Re: [qubes-users] Number of cores and other CPU characteristics

2017-02-04 Thread WillyPillow
 Original Message 
Subject: [qubes-users] Number of cores and other CPU characteristics
Local Time: February 2, 2017 9:50 AM
UTC Time: February 2, 2017 9:50 AM
From: groups-no-private-mail--contact-me-at--contact.v6ak@v6ak.com
To: qubes-users 

Choosing the right CPU is about choosing the right tradeoff. The tradeoff is 
not only between price, power consumption and performance. We can also balance 
single-core performance to multi-core performance, or we might want some 
enhancements for some specific tasks, like AES-NI. And many more.

I'd like to ask how should Qubes affect my choice (looking at Qubes 4 and 
newer):

* Obviously, it needs to meet the requirements mentioned at 
https://www.qubes-os.org/doc/system-requirements/ .
* I might want TXT for AEM (this is not performance-related, though).
* Qubes has GPU for all VMs emulated on CPU. (I believe the GPU emulation runs 
in the VM itself or in its stubdom.) This might increase need for multiple 
cores. (Unsure how much.) This might become more important when considering 
hiDPI or other GPU-intensive tasks.
* Qubes will typically use encryption (at least for data storage), which makes 
AES-NI potentially useful. It might also utilize an extra core.
* Qubes typically runs multiple VMs at once. I believe this introduces just a 
minor CPU overhead – while you have more OSes running at once, one VM will have 
fewer processes. Typically, IMHO at most one VM is performing CPU-bound tasks.

There are my more specific questions:

1. Does Qubes affected desicion between dual-core and quad-core CPUs? While 
Qubes will more likely utilize multiple cores, I believe that dual-core should 
be enough in most cases.
2. Is there anything wrong with Intel's U-series? One of considered CPUs is 
Intel i7 7500U, which seems to provide excellent single-core performance with 
low power consumption.

AFAIK, [this 
attack](http://blog.ptsecurity.com/2017/01/intel-debugger-interface-open-to.html)
 only work on the U-series.


3. Should I be picky about integrated graphics? Since it is used in dom0 only, 
I don't think its performance is important in QubesOS. Maybe it will become 
important when XenGT is integrated in QubesOS (which is not sure if it happens 
at all).
4. Is there anything else I should be aware of when looking at recent i7 (or 
maybe i5) CPUs?

Regards,
Vít Šesták 'v6ak'

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/509f624e-267a-407e-aadb-5672f562dd35%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.



--WillyPillow
--
https://blog.nerde.pw/
PGP fingerprint = B57E 7237 B211 419C 35C4 AF5B EB4D 3264 A318 73CB
--

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/If3P9npSvWYiqwpqZhWK0FlICfwGvItZBIukXTipuHwtQ4DAUN8yEy49DRcq3oXSJ5N3t8S73cW0Yd86hthwBvWeIRn2z8H9_1vldIQaVDQ%3D%40nerde.pw.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How do I attach two virtualized NICs to one HVM?

2017-02-04 Thread charles . l . scoville
Ok, so, after much messing around with it I still couldn't seem to get anything 
to work. It was baffling, I was pretty sure I was doing everything right but no 
dice.

... turns out that both of my add in NICs are broken, both in completely 
unrelated ways :( One just doesn't install correctly, it's seen as an unknown 
PCI device. The other installs right, but has some layer 1 problem. (can't 
detect a carrier, as if no cable was plugged in)

So, until I get a new NIC, I'm probably going to have to put this off for later.

Anyway, thanks for your help. I'll probably start a new thread if I'm still 
having problems with a new NIC.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8f351bdc-3a8e-48b8-aae8-41ced5e71efd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] symlinks in /va/lib/qubes for files

2017-02-04 Thread Oleg Artemiev
Hello.

I'm thinking about upgrading from 3.0 by reinstalling.

Subj?

 I remember I had some troubles w/ qubes utilities when had install
with many mount points under /var/lib/qubes and attempted to symlink
some dirs to another path in dom0. Sorry - more than 1.5 years ago -
don't remember exactly what was a problem - AFAIR I was interested in
moving file to difrent location and place a symlink to new
location..%)

-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABunX6PZLN21h8DKMxYQ4n2oKthF8XAY-tNcFCg3KRBcaBxVvA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Two ways of "true" security.

2017-02-04 Thread Oleg Artemiev
Hi

On Sat, Feb 4, 2017 at 3:38 PM, Rusty Bird  wrote:
>> > I have successfully castrated ME firmware on 2 Haswell laptops so I'd go 
>> > for something more recent but well supported by Linux, reflash and put a 
>> > non-Intel network card for peace of mind.
>> Could you show the instructions and write here your chipset?
> He's probably referring to https://github.com/corna/me_cleaner
Thanks for link!

Is it possible to make unusable USB-JTAG bridge I've heared about in
modern computers w/ this utility?

I 'd be glad to get rid of intel independent chip abitilty to get
periferal  interface access w/o my pemission, especially network and
usb.

Interesting has anyone made such a surgery operation on asus n56vz w/o
bricking it?

-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABunX6Oy9_uPVp0XwEpeREe_2Oz4UiY-os0SwwXwEf%2BQOxjA4g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qubes regularry attaches and detaches usb card reader

2017-02-04 Thread Oleg Artemiev
Currently I've all usb controllers attached to Dom0.

Subj:

Is there any process that should do it usually in Dom0?

-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABunX6OQtMrKsP7Gh7T3AT8e8YUJ%2B5%3DY8qd0ecoOsRe733rzyQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unable to locate package linux-headers

2017-02-04 Thread Aneer Qadri
'TimMeskov' via qubes-users:
> I followed this procedure:
> 1. Download debian-8 template
> 2. Installed linux-headers 3.16.0-4-amd64
> 3. Upgraded debian-8 to debian-9
> 4. apt-get update && apt-get dist-upgrade in debian-9, have downloaded kernel 
> 4.9.0-1-amd64
> 
> Before remove the old kernel with autoremove, I try to install the new with 
> dkms command like described in doc, but the output is:
> 
> Error! bad return status for module build on kernel 4.9.0-1-amd64 (x86_64)
> Consult /var/lib/dkms/u2mfn/3.2.3/build/make.log
> 

Could you paste what /var/lib/dkms/u2mfn/3.2.3/build/make.log says?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o75l23%24npi%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL Suggestions?

