Re: [qubes-users] Install Problem // existing lvms

2017-01-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-04 00:43, haaber wrote:
> Hi, I have for years debian running on my machine: /boot on a usb
> key, the /root on a 32g SSD and /home on a HDD. All filesystems are
> fully encrypted. I want to give qubes a try, at least, if I can
> install it :) So I first made a full home backup, and a full dd
> take of the SSD drive. That way I hope to be able to "turn back" if
> install fails. Also, I can overwrite the SSD without fear entirely,
> which is necessary since otherwise there is not enough space.
> 
> I made the installer delete the SSD volume and use it as root, but
> then it is unhappy with available space. It wants 250g somewhere -
> which is OK, it may use the hdd. But somehow here I get stuck,
> warnings and abandoned the install. Can I preserve the existing
> encrypted HDD volume (providing the passphrase) on install ?
> 
> Thank you for any hint / clarifying question / comments !
> 

You can certainly have a secondary encrypted HDD and carry it over
from a previous installation to a new Qubes installation. I did this
myself recently when installing 3.2. I simply didn't touch the
encrypted HDD during my installation.

However, your case sounds different. It sounds like want to both (a)
use this HDD as an installation target for Qubes and (b) keep a
pre-existing encrypted volume on it. In principle, this should be OK,
as long as you're careful not to overwrite the encrypted volume with
your new Qubes installation. You may want to do some manual
partitioning before presenting this disk to the Qubes installer.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=/OSn
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff82c766-f482-3051-d576-6e4a144c6836%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to set file association in disposable VMs?

2017-01-04 Thread Robin Green
On Wed, 4 Jan 2017 at 00:16 Unman  wrote:

> Did you actually read that bug report?


Yes.


> I'm amazed it's still open.
>
> I assume that you are using a Fedora template


Yes.


> since 'mimeopen'
> works for a vanilla Debian template.
>

I don't think the Fedora template uses mimeopen directly any more.


>
> For Fedora based dvms, the dvm does NOT pick up the association from the
> template. It's therefore necessary to customize the DispVM: there are
> instructions for doing this in the docs.
>
> In brief, for a fedora-24-dvm:
> qvm-run -a fedora-24-dvm xterm
>
> In the dvm:
> mimeopen -d test.pdf
> touch /home/user/.qubes-dispvm-customized
> sudo halt
>
> Regenerate DispVM template using qvm-create-default-dvm:
> qvm-create-default-dvm fedora-24
>
>
> I haven't tested this with Okular, but it works for setting other default
> applications. Can you confirm it with Okular?
>

No, it doesn't. I tried both ways of settings the file associations.
Neither works.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CACVBcp4mP%2BzuMmVajNTKSgnwsq81R-MN6Ecb_rDWU6KgFhU6ZQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to set file association in disposable VMs?

2017-01-04 Thread Unman
On Tue, Jan 03, 2017 at 08:42:37PM -0800, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-01-03 16:16, Unman wrote:
> > On Tue, Jan 03, 2017 at 08:57:58AM +, Robin Green wrote:
> >> On Tue, 3 Jan 2017 at 03:14 Unman  wrote:
> >>
> >  Original Message 
> > Subject: [qubes-users] How to set file association in disposable VMs?
> > Local Time: December 29, 2016 7:48 PM
> > UTC Time: December 29, 2016 11:48 AM
> > From: gree...@gmail.com
> > To: qubes-users 
> >
> > I have configured Nautilus in an AppVM to open PDF files with Okular,
> >>> and
> > I've then done the same configuration (as user "user") in the
> >>> TemplateVM
> > that the disposable VMs are also based on. However, when I choose
> >>> "Open in
> > disposable VM" from that reconfigured AppVM, even though the dispvm
> > savefile is updated before launching the dispvm, it still uses the
> >>> default
> > PDF viewer instead of Okular.
> >
> >
> > Sounds similar to this:
> >
> >
> >>> https://groups.google.com/forum/#!searchin/qubes-users/open$20in$20dvm|sort:relevance/qubes-users/GZ2zWcoMuwc/vwAzmYS5DgAJ
> >
> > --WillyPillow
> >
> >>>
> >>> You don't say *how* you have changed the association.
> >>>
> >>
> >> I changed it using Nautilus, by right-clicking on the file, Properties.
> >>
> >>
> >>> Try changing the file association in the template:
> >>> mimeopen -d file.pdf will allow you to set the default application.
> >>> Close down the template.
> >>> Then make sure the dvm file is regenerated before opening the dispVM,
> >>> as you have done.
> >>>
> >>
> >> That didn't work either. Please note, as noted already in this thread, this
> >> is a known bug.
> >>
> > 
> > Did you actually read that bug report? I'm amazed it's still open.
> > 
> 
> Would you mind explaining why you think it should be closed?
> 
> > I assume that you are using a Fedora template since 'mimeopen'
> > works for a vanilla Debian template.
> > 
> > For Fedora based dvms, the dvm does NOT pick up the association from the
> > template. It's therefore necessary to customize the DispVM: there are
> > instructions for doing this in the docs.
> > 
> > In brief, for a fedora-24-dvm:
> > qvm-run -a fedora-24-dvm xterm
> > 
> > In the dvm:
> > mimeopen -d test.pdf
> > touch /home/user/.qubes-dispvm-customized
> > sudo halt
> > 
> > Regenerate DispVM template using qvm-create-default-dvm:
> > qvm-create-default-dvm fedora-24
> > 
> 
> If this solves the problem in the aforementioned issue, we can add this
> to the documentation (as a way of closing that issue).
> 
> > 
> > I haven't tested this with Okular, but it works for setting other default
> > applications. Can you confirm it with Okular?
> > 
> 

I'm amazed it is still open because it is a subset of customizing the
dispVM template which is already well documented. 
This method works for switching between the apps I use - for PDF
between evince and xpdf. Robin reports it doesnt work for Okular, so we
should look at why that doesnt work when other programs do. I'm not
familiar with that program, (or nautilus generally), but the principles
of dispVM opening are quite straightforward.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104122858.GA31162%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to set file association in disposable VMs?

2017-01-04 Thread Unman
On Wed, Jan 04, 2017 at 10:00:35AM +, Robin Green wrote:
> On Wed, 4 Jan 2017 at 00:16 Unman  wrote:
> 
> > Did you actually read that bug report?
> 
> 
> Yes.
> 
> 
> > I'm amazed it's still open.
> >
> > I assume that you are using a Fedora template
> 
> 
> Yes.
> 
> 
> > since 'mimeopen'
> > works for a vanilla Debian template.
> >
> 
> I don't think the Fedora template uses mimeopen directly any more.
> 
> 
> >
> > For Fedora based dvms, the dvm does NOT pick up the association from the
> > template. It's therefore necessary to customize the DispVM: there are
> > instructions for doing this in the docs.
> >
> > In brief, for a fedora-24-dvm:
> > qvm-run -a fedora-24-dvm xterm
> >
> > In the dvm:
> > mimeopen -d test.pdf
> > touch /home/user/.qubes-dispvm-customized
> > sudo halt
> >
> > Regenerate DispVM template using qvm-create-default-dvm:
> > qvm-create-default-dvm fedora-24
> >
> >
> > I haven't tested this with Okular, but it works for setting other default
> > applications. Can you confirm it with Okular?
> >
> 
> No, it doesn't. I tried both ways of settings the file associations.
> Neither works.
> 

Can you confirm it works for switching between xpdf and evince?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104123016.GB31162%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to set file association in disposable VMs?

