Re: [qubes-users] Number of cores and other CPU characteristics
Original Message Subject: [qubes-users] Number of cores and other CPU characteristics Local Time: February 2, 2017 9:50 AM UTC Time: February 2, 2017 9:50 AM From: groups-no-private-mail--contact-me-at--contact.v6ak@v6ak.com To: qubes-usersChoosing the right CPU is about choosing the right tradeoff. The tradeoff is not only between price, power consumption and performance. We can also balance single-core performance to multi-core performance, or we might want some enhancements for some specific tasks, like AES-NI. And many more. I'd like to ask how should Qubes affect my choice (looking at Qubes 4 and newer): * Obviously, it needs to meet the requirements mentioned at https://www.qubes-os.org/doc/system-requirements/ . * I might want TXT for AEM (this is not performance-related, though). * Qubes has GPU for all VMs emulated on CPU. (I believe the GPU emulation runs in the VM itself or in its stubdom.) This might increase need for multiple cores. (Unsure how much.) This might become more important when considering hiDPI or other GPU-intensive tasks. * Qubes will typically use encryption (at least for data storage), which makes AES-NI potentially useful. It might also utilize an extra core. * Qubes typically runs multiple VMs at once. I believe this introduces just a minor CPU overhead – while you have more OSes running at once, one VM will have fewer processes. Typically, IMHO at most one VM is performing CPU-bound tasks. There are my more specific questions: 1. Does Qubes affected desicion between dual-core and quad-core CPUs? While Qubes will more likely utilize multiple cores, I believe that dual-core should be enough in most cases. 2. Is there anything wrong with Intel's U-series? One of considered CPUs is Intel i7 7500U, which seems to provide excellent single-core performance with low power consumption. AFAIK, [this attack](http://blog.ptsecurity.com/2017/01/intel-debugger-interface-open-to.html) only work on the U-series. 3. Should I be picky about integrated graphics? Since it is used in dom0 only, I don't think its performance is important in QubesOS. Maybe it will become important when XenGT is integrated in QubesOS (which is not sure if it happens at all). 4. Is there anything else I should be aware of when looking at recent i7 (or maybe i5) CPUs? Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/509f624e-267a-407e-aadb-5672f562dd35%40googlegroups.com. For more options, visit https://groups.google.com/d/optout. --WillyPillow -- https://blog.nerde.pw/ PGP fingerprint = B57E 7237 B211 419C 35C4 AF5B EB4D 3264 A318 73CB -- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/If3P9npSvWYiqwpqZhWK0FlICfwGvItZBIukXTipuHwtQ4DAUN8yEy49DRcq3oXSJ5N3t8S73cW0Yd86hthwBvWeIRn2z8H9_1vldIQaVDQ%3D%40nerde.pw. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How do I attach two virtualized NICs to one HVM?
Ok, so, after much messing around with it I still couldn't seem to get anything to work. It was baffling, I was pretty sure I was doing everything right but no dice. ... turns out that both of my add in NICs are broken, both in completely unrelated ways :( One just doesn't install correctly, it's seen as an unknown PCI device. The other installs right, but has some layer 1 problem. (can't detect a carrier, as if no cable was plugged in) So, until I get a new NIC, I'm probably going to have to put this off for later. Anyway, thanks for your help. I'll probably start a new thread if I'm still having problems with a new NIC. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8f351bdc-3a8e-48b8-aae8-41ced5e71efd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] symlinks in /va/lib/qubes for files
Hello. I'm thinking about upgrading from 3.0 by reinstalling. Subj? I remember I had some troubles w/ qubes utilities when had install with many mount points under /var/lib/qubes and attempted to symlink some dirs to another path in dom0. Sorry - more than 1.5 years ago - don't remember exactly what was a problem - AFAIR I was interested in moving file to difrent location and place a symlink to new location..%) -- Bye.Olli. gpg --search-keys grey_olli , use key w/ fingerprint below: Key fingerprint = 9901 6808 768C 8B89 544C 9BE0 49F9 5A46 2B98 147E Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABunX6PZLN21h8DKMxYQ4n2oKthF8XAY-tNcFCg3KRBcaBxVvA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Two ways of "true" security.
Hi On Sat, Feb 4, 2017 at 3:38 PM, Rusty Birdwrote: >> > I have successfully castrated ME firmware on 2 Haswell laptops so I'd go >> > for something more recent but well supported by Linux, reflash and put a >> > non-Intel network card for peace of mind. >> Could you show the instructions and write here your chipset? > He's probably referring to https://github.com/corna/me_cleaner Thanks for link! Is it possible to make unusable USB-JTAG bridge I've heared about in modern computers w/ this utility? I 'd be glad to get rid of intel independent chip abitilty to get periferal interface access w/o my pemission, especially network and usb. Interesting has anyone made such a surgery operation on asus n56vz w/o bricking it? -- Bye.Olli. gpg --search-keys grey_olli , use key w/ fingerprint below: Key fingerprint = 9901 6808 768C 8B89 544C 9BE0 49F9 5A46 2B98 147E Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABunX6Oy9_uPVp0XwEpeREe_2Oz4UiY-os0SwwXwEf%2BQOxjA4g%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] qubes regularry attaches and detaches usb card reader
Currently I've all usb controllers attached to Dom0. Subj: Is there any process that should do it usually in Dom0? -- Bye.Olli. gpg --search-keys grey_olli , use key w/ fingerprint below: Key fingerprint = 9901 6808 768C 8B89 544C 9BE0 49F9 5A46 2B98 147E Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABunX6OQtMrKsP7Gh7T3AT8e8YUJ%2B5%3DY8qd0ecoOsRe733rzyQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Unable to locate package linux-headers
'TimMeskov' via qubes-users: > I followed this procedure: > 1. Download debian-8 template > 2. Installed linux-headers 3.16.0-4-amd64 > 3. Upgraded debian-8 to debian-9 > 4. apt-get update && apt-get dist-upgrade in debian-9, have downloaded kernel > 4.9.0-1-amd64 > > Before remove the old kernel with autoremove, I try to install the new with > dkms command like described in doc, but the output is: > > Error! bad return status for module build on kernel 4.9.0-1-amd64 (x86_64) > Consult /var/lib/dkms/u2mfn/3.2.3/build/make.log > Could you paste what /var/lib/dkms/u2mfn/3.2.3/build/make.log says? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/o75l23%24npi%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] HCL Suggestions?
