Re: [qubes-users] Configuring OpenDNS in Qubes

2016-08-04 Thread Marc Busqué
Ok, thanks a lot for your help. I'll try it.

On Aug 5, 2016 00:04, "Qubed One"  wrote:

> m...@lamarciana.com:
> >> eth0 is an uplink to sys-net. And /etc/resolv.conf there indeed is
> >> generated, so manual changes will be lost. There is a way to avoid this
> >> using /etc/qubes/protected-files.d/, but I think it isn't the way to go.
> >> Better adjust NetworkManager settings in sys-net, using standard
> >> connection editor GUI. The DNS servers in any other VM are in the end
> >> pointing to what you have in sys-net(*) (using DNAT redirections).
> >>
> >> (*) unless you use Tor/Whonix - in which case those are redirected to
> >> tor process.
> >
> > Thanks for your answer.
> >
> > Does it mean that all VM have to share the same DNS settings (except
> Tor/Whonix)? What I was trying to do is routing only one of them through
> OpenDNS, while keeping the rest with my ISP DNS server (and I would like to
> avoid an HVM just for that).
> >
> > I see I can create a new "NetVM" but I'm not sure if it is full
> supported. If I create a new one, is the GUI adapted so that I can
> configure both (sys-net and my custom one)? I prefer to ask before trying
> it and risking leaving something in an inconsistent state.
> >
>
>
>
> I would suggest trying to completely disable or get rid of
> NetworkManager in that ProxyVM (you shouldn't need it, especially just
> to redirect DNS), then see if /etc/resolv.conf changes become
> persistent. If not, you could still use /rw/config/rc.local to replace
> /etc/resolv.conf on boot.
>
> --
> You received this message because you are subscribed to a topic in the
> Google Groups "qubes-users" group.
> To unsubscribe from this topic, visit https://groups.google.com/d/
> topic/qubes-users/Q0kLzqD1ir4/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/a038a41c-61c1-da76-225e-68600908de45%40riseup.net.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJzvRW9N7DsuScqixQURMPWdN6WVShp6_zccnQLM4a7DgQO3aw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Attaching a webcam from sys-usb to other appvm

2016-08-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-08-04 07:28, Marek Marczykowski-Górecki wrote:
> On Thu, Aug 04, 2016 at 02:02:59PM +, 46l47g+27idcs742td9g via
> qubes-users wrote:
>> Hi,
> 
>> I finally managed to put this to work, the missing part was to install
>> the qubes-usb-proxy also on the sys-usb as well (mea culpa) :) I'm now
>> able to attach the webcam to any AppVM, unfortunately the only caveat is
>> that when I unassigned the device from the AppVM back to the sys-usb I'm
>> not able to get the camera working again on the sys-usb - the device
>> doesn't seem to be present.
> 
> Indeed this is how it is working now. Mostly because device is still
> connected to usbip-host driver and isn't switched back to the original
> one.
> 
>> Is this the expected behavior?
> 
> That's a good question. I think the most common use case would be to 
> either: - use device directly in sys-usb all the time - for example if you
> use a different mechanism to make it available to other VMs - like 
> qvm-block, or simply mount it there and copy to/from files using qubes file
> copy - don't use it in sys-usb at all and only attach to some VM when
> needed - like for webcam - you don't have your video call credentials in 
> sys-usb, but in some other dedicated VM
> 
> Generally it is based on assumption that sys-usb serves only as an 
> interface to the devices, but all the data is stored in some AppVM.
> 
> If this is correct, switching device driver back to the original one is 
> just waste of time.
> 
> Joanna, Andrew, what do you think?
> 

I agree. We should assume that sys-usb is compromised (due to the existence of
things like BadUSB). We certainly don't want the user's webcam spying on him
or her from sys-usb, so the safe default would be not to switch the device
driver back to sys-usb (at least not without explicit user consent).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=yeA+
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/32fe844e-e075-c6d6-a96e-40140318df2c%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Configuring OpenDNS in Qubes

