Re: [qubes-users] Problem installing Qubes 4rc1 on Lenovo Thinkpad X200 - Installer hangs with VT-d enabled / without: libxenlight failed to create new domain (with/without iommo-tweak)

2017-08-06 Thread 'P R' via qubes-users
Hello,

Am 06.08.2017 11:05 nachm. schrieb "pencilfight" :


Many current users may require a completely new hardware. I think you are
right many would benefit from a dedicated thread.


Of course the task for "us" as prerelease testers is to give valuable
feedback what is working and what is not which will save other users
struggling with Qubes.

The most important is:
Will Qubes 4 work with my hardware, if the answer is yes, I have no problem
trying to get Qubes up and running, but if the answer is no, I would of
course save my time and just get the proper hardware.

So I would like to see which hardware can be used with Qubes 4. Currently I
am not sure if this is the case with the Lenovo X200.
Is there a dedicated HCL for Qubes 4?
https://www.qubes-os.org/hcl/

I would like to see the Lenovo X230 supported on Qubes 4 if the old X200
will not work.

As such my question again:
Has someone successfully setup Qubes 4rc1 on a X200?
And if so, what was the trick?

Regarding hardware:

If we manage to get a 12, 14 and 15inch laptop from Lenovo / Dell and maybe
HP on a Qubes 4 HCL this would benefit new users as they can just buy a
refurbished nlmodell for cheap.
Most people I talk to have no problem buying a laptop if the know what the
need to buy.

Someone might even come up with the idea to sell SSDs with Qubes
preinstalled which can be a good thing for new users who just need to
replace their harddrive which is an easy task with corporate grade laptops.

I know that someone will say, that this doesn't guarantee that the
installation has not been tampered, but honestly I am already trusting the
Qubes team for their work.

- PhR

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM8xnvKdngLJ%2B4b9hykf6rEq2sT9_GC3DQqi2pjOBGCmqBR6aw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fwd: Us congress hearing of maan alsaan Money laundry قضية الكونغجرس لغسيل الأموال للمليادير معن الصانع

2017-08-06 Thread Kasem A
YouTube videos of



 U.S. Congress money laundering hearing


of

Saudi Billionaire  " Maan  Al sanea"

 with *bank of America*


and  The  owner of Saad Hospital and  Schools

 in the Eastern Province in *Saudi Arabia*



and the Chairman of the Board of Directors of Awal Bank  in *Bahrain*


With Arabic Subtitles





*موقع اليوتيوب الذي عرض جلسة استماع الكونجرس الأمريكي *

* لمتابعة نشاطات غسل الأموال ونشاطات*



*السعودي معن عبدالواحد الصانع*



*مالك مستشفى  وشركة سعد  ومدارس سعد بالمنطقة الشرقية بالسعودية   ورئيس مجلس
ادارة بنك اوال البحريني*



*مترجم باللغة العربية*



http://www.youtube.com/watch?v=mIBNnQvhU8s

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM1Css8U1znFYJqvQaWbvZCF%2BNimzynM5YCW3owf82ffYgoSPQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Problem installing Qubes 4rc1 on Lenovo Thinkpad X200 - Installer hangs with VT-d enabled / without: libxenlight failed to create new domain (with/without iommo-tweak)

2017-08-06 Thread pencilfight



5. Aug 2017 17:25 by qubes-users@googlegroups.com:


> Hello,
> I have already raised a question in the thread regarding Qubes 4rc1, but as 
> the Lenovo series is a common laptop for Qubes it might make sense to open a 
> dedicated thread for this.
> I tried several things in order to get Qubes 4 running on my Lenovo X200 but 
> it seems I am stuck.
> I've installed Qubes 4 from USB with VT-d disabled which works but throws an 
> error in the end and which doesn't allow to start an AppVM:
> Start failed: internal error: libxenlight failed to create new domain 
> 'sys-firewall'
>
> I have also tried to create a new Fedora 25 based AppVM (HVM and non-HVM) and 
> run into the same error.
>
> I have enabled VT-d in the BIOS and rebooted, same error. I have 
> enabled/disabled iommu=igfx / no-igfx same problem.
> Unfortunately it seems that I can't enable VT-d during Qubes installation as 
> the installer will halt with a black screen when VT-d is enabled.> See here 
> for the hint regarding the Installation of Qubes 3.2 (?):> 
> https://www.qubes-os.org/doc/thinkpad-troubleshooting/
>
> As I didn't have any trouble installing and running Qubes 3.2 on the X200 
> (with 8 GB RAM) I don't understand what is the problem with Qubes 4.
> I've done some crossreading regarding the libxenlight error but didn't come 
> to a good suggestion what to try next.
> - PhR
>
> -- 
>
>




My Thinkpad  also runs 3.2 with no issues minus the well known Nvidia issue.  I 
was concerned as well trying the 4 prerelease, but I believe Joanna posted 
recently how Quebes 4 architecture is significantly different from all prior 
builds, not to mention new kernel. Many current users may require a completely 
new hardware. I think you are right many would benefit from a dedicated thread. 




