[qubes-users] Re: *.brain files 3.18.5 - Open with - add (application)?

2016-10-14 Thread '10834'019438'0194382'0918432'098
Hello,

With the q-menue sync command I can bring the new app into the VM application 
menu:

1. start VM
2. terminal dom0
3. qvm-sync-appmenus vmname

This works fine.

But why nautilus / files 3.18.5 open with applications menue is not in sync 
afterwards?

I would expect TheBrain Icon, run this file under the application...

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b966a3a5-1265-4ab6-a35f-57d01bb74572%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Error Debian Standalone restart

2016-10-14 Thread '09348'103248'109438'019438
Hello,

uner QR32 an D8 standalone restart via QM is running into the error

line: assert no vm.is running()
func: start_vm
line_no: 1158

??

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ce3167d6-e1cf-41cd-bad8-570174523631%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] *.brain files 3.18.5 - Open with - add (application)?

2016-10-14 Thread 83102347810943780914327097814
Hello,

I like to open in /Documents my file *.brain with TheBrain.

PB7 can be started via the terminal...
/rw/usrlocal/TheBrain/TheBrain

I open the files 3.18.5 and found the help, which explains how I add a new 
application:

1. choose file ... *.brain
2. open with
3. press the button ADD

But this button is inactive...

What I must do that I can press this button?

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d998b154-3b85-4838-b221-a9227a35ca24%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can't seeem to get program to start via rc.local?

2016-10-14 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-14 20:35, pleom...@gmail.com wrote:
> after reboot in systems should be to run also on cron
> @ reboot
> 
> but Qubes is build on Fedora mostly and it not have even cron.
> 

In Qubes, cron is available in both dom0 and the standard Fedora TemplateVM.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=9YT9
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c34381d-be0a-09f4-fa08-9bc8f55e5857%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: philosofy on qubes and other environment

2016-10-14 Thread pleomati
And if there is some kind of exploaitaion so the secure system should not been 
build on the same topology as its qubes bcs of chain exploits.So this system 
under security measures dont have any value ... bcs its build on the same linux 
topology ... someone brake 1 pcs brake on chain logic whole environment.

better way for secure environment is mix topology than duplicate or clone them.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2b46023-ee37-4792-aa19-8721ae1c84f5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Restart sound card "state"..?

2016-10-14 Thread neilhardley
When I first installed Qubes, my webcam/mic was plugged in.

I have since removed the webcam/mic physically.

Since doing this, the sound no longer works on Qubes.

I tried booting Ubuntu live disc, and sound works.

So it's not a physical problem.

I feel like Qubes initially detected a certain "state" or some kind of hardware 
detection.

And now, it's different hardware, so it doesn't play sound anymore. Speakers, 
headphone sockets.. Simply no sound.

How do I re-detect the sound hardware.. or restart the state.. or something 
along these lines..? 

Something like what Qubes would do when first installing.. Detecting the 
hardware..? Something like that.

How do I do this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/265bd410-a892-46bf-9b14-811dde0ecc55%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: philosofy on qubes and other environment

2016-10-14 Thread pleomati
yep i know  someone exploit ur app and take control on ur environment.. but ... 
if app is in sandbox then he cant take any control on system bcs its a jail or 
sanbox.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6a31f82-4e04-449d-a82a-55a7dff5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] philosofy on qubes and other environment

2016-10-14 Thread pleomati
philosofy of qubes is that you are safe when your app is isolatet.This is wrong 
just keep app in sandboxes or jails  and what wrong can be happen? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/06a0c291-f714-46eb-bb0b-88484af312c8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can't seeem to get program to start via rc.local?

2016-10-14 Thread pleomati
after reboot in systems should be to run also on cron
@ reboot

but Qubes is build on Fedora mostly and it not have even cron.

i think best way is to build on debian or FreeBSD not this stupid fedora.For 
sake this is so administratively wrong.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eb05956e-3b77-479b-ab2e-433a5041787c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to send wake on lan from qubes?

2016-10-14 Thread pleomati
Rudd-O 
might be you so nice and explain why it dosent work


https://groups.google.com/forum/#!topic/qubes-users/E2NBXnYazUk

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/613fbb6e-a247-4a82-95aa-26d9e6f51d01%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Bug or Feature? DispVM inherits settings from calling VM

2016-10-14 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-14 15:18, raahe...@gmail.com wrote:
> On Friday, October 14, 2016 at 6:16:16 PM UTC-4, raah...@gmail.com wrote:
>> On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote:
> On 2016-10-13 03:45, Robert Mittendorf wrote:
> Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com:
>>
>> feature.  I use to make menu shortcuts to launch programs in dispvms 
>> inheriting firewall rules.  But xfce only lets you edit already existing 
>> rules,  not create new ones :(   editing a config file is a little too 
>> much effort for me lol.
>>
> You can edit the rules in Xfce-Dom0 via the Qubes VM Manager?!
>
> How can this "feature" be disabled? I want to start a normal DispVM, not 
> a "special" DispVM.
>
> Use Case: Mail VM is only allowed to access Mail-Server. I want to start 
> a Browser in DispVM for urls in Mails.
> This works fine, but those "special" DispVMs have the same limitations. I 
> want just a normal DispVM like the one started via Dom0. The only way to 
> achieve this afaik is to let the special DispVM connect to NetVM, so no 
> ProxyVM is used. But this means that the DispVM has access to the 
> intranet.
>
> 
> This is precisely the use case I described in issue #1296, which I linked in 
> my previous message:
> 
> https://github.com/QubesOS/qubes-issues/issues/1296
> 
>>
>> couldn't you just use a normal dispvm then?  meaning why even launch 
>> anything from within an appvm?  Just run it from dom0, like the default 
>> firefox dispvm menu item.
> 
> only reason i'd launch a program in a dispvm from within an appvm,  is to 
> inherit its firewall rules. 
> 

