[qubes-users] vpnleak or my vpn
I set up a vpn in accordance to cprise's advice.. https://groups.google.com/d/topic/qubes-users/UbY4-apKScE/discussion. dnsleaktest.com comes back all good. (shows my vpn's ip address) dnsleak.com, however, is showing multiple dns leaks. They are, however, from random places all over the world, none of which have any connection to my IP. Does this have something to do with my vpn or am I setting it up wrong? Connecting through dhcp to the vpn.. One thing I am not sure about is where to put are the up/dwn commands. Working now, I have in my *.ovpn file, is.. #down /etc/openvpn/update-resolv-conf #up /etc/openvpn/update-resolv-conf script-security 2 up vpn-setup2.sh down vpn-setup2.sh Is that right? Here is the dnsleak result. Looks like your DNS might be leaking... Your IP: 185.57.87.27 DNS IP: 37.48.74.75 Hostname: hosted-by.leaseweb.com Country: Netherlands City: Amsterdam Looks like your DNS might be leaking... Your IP: 185.57.82.27 DNS IP: 185.57.82.25 Hostname: 185.57.82.25 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b8236871-66b7-4d3e-bb7c-1b0eac258d3e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: VM seemingly all of a suddon will no longer start up? (yellow dot)
On Saturday, July 30, 2016 at 9:39:22 PM UTC+6:30, gaikokuji...@gmail.com wrote: > I just managed to install a second hard drive on my laptop then tried > restarting, everything started off fine except when I tried to start my > "media vm" which mainly had Kodi media center on it. I don't see how the new > hard drive would affect this appvm starting up but that is the only > difference between earlier today when I last used this vm/kodi and now. > > Now I am noticing the I can't start anything from the MediaVM, and my workvm > shows up as a yellow dot but I can start firefox from there (so far at > least), and the sys-firewall had a mementary error/yellow triangle, something > about using/requesting more memory than available? > > I noticed the failed to connect to gui-agent error from the logs (below) as > it was about the only error that pops up, apart from that I am not sure. My > qubes setup has been running pretty well lately, until now... thoughts? > > Icon size: 128x128 > libvchan_is_eof > release_all_mapped_mfns running > Obtained 8 stack frames. > Icon size: 128x128 > Failed to connect to gui-agent Sorry, the reoccuring error is "can not start qubes guid" -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c31a7817-cb15-4a0e-9a21-6aefcee8fddc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] VM seemingly all of a suddon will no longer start up? (yellow dot)
I just managed to install a second hard drive on my laptop then tried restarting, everything started off fine except when I tried to start my "media vm" which mainly had Kodi media center on it. I don't see how the new hard drive would affect this appvm starting up but that is the only difference between earlier today when I last used this vm/kodi and now. Now I am noticing the I can't start anything from the MediaVM, and my workvm shows up as a yellow dot but I can start firefox from there (so far at least), and the sys-firewall had a mementary error/yellow triangle, something about using/requesting more memory than available? I noticed the failed to connect to gui-agent error from the logs (below) as it was about the only error that pops up, apart from that I am not sure. My qubes setup has been running pretty well lately, until now... thoughts? Icon size: 128x128 libvchan_is_eof release_all_mapped_mfns running Obtained 8 stack frames. Icon size: 128x128 Failed to connect to gui-agent -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9af183b5-551d-44b0-a796-779aa9833ef1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Snowden plans a wireless hardware security device
"Isn't a laptop wireless hardware switch simpler?" No, it only provides one-third of the functionality that is required to fully secure the radio: This is the situation at the moment: 1. A hardware switch for the motherboard. 2. A software combo switch which you must engage after bootup to fully turn off the radio. 3. Then you have to install software like "rfkill" to check the wireless status. This is insufficient because sometimes you forget the key combo, which leaves the wireless broadcasting. Some computers don't have a hardware switch at all, while some have a fake hardware switch, so the wireless is always on in some capacity. And on some computers it's difficult to turn off bluetooth via software. A hardware device provides all the appropriate functionality for all wireless devices (wifi, bluetooth, etc.) in one product - including feedback, kill, and the security of tamperproof hardware. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aa2ab5a0-055c-4559-b882-999e8d7d74dc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: What do you think about the idea of a FileVM?
