Re: [qubes-users] Re: Qubes R4.0.2-RC2 Custom Partition Fresh Install Issue

2019-11-07 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2019-11-07 8:59 AM, Rafael Reis wrote:
> It's done!
> 
> https://github.com/QubesOS/qubes-doc/pull/881
> 
> Glad to help. Added a TODO note on the pull request to, in the future, add 
> instructions for GPT / UEFI Installations. I ran into this issue. Did the 
> whole thing which implies a MBR disk (step 2) and couldn't boot afterwards. 
> Had to redo the disk initialization from a Live CD to GPT, and figure out 
> the different mount points and filesystems for /boot/efi . I could propose 
> instructions but I'd rather have someone more experienced review it.
> 
> Rafael
> 

Thank you!

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=CKqg
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/05dc00e0-e432-9c4a-86b7-5f166fd9341c%40qubes-os.org.


[qubes-users] Re: HCL HP EliteDesk 800 G1 SFF

2019-11-07 Thread thoth3g
Good to hear, i just bought the exact same thing!


On Tuesday, February 13, 2018 at 3:14:01 PM UTC-6, John wrote:
>
> Qubes R4 rc4 on USB 3.0 stick - no problems to report
>
>  
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/755902a1-2ec4-4a33-a651-f3132657c5c4%40googlegroups.com.


Re: [qubes-users] Qubes VPN routing

2019-11-07 Thread Supraleiter

Hey Chris,

Thanks for your reply. I checked presence of a gateway route with "ip 
route get 192.168.10.0/24" and got the output
"192.168.10.1 dev eth0 src 10.137.0.10 uid 0" so I guess a route is set. 
I also tried calling qubes-setup-dnat-to-ns and checked connection 
again, but it seems like nothing happened. Do I have to run it on 
proxyVM (as resolv.conf is only altered in this vm)?


I had another idea regarding network devices. If I list all devices with 
ifconfig, only eth0 and lo are shown. Keeping in mind that every AppVM 
has its own nat device, I looked up any net device with "cat 
/proc/net/dev" and then another device "vif17.0" showed up. Does this 
interfere with routing? Do I have to setup rules regarding this device?


Regards,
Supraleiter



Am 05.11.2019 22:29 schrieb Chris Laprise:

On 11/5/19 8:41 AM, Supraleiter wrote:

Hello Guys,

I have a problem concerning ipsec routing in qubes.
After setup of a network providing app-vm (former “Proxy-VM”) with a 
strongswan client, I try to connect to a publicly available ikev2 vpn 
server over WAN. The client tells me that a connection is established 
and everything seems to work fine, but when trying to ping any host in 
the private subnet, nothing happens.
I already tried to add following suggested iptable rules in proxyVM 
(despite the fact that I believe it is not necessary for the client 
but for a gateway):


iptables -t nat -A POSTROUTING -s 10.137.0.0/24 -o eth0 -m policy 
--dir out --pol ipsec -j ACCEPT

iptables -t nat -A POSTROUTING -s 10.137.0.0/24 -o eth0 -j MASQUERADE
iptables -t nat -I POSTROUTING -m policy --pol ipsec --dir out -j 
ACCEPT


I also tried to use “sys-net” VM as network provider as alternative to 
“sys-firewall” to circumvent any firewall related problem, but it does 
not work, too.
Are there any other (maybe Qubes specific) settings I have to set up 
to make the proxyVM send traffic over ipsec tunnel (strongswan does 
not install a virtual network device)?


Several config files and shell outputs are given below.
Thank you very much.


Hi,

I'm not familiar with IPsec routing policies, but have you checked the
routing table after connecting? Other VPN clients declare tunnel IPs
as gateways by default, and I'm wondering if a gateway route is what's
missing here.

Also make sure your initial ping attempts use the subnet's IP address
and not host names.

And after resolv.conf is modified, you should run
'/usr/lib/qubes/qubes-setup-dnat-to-ns' to setup nat for downstream VM
DNS.

Finally, once you get the link working, you may want to setup an
anti-leak barrier in forwarding, such as what is shown in the Qubes
Network Manager VPN doc (i.e. block all forwarding to eth0).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44653856099d7209e7b43c21d7de3633%40posteo.de.


[qubes-users] Re: Template based VM not updating when I install software in the template

2019-11-07 Thread billollib

My error.  I forgot to turn off and turn on the template VM for 
debian-10.   Once I did that and then turned on the template based vm, it 
came up.  Sorry for the newbie mistake.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5d52ed2-6ca3-406a-aa69-63d3970908a1%40googlegroups.com.