2017-01-04 Thread Unman
On Wed, Jan 04, 2017 at 10:00:35AM +, Robin Green wrote:
> On Wed, 4 Jan 2017 at 00:16 Unman  wrote:
> 
> > Did you actually read that bug report?
> 
> 
> Yes.
> 
> 
> > I'm amazed it's still open.
> >
> > I assume that you are using a Fedora template
> 
> 
> Yes.
> 
> 
> > since 'mimeopen'
> > works for a vanilla Debian template.
> >
> 
> I don't think the Fedora template uses mimeopen directly any more.
> 
> 
> >
> > For Fedora based dvms, the dvm does NOT pick up the association from the
> > template. It's therefore necessary to customize the DispVM: there are
> > instructions for doing this in the docs.
> >
> > In brief, for a fedora-24-dvm:
> > qvm-run -a fedora-24-dvm xterm
> >
> > In the dvm:
> > mimeopen -d test.pdf
> > touch /home/user/.qubes-dispvm-customized
> > sudo halt
> >
> > Regenerate DispVM template using qvm-create-default-dvm:
> > qvm-create-default-dvm fedora-24
> >
> >
> > I haven't tested this with Okular, but it works for setting other default
> > applications. Can you confirm it with Okular?
> >
> 
> No, it doesn't. I tried both ways of settings the file associations.
> Neither works.
> 

You're right that the mimeopen method doesnt work for okular, although I
wonder if this is a matter of getting the command right.

However, setting okular as default application in nautilus in
fedora-24-dvm, and then regenerating the DispVM template DOES work, at
least for me.
Can you check again with the xpdf/evince switch, and then add okular to
the mix?

One thing I have noticed - for some reason it's best to restart
nautilus in the qube, before opening a file in a dispVM.

Andrew - can you test also and report back?

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104142631.GA31999%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Computer Models Guaranteed to work with Qubes 4.0?

2017-01-04 Thread taii...@gmx.com

On 01/03/2017 04:01 PM, 'James Funkhauser' via qubes-users wrote:


I would like to start saving up for a desktop that will run 4.0 out of the box. Price 
isn't really an issue; what's important is that I have a computer that meets all the 
standards necessary for running 4.0. I have looked at the HCL list, but none of the 
machines have been tested with 4.0 (which I understand, given that it is still in alpha). 
Would it be sufficient to just get a machine with one of the processors listed in the 
ark.intel link on your site's "Minimum requirements for 4.x" page? Or could I 
even just replace my current processor with one of those listed there?

Otherwise, if anyone can point me toward a machine (or better yet, a few 
different machines) that will meet all the necessary requirements, run the OS 
with sufficient hardware isolation, etc., I would be most grateful. Thanks in 
advance for your time.


You'll want a KGPE-D16 motherboard with a 62xx series processor.

It is blob free coreboot compatible and it supports user defined TPM 
CRTM (tpm addon sold separately)


I have one and it is great, supports IOMMU for graphics as well.


Any recent intel isn't going to support libre anything.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/875b6ddc-69a4-ca01-baad-e431eff27f35%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to attach a Yubikey as a normal, extra usb keyboard only to specific AppVMs?

2017-01-04 Thread @LeeteqXV (Twitter)

I have followed this guide: https://www.qubes-os.org/doc/usb/

And I can see the Yubikey, and attach it to the AppVM, then see that it 
is attached to the AppVM with the qvm-usb command.


However, nothing happens inside the AppVM when I push the Yubikey button 
to send the password to the field with the cursor, neither in a browser 
window nor in Gedit.


As far as I know, the Yubikeys are identifying themselves as a 100% 
standard keyboard without the need for any driver on any system, so the 
push of its button should be understood by the Qube to be normal 
keyboard key presses.


What may be wrong?

Regards,

@LeeteqXV

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/88bab5fe-383b-8b32-8336-4e2d2bfaa955%40leeteq.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Application menu edits

2017-01-04 Thread Patrick Bouldin
Hi, I have looked and can't seem to find advice or documentation on manually 
removing old deleted VM shortcuts and/or deleted shortcusts from the 
Applications start button. I saw Application finder, didn't see a clean way 
there.

Any hint?

Thanks,
Patrick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b1171c4a-de6f-4e28-b66b-48949ab74f44%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Trouble reading data CD under Qubes

2017-01-04 Thread raahelps
On Saturday, December 31, 2016 at 7:06:46 AM UTC-5, Pawel Debski wrote:
> W dniu niedziela, 4 grudnia 2016 00:48:36 UTC+1 użytkownik Marek 
> Marczykowski-Górecki napisał:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> > 
> > On Sat, Dec 03, 2016 at 03:21:48AM -0800, Pawel Debski wrote:
> > > Folks,
> > > 
> > > I have a PC with two SATA controllers: primary master holds my SDD with 
> > > Qubes, while secondary master has CD drive attached.
> > > 
> > > When I insert a data CD it gets mounted by dom0 and the files are 
> > > accessible. I do not want to open these files in dom0 however. So in the 
> > > VM Manager I right click my favourite perssonal-full-sw appVM that I 
> > > created previously and select:
> > > 
> > > Attach/detach block devices -> Attach dom0:sr0
> > > 
> > > and nothing happens. 
> > > 
> > > Even more: CD content is still visible in dom0 and /dev/sr0 is still 
> > > mounted in /run/media/pdebski/CDTITLE
> > > 
> > > How can I better diagnose the problem?
> > 
> > I think the problem is you have it mounted in dom0. If unmount it there,
> > it should just work.
> > 
> > - -- 
> > Best Regards,
> > Marek Marczykowski-Górecki
> > Invisible Things Lab
> > A: Because it messes up the order in which people normally read text.
> > Q: Why is top-posting such a bad thing?
> > -BEGIN PGP SIGNATURE-
> > Version: GnuPG v2
> > 
> > iQEcBAEBCAAGBQJYQ1nPAAoJENuP0xzK19cs7dkH/3tixTrrQAaozHR6A+J3Z/wX
> > wqheJcIwYdGYxGYd4wKC2breqED7tuVertg771ZhwJsN+YOshLiPywfY13Xj52cV
> > Yfr3JYLkSFyhuE8PSQjQm5Zzovhm/PNOoMuBBsVm2l/afTv66iDedxpoisEGk2PO
> > fc38ZaCVy5eXtE8cWuIqIUDXoVelD2Qlr2rxIBbewykCFqK0DgcxTUkh2qwrBlF3
> > 7O1K1+hOmYkKFaOoM0lUoRuBUeG6Lh0hm+hHk0KlJuEW1uPzV/6SfWgZO2bu13UR
> > 6x5LiXSMIxLzLnGyzzx0uMVhOAuWoNJeVPwm4AEi5AIsXyTek+LyU8F4WZVbF/k=
> > =/m+X
> > -END PGP SIGNATURE-
> 
> How do I check whether it is really mounted in dom0?
> (I think it is not, but maybe I'm doing something wrong

notification bubble should pop up on the screen.  I think its usually sr0 or 
something. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ff85ea9e-ab9d-44fe-87f6-640983689781%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 3.2 Installation Issues: anaconda 'text mode' Installation Destination autopart failed LUKS

2017-01-04 Thread pixelite25
Additional Notes: The setting I'm referring to is usually available in the 
UEFI/BIOS. Furthermore, when setting it back to 512MB and attempting to boot 
the now installed Qubes, I get similar GUI issues as before. Sometimes I can't 
even enter the LUKS passphrase, other times it will freeze during the creation 
of the desktop environment. In any case, there seems to be a major bug with the 
GUI and using more than 256MB of shared video memory.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e00de93-7077-40eb-8909-2e5a10e0d4a8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Wifi Issues Atheros QCA9377

