Re: [qubes-users] Qubes freezing (hangs) always in less than 1 hour
On Sun, December 31, 2017 8:31 pm, Sameer Vao wrote: > freezes completely (hangs) normally within 15 minutes after booting, > needing a hard reboot. Theres no specific thing - sometimes moving the If you haven't already, try running "sudo qubes-dom0-update" as soon as you get in to Qubes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/37d1bc4d34e000b223353355618580ac.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] cannot remove/create VM exists and doesn't exist
On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users wrote: > > libvirtError: operation failed: domain 'win7' already exists with uuid > Sometimes a reboot clears up discrepancies like that for me. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/867e7da61904820085593b6b53e644da.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] cannot remove/create VM exists and doesn't exist
Hi awokd > Den 1. jan. 2018 kl. 11.32 skrev awokd : > >> On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users wrote: >> >> >> libvirtError: operation failed: domain 'win7' already exists with uuid >> > > Sometimes a reboot clears up discrepancies like that for me. I’m sorry, I tried that, after restarting the libvirtd service and that didn’t work. Thank you for your reply Soncerely Max -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/51441858-AD36-414F-840C-52046DE0E02A%40militant.dk. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] cannot remove/create VM exists and doesn't exist
On Mon, January 1, 2018 10:41 am, Max Andersen wrote: > Hi awokd > > >> Den 1. jan. 2018 kl. 11.32 skrev awokd : >> >> >>> On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users >>> wrote: >>> >>> >>> >>> libvirtError: operation failed: domain 'win7' already exists with >>> uuid >>> >> >> Sometimes a reboot clears up discrepancies like that for me. >> > > I’m sorry, I tried that, after restarting the libvirtd service and that > didn’t work. > Can try to rename Win7 to Win7b. There is also a "virsh destroy" but ordinarily you shouldn't have to use that. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fd36716e51b486a5cd363270c7336762.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] cannot remove/create VM exists and doesn't exist
On 01/01/2018 11:52 AM, awokd wrote: > On Mon, January 1, 2018 10:41 am, Max Andersen wrote: >> Hi awokd >> >> >>> Den 1. jan. 2018 kl. 11.32 skrev awokd : >>> >>> On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users wrote: libvirtError: operation failed: domain 'win7' already exists with uuid >>> Sometimes a reboot clears up discrepancies like that for me. >>> >> I’m sorry, I tried that, after restarting the libvirtd service and that >> didn’t work. >> > Can try to rename Win7 to Win7b. There is also a "virsh destroy" but > ordinarily you shouldn't have to use that. I cannot rename or do a simple list with qvm-prefs. Only with virsh, so there must be a discrepancy between the 2. qvm-ls shows no win7, but virsh does. Sincerely Max -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ef665cec-2311-5be6-8547-15419fbc664e%40militant.dk. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Install Rtlwifi new
On Sunday, 31 December 2017 20:57:36 GMT davidmizr2...@gmail.com wrote: > I can see e permission problem here > "/net/wireless/realtek/rtlwifi/rtl_pci.ko' Read-only file system, That is not a permission problem. Nobody can write to a read-only filesystem. Try to make sure that you configured your compile correctly. The path starting with /net makes little sense to me. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4847878.CPfFngQe5g%40mail. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] cannot remove/create VM exists and doesn't exist [SOLVED]
