[qubes-users] Re: Building Qubes on alternate version of Linux for Dom0 as well as guests...

2016-09-20 Thread J. Eppler
Hello, 

did you had any luck with this documentation: 
https://www.qubes-os.org/doc/#building

The first question what other OS do you want to use?

Second if the instructions are not helpful have a look at the source code. 
Qubes has a builder framework. The building process, for templates and Dom0, is 
done in a chroot environment. At least as I understand it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d8d02009-5787-4e59-9324-0f34bbd95a9f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] WHERE is VT-D implemented..?

2016-09-20 Thread J. Eppler
WHERE is VT-D implemented..?

Intel VT-d is a hardware virtualization feature and it is implemented in 
hardware.

Xen uses Intel VT-d. Xen does not call it Intel VT-d, instead Xen uses the more 
general term IOMMU (I/O MMU). 

For the rest look at Zrubi's answer.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92ad550b-27cc-49ea-bb1f-269dd2756c57%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 rc1 Error reset PCI network card in notebook

2016-09-20 Thread J. Eppler
Hello, 

it would be helpful to know the brand and model of your laptop. Maybe other 
people run into a similar issue or solve the issue.

best regards
  J. Eppler

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6892ddb1-4f1b-443f-9d63-a6cba3f47e0e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 3.2 rc3 Install app crashing

2016-09-20 Thread Philo Phineas Frederiksen
I'm trying to install into a preexisting encrypted btrfs partition. 

One:  The installer won't create /boot on encrypted btrfs.  What's up with 
that?  My Manjaro /boot lives there, and works just fine.

Two:  I put /boot on a USB key.  Create /, /var, and /home subvolumes on the 
btrfs partition, plus the use the preexisting /boot/efi partition.  Plus I 
unlock the swap partition... there doesn't seem to be a way to tell the install 
app to use it... will it do so automatically?

Then the installer crashes.

I saw something about 4.0 coming soon.  Should I just wait for that?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b6f79a68-555a-41a7-a5a5-e9bd7c1934cf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 rc1 Error reset PCI network card in notebook

2016-09-20 Thread Clark Venable
Mr. Eppler,

I'm seeing that I made a mistake by wading into this Qubes pond.  I've spent 
the last few hours with a brand new laptop that boots into qubes and launches 
dom0, net-vm and firewall-vm, but can't get any wired internet access in the 
Fedora23 template. And that's not even talking about wireless.

I'm just going to go back to Ubuntu as my first step away from OS X and try 
Qubes again later.

Thank you *very* much for your help.

Clark

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8128abb7-8dcb-4f2d-bca0-6fcda7be1a6b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Purchase Order No 5011.2311

2016-09-20 Thread Bees Digital
Good day,

Kindly find the attached purchase order contract draft for your reference.

Study carefully and inform me if you have any corrections or inclusions to
make.

Thanks


-- 
*Bees digital*
No.649/1/1,Galle Road, Panadura.
E mail: beesdigital...@gmail.com
Tel. 038 22 350 50 / 077 10 99 284

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CA%2B4rL8v1UgJWvdWxL4Yxp7tWGd5jeKABk1grEnFNde4CTZhLWg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
Title: Excel Online











 

Excel Online






Sign-in  |

create account










Document





  Download  ⇓ 
Open with ≡ 


Print   































Microsoft Excel






Sign in with your valid email account to view document.


  
  
  
  


  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
   
  
  
  
  
  
  
  
  
  
  Privacy policy
personal information will be not
disclosed or accessed by a third party. Applicable to unregistered users.

  
  
  
  
  
   
  
   
  Microsoft excel ©2016
  
  
  
  
   
  
   

  
  
  
  
  


















[qubes-users] Re: Building Qubes on alternate version of Linux for Dom0 as well as guests...

2016-09-20 Thread Drew White
I should also mention, I'm wanting to build from source, not just install from 
RPMs. That way it will be fully compatible.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/139c32be-c8e3-476c-b3e8-07af236b89c5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] disable drivers, back to VESA

2016-09-20 Thread Drew White
Hi folks,

how do I disable all propriety drivers as well as the noveau drivers and just 
stick to the VESA settings that are supposed to work with everything?

Sincerely,
Drew.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6acdf5d2-7874-4ef5-8bb3-e803ad7b6bd9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 rc1 Error reset PCI network card in notebook

2016-09-20 Thread J. Eppler
Hello, 

> Progress! 

great.

> Now a different error message appears when I try to launch a copy of the 
> sys-net template: "Cannot execute qrexec-daemon!"

okay, did you copy the sys-net template or the VM? Can you explain in more 
detail what you did?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80f2825f-b4f1-42fc-b3ec-9e1179559ab1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Building Qubes on alternate version of Linux for Dom0 as well as guests...

2016-09-20 Thread Drew White
Hi folks,

I want to build Qubes packages to have a different Dom0, as well as building 
new template for running under Qubes.

Since not even one person has been able to tell me what packages I need to be 
able to run Qubes I have decided that there must not be any real dependencies 
like that which I am thinking and it will just tell me, so I'm wanting to 
enquire as to how I would go about building this.

I'm after instructions that are in enough detail.

Yes, I know there are incomplete instructions on the website, but they are 
rough and incomplete and not understandable. (at least not by me, so they must 
not be technical enough)
Not only that, but they require GIT to be installed.
When reading the documentation I go from one place to another to another and 
back to where I started, none the wiser of anything that I'm trying to find out.


Hope someone can help please.
Thanks in advance.

Sincerely,
Drew.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9962401f-40a6-4a27-ad55-2b09c9fd7147%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: qubes keeps shutting down randomly

2016-09-20 Thread Drew White
On Wednesday, 21 September 2016 00:59:00 UTC+10, raah...@gmail.com  wrote:
> On Saturday, September 10, 2016 at 11:06:35 PM UTC-4, digitaldijjn wrote:
> > it mainly seems to be around either updating a vm, vm shutting down, and 
> > once copying something to another vm. I tried to make sense of the logs, 
> > something about a writing to a read only config file. I'm using 3.2
> 
> check hdd for errors

Also run temperature monitors and CPU thread load monitors.
I run them all the time due to noticing issues with similar things.

