Re: [qubes-users] Q Diskmanagement partition?

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 11:15, '834'109438'1094328'0193284'098 wrote: > Hello, > > Q need enough free disk space in the root partition, as I found in the > documentation: > > https://www.qubes-os.org/doc/out-of-memory/ > > Check the disk space: > > df >

Re: [qubes-users] Can't update dom0?

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 12:10, Loren Rogers wrote: > I can't seem to update dom0 using the regular updater. The system keeps > telling me there are updates for dom0, but I can't get anything to actually > update. Is there something I'm missing here? > >

Re: [qubes-users] Re: error reporting

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-17 04:26, Salmiakki wrote: > Copy/Paste between dom0 and other domains is intentionally prohibited. > > https://www.qubes-os.org/doc/copy-paste/#copypaste-between-dom0-and-other-domains > > Or maybe you want this: > >

Re: [qubes-users] desktop sharing, capturing and screenshoting

2016-11-19 Thread Manuel Amador (Rudd-O)
On 11/19/2016 09:30 AM, Ray Brainer wrote: > I am having hard time to make desktop sharing in Qubes. > Within VM I see white screen. X server in VM does not allow screengrabs at all. Security measure. > Installing software on dom0 and using it in broadcast is denied. > What should I do? > dom0

Re: [qubes-users] Re: Qubes not shutting down

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 13:27, Loren Rogers wrote: > On 11/16/2016 02:33 PM, Grzesiek Chodzicki wrote: > >> W dniu środa, 16 listopada 2016 20:04:14 UTC+1 użytkownik Loren Rogers >> napisał: >>> Hi all, >>> >>> I've successfully installed Qubes on my

[qubes-users] desktop sharing, capturing and screenshoting

2016-11-19 Thread Ray Brainer
I am having hard time to make desktop sharing in Qubes. Within VM I see white screen. Installing software on dom0 and using it in broadcast is denied. What should I do? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this

Re: [qubes-users] vPro and Qubes

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 00:03, nezna...@xy9ce.tk wrote: > If i have intel processor with the vPro technology - should i afraid some > "factory vulnerabilities" of that technology and some manipulation with my > BIOS. Or security of Qubes is higher of that

Re: [qubes-users] Kernel 4.9 in Qubes

2016-11-19 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Nov 19, 2016 at 02:44:38AM -0800, Grzesiek Chodzicki wrote: > AFAIK Qubes uses only LTS kernels for both dom0 and templates. Will Qubes be > upgraded to the upcoming 4.9 kernel whenver final version is released? 4.9 is > supposed to be the

[qubes-users] Re: desktop sharing, capturing and screenshoting

2016-11-19 Thread pixel fairy
On Saturday, November 19, 2016 at 4:30:44 AM UTC-5, Ray Brainer wrote: > I am having hard time to make desktop sharing in Qubes. > Within VM I see white screen. > Installing software on dom0 and using it in broadcast is denied. > What should I do? what are you trying to do? dom0 has no internet,

Re: [qubes-users] Just Broke Debian-8 Template

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 04:37, Sec Tester wrote: > qvm-revert-template-changes debian-8 - didnt fix it. I tried to set an > earlier date, but --help file and man file didnt specific the option format. > qvm-revert-template-changes can only roll back

Re: Enigmial and Splig GPG2 (previously Re: [qubes-users] Upgrading from Split GPG1 to Split GPG2?)

