[qubes-users] qubes keeps shutting down randomly

2016-09-10 Thread 'digitaldijjn' via qubes-users
it mainly seems to be around either updating a vm, vm shutting down, and once 
copying something to another vm. I tried to make sense of the logs, something 
about a writing to a read only config file. I'm using 3.2

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fcf168fa-7543-4048-a8a1-1e725ccfa9b0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Current Windows instructions?

2016-09-10 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-10 16:12, 3n7r0...@gmail.com wrote:
> On Wednesday, August 17, 2016 at 12:43:27 AM UTC, Andrew David Wong wrote:
>>
>> So, as Marek said, in this particular case, the updated package has already 
>> been
>> uploaded to the testing repo for 3.2. If you're on R3.2, and if you're 
>> willing
>> to test this package (and you're certainly under no obligation to do so), 
>> then
>> you can do so now by following the instructions here (under "Testing
>> repositories"):
>>
>> https://www.qubes-os.org/doc/software-update-dom0/#tocAnchor-1-1-3
>>
>> I believe the correct repo is current-testing. If so, your command would be:
>>
>> $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing 
>> 
>>
>> If this is, indeed, the right place, then you can see a list of available
>> packages here (or from the command line):
>>
>> http://yum.qubes-os.org/r3.2/current-testing/dom0/fc23/rpm/
>>
>> The only packages containing the word "windows" are different versions of
>> qubes-windows-tools, so I gather this is what you want. If that's correct,
>> then the command would be:
>>
>> $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing \
>> qubes-windows-tools
>>
> 
> 
> Andrew, I don't see qubes-windows-tools 3.2.x in the
> R3.1-current-testing repo. Is that an oversight or is QWT 3.04 the
> last update for R3.1? I wouldn't expect R3.1 to get any new features
> but if QWT3.2 is improving stability, it'd be great to get it if
> possible.
> 

That's a good question. I can confirm what you're seeing (in terms
of what's available in the Qubes repos), but I'm not sure whether
it's intended.

Rafał, is QWT 3.2 supposed to be available in the R3.1 repo, or is
it only for R3.2?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJX1KyYAAoJENtN07w5UDAwBIMP/0zlqkVIlAUKVdbZFN7onrHd
XYZeKQYoCqm84CkgF2Uzgwq5FI025/au4zYgKnE4ISnBnLJXlXWal4Y9MA8wL0Yk
rDmcBEcC8i1fLvyTYyqszJTXZeY1seG8fHfKz5DWTaegJD9topHBnJpaD3+oZnjz
UsD7O3c3zefujgXABocy9cZG9HwtbK+SHbMVSVajgwpRhqeqAo+Ztt1ZN0aNj64n
IABfilK6fFYdlZX+8GEw+oY5oahb0tvs5GUzJ+Fv1L3TXnpZw6HwjrF9B84nrpvh
VpnoMkeh4tEZWoE2wCrv0bJVCXbWqwhZddAxx1625AJivXSglrQglyBVKs78nQ0P
a9GxJyYZewFdNdFkoJ/pin/gFVSzimlqRShg/kJsfELFWxoO5iEj+xUcM0ozg5SK
Azwsb2EGE83n/yitBrcBYek+9EmHdQiSYAI2OdIXwg/EDuUS3UarulKMkvcTCMDx
yKoO/KDNFz8v2x63CVdWsijulT3hZeitqIoWomuzdt3Bj534x6pAIdv/BcMNnon/
sjwlefXsX/UMCTIwkQAwjAZGfQeu2xulAghis0sK9bOYfe7tVOmK02tO8wPf02My
LqIHnQebJyEtJrgi8mMNIIcTvj5zxCqfITG6OEbj4HN6sJ087vqQBIzknkf/RnLA
92YN6+sSnDkzIGCaDvsB
=/Vvj
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/98707cfd-150f-1abd-0ffe-20743999774f%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installation problems?

2016-09-10 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-10 09:42, Jodie wrote:
> Here it is, as lovely as that photo is. Thanks!
> 
> On Friday, September 9, 2016 at 6:46:03 PM UTC-4, Andrew David Wong wrote:
> On 2016-09-09 13:48, Jodie wrote:
 Version 3.1. What's annoying me is that I can't figure out why this
 is happening. I even have a terrible photo of the install error if
 you want to see it.

