Re: [qubes-users] Enabling OpenVPN auto start

2018-09-26 Thread Chris Laprise

On 09/26/2018 08:38 PM, Stuart Perkins wrote:

Well, got the proxyVM created.  Based it on Fedora-28.  Have it squeezed 
between sys-firewall and sys-net.  It runs automatically due to the dependency, 
but the vpn does not run automatically, which is what I want.


It should run openvpn automatically, unless there was a typo or a step 
was skipped. You can check its log with 'sudo journalctl -u qubes-tunnel'.


  I setup a shortcut to start the open vpn and another to kill it.  It 
seems to work, but my ability to test it out is not complete right now. 
I'll know more after I test it some more tomorrow.  That keeps my 
storage of VPN credentials away from sys-net, while still enabling 
sys-firewall.  That is the part I need to test more fully.  I have one 
appVM firewalled to only access my home system for backup purposes as 
well as other appVMs with full access.  I'll do some serious testing 
tomorrow and report the results.  I can synthesize being away from home 
by using my smartphone for internet.  I will need to access my home 
network when connected to the VPN, which I ought to be able to, and a 
traceroute should go through my home system's DNS server.  This may be 
the best solution for my need for now.  It is better than the previous 
sys-net hosted openvpn instance.  Thanks to Chris for the explanation as 
to why to use qubes-tunnel.


There are two ways to access a LAN while connected to a VPN with 
qubes-tunnel. One is to add exceptions to the ProxyVM internal iptables 
rules, the other (recommended way) is to connect the particular VM 
requiring LAN access to a clearnet VM such as sys-firewall (assuming you 
have sys-firewall still connected directly to sys-net).



--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f5e1f1d-c77d-f02f-5ea6-bf7a501cc681%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Thinkpad X1 Carbon 6th gen - Qubes 4.0

2018-09-26 Thread beastgoalie
On Monday, April 16, 2018 at 3:14:43 PM UTC-7, fiasc...@gmail.com wrote:
> Summary: Install worked reasonably well and it boots with EFI into the 
> installed Qubes 4.0 nicely. There are a few issues to resolve.
> 
> 1. I have the model with a touch screen and I haven't debugged how to make it 
> work yet (I'll get to that and post back what worked).
> 
> 2. Suspend/resume doesn't work and I have to do a hard reset. A few times 
> (not all) I had to hard reset twice to get it to reboot properly.
> 
> 3. HCL reports no TPM, but I have a dTPM 2.0.
> 
> It's booting with UEFI smoothly. I haven't tested the mic, camera, or ports 
> except USB for storage yet. I'll update once I find fixes for the above. If 
> anyone could point me in the right direction for the suspend freezing issue, 
> let me know. I tried shutting down all VMs, including service VMs after 
> reading this, 
> https://groups.google.com/d/msg/qubes-users/81t26xq4MEI/HrfDEcjeAgAJ but the 
> problem persisted didn't change anything.

Confirming that DJB's notes in that thread worked for me. Currently running 
4.14.67 with patches. 

Also want to note that the latest 1.30 (I'm about to install it) bios supports 
a toggle for Linux vs Windows sleep states. It was released around 9/8/2018.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa2e89f9-c72a-4e28-9d3f-789efd791939%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: X1 Carbon again; Qubes DSDT override?