2017-02-04 Thread Oleg Artemiev
> This is a good time to mention that we're in need of an HCL
> maintainer. Our longtime volunteer HCL maintainer, Zrubi, no longer
> has the time to do it. We all owe Zrubi a debt of gratitude for
> keeping up this thankless task for so long! :)
>
> Any volunteers?
Why not to just script-out this once and forget?

source information: email from someone, output information -> some
file to put on the web?

-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABunX6ORm1Evhkmm813vum-CzX320dASBD0LspU8N06tL0GVZA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Devilspie2 integration

2017-02-04 Thread WillyPillow
 Original Message 
Subject: Re: [qubes-users] Devilspie2 integration
Local Time: February 2, 2017 10:05 PM
UTC Time: February 2, 2017 10:05 PM
From: tas...@openmailbox.org
To: Hack , qubes-users@googlegroups.com

On 02/02/2017 09:09 AM, Hack wrote:
> Hi,
>
> Could it be possible to provide Qubes OS with Devilspie2 at first
> install?
>
> Like this, we could have, by default? some virtual desktops attributed
> to some task.
>
> For example:
>
> * Desktop 1 = administration tasks (sys-firewall, sys-net, etc…)
> * Desktop 2 = Personal
> * Desktop 3 = Work
> * and so on
>
> Maybe with some color "matching" on the tool bars?
>
> Of course, with the option to customize it.


This is one of the things I love about using KDE on Qubes.

Chris


Also, with AwesomeWM it should be possible to set up custom rules that 
automatically tags clients in different domUs, though I've never tried this.



--WillyPillow
--
https://blog.nerde.pw/
PGP fingerprint = B57E 7237 B211 419C 35C4 AF5B EB4D 3264 A318 73CB
--

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2rX_S64575-cMWOioc0-M6b7W4wXPgYwCLdkIUedrhxvmDjtGQ3Y_3hzTh-JQom0AjnYuqr2jA-FsCN-nG609jHYDQxq0xt7C45s_X93d2M%3D%40nerde.pw.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] user behavioral analytics

2017-02-04 Thread Oleg Artemiev
The only interface to this I can think of is running analysing
software inside a VM and export it to other VM via dom0 scripting.
Also you may mount VM drives inside Dom0 (security risk enen when
mounting r/o!) and monitor file system access w/ some software
designed for this. You also may mount a /proc and other statistical
virtual file systems from VM to Dom0 to some place and monitor it w/
something specially designed for this.

On Thu, Feb 2, 2017 at 12:40 PM, Zbigniew Łukasiak  wrote:
> Is it possible to control one VM form another one enough to do a User
> Behavioral Analysis (one that would include not just net usage but
> also data internal to the anlyzed vm)? I guess this should be possible
> - so further questions - is anyone working on this? Are there any
> plans for tools doing this?
>
> --
> Zbigniew Lukasiak
> http://brudnopis.blogspot.com/
> http://perlalchemy.blogspot.com/
>
> --
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/CAGL_UUshxg%2BscQh7ONEDpmRc3sF8_aO7ioaBVKUSM92f7NqTpA%40mail.gmail.com.
> For more options, visit https://groups.google.com/d/optout.



-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABunX6P1iVS2qz%2Ba34%2BOF-q9PpknukS4V%2BKHAOSDPe%2B9RFBBSQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] user behavioral analytics

2017-02-04 Thread Unman
On Sun, Feb 05, 2017 at 02:02:28AM +0300, Oleg Artemiev wrote:
> The only interface to this I can think of is running analysing
> software inside a VM and export it to other VM via dom0 scripting.
> Also you may mount VM drives inside Dom0 (security risk enen when
> mounting r/o!) and monitor file system access w/ some software
> designed for this. You also may mount a /proc and other statistical
> virtual file systems from VM to Dom0 to some place and monitor it w/
> something specially designed for this.
> 
> On Thu, Feb 2, 2017 at 12:40 PM, Zbigniew Łukasiak  wrote:
> > Is it possible to control one VM form another one enough to do a User
> > Behavioral Analysis (one that would include not just net usage but
> > also data internal to the anlyzed vm)? I guess this should be possible
> > - so further questions - is anyone working on this? Are there any
> > plans for tools doing this?
> >
> > --
> > Zbigniew Lukasiak
> > http://brudnopis.blogspot.com/
> > http://perlalchemy.blogspot.com/
> >
> > --
> > You received this message because you are subscribed to the Google Groups 
> > "qubes-users" group.
> > To unsubscribe from this group and stop receiving emails from it, send an 
> > email to qubes-users+unsubscr...@googlegroups.com.
> > To post to this group, send email to qubes-users@googlegroups.com.
> > To view this discussion on the web visit 
> > https://groups.google.com/d/msgid/qubes-users/CAGL_UUshxg%2BscQh7ONEDpmRc3sF8_aO7ioaBVKUSM92f7NqTpA%40mail.gmail.com.
> > For more options, visit https://groups.google.com/d/optout.
> 

The qubes.VMShell service allows you to run a command in another vm, but
look at the warning in the policy file. You could qvm-copy your analysis
tool in to target, qvm-run the tool remotely then extract the result.

A better route would be to use qrexec service, tailored to the task
you want to perform. Look at www.qubes-os.org/doc/qrexec3/

There have been interesting posts recently on the use of qrexec services -
look in the list archives to see what people are doing with them.