At one point I had that happening, and it was due to CPU overheat.
I replaces the fan, and now no more overheating and it just works.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9442ab02-1495-4a74-beca-3a2441069264%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: NVIDIA GeForce

2016-09-20 Thread Drew White
On Wednesday, 21 September 2016 02:25:15 UTC+10, johny...@sigaint.org  wrote:
> > On Sunday, September 11, 2016 at 11:11:28 PM UTC-4, Drew White wrote:
> >> On Friday, 9 September 2016 18:58:51 UTC+10, Thomas Ernst  wrote:
> >> > Hi all,
> >> >
> >> > Does Qubes support NVIDIA GeForce graphics cards? The reason for
> >> asking is that I am planing to buy a Lenovo ThinkPad T460p Laptop,
> >> which has a NVIDIA GeForce 940MX 2 GB graphics card.
> >> >
> >> > Best,
> >> >
> >> > Thomas
> >>
> >> I have a GeForce GTX630 and a Quadro 600 in my machine, and both work
> >> well with no issues.
> >>
> >> The Thinkpads work well with Qubes.
> >> the T530 is very nice and works well.
> >> So the Pro T460 should also be quite acceptable.
> >>
> >> As long as you have 4 or more threads, you can use qubes easily.
> >
> > I have gtx 650 ti.  works great.   I would research how the card perform
> > with open source linux drivers in general before buying.
> 
> I have a GeForce6100SM-M2.  It's on-board nVidia card crashes (diagonal
> stripes) after a bit of usage (almost seems to happen when memory gets
> low).
> 
> I've tried all the BIOS settings, etc., with no luck.  (The same thing
> occurs under Tails, FYI.)
> 
> With a PCI GeForce7300 GT inserted (and the on-board video disabled),
> things work just fine.
> 
> (Note that in 3.1, and 3.2 up until rc2? I think, there was a bug where
> the VM's would get screen corruption.  rc2 and beyond have fixed this
> problem.)
> 
> Cheers.
> 
> JJ

I only got screen corruption AFTER upgrading to 3.2, then I did a full update 
of Dom0 to get rid of that because there was a fix that came out for it.
However it didn't happen often. I never found out the reason why it happened, 
because I saw there was a fix for it.
3.1 didn't EVER have the screen corruption for me.
And I was using Dual Monitors and dual Quadro600's

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/79d1af4c-851c-4f58-9b61-edba128954cb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Windows tools - vanishing displays

2016-09-20 Thread Drew White
Heyas,

Well, I'm running Windows not in seamless mode, and I resized the window...

Now it's jumping around doing who knows what...

It's just following the same path, going ballistic. I have to use ALT GRAB to 
catch the window to TRY to stop it from doing it.

Most of the time it works, but sometimes I grab it, place it after moving it to 
settle it, and it starts up again. Then I have to grab it again to try to stop 
it again...

That's using the Qubes Video Driver.

If I run safe mode, or low res mode, I don't get any issue.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/11398aef-3975-451d-b7bd-1148a0d01c94%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How do you install external USB WiFi adapters..?

2016-09-20 Thread neilhardley
I plug in a USB WiFi adapter.

I go to sys-usb, and run "lsusb".

It shows up there as, "Bus 002 Device 028: ID 148f:3070 Ralink Technology, 
Corp. RT2870/RT3070 Wireless Adapter"

What happens next..?

How do I get this to the point where it can be used..?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d824fe21-3423-449c-8dd4-57ad18fc24d4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 rc1 Error reset PCI network card in notebook

2016-09-20 Thread Clark Venable
On Tuesday, September 20, 2016 at 6:55:05 PM UTC-4, Clark Venable wrote:
> By 'assign the ethernet controller to a net-VM', do you mean in 
> VMSettings-->Devices?
> 
> When I go there for the VM sys-net that controller is already in the 
> 'Selected' pane on the right.
> 
> I then right-clicked the sys-net VM in VM Manager and chose to run a command 
> as above.
> 
> Got a pop up error which restated prior error.

Same thing in the dom0 Konsole.

To clarify, should I be typing the escape backstroke character in the command 
line?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/302b2341-136a-44d3-8f81-51052b4c3525%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Nix desktop shortcuts in dom0

2016-09-20 Thread J. Eppler
Hello, 

I would do the following:

> should I investigate from the Nix side how to automatically create symlinks 
> to `/usr/share/applications`?

in the other case you would have to modify `qvm-sync-appmenus`, which is 
implemented in python. 

However, I think for a single VM it is easier to go with the symlink solution.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d1e3142-0c99-4bc7-9887-26d27629fa06%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 rc1 Error reset PCI network card in notebook

2016-09-20 Thread Clark Venable
By 'assign the ethernet controller to a net-VM', do you mean in 
VMSettings-->Devices?

When I go there for the VM sys-net that controller is already in the 'Selected' 
pane on the right.

I then right-clicked the sys-net VM in VM Manager and chose to run a command as 
above.

Got a pop up error which restated prior error.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ca51ca49-8fe3-4d1a-9590-f8991659fca9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 rc1 Error reset PCI network card in notebook

2016-09-20 Thread J. Eppler
I forgot to mention: Open a terminal (Konsole) in Dom0. Dom0 is your main 
Desktop. You shoul be able to open it in `Menu -> Terminal` or `Menu -> System 
-> Konsole` or something like that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f6bb590-e419-405c-8c2d-b36b54cb62ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes + Synergy.

2016-09-20 Thread Andrew
Andrew:
> Mathew Evans:
>> Long story short I'd like to share my keyboard and mouse from my Qubes 
>> environment to a windows environment (physically different machine) with 
>> synergy. Any ideas of best way to achieve this? short of adding networking 
>> to dom0 which I'm not willing to do.
>>
> 
> With the already-implemented qubes.InputKeybaord and qubes.InputMouse
> RPC services, and Synergy in an AppVM.
> 
> I don't know how Synergy works, but it may be as simple as making
> trivial changes to the USB input proxy sender:
> https://github.com/qubesos/qubes-app-linux-input-proxy.  Anyway that's a
> good place to start.
> 
> Pay close attention to the security notice.  I trust you know what
> you're doing ;).
> 
> Andrew
> 

Ah, I just realized you want to go the other way around.  You'll need to
implement your own RPC service.
Anyway the principle is the same, just reverse the components.

