Re: [qubes-users] Is it possible to have 2 Net VMs - one for Ethernet, another for WiFi..?
On 09/23/2016 07:34 PM, neilhard...@gmail.com wrote: I want to have 2 Net VMs running at the same time. One would hold Ethernet in "Devices" The other would hold WiFi in "Devices" Is this possible? Yes, just don't assign the same PCI devices to the different vms. One vm should have only ethernet, and the other vm only wifi. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e33afa13-3124-c313-13c2-c7e246849365%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Adding shortcuts to desktop for commonly used apps like untrusted firefox
Hi, I'm a qubes-os newbie, so I'm probably missing something obvious, but am asking to be sure. I can add additional icons in the xfce vm menus with no issues, but I can't find a way to send a copy to the desktop. I don't know if I'm having a menu or touchpad click issue, but I can only launch the app with a left click, or straight into edit mode of the launcher with a right click. If I create a new launcher, put in the same values under edit, I can launch the app in the vm I want, but the icon isn't available, only generic ones without coloring. This is on an HP Envy 360. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/92d2bc40-c27d-4908-ac49-bc530f33dbe7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to add a "sys-firewall" to a NetVM..?
I created a new NetVM to use debian8, rather than fedora-23 It all works fine. But I noticed that the original "sys-net" has a "sys-firewall" tied to it. Do I need to add something like this for my new Net VM, and if so, how do I do it..? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/88743796-2866-4900-8ec6-3ced381fc0fc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Upgrade fedora 21 to 23
Hello After upgrading qubes 3.0 to 3.1 I needed to do the same with fedora template. I run this command: sudo qubes-dom0-update qubes-template-fedora-23 and this sudo yum remove qubes-template-fedora-21 I haven't considered the others explained in the tutorial "Upgrading the Fedora 21 Template" Is it the same? Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/563583566c388917fb75bd549ddccd86.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Is it possible to have 2 Net VMs - one for Ethernet, another for WiFi..?
I want to have 2 Net VMs running at the same time. One would hold Ethernet in "Devices" The other would hold WiFi in "Devices" Is this possible? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1825a2b3-2e29-4df1-89e5-20c57c37595b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] 3.0 to 3.1 in place upgrade broke USB VMs
The in place upgrade from 3.0 to 3.1 broke my two USB VMs (one controller with ports, one controller with devices) which were both set to auto start and working on 3.0. The error is similar to that where devices are assigned to another running VM - this is not the case however. livirt.libvirtError: Requested operation is not valid: PCI device xyz is in use by driver xenlight, domain usbvm sys-net still auto starts and everything else seems to work. Both VMs start fine without the USB devices assigned. I've tried hiding the devices from dom0 in case this made any difference using the kernel line in the docs, but this has made no difference. TIA -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ULyzjiM2Df5aepri0VxtxWHI2MoeVyJaqxvwKW3hJdBdKlHVpn5jeDbtZmsk0G69lRRdp-9vAoVpIID2ska-Pgn_pJ8DvJ0BzmrTV3I45sw%3D%40protonmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] exit code 1 of qubes.RecieveUpdate, what does it mean? Failing to install dev packages in dom0
Dear gods, I'm trying to install zfsonlinux in dom0. One of the first steps is to install the packages needed to build the DKMS modules. I recieve exit code 1 and I don't know what to do. Needless to say I'm new to Qubes. '/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed with exit code 1! Here are the details $ cat dom0installdev.sh sudo qubes-dom0-update dkms kernel-devel zlib-devel libuuid-devel libblkid-devel lsscsi bc autoconf automake binutils bison flex gcc gcc-c++ gdb gettext libtool make pkgconfig redhat-rpm-config rpm-build strace $ bash dom0installdev.sh Using sys-firewall as UpdateVM to download updates for Dom0; this may take some