Re: [qubes-users] Re: Unsure about network device attachment to VMs
> So, I am not sure whether it is a problem related to Qubes, or the graphics > card or with BIOS. My hunch is still that it is with BIOS, unless the > hardware itself is compromised. At this point (that is since I reinstalled Windows 10), I have don’t have any Qubes on my system, but the laptop is still freezing. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/A96651C8-4F47-4F89-AB52-1A3650B49A13%40gmail.com.
Re: [qubes-users] Re: Unsure about network device attachment to VMs
>> Your system intermittently freezing sounds like it could be >> https://github.com/QubesOS/qubes-issues/issues/5272 too. > > It does seem like it, but one difference is that this time I haven’t even > updated dom0 yet. I have not connected to internet at all, as I was first > trying to connect through ethernet. Since at that time USB-C seemed to be the problem, I decided it was not possible to use Qubes with Dell XPS 9370. So I reintalled Windows 10. Before that I updated the latest BIOS driver from pen drive. Everything went well till the installation was finished and Windows activated and some other applications installed. I was trying to update drivers and Windows, when the system started freezing in the same way: after a flicker. At one point I must have rebooted at least 20 times within 1 hour or so. I finally decided to call Dell Customer Service, as the laptop is still under warranty. After several attempts (as the calls also sort of froze in the middle of my telling what was wrong), I was able to get through to someone at Dell India. There was a long session that involved running diagnostics at bootup, then checking that the graphics driver was installed or not. The graphics driver had to be downloaded and installed. Strangely, the system didn’t freeze once during the more than one hour session with the Dell representative. Since it seemed to be working well, I thought the problem was related to graphics driver. Several online forums also mentioned Dell XPS 9370 freezes due to graphics card driver problem, but in my case freeze often happens even during the bootup, before the OS starts. Still, I updated the drivers suggested by Dell Update tool and also updated Windows. All seem to be going well when the freezing started again. This time it was even worse. It once froze during typing the boot password, which I have had setup for several months now. There were many freezes and restarts, but one was particularly strange. The system restarted automatically in the middle of my typing the boot password (I had typed only part of the password) and then it rebooted without asking me for boot password. On this occasion, every key press was accompanied by a flicker. I was able to reboot again several times (the boot password is not deleted, as the system is asking for it, but it flickers at every key press while typing the boot password). I did Dell bootup diagnostics again and it said everything was fine. Still, the system is freezing so frequently now that it is again practically unusable. So, I am not sure whether it is a problem related to Qubes, or the graphics card or with BIOS. My hunch is still that it is with BIOS, unless the hardware itself is compromised. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/AA91ACCB-E3B9-4683-ABF8-BCA94E4AA920%40gmail.com.
[qubes-users] Any virtualizer / emulator working in Qubes OS?
Is there any virtualizer / emulator working inside Qubes OS AppVMs? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2d7d4f20-b255-ed3b-30ef-7b98bfd44e69%40whonix.org.