2018-09-26 Thread fiasco4297
On Tuesday, September 4, 2018 at 10:01:08 PM UTC-7, aqeel...@gmail.com wrote:
> On Wednesday, 1 August 2018 12:04:13 UTC+10, D. J. Bernstein  wrote:
> > I finally decided to resort to patching the kernel. Suspend now seems to
> > work normally in several tests on a Lenovo X1 ThinkPad Carbon 6th
> > generation under Qubes R4.0. The idea of the patch is to do
> > 
> >if (sleep_state == ACPI_STATE_S3) {
> >  *sleep_type_a = 5;
> >  *sleep_type_b = 5;
> >  return_ACPI_STATUS(AE_OK);
> >}
> > 
> > near the top of acpi_get_sleep_type_data() (right after the "Validate
> > parameters" part) in linux/drivers/acpi/acpica/hwxface.c. This has the
> > same effect as the DSDT patches running around for this laptop: telling
> > the kernel that the laptop supports S3 state (which the hardware _does_
> > support---the starting problem is that the BIOS fails to announce this),
> > and more specifically that S3 is hardware sleep type 5.
> > 
> > Of course, simply adding the lines above wouldn't be appropriate for
> > non-laptops, or laptops where S3 is another hardware sleep type. The
> > actual patch is instead triggered by
> > 
> >* DMI reporting this laptop, or
> >* "acpi_force_s3=5" on the kernel command line (so users have a
> >  relatively easy way to handle newer laptops with the same problem).
> > 
> > If this patch survives more tests and review (I'm not a Linux kernel
> > expert) then it should be suitable for upstream adoption. I've attached
> > the patch, and some notes on how I compiled a patched kernel for Qubes
> > R4.0.
> > 
> > Beyond the patch, I've put
> > 
> >mem_sleep_default=deep
> > 
> > into my /boot/efi/EFI/qubes/xen.cfg on the kernel= line for the patched
> > kernel, to tell the kernel to use S3 for suspend---otherwise it uses
> > s2idle. The importance of S3 vs. s2idle for this laptop is different on
> > Qubes from vanilla Linux: there are many reports of s2idle consuming
> > more power than S3 on vanilla Linux, but Qubes seems unique in s2idle
> > not waking up at all. I don't see a serious argument for s2idle when S3
> > is supported, so I'm not sure why mem_sleep_default prefers s2idle over
> > S3; even if there's a reason for this, maybe there would be general
> > interest in a second patch that disables s2idle on this laptop.
> > 
> > ---Dan
> 
> Hi Dan,
> 
> I followed kernel-compile-notes.txt twice. The first time failed, the second 
> time worked a charm with minor changes to the method. These are my notes on 
> the experience.
> 
> Before I proceed, I note that the current version of the qubes-linux-kernel 
> git on stable-4.14 is 4.14.67-1. This is the version of the kernel that I 
> have compiled and applied your patch to.
> 
> The first (failed) attempted, I was on a fresh install of Qubes R4.0, kernel 
> 4.14.18-1. Compiling the kernel seemed to work, as did installing. Upon boot 
> and unlocking my hard-drive the system never seemed to get anywhere on the 
> loading. Upon pressing escape I noticed I was being spammed with a `dracut` 
> error before eventually it dropped to an emergency shell. A more forward 
> thinking me would have written down the error message. I simply reinstalled 
> Qubes R4.0 fresh to start over.
> 
> The second (successful) attempt was after I had updated dom0. I was running 
> kernel 4.14.57-2. I knew that this was an earlier version than the one I was 
> going to compile so it wasn't going to be an issue (as you've described in 
> your excellent notes). I doubt updating dom0 had anything to do with the 
> success of this attempt, instead I did two things differently to your notes:
> 
> 1. I ran the following command twice, superfluous I presume: 
>
>make verify-sources 
> 
> 2. I ran the following command in dom0 after installing:
>
>dom0 $ sudo dracut -f "/boot/efi/EFI/qubes/initramfs-$version.img" 
> "$version"
> 
> Paying special attention that the variable $version was expanded correctly. 
> 
> After adding the kernel parameter: 
>mem_sleep_default=deep
> to the appropriate line in /boot/efi/EFI/qubes/xen.cfg - again as you've 
> described.
> 
> To conclude, I can confirm that your patch works for version 4.14.67-1 of the 
> qubes-linux-kernel too. That is, standby and wake from standby work as 
> intended and the command:
>dmesg | grep ACPI | grep supports
> yields:
>ACPI: (supports S0 S3 S5)
> on my Carbon X1 Gen 6, i7 8550U.
> 
> However, perhaps unrelated, I have noticed the CPU doesn't turbo boost. 
> Running the following command in dom0:
>xenpm get-cpufreq-states
> shows that only 13 / 16 P-States are usable with P0, P1, P3 (the turbo 
> states) clearly as the ones that aren't available.
> 
> Regards,
> Aqeel