When I was able to get some sort of functionally I understood where most common 
tasks in 3.2 where relocated to in dom0. But I could not figure out how/where 
to go to restore my backups. Which brings me to the subject of 4 strictly using 
HVMs if I'm correct.  Is there a process for app VMs to smoothly transition to 
HVMs? I have to assume these will all run in seamless mode? Lots of questions 
on top of the Thinkpad specific ones. I'm in no hurry for answers, they will 
come in time. 




That being said, I can't begin to say how appreciative I am for the developers' 
hard work over the last two years to bring us a prerelease.  And everyone 
should keep in mind that is exactly what it is, a prerelease. I'm not 
discouraged having to revert to 3.2 temporarily. 




Cheers!

Pen

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/KqtMYfn--3-0%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes r4 internal networking question

2017-08-06 Thread Unman
On Sat, Aug 05, 2017 at 11:55:28PM -0700, Foppe de Haan wrote:
> In qubes r3.2, any VMs behind a proxy were on a different subnet (e.g. 
> anything attached to sys-firewall was on 1.x, while anything behind the tor 
> gateway was on 3.x). In r4, from what I'm seeing so far, everything is just 
> in 0.x.
> 
> Is this going to be the new normal / does this have advantages over the old 
> situation? Because while it was a bit arbitrary, I appreciated that the old 
> numbering system gave hints as to what was connected to what (esp. while 
> adding routes in iptables).
> 

Indeed, and it's been implemented for that reason.
See, https://github.com/QubesOS/qubes-issues/issues/1143
and https://github.com/QubesOS/qubes-core-admin/pull/67

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170806181318.hlpcpcunww5tdhp4%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to change / swap behavior of Ctrl, Alt, Win, and fn keys?

2017-08-06 Thread Unman
On Sat, Aug 05, 2017 at 05:15:22PM -0700, Tao Effect wrote:
> Dear list,
> 
> Does anyone have any suggestions on how I might go about changing the 
> behavior of the keys mentioned in the subject?
> 
> I'm so very used to the OS X keymap and it is, I think, unnecessarily painful 
> having to switch between different keyboard layouts.
> 
> I would love to remap keys as follows:
> 
> Ctrl => fn
> Alt => Ctrl
> Win => Alt
> fn => Win
> 
> Any help appreciated!
> 
> Thanks so much,
> Greg
> 

Hi Greg,

As others have said, the Fn key is usually set in BIOS - if your machine
supports it you may find that you are able to swap keys there. (On my
Thinkpad you can do this, and it's also an option on some HPs.)

For the other keys, the simplest method would be to use xmodmap.
First, dump the existing keycodes.
'xmodmap -pke > ~/.xmodmap'

Then edit the file, swapping the entries as appropriate.
You can test the new settings by:
'xmodmap ~/.xmodmap'

To avoid doing this manually, you can add this command to .xinitrc - in my
experience that doesn't work in Qubes, but you can achieve the desired
effect by adding the line to .bash_profile.

Because of the BIOS constraints on the Fn key, you may find that you
have to implement swap FN-Ctrl in BIOS, and then remap Ctrl to Win using
xmodmap.

A major issue that you'll encounter is that individual qubes no longer
seem to inherit from dom0. (i think they used to.) That means that
you'll need to make this change in each qube AND i don't know how those
qubes will cope with the BIOS key swap, but it's worth a try.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170806175132.doizbj7ruezz5wo4%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to change / swap behavior of Ctrl, Alt, Win, and fn keys?

2017-08-06 Thread Robin Schneider
On 08/06/2017 03:43 PM, Connor Page wrote:
> AFAIK fn does not emit a code and bios will process it only in combinations 
> with predefined keys.

That is also how I observed it.

> other keys can probably be remapped. but from my exprience I failed to swap 
> fn and ctrl.