2016-08-04 Thread Qubed One
m...@lamarciana.com:
>> eth0 is an uplink to sys-net. And /etc/resolv.conf there indeed is
>> generated, so manual changes will be lost. There is a way to avoid this
>> using /etc/qubes/protected-files.d/, but I think it isn't the way to go.
>> Better adjust NetworkManager settings in sys-net, using standard
>> connection editor GUI. The DNS servers in any other VM are in the end
>> pointing to what you have in sys-net(*) (using DNAT redirections). 
>>
>> (*) unless you use Tor/Whonix - in which case those are redirected to
>> tor process.
> 
> Thanks for your answer.
> 
> Does it mean that all VM have to share the same DNS settings (except 
> Tor/Whonix)? What I was trying to do is routing only one of them through 
> OpenDNS, while keeping the rest with my ISP DNS server (and I would like to 
> avoid an HVM just for that).
> 
> I see I can create a new "NetVM" but I'm not sure if it is full supported. If 
> I create a new one, is the GUI adapted so that I can configure both (sys-net 
> and my custom one)? I prefer to ask before trying it and risking leaving 
> something in an inconsistent state.
> 



I would suggest trying to completely disable or get rid of
NetworkManager in that ProxyVM (you shouldn't need it, especially just
to redirect DNS), then see if /etc/resolv.conf changes become
persistent. If not, you could still use /rw/config/rc.local to replace
/etc/resolv.conf on boot.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a038a41c-61c1-da76-225e-68600908de45%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: SUCCESS: GPU passthrough on Qubes 3.1 (Xen 4.6.1) / Radeon 6950 / Win 7 & Win 8.1 (TUTORIAL + HCL)

2016-08-04 Thread Marcus at WetwareLabs
On Monday, August 1, 2016 at 10:24:32 PM UTC+3, tom...@gmail.com wrote:
> Hi Marcus,
> 
> I'm bit confused with this
> > Edit /etc/default/grub and add following options (change the pci address if 
> > needed)
> 
> Which version of Qubes is this? Aint 3.1 EFI-only?
> And EFI version of kernel args are to be passed via /boot/efi/EFI/qubes 
> (kernel=)?
> 
> regards,
>   Tom

Hi Tom, 

I use 3.1 and 3.2 rc2. Actually I haven't thought about this before. It seems 
on my system the default state is 'BIOS compatibilty mode' even though it's a 
new motherboard which is running on UEFI firmware. As for the partition table 
type on my SDD, it has always been 'dos' type MBR and that was never converted 
to GPT by Qubes Installer. 

I'm not familiar how to configure EFI type bootloader, but it seems editing  
/boot/efi/EFI/qubes/xen.cfg should work. There's lots of discussion about it 
here: https://github.com/QubesOS/qubes-issues/issues/794

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5d085b6-8517-4cc7-9da3-4c2fb8c54eac%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Android Emulator

2016-08-04 Thread Torsten Grote
On 08/03/2016 12:10 PM, Torsten Grote wrote:
> Oh thanks! I didn't try using an ARM image. If you ever find out how to
> run an x86 image with Qubes, please let me know.

I tried it now and it works, but is barely usable, because it is
very(!!!) slow. On top of running ARM emulation in an AppVM, I needed to
turn on software graphic rendering, because hardware rendering didn't work.

It would be nice if Android guests would be officially supported by
Qubes OS, but until that's the case, maybe there's a way of running
Android guests in the meantime.

An Android image comes with these files:

  kernel-qemu
  ramdisk.img
  system.img
  userdata.img

Shouldn't it be possible somehow to create a XEN guest VM with these
files mounted, so Android can actually boot?

Kind Regards,
Torsten

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3200476a-9bcc-e1b2-cf77-74dc3606d101%40grobox.de.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Re: Can't find Fedora 23 minimal template

2016-08-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Aug 04, 2016 at 04:55:51PM +, Francisco Muniz wrote:
> Thanks! I didn't try that.
> Since qubes-templates.repo wasn't on sys-firewall, is the repo info
> forwarded along with the command?