> This is a good time to mention that we're in need of an HCL > maintainer. Our longtime volunteer HCL maintainer, Zrubi, no longer > has the time to do it. We all owe Zrubi a debt of gratitude for > keeping up this thankless task for so long! :) > > Any volunteers? Why not to just script-out this once and forget? source information: email from someone, output information -> some file to put on the web? -- Bye.Olli. gpg --search-keys grey_olli , use key w/ fingerprint below: Key fingerprint = 9901 6808 768C 8B89 544C 9BE0 49F9 5A46 2B98 147E Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABunX6ORm1Evhkmm813vum-CzX320dASBD0LspU8N06tL0GVZA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Devilspie2 integration
Original Message Subject: Re: [qubes-users] Devilspie2 integration Local Time: February 2, 2017 10:05 PM UTC Time: February 2, 2017 10:05 PM From: tas...@openmailbox.org To: Hack, qubes-users@googlegroups.com On 02/02/2017 09:09 AM, Hack wrote: > Hi, > > Could it be possible to provide Qubes OS with Devilspie2 at first > install? > > Like this, we could have, by default? some virtual desktops attributed > to some task. > > For example: > > * Desktop 1 = administration tasks (sys-firewall, sys-net, etc…) > * Desktop 2 = Personal > * Desktop 3 = Work > * and so on > > Maybe with some color "matching" on the tool bars? > > Of course, with the option to customize it. This is one of the things I love about using KDE on Qubes. Chris Also, with AwesomeWM it should be possible to set up custom rules that automatically tags clients in different domUs, though I've never tried this. --WillyPillow -- https://blog.nerde.pw/ PGP fingerprint = B57E 7237 B211 419C 35C4 AF5B EB4D 3264 A318 73CB -- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2rX_S64575-cMWOioc0-M6b7W4wXPgYwCLdkIUedrhxvmDjtGQ3Y_3hzTh-JQom0AjnYuqr2jA-FsCN-nG609jHYDQxq0xt7C45s_X93d2M%3D%40nerde.pw. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] user behavioral analytics
The only interface to this I can think of is running analysing software inside a VM and export it to other VM via dom0 scripting. Also you may mount VM drives inside Dom0 (security risk enen when mounting r/o!) and monitor file system access w/ some software designed for this. You also may mount a /proc and other statistical virtual file systems from VM to Dom0 to some place and monitor it w/ something specially designed for this. On Thu, Feb 2, 2017 at 12:40 PM, Zbigniew Łukasiakwrote: > Is it possible to control one VM form another one enough to do a User > Behavioral Analysis (one that would include not just net usage but > also data internal to the anlyzed vm)? I guess this should be possible > - so further questions - is anyone working on this? Are there any > plans for tools doing this? > > -- > Zbigniew Lukasiak > http://brudnopis.blogspot.com/ > http://perlalchemy.blogspot.com/ > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/CAGL_UUshxg%2BscQh7ONEDpmRc3sF8_aO7ioaBVKUSM92f7NqTpA%40mail.gmail.com. > For more options, visit https://groups.google.com/d/optout. -- Bye.Olli. gpg --search-keys grey_olli , use key w/ fingerprint below: Key fingerprint = 9901 6808 768C 8B89 544C 9BE0 49F9 5A46 2B98 147E Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABunX6P1iVS2qz%2Ba34%2BOF-q9PpknukS4V%2BKHAOSDPe%2B9RFBBSQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] user behavioral analytics
On Sun, Feb 05, 2017 at 02:02:28AM +0300, Oleg Artemiev wrote: > The only interface to this I can think of is running analysing > software inside a VM and export it to other VM via dom0 scripting. > Also you may mount VM drives inside Dom0 (security risk enen when > mounting r/o!) and monitor file system access w/ some software > designed for this. You also may mount a /proc and other statistical > virtual file systems from VM to Dom0 to some place and monitor it w/ > something specially designed for this. > > On Thu, Feb 2, 2017 at 12:40 PM, Zbigniew Łukasiakwrote: > > Is it possible to control one VM form another one enough to do a User > > Behavioral Analysis (one that would include not just net usage but > > also data internal to the anlyzed vm)? I guess this should be possible > > - so further questions - is anyone working on this? Are there any > > plans for tools doing this? > > > > -- > > Zbigniew Lukasiak > > http://brudnopis.blogspot.com/ > > http://perlalchemy.blogspot.com/ > > > > -- > > You received this message because you are subscribed to the Google Groups > > "qubes-users" group. > > To unsubscribe from this group and stop receiving emails from it, send an > > email to qubes-users+unsubscr...@googlegroups.com. > > To post to this group, send email to qubes-users@googlegroups.com. > > To view this discussion on the web visit > > https://groups.google.com/d/msgid/qubes-users/CAGL_UUshxg%2BscQh7ONEDpmRc3sF8_aO7ioaBVKUSM92f7NqTpA%40mail.gmail.com. > > For more options, visit https://groups.google.com/d/optout. > The qubes.VMShell service allows you to run a command in another vm, but look at the warning in the policy file. You could qvm-copy your analysis tool in to target, qvm-run the tool remotely then extract the result. A better route would be to use qrexec service, tailored to the task you want to perform. Look at www.qubes-os.org/doc/qrexec3/ There have been interesting posts recently on the use of qrexec services - look in the list archives to see what people are doing with them. Hope this helps unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170205002401.GA719%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] shrink ntfs from qubes - what do use for this?