Hope this helps

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170205002401.GA719%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] shrink ntfs from qubes - what do use for this?

2017-02-04 Thread Oleg Artemiev
Last time I wanted such a thing I was using a tool like partition
magic (boot from toolset disk). It was a few years ago. Is there a
relatively safe way to shrink a win7 partition from linux w/o
destroyng already installed win7 or current linux tools for this are
known to be not stable enough?

Installing windows on my laptop is a long timewaste - once did it for
games and would like to avpoid it.

-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABunX6NCaCM9yKPJS%2BLaJWWzVVFPtL8ig308p3ZX%3DjOfkGW07g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] "Backup VMs" does not backup salt configuration

2017-02-04 Thread Oleg Artemiev
Hi.

On Wed, Feb 1, 2017 at 11:56 PM, john.david.r.smith
 wrote:
> On 01/02/17 21:30, qu...@posteo.de wrote:
>> I have now nearly a complete salt configuration for all my templates so I
>> do not need to backup them anymore and save a lot of space by this.
>>
>> So I have ran a backup including dom0 and realized that the salt
>> configuration ("/srv/salt") does not seem to be included because it is much
>> bigger than the MB listed for dom0.
>>
>> Is there a way to back it up right now with this method or do I manually
>> have to copy everything outside of dom0?
>>
>> Thx in advance
>>
>
> i put my files in ~/salt and symlinked them to /srv/salt
> then backups should work

Could you point to source for more information on your work?

Backups work slow (disk/network bottlenecks) & I'm also interested to
backup less.

-- 
Bye.Olli.
gpg --search-keys grey_olli , use key w/ fingerprint below:
Key fingerprint = 9901 6808 768C 8B89 544C  9BE0 49F9 5A46 2B98 147E
Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABunX6Of_4KrpHRFSvcpLLd1sWPg6BKqjJiBsBuQvr8F1d2VBQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Anything similar to VirtualBox Saved Machine States?

2017-02-04 Thread anoa
Virtualbox has a handy feature that allows you to save a VM's state to
harddisk and store it for later, thus freeing up your RAM while allowing
you to return to work later without closing all the programs contained
within that VM.

It would also let users launch a RAM-heavy VM temporarily without having
to find running VMs to kill for more RAM.

Does Qubes/Xen have such a feature?

Andrew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o75ot1%24bbl%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Convert live system to VM in Qube OS?

2017-02-04 Thread szalonylabrador
Hi,
I am desktop end-user looking for additional security for my daily driver PC. I 
need to have access to all of the files on the system that I currently use for 
work - planning to fade it off, but at this time I was thinking I will try 
converting live system to a VM in Qube OS to use it when needed as I cannot 
afford re-configuring all of the software that I need on daily basis from 
scratch (time constraint). 

What would be the best way to do that?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8cccf9b2-f4a0-4d53-b5db-e1e2e3be31e6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Convert live system to VM in Qube OS?

2017-02-04 Thread szalonylabrador
On Saturday, February 4, 2017 at 1:12:54 PM UTC+1, szalony...@gmail.com wrote:
> Hi,
> I am desktop end-user looking for additional security for my daily driver PC. 
> I need to have access to all of the files on the system that I currently use 
> for work - planning to fade it off, but at this time I was thinking I will 
> try converting live system to a VM in Qube OS to use it when needed as I 
> cannot afford re-configuring all of the software that I need on daily basis 
> from scratch (time constraint). 
> 
> What would be the best way to do that?

I currently use dual boot Windows 7 and Debian 8.7 if it helps, but what I care 
about as a VM is Windows.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c5cf66e0-9c0f-4218-a89a-0c431d6bf131%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Two ways of "true" security.

2017-02-04 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

mr.l...@gmail.com:
> четверг, 2 февраля 2017 г., 17:33:46 UTC+5 пользователь Connor Page написал:
> > I have successfully castrated ME firmware on 2 Haswell laptops so I'd go 
> > for something more recent but well supported by Linux, reflash and put a 
> > non-Intel network card for peace of mind.
> 
> Could you show the instructions and write here your chipset?

He's probably referring to https://github.com/corna/me_cleaner

Rusty
-BEGIN PGP SIGNATURE-
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=Eht6
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170204123829.GA2245%40mutt.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can somebody explain me how install flux on Qubes OS 3.2 in a fedora Template ?

2017-02-04 Thread codeur4life
Le vendredi 3 février 2017 19:08:54 UTC+1, Chris Laprise a écrit :
> On 02/03/2017 05:52 AM, codeur4l...@gmail.com wrote:
> > Can somebody explain me the procédure for installing f.lux or fluxgui on 
> > Qubes OS 3.2 in a fedora Template ?
> >
> 
> You could install redshift in dom0 instead.
> 
> Chris

Ok this is this http://jonls.dk/redshift/
What should I do for installing this in dom0 ?
open dom0 console and execute  sudo yum install redshift ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/32dd5db3-0d3a-4cf8-ad15-29cd8a24d838%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Convert live system to VM in Qube OS?

2017-02-04 Thread Alex
On 02/04/2017 01:12 PM, szalonylabra...@gmail.com wrote:
> Hi, I am desktop end-user looking for additional security for my
> daily driver PC. I need to have access to all of the files on the
> system that I currently use for work - planning to fade it off, but
> at this time I was thinking I will try converting live system to a VM
> in Qube OS to use it when needed as I cannot afford re-configuring
> all of the software that I need on daily basis from scratch (time
> constraint).
> 
> What would be the best way to do that?
> 
First, you may already have thought about it, but the simple
transposition of a work pc to a VM environment (be it qubes or not) does
not give you any additional security benefit. It only increases the
compatibility problems!

To actually benefit from the Qubes architecture a deep restructuring of
both your filesystem and your habits must be done. If you want to
benefit from multi-vm-isolation, then you will need to split your
software usage (thus, configurations) among several VM. If you want to
benefit from fake persistence of system files, you will need to try to
move as much software as possible in either the template (installing
with dnf) or in /usr/local/bin (if manually-compiled or direct binary
package).

