Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread f . tuttmann
Am Montag, 31. Juli 2017 22:12:06 UTC+2 schrieb PR:
> Hello,
> 
> 
> 
> Am 31.07.2017 9:42 nachm. schrieb  :
> 
> 
> I was able to restore all of my VMs via CLI but after restoring I couldn't 
> start any VM.
> 
> Will downgrade to 3.2 and will wait for final release of 4.0 and I hope that 
> this will then be fixed.
> 
> 
> Of course you can go straight back to 3.2 but as this is release candidate 
> feedback could be helpful.
> What happens when you start one of the AppVMs from the CLI?
> Output/Error messages?
> 
> 
> Have you tried to launch a template VM also, not only the AppVMs?
> 
> 
> - PhR

I can't start any VM (AppVM & Template VM) even the Template VM that was 
created freshly with 4.0 installation can't start.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9da17f19-455a-4f2c-9ef7-25b5a56fcc02%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cannot install kernel 4.9.35 from …-current-testing

2017-07-31 Thread Foppe de Haan
On Tuesday, August 1, 2017 at 7:21:10 AM UTC+2, Holger Levsen wrote:
> On Mon, Jul 31, 2017 at 10:11:56PM -0700, Foppe de Haan wrote:
> > and if you add --best --allowerasing to the command?
> 
> commandline error, no such option :(
> 
> 
> -- 
> cheers,
>   Holger

'sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --best 
--allowerasing' shouldn't error like that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4017858-4bcb-4898-a319-a9b37a09eab8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cannot install kernel 4.9.35 from …-current-testing

2017-07-31 Thread Holger Levsen
On Mon, Jul 31, 2017 at 10:11:56PM -0700, Foppe de Haan wrote:
> and if you add --best --allowerasing to the command?

commandline error, no such option :(


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801052105.GB2703%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Holger Levsen
On Mon, Jul 31, 2017 at 09:17:43PM +, Holger Levsen wrote:
> Now I get another error OTOH, but I'll try a fresh reinstallation of 4.0rc1 
> first, before
> reporting that exact error…

whoohooo - that fresh installation on an x260 for the first time showed
reliable suspend+resumes, I've done 42 suspends of the machine (which, granted,
was not doing anything) and it successfully resumed 42 times \o/

which to me is quite very amazing, running qubes 3.2 I'd estimate the success
rate rather to be 60% or so, maybe 70%… (while the same machine running 
Debian 8 also had 99.x% successful resumes…)

so far so very good. i'm curious whether this will also be the case with qubes
3.2.1 and a 4.9 kernel (so far only tried with the older 4.8 one from the
qubes repos…)

(but then, see the other mail on this list about my problems installing the
4.9 kernel on qubes 3.2…)

OTOH, wireless didnt work after a few resumes (qubes 4.0rc1), i assume this 
can be fixed by unloading+reloading the module, but…

I'm happy as long as resume works.


-- 
cheers,
Holger, who really did those 42 suspends and resumes…

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170801051910.GA2703%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


[qubes-users] Re: cannot install kernel 4.9.35 from …-current-testing

2017-07-31 Thread Foppe de Haan
On Tuesday, August 1, 2017 at 12:42:45 AM UTC+2, Holger Levsen wrote:
> On Mon, Jul 31, 2017 at 02:38:32PM -0700, Foppe de Haan wrote:
> > Try manually installing perl-Math-BigInt first?
> 
> hah, I only tried installing the kernel and qubes-kernel-vm but not that
> package. Installing perl-Math-BigInt succeeded but then I still get this:
> 
> 
> [user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
> --enablerepo=qubes-dom0-current-testing kernel
> Using sys-firewall as UpdateVM to download updates for Dom0; this may take 
> some time...
> Running command on VM: 'sys-firewall'...
> Running command on VM: 'sys-firewall'...
> fedora/metalink |  12 kB  00:00   
>   
> qubes-dom0-current  | 2.9 kB  00:00   
>   
> qubes-dom0-current-testing  | 2.9 kB  00:00   
>   
> qubes-templates-itl | 2.9 kB  00:00   
>   
> updates/metalink|  11 kB  00:00   
>   
> --> Running transaction check
> ---> Package kernel.x86_64 1000:4.9.35-19.pvops.qubes will be installed
> --> Finished Dependency Resolution
> /var/lib/qubes/dom0-updates/packages/kernel-4.9.35-19.pvops.qubes.x86_64.rpm 
> already exists and appears to be complete
> find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
> Redirecting to '/usr/bin/dnf 
> --exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws,
>  install kernel' (see 'man yum2dnf')
> 
> Qubes OS Repository for Dom0  
>   
>  66 MB/s | 189 kB 00:00
> Package kernel-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, 
> skipping.
> Package kernel-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, 
> skipping.
> Package kernel-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, 
> skipping.
> Dependencies resolved.
> 
>  Package   Arch   
>Version
>  RepositorySize
> 
> Skipping packages with conflicts:
> (add '--best --allowerasing' to command line to force their upgrade):
>  kernelx86_64 
>1000:4.9.35-19.pvops.qubes 
>  qubes-dom0-cached 40 M
> 
> Transaction Summary
> 
> Skip  1 Package
> 
> Nothing to do.
> Complete!
> [user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
> --enablerepo=qubes-dom0-current-testing kernel-qubes-vm
> Using sys-firewall as UpdateVM to download updates for Dom0; this may take 
> some time...
> Running command on VM: 'sys-firewall'...
> Running command on VM: 'sys-firewall'...
> fedora/metalink |  12 kB  00:00   
>   
> qubes-dom0-current  | 2.9 kB  00:00   
>   
> qubes-dom0-current-testing  | 2.9 kB  00:00   
>   
> qubes-templates-itl | 2.9 kB  00:00   
>   
> updates/metalink|  11 kB  00:00   
>   
> --> Running transaction check
> ---> Package kernel-qubes-vm.x86_64 1000:4.9.35-19.pvops.qubes will be 
> installed
> --> Finished Dependency Resolution
> /var/lib/qubes/dom0-updates/packages/kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64.rpm
>  already exists and appears to be complete
> find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
> Redirecting to '/usr/bin/dnf 
> --exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws,
>  install kernel-qubes-vm' (see 'man yum2dnf')
> 
> Qubes OS Repository for Dom0  
>   
>   

[qubes-users] Re: Announcement: Recommended Fedora 25 TemplateVM Upgrade for Qubes 3.2

2017-07-31 Thread qubester
So, I went through  the docs, and successfully  have F25  working. 
So.why would I want to run the command below?


and/or  should I be doing that at this stage?