Dan's notes worked perfectly for me once I remembered to enable thunderbolt 
assist. Thanks djb!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an 

Re: [qubes-users] Enabling OpenVPN auto start

2018-09-26 Thread Stuart Perkins



On Wed, 26 Sep 2018 00:24:29 -0500
Stuart Perkins  wrote:

>On Tue, 25 Sep 2018 22:34:12 -0400
>Chris Laprise  wrote:
>
>>On 09/25/2018 05:27 PM, Stuart Perkins wrote:  
>>> 
>>> On Tue, 25 Sep 2018 12:52:16 -0700 (PDT)
>>> Ninja-mania via qubes-users  wrote:
>>> 
 Dude I actually love you (no homo).

 Spent 20+ trying to set vpn up (Big ass noob) and never came across the 
 Qubes tunnel. It’s awesome. You’re awesome.
>>
>>Glad to help!
>>
>>  
>>> I have two separate VPN's on my Qubes 3.2 laptop.
>>> 
>>> One Cisco VPN running via OpenConnect in a dedicated appVM for a client.
>>> One OpenVPN running in a secondary copy of sys-net which I switch to when I 
>>> need it.  I run the server OpenVPN on a VM on my home server (Debian and 
>>> VirtualBox).
>>> 
>>> When I want to connect EVERYTHING to the VPN, I switch out and run the copy 
>>> of sys-net with the VPN credentials and scripts.
>>> 
>>> When I want to access the client, I start the appVM with the OpenConnect 
>>> Cisco VPN client and credentials.  I also use this appVM to run client 
>>> specific software through Wine for most of my work on their equipment, 
>>> although I do a fair amount of straight up command line stuff on their 
>>> system as well.  I can run this on top of the other VPN if absolutely 
>>> necessary, but performance is not fast since my home connection is not fast.
>>> 
>>> Haven't had occasion to try the Qubes tunnel.  Is there a particular reason 
>>> to?
>>
>>Its good practice to use a Qubes-specific tool like qubes-tunnel to 
>>ensure that DNS packets (and everything else) gets routed through the 
>>tunnel and never _around_ it even when the link goes down. This is 
>>important for Qubes because any service VM (NetVM or ProxyVM) that runs 
>>VPN software is acting like a router, not a PC, and Qubes also has 
>>special requirements for proper routing of DNS in this situation.
>>
>>In your case the AppVM with OpenConnect acts like a PC endpoint and is 
>>probably not a security issue. But the sys-net copy is acting like a 
>>router as previously mentioned and that's an issue on Qubes; to improve 
>>security you could move your openvpn config to a ProxyVM and use 
>>qubes-tunnel.
>>
>>There is also the issue of VPN passwords or keys being stored in a 
>>sys-net type VM, since these VMs are considered vulnerable to attack. 
>>Moving the VPN to a ProxyVM increases the security of your VPN secrets.
>>  
>
>I will try and get the qubes-tunnel to work, as this makes sense.  


Well, got the proxyVM created.  Based it on Fedora-28.  Have it squeezed 
between sys-firewall and sys-net.  It runs automatically due to the dependency, 
but the vpn does not run automatically, which is what I want.  I setup a 
shortcut to start the open vpn and another to kill it.  It seems to work, but 
my ability to test it out is not complete right now.  I'll know more after I 
test it some more tomorrow.  That keeps my storage of VPN credentials away from 
sys-net, while still enabling sys-firewall.  That is the part I need to test 
more fully.  I have one appVM firewalled to only access my home system for 
backup purposes as well as other appVMs with full access.  I'll do some serious 
testing tomorrow and report the results.  I can synthesize being away from home 
by using my smartphone for internet.  I will need to access my home network 
when connected to the VPN, which I ought to be able to, and a traceroute should 
go through my home system's DNS server.  This may be the best solution for my 
need for now.  It is better than the previous sys-net hosted openvpn instance.  
Thanks to Chris for the explanation as to why to use qubes-tunnel.