On 07/30/2016 12:12 AM, arthur.summ...@gmail.com wrote: > I agree with the idea of having an option for a storage VM, but my agreement > goes a little deeper (and forks a bit). I know that the primary goal of Qubes > is security, but there are a lot of different use cases for it. I use it > because I like the compartmentalization provided by VMs. Security is almost a > secondary for me - I wanted a bare-metal client hypervisor. Since XenClient > no longer exists and no other offerings are well maintained, I landed on > Qubes. For my purposes, sharing storage would be great, but baking it in DOES > defeat the primary goals of the project. I'm not necessarily sure that conclusion is foregone. Perhaps it's a good idea to provide a vchan-backed FUSE file system that allows a VM to "mount" the subdirectory of another VM. This would require a few things UX-wise, but it's totally doable otherwise. Of course, the mounting VM would need to trust the mounted VM, but it'd be quite good otherwise. Failing that, a mechanism to provide networking between VMs, such that a VM can serve another VM via SSH or CIFS, would be okay. Sometimes I think that the networking model in Qubes is far too restrictive. -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/184990c8-941a-318d-afec-fc55d0580c70%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes server?
Hello! I want to roll my own Qubes server — software-defined networking, remote VM management, all the goodies that come with Qubes like volatile VMs and VM templates — but I have had real trouble writing code to "undo" some of the features of Qubes that make routing and firewalling essentially client-only. Is there someone working on this, on upstreaming the improvements, and on remote management? I can see there's a market for it, and I certainly need it. I would hate to roll-my-own based on, say, Fedora or Debian, and having to redo all the work that Qubes has done w.r.t. securing machines. Thanks. -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ec6d592c-1d52-3cc1-c812-dde0edf63ee6%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Play Audio from AppVm on device attached to USB Cube
Read the last part at https://www.qubes-os.org/doc/usb/ This should solve your problem unless you want to mix sound from multiple vms. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/03a8699f-3bc5-4964-aa5f-6c2fd40b8ebc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Risks of Dual-Boot?
Am Sonntag, 31. Juli 2016 01:22:48 UTC+2 schrieb Andrew David Wong: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-07-30 16:06, Fabian Wloch wrote: > > Am Samstag, 30. Juli 2016 23:25:05 UTC+2 schrieb Markus Kilås: > >> On 07/30/2016 06:25 PM, Fabian Wloch wrote: The issues with unprotected > >> /boot and BIOS is briefly mentioned on the below link and it sounds like > >> AEM should be able to at least be able to detect a compromise for you: > >> https://www.qubes-os.org/doc/multiboot/ > > > > Okay sorry, I just searched in the mailinglist, not on the website. My bad. > > Okay, so the problem with manipulating the Qubes-Partitions should be easy > > to solve through just disabling the Drive in the BIOS / using a mobile rack > > with a physical switch to turn the drive on/off. I'm thinking about using > > a Samsung 950 Pro SSD (which is a M.2 SSD), so the physical switch to turn > > it off can't be used. I already contacted the mainboard vendor and asked, > > if I can disable the M.2 Slot in the BIOS. > > > > > > And now the BIOS/Firmware problem: Can I "prevent" this through setting a > > User-Password (the boot password) and an Admin-Password (to change BIOS > > settings)? I'm not sure about this. > > > > It could help, but depending on the sophistication of your hypothetical > attacker, you might not want to rely on BIOS passwords. Many BIOSes have > "maintenance" passwords that