 I'm inclined to think that I'm doing something wrong, but can't
 tell what it is that I'm doing wrong.

> 
> Yes, please share the photo of the error.
> 

Thanks. Tracking here:

https://github.com/QubesOS/qubes-issues/issues/2308

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=dixp
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e0621621-d7b2-53eb-7bf9-29b2e31b7f61%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Current Windows instructions?

2016-09-10 Thread 3n7r0py1
On Wednesday, August 17, 2016 at 12:43:27 AM UTC, Andrew David Wong wrote:
> 
> So, as Marek said, in this particular case, the updated package has already 
> been
> uploaded to the testing repo for 3.2. If you're on R3.2, and if you're willing
> to test this package (and you're certainly under no obligation to do so), then
> you can do so now by following the instructions here (under "Testing
> repositories"):
> 
> https://www.qubes-os.org/doc/software-update-dom0/#tocAnchor-1-1-3
> 
> I believe the correct repo is current-testing. If so, your command would be:
> 
> $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing 
> 
> If this is, indeed, the right place, then you can see a list of available
> packages here (or from the command line):
> 
> http://yum.qubes-os.org/r3.2/current-testing/dom0/fc23/rpm/
> 
> The only packages containing the word "windows" are different versions of
> qubes-windows-tools, so I gather this is what you want. If that's correct,
> then the command would be:
> 
> $ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing \
> qubes-windows-tools
> 


Andrew, I don't see qubes-windows-tools 3.2.x in the R3.1-current-testing repo. 
Is that an oversight or is QWT 3.04 the last update for R3.1? I wouldn't expect 
R3.1 to get any new features but if QWT3.2 is improving stability, it'd be 
great to get it if possible.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c842d6f8-d14f-4dcb-8893-809d7f8d26dc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Does anyone use a dedicated Tor router box..?

2016-09-10 Thread Holger Levsen
On Sat, Sep 10, 2016 at 03:23:54PM -0400, Chris Laprise wrote:
> That also misses the point.

yes, somewhat - thanks for making "the point" clearer! :-)
 
> Xen is far smaller and simpler than the kernels that protect Windows and
> Linux, and it has fewer vulnerabilities as a result. Its also worth noting
> that a large number of Xen vulns are either not serious or don't affect
> Qubes... they affect Xen installations configured for maximum features and
> convenience.
> 
> I think the problem Qubes has with the Xen project is that the latter merely
> has a security "focus" (among others) instead of making security their
> number-one priority (as Qubes does). It also doesn't help that they publish
> additional bug-prone code which -- although secure installations like Qubes
> won't trust it -- nevertheless gets reported as simply "Xen vulnerabilities"
> when said bugs are discovered.

I agree, thanks for spelling it out!


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160910224211.GA11208%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


Re: [qubes-users] Installation problems?

2016-09-10 Thread Chris Laprise

Here is the redhat help page for yum errno 256:

https://access.redhat.com/solutions/203603

It looks like yum either cannot access or validate the rpm file shown 
(fedora template). Maybe a read error... What type of media did you 
create, and what is the capacity?


You could try booting with another Linux distro like fedora, and examine 
the boot/install media and the rpm that its complaining about.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17b8c5f8-3891-8562-ccd3-a23599bf79ee%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Post-install config networking failure - VMs cannot start, "Unable to reset PCI device 0000:02:00.0"

2016-09-10 Thread etular via qubes-users
Hey everyone,

I finally got around to setting up Qubes OS 3.1 onto an old laptop of mine - an 
Acer Aspire V3-571. The installation went smoothly, allowing the installer to 
set up all the default settings (and setting up the partitions so it allocated 
all space to the new OS, wiping the old drive), up until the end of the 
post-install configuration, where I was met with this error message: 
https://i.imgur.com/SblbJIC.jpg

I continued the installation, and at this stage, whenever I try to start any of 
the VMs - including sys-net - I'm met with this response:
https://i.imgur.com/VnX1FNJ.jpg