Stuart

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180926193803.7eb70ee5%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Installing Android on Qubes OS?

2018-09-26 Thread 'awokd' via qubes-users

Gustav wrote on 9/26/18 7:08 PM:



On 9/26/18 7:39 PM, Gustav wrote:

Hey Guys!

I'm trying to install android as a standalone VM and i found that
thread: https://groups.google.com/forum/#!topic/qubes-users/frK8xaBh9pI

The thing is, i don't understand, how can i install it.
For example this one:
http://www.android-x86.org/releases/releasenote-8-1-rc1

can somebody help, please? :)

greets
alesso



... i installed a new hmv "qvm-create android --class StandaloneVM
--property virt_mode=hvm --property kernel='' --label=green"

then downloaded an android.iso on other appVM

then started from this iso "qvm-start android
--cdrom=otherVM:/home/user/android.iso"

so i get the boot screen, but the problem is, if i want to install it on
the hard drive it shows me "there is no hard drive to edit partitions"

it seems to be the problem with the installed raw android HMV


Check out this thread: 
https://groups.google.com/forum/#!topic/qubes-users/JGDqzuf1dS0.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eeed35b9-2f2a-1756-98ce-dc5db4d28dec%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] UnicodeDecodeError during Qubes 4.0 installation

2018-09-26 Thread 'awokd' via qubes-users

C. wrote on 9/26/18 11:26 AM:

Hello!

I have a strange problem when trying to install Qubes 4.0 through USB. I get to the first 
installer screen (language selection), but then I get an "undefined error" and 
I can not move forward with the installation. The error:

UnicodeDecodeError: 'utf-8' codec can not decode byte 0xed in position 5: 
invalid continuation byte

I have tried to install in 2 different USB, always with dd and as indicated in 
the installation guide, but without luck:

sudo dd if=Qubes-R4.0-x86_64.iso of=/dev/disk3 bs=1048576 && sync

Looking for information I see that the error is from Python3, but I do not know 
how to fix it in the installer or in the USB itself. If anyone has any 
suggestions or can indicate the correct path I would be more than grateful.


There's this issue out there: 
https://github.com/QubesOS/qubes-issues/issues/4229. Hard to tell if 
it's related, but do you have any hardware with non-ASCII names in it? 
Could also try installing in legacy mode instead of UEFI.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ddd8734f-a543-d454-7322-40aeecc07345%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Yubikey in challenge/response mode to unlock LUKS on boot

2018-09-26 Thread Joe
On Wednesday, 26 September 2018 03:28:21 UTC-4, simonda...@googlemail.com  
wrote:
> Is this module working on Qubes 4.0?

Yes, it is working for me on Qubes 4.0 and I have used it with LVM and Raid 
configurations.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/64a82348-1c55-4c09-82cd-470a69a16d7b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fedora 27 Template on Qubes 2

2018-09-26 Thread 'awokd' via qubes-users

nicolo...@gmail.com wrote on 9/26/18 10:47 AM:

I'm currently run Qubes 4 but i need to run Qubes 2 on another machine.
Is possible to backup my Qubes 4 Fedora 27 Template to Qubes 2?


No, I don't think that will work, even if you mean Qubes 3.2.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cdbaee71-ab91-0fbb-a67c-045e765851a9%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Having trouble getting an Intel 82576 nic to like its qube

2018-09-26 Thread 'awokd' via qubes-users

mccall.christ...@gmail.com wrote on 9/25/18 11:14 PM:

I passed several nics to a BSD based firewall appliance(its wan is still going 
through sys-net/sys-firewall). Three of them were Realtek 8111/8168/8411, 
likely all three were 8111, with no issues. I can connect through those nics 
with no issue.