2017-01-04 Thread wes . akers
OMG I got it... The issue is that the Kernel Module wasn't loading during boot, 
thats why I wasn't seeing any error messages or anything in the dmesg output. 
What led me down the road to my answer was the fact that when I ran the lspci 
-k command the "Kernel module in use:" line was missing. I noticed that is was 
a potential issue in my original post but I didn't know how to go about fixing 
it... After trying I found out that the "ath10k_core" was being loaded at 
startup but not the "ath10k_pci" Kernel Module. In an attempt to load that 
module I noticed that the /usr/lib/modules/`uname -r`/modules.networking file 
was absent "ath10k_pci". I decided to modify the file located at 
/etc/sysconfig/modules/qubes-u2mfn.modules and add the line "modprobe 
ath10k_pci.ko" and BAM BANG POW after a reboot the wifi starts working!!! 
Well... I can at least see the wifi networks now but I'm sure they work... 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e96547da-4d54-4289-bf02-3b8da54956a5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-04 Thread raahelps
On Wednesday, December 28, 2016 at 12:01:57 AM UTC-5, Vít Šesták wrote:
> While I agree Debian is a fair choice in terms of security, I disagree with 
> your reasoning. The “encryption bypass” is rather a minor vulnerability (i.e. 
> if attacker has all prerequisities to abuse it, she probably could also 
> perform another attacks) and I don't believe that this is statistically 
> significant. On the other hand, there are also some Debian-specific 
> vulnerabilities. For example, recent APT vulnerability or not-so-recent 
> vulnerable SSH keys due to some Debian-specific tuning. This does not suggest 
> that Debian is less secure, this suggests it is not so clear.
> 
> Regards,
> Vít Šesták 'v6ak'

There are alot of reasons why I feel Fedora and Debian are the two most secure 
mainstream linux distros. But thats not saying much at all,  its why we use 
Qubes.  Linux sucks imo and is no better then windows.  Especially when using 
popular distros.  These are just my personal opinions I might be living in a 
bubble.

Yes, I was also trying to point out the choice of security between the two is 
not so clear..  But when it comes to the things that puts fedora up there like 
a default firewall or selinux , They don't matter for a Qubes dom0.   But I 
think if hardware support is priority,  fedora always optimized for a newer 
kernel and newer driver support and having newer software would be more ideal.  
 If stability,  then debian.

Things like holding enter button down to bypass luks, or holding backspace down 
to bypass grub, or using siri and hitting pad a couple times to bypass ios 
phone lock(ion every single version).  whether needing physical access or not,  
sure does make me wonder if they are not there on purpose. Like for police 
purposes.   I've always felt the people behind ubuntu or fedora are not as 
trustworthy when it comes to privacy if not security then a distro like debian. 
 I'm sure everyone knows all the common reasons why, so no need to list them 
all,  but things like NSA,  Search redirections, corporate greed, unknown 
network connections, services phoning home,   etc always come up...  When using 
a baremetal system I prefer debian system because I feel by default it gives 
more protection from itself then fedora will protect you from fedora.  That 
includes both backdoors and stability.

And if you want a conspiracy theory I think Russia has been undermining fedora 
especially starting with fedora 20.  I have also felt every hardened fedora box 
I have ever owned has been hacked or maliciously destroyed. Every single one.  
Its never happened with a hardened debian, or even with a hardened windows 7.  
But again in this case for a Qubes dom0 I don't think it really matters.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/876ac1cb-9f9e-4aaa-b746-d0a464d3f280%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 3.2 Installation Issues: anaconda 'text mode' Installation Destination autopart failed LUKS

2017-01-04 Thread pixelite25
Thanks for the replies everyone. I wanted to provide an update on the original 
problem in which the GUI would freeze and thus force me to attempt to use 
Anaconda's text interface.

I actually (accidentally) stumbled upon the solution. Apparently, changing the 
Total Graphics Memory setting (shared video memory amount for the built-in 
Intel GPU) from 512MB to 256MB totally solves the GUI problems!!! I was easily 
able to use the standard graphical installer to get Qubes OS up and running 
just fine. Hopefully some other confused person will find this useful to know.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/31183799-c225-44bc-a279-1e4137ef1922%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Wifi Issues Atheros QCA9377

2017-01-04 Thread wes . akers
It is Qubes 3.2. Kernel is 4.4.31-11.pvops.qubes.x86_64. I've been to that link 
before but I haven't tried any of the steps to dom0 so im going to give it a 
try now qubes-hcl-report on dom0 shows my wireless adapter under the Net: 
listing. I'm sure it's supposed to work just wondering what it is that I'm 
missing...gotta be something easy I just suck...

Dmesg on dom0 shows this...

[85068.905503] audit: type=1123 audit(1483579070.490:139): pid=10524 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D6620514341393958302F terminal=pts/4 res=success'
[85076.346626] audit: type=1123 audit(1483579077.917:144): pid=10528 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D6620514341393938342F terminal=pts/4 res=success'
[85082.446595] audit: type=1123 audit(1483579084.006:149): pid=10537 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D6620514341393938582F terminal=pts/4 res=success'
[85094.044343] audit: type=1123 audit(1483579095.580:154): pid=10539 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D662051434139383838 terminal=pts/4 res=success'
[85110.305439] audit: type=1123 audit(1483579111.810:159): pid=10542 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D662051434139383858 terminal=pts/4 res=success'
[85114.181940] audit: type=1123 audit(1483579115.678:164): pid=10544 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D662051434139383837 terminal=pts/4 res=success'
[85122.442339] audit: type=1123 audit(1483579123.923:169): pid=10546 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D662051434136313734 terminal=pts/4 res=success'
[85128.582364] audit: type=1123 audit(1483579130.051:174): pid=10548 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k" 
cmd=726D202D72202D662051434134303139 terminal=pts/4 res=success'
[85459.730731] audit: type=1123 audit(1483579460.551:179): pid=10593 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k/QCA9377/hw1.0" 
cmd="dmidecode" terminal=pts/4 res=success'
[86069.245761] audit: type=1123 audit(1483580068.874:184): pid=10759 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k/QCA9377/hw1.0" cmd="dmesg" 
terminal=pts/4 res=success'
[86091.606143] audit: type=1123 audit(1483580091.191:189): pid=10764 uid=1000 
auid=1000 ses=1 msg='cwd="/usr/lib/firmware/ath10k/QCA9377/hw1.0" cmd="dmesg" 
terminal=pts/4 res=success'