TL: DR; it takes time to get used to the split-vm environment,
especially so if you come from a single-workstation (both personal and
work) mindset. It took me ~1 month, and a couple reinstallations, two
years ago.

For your actual question, there's no tool to assist in "converting" a
live system to a Qubes VM: since there would be so little benefit
there's no actual reason to make such a tool. Since linux PVM are just
Xen domains, you may try to move all the files in your home directory
into the /home directory into the private.img ext4 volume of an AppVM of
your choice. If you use custom systemd unit files for your automations,
you could either put them in the template or in ~/.config/systemd/user
and enable/start them as user units (I do that for syncthing, for example).

If you use Windows, since this OS is supported as HVM (a nearly standard
virtual machine), you would not be able to easily move things between
the live system and the HVM, since the easiest way to have it working is
to install Windows *in* the HVM, thus having its own registry and system
files. If your main programs are on Windows, you will need to
reconfigure them from scratch. Trying to mount an image of the live
system in the HVM, or trying to mount it as a separate disk, could lead
to way more time being spent in investigating poorly documented issues.
Not that a Windows HVM is that much documented itself...

Good luck
-- 
Alex

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96061a77-22be-73e9-8383-3bf88a3757cc%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Re: off topic - invite codes to 'riseup'

2017-02-04 Thread kamalikool1
On Monday, December 8, 2014 at 6:39:17 AM UTC+5:30, saltyk...@gmail.com wrote:
> On Thursday, October 30, 2014 10:27:16 AM UTC-4, 
> bm-2cu9wcijafoqtf6...@bitmessage.ch wrote:
> > follow up...
> > 
> > I received an invite code from one generous riseup user.
> > 
> > I need one more.
> > 
> > Would appreciate a 2nd invite code from another riseup user.
> > 
> > Thank you in advance,
> > 
> > 
> > On 2014-10-28 18:26, bm-2cu9wcijafoqtf6boamtwr773pjglz1...@bitmessage.ch 
> > wrote:
> > > Dear qubes-users,
> > > 
> > > I am long time qubes follower and user. I apologize in advance if 
> > > anyone
> > > feels this request is spam.
> > > 
> > > I am looking for two invite codes needed to sign up to anonymous
> > > riseup.net email service.
> > > 
> > > I am hoping there are some qubes users who are riseup.net account
> > > holders.
> > > 
> > > Can anyone please send me a couple of invite codes that I might be able
> > > to sign up?
> > > 
> > > Thank you in advance.
> 
> Code sent!
> 
> Noah

need invite of riseup.net email account pls help me

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/56c42400-8210-4c29-b9f1-3d1873018c80%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] AMD GPU under Qubes OS

2017-02-04 Thread Top Hatted Cat
Hi, I have just installed Qubes OS R3.2 on an external HDD for trying it on my 
laptop. The laptop in question has an AMD APU. When booting the OS, it will 
freeze on "Starting Show Plymouth Boot Screen". Is there a driver I need to 
install or something I need to do to fix this?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/83d18d7e-6b15-4f49-b7b1-305292ebba72%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disposable VMs

2017-02-04 Thread Unman
On Sat, Feb 04, 2017 at 07:02:57PM +0100, john.david.r.smith wrote:
> On 04/02/17 18:42, Loren Rogers wrote:
> >Hi all,
> >
> >I'm confused about running disposable VMs - if I open a browser or file 
> >viewer, then want to open a terminal for the same VM, how could I do this? 
> >(E.g. I want to view an untrusted file, then make some edits.)
> right click the dispvm in the qubes manager.
> select run command.
> enter xterm or whatever you want to run
> 
> or user (in dom0) qvm-run DISPVM_NAME xterm
> >
> >Is there a way to configure the default disposable VM in the Qubes menu? I 
> >see that disposable VMs can be configured for individual domains, but I 
> >can't find where the generic one is.
> >
> >Also, is it possible to specify a different template for disposable 
> >machines? Say I'm running something based on the default fedora-23, and I 
> >want to open a document from my work VM, which uses that template. But I 
> >want to open it with my fedora-23-custom template as a disposable VM. (E.g. 
> >running a video in VLC that has untrustworthy components.) Is this doable?
> 
> currently you can only have one dispvm.
> if you want, you can set the template as default for dispvms 
> (qvm-create-default-dvm)
> 
> -john

Loren,

You can't configure disposable VMs for individual qubes - what you can
do is change the netVM which will apply if you start a disposableVM from
that qube. The dispVM that will be started is determined by the default
dvm, and this is set by qvm-create-default-dvm.

As John said, you can only have one default dvm, but it's trivial to
work around this with a small script. It's possible to do this because
qvm-create-default-dvm does NOT remove the files for old dvms. You can
see this if you generate a new default-dvm, and then look in
/var/lib/qubes/appvms.
So if you generate a number of different dvms based on different
templates, it's simple to switch between them before launching a new
dispVM. The launch time isn't noticeably different from starting up a
new dispVM, and voila - multiple template disposable VMs on the cheap.

I do this without any apparent ill effects, but it certainly isn't part
of the canon.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170204205904.GB32031%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disposable VMs

2017-02-04 Thread Loren Rogers
Sent with [ProtonMail](https://protonmail.com) Secure Email.