On 01/01/2018 01:40 PM, Max Andersen wrote: > > On 01/01/2018 11:52 AM, awokd wrote: >> On Mon, January 1, 2018 10:41 am, Max Andersen wrote: >>> Hi awokd >>> >>> Den 1. jan. 2018 kl. 11.32 skrev awokd : > On Mon, January 1, 2018 4:36 am, 'Max Andersen' via qubes-users > wrote: > > > > libvirtError: operation failed: domain 'win7' already exists with > uuid > Sometimes a reboot clears up discrepancies like that for me. >>> I’m sorry, I tried that, after restarting the libvirtd service and that >>> didn’t work. >>> >> Can try to rename Win7 to Win7b. There is also a "virsh destroy" but >> ordinarily you shouldn't have to use that. > I cannot rename or do a simple list with qvm-prefs. Only with virsh, so > there must be a discrepancy between the 2. > > qvm-ls shows no win7, but virsh does. > > Sincerely > Max I started up the virsh shell, typed 'undefine win7', and started all over. That worked. Thank you for your efforts, awokd Sincerely Max > > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1aaded14-36e1-08f1-88ea-5268d0afc196%40militant.dk. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] cannot remove/create VM exists and doesn't exist
Mine is just a guess: have you tried with something like 'virsh -c xen:/// undefine win7' and then, if some references to your vm remains in qubes.xml or the Application menus, manually remove them? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0ec4523e-6eef-445c-9bb7-4f77a61200a9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] cannot remove/create VM exists and doesn't exist
On Mon, January 1, 2018 1:44 pm, Lorenzo Guerra wrote: > Mine is just a guess: have you tried with something like 'virsh -c > xen:/// undefine win7' and then, if some references to your vm remains in > qubes.xml or the Application menus, manually remove them? Sounds like that worked for Max. "Destroy" doesn't also undefine? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/00858659be624fd070ebd387bcc7275f.squirrel%40tt3j2x4k5ycaa5zt.onion. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Help verifying install files: how to verify the Release 3 Signing Key?
I have successfully verified the fingerprint for the Qubes Master Signing Key. I have verified the Release 3 ISO signature using the Qubes Release 3 Signing Key. How do I verify that the Release 3 signing key is good? Do I somehow use the Qubes Master Signing Key to verify the authenticity of the Release 3 Signing Key? If so, please explain how to do this with gpg4win? Thanks! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0eeda219-044f-4743-a30c-daf77edc819c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Detached LUKS header
> I haven't personally tried it, but I can't immediately think of > anything preventing it. You won't be able to do it via the GUI > installer, but you should be able to do it from the command-line. I > suggest taking inspiration from here: > > https://www.qubes-os.org/doc/custom-install/ > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > I did look at this link as I already said. But the thing is that there are no info on how to install it without using the GUI. I guess I could look into the installer code, but I didn't try it for now -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f52f9bf8-530b-4fef-9cb1-e066e2e11bcf%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Running rkt containers directly on zen?