time... Running command on VM: 'sys-firewall'... Last metadata expiration check: 14:18:18 ago on Thu Sep 22 23:55:13 2016. Package binutils-2.25-17.fc23.x86_64 is already installed, skipping. Package gettext-0.19.8.1-1.fc23.x86_64 is already installed, skipping. Package make-1:4.0-5.1.fc23.x86_64 is already installed, skipping. Package pkgconfig-1:0.28-9.fc23.x86_64 is already installed, skipping. Dependencies resolved. PackageArch Version Repository Size Installing: autoconf noarch 2.69-21.fc23fedora 709 k automake noarch 1.15-4.fc23 fedora 695 k bc x86_64 1.06.95-15.fc23 fedora 122 k bison x86_64 3.0.4-3.fc23updates684 k cppx86_64 5.3.1-6.fc23updates8.3 M dkms noarch 2.2.0.3-34.git.9e0394d.fc23 updates 82 k dwzx86_64 0.12-1.fc23 fedora 106 k elfutils x86_64 0.166-1.fc23updates304 k file x86_64 5.22-6.fc23 updates 66 k flex x86_64 2.6.0-1.fc23updates315 k fpc-srpm-macrosnoarch 1.0-1.fc23 updates7.8 k gc x86_64 7.4.2-4.fc23fedora 104 k gccx86_64 5.3.1-6.fc23updates 19 M gcc-c++x86_64 5.3.1-6.fc23updates9.8 M gdbx86_64 7.10.1-31.fc23 updates3.2 M ghc-srpm-macrosnoarch 1.4.2-2.fc23fedora 8.2 k glibc-develx86_64 2.22-18.fc23updates914 k glibc-headers x86_64 2.22-18.fc23updates497 k gnat-srpm-macros noarch 2-1.fc23fedora 8.4 k go-srpm-macros noarch 2-3.fc23fedora 8.0 k guile x86_64 5:2.0.11-7.fc23 updates3.9 M islx86_64 0.14-4.fc23 fedora 490 k kernel-devel x86_64 1000:4.4.14-11.pvops.qubes qubes-dom0-current 10 M kernel-headers x86_64 4.7.3-100.fc23 updates1.0 M libatomic_ops x86_64 7.4.2-9.fc23updates 32 k libbabeltrace x86_64 1.2.4-2.fc23fedora 151 k libblkid-devel x86_64 2.28-2.fc23 updates 76 k libipt x86_64 1.4.3-1.fc23updates 38 k libmpc x86_64 1.0.2-4.fc23fedora 55 k libstdc++-develx86_64 5.3.1-6.fc23updates1.8 M libtoolx86_64 2.4.6-8.fc23updates707 k libuuid-devel x86_64 2.28-2.fc23 updates 87 k lsscsi x86_64 0.28-2.fc23 fedora 56 k m4 x86_64 1.4.17-8.fc23 fedora 266 k mpfr x86_64 3.1.3-2.fc23updates214 k ocaml-srpm-macros noarch 2-3.fc23fedora 8.1 k patch x86_64 2.7.5-2.fc23fedora 123 k perl-Data-Dumper x86_64 2.158-347.fc23 fedora 55 k perl-Math-BigInt noarch 1.9997-354.fc23 updates189 k perl-Thread-Queue noarch 3.11-1.fc23 updates 22 k perl-generatorsnoarch 1.06-2.fc23 updates 15 k perl-srpm-macros noarch 1-17.fc23 fedora 9.7 k python-srpm-macros noarch 3-7.fc23updates8.1 k redhat-rpm-config noarch 37-1.fc23.1 updates 59 k rpm-build x86_64
Re: [qubes-users] BTRFS?
On 09/23/2016 08:00 AM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Sep 23, 2016 at 07:42:07AM -0400, Chris Laprise wrote: On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote: In fact, I think the right question is "Will Qubes 4 be compatible with btrfs root if vm storage is expected to reside on a LVM thin pool?" This is a good question. The new storage handling is flexible enough to allow writing a module to handle btrfs even better than in Qubes 3.x. But it is unlikely that we'll manage to write such module for 4.0. If someone would contribute such module, then yes - it will be supported. Otherwise, probably somehow around 4.1 or later. - -- You realize that some of us have been happily using btrfs features with Qubes in a way that produces better work flows? If ITL desires a modular storage layer, wouldn't the best approach be to offer a general image file module *first* to emulate the current architecture? That way, people can continue to have the same storage choices and backup procedures they already do. File backend is also available, but we haven't added new features to it (like multiple snapshots etc). Probably it could be easily extended to proper btrfs module (for example by dropping dm-snapshot over files and simply use cp --reflink=always). - -- Good to know there is a file back end. I also was thinking about having qvm-backup reference a particular 'backup' pool which points to a subvolume containing all the vms the user wishes to backup; Then differential backups could be done quite easily with 'btrfs send' without a lot of overhead. And vms could very easily be moved in/out of the backup pool/subvolume pairing. But that may be too filesystem-specific for the new storage layer. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c91f4586-a8a3-255d-f5fb-d5a177e05355%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] BTRFS?