 Original Message 
Subject: Re: [qubes-users] Disposable VMs
Local Time: February 4, 2017 3:59 PM
UTC Time: February 4, 2017 8:59 PM
From: un...@thirdeyesecurity.org
To: john.david.r.smith 
Loren Rogers , qubes-users 


On Sat, Feb 04, 2017 at 07:02:57PM +0100, john.david.r.smith wrote:
> On 04/02/17 18:42, Loren Rogers wrote:
> >Hi all,
> >
> >I'm confused about running disposable VMs - if I open a browser or file 
> >viewer, then want to open a terminal for the same VM, how could I do this? 
> >(E.g. I want to view an untrusted file, then make some edits.)
> right click the dispvm in the qubes manager.
> select run command.
> enter xterm or whatever you want to run
>
> or user (in dom0) qvm-run DISPVM_NAME xterm
> >
> >Is there a way to configure the default disposable VM in the Qubes menu? I 
> >see that disposable VMs can be configured for individual domains, but I 
> >can't find where the generic one is.
> >
> >Also, is it possible to specify a different template for disposable 
> >machines? Say I'm running something based on the default fedora-23, and I 
> >want to open a document from my work VM, which uses that template. But I 
> >want to open it with my fedora-23-custom template as a disposable VM. (E.g. 
> >running a video in VLC that has untrustworthy components.) Is this doable?
>
> currently you can only have one dispvm.
> if you want, you can set the template as default for dispvms 
> (qvm-create-default-dvm)
>
> -john

Loren,

You can't configure disposable VMs for individual qubes - what you can
do is change the netVM which will apply if you start a disposableVM from
that qube. The dispVM that will be started is determined by the default
dvm, and this is set by qvm-create-default-dvm.

As John said, you can only have one default dvm, but it's trivial to
work around this with a small script. It's possible to do this because
qvm-create-default-dvm does NOT remove the files for old dvms. You can
see this if you generate a new default-dvm, and then look in
/var/lib/qubes/appvms.
So if you generate a number of different dvms based on different
templates, it's simple to switch between them before launching a new
dispVM. The launch time isn't noticeably different from starting up a
new dispVM, and voila - multiple template disposable VMs on the cheap.

I do this without any apparent ill effects, but it certainly isn't part
of the canon.

unman

Very interesting - thanks for the info on how it's done. I'm glad I wasn't just 
missing something obvious!

Loren

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/PE01ztr699RYXdxOtwdrLN4jQl2wLYLIi6qhTWY6CL3T-tvftTcAvHcNM5uiGAdatewIsatqoy8Mz8RFqaAa7AyxgWcjaty2Er2liDo99Gw%3D%40lorentrogers.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] AMD GPU under Qubes OS

2017-02-04 Thread taii...@gmx.com

On 02/04/2017 10:42 AM, Top Hatted Cat wrote:


Hi, I have just installed Qubes OS R3.2 on an external HDD for trying it on my laptop. 
The laptop in question has an AMD APU. When booting the OS, it will freeze on 
"Starting Show Plymouth Boot Screen". Is there a driver I need to install or 
something I need to do to fix this?

Thanks.

As I am an elite hacker, I have already remotely accessed your computer 
and ran "qubes-hcl-report" however the connection died and I wasn't able 
to get the results so can you maybe post them to the list?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3c60c7a0-61cd-4f1b-6eec-e4649025fdef%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Disposable VMs

2017-02-04 Thread Loren Rogers
Hi all,

I'm confused about running disposable VMs - if I open a browser or file viewer, 
then want to open a terminal for the same VM, how could I do this? (E.g. I want 
to view an untrusted file, then make some edits.)

Is there a way to configure the default disposable VM in the Qubes menu? I see 
that disposable VMs can be configured for individual domains, but I can't find 
where the generic one is.

Also, is it possible to specify a different template for disposable machines? 
Say I'm running something based on the default fedora-23, and I want to open a 
document from my work VM, which uses that template. But I want to open it with 
my fedora-23-custom template as a disposable VM. (E.g. running a video in VLC 
that has untrustworthy components.) Is this doable?


Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/P0V-3mPvSqFlHvDpDxAfjb-iBk5r3G38iXa8YcOPYHSBcYpo1MLvlgr5lOjsTSzA7C7u5gYM-fFnf-xlrNNGSabnhsq9xZgBvrbnn0jDE-o%3D%40lorentrogers.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] AMD GPU under Qubes OS

2017-02-04 Thread samsamsimpson02
On Saturday, 4 February 2017 16:33:32 UTC, tai...@gmx.com  wrote:
> On 02/04/2017 10:42 AM, Top Hatted Cat wrote:
> 
> > Hi, I have just installed Qubes OS R3.2 on an external HDD for trying it on 
> > my laptop. The laptop in question has an AMD APU. When booting the OS, it 
> > will freeze on "Starting Show Plymouth Boot Screen". Is there a driver I 
> > need to install or something I need to do to fix this?
> >
> > Thanks.
> >
> As I am an elite hacker, I have already remotely accessed your computer 
> and ran "qubes-hcl-report" however the connection died and I wasn't able 
> to get the results so can you maybe post them to the list?

That must have been the 7 firewalls.

Here's the results:
Qubes release 3.2 (R3.2)

Brand:  Hewlett-Packard
Model:  HP Pavilion 15 Notebook PC 
BIOS:   F.43

Xen:4.6.1
Kernel: 4.4.14-11

RAM:7103 Mb

CPU:
  HP Hexa-Core 2.0GHz
Chipset:
  Advanced Micro Devices, Inc. [AMD] Device [1022:1566]
VGA:
  Advanced Micro Devices, Inc. [AMD/ATI] Mullins [Radeon R4/R5 Graphics] 
[1002:9851] (rev 05) (prog-if 00 [VGA controller])
  Advanced Micro Devices, Inc. [AMD/ATI] Topaz XT [Radeon R7 M260/M265 / 
M340/M360 / M440/M445] [1002:6900] (rev ff) (prog-if ff)

Net:
  Realtek Semiconductor Co., Ltd. RTL8723BE PCIe Wireless Network Adapter
  Realtek Semiconductor Co., Ltd. RTL8101/2/6E PCI Express Fast/Gigabit 
Ethernet controller (rev 07)

SCSI:
  Samsung SSD 850  Rev: 1B6Q
  DVDRAM GU90N Rev: U900
  MQ01ABD100   Rev: 

HVM:Active
I/O MMU:Not active
HAP/SLAT:   Yes
TPM:Device not found

Qubes HCL Files are copied to: 'dom0'

Qubes-HCL-Hewlett_Packard-HP_Pavilion_15_Notebook_PC_-20170204-172931.yml   
- HCL Info

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07004349-e081-4f8d-a6c9-b4812c434efe%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Why doesn't whonix-gw run the latest 0.2.8.x tor?

