Re: [qubes-users] Problem installing Qubes 4rc1 on Lenovo Thinkpad X200 - Installer hangs with VT-d enabled / without: libxenlight failed to create new domain (with/without iommo-tweak)
Hello, Am 06.08.2017 11:05 nachm. schrieb "pencilfight": Many current users may require a completely new hardware. I think you are right many would benefit from a dedicated thread. Of course the task for "us" as prerelease testers is to give valuable feedback what is working and what is not which will save other users struggling with Qubes. The most important is: Will Qubes 4 work with my hardware, if the answer is yes, I have no problem trying to get Qubes up and running, but if the answer is no, I would of course save my time and just get the proper hardware. So I would like to see which hardware can be used with Qubes 4. Currently I am not sure if this is the case with the Lenovo X200. Is there a dedicated HCL for Qubes 4? https://www.qubes-os.org/hcl/ I would like to see the Lenovo X230 supported on Qubes 4 if the old X200 will not work. As such my question again: Has someone successfully setup Qubes 4rc1 on a X200? And if so, what was the trick? Regarding hardware: If we manage to get a 12, 14 and 15inch laptop from Lenovo / Dell and maybe HP on a Qubes 4 HCL this would benefit new users as they can just buy a refurbished nlmodell for cheap. Most people I talk to have no problem buying a laptop if the know what the need to buy. Someone might even come up with the idea to sell SSDs with Qubes preinstalled which can be a good thing for new users who just need to replace their harddrive which is an easy task with corporate grade laptops. I know that someone will say, that this doesn't guarantee that the installation has not been tampered, but honestly I am already trusting the Qubes team for their work. - PhR -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAM8xnvKdngLJ%2B4b9hykf6rEq2sT9_GC3DQqi2pjOBGCmqBR6aw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Fwd: Us congress hearing of maan alsaan Money laundry قضية الكونغجرس لغسيل الأموال للمليادير معن الصانع
YouTube videos of U.S. Congress money laundering hearing of Saudi Billionaire " Maan Al sanea" with *bank of America* and The owner of Saad Hospital and Schools in the Eastern Province in *Saudi Arabia* and the Chairman of the Board of Directors of Awal Bank in *Bahrain* With Arabic Subtitles *موقع اليوتيوب الذي عرض جلسة استماع الكونجرس الأمريكي * * لمتابعة نشاطات غسل الأموال ونشاطات* *السعودي معن عبدالواحد الصانع* *مالك مستشفى وشركة سعد ومدارس سعد بالمنطقة الشرقية بالسعودية ورئيس مجلس ادارة بنك اوال البحريني* *مترجم باللغة العربية* http://www.youtube.com/watch?v=mIBNnQvhU8s -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAM1Css8U1znFYJqvQaWbvZCF%2BNimzynM5YCW3owf82ffYgoSPQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Problem installing Qubes 4rc1 on Lenovo Thinkpad X200 - Installer hangs with VT-d enabled / without: libxenlight failed to create new domain (with/without iommo-tweak)
5. Aug 2017 17:25 by qubes-users@googlegroups.com: > Hello, > I have already raised a question in the thread regarding Qubes 4rc1, but as > the Lenovo series is a common laptop for Qubes it might make sense to open a > dedicated thread for this. > I tried several things in order to get Qubes 4 running on my Lenovo X200 but > it seems I am stuck. > I've installed Qubes 4 from USB with VT-d disabled which works but throws an > error in the end and which doesn't allow to start an AppVM: > Start failed: internal error: libxenlight failed to create new domain > 'sys-firewall' > > I have also tried to create a new Fedora 25 based AppVM (HVM and non-HVM) and > run into the same error. > > I have enabled VT-d in the BIOS and rebooted, same error. I have > enabled/disabled iommu=igfx / no-igfx same problem. > Unfortunately it seems that I can't enable VT-d during Qubes installation as > the installer will halt with a black screen when VT-d is enabled.