: > > KEYBOARD > > > > How do I set the "compose" key on the keyboard? I have run several Linux > > distributions (base on Debian/Ubuntu) for several years and have had no > >

Re: [qubes-users] VMApp files from template

2019-01-15 Thread unman
need more help, feel free to ask cheers unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To po

[qubes-users] Qubes 4.0.1 Live

2019-01-13 Thread unman
. There's a desktop shortcut to install, but it doesnt work (as yet). unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-user

Re: [qubes-users] Debian minimal template

2019-01-13 Thread unman
On Fri, Jan 11, 2019 at 04:25:00PM +0100, Zrubi wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 1/10/19 1:14 AM, unman wrote: > > If any one is interested there's a prebuilt debian-9-minimal > > template currently available in itl-testing. > > wou

Re: [qubes-users] Re: Can't open xterm from default fedora-29-minimal template

2019-01-13 Thread unman
On Sun, Jan 13, 2019 at 04:36:32PM -0800, Tonyt wrote: > On Sunday, January 13, 2019 at 7:11:33 PM UTC, 799 wrote: > > Hello, > > > > > > after I had some problems rebuilding my fedora-28 based templates with > > fedora-29, I re-installed the template using: > > > > > > sudo qubes-dom0-update

Re: [qubes-users] bind-dirs qubes 4.0.1

2019-01-13 Thread unman
On Sun, Jan 13, 2019 at 09:00:27PM +, Robert Rettig wrote: > > Hi, > > > > with the current 4.0.1 even the "How does it work?" section as mentioned > > here > > https://groups.google.com/d/msg/qubes-users/m0qWwToAi8w/phdwx1hSCQAJ > > cannot be applied. > > > > Maybe because the file

Re: [qubes-users] Using OpenBSD as Qubes firewall

2019-01-13 Thread unman
gards, If you search this list you'll see this has already been covered. You can install openBSD as HVM, and with some manipulation of basic Qubes networking, have it act as a netvm. Thus take place of sys-net or sys-firewall. You can find some notes that may help here: https://github.com/un

Re: [qubes-users] cannot qvm-remove fedora-29

2019-01-10 Thread unman
On Thu, Jan 10, 2019 at 10:23:04PM +0100, haaber wrote: > On 1/10/19 10:18 PM, gone wrote: > > Hello, > > > > I had problems with the new Version of fedora and therefore want to > > completely remove it before reinstalling. But that doesn't work although > > I switched all the templates and the

<    3   4   5   6   7   8   9   10   11   12   >