2017-02-04 Thread Patrick Schleizer
cezg...@gmail.com:
> Den søndag den 29. januar 2017 kl. 12.36.04 UTC+1 skrev Joonas
> My guess is lack of time and funding.
> [...]

Right.

Gave the upgrade low priority and I am pretty conservative when it comes
to stable upgrades. It's not too hard to upload a package to the stable
repository that then would wreck connectivity for most users.

Posted on January 29, 2017:

> Tor was updated to 0.2.9.9-1~d80.jessie+1 in Whonix
stable-proposed-updates as well as in testers repository.

https://forums.whonix.org/t/tor-0-2-9-9-1-d80-jessie-1-stable-upgrade-testers-wanted

Cheers,
Patrick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e94b7f3-50b7-f5d4-9259-80c9fa75e448%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-usb fails if sys-usb template is set to fedora-24-minimal

2017-02-04 Thread Grzegorz Chodzicki

On 02/03/2017 11:56 PM, Andrew David Wong wrote:
> On 2017-02-03 06:34, Grzesiek Chodzicki wrote:
> > qubes-usb-proxy not installed in VM is thrown in dom0 terminal after
> running qvm-usb -a if sys-usb uses minimal fedora 24 template.
> Necessary packages were installed in fedora-24-minimal beforehand
>
> > Steps to reproduce:
> > 1. Launch fedora-24-minimal terminal
> > 2. sudo dnf install qubes-usb-proxy qubes-input-proxy-sender (or
> switch to root beforehand if sudo not installed)
> > 3. Shutdown fedora-24-minimal
> > 4. Shutdown sys-usb
> > 5. Change sys-usb template to fedora-24-minimal (qvm-prefs -s
> sys-usb template fedora-24-minimal)
> > 6. Launch sys-usb
> > 7. Try attaching any USB device via qvm-usb
>
> > Observed behavior:
> > ERROR: qubes-usb-proxy not installed in VM
>
> > Expected behavior:
> > Device is attached to an AppVM
>
> > Additional details:
> > Switching the template back to regular fedora-24 causes the qvm-usb
> to work fine.
>
>
> Are you sure that the necessary packages and all dependencies are
> actually installed? See:
>
> https://github.com/QubesOS/qubes-issues/issues/2606
>
>

This does seem to be the issue, however manually installing the pycairo
package does not resolve the problem. Fedora-24-minimal has the
qubes-usb-proxy-1.0.5-1.fc24.noarch package installed however Dom0 still
throws the usb-proxy not installed error.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f42b6e38-90fd-355f-fe9d-8fceca8afd9b%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disposable VMs

2017-02-04 Thread john.david.r.smith

On 04/02/17 18:42, Loren Rogers wrote:

Hi all,

I'm confused about running disposable VMs - if I open a browser or file viewer, 
then want to open a terminal for the same VM, how could I do this? (E.g. I want 
to view an untrusted file, then make some edits.)

right click the dispvm in the qubes manager.
select run command.
enter xterm or whatever you want to run

or user (in dom0) qvm-run DISPVM_NAME xterm


Is there a way to configure the default disposable VM in the Qubes menu? I see 
that disposable VMs can be configured for individual domains, but I can't find 
where the generic one is.

Also, is it possible to specify a different template for disposable machines? 
Say I'm running something based on the default fedora-23, and I want to open a 
document from my work VM, which uses that template. But I want to open it with 
my fedora-23-custom template as a disposable VM. (E.g. running a video in VLC 
that has untrustworthy components.) Is this doable?


currently you can only have one dispvm.
if you want, you can set the template as default for dispvms 
(qvm-create-default-dvm)

-john

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a56fa765-2503-8f2a-2f05-6ba87e5cbb72%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Workaround for building Ubuntu xenial+desktop with qubes-builder

2017-02-04 Thread Nick Darren


On 02/04/2017 05:12 AM, anoa wrote:
> On 02/03/2017 08:41 AM, Unman wrote:
>> On Fri, Feb 03, 2017 at 06:21:15AM +, Nick Darren wrote:
>>>
>>> On 02/02/2017 12:07 AM, Unman wrote:
 On Mon, Jan 30, 2017 at 11:00:41AM -0800, Andrew M wrote:
> Thanks Unman,
>
> This bug is currently affecting my work so it would be greatly
> appreciated if it were resolved :)
>
>
> On 01/29/2017 06:38 PM, Unman wrote:
>> On Sat, Jan 28, 2017 at 12:31:38PM +, Nick Darren wrote:
>>> /Hi all,/
>>>
>>>
>>> On 01/24/2017 06:59 AM, anoa wrote:
 Hey all,

 Today I was trying to build the Ubuntu 16.04 Xenial+Desktop template
 using qubes-builder with help from these instructions:

 https://github.com/QubesOS/qubes-builder

 Everything was alright until the `make qubes-vm` step where it would
 fail on the following:

> dpkg-source: error: can't build with source format '3.0 (quilt)': no 
> upstream tarball found at ../xen_4.6.3.orig.tar.{bz2,gz,lzma,xz}
> dpkg-buildpackage: error: dpkg-source -b debian-vm gave error exit 
> status 255
> /home/user/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:196:
>  recipe for target 'dist-package' failed
 The build was looking for xen_4.6.3 when in fact xen_4.6.4 is in the
 folder. As a workaround, simply copying the xen_4.6.4 to be named
 xen.4.6.3 allowed the build to continue and eventually complete
 successfully:

> cd /path/to/qubes-builder/chroot-xenial/home/user/qubes-src/vmm-xen; 
> sudo cp -pr ./xen_4.6.4.orig.tar.gz ./xen_4.6.3.orig.tar.gz
>>> /It doesn't work by just rename the 'xen_4.6.4.orig.tar.gz' on
>>> chroot-xenial. On my case (on testing to build xenial-desktop) needs to
>>> copy the file to /path/to/qubes-builder/qubes-src/vmm-xen/. there. Then,
>>> it will skip the error message and allowed the build successfully./
>>>
 Hope this helps someone while the script is being updated.

