[qubes-users] [HOWTO] Give win7 HVM an IP but no net access

2016-08-12 Thread jewglejewgleoyvey
Just thought I'd leave this here.
Maybe it works for you, maybe it does not.

1. Shutdown whatever VMs are needed, and the sys-firewall
2. Open terminal in dom0, qvm-clone the sys-firewall
3. Set it to deny all traffic except to the IP that you want to 
https://xpra.org/ into your win7 HVM from. VNC is insecure by design which is 
why Subgraph OS doesn't use it; correct me if I am talking shit
4. Remove the sys-net from your cloned sys-firewall

Profit.

You now have a win7 instance with an internal IP that can communicate with 
other VMs, but no access to the inet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c69b7d1-343a-499c-a341-14553f5dd0ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] grub2-mkconfig not found

2016-08-12 Thread zackptg5
Hi all, I'm a new qubes user and have been following the guides to get trim 
enabled for the dom0. Everything seems to have gone smoothly until the grub 
steps. I can't find a grub.cfg file anywhere. The only abnormality to my 
installation is that it's UEFI. So the closest thing I did find to this was 
/boot/efi/EFI/qubes/xen.cfg which had the kernel line referenced in the trim 
guide. However, when I attempt to run grub2-mkconfig -o 
/boot/efi/EFI/qubes/xen.cfg I get "grub2-mkconfig: command not found"
All that is present in the /boot/grub2 folder is a themes folder. I am using 
the main dom0 terminal for all of this.

Considering that everything boots fine, I'm hesitant to reinstall grub2 (I 
assume it would need to be grub2-efi in this case). Any clue as to what's going 
on? Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ac23634-8b0e-41b4-9000-e2a740c54d62%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.2(R2) USB Connecting to DOM0 by Default

2016-08-12 Thread Nicklaus McClendon
On 08/12/2016 01:27 PM, johnroberts19...@gmail.com wrote:
> On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote:
> On 2016-08-11 05:08, amad...@riseup.net wrote:
 My understanding is that by default Qubes Dom0 is protected from USB
 attacks by disallowing access to USB's. To the contrary,on my system, USB's
 have direct access to Dom0 - I plug in a usb -popup shows it's connected to
 dom0 - i have direct access via dom0 to the files on the usb.

 Is it just me? or it it a system failure?

> 
> Pleas read this page:
> 
> https://www.qubes-os.org/doc/usb/
> 
> Without a USB qube, the USB controllers are left in dom0, which sounds like
> your situation. Depending on the version of Qubes you're using and whether
> you're using a USB keyboard and/or mouse, you should have been prompted during
> installation to create a USB qube. However, you can also create one yourself
> by following the instructions on that page.
> 
> 
> So i use R 3.1 and have a usb mouse and keyboard but nothing about usb 
> mention while the installation. i wonder the same as the author after i 
> insert usb stick to my system and it's at dom0.
> 
Do you have a USB Qube? If not, you need to make on following Axon's
instructions above. Otherwise, I would check your USB Qube's attached
devices with Qubes VM Manager (the Devices tab in the USB Qube's
settings) and make sure your USB Controllers are selected.

-- 
kulinacs 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/799e56e8-8afc-1bdb-08a6-4cbfe66b688f%40kulinacs.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Qubes 3.2(R2) USB Connecting to DOM0 by Default