-

We also provide fresh Fedora 25 TemplateVM packages through the official
Qubes repositories, which you can get with the following commands (in
dom0).

Standard Fedora 25 TemplateVM:

$ sudo qubes-dom0-update qubes-template-fedora-25

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21c331fe-997b-72c2-c4be-d9f7ff4a8ede%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Announcement: Recommended Fedora 25 TemplateVM Upgrade for Qubes 3.2

2017-07-31 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-07-30 20:53, wannabeiron...@gmail.com wrote:
> On Saturday, July 29, 2017 at 10:25:12 PM UTC-4, Andrew David Wong
> wrote: Dear Qubes Users,
> 
> Fedora 24, one of the supported TemplateVM versions in Qubes 3.2,
> is scheduled to reach EOL (end of life) approximately one month
> after the release of Fedora 26, which was on 2017-07-11. This
> places the expected EOL date for Fedora 24 somewhere in the second
> week of August.
> 
> Options for migrating to Fedora 25 are now available for Qubes 3.2.
> If you're currently using Fedora 24 (or older) TemplateVMs or 
> StandaloneVMs, we strongly recommend upgrading them to Fedora 25 
> before then. We provide step-by-step instructions for upgrading
> your existing TemplateVMs and StandaloneVMs in-place here:
> 
> https://www.qubes-os.org/doc/template/fedora/upgrade-24-to-25/
> 
> We also provide fresh Fedora 25 TemplateVM packages through the
> official Qubes repositories, which you can get with the following
> commands (in dom0).
> 
> Standard Fedora 25 TemplateVM:
> 
> $ sudo qubes-dom0-update qubes-template-fedora-25
> 
> Minimal Fedora 25 TemplateVM:
> 
> $ sudo qubes-dom0-update qubes-template-fedora-25-minimal
> 
> After upgrading to a Fedora 25 TemplateVM, please remember to set
> all qubes that were using the old template to use the new one. This
> can be done in dom0 either with the Qubes VM Manager or with the
> `qvm-prefs` command-line tool.
> 
> Please note that no user action is required regarding the OS
> version in dom0. If you're using Qubes 3.2, there is no dom0 OS
> upgrade available, since none is currently required. For details,
> please see here:
> 
> https://www.qubes-os.org/doc/supported-versions/#dom0
> 
> If you're using an older version of Qubes, we strongly recommend
> that you upgrade to 3.2, as older versions are no longer
> supported.
> 
> 
> Axon,
> 
> Will an iso with Fed25 TemplateVMs be released soon? I have a
> network driver issue with a Kaby Lake NUC that could be solved by
> Fed25. Just wanted to ask before I started jumping through hoops.
> Thank you.
> 

Qubes 3.2.1 will probably have fedora-25 as a default template on the
ISO, and it will probably be out Soon (TM). I'm afraid we don't yet
know enough to be any more specific than that.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=SnhM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/538e7ca6-7639-8256-8f3e-2f3263de917e%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Not able to connect with 2 firewall-proxy/vpns at same time

2017-07-31 Thread Chris Laprise

On 07/31/2017 07:54 PM, 'Essax' via qubes-users wrote:

AUTH: Received control message: 
AUTH_FAILED



This sounds like an issue with the provider. If they ask for more detail 
you can set '--verb 5' for more verbosity from openvpn.


--

Chris Laprise, tas...@openmailbox.org
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/36f1ac3c-c800-2f56-57a4-aee985e11d75%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Not able to connect with 2 firewall-proxy/vpns at same time