Last time I wanted such a thing I was using a tool like partition magic (boot from toolset disk). It was a few years ago. Is there a relatively safe way to shrink a win7 partition from linux w/o destroyng already installed win7 or current linux tools for this are known to be not stable enough? Installing windows on my laptop is a long timewaste - once did it for games and would like to avpoid it. -- Bye.Olli. gpg --search-keys grey_olli , use key w/ fingerprint below: Key fingerprint = 9901 6808 768C 8B89 544C 9BE0 49F9 5A46 2B98 147E Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABunX6NCaCM9yKPJS%2BLaJWWzVVFPtL8ig308p3ZX%3DjOfkGW07g%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] "Backup VMs" does not backup salt configuration
Hi. On Wed, Feb 1, 2017 at 11:56 PM, john.david.r.smithwrote: > On 01/02/17 21:30, qu...@posteo.de wrote: >> I have now nearly a complete salt configuration for all my templates so I >> do not need to backup them anymore and save a lot of space by this. >> >> So I have ran a backup including dom0 and realized that the salt >> configuration ("/srv/salt") does not seem to be included because it is much >> bigger than the MB listed for dom0. >> >> Is there a way to back it up right now with this method or do I manually >> have to copy everything outside of dom0? >> >> Thx in advance >> > > i put my files in ~/salt and symlinked them to /srv/salt > then backups should work Could you point to source for more information on your work? Backups work slow (disk/network bottlenecks) & I'm also interested to backup less. -- Bye.Olli. gpg --search-keys grey_olli , use key w/ fingerprint below: Key fingerprint = 9901 6808 768C 8B89 544C 9BE0 49F9 5A46 2B98 147E Blog keys (the blog is mostly in Russian): http://grey-olli.livejournal.com/tag/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABunX6Of_4KrpHRFSvcpLLd1sWPg6BKqjJiBsBuQvr8F1d2VBQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Anything similar to VirtualBox Saved Machine States?
Virtualbox has a handy feature that allows you to save a VM's state to harddisk and store it for later, thus freeing up your RAM while allowing you to return to work later without closing all the programs contained within that VM. It would also let users launch a RAM-heavy VM temporarily without having to find running VMs to kill for more RAM. Does Qubes/Xen have such a feature? Andrew -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/o75ot1%24bbl%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] Convert live system to VM in Qube OS?
Hi, I am desktop end-user looking for additional security for my daily driver PC. I need to have access to all of the files on the system that I currently use for work - planning to fade it off, but at this time I was thinking I will try converting live system to a VM in Qube OS to use it when needed as I cannot afford re-configuring all of the software that I need on daily basis from scratch (time constraint). What would be the best way to do that? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8cccf9b2-f4a0-4d53-b5db-e1e2e3be31e6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Convert live system to VM in Qube OS?
On Saturday, February 4, 2017 at 1:12:54 PM UTC+1, szalony...@gmail.com wrote: > Hi, > I am desktop end-user looking for additional security for my daily driver PC. > I need to have access to all of the files on the system that I currently use > for work - planning to fade it off, but at this time I was thinking I will > try converting live system to a VM in Qube OS to use it when needed as I > cannot afford re-configuring all of the software that I need on daily basis > from scratch (time constraint). > > What would be the best way to do that? I currently use dual boot Windows 7 and Debian 8.7 if it helps, but what I care about as a VM is Windows. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c5cf66e0-9c0f-4218-a89a-0c431d6bf131%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Two ways of "true" security.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 mr.l...@gmail.com: > четверг, 2 февраля 2017 г., 17:33:46 UTC+5 пользователь Connor Page написал: > > I have successfully castrated ME firmware on 2 Haswell laptops so I'd go > > for something more recent but well supported by Linux, reflash and put a > > non-Intel network card for peace of mind. > > Could you show the instructions and write here your chipset? He's probably referring to https://github.com/corna/me_cleaner Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJYlctFXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfKUUP/iV5kCJrQ24NqB/jGfegqmoI 8dpvkVx3uZALlHjuVYOJK8mMkBbeSsyd85/WigvI/rcvHmwN5+F5aPMiXovVBt0n WSGFvJb/Mhyv7dkeItW8hn5QdXHbDqXhTDXifd83ZL0VL9JlNkaW/Zp+NwfYeINO Yl5kH4/3hxviTEhumcjBD1CyqP1Vf+m42+6pJca+jxU/55ulImH+0sOvqAAm1Q8Z a4z26qhbubXTDdFNYoE7NPZbXr4h3h0IVJX9221llxAHGvaALkaBwL2svRqWyEBU bHau2msYc2fEjcY79YGA09Aw/NKK/ywPLMGpJlg/kSPWmvK3x4lkNswKafoHxTyd RLLRTAKKAtXdc/qdZF2C9pSrmI6ikd1DVFRNgrAF4u0ZEdQdJlyBKHPw7bCHKSRq hs703uIORu6N3dGiOZ5X4WnK1grv/8ZoksEXIbR46ncUFnBAN2jNBj8Nkgmh15wo UOuumSUqlVQIBfxrr05aYhz0nEfqB4ZRK+ipfbloijioX/NUVp2CKnSOoTcpY+86 /SNFdN3/ux7IsSajS6MhD01Ibh7t9Yi0inDCYOP3A9XmQZRv6Tprz+0yikP+Ps5B B+MxsSrNJ3evvCkLkCS02ntzIhYPMRUY0bG8FOIKjdXYM+f3QJj4LU+x/EknnTap RkdeK6HKhXKXcRYpYlqU =Eht6 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170204123829.GA2245%40mutt. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can somebody explain me how install flux on Qubes OS 3.2 in a fedora Template ?