One network card has two Intel nics on it, 82576 models. Qubes passes the 
device through no problem, and the BSD system sees them.

When I try and connect a device to an 82576 NIC that device does not receive 
DHCP data and ends up assigning a random IP to itself. It also cannot connect 
to BSD unless I plug it into a Realtek NIC . I can use ping from within the BSD 
qube, pinging from one of the 82576 interfaces to google and that will work.

What has me thinking this could be passthrough related was that these NICs did 
work when they used on a native BSD install. I just got done migrating that 
install into a VM and now they do not work.



Some of those Intel NICs are quirky on passthrough. Try 
https://groups.google.com/d/msg/qubes-users/1OVqWxzvvGY/9Tf4Wc29AQAJ. 
You can also try enabling permissive mode, but it's not best for security.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9bbde2af-7854-9adc-8214-442986cf15d3%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] manually import VM's

2018-09-26 Thread 'awokd' via qubes-users

cyberian@national.shitposting.agency wrote on 9/25/18 7:05 PM:

I will be reimaging a QubesOS machine.  Will I be able to save the existing 
VM's manually and import into the fresh Install of Qubes?
I would like to do the backup operation without needing to actually boot up the 
existing OS, and then restore the backed up volumes after an install.


No easy way I know of. Could mount the LVM qube partitions and backup 
just the data you want to keep, but that wouldn't include the VM 
definitions.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c0eb44f4-72bb-d7c2-e642-a64a6b75d4f9%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Port-forwarding through VM's and a WiFi Router in Qubes 4.0 through Debian-9

2018-09-26 Thread 'awokd' via qubes-users

AlphaMufasaOmega wrote on 9/25/18 7:09 AM:

Qubes OS version:

$4.0
Basically I have a router that my wifi is connected to and I am trying to learn 
how to successfully Port forward in msfconsole from qubes 4.0 Obviously there 
is a net-vm ans a sys-usb vm and it is hard to see whether or not my 
applications are working due to this conundrum :) I would also like to put the 
a listener through whonix if at all possible!
Affected component(s):

msfconsole
sys-net vm
firewall vm
whonix vms
Steps to reproduce the behavior:
Expected behavior:

Port forwarding works the same as a simple linux machine connected to wifi

Actual behavior:

Can't tell if I have to change my tactics for port forwarding from a normal 
computer due to the fact that there are so many virtual machines along with the 
Wifi Router

General notes:

No response form a listener due to the fact that there are multiple port 
forwarding obstacles infected program seems to be functioning normally as 
far as I can tell but it does not show up in my listener


Assuming you submitted 
https://github.com/QubesOS/qubes-issues/issues/4302, where are you 
getting stuck? Try the basics first, like a web server or something on a 
standard template and making sure you can reach it from another computer 
on the same network as your Qubes PC. Going through Whonix is going to 
be an additional challenge as it's designed to not send traffic locally.





--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7883e902-f5b0-d578-bd87-a67122cfccd0%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: A method can effectively lock up a VM and any attempt of killing the VM in dom0 lock up the GUI.

2018-09-26 Thread 'awokd' via qubes-users

rqwang2...@gmail.com wrote:

On Sunday, 23 September 2018 16:35:55 UTC-4, awokd  wrote:

rqwan...@gmail.com:

On Sunday, 23 September 2018 00:54:26 UTC-4, rqwan...@gmail.com  wrote:

Currently in my work I encountered VM lock-ups that can be reliably replayed. 
And each time I must cold reboot my laptop in order to recover.

I have allocated 2 VCPUs to the VM and the triggerer process is single 
threaded. However when that happens, Qubes VM Manager shows that 50% of the CPU 
is busy in the mentioned VM. Noticing that my cpu has 4 cores and a recent 
update disabled hyper-threading, certainly some disaster happened to the VM. I 
don't know whether Shutdown VM does its job (I believe it should be unlikely), 
but to make things worse, Kill VM in the Qubes VM Manager locked up the GUI and 
I cannot even use Ctrl+Alt+Fx to open the other ttys.