2016-08-12 Thread johnroberts19855
On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-08-11 05:08, amad...@riseup.net wrote:
> > My understanding is that by default Qubes Dom0 is protected from USB
> > attacks by disallowing access to USB's. To the contrary,on my system, USB's
> > have direct access to Dom0 - I plug in a usb -popup shows it's connected to
> > dom0 - i have direct access via dom0 to the files on the usb.
> > 
> > Is it just me? or it it a system failure?
> > 
> 
> Pleas read this page:
> 
> https://www.qubes-os.org/doc/usb/
> 
> Without a USB qube, the USB controllers are left in dom0, which sounds like
> your situation. Depending on the version of Qubes you're using and whether
> you're using a USB keyboard and/or mouse, you should have been prompted during
> installation to create a USB qube. However, you can also create one yourself
> by following the instructions on that page.
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJXrMkGAAoJENtN07w5UDAw2SkQAKE230GVdVVTj6ds7dH2m7ua
> LJfdrLATMfXiCc8ua0GCPB/LFlBHua39LJDowL0okeX7UZfh6mPS+iQ51wEDVHU1
> Mox/PaEqkKpv7QnIj/6XSV3sIhwYqTIL+5HFBhd3IE8Psj2NCb30fYFJgoOdcpR6
> /8Y2huXCxCIvlsuTnxaa9/xvwZXKaN7eB00OMrk2pzRBfNOTedMIONzy5pPOvF2Q
> X0cOln+U7s2iu0s+WmZWtcgX82qKpTWa07r96WcTU262e8+TXvH8umZZtIlJLwLU
> eJxucUJFaNOGYGUL9dx6zaFiQ5WmOpCQ37Awh/3m/iVgL6FrpUlX+z66ZCpC6UZG
> pwjHKcv3jRyxNIXTu6ROwjPzjjuHx8xuKAP1cIhU/EsQi+k6goWXeIalwO2lmDy1
> +lZwm3oHN1w2BEtPBthB+GDEsVjCzlUKnZSPZzj9rSMNW5CkYuw/KLXtKKhm2jcy
> 7sSAk8zZ320NA0OeLcMR485QFaQ3HPtVoWdaA2aHjV/bTtMQMR72rgUZGXI3jntB
> kFnQfa255+IQN8+WH6goHypuunSz3od3HH1ChlSnO2slzykMRiy51bHvLGnyNILN
> TuKSTBTzqHxeV242NoqJye+zVTm5Ka1V43MTjIO6vhLCFz5HN6ezViT3GX/Eehah
> nrDdi2shrGFOzLwP7Zea
> =ZISO
> -END PGP SIGNATURE-

So i use R 3.1 and have a usb mouse and keyboard but nothing about usb mention 
while the installation. i wonder the same as the author after i insert usb 
stick to my system and it's at dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/505ef430-be83-4168-a013-79a1d208bf3d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unable to install R3.1 / media check failure

2016-08-12 Thread Gabriele Bini
Hello,
I have exactly the same problem. This is what I did:
1. I downloaded the Qubes-R3.1-x86_64.iso ISO from the Torrent.
2. I checked the signature and the hash values in the DIGEST file (I checked 
just the hash values in a second PC) and everything was fine.
3. I used dd to copy the ISO in a USB flash drive (Sony 8Gb)
4. When I booted from the USB I tried the “Verify and Install” option but, 
exactly at 4,8% (as for Cory Nelson) the check failed. There was a message of 
this type (copied by hand):
Failed to start media check on /dev/sdc
See 'systemctl status checkisomd5@-dev-sdc.service' and 'journal.ctl-xn'  for 
details
5. I couldn't check anything because the system was halted

What can I do?
Thank you in advance!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6cf64646-8d0e-4339-ada4-ef26e0ebfe47%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 3.1 - Fedora update check disabled but still check

2016-08-12 Thread johnroberts19855
Hello

i disable all the option auto update options but qubes still pop the update 
icon in my qubes vm manager.

qubes vm manager "System - Global Settings" Disable dom0 and VM updates
Fedorar 23 Template VM disable firewall rule "Allow connections to Updates 
Proxy"

and even then from time to time it says new updates.

i want to control back about when i check for updates.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/29f2f02b-fa8f-4357-ae3e-bcc9ece93b76%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to remove KDE from dom0?

2016-08-12 Thread Torsten Grote
Hi all,

I installed Qubes 3.2 with KDE and XFCE with the intention of continuing
to use KDE as I did before. However, there were so many problems and
bugs that I decided to use XFCE in the hope of having less of those.
Although, it is not bug free, it works a lot better, so I would like to
remove KDE from dom0 now.

I already tried removing the @kde-desktop-qubes group, but that wants to
remove all sorts of other rather essential packages.

Kind Regards,
Torsten

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d33cc7f-8870-be38-4735-65b82b17b031%40grobox.de.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Manual https://www.qubes-os.org/doc/templates/archlinux/ does not work.

2016-08-12 Thread lol lol
Hi guys, it doesn't work on a step 9 after compiling.


:: Running post-transaction hooks...
(1/2) Updating manpage index...
mandb: can't set the locale; make sure $LC_* and $LANG are correct


--

bsdtar: Failed to set default locale
==>Starting build()



/home/user/qubes-src/vmm-xenPKGBUILD: line 49: autoreconf: command not found
==> ERROR: A failure occurred in build().
Aborting...
/home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:120: 
recipe for target 'dist-package' failed
make[2]:***[dist-package] Error 2
Makefile.generic:139: recipe for target 'packages' failed
make[1]: *** [packages] Error 1
Makefile:208: recipe for targert 'vmm-xen-vm' failed
make: *** [vmm-xen-vm] Error 1 

--

So, i can't install archlinux template step by step :( Script doesn't work. 
Please fix it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f08ab15f-09c8-443c-aa1a-be3993e0f2fb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Tool to record Whonix / Tor browsing history..?