Le vendredi 3 février 2017 19:08:54 UTC+1, Chris Laprise a écrit : > On 02/03/2017 05:52 AM, codeur4l...@gmail.com wrote: > > Can somebody explain me the procédure for installing f.lux or fluxgui on > > Qubes OS 3.2 in a fedora Template ? > > > > You could install redshift in dom0 instead. > > Chris Ok this is this http://jonls.dk/redshift/ What should I do for installing this in dom0 ? open dom0 console and execute sudo yum install redshift ? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/32dd5db3-0d3a-4cf8-ad15-29cd8a24d838%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Convert live system to VM in Qube OS?
On 02/04/2017 01:12 PM, szalonylabra...@gmail.com wrote: > Hi, I am desktop end-user looking for additional security for my > daily driver PC. I need to have access to all of the files on the > system that I currently use for work - planning to fade it off, but > at this time I was thinking I will try converting live system to a VM > in Qube OS to use it when needed as I cannot afford re-configuring > all of the software that I need on daily basis from scratch (time > constraint). > > What would be the best way to do that? > First, you may already have thought about it, but the simple transposition of a work pc to a VM environment (be it qubes or not) does not give you any additional security benefit. It only increases the compatibility problems! To actually benefit from the Qubes architecture a deep restructuring of both your filesystem and your habits must be done. If you want to benefit from multi-vm-isolation, then you will need to split your software usage (thus, configurations) among several VM. If you want to benefit from fake persistence of system files, you will need to try to move as much software as possible in either the template (installing with dnf) or in /usr/local/bin (if manually-compiled or direct binary package). TL: DR; it takes time to get used to the split-vm environment, especially so if you come from a single-workstation (both personal and work) mindset. It took me ~1 month, and a couple reinstallations, two years ago. For your actual question, there's no tool to assist in "converting" a live system to a Qubes VM: since there would be so little benefit there's no actual reason to make such a tool. Since linux PVM are just Xen domains, you may try to move all the files in your home directory into the /home directory into the private.img ext4 volume of an AppVM of your choice. If you use custom systemd unit files for your automations, you could either put them in the template or in ~/.config/systemd/user and enable/start them as user units (I do that for syncthing, for example). If you use Windows, since this OS is supported as HVM (a nearly standard virtual machine), you would not be able to easily move things between the live system and the HVM, since the easiest way to have it working is to install Windows *in* the HVM, thus having its own registry and system files. If your main programs are on Windows, you will need to reconfigure them from scratch. Trying to mount an image of the live system in the HVM, or trying to mount it as a separate disk, could lead to way more time being spent in investigating poorly documented issues. Not that a Windows HVM is that much documented itself... Good luck -- Alex -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/96061a77-22be-73e9-8383-3bf88a3757cc%40gmx.com. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] Re: off topic - invite codes to 'riseup'
On Monday, December 8, 2014 at 6:39:17 AM UTC+5:30, saltyk...@gmail.com wrote: > On Thursday, October 30, 2014 10:27:16 AM UTC-4, > bm-2cu9wcijafoqtf6...@bitmessage.ch wrote: > > follow up... > > > > I received an invite code from one generous riseup user. > > > > I need one more. > > > > Would appreciate a 2nd invite code from another riseup user. > > > > Thank you in advance, > > > > > > On 2014-10-28 18:26, bm-2cu9wcijafoqtf6boamtwr773pjglz1...@bitmessage.ch > > wrote: > > > Dear qubes-users, > > > > > > I am long time qubes follower and user. I apologize in advance if > > > anyone > > > feels this request is spam. > > > > > > I am looking for two invite codes needed to sign up to anonymous > > > riseup.net email service. > > > > > > I am hoping there are some qubes users who are riseup.net account > > > holders. > > > > > > Can anyone please send me a couple of invite codes that I might be able > > > to sign up? > > > > > > Thank you in advance. > > Code sent! > > Noah need invite of riseup.net email account pls help me -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/56c42400-8210-4c29-b9f1-3d1873018c80%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] AMD GPU under Qubes OS
Hi, I have just installed Qubes OS R3.2 on an external HDD for trying it on my laptop. The laptop in question has an AMD APU. When booting the OS, it will freeze on "Starting Show Plymouth Boot Screen". Is there a driver I need to install or something I need to do to fix this? Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/83d18d7e-6b15-4f49-b7b1-305292ebba72%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disposable VMs
On Sat, Feb 04, 2017 at 07:02:57PM +0100, john.david.r.smith wrote: > On 04/02/17 18:42, Loren Rogers wrote: > >Hi all, > > > >I'm confused about running disposable VMs - if I open a browser or file > >viewer, then want to open a terminal for the same VM, how could I do this? > >(E.g. I want to view an untrusted file, then make some edits.) > right click the dispvm in the qubes manager. > select run command. > enter xterm or whatever you want to run > > or user (in dom0) qvm-run DISPVM_NAME xterm > > > >Is there a way to configure the default disposable VM in the Qubes menu? I > >see that disposable VMs can be configured for individual domains, but I > >can't find where the generic one is. > > > >Also, is it possible to specify a different template for disposable > >machines? Say I'm running something based on the default fedora-23, and I > >want to open a document from my work VM, which uses that template. But I > >want to open it with my fedora-23-custom template as a disposable VM. (E.g. > >running a video in VLC that has untrustworthy components.) Is this doable? > > currently you can only have one dispvm. > if you want, you can set the template as default for dispvms > (qvm-create-default-dvm) > > -john Loren, You can't configure disposable VMs for individual qubes - what you can do is change the netVM which will apply if you start a disposableVM from that qube. The dispVM that will be started is determined by the default dvm, and this is set by qvm-create-default-dvm. As John said, you can only have one default dvm, but it's trivial to work around this with a small script. It's possible to do this because qvm-create-default-dvm does NOT remove the files for old dvms. You can see this if you generate a new default-dvm, and then look in /var/lib/qubes/appvms. So if you generate a number of different dvms based on different templates, it's simple to switch between them before launching a new dispVM. The launch time isn't noticeably different from starting up a new dispVM, and voila - multiple template disposable VMs on the cheap. I do this without any apparent ill effects, but it certainly isn't part of the canon. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170204205904.GB32031%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disposable VMs