Depends on the laptop model. The keyboard is handled by the embedded controller
which typically runs proprietary firmware. But that does not prevent people from
modifying it anyway :)

https://github.com/hamishcoleman/thinkpad-ec/pull/32

-- 
Live long and prosper
Robin `ypid` Schneider -- https://me.ypid.de/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86f1843d-e6d6-8a91-7100-35645adc83a6%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to change / swap behavior of Ctrl, Alt, Win, and fn keys?

2017-08-06 Thread Connor Page
AFAIK fn does not emit a code and bios will process it only in combinations 
with predefined keys. other keys can probably be remapped. but from my 
exprience I failed to swap fn and ctrl.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/873db90b-1612-4b8f-8475-668684e2323e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-06 Thread 'PhR' via qubes-users



On 08/06/17 09:16, Foppe de Haan wrote:



   Notifications - I haven't seen any notifications at all, like
 starting/stopping of VMs or when a new USB-device has been
 attached. Would like to see the notification from Qubes 3.2 in
 Qubes 4

Agreed.



   Positioning of Blockdevice and Running VMs widgets:

 I see my self moving the mouse from left to right a lot, just to
 start programs and get information (from the widgets) - again
 Qubes Manager was much more comfortable.

few options for you:
- Alt-f2 (or alt-f1+arrow keys) is your friend. :p
- you can also choose to permanently move either the start menu or the widgets 
to the left of the menu bar. :)
Ok, I haven't used Alt+F2 before, this looks interesting, but I haven't 
figured out how to use it.

Does it offers auto-completion?


 Is it possible to have something like a desktop widget, showing
 all running AppVMs?

Would a toggle to permanently expand/unfold the manager-widget do? Or do you 
also want additional features accessible from that QM-widget?


It seems that we need to restart Qubes 4rc1 after reinstallation at 
least one or two times, so that the widgets are working - maybe this 
should be added to the documentation (?)

I have also updated dom0, maybe this brought also the solution?
Now all running VMs are shown in the widget, before I could only see 
sys-net and sys-firewall there.



   IDEA "QuickstartBar": Could we get something like a shortcut
 so that a launch bar will open up, where I can enter either bash
 commands or something like: untrusted:firefox and then Firefox
 opens in my AppVM named untrusted (general syntax:
 AppVM:Command/Program? task completion would even be easier?

Beyond what you can do with alt-f2 (in xfce) + searching + arrow key navigation?


As mentioned, I havent used that before, can this be used without 
mouse-navigation?
I've to enter untrusted: Terminal but when hitting enter, nothing 
happens, except a red stop sign.
need to find out the syntax of that quick launcher, having the graphical 
menu available from the quick-launcher is a nice addon, but this needs 
more time, then just using the start menu.



   The AppVM widget is only showing sys-usb, sys-net,
 sys-firewall, not other AppVMs which are running.

If this concerns VMs you've created yourself, this should probably be fixed in 
the next update. Or do you mean the 'devices' widget?


This has been fixed, after some restarts, I can now also see usb devices 
in the device widget and can attach them from there to the running VMs - 
very nice.

I like having block and usb devices in one view.
What would be nice, but I don't know if this can be done:
If a device has been attached to a VM, maybe it can be highlighted or 
marked with a symbol in the device widget menu.
As such I can see directly which devices are attached. currently I need 
to open the menu entry and I can then see, which AppVM has the device 
attached (can be identified because it is grayed out and offers an eject 
button).



   The "Create Qubes VM" menu entry could also be enhanced so
 that we have the option to create a clone from an existing VM.
 Maybe via something like an additional option "Clone from
 "

Not sure I'd use this often enough for it to make sense -- isn't this part of 
what dispvms are for?

Maybe you are right, but now I have to go to terminal to clone a vm.
What I am doing is, that I leave the default templates untouched and 
create a clone of them, which I then use for my AppVMs. This makes sure 
that I can always test an AppVM with the "original" default Qubes 
template for troubleshooting.



   Working with USB devices: Could we improve the handling of usb
 devices. Currently it seems that it is impossible to add a
 usb-device to a VM without touching the terminal.

Huh? That should be there now, even if it doesn't look the part, and isn't very 
intuitive (devices widget in notification area? Or doesn't that do usb devices 
yet? (I can't test this myself due to a different bug)).
Solved, my mistake as mentioned above, it seems that Qubes needs one or 
two restarts until the Widgets are working correctly.

A possible bug (?):
If you shutdown sys-usb the USB-devices are gone from the list, and 
won't come back when restarting sys-usb.

Another strange effect:
I can then see entries called QEMU_QEMU_USB_Tablet_42 for every running 
AppVM.
Is this the virtual USB Hub in every AppVM? I think this should be 
hidden from the widget.