2016-08-12 Thread neilhardley
I would like to be able to do something like:

1. Use Whonix/Tor as a disposable VM

2. Record browsing history using an external software

One of the reasons I don't use Tor that much (other than slow speed, captchas 
etc) is because I actually want to have a record of the websites I have visited.

We know that it could be risky to have the Tor browser itself record history, 
if it gets hacked.

But to have some tool running outside of the VM would be useful..

Is that possible..?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/72cae3bb-8359-49b3-91db-12e3b9e12c2a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to install "tl-wn823n" wlan mini usb stick in qubes ?

2016-08-12 Thread Fox
this is the instructions in the driver files from the tl-wn823n website.
I have no success so far how to do it with qubes ?
want to attach the usb wifi stick to my sys net. this device does not even get 
recognized by qubes but lsusb shows there is a device plugged in.


1. Development Environment
System version: Ubuntu 14.04.1
Kernel version: 3.16.0-30-generic
Gcc version:4.8.2


2. Compile the Driver

2.1. Compilation tool and kernel sources
Before you compile the driver, please make sure you have the correct compile 
tool and
kernel sources.
We can install compile tool gcc by command “apt-get install gcc”
Note : We recommend you use a suitable compile tool to compile our driver.
For example:
According to the command “cat /proc/version”, we could see your linux system is 
compiled
by gcc4.8.2. So we recommend you use gcc4.8.2 to compile our driver if possible.




2.2. Compile and install the Driver

1. Access the directory of driver.

2. Before compile, make sure the parameters in “makefile.c” is suitable for your
compile environment of your Linux system.

ifeq ($(CONFIG_PLATFORM_I386_PC), y)
EXTRA_CFLAGS += -DCONFIG_LITTLE_ENDIAN
SUBARCH := $(shell uname -m | sed -e s/i.86/i386/)
ARCH ?= $(SUBARCH)
CROSS_COMPILE ?=
KVER := $(shell uname -r)
KSRC := /lib/modules/$(KVER)/build
MODDESTDIR := /lib/modules/$(KVER)/kernel/drivers/net/wireless/
INSTALL_PREFIX :=
endif

Explanation:
· KSRC is used to specify the kernel source path for driver compilation.
· CROSS_COMPILE is used to specify the toolchain.
· ARCH is used to specify the target platform's CPU architectures such as arm, 
mips,
i386 and so on.
1If your Linux kernel does not support 802.11, please annotate macro

“CONFIG_IOCTL_CFG80211” in “makefile.c”.
CONFIG_IOCTL_CFG80211=n
ifeq ($(strip &(CONFIG_IOCTL_CFG80211)),y)
EXTRA_CFLAGS + = -DCONFIG_IOCTL_CFG80211 = 1
EXTRA_CFLAGS + = -DRTW_USE_CFG80211_STA_EVENT = 1
endif

3. Type “sudo make” to compile the driver file.

4. Type “sudo make install” to install the driver file.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a58f6a29-b0be-4e99-b5cc-9fbf33e38047%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.1, Debian Stretch VM: audio not working

2016-08-12 Thread RSS
On Fri, 12 Aug 2016 00:37:59 -0700
Andrew David Wong  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-08-10 04:32, RSS wrote:
> > Everything should be update, with Qubes stretch "testing" sources
> > turned on.
> > 
> > This has been broken for a while, is it a known problem? If I try
> > to start it manually with debug turned on, there seems to be zero
> > useful information:
> > 
> > $ pulseaudio --start --log-level=debug -n 
> > --file=/etc/pulse/qubes-default.pa
> > 
> > D: [pulseaudio] conf-parser.c: Parsing configuration file 
> > '/etc/pulse/client.conf'
> > 
> > D: [pulseaudio] conf-parser.c: /etc/pulse/client.conf.d does not
> > exist, ignoring.
> > 
> > E: [pulseaudio] main.c: Daemon startup failed.
> >   
> 
> Yes, this is being tracked here:
> 
> https://github.com/QubesOS/qubes-issues/issues/1927

Cool, and the workaround mentioned there

sudo ln
-s /usr/lib/pulse-8.0/modules/module-vchan-sink.so 
/usr/lib/pulse-9.0/modules/module-vchan-sink.so

still works like a charm.

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160812170542.7e88e230%40armor-mail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: usb 3.0

2016-08-12 Thread Nicola Schwendener
Andrew,
THANK YOU very much. I really really appreciate your work, your answers. 
wish there are more people like you that helps other people getting a clearer 
idea how to do jobs correct.
thank you again and again
Nick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/637778f5-9240-4f3f-a247-d0b8c1ad1584%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.