Sent with [ProtonMail](https://protonmail.com) Secure Email. Original Message Subject: Re: [qubes-users] Disposable VMs Local Time: February 4, 2017 3:59 PM UTC Time: February 4, 2017 8:59 PM From: un...@thirdeyesecurity.org To: john.david.r.smithLoren Rogers , qubes-users On Sat, Feb 04, 2017 at 07:02:57PM +0100, john.david.r.smith wrote: > On 04/02/17 18:42, Loren Rogers wrote: > >Hi all, > > > >I'm confused about running disposable VMs - if I open a browser or file > >viewer, then want to open a terminal for the same VM, how could I do this? > >(E.g. I want to view an untrusted file, then make some edits.) > right click the dispvm in the qubes manager. > select run command. > enter xterm or whatever you want to run > > or user (in dom0) qvm-run DISPVM_NAME xterm > > > >Is there a way to configure the default disposable VM in the Qubes menu? I > >see that disposable VMs can be configured for individual domains, but I > >can't find where the generic one is. > > > >Also, is it possible to specify a different template for disposable > >machines? Say I'm running something based on the default fedora-23, and I > >want to open a document from my work VM, which uses that template. But I > >want to open it with my fedora-23-custom template as a disposable VM. (E.g. > >running a video in VLC that has untrustworthy components.) Is this doable? > > currently you can only have one dispvm. > if you want, you can set the template as default for dispvms > (qvm-create-default-dvm) > > -john Loren, You can't configure disposable VMs for individual qubes - what you can do is change the netVM which will apply if you start a disposableVM from that qube. The dispVM that will be started is determined by the default dvm, and this is set by qvm-create-default-dvm. As John said, you can only have one default dvm, but it's trivial to work around this with a small script. It's possible to do this because qvm-create-default-dvm does NOT remove the files for old dvms. You can see this if you generate a new default-dvm, and then look in /var/lib/qubes/appvms. So if you generate a number of different dvms based on different templates, it's simple to switch between them before launching a new dispVM. The launch time isn't noticeably different from starting up a new dispVM, and voila - multiple template disposable VMs on the cheap. I do this without any apparent ill effects, but it certainly isn't part of the canon. unman Very interesting - thanks for the info on how it's done. I'm glad I wasn't just missing something obvious! Loren -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/PE01ztr699RYXdxOtwdrLN4jQl2wLYLIi6qhTWY6CL3T-tvftTcAvHcNM5uiGAdatewIsatqoy8Mz8RFqaAa7AyxgWcjaty2Er2liDo99Gw%3D%40lorentrogers.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] AMD GPU under Qubes OS
On 02/04/2017 10:42 AM, Top Hatted Cat wrote: Hi, I have just installed Qubes OS R3.2 on an external HDD for trying it on my laptop. The laptop in question has an AMD APU. When booting the OS, it will freeze on "Starting Show Plymouth Boot Screen". Is there a driver I need to install or something I need to do to fix this? Thanks. As I am an elite hacker, I have already remotely accessed your computer and ran "qubes-hcl-report" however the connection died and I wasn't able to get the results so can you maybe post them to the list? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3c60c7a0-61cd-4f1b-6eec-e4649025fdef%40gmx.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Disposable VMs
Hi all, I'm confused about running disposable VMs - if I open a browser or file viewer, then want to open a terminal for the same VM, how could I do this? (E.g. I want to view an untrusted file, then make some edits.) Is there a way to configure the default disposable VM in the Qubes menu? I see that disposable VMs can be configured for individual domains, but I can't find where the generic one is. Also, is it possible to specify a different template for disposable machines? Say I'm running something based on the default fedora-23, and I want to open a document from my work VM, which uses that template. But I want to open it with my fedora-23-custom template as a disposable VM. (E.g. running a video in VLC that has untrustworthy components.) Is this doable? Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/P0V-3mPvSqFlHvDpDxAfjb-iBk5r3G38iXa8YcOPYHSBcYpo1MLvlgr5lOjsTSzA7C7u5gYM-fFnf-xlrNNGSabnhsq9xZgBvrbnn0jDE-o%3D%40lorentrogers.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] AMD GPU under Qubes OS
On Saturday, 4 February 2017 16:33:32 UTC, tai...@gmx.com wrote: > On 02/04/2017 10:42 AM, Top Hatted Cat wrote: > > > Hi, I have just installed Qubes OS R3.2 on an external HDD for trying it on > > my laptop. The laptop in question has an AMD APU. When booting the OS, it > > will freeze on "Starting Show Plymouth Boot Screen". Is there a driver I > > need to install or something I need to do to fix this? > > > > Thanks. > > > As I am an elite hacker, I have already remotely accessed your computer > and ran "qubes-hcl-report" however the connection died and I wasn't able > to get the results so can you maybe post them to the list? That must have been the 7 firewalls. Here's the results: Qubes release 3.2 (R3.2) Brand: Hewlett-Packard Model: HP Pavilion 15 Notebook PC BIOS: F.43 Xen:4.6.1 Kernel: 4.4.14-11 RAM:7103 Mb CPU: HP Hexa-Core 2.0GHz Chipset: Advanced Micro Devices, Inc. [AMD] Device [1022:1566] VGA: Advanced Micro Devices, Inc. [AMD/ATI] Mullins [Radeon R4/R5 Graphics] [1002:9851] (rev 05) (prog-if 00 [VGA controller]) Advanced Micro Devices, Inc. [AMD/ATI] Topaz XT [Radeon R7 M260/M265 / M340/M360 / M440/M445] [1002:6900] (rev ff) (prog-if ff) Net: Realtek Semiconductor Co., Ltd. RTL8723BE PCIe Wireless Network Adapter Realtek Semiconductor Co., Ltd. RTL8101/2/6E PCI Express Fast/Gigabit Ethernet controller (rev 07) SCSI: Samsung SSD 850 Rev: 1B6Q DVDRAM GU90N Rev: U900 MQ01ABD100 Rev: HVM:Active I/O MMU:Not active HAP/SLAT: Yes TPM:Device not found Qubes HCL Files are copied to: 'dom0' Qubes-HCL-Hewlett_Packard-HP_Pavilion_15_Notebook_PC_-20170204-172931.yml - HCL Info -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/07004349-e081-4f8d-a6c9-b4812c434efe%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Why doesn't whonix-gw run the latest 0.2.8.x tor?