Yes.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXo3ymAAoJENuP0xzK19csj94H/3Ka2w+3SdRrhEtcGtLQC4by
XObfkF6wB8PHTTHb7pemjDkyW+EGZEAD7xmlXzqisSlzDRv4lYrRVuP1REQeA1gC
McNnlVIL0Fv31IpESOAg4wNAVwWOkjmwOdThElqP7F1rJkGVD0LCdgzBz/MVOyg7
Sk9Pisq8scmsrWDozNiE7FUSLEROD0R5nwEaVRy7ilG3w/lKn/JnBSWf0Zi23UL2
03Za3f2rrBwyf1uFD81d2XwESQkY48JFRylv9zvdtJCM6XddM4BydNSFmDuVjfYU
TpKxAOlIggxYslezbfCTJDr5nLCfOj0nRGqixqXQ4vbzhod9DnQPh62aIINLEKI=
=3Z/l
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160804173429.GD32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can't find Fedora 23 minimal template

2016-08-04 Thread Francisco Muniz
Thanks! I didn't try that.
Since qubes-templates.repo wasn't on sys-firewall, is the repo info
forwarded along with the command?

El jue., ago. 4, 2016 12:41, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> escribió:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Thu, Aug 04, 2016 at 09:20:19AM -0700, fmu...@gmail.com wrote:
> > Ok, got it working.
> > I copied /etc/yum.repos.d/qubes-templates.repo to sys-firewall, same
> place; then on sys-firewall I edited the file and put 3.2 where it said
> $releasever (it didn't work otherwise) and finally I run "dnf -v --refresh
> makecache" to refresh dnf.
> > After that I run qubes-dom0-update qubes-template-fedora-23-minimal and
> it installed the package.
>
> If that was a problem with old metadata cached, simply adding a --clean
> option to qubes-dom0-update should be enough.
>
> - --
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
>
> iQEcBAEBCAAGBQJXo3BAAAoJENuP0xzK19csbQ0H/2t32pCerfiSUYMYUzA+Zq4M
> Suj7mtJ85zaVOOJrtrNvgo71UyAQjcn+Kwn08J+EXL6zYhpLeph2tKGB45u27txf
> TB/bS/6erWm659WsaqTyQ+LuuakmONw/e+iFxRXesZI9ufKmjhaQvvHJHaxxQ8Ng
> ec/hz5xKBaHwa4gc8DdvMtOh3BDrfcPY0sjbG2qCvxENvT3fWT7c+kybisRVxgJK
> xNDAvoWF4h3JwueC69bgwDq+ftPX/O3fJu1YRUmahrZZDX4AMe9P10hsXHGnMs4F
> 1XewYQK+saxscYbBvcy7FbvOYKuQTWZrUyWBJzJGBy75Vz9Cz64TNR9V7V/58g4=
> =8Lhm
> -END PGP SIGNATURE-
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAKXLZdSKq9j-zxSi85ih4RMsjEdpnr3dEfnYZpWWN6Cmd09Jgg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can't find Fedora 23 minimal template

2016-08-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Aug 04, 2016 at 09:20:19AM -0700, fmu...@gmail.com wrote:
> Ok, got it working.
> I copied /etc/yum.repos.d/qubes-templates.repo to sys-firewall, same place; 
> then on sys-firewall I edited the file and put 3.2 where it said $releasever 
> (it didn't work otherwise) and finally I run "dnf -v --refresh makecache" to 
> refresh dnf.
> After that I run qubes-dom0-update qubes-template-fedora-23-minimal and it 
> installed the package.

If that was a problem with old metadata cached, simply adding a --clean
option to qubes-dom0-update should be enough.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXo3BAAAoJENuP0xzK19csbQ0H/2t32pCerfiSUYMYUzA+Zq4M
Suj7mtJ85zaVOOJrtrNvgo71UyAQjcn+Kwn08J+EXL6zYhpLeph2tKGB45u27txf
TB/bS/6erWm659WsaqTyQ+LuuakmONw/e+iFxRXesZI9ufKmjhaQvvHJHaxxQ8Ng
ec/hz5xKBaHwa4gc8DdvMtOh3BDrfcPY0sjbG2qCvxENvT3fWT7c+kybisRVxgJK
xNDAvoWF4h3JwueC69bgwDq+ftPX/O3fJu1YRUmahrZZDX4AMe9P10hsXHGnMs4F
1XewYQK+saxscYbBvcy7FbvOYKuQTWZrUyWBJzJGBy75Vz9Cz64TNR9V7V/58g4=
=8Lhm
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160804164135.GC32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can't find Fedora 23 minimal template

