[qubes-users] vpnleak or my vpn

2016-07-30 Thread eliwu
I set up a vpn in accordance to cprise's advice.. 
https://groups.google.com/d/topic/qubes-users/UbY4-apKScE/discussion.  

dnsleaktest.com comes back all good.  (shows my vpn's ip address)
dnsleak.com, however, is showing multiple dns leaks.   
They are, however, from random places all over the world, none of which have 
any connection to my IP.  
Does this have something to do with my vpn or am I setting it up wrong?  

Connecting through dhcp to the vpn..

One thing I am not sure about is where to put are the up/dwn commands. 
Working now, I have in my *.ovpn file, is..

#down /etc/openvpn/update-resolv-conf
#up /etc/openvpn/update-resolv-conf
script-security 2
up vpn-setup2.sh
down vpn-setup2.sh

Is that right?  

Here is the dnsleak result.
Looks like your DNS might be leaking...
Your IP: 185.57.87.27
DNS IP: 37.48.74.75
Hostname: hosted-by.leaseweb.com
Country: Netherlands
City: Amsterdam
Looks like your DNS might be leaking...
Your IP: 185.57.82.27
DNS IP: 185.57.82.25
Hostname: 185.57.82.25

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8236871-66b7-4d3e-bb7c-1b0eac258d3e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: VM seemingly all of a suddon will no longer start up? (yellow dot)

2016-07-30 Thread gaikokujinkyofusho
On Saturday, July 30, 2016 at 9:39:22 PM UTC+6:30, gaikokuji...@gmail.com wrote:
> I just managed to install a second hard drive on my laptop then tried 
> restarting, everything started off fine except when I tried to start my 
> "media vm" which mainly had Kodi media center on it. I don't see how the new 
> hard drive would affect this appvm starting up but that is the only 
> difference between earlier today when I last used this vm/kodi and now.
> 
> Now I am noticing the I can't start anything from the MediaVM, and my workvm 
> shows up as a yellow dot but I can start firefox from there (so far at 
> least), and the sys-firewall had a mementary error/yellow triangle, something 
> about using/requesting more memory than available?
> 
> I noticed the failed to connect to gui-agent error from the logs (below) as 
> it was about the only error that pops up, apart from that I am not sure. My 
> qubes setup has been running pretty well lately, until now... thoughts?
> 
> Icon size: 128x128
> libvchan_is_eof
> release_all_mapped_mfns running
> Obtained 8 stack frames.
> Icon size: 128x128
> Failed to connect to gui-agent

Sorry, the reoccuring error is "can not start qubes guid"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c31a7817-cb15-4a0e-9a21-6aefcee8fddc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VM seemingly all of a suddon will no longer start up? (yellow dot)

2016-07-30 Thread gaikokujinkyofusho
I just managed to install a second hard drive on my laptop then tried 
restarting, everything started off fine except when I tried to start my "media 
vm" which mainly had Kodi media center on it. I don't see how the new hard 
drive would affect this appvm starting up but that is the only difference 
between earlier today when I last used this vm/kodi and now.

Now I am noticing the I can't start anything from the MediaVM, and my workvm 
shows up as a yellow dot but I can start firefox from there (so far at least), 
and the sys-firewall had a mementary error/yellow triangle, something about 
using/requesting more memory than available?

I noticed the failed to connect to gui-agent error from the logs (below) as it 
was about the only error that pops up, apart from that I am not sure. My qubes 
setup has been running pretty well lately, until now... thoughts?

Icon size: 128x128
libvchan_is_eof
release_all_mapped_mfns running
Obtained 8 stack frames.
Icon size: 128x128
Failed to connect to gui-agent

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9af183b5-551d-44b0-a796-779aa9833ef1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Snowden plans a wireless hardware security device

2016-07-30 Thread Syd Brisby
"Isn't a laptop wireless hardware switch simpler?"

No, it only provides one-third of the functionality that is required to fully 
secure the radio: This is the situation at the moment:

1. A hardware switch for the motherboard. 
2. A software combo switch which you must engage after bootup to fully turn off 
the radio. 
3. Then you have to install software like "rfkill" to check the wireless status.

