Re: [qubes-users] Re: Unsure about network device attachment to VMs

2019-09-19 Thread Anil Eklavya
> So, I am not sure whether it is a problem related to Qubes, or the graphics 
> card or with BIOS. My hunch is still that it is with BIOS, unless the 
> hardware itself is compromised.

At this point (that is since I reinstalled Windows 10), I have don’t have any 
Qubes on my system, but the laptop is still freezing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/A96651C8-4F47-4F89-AB52-1A3650B49A13%40gmail.com.


Re: [qubes-users] Re: Unsure about network device attachment to VMs

2019-09-19 Thread Anil Eklavya
>> Your system intermittently freezing sounds like it could be
>> https://github.com/QubesOS/qubes-issues/issues/5272 too.
> 
> It does seem like it, but one difference is that this time I haven’t even 
> updated dom0 yet. I have not connected to internet at all, as I was first 
> trying to connect through ethernet.

Since at that time USB-C seemed to be the problem, I decided it was not 
possible to use Qubes with Dell XPS 9370. So I reintalled Windows 10. Before 
that I updated the latest BIOS driver from pen drive. Everything went well till 
the installation was finished and Windows activated and some other applications 
installed. I was trying to update drivers and Windows, when the system started 
freezing in the same way: after a flicker. At one point I must have rebooted at 
least 20 times within 1 hour or so.

I finally decided to call Dell Customer Service, as the laptop is still under 
warranty. After several attempts (as the calls also sort of froze in the middle 
of my telling what was wrong), I was able to get through to someone at Dell 
India. There was a long session that involved running diagnostics at bootup, 
then checking that the graphics driver was installed or not. The graphics 
driver had to be downloaded and installed. Strangely, the system didn’t freeze 
once during the more than one hour session with the Dell representative. Since 
it seemed to be working well, I thought the problem was related to graphics 
driver. Several online forums also mentioned Dell XPS 9370 freezes due to 
graphics card driver problem, but in my case freeze often happens even during 
the bootup, before the OS starts. Still, I updated the drivers suggested by 
Dell Update tool and also updated Windows. All seem to be going well when the 
freezing started again.

This time it was even worse. It once froze during typing the boot password, 
which I have had setup for several months now. There were many freezes and 
restarts, but one was particularly strange. The system restarted automatically 
in the middle of my typing the boot password (I had typed only part of the 
password) and then it rebooted without asking me for boot password. On this 
occasion, every key press was accompanied by a flicker. I was able to reboot 
again several times (the boot password is not deleted, as the system is asking 
for it, but it flickers at every key press while typing the boot password).

I did Dell bootup diagnostics again and it said everything was fine. Still, the 
system is freezing so frequently now that it is again practically unusable.

So, I am not sure whether it is a problem related to Qubes, or the graphics 
card or with BIOS. My hunch is still that it is with BIOS, unless the hardware 
itself is compromised.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AA91ACCB-E3B9-4683-ABF8-BCA94E4AA920%40gmail.com.


[qubes-users] Any virtualizer / emulator working in Qubes OS?

2019-09-19 Thread Patrick Schleizer
Is there any virtualizer / emulator working inside Qubes OS AppVMs?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d7d4f20-b255-ed3b-30ef-7b98bfd44e69%40whonix.org.


Re: [qubes-users] whonix-15 TB in dvm on Safest has whitelisted sites in NoScript by default

2019-09-19 Thread scurge1tl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512



Patrick Schleizer:
> Whonix source code doesn't write literally googlevideo, netflix, 
> outlook, etc. anywhere. It does not do anything to give special 
> treatment to any websites.
> 
> By policy, for simplicity, clean implementation and whatnot, the 
> "inside" of Tor Browser isn't modified by Whonix. This is
> elaborated here:
> 
> https://www.whonix.org/wiki/FAQ#Does_Whonix_Change_Default_Tor_Browser
_Settings.3F
>
>  Tor Browser upstream issue. Bug report written just now.
> 
> wipe all mentions of netflix, paypal, youtube, ... from noscript in
> Tor Browser
> 
> https://trac.torproject.org/projects/tor/ticket/31798
> 
> See also:
> 
> https://www.helpnetsecurity.com/2015/07/01/researchers-point-out-the-h
oles-in-noscripts-default-whitelist/
>
>  
> https://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs
- -zendcdn-net/
>
> 
>> From noscript FAQ:
> 
> Q: What websites are in the default whitelist and
> 
> https://noscript.net/faq#qa1_5
> 
> Q: What is a trusted site?
> 
> https://noscript.net/faq#qa1_11
> 
> Whonix forum discussion:
> 
> https://forums.whonix.org/t/noscript-with-security-slider-at-safest-pe
rmits-around-30-sites/8160
>
>  Cheers, Patrick
> 


Hello Patrick, thank you for the reaction.

