Re: [qubes-users] Is it possible to have 2 Net VMs - one for Ethernet, another for WiFi..?
On 09/23/2016 07:34 PM, neilhard...@gmail.com wrote: I want to have 2 Net VMs running at the same time. One would hold Ethernet in "Devices" The other would hold WiFi in "Devices" Is this possible? Yes, just don't assign the same PCI devices to the different vms. One vm should have only ethernet, and the other vm only wifi. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e33afa13-3124-c313-13c2-c7e246849365%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to add a "sys-firewall" to a NetVM..?
On 09/23/2016 08:02 PM, neilhard...@gmail.com wrote: I created a new NetVM to use debian8, rather than fedora-23 It all works fine. But I noticed that the original "sys-net" has a "sys-firewall" tied to it. Do I need to add something like this for my new Net VM, and if so, how do I do it..? Thanks You can just go into the settings for sys-firewall and change the template to debian and the 'netvm' to point to the new netvm. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2b0a0830-95bd-54bc-b35a-3a528958fd17%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Adding shortcuts to desktop for commonly used apps like untrusted firefox
On Friday, September 23, 2016 at 8:52:04 PM UTC-5, joe yuser wrote: > Hi, > > I'm a qubes-os newbie, so I'm probably missing something obvious, but am > asking to be sure. > > I can add additional icons in the xfce vm menus with no issues, but I can't > find a way to send a copy to the desktop. I don't know if I'm having a menu > or touchpad click issue, but I can only launch the app with a left click, or > straight into edit mode of the launcher with a right click. > > If I create a new launcher, put in the same values under edit, I can launch > the app in the vm I want, but the icon isn't available, only generic ones > without coloring. > > This is on an HP Envy 360. update: I am successful with icon & color if I copy launcher from /var/lib/qubes/appvms/untrusted/apps/ , just wondering if I'm missing a better way. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/21ae17b2-20fe-43cd-80e0-697deb9cf706%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Thunderbird: "Open link in DispVM"
Hello everyone, working with Qubes I think it is a good idea to open links from mails (Thunderbird) in a DispVM. This way you can open "verify registration" links without having the need to allow full internet access to the mail VM or using cross-VM c&p. I thought about writing a Thunderbird extension, but in fact it is even easier to do that. In settings-> attachments -> receive (or similar, I don't use the English Thunderbird version) you can set handlers for http, https and ftp. I could not figure out how to handle parameters properly, so I wrote a small "script"; Thunderbird calls (you dont need to enter the %url% string, it is appended automatically) run_dispFox.sh %url% This script utilizes the cubes tools by calling /usr/bin/qvm-run --dispvm firefox $1 and Firefox opens up in a DispVM. Now mail VM only needs access to the webserver and the update-servers of the thunderbird add-ons (usually AMO). BUT: I can only open up 1 URL at a time. If there is an DispVM with Firefox already, the URL will not be opened in Firefox in a DispVM (not in the existing window and not in a new one). -- M. Sc. Informatik Robert Mittendorf DigiTrace GmbH - Kompetenz in IT-Forensik Geschäftsführer: Alexander Sigel, Martin Wundram Registergericht Köln, HR B 72919 USt-IdNr: DE278529699 Zollstockgürtel 59, 50969 Köln Telefon: 0221-6 77 86 95-2 Website: www.DigiTrace.de E-Mail: i...@digitrace.de Haben Sie schon den DigiTrace-Newsletter abonniert? http://www.digitrace.de/de/service/newsletter DigiTrace ist Partner der Allianz für Cyber-Sicherheit sowie Mitglied im nrw.units Netzwerk für IT-Sicherheit: https://www.allianz-fuer-cybersicherheit.de http://www.nrw-units.de/netzwerk/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/45a823a4-8706-c58b-765d-081346b0ab90%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Adding shortcuts to desktop for commonly used apps like untrusted firefox
Hi, I'm a qubes-os newbie, so I'm probably missing something obvious, but am asking to be sure. I can add additional icons in the xfce vm menus with no issues, but I can't find a way to send a copy to the desktop. I don't know if I'm having a menu or touchpad click issue, but I can only launch the app with a left click, or straight into edit mode of the launcher with a right click. If I create a new launcher, put in the same values under edit, I can launch the app in the vm I want, but the icon isn't available, only generic ones without coloring. This is on an HP Envy 360. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/92d2bc40-c27d-4908-ac49-bc530f33dbe7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to add a "sys-firewall" to a NetVM..?