Hi, While searching on the internet I stumbled onto this: https://github.com/rkt/stage1-xen Would this work on qubes? Anyone already doing it? Also found some stuff about rumprun unikernels allowing directly running any posix app on xen. It seems awfully quiet about such initiatives, which puzzles me because surely being able to run applications in total isolation without the overhead (memory, disk, cpu) of a full linux install is very interesting for something like qubes right? What is the current state of affairs? Naja Melan -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4df77270-1ac2-2d7d-63d1-9fc8eb372cbb%40autistici.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Help verifying install files: how to verify the Release 3 Signing Key?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2018-01-01 10:44, Kyle Breneman wrote: > I have successfully verified the fingerprint for the Qubes Master > Signing Key. I have verified the Release 3 ISO signature using > the Qubes Release 3 Signing Key. How do I verify that the Release > 3 signing key is good? Do I somehow use the Qubes Master Signing > Key to verify the authenticity of the Release 3 Signing Key? Yes. The Release 3 Signing Key is signed by the Qubes Master Signing Key, and you can check this signature in order to verify that the Release 3 Signing Key is authentic. > If so, please explain how to do this with gpg4win? Thanks! > I don't use gpg4win, so I'm afraid I can't provide instructions for that program. However, I can show you how to do it in GnuPG (on Linux). Perhaps gpg4win has a way to accept GnuPG commands, or perhaps this will help you search for the equivalent gpg4win instructions. Here's how I'd do it in GnuPG: == $ gpg2 --check-signatures C52261BE0A823221D94CA1D1CB11CA1D03FA5082 pub rsa4096 2014-11-19 [SC] C52261BE0A823221D94CA1D1CB11CA1D03FA5082 uid [ full ] Qubes OS Release 3 Signing Key sig!3CB11CA1D03FA5082 2014-11-19 Qubes OS Release 3 Signing Key sig! DDFA1A3E36879494 2014-11-19 Qubes Master Signing Key gpg: 2 good signatures $ gpg2 --fingerprint DDFA1A3E36879494 pub rsa4096 2010-04-01 [SC] 427F 11FD 0FAA 4B08 0123 F01C DDFA 1A3E 3687 9494 uid [ultimate] Qubes Master Signing Key == First, we check the signatures on the Release 3 Signing Key and find that there are two good signatures: one from the Release 3 Signing Key itself and one from a key named "Qubes Master Signing Key." Since anyone can create a key with this name, we then check that the full fingerprint of the key claiming to be the Qubes Master Signing Key matches the fingerprint we've obtained and verified through multiple independent channels. In this case, the signature check shows us the long-form ID of each signing key, which is probably not easy to forge (much harder than the short-form, at least), but it's still safer to check the full fingerprint. Since I've already set the trust level of the Qubes Master Signing Key to "ultimate" in this keyring, the Release 3 Signing Key automatically has a trust level of "full" (given the default trust model) because it's signed by the Qubes Master Signing Key. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlpKyywACgkQ203TvDlQ MDAGFBAAmnKx7+whIIIT/ktzYSTv0XMl2CIlIPz0c+wymkWyPeivj3wuNW7Oj8dL 3SqshpjJLk9pbdfMLWza56X8Wb1aczVBKc6xylAQNFyRgDA42NBnpVRC36h764Xt wprir/o4eIHJUvHgZ0yOrgVoJy9i3xL6zrZN1O1BVsGy1pyMdndT8Td9Rsp7oRi6 3JCaSUHIeiddVy4h30/xmVVsrFWFSN9PHsNzneW+lI+oIcSaOkUJIOfJdIiZ+FOG Uf+wIaNwkG1ILzSbknvBtuaIDlK4CKKmiobliTq1epxEhGm/UmMcojdCbGjM8qYZ MYWbnuIir0Ab/pp85UL/QF3ePN9wnUJVknQdGiVBtVuzCtIKmpckEhesSS2ZCC1M bcTxBEikEBg1/kYDH+O8PAEfNLidVp9zdwzC607gbza3ZqQoHwXJtxvmTxUUnDaB 4J/Wn01oE9P8tt18a+FOQUEVwnEwZAl+UknZPuTv6gr/gzJvcViLCla5GPRTsgVG OXCF9HU8GZG/C+TNsFVAnX0Z4ttkG5Wi/n27SN2zDB6pJ0/vwVmgoiPTfK7VYcm9 iHhDchvQoluVWpgEQrmeTw0q3ZRXj4nnnwkKEDW+2GewUTSC1rF7P7YJ0RjrNi+o 9yNrqC1S4NBL09vjun+NziUfo5pYHf8TByv+rECG99mzLgEW6T8= =NqUe -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a4e63d86-2bf3-b4c7-4d95-dd9e6a7ee001%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Help verifying install files: how to verify the Release 3 Signing Key?