2016-08-04 Thread fmuniz
Ok, got it working.
I copied /etc/yum.repos.d/qubes-templates.repo to sys-firewall, same place; 
then on sys-firewall I edited the file and put 3.2 where it said $releasever 
(it didn't work otherwise) and finally I run "dnf -v --refresh makecache" to 
refresh dnf.
After that I run qubes-dom0-update qubes-template-fedora-23-minimal and it 
installed the package.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3be58d0e-0ab3-4a54-9c86-ebf0a2770c1d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ssh-agent, gnome-keyring, ed25519 keys

2016-08-04 Thread pixel fairy
On Wednesday, August 3, 2016 at 8:21:03 PM UTC-7, pixel fairy wrote:
> out of the box, fedora23 template, ssh-agent works fine with rsa keys, but 
> not ed25519. 
> 
> could not add identity "/home/user/.ssh/id_ed25519": communication with agent 
> failed
> 
> running "ssh-agent bash" and then adding both keys works fine. is there a 
> clean way to disable this keyring? its not like we need it.

so in ubuntu this is easy to disable. "gnome-session-properties" and uncheck 
"ssh key agent". you get back the real ssh-agent. none of the methods ive found 
online work to disable it in the fedora or debian appvms. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9b963f7f-1107-443c-8918-d95a48b5433b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread kelo
anyone knows a solution to get it working somehow with this specific dell xps 
15 wirless card the 
 Broadcom BCM43602 .  Im not an expert with anything terminal related.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/331db64a-2efd-43c6-9b87-1bb64b4d040d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't find Fedora 23 minimal template

2016-08-04 Thread fmuniz
Hi,

I can't find the fedora 23 minimal template. Qubes-dom0-update can't find it 
and I don't see on the web page for the repository either. Anyone knows where I 
can download it?

Thanks,
Francisco

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dae0ab8f-b88f-4581-a07b-58c97994a05b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Attaching a webcam from sys-usb to other appvm

2016-08-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Aug 04, 2016 at 02:02:59PM +, 46l47g+27idcs742td9g via qubes-users 
wrote:
> Hi,
> 
> I finally managed to put this to work, the missing part was to install the 
> qubes-usb-proxy also on the sys-usb as well (mea culpa) :)
> I'm now able to attach the webcam to any AppVM, unfortunately the only caveat 
> is that when I unassigned the device from the AppVM back to the sys-usb I'm 
> not able to get the camera working again on the sys-usb - the device doesn't 
> seem to be present.

Indeed this is how it is working now. Mostly
because device is still connected to usbip-host driver and isn't
switched back to the original one.

> Is this the expected behavior?

That's a good question. I think the most common use case would be to
either:
 - use device directly in sys-usb all the time - for example if you use
   a different mechanism to make it available to other VMs - like
   qvm-block, or simply mount it there and copy to/from files using
   qubes file copy
 - don't use it in sys-usb at all and only attach to some VM when needed
   - like for webcam - you don't have your video call credentials in
 sys-usb, but in some other dedicated VM

Generally it is based on assumption that sys-usb serves only as an
interface to the devices, but all the data is stored in some AppVM.

If this is correct, switching device driver back to the original one is
just waste of time.

Joanna, Andrew, what do you think?

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXo1EfAAoJENuP0xzK19csFzEIAJi9bEBcN7RjhNsFa4IGhYBt
uNS9679m9xuHvaIMydLfDVOzYmV98YXix25K8MpzbUbqY4+0aHXvVPmv7jIBem0v
1gCFDIt8v9tl9r0b3XYfP7zgEdoosyyz1FB/fHFAHMHogJs//+F3DxysoA/DLL8i
JMamHvegtunzVq3iJDkSpckFo6MCgBkqb1q4RUkS2F7ZRq5ZpkjE+jL38mCKJVK1
USoGod8fYPMewhGMPs0GABzMzZHdarZU5SyySFWdEfy2/GwSgWQCpMn9WpaGqSSw
qDCHuCpZrwMnRCsPyBGkEP3ZJjtmOKZbHO4LRAZ/hQmyxGxMoH93oqGG5GENBFY=
=yw18
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160804142847.GB32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 08/04/2016 02:16 PM, Jeral wrote:
> On Thursday, August 4, 2016 at 11:08:32 AM UTC+3, Marek
> Marczykowski-Górecki wrote: On Wed, Aug 03, 2016 at 07:05:00AM
> -0700, Michael wrote:
 Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950
 
 and I downloaded Qubes Release 3.2-rc2
 
 Problem: I can not connect to the internet cause my wifi card
 is not working with qubes: "If BCM43602, the wireless card is
 disabled in BIOS, installation succeeds, and afterwards it's
 possible to re-enable BCM43602 in BIOS and boot Qubes.
 However, subsecuantly adding BCM43602 device to the sys-netvm
 freezes the computer."
 