I created a new NetVM to use debian8, rather than fedora-23 It all works fine. But I noticed that the original "sys-net" has a "sys-firewall" tied to it. Do I need to add something like this for my new Net VM, and if so, how do I do it..? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/88743796-2866-4900-8ec6-3ced381fc0fc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Upgrade fedora 21 to 23
Hello After upgrading qubes 3.0 to 3.1 I needed to do the same with fedora template. I run this command: sudo qubes-dom0-update qubes-template-fedora-23 and this sudo yum remove qubes-template-fedora-21 I haven't considered the others explained in the tutorial "Upgrading the Fedora 21 Template" Is it the same? Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/563583566c388917fb75bd549ddccd86.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Is it possible to have 2 Net VMs - one for Ethernet, another for WiFi..?
I want to have 2 Net VMs running at the same time. One would hold Ethernet in "Devices" The other would hold WiFi in "Devices" Is this possible? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1825a2b3-2e29-4df1-89e5-20c57c37595b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Nix desktop shortcuts in dom0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Sep 23, 2016 at 04:53:10PM +0200, Marc Busqué wrote: > > It uses /usr/share/applications/ /usr/local/share/applications/ > > directly. > > > > Does Nix set $XDG_DATA_DIRS? > > I think it doesn't. At least, it didn't set it during my installation. > But it could be set manually. If it doesn't, supporting XDG_DATA_DIRS would not help with Nix. Current implementation simply assume default value, according to spec[1]: If $XDG_DATA_DIRS is either not set or empty, a value equal to /usr/local/share/:/usr/share/ should be used. [1] https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJX5Zg3AAoJENuP0xzK19cssTkIAJMRv/CE08ujWAtKXH2d6gAa gLtJ7X+XTOTSRLFlzg6ry7ndiiukFIHFzqmgIoPWTf3+9BpsBJKGWrLyY/hDmx+5 K5iUHkRXSd2DzKmDa6QMNZxsL3+NvIYSZzWxT4k9LJLCCjEWn0r1nX2h7OYcRwwE Nwhur4i3XouECfJ4iryYcbVkqWG0sVDGbGE1JaGrgtqqtVqNYFAt93wsbJpffIRK JqmjBTEczlHt+zgXiGJp2//4oXevfAN5ahF6UoGRXvI1AWfwnh0aLvxnCi9id6Mu 3jGttmLPQq85BSu9Klc8gLyrGBIxO2QBBORMdlzSjI+mvEewcR+cRZ+6/7GSn7g= =UrXO -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160923210143.GE31510%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] 3.0 to 3.1 in place upgrade broke USB VMs
The in place upgrade from 3.0 to 3.1 broke my two USB VMs (one controller with ports, one controller with devices) which were both set to auto start and working on 3.0. The error is similar to that where devices are assigned to another running VM - this is not the case however. livirt.libvirtError: Requested operation is not valid: PCI device xyz is in use by driver xenlight, domain usbvm sys-net still auto starts and everything else seems to work. Both VMs start fine without the USB devices assigned. I've tried hiding the devices from dom0 in case this made any difference using the kernel line in the docs, but this has made no difference. TIA -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ULyzjiM2Df5aepri0VxtxWHI2MoeVyJaqxvwKW3hJdBdKlHVpn5jeDbtZmsk0G69lRRdp-9vAoVpIID2ska-Pgn_pJ8DvJ0BzmrTV3I45sw%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Fullscreen mode and/or single mouse pointer with Linux HVM?