allow anyone in (who knows the maintenance > password), and these can sometimes be found online (or are known by certain > people, such as the developers of the BIOS). > > In general, the idea is that AEM will alert you to any change that was made to > anything that AEM measures, but it can't prevent malicious activity from > occurring. It only alerts you to that activity after the fact (at which point, > depending on your security needs and level of paranoia, you may have to throw > out your laptop and get a new one). > > > However, thank you both for your answers so far. -Fabian > > > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXnTatAAoJENtN07w5UDAwFn4QAM+Psp/hnrEwUnQYcCya1at4 > QFbKpNml5xRBsPgv81CKNEwKBwmeZeAdcZl9QZar86lHPg+p2Rrf+iZNzcMSD+Pa > h7Bzj4DfiFs1Sg9elMPFsvVC80zgexiFIPbhrke+ayJDuaQdPPTGh/EdlidKyYQr > lTWUh+gh5uorOM7rSXKRAlSiOKcH5yQKFm50CUPULHKILByvTnH1LDVmHWAAOju3 > yas3X/ckni6srcN9OOzXoekmb59Ahh/7vyTKEtHcjk6UyPhaS4ocks4fNXXy2yeu > 7lnoUObtIjzCduqzc5Kyi37OyPQQYVOTGejsM4kFwinfAhmx/E+9/vZ8PnfbC0DG > 2nZ0Rk9oTWWxGrbIhHU6RjUJzkAUiB4Di52g97dVw1XzmTpyzKwlmhGg3MOOqR/r > UT2WhgSzQczduwOFL4yRhPrI4B8ppaEg01nIXZLLi6aZ+CT505J5AGB4GoDwAxea > ClQTbQK6NvrKgr5n0BQj80fC/ZiWnSQmwz7Past+AEat9K83+PiA+opzh8g2kr5Q > axi4Np5RPXR3ar6pv6LDJR1BqF7jCWRK0RxSU8yJpS5uiIXQFB6pwBUv0WdyFDG8 > F4f4SuPMyuqhbPW9n5UDpwvHwn39h9HYvc74Eah/jtGtEohi3pN6zwfTEzXViKCM > JaNsxUo+hIrUIx3ATMrb > =qDM3 > -END PGP SIGNATURE- Right, I should've thought about a Maintenance password. Depending on the answer (or if I get one at all) I will decide between these two: 1) The Mainboard Manufacturer answers, that I can disable the M.2 Slot on the Mainboard in the BIOS. Then I'll go for the "good" rig with Dualboot. Probably, depends on my mood/feeling when I finally order. 2) They don't answer / answer that I can't turn the M.2 Slot off - I'll buy 2 separate systems. I just made a list with 2 systems, each one a little bit slower than the "good" one, but still fine for everything. Thanks for advice -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44e2a9ca-f59b-404c-8203-52def7dd04f2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Risks of Dual-Boot?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-30 16:06, Fabian Wloch wrote: > Am Samstag, 30. Juli 2016 23:25:05 UTC+2 schrieb Markus Kilås: >> On 07/30/2016 06:25 PM, Fabian Wloch wrote: The issues with unprotected >> /boot and BIOS is briefly mentioned on the below link and it sounds like >> AEM should be able to at least be able to detect a compromise for you: >> https://www.qubes-os.org/doc/multiboot/ > > Okay sorry, I just searched in the mailinglist, not on the website. My bad. > Okay, so the problem with manipulating the Qubes-Partitions should be easy > to solve through just disabling the Drive in the BIOS / using a mobile rack > with a physical switch to turn the drive on/off. I'm thinking about using > a Samsung 950 Pro SSD (which is a M.2 SSD), so the physical switch to turn > it off can't be used. I already contacted the mainboard vendor and asked, > if I can disable the M.2 Slot in the BIOS. > > > And now the BIOS/Firmware problem: Can I "prevent" this through setting a > User-Password (the boot password) and an Admin-Password (to change BIOS > settings)? I'm not sure about this. > It could help, but depending on the sophistication of your hypothetical attacker, you might not want to rely on BIOS passwords. Many BIOSes have "maintenance" passwords that allow anyone in (who knows the maintenance password), and these can sometimes be found online (or are known by certain people, such as the developers of the BIOS). In general, the idea is that AEM will alert you to any change that was made to anything that AEM measures, but it can't prevent malicious activity from occurring. It only alerts you to that activity after the fact (at which point, depending on your security needs and level of paranoia, you may have to throw out your laptop and get a new one). > However, thank you both for your answers so far. -Fabian > - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXnTatAAoJENtN07w5UDAwFn4QAM+Psp/hnrEwUnQYcCya1at4 QFbKpNml5xRBsPgv81CKNEwKBwmeZeAdcZl9QZar86lHPg+p2Rrf+iZNzcMSD+Pa h7Bzj4DfiFs1Sg9elMPFsvVC80zgexiFIPbhrke+ayJDuaQdPPTGh/EdlidKyYQr lTWUh+gh5uorOM7rSXKRAlSiOKcH5yQKFm50CUPULHKILByvTnH1LDVmHWAAOju3 yas3X/ckni6srcN9OOzXoekmb59Ahh/7vyTKEtHcjk6UyPhaS4ocks4fNXXy2yeu 7lnoUObtIjzCduqzc5Kyi37OyPQQYVOTGejsM4kFwinfAhmx/E+9/vZ8PnfbC0DG 2nZ0Rk9oTWWxGrbIhHU6RjUJzkAUiB4Di52g97dVw1XzmTpyzKwlmhGg3MOOqR/r UT2WhgSzQczduwOFL4yRhPrI4B8ppaEg01nIXZLLi6aZ+CT505J5AGB4GoDwAxea ClQTbQK6NvrKgr5n0BQj80fC/ZiWnSQmwz7Past+AEat9K83+PiA+opzh8g2kr5Q axi4Np5RPXR3ar6pv6LDJR1BqF7jCWRK0RxSU8yJpS5uiIXQFB6pwBUv0WdyFDG8 F4f4SuPMyuqhbPW9n5UDpwvHwn39h9HYvc74Eah/jtGtEohi3pN6zwfTEzXViKCM JaNsxUo+hIrUIx3ATMrb =qDM3 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a2eb3202-ec6b-e7a4-4269-a18be8ee35e8%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: installer 3.2 bugs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-07-30 11:55, Peter M wrote: > On Thursday, July 14, 2016 at 4:56:32 PM UTC-6, Drew White wrote: >> installer bug.. picture > > I am having a similar issue but in this case I check to configure sys-net, > sys-firewall and default application qubes but I get the same error you > observed. > > Then when I go to the system it has nothing except dom0 and the VM > templates. no sys-net, sys-firewall and default application qubes. > This issue is being tracked here: https://github.com/QubesOS/qubes-issues/issues/2213 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJXnS8pAAoJENtN07w5UDAwrhcP/3vym+GdifMH3dhJuhmIzSCC 2F1QbgUYlvkNeBPNc/P+QhodaV+agvfWnPn04G6JX5gBnfFCCF1ALRlAt2fB1Wel iQijVuEqakmFD/+iOvQQNOXQs2+U21DHrSE9vPyyuZfNd8T/0wv1mPyxiwepqpg7 O5qejJDjil+ir2DTAHWUYaQNgbs0XbFLg9kRoVQepQQcoHIdkj+ir5GEGLl8q+1o Et1MxNcl8oaAzDOd9TPbDPkXIV76x8Mu5GGAR9BuZX0ByXNmUe+1FY2ucvMEg33A 49aTMZKX3AKQZCoXQUfZKN3Idt31KshxNc0ZNjS1FoCCn5uOloPBUpeiuqat9Dnb W7OwdXXO6iewZt3KGOfr7wI3kALrgwGrBb4JY9T6NeZtjJHhEcsNbsY6lsqHtMu4 tjCzjVMAuTE9+9L/OpHO1S/9WQrrxpyBPWZAjVo1yVklh80+SkjTHrZFO3A3Q8lA fBWo62TiBJ92KCagcr3b3Xu9ae7LgNHTt7yMVkr81FFAPvxuCjBz2sVl0wFdZ+kB IVPlY5RQ2ikdWb1AIY1/Ah3rr186x02V2eJf/9WiP7/W9a2vV3Zx+gYdDcwlRyTI HXw+64IYUO1VVUEKKFGDqa+nhA3eRHgnuG3ROxW6wERVBLs5XHjBS+wIMPoxpot8 Z5h0oslwlVR2/0MAfzB4 =Kn5f -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5ab7b681-f648-adb8-77b1-d37ecabe57c0%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] AEM with Linux 4.4 causes hard reboot (cont... Trying to resolve issue)
On 07/30/2016 02:52 PM, Marek Marczykowski-Górecki wrote: > On Sat, Jul 30, 2016 at 02:44:24PM -0700, tel wrote: > > Sorry for the delay, Chris. I was waiting for 3.2-rc2, which I just > installed. It seems to come with the latest AEM package, so I didn't > have to install that package myself. > > > I added the parameter to the tboot line. It didn't reboot, but it > hung before asking for the password with "Waiting for > /dev/disk/by-label/aem* to be connected..." > > > Not sure where to go from here. > > Do you use also USB VM? In that case, dom0 has no access to USB > controllers... > > But you can re-enable it just for boot time by editing /etc/default/grub > and removing the line with "hide_all_usb" (or just comment it out). Then > rerun `grub2-mkconfig -o /boot/grub2/grub.cfg`. > It will expose dom0 for all connected USB devices for a short time > during system startup. > > Yep. That's the ticket. I can confirm that Chris' method works, and I now have a working anti-evil-maid! Thanks Chris and Marek! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b4d04e38-489e-2b4c-f66d-b780ed1eae60%40nowlas.org. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
Re: [qubes-users] Risks of Dual-Boot?