On 01/01/2018 11:44 AM, Kyle Breneman wrote: I have successfully verified the fingerprint for the Qubes Master Signing Key. I have verified the Release 3 ISO signature using the Qubes Release 3 Signing Key. How do I verify that the Release 3 signing key is good? Do I somehow use the Qubes Master Signing Key to verify the authenticity of the Release 3 Signing Key? If so, please explain how to do this with gpg4win? Thanks! Hi Kyle, After you import both the master and signing keys, you can check them with 'gpg --check-sigs' which should have output like this: pub rsa4096 2017-03-06 [SC] 5817A43B283DE5A9181A522E1848792F9E2795E9 uid [ unknown] Qubes OS Release 4 Signing Key sig!31848792F9E2795E9 2017-03-06 Qubes OS Release 4 Signing Key sig! DDFA1A3E36879494 2017-03-08 Qubes Master Signing Key (I have the Qubes 4 key but its otherwise the same.) This lists the Qubes master key under the uid for the Qubes release key, showing the release key has been signed by the master. The exclamation mark after "sig" means the signature has been verified as good. -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f29d5a14-c5ae-fed9-7dda-2d2bf183c870%40posteo.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Install Rtlwifi new
On Sunday, December 31, 2017 at 11:39:43 AM UTC-7, davidm...@gmail.com wrote: > Hi, I'm tring to istall the RTlwifi new driver in "sys-net", you can see the > driver here, "https://github.com/lwfinger/rtlwifi_new";, I have to install > this driver using "SUDO MAKE" and "SUDO MAKE INSTALL", sudo make works good, > but when I try "sudo make install" the system send this error. > > > THE ERROR > "/net/wireless/realtek/rtlwifi/rtl_pci.ko' Read-only file system > "Make file:65: recipe for target "install" failed > make *** [install] error 1" > > thank you very much, I really like this operating system, it is the best > > but I need to install this drivers > > Thanks > > please help me Thanks What I do is to open the terminal and folow the steps that you can see here, https://akshaycv006.wordpress.com/2017/01/12/installing-realtek-rtl8723be-driver-for-ubuntu-debian-or-fedora/, I try in ubuntu and works good. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/26b366d9-b97e-4229-ba28-5b3dfc07d286%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 3.2 GRUB menu not shown after boot
Hello, Just installed Qubes 3.2 on a Lenovo ThinkPad Y700. It tried about 4 times and the SSD hard drive where I installed was not seen as UEFI bootable. I went to uefi troubleshoot page, followed the steps there (add mabps, noexitboot on kernel lines) plus creating the /boot/efi/EFI/BOOT folder and moving xen.cfg -> BOOTX64.cfg ,etc. Now, the hard drive where Qubes 3.2 is installed is seen as UEFI bootable and selected, but when it boots it just hangs in a black screen, without showing anything at all. The hard drive is LUCKS encrypted. I tried to press any key, waited a reasonable about of time, nothing changes, it's just the black screen. Thank you. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAGn7Kap5-Q-O4hpaWH52D1LLa6EawtR3vxjdFLg%3DzfeAYb2d%3Dg%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Detached LUKS header
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2018-01-01 11:14, spi...@gmail.com wrote: >> I haven't personally tried it, but I can't immediately think of >> anything preventing it. You won't be able to do it via the GUI >> installer, but you should be able to do it from the command-line. >> I suggest taking inspiration from here: >> >> https://www.qubes-os.org/doc/custom-install/ >> > > I did look at this link as I already said. Oh, I didn't know you were referring to that document. I thought you meant that you clicked on the "custom" button in the GUI installer or something. > But the thing is that there are no info on how to install it > without using the GUI. I guess I could look into the installer > code, but I didn't try it for now > Yeah, I see what you mean. I don't know whether there's a way to complete the installation without the GUI, and I can't recall anyone discussing it on the list. However, the Qubes installer is mostly the same as the Fedora installer, so if there's a way to do it when installing Fedora, there's a good chance the same method would apply in Qubes. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlpKwugACgkQ203TvDlQ MDCEqBAAgP/xTlocNI/5Rd2g0Pmqr/ISeFZzSNIXKAtZJaTnmOVewQP/imshkSoo bi975lwCEJ1nKNIMc7woL1apGUdO2pJBxUl0xxm80ZhjYu2iAVCNlnMS5LPuTexx h3GRGrwUpXt6k5PT3w4oYC0FRAG5k4z6mkEky/QSfe6IKC9Wkn8oSgqvULA1wpBL B5KZAJiyvNwDogQDkIg1XvOHGMtAGkPl1JKQTj/mP2lgwtcI9KUYdS5xpaVPKX/I /hdkjerc/BqIwPMdC8Hcv8V9Wf9R1T0z+dar0whl7aHg261mjuj8mJGJSHFA3sp9 t7WCfvk4QTzpGgGNtO5vF0LcgW1X46mZwCID3+1B08kSwZpaBXKS2aDGemvwyDt0 O+IK+TVg4iW8ZirOtBCuK+kmbhMpUi/JVXY655MwtCLvNpUBNR+MQvs/0kh7cBrj eorPL+S3P4exjufI0VjIM3Qg901+4Syry6l5XYpnV/Pc+2olw1hyU35NdUUwIMmp GVVBO/RGavf8bXaT5/FUzAJ8Et8hJ6IXiHMnHwWIsaTEuBbJS1v0traroKtAjWaK ychD3QGZXLn1Y4eAhflFxP3drd2krJ5VoOh9UJ6JSOqzHstJdfvP8ijVfguyBvHO NdRagCfjef07ZOQSSrdBOfTiafUXboQSrtF+BMEB5zwNCylD4+4= =/whK -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e41694b8-cb1f-0c2d-64ce-223ed3ab2863%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Install Rtlwifi new
thanks What I do is to open the terminal and folow the steps that you can see here, https://akshaycv006.wordpress.com/2017/01/12/installing-realtek-rtl8723be-driver-for-ubuntu-debian-or-fedora/, I try in ubuntu and works good. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f0ef02fb-6ce4-4166-b356-0c865d9f8559%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to add Web-Shortcut to Menu of an AppVM
Hello, I would like to enter a new menu item to the Appmenu of a Fedora 25 based AppVM. The menu should contain a link to our corporate Mailserver (https:///owa). I have thereof installed "menulibre" (sudo yum -y install menulibre) and created a new desktop entry under the Office Section, but it won't show up in the qubes app menu. I have synced the application within the applications Tab under VM Settings. I have also tried to manually add the desktop file: nano open-corporate-webmail.desktop [Desktop Entry] Encoding=UTF-8 Name=Open Corporate Webmail Icon=my-icon Type=Application Categories=Office; Exec=xdg-open https://example.com/owa/ Following the documentation about adding menu files I have run: xdg-desktop-menu install open-corporate-webmail.desktop Unfortunately both ways (menulibre and manual creation of desktop file) didn't solve the task. ... Thereof the Question: How can I add a web Shortcut to an application menu of an AppVM? Kind regards [799] -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7SRQxQbrEv_YnX3dN0EgJdP_eKjnpcWIQNz2Hcc-yigy7KbHgMQHLoV4_pn6YGc3kJypAjYLoIDm-uHIdAHfHJktO9CLFEGWKYfuxOy_ZP8%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How find out addresses to limit outgoing connections
I read some posts about firewalls etc but haven't been able to find/limit outgoing connections. I have tried to add domains which seems to have worked (minus a bug or two) but I can't seem to figure out all the domains I need to list. example, I use a gmail account, I tried adding say gmail.com and google.com to the list of accepted connections but it still doesn't work. I assume there are other domains I need to add but I can't figure out how to see what they are. I tried tcpdump and installed iptraf in the vm but they strangely don't even show email, just amazon aws, akamaitechnolog, and ???.1e100.net but then I tried installing umatrix in chrome and it shows various other domains (quite a few actually). Also, when I try to add domains the firewall window gives me an error port number or service is invalid, but I selected "any" for service and ports? And after adding whatever domains the first time and saving/clicking ok, when I try to go back in to further add/modify the firewall I get the error "firewall has been modified manually - please use qvm-firewall for any further configuration." I haven't had much luck using qvm-firewall beyond just the list option. In the end, I want to have say a VM for email, where the firewall blocks everything but access to the email service, and do the same for my "banking VM" or "bitcoin wallet vm" I'm at a bit of a loss so would be greatful for help. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/735899610fd060b025b597c76e48b056%40posteo.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How find out addresses to limit outgoing connections