 -my boot setup has VT and VT-d options activated
 
 how can I make my network function ?
> 
> Do you have serial console in this computer (for example in
> docking station)? That would greatly ease collecting more
> information.
> 
> 
> I tried to compile and install wl driver into sys-net VM. 
> Unfortunately it didn't solve the problem, dom0 still freezes...
> :(
> 

I guess you have already tried with permissive mode, right? It seems
complicated to achieve. Also it is more related to Xen, Linux and the
card vendor than to Qubes.

Regards.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=TivY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5bc7bf98-e930-c773-f741-077f19207ef8%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread Jeral
On Thursday, August 4, 2016 at 11:08:32 AM UTC+3, Marek Marczykowski-Górecki 
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Wed, Aug 03, 2016 at 07:05:00AM -0700, Michael wrote:
> > Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950
> > 
> > and I downloaded Qubes Release 3.2-rc2
> > 
> > Problem: I can not connect to the internet cause my wifi card is not 
> > working with qubes:
> > "If BCM43602, the wireless card is disabled in BIOS, installation succeeds, 
> > and afterwards it's possible to re-enable BCM43602 in BIOS and boot Qubes. 
> > However, subsecuantly adding BCM43602 device to the sys-netvm freezes the 
> > computer."
> > 
> > -my boot setup has
> > VT and VT-d options activated
> > 
> > how can I make my network function ?
> 
> Do you have serial console in this computer (for example in docking
> station)? That would greatly ease collecting more information.
> 
> - -- 
> Best Regards,
> Marek Marczykowski-Górecki
> Invisible Things Lab
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
> 
> iQEcBAEBCAAGBQJXovf6AAoJENuP0xzK19cszGgIAJBIKc8ja2GP4y2GZxSqnuHu
> NMEceDcOOcHqOz8Pq/xFjzP6dBiof9R5ITZeUl7+Nol0vtN6sX/zXGrQu1ZvblxG
> MnTCEzkQ6ZdAm0rwoaKykvblHeNyfZnk3jnrFImqyktIBqJoWa4gpBvz3eTfWOUE
> vgsSxbmFlblzXt2SQuNlbRRI/UgqNx3GXRnJpUFNGfDWoW6sYTj/Re4LumF4bK4S
> zU8rG5w6x3q2B35SotACdGDGgJhThDcR9rX0LfmBDljqyqYTCNtXfpGynUyycSq4
> 1t3BT1kfdsDAalKuoDjszW27bqLGlCbzJ4/JSYWku/aciLVksZdqa6BpcCRq3HI=
> =cfQk
> -END PGP SIGNATURE-

I tried to compile and install wl driver into sys-net VM.
Unfortunately it didn't solve the problem, dom0 still freezes... :(

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7442a4d6-e62f-4d45-a7a3-0b273fa5ca78%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Aug 04, 2016 at 12:39:35PM +0200, donoban wrote:
> 
> 
> On 08/04/2016 12:24 PM, vincent.maximus.c...@gmail.com wrote:
> > the wlan card is the
> > 
> > broadcom bcm43602
> > 
> > in all Dell xps 15 9950 machines
> > 
> > it works on ubuntu for me but not with qubes ?
> > 
> 
> Because Ubuntu adds a lot of proprietary drivers which most major
> distributions don't.
> 
> As you can see here
> wireless.kernel.org/en/users/Drivers/b43#Supported_devices , most
> bc4360 cards are supported only by the proprietary wl driver.
> 
> You need to compile the module for your sys-net kernel, or the VM you
> want to use for run it.
> 
> I suggest you to do an standalone VM and let it use his own kernel
> instead the dom0 provided. It's a pretty complicated process

It's slightly easier thanks to PV Grub support:
https://www.qubes-os.org/doc/managing-vm-kernel/#tocAnchor-1-1-3

But still requires some work.

