[qubes-users] qubes keeps shutting down randomly
it mainly seems to be around either updating a vm, vm shutting down, and once copying something to another vm. I tried to make sense of the logs, something about a writing to a read only config file. I'm using 3.2 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fcf168fa-7543-4048-a8a1-1e725ccfa9b0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Current Windows instructions?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-10 16:12, 3n7r0...@gmail.com wrote: > On Wednesday, August 17, 2016 at 12:43:27 AM UTC, Andrew David Wong wrote: >> >> So, as Marek said, in this particular case, the updated package has already >> been >> uploaded to the testing repo for 3.2. If you're on R3.2, and if you're >> willing >> to test this package (and you're certainly under no obligation to do so), >> then >> you can do so now by following the instructions here (under "Testing >> repositories"): >> >> https://www.qubes-os.org/doc/software-update-dom0/#tocAnchor-1-1-3 >> >> I believe the correct repo is current-testing. If so, your command would be: >> >> $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing >> >> >> If this is, indeed, the right place, then you can see a list of available >> packages here (or from the command line): >> >> http://yum.qubes-os.org/r3.2/current-testing/dom0/fc23/rpm/ >> >> The only packages containing the word "windows" are different versions of >> qubes-windows-tools, so I gather this is what you want. If that's correct, >> then the command would be: >> >> $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing \ >> qubes-windows-tools >> > > > Andrew, I don't see qubes-windows-tools 3.2.x in the > R3.1-current-testing repo. Is that an oversight or is QWT 3.04 the > last update for R3.1? I wouldn't expect R3.1 to get any new features > but if QWT3.2 is improving stability, it'd be great to get it if > possible. > That's a good question. I can confirm what you're seeing (in terms of what's available in the Qubes repos), but I'm not sure whether it's intended. Rafał, is QWT 3.2 supposed to be available in the R3.1 repo, or is it only for R3.2? - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX1KyYAAoJENtN07w5UDAwBIMP/0zlqkVIlAUKVdbZFN7onrHd XYZeKQYoCqm84CkgF2Uzgwq5FI025/au4zYgKnE4ISnBnLJXlXWal4Y9MA8wL0Yk rDmcBEcC8i1fLvyTYyqszJTXZeY1seG8fHfKz5DWTaegJD9topHBnJpaD3+oZnjz UsD7O3c3zefujgXABocy9cZG9HwtbK+SHbMVSVajgwpRhqeqAo+Ztt1ZN0aNj64n IABfilK6fFYdlZX+8GEw+oY5oahb0tvs5GUzJ+Fv1L3TXnpZw6HwjrF9B84nrpvh VpnoMkeh4tEZWoE2wCrv0bJVCXbWqwhZddAxx1625AJivXSglrQglyBVKs78nQ0P a9GxJyYZewFdNdFkoJ/pin/gFVSzimlqRShg/kJsfELFWxoO5iEj+xUcM0ozg5SK Azwsb2EGE83n/yitBrcBYek+9EmHdQiSYAI2OdIXwg/EDuUS3UarulKMkvcTCMDx yKoO/KDNFz8v2x63CVdWsijulT3hZeitqIoWomuzdt3Bj534x6pAIdv/BcMNnon/ sjwlefXsX/UMCTIwkQAwjAZGfQeu2xulAghis0sK9bOYfe7tVOmK02tO8wPf02My LqIHnQebJyEtJrgi8mMNIIcTvj5zxCqfITG6OEbj4HN6sJ087vqQBIzknkf/RnLA 92YN6+sSnDkzIGCaDvsB =/Vvj -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/98707cfd-150f-1abd-0ffe-20743999774f%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Installation problems?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-10 09:42, Jodie wrote: > Here it is, as lovely as that photo is. Thanks! > > On Friday, September 9, 2016 at 6:46:03 PM UTC-4, Andrew David Wong wrote: > On 2016-09-09 13:48, Jodie wrote: Version 3.1. What's annoying me is that I can't figure out why this is happening. I even have a terrible photo of the install error if you want to see it. I'm inclined to think that I'm doing something wrong, but can't tell what it is that I'm doing wrong. > > Yes, please share the photo of the error. > Thanks. Tracking here: https://github.com/QubesOS/qubes-issues/issues/2308 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJX1KrDAAoJENtN07w5UDAwaD8P/0A2HwRSJ7AvYN+a5niVPlDj TpSzEPiOtTBXPJ8WjmlWf3P9vcp34Smo+Omo8+W3KBW9HVo+qQnsHisgfQgygnfI Qnlu9qyQ6TS0LjSGtL1R5idPiAZcb4wdPLcxeyjSGPSrMaq49FHua1+3jzsLd27m 9CxAP62hNFWBwLHL5unm98IfRfeQ5mdFye1iSTiIN5pqWvEm9RYwXjnX/EjE7DSM R8zCPNVXzvTbxvsok2ErYV0UE1ZBKdbyPXtqz5mTiIz+yvQ34v94QXvJocNyoqKf Xq8NI6yVbgKbw5Pvfok2qKrI5TtrFWo+sT0NQbTTQI1sUyy+7XBSIL/wQRyufD18 pda6YVupnLZGgjz299anvGumQUQTpDEFM7VMa0Z3Lyc3jGnLaULKpDkpJftbrhoY LO3cyPsDSHEKo4iQwZvrN2YfvAkXEizDxnbGT9lFqR9KZiBaBs3EjqLWkUkVFsjY vL//GuIr1hDGOf5PP8610dWVVFfKqh4nF6vhUM2q8IMikN5Kxeh5Uyr4rSMyS5xe GEQ6WH9KU6n89zSJ82GrcrmRt3nRTEUwerqpswoiHVTdVEw4PfwpivFAkJP23eJg ksz6VoDUv2WGERZhef4ai9sXqDZjSvj0xLJc8RPW8hJzWeZU3T/xdMf9mfILR6hN VOSiKoZ7zMYvzNGP7HFH =dixp -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e0621621-d7b2-53eb-7bf9-29b2e31b7f61%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Current Windows instructions?
On Wednesday, August 17, 2016 at 12:43:27 AM UTC, Andrew David Wong wrote: > > So, as Marek said, in this particular case, the updated package has already > been > uploaded to the testing repo for 3.2. If you're on R3.2, and if you're willing > to test this package (and you're certainly under no obligation to do so), then > you can do so now by following the instructions here (under "Testing > repositories"): > > https://www.qubes-os.org/doc/software-update-dom0/#tocAnchor-1-1-3 > > I believe the correct repo is current-testing. If so, your command would be: > > $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing > > If this is, indeed, the right place, then you can see a list of available > packages here (or from the command line): > > http://yum.qubes-os.org/r3.2/current-testing/dom0/fc23/rpm/ > > The only packages containing the word "windows" are different versions of > qubes-windows-tools, so I gather this is what you want. If that's correct, > then the command would be: > > $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing \ > qubes-windows-tools > Andrew, I don't see qubes-windows-tools 3.2.x in the R3.1-current-testing repo. Is that an oversight or is QWT 3.04 the last update for R3.1? I wouldn't expect R3.1 to get any new features but if QWT3.2 is improving stability, it'd be great to get it if possible. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c842d6f8-d14f-4dcb-8893-809d7f8d26dc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Does anyone use a dedicated Tor router box..?
On Sat, Sep 10, 2016 at 03:23:54PM -0400, Chris Laprise wrote: > That also misses the point. yes, somewhat - thanks for making "the point" clearer! :-) > Xen is far smaller and simpler than the kernels that protect Windows and > Linux, and it has fewer vulnerabilities as a result. Its also worth noting > that a large number of Xen vulns are either not serious or don't affect > Qubes... they affect Xen installations configured for maximum features and > convenience. > > I think the problem Qubes has with the Xen project is that the latter merely > has a security "focus" (among others) instead of making security their > number-one priority (as Qubes does). It also doesn't help that they publish > additional bug-prone code which -- although secure installations like Qubes > won't trust it -- nevertheless gets reported as simply "Xen vulnerabilities" > when said bugs are discovered. I agree, thanks for spelling it out! -- cheers, Holger -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160910224211.GA11208%40layer-acht.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: Digital signature
Re: [qubes-users] Installation problems?