 From user perspective I would like to get a notification popup
 as soon as I attach something to my laptop, then allowing me to
 choose with the next click where to attach this device to.

 If I am attaching a device it is most time because I need to get
 this device into an AppVM.


When I attach a usb device through the 

Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!

2017-08-06 Thread Foppe de Haan
On Sunday, August 6, 2017 at 2:11:41 AM UTC+2, PR wrote:
> Hello,
hi. :)
>   Notifications - I haven't seen any notifications at all, like
> starting/stopping of VMs or when a new USB-device has been
> attached. Would like to see the notification from Qubes 3.2 in
> Qubes 4
Agreed.
>   Positioning of Blockdevice and Running VMs widgets:
> 
> I see my self moving the mouse from left to right a lot, just to
> start programs and get information (from the widgets) - again
> Qubes Manager was much more comfortable.
few options for you:
- Alt-f2 (or alt-f1+arrow keys) is your friend. :p 
- you can also choose to permanently move either the start menu or the widgets 
to the left of the menu bar. :)
> Is it possible to have something like a desktop widget, showing
> all running AppVMs?
Would a toggle to permanently expand/unfold the manager-widget do? Or do you 
also want additional features accessible from that QM-widget?

>   IDEA "QuickstartBar": Could we get something like a shortcut
> so that a launch bar will open up, where I can enter either bash
> commands or something like: untrusted:firefox and then Firefox
> opens in my AppVM named untrusted (general syntax:
> AppVM:Command/Program? task completion would even be easier?
Beyond what you can do with alt-f2 (in xfce) + searching + arrow key navigation?
>   The AppVM widget is only showing sys-usb, sys-net,
> sys-firewall, not other AppVMs which are running.
If this concerns VMs you've created yourself, this should probably be fixed in 
the next update. Or do you mean the 'devices' widget?

   
>   The "Create Qubes VM" menu entry could also be enhanced so
> that we have the option to create a clone from an existing VM.
> Maybe via something like an additional option "Clone from
> "
Not sure I'd use this often enough for it to make sense -- isn't this part of 
what dispvms are for?

>   Working with USB devices: Could we improve the handling of usb
> devices. Currently it seems that it is impossible to add a
> usb-device to a VM without touching the terminal.
Huh? That should be there now, even if it doesn't look the part, and isn't very 
intuitive (devices widget in notification area? Or doesn't that do usb devices 
yet? (I can't test this myself due to a different bug)).

> From user perspective I would like to get a notification popup
> as soon as I attach something to my laptop, then allowing me to
> choose with the next click where to attach this device to.
> 
> If I am attaching a device it is most time because I need to get
> this device into an AppVM.
>   Fonts/Display Resolution seems to be different compared to
> Qubes 3.2.
> 
> My Laptop has a 3K resolution 2880x1620 Pixels. In 4rc1 the
> qubes window frames (which seems to be rendered in dom0) are
> small, but the content in the window (content of the AppVM) is
> using a bigger font (DPI-size).
> 
> How can this be resolved?
Does this help? 
https://groups.google.com/forum/#!searchin/qubes-users/hidpi$20vm|sort:relevance/qubes-users/GQOLttJeJTg/hubZ7gX8AwAJ
 ?

>   qvm-top ... seems to be gone, how can I quickly get a list of
> all running VMs?
try qvm-ls


> I now have to enter the name of the target AppVM when pasting
> via global clipboard (Shift+Ctrl+V). While this adds more
> security, it is a pain for the user, when copying a lot. Could
> it make possible to have the option to get a slightly easier
> copy process:
> 
> the current appvm, to which the window belongs is already
> selected in the list of the target VM.
> 
> If the user hits Enter two (!) times, the content of clipboard
> would be pasted into this AppVM clipboard.
Agreed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b3f4c4b-4e25-4569-a4d6-392f5b165463%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes r4 internal networking question

2017-08-06 Thread Foppe de Haan
In qubes r3.2, any VMs behind a proxy were on a different subnet (e.g. anything 
attached to sys-firewall was on 1.x, while anything behind the tor gateway was 
on 3.x). In r4, from what I'm seeing so far, everything is just in 0.x.

Is this going to be the new normal / does this have advantages over the old 
situation? Because while it was a bit arbitrary, I appreciated that the old 
numbering system gave hints as to what was connected to what (esp. while adding 
routes in iptables).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/49d53b95-4026-4752-80ac-abbf15ee6b4b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.