2017-07-31 Thread 'Essax' via qubes-users
I have multiple firewall-proxy/vpns setup as per the qubes docs. I have always 
been able to use more than one at the same time with out any problems 
connecting to my vpn providers servers. Starting a few day ago I am no longer 
able to connect with more than one firewall-proxy/vpn at a time.
I start and connect with vpn1 . I start vpn2 and it fails to connect. Then I 
start vpn2 from the CLI and this is the output I get everytime. ( I just posted 
the important part at the end )
Mon Jul 31 17:20:43 2017 us=x Local Options String (VER=V4): 'V4,dev-type 
tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth 
SHA512,keysize 256,key-method 2,tls-client'
Mon Jul 31 17:20:43 2017 us=870023 Expected Remote Options String (VER=V4): 
'V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher 
AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Mon Jul 31 17:20:43 2017 us=x TCP/UDP: Preserving recently used remote 
address: [AF_INET]xxx
Mon Jul 31 17:20:43 2017 us=870070 Socket Buffers: R=[212992->212992] 
S=[212992->212992]
Mon Jul 31 17:20:43 2017 us=870086 UDP link local: (not bound)
Mon Jul 31 17:20:43 2017 us=870101 UDP link remote: [AF_INET]
Mon Jul 31 17:20:43 2017 us=951538 TLS: Initial packet from [AF_INET]Server ip 
xxx, sid=x
Mon Jul 31 17:20:43 2017 us=951664 WARNING: this configuration may cache 
passwords in memory -- use the auth-nocache option to prevent this
Mon Jul 31 17:20:44 2017 us=42751 VERIFY OK: nsCertType=SERVER
Mon Jul 31 17:20:44 2017 us=938100 NOTE: --mute triggered...
Mon Jul 31 17:20:44 2017 us=938181 1 variation(s) on previous 3 message(s) 
suppressed by --mute
Mon Jul 31 17:20:44 2017 us=938321 [server] Peer Connection Initiated with 
[AF_INET]
Mon Jul 31 17:20:45 2017 us=987500 SENT CONTROL [server]: 'PUSH_REQUEST' 
(status=1)
Mon Jul 31 17:20:46 2017 us=66601 AUTH: Received control message: AUTH_FAILED
Mon Jul 31 17:20:46 2017 us=66649 SIGTERM received, sending exit notification 
to peer
Mon Jul 31 17:20:49 2017 us=214365 TCP/UDP: Closing socket
Mon Jul 31 17:20:49 2017 us=214441 SIGTERM[soft,exit-with-notification] 
received, process exiting
If I were to shutdown vpn1, I would have no problems connecting with vpn2.
My vpn service provider also has a limited vpn service that is free of charge. 
I configured a firewall-proxy/vpn with those configuration files and I could 
use that and one of my other proxy/vpns at the same time. Taking into 
consideration the vpn logs and the fact that I can connect with the free 
service I'm leaning towards the problem being with my vpn provider.
I'm going to start a support ticket with my provider but I wanted to hear if 
anyone else thought as I do or if there could be another problem I'm not seeing 
in the logs.
Thanks in advance

Essax
Sent with [ProtonMail](https://protonmail.com) Secure Email.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/_Q5bZgOCN1vyKKhaegjrUG63zw7ymbUGzi1giV6_PWqG8mV3Gb7xYyyaerrDjFlsTRuQhOv3JQHuzwbw3V1ijMwCopsFszOozwGuyKo-HxQ%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cannot install kernel 4.9.35 from …-current-testing

2017-07-31 Thread Holger Levsen
On Mon, Jul 31, 2017 at 02:38:32PM -0700, Foppe de Haan wrote:
> Try manually installing perl-Math-BigInt first?

hah, I only tried installing the kernel and qubes-kernel-vm but not that
package. Installing perl-Math-BigInt succeeded but then I still get this:


[user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
--enablerepo=qubes-dom0-current-testing kernel
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
fedora/metalink |  12 kB  00:00 
qubes-dom0-current  | 2.9 kB  00:00 
qubes-dom0-current-testing  | 2.9 kB  00:00 
qubes-templates-itl | 2.9 kB  00:00 
updates/metalink|  11 kB  00:00 
--> Running transaction check
---> Package kernel.x86_64 1000:4.9.35-19.pvops.qubes will be installed
--> Finished Dependency Resolution
/var/lib/qubes/dom0-updates/packages/kernel-4.9.35-19.pvops.qubes.x86_64.rpm 
already exists and appears to be complete
find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
Redirecting to '/usr/bin/dnf 
--exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws,
 install kernel' (see 'man yum2dnf')

Qubes OS Repository for Dom0

 66 MB/s | 189 kB 00:00
Package kernel-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, skipping.
Dependencies resolved.

 Package   Arch 
 Version
 RepositorySize

Skipping packages with conflicts:
(add '--best --allowerasing' to command line to force their upgrade):
 kernelx86_64   
 1000:4.9.35-19.pvops.qubes 
 qubes-dom0-cached 40 M

Transaction Summary

Skip  1 Package

Nothing to do.
Complete!
[user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
--enablerepo=qubes-dom0-current-testing kernel-qubes-vm
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
fedora/metalink |  12 kB  00:00 
qubes-dom0-current  | 2.9 kB  00:00 
qubes-dom0-current-testing  | 2.9 kB  00:00 
qubes-templates-itl | 2.9 kB  00:00 
updates/metalink|  11 kB  00:00 
--> Running transaction check
---> Package kernel-qubes-vm.x86_64 1000:4.9.35-19.pvops.qubes will be installed
--> Finished Dependency Resolution
/var/lib/qubes/dom0-updates/packages/kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64.rpm
 already exists and appears to be complete
find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
Redirecting to '/usr/bin/dnf 
--exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws,
 install kernel-qubes-vm' (see 'man yum2dnf')

Qubes OS Repository for Dom0

 66 MB/s | 189 kB 00:00
Package kernel-qubes-vm-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, 
skipping.
Package kernel-qubes-vm-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, 
skipping.
Package kernel-qubes-vm-1000

Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Micah Lee:
> I just installed Qubes 4.0-rc1 on a Lenovo ThinkPad T440 which runs
> Qubes 3.2 without a problem. After installing it, when I boot up, grub
> works, but then as soon as Qubes starts to boot the computer reboots,
> and I end up back in grub.

I ran into the same behavior on a T420. Removing iommu=no-igfx from
the Xen command line fixed it. [1]

If that doesn't help, _adding_ console=vga should let you see what's
going on.