[qubes-users] 4.0.1RC2 KDE unusable on HP 15t laptop

2019-11-07 Thread billollib
 

I installed KDE .  The installation went fine, though of course the 
touchscreen doesn't work (which has been written about before).  The 
graphical interaction for blender was actually better in KDE than it was in 
Xfce.  However...   after a minute or two, the left mouse button became 
unresponsive, either on usb mouse or touchpad when dealing with either 
panels, menus, or the KDE settings tool.  It seemed like there was suddenly 
a huge delay -- if I clicked the mouse once, then the appropriate action 
would eventually occur in 30 -40 seconds.  During that time, there's a lot 
of flickering and seemingly random things being highlighted, as if there's 
noise in the mouse signal.  The right mouse button seemed to work.  The 
middle button worked, but the wheel did not.  This occurred even when I set 
the compositor to xrender.

I turned off sddm and turned on lightdm, which flipped me back into Xfce -- 
I guess you can't run kde using lightdm.   It's doing fine, though again, 
the touchscreen isn't working.  I forgot to test the touchscreen before I 
installed kde, so I don't know if it would work on a clean installation or 
not.

billo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b872703-54a5-4928-96b2-37f7f4c0db89%40googlegroups.com.


[qubes-users] Template based VM not updating when I install software in the template

2019-11-07 Thread billollib

So, this is odd.  I installed 4.0.2rc2 and:

1) Changed the template for untrusted: to debian-10.  That seemed to work 
fine.
2) Went to the debian 10 template and installed Blender.  That seemed to 
work fine -- blender will run if I invoke it from the debian-10 template 
terminal
3) Restarted untrusted: VM.Blender shows up in the available apps in 
the qubes settings.  I move it to selected.  It shows up in the menu.
4) Blender does not run when I choose it from the untrusted: menu.  
Moreover, it will not run from the untrusted: terminal.  When  I look at 
/usr/bin in untrusted:, blender is not there (and it still is there in the 
debian-10 template).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/118f6758-7945-424c-b3ac-ccc14d5634bf%40googlegroups.com.


Re: [qubes-users] Bluetooth USB dongle

2019-11-07 Thread Claudio Chinicz
Thanks Francesco!

On Thursday, 7 November 2019 13:53:13 UTC+2, Francesco wrote:
>
>
>
> On Thu, Nov 7, 2019 at 8:13 AM Claudio Chinicz  > wrote:
>
>> Hi,
>>
>> I want to buy a Bluetooth USB to connect my PC with Qubes 4 to an ear 
>> phone. The device I'm considering says its compatible with Fedora and Linux 
>> Kernel 3.0.34, 3.2.20, 3.4 and later.
>>
>> Has anyone done it before? Can I use it with an AppVM created from the 
>> Fedora 30 Template? 
>>
>
> Yes, but not any appVM, I would use the one to which the USB controller is 
> assigned, that is sys-usb or sys-net, according to what you selected during 
> Qubes installation.  Obviously it will work ONLY with what is played in 
> either sys-net or sys-usb. 
>
> Will I need to change the Template and install any driver?
>>
>
> probably not, check you BT adapter manual
>
> If you need to route the audio of all appVMs to BT, there is a way even if 
> the audio quality may decrease a bit. There are external hardware 3.5 audio 
> jack converters to BT. It works perfectly and they are cheap.
> Best
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/58428130-311a-480c-8a6e-b8d393d32c1f%40googlegroups.com.


Re: [qubes-users] Re: Qubes R4.0.2-RC2 Custom Partition Fresh Install Issue

2019-11-07 Thread Rafael Reis
It's done!

https://github.com/QubesOS/qubes-doc/pull/881

Glad to help. Added a TODO note on the pull request to, in the future, add 
instructions for GPT / UEFI Installations. I ran into this issue. Did the 
whole thing which implies a MBR disk (step 2) and couldn't boot afterwards. 
Had to redo the disk initialization from a Live CD to GPT, and figure out 
the different mount points and filesystems for /boot/efi . I could propose 
instructions but I'd rather have someone more experienced review it.

