Re: [qubes-users] Re: Thoughts about installed software

2016-10-11 Thread Drew White
On Wednesday, 12 October 2016 11:30:27 UTC+11, Manuel Amador (Rudd-O) wrote: > On 10/12/2016 12:26 AM, Drew White wrote: > > Hi Robert, > > Do you think you could build a template that would be that which you would > > consider secure? > > > > Personally, I've been asking what packages are

[qubes-users] Re: Why it's so big secret?

2016-10-11 Thread Drew White
On Wednesday, 12 October 2016 12:50:23 UTC+11, nezn...@xy9ce.tk wrote: > i readed that proprietary driver better than free driver. Because with free > driver you'll get hot laptop and because free driver can't adjust rotate of > the fan and etc.. > How i can add the repo? Can you write me?

[qubes-users] "VM didnt give back all requested memory"

2016-10-11 Thread pixel fairy
i keep getting this while running appvms based on fedora-24. the template was updated from fedora-23. Just got it on one of the two new appvms i just made. havent used either one yet. everything seems to work ok. -- You received this message because you are subscribed to the Google Groups

[qubes-users] Re: Why it's so big secret?

2016-10-11 Thread neznaika
i readed that proprietary driver better than free driver. Because with free driver you'll get hot laptop and because free driver can't adjust rotate of the fan and etc.. How i can add the repo? Can you write me? Because i'm not sure. And about gpg-keys.. Did you something with it? maybe you use

[qubes-users] Re: Why it's so big secret?

2016-10-11 Thread neznaika
i readed that proprietary driver better than free driver. Because with free driver you'll get hot laptop and because free driver can't adjust rotate of the fun and etc.. How i can add the repo? Can you write me? Because i'm noy sure. And about gpg-keys.. Did you something with it? maybe you use

Re: [qubes-users] Re: Thoughts about installed software

2016-10-11 Thread Manuel Amador (Rudd-O)
On 10/12/2016 12:26 AM, Drew White wrote: > Hi Robert, > Do you think you could build a template that would be that which you would > consider secure? > > Personally, I've been asking what packages are REQUIRED for full integration, > and never gotten an answer that provides the information I

[qubes-users] Re: Thoughts about installed software

2016-10-11 Thread Drew White
On Tuesday, 11 October 2016 20:30:54 UTC+11, Robert Mittendorf wrote: > Software that you don't need is a security risk as it imposes additional > attack surface - we all know that. > Besides exploits those tools might cause additional threat (e.G. RDP- > VNC-, SSH-Clients) > So you better do

[qubes-users] Re: Why it's so big secret?

2016-10-11 Thread Drew White
On Wednesday, 12 October 2016 07:28:28 UTC+11, nezn...@xy9ce.tk wrote: > I see very detailed instructions in the Docs about HVM, Templates and other. > But instructions about the proprietary driver Nvidia and bumblebee looks like > a some secret. This problem have status "open" from R2

[qubes-users] Networking issue with bittorrent client Q3.2

2016-10-11 Thread yorp
For some reason using a bittorrent client in an AppVM will not connect to internet. I have tried setting up a new ProxyVM and configuring the iptables but still nothing... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from

Re: [qubes-users] rc.local iptables persistence on reboot

2016-10-11 Thread Manuel Amador (Rudd-O)
On 09/18/2016 12:14 AM, nishiwak...@gmail.com wrote: > iptables -F > iptables -P INPUT DROP > iptables -P OUTPUT ACCEPT > iptables -P FORWARD DROP > iptables -A INPUT -i lo -j ACCEPT > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT > iptables -A INPUT -p tcp --dport 80 -j ACCEPT

Re: [qubes-users] Why it so big secret?

2016-10-11 Thread Desobediente
Additionaly, the Bumblebee howto is here: https://fedoraproject.org/wiki/Bumblebee -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

Re: [qubes-users] Why it so big secret?