cezg...@gmail.com: > Den søndag den 29. januar 2017 kl. 12.36.04 UTC+1 skrev Joonas > My guess is lack of time and funding. > [...] Right. Gave the upgrade low priority and I am pretty conservative when it comes to stable upgrades. It's not too hard to upload a package to the stable repository that then would wreck connectivity for most users. Posted on January 29, 2017: > Tor was updated to 0.2.9.9-1~d80.jessie+1 in Whonix stable-proposed-updates as well as in testers repository. https://forums.whonix.org/t/tor-0-2-9-9-1-d80-jessie-1-stable-upgrade-testers-wanted Cheers, Patrick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0e94b7f3-50b7-f5d4-9259-80c9fa75e448%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] qvm-usb fails if sys-usb template is set to fedora-24-minimal
On 02/03/2017 11:56 PM, Andrew David Wong wrote: > On 2017-02-03 06:34, Grzesiek Chodzicki wrote: > > qubes-usb-proxy not installed in VM is thrown in dom0 terminal after > running qvm-usb -a if sys-usb uses minimal fedora 24 template. > Necessary packages were installed in fedora-24-minimal beforehand > > > Steps to reproduce: > > 1. Launch fedora-24-minimal terminal > > 2. sudo dnf install qubes-usb-proxy qubes-input-proxy-sender (or > switch to root beforehand if sudo not installed) > > 3. Shutdown fedora-24-minimal > > 4. Shutdown sys-usb > > 5. Change sys-usb template to fedora-24-minimal (qvm-prefs -s > sys-usb template fedora-24-minimal) > > 6. Launch sys-usb > > 7. Try attaching any USB device via qvm-usb > > > Observed behavior: > > ERROR: qubes-usb-proxy not installed in VM > > > Expected behavior: > > Device is attached to an AppVM > > > Additional details: > > Switching the template back to regular fedora-24 causes the qvm-usb > to work fine. > > > Are you sure that the necessary packages and all dependencies are > actually installed? See: > > https://github.com/QubesOS/qubes-issues/issues/2606 > > This does seem to be the issue, however manually installing the pycairo package does not resolve the problem. Fedora-24-minimal has the qubes-usb-proxy-1.0.5-1.fc24.noarch package installed however Dom0 still throws the usb-proxy not installed error. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f42b6e38-90fd-355f-fe9d-8fceca8afd9b%40gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disposable VMs
On 04/02/17 18:42, Loren Rogers wrote: Hi all, I'm confused about running disposable VMs - if I open a browser or file viewer, then want to open a terminal for the same VM, how could I do this? (E.g. I want to view an untrusted file, then make some edits.) right click the dispvm in the qubes manager. select run command. enter xterm or whatever you want to run or user (in dom0) qvm-run DISPVM_NAME xterm Is there a way to configure the default disposable VM in the Qubes menu? I see that disposable VMs can be configured for individual domains, but I can't find where the generic one is. Also, is it possible to specify a different template for disposable machines? Say I'm running something based on the default fedora-23, and I want to open a document from my work VM, which uses that template. But I want to open it with my fedora-23-custom template as a disposable VM. (E.g. running a video in VLC that has untrustworthy components.) Is this doable? currently you can only have one dispvm. if you want, you can set the template as default for dispvms (qvm-create-default-dvm) -john -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a56fa765-2503-8f2a-2f05-6ba87e5cbb72%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Workaround for building Ubuntu xenial+desktop with qubes-builder