Rafael

Em quinta-feira, 7 de novembro de 2019 04:06:40 UTC-3, Andrew David Wong 
escreveu:
>
> -BEGIN PGP SIGNED MESSAGE- 
> Hash: SHA512 
>
> On 2019-11-06 2:44 PM, Rafael Reis wrote: 
> > Hey, 
> > 
> > So I was able to figure this one out on my own. 
> > 
> > The installer expects you to format filesystems prior to allocating 
> > the mountpoints. I honestly wasn't sure which FSes I should use. So 
> > i checked out what auto mode would do, and mimicked it with the 
> > custom created pools. As soon as I check Reformat option and choose 
> > the appropriate FS, the mountpoint box is whited out and I can move 
> > on with the installation. 
> > 
> > Maybe this step and the clarification of point 1 on my previous 
> > email could make it into the documentation, for improved clarity. 
> > 
> > Regards, 
> > 
> > Rafael 
> > 
>
> Would you mind contributing this change to the documentation? Here is 
> a guide for how to do so: 
>
> https://www.qubes-os.org/doc/doc-guidelines/#how-to-contribute 
>
> Thank you! 
>
> > Em quarta-feira, 6 de novembro de 2019 15:58:20 UTC-3, Rafael Reis 
> > escreveu: 
> >> 
> >> Hey guys, 
> >> 
> >> TLDR> Qubes Installer does not let me assign mountpoints to the 
> >> manually created lvm pools. (attachment) 
> >> 
> >> 
> >> After trying out Qubes for a while on a 64GB USB Drive, decided 
> >> to pull the plug and get a dedicated 256GB disk for it in my 
> >> laptop. Went for the custom partitioning route, to increase 
> >> encryption levels as 
> >> per:https://www.qubes-os.org/doc/custom-install/ Followed the 
> >> guide to the letter. Ran into the following issues: 
> >> 
> >> 1 - Step 6 says "Proceed with the installer. At the disk 
> >> selection screen, select:" Does that mean I should reboot and 
> >> restart installation? Or is there a command to resume 
> >> installation from the shell? Since I didn't know the command I 
> >> went for the reboot. 
> >> 
> >> 2 -  The installer detects the luks volume, decrypts it just 
> >> fine. But the LVM pools although seemingly correctly created, 
> >> have the mountpoints options greyed out (attachment) If I set for 
> >> the defaults instead of the custom partitioning, it appears to 
> >> move with the install just fine. 
> >> 
> >> Since I'm reinstalling from scratch, I'd like to take the 
> >> opportunity to use the higher encryption levels instead of the 
> >> defaults. 
> >> 
> >> Regards, 
> >> 
> >> Rafael 
> >> 
> > 
>
>
> - -- 
> Andrew David Wong (Axon) 
> Community Manager, Qubes OS 
> https://www.qubes-os.org 
>
> -BEGIN PGP SIGNATURE- 
>
> iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3Dwm8ACgkQ203TvDlQ 
> MDCigRAAtNFoYoE9sU5TtapNwgV2ZvjxYGpBoOhCzp0YZ+TVXa0/SzLoTY0zhQVQ 
> iLfNGh55StiHpmAeZBx0fTy5fW2UnptkXCk55/2kBTF0i5ZFXWIdStzYut6ZAqSP 
> MGhcM9ewZsxbLqLXu6YOxRWt3i/J1SYjCqX/wDdemd2us3PkktN12eyMFWw97WPA 
> Eg1Dq91Dc7qCCEswzg78dPs58BS7oO9/OTbsJvJEjSEPReHKpEKOIjic5rNGH62r 
> rBPh29X9FImC30jbC/c7Ouefq8qFt+1LG11wvkUe93a84pH/D3m13MbRa/6B/jXm 
> w3zx86lQD2t1k2VV3du2+Zqz0HmYxUCJugfpjRuZrxTdbr8pwh0xe7NcJPXHfCPI 
> XY/r+JBxvMAimvYqrQjOuSVqnD3w7Ia0OqORRzSFTcjgXDwctartxclSmVdZCjVu 
> VNChcyOzLvu7Dh7tVZaXlslywS0DB3PmD3w6/FoQ3fdViOQMg6soNoegxEv/RxL0 
> Gy9yVSRidrrNyH3wXo6XVsT/7qJVDQyxkLTpGHD/2E95qGP8QZy+M2o7tD+yNwzw 
> Rd5EeNaGx/gTZrXhdyXNrUPb+AokUcfoAU538q2MJMh7DQvqnYNuMsVfzPz8DtMg 
> 38rhnmZq3wosJuL2bC5sOzYubPkkraJBQmmEH4lS6ZlpaAATvJk= 
> =AD0F 
> -END PGP SIGNATURE- 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf462821-6ff6-4d81-9808-dff8a928acae%40googlegroups.com.


[qubes-users] 4.0.2-RC2 minor issue when changing untrusted template, with easy fix

2019-11-07 Thread billollib

So, for my "untrusted" qube, I decided I wanted Debian, and I changed it in 
the Qubes settings.  That worked fine.  However, when I did that, Firefox 
stopped coming up when I clicked on untrusted:Firefox (though it came up 
fine from the terminal when I typed "firefox").

So... I went back to the Qubes Settings -> Applications and only Files and 
Terminal were in the "Selected" column, though "Firefox ESR" was in the 
"Available" column.  I moved Firefox ESR into the Selected column and it 
started coming up.

So, I gather, Firefox and Firefox extended release are not the same, and if 
you switch to the Debian template, you will need to change that...

billo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c4b0bdd6-8f8d-4f47-8f00-27943a3b10be%40googlegroups.com.