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-17 10:05, cubit wrote: > 17. Nov 2016 15:33 by dmoer...@gmail.com: > >> On Wednesday, November 16, 2016 at 10:21:33 PM UTC-5, george wrote: >>> Yes. I get the same issue too. I can read the message, but I can't write, >>> and I'm also

Re: [qubes-users] Re: Trying to do an in-place upgrade from 3.1.17 to 3.2

2016-11-19 Thread Holger Levsen
On Sat, Nov 05, 2016 at 03:58:21PM +0100, Marek Marczykowski-Górecki wrote: > > > > p.s./btw: https://www.qubes-os.org/doc/upgrade-to-r3.1/ advices one to > > > > install qubes-mgmt-salt-admin-tools but this package does not exist?! > > > That's interesting, this step should be in 3.1->3.2

Re: [qubes-users] Re: Fedora 24 template available for Qubes 3.2

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-17 22:57, Sec Tester wrote: > Just pointing out that there documentation here needs updating to include > commands for fedora-24: > > https://www.qubes-os.org/doc/templates/ > Do you mean just the numbers ("23" to "24"), or have some

Re: [qubes-users] Replacing Dolphin on Whonix-ws

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-17 22:07, Sec Tester wrote: > I Really dislike Dolphin. Thumbnail previews dont even seem to work, and its > kinda annoying to use. I'd like to swap it out for something lite and simple > (like the fedora-23 file browser) > Thumbnail

Re: [qubes-users] isolated workflows - image converter - trusted jpg

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 12:48, Chris Laprise wrote: > What is the command to do the trusted image conversion? > The command is: qvm-convert-img (Requires Qubes 3.2) - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org

Re: [qubes-users] disable split-gpg notifications?

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-18 09:39, Michael Carbone wrote: > Marek Marczykowski-Górecki: >> On Fri, Nov 18, 2016 at 02:49:00PM +, Michael Carbone wrote: >>> Is there an easy way to disable split-gpg notifications? They are just >>> screen noise, and in XFCE

Re: [qubes-users] recommendation for a laptop to use windows in qubes?

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 02:35, Achim Patzner wrote: > Am 15.11.2016 um 14:46 schrieb Andrew David Wong: >> If you plan to be using the same machines for Qubes 4.x, you should also >> take into consideration the updated requirements for Qubes-certified >>

Re: [qubes-users] Firewall loading error after backup restore

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-19 03:53, Franz wrote: > Hello > After upgrading to 3.2 and backup restoring electrum VM, which had custom > firewall settings to connect only to electrum servers, I'm getting the > error documented in the enclosed photo. > > In the

Re: [qubes-users] sparse fedora template

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-18 15:31, Eva Star wrote: > Hello, > > is it possible to sparse fedora template like Windows template? How to fill > it with nulls before cleaning? > > I have this question because fedora-24 template 1 gb bigger after same > programs

Re: [qubes-users] Cryptsetup Vulnerability affects QubesOS?

2016-11-19 Thread Achim Patzner
Am 19.11.2016 um 12:54 schrieb Andrew David Wong: > By default, Qubes does not encrypt /boot. Traditionally, that's > because doing so would render the > system unbootable. However, that's no longer true with newer versions > of GRUB, which are now capable > of booting from encrypted block

Re: [qubes-users] recommendation for a laptop to use windows in qubes?

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-19 04:48, Achim Patzner wrote: > Am 19.11.2016 um 12:58 schrieb Andrew David Wong: >>> These requirements are probably the worst you can do for corporate >> users; they prefer "standard hardware"; even I would rather stop using >> Qubes

Re: [qubes-users] Cryptsetup Vulnerability affects QubesOS?

2016-11-19 Thread Fred
On 2016-11-19 11:54, Andrew David Wong wrote: On 2016-11-16 13:31, Fred wrote: A good time to ask if Qubes encrypts /boot in it's LUKS setup. I've not checked myself. By default, Qubes does not encrypt /boot. Traditionally, that's because doing so would render the system unbootable.

Re: [qubes-users] HCL - Lenovo X230

2016-11-19 Thread Aaron Jefferson
group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CANaC%2BvSTkvt2L7y40wNkR7ECK%3DkMPH-1V4qRfWG8sp%3DHG_rr0w%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-LENOVO-2325W4K-20161119-181318.yml Description: application/yaml

Re: [qubes-users] Cryptsetup Vulnerability affects QubesOS?