On 02/04/2017 05:12 AM, anoa wrote: > On 02/03/2017 08:41 AM, Unman wrote: >> On Fri, Feb 03, 2017 at 06:21:15AM +, Nick Darren wrote: >>> >>> On 02/02/2017 12:07 AM, Unman wrote: On Mon, Jan 30, 2017 at 11:00:41AM -0800, Andrew M wrote: > Thanks Unman, > > This bug is currently affecting my work so it would be greatly > appreciated if it were resolved :) > > > On 01/29/2017 06:38 PM, Unman wrote: >> On Sat, Jan 28, 2017 at 12:31:38PM +, Nick Darren wrote: >>> /Hi all,/ >>> >>> >>> On 01/24/2017 06:59 AM, anoa wrote: Hey all, Today I was trying to build the Ubuntu 16.04 Xenial+Desktop template using qubes-builder with help from these instructions: https://github.com/QubesOS/qubes-builder Everything was alright until the `make qubes-vm` step where it would fail on the following: > dpkg-source: error: can't build with source format '3.0 (quilt)': no > upstream tarball found at ../xen_4.6.3.orig.tar.{bz2,gz,lzma,xz} > dpkg-buildpackage: error: dpkg-source -b debian-vm gave error exit > status 255 > /home/user/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:196: > recipe for target 'dist-package' failed The build was looking for xen_4.6.3 when in fact xen_4.6.4 is in the folder. As a workaround, simply copying the xen_4.6.4 to be named xen.4.6.3 allowed the build to continue and eventually complete successfully: > cd /path/to/qubes-builder/chroot-xenial/home/user/qubes-src/vmm-xen; > sudo cp -pr ./xen_4.6.4.orig.tar.gz ./xen_4.6.3.orig.tar.gz >>> /It doesn't work by just rename the 'xen_4.6.4.orig.tar.gz' on >>> chroot-xenial. On my case (on testing to build xenial-desktop) needs to >>> copy the file to /path/to/qubes-builder/qubes-src/vmm-xen/. there. Then, >>> it will skip the error message and allowed the build successfully./ >>> Hope this helps someone while the script is being updated. >>> /I have another weird situation. The build was succeed but the problem >>> is, terminal and some others application cannot be launched due to an >>> error, normally on ubuntu's standard installation caused by locales >>> issue. Tried to fix it the way it used to be on normal ubuntu >>> installation or archlinux. But the problem still persists after >>> rebooting the template-vm or any appvms that's based on it./ >>> >>> user@ubuntu-xenial:~$ Error constructing proxy for >>> org.gnome.Terminal:/org/gnome/Terminal/Factory0: Error calling >>> StartServiceByName for org.gnome.Terminal: >>> GDBus.Error:org.freedesktop.DBus.Error.Spawn.ChildSignaled: Process >>> org.gnome.Terminal received signal 5 >>> >>> /Test on executing gedit from xterm/UXterm/urvtx:/ >>> >>> user@ubuntu-xenial:~$ gedit >>> Gedit failure to execute. >>> (gedit:5697): GLib-GIO-ERROR **: No GSettings schemas are installed on >>> the system >>> Trace/breakpoint trap (core dumped) >>> >>> >>> /The same error happen when I execute the 'xfce4-terminal' or >>> 'terminator'. Still the same 'Trace/breakpoint trap (core dumped)' >>> issues here and there./ >>> >>> >>> >>> >>> /Locale was set in order to avoid gnome-terminal error, but it' useless >>> on this case and still failed to work./ >>> >>> user@ubuntu-xenial:~$ localectl >>>System Locale: LANG=en_US.UTF-8 >>>VC Keymap: us >>> X11 Layout: us >>>X11 Model: pc105+inet >>> X11 Options: terminate:ctrl_alt_bksp >>> >>> >>> >>> /On checking qubes local packages installed on the 'xenial-desktop' >>> system. >>> / >>> libqubes-rpc-filecopy2/now 3.2.3+xenialu1 amd64 [installed,local] >>> Qubes file copy protocol library >>> >>> libqubesdb/now 3.2.3-1+xenialu1 amd64 [installed,local] >>> QubesDB libs. >>> >>> libvchan-xen/now 3.2.0-1+xenialu1 amd64 [installed,local] >>> Qubes Xen core libraries >>> >>> libxen-4.6/now 2001:4.6.3-25+xenialu1 amd64 [installed,local] >>> Libraries for Xen tools >>> >>> qubes-core-agent/now 3.2.15-1+xenialu1 amd64 [installed,local] >>> Qubes core agent >>> >>> qubes-gui-agent/now 3.2.13-1+xenialu1 amd64 [installed,local] >>> Makes X11 windows available to qubes dom0 >>> >>> qubes-utils/now 3.2.3+xenialu1 amd64 [installed,local] >>> Qubes Linux utilities >>> >>> qubesdb/now 3.2.3-1+xenialu1 amd64 [installed,local] >>> QubesDB management tools and daemon. >>> >>> qubesdb-vm/now 3.2.3-1+xenialu1 amd64 [installed,local] >>> QubesDB VM service. >>> >>> xserver-xorg-input-qubes/now 3.2.13-1+xenialu1 amd64 [installed,local] >>> X
Re: [qubes-users] Can somebody explain me how install flux on Qubes OS 3.2 in a fedora Template ?