2016-10-11 Thread Desobediente
This should be here: https://www.qubes-os.org/doc/install-nvidia-driver/ Have you tried that? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

[qubes-users] Re: rc.local iptables persistence on reboot

2016-10-11 Thread pleomati
https://www.qubes-os.org/doc/qubes-firewall/ everything is in this chapter "Enabling networking between two VMs". dont need to run custom scripts for enabling networking between two vms. In case u need yuor system safe from connecting apps each other you can allow traffic on single port and

[qubes-users] Re: rc.local iptables persistence on reboot

2016-10-11 Thread pleomati
https://www.qubes-os.org/doc/qubes-firewall/ everything is in this chapter "Enabling networking between two VMs". dont need to run custom scripts for enabling networking between two vms. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

[qubes-users] Why it's so big secret?

2016-10-11 Thread neznaika
I see very detailed instructions in the Docs about HVM, Templates and other. But instructions about the proprietary driver Nvidia and bumblebee looks like a some secret. This problem have status "open" from R2 version. And i killed many weeks to solve this. Still i have just Qubes with nouveau

[qubes-users] Why it's so big secret?

2016-10-11 Thread neznaika
I see very detailed instructions in the Docs about HVM, Templates and other. But instructions about the proprietary driver Nvidia and bumblebee looks like a some secret. This problem have status "open" from R2 version. And i kill many weeks to solve this. Still i have just Qubes with nouveau

[qubes-users] Why it so big secret?

2016-10-11 Thread neznaika
I see very detailed instructions in the Docs about HVM, Templates and other. But instructions about the proprietary driver Nvidia and bumblebee looks like a some secret. This problem have status "open" from R2 version. And i kill many weeks to solve this. Still i have just Qubes with nouveau

[qubes-users] Re: Problems with USB Pass through / iGPU drivers

2016-10-11 Thread raahelps
On Tuesday, October 11, 2016 at 3:19:15 PM UTC-4, jidar wrote: > On 10/11/2016 08:31 AM, Marek Marczykowski-Górecki wrote: > > > > If you want custom USB VM, you can simply remove the default one. > > As for qubes.InputKeyboard, take a look here: > >

[qubes-users] ANN: Qubes network server

2016-10-11 Thread Manuel Amador (Rudd-O)
Folks, it gives me great pleasure to announce the product of over two years of work (primarily because I never paid enough attention to this project to bring it to completion): Qubes network server. The traditional Qubes OS networking model contemplates a client-only use case. User VMs (AppVMs or

Re: [qubes-users] Re: rc.local iptables persistence on reboot

2016-10-11 Thread raahelps
On Tuesday, October 11, 2016 at 6:16:31 AM UTC-4, Unman wrote: > On Mon, Oct 10, 2016 at 10:19:16PM -0700, raahe...@gmail.com wrote: > > On Thursday, September 22, 2016 at 7:46:45 AM UTC-4, Connor Page wrote: > > > world writable script executed as root is the worst advice I've ever seen > > > on

[qubes-users] Re: Problems with USB Pass through / iGPU drivers

2016-10-11 Thread jidar
On 10/11/2016 08:31 AM, Marek Marczykowski-Górecki wrote: If you want custom USB VM, you can simply remove the default one. As for qubes.InputKeyboard, take a look here: https://www.qubes-os.org/doc/usb/#how-to-use-a-usb-keyboard - -- Best Regards, Marek Marczykowski-Górecki Invisible Things

Re: [qubes-users] Group/Hide VMs (e.g. mark arbitrary VM as "internal")

2016-10-11 Thread Unman
On Tue, Oct 11, 2016 at 03:23:00PM +0200, Robert Mittendorf wrote: > Hey again, > > I have quite some VMs that I don't use very often (e.g. for backup reasons). > I'd like to hide those without hiding all inactive VMs. > Is it possible to mark an own VM as "internal" like the fedora-23-dvm >