2016-11-19 Thread taii...@gmx.com
On 11/19/2016 02:31 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Nov 19, 2016 at 07:20:56PM +, Fred wrote: On 2016-11-19 11:54, Andrew David Wong wrote: On 2016-11-16 13:31, Fred wrote: A good time to ask if Qubes encrypts /boot in it's

Re: [qubes-users] Re: Android-x86 on Qubes

2016-11-19 Thread entr0py
Torsten Grote: > On 11/11/2016 06:01 PM, entr0py wrote: >> Thanks! With that, some progress... Deleting `> bus='xen'/>` from the config file results in usbtablet being >> replaced with ps/2 mouse device. > > I finally got around to try that and it works indeed! > >> Now, the pointer tracks mouse

Re: [qubes-users] HCL - Lenovo X230

2016-11-19 Thread Aaron Jefferson
Thanks, I'll check it out. On Sat, Nov 19, 2016, 18:06 Chris Laprise wrote: > On 11/19/2016 02:02 PM, Aaron Jefferson wrote: > > First boot wlan didn't work, second boot worked fine. > > > > > > > > Most X230s with that CPU have Vt-d capability, but the report says 'no'.

[qubes-users] HCL - Lenovo X230

2016-11-19 Thread Aaron Jefferson
VO-2325W4K-20161119-135504.yml Description: application/yaml

[qubes-users] Re: Thoughts on Qubes OS Security... Could be improved.

2016-11-19 Thread kev27
On Saturday, November 12, 2016 at 5:21:18 AM UTC+2, Sec Tester wrote: > So Im still new to Qubes, but after going through a bit of a learning curve, > building & customizing VM's to suit my security needs, I have a few thoughts > on its security. > > Firstly I really love the direction Qubes

[qubes-users] Re: How to block template vm? (prevent it from starting)

2016-11-19 Thread pleomati
you can build a tamplate and give im separate networking then if get some wrong just shut down networking that this template based. Lets say Tamplate X give networking X and than abandon networking X to separate Tamplate X from universe. -- You received this message because you are subscribed

Re: [qubes-users] How to block template vm? (prevent it from starting)

2016-11-19 Thread yaqu
On Sat, 19 Nov 2016 09:27:39 -0800 (PST), Pawel Debski wrote: > is it possible to somehow block a TemplateVM and all VMs based on > this template? > > I.e. whenever some app would be started in any VM involving this > template I'd like to get an error messages or at

[qubes-users] How to block template vm? (prevent it from starting)

2016-11-19 Thread Pawel Debski
Folks, is it possible to somehow block a TemplateVM and all VMs based on this template? I.e. whenever some app would be started in any VM involving this template I'd like to get an error messages or at least have the operation fail silently instead of having Qubes start the VM. Best regards

Re: [qubes-users] Re: Qubes not shutting down

2016-11-19 Thread Loren Rogers
On 11/19/2016 06:28 AM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-16 13:27, Loren Rogers wrote: On 11/16/2016 02:33 PM, Grzesiek Chodzicki wrote: W dniu środa, 16 listopada 2016 20:04:14 UTC+1 użytkownik Loren Rogers napisał: Hi all, I've

Re: [qubes-users] Cryptsetup Vulnerability affects QubesOS?

2016-11-19 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Nov 19, 2016 at 07:20:56PM +, Fred wrote: > On 2016-11-19 11:54, Andrew David Wong wrote: > > On 2016-11-16 13:31, Fred wrote: > > > A good time to ask if Qubes encrypts /boot in it's LUKS setup. I've > > > not > > > checked myself. > >

Re: [qubes-users] HCL - Lenovo X230

2016-11-19 Thread Chris Laprise
On 11/19/2016 02:02 PM, Aaron Jefferson wrote: First boot wlan didn't work, second boot worked fine. Most X230s with that CPU have Vt-d capability, but the report says 'no'. You may want to check your BIOS to make sure its switched on. This affects the security and operation of wlan,