> , you can
> also buy a cheap (and compatible) USB dongle and connect it directly
> to sys-net.

Or different miniPCIe wireless card...

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXox+ZAAoJENuP0xzK19cs5LsIAI+9VtpeeqFLfZkHJfQY77Ek
wKB/FjLxwIUJdN1oDmzpYIAWvVjXCtgcD3oAjMbgW7MX9/QMLa8cSD1xzIG9PxXs
AOKBRBbZ0Gt+iCmltgCIebmA1PQ01LwLog+D7I1fKSUfUYtwfkqxpvzhi5n4Huex
CfF8ti3yYPxuEi5tw1kGMeVA6lBf+06ghUwbwcT+Ym2OR3catvpKbGowBxXFiJDg
AWafsmrdtGieI5yWOj41Ap6rQKJQrB8aQJImEznQl5sjNTMOZMNRAtivTu4EmhPF
NHa6EwVfa2t/tHchwTNvmKSKo4CZoKXkyxwOhwiHmYot0yAesWCPdLNRnNamzIo=
=+Tmb
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160804105728.GA32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] stickers and glitter for physical evil maid detection?

2016-08-04 Thread pixel fairy
any recommendations on stickers/glitter for physical tamper detection (or 
deterrence?) the nail polishes ive tried so far havent worked well, and the 
stickers were too easy to replace without looking out of place.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9ffc082-09a4-48e0-9358-dbffa36a6199%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Attaching a webcam from sys-usb to other appvm

2016-08-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Aug 03, 2016 at 06:35:16PM +, 46h6sk+9aybfqrmo0zwg via qubes-users 
wrote:
> Thank you for the reply. I tried to follow the instructions on the 
> documentation (as illustrated for the conference AppVM) however that does not 
> work. I get a message stating - ERROR: qubes-usb-proxy not installed in the 
> VM - which is not true, I've installed the package and the message is still 
> displayed.
> 
> What I'm doing wrong?

Do you have it installed in both sys-usb and target AppVM? Or rather -
respective template(s)?

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXoxvFAAoJENuP0xzK19cs8DoH/iQIXhiixF6O9VlaLckR4N7k
Ytrc7VjjhG7g+1GNLsVIGzCaiurndsKrmgD0p+McT3hIhmlRckh/uHSGuwQGOEeK
MYJcKoyWLXnxpg7wjiFh+GNlD12DvyzjNT+eB8JVmWx4VMcBVeUmRfA7p52KNuke
o8mL+V79Xgj3MMurMU1d5ZQ3cx26/gSsGOAffplNXrilSczN54Z6D1fQCx3Tzn9W
65aYijzUlhlc1Okv4MRu4pl+aj29XamsFpnwIo/AuiIR9Ct9j8+RrJZTINlz6qKU
ibfOVv2dsdcIXCHn83CStAKwrImiYkm6p3InImGIbS5D86xEuT146qnyYcErjlA=
=Yip+
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160804104108.GY32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256



On 08/04/2016 12:24 PM, vincent.maximus.c...@gmail.com wrote:
> the wlan card is the
> 
> broadcom bcm43602
> 
> in all Dell xps 15 9950 machines
> 
> it works on ubuntu for me but not with qubes ?
> 

Because Ubuntu adds a lot of proprietary drivers which most major
distributions don't.

As you can see here
wireless.kernel.org/en/users/Drivers/b43#Supported_devices , most
bc4360 cards are supported only by the proprietary wl driver.

You need to compile the module for your sys-net kernel, or the VM you
want to use for run it.

I suggest you to do an standalone VM and let it use his own kernel
instead the dom0 provided. It's a pretty complicated process, you can
also buy a cheap (and compatible) USB dongle and connect it directly
to sys-net.