Just shortly: Tails fresh install 3.16 or 4.0-beta TB don't have this
issue. Even it starts on "Standard" by default of course. Fresh
install of TBB on win7 doesn't have the issue. It seems to be
qubes-whonix (dont know how is ti in non-qubes-whonix) specific for
some reason.

I believe that if one sets the security setting to "Safest", she for
sure didn't meant to be tracked by entities like google, youtube,
microsoft, yahoo, paypal and others - the worst surveillance
capitalists on this planet.

Interesting is that the issue with the whitelist can be easily
"solved" just by clicking on the Standard security setting and than
again back to the Safest -> no "Trusted" websites anymore, zero. Can
you please check deeper on this issue? Thank you!

Weird ^^

-BEGIN PGP SIGNATURE-

iQKTBAEBCgB9FiEExlmPb5HoPUTt+CQT44JZDAWK6UwFAl2Do7VfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEM2
NTk4RjZGOTFFODNENDRFREY4MjQxM0UzODI1OTBDMDU4QUU5NEMACgkQ44JZDAWK
6Uyy+hAAgDc4f/iwLGoTfQKaAX8xcpiaKWEd+p032laJ8rKdSIB6Kd5JG3bBYSGh
iHY5MeAZene44f3DyloDcny6Kv6ibw31/877sIVNDWKIQQQi/rtfkVT+nyp1Bb+5
32xrh+u+MhTIKbBjYCjyy+E5F1fVWK1Q3+dBApLHWsJxseeAON1lL41dH63fP4zX
ApSoOmvJM3fiLZGgPYA2zr/W4VzSTmWag5pp27X4r2rMPpoonZghFv5B+IjixhHX
tTntE+cfxTXqkoNwLY/upsJeXLoFgWr4ss7FQ3OfDE7X743fbu2Y3j857rPSPs00
V2eArJjxh5a2pwmrZcFzW+KN30CHIAXRplIt5/k2Nfa+UcHfkPlZOsZlGXBtVba2
AofLm/OlGjqupgFMpIwDcwP+zHEIGrN/HTyr61GAozInK4A1YU7+Q0Jz+b0fJl8j
927uxdZVFE9JZXpF8YmO7pMrTcAwfo7fqV9/tfjEkvm6EtvlNdt5FLPRGLF4QGMI
tH7ovKxRedvdHRLp+81CqLjxn8R5zkdnoZzNMOfWN/Q5NtETNOLxWiRPKt6iLg4l
qW07ICAkQYJaVDTVKfH49CrKRWZF88f+I2s+/6AVUivvuPAM/n8p64ABsGyS5e+h
QgRIhBZbIvu+6kGxSWQkftKTwTuQHn24JFPM2jIQgaO1g9stTwg=
=Vqtn
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3d201ef-93c4-6a34-3acd-da933cc68dc7%40cock.li.


0xC1F4E83AF470A4ED.asc
Description: application/pgp-keys


[qubes-users] partition resizing

2019-09-19 Thread josefh.maier via qubes-users
Hello list,

is there a way to resize the partition used by Qubes after the installation of 
Qubes,
e.g. with a tool "inside" Qubes or e.g. with gparted after booting the PC with 
some kind
of Linux Live DVD?



Thank you!

Regards,

Joe

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190919144737.405A5E0776%40smtp.hushmail.com.


Re: [qubes-users] System and Template updates over Tor

2019-09-19 Thread 'awokd' via qubes-users
duc...@disroot.org:

> I followed the Onionizing Repos guide, commented out the metalinks and
> uncommented the onion lines. On first test (sudo qubes-dom0-update) I
> got a 404 error:
> 
>> HTTP Error 404 - Not Found
> 
>> http://yum.sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/r4.0/current/dom0/fc25/repodata/repomd.xml
>> "Error: Cannot retrieve repository metadata for (repomd.xml) for repository: 
>> qubes-dom0-current"

I think that's the old onion. If you hadn't ran dom0 updates since
installing, it might not have been corrected. Should now be showing this
one in your qubes-dom0.repo & qubes-templates.repo:

http://yum.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e6a2b508-ae6f-6411-2a52-f8d6fc89ed4c%40danwin1210.me.