On 09/22/2016 07:12 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Sep 22, 2016 at 03:56:57PM -0700, Connor Page wrote: In fact, I think the right question is "Will Qubes 4 be compatible with btrfs root if vm storage is expected to reside on a LVM thin pool?" This is a good question. The new storage handling is flexible enough to allow writing a module to handle btrfs even better than in Qubes 3.x. But it is unlikely that we'll manage to write such module for 4.0. If someone would contribute such module, then yes - it will be supported. Otherwise, probably somehow around 4.1 or later. - -- You realize that some of us have been happily using btrfs features with Qubes in a way that produces better work flows? If ITL desires a modular storage layer, wouldn't the best approach be to offer a general image file module *first* to emulate the current architecture? That way, people can continue to have the same storage choices and backup procedures they already do. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3b8adced-078d-8776-93b6-a212eed2e186%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: BTRFS?
Thanks Rusty. People should be aware of this. I think I did reclaim all space but fiddled too much with the settings. Anyway, it was a good excercise, I learned about btrfs, LUKS and dracut, that wouldn't happen otherwise. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/395b69cc-e910-4e59-a921-6acdfd6627a2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to mount USB with ISO in Windows-Template
Hello, I have successfully installed Qubes 3.2-rc3 (xfce yes) on a Lenovo Thinkpad X1 Carbon (4th edition / 2016). After the installing issue, I have setup a Win7 template by following the documentation. By the way - thank you for the documentation! BUT - How can I mount an USB stick with an ISO-File in Win7 (to continue installing required software)? If I have missed this answer in the documentation or my internet searchs, please point me towards the answer;-) Thank you. Martin -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2D289599-C46C-4F44-B225-B5B98D5ADDA7%40web.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: BTRFS?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Connor, > The tricky bit was to put it on a LUKS partition as somehow the > installer encrypted only the swap partition. https://github.com/QubesOS/qubes-issues/issues/2294 has a workaround. Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJX5OYjXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfR4UP/R8OxIfFI7JyeIW6gazWUEkq IBdlvShyY5piOKSQO5RrEpcS5GXHjPPN1HqPn1Bt6FFQln5MAKkQsD6AaPE8nrjD OHzYU/G3fgXoPPJy8nupA3SANatESdKV+b2/JWP0o0+9/7HAYgzykeGlfaoa6BtH UuLHBVloagCaVKLjwX61KXHzf5Q+PJTm1ZAF2f8b9vY1vNPPJ+QKvXXr89n76p7W McQTVTrLuSzTLLL2KFXxC2uMuIlO1qxYDifUrHO1f//CmuF9XGP4pGLIfVigodbg We+1+2FbUqB6oB/WTHGLvbXhdrdgJHcZn7iUyXIbKcmncgo1wFZ0RYFq/rjzpCkX b3gyYTEBxBLj4AbIc28sqJm8bUjpinWAzWOv4j0dHKQqnBXX2N6YrCSsOPFkKpuv 2fGjIryyS1pPktpYS4Evv/mDquusnOIAqnEooNmz2MaC9kd6v2/Kl9IHpbXX9bSd MfIVaiAuWhFaRe9SUW4kIG5+dIEMkBCz2kNImdwfH2rNLOGTU2BvfcfvbpKmOxJy QDHKU5WixixM6KtuO9Gvh/UW9nT36RPtn2+1nev/HztDbTzItSBwqHhXCXUtfM9p weLEntmvVdQCLoKN+tRBd9NNiC+jlZbZtkmzUasi2GzL5japwrn42OeGlz0oSlh/ wvwrGWyDVaYlPxzN6Lye =7Jna -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/527c132e-e52b-51ab-0d35-0449b3d37962%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Dear qubes-users
Dear qubes-users, I am long time qubes follower and user. I apologize in advance if anyone feels this request is spam. I am looking for two invite codes needed to sign up to anonymous riseup.net email service. I am hoping there are some qubes users who are riseup.net account holders. Can anyone please send me a couple of invite codes that I might be able to sign up? Thank you in advance. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ba06c510-0fd3-4908-8f8c-802d54e0cb94%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] System still freezes, still no resolution.