This is insufficient because sometimes you forget the key combo, which leaves 
the wireless broadcasting. Some computers don't have a hardware switch at all, 
while some have a fake hardware switch, so the wireless is always on in some 
capacity. And on some computers it's difficult to turn off bluetooth via 
software.  

A hardware device provides all the appropriate functionality for all wireless 
devices (wifi, bluetooth, etc.) in one product - including feedback, kill, and 
the security of tamperproof hardware. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa2ab5a0-055c-4559-b882-999e8d7d74dc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-30 Thread Manuel Amador (Rudd-O)
On 07/30/2016 12:12 AM, arthur.summ...@gmail.com wrote:
> I agree with the idea of having an option for a storage VM, but my agreement 
> goes a little deeper (and forks a bit). I know that the primary goal of Qubes 
> is security, but there are a lot of different use cases for it. I use it 
> because I like the compartmentalization provided by VMs. Security is almost a 
> secondary for me - I wanted a bare-metal client hypervisor. Since XenClient 
> no longer exists and no other offerings are well maintained, I landed on 
> Qubes. For my purposes, sharing storage would be great, but baking it in DOES 
> defeat the primary goals of the project.

I'm not necessarily sure that conclusion is foregone.  Perhaps it's a
good idea to provide a vchan-backed FUSE file system that allows a VM to
"mount" the subdirectory of another VM.  This would require a few things
UX-wise, but it's totally doable otherwise.  Of course, the mounting VM
would need to trust the mounted VM, but it'd be quite good otherwise.

Failing that, a mechanism to provide networking between VMs, such that a
VM can serve another VM via SSH or CIFS, would be okay.  Sometimes I
think that the networking model in Qubes is far too restrictive.

-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/184990c8-941a-318d-afec-fc55d0580c70%40rudd-o.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes server?

2016-07-30 Thread Manuel Amador (Rudd-O)
Hello!

I want to roll my own Qubes server — software-defined networking, remote
VM management, all the goodies that come with Qubes like volatile VMs
and VM templates — but I have had real trouble writing code to "undo"
some of the features of Qubes that make routing and firewalling
essentially client-only.

Is there someone working on this, on upstreaming the improvements, and
on remote management?

I can see there's a market for it, and I certainly need it.  I would
hate to roll-my-own based on, say, Fedora or Debian, and having to redo
all the work that Qubes has done w.r.t. securing machines.

Thanks.

-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ec6d592c-1d52-3cc1-c812-dde0edf63ee6%40rudd-o.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Play Audio from AppVm on device attached to USB Cube

2016-07-30 Thread Connor Page
Read the last part at https://www.qubes-os.org/doc/usb/
This should solve your problem unless you want to mix sound from multiple vms.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03a8699f-3bc5-4964-aa5f-6c2fd40b8ebc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Risks of Dual-Boot?