Re: [qubes-users] R4.0.1 installer rejects 32GB flash drive as too small at default settings

2019-09-19 Thread duc01k
duc...@disroot.org:
> R4.0.1, all checksums verified, GPG sig verified, GPG fingerprint
> reasonably well confirmed through online searches. Installing from a
> bootable USB flash drive created using /dd/. I couldn't find anything
> relating to this issue after searching.
> 
> I've just spent some time confirming this issue before posting. Here's
> what I discovered. In a nutshell: R4.0.1 rejects my 32 GB flash drive as
> needing 1.55 GiB additional space at default settings and after
> reclaiming all available drive space. I double-checked, and all the
> system requirements list 32GB (not GiB) as the minimum drive size.
> 
> *All options were left at their defaults unless specified*
> 
> 1) Boot Installer, click Done to confirm default language and location
> options and reach the Installation Summary screen.
> 
> 2) Enter the "Installation Destination" screen by following the
> on-screen prompts.
> 
> 3) Select the 32GB flash drive and de-select all others. This screen
> reports the drive space in Base-2, so 28.9 GiB for the 32GB flash drive.
> 
> 4) Click Done to reach the Installation Options window. It reports:
>> Your current Qubes software selection requires 22.91GiB, including
> 19.39GiB for software and 3.52 GiB for swap space.
> 
> This looks positive. I have to reclaim disk space on the drive, so
> choose to Reclaim Space (or words to that effect).
> 
> 5) On the Reclaim Disk Space screen, it now reports:
>> Installation requires a total of 24.23GiB for system data.
> 
> This is weird. Now I need 24.32 GiB instead of 22.91 GiB - an increase
> of 1.41 GiB. I still have enough space though, so I re-claim all drive
> space with the Delete All button, then click Done.
> 
> 6) This brings me back to the Installation Summary screen, where a
> warning banner at the foot of the screen reports:
>> Not enough space in file systems for the current software selection.
>> An additional 1.55 GiB is needed.
> 
> Right. Okay. Now I'm 1.55 GiB short, so the total install is 30.45 GiB -
> an increase of 6.13 GiB from the Reclaim Disk Space Screen, and now I
> can't install to the 32GB flash drive.
> 
> Troubleshooting steps:
> 
> I repeated the process over several boots of the installer with no change.
> I tried disabling Encryption on the Installation Destination screen, but
> the error remains.
> I tried using the "I will configure partitioning" option to reach the
> Manual Partitioning screen. I used the "click here to create
> [partitions] automatically" option, and it successfully creates the
> root, swap and EFI partitions with 21.26 GiB, 2.89 GiB and 500 MiB
> respectively. On completion, it reports available space as 1.97MiB, so
> that looks positive. But when I save the settings and return to the
> Installation Summary screen, the same error message appears, and I'm
> 1.55 GiB short again.
> 
> Is this PEBKAC or a genuine bug?

No feedback available on this issue? Am I the only one encountering it?
I was hoping not to have to buy a 64GB flash drive just to work around
it, as I have no need for that anything larger than 32GB generally. If I
don't hear anything I'll assume it's a bug and file a report.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/08e661b7-534c-0ef7-2f99-7fe506ebdd75%40disroot.org.


Re: [qubes-users] System and Template updates over Tor

2019-09-19 Thread duc01k
duc...@disroot.org:
> 'awokd' via qubes-users:
>> duc...@disroot.org:
>>
>>> Based on the settings I chose, should I have expected the
>>> qubes-dom0-update commands to leverage a Tor connection?
>>
>> Yes.
>>
>>> Does it seem
>>> likely that they did in this case?
>>
>> No; agree it doesn't sound like it. Did you "sudo qubesctl state.sls
>> qvm.updates-via-whonix" as part of upgrading the Whonix templates? Seems
>> like it should have been unnecessary, though.
>>
> 
> The only CLI tool I used was qubes-dom0-update, once for each template.
> 
>>> In future, what steps can I take to
>>> verify that performing similar updates will use Tor?
>>
>> Check Qubes Global Settings to make sure Dom0's UpdateVM is set to
>> sys-whonix. Also, double-check /etc/qubes-rpc/policy/qubes.UpdatesProxy
>> and make sure the first line says "$type:TemplateVM $default
>> allow,target=sys-whonix". 
> 
> I'll check this and post back.
> 

You were right, these were incorrectly set.  I had to manually change
the Dom0 UpdateVM to Sys-Whonix, and uncomment the $type:TemplateVM
$default allow,target=sys-whonix line. I'll be performing a fresh
install of Qubes R4.0.1 on a friend's device with the same settings, if
this happens with hers too I'll report a bug.

>> You might want to
>> https://www.whonix.org/wiki/Onionizing_Repositories while you are at it.
>>
> 
> Thanks. I'll pull all the Whonix docs for reference, seems like a good idea.
> 

I followed the Onionizing Repos guide, commented out the metalinks and
uncommented the onion lines. On first test (sudo qubes-dom0-update) I
got a 404 error:

> HTTP Error 404 - Not Found

> http://yum.sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/r4.0/current/dom0/fc25/repodata/repomd.xml
> "Error: Cannot retrieve repository metadata for (repomd.xml) for repository: 
> qubes-dom0-current"

The following text was in white instead of red, so it's possible the
other repos were successfully updated, but I'm not sure.

> Qubes OS Repository for Dom0  12 MB/s | 26kB 00:00

That was the end of the text echoed to the Console.  Has that particular
file been moved and the yum.repos.d/qubes-dom0.repo file not been updated?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b732a25b-5218-feac-b145-be0f79d43943%40disroot.org.


Re: [qubes-users] Whonix Tor Browser Starter safest setting fails

2019-09-19 Thread Patrick Schleizer
'b17b7bdb' via qubes-users:
> - JavaScript is ALLOWED on selected sites.
> To view these sites click on the NoScript Preferences button in the 
> about:addons page and then select the Per-Site Permissions tab.


Whonix source code doesn't write literally googlevideo, netflix,
outlook, etc. anywhere. It does not do anything to give special
treatment to any websites.

By policy, for simplicity, clean implementation and whatnot, the
"inside" of Tor Browser isn't modified by Whonix. This is elaborated here:

 
https://www.whonix.org/wiki/FAQ#Does_Whonix_Change_Default_Tor_Browser_Settings.3F

Tor Browser upstream issue. Bug report written just now.

wipe all mentions of netflix, paypal, youtube, ... from noscript in Tor
Browser

https://trac.torproject.org/projects/tor/ticket/31798

See also:

https://www.helpnetsecurity.com/2015/07/01/researchers-point-out-the-holes-in-noscripts-default-whitelist/

https://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs-zendcdn-net/

>From noscript FAQ:

Q: What websites are in the default whitelist and

https://noscript.net/faq#qa1_5

Q: What is a trusted site?

https://noscript.net/faq#qa1_11

Whonix forum discussion:

https://forums.whonix.org/t/noscript-with-security-slider-at-safest-permits-around-30-sites/8160

Cheers,
Patrick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0104280d-a6d9-68e0-16fb-0fe080789c76%40whonix.org.


Re: [qubes-users] whonix-15 TB in dvm on Safest has whitelisted sites in NoScript by default

2019-09-19 Thread Patrick Schleizer
Whonix source code doesn't write literally googlevideo, netflix,
outlook, etc. anywhere. It does not do anything to give special
treatment to any websites.

By policy, for simplicity, clean implementation and whatnot, the
"inside" of Tor Browser isn't modified by Whonix. This is elaborated here:

 
https://www.whonix.org/wiki/FAQ#Does_Whonix_Change_Default_Tor_Browser_Settings.3F

Tor Browser upstream issue. Bug report written just now.

wipe all mentions of netflix, paypal, youtube, ... from noscript in Tor
Browser

https://trac.torproject.org/projects/tor/ticket/31798

See also:

https://www.helpnetsecurity.com/2015/07/01/researchers-point-out-the-holes-in-noscripts-default-whitelist/

https://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs-zendcdn-net/

>From noscript FAQ:

Q: What websites are in the default whitelist and

https://noscript.net/faq#qa1_5

Q: What is a trusted site?

https://noscript.net/faq#qa1_11

Whonix forum discussion:

https://forums.whonix.org/t/noscript-with-security-slider-at-safest-permits-around-30-sites/8160

Cheers,
Patrick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d283bda-6150-8cbe-acce-5cc39c384d75%40whonix.org.