Starting a new DispVM from dom0 and setting its NetVM is a lot more 
labor-intensive than simply clicking a link in an email and having the rest 
work automatically.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=BVEY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e184223e-a9cb-b701-08df-66cfc5c19761%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: View: Qubes discussion should be migrated away from Google Groups

2016-10-14 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-14 10:44, 109278409178304917834093 wrote:
> Hello,
> 
> I would appreciate more anonymity (I think there is a french group-chat 
> platform...).
> 

It's quite possible to participate on both Qubes mailing lists anonymously (or 
pseudonymously). I did so for several years under the pseudonym "Axon," and 
many others still do.

You can read about all the possible ways of interacting with the lists here:

https://www.qubes-os.org/mailing-lists/

> Nice would be some good structure, before you dive inside the big hep of 
> discussions.
> 
> Installation
> Newbie questions
> Bugs
> ...
> 
> This forum makes a perfect job for onboarding into a new community:
> 
> http://forums.thebrain.com/
> 
> And the innovative discussions about future features are bundled here for the 
> normal non-techie users (and works well too):
> 
> https://thebrain.uservoice.com/forums/4597-thebrain-feature-suggestions
> 
> I look forward to see some improvements.
> 
> Kind Regards
> 

We've previously discussed the possibility of having an official Qubes forum, 
but we ultimately decided against it:

https://groups.google.com/d/topic/qubes-users/2rqas38ncFA/discussion

Note that this is in no way meant to deter anyone from creating an unofficial 
Qubes forum.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=vgzM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/acfcdded-0bdc-65fd-0db8-1076e43094db%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] View: Qubes discussion should be migrated away from Google Groups

2016-10-14 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-10-14 09:13, epicd...@gmail.com wrote:
> I imagine the requirement of a Google account deters many from contributing 
> to discussion. All Google accounts require SMS verification of a phone, which 
> is very de-anonymizing, and sort of out of line with the privacy centric 
> nature of Qubes and its users. 
> 

Andrew is correct. A Google account is not required to participate on either of 
the Qubes mailing lists:

https://www.qubes-os.org/mailing-lists/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYAZl3AAoJENtN07w5UDAwul0P/18RZzqQlrvWZFqF2smDD/3k
M0nP2qPeO9cphHyipXfRUG4zb6uoDnG4rS1yPqZvQLPrbbMTiiEarhpq4XsHNx/i
bwTvqU0FhxOYJF4zmpya2fE4Ssi1/OWaD5WS4TJme0WJNIQzbM8NVjTePzQmcrrA
FUDH9gcHLTidz2hZXv4aOn7LY0fs7D/Qh1t6UY10CFj+3NBr5G5TZ/hR2/orpHnq
v4as/Jlc0NihAs0Efe/bwUjb9cyb9SLUHfr/v45wBtOEn2mSAhRp6PurYgQLfUfG
Mh9qfpgu7aJ/groTPpZrHo1cFG096m113pJUMOCcJEcHlTByEB4VNFWPztEzPVhy
LPHPTyU2PMFCy1GUvslUTv9oSBdaBCHySLrGu1LfX6O4UQqB3Wd2J0Hv5x1vJN4H
ONGk2+qBNbPi2/6li01rkYDl6kFVRihrTK5iQ+VI+hCPh8JXUvecqccrFrQIVq2A
a6915j5dN/Zlp035093LltOtayaB3m95z9B+rF0eZWNamTa81nMsD8eUIFoodI4i
XQQLJqRUb/fVjIN9kiv2VUIXyvOB4TGn8cPrqvUuYXIumj6Sja39tJcr1OnPJA/U
ugtqv3ZWSZRFZl6lnEU+REEd24X/3i0gGHr15Z8zYf5BgKbXEfVvyHIDnp1XvbVj
S9Fzz2zUyKOE2YmkUxpw
=tO02
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/735aadac-7226-d5c5-e928-6920ebd4dae9%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Why it's so big secret?

2016-10-14 Thread Manuel Amador (Rudd-O)
On 10/13/2016 02:12 AM, nezna...@xy9ce.tk wrote:
>> Then set up the Repos.
> Pls tell me how you did it?

Usually you can do this with a chrooted yum.  Mock is the right tool to
use.

-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e5f06203-a353-b116-4c2c-03c11eff6a63%40rudd-o.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can't seeem to get program to start via rc.local?