2016-07-30 Thread Fabian Wloch
Am Sonntag, 31. Juli 2016 01:22:48 UTC+2 schrieb Andrew David Wong:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-07-30 16:06, Fabian Wloch wrote:
> > Am Samstag, 30. Juli 2016 23:25:05 UTC+2 schrieb Markus Kilås:
> >> On 07/30/2016 06:25 PM, Fabian Wloch wrote: The issues with unprotected 
> >> /boot and BIOS is briefly mentioned on the below link and it sounds like 
> >> AEM should be able to at least be able to detect a compromise for you: 
> >> https://www.qubes-os.org/doc/multiboot/
> > 
> > Okay sorry, I just searched in the mailinglist, not on the website. My bad.
> >  Okay, so the problem with manipulating the Qubes-Partitions should be easy
> > to solve through just disabling the Drive in the BIOS / using a mobile rack
> > with a physical switch to turn the drive on/off. I'm thinking about using
> > a Samsung 950 Pro SSD (which is a M.2 SSD), so the physical switch to turn
> > it off can't be used. I already contacted the mainboard vendor and asked,
> > if I can disable the M.2 Slot in the BIOS.
> > 
> > 
> > And now the BIOS/Firmware problem: Can I "prevent" this through setting a 
> > User-Password (the boot password) and an Admin-Password (to change BIOS 
> > settings)? I'm not sure about this.
> > 
> 
> It could help, but depending on the sophistication of your hypothetical
> attacker, you might not want to rely on BIOS passwords. Many BIOSes have
> "maintenance" passwords that allow anyone in (who knows the maintenance
> password), and these can sometimes be found online (or are known by certain
> people, such as the developers of the BIOS).
> 
> In general, the idea is that AEM will alert you to any change that was made to
> anything that AEM measures, but it can't prevent malicious activity from
> occurring. It only alerts you to that activity after the fact (at which point,
> depending on your security needs and level of paranoia, you may have to throw
> out your laptop and get a new one).
> 
> > However, thank you both for your answers so far. -Fabian
> > 
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJXnTatAAoJENtN07w5UDAwFn4QAM+Psp/hnrEwUnQYcCya1at4
> QFbKpNml5xRBsPgv81CKNEwKBwmeZeAdcZl9QZar86lHPg+p2Rrf+iZNzcMSD+Pa
> h7Bzj4DfiFs1Sg9elMPFsvVC80zgexiFIPbhrke+ayJDuaQdPPTGh/EdlidKyYQr
> lTWUh+gh5uorOM7rSXKRAlSiOKcH5yQKFm50CUPULHKILByvTnH1LDVmHWAAOju3
> yas3X/ckni6srcN9OOzXoekmb59Ahh/7vyTKEtHcjk6UyPhaS4ocks4fNXXy2yeu
> 7lnoUObtIjzCduqzc5Kyi37OyPQQYVOTGejsM4kFwinfAhmx/E+9/vZ8PnfbC0DG
> 2nZ0Rk9oTWWxGrbIhHU6RjUJzkAUiB4Di52g97dVw1XzmTpyzKwlmhGg3MOOqR/r
> UT2WhgSzQczduwOFL4yRhPrI4B8ppaEg01nIXZLLi6aZ+CT505J5AGB4GoDwAxea
> ClQTbQK6NvrKgr5n0BQj80fC/ZiWnSQmwz7Past+AEat9K83+PiA+opzh8g2kr5Q
> axi4Np5RPXR3ar6pv6LDJR1BqF7jCWRK0RxSU8yJpS5uiIXQFB6pwBUv0WdyFDG8
> F4f4SuPMyuqhbPW9n5UDpwvHwn39h9HYvc74Eah/jtGtEohi3pN6zwfTEzXViKCM
> JaNsxUo+hIrUIx3ATMrb
> =qDM3
> -END PGP SIGNATURE-

Right, I should've thought about a Maintenance password.

Depending on the answer (or if I get one at all) I will decide between these 
two:
1) The Mainboard Manufacturer answers, that I can disable the M.2 Slot on the 
Mainboard in the BIOS. Then I'll go for the "good" rig with Dualboot. Probably, 
depends on my mood/feeling when I finally order.

2) They don't answer / answer that I can't turn the M.2 Slot off - I'll buy 2 
separate systems. I just made a list with 2 systems, each one a little bit 
slower than the "good" one, but still fine for everything.

Thanks for advice

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44e2a9ca-f59b-404c-8203-52def7dd04f2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Risks of Dual-Boot?

2016-07-30 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-30 16:06, Fabian Wloch wrote:
> Am Samstag, 30. Juli 2016 23:25:05 UTC+2 schrieb Markus Kilås:
>> On 07/30/2016 06:25 PM, Fabian Wloch wrote: The issues with unprotected 
>> /boot and BIOS is briefly mentioned on the below link and it sounds like 
>> AEM should be able to at least be able to detect a compromise for you: 
>> https://www.qubes-os.org/doc/multiboot/
> 
> Okay sorry, I just searched in the mailinglist, not on the website. My bad.
>  Okay, so the problem with manipulating the Qubes-Partitions should be easy
> to solve through just disabling the Drive in the BIOS / using a mobile rack
> with a physical switch to turn the drive on/off. I'm thinking about using
> a Samsung 950 Pro SSD (which is a M.2 SSD), so the physical switch to turn
> it off can't be used. I already contacted the mainboard vendor and asked,
> if I can disable the M.2 Slot in the BIOS.
> 
> 
> And now the BIOS/Firmware problem: Can I "prevent" this through setting a 
> User-Password (the boot password) and an Admin-Password (to change BIOS 
> settings)? I'm not sure about this.
> 

It could help, but depending on the sophistication of your hypothetical
attacker, you might not want to rely on BIOS passwords. Many BIOSes have
"maintenance" passwords that allow anyone in (who knows the maintenance
password), and these can sometimes be found online (or are known by certain
people, such as the developers of the BIOS).