Re: [qubes-users] HCL - Lenovo X230

2016-11-19 Thread Chris Laprise
On 11/19/2016 06:15 PM, Aaron Jefferson wrote: Hadn't turned it on. On Sat, Nov 19, 2016 at 6:08 PM, Aaron Jefferson > wrote: Thanks, I'll check it out. On Sat, Nov 19, 2016, 18:06 Chris Laprise

Re: [qubes-users] HCL - Lenovo X230

2016-11-19 Thread Aaron Jefferson
Thanks On Sat, Nov 19, 2016, 19:46 Chris Laprise wrote: > On 11/19/2016 06:15 PM, Aaron Jefferson wrote: > > Hadn't turned it on. > > > > On Sat, Nov 19, 2016 at 6:08 PM, Aaron Jefferson > > > wrote: > > > >

[qubes-users] HCL - Surface Pro 3 (i5-4300U 4Gb)

2016-11-19 Thread Johannes Zipperer
/d/msgid/qubes-users/1249599975.32906.1479610107263%40office.mailbox.org. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-Microsoft_Corporation-Surface_Pro_3-20161119-225602.cpio.gz Description: application/gzip Qubes-HCL-Microsoft_Corporation-Surface_Pro_3-20161119-225602.yml Description: application/yaml

[qubes-users] Problem creating Win7 HVM

2016-11-19 Thread Sec Tester
So using the VM manager i created a Win7 HVM (not a HVM template) I copied over the Win7.iso to a the user directory in dom0 using "qvm-run --pass-io 'cat /path/to/file_in_src_domain' > /path/to/file_name_in_dom0" And ran "qvm-start win7 --cdrom=/home/myusername/Win7.iso" =

[qubes-users] Re: Kaspersky OS

2016-11-19 Thread Fabian Wloch
I don't like this project at all to be honest. First thing is that it's closed source, which means he can prove exactly *nothing* to me in terms of security. As long as I can't check, I don't believe. Sorry. Second: He writes it's hacking proof, which is impossible to proof. Yes, maybe it's

[qubes-users] Re: Kaspersky OS

2016-11-19 Thread Sec Tester
Wow just been reading about Kaspersky OS. Dam maybe this could be a new super hardened VM for Qubes..? Apparently not even based on Linux tho, built from the ground up, 14 year project. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: Enigmial and Splig GPG2 (previously Re: [qubes-users] Upgrading from Split GPG1 to Split GPG2?)

2016-11-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-11-19 03:43, Andrew David Wong wrote: > On 2016-11-17 10:05, cubit wrote: >> 17. Nov 2016 15:33 by dmoer...@gmail.com: > >>> On Wednesday, November 16, 2016 at 10:21:33 PM UTC-5, george wrote: Yes. I get the same issue too. I can read

Re: [qubes-users] Re: Android-x86 on Qubes

2016-11-19 Thread Torsten Grote
On 11/11/2016 06:01 PM, entr0py wrote: > Thanks! With that, some progress... Deleting ` bus='xen'/>` from the config file results in usbtablet being > replaced with ps/2 mouse device. I finally got around to try that and it works indeed! > Now, the pointer tracks mouse movements automatically

[qubes-users] Kaspersky OS

2016-11-19 Thread '02845'2894'502'45028'45'280'
Hello, is the new Kaspersky OS programmed with integral securiy able to be a solid foundation of some stateless laptop? Or is it using just the standard chipsets the the known hardware backdoors? Kind Regards -- You received this message because you are subscribed to the Google Groups

Re: Enigmial and Splig GPG2 (previously Re: [qubes-users] Upgrading from Split GPG1 to Split GPG2?)

2016-11-19 Thread Daniel Moerner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/19/2016 06:43 AM, Andrew David Wong wrote: > Sorry, this is a known issue. Enigmail 1.9 is incompatible with > Split GPG on Debian 8: > > https://github.com/QubesOS/qubes-issues/issues/2170 > > Until this is resolved, I recommend using the