Re: [qubes-users] whonix-15 TB in dvm on Safest has whitelisted sites in NoScript by default
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Patrick Schleizer: > Whonix source code doesn't write literally googlevideo, netflix, > outlook, etc. anywhere. It does not do anything to give special > treatment to any websites. > > By policy, for simplicity, clean implementation and whatnot, the > "inside" of Tor Browser isn't modified by Whonix. This is > elaborated here: > > https://www.whonix.org/wiki/FAQ#Does_Whonix_Change_Default_Tor_Browser _Settings.3F > > Tor Browser upstream issue. Bug report written just now. > > wipe all mentions of netflix, paypal, youtube, ... from noscript in > Tor Browser > > https://trac.torproject.org/projects/tor/ticket/31798 > > See also: > > https://www.helpnetsecurity.com/2015/07/01/researchers-point-out-the-h oles-in-noscripts-default-whitelist/ > > > https://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs - -zendcdn-net/ > > >> From noscript FAQ: > > Q: What websites are in the default whitelist and > > https://noscript.net/faq#qa1_5 > > Q: What is a trusted site? > > https://noscript.net/faq#qa1_11 > > Whonix forum discussion: > > https://forums.whonix.org/t/noscript-with-security-slider-at-safest-pe rmits-around-30-sites/8160 > > Cheers, Patrick > Hello Patrick, thank you for the reaction. Just shortly: Tails fresh install 3.16 or 4.0-beta TB don't have this issue. Even it starts on "Standard" by default of course. Fresh install of TBB on win7 doesn't have the issue. It seems to be qubes-whonix (dont know how is ti in non-qubes-whonix) specific for some reason. I believe that if one sets the security setting to "Safest", she for sure didn't meant to be tracked by entities like google, youtube, microsoft, yahoo, paypal and others - the worst surveillance capitalists on this planet. Interesting is that the issue with the whitelist can be easily "solved" just by clicking on the Standard security setting and than again back to the Safest -> no "Trusted" websites anymore, zero. Can you please check deeper on this issue? Thank you! Weird ^^ -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEExlmPb5HoPUTt+CQT44JZDAWK6UwFAl2Do7VfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEM2 NTk4RjZGOTFFODNENDRFREY4MjQxM0UzODI1OTBDMDU4QUU5NEMACgkQ44JZDAWK 6Uyy+hAAgDc4f/iwLGoTfQKaAX8xcpiaKWEd+p032laJ8rKdSIB6Kd5JG3bBYSGh iHY5MeAZene44f3DyloDcny6Kv6ibw31/877sIVNDWKIQQQi/rtfkVT+nyp1Bb+5 32xrh+u+MhTIKbBjYCjyy+E5F1fVWK1Q3+dBApLHWsJxseeAON1lL41dH63fP4zX ApSoOmvJM3fiLZGgPYA2zr/W4VzSTmWag5pp27X4r2rMPpoonZghFv5B+IjixhHX tTntE+cfxTXqkoNwLY/upsJeXLoFgWr4ss7FQ3OfDE7X743fbu2Y3j857rPSPs00 V2eArJjxh5a2pwmrZcFzW+KN30CHIAXRplIt5/k2Nfa+UcHfkPlZOsZlGXBtVba2 AofLm/OlGjqupgFMpIwDcwP+zHEIGrN/HTyr61GAozInK4A1YU7+Q0Jz+b0fJl8j 927uxdZVFE9JZXpF8YmO7pMrTcAwfo7fqV9/tfjEkvm6EtvlNdt5FLPRGLF4QGMI tH7ovKxRedvdHRLp+81CqLjxn8R5zkdnoZzNMOfWN/Q5NtETNOLxWiRPKt6iLg4l qW07ICAkQYJaVDTVKfH49CrKRWZF88f+I2s+/6AVUivvuPAM/n8p64ABsGyS5e+h QgRIhBZbIvu+6kGxSWQkftKTwTuQHn24JFPM2jIQgaO1g9stTwg= =Vqtn -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b3d201ef-93c4-6a34-3acd-da933cc68dc7%40cock.li. 0xC1F4E83AF470A4ED.asc Description: application/pgp-keys
[qubes-users] partition resizing
Hello list, is there a way to resize the partition used by Qubes after the installation of Qubes, e.g. with a tool "inside" Qubes or e.g. with gparted after booting the PC with some kind of Linux Live DVD? Thank you! Regards, Joe -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20190919144737.405A5E0776%40smtp.hushmail.com.
Re: [qubes-users] System and Template updates over Tor
duc...@disroot.org: > I followed the Onionizing Repos guide, commented out the metalinks and > uncommented the onion lines. On first test (sudo qubes-dom0-update) I > got a 404 error: > >> HTTP Error 404 - Not Found > >> http://yum.sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/r4.0/current/dom0/fc25/repodata/repomd.xml >> "Error: Cannot retrieve repository metadata for (repomd.xml) for repository: >> qubes-dom0-current" I think that's the old onion. If you hadn't ran dom0 updates since installing, it might not have been corrected. Should now be showing this one in your qubes-dom0.repo & qubes-templates.repo: http://yum.qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e6a2b508-ae6f-6411-2a52-f8d6fc89ed4c%40danwin1210.me.