On 07/30/2016 09:24 PM, Markus Kilås wrote: > On 07/30/2016 06:25 PM, Fabian Wloch wrote: >> didn't found anything > The issues with unprotected /boot and BIOS is briefly mentioned on the > below link and it sounds like AEM should be able to at least be able to > detect a compromise for you: > > https://www.qubes-os.org/doc/multiboot/ Yes; but what about infected firmware other than the BIOS? e.g. USB controllers? e.g. Storage firmware? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/579d2987.962cc80a.a14ea.8468%40mx.google.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] AEM with Linux 4.4 causes hard reboot (cont... Trying to resolve issue)
Sorry for the delay, Chris. I was waiting for 3.2-rc2, which I just installed. It seems to come with the latest AEM package, so I didn't have to install that package myself. I added the parameter to the tboot line. It didn't reboot, but it hung before asking for the password with "Waiting for /dev/disk/by-label/aem* to be connected..." Not sure where to go from here. Todd -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/09dcdc5d-cbb0-4052-979b-9acd9f203b11%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Risks of Dual-Boot?
On 07/30/2016 06:25 PM, Fabian Wloch wrote: > didn't found anything The issues with unprotected /boot and BIOS is briefly mentioned on the below link and it sounds like AEM should be able to at least be able to detect a compromise for you: https://www.qubes-os.org/doc/multiboot/ Cheers, Markus -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/674edceb-e858-30c5-584e-1949f651cd8d%40xn--kils-soa.se. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] No sound with VoIP
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Jul 30, 2016 at 05:29:27AM -0700, ghbouchard...@gmail.com wrote: > Hi, > > I try to use Tox for having a VoIP software but unfortunately I can not have > any sound. Here is my setup : (I use Qubes 3.2) > > http://www.hostingpics.net/viewer.php?id=558339tox.png > > Audio Input Device : > -Built in Audio Analog Stereo > -Monitor of Qubes VCHAN sink > -Qubes VCHAN source > -Monitor of Built in Audio Analog Stereo > > Audio Output Device : > -Built in Audio Analog Stereo > -Qubes VCHAN sink > > Do you know how to make things work ? :-) "Qubes VCHAN source" should work for input. You need to explicitly enable audio input for the VM in Qubes Manager. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJXnRJDAAoJENuP0xzK19csXWYIAIOMp8A5mnLEJN1tSrCXxWko zrtBFQnx/mpoBA4/0dtJr2Kt62sbuVVLXS/dTeEdeJPeRWumlsJ0hRqi4eStWuWZ qYjJgCzNdWDwaHxdNGlipjdn16DD81oOUZnSv/ulPGBUF1f97pGqtiNRp5862/SN 4GIs1zwKuI09o69vbslvIPht2qoQPw0PLdfVxwFT27DUDpHeGGJTkywBWYxpWzlK PFCDYZXaRUgCqXFL5zzir9NLtBsTcT3skx7J2bP/Az1ddgmHO11Mh6xsAVpWhtkq l2kIYREf5mPuxL2/0kO2xGCKGjBKSl6lwBK2Fnsqy3PdjaI1JINApklRtPI1v9U= =VELC -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160730204658.GW32095%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] No sound with VoIP
ghbouchard...@gmail.com: > I try to use Tox for having a VoIP software but unfortunately I can > not have any sound. Here is my setup : (I use Qubes 3.2) > Is this a VOIP-issue or do you not have any sound in general? Can you listen to audio files, watch youtube videos, etc? Some things to check: In dom0, go to System Settings -> PulseAudio Volume Control -> verify all settings are correct appVM settings will be dependent on OS & DE. I won't pretend to know how all the sound subsystems interact. In my Debian (KDE) appVM, I can adjust volumes using `alsamixer` and `kmix`. Gnome has a sound panel of its own. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d26b73a4-bc3d-456c-81ff-55c72f27da27%40gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: PulseAudio Connection Terminated
Marek Marczykowski-Górecki: > Maybe it is related to HDMI audio output? Try to disable it (for example > unload snd-hda-codec-hdmi kernel module). Thanks Marek! I figured it out this morning but `Replied` to Myself :/ Sorry to waste your time. > On Sat, Jul 30, 2016 at 04:11:50 AM UTC, 3n7r0...@gmail.com wrote: > > Issue resolved (not sure if Qubes related or not): > > 2 sound devices are present: HDMI-Audio via graphics card & Integrated Intel > HD Audio > Launch `pavucontrol`. For HDMI-Audio, disable Profile (set to `off`). > > This means either: > 1. I had the profile off originally and a recent update reset the setting > or... > 2. I had the profile on but a recent update requires that it be off. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4c4e7dcb-6227-7345-75bf-d58fb31c6674%40gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: installer 3.2 bugs
On Thursday, July 14, 2016 at 4:56:32 PM UTC-6, Drew White wrote: > installer bug.. picture I am having a similar issue but in this case I check to configure sys-net, sys-firewall and default application qubes but I get the same error you observed. Then when I go to the system it has nothing except dom0 and the VM templates. no sys-net, sys-firewall and default application qubes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5b411c49-2ad7-4a5a-90b5-5c36ea57755d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Risks of Dual-Boot?