The lock up is limited to several instructions in userspace.

Any idea of tracking the problems?


For reference I use Qubes 3.2, and the guest is Fedora 28.


Does qvm-kill from the command line work any better than the GUI?


qvm-kill cannot kill the locked up VM. As for GUI lock up I don't know how it 
works, it may lock after certain period of time or after I operate on Qubes VM 
Manager; anyway the whole qubes gets locked by the VM _often_.

I used another fedora 26 old VM and got the same result.



You might want to submit an issue on 
https://github.com/QubesOS/qubes-issues. Details on how to recreate the 
lockup would be needed.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/72257600-9f48-af7c-f145-ec5cc20b0296%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: qubes-u2f not installing on templates

2018-09-26 Thread paigemarie

 
> All u2f-related packages area already in stable repository (since
> yesterday), so the above is not needed anymore.

When I run `sudo apt install qubes-u2f` in my Debian template or `sudo dnf 
install qubes-u2f` in my Fedora template, I get errors about not being able to 
locate or match the package.

I was able to install the dom0 package.

I'm using Qubes v3.2

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8073a338-a530-4ed4-8a9c-995be1ba574e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing Android on Qubes OS?

2018-09-26 Thread Gustav



On 9/26/18 7:39 PM, Gustav wrote:
> Hey Guys!
> 
> I'm trying to install android as a standalone VM and i found that
> thread: https://groups.google.com/forum/#!topic/qubes-users/frK8xaBh9pI
> 
> The thing is, i don't understand, how can i install it.
> For example this one:
> http://www.android-x86.org/releases/releasenote-8-1-rc1
> 
> can somebody help, please? :)
> 
> greets
> alesso
> 

... i installed a new hmv "qvm-create android --class StandaloneVM
--property virt_mode=hvm --property kernel='' --label=green"

then downloaded an android.iso on other appVM

then started from this iso "qvm-start android
--cdrom=otherVM:/home/user/android.iso"

so i get the boot screen, but the problem is, if i want to install it on
the hard drive it shows me "there is no hard drive to edit partitions"

it seems to be the problem with the installed raw android HMV

greets
a.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a66cc3b1-9cc3-9aea-71b5-f916a8489176%40alessandro-fabbri.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installing Android on Qubes OS?

2018-09-26 Thread Gustav
Hey Guys!

I'm trying to install android as a standalone VM and i found that
thread: https://groups.google.com/forum/#!topic/qubes-users/frK8xaBh9pI

The thing is, i don't understand, how can i install it.
For example this one:
http://www.android-x86.org/releases/releasenote-8-1-rc1

can somebody help, please? :)

greets
alesso

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e65062c7-9b84-5709-baaa-6c213d244678%40alessandro-fabbri.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN Tunnels - any date for official release?

2018-09-26 Thread qubes-fan
You are a hero mate :-B
Looking forward!


Sep 26, 2018, 6:20 PM by tas...@posteo.net:

> On 09/26/2018 11:39 AM, > qubes-...@tutanota.com 
> >  wrote:
>
>> Is there anything new with the Integration of VPN Tunnels for Qubes? The 
>> release of the U2F Proxy was an excellent move. Is there any date to 
>> officially launch the VPN Tunnels for less technically skilled users?
>>
>> If someone finds the time to give it some love, we would be significantly 
>> happier \o/
>>
>> Thank you!
>>
>
> I'm working on getting the packaging correct so that it integrates properly 
> with qubes-builder. Its a bit more complicated than I expected but I think it 
> could happen this week.
>
>
> -- 
>
> Chris Laprise, > tas...@posteo.net 
> https://github.com/tasket 
> https://twitter.com/ttaskett 
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LNLjm2N--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN Tunnels - any date for official release?

2018-09-26 Thread Chris Laprise

On 09/26/2018 11:39 AM, qubes-...@tutanota.com wrote:

Is there anything new with the Integration of VPN Tunnels for Qubes? The 
release of the U2F Proxy was an excellent move. Is there any date to officially 
launch the VPN Tunnels for less technically skilled users?