Rusty


1. https://github.com/QubesOS/qubes-issues/issues/2841#issuecomment-318172669
-BEGIN PGP SIGNATURE-
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=IbPe
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2017073134.GA9976%40mutt.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: cannot install kernel 4.9.35 from …-current-testing

2017-07-31 Thread Foppe de Haan
On Monday, July 31, 2017 at 10:56:15 PM UTC+2, Holger Levsen wrote:
> Hi,
> 
> I fail to install kernel 4.9.35 on Qubes 3.2, any hints how I can accomplish 
> this? 
> 
> [user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
> --enablerepo=qubes-dom0-current-testing   kernel kernel-qubes-vm
> Using sys-firewall as UpdateVM to download updates for Dom0; this may take 
> some time...
> Running command on VM: 'sys-firewall'...
> Running command on VM: 'sys-firewall'...
> fedora/metalink |  11 kB  00:00   
>   
> qubes-dom0-current  | 2.9 kB  00:00   
>   
> qubes-dom0-current-testing  | 2.9 kB  00:00   
>   
> qubes-templates-itl | 2.9 kB  00:00   
>   
> updates/metalink|  11 kB  00:00   
>   
> --> Running transaction check
> ---> Package kernel.x86_64 1000:4.9.35-19.pvops.qubes will be installed
> ---> Package kernel-qubes-vm.x86_64 1000:4.9.35-19.pvops.qubes will be 
> installed
> --> Processing Dependency: perl(Math::BigInt) for package: 
> 1000:kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64
> --> Running transaction check
> ---> Package perl-Math-BigInt.noarch 0:1.9997-355.fc23 will be installed
> --> Finished Dependency Resolution
> /var/lib/qubes/dom0-updates/packages/kernel-4.9.35-19.pvops.qubes.x86_64.rpm 
> already exists and appears to be complete
> /var/lib/qubes/dom0-updates/packages/kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64.rpm
>  already exists and appears to be complete
> /var/lib/qubes/dom0-updates/packages/perl-Math-BigInt-1.9997-355.fc23.noarch.rpm
>  already exists and appears to be complete
> find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
> Redirecting to '/usr/bin/dnf 
> --exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws,
>  install kernel kernel-qubes-vm' (see 'man yum2dnf')
> 
> Qubes OS Repository for Dom0  
> 44 MB/s | 189 kB 00:00
> Package kernel-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, 
> skipping.
> Package kernel-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, 
> skipping.
> Package kernel-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, 
> skipping.
> Package kernel-qubes-vm-1000:4.4.14-11.pvops.qubes.x86_64 is already 
> installed, skipping.
> Package kernel-qubes-vm-1000:4.4.38-11.pvops.qubes.x86_64 is already 
> installed, skipping.
> Package kernel-qubes-vm-1000:4.8.12-12.pvops.qubes.x86_64 is already 
> installed, skipping.
> Dependencies resolved.
> =
>  Package  Arch   Version 
> Repository Size
> =
> Skipping packages with conflicts:
> (add '--best --allowerasing' to command line to force their upgrade):
>  kernel   x86_64 1000:4.9.35-19.pvops.qubes  
> qubes-dom0-cached  40 M
>  kernel-qubes-vm  x86_64 1000:4.9.35-19.pvops.qubes  
> qubes-dom0-cached  56 M
>  perl-Math-BigInt noarch 1.9997-355.fc23 
> qubes-dom0-cached 188 k
> 
> Transaction Summary
> =
> Skip  3 Packages
> 
> Nothing to do.
> Complete!
> [user@dom0 ~]$ 
> 
> 
> -- 
> cheers,
>   Holger

Try manually installing perl-Math-BigInt first?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1ce545f2-2d41-45d0-a1c6-bc895a4342d3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Foppe de Haan
On Monday, July 31, 2017 at 11:23:20 PM UTC+2, Micah Lee wrote:
> On 07/31/2017 04:43 AM, Marek Marczykowski-Górecki wrote:
> > Hello,
> > 
> > We have just released Qubes 4.0-rc1:
> > 
> > https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/
> 
> I just installed Qubes 4.0-rc1 on a Lenovo ThinkPad T440 which runs
> Qubes 3.2 without a problem. After installing it, when I boot up, grub
> works, but then as soon as Qubes starts to boot the computer reboots,
> and I end up back in grub.
> 
> Any ideas on how to start troubleshooting?

start by pressing esc to switch to text boot. Maybe get a camera so you can 
capture the error msg before reboot. If that doesn't provide enough info, you 
can try enabling debugging in the boot options by adding the relevant parameter.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bab9b7da-ef20-4a04-8495-dbc198a06768%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Micah Lee
On 07/31/2017 04:43 AM, Marek Marczykowski-Górecki wrote:
> Hello,
> 
> We have just released Qubes 4.0-rc1:
> 
> https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/

I just installed Qubes 4.0-rc1 on a Lenovo ThinkPad T440 which runs
Qubes 3.2 without a problem. After installing it, when I boot up, grub
works, but then as soon as Qubes starts to boot the computer reboots,
and I end up back in grub.

Any ideas on how to start troubleshooting?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37f90321-b62b-a74c-1f01-a6590a7f75a6%40micahflee.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Holger Levsen
On Mon, Jul 31, 2017 at 10:46:19PM +0200, Marek Marczykowski-Górecki wrote:
> Do you have VT-x enabled in BIOS?

doh, indeed it was disabled. (Which slightly puzzles me as I had running Qubes 
3.2 running
on this machine before…)

Now I get another error OTOH, but I'll try a fresh reinstallation of 4.0rc1 
first, before
reporting that exact error…

Thanks!
 

-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170731211743.GB1014%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


Re: [qubes-users] dispvm savefile creation fails when .qubes-dispvm-customized

2017-07-31 Thread Unman
On Mon, Jul 31, 2017 at 09:22:23AM -0400, Steve Coleman wrote:
> On 07/29/2017 08:59 AM, Connor Page wrote:
> > qvm-create-default-dvm fedora-25
> > 
> > Try that to check if it fails. If not then starting dvms won't be a problem 
> > anymore. If it does then there's something wrong with your template.
> > I use a heavily customized F25 template for dvms and it never fails, but I 
> > always run qvm-create-default-dvm after any changes to its private image.
> 
> I have run this command many times, to recreate the dvm, so running it again
> simply does not help.
> 
> The dvm works fine as long as Qubes does not try to process the
> "customization" of the DVM prior to launching it. I have no way presently to
> see what portion of the customization process that gets hung.
> 
> What I need is to find out how to run that customization code (script?)
> under trace or debugger control so I can identify the actual problem. The
> question is where is this customization script, dom0 or in the template? The
> only script I have found so far (still looking) is dom0 "startup-dvm.sh",
> but all it does is create symbolic links and set permissions for the
> savefile. It never even tests for the existence of
> ".qubes-dispvm-customized".
> 
> 

When this has come up in the past on the list the answer has been to
delete the saved dvm file and to recreate it, add customization, and
then run qvm-create-default-template again.