In general, the idea is that AEM will alert you to any change that was made to
anything that AEM measures, but it can't prevent malicious activity from
occurring. It only alerts you to that activity after the fact (at which point,
depending on your security needs and level of paranoia, you may have to throw
out your laptop and get a new one).

> However, thank you both for your answers so far. -Fabian
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=qDM3
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2eb3202-ec6b-e7a4-4269-a18be8ee35e8%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: installer 3.2 bugs

2016-07-30 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-07-30 11:55, Peter M wrote:
> On Thursday, July 14, 2016 at 4:56:32 PM UTC-6, Drew White wrote:
>> installer bug.. picture
> 
> I am having a similar issue but in this case I check to configure sys-net, 
> sys-firewall and default application qubes but I get the same error you 
> observed.
> 
> Then when I go to the system it has nothing except dom0 and the VM
> templates. no sys-net, sys-firewall and default application qubes.
> 

This issue is being tracked here:

https://github.com/QubesOS/qubes-issues/issues/2213

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=Kn5f
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ab7b681-f648-adb8-77b1-d37ecabe57c0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] AEM with Linux 4.4 causes hard reboot (cont... Trying to resolve issue)

2016-07-30 Thread Todd Lasman
On 07/30/2016 02:52 PM, Marek Marczykowski-Górecki wrote:
> On Sat, Jul 30, 2016 at 02:44:24PM -0700, tel wrote:
> > Sorry for the delay, Chris. I was waiting for 3.2-rc2, which I just
> installed. It seems to come with the latest AEM package, so I didn't
> have to install that package myself.
>
> > I added the parameter to the tboot line. It didn't reboot, but it
> hung before asking for the password with "Waiting for
> /dev/disk/by-label/aem* to be connected..."
>
> > Not sure where to go from here.
>
> Do you use also USB VM? In that case, dom0 has no access to USB
> controllers...
>
> But you can re-enable it just for boot time by editing /etc/default/grub
> and removing the line with "hide_all_usb" (or just comment it out). Then
> rerun `grub2-mkconfig -o /boot/grub2/grub.cfg`.
> It will expose dom0 for all connected USB devices for a short time
> during system startup.
>
>
Yep. That's the ticket.

I can confirm that Chris' method works, and I now have a working
anti-evil-maid! Thanks Chris and Marek!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b4d04e38-489e-2b4c-f66d-b780ed1eae60%40nowlas.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Risks of Dual-Boot?

2016-07-30 Thread 7v5w7go9ub0o


On 07/30/2016 09:24 PM, Markus Kilås wrote:
> On 07/30/2016 06:25 PM, Fabian Wloch wrote:
>> didn't found anything
> The issues with unprotected /boot and BIOS is briefly mentioned on the
> below link and it sounds like AEM should be able to at least be able to
> detect a compromise for you:
>
> https://www.qubes-os.org/doc/multiboot/

Yes; but what about infected firmware other than the BIOS?

e.g. USB controllers?

e.g. Storage firmware?




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/579d2987.962cc80a.a14ea.8468%40mx.google.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] AEM with Linux 4.4 causes hard reboot (cont... Trying to resolve issue)

2016-07-30 Thread tel
Sorry for the delay, Chris. I was waiting for 3.2-rc2, which I just installed. 
It seems to come with the latest AEM package, so I didn't have to install that 
package myself. 

I added the parameter to the tboot line. It didn't reboot, but it hung before 
asking for the password with "Waiting for /dev/disk/by-label/aem* to be 
connected..."

Not sure where to go from here. 

Todd

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/09dcdc5d-cbb0-4052-979b-9acd9f203b11%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Risks of Dual-Boot?