2016-10-14 Thread raahelps
On Friday, October 14, 2016 at 8:03:21 PM UTC-4, Unman wrote:
> On Fri, Oct 14, 2016 at 04:27:16PM -0700, raahe...@gmail.com wrote:
> > On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com 
> > wrote:
> > > On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote:
> > > > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com 
> > > > wrote:
> > > > > I have been trying to get a program to startup when the AppVM that 
> > > > > its setup in starts up by adding a line to the rc.local file.
> > > > > 
> > > > > I changed rc.local to executable, and after the first few tries added 
> > > > > in programs that should definitely start (I thought) like firefox 
> > > > > (just to test). But still every time I start the appvm, nothing? Is 
> > > > > it the rc.local that is supposed to be used or another init file?
> > > > 
> > > > it doesn't really start gui programs if thats what you were trying. you 
> > > > have to add those to autostart.   You can create ~/.config/autostart/   
> > > > and add a .desktop file in there.
> > > 
> > > I tried the .profile option before I saw your post but it seems to have 
> > > worked (for a file syncing service frontend). I didn't quite follow your 
> > > .desktop suggestion though would I add the path to the x file in the 
> > > .desktop file? (could come in handy later so might as will understand it 
> > > now).
> > 
> > I don't quite understand what you are asking.  maybe this will help. 
> > https://linuxcritic.wordpress.com/2010/04/07/anatomy-of-a-desktop-file/
> >  You can also look in your system for examples usually in 
> > /etx/xdg/autostart.  
> > 
> 
> If it helps I have this in one of my qubes:
> .config/autostart/xterm.desktop
> 
> [Desktop Entry]
> Name=Xterm
> Exec=xterm
> Terminal=false
> Type=Application
> 
> When the qube starts it spawns an xterm.
> The crucial line , of course, is Exec=xterm
> 
> unman

you can put the full path in exec line and can always just point to a script. 
path line for working directory   I use one for pglgui

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/da2a60bc-5eaa-4dd9-b03a-57b410eef308%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can't seeem to get program to start via rc.local?

2016-10-14 Thread Unman
On Fri, Oct 14, 2016 at 04:27:16PM -0700, raahe...@gmail.com wrote:
> On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com wrote:
> > On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote:
> > > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com 
> > > wrote:
> > > > I have been trying to get a program to startup when the AppVM that its 
> > > > setup in starts up by adding a line to the rc.local file.
> > > > 
> > > > I changed rc.local to executable, and after the first few tries added 
> > > > in programs that should definitely start (I thought) like firefox (just 
> > > > to test). But still every time I start the appvm, nothing? Is it the 
> > > > rc.local that is supposed to be used or another init file?
> > > 
> > > it doesn't really start gui programs if thats what you were trying. you 
> > > have to add those to autostart.   You can create ~/.config/autostart/   
> > > and add a .desktop file in there.
> > 
> > I tried the .profile option before I saw your post but it seems to have 
> > worked (for a file syncing service frontend). I didn't quite follow your 
> > .desktop suggestion though would I add the path to the x file in the 
> > .desktop file? (could come in handy later so might as will understand it 
> > now).
> 
> I don't quite understand what you are asking.  maybe this will help. 
> https://linuxcritic.wordpress.com/2010/04/07/anatomy-of-a-desktop-file/
>  You can also look in your system for examples usually in /etx/xdg/autostart. 
>  
> 

If it helps I have this in one of my qubes:
.config/autostart/xterm.desktop

[Desktop Entry]
Name=Xterm
Exec=xterm
Terminal=false
Type=Application

When the qube starts it spawns an xterm.
The crucial line , of course, is Exec=xterm

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161015000319.GA19245%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Chromium asking about choosing password for new keyring?

2016-10-14 Thread raahelps
On Friday, October 14, 2016 at 6:02:43 PM UTC-4, gaikokuji...@gmail.com wrote:
> I made a appvm (fedora 23) just for chromium and started it up and then 
> started Chromium and another windows came up saying:
> 
> "Choose password for new keyring
> An application wants to create a new keyring called 'Default keyring'. Choose 
> the password you want to use for it."
> 
> What exactly is it asking for? a password for the browser itself? For a site 
> (didn't seem like a site) or is it related to the appvm? I wanted to ask 
> before creating something I didn't entirely understand.

I think chrome wants to use the linux gnome-keyring.  If you leave it blank and 
just hit continue it won't ask again.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01743bf8-a3a7-412b-a76a-cf5667c87839%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can't seeem to get program to start via rc.local?

2016-10-14 Thread raahelps
On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com wrote:
> On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote:
> > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com 
> > wrote:
> > > I have been trying to get a program to startup when the AppVM that its 
> > > setup in starts up by adding a line to the rc.local file.
> > > 
> > > I changed rc.local to executable, and after the first few tries added in 
> > > programs that should definitely start (I thought) like firefox (just to 
> > > test). But still every time I start the appvm, nothing? Is it the 
> > > rc.local that is supposed to be used or another init file?
> > 
> > it doesn't really start gui programs if thats what you were trying. you 
> > have to add those to autostart.   You can create ~/.config/autostart/   and 
> > add a .desktop file in there.
> 
> I tried the .profile option before I saw your post but it seems to have 
> worked (for a file syncing service frontend). I didn't quite follow your 
> .desktop suggestion though would I add the path to the x file in the .desktop 
> file? (could come in handy later so might as will understand it now).