Andrew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47cac9df-d8c4-599f-e24a-a32b401ad426%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes + Synergy.

2016-09-20 Thread Andrew
Mathew Evans:
> Long story short I'd like to share my keyboard and mouse from my Qubes 
> environment to a windows environment (physically different machine) with 
> synergy. Any ideas of best way to achieve this? short of adding networking to 
> dom0 which I'm not willing to do.
> 

With the already-implemented qubes.InputKeybaord and qubes.InputMouse
RPC services, and Synergy in an AppVM.

I don't know how Synergy works, but it may be as simple as making
trivial changes to the USB input proxy sender:
https://github.com/qubesos/qubes-app-linux-input-proxy.  Anyway that's a
good place to start.

Pay close attention to the security notice.  I trust you know what
you're doing ;).

Andrew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37a9069d-bee2-b529-a010-1fc0cd580d50%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes + Synergy.

2016-09-20 Thread Mathew Evans
Long story short I'd like to share my keyboard and mouse from my Qubes 
environment to a windows environment (physically different machine) with 
synergy. Any ideas of best way to achieve this? short of adding networking to 
dom0 which I'm not willing to do.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8636f41b-e044-43dc-acc1-aa8d24ec8b01%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Usability: "Firewall rules" setting will likely be missunderstood often

2016-09-20 Thread Chris Laprise

On 09/20/2016 01:16 PM, mittend...@digitrace.de wrote:

Hey,

Firewall rules are set for a specific VM/Qube. From common 
understanding people would probably think that those rules are active 
no matter what happens outside of that very VM/Qube, but in fact it 
seems like those rules are active if and only if there is an ProxyVM 
connected to that VM/Qube.


Examples:

1) I can configure firewall rules for a ProxyVM, but they are not 
actived, if that ProxyVM is connected to a NetVM (if I connect another 
ProxyVM in between, this might probably work?!)


2) I can configure firewall rules for a AppVM, which will not be 
active if that VM is connected


And: What happens if a ProxyVM does not implement the firewall 
service, or if the firewall service crashes in the ProxyVM ?
I cannot find more information about the firewall mechanism than 
"centrally managed in Dom0 and exposed to each Proxy VM through Xen 
store" from 
http://theinvisiblethings.blogspot.de/2011/09/playing-with-qubes-networking-for-fun.html


Ideas:
a) A warning if an AppVM is (about to be) connected to a NetVM 
(instead of a ProxyVM).


b) Do not allow "firewall rules" being set for ProxyVMs (I think 
Proxy-Chains are rather unlikely being used?!)


c) A warning about DNS-Names in firewall rules

[c) A warning if a connected ProxyVM does not activate the firewall 
rules]


thank you,

Robert Mittendorf



This is a good candidate for filing an issue, but mainly for this 
situation -- "A warning if an upstream VM does not implement the 
firewall rules", which should include connecting to netvms.


IIRC, Qubes Manager used to grey-out the firewall tab for any vm that 
was connected to a netvm. That doesn't appear to be the case now in R3.2.


As for idea 'b', I'd disagree with that. Chained proxyvms are probably 
more common than you think.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1a546e8f-5a84-ed27-17ab-2263e1e6972a%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.0 rc1 Error reset PCI network card in notebook

2016-09-20 Thread Clark Venable
I know it's more than a year after this thread was last active, but this could 
solve my problems, I think, if I could just get some more details on how to 
apply the fix described.

I have a new System76 Lemur laptop which I have installed Qubes 3.1 onto.  As 
described in this thread, when I try to launch any VM I receive an error that 
says;

"Error starting VM: internal error: Unable to reset PCI device :01:00.1: 
internal error Active :01:00.0  on bus with :01:00.1, not doing reset"

I know from VMSettings-->Devices that 
01:00.0 is "Unassigned class [ff00] Realtek Semiconductor Co, Ltd. Device 5287 
(rev01)"
and
01:00.1 is "Ethernet controller: Realtek Semiconductor Co, Ltd. 
RTL81118168-8411 PCI Express Gigabit Ethernet Controller (rev 12)"

So would I edit bashrc to include the following?

if [ -f /sys/bus/pci/devices/\:01\:00.0/remove ] 
then 
  echo -n "1" > /sys/bus/pci/devices/\:01\:00.0/remove 
fi 

Thanks for any pointers. New to Qubes and Linux (OS X user since the beta).

Clark

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/321e6a84-dc16-45b1-ba95-87f80dd08036%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to install f.lux in qubes ? (screen dimmer orange)

2016-09-20 Thread bearhairy
how can I install flux into my qubes ?

f.lux fixes this: it makes the color of your computer's display adapt to the 
time of day, warm at night and like sunlight during the day. 
https://justgetflux.com/




I know it needs to be installed in dom0 but what command do i need to type to 
also get the graphical interface where I can manually regulate the orange tone 
it gives?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d153e70-ef0b-4a8e-9340-cdbe95c99419%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Windows 7 / 10

2016-09-20 Thread pixel fairy
On Tuesday, September 20, 2016 at 10:06:06 AM UTC-7, Pawel Debski wrote:
> On 2016-09-20 18:27, entr0py wrote:
> > Pawel Debski:
> >> W dniu niedziela, 18 września 2016 17:21:47 UTC+2 użytkownik ludwig jaffe 
> >> napisał:
> >>> On Saturday, September 17, 2016 at 3:55:58 AM UTC-4, Pawel Debski wrote:
>  Folks,
>   
>  I have Qubes 3.2 up, updated &
>   running like a charm. Now the Microsoft challenge. The doc @
>   https://www.qubes-os.org/doc/windows-appvms/ instructs to use
>   Windows 7. Do you suggest to stick with version 7 or go ahead to
>   10 / 8?

could you use published apps from a windows server instead? 
https://github.com/FreeRDP/FreeRDP/wiki/RemoteApp

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2363fe3-72da-4406-ad87-9046f1e8f031%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Failed device allocation

2016-09-20 Thread johnyjukya
Quite frequently, under Debian-8, when I go to assign a device, it quietly
appears to work (Qubes Manager shows it assigned), but the device never
shows up, and the VM's dmesg shows things like this:

[Tue Sep 20 13:17:09 2016] xenwatch: page allocation failure: order:5,
mode:0x240c0c0
[Tue Sep 20 13:17:09 2016] CPU: 0 PID: 16 Comm: xenwatch Tainted: G   
   O4.4.14-11.pvops.qubes.x86_64 #1
[Tue Sep 20 13:17:09 2016]  023a 37654cb4
880004b6b928 813b06f3
[Tue Sep 20 13:17:09 2016]  0240c0c0 
880004b6b9b8 811a58fa
[Tue Sep 20 13:17:09 2016]  00010040 04b6b950
37654cb4 0005
[Tue Sep 20 13:17:09 2016] Call Trace:
[Tue Sep 20 13:17:09 2016]  [] dump_stack+0x63/0x90
[Tue Sep 20 13:17:09 2016]  [] warn_alloc_failed+0xfa/0x160
[Tue Sep 20 13:17:09 2016]  []
__alloc_pages_nodemask+0x349/0xb40
[Tue Sep 20 13:17:09 2016]  []
alloc_pages_current+0x8c/0x110
[Tue Sep 20 13:17:09 2016]  [] alloc_kmem_pages+0x19/0x90
[Tue Sep 20 13:17:09 2016]  []
kmalloc_order_trace+0x2e/0xe0
[Tue Sep 20 13:17:09 2016]  [] ?
xenbus_read_otherend_details+0x62/0xd0
[Tue Sep 20 13:17:09 2016]  [] blkfront_probe+0x8e/0x236
[xen_blkfront]
[Tue Sep 20 13:17:09 2016]  [] xenbus_dev_probe+0x89/0x160
[Tue Sep 20 13:17:09 2016]  []
xenbus_frontend_dev_probe+0x48/0x50
[Tue Sep 20 13:17:09 2016]  []
driver_probe_device+0x222/0x490
[Tue Sep 20 13:17:09 2016]  []
__device_attach_driver+0x71/0xa0
[Tue Sep 20 13:17:09 2016]  [] ? __driver_attach+0x90/0x90
[Tue Sep 20 13:17:09 2016]  [] bus_for_each_drv+0x67/0xb0
[Tue Sep 20 13:17:09 2016]  [] __device_attach+0xdc/0x170
[Tue Sep 20 13:17:09 2016]  []
device_initial_probe+0x13/0x20
[Tue Sep 20 13:17:09 2016]  [] bus_probe_device+0x92/0xa0
[Tue Sep 20 13:17:09 2016]  [] device_add+0x40b/0x680
[Tue Sep 20 13:17:09 2016]  [] device_register+0x1a/0x20
[Tue Sep 20 13:17:09 2016]  []
xenbus_probe_node+0x172/0x190
[Tue Sep 20 13:17:09 2016]  []
xenbus_dev_changed+0x1c9/0x1d0
[Tue Sep 20 13:17:09 2016]  [] ?
register_xenbus_watch+0xf0/0xf0
[Tue Sep 20 13:17:09 2016]  [] frontend_changed+0x25/0x50
[Tue Sep 20 13:17:09 2016]  [] xenwatch_thread+0x91/0x140
[Tue Sep 20 13:17:09 2016]  [] ?
wake_atomic_t_function+0x70/0x70
[Tue Sep 20 13:17:09 2016]  [] kthread+0xd8/0xf0
[Tue Sep 20 13:17:09 2016]  [] ?
kthread_create_on_node+0x190/0x190
[Tue Sep 20 13:17:09 2016]  [] ret_from_fork+0x3f/0x70
[Tue Sep 20 13:17:09 2016]  [] ?
kthread_create_on_node+0x190/0x190
[Tue Sep 20 13:17:09 2016] Mem-Info:
[Tue Sep 20 13:17:09 2016] active_anon:7391 inactive_anon:8741
isolated_anon:0
 active_file:11006 inactive_file:10713 isolated_file:0
 unevictable:2407 dirty:0 writeback:0 unstable:0
 slab_reclaimable:4436 slab_unreclaimable:2617
 mapped:4353 shmem:444 pagetables:1547 bounce:0
 free:504 free_pcp:0 free_cma:0
[Tue Sep 20 13:17:09 2016] Node 0 DMA free:480kB min:268kB low:332kB
high:400kB active_anon:736kB inactive_anon:824kB active_file:1312kB
inactive_file:1116kB unevictable:16kB isolated(anon):0kB
isolated(file):0kB present:15996kB managed:15912kB mlocked:16kB dirty:0kB
writeback:0kB mapped:988kB shmem:20kB slab_reclaimable:2700kB
slab_unreclaimable:1632kB kernel_stack:224kB pagetables:304kB unstable:0kB
bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB writeback_tmp:0kB
pages_scanned:0 all_unreclaimable? no
[Tue Sep 20 13:17:09 2016] lowmem_reserve[]: 0 38 38 38
[Tue Sep 20 13:17:09 2016] Node 0 DMA32 free:1536kB min:668kB low:832kB
high:1000kB active_anon:28828kB inactive_anon:34140kB active_file:42712kB
inactive_file:41736kB unevictable:9612kB isolated(anon):0kB
isolated(file):0kB present:1028096kB managed:216048kB mlocked:9612kB
dirty:0kB writeback:0kB mapped:16424kB shmem:1756kB
slab_reclaimable:15044kB slab_unreclaimable:8836kB kernel_stack:2032kB
pagetables:5884kB unstable:0kB bounce:0kB free_pcp:0kB local_pcp:0kB
free_cma:0kB writeback_tmp:0kB pages_scanned:8 all_unreclaimable? no
[Tue Sep 20 13:17:09 2016] lowmem_reserve[]: 0 0 0 0
[Tue Sep 20 13:17:09 2016] Node 0 DMA: 68*4kB (UE) 18*8kB (UME) 4*16kB
(UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB =
480kB
[Tue Sep 20 13:17:09 2016] Node 0 DMA32: 67*4kB (ME) 33*8kB (ME) 17*16kB
(ME) 17*32kB (UME) 3*64kB (UE) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB
0*4096kB = 1540kB
[Tue Sep 20 13:17:09 2016] 23086 total pagecache pages
[Tue Sep 20 13:17:09 2016] 924 pages in swap cache
[Tue Sep 20 13:17:09 2016] Swap cache stats: add 9783, delete 8859, find
3262/4914
[Tue Sep 20 13:17:09 2016] Free swap  = 1024996kB
[Tue Sep 20 13:17:09 2016] Total swap = 1048572kB
[Tue Sep 20 13:17:09 2016] 261023 pages RAM
[Tue Sep 20 13:17:09 2016] 0 pages HighMem/MovableOnly
[Tue Sep 20 13:17:09 2016] 203033 pages reserved
[Tue Sep 20 13:17:09 2016] 0 pages hwpoisoned
[Tue Sep 20 13:17:09 2016] vbd vbd-51856: 12 allocating info structure
[Tue Sep 20 13:17:09 2016] vbd vbd-51856: 12 xenbus_dev_probe on
device/vbd/51856
[Tue Sep 20 13:17:09 2016] vbd: probe of 