Re: [qubes-users] R4.0.1 installer rejects 32GB flash drive as too small at default settings
duc...@disroot.org: > R4.0.1, all checksums verified, GPG sig verified, GPG fingerprint > reasonably well confirmed through online searches. Installing from a > bootable USB flash drive created using /dd/. I couldn't find anything > relating to this issue after searching. > > I've just spent some time confirming this issue before posting. Here's > what I discovered. In a nutshell: R4.0.1 rejects my 32 GB flash drive as > needing 1.55 GiB additional space at default settings and after > reclaiming all available drive space. I double-checked, and all the > system requirements list 32GB (not GiB) as the minimum drive size. > > *All options were left at their defaults unless specified* > > 1) Boot Installer, click Done to confirm default language and location > options and reach the Installation Summary screen. > > 2) Enter the "Installation Destination" screen by following the > on-screen prompts. > > 3) Select the 32GB flash drive and de-select all others. This screen > reports the drive space in Base-2, so 28.9 GiB for the 32GB flash drive. > > 4) Click Done to reach the Installation Options window. It reports: >> Your current Qubes software selection requires 22.91GiB, including > 19.39GiB for software and 3.52 GiB for swap space. > > This looks positive. I have to reclaim disk space on the drive, so > choose to Reclaim Space (or words to that effect). > > 5) On the Reclaim Disk Space screen, it now reports: >> Installation requires a total of 24.23GiB for system data. > > This is weird. Now I need 24.32 GiB instead of 22.91 GiB - an increase > of 1.41 GiB. I still have enough space though, so I re-claim all drive > space with the Delete All button, then click Done. > > 6) This brings me back to the Installation Summary screen, where a > warning banner at the foot of the screen reports: >> Not enough space in file systems for the current software selection. >> An additional 1.55 GiB is needed. > > Right. Okay. Now I'm 1.55 GiB short, so the total install is 30.45 GiB - > an increase of 6.13 GiB from the Reclaim Disk Space Screen, and now I > can't install to the 32GB flash drive. > > Troubleshooting steps: > > I repeated the process over several boots of the installer with no change. > I tried disabling Encryption on the Installation Destination screen, but > the error remains. > I tried using the "I will configure partitioning" option to reach the > Manual Partitioning screen. I used the "click here to create > [partitions] automatically" option, and it successfully creates the > root, swap and EFI partitions with 21.26 GiB, 2.89 GiB and 500 MiB > respectively. On completion, it reports available space as 1.97MiB, so > that looks positive. But when I save the settings and return to the > Installation Summary screen, the same error message appears, and I'm > 1.55 GiB short again. > > Is this PEBKAC or a genuine bug? No feedback available on this issue? Am I the only one encountering it? I was hoping not to have to buy a 64GB flash drive just to work around it, as I have no need for that anything larger than 32GB generally. If I don't hear anything I'll assume it's a bug and file a report. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/08e661b7-534c-0ef7-2f99-7fe506ebdd75%40disroot.org.