Still troubleshooting.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ad0c53cd-5ff5-4c06-8acf-2ccb2dd9be27%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-04 Thread raahelps
On Wednesday, January 4, 2017 at 7:37:42 PM UTC-5, raah...@gmail.com wrote:
> On Sunday, January 1, 2017 at 12:08:54 PM UTC-5, Jeremy Rand wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > pixel fairy:
> > > On Tuesday, October 1, 2013 at 6:32:41 PM UTC-7, ears...@gmail.com
> > > wrote:
> > >> We all know Fedora is a big name, but is it a good choice for a
> > >> Security Driven OS like QubeOS to be based around? What do others
> > >> here think?
> > > 
> > > There are a lot of packages creating a bigger attack surface. but,
> > > bigger distros like fedora have companies behind them like red hat.
> > > red hat has been pretty good about actively looking for
> > > vulnerabilities in those packages. distros that automatically
> > > upgrade to the latest version (gentoo etc) can also burn you. they
> > > would make better template vms where your more likely to want newer
> > > software and new issues can be better contained.
> > > 
> > > for dom0, newer distros are better at hardware compatibility with
> > > those fancy new processors, graphics cards and storage controllers
> > > in laptops.
> > > 
> > > just personal opinion, but wayland is a better fit than x11 for
> > > qubes in the long run. fedora is the only distro with a dedicated
> > > security staff actively supporting it.
> > > 
> > > anytime you abstract a layer, your diluting your resources.
> > > maintaining a dom0 isnt much more work than a domu template, but if
> > > you want to add slackware, arch, and gentoo, youve now more than
> > > doubled the developers distro maintanance work when they could be
> > > working on stability and features.
> > 
> > Potentially worth noting here that in Ed Snowden's keynote at
> > Libreplanet 2016, he criticized the free software community's tendency
> > to use stable, outdated software.  Snowden said that the attackers
> > move and adapt quickly, and it's dangerous to continue using outdated
> > software that doesn't have the latest security fixes/features just
> > because it's more stable or more backward-compatible.  Snowden did not
> > explicitly mention any distros that he was talking about, but I got
> > the distinct impression that he was (at least in part) talking about
> > Debian.
> > 
> > Of course, "appeal to authority" is a classic fallacy, so we shouldn't
> > do what Snowden says without questioning it, but I think it's at least
> > worth considering his argument seriously.
> > 
> > Cheers,
> > - -Jeremy
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJYaTeQAAoJELPy0WV4bWVwbNgP+QG3jY+xlwsTnViOS+IFEHMP
> > Nyt+d9Cuq7iEnCsr1fuXbzjSNB8RDM0y2BY6rciELmo4kvyfsGoPYZod7nOlQPeV
> > xjgjubrlA3udMxSCsc5lc2DbP4IszehJECYGbZw4gaFabScs6ugt0P9gxKaiTIWR
> > pa9bAaSzJffZsJg9/efUJuo134Mdd8QBssKEC6idWCiEuM8YWHZI9xKfvhTjRrqj
> > g233nSNbvctg0yoUQbf2XHZ6gyGZ2p0Y1ab8o0o0MFVsuQIuPCKlWgr/WhjgdWDY
> > Ye4TCYZhonuLHRCiOt+ZuS2w8nj24O0qFvXra+asXAaW2mFzQa/Aq3CdLBE87nXE
> > z3dgNp2Z08dWi28ncbCwvn8mpw0w07yl1n6+2JlBC4pDTF2/r6BMgsp4DIS9sFDB
> > h+mFWCnqh80P/39SQeOoOcHATruMfHp8CUDVtOMVBRV4VpoA7YaKxiiiUXFnD21M
> > S6XP7QqxPkbPW0E77UeR53igB61QQ1t3Fb4QQRLZY1bhncKn3kM/OmUDnHzepLQn
> > 0/FLW/aJMBofOHeb6xqrfipeayGrdHLNuav9Nu1QRuX2lY6E0Sl40VZBwRERxfaW
> > t+Ck3n4Qw2Gru13zXPhHuE8OpTV3/RgkMzNMnADxfArhSIW2zwoYQvNCn8U/LNaq
> > P2HMZA0yehx6CZnBmdb/
> > =RC2L
> > -END PGP SIGNATURE-
> 
> I disagree with Snowden on this,  if it aint broke don't fix it.  What 
> usually happens in reality is the newer software introduces even more bugs 
> then were originally there imo for the sake of new shiny things.  Many 
> experts say we are actually less safe nowadays cause systems are already too 
> complex.And if new exploits found in old software are patched with 
> security updates then I think the freesoftware communities have it right when 
> it comes to security.
> 
> If he means old software thats no longer maintained and abandoned then he has 
> a good point.  There is plenty of that in every linux distro, some more then 
> others.
> 
> But saying attackers adapt quick,  means to me adapting to something new,  
> adapting to a new exploit, not a secret one they've already known about.

I use to believe that always updating software would remove exploits currently 
in them.  But usually in reality if not specifically addressed,  since new 
software is still built upon the same old software,  the old bugs still exist 
while new ones are now introduced as well.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9374a34-a97f-41bd-b46c-d0aabf4ba8cd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: NetworkManager disconnecting WiFi upon dom0 update, also disconnects every 2-5min

2017-01-04 Thread raahelps
On Friday, December 30, 2016 at 5:20:18 PM UTC-5, anoa wrote:
> Hi all,
> 
> I've been dealing with a rather frustrating problem lately. Since the
> past week or so, my sys-net VM which is based on Fedora-24 has been
> disconnecting from WiFi every 2-5min. I'm not entirely sure what causes
> it but I've now found a way to reproduce it reliably.
> 
> Whenever I update dom0 with `sudo qubes-dom0-update`, the WiFi on the
> sys-net nm-applet immediately shows that it's been disconnected, even
> though the update itself is running on sys-firewall. After switching
> sys-firewall to debian-8 and running the update I get the same issue. I
> cannot seem to find the correct driver for my WiFi card on debian (Intel
> Corporation Wireless 7260 rev bb), so switching that VM to debian is not
> an option.
> 
> Here are the relevant journalctl and dmesg outputs for both sys-net and
> sys-firewall:
> 
> journalctl
> sys-firewall: http://ix.io/1OJO
> sys-net: http://ix.io/1OJP
> 
> dmesg
> sys-firewall: http://ix.io/1OJR
> sys-net: http://ix.io/1OJQ
> 
> Any ideas why the update in dom0 may be causing sys-net to lose
> connection, or it losing connection every 2-5 minutes?
> 
> Thanks
> anoa

maybe you should try a diff kernel?  Have you tried deleting the sys-net and 
sys-firewall and recreating them?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6a260951-bef4-4246-b776-2bafa6536a90%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-04 Thread raahelps
On Sunday, January 1, 2017 at 12:08:54 PM UTC-5, Jeremy Rand wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> pixel fairy:
> > On Tuesday, October 1, 2013 at 6:32:41 PM UTC-7, ears...@gmail.com
> > wrote:
> >> We all know Fedora is a big name, but is it a good choice for a
> >> Security Driven OS like QubeOS to be based around? What do others
> >> here think?
> > 
> > There are a lot of packages creating a bigger attack surface. but,
> > bigger distros like fedora have companies behind them like red hat.
> > red hat has been pretty good about actively looking for
> > vulnerabilities in those packages. distros that automatically
> > upgrade to the latest version (gentoo etc) can also burn you. they
> > would make better template vms where your more likely to want newer
> > software and new issues can be better contained.
> > 
> > for dom0, newer distros are better at hardware compatibility with
> > those fancy new processors, graphics cards and storage controllers
> > in laptops.
> > 
> > just personal opinion, but wayland is a better fit than x11 for
> > qubes in the long run. fedora is the only distro with a dedicated
> > security staff actively supporting it.
> > 
> > anytime you abstract a layer, your diluting your resources.
> > maintaining a dom0 isnt much more work than a domu template, but if
> > you want to add slackware, arch, and gentoo, youve now more than
> > doubled the developers distro maintanance work when they could be
> > working on stability and features.
> 
> Potentially worth noting here that in Ed Snowden's keynote at
> Libreplanet 2016, he criticized the free software community's tendency
> to use stable, outdated software.  Snowden said that the attackers
> move and adapt quickly, and it's dangerous to continue using outdated
> software that doesn't have the latest security fixes/features just
> because it's more stable or more backward-compatible.  Snowden did not
> explicitly mention any distros that he was talking about, but I got
> the distinct impression that he was (at least in part) talking about
> Debian.
> 
> Of course, "appeal to authority" is a classic fallacy, so we shouldn't
> do what Snowden says without questioning it, but I think it's at least
> worth considering his argument seriously.
> 
> Cheers,
> - -Jeremy
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYaTeQAAoJELPy0WV4bWVwbNgP+QG3jY+xlwsTnViOS+IFEHMP
> Nyt+d9Cuq7iEnCsr1fuXbzjSNB8RDM0y2BY6rciELmo4kvyfsGoPYZod7nOlQPeV
> xjgjubrlA3udMxSCsc5lc2DbP4IszehJECYGbZw4gaFabScs6ugt0P9gxKaiTIWR
> pa9bAaSzJffZsJg9/efUJuo134Mdd8QBssKEC6idWCiEuM8YWHZI9xKfvhTjRrqj
> g233nSNbvctg0yoUQbf2XHZ6gyGZ2p0Y1ab8o0o0MFVsuQIuPCKlWgr/WhjgdWDY
> Ye4TCYZhonuLHRCiOt+ZuS2w8nj24O0qFvXra+asXAaW2mFzQa/Aq3CdLBE87nXE
> z3dgNp2Z08dWi28ncbCwvn8mpw0w07yl1n6+2JlBC4pDTF2/r6BMgsp4DIS9sFDB
> h+mFWCnqh80P/39SQeOoOcHATruMfHp8CUDVtOMVBRV4VpoA7YaKxiiiUXFnD21M
> S6XP7QqxPkbPW0E77UeR53igB61QQ1t3Fb4QQRLZY1bhncKn3kM/OmUDnHzepLQn
> 0/FLW/aJMBofOHeb6xqrfipeayGrdHLNuav9Nu1QRuX2lY6E0Sl40VZBwRERxfaW
> t+Ck3n4Qw2Gru13zXPhHuE8OpTV3/RgkMzNMnADxfArhSIW2zwoYQvNCn8U/LNaq
> P2HMZA0yehx6CZnBmdb/
> =RC2L
> -END PGP SIGNATURE-