I'm not terrified of the terminal, but I'm not entirely familiar with it 
either. I decided to run the two commands suggested in the post-install 
configuration. Below is "systemctl status qubes-netvm.service", followed by the 
first part of "journalctl -xn":
http://i.imgur.com/FAe6Juu.jpg
http://i.imgur.com/YrGfa1X.jpg

Is anyone familiar with the problem, or have any recommendations on how to 
resolve it? Any information required, if you can let me know how I can access 
it, I'll happily provide it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/036148d5-f675-4845-859c-a26a64d2fa1c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Does anyone use a dedicated Tor router box..?

2016-09-10 Thread Chris Laprise

On 09/10/2016 07:31 AM, Holger Levsen wrote:

Hi,

On Sat, Sep 10, 2016 at 04:08:53AM -0700, neilhard...@gmail.com wrote:

Qubes is insecure due to Xen exploits.

[...]

Considering that Snowden is literally advertised on the Qubes home page, I would suggest 
the answer is "Yes" The NSA is now very likely spending money buying up Xen 
exploits and developing them themselves.

you are mostly right, but you also mostly miss the point ;-)

Of course Qubes is attackable via Xen exploits. Like all the other OSes
are attackable via *other* exploits, which attackers have been
targetting since almost half a century already.

The biggest and most valuable target is still Windows, then MacOS, and
then an attacker also want to own Redhat and Debian, preferedly via holes
in the source codes, to also catch all those other Linux distros.

And, yes, Qubes is attackable via Xen.

(And maybe, one would ignore all those OSes and just attack via Intel ME
or the AMD and ARM equivalents of that..)

So as said, you mostly missed the point. Security ain't binary.


That also misses the point.

Xen is far smaller and simpler than the kernels that protect Windows and 
Linux, and it has fewer vulnerabilities as a result. Its also worth 
noting that a large number of Xen vulns are either not serious or don't 
affect Qubes... they affect Xen installations configured for maximum 
features and convenience.


I think the problem Qubes has with the Xen project is that the latter 
merely has a security "focus" (among others) instead of making security 
their number-one priority (as Qubes does). It also doesn't help that 
they publish additional bug-prone code which -- although secure 
installations like Qubes won't trust it -- nevertheless gets reported as 
simply "Xen vulnerabilities" when said bugs are discovered.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37a4e30d-b4c6-0959-ce80-96abe96dbd6a%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't connect a VPN before Tor

2016-09-10 Thread 3n7r0py1
[First, a rant. I hate mailing lists. How am I supposed to attribute quotes 
from earlier posts in the thread not contained in the previous post?]

nishi:
>Any advices on how to set up Qubes to have a VPN + sys-whonix working together 
>(or VPN + a TorVM proxy) in a good anonymous way would be really appreciated :)

As you know, you can either connect to a VPN from a non-Whonix proxyVM or set 
up the VPN directly in the Whonix-Gateway. Both methods have the goal of 
preventing "unintentional" leaks and have the property of failing-closed. IMO, 
since you are using Qubes already, the proxyVM method is easier to configure 
and provides more flexibility. If you're short on RAM and/or need to operate 
multiple Whonix-Gateways with each having a separate VPN, you may be better off 
connecting to the VPN from within the Gateway. From a security/anonymity 
perspective, neither is obviously better than the other. A Gateway compromise 
would most likely be game-over in either scenario.

Speaking generally, you've got a whole bunch of moving parts. You need to 
troubleshoot by isolating each piece. 

**This step reveals that you use Tor. Only proceed if safe to do so.

1. sys-net <- appVM: Do I have general connectivity?
2. sys-net <- vpn-VM <- appVM: Does my VPN work?
3.** sys-net <- appVM w/ Tor Browser Bundle: Does Tor work?
4.** sys-net <- whonix-gateway: Run whonixcheck. Does Whonix-Gateway work?
5. sys-net <- vpn-vm <- whonix-gateway

My suggestion is to start with a fresh proxyVM and follow Chris' Qubes VPN 
documentation step by step. (Or take a look at his [git 
repo](https://github.com/ttasket/Qubes-vpn-support) ). If the vpn-VM allows 
successful connections from the appVM, then it's simply a matter of assigning 
it to the Whonix-Gateway as its netVM. No Whonix-specific configuration is 
necessary since it's all transparent to Whonix.