If you want to check the script operations, look at
/usr/lib/qubes/init/mount-dirs.sh and
/usr/lib/qubes/init/setup-dvm-home.sh

They are simple scripts, so it shouldnt take much debugging.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170731210941.7enjqet7ufy3q564%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] cannot install kernel 4.9.35 from …-current-testing

2017-07-31 Thread Holger Levsen
Hi,

I fail to install kernel 4.9.35 on Qubes 3.2, any hints how I can accomplish 
this? 

[user@dom0 ~]$ LANG=C sudo qubes-dom0-update 
--enablerepo=qubes-dom0-current-testing   kernel kernel-qubes-vm
Using sys-firewall as UpdateVM to download updates for Dom0; this may take some 
time...
Running command on VM: 'sys-firewall'...
Running command on VM: 'sys-firewall'...
fedora/metalink |  11 kB  00:00 
qubes-dom0-current  | 2.9 kB  00:00 
qubes-dom0-current-testing  | 2.9 kB  00:00 
qubes-templates-itl | 2.9 kB  00:00 
updates/metalink|  11 kB  00:00 
--> Running transaction check
---> Package kernel.x86_64 1000:4.9.35-19.pvops.qubes will be installed
---> Package kernel-qubes-vm.x86_64 1000:4.9.35-19.pvops.qubes will be installed
--> Processing Dependency: perl(Math::BigInt) for package: 
1000:kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64
--> Running transaction check
---> Package perl-Math-BigInt.noarch 0:1.9997-355.fc23 will be installed
--> Finished Dependency Resolution
/var/lib/qubes/dom0-updates/packages/kernel-4.9.35-19.pvops.qubes.x86_64.rpm 
already exists and appears to be complete
/var/lib/qubes/dom0-updates/packages/kernel-qubes-vm-4.9.35-19.pvops.qubes.x86_64.rpm
 already exists and appears to be complete
/var/lib/qubes/dom0-updates/packages/perl-Math-BigInt-1.9997-355.fc23.noarch.rpm
 already exists and appears to be complete
find: '/var/lib/qubes/dom0-updates/var/cache/yum': No such file or directory
Redirecting to '/usr/bin/dnf 
--exclude=qubes-template-whonix-gw,qubes-template-fedora-24,qubes-template-fedora-25-minimal,qubes-template-fedora-23,qubes-template-debian-8,qubes-template-whonix-ws,
 install kernel kernel-qubes-vm' (see 'man yum2dnf')

Qubes OS Repository for Dom0  
44 MB/s | 189 kB 00:00
Package kernel-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, skipping.
Package kernel-qubes-vm-1000:4.4.14-11.pvops.qubes.x86_64 is already installed, 
skipping.
Package kernel-qubes-vm-1000:4.4.38-11.pvops.qubes.x86_64 is already installed, 
skipping.
Package kernel-qubes-vm-1000:4.8.12-12.pvops.qubes.x86_64 is already installed, 
skipping.
Dependencies resolved.
=
 Package  Arch   Version 
Repository Size
=
Skipping packages with conflicts:
(add '--best --allowerasing' to command line to force their upgrade):
 kernel   x86_64 1000:4.9.35-19.pvops.qubes  
qubes-dom0-cached  40 M
 kernel-qubes-vm  x86_64 1000:4.9.35-19.pvops.qubes  
qubes-dom0-cached  56 M
 perl-Math-BigInt noarch 1.9997-355.fc23 
qubes-dom0-cached 188 k

Transaction Summary
=
Skip  3 Packages

Nothing to do.
Complete!
[user@dom0 ~]$ 


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170731205607.GA1014%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jul 31, 2017 at 08:42:51PM +, Holger Levsen wrote:
> On Mon, Jul 31, 2017 at 01:43:20PM +0200, Marek Marczykowski-Górecki wrote:
> > We have just released Qubes 4.0-rc1:
> 
> awesome!
> 
> I've installed it on a lenovo x260 and upon the end of the installation I had 
> some 
> error concerning sys-firewall stating "could not find capabilities for 
> arch=x86_64",
> despite that the installation seemed successful. But then when I logged into 
> the
> installed system and ran "qvm-run personal xterm" I got the same:
> 
> $ qvm-run personal xterm
> Running 'xterm' on personal
> personal: Start failed: invalid argument: could not find capabilities for 
> arch=x86_64
> 
> IOW: this doesnt work for me at all. Happy to test+debug further though if 
> someone
> has an idea what to do…

Do you have VT-x enabled in BIOS?

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZf5ccAAoJENuP0xzK19csMK0IAIYI/zVfwmAj7Zn8Ywja8oRQ
+s4EjLS+okL5bGDt+l86BOuVrtFi0W/9ugKWQgwab+MUEzfot4Y1IMUcIQG57Ee0
UPXXSFxY9TG93wgtgq1qPLp3j6rU7gD14DYiE8hoSkAa7XmqT5eMA/u4kKD7Mp0Q
cvGtcj+2qNiN2Klt+rSqAZhnQU/SbPNJncRTsI3QeU0Jvny2RT2/M5re261wa3cO
JlNv0vLojgQQ0TIaL/ObeZLN4RfQScCldNTlkecjgjASEFiiNokfLRFC1wAtvlOe
CGcY09DV0AXGKexmTxxE2rj6ayDloYGzhG7CWXHxCB9N3yHuCF2dHyPgA+F9Ff4=
=OXeO
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170731204619.GC13907%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Holger Levsen
On Mon, Jul 31, 2017 at 01:43:20PM +0200, Marek Marczykowski-Górecki wrote:
> We have just released Qubes 4.0-rc1:

awesome!