I don't quite understand what you are asking.  maybe this will help. 
https://linuxcritic.wordpress.com/2010/04/07/anatomy-of-a-desktop-file/
 You can also look in your system for examples usually in /etx/xdg/autostart.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5a2f134-c87c-4325-abe0-e8d18b41048d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Possible to run a launcher (like Synapse) in Qubes?

2016-10-14 Thread Gaiko Kyofusho
given qubes separation is it possible to run something like Synapse (or
some similar launcher) in Qubes?

It would be awesome to have times that one could say start typing the VM
Name  then start typing the app .

For those of use using Qubes on a laptop with a miserable touchpad a proper
launcher is sorely missed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGpWZxOEMnsc1%2BXW%2BU%2Bm39AWuMsdbfhDsKrgWXrYjTeYEoX1dA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to send wake on lan from qubes?

2016-10-14 Thread raahelps
On Thursday, October 13, 2016 at 8:28:51 AM UTC-4, gal...@gmail.com wrote:
> I'm trying to remotely wake a computer from qubes with these commands:
> 
> sudo ether-wake -b MAC
> sudo ether-wake MAC
> 
> Neither version works and I get no error messages.
> 
> The remote computer wakes remotely from other (non qubes) computers.
> 
> I've tried from a template VM and a normal VM.
> 
> ether-wake is not available in the dom0 terminal.
> 
> Is there some setting I need to configure in qubes to make this work?

did you try from sys-net?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f604d52f-f1a4-4e42-97a6-0162c8336d76%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can't seeem to get program to start via rc.local?

2016-10-14 Thread gaikokujinkyofusho
On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote:
> On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com wrote:
> > I have been trying to get a program to startup when the AppVM that its 
> > setup in starts up by adding a line to the rc.local file.
> > 
> > I changed rc.local to executable, and after the first few tries added in 
> > programs that should definitely start (I thought) like firefox (just to 
> > test). But still every time I start the appvm, nothing? Is it the rc.local 
> > that is supposed to be used or another init file?
> 
> it doesn't really start gui programs if thats what you were trying. you have 
> to add those to autostart.   You can create ~/.config/autostart/   and add a 
> .desktop file in there.

I tried the .profile option before I saw your post but it seems to have worked 
(for a file syncing service frontend). I didn't quite follow your .desktop 
suggestion though would I add the path to the x file in the .desktop file? 
(could come in handy later so might as will understand it now).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1d504956-af1f-403b-a0e6-8429bc06a7ed%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Bug or Feature? DispVM inherits settings from calling VM

2016-10-14 Thread raahelps
On Friday, October 14, 2016 at 6:16:16 PM UTC-4, raah...@gmail.com wrote:
> On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2016-10-13 03:45, Robert Mittendorf wrote:
> > > Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com:
> > >>
> > >> feature.  I use to make menu shortcuts to launch programs in dispvms 
> > >> inheriting firewall rules.  But xfce only lets you edit already existing 
> > >> rules,  not create new ones :(   editing a config file is a little too 
> > >> much effort for me lol.
> > >>
> > > You can edit the rules in Xfce-Dom0 via the Qubes VM Manager?!
> > > 
> > > How can this "feature" be disabled? I want to start a normal DispVM, not 
> > > a "special" DispVM.
> > > 
> > > Use Case: Mail VM is only allowed to access Mail-Server. I want to start 
> > > a Browser in DispVM for urls in Mails.
> > > This works fine, but those "special" DispVMs have the same limitations. I 
> > > want just a normal DispVM like the one started via Dom0. The only way to 
> > > achieve this afaik is to let the special DispVM connect to NetVM, so no 
> > > ProxyVM is used. But this means that the DispVM has access to the 
> > > intranet.
> > > 
> > 
> > This is precisely the use case I described in issue #1296, which I linked 
> > in my previous message:
> > 
> > https://github.com/QubesOS/qubes-issues/issues/1296
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJX/9QlAAoJENtN07w5UDAweRkP/0uhxA8ARtTJuYuroi0znFNb
> > gXb/LRC0rCy9F1TdiwXAhj7kHMSx+HObeXCqTGFlvCYl6sJGkTW0GWulN2M6XtCj
> > KLHQ+vS6YpMTB4EYrDu2QBVlMuFoZoNuj+O/XVcup3aK1MUvpeJJwX6VzCc/X2Y4
> > NHYthK8PtbPZ8WHEdsdAYWBrKWw14ewtaQY9bIsx4SBjf/iq0sr/vGeWOR6Trok1
> > 0SCYo0UBgWKKDPCUeRFUKPSrL/ZCPzeF5fC+F4oG+LZE5xHM5Vu8++U5D9lCuOoS
> > pfqfWI9zKib4WTjwv+tQth5G3khM+W9vfmLJfkwuO6bIGO2B59gKSwwh/DCcTH0q
> > jPUgGv7dn4Ypobh15YKxynvilYMNXBLoN5nst/3ZWh2tGMwsJ9Qicc7LRg5lUpWq
> > Gm+V27OEmwf40G3ejFKXr937Jc3j+GjiBAMN3hhTbfb9FkMjTS5HJqVl0rpTOX7V
> > p6YW+JfdtiRGEPhiCY/24ld0p//TIyL72Ry5mT4naSP2mJyViFt3cZr91Uvcr4/p
> > 5BltNOzPvpGvlR+S1CM8Kn3LcV9GZb1uKdHBGRfAVA0Y6Ikh8t8N/i1h28e0gSdr
> > 02Wf9tssdixLIJL5kNQDew36kwqcW79c28qJTsfv60EM+nYHFfhrPSoZyyzrT4ty
> > Jv8Ojecj2huxgn9KS0ln
> > =uR2N
> > -END PGP SIGNATURE-
> 
> couldn't you just use a normal dispvm then?  meaning why even launch anything 
> from within an appvm?  Just run it from dom0, like the default firefox dispvm 
> menu item.