>>> /I have another weird situation. The build was succeed but the problem
>>> is, terminal and some others application cannot be launched due to an
>>> error, normally on ubuntu's standard installation caused by locales
>>> issue. Tried to fix it the way it used to be on normal ubuntu
>>> installation or archlinux. But the problem still persists after
>>> rebooting the template-vm or any appvms that's based on it./
>>>
>>> user@ubuntu-xenial:~$ Error constructing proxy for
>>> org.gnome.Terminal:/org/gnome/Terminal/Factory0: Error calling
>>> StartServiceByName for org.gnome.Terminal:
>>> GDBus.Error:org.freedesktop.DBus.Error.Spawn.ChildSignaled: Process
>>> org.gnome.Terminal received signal 5
>>>
>>> /Test on executing gedit from xterm/UXterm/urvtx:/
>>>
>>> user@ubuntu-xenial:~$ gedit
>>> Gedit failure to execute.
>>> (gedit:5697): GLib-GIO-ERROR **: No GSettings schemas are installed on
>>> the system
>>> Trace/breakpoint trap (core dumped)
>>>
>>>
>>> /The same error happen when I execute the 'xfce4-terminal' or
>>> 'terminator'. Still the same 'Trace/breakpoint trap (core dumped)'
>>> issues here and there./
>>>
>>>
>>> 
>>>
>>> /Locale was set in order to avoid gnome-terminal error, but it' useless
>>> on this case and still failed to work./
>>>
>>> user@ubuntu-xenial:~$ localectl
>>>System Locale: LANG=en_US.UTF-8
>>>VC Keymap: us
>>>   X11 Layout: us
>>>X11 Model: pc105+inet
>>>  X11 Options: terminate:ctrl_alt_bksp
>>>
>>> 
>>>
>>> /On checking qubes local packages installed on the 'xenial-desktop' 
>>> system.
>>> /
>>> libqubes-rpc-filecopy2/now 3.2.3+xenialu1 amd64 [installed,local]
>>>   Qubes file copy protocol library
>>>
>>> libqubesdb/now 3.2.3-1+xenialu1 amd64 [installed,local]
>>>   QubesDB libs.
>>>
>>> libvchan-xen/now 3.2.0-1+xenialu1 amd64 [installed,local]
>>>   Qubes Xen core libraries
>>>
>>> libxen-4.6/now 2001:4.6.3-25+xenialu1 amd64 [installed,local]
>>>   Libraries for Xen tools
>>>
>>> qubes-core-agent/now 3.2.15-1+xenialu1 amd64 [installed,local]
>>>   Qubes core agent
>>>
>>> qubes-gui-agent/now 3.2.13-1+xenialu1 amd64 [installed,local]
>>>   Makes X11 windows available to qubes dom0
>>>
>>> qubes-utils/now 3.2.3+xenialu1 amd64 [installed,local]
>>>   Qubes Linux utilities
>>>
>>> qubesdb/now 3.2.3-1+xenialu1 amd64 [installed,local]
>>>   QubesDB management tools and daemon.
>>>
>>> qubesdb-vm/now 3.2.3-1+xenialu1 amd64 [installed,local]
>>>   QubesDB VM service.
>>>
>>> xserver-xorg-input-qubes/now 3.2.13-1+xenialu1 amd64 [installed,local]
>>>   X 

Re: [qubes-users] Can somebody explain me how install flux on Qubes OS 3.2 in a fedora Template ?

2017-02-04 Thread Chris Laprise

On 02/04/2017 08:08 AM, codeur4l...@gmail.com wrote:

Le vendredi 3 février 2017 19:08:54 UTC+1, Chris Laprise a écrit :

On 02/03/2017 05:52 AM, codeur4l...@gmail.com wrote:

Can somebody explain me the procédure for installing f.lux or fluxgui on Qubes 
OS 3.2 in a fedora Template ?


You could install redshift in dom0 instead.

Chris

Ok this is this http://jonls.dk/redshift/
What should I do for installing this in dom0 ?
open dom0 console and execute  sudo yum install redshift ?


$ sudo qubes-dom0-update redshift

Here is the doc for updates/installs: 
https://www.qubes-os.org/doc/software-update-dom0/


There are two GUIs for redshift that you can also add:
plasma-applet-redshift-control (KDE)
redshift-gtk (Xfce)

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9ce45210-d7e1-9f83-8222-b07652aed1c1%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Current chances of successful Qubes-3.2 on iMac 27" Retina, Mac OSX Sierra 10.12.3 (i5, Radeon M380)

2017-02-04 Thread dave m.
It looks like there are occasionally people who want to run Qubes on a Mac, and 
also some partial success stories.  However, the most recent I can find are 
from a while ago, with previous versions of Qubes, previous OSX, and older Macs.

Is there an updated Howto or more recent info about this?  I have a late 2015 
27" Retina iMac (model iMac17,1), i5 processor, Radeon R9 M380 video.  I would 
like to run Qubes, with Mac OSX, Linux and Win7 guests.  (My current setup is 
OSX host, with Linux and Win7 guests under VMWare or Parallels; this works OK, 
but I wanted to try Qubes for security.)

I did manage to boot a Qubes-3.2 USB drive, but it stops shortly after the 
initial (Grub?) bootscreen, when you select "Install..."  It says "Xen 4.6.1 
(c/s ) EFI loader, using configuration [...], vmlinuz [...], initrd.img [...]"