Hello Drew, I'm tired of having to re-do the work that gets lost if files get corrupted or not saved properly, and also browsing information from things I'm doing. I share your frustration. Which computer are you using? Are your applications still running in the background (ie. only the graphical interface is frozen) or is it a complete system freeze? On my side I'm running Qubes on a Lenovo Thinkpad T500 and I just wrote a similar request as yours just a few days ago: https://groups.google.com/forum/#!topic/qubes-users/O4UO9CjO4TM On my side the graphical display is frozen, and with KDE I managed to workaround the issue by setting KWin to use XRender instead of OpenGL as compositing engine. After that the system became rock-solid and I never encountered such freeze anymore for months, while it happened about once a week until that. The sad thing is that Qubes has now switched to XFCE, the freezes came back and I do not know any equivalent setting on XFCE. I recently tried to completely disable compositing and am now crossing my fingers. Regards, Simon. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cbcb5184437ac80fb4bead50c187364c%40whitewinterwolf.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: installing Signal on Qubes mini-HOWTO
On Friday, 23 September 2016 07:56:15 UTC+10, dlme...@gmail.com wrote: > On Friday, 23 September 2016 04:11:33 UTC+10, se...@redhat.com wrote: > > On Thursday, September 22, 2016 at 3:57:01 AM UTC-4, dlme...@gmail.com > > wrote: > > > On Monday, 15 August 2016 20:43:18 UTC+10, pixel fairy wrote: > > > > On Sunday, August 14, 2016 at 3:22:30 PM UTC-7, Alex wrote: > > > > ... > > > > > 1. Install the Chromium browser in your appvm template - skip if you > > > > > were already using it. Shut down the template VM. > > > > > > > > I keep wondering how safe chromium browser is. do redhat or debian > > > > track updates in time with google-chrome? > > > > > > > > > Chromium in the supported Fedora template for Qubes (FC23) contains High > > > severity security bugs: > > > > > > FC23 = 52.0.2743.116-10.fc23. > > > FC24 = 53.0.2785.113-1.fc24. > > > > > > See: https://apps.fedoraproject.org/packages/chromium (for builds) > > > > > > Numerous security vulnerabilities, including High severity CVE's here: > > > https://googlechromereleases.blogspot.com.au/2016/09/stable-channel-update-for-desktop_13.html > > > > > > Newer RPMs available here, but haven't been tagged to either updates or > > > updates-testing for FC23: > > > > > > http://koji.fedoraproject.org/koji/buildinfo?buildID=802754 > > > > > > So what you're saying is we should move to Fedora 24. > > Sure. However, FC23 is still listed as a supported release: > https://fedoraproject.org/wiki/Releases#Current_Supported_Releases. Maybe > only "Critical" security fixes would make it to FC23 though, not "High" > (https://www.chromium.org/developers/severity-guidelines), but people likely > assume otherwise. Note also that Chromium is not listed as a Critical Path > package, unlike Firefox. Qubes 3.1 doesn't have an fc24 template. Qubes 3.2 won't be released with fc23 because it's too late in testing, but will (does currently for the RC) have an fc24 template available. It looks like chromium-53.0.2785.116-1.fc23 should now be in 'updates-testing' repo (since 2016-09-21 17:43:43Z), but it hasn't propagated far. Out of 6 mirrors in Australia, only one here even had the previous 53.0.2785.113-1.fc23.x86_64, in 'updates-testing', which is now ~8 days old. YMMV, but looks like Fedora needs to drop some consistently slow mirrors: https://admin.fedoraproject.org/mirrormanager/propgation Also, if fc23 users want Chromium, it needs package testers. https://fedoraproject.org/wiki/QA:Updates_Testing. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/638ea945-7e38-4d96-9e20-9e6d68e0b35c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.