I disagree with Snowden on this,  if it aint broke don't fix it.  What usually 
happens in reality is the newer software introduces even more bugs then were 
originally there imo for the sake of new shiny things.  Many experts say we are 
actually less safe nowadays cause systems are already too complex.And if 
new exploits found in old software are patched with security updates then I 
think the freesoftware communities have it right when it comes to security.

If he means old software thats no longer maintained and abandoned then he has a 
good point.  There is plenty of that in every linux distro, some more then 
others.

But saying attackers adapt quick,  means to me adapting to something new,  
adapting to a new exploit, not a secret one they've already known about.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/faa57a13-6bae-4007-b311-5c89d7989718%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] strange bug: qubes-os booted from external device forces filevault reset.

2017-01-04 Thread pixel fairy
when booting qubes-os on a mac (hardware 11,3) filevault stops accepting the 
passphrase and you have to use the reset key to make a new one. 

ive only done this with an external drive. for some reason, qubes is either 
writing to the internal drive, or the mac firmware is rewriting it, or 
filevault keeps those keys elsewhere and qubes is somehow tripping that. either 
way, its pretty strange stuff.

this happens with qubes-3.2 though it doesnt actaully boot. you only get "." on 
the screen. qubes-3.2-unstable does boot, and even run for a few minutes, and 
also trips filevault.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/685f4302-96fc-441e-8fbb-e716336b918b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 3.2 Installation Issues: anaconda 'text mode' Installation Destination autopart failed LUKS

2017-01-04 Thread Drew White
On Thursday, 5 January 2017 09:58:28 UTC+11, pixel...@gmail.com  wrote:
> Additional Notes:  Sometimes I can't even enter the LUKS passphrase, other 
> times it will freeze during the creation of the desktop environment.

The Qubes Installer has had this bug since the beginning, and it still isn't 
fixed in version 3.2. So don't get your hopes up. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7fca9b67-594c-4d9d-b425-137873f37e86%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Shading doesn't work as it's meant to.

2017-01-04 Thread Drew White
On Wednesday, 4 January 2017 10:44:20 UTC+11, Drew White  wrote:
> I've been shading for a long time, and I've found that it's glitchy and 
> buggy, and doesn't work the way that it's supposed to in Qubes.
> 
> This needs to be fixed.
> 
> One VM, I shade the window, click on the window behind that's in the same VM, 
> and all I do is click on the content of the window I just shaded.

This issue I would believe is an issue with the Qubes Display Driver and the 
integration of Qubes Tools passing the shading request to the Guest.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe64abed-7ec0-4c10-a360-db9e80156cab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Application menu edits

2017-01-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-04 06:35, Patrick Bouldin wrote:
> Hi, I have looked and can't seem to find advice or documentation
> on manually removing old deleted VM shortcuts and/or deleted
> shortcusts from the Applications start button. I saw Application
> finder, didn't see a clean way there.
> 
> Any hint?
> 
> Thanks, Patrick
> 

Is this what you're looking for?

https://www.qubes-os.org/doc/remove-vm-manually/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=Va+w
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e3a6a105-ac6c-7fb8-b138-b07079c75cd8%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to attach a Yubikey as a normal, extra usb keyboard only to specific AppVMs?

2017-01-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-04 07:01, @LeeteqXV (Twitter) wrote:
> I have followed this guide: https://www.qubes-os.org/doc/usb/
> 
> And I can see the Yubikey, and attach it to the AppVM, then see 
> that it is attached to the AppVM with the qvm-usb command.
> 
> However, nothing happens inside the AppVM when I push the Yubikey 
> button to send the password to the field with the cursor, neither 
> in a browser window nor in Gedit.
> 
> As far as I know, the Yubikeys are identifying themselves as a 100%
> standard keyboard without the need for any driver on any system, so
> the push of its button should be understood by the Qube to be
> normal keyboard key presses.
> 
> What may be wrong?
> 
> Regards,
> 
> @LeeteqXV
> 

I don't have a YubiKey, so I haven't tried this myself. If it really
identifies itself as a keyboard, then it's probably necessary to
follow the USB keyboard-specific instructions:

https://www.qubes-os.org/doc/usb/#how-to-use-a-usb-keyboard

Specifically, make sure you edit the RPC policy rules, if you haven't.

Also, you might find some hints here:

https://www.qubes-os.org/doc/yubi-key/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=x77l
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39511bb3-9d4c-6ed8-5332-7226826ff7e3%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-04 Thread Vít Šesták
When you don't update, you will eventually have software full of known security 
bugs. Known security bugs (if they aren't properly managed, like analyzing 
their impact and mitigating them) are arguably worse than unknown security bugs 
(ceteris paribus), because they are much cheaper to exploit.

The same does not apply to non-security bugs. The key difference is that 
security bugs are triggered on purpose, while other bugs are triggered 
accidentally.

It is questionable if old software with security patches (e.g. Debian stable, 
Firefox ESR) is better than fresh one or not. I see good arguments on both 
sides, so maybe it depends.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/57eb6f16-91f9-497b-921b-d7d39beb93e1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Application menu edits

2017-01-04 Thread Patrick Bouldin
On Wednesday, January 4, 2017 at 10:45:53 PM UTC-5, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-01-04 06:35, Patrick Bouldin wrote:
> > Hi, I have looked and can't seem to find advice or documentation
> > on manually removing old deleted VM shortcuts and/or deleted
> > shortcusts from the Applications start button. I saw Application
> > finder, didn't see a clean way there.
> > 
> > Any hint?
> > 
> > Thanks, Patrick
> > 
> 
> Is this what you're looking for?
> 
> https://www.qubes-os.org/doc/remove-vm-manually/
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYbcFmAAoJENtN07w5UDAwqfwQAJdgGwBoXgmSeTdLhoL2Ow69
> RbaPMnWaK/gfKUTZPWfsuwxuM8G9Rk+9Ew/h1+vA0NL4D7cDzfYQd0W1JFke1J9j
> /6TbLX4u7w0PjoyNQaq/sS3l1+Jqmz6QiR5bR3JnQxURpyX8YqLeO1DRlpg8unxa
> q6kiQoGg0qzH1+EhzNRxhuO+qEMDaAoJxAUFeVUnABf/EWwu6WUOTMLchacHoTgj
> sHwfXiFOS3xgxt4ZbBscRNvOWcuIhIxN0yBPMyuyrvxkGntKts+xAslWb803blgP
> YIVkOv8WITrEEtW8/+wTPNx+T7a3NKZQCIeR9rXIg+c81pQ+qnXBhSif85h9Xjr/
> BgsZo0yXzlrLoyDH9UJTRVHGEWSulLqor+7Ks5GcK5VlPiOkU4oTwBxGRhzgW5Fj
> vD10SG02/GJ/LTD488EKHnwnX1JYh6sXR2hXXgD8FgdJaZAx1ei9Bq1FFkZBG+yX
> Gguc5TJSlSN1kOY3amo2BucG3vMs1Acq5sBCF3PXg70omMJ+Wx8V9vrgxnRQf9Ih
> cSBokbLxiXMskJj+ZVmZEmlSAoiMfxE1mabuClC/m5GF/SsrfRkhI+fLzVV5Dpol
> OrDdQzY5TyyRbgKCdumrDnFSkPjZJ/cx0sskYaa7+DDABRDTx4glyKhmtOHmcx/M
> dnfqdF/5LbaZt6hOWM1J
> =Va+w
> -END PGP SIGNATURE-

Hi Andrew, thanks and I guess so. When I removed one or two with the right 
click it still left it on the Applications menu selection. So I guess was 
looking for a remedy to get that last step done.