On Thursday, September 22, 2016 at 7:54:31 PM UTC-4, Andrew David Wong wrote: > There are certainly Qubes-specific customizations that will cause a Debian > TemplateVM (or StandaloneVM created from the Qubes Debian TemplateVM) to > be different from a Debian HVM. Thanks again. Just to clarify, there is no actual step required to create a StandaloneVM "from" a TemplateVM, correct? All I am doing is cloning the standard Debian 8 TemplateVM and then operating that TemplateVM independently, treating effectively it as a StandaloneVM. Meaning, installing software in it and then then running that software directly in/from it, instead of creating AppVM's based on it and running the software from those. If there is an extra step needed to transform a TemplateVM into a true StandaloneVM (not a full HVM) I am not aware of it, or doing it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/51efa6fe-5174-4d1c-b35a-c9e05a569a1b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to mount USB with ISO in Windows-Template
W dniu piątek, 23 września 2016 12:58:27 UTC+2 użytkownik martin.forum napisał: > Hello, > > I have successfully installed Qubes 3.2-rc3 (xfce yes) on a Lenovo Thinkpad > X1 Carbon (4th edition / 2016). After the installing issue, I have setup a > Win7 template by following the documentation. By the way - thank you for the > documentation! > > BUT - How can I mount an USB stick with an ISO-File in Win7 (to continue > installing required software)? > > If I have missed this answer in the documentation or my internet searchs, > please point me towards the answer;-) > > Thank you. > > Martin attach the block device to a VM and then use qvm-start Win7VMName --drive=NameofVMHoldingUSBStick/path/to/stick Alternatively create an iso out of it -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7eb93273-e56d-4a8d-acb0-b4014c276f6d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Nix desktop shortcuts in dom0
It uses /usr/share/applications/ /usr/local/share/applications/ directly. Does Nix set $XDG_DATA_DIRS? I think it doesn't. At least, it didn't set it during my installation. But it could be set manually. Furthermore, I don't see this variable set in debian and template VMs. I don't have "canonical" fedora/debian machines to test it there. If it is set there, I think qubes should follow the convention. But then, that variable should also be set in debian/fedora VMs. What do you think? Marc Busqué http://waiting-for-dev.github.io/about/
Re: [qubes-users] Re: Nix desktop shortcuts in dom0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Sep 23, 2016 at 06:45:43AM -0700, m...@lamarciana.com wrote: > Hi. Finally I get some light from the other side :) > > It seems that freedesktop Desktop Menu Specification defines an environment > variable which should contain a path with all directories with .desktop files: > > https://specifications.freedesktop.org/menu-spec/menu-spec-latest.html#paths > > $XDG_DATA_DIRS/applications/ > > This directory contains a .desktop file for each possible menu item. > Each directory in the $XDG_DATA_DIRS search path should be used (i.e. desktop > entries are collected from all of them, not just the first one that exists). > When two desktop entries have the same name, the one appearing earlier in the > path is used. > > The element in a menu file indicates that this > default list of desktop entry locations should be scanned at that point. If a > menu file does not contain , then these locations are not > scanned. > > I have looked at `qvm-sync-appmenus` and I don't see it reading that > variable. Can anyone confirm this point? Yes, I