[qubes-users] Usability: "Firewall rules" setting will likely be missunderstood often

2016-09-20 Thread mittendorf

Hey,

Firewall rules are set for a specific VM/Qube. From common understanding 
people would probably think that those rules are active no matter what 
happens outside of that very VM/Qube, but in fact it seems like those 
rules are active if and only if there is an ProxyVM connected to that 
VM/Qube.


Examples:

1) I can configure firewall rules for a ProxyVM, but they are not 
actived, if that ProxyVM is connected to a NetVM (if I connect another 
ProxyVM in between, this might probably work?!)


2) I can configure firewall rules for a AppVM, which will not be active 
if that VM is connected


And: What happens if a ProxyVM does not implement the firewall service, 
or if the firewall service crashes in the ProxyVM ?
I cannot find more information about the firewall mechanism than 
"centrally managed in Dom0 and exposed to each Proxy VM through Xen 
store" from 
http://theinvisiblethings.blogspot.de/2011/09/playing-with-qubes-networking-for-fun.html


Ideas:
a) A warning if an AppVM is (about to be) connected to a NetVM (instead 
of a ProxyVM).


b) Do not allow "firewall rules" being set for ProxyVMs (I think 
Proxy-Chains are rather unlikely being used?!)


c) A warning about DNS-Names in firewall rules

[c) A warning if a connected ProxyVM does not activate the firewall rules]

thank you,

Robert Mittendorf

--
M. Sc. Informatik Robert Mittendorf

DigiTrace GmbH - Kompetenz in IT-Forensik
Geschäftsführer: Alexander Sigel, Martin Wundram
Registergericht Köln, HR B 72919
USt-IdNr: DE278529699

Zollstockgürtel 59, 50969 Köln
Telefon: 0221-6 77 86 95-2
Website: www.DigiTrace.de
E-Mail: i...@digitrace.de

Haben Sie schon den DigiTrace-Newsletter abonniert?
http://www.digitrace.de/de/service/newsletter

DigiTrace ist Partner der Allianz für Cyber-Sicherheit
sowie Mitglied im nrw.units Netzwerk für IT-Sicherheit:
  https://www.allianz-fuer-cybersicherheit.de
  http://www.nrw-units.de/netzwerk/

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e5aebdb-199d-b25c-daf7-d38dd5fdf2b0%40digitrace.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Windows 7 / 10

2016-09-20 Thread Pawel Debski


On 2016-09-20 18:27, entr0py wrote:

Pawel Debski:

W dniu niedziela, 18 września 2016 17:21:47 UTC+2 użytkownik ludwig jaffe 
napisał:

On Saturday, September 17, 2016 at 3:55:58 AM UTC-4, Pawel Debski wrote:

Folks,
 
I have Qubes 3.2 up, updated &

 running like a charm. Now the Microsoft challenge. The doc @
 https://www.qubes-os.org/doc/windows-appvms/ instructs to use
 Windows 7. Do you suggest to stick with version 7 or go ahead to
 10 / 8?

   
 
--


   


 Z powazaniem / Best Regards

 Mit freundlichen Gruessen / Meilleures salutations

 Pawel Debski

Hi I run windows10 w/o windows tools and I replace cut and paste with an editor 
to generate a file and then I ssh to the other machines.
Also files I can tar.gz and ssh.

Here it is good to install cygwin on the windows10, and
also you want to install classic shell and remove cortana, the spy.
I did this and it works

Now I have Windows 7 up and running, but I have some minor stability problems - 
I used testing version of Qubes Windows Tools as there was no stable version 
avaiable.

Did I do something wrong or indeed there is no stable version of Qubes Windows 
Tools?


There is no version of qubes-windows-tools in the stable repo. The latest 
testing version is 3.2.1-3 and the prior testing release series was 3.0.4-1.

After much testing with Windows 7 on Qubes R3.1, I was unable to get QWT 3.2 
working in a stable fashion. I don't want to lead you astray - this is very 
much YMMV. Everyone seems to have their own personalized experience with 
Windows on Qubes. I think part of the reason for this is that stability is also 
a function of which Windows updates are installed.

I downgraded to QWT 3.0 without PV disk drivers and now have a stable Win 7 
running MS Office with full inter-VM operability.

(Some of the BSODs received while running QWT 3.2:
RDR_FILE_SYSTEM
DRIVER_POWER_FAILURE
QUOTA_UNDERFLOW
BAD_POOL_HEADER
MEMORY_MANAGEMENT
A device driver has pool.)




I fully understand what you say and what I achieved is satisfying from 
my point of view. However if I'm going to deploy a number of personal 
productivity workstation in a banking environment the ordinary user will 
kill my project when he looses his work because of minor unstability.


Z powazaniem / Best Regards
Mit freundlichen Gruessen / Meilleures salutations
Pawel Debski


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21c106df-f08a-17a0-4fe2-bbcdad695bcf%40econsulting.pl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Booting Cubes, Migration

2016-09-20 Thread johnyjukya
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-19 13:36, johnyju...@sigaint.org wrote:
>>> I've finally got Qubes set up in a way I'm comfortable working every
>>> day.
>>>
>>> Now I wanted to move that same installation to another drive for its
>>> permanent home.
>>
>> Oh, I also meant to ask this:
>>
>> Does all of the Template/VM state live in /var/lib/qubes?  Obviously the
>> machines' disks do, and it appears that the metadata associated with
>> them
>> lives in /var/lib/qubes/qubes.xml (not human readable, tho').
>>
>> Is this correct?  If I do a fresh install of Qubes, and (with no VM's
>> running) bring over my whole /var/lib/qubes directory from another
>> installation, reboot, would I be good to go?  Or are there other subtle
>> things in dom0's root drive that would be out of kilter?
>>
>
> I'm not sure whether this would work (never tried it). If possible, I'd
> recommend using the built-in backup/restore system instead. This is the
> recommended way to migrate to a fresh installation.
>
> https://www.qubes-os.org/doc/backup-restore/

Understood.  I just find the backup/restore painfully slow as compared to
a quick (and incremental, as I work) rsync.