Thanks,
Patrick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3bf64485-6824-48c0-ab55-f5451e71d602%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-04 Thread Drew White
On Thursday, 5 January 2017 11:38:52 UTC+11, raah...@gmail.com  wrote:
> On Wednesday, January 4, 2017 at 7:37:42 PM UTC-5, raah...@gmail.com wrote:
> > On Sunday, January 1, 2017 at 12:08:54 PM UTC-5, Jeremy Rand wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA512
> > > 
> > > pixel fairy:
> > > > On Tuesday, October 1, 2013 at 6:32:41 PM UTC-7, ears...@gmail.com
> > > > wrote:
> > > >> We all know Fedora is a big name, but is it a good choice for a
> > > >> Security Driven OS like QubeOS to be based around? What do others
> > > >> here think?
> > > > 
> > > > There are a lot of packages creating a bigger attack surface. but,
> > > > bigger distros like fedora have companies behind them like red hat.
> > > > red hat has been pretty good about actively looking for
> > > > vulnerabilities in those packages. distros that automatically
> > > > upgrade to the latest version (gentoo etc) can also burn you. they
> > > > would make better template vms where your more likely to want newer
> > > > software and new issues can be better contained.
> > > > 
> > > > for dom0, newer distros are better at hardware compatibility with
> > > > those fancy new processors, graphics cards and storage controllers
> > > > in laptops.
> > > > 
> > > > just personal opinion, but wayland is a better fit than x11 for
> > > > qubes in the long run. fedora is the only distro with a dedicated
> > > > security staff actively supporting it.
> > > > 
> > > > anytime you abstract a layer, your diluting your resources.
> > > > maintaining a dom0 isnt much more work than a domu template, but if
> > > > you want to add slackware, arch, and gentoo, youve now more than
> > > > doubled the developers distro maintanance work when they could be
> > > > working on stability and features.
> > > 
> > > Potentially worth noting here that in Ed Snowden's keynote at
> > > Libreplanet 2016, he criticized the free software community's tendency
> > > to use stable, outdated software.  Snowden said that the attackers
> > > move and adapt quickly, and it's dangerous to continue using outdated
> > > software that doesn't have the latest security fixes/features just
> > > because it's more stable or more backward-compatible.  Snowden did not
> > > explicitly mention any distros that he was talking about, but I got
> > > the distinct impression that he was (at least in part) talking about
> > > Debian.
> > > 
> > > Of course, "appeal to authority" is a classic fallacy, so we shouldn't
> > > do what Snowden says without questioning it, but I think it's at least
> > > worth considering his argument seriously.
> > > 
> > > Cheers,
> > > - -Jeremy
> > > -BEGIN PGP SIGNATURE-
> > > 
> > > iQIcBAEBCgAGBQJYaTeQAAoJELPy0WV4bWVwbNgP+QG3jY+xlwsTnViOS+IFEHMP
> > > Nyt+d9Cuq7iEnCsr1fuXbzjSNB8RDM0y2BY6rciELmo4kvyfsGoPYZod7nOlQPeV
> > > xjgjubrlA3udMxSCsc5lc2DbP4IszehJECYGbZw4gaFabScs6ugt0P9gxKaiTIWR
> > > pa9bAaSzJffZsJg9/efUJuo134Mdd8QBssKEC6idWCiEuM8YWHZI9xKfvhTjRrqj
> > > g233nSNbvctg0yoUQbf2XHZ6gyGZ2p0Y1ab8o0o0MFVsuQIuPCKlWgr/WhjgdWDY
> > > Ye4TCYZhonuLHRCiOt+ZuS2w8nj24O0qFvXra+asXAaW2mFzQa/Aq3CdLBE87nXE
> > > z3dgNp2Z08dWi28ncbCwvn8mpw0w07yl1n6+2JlBC4pDTF2/r6BMgsp4DIS9sFDB
> > > h+mFWCnqh80P/39SQeOoOcHATruMfHp8CUDVtOMVBRV4VpoA7YaKxiiiUXFnD21M
> > > S6XP7QqxPkbPW0E77UeR53igB61QQ1t3Fb4QQRLZY1bhncKn3kM/OmUDnHzepLQn
> > > 0/FLW/aJMBofOHeb6xqrfipeayGrdHLNuav9Nu1QRuX2lY6E0Sl40VZBwRERxfaW
> > > t+Ck3n4Qw2Gru13zXPhHuE8OpTV3/RgkMzNMnADxfArhSIW2zwoYQvNCn8U/LNaq
> > > P2HMZA0yehx6CZnBmdb/
> > > =RC2L
> > > -END PGP SIGNATURE-
> > 
> > I disagree with Snowden on this,  if it aint broke don't fix it.  What 
> > usually happens in reality is the newer software introduces even more bugs 
> > then were originally there imo for the sake of new shiny things.  Many 
> > experts say we are actually less safe nowadays cause systems are already 
> > too complex.And if new exploits found in old software are patched with 
> > security updates then I think the freesoftware communities have it right 
> > when it comes to security.
> > 
> > If he means old software thats no longer maintained and abandoned then he 
> > has a good point.  There is plenty of that in every linux distro, some more 
> > then others.
> > 
> > But saying attackers adapt quick,  means to me adapting to something new,  
> > adapting to a new exploit, not a secret one they've already known about.
> 
> I use to believe that always updating software would remove exploits 
> currently in them.  But usually in reality if not specifically addressed,  
> since new software is still built upon the same old software,  the old bugs 
> still exist while new ones are now introduced as well.

If you have a secure system in the first place, the exploits can't get a grip 
easily.
If you manage your system you won't get hit easily.
If you lock the machine down, you won't get hit easily.

I limit SUDO activity to what I want to let things use.
I don't let sudo change passwords..
I don't let sudo do 

[qubes-users] Re: lemur7 Unable to reset PCI device

2017-01-04 Thread pixel fairy
On Tuesday, January 3, 2017 at 11:36:23 PM UTC-8, Sean wrote:
> For Wifi, in sys-net keep 02:00.0, but remove (03:00.0 and) 03:00.1.
> 
> If you need Ethernet, good luck. I have been unable to get the Realtek 
> Ethernet devices to function reliably -- barely at all -- on my Lemur, but 
> Wifi works great. 

that worked. first machine ive had to manually assign the net device too. mine 
also didnt work when both devices were assigned to it. ill revisit this at the 
next stable release. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/535b4f1b-c2b7-4245-bacf-11c2b6f77160%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Best way to install qubes on mixed ssd and sata disks

2017-01-04 Thread Ronald Duncan
On Tuesday, 3 January 2017 21:33:47 UTC, Andrew David Wong  wrote:
 
> On 2017-01-03 08:38, Ronald Duncan wrote:
> > Looking to reinstall qubes from scratch and would like to optimise
> >  the use of the ssd so I execute as much as possible on the ssd and
> >  use the sata for storage.