* Make sure that the Qubes firewall (Qubes VM Manager) is open on the 
Whonix-Gateway. I don't remember what the default setting is.

* Both TCP and UDP are fine for upstream VPNs. Tor can not carry UDP but it can 
be carried on UDP, if that makes sense.

* Don't add any additional firewalls until you can get this working.


nishi:
>Which gives in Qubes something a pattern like this one below (I don't know if 
>all firewall VMs are really needed though) :
>
>AppVM => sys-vpn-firewall => sys-vpn => sys-whonix-firewall (or 
>TorVM-firewall) => sys-whonix (or TorVM) => sys-firewall => sys-net

Firewalls have limited usefulness as described here: 
https://www.qubes-os.org/doc/data-leaks/

rustybird's Corridor can ensure that all traffic goes to a Tor Entry Guard (but 
obviously, can't guarantee that the Entry Guard is trustworthy).


nishi:
>When I purchased a VPN subscription, I saw it as a way to improve anonymity, 
>now I feel it is more a tool to provide security.

VPNs don't necessarily improve anonymity OR security. They simply shift the 
trust that you place in your ISP to someone else. That may be good or bad.


Chris:
>Although its straightforward to get the opposite working (Tor -> VPN ->
Internet -- just follow the Qubes vpn doc and connect sys-whonix to the
vpn vm)

Just to clarify, to achieve user -> Tor -> VPN -> Internet, sys-whonix needs to 
be connected as the *netVM* for the vpn-vm. If vpn-vm is the netVM for 
sys-whonix, the resulting traffic is user -> VPN -> Tor -> Internet. I may be 
forgetting something, but I believe both configurations work out of the box.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ab52f16-0a3a-4acf-bcc7-ed6153ded7c8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Do Linux browser exploits exist..?

2016-09-10 Thread neilhardley
I've seen some dispute that a Linux browser exploit even exists.

Like, could you take Chrome or Firefox to a page, and then have a remote shell, 
that loads a file onto the hard drive to monitor everything?

I can do this with Metasploit on Windows, but I've actually seen a lot of 
people saying that it's not even possible on Linux.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f493648-b51b-4459-aee2-c2d80881913d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HELLO

2016-09-10 Thread CONIMA CONTE
How are you today,  is my pleasure to come
in contact with you, please i have an urgency
that i will like to share with you as soon as
possible, i will be happy to read from you as
soon as i can.

Best regard
Conima.






-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/VI1PR0901MB13904FD697AB5F6846225F7CA0FD0%40VI1PR0901MB1390.eurprd09.prod.outlook.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't connect a VPN before Tor

2016-09-10 Thread nishiwaka46
Le samedi 10 septembre 2016 04:57:17 UTC+2, Chris Laprise a écrit :
> On 09/08/2016 04:41 AM, nishiwak...@gmail.com wrote:
> > Hello,
> >
> > I am struggling to have VPN work while using it with Tor, I can't have both 
> > work.
> >
> > I tried first to follow Mrs. Rutkowska's tutorial on setting up a clear Tor 
> > proxyVM 
> > https://theinvisiblethings.blogspot.de/2011/09/playing-with-qubes-networking-for-fun.html
> >  but unfortunately I can't make it work.
> >
> > "QUBES_IP=$(xenstore-read qubes_ip)" line doesn't seem to work. If I 
> > replace "(xenstore-read qubes_ip)" with proxyVM's IP then script works but 
> > then I have to set up /etc/tor/torrc to achieve to connect Tor Browser in 
> > another AppVM. I guess this setup is too complicated for me.
> >
> > Then I read whonix documentation 
> > https://www.whonix.org/wiki/Tunnels/Connecting_to_a_VPN_before_Tor, to 
> > check what I need to do to avoid reinstalling my VPN into a whonix gateway 
> > and just use it as a proxy VM before Tor.
> 
> Although its straightforward to get the opposite working (Tor -> VPN -> 
> Internet -- just follow the Qubes vpn doc and connect sys-whonix to the 
> vpn vm) there are wrinkles to iron out when getting it to work as you 
> describe.