[qubes-users] Re: Data point: QubesR4.02-RC2 installed fine on HP laptop model 15t-da000

2019-11-07 Thread billollib


On Thursday, November 7, 2019 at 8:01:41 AM UTC-5, bill...@gmail.com wrote:
>
> Just a quick data point.  Installed without a hitch on my HP laptop with 
> 256G SSD and a 1TB  SATA (installed on my SSD only).  The SSD makes it a 
> *lot* more snappy.
>


Actually that's a 15t-da000, not 5t.  Bad typing... 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/292a1215-4ac5-46aa-8fd4-97f717327a89%40googlegroups.com.


Re: [qubes-users] Bluetooth USB dongle

2019-11-07 Thread Franz
On Thu, Nov 7, 2019 at 8:13 AM Claudio Chinicz  wrote:

> Hi,
>
> I want to buy a Bluetooth USB to connect my PC with Qubes 4 to an ear
> phone. The device I'm considering says its compatible with Fedora and Linux
> Kernel 3.0.34, 3.2.20, 3.4 and later.
>
> Has anyone done it before? Can I use it with an AppVM created from the
> Fedora 30 Template?
>

Yes, but not any appVM, I would use the one to which the USB controller is
assigned, that is sys-usb or sys-net, according to what you selected during
Qubes installation.  Obviously it will work ONLY with what is played in
either sys-net or sys-usb.

Will I need to change the Template and install any driver?
>

probably not, check you BT adapter manual

If you need to route the audio of all appVMs to BT, there is a way even if
the audio quality may decrease a bit. There are external hardware 3.5 audio
jack converters to BT. It works perfectly and they are cheap.
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBXgzW7XjUnH_mTUuvYky46NMFdq6XATnKs8f2XMiOcXg%40mail.gmail.com.


[qubes-users] Bluetooth USB dongle

2019-11-07 Thread Claudio Chinicz
Hi,

I want to buy a Bluetooth USB to connect my PC with Qubes 4 to an ear 
phone. The device I'm considering says its compatible with Fedora and Linux 
Kernel 3.0.34, 3.2.20, 3.4 and later.

Has anyone done it before? Can I use it with an AppVM created from the 
Fedora 30 Template? Will I need to change the Template and install any 
driver?

Thanks in advance for any feed-back.

Claudio

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74ce0eb3-ca6d-4ffd-9fd4-436c6b708322%40googlegroups.com.


Re: [qubes-users] Re: Qubes R4.0.2-RC2 Custom Partition Fresh Install Issue

2019-11-07 Thread Claudia

Rafael Reis:

Hey,

So I was able to figure this one out on my own.

The installer expects you to format filesystems prior to allocating the
mountpoints. I honestly wasn't sure which FSes I should use. So i checked
out what auto mode would do, and mimicked it with the custom created pools.
As soon as I check Reformat option and choose the appropriate FS, the
mountpoint box is whited out and I can move on with the installation.

Maybe this step and the clarification of point 1 on my previous email could
make it into the documentation, for improved clarity.

Regards,

Rafael

Em quarta-feira, 6 de novembro de 2019 15:58:20 UTC-3, Rafael Reis escreveu:


Hey guys,

TLDR> Qubes Installer does not let me assign mountpoints to the manually
created lvm pools. (attachment)


After trying out Qubes for a while on a 64GB USB Drive, decided to pull
the plug and get a dedicated 256GB disk for it in my laptop.
Went for the custom partitioning route, to increase encryption levels as
per:https://www.qubes-os.org/doc/custom-install/
Followed the guide to the letter. Ran into the following issues:

1 - Step 6 says "Proceed with the installer. At the disk selection
screen, select:"
Does that mean I should reboot and restart installation? Or is there a
command to resume installation from the shell? Since I didn't know the
command I went for the reboot.

2 -  The installer detects the luks volume, decrypts it just fine. But the
LVM pools although seemingly correctly created, have the mountpoints
options greyed out (attachment)
If I set for the defaults instead of the custom partitioning, it appears
to move with the install just fine.

Since I'm reinstalling from scratch, I'd like to take the opportunity to
use the higher encryption levels instead of the defaults.

Regards,

Rafael





1: You can go back to the graphical installer from the shell using 
ctrl-alt-f6 (or one of the other F-keys, I forget which one). Then click 
"rescan devices." But rebooting works too.


2: I haven't quite figured out the Qubes/Fedora installer yet. It seems 
it won't touch any filesystem it didn't format itself, so you always 
have to let the installer format it. Looks like you figured that out. 
This is, for example, why you can't use custom cryptsetup options and 
btrfs at the same time - the installer refuses to install to an existing 
filesystem, but it also won't let you create btrfs on dm-crypt.


Glad to hear you got it working.

-
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39c449ac-4582-80de-f3e8-ff6bbbe7b53a%40vfemail.net.