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-12-29 21:55, Stumpy wrote: > I read some posts about firewalls etc but haven't been able to > find/limit outgoing connections. I have tried to add domains which > seems to have worked (minus a bug or two) but I can't seem to > figure out all the domains I need to list. > > example, I use a gmail account, I tried adding say gmail.com and > google.com to the list of accepted connections but it still doesn't > work. I assume there are other domains I need to add but I can't > figure out how to see what they are. I tried tcpdump and installed > iptraf in the vm but they strangely don't even show email, just > amazon aws, akamaitechnolog, and ???.1e100.net but then I tried > installing umatrix in chrome and it shows various other domains > (quite a few actually). > > Also, when I try to add domains the firewall window gives me an > error port number or service is invalid, but I selected "any" for > service and ports? And after adding whatever domains the first > time and saving/clicking ok, when I try to go back in to further > add/modify the firewall I get the error "firewall has been > modified manually - please use qvm-firewall for any further > configuration." I haven't had much luck using qvm-firewall beyond > just the list option. > > In the end, I want to have say a VM for email, where the firewall > blocks everything but access to the email service, and do the same > for my "banking VM" or "bitcoin wallet vm" > > I'm at a bit of a loss so would be greatful for help. > Take a look at this thread: https://groups.google.com/d/topic/qubes-users/fSiFkQeoqGE/discussion - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlpLE4EACgkQ203TvDlQ MDBnvQ/+NmurlEXasTE9nUE14APmiSDl1xWlnueJCY1sWuZLt9rriMG021AaVZS8 Csk1ETVBGVhfmB/ShAvTn18jkFbMr73Z3pykPr3ozjLfEo74WVrgsBAvAhQ/kaQG EBV6h+c7WdOPDuaBSX7HuJnVxkEFKImO0b+Is3VxHnSP/Twz8vCBqJyKsyoqucmw +i2ZWAauULBWm0STU7ZFzlAtDKz8jKb1VTZfKc8o6DpejSyApruff6+nk9OnjDkO ZeeCz5LoIcvj7frEDOQJNCo5N5yJLdufyD9m7/XGnAmQ0W0ARdZyyPeO5I7h+jns CwiocNK61QkmZZI+c0leVj9zPJKBSJoJwHf0eGdfmxMGjIOJpCyqfLozNWlPXZ3k lihGBEHXbKt/rNyl4qEf+pHT/QykQZGVQaYVUL5BwYXr70LnZAfJ1TaijGyX+PZ3 JI/HsUlCegKycGuc5LWt6ARUu/qQxgZTv+2QLPVyGb175htCAYnoyhWA8/yA7MV9 AEMFNZpyOEt1kWHsow2Jzyrars+rOk0eNvpAz6WQJCIyjG1tRIUrxbO4I6IJSUnX nEeecbu/Ser6swvrnoCowl2bdxxOaR9UG9DQCt4NmEjYe8bAjCJaANl+SUe8tB7m 61wpGsfw+L2dHD3/J9Ro2QtR3codlqfUjuTMvUWchKcKKj6cSKg= =z3QR -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4571aac8-ebd8-a432-b17a-c899e6f42086%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Installation security : Usb optical vs sata optical vs usb drive
So from the installation security guide I read the following: "Use a USB optical drive. Attach a SATA optical drive to a secondary SATA controller, then assign this secondary SATA controller to an AppVM." And for USB Drive: "Untrustworthy firmware. (Firmware can be malicious even if the drive is new. Plugging a drive with rewritable firmware into a compromised machine can also compromise the drive. Installing from a compromised drive could compromise even a brand new Qubes installation.)" Do usb optical drives not also have the same problem firmware wise? What about sata? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0f4ae4ef-1b58-474c-ba10-27b87188b409%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.