Indeed it is easier to make it work the other way, but problem is that even if 
I kinda trust my VPN provider, who claims not to keep connection logs, I don't 
like to have my connection go through 1 spot in 1 country (you can create 
multiple openvpn.conf file, but this is not very convenient to use). I guess 
this is irrelevant to look for anonymity with this bottle neck effect. When I 
purchased a VPN subscription, I saw it as a way to improve anonymity, now I 
feel it is more a tool to provide security.

This is also why I put Tor browser as the #1 service to provide anonymity, 
because even if nodes exit might be observed, you still have possibilities to 
improve this aspect setting up bridges, besides Tor was created by the US Navy 
Research Laboratory, it is not a big surprise to me that the US were involved 
in this project. When you're talking about defense of freedom, how could one 
not show great admiration and love for the US. I know you have people to talk 
shit about US policies, that the US fucked up in Vietnam or Irak, but where 
would be Europe at right now if no young heroic US soldiers to sacrifice their 
lives to defend freedom and help beating nazi rats ? When I see rise of 
nationalism once again in Europe, I am just so ashamed. They don't know what's 
memory, what's bravery. They want another bloody tyrant on one continent in the 
future, they want the end of time ? Fuck this. Welcome the refugees, stop 
hating.

> Since the solution is Tor-specific, probably the best place to start is 
> trying create the whole setup in Whonix-Qubes using the Whonix doc you 
> referenced. The Whonix forum should be able to help you with any 
> specific issues when following their directions.
> 
> Chris

Ok thank you, I'll find out what I can do setting up Whonix. Maybe this will 
fix my issue https://www.whonix.org/wiki/Bridges#How_to_use_bridges_in_Whonix

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a223e934-58d5-4cd8-ba29-35cc330b4858%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Does anyone use a dedicated Tor router box..?

2016-09-10 Thread neilhardley
Qubes is insecure due to Xen exploits.

Qubes tends to quickly patch the exploits, but we know how it works in the real 
world... nation states and other people buy up the exploits before they can get 
to the market.

I would also suggest that if you are using Qubes, this may even be a flag at 
somewhere like the NSA to target you for surveillance.

I could be wrong, but see the NSA Snowden documents mentioning "extremist" 
Tails OS.

So if you assume that simply using Qubes puts you on a nation state's attention 
list... then, at this point, the question is.. do you think the NSA has Xen 
exploits before everyone else finds out about them...?

Considering that Snowden is literally advertised on the Qubes home page, I 
would suggest the answer is "Yes" The NSA is now very likely spending money 
buying up Xen exploits and developing them themselves.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6947f09a-c605-417c-b591-ec2a2d85f90e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Does anyone use a dedicated Tor router box..?

2016-09-10 Thread jkitt
On Friday, 9 September 2016 09:56:36 UTC+1, neilh...@gmail.com  wrote:
> the problem with Qubes, of course, is all the Xen exploits which make it 
> insecure.

Off-topic here but is Qubes really insecure? Should I be worried?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0bf7258b-b7c6-43e3-8e93-6068cf8e7614%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Split dm-crypt 0.1.0

2016-09-10 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

> https://github.com/rustybird/qubes-split-dm-crypt

If anyone has been using this already, please update to version 0.1.1
which contains a security bugfix.

Rusty
-BEGIN PGP SIGNATURE-
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=Fe+2
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bdb4d6e6-7ce6-3cea-4dea-aa8479f63bf6%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Split dm-crypt 0.1.0

2016-09-10 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Andrew!

>> https://github.com/rustybird/qubes-split-dm-crypt

> This looks great, Rusty! Thank you!

I actually took the modern luksFormat parameters from your writeup at
https://www.qubes-os.org/doc/encryption-config/. The 5 sec iteration
time hits a nice balance.

Rusty
-BEGIN PGP SIGNATURE-
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=LfiK
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/716cac4a-1de8-8ef8-97e0-d07d72b88663%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.