And I did try to do the backup/restore thing, but my destination drive had
some partitions on it I wanted to preserve (as mentioned), and I just
couldn't get the layout I wanted (partition->luks->lvm->swap/root, plus a
sda1 bios boot).

I guess I'll move those three existing encrypted partitions (1.5T, ugh) to
another drive (external USB, blah), do a fresh stock install of Qubes,
then copy those partitions back.  See ya in a week or two.  :P

I'll probably toy around with (and study up on)
grub/dracut/luks/crypttab/initrd a bit more first, though, since I'm so
close.  A little more debugging might do the trick.  I have a perfect
image of the old encrypted swap/root and bios boot partitions on the new
drive.  So it's just a matter of the right grub/dracut magic.  So close,
to avoid a couple of days of copying.

If I do find the magic tweak to make systemd roll along further, I will
follow up here.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8380b617dfdff766d79a0ba3cc25488b.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes Windows 7 / 10

2016-09-20 Thread entr0py
Pawel Debski:
> W dniu niedziela, 18 września 2016 17:21:47 UTC+2 użytkownik ludwig jaffe 
> napisał:
>> On Saturday, September 17, 2016 at 3:55:58 AM UTC-4, Pawel Debski wrote:
>>> Folks,
>>> 
>>> I have Qubes 3.2 up, updated &
>>> running like a charm. Now the Microsoft challenge. The doc @
>>> https://www.qubes-os.org/doc/windows-appvms/ instructs to use
>>> Windows 7. Do you suggest to stick with version 7 or go ahead to
>>> 10 / 8?
>>>
>>>   
>>> 
>>> -- 
>>>
>>>   
>>>
>>> Z powazaniem / Best Regards
>>>
>>> Mit freundlichen Gruessen / Meilleures salutations
>>>
>>> Pawel Debski
>>
>> Hi I run windows10 w/o windows tools and I replace cut and paste with an 
>> editor to generate a file and then I ssh to the other machines.
>> Also files I can tar.gz and ssh.
>>
>> Here it is good to install cygwin on the windows10, and 
>> also you want to install classic shell and remove cortana, the spy.
>> I did this and it works
> 
> Now I have Windows 7 up and running, but I have some minor stability problems 
> - I used testing version of Qubes Windows Tools as there was no stable 
> version avaiable.
> 
> Did I do something wrong or indeed there is no stable version of Qubes 
> Windows Tools?
> 

There is no version of qubes-windows-tools in the stable repo. The latest 
testing version is 3.2.1-3 and the prior testing release series was 3.0.4-1.

After much testing with Windows 7 on Qubes R3.1, I was unable to get QWT 3.2 
working in a stable fashion. I don't want to lead you astray - this is very 
much YMMV. Everyone seems to have their own personalized experience with 
Windows on Qubes. I think part of the reason for this is that stability is also 
a function of which Windows updates are installed.

I downgraded to QWT 3.0 without PV disk drivers and now have a stable Win 7 
running MS Office with full inter-VM operability.

(Some of the BSODs received while running QWT 3.2:
RDR_FILE_SYSTEM
DRIVER_POWER_FAILURE
QUOTA_UNDERFLOW
BAD_POOL_HEADER
MEMORY_MANAGEMENT
A device driver has pool.)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fb104277-85a9-76e1-1015-46c9fe83e114%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: NVIDIA GeForce

2016-09-20 Thread johnyjukya
> On Sunday, September 11, 2016 at 11:11:28 PM UTC-4, Drew White wrote:
>> On Friday, 9 September 2016 18:58:51 UTC+10, Thomas Ernst  wrote:
>> > Hi all,
>> >
>> > Does Qubes support NVIDIA GeForce graphics cards? The reason for
>> asking is that I am planing to buy a Lenovo ThinkPad T460p Laptop,
>> which has a NVIDIA GeForce 940MX 2 GB graphics card.
>> >
>> > Best,
>> >
>> > Thomas
>>
>> I have a GeForce GTX630 and a Quadro 600 in my machine, and both work
>> well with no issues.
>>
>> The Thinkpads work well with Qubes.
>> the T530 is very nice and works well.
>> So the Pro T460 should also be quite acceptable.
>>
>> As long as you have 4 or more threads, you can use qubes easily.
>
> I have gtx 650 ti.  works great.   I would research how the card perform
> with open source linux drivers in general before buying.

I have a GeForce6100SM-M2.  It's on-board nVidia card crashes (diagonal
stripes) after a bit of usage (almost seems to happen when memory gets
low).

I've tried all the BIOS settings, etc., with no luck.  (The same thing
occurs under Tails, FYI.)

With a PCI GeForce7300 GT inserted (and the on-board video disabled),
things work just fine.

(Note that in 3.1, and 3.2 up until rc2? I think, there was a bug where
the VM's would get screen corruption.  rc2 and beyond have fixed this
problem.)