Here is the redhat help page for yum errno 256: https://access.redhat.com/solutions/203603 It looks like yum either cannot access or validate the rpm file shown (fedora template). Maybe a read error... What type of media did you create, and what is the capacity? You could try booting with another Linux distro like fedora, and examine the boot/install media and the rpm that its complaining about. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/17b8c5f8-3891-8562-ccd3-a23599bf79ee%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Post-install config networking failure - VMs cannot start, "Unable to reset PCI device 0000:02:00.0"
Hey everyone, I finally got around to setting up Qubes OS 3.1 onto an old laptop of mine - an Acer Aspire V3-571. The installation went smoothly, allowing the installer to set up all the default settings (and setting up the partitions so it allocated all space to the new OS, wiping the old drive), up until the end of the post-install configuration, where I was met with this error message: https://i.imgur.com/SblbJIC.jpg I continued the installation, and at this stage, whenever I try to start any of the VMs - including sys-net - I'm met with this response: https://i.imgur.com/VnX1FNJ.jpg I'm not terrified of the terminal, but I'm not entirely familiar with it either. I decided to run the two commands suggested in the post-install configuration. Below is "systemctl status qubes-netvm.service", followed by the first part of "journalctl -xn": http://i.imgur.com/FAe6Juu.jpg http://i.imgur.com/YrGfa1X.jpg Is anyone familiar with the problem, or have any recommendations on how to resolve it? Any information required, if you can let me know how I can access it, I'll happily provide it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/036148d5-f675-4845-859c-a26a64d2fa1c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Does anyone use a dedicated Tor router box..?
On 09/10/2016 07:31 AM, Holger Levsen wrote: Hi, On Sat, Sep 10, 2016 at 04:08:53AM -0700, neilhard...@gmail.com wrote: Qubes is insecure due to Xen exploits. [...] Considering that Snowden is literally advertised on the Qubes home page, I would suggest the answer is "Yes" The NSA is now very likely spending money buying up Xen exploits and developing them themselves. you are mostly right, but you also mostly miss the point ;-) Of course Qubes is attackable via Xen exploits. Like all the other OSes are attackable via *other* exploits, which attackers have been targetting since almost half a century already. The biggest and most valuable target is still Windows, then MacOS, and then an attacker also want to own Redhat and Debian, preferedly via holes in the source codes, to also catch all those other Linux distros. And, yes, Qubes is attackable via Xen. (And maybe, one would ignore all those OSes and just attack via Intel ME or the AMD and ARM equivalents of that..) So as said, you mostly missed the point. Security ain't binary. That also misses the point. Xen is far smaller and simpler than the kernels that protect Windows and Linux, and it has fewer vulnerabilities as a result. Its also worth noting that a large number of Xen vulns are either not serious or don't affect Qubes... they affect Xen installations configured for maximum features and convenience. I think the problem Qubes has with the Xen project is that the latter merely has a security "focus" (among others) instead of making security their number-one priority (as Qubes does). It also doesn't help that they publish additional bug-prone code which -- although secure installations like Qubes won't trust it -- nevertheless gets reported as simply "Xen vulnerabilities" when said bugs are discovered. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/37a4e30d-b4c6-0959-ce80-96abe96dbd6a%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't connect a VPN before Tor