can confirm: [user@testvm ~]$ cat /etc/qubes-rpc/qubes.GetAppmenus find /usr/share/applications/ /usr/local/share/applications/ -name '*.desktop' -print0 2>/dev/null | \ xargs -0 awk ' BEGINFILE { entry="" } /^\[/ { if (tolower($0) != "\[desktop entry\]") nextfile } /^Exec=/ { entry = entry FILENAME ":Exec=qubes-desktop-run " FILENAME "\n"; next } /^NoDisplay *= *true$/ { entry=""; nextfile } /=/ { entry = entry FILENAME ":" $0 "\n" } ENDFILE { print entry } ' 2> /dev/null It uses /usr/share/applications/ /usr/local/share/applications/ directly. Does Nix set $XDG_DATA_DIRS? - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJX5TSyAAoJENuP0xzK19cscQUIAI2+H8DxFxl8Wd/XyadzMZkZ fjaPauYubkajzGLCmceuHYriNs1IFEYVTw98aYIq2Z23qdTJvyBt3FaQ6elj40Zr SSxUmF3b0mBCT428idn3v5LobmMrKNdjaLBZy0MNDY3dxWNRRfzHAuD+4Ohfvtsp W9UJAmbuivj8DbxG7w3OBMvdlUWBmP7kkcmNlO08557yOvOnA60Z2No3aRBaI6VO De7KEkM9vak/BFX1T9yHJquuTCQ3QPHM6spN7F2sJmnp5e1CxO00qdNj2FbZEZGF UcpNtO0Io7Qwefi/UieuFXvBlkny2DQri9Y404GE8xg4P2lRSGvK0oEFbI78b6Y= =VliW -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160923135706.GA31510%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Nix desktop shortcuts in dom0
Hi. Finally I get some light from the other side :) It seems that freedesktop Desktop Menu Specification defines an environment variable which should contain a path with all directories with .desktop files: https://specifications.freedesktop.org/menu-spec/menu-spec-latest.html#paths $XDG_DATA_DIRS/applications/ This directory contains a .desktop file for each possible menu item. Each directory in the $XDG_DATA_DIRS search path should be used (i.e. desktop entries are collected from all of them, not just the first one that exists). When two desktop entries have the same name, the one appearing earlier in the path is used. The element in a menu file indicates that this default list of desktop entry locations should be scanned at that point. If a menu file does not contain , then these locations are not scanned. I have looked at `qvm-sync-appmenus` and I don't see it reading that variable. Can anyone confirm this point? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b8d872e0-82ef-40d4-84c9-3ec843d9439a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] exit code 1 of qubes.RecieveUpdate, what does it mean? Failing to install dev packages in dom0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Sep 23, 2016 at 05:37:21AM -0700, tobbe...@gmail.com wrote: > Dear gods, > > I'm trying to install zfsonlinux in dom0. One of the first steps is to > install the packages needed to build the DKMS modules. > > I recieve exit code 1 and I don't know what to do. Needless to say I'm new to > Qubes. > > '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates > /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed > with exit code 1! > > Here are the details > > $ cat dom0installdev.sh > sudo qubes-dom0-update dkms kernel-devel zlib-devel libuuid-devel > libblkid-devel lsscsi bc autoconf automake binutils bison flex gcc gcc-c++ > gdb gettext libtool make pkgconfig redhat-rpm-config rpm-build strace > > $ bash dom0installdev.sh > Using sys-firewall as UpdateVM to download updates for Dom0; this may take > some time... > Running command on VM: 'sys-firewall'... (...) > '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates > /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed > with exit code 1! Check /var/log/qubes/qrexec.sys-firewall.log. I'd guess it is something about package signature verification. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJX5SysAAoJENuP0xzK19csViUH/393OTRWN1Ao73yBJcYP6z+s 3LIRZw1eFHQWXrhscmWU3dIzln03/HVT6TNaTnQ4ropAgZuqjLf7AGG1GeORhA3a F8GGZ62P+4GtPNll+AQRE94w/nio+towYYR1Jo0xPBa/3ybBtWq6EqqHDhN9i/CA Mq43IRh2R9t/9Fngw78Tf7YL60DDGbXlRgeW2X/DyTkY9ujr1XDdBjpuN+9NTj6y fq5BfPfsb3k9+WNyyahCl90/UnaxgbmBsItuYcFPIKko0hd0NKloe3I8a1m9MG7A vW2o+jVLA8bmCpHK09UR52qvg9a4JRqkIGImjG5jTQ2hxS8GRWqFF+kZo4/RSfQ= =L0XW -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160923132252.GZ31510%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] exit code 1 of qubes.RecieveUpdate, what does it mean? Failing to install dev packages in dom0
Dear gods, I'm trying to install zfsonlinux in dom0. One of the first steps is to install the packages needed to build the DKMS modules. I recieve exit code 1 and I don't know what to do. Needless to say I'm new to Qubes. '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed with exit code 1! Here are the details $ cat dom0installdev.sh sudo qubes-dom0-update dkms kernel-devel zlib-devel libuuid-devel libblkid-devel lsscsi bc autoconf automake binutils bison flex gcc gcc-c++ gdb gettext libtool make pkgconfig redhat-rpm-config rpm-build strace $ bash dom0installdev.sh Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time... Running command on VM: 'sys-firewall'... Last metadata expiration check: 14:18:18 ago on Thu Sep 22 23:55:13 2016. Package binutils-2.25-17.fc23.x86_64 is already installed, skipping. Package gettext-0.19.8.1-1.fc23.x86_64 is already installed, skipping. Package make-1:4.0-5.1.fc23.x86_64 is already installed, skipping. Package pkgconfig-1:0.28-9.fc23.x86_64 is already installed, skipping. Dependencies resolved. PackageArch Version Repository Size Installing: autoconf noarch 2.69-21.fc23fedora 709 k automake noarch 1.15-4.fc23 fedora 695 k bc x86_64 1.06.95-15.fc23 fedora 122 k bison x86_64 3.0.4-3.fc23updates684 k cppx86_64 5.3.1-6.fc23updates8.3 M dkms noarch 2.2.0.3-34.git.9e0394d.fc23 updates 82 k dwzx86_64 0.12-1.fc23 fedora 106 k elfutils x86_64 0.166-1.fc23updates304 k file x86_64 5.22-6.fc23 updates 66 k flex x86_64 2.6.0-1.fc23updates315 k fpc-srpm-macrosnoarch 1.0-1.fc23 updates7.8 k gc x86_64 7.4.2-4.fc23fedora 104 k gccx86_64 5.3.1-6.fc23updates 19 M gcc-c++x86_64 5.3.1-6.fc23updates9.8 M gdbx86_64 7.10.1-31.fc23 updates3.2 M ghc-srpm-macrosnoarch 1.4.2-2.fc23fedora 8.2 k glibc-develx86_64 2.22-18.fc23updates914 k glibc-headers x86_64 2.22-18.fc23updates497 k gnat-srpm-macros noarch 2-1.fc23fedora 8.4 k go-srpm-macros noarch 2-3.fc23fedora 8.0 k guile x86_64 5:2.0.11-7.fc23 updates3.9 M islx86_64 0.14-4.fc23 fedora 490 k kernel-devel x86_64 1000:4.4.14-11.pvops.qubes qubes-dom0-current 10 M kernel-headers x86_64 4.7.3-100.fc23 updates1.0 M libatomic_ops x86_64 7.4.2-9.fc23updates 32 k libbabeltrace x86_64 1.2.4-2.fc23fedora 151 k libblkid-devel x86_64 2.28-2.fc23 updates 76 k libipt x86_64 1.4.3-1.fc23updates 38 k libmpc x86_64 1.0.2-4.fc23fedora 55 k libstdc++-develx86_64 5.3.1-6.fc23updates1.8 M libtoolx86_64 2.4.6-8.fc23updates707 k libuuid-devel x86_64 2.28-2.fc23 updates 87 k lsscsi x86_64 0.28-2.fc23 fedora 56 k m4 x86_64 1.4.17-8.fc23 fedora 266 k mpfr x86_64 3.1.3-2.fc23updates214 k ocaml-srpm-macros noarch 2-3.fc23fedora 8.1 k patch x86_64 2.7.5-2.fc23fedora 123 k perl-Data-Dumper x86_64 2.158-347.fc23 fedora 55 k perl-Math-BigInt noarch 1.9997-354.fc23 updates189 k perl-Thread-Queue noarch 3.11-1.fc23 updates 22 k perl-generatorsnoarch 1.06-2.fc23 updates 15 k perl-srpm-macros noarch 1-17.fc23 fedora 9.7 k python-srpm-macros noarch 3-7.fc23updates8.1 k redhat-rpm-config noarch 37-1.fc23.1 updates 59 k rpm-build x86_64 4.13.0-0.rc1.13.f
Re: [qubes-users] BTRFS?