> See here > for the hint regarding the Installation of Qubes 3.2 (?):> > https://www.qubes-os.org/doc/thinkpad-troubleshooting/ > > As I didn't have any trouble installing and running Qubes 3.2 on the X200 > (with 8 GB RAM) I don't understand what is the problem with Qubes 4. > I've done some crossreading regarding the libxenlight error but didn't come > to a good suggestion what to try next. > - PhR > > -- > > My Thinkpad also runs 3.2 with no issues minus the well known Nvidia issue. I was concerned as well trying the 4 prerelease, but I believe Joanna posted recently how Quebes 4 architecture is significantly different from all prior builds, not to mention new kernel. Many current users may require a completely new hardware. I think you are right many would benefit from a dedicated thread. When I was able to get some sort of functionally I understood where most common tasks in 3.2 where relocated to in dom0. But I could not figure out how/where to go to restore my backups. Which brings me to the subject of 4 strictly using HVMs if I'm correct. Is there a process for app VMs to smoothly transition to HVMs? I have to assume these will all run in seamless mode? Lots of questions on top of the Thinkpad specific ones. I'm in no hurry for answers, they will come in time. That being said, I can't begin to say how appreciative I am for the developers' hard work over the last two years to bring us a prerelease. And everyone should keep in mind that is exactly what it is, a prerelease. I'm not discouraged having to revert to 3.2 temporarily. Cheers! Pen -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/KqtMYfn--3-0%40tutanota.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes r4 internal networking question
On Sat, Aug 05, 2017 at 11:55:28PM -0700, Foppe de Haan wrote: > In qubes r3.2, any VMs behind a proxy were on a different subnet (e.g. > anything attached to sys-firewall was on 1.x, while anything behind the tor > gateway was on 3.x). In r4, from what I'm seeing so far, everything is just > in 0.x. > > Is this going to be the new normal / does this have advantages over the old > situation? Because while it was a bit arbitrary, I appreciated that the old > numbering system gave hints as to what was connected to what (esp. while > adding routes in iptables). > Indeed, and it's been implemented for that reason. See, https://github.com/QubesOS/qubes-issues/issues/1143 and https://github.com/QubesOS/qubes-core-admin/pull/67 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170806181318.hlpcpcunww5tdhp4%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to change / swap behavior of Ctrl, Alt, Win, and fn keys?
On Sat, Aug 05, 2017 at 05:15:22PM -0700, Tao Effect wrote: > Dear list, > > Does anyone have any suggestions on how I might go about changing the > behavior of the keys mentioned in the subject? > > I'm so very used to the OS X keymap and it is, I think, unnecessarily painful > having to switch between different keyboard layouts. > > I would love to remap keys as follows: > > Ctrl => fn > Alt => Ctrl > Win => Alt > fn => Win > > Any help appreciated! > > Thanks so much, > Greg > Hi Greg, As others have said, the Fn key is usually set in BIOS - if your machine supports it you may find that you are able to swap keys there. (On my Thinkpad you can do this, and it's also an option on some HPs.) For the other keys, the simplest method would be to use xmodmap. First, dump the existing keycodes. 'xmodmap -pke > ~/.xmodmap' Then edit the file, swapping the entries as appropriate. You can test the new settings by: 'xmodmap ~/.xmodmap' To avoid doing this manually, you can add this command to .xinitrc - in my experience that doesn't work in Qubes, but you can achieve the desired effect by adding the line to .bash_profile. Because of the BIOS constraints on the Fn key, you may find that you have to implement swap FN-Ctrl in BIOS, and then remap Ctrl to Win using xmodmap. A major issue that you'll encounter is that individual qubes no longer seem to inherit from dom0. (i think they used to.) That means that you'll need to make this change in each qube AND i don't know how those qubes will cope with the BIOS key swap, but it's worth a try. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170806175132.doizbj7ruezz5wo4%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to change / swap behavior of Ctrl, Alt, Win, and fn keys?
On 08/06/2017 03:43 PM, Connor Page wrote: > AFAIK fn does not emit a code and bios will process it only in combinations > with predefined keys. That is also how I observed it. > other keys can probably be remapped. but from my exprience I failed to swap > fn and ctrl. Depends on the laptop model. The keyboard is handled by the embedded controller which typically runs proprietary firmware. But that does not prevent people from modifying it anyway :) https://github.com/hamishcoleman/thinkpad-ec/pull/32 -- Live long and prosper Robin `ypid` Schneider -- https://me.ypid.de/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/86f1843d-e6d6-8a91-7100-35645adc83a6%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to change / swap behavior of Ctrl, Alt, Win, and fn keys?