> 
> Personally, I install Qubes on an SSD and leave all of my
> frequently-accessed VMs on there. For infrequently-accessed,
> bulk-storage VMs, I use this method:
> 
> https://www.qubes-os.org/doc/secondary-storage/
> 
> - -- 
> Andrew David Wong (Axon)
Thanks Andrew,

I thought about using links to the other disk for the infrequently accessed 
info.  Nice to see this is the "official" method.

My ssd is big enough that I should be able to get everything on it, and then I 
can mv some VM's if I want to rearrange the space.

Regards
Ronald

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3f7a5c48-fc22-4ce5-a08d-888b41e67972%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Wifi Issues Atheros QCA9377

2017-01-04 Thread raahelps
On Tuesday, January 3, 2017 at 10:09:22 PM UTC-5, wes@gmail.com wrote:
> Hello Qubes World.
> 
> I have spent the better part of 5-6 hours trying to figure out why my 
> wifi will not show up in sys-net, it has never worked. I have read through 
> every forum/post I could find and wasn't able to figure out the exact issue. 
> I feel as if this is my last resort, I have to travel in a few weeks and if I 
> can't get it working I'll have to abandon my 3 week qubes exerience. I'll 
> provide as much information as possible to aid in troubleshooting. Appreciate 
> any help given, thanks.
> 
> Laptop: Acer Aspire E 15 E5-575G-76YK
> 
> When I first start sys-net I typically have to kill it a couple times 
> before it will even recognize my ethernet..what a pain. As for the Wifi I run 
> dmesg and dont see any errors regarding that the device has failedbut i'm 
> not really sure what to look for... I will post the output below ...can't 
> figure out how to make a link to it yet so sorry for the expanded output. 
> I've attempted to manually add the Wifi SSID and crap through the Network 
> Manager and that didn't work either. It appears that it just isn't loading 
> when sys-net starts up even though I've added the device in the devices tab. 
> A lot of the ubuntu forums say to install "linux-headers-generic" and 
> "build-essential" but those aren't listed in the repo
> 
> The output of lspci shows the wireless adapter but one thing that I noticed 
> is that it doesn't say "Kernel driver in use" like the others say (part of 
> the problem?)
> 
> 00:00.0 Network controller [0280]: Qualcomm Atheros QCA9377 802.11ac Wireless 
> Network Adapter [168c:0042] (rev 30)
>   Subsystem: Lite-On Communications Inc Device [11ad:0806]
>   Kernel modules: ath10k_pci
> 
> The drivers are installed as listed in /lib/firmware/ath10k/QCA9377/hw1.0
> 
> sudo modprobe -D ath10k_pci 
> 
> insmod /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/net/rfkill/rfkill.ko 
> insmod /lib/modules/ 
> 4.4.31-11.pvops.qubes.x86_64/kernel/net/wireless/cfg80211.ko 
> insmod 
> /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/net/mac80211/mac80211.ko 
> insmod/lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath.ko
>  
> insmod 
> /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath10k/ath10k_core.ko
>  
> insmod 
> /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath10k/ath10k_pci.ko
>  
> 
> 
> Current linux firmware is 20160923-68.git42ad5367.fc24.noarch
> 
> When I run the command "nmcli g" it shows the wifi enabled and wwan enabled.
> 
> STATE  CONNECTIVITY  WIFI-HW  WIFI WWAN-HW  WWAN
> connected  full  enabled  enabled  enabled  enabled 
> 
> ifconfig output:
> enp0s1f1: flags=4163  mtu 1500
> inet 192.168.1.60  netmask 255.255.255.0  broadcast 192.168.1.255
> inet6 fe80::b353:2725:5528:1f78  prefixlen 64  scopeid 0x20
> ether 54:ab:3a:81:38:24  txqueuelen 1000  (Ethernet)
> RX packets 25634  bytes 32481540 (30.9 MiB)
> RX errors 0  dropped 0  overruns 0  frame 0
> TX packets 13396  bytes 1586775 (1.5 MiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
> 
> lo: flags=73  mtu 65536
> inet 127.0.0.1  netmask 255.0.0.0
> inet6 ::1  prefixlen 128  scopeid 0x10
> loop  txqueuelen 1  (Local Loopback)
> RX packets 84  bytes 8028 (7.8 KiB)
> RX errors 0  dropped 0  overruns 0  frame 0
> TX packets 84  bytes 8028 (7.8 KiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
> 
> vif5.0: flags=4163  mtu 1500
> inet 10.137.1.1  netmask 255.255.255.255  broadcast 0.0.0.0
> inet6 fe80::fcff::feff:  prefixlen 64  scopeid 0x20
> ether fe:ff:ff:ff:ff:ff  txqueuelen 32  (Ethernet)
> RX packets 13246  bytes 1385694 (1.3 MiB)
> RX errors 0  dropped 0  overruns 0  frame 0
> TX packets 24267  bytes 32251590 (30.7 MiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
> 
> 
> I've attempted to install the kvalo ath10k firmware listed on github but it 
> did no good. md5sums of the files were the same as what I had anyways
> 
> modinfo ath10k_pci produces the following output
> 
> filename:   /lib/modules/4.4.31-
> 11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath10k/ ath10k_pci.ko
> firmware:   ath10k/QCA9377/hw1.0/board.bin
> firmware:   ath10k/QCA9377/hw1.0/firmware-5.bin
> firmware:   ath10k/QCA6174/hw3.0/board-2.bin
> firmware:   ath10k/QCA6174/hw3.0/board.bin
> firmware:   ath10k/QCA6174/hw3.0/firmware-5.bin
> firmware:   ath10k/QCA6174/hw3.0/firmware-4.bin
> firmware:   ath10k/QCA6174/hw2.1/board-2.bin
> firmware:   ath10k/QCA6174/hw2.1/board.bin
> 

[qubes-users] Install Problem // existing lvms

2017-01-04 Thread haaber
Hi, I have for years debian running on my machine: /boot on a usb key,
the /root on a 32g SSD and /home on a HDD. All filesystems are fully
encrypted. I want to give qubes a try, at least, if I can install it :)
So I first made a full home backup, and a full dd take of the SSD drive.
That way I hope to be able to "turn back" if install fails. Also, I can
overwrite the SSD without fear entirely, which is necessary since
otherwise there is not enough space.

I made the installer delete the SSD volume and use it as root, but then
it is unhappy with available space. It wants 250g somewhere - which is
OK, it may use the hdd. But somehow here I get stuck, warnings and
abandoned the install. Can I preserve the existing encrypted HDD volume
(providing the passphrase) on install ?

Thank you for any hint / clarifying question / comments !

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f9dcb0f-8b6e-a812-16d0-487850b78732%40web.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Application menu edits

2017-01-04 Thread Unman
On Wed, Jan 04, 2017 at 06:35:10AM -0800, Patrick Bouldin wrote:
> Hi, I have looked and can't seem to find advice or documentation on manually 
> removing old deleted VM shortcuts and/or deleted shortcusts from the 
> Applications start button. I saw Application finder, didn't see a clean way 
> there.
> 
> Any hint?
> 
> Thanks,
> Patrick
> 


If you look in ~/.config/menus/applications-merged you will find the
menu files for each qube. If you have a zombie menu you can delete it
from here and it should disappear from the Applications menu.

The desktop files that back the qube menus are under
/var/lib/qubes/appvms/ or ~/.local/share/applications.
Again, you may find zombie files there, but if you have deleted the menu
entry it should not matter.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104175113.GA619%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to attach a Yubikey as a normal, extra usb keyboard only to specific AppVMs?