I've installed it on a lenovo x260 and upon the end of the installation I had 
some 
error concerning sys-firewall stating "could not find capabilities for 
arch=x86_64",
despite that the installation seemed successful. But then when I logged into the
installed system and ran "qvm-run personal xterm" I got the same:

$ qvm-run personal xterm
Running 'xterm' on personal
personal: Start failed: invalid argument: could not find capabilities for 
arch=x86_64

IOW: this doesnt work for me at all. Happy to test+debug further though if 
someone
has an idea what to do…


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170731204251.GA30080%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread 'P R' via qubes-users
Hello,

Am 31.07.2017 9:42 nachm. schrieb :


I was able to restore all of my VMs via CLI but after restoring I couldn't
start any VM.
Will downgrade to 3.2 and will wait for final release of 4.0 and I hope
that this will then be fixed.


Of course you can go straight back to 3.2 but as this is release candidate
feedback could be helpful.
What happens when you start one of the AppVMs from the CLI?
Output/Error messages?

Have you tried to launch a template VM also, not only the AppVMs?

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvJNd%2BDL9j5WK_Qqk_BT67LywqpM99nJhTcDp0kZ8OE5%3Dg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread miki

Hi,
HVM Standalone option is greyed out. Also the --cdrom option no longer exists 
with the qvm-start command. Does anyone know if this is related to some Stubdom 
changes/problems and will be supported again in the final release?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53647138-4cfa-4091-a878-8350795c6c64%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread f . tuttmann
Am Montag, 31. Juli 2017 20:37:14 UTC+2 schrieb PR:
> Hello,
> 
> 
> 
> Am 31.07.2017 8:09 nachm. schrieb  :
> 
> I don't like that Qubes Manager was removed.
> 
> 
> 
> I can understand that this might feel strange, but after getting used to it 
> you can do anything (even more than with Qubes Manager) from the command 
> line/CLI.
> 
> 
> As far as I have understand, the option is there that someone can program a 
> Qubes GUI, but this is not in scope of the Qubes Core Team, which seem ro be 
> focussed more on the "real"/difficult Qubes stuff.
> I think this is a good decision, but having something like a "legacy" Qubes 
> Manager for Newbies might be helpful for beginners.
> 
> 
> 
> 
> 
> I am also looking for an icon for Backup/Restore.
> 
> 
> You can do backup and restores from the CLI (at least on Qubes 3.2) and I am 
> sure that this can also be done in Qubes 4 RC1.
> In dom0:
> qubes-backup-restore --help
> ... will tell you exactly what you need to do.
> 
> 
> 
> 
>  As long as I can't find this option I can't restore my VMs and this release 
> is useless for me.
> 
> 
> Have you tried to do a restore via CLI?
> If you run into problems, just tell us where exactly the problem is and we'll 
> figure it out.
> 
> 
> I'll download RC1 this evening and will also restore my Qubes 3.2 VMs.
> I can then update this post with a short how-to.
> 
> 
> - PhR

I was able to restore all of my VMs via CLI but after restoring I couldn't 
start any VM.
Will downgrade to 3.2 and will wait for final release of 4.0 and I hope that 
this will then be fixed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ae18dfd-1366-464c-a261-c20793176790%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Eva Star
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Very good news, thanks :)

On 07/31/2017 02:43 PM, Marek Marczykowski-Górecki wrote:
> Hello,
> 
> We have just released Qubes 4.0-rc1:
> 
> https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/
> 
> 

- -- 
Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJZf4FCAAoJEGSin3PC/C0A/ZMQALsV5RzgmGmCu0JoDUROzG5u
a2nkQjtlh2uIeDOtd1xkYdOjtpoOv6Jllpjef/PJF01txwgz5paNRyvu+cW2hc2C
LNVeff6alf7rhDlZX11ZY6WI17ld/P/yQv/rlW6gQjW6Is5prMb6DKIhzx+1XoGS
W4SQmHThkT8ZGZ/fiuqxLHXKgSh/JWxG/De1KpSf0CByU6ugh2CGbOKV4RPHwa4X
Z6WMfvECr+KCvl7vqYmwQaBwKD2gNag5bKuy0DNpXKIyHf33CGFHVvfT6uPoTg40
RtRUSp/uw+mZAjKIzCzOn82gt4aeLVvczF3jvE2Prk0Td8CThQCwUxPXw4IcUZ8m
RSuxYspYYKz11WLZtM7pCDl+CkfrlM/ZUU88RJJ6waeVRPa2m0oM0d4dFn210usk
Uc5UOC0/sKqh15ZH3rlaHK0+CfKyMYyNEMYN6vGME1bzLkOZ3g/ZLmL5EzUuL7mn
NwlS1JkCX5yXUfZ+Xa0SnI4ZIWDxqzvyjY4VORAZxTua72R3iOYOKb/xU/N7CX91
vhZ9yamW3F3mnbiUYrP38tiVhH6XKhsfxzdotBVq5CuIccKlK1BrkEfKXZJDQuze
55MdXmbTaIDpivA5zfWjA7CDPHy82az3Aa7+XwaieD3jmX+jPYNXbXWBnRnLTCUz
oBTFff76TAPKfQt8kouU
=KJGq
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc002212-70a1-8e7c-0505-2b4a9d72d2b4%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] fedora 25 template on 3.2 very long boot

2017-07-31 Thread Eva Star
Hello,

Very long boot of new fedora-25 template on Q3.2 vs previous fedora-24
template.