[First, a rant. I hate mailing lists. How am I supposed to attribute quotes from earlier posts in the thread not contained in the previous post?] nishi: >Any advices on how to set up Qubes to have a VPN + sys-whonix working together >(or VPN + a TorVM proxy) in a good anonymous way would be really appreciated :) As you know, you can either connect to a VPN from a non-Whonix proxyVM or set up the VPN directly in the Whonix-Gateway. Both methods have the goal of preventing "unintentional" leaks and have the property of failing-closed. IMO, since you are using Qubes already, the proxyVM method is easier to configure and provides more flexibility. If you're short on RAM and/or need to operate multiple Whonix-Gateways with each having a separate VPN, you may be better off connecting to the VPN from within the Gateway. From a security/anonymity perspective, neither is obviously better than the other. A Gateway compromise would most likely be game-over in either scenario. Speaking generally, you've got a whole bunch of moving parts. You need to troubleshoot by isolating each piece. **This step reveals that you use Tor. Only proceed if safe to do so. 1. sys-net <- appVM: Do I have general connectivity? 2. sys-net <- vpn-VM <- appVM: Does my VPN work? 3.** sys-net <- appVM w/ Tor Browser Bundle: Does Tor work? 4.** sys-net <- whonix-gateway: Run whonixcheck. Does Whonix-Gateway work? 5. sys-net <- vpn-vm <- whonix-gateway My suggestion is to start with a fresh proxyVM and follow Chris' Qubes VPN documentation step by step. (Or take a look at his [git repo](https://github.com/ttasket/Qubes-vpn-support) ). If the vpn-VM allows successful connections from the appVM, then it's simply a matter of assigning it to the Whonix-Gateway as its netVM. No Whonix-specific configuration is necessary since it's all transparent to Whonix. * Make sure that the Qubes firewall (Qubes VM Manager) is open on the Whonix-Gateway. I don't remember what the default setting is. * Both TCP and UDP are fine for upstream VPNs. Tor can not carry UDP but it can be carried on UDP, if that makes sense. * Don't add any additional firewalls until you can get this working. nishi: >Which gives in Qubes something a pattern like this one below (I don't know if >all firewall VMs are really needed though) : > >AppVM => sys-vpn-firewall => sys-vpn => sys-whonix-firewall (or >TorVM-firewall) => sys-whonix (or TorVM) => sys-firewall => sys-net Firewalls have limited usefulness as described here: https://www.qubes-os.org/doc/data-leaks/ rustybird's Corridor can ensure that all traffic goes to a Tor Entry Guard (but obviously, can't guarantee that the Entry Guard is trustworthy). nishi: >When I purchased a VPN subscription, I saw it as a way to improve anonymity, >now I feel it is more a tool to provide security. VPNs don't necessarily improve anonymity OR security. They simply shift the trust that you place in your ISP to someone else. That may be good or bad. Chris: >Although its straightforward to get the opposite working (Tor -> VPN -> Internet -- just follow the Qubes vpn doc and connect sys-whonix to the vpn vm) Just to clarify, to achieve user -> Tor -> VPN -> Internet, sys-whonix needs to be connected as the *netVM* for the vpn-vm. If vpn-vm is the netVM for sys-whonix, the resulting traffic is user -> VPN -> Tor -> Internet. I may be forgetting something, but I believe both configurations work out of the box. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8ab52f16-0a3a-4acf-bcc7-ed6153ded7c8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Do Linux browser exploits exist..?