(I'm guessing the video is going elsewhere, but I don't know where!)

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/89452576-4f83-4471-af25-0290afb002ac%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Workaround for building Ubuntu xenial+desktop with qubes-builder

2017-02-04 Thread Unman
On Sat, Feb 04, 2017 at 06:46:53PM +, Nick Darren wrote:
> 
> 
> On 02/04/2017 05:12 AM, anoa wrote:
> > On 02/03/2017 08:41 AM, Unman wrote:
> >> On Fri, Feb 03, 2017 at 06:21:15AM +, Nick Darren wrote:
> >>>
> >>> On 02/02/2017 12:07 AM, Unman wrote:
>  On Mon, Jan 30, 2017 at 11:00:41AM -0800, Andrew M wrote:
> > Thanks Unman,
> >
> > This bug is currently affecting my work so it would be greatly
> > appreciated if it were resolved :)
> >
> >
> > On 01/29/2017 06:38 PM, Unman wrote:
> >> On Sat, Jan 28, 2017 at 12:31:38PM +, Nick Darren wrote:
> >>> /Hi all,/
> >>>
> >>>
> >>> On 01/24/2017 06:59 AM, anoa wrote:
>  Hey all,
> 
>  Today I was trying to build the Ubuntu 16.04 Xenial+Desktop template
>  using qubes-builder with help from these instructions:
> 
>  https://github.com/QubesOS/qubes-builder
> 
>  Everything was alright until the `make qubes-vm` step where it would
>  fail on the following:
> 
> > dpkg-source: error: can't build with source format '3.0 (quilt)': 
> > no upstream tarball found at ../xen_4.6.3.orig.tar.{bz2,gz,lzma,xz}
> > dpkg-buildpackage: error: dpkg-source -b debian-vm gave error exit 
> > status 255
> > /home/user/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:196:
> >  recipe for target 'dist-package' failed
>  The build was looking for xen_4.6.3 when in fact xen_4.6.4 is in the
>  folder. As a workaround, simply copying the xen_4.6.4 to be named
>  xen.4.6.3 allowed the build to continue and eventually complete
>  successfully:
> 
> > cd 
> > /path/to/qubes-builder/chroot-xenial/home/user/qubes-src/vmm-xen; 
> > sudo cp -pr ./xen_4.6.4.orig.tar.gz ./xen_4.6.3.orig.tar.gz
> >>> /It doesn't work by just rename the 'xen_4.6.4.orig.tar.gz' on
> >>> chroot-xenial. On my case (on testing to build xenial-desktop) needs 
> >>> to
> >>> copy the file to /path/to/qubes-builder/qubes-src/vmm-xen/. there. 
> >>> Then,
> >>> it will skip the error message and allowed the build successfully./
> >>>
>  Hope this helps someone while the script is being updated.
> 
> >>> /I have another weird situation. The build was succeed but the problem
> >>> is, terminal and some others application cannot be launched due to an
> >>> error, normally on ubuntu's standard installation caused by locales
> >>> issue. Tried to fix it the way it used to be on normal ubuntu
> >>> installation or archlinux. But the problem still persists after
> >>> rebooting the template-vm or any appvms that's based on it./
> >>>
> >>> user@ubuntu-xenial:~$ Error constructing proxy for
> >>> org.gnome.Terminal:/org/gnome/Terminal/Factory0: Error calling
> >>> StartServiceByName for org.gnome.Terminal:
> >>> GDBus.Error:org.freedesktop.DBus.Error.Spawn.ChildSignaled: Process
> >>> org.gnome.Terminal received signal 5
> >>>
> >>> /Test on executing gedit from xterm/UXterm/urvtx:/
> >>>
> >>> user@ubuntu-xenial:~$ gedit
> >>> Gedit failure to execute.
> >>> (gedit:5697): GLib-GIO-ERROR **: No GSettings schemas are installed on
> >>> the system
> >>> Trace/breakpoint trap (core dumped)
> >>>
> >>>
> >>> /The same error happen when I execute the 'xfce4-terminal' or
> >>> 'terminator'. Still the same 'Trace/breakpoint trap (core dumped)'
> >>> issues here and there./
> >>>
> >>>
> >>> 
> >>>
> >>> /Locale was set in order to avoid gnome-terminal error, but it' 
> >>> useless
> >>> on this case and still failed to work./
> >>>
> >>> user@ubuntu-xenial:~$ localectl
> >>>System Locale: LANG=en_US.UTF-8
> >>>VC Keymap: us
> >>>   X11 Layout: us
> >>>X11 Model: pc105+inet
> >>>  X11 Options: terminate:ctrl_alt_bksp
> >>>
> >>> 
> >>>
> >>> /On checking qubes local packages installed on the 'xenial-desktop' 
> >>> system.
> >>> /
> >>> libqubes-rpc-filecopy2/now 3.2.3+xenialu1 amd64 [installed,local]
> >>>   Qubes file copy protocol library
> >>>
> >>> libqubesdb/now 3.2.3-1+xenialu1 amd64 [installed,local]
> >>>   QubesDB libs.
> >>>
> >>> libvchan-xen/now 3.2.0-1+xenialu1 amd64 [installed,local]
> >>>   Qubes Xen core libraries
> >>>
> >>> libxen-4.6/now 2001:4.6.3-25+xenialu1 amd64 [installed,local]
> >>>   Libraries for Xen tools
> >>>
> >>> qubes-core-agent/now 3.2.15-1+xenialu1 amd64 [installed,local]
> >>>   Qubes core agent
> >>>
> >>> qubes-gui-agent/now 3.2.13-1+xenialu1 amd64 [installed,local]
> >>>   Makes X11 windows available to qubes dom0
> >>>
> >>> qubes-utils/now 3.2.3+xenialu1 amd64 [installed,local]
> >>>   Qubes