With fedora 24 template appVm start almost the same like whonix
template. Now, it take 2-3 mins to launch.
Anybody know how to fix?
And why "run in debug" mode does not work for AppVM?

-- 
Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2cbcc5c2-8d3e-27ae-fa98-7ce1e5e0dd89%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Foppe de Haan
Tiny bug with 4rc1 (clean install): qvm-copy-to-vm doesn't exit once done 
transferring data.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/688f99ae-d794-482c-bd10-33cf1b36e2ef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Seeking moderators for unofficial Qubes IRC channels on Freenode and OFTC

2017-07-31 Thread Nicklaus McClendon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/20/2017 07:27 PM, Andrew David Wong wrote:
> Dear Qubes Community,
> 
> We're looking for well-known, trustworthy volunteers from the 
> community who would like to be moderators in the unofficial Qubes
> IRC channels on Freenode and OFTC (#qubes on both). We'd like to
> have at least two unrelated moderators who can oversee both
> channels. If you're interested, please let us know.
> 
> Best, Andrew
> 
> 

I'm always lurking in the Freenode #qubes, I'd be happy to be a moderato
r.

- -- 
kulinacs 
-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEPL+ie5e8l/3OecVUuXLc0JPgMlYFAll/fr8ACgkQuXLc0JPg
MlYXLw//QtqB0NyvPLScIus5pZf7/93HiOkt7PJhnaqg0ENInvXkeXhJQg0bAJEA
KxjdpggoxhwwsChxh4T1aq5f/YkeP5XDZhKAEeY4W/GElzTjFWgM7GSdlPb9bejS
R7AOlwmtD+z0epdOHxQUb9ZWFyM0yJ9uEN/HP4tlDAqh0TrGxrWQQvoKYVagCXos
bHCWcr0ynGYcRnAB//ABhRAcitGwBpyCfWgJc4fyR2sppmu6qVf5/drKC2eeJ605
H8c/RQThDuymj3W9vssYz5eLHsYYqugOJWwhCxjBIQ0bmwAmoQAH4EoVo0OoHV+T
yZojBFtTnuNB+/Tf3NlOnYs8sNXmcTVoCLDt7mHYM+8mpLc2+6xCTK+K30wNjXla
eveHEVjE81sxgqUhQGuh2C5jojrEReEGtPS5VAYPYVGh5kCbHarrK/XyuI9oGY98
y36H1+ViFBUdvWo5zvmA/qd/YwmRvFDULC+dFijzp6BXjEnMe9RP2D3taSHN34fB
RADfhcM16GLwem14ROw9oRk8FhR8BECXYMwRmr0fqP8rH6bkGLQXswioeXKGPQdZ
cJA73oyNvgiKByA7SaZdkKFJtUoPMzBGPw//kVpOWJavfkvYwZJsaG/SbvSq03ZI
NBHn0qeveaMYB9Qg26HnEKcMGgFxdY2RNTnVMpGFSqrXTMmMFV4=
=Alcw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7bebf087-cb13-8113-a35c-d3ec4edba2f4%40kulinacs.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread 'P R' via qubes-users
Hello,

Am 31.07.2017 8:09 nachm. schrieb :

I don't like that Qubes Manager was removed.


I can understand that this might feel strange, but after getting used to it
you can do anything (even more than with Qubes Manager) from the command
line/CLI.

As far as I have understand, the option is there that someone can program a
Qubes GUI, but this is not in scope of the Qubes Core Team, which seem ro
be focussed more on the "real"/difficult Qubes stuff.
I think this is a good decision, but having something like a "legacy" Qubes
Manager for Newbies might be helpful for beginners.

I am also looking for an icon for Backup/Restore.


You can do backup and restores from the CLI (at least on Qubes 3.2) and I
am sure that this can also be done in Qubes 4 RC1.
In dom0:
qubes-backup-restore --help
... will tell you exactly what you need to do.

 As long as I can't find this option I can't restore my VMs and this
release is useless for me.


Have you tried to do a restore via CLI?
If you run into problems, just tell us where exactly the problem is and
we'll figure it out.

I'll download RC1 this evening and will also restore my Qubes 3.2 VMs.
I can then update this post with a short how-to.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvLEh3JZ7pt%3DVjSOa7AM8wBJLkg2qymtoyUW9sqDRb9d2w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread f . tuttmann
Am Montag, 31. Juli 2017 13:43:28 UTC+2 schrieb Marek Marczykowski-Górecki:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> Hello,
> 
> We have just released Qubes 4.0-rc1:
> 
> https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJZfxfZAAoJENuP0xzK19cswOMH/0k+rDX8EuoGXduK+q7zltmT
> nZ06yFh5nzUIA0x8gi6XyFAL/Ph68d0WARKIB2r7X+e2IChG9WbXnBZAzLmnpwRP
> G0PwkYSMQNeVxv7dT9cTyOXtFScZlfhTJtJAhd40LuuLB1tMbfA+wEQVYT4eR7r3
> q7wftZRz5L6AAYZ2ofeDAkraIYF2i0PBC7NZeDnKKR6vT09S4a590HzqJukDz+Ob
> HbOB3PhumFbCpISNjIhtPNgUitXbUreC1Wfc3hFF35UgzMatWzskP/lXeIZxztUI
> TO+X7FsO3QO7LXJXidD7IZrPH6FWLfIL1Dhms8sj2MVuA1Ug5bayuYwJ/G4ci3Y=
> =SV8T
> -END PGP SIGNATURE-


I don't like that Qubes Manager was removed.
I am also looking for an icon for Backup/Restore. As long as I can't find this 
option I can't restore my VMs and this release is useless for me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84867909-49fe-4a54-ade0-5fa407b350ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Impact of the Intel hyper-threading bug [Skylake & Kaby Lake]?