On 09/23/2016 08:00 AM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Sep 23, 2016 at 07:42:07AM -0400, Chris Laprise wrote: On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote: In fact, I think the right question is "Will Qubes 4 be compatible with btrfs root if vm storage is expected to reside on a LVM thin pool?" This is a good question. The new storage handling is flexible enough to allow writing a module to handle btrfs even better than in Qubes 3.x. But it is unlikely that we'll manage to write such module for 4.0. If someone would contribute such module, then yes - it will be supported. Otherwise, probably somehow around 4.1 or later. - -- You realize that some of us have been happily using btrfs features with Qubes in a way that produces better work flows? If ITL desires a modular storage layer, wouldn't the best approach be to offer a general image file module *first* to emulate the current architecture? That way, people can continue to have the same storage choices and backup procedures they already do. File backend is also available, but we haven't added new features to it (like multiple snapshots etc). Probably it could be easily extended to proper btrfs module (for example by dropping dm-snapshot over files and simply use cp --reflink=always). - -- Good to know there is a file back end. I also was thinking about having qvm-backup reference a particular 'backup' pool which points to a subvolume containing all the vms the user wishes to backup; Then differential backups could be done quite easily with 'btrfs send' without a lot of overhead. And vms could very easily be moved in/out of the backup pool/subvolume pairing. But that may be too filesystem-specific for the new storage layer. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c91f4586-a8a3-255d-f5fb-d5a177e05355%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] BTRFS?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Sep 23, 2016 at 07:42:07AM -0400, Chris Laprise wrote: > On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote: > > > In fact, I think the right question is "Will Qubes 4 be compatible with > > > btrfs root if vm storage is expected to reside on a LVM thin pool?" > > This is a good question. The new storage handling is flexible enough to > > allow writing a module to handle btrfs even better than in Qubes 3.x. > > But it is unlikely that we'll manage to write such module for 4.0. If > > someone would contribute such module, then yes - it will be supported. > > Otherwise, probably somehow around 4.1 or later. > > > > - -- > > You realize that some of us have been happily using btrfs features with > Qubes in a way that produces better work flows? > > If ITL desires a modular storage layer, wouldn't the best approach be to > offer a general image file module *first* to emulate the current > architecture? That way, people can continue to have the same storage choices > and backup procedures they already do. File backend is also available, but we haven't added new features to it (like multiple snapshots etc). Probably it could be easily extended to proper btrfs module (for example by dropping dm-snapshot over files and simply use cp --reflink=always). - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJX5RlQAAoJENuP0xzK19cs4aoH/05E83Jvm/cfoD8ZHmTRjRfF 1fhgf4BK1ErC38Vt2HlHjTM7aXO84uRrLI7t+gRkJ14KIPu+JAWh7PSwaTummI7j MH3EYNNEW/dMhm3eODAeLygFx78uhSzBTta0Y84eboe/uO/pLF0DRF2IwMSHOhhc UVLyRTD/rlJ/0Um95PV8XYd0ZqOyFNgh208yrB36YaxDxlTxeLdHijKsltjqYggh Z9C+MRwUm1SbPZYHjVMd8FmqJwy8R3dVJcqQzIM1jnO8B5bVULBOYSCxFGO8pX0d BC6qu92j1nFFELrUDhK/LZtuxbV0P8QMfP//cBAHM9G9Si3+Mjfu1Wgm6hkADCI= =+F6s -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160923120016.GY31510%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] BTRFS?
On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote: In fact, I think the right question is "Will Qubes 4 be compatible with btrfs root if vm storage is expected to reside on a LVM thin pool?" This is a good question. The new storage handling is flexible enough to allow writing a module to handle btrfs even better than in Qubes 3.x. But it is unlikely that we'll manage to write such module for 4.0. If someone would contribute such module, then yes - it will be supported. Otherwise, probably somehow around 4.1 or later. - -- You realize that some of us have been happily using btrfs features with Qubes in a way that produces better work flows? If ITL desires a modular storage layer, wouldn't the best approach be to offer a general image file module *first* to emulate the current architecture? That way, people can continue to have the same storage choices and backup procedures they already do. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3b8adced-078d-8776-93b6-a212eed2e186%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: BTRFS?