2016-07-30 Thread Markus Kilås
On 07/30/2016 06:25 PM, Fabian Wloch wrote:
> didn't found anything

The issues with unprotected /boot and BIOS is briefly mentioned on the
below link and it sounds like AEM should be able to at least be able to
detect a compromise for you:

https://www.qubes-os.org/doc/multiboot/

Cheers,
Markus

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/674edceb-e858-30c5-584e-1949f651cd8d%40xn--kils-soa.se.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] No sound with VoIP

2016-07-30 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Jul 30, 2016 at 05:29:27AM -0700, ghbouchard...@gmail.com wrote:
> Hi,
> 
> I try to use Tox for having a VoIP software but unfortunately I can not have 
> any sound. Here is my setup : (I use Qubes 3.2)
> 
> http://www.hostingpics.net/viewer.php?id=558339tox.png
> 
> Audio Input Device :
> -Built in Audio Analog Stereo
> -Monitor of Qubes VCHAN sink
> -Qubes VCHAN source
> -Monitor of Built in Audio Analog Stereo
> 
> Audio Output Device :
> -Built in Audio Analog Stereo
> -Qubes VCHAN sink
> 
> Do you know how to make things work ? :-)

"Qubes VCHAN source" should work for input. You need to explicitly
enable audio input for the VM in Qubes Manager.


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXnRJDAAoJENuP0xzK19csXWYIAIOMp8A5mnLEJN1tSrCXxWko
zrtBFQnx/mpoBA4/0dtJr2Kt62sbuVVLXS/dTeEdeJPeRWumlsJ0hRqi4eStWuWZ
qYjJgCzNdWDwaHxdNGlipjdn16DD81oOUZnSv/ulPGBUF1f97pGqtiNRp5862/SN
4GIs1zwKuI09o69vbslvIPht2qoQPw0PLdfVxwFT27DUDpHeGGJTkywBWYxpWzlK
PFCDYZXaRUgCqXFL5zzir9NLtBsTcT3skx7J2bP/Az1ddgmHO11Mh6xsAVpWhtkq
l2kIYREf5mPuxL2/0kO2xGCKGjBKSl6lwBK2Fnsqy3PdjaI1JINApklRtPI1v9U=
=VELC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160730204658.GW32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] No sound with VoIP

2016-07-30 Thread entr0py
ghbouchard...@gmail.com:
> I try to use Tox for having a VoIP software but unfortunately I can
> not have any sound. Here is my setup : (I use Qubes 3.2)
> 

Is this a VOIP-issue or do you not have any sound in general? Can you listen to 
audio files, watch youtube videos, etc?

Some things to check:

In dom0, go to System Settings -> PulseAudio Volume Control -> verify all 
settings are correct

appVM settings will be dependent on OS & DE. I won't pretend to know how all 
the sound subsystems interact. In my Debian (KDE) appVM, I can adjust volumes 
using `alsamixer` and `kmix`. Gnome has a sound panel of its own.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d26b73a4-bc3d-456c-81ff-55c72f27da27%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: PulseAudio Connection Terminated

2016-07-30 Thread entr0py
Marek Marczykowski-Górecki:
> Maybe it is related to HDMI audio output? Try to disable it (for example
> unload snd-hda-codec-hdmi kernel module).

Thanks Marek! I figured it out this morning but `Replied` to Myself :/ Sorry to 
waste your time.


> On Sat, Jul 30, 2016 at 04:11:50 AM UTC, 3n7r0...@gmail.com wrote:
> 
> Issue resolved (not sure if Qubes related or not):
> 
> 2 sound devices are present: HDMI-Audio via graphics card & Integrated Intel 
> HD Audio
> Launch `pavucontrol`. For HDMI-Audio, disable Profile (set to `off`).
> 
> This means either:
> 1. I had the profile off originally and a recent update reset the setting 
> or...
> 2. I had the profile on but a recent update requires that it be off.
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4c4e7dcb-6227-7345-75bf-d58fb31c6674%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: installer 3.2 bugs

2016-07-30 Thread Peter M
On Thursday, July 14, 2016 at 4:56:32 PM UTC-6, Drew White wrote:
> installer bug.. picture

I am having a similar issue but in this case I check to configure sys-net, 
sys-firewall and default application qubes but I get the same error you 
observed.

Then when I go to the system it has nothing except dom0 and the VM templates. 
no sys-net, sys-firewall and default application qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b411c49-2ad7-4a5a-90b5-5c36ea57755d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Risks of Dual-Boot?