I've seen some dispute that a Linux browser exploit even exists. Like, could you take Chrome or Firefox to a page, and then have a remote shell, that loads a file onto the hard drive to monitor everything? I can do this with Metasploit on Windows, but I've actually seen a lot of people saying that it's not even possible on Linux. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4f493648-b51b-4459-aee2-c2d80881913d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HELLO
How are you today, is my pleasure to come in contact with you, please i have an urgency that i will like to share with you as soon as possible, i will be happy to read from you as soon as i can. Best regard Conima. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/VI1PR0901MB13904FD697AB5F6846225F7CA0FD0%40VI1PR0901MB1390.eurprd09.prod.outlook.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't connect a VPN before Tor
Le samedi 10 septembre 2016 04:57:17 UTC+2, Chris Laprise a écrit : > On 09/08/2016 04:41 AM, nishiwak...@gmail.com wrote: > > Hello, > > > > I am struggling to have VPN work while using it with Tor, I can't have both > > work. > > > > I tried first to follow Mrs. Rutkowska's tutorial on setting up a clear Tor > > proxyVM > > https://theinvisiblethings.blogspot.de/2011/09/playing-with-qubes-networking-for-fun.html > > but unfortunately I can't make it work. > > > > "QUBES_IP=$(xenstore-read qubes_ip)" line doesn't seem to work. If I > > replace "(xenstore-read qubes_ip)" with proxyVM's IP then script works but > > then I have to set up /etc/tor/torrc to achieve to connect Tor Browser in > > another AppVM. I guess this setup is too complicated for me. > > > > Then I read whonix documentation > > https://www.whonix.org/wiki/Tunnels/Connecting_to_a_VPN_before_Tor, to > > check what I need to do to avoid reinstalling my VPN into a whonix gateway > > and just use it as a proxy VM before Tor. > > Although its straightforward to get the opposite working (Tor -> VPN -> > Internet -- just follow the Qubes vpn doc and connect sys-whonix to the > vpn vm) there are wrinkles to iron out when getting it to work as you > describe. Indeed it is easier to make it work the other way, but problem is that even if I kinda trust my VPN provider, who claims not to keep connection logs, I don't like to have my connection go through 1 spot in 1 country (you can create multiple openvpn.conf file, but this is not very convenient to use). I guess this is irrelevant to look for anonymity with this bottle neck effect. When I purchased a VPN subscription, I saw it as a way to improve anonymity, now I feel it is more a tool to provide security. This is also why I put Tor browser as the #1 service to provide anonymity, because even if nodes exit might be observed, you still have possibilities to improve this aspect setting up bridges, besides Tor was created by the US Navy Research Laboratory, it is not a big surprise to me that the US were involved in this project. When you're talking about defense of freedom, how could one not show great admiration and love for the US. I know you have people to talk shit about US policies, that the US fucked up in Vietnam or Irak, but where would be Europe at right now if no young heroic US soldiers to sacrifice their lives to defend freedom and help beating nazi rats ? When I see rise of nationalism once again in Europe, I am just so ashamed. They don't know what's memory, what's bravery. They want another bloody tyrant on one continent in the future, they want the end of time ? Fuck this. Welcome the refugees, stop hating. > Since the solution is Tor-specific, probably the best place to start is > trying create the whole setup in Whonix-Qubes using the Whonix doc you > referenced. The Whonix forum should be able to help you with any > specific issues when following their directions. > > Chris Ok thank you, I'll find out what I can do setting up Whonix. Maybe this will fix my issue https://www.whonix.org/wiki/Bridges#How_to_use_bridges_in_Whonix -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a223e934-58d5-4cd8-ba29-35cc330b4858%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Does anyone use a dedicated Tor router box..?
Qubes is insecure due to Xen exploits. Qubes tends to quickly patch the exploits, but we know how it works in the real world... nation states and other people buy up the exploits before they can get to the market. I would also suggest that if you are using Qubes, this may even be a flag at somewhere like the NSA to target you for surveillance. I could be wrong, but see the NSA Snowden documents mentioning "extremist" Tails OS. So if you assume that simply using Qubes puts you on a nation state's attention list... then, at this point, the question is.. do you think the NSA has Xen exploits before everyone else finds out about them...? Considering that Snowden is literally advertised on the Qubes home page, I would suggest the answer is "Yes" The NSA is now very likely spending money buying up Xen exploits and developing them themselves. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6947f09a-c605-417c-b591-ec2a2d85f90e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Does anyone use a dedicated Tor router box..?