2017-07-31 Thread private user82
Thanks Unman.

26.07.2017, 17:21, "Unman" :
> On Tue, Jul 25, 2017 at 05:14:45PM +0300, private user82 wrote:
>>  I am concerned about the recent bug affecting Skylake and Kaby Lake gen 
>> Intel processors - 
>> https://lists.debian.org/debian-devel/2017/06/msg00308.html
>>
>>  As BIOS updates aren't yet available from many mobo manufacturers, how can 
>> we Qubes users best defend ourselves against an exploit? In this post I am 
>> hoping to reach out to someone who may be able to comment on how we can best 
>> configure our platforms until a fix is available.
>>
>>  Following the advice in the linked Debian advisory, I have disabled 
>> hyper-threading in the BIOS settings. My questions are as follows:
>>
>>  1) When I check /proc/cpuinfo in dom0, 'ht' remains listed as a flag 
>> (capability). Running $ lscpu in dom0 indicates that 'Threads per core: 1' 
>> so I assume the BIOS has in fact disabled hyper-threading. Is this correct, 
>> or should the flag also disappear when functionality is disabled in BIOS 
>> settings?
>>
>>  2) Is it safe to run multiple VCPUs (up to the number of physical cores) 
>> for each Guest VM. Or, in light of this bug, should we only be using a 
>> single VCPU for each guest?
>>
>>  Many thanks in advance.
>
> I seem to recall that Xen used to advise disabling hyperthreading, and
> VMWare counsel against its use when provisioning vcpus.
> In general there's no advantage in assigning more than physical cores to any 
> VM.
>
> On the specifics, I *think* that cpuinfo reports capabilities even if
> they have been diabled, so that isnt an issue.
>
> I dont see any issue in assigning multiple vcpus up to the number of
> physical cores. I dont think that bug is relevant to the decision.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/315281501502066%40web9o.yandex.ru.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] dispvm savefile creation fails when .qubes-dispvm-customized

2017-07-31 Thread Steve Coleman

On 07/29/2017 08:59 AM, Connor Page wrote:

qvm-create-default-dvm fedora-25

Try that to check if it fails. If not then starting dvms won't be a problem 
anymore. If it does then there's something wrong with your template.
I use a heavily customized F25 template for dvms and it never fails, but I 
always run qvm-create-default-dvm after any changes to its private image.


I have run this command many times, to recreate the dvm, so running it 
again simply does not help.


The dvm works fine as long as Qubes does not try to process the 
"customization" of the DVM prior to launching it. I have no way 
presently to see what portion of the customization process that gets hung.


What I need is to find out how to run that customization code (script?) 
under trace or debugger control so I can identify the actual problem. 
The question is where is this customization script, dom0 or in the 
template? The only script I have found so far (still looking) is dom0 
"startup-dvm.sh", but all it does is create symbolic links and set 
permissions for the savefile. It never even tests for the existence of 
".qubes-dispvm-customized".




--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44a122d9-6907-63ce-b01b-894148a8091d%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Keyboard AltGr bug

2017-07-31 Thread Kelly Dean
In Qubes 3.2 with i3, in any qube, regardless of which template I use, and 
regardless of which physical keyboard I use, the right Alt key is useless when 
mapped as AltGr, because it generates spurious Alt_L events.

With a standard American keyboard (or Polish one; they're equivalent except for 
the markings) and American localization, start a new qube, run xev, press and 
release right Alt, and notice you get KeyPress and KeyRelease events for 
keycode 108 (keysym Alt_R).

Now, do this:
xmodmap -e 'remove mod1 = Alt_R'
xmodmap -e 'keycode 108 = Mode_switch'

Then run xev again, and notice when you press right Alt, you get a KeyPress 
event for keycode 108 (keysym Mode_switch), as expected. However, when you 
release right Alt, you get two events: a spurious KeyPress event for keycode 64 
(keysym Alt_L), followed by a KeyRelease event for keycode 108 (keysym 
Mode_switch). You should only get the latter.

Why does that happen?

On another system running plain Debian instead of Qubes, using the same 
keyboards, I don't get the spurious KeyPress for keycode 64.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/IxfIgxhVFiQfrypF6duH5I5VqsylWsAYC0IKwUkDLwY%40local.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes OS 4.0 first release candidate (rc1) has been released!

2017-07-31 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hello,

We have just released Qubes 4.0-rc1:

https://www.qubes-os.org/news/2017/07/31/qubes-40-rc1/

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJZfxfZAAoJENuP0xzK19cswOMH/0k+rDX8EuoGXduK+q7zltmT
nZ06yFh5nzUIA0x8gi6XyFAL/Ph68d0WARKIB2r7X+e2IChG9WbXnBZAzLmnpwRP
G0PwkYSMQNeVxv7dT9cTyOXtFScZlfhTJtJAhd40LuuLB1tMbfA+wEQVYT4eR7r3
q7wftZRz5L6AAYZ2ofeDAkraIYF2i0PBC7NZeDnKKR6vT09S4a590HzqJukDz+Ob
HbOB3PhumFbCpISNjIhtPNgUitXbUreC1Wfc3hFF35UgzMatWzskP/lXeIZxztUI
TO+X7FsO3QO7LXJXidD7IZrPH6FWLfIL1Dhms8sj2MVuA1Ug5bayuYwJ/G4ci3Y=
=SV8T
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170731114320.GY13907%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Problems with Qubes OS launch

2017-07-31 Thread maxxgoodmann
Hello,
successfully installed Qubes OS on internal HDD of my Lenovo ThinkPad, but 
can't see the Qubes OS between the BOOT options.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/603871ea-66c3-409d-a2ac-3c16b6389c83%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.