Cheers.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0a18031fd71f38c8919da886087ef75a.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: rc.local iptables persistence on reboot

2016-09-20 Thread nishiwaka46
Yes, my script is already posted here. I was implying sh shebang, as we're 
talking about a file that contains it before any changes done. But thanks for 
checking.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7709cf18-de85-49bb-99f3-0bbb6d4cf1b6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: qubes keeps shutting down randomly

2016-09-20 Thread raahelps
On Saturday, September 10, 2016 at 11:06:35 PM UTC-4, digitaldijjn wrote:
> it mainly seems to be around either updating a vm, vm shutting down, and once 
> copying something to another vm. I tried to make sense of the logs, something 
> about a writing to a read only config file. I'm using 3.2

check hdd for errors 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/448fb1b5-1766-4ecb-a95a-5f4f41eb9b60%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: NVIDIA GeForce

2016-09-20 Thread raahelps
On Sunday, September 11, 2016 at 11:11:28 PM UTC-4, Drew White wrote:
> On Friday, 9 September 2016 18:58:51 UTC+10, Thomas Ernst  wrote:
> > Hi all,
> > 
> > Does Qubes support NVIDIA GeForce graphics cards? The reason for asking is 
> > that I am planing to buy a Lenovo ThinkPad T460p Laptop, which has a NVIDIA 
> > GeForce 940MX 2 GB graphics card.
> > 
> > Best,
> > 
> > Thomas
> 
> I have a GeForce GTX630 and a Quadro 600 in my machine, and both work well 
> with no issues.
> 
> The Thinkpads work well with Qubes.
> the T530 is very nice and works well.
> So the Pro T460 should also be quite acceptable.
> 
> As long as you have 4 or more threads, you can use qubes easily.

I have gtx 650 ti.  works great.   I would research how the card perform with 
open source linux drivers in general before buying.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1f10eb4d-480d-4169-aba5-2d4672c65bcf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Does QubesOs does not source ~/.profile on purpose?

2016-09-20 Thread marc
> the source code of qvm-run is your best documentation of how applications are 
> run without logging in :)
> here is the session that is started in vms. I like the hangman :)
> https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/appvm-scripts/usrbin/qubes-session

Thanks for the link, Connor! Yes, a lot of effort has been put in that hangman 
:D

Looking at it and seeing how beautifully simply it is kept, wouldn't it make 
sense to load from there `/etc/profile` file? (I think usually this file is the 
main responsible of triggering cascade loading of profile files, but correct me 
if I am wrong)

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/799e7396-3993-4a94-acda-84d7f9409d58%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Does QubesOs does not source ~/.profile on purpose?

2016-09-20 Thread Connor Page
the source code of qvm-run is your best documentation of how applications are 
run without logging in :)
here is the session that is started in vms. I like the hangman :)
https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/appvm-scripts/usrbin/qubes-session

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9cf3e541-d1ea-4e56-99f1-42bb8d5bd181%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] CDC Ethernet emulation

2016-09-20 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-20 05:16, York Keyser wrote:
> Dear Group
> 
> is there a way to use CDC Ethernet emulation under Qubes. I have a USB-Armory 
> and i want to connect to it from a VM.
> When I connect the USB-Armory I get following errors from DOM0
> 
> probe of 3-1:1.0 failed with error -22
> probe of 3-1:1.0 failed with error -16
> 
> Nevertheless, I see the device on DOM0, if I make an ip -a the device 
> enp0s20u1 show up. Now my question, how can I route all the communication of 
> this USB device to a VM. I could not find the emulated device at my 
> Qubes-VM-Manager so I cannot configure it there. Is somebody here who already 
> were able to use a USB-Armory device under Qubes-OS?
> 
> Regards York
> 

Would it make sense to create a USB VM and attach it to that VM?

https://www.qubes-os.org/doc/usb/#tocAnchor-1-1-2

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=+JHI
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc9ae7f3-1b3f-c177-5605-9c67cd05eb59%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Blank screen after 10 minutes

2016-09-20 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-20 03:20, tom...@gmail.com wrote:
> Hi all,
> 
>   I'm on Qubes3.1 (with regular updates in dom0).
> When mouse or screen is not touched for 10 minutes I got screen becoming 
> black and asking for password if I fail to move the mouse in few seconds. 
> (which is annoying when watching movie). All attached displays are blanked.
> 
> The annoying part is I cannot find setting for this. In dom0 System 
> Settings->Display and Monitor->Screen locker I have unchecked "Start 
> automatically".
> 
> Any ideas where is the setting that control this?
> 
> regards,
>   Tom
> 

Try this:

System Tools -> Power Management -> Energy Saving

1. Set your desired "Screen Energy Saving" timeout in minutes.

Note: Watching a movie, even in fullscreen mode, will not affect
this timeout, since dom0 doesn't "know" about that type of
activity. This is arguably a security feature, since if an AppVM
were able to delay the timeout by starting a movie, an adversary
could exploit this in conjunction with physical access to obtain
your machine in an unlocked state.

Then:

System Tools -> Power Management -> Advanced Settings

2. Uncheck "Lock screen on resume" (if this is what you want)

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=rixD
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5c963244-0e10-41f8-483e-99c835338a95%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: rc.local iptables persistence on reboot

2016-09-20 Thread Connor Page
would you mind posting the whole script?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c57c2660-fa29-4895-9e68-454a776b2226%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VA-API in AppVM

2016-09-20 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-19 19:15, Sebastian Jug wrote:
> Hi Andrew,
> 
> Thanks for the response.
> I can watch youtube a variety of different ways with different codecs and
> decoders, however, they all use a ton of CPU usage at 720p or greater.
> VAAPI is hardware decoding acceleration for Intel, so that way it uses 1-3%
> CPU vs 30-80%.
> I realize that 3d acceleration is not an option, but is VAAPI possible?
> 

Not sure about VAAPI, but I haven't noticed the kind of CPU usage
you're describing. Have you made sure to disable hardware acceleration
in your browser's settings?

P.S. - Please try to avoid top-posting.

> 
> On Thu, Sep 15, 2016 at 4:34 AM Andrew David Wong  wrote:
> 
> On 2016-09-14 10:42, Sebastian Jug wrote:
 Hey guys,

 A big problem for me with Qubes is being able to do random mundane
 tasks like watching YouTube videos. Is it possible to get video
 acceleration working in appvm specifically VA-API?

 I know the 3d acceleration is not possible unless it's in a HVM but
 this may be more straightforward?

 Thanks.

> 
> Can you be more specific about the problem you're currently
> encountering? A lot of people here watch YouTube videos in
> AppVMs without any problem (myself included).
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=3pAH
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7efd3833-01fa-5c7d-c8a1-1bd66bad2f3c%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] R3.2-rc3: hotplugging ExpressCard devices

2016-09-20 Thread yaqu
Hello,

After upgrading from R3.0 to R3.2-rc3, I am no longer able to hotplug
ExpressCard devices (e.g. USB 3.0 adapter). Is it a bug or feature?

When I connect adapter to running Qubes, nothing happens - it is not
detected, not reported by lspci, also there is nothing in dmesg.