If someone finds the time to give it some love, we would be significantly 
happier \o/

Thank you!


I'm working on getting the packaging correct so that it integrates 
properly with qubes-builder. Its a bit more complicated than I expected 
but I think it could happen this week.



--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aab46d42-2b8d-dd3f-722a-142a8ffd88cf%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VPN Tunnels - any date for official release?

2018-09-26 Thread qubes-fan
Is there anything new with the Integration of VPN Tunnels for Qubes? The 
release of the U2F Proxy was an excellent move. Is there any date to officially 
launch the VPN Tunnels for less technically skilled users? 

If someone finds the time to give it some love, we would be significantly 
happier \o/

Thank you!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LNLXGcV--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Signal installation returns gpg: no valid OpenPGP data found.

2018-09-26 Thread qubes-fan
Solved.


Sep 26, 2018, 4:27 PM by qubes-...@tutanota.com:

> hi, it only shows itself in the <>, I put it precisely like what you show and 
> with the same result..
> gpg: no valid OpenPGP data found
>
> My curl is 7.52.1-5+deb9u7, and I am using cloned debian-9 template. Dont 
> know how to proceed.
> Any support appreciated.
>
>
> Sep 25, 2018, 5:03 PM by > qube...@riseup.net > :
>
>> qubes-...@tutanota.com >>  <>> 
>> mailto:qubes-...@tutanota.com >> >> :
>>
>>> I try to install the Signal to my debian-9 template, following the guide >> 
>>> >>> https://www.qubes-os.org/doc/signal 
>>> >> 
>>> https://www.qubes-os.org/doc/signal 
>>> >>  <>> >>> 
>>> https://www.qubes-os.org/doc/signal 
>>> >> 
>>> https://www.qubes-os.org/doc/signal 
>>> >> > .
>>>
>>> After I initiate 
>>> $ curl -s >> >>> https://updates.signal.org/desktop/apt/keys.asc 
>>> >> 
>>> https://updates.signal.org/desktop/apt/keys.asc 
>>> >>  <>> >>> 
>>> https://updates.signal.org/desktop/apt/keys.asc 
>>> >> 
>>> https://updates.signal.org/desktop/apt/keys.asc 
>>> >> > | sudo apt-key 
>>> add -
>>> I get 
>>> $ gpg: no valid OpenPGP data found.
>>>
>>> Thank you
>>>
>>
>> You have added this part
>> "<> >> https://updates.signal.org/desktop/apt/keys.asc 
>> >>  <>> 
>> https://updates.signal.org/desktop/apt/keys.asc 
>> >> >> >" accidentally. The
>> correct command, as shown in the guide, is:
>>
>> curl -s > >> https://updates.signal.org/desktop/apt/keys.asc 
>> >>  <>> 
>> https://updates.signal.org/desktop/apt/keys.asc 
>> >> >>  | sudo apt-key add -
>>
>> This should work as expected, I just tested it.
>>
>> -- 
>> qubenix
>> PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
>> OTR: > >> qube...@chat.freenode.net >>  
>> <>> mailto:qube...@chat.freenode.net 
>> >> >
>> OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
>>
>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "qubes-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to > >> qubes-users+unsubscr...@googlegroups.com 
>> >>  <>> 
>> mailto:qubes-users+unsubscr...@googlegroups.com 
>> >> >> .
>> To post to this group, send email to > >> qubes-users@googlegroups.com 
>> >>  <>> 
>> mailto:qubes-users@googlegroups.com 
>> >> >> .
>> To view this discussion on the web visit > >> 
>> https://groups.google.com/d/msgid/qubes-users/ee063803-5308-39bc-d192-150f3cab93b8%40riseup.net
>>  
>> >>
>>   <>> 
>> https://groups.google.com/d/msgid/qubes-users/ee063803-5308-39bc-d192-150f3cab93b8%40riseup.net
>>  
>> >>
>>  >> .
>> For more options, visit > >> https://groups.google.com/d/optout 
>> >>  <>> 
>> https://groups.google.com/d/optout >> >> 
>> .
>>
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to > qubes-users+unsubscr...@googlegroups.com 
> > .
> To post to this group, send email to > qubes-users@googlegroups.com 
> > .
> To view this discussion on the web visit > 
> https://groups.google.com/d/msgid/qubes-users/LNLGn-s--3-1%40tutanota.com 
> > .
> For more options, visit > https://groups.google.com/d/optout 
> > .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 