Thanks Rusty. People should be aware of this. I think I did reclaim all space but fiddled too much with the settings. Anyway, it was a good excercise, I learned about btrfs, LUKS and dracut, that wouldn't happen otherwise. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/395b69cc-e910-4e59-a921-6acdfd6627a2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to mount USB with ISO in Windows-Template
Hello, I have successfully installed Qubes 3.2-rc3 (xfce yes) on a Lenovo Thinkpad X1 Carbon (4th edition / 2016). After the installing issue, I have setup a Win7 template by following the documentation. By the way - thank you for the documentation! BUT - How can I mount an USB stick with an ISO-File in Win7 (to continue installing required software)? If I have missed this answer in the documentation or my internet searchs, please point me towards the answer;-) Thank you. Martin -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2D289599-C46C-4F44-B225-B5B98D5ADDA7%40web.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: BTRFS?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Connor, > The tricky bit was to put it on a LUKS partition as somehow the > installer encrypted only the swap partition. https://github.com/QubesOS/qubes-issues/issues/2294 has a workaround. Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJX5OYjXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfR4UP/R8OxIfFI7JyeIW6gazWUEkq IBdlvShyY5piOKSQO5RrEpcS5GXHjPPN1HqPn1Bt6FFQln5MAKkQsD6AaPE8nrjD OHzYU/G3fgXoPPJy8nupA3SANatESdKV+b2/JWP0o0+9/7HAYgzykeGlfaoa6BtH UuLHBVloagCaVKLjwX61KXHzf5Q+PJTm1ZAF2f8b9vY1vNPPJ+QKvXXr89n76p7W McQTVTrLuSzTLLL2KFXxC2uMuIlO1qxYDifUrHO1f//CmuF9XGP4pGLIfVigodbg We+1+2FbUqB6oB/WTHGLvbXhdrdgJHcZn7iUyXIbKcmncgo1wFZ0RYFq/rjzpCkX b3gyYTEBxBLj4AbIc28sqJm8bUjpinWAzWOv4j0dHKQqnBXX2N6YrCSsOPFkKpuv 2fGjIryyS1pPktpYS4Evv/mDquusnOIAqnEooNmz2MaC9kd6v2/Kl9IHpbXX9bSd MfIVaiAuWhFaRe9SUW4kIG5+dIEMkBCz2kNImdwfH2rNLOGTU2BvfcfvbpKmOxJy QDHKU5WixixM6KtuO9Gvh/UW9nT36RPtn2+1nev/HztDbTzItSBwqHhXCXUtfM9p weLEntmvVdQCLoKN+tRBd9NNiC+jlZbZtkmzUasi2GzL5japwrn42OeGlz0oSlh/ wvwrGWyDVaYlPxzN6Lye =7Jna -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/527c132e-e52b-51ab-0d35-0449b3d37962%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Dear qubes-users
Dear qubes-users, I am long time qubes follower and user. I apologize in advance if anyone feels this request is spam. I am looking for two invite codes needed to sign up to anonymous riseup.net email service. I am hoping there are some qubes users who are riseup.net account holders. Can anyone please send me a couple of invite codes that I might be able to sign up? Thank you in advance. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ba06c510-0fd3-4908-8f8c-802d54e0cb94%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] System still freezes, still no resolution.
Hello Drew, I'm tired of having to re-do the work that gets lost if files get corrupted or not saved properly, and also browsing information from things I'm doing. I share your frustration. Which computer are you using? Are your applications still running in the background (ie. only the graphical interface is frozen) or is it a complete system freeze? On my side I'm running Qubes on a Lenovo Thinkpad T500 and I just wrote a similar request as yours just a few days ago: https://groups.google.com/forum/#!topic/qubes-users/O4UO9CjO4TM On my side the graphical display is frozen, and with KDE I managed to workaround the issue by setting KWin to use XRender instead of OpenGL as compositing engine. After that the system became rock-solid and I never encountered such freeze anymore for months, while it happened about once a week until that. The sad thing is that Qubes has now switched to XFCE, the freezes came back and I do not know any equivalent setting on XFCE. I recently tried to completely disable compositing and am now crossing my fingers. Regards, Simon. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cbcb5184437ac80fb4bead50c187364c%40whitewinterwolf.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: installing Signal on Qubes mini-HOWTO
On Friday, 23 September 2016 07:56:15 UTC+10, dlme...@gmail.com wrote: > On Friday, 23 September 2016 04:11:33 UTC+10, se...@redhat.com wrote: > > On Thursday, September 22, 2016 at 3:57:01 AM UTC-4, dlme...@gmail.com > > wrote: > > > On Monday, 15 August 2016 20:43:18 UTC+10, pixel fairy wrote: > > > > On Sunday, August 14, 2016 at 3:22:30 PM UTC-7, Alex wrote: > > > > ... > > > > > 1. Install the Chromium browser in your appvm template - skip if you > > > > > were already using it. Shut down the template VM. > > > > > > > > I keep wondering how safe chromium browser is. do redhat or debian > > > > track updates in time with google-chrome? > > > > > > > > > Chromium in the supported Fedora template for Qubes (FC23) contains High > > > severity security bugs: > > > > > > FC23 = 52.0.2743.116-10.fc23. > > > FC24 = 53.0.2785.113-1.fc24. > > > > > > See: https://apps.fedoraproject.org/packages/chromium (for builds) > > > > > > Numerous security vulnerabilities, including High severity CVE's here: > > > https://googlechromereleases.blogspot.com.au/2016/09/stable-channel-update-for-desktop_13.html > > > > > > Newer RPMs available here, but haven't been tagged to either updates or > > > updates-testing for FC23: > > > > > > http://koji.fedoraproject.org/koji/buildinfo?buildID=802754 > > > > > > So what you're saying is we should move to Fedora 24. > > Sure. However, FC23 is still listed as a supported release: > https://fedoraproject.org/wiki/Releases#Current_Supported_Releases. Maybe > only "Critical" security fixes would make it to FC23 though, not "High" > (https://www.chromium.org/developers/severity-guidelines), but people likely > assume otherwise. Note also that Chromium is not listed as a Critical Path > package, unlike Firefox. Qubes 3.1 doesn't have an fc24 template. Qubes 3.2 won't be released with fc23 because it's too late in testing, but will (does currently for the RC) have an fc24 template available. It looks like chromium-53.0.2785.116-1.fc23 should now be in 'updates-testing' repo (since 2016-09-21 17:43:43Z), but it hasn't propagated far. Out of 6 mirrors in Australia, only one here even had the previous 53.0.2785.113-1.fc23.x86_64, in 'updates-testing', which is now ~8 days old. YMMV, but looks like Fedora needs to drop some consistently slow mirrors: https://admin.fedoraproject.org/mirrormanager/propgation Also, if fc23 users want Chromium, it needs package testers. https://fedoraproject.org/wiki/QA:Updates_Testing. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/638ea945-7e38-4d96-9e20-9e6d68e0b35c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] R3.2-rc2: random reboots on Lenovo T520 (workaround)
Hello Yaqu, Does anyone else have similar issue with i915? I have the impression that latest Qubes OS hardly supports i915 chipsets. On my side, on a Lenovo T500 after a normal boot process when the X server should start the screen goes blank and there is no more disk activity (no log either) letting me think of some deep crash / freeze somewhere. Hopefully this laptop offers a second ATI based graphical chipset, so once I solved Qubes/Fedora over-heating issue with this one (`radeon.dpm=1' for those interested) I managed to install an use Qubes. It can be worth to noting that on the same laptop I had no issue to use Qubes 2 with Intel i915 graphical chipset (this was actually my first workaround against the afore mentioned ATI over-heating issue), and that latest Fedora Live CD does not cause any issue either. So this i915 issue is really a Qubes or Xen specific issue. Moreover, if you check the issue list, you will find yet another issue still related to i915 handling, "Graphic woes / i915 - Intel Graphics 5500 on T450s": https://github.com/QubesOS/qubes-issues/issues/2232 Good luck... Simon. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ac5051e35648a5adae179654f545f1e8%40whitewinterwolf.com. For more options, visit https://groups.google.com/d/optout.