Hello, there are plenty threads of people asking for advice for dual boot, but this is not my intention here. What I would like to know is, what are the risks of a Qubes-Dualboot System? Let's assume I have installed the latest version of Qubes, Encrypted the whole drive using LUKS (and a 32 character long passphrase) and installed Anti-Evil-Maid on an USB Drive´/SD-Card. After doing this, I remove the AEM-Stick and install Windows7/SteamOS on another drive in my computer to play some games. Is this second OS able to do anything to my Qubes-Installation without me noticing it? (Of course I'll only boot it with the AEM-Stick removed). Sorry if this was already discussed anywhere, I searched for those things but didn't found anything. Reason why I'm asking: I'm going to buy a new computer soon, and I usually play some games. I'll try to get the GPU-Passthrough working, but if this fails I still wanna play games, but also use Qubes on this machine without worrying. Sadly my Budget is limited, so I can't afford two computers, one to play and another one just for Qubes. -Fabian -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ebb23d35-306e-4201-b269-8cc99d6b507e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Play Audio from AppVm on device attached to USB Cube
Hi all, I am a new Qubes user and amazed by the awesome work you put into Qubes to make compartmentalization usable. Also great to see how much you care about the community. Feels already good to be a part of it. Now to my question: I am running a USB Qube that has all my USB controllers attached. There is an external sound device attached and I managed to make it show up in Pulseaudio and play audio from the USB qube. However, the pulseaudio daemon running on the USB Qube is of course isolated from the rest of the system, so if I want play sound in a disposable VM (e.g. from Youtube) for example, it doesn't play. I guess this is because Pulseaudio in dom0 doesn't know about this output device. Is there any way (maybe with an additional vchan sink) to make this output device available globally so it can play sound from ideally all AppVMs? I've read https://www.qubes-os.org/doc/external-audio but this requires assigning an entire USB controller to a different VM and I think it also assumes that only this VM will play the audio, right? Kind Regards, Torsten -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/22f058c0-6e31-bd5c-4cc0-40a23e38a5e6%40grobox.de. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature
[qubes-users] Re: What do you think about the idea of a FileVM?
I used to run samba server on Archlinux inside Qubes. Actual data was stored on a separate volume group and mounted in the server vm on boot. The main difficulty was to do routing and firewalling properly on every change of network topology. The main risk was that eventually many vms had to be connected to one proxyvm and that was not safe. When I realised that the data is more often accessed from outside than inside I just created a NAS (Turnkey fileserver running in an unprivileged container actually :) ) Having done all that I believe there should be no traditional network services inside Qubes. A storage domain owning storage controllers and disconnected from network would make sense but it would require great care in dealing with concurrent file access. And it definitely must not have access to images of other vms. I agree with Axon. A need for simulteneous access can be justified only in case of different OS'es. My solution to that is simple - ditch Windows :))) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b44ac1e8-a1c2-484f-85b8-bff7f0b81324%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] No sound with VoIP
Hi, I try to use Tox for having a VoIP software but unfortunately I can not have any sound. Here is my setup : (I use Qubes 3.2) http://www.hostingpics.net/viewer.php?id=558339tox.png Audio Input Device : -Built in Audio Analog Stereo -Monitor of Qubes VCHAN sink -Qubes VCHAN source -Monitor of Built in Audio Analog Stereo Audio Output Device : -Built in Audio Analog Stereo -Qubes VCHAN sink Do you know how to make things work ? :-) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ca081670-26b9-4331-a351-e7756d7316eb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] usb 3.0
Hello all, sorry if I bother you but I haven't understood if USB 3.0 (I've a lot of external disks with usb 3.0) is supported or not. I want to migrate from my actual windows 8.1 OS to Qubes (I've to do a Windows HVW for some applications) but, the USB 3.0 should work correctly. could you please help me? best regards Nick -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f4a94646-e4a4-4455-8fa6-c1fdad07acd0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.