Re: [qubes-users] Signal installation returns gpg: no valid OpenPGP data found.

2018-09-26 Thread qubes-fan
hi, it only shows itself in the <>, I put it precisely like what you show and 
with the same result..
gpg: no valid OpenPGP data found

My curl is 7.52.1-5+deb9u7, and I am using cloned debian-9 template. Dont know 
how to proceed.
Any support appreciated.


Sep 25, 2018, 5:03 PM by qube...@riseup.net:

> qubes-...@tutanota.com > :
>
>> I try to install the Signal to my debian-9 template, following the guide >> 
>> https://www.qubes-os.org/doc/signal >> 
>>  <>> https://www.qubes-os.org/doc/signal 
>> >> > .
>>
>> After I initiate 
>> $ curl -s >> https://updates.signal.org/desktop/apt/keys.asc 
>> >>  <>> 
>> https://updates.signal.org/desktop/apt/keys.asc 
>> >> > | sudo apt-key add -
>> I get 
>> $ gpg: no valid OpenPGP data found.
>>
>> Thank you
>>
>
> You have added this part
> "<> https://updates.signal.org/desktop/apt/keys.asc 
> > >" accidentally. The
> correct command, as shown in the guide, is:
>
> curl -s > https://updates.signal.org/desktop/apt/keys.asc 
> >  | sudo apt-key add -
>
> This should work as expected, I just tested it.
>
> -- 
> qubenix
> PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
> OTR: > qube...@chat.freenode.net 
> OTR: DFD1DA35 D74E775B 3E3DADB1 226282EE FB711765
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to > qubes-users+unsubscr...@googlegroups.com 
> > .
> To post to this group, send email to > qubes-users@googlegroups.com 
> > .
> To view this discussion on the web visit > 
> https://groups.google.com/d/msgid/qubes-users/ee063803-5308-39bc-d192-150f3cab93b8%40riseup.net
>  
> >
>  .
> For more options, visit > https://groups.google.com/d/optout 
> > .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LNLGn-s--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] UnicodeDecodeError during Qubes 4.0 installation

2018-09-26 Thread C.
Hello!

I have a strange problem when trying to install Qubes 4.0 through USB. I get to 
the first installer screen (language selection), but then I get an "undefined 
error" and I can not move forward with the installation. The error:

UnicodeDecodeError: 'utf-8' codec can not decode byte 0xed in position 5: 
invalid continuation byte

I have tried to install in 2 different USB, always with dd and as indicated in 
the installation guide, but without luck:

sudo dd if=Qubes-R4.0-x86_64.iso of=/dev/disk3 bs=1048576 && sync

Looking for information I see that the error is from Python3, but I do not know 
how to fix it in the installer or in the USB itself. If anyone has any 
suggestions or can indicate the correct path I would be more than grateful.

Many thanks!

C.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/be3aa550-ea35-451a-9731-911e1bba68b2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora 27 Template on Qubes 2

2018-09-26 Thread nicolodem
I'm currently run Qubes 4 but i need to run Qubes 2 on another machine.
Is possible to backup my Qubes 4 Fedora 27 Template to Qubes 2?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/64ac1a62-3a74-406d-b518-6b18b6315137%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Yubikey in challenge/response mode to unlock LUKS on boot

2018-09-26 Thread simondavies315 via qubes-users
Is this module working on Qubes 4.0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee7a1efc-9eec-4eaa-ad3a-39b0b2041f46%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.