only reason i'd launch a program in a dispvm from within an appvm,  is to 
inherit its firewall rules. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a36758a3-7a85-42fb-a6b6-2fcea9463102%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Bug or Feature? DispVM inherits settings from calling VM

2016-10-14 Thread raahelps
On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2016-10-13 03:45, Robert Mittendorf wrote:
> > Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com:
> >>
> >> feature.  I use to make menu shortcuts to launch programs in dispvms 
> >> inheriting firewall rules.  But xfce only lets you edit already existing 
> >> rules,  not create new ones :(   editing a config file is a little too 
> >> much effort for me lol.
> >>
> > You can edit the rules in Xfce-Dom0 via the Qubes VM Manager?!
> > 
> > How can this "feature" be disabled? I want to start a normal DispVM, not a 
> > "special" DispVM.
> > 
> > Use Case: Mail VM is only allowed to access Mail-Server. I want to start a 
> > Browser in DispVM for urls in Mails.
> > This works fine, but those "special" DispVMs have the same limitations. I 
> > want just a normal DispVM like the one started via Dom0. The only way to 
> > achieve this afaik is to let the special DispVM connect to NetVM, so no 
> > ProxyVM is used. But this means that the DispVM has access to the 
> > intranet.
> > 
> 
> This is precisely the use case I described in issue #1296, which I linked in 
> my previous message:
> 
> https://github.com/QubesOS/qubes-issues/issues/1296
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJX/9QlAAoJENtN07w5UDAweRkP/0uhxA8ARtTJuYuroi0znFNb
> gXb/LRC0rCy9F1TdiwXAhj7kHMSx+HObeXCqTGFlvCYl6sJGkTW0GWulN2M6XtCj
> KLHQ+vS6YpMTB4EYrDu2QBVlMuFoZoNuj+O/XVcup3aK1MUvpeJJwX6VzCc/X2Y4
> NHYthK8PtbPZ8WHEdsdAYWBrKWw14ewtaQY9bIsx4SBjf/iq0sr/vGeWOR6Trok1
> 0SCYo0UBgWKKDPCUeRFUKPSrL/ZCPzeF5fC+F4oG+LZE5xHM5Vu8++U5D9lCuOoS
> pfqfWI9zKib4WTjwv+tQth5G3khM+W9vfmLJfkwuO6bIGO2B59gKSwwh/DCcTH0q
> jPUgGv7dn4Ypobh15YKxynvilYMNXBLoN5nst/3ZWh2tGMwsJ9Qicc7LRg5lUpWq
> Gm+V27OEmwf40G3ejFKXr937Jc3j+GjiBAMN3hhTbfb9FkMjTS5HJqVl0rpTOX7V
> p6YW+JfdtiRGEPhiCY/24ld0p//TIyL72Ry5mT4naSP2mJyViFt3cZr91Uvcr4/p
> 5BltNOzPvpGvlR+S1CM8Kn3LcV9GZb1uKdHBGRfAVA0Y6Ikh8t8N/i1h28e0gSdr
> 02Wf9tssdixLIJL5kNQDew36kwqcW79c28qJTsfv60EM+nYHFfhrPSoZyyzrT4ty
> Jv8Ojecj2huxgn9KS0ln
> =uR2N
> -END PGP SIGNATURE-

couldn't you just use a normal dispvm then?  meaning why even launch anything 
from within an appvm?  Just run it from dom0, like the default firefox dispvm 
menu item.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed12f24e-eb0f-4b2a-8232-c4f13a496877%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Chromium asking about choosing password for new keyring?

2016-10-14 Thread gaikokujinkyofusho
I made a appvm (fedora 23) just for chromium and started it up and then started 
Chromium and another windows came up saying:

"Choose password for new keyring
An application wants to create a new keyring called 'Default keyring'. Choose 
the password you want to use for it."

What exactly is it asking for? a password for the browser itself? For a site 
(didn't seem like a site) or is it related to the appvm? I wanted to ask before 
creating something I didn't entirely understand.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/784373a7-64ab-4605-afd4-bd223dc58270%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can't seeem to get program to start via rc.local?

2016-10-14 Thread raahelps
On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com wrote:
> I have been trying to get a program to startup when the AppVM that its setup 
> in starts up by adding a line to the rc.local file.
> 
> I changed rc.local to executable, and after the first few tries added in 
> programs that should definitely start (I thought) like firefox (just to 
> test). But still every time I start the appvm, nothing? Is it the rc.local 
> that is supposed to be used or another init file?

it doesn't really start gui programs if thats what you were trying. you have to 
add those to autostart.   You can create ~/.config/autostart/   and add a 
.desktop file in there.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/71e40f12-c88f-4ec2-8147-62b713238197%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Can't seeem to get program to start via rc.local?