Regards.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJXoxtnAAoJEBQTENjj7QilSOoP/0JoPS5o3W/gjh1EJR/U4rVG
fumEkt1aHeQteZH4NoQssCHFaeWJ1uW5cBj0sDEMyJZd33W1v4iJ16evD8kbjl+w
YPmfnMt6xFdijWaC735mtcmRs7CghH4sVzrJs1eK2p84spNc9Qg5x+IAK8TYuZM7
x0PvLhI/14yXjISdIJO61qxz5Jf/9m+PoH9wF5YKuFpJcYFCYmzNS9B7kz8sQJSB
f35corkVdC8qRv9P3EdJPr7yAeqbOb3AKnG97Nz1z/GGgWMhafTTWk61o767eFfB
7raFELn4RgNUxSp7xPtjRPUmjF6S5pcTcfDehRs4t7kMTzto09qV7keyulBqh19W
lAW9Gy6SjOyxCwnCuVmFUAQPEuVkapAw3KgW+vnNkvL41uDI/zkdkLmneko+Elcc
uKQuTY+S75PTF/cFZ01cGWVKOG9KFoYx98gJHA+2NS6AHhtzCindfDPE4FVYI0pJ
JT5F1X2r5RP1I+nzCjJoWK5zZO/oNw5s+9NZdj8TAUpQ83Xzbedlk02RbLppwqKc
hSS5cHHz3Uqw7mg1S9AtysZ/Yyg0NA5Jsw2vaFrQYnKwjHjjohs6GFS8P1X74n1v
ihtzkIybJA7BcSLfp7wsALro/xh4biNxmo/p56/3lIHMz6A8xN0I8rabUnph8mXM
DoWyF6ib/Kyb8TBtfSb+
=iA/s
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a3390f1-b7ad-62c9-f207-314d23d5717f%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Please make a better Scaling for 4K screens - Zoom, DPI

2016-08-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Aug 04, 2016 at 03:16:24AM -0700, Smithy wrote:
> I have a 4K screen and the layout in qubes R3.2 is unusable 
> even with the DPI scaling and the text size modification tool.
> 
> -qubes manager is tiny and can not be scaled
> -debian and other vms are tiny

VM support is tracked here:
https://github.com/QubesOS/qubes-issues/issues/1951

> the qubes manager tab should be able to be zoomed in and scaled
> same with any other window there is with settings that can be saved.

Qubes manager does respect global font DPI setting, so it shouldn't be a
problem. It isn't ideal tough:
https://github.com/QubesOS/qubes-issues/issues/2033

> ubuntu does a great job with that.
> it would be great if that can be put inside the next release.
> 


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXoxnjAAoJENuP0xzK19csfUYH/RMUAhJiu2HwYhMbb/ypUbTS
BiXMgUWkfeGCtlC7jwxyYxT3GhCh/xCskpflufkzgtL02KLzL0U8qs9DCjG/MkL3
Mm4MneiLaHE81OlDV16rmvruxbCxFlna+zjrZ12xRDh1XXI0afoYWEzca1/b00bt
tCoqrbQvRYorPVth7uvtcofx8m/gbCQF6PbTzajkQovc8R7+dfI78bmErsVTkprh
hcndRCalEewKK0dS+gM0csvOpzvUFz2tVG4nbfhgqI1U2/KpiBylNYECz1D0V+SS
YRFS/9iY8G1K1cbByX+2dkydL2UCASF+FtinVT14qrt4TyWUvXZaMJbJyegsUMM=
=0FQo
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160804103305.GX32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread vincent . maximus . coco
the wlan card is the

broadcom bcm43602

in all Dell xps 15 9950 machines

it works on ubuntu for me but not with qubes ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/abdef991-7cd0-460e-9e52-3231d8c55a6d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread vincent . maximus . coco
On Wednesday, August 3, 2016 at 4:05:01 PM UTC+2, Michael wrote:
> Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950
> 
> and I downloaded Qubes Release 3.2-rc2
> 
> Problem: I can not connect to the internet cause my wifi card is not working 
> with qubes:
> "If BCM43602, the wireless card is disabled in BIOS, installation succeeds, 
> and afterwards it's possible to re-enable BCM43602 in BIOS and boot Qubes. 
> However, subsecuantly adding BCM43602 device to the sys-netvm freezes the 
> computer."
> 
> -my boot setup has
> VT and VT-d options activated
> 
> 
> how can I make my network function ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a724df5e-79f9-4b25-bdc9-ae17a4243b5e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Please make a better Scaling for 4K screens - Zoom, DPI

2016-08-04 Thread Smithy
I have a 4K screen and the layout in qubes R3.2 is unusable 
even with the DPI scaling and the text size modification tool.