On 02/04/2017 08:08 AM, codeur4l...@gmail.com wrote: Le vendredi 3 février 2017 19:08:54 UTC+1, Chris Laprise a écrit : On 02/03/2017 05:52 AM, codeur4l...@gmail.com wrote: Can somebody explain me the procédure for installing f.lux or fluxgui on Qubes OS 3.2 in a fedora Template ? You could install redshift in dom0 instead. Chris Ok this is this http://jonls.dk/redshift/ What should I do for installing this in dom0 ? open dom0 console and execute sudo yum install redshift ? $ sudo qubes-dom0-update redshift Here is the doc for updates/installs: https://www.qubes-os.org/doc/software-update-dom0/ There are two GUIs for redshift that you can also add: plasma-applet-redshift-control (KDE) redshift-gtk (Xfce) Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9ce45210-d7e1-9f83-8222-b07652aed1c1%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Current chances of successful Qubes-3.2 on iMac 27" Retina, Mac OSX Sierra 10.12.3 (i5, Radeon M380)
It looks like there are occasionally people who want to run Qubes on a Mac, and also some partial success stories. However, the most recent I can find are from a while ago, with previous versions of Qubes, previous OSX, and older Macs. Is there an updated Howto or more recent info about this? I have a late 2015 27" Retina iMac (model iMac17,1), i5 processor, Radeon R9 M380 video. I would like to run Qubes, with Mac OSX, Linux and Win7 guests. (My current setup is OSX host, with Linux and Win7 guests under VMWare or Parallels; this works OK, but I wanted to try Qubes for security.) I did manage to boot a Qubes-3.2 USB drive, but it stops shortly after the initial (Grub?) bootscreen, when you select "Install..." It says "Xen 4.6.1 (c/s ) EFI loader, using configuration [...], vmlinuz [...], initrd.img [...]" (I'm guessing the video is going elsewhere, but I don't know where!) Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/89452576-4f83-4471-af25-0290afb002ac%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Workaround for building Ubuntu xenial+desktop with qubes-builder
On Sat, Feb 04, 2017 at 06:46:53PM +, Nick Darren wrote: > > > On 02/04/2017 05:12 AM, anoa wrote: > > On 02/03/2017 08:41 AM, Unman wrote: > >> On Fri, Feb 03, 2017 at 06:21:15AM +, Nick Darren wrote: > >>> > >>> On 02/02/2017 12:07 AM, Unman wrote: > On Mon, Jan 30, 2017 at 11:00:41AM -0800, Andrew M wrote: > > Thanks Unman, > > > > This bug is currently affecting my work so it would be greatly > > appreciated if it were resolved :) > > > > > > On 01/29/2017 06:38 PM, Unman wrote: > >> On Sat, Jan 28, 2017 at 12:31:38PM +, Nick Darren wrote: > >>> /Hi all,/ > >>> > >>> > >>> On 01/24/2017 06:59 AM, anoa wrote: > Hey all, > > Today I was trying to build the Ubuntu 16.04 Xenial+Desktop template > using qubes-builder with help from these instructions: > > https://github.com/QubesOS/qubes-builder > > Everything was alright until the `make qubes-vm` step where it would > fail on the following: > > > dpkg-source: error: can't build with source format '3.0 (quilt)': > > no upstream tarball found at ../xen_4.6.3.orig.tar.{bz2,gz,lzma,xz} > > dpkg-buildpackage: error: dpkg-source -b debian-vm gave error exit > > status 255 > > /home/user/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:196: > > recipe for target 'dist-package' failed > The build was looking for xen_4.6.3 when in fact xen_4.6.4 is in the > folder. As a workaround, simply copying the xen_4.6.4 to be named > xen.4.6.3 allowed the build to continue and eventually complete > successfully: > > > cd > > /path/to/qubes-builder/chroot-xenial/home/user/qubes-src/vmm-xen; > > sudo cp -pr ./xen_4.6.4.orig.tar.gz ./xen_4.6.3.orig.tar.gz > >>> /It doesn't work by just rename the 'xen_4.6.4.orig.tar.gz' on > >>> chroot-xenial. On my case (on testing to build xenial-desktop) needs > >>> to > >>> copy the file to /path/to/qubes-builder/qubes-src/vmm-xen/. there. > >>> Then, > >>> it will skip the error message and allowed the build successfully./ > >>> > Hope this helps someone while the script is being updated. > > >>> /I have another weird situation. The build was succeed but the problem > >>> is, terminal and some others application cannot be launched due to an > >>> error, normally on ubuntu's standard installation caused by locales > >>> issue. Tried to fix it the way it used to be on normal ubuntu > >>> installation or archlinux. But the problem still persists after > >>> rebooting the template-vm or any appvms that's based on it./ > >>> > >>> user@ubuntu-xenial:~$ Error constructing proxy for > >>> org.gnome.Terminal:/org/gnome/Terminal/Factory0: Error calling > >>> StartServiceByName for org.gnome.Terminal: > >>> GDBus.Error:org.freedesktop.DBus.Error.Spawn.ChildSignaled: Process > >>> org.gnome.Terminal received signal 5 > >>> > >>> /Test on executing gedit from xterm/UXterm/urvtx:/ > >>> > >>> user@ubuntu-xenial:~$ gedit > >>> Gedit failure to execute. > >>> (gedit:5697): GLib-GIO-ERROR **: No GSettings schemas are installed on > >>> the system > >>> Trace/breakpoint trap (core dumped) > >>> > >>> > >>> /The same error happen when I execute the 'xfce4-terminal' or > >>> 'terminator'. Still the same 'Trace/breakpoint trap (core dumped)' > >>> issues here and there./ > >>> > >>> > >>> > >>> > >>> /Locale was set in order to avoid gnome-terminal error, but it' > >>> useless > >>> on this case and still failed to work./ > >>> > >>> user@ubuntu-xenial:~$ localectl > >>>System Locale: LANG=en_US.UTF-8 > >>>VC Keymap: us > >>> X11 Layout: us > >>>X11 Model: pc105+inet > >>> X11 Options: terminate:ctrl_alt_bksp > >>> > >>> > >>> > >>> /On checking qubes local packages installed on the 'xenial-desktop' > >>> system. > >>> / > >>> libqubes-rpc-filecopy2/now 3.2.3+xenialu1 amd64 [installed,local] > >>> Qubes file copy protocol library > >>> > >>> libqubesdb/now 3.2.3-1+xenialu1 amd64 [installed,local] > >>> QubesDB libs. > >>> > >>> libvchan-xen/now 3.2.0-1+xenialu1 amd64 [installed,local] > >>> Qubes Xen core libraries > >>> > >>> libxen-4.6/now 2001:4.6.3-25+xenialu1 amd64 [installed,local] > >>> Libraries for Xen tools > >>> > >>> qubes-core-agent/now 3.2.15-1+xenialu1 amd64 [installed,local] > >>> Qubes core agent > >>> > >>> qubes-gui-agent/now 3.2.13-1+xenialu1 amd64 [installed,local] > >>> Makes X11 windows available to qubes dom0 > >>> > >>> qubes-utils/now 3.2.3+xenialu1 amd64 [installed,local] > >>> Qubes