2017-01-04 Thread wes . akers
Good Luck @LeeteqXV

I haven't yet tried to get my yubikey to work but that is on my to-do list. I 
hope you are able to deduce the problem and get it working. Still 
troubleshooting my wifi problems. Ugh...fml

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd1e090b-c892-4717-8057-59032b5ecc37%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Computer Models Guaranteed to work with Qubes 4.0?

2017-01-04 Thread 'James Funkhauser' via qubes-users
On Wed, Jan 4, 2017 at 7:25 AM, taii...@gmx.com <'taii...@gmx.com'> wrote:

You'll want a KGPE-D16 motherboard with a 62xx series processor.


Thanks for the advice! Is this what you mean by 62xx series: 
http://ark.intel.com/products/88193/Intel-Core-i5-6200U-Processor-3M-Cache-up-to-2_80-GHz.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/flUGiCWBPr-CA7NkxC9FRbYrsDziq9mQFhjwQ572Zt2jEyac0rbkXM8RclcEEa-h0h-pLXJ7Up1k9bDnPK9QNz4ZGTd_Onm8xOTDXE8eZoQ%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-04 Thread Unman
On Tue, Jan 03, 2017 at 07:38:20PM -0800, Otto Kratik wrote:
> On Tuesday, January 3, 2017 at 8:55:58 PM UTC-5, Unman wrote:
> > On Tue, Jan 03, 2017 at 04:12:28PM -0800, Otto Kratik wrote:
> > > On Tuesday, January 3, 2017 at 6:02:09 PM UTC-5, Marek 
> > > Marczykowski-Górecki > 
> > > 
> > > > Try running `xdg-desktop-menu forceupdate`.
> > > 
> > > Ran it as su from dom0 terminal. Command was accepted, but no noticeable 
> > > effect or change, or output.
> > > 
> > 
> > Have you checked the menu files?
> > 
> > For xfce, in /etc/xdg/menus/xfce-applications.menu you should have a
> >  section with  System that references 
> > qubes-System-Tools.directory
> > There should be an  section containing 
> > and Excludes for X-Qubes_VM and X-Xfce-Toplevel
> > 
> > The actual desktop files should be in /usr/share/applications: check
> > that they are there.
> > Confirm the Categories of a sample desktop file.
> > 
> > I can't imagine that these have been deleted - if they have then you don't
> > need to reinstall, just replace the missing files.
> > 
> > let us know what you find (or not, as the case may be).
> 
> 
> Here are the contents of the xfce-applications.menu file:
> 
> **
>"http://www.freedesktop.org/standards/menu-spec/1.0/menu.dtd;>
> 
> 
> Xfce
> 
> 
> 
> 
> 
> 
> 
> X-Xfce-Toplevel
> 
> 
> exo-file-manager.desktop
> exo-mail-reader.desktop
> exo-web-browser.desktop
> 
> 
> 
> /usr/local/share/applications
> 
> 
> xfce4-run.desktop
> exo-terminal-emulator.desktop
> 
> System
> 
> 
> 
> xfce4-about.desktop
> xfce4-session-logout.desktop
> 
> 
> 
> System
> qubes-System-Tools.directory
> 
> 
> 
> 
> X-Xfce-Toplevel
> X-Qubes-VM
> 
> 
> 
> xfce-settings-manager.desktop
> 
> 
> 
> 
> 
> 
> 
> 
> 
> ***
> 
> In /usr/share/applications I see:
> 
> kde (folfer)
> kde4 (folder)
> screensavers (folder)
> gnome-mimeapps.list
> kde-mimeapps.list
> mimeapps.list
> mineinfo.cache
> xfce-mimeapps.list
> 
> 
> Does that reveal anything? What should I be looking for within this location 
> further?
> 
> Thanks...
> 

I'd expect to see the .desktop files.
Here's a sample - save it as xfce4-terminal.desktop:

[Desktop Entry]
Version=1.0
Name=Xfce Terminal
Name[ar]=طرفية إكسفس
Name[bg]=Xfce Терминал
Name[cs]=Terminál Xfce
Name[da]=Xfce Terminal
Name[de]=Xfce Terminal
Name[el]=Τερμαρικό XFCE
Name[en_AU]=Xfce Terminal
Name[en_GB]=Xfce Terminal
Name[es]=Terminal de Xfce
Name[eu]=Xfce  terminala
Name[fi]=Xfce-pääte
Name[fr]=Terminal Xfce
Name[he]=מסוף Xfce
Name[hr]=Xfce terminal
Name[hu]=Xfce terminál
Name[id]=Terminal Xfce
Name[it]=Terminale di Xfce
Name[ja]=Xfce Terminal
Name[kk]=Xfce Terminal
Name[ko]=Xfce 터미널
Name[nl]=Xfce terminal
Name[oc]=Terminal Xfce
Name[pl]=Terminal Xfce
Name[pt]=Terminal Xfce
Name[pt_BR]=Xfce terminal
Name[ro]=Terminal Xfce
Name[ru]=Терминал Xfce
Name[sr]=ИксФЦЕ терминал
Name[th]=เทอร์มินัลของ Xfce
Name[tr]=Xfce Terminal
Name[ug]=Xfce تېرمىنالى
Name[uk]=Термінал XFCE
Name[zh_CN]=Xfce 终端
Name[zh_TW]=Xfce 終端機
Comment=Terminal Emulator
Comment[ar]=محاكي طرفية
Comment[ast]=Emulador de terminal
Comment[be]=Эмулятар тэрмінала
Comment[bg]=Терминален Емулатор
Comment[ca]=Emulador de terminal
Comment[cs]=Emulátor terminálu
Comment[da]=Terminal Emulator
Comment[de]=Terminal-Programm
Comment[el]=Προσομοίωση τερματικού
Comment[en_AU]=Terminal Emulator
Comment[en_GB]=Terminal Emulator
Comment[eo]=Terminala Simulilo
Comment[es]=Emulador de terminal
Comment[et]=Terminaliemulaator
Comment[eu]=Terminal emuladorea
Comment[fi]=Pääte-emulaattori
Comment[fr]=Émulateur de terminal
Comment[gl]=Emulador de terminal
Comment[he]=מדמה מסוף
Comment[hr]=Emulator terminala
Comment[hu]=Terminálemulátor
Comment[id]=Emulator Terminal
Comment[it]=Emulatore di Terminale
Comment[ja]=ターミナルエミュレーター
Comment[kk]=Терминал эмуляторы
Comment[ko]=터미널 에뮬레이터
Comment[lt]=Terminalo emuliatorius
Comment[lv]=Termināļa emulators
Comment[nb]=Teminalemulator
Comment[nl]=Terminalvenster
Comment[oc]=Emulator de terminal
Comment[pa]=ਟਰਮੀਨਲ ਈਮੂਲੇਟਰ
Comment[pl]=Emuluje działanie terminala X
Comment[pt]=Emulador de terminal
Comment[pt_BR]=Emulador de terminal
Comment[ro]=Emulator de terminal
Comment[ru]=Эмулятор терминала
Comment[sk]=Terminál Emulátor
Comment[sq]=Emulues Terminali
Comment[sr]=Емулатор терминала
Comment[sv]=Terminalemulator
Comment[te]=టెర్మినల్ ఎమ్యులేటర్
Comment[th]=โปรแกรมจำลองเทอร์มินัล
Comment[tr]=Uçbirim Öykünücüsü
Comment[ug]=تېرمىنال Emulator
Comment[uk]=Емулятор терміналу
Comment[ur]=ٹرمنل ایمولیٹر
Comment[ur_PK]=ٹرمنل ایمولیٹر
Comment[vi]=Trình giả lập Terminal
Comment[zh_CN]=终端模拟器
Comment[zh_TW]=終端機程式
GenericName=Terminal Emulator
GenericName[ar]=محاكي طرفية
GenericName[ast]=Emulador de terminal