AFAIK fn does not emit a code and bios will process it only in combinations with predefined keys. other keys can probably be remapped. but from my exprience I failed to swap fn and ctrl. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/873db90b-1612-4b8f-8475-668684e2323e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!
On 08/06/17 09:16, Foppe de Haan wrote: Notifications - I haven't seen any notifications at all, like starting/stopping of VMs or when a new USB-device has been attached. Would like to see the notification from Qubes 3.2 in Qubes 4 Agreed. Positioning of Blockdevice and Running VMs widgets: I see my self moving the mouse from left to right a lot, just to start programs and get information (from the widgets) - again Qubes Manager was much more comfortable. few options for you: - Alt-f2 (or alt-f1+arrow keys) is your friend. :p - you can also choose to permanently move either the start menu or the widgets to the left of the menu bar. :) Ok, I haven't used Alt+F2 before, this looks interesting, but I haven't figured out how to use it. Does it offers auto-completion? Is it possible to have something like a desktop widget, showing all running AppVMs? Would a toggle to permanently expand/unfold the manager-widget do? Or do you also want additional features accessible from that QM-widget? It seems that we need to restart Qubes 4rc1 after reinstallation at least one or two times, so that the widgets are working - maybe this should be added to the documentation (?) I have also updated dom0, maybe this brought also the solution? Now all running VMs are shown in the widget, before I could only see sys-net and sys-firewall there. IDEA "QuickstartBar": Could we get something like a shortcut so that a launch bar will open up, where I can enter either bash commands or something like: untrusted:firefox and then Firefox opens in my AppVM named untrusted (general syntax: AppVM:Command/Program? task completion would even be easier? Beyond what you can do with alt-f2 (in xfce) + searching + arrow key navigation? As mentioned, I havent used that before, can this be used without mouse-navigation? I've to enter untrusted: Terminal but when hitting enter, nothing happens, except a red stop sign. need to find out the syntax of that quick launcher, having the graphical menu available from the quick-launcher is a nice addon, but this needs more time, then just using the start menu. The AppVM widget is only showing sys-usb, sys-net, sys-firewall, not other AppVMs which are running. If this concerns VMs you've created yourself, this should probably be fixed in the next update. Or do you mean the 'devices' widget? This has been fixed, after some restarts, I can now also see usb devices in the device widget and can attach them from there to the running VMs - very nice. I like having block and usb devices in one view. What would be nice, but I don't know if this can be done: If a device has been attached to a VM, maybe it can be highlighted or marked with a symbol in the device widget menu. As such I can see directly which devices are attached. currently I need to open the menu entry and I can then see, which AppVM has the device attached (can be identified because it is grayed out and offers an eject button). The "Create Qubes VM" menu entry could also be enhanced so that we have the option to create a clone from an existing VM. Maybe via something like an additional option "Clone from " Not sure I'd use this often enough for it to make sense -- isn't this part of what dispvms are for? Maybe you are right, but now I have to go to terminal to clone a vm. What I am doing is, that I leave the default templates untouched and create a clone of them, which I then use for my AppVMs. This makes sure that I can always test an AppVM with the "original" default Qubes template for troubleshooting. Working with USB devices: Could we improve the handling of usb devices. Currently it seems that it is impossible to add a usb-device to a VM without touching the terminal. Huh? That should be there now, even if it doesn't look the part, and isn't very intuitive (devices widget in notification area? Or doesn't that do usb devices yet? (I can't test this myself due to a different bug)). Solved, my mistake as mentioned above, it seems that Qubes needs one or two restarts until the Widgets are working correctly. A possible bug (?): If you shutdown sys-usb the USB-devices are gone from the list, and won't come back when restarting sys-usb. Another strange effect: I can then see entries called QEMU_QEMU_USB_Tablet_42 for every running AppVM. Is this the virtual USB Hub in every AppVM? I think this should be hidden from the widget. From user perspective I would like to get a notification popup as soon as I attach something to my laptop, then allowing me to choose with the next click where to attach this device to. If I am attaching a device it is most time because I need to get this device into an AppVM. When I attach a usb device through the
Re: [qubes-users] Re: Qubes OS 4.0 first release candidate (rc1) has been released!