2016-10-14 Thread Unman
On Fri, Oct 14, 2016 at 12:57:06PM -0700, gaikokujinkyofu...@gmail.com wrote:
> I have been trying to get a program to startup when the AppVM that its setup 
> in starts up by adding a line to the rc.local file.
> 
> I changed rc.local to executable, and after the first few tries added in 
> programs that should definitely start (I thought) like firefox (just to 
> test). But still every time I start the appvm, nothing? Is it the rc.local 
> that is supposed to be used or another init file?
> 

Depending on what you want to start rc.local is almost certainly
not the best place. It's too early in the boot.
For user stuff like firefox you could add an entry to .profile: this
will start the program when you start the qube.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161014212759.GA17469%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] awesome wm issues

2016-10-14 Thread prancertheory
Thanks for packaging awesome wm for qubes. It mostly works well, but I
have a couple of issues.

(1) the menubar does not scroll. Annoying if you have more vms than can
fit in it. I had a glance at qubes.lua and it looks like there's no easy
way to add sub-directories to split the vms (e.g. anything starting with
sys- should go under system-vms, etc).

(2) notifications are not displayed (e.g. vpn and tor connect/disconnect
messages).

If anyone has work arounds for these issues, that would be... awesome.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/653703b4169ef29f46f3aa9388670fe5.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ReactOS instead of Win7?

2016-10-14 Thread gaikokujinkyofusho
On Thursday, October 13, 2016 at 9:59:08 PM UTC-4, Drew White wrote:
> On Thursday, 13 October 2016 23:26:31 UTC+11, gaikokuji...@gmail.com  wrote:
> > On Wednesday, October 12, 2016 at 10:12:48 PM UTC-4, Drew White wrote:
> > > On Thursday, 13 October 2016 07:48:24 UTC+11, Gaiko Kyofusho  wrote:
> > > > I haven't seen much mention of ReactOS on the list but was thinking it 
> > > > *might* be worth trying a ReactOS AppVM as an alternative to a MS 
> > > > Windows AppVM but before I put myself through the frustration I thought 
> > > > I'd ask #1 The wisdom (or not) of the idea and #2 If its been tried 
> > > > already and doesn't work yet.
> > > > 
> > > > Thx
> > > 
> > > Qubes tools will NOT work. ROS is only 32 bit. It's still only 2003/XP 
> > > based.
> > > I'm looking at doing something with the Qubes Tools to enable at least 
> > > copy/paste/qrexec.
> > > 
> > > But at this time, it just won't have that option available if you use 
> > > ReactOS.
> > 
> > Thats too bad, it would have been nice to use OSS to run win apps but 
> > anyway thanks for the answer! Saved me a bit of frustration trying to make 
> > it work.
> 
> No problem, I just talked to the ReactOS people to find out.
> during the chat, I may have worked out exactly how to get them working 
> though, as some of them have patches/cracks to get win7 stuff to work on ROS.
> Not always well, but it does work.
> 
> On the other hand, I may just write an interpreter for ReactOS to work just 
> like the tools normally would. It shouldn't be that hard since the code is 
> already available. But who knows. I will probably encounter many issues. But 
> I think that it will be beneficial in the end.
> 
> At the moment there are other things I'm working on in Qubes to get it to 
> work right, you know, bridged networking and all. and I mean completely 
> bridged, not just forwarding.
> So that's my first priority, then I'll get onto this other thing and see what 
> I can pull off, or if it is even possible. It should be possible, and 
> shouldn't take too long if it is possible. 
> 
> I'll let you know how it goes.

Totally understand the priorities part. But hey, its great to hear that it 
will/might be added in the future as I think ReactOS fits (ethos wise) fairly 
well with Qubes. Look'n forward to it.

Thanks!!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3081a644-6b19-4945-83d5-017d03e430ca%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can't seeem to get program to start via rc.local?

2016-10-14 Thread gaikokujinkyofusho
I have been trying to get a program to startup when the AppVM that its setup in 
starts up by adding a line to the rc.local file.

I changed rc.local to executable, and after the first few tries added in 
programs that should definitely start (I thought) like firefox (just to test). 
But still every time I start the appvm, nothing? Is it the rc.local that is 
supposed to be used or another init file?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ed3c4d70-2700-489c-b45a-75c7bfe12762%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] sys-usb mouse issues when copying files to USB

2016-10-14 Thread cubit
Hello!

I am really not where to start or look to troubleshoot so suggestions are 
welcome.

Since upgrading to 3.2 any time I copy files in sys-usb to USB stick, my 
external mouse becomes hard to use.  Moving the cursor is no longer smooth and 
seems to lag and as a result jumps when moving it across the screen.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/KU3igwr--3-0%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] View: Qubes discussion should be migrated away from Google Groups

2016-10-14 Thread Andrew
epicd...@gmail.com:
> I imagine the requirement of a Google account deters many from contributing 
> to discussion. All Google accounts require SMS verification of a phone, which 
> is very de-anonymizing, and sort of out of line with the privacy centric 
> nature of Qubes and its users. 
> 

You are mistaken.  A Google account is not required to join the mailing
list.  I agree about the invasiveness of SMS-based "authentication", though.