2016-07-30 Thread Fabian Wloch
Hello,
there are plenty threads of people asking for advice for dual boot, but this is 
not my intention here.

What I would like to know is, what are the risks of a Qubes-Dualboot System?

Let's assume I have installed the latest version of Qubes, Encrypted the whole 
drive using LUKS (and a 32 character long passphrase) and installed 
Anti-Evil-Maid on an USB Drive´/SD-Card.
After doing this, I remove the AEM-Stick and install Windows7/SteamOS on 
another drive in my computer to play some games.

Is this second OS able to do anything to my Qubes-Installation without me 
noticing it? (Of course I'll only boot it with the AEM-Stick removed).

Sorry if this was already discussed anywhere, I searched for those things but 
didn't found anything.

Reason why I'm asking: I'm going to buy a new computer soon, and I usually play 
some games. I'll try to get the GPU-Passthrough working, but if this fails I 
still wanna play games, but also use Qubes on this machine without worrying.
Sadly my Budget is limited, so I can't afford two computers, one to play and 
another one just for Qubes.

-Fabian

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ebb23d35-306e-4201-b269-8cc99d6b507e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Play Audio from AppVm on device attached to USB Cube

2016-07-30 Thread Torsten Grote
Hi all,

I am a new Qubes user and amazed by the awesome work you put into Qubes
to make compartmentalization usable. Also great to see how much you care
about the community. Feels already good to be a part of it.

Now to my question: I am running a USB Qube that has all my USB
controllers attached. There is an external sound device attached and I
managed to make it show up in Pulseaudio and play audio from the USB qube.

However, the pulseaudio daemon running on the USB Qube is of course
isolated from the rest of the system, so if I want play sound in a
disposable VM (e.g. from Youtube) for example, it doesn't play. I guess
this is because Pulseaudio in dom0 doesn't know about this output device.

Is there any way (maybe with an additional vchan sink) to make this
output device available globally so it can play sound from ideally all
AppVMs?


I've read https://www.qubes-os.org/doc/external-audio but this requires
assigning an entire USB controller to a different VM and I think it also
assumes that only this VM will play the audio, right?

Kind Regards,
Torsten

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22f058c0-6e31-bd5c-4cc0-40a23e38a5e6%40grobox.de.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-30 Thread Connor Page
I used to run samba server on Archlinux inside Qubes. Actual data was stored on 
a separate volume group and mounted in the server vm on boot. The main 
difficulty was to do routing and firewalling properly on every change of 
network topology. The main risk was that eventually many vms had to be 
connected to one proxyvm and that was not safe. When I realised that the data 
is more often accessed from outside than inside I just created a NAS (Turnkey 
fileserver running in an unprivileged container actually :) )

Having done all that I believe there should be no traditional network services 
inside Qubes. A storage domain owning storage controllers and disconnected from 
network would make sense but it would require great care in dealing with 
concurrent file access. And it definitely must not have access to images of 
other vms.

I agree with Axon. A need for simulteneous access can be justified only in case 
of different OS'es. My solution to that is simple - ditch Windows :)))

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b44ac1e8-a1c2-484f-85b8-bff7f0b81324%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] No sound with VoIP

2016-07-30 Thread ghbouchardkek
Hi,

I try to use Tox for having a VoIP software but unfortunately I can not have 
any sound. Here is my setup : (I use Qubes 3.2)

http://www.hostingpics.net/viewer.php?id=558339tox.png

Audio Input Device :
-Built in Audio Analog Stereo
-Monitor of Qubes VCHAN sink
-Qubes VCHAN source
-Monitor of Built in Audio Analog Stereo

Audio Output Device :
-Built in Audio Analog Stereo
-Qubes VCHAN sink

Do you know how to make things work ? :-)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ca081670-26b9-4331-a351-e7756d7316eb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] usb 3.0

2016-07-30 Thread Nicola Schwendener
Hello all,
sorry if I bother you but I haven't understood if USB 3.0 (I've a lot of 
external disks with usb 3.0) is supported or not. I want to migrate from my 
actual windows 8.1 OS to Qubes (I've to do a Windows HVW for some applications) 
but, the USB 3.0 should work correctly. 
could you please help me?
best regards
Nick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4a94646-e4a4-4455-8fa6-c1fdad07acd0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.