On Sunday, August 6, 2017 at 2:11:41 AM UTC+2, PR wrote: > Hello, hi. :) > Notifications - I haven't seen any notifications at all, like > starting/stopping of VMs or when a new USB-device has been > attached. Would like to see the notification from Qubes 3.2 in > Qubes 4 Agreed. > Positioning of Blockdevice and Running VMs widgets: > > I see my self moving the mouse from left to right a lot, just to > start programs and get information (from the widgets) - again > Qubes Manager was much more comfortable. few options for you: - Alt-f2 (or alt-f1+arrow keys) is your friend. :p - you can also choose to permanently move either the start menu or the widgets to the left of the menu bar. :) > Is it possible to have something like a desktop widget, showing > all running AppVMs? Would a toggle to permanently expand/unfold the manager-widget do? Or do you also want additional features accessible from that QM-widget? > IDEA "QuickstartBar": Could we get something like a shortcut > so that a launch bar will open up, where I can enter either bash > commands or something like: untrusted:firefox and then Firefox > opens in my AppVM named untrusted (general syntax: > AppVM:Command/Program? task completion would even be easier? Beyond what you can do with alt-f2 (in xfce) + searching + arrow key navigation? > The AppVM widget is only showing sys-usb, sys-net, > sys-firewall, not other AppVMs which are running. If this concerns VMs you've created yourself, this should probably be fixed in the next update. Or do you mean the 'devices' widget? > The "Create Qubes VM" menu entry could also be enhanced so > that we have the option to create a clone from an existing VM. > Maybe via something like an additional option "Clone from > " Not sure I'd use this often enough for it to make sense -- isn't this part of what dispvms are for? > Working with USB devices: Could we improve the handling of usb > devices. Currently it seems that it is impossible to add a > usb-device to a VM without touching the terminal. Huh? That should be there now, even if it doesn't look the part, and isn't very intuitive (devices widget in notification area? Or doesn't that do usb devices yet? (I can't test this myself due to a different bug)). > From user perspective I would like to get a notification popup > as soon as I attach something to my laptop, then allowing me to > choose with the next click where to attach this device to. > > If I am attaching a device it is most time because I need to get > this device into an AppVM. > Fonts/Display Resolution seems to be different compared to > Qubes 3.2. > > My Laptop has a 3K resolution 2880x1620 Pixels. In 4rc1 the > qubes window frames (which seems to be rendered in dom0) are > small, but the content in the window (content of the AppVM) is > using a bigger font (DPI-size). > > How can this be resolved? Does this help? https://groups.google.com/forum/#!searchin/qubes-users/hidpi$20vm|sort:relevance/qubes-users/GQOLttJeJTg/hubZ7gX8AwAJ ? > qvm-top ... seems to be gone, how can I quickly get a list of > all running VMs? try qvm-ls > I now have to enter the name of the target AppVM when pasting > via global clipboard (Shift+Ctrl+V). While this adds more > security, it is a pain for the user, when copying a lot. Could > it make possible to have the option to get a slightly easier > copy process: > > the current appvm, to which the window belongs is already > selected in the list of the target VM. > > If the user hits Enter two (!) times, the content of clipboard > would be pasted into this AppVM clipboard. Agreed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9b3f4c4b-4e25-4569-a4d6-392f5b165463%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes r4 internal networking question
In qubes r3.2, any VMs behind a proxy were on a different subnet (e.g. anything attached to sys-firewall was on 1.x, while anything behind the tor gateway was on 3.x). In r4, from what I'm seeing so far, everything is just in 0.x. Is this going to be the new normal / does this have advantages over the old situation? Because while it was a bit arbitrary, I appreciated that the old numbering system gave hints as to what was connected to what (esp. while adding routes in iptables). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/49d53b95-4026-4752-80ac-abbf15ee6b4b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.