Andrew

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1aaefa9c-e0b4-39f8-e660-1c34b833036d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: View: Qubes discussion should be migrated away from Google Groups

2016-10-14 Thread 109278409178304917834093
Hello,

I would appreciate more anonymity (I think there is a french group-chat 
platform...).

Nice would be some good structure, before you dive inside the big hep of 
discussions.

Installation
Newbie questions
Bugs
...

This forum makes a perfect job for onboarding into a new community:

http://forums.thebrain.com/

And the innovative discussions about future features are bundled here for the 
normal non-techie users (and works well too):

https://thebrain.uservoice.com/forums/4597-thebrain-feature-suggestions

I look forward to see some improvements.

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/826c3cb1-4ef1-4fc6-a8f8-76cd243e0630%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Hard to run TheBrain - better alternatives?

2016-10-14 Thread 10943278091327840932107
Hello,

It is hard to get TheBrain run perfect under QubesOS.

- no deep link content search (attach a file to PB and type a search-keyword in 
the search field and press enter), which seams not to work
- new node F6 and press the type or tag button, which seams not to work
- node, context menue, new type, select a color, which seams not to work

TheBrain is more than a mindmapping tool, so also file management will work 
fine - so this could also give a central searchable place - in theory - for 
Qubes. 

In my eye a real killer application.

But with weaknesses:

- javabased and this might or might not be super secure
- no real DB and this might or might not be super stable for the long time usage
(PB-Backups, btfrs, daily Linux-Backups or QVM-Backups would be recommended, if 
you like to get full access of all your data, even in "bad" situations - 
somethimes thebrain becomes a little or more corrupted. An than perhaps or 
perhaps not you might safe your data).
- keylogger
- cloud (optinal)

But, ok. Is there some similar tool, which works today seamless together with 
Qubes?

Are there any suggestions, how to integrate, comment and search on a big stack 
of informations?

http://alternativeto.net/software/personal-brain/

I use thebrain normally for:

- configuration management
- knowlege management
- file management
- search (or better find my things)

And sure I would be happy, if PB7 will work perfect togehter / inside Qubes. 
But I'm also open to better solutions, instead to be in the bug-patch-loop, I 
like more the fast productive working. In general I like the simple NT-style of 
QR32, as long it works and I can generate content.

Kind Regards


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0eef6a1b-47d5-4108-9c21-5fe953b94958%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Error converting vmdk disk to raw

2016-10-14 Thread pleomati

https://wiki.xenproject.org/wiki/Migration_from_VMware

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cedceb28-334d-46fc-9afc-b48d4f27f95a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Error converting vmdk disk to raw

2016-10-14 Thread pleomati
https://wiki.xenproject.org/wiki/Migration_from_VMware

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/481e81d5-b902-4d02-9895-fe5a4e76f158%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Error converting vmdk disk to raw

2016-10-14 Thread johnyjukya
> I'm having same issue, I know there is enough space because df -h shows
> 198G available and qemu-img-xen info image.vmdk shows that the virtual
> disk size is 8G

I've had cases with the qemu tools where it reported a write error because
it had trouble reading one of the input files (corrupted, I think it was,
or maybe a usage error).

Put a "strace -o /tmp/log.txt" before your command, and go look at the
system calls that resulted in it giving that error message.  You might see
a read error, or more specifics on the nature of the write failure.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/188acf2835438040b31c2bfdd6b70c65.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] View: Qubes discussion should be migrated away from Google Groups

2016-10-14 Thread epicdonk
I imagine the requirement of a Google account deters many from contributing to 
discussion. All Google accounts require SMS verification of a phone, which is 
very de-anonymizing, and sort of out of line with the privacy centric nature of 
Qubes and its users. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e05730c6-fdd6-4384-80a0-fba658ad59b8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Leakproof Qubes VPN

2016-10-14 Thread epicdonk
Hello, what is the difference between this implementation and just following 
the VPN guide on the Qubes website? Both seem to create a proxyVM.

https://www.qubes-os.org/doc/vpn/

Is your version more leak proof, if so, how?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b14278f-f0c6-4d79-be6c-ad6db633760a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Leakproof Qubes VPN

2016-10-14 Thread pleomati


What im doing wrongso so its not working on fedora-23-minimal
i follow this steps

1.install openvpn in fedora minimal template
2.copy to fedora min template qubes-vpn*.noarch.rpm that i build in git qubes
3.sudo dnf install qubes-vpn*noarch.rpm && mkdir /rw/config/qubes-vpn
4 copy VPN .ovpn config files there
5.create file qubes-vpn.creds  1 line username 2 line pass
6 mv vpn-config.ovpn qubes-vpn.conf
7.edit qubes-vpn.conf and add 
  
auth-user-pass qubes-vpn.creds
auth-retry nointeract

8.create vpn vm from fedora minimal - check box proxy vm trugh sys-fireewall
9 in VPN vm i add qubes-vpn to service
1- add firewall restrict in firewall tab * port
11 test config : openvpn --config qubes-vpn.conf SUCCES connect
12.shutdown VPN vm
13 set WORK VM to use VPN insted sys-firewall
14 start WORK vm
15 VPN starts automaticaly
16 Firefox in WORK start

and it wont connect 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a562c8b2-e5b4-4f90-8316-7ff2fb5ee7a1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: ANN: Leakproof Qubes VPN