Re: [qubes-users] System and Template updates over Tor
duc...@disroot.org: > 'awokd' via qubes-users: >> duc...@disroot.org: >> >>> Based on the settings I chose, should I have expected the >>> qubes-dom0-update commands to leverage a Tor connection? >> >> Yes. >> >>> Does it seem >>> likely that they did in this case? >> >> No; agree it doesn't sound like it. Did you "sudo qubesctl state.sls >> qvm.updates-via-whonix" as part of upgrading the Whonix templates? Seems >> like it should have been unnecessary, though. >> > > The only CLI tool I used was qubes-dom0-update, once for each template. > >>> In future, what steps can I take to >>> verify that performing similar updates will use Tor? >> >> Check Qubes Global Settings to make sure Dom0's UpdateVM is set to >> sys-whonix. Also, double-check /etc/qubes-rpc/policy/qubes.UpdatesProxy >> and make sure the first line says "$type:TemplateVM $default >> allow,target=sys-whonix". > > I'll check this and post back. > You were right, these were incorrectly set. I had to manually change the Dom0 UpdateVM to Sys-Whonix, and uncomment the $type:TemplateVM $default allow,target=sys-whonix line. I'll be performing a fresh install of Qubes R4.0.1 on a friend's device with the same settings, if this happens with hers too I'll report a bug. >> You might want to >> https://www.whonix.org/wiki/Onionizing_Repositories while you are at it. >> > > Thanks. I'll pull all the Whonix docs for reference, seems like a good idea. > I followed the Onionizing Repos guide, commented out the metalinks and uncommented the onion lines. On first test (sudo qubes-dom0-update) I got a 404 error: > HTTP Error 404 - Not Found > http://yum.sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/r4.0/current/dom0/fc25/repodata/repomd.xml > "Error: Cannot retrieve repository metadata for (repomd.xml) for repository: > qubes-dom0-current" The following text was in white instead of red, so it's possible the other repos were successfully updated, but I'm not sure. > Qubes OS Repository for Dom0 12 MB/s | 26kB 00:00 That was the end of the text echoed to the Console. Has that particular file been moved and the yum.repos.d/qubes-dom0.repo file not been updated? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b732a25b-5218-feac-b145-be0f79d43943%40disroot.org.
Re: [qubes-users] Whonix Tor Browser Starter safest setting fails
'b17b7bdb' via qubes-users: > - JavaScript is ALLOWED on selected sites. > To view these sites click on the NoScript Preferences button in the > about:addons page and then select the Per-Site Permissions tab. Whonix source code doesn't write literally googlevideo, netflix, outlook, etc. anywhere. It does not do anything to give special treatment to any websites. By policy, for simplicity, clean implementation and whatnot, the "inside" of Tor Browser isn't modified by Whonix. This is elaborated here: https://www.whonix.org/wiki/FAQ#Does_Whonix_Change_Default_Tor_Browser_Settings.3F Tor Browser upstream issue. Bug report written just now. wipe all mentions of netflix, paypal, youtube, ... from noscript in Tor Browser https://trac.torproject.org/projects/tor/ticket/31798 See also: https://www.helpnetsecurity.com/2015/07/01/researchers-point-out-the-holes-in-noscripts-default-whitelist/ https://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs-zendcdn-net/ >From noscript FAQ: Q: What websites are in the default whitelist and https://noscript.net/faq#qa1_5 Q: What is a trusted site? https://noscript.net/faq#qa1_11 Whonix forum discussion: https://forums.whonix.org/t/noscript-with-security-slider-at-safest-permits-around-30-sites/8160 Cheers, Patrick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0104280d-a6d9-68e0-16fb-0fe080789c76%40whonix.org.
Re: [qubes-users] whonix-15 TB in dvm on Safest has whitelisted sites in NoScript by default
Whonix source code doesn't write literally googlevideo, netflix, outlook, etc. anywhere. It does not do anything to give special treatment to any websites. By policy, for simplicity, clean implementation and whatnot, the "inside" of Tor Browser isn't modified by Whonix. This is elaborated here: https://www.whonix.org/wiki/FAQ#Does_Whonix_Change_Default_Tor_Browser_Settings.3F Tor Browser upstream issue. Bug report written just now. wipe all mentions of netflix, paypal, youtube, ... from noscript in Tor Browser https://trac.torproject.org/projects/tor/ticket/31798 See also: https://www.helpnetsecurity.com/2015/07/01/researchers-point-out-the-holes-in-noscripts-default-whitelist/ https://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs-zendcdn-net/ >From noscript FAQ: Q: What websites are in the default whitelist and https://noscript.net/faq#qa1_5 Q: What is a trusted site? https://noscript.net/faq#qa1_11 Whonix forum discussion: https://forums.whonix.org/t/noscript-with-security-slider-at-safest-permits-around-30-sites/8160 Cheers, Patrick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5d283bda-6150-8cbe-acce-5cc39c384d75%40whonix.org.