-qubes manager is tiny and can not be scaled
-debian and other vms are tiny

the qubes manager tab should be able to be zoomed in and scaled
same with any other window there is with settings that can be saved.


ubuntu does a great job with that.
it would be great if that can be put inside the next release.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44cb94f7-9c0e-4cad-b361-ba9aead2dc3f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Microphone attached hides reboot needed icon - Minor Bug - Qubes 3.2-rc2

2016-08-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-08-03 23:44, donoban wrote:
> Hi,
> 
> yesterday I noticed that the reboot needed icon is not visible if you have
> the microphone attached to a Domain.
> 
> Regards.
> 

Thanks. Tracking:

https://github.com/QubesOS/qubes-issues/issues/2226

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=O3ea
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e360ef2a-270c-c317-bda2-75c83131fe83%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes

2016-08-04 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Wed, Aug 03, 2016 at 07:05:00AM -0700, Michael wrote:
> Have a Broadcom BCM43602 Wifi Card in my dell xps 15 9950
> 
> and I downloaded Qubes Release 3.2-rc2
> 
> Problem: I can not connect to the internet cause my wifi card is not working 
> with qubes:
> "If BCM43602, the wireless card is disabled in BIOS, installation succeeds, 
> and afterwards it's possible to re-enable BCM43602 in BIOS and boot Qubes. 
> However, subsecuantly adding BCM43602 device to the sys-netvm freezes the 
> computer."
> 
> -my boot setup has
> VT and VT-d options activated
> 
> how can I make my network function ?

Do you have serial console in this computer (for example in docking
station)? That would greatly ease collecting more information.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJXovf6AAoJENuP0xzK19cszGgIAJBIKc8ja2GP4y2GZxSqnuHu
NMEceDcOOcHqOz8Pq/xFjzP6dBiof9R5ITZeUl7+Nol0vtN6sX/zXGrQu1ZvblxG
MnTCEzkQ6ZdAm0rwoaKykvblHeNyfZnk3jnrFImqyktIBqJoWa4gpBvz3eTfWOUE
vgsSxbmFlblzXt2SQuNlbRRI/UgqNx3GXRnJpUFNGfDWoW6sYTj/Re4LumF4bK4S
zU8rG5w6x3q2B35SotACdGDGgJhThDcR9rX0LfmBDljqyqYTCNtXfpGynUyycSq4
1t3BT1kfdsDAalKuoDjszW27bqLGlCbzJ4/JSYWku/aciLVksZdqa6BpcCRq3HI=
=cfQk
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160804080825.GW32095%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unable to get right X display for kali on HVM

2016-08-04 Thread NewbieG
On Thursday, August 4, 2016 at 5:29:45 AM UTC, J. Eppler wrote:
> On Monday, August 1, 2016 at 8:58:56 AM UTC-5, NewbieG wrote:
> > Hello list,
> > 
> > I'm running Qubes OS 3.1 and I'm trying to have a Kali VM (2016.1).
> > 
> > I've tried both methods suggested in:
> > 
> > https://www.qubes-os.org/doc/pentesting/kali/
> > 
> > First one, works ok if you run kali from DVD without installing it. If I 
> > try to install it, login window flickers and once logged on, the desktop 
> > shows up 'misplaced' (see attach).
> 
> I was first able to install and run kali without the above problems, but 
> since Kali is a rolling distribution, I will test it again.

It might just don't like my video card (Nvidia GF108M).
>  
> > Second one, as someone already pointed out in the list, introduces 
> > conflicts between X packages from kali and X packages from the debian-9 
> > template.
> 
> For the second method there are two paths, one which uses kali repos directly 
> and another is based on katoolin (which is a helper script).
> 
> Use the katoolin one, that method works well.

thanks for your suggestion. I've tried both, manual and katoolin ways. If you 
try to install everything (kali-full) X-based conflicts show up, hash 
mismatches, etc.

Cheers

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/230f7e55-91b7-4046-8ece-23c62f2cdf0c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Microphone attached hides reboot needed icon - Minor Bug - Qubes 3.2-rc2

2016-08-04 Thread donoban
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

yesterday I noticed that the reboot needed icon is not visible if you
have the microphone attached to a Domain.

Regards.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=cu7k
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8cef73f2-908d-8565-574a-03749939ffba%40riseup.net.
For more options, visit https://groups.google.com/d/optout.