On Friday, 9 September 2016 09:56:36 UTC+1, neilh...@gmail.com wrote: > the problem with Qubes, of course, is all the Xen exploits which make it > insecure. Off-topic here but is Qubes really insecure? Should I be worried? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0bf7258b-b7c6-43e3-8e93-6068cf8e7614%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Split dm-crypt 0.1.0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > https://github.com/rustybird/qubes-split-dm-crypt If anyone has been using this already, please update to version 0.1.1 which contains a security bugfix. Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJX08IXXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfiXkP/296qW+raC+ku/86uRh4NIgx DFufItk6a7LE1uEHjSKWh2liM5oFu1kimOkYaewl9A7ZbDgVCJ767BRLvbPpvaER uNW/A9qnTojQ1wGIhqSUye0iChAfDHU8TfdkBofMP6bMIcNSZg+gdqJS1EpphSww uoyHk+flzvETf8WjbPiTJn5mUFITQw7U+Dpv/tbUCdmI2V1051AT3RpDShzTtfgT 5M94BNNT+BW4rZnCvPSWp2AgGJBXXwacQvizPRvwgqBfgOm/KNbHt8VSbcco/5tV uxM15x8fH66UpI8LxSXEkCgfpUoidBBcQKzWylzH3ggRQP9L/09Ph+iOCpWzU3SF yOuPVUaPpzRQbq7Rr1q5lZNFDVHTKew6PVZR5yYUm2eyJQerPYPU4InoTjQAM3te UkUjEWkdpCffACKL3DUpSavErkJefwadXIBPHssluTOwa4rGPm8kgJhm1rdZm3xj dTE4v25aR414Ty/VXOFzjwAHpdGbZvq3dbgQs0+GyCqjE8JSJps42a2XuUsGDypZ hsYrUFDiGBEmiIucgHed2gsEIahxM7p6lz3CTmghFD5skp+ngmnuNjEWFiuFD1UB lBAxmdljABI+VsrW7EGFJ3CuJv83pQOMy0HqwVeFehyeyWtkdxbcKqjbO676bKUG DZ1QuKeJzXatRJoX1ZPd =Fe+2 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bdb4d6e6-7ce6-3cea-4dea-aa8479f63bf6%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Split dm-crypt 0.1.0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Andrew! >> https://github.com/rustybird/qubes-split-dm-crypt > This looks great, Rusty! Thank you! I actually took the modern luksFormat parameters from your writeup at https://www.qubes-os.org/doc/encryption-config/. The 5 sec iteration time hits a nice balance. Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJX08FSXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfQZ4P+wY89oHl3mUBpv3JJHJyg+aU +XqBn37f3uMReCmXZUhoRZGkjFYV9HBStrKPYDT2Og3Tc56Lw6J/48m4Yb8rXMnh 6+i1HDYmqBA9CBGTCvFFv/+S85vWF9RGqTWYr8aqkX8YqxmbEFp0RU1qqXTK2Dm1 sO9YmWgMp+4R/qagdJ2OCG5Rrx/cAJEu53e51Y6YcAaJkvsY85z8XNYdo7gSOGTx WvDwRyAZT9GGxseeLzxu3S0cVyq+uWww6wtwNPnYl5DLFVeum3RlNDYvJDXm/+4X fTUvRJGLmMWHcs0/xQqgLjeIhFaAi/kNRI3OLi/jRx2bSQk4b6Pv9tEaVupmIwFF lGSv+IjQjLrGOvLxizV3ZLZQvLG/ZDX18BjCbZNZCHL6SqY8Yv2kOZMPNPa5BL+O /GEkc+ij89NeQPvr0Q42K++ypvO2XllxKA+U8YBAVbXMbDD+2SZF2H+eJeVzBAG0 Bs4ewKONNqTT3nGocX915tlj7+XW61OMQa0riiIY+5nt2/WrIWcUkIkLXzC7doPc 1Fkxc4170vgScYbJMnIMxIhR1DRvpLSuYNlscKUJyhFLh+sAkyXsTE3X+h/m+3pI hqdoMrJb+Jiz6ZdgE1zRb4ru/BIdUt8+V6AzcyWow/VB/hqGT6JSHBVtlJGqgd83 Aj6CMermoytakjKEMwaD =LfiK -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/716cac4a-1de8-8ef8-97e0-d07d72b88663%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.