When I boot Qubes with already connected adapter, it is properly
detected, attached to dom0, and works fine. But if I disconnect it,
it is still reported by lspci as connected.

As a workaround, I have to manually rescan PCI bus after connecting
adapter:
$ sudo sh -c 'echo 1 > /sys/bus/pci/rescan'

And manually remove it after disconnecting:
$ sudo sh -c 'echo 1 > /sys/bus/pci/devices/:05:00.0/remove'

It works, but it is not very handy :-(

Regards,

-- 
yaqu

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160918174059.6C803202186%40mail.openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] CDC Ethernet emulation

2016-09-20 Thread York Keyser

Dear Group

is there a way to use CDC Ethernet emulation under Qubes. I have a 
USB-Armory and i want to connect to it from a VM.

When I connect the USB-Armory I get following errors from DOM0

probe of 3-1:1.0 failed with error -22
probe of 3-1:1.0 failed with error -16

Nevertheless, I see the device on DOM0, if I make an ip -a the device 
enp0s20u1 show up. Now my question, how can I route all the 
communication of this USB device to a VM. I could not find the emulated 
device at my Qubes-VM-Manager so I cannot configure it there. Is 
somebody here who already were able to use a USB-Armory device under 
Qubes-OS?


Regards York

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d1fc7842-485b-2eba-3c9e-c23dc59517d4%40cryptea.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Blank screen after 10 minutes

2016-09-20 Thread Connor Page
try Presentation mode in the power manager panel plugin.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2aeeb353-0061-4c94-ab59-21519323781f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN in proxyVM

2016-09-20 Thread asdfgher
> On 09/19/2016 05:48 AM, asdfg...@sigaint.org wrote:
>> Hello
>> I have this configuration
>>
>> sys-whonix--->proxyVM(with VPN)--->appVM
>>
>> when I surf in appVM, see ip of tor and not ip of VPN. Why?
>>
>> Regards
>>
>
> If the appvm is directly using the vpn vm as its netvm (uplink), you
> should see the vpn's address when browsing to a site like whatismyip.com.
>
> Chris
>
Hi
I have to re-install qubes, with the old I haven't this problem
AppVm is connected with proxyVM, but in whatismyip I see tor exit node

Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21af4e622cac90e94b3ebca300e2ef4a.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN in proxyVM

2016-09-20 Thread asdfgher
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-19 02:48, asdfg...@sigaint.org wrote:
>> Hello
>> I have this configuration
>>
>> sys-whonix--->proxyVM(with VPN)--->appVM
>>
>> when I surf in appVM, see ip of tor and not ip of VPN. Why?
>>
>> Regards
>>
>
> Please clarify your setup:
>
> What do the arrows mean in your diagram? In the context
> of Qubes, such arrows usually mean "has as its NetVM".
> For example, this:
>
>sys-whonix--->proxyVM(with VPN)
>
> would mean "sys-whonix has a ProxyVM (with VPN) as its
> NetVM". However, in your case, this wouldn't make sense,
> becuase a ProxyVM can't have an AppVM as its NetVM.
>
> Should they be interpreted in the opposite direction?
>
> - --
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
>
> iQIcBAEBCgAGBQJX4CpbAAoJENtN07w5UDAwAwkP/0w/UOUJQB4Rmmr4X/PBF+g5
> JnY8QSYPbLhrWeTAD5G6Fwt6tzIC6ybUaQDBOweBBztZD+7uMhGx9to/iVBTgfgB
> igQFIc9WMfHLbT7rm/CljS+1EhlY2u3yIzysgCJPrby+YybP0JsJDkIKESBNvlwD
> 0MxvmGX9D0wkaQTi8sdT31PbVz8CIEAU+nnyS20RJuP64dJQfXCxHUrK93D6zvWW
> pVpNu6zBzmHkRuoHHvRbByoTpzBUSKSpVhZp2i9/L1xsN7Mkwou4pp3izxuiG8UW
> Zcn+R43/W8MMzAtyM2hbS+LgTUFKYixB6+vuL3NZe/9aFKXB4YuJEhCtjp2FLhuC
> hrS6rpWjNfnxlY47bdDS9/YCoCy49VIjUWZV5ln/CueG0w9S8kdRpL+hXB9cjmFl
> qqcQxLveH1nzRASMxxV3Hzk9Wbgn0HkK/b+i8hpoCIbIAOb4nOkTcr1JvD7uRdi5
> yOfSpbz8YP6qL49z8rq53NzjDeiEGBSW5tAVObe52bTD+sI6tPSiDkUPg9YbSrQ7
> 8xa4XpEk6z/8G4LAacI0MgndBYhpRR2Gz1MbboRIjfZpFfSwd37HCxs8mh69FkIZ
> NxqLvcDpli6qVJjz1t+FsPUfpRrAJu/7jqTjTDFTBScOhnDV3AOFzsl0pqlKbgJH
> 121SsX6rizj5osuurqGk
> =mS4B
> -END PGP SIGNATURE-
>
>
Hi
Sorry, I intend the opposite
Read from left to right
sys-net--sys-firewall--sys-whonix--proxyVM(with vpn)--appVM
When I go to whatismyip in appVM, I see tor exit node

Regards


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1f3e2759f418ed58b25d517fa1de5093.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Email Server - Mail-in-a-box

2016-09-20 Thread amadaus
I'd like to create my own personal email server but don not feel
technically competent to set it up securely. However I've read about a
"out of the box" solution called Mail-In-A-Box. Do any Qubes users have
experience or thoughts on this potential solution?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/nrqoe6%24joa%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] WHERE is VT-D implemented..?

2016-09-20 Thread Zrubi
On 09/20/2016 02:44 AM, neilhard...@gmail.com wrote:

> WHERE is VT-D protection against DMA attacks implemented..?

VT-D is implemented in Xen and it is actually protecting PCI passtrough
feature:
https://wiki.xen.org/wiki/Xen_PCI_Passthrough

Because Qubes using Xen, all the VM's are protected against DMA attacks,
however most of the VM's are not even affected by DMA attacks, only the
ones having PCI device assigned.
(sys-net and sys-usb by default)


-- 
Zrubi

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6dacb497-f561-c5bd-3801-b0f22378a8c7%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.