2016-10-14 Thread pleomati
What im doing wrongso so its not working on fedora-23-minimal

i follow this steps

1.install openvpn in fedora minimal template
2.copy to fedora min template qubes-vpn*.noarch.rpm that i build in git qubes
3.mkdir /rw/config/qubes-vpn
4 copy VPN .ovpn config files there
5.create file qubes-vpn.creds  1 line username 2 line pass
6 mv vpn-config.ovpn qubes-vpn.conf
7.edit qubes-vpn.conf and add 
  
auth-user-pass qubes-vpn.creds
auth-retry nointeract

8.create vpn vm from fedora minimal - check box proxy vm trugh sys-fireewall
9 in VPN vm i add qubes-vpn to service
1- add firewall restrict in firewall tab * port
11 test config : openvpn --config qubes-vpn.conf SUCCES connect
12.shutdown VPN vm
13 set WORK VM to use VPN insted sys-firewall
14 start WORK vm
15 VPN starts automaticaly
16 Firefox in WORK start

and it wont connect 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/43b74b3f-679b-42dc-a397-efdeb2fdc250%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] TVM ASLR-exploit-proof?

2016-10-14 Thread Manuel Amador (Rudd-O)
On 10/14/2016 01:26 PM, 917832409173409178324097 wrote:
> Hello,
>
> can ASLR tech help to build a hard template VM for Qubes?
>
> https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/
>
> checksec.sh: 
> How important it is that all libs and executables are PIE-compiled?
> Are 100% of the TVM PIE compliant?
>
> https://www.blackhat.com/docs/asia-16/materials/asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems.pdf
>
> Will ASLR-NG mitigate the ASLR-weaknesses?
>
> The rerandomization should be fast enough or be able to detect some 
> brute-force attacks.
>
> There are other exploit-strategies, which sould be taken into account, so 
> that the TVM is hard enough to resist the contact with the web (ebanking) - 
> or the QAchitecture is adressing all of them?
>
> Heap-Spraying?
> Egg-Hunting?
> ROP?
> DEP?
> SEHOP?
> SafeSEZ?
> Stack Cockies?
> SEH overflows?
> stack overflows?
>
> or others?
>
> It looks that there are many methods around to inject shellcode in some way...
>
> https://www.corelan.be/index.php/2013/02/19/deps-precise-heap-spray-on-firefox-and-ie10/
>
> Kind Regards
>

This would be really nice, but basically you're talking about hardening
Fedora, so this should probably be done with upstreaming the work in
mind.  Perhaps we begin with a template on Qubes OS that we can use, and
piece by piece, the modifications to that template can get upstreamed. 
Eventually the template will no longer be necessary.


-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3fa020b9-2b92-df63-0dce-70ed805321bd%40rudd-o.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] TVM ASLR-exploit-proof?

2016-10-14 Thread 917832409173409178324097
Hello,

can ASLR tech help to build a hard template VM for Qubes?

https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/

checksec.sh: 
How important it is that all libs and executables are PIE-compiled?
Are 100% of the TVM PIE compliant?

https://www.blackhat.com/docs/asia-16/materials/asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems.pdf

Will ASLR-NG mitigate the ASLR-weaknesses?

The rerandomization should be fast enough or be able to detect some brute-force 
attacks.

There are other exploit-strategies, which sould be taken into account, so that 
the TVM is hard enough to resist the contact with the web (ebanking) - or the 
QAchitecture is adressing all of them?

Heap-Spraying?
Egg-Hunting?
ROP?
DEP?
SEHOP?
SafeSEZ?
Stack Cockies?
SEH overflows?
stack overflows?

or others?

It looks that there are many methods around to inject shellcode in some way...

https://www.corelan.be/index.php/2013/02/19/deps-precise-heap-spray-on-firefox-and-ie10/

Kind Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a99b301-e162-4069-b131-91ab9d12925f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANN: Leakproof Qubes VPN

2016-10-14 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Oct 13, 2016 at 11:22:08PM -0400, Chris Laprise wrote:
> On 10/13/2016 09:31 PM, Manuel Amador (Rudd-O) wrote:
> > 
> > Oops about what?  Unlike the official Qubes VPN documentation, which
> > counsels people to write scripts that make non-atomic modifications to
> > their firewall, which actually and demonstrably have a leak between
> > Qubes firewall updates and VPN rules setup, my work doesn't leak traffic
> > in-between the addition of iptables rules.
> 
> The qubes-firewall-user-script is a feature of Qubes firewall. And its one
> of the original Qubes docs that encourage people to use it. So, yes, there
> is a vulnerability in Qubes firewall, and it should be noted foremost in the
> Known Issues for the project.

ip_forwarding is disabled for the time of reloading rules.

Anyway, guys, please. Both solutions are fine. 
One is easier to understand, convert to other VPN software and apply to
ProxyVM without modifying any template. The other one is OpenVPN
specific (at least currently) and easier to package (so do not require
copying any