[qubes-users] HCL - Lenovo ideapad 700

2016-10-11 Thread Jan Fabo
send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPxa56rqLpwXBLfoTmNDYqM92KS%3DCWPagQD4iJ_FwCPH4o68pQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-LENOVO-80RU-20161011-1912

Re: [qubes-users] Random MAC addresses working in Network Manager 1.4.2

2016-10-11 Thread Chris Laprise
On 10/03/2016 03:05 PM, Chris Laprise wrote: Network Manager 1.4.2 has been testing very well for me the last few days... This new version appears to randomize MAC addresses properly, and the feature set has evolved to the point where the randomization process is managed in a more holistic

Re: [qubes-users] Re: Problems with USB Pass through / iGPU drivers

2016-10-11 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Oct 10, 2016 at 08:28:04PM -0500, jidar wrote: > On 10/05/2016 10:10 PM, Jeremy Rand wrote: > > You can setup a USB VM that's not a NetVM. Create a new AppVM and > > assign the USB controller to it in the Devices tab. You might also have >

Re: [qubes-users] Re: rc.local iptables persistence on reboot

2016-10-11 Thread Unman
On Mon, Oct 10, 2016 at 10:19:16PM -0700, raahe...@gmail.com wrote: > On Thursday, September 22, 2016 at 7:46:45 AM UTC-4, Connor Page wrote: > > world writable script executed as root is the worst advice I've ever seen > > on this mailing list. > > please don't do that! > > I don't even think

[qubes-users] How to solve ProxyVM (sys-firewall) becomming non-functional at runtime

2016-10-11 Thread Robert Mittendorf
Hey folks, sometimes the sys-firewall (more likely a service within it) crashes and does no longer allow connected VMs to resolve DNS. The ProxyVM must be the responsible entity, because the connection will be fine again If I restart the sys-firewall. Restarting the ProxyVM is tedious, as you

[qubes-users] Thoughts about installed software

2016-10-11 Thread Robert Mittendorf
Software that you don't need is a security risk as it imposes additional attack surface - we all know that. Besides exploits those tools might cause additional threat (e.G. RDP- VNC-, SSH-Clients) So you better do not install non-universal software* in a template VM. *software that is not

Re: [qubes-users] Re: HVM Windows

2016-10-11 Thread Robert Mittendorf
pen usb - is it a thumb drive or a tool for drawing? if thumb drive how do you attach? (block device or usb device?) are you using the usb-vm? afaik Windows Qubes tools do not yet support USB-passthrough. The file will usually be in documents folder. You did install the Windows Qubes Tools,

Re: [qubes-users] Documentation Update?

2016-10-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-10 18:21, jidar wrote: > https://www.qubes-os.org/doc/usb/ states: > > (Note: Beginning with R3.2, rd.qubes.hide_all_usb is set automatically if > you opt to create a USB qube during installation.) > > This also happens if you

Re: [qubes-users] Re: 3.2 installation crash on a ThinkPad

2016-10-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-10 03:21, pixel fairy wrote: > On Monday, October 10, 2016 at 3:07:06 AM UTC-7, yaqu wrote: >> On Mon, 10 Oct 2016 01:49:07 -0700 (PDT), pixel fairy >> wrote: >> >>> On Thursday, October 6, 2016 at 1:47:02 AM UTC-7,

[qubes-users] [Q3.2] Fn keys stopped working.

2016-10-11 Thread Mathew Evans
I've used qubes for quite a while not and had no issues with my Fn (function) keys working as should do until the Qubes 3.2 release, all the release candidates they worked perfectly fine. Ive checked with xev in dom0 and they are not even detected as XF86 keys so i cant even manually map them

Re: [qubes-users] Re: Qubes Windows 10?

2016-10-11 Thread Ph.T
On Mon, Oct 10, 2016 at 10:39 PM, wrote: > > how did you remove cortana? > https://www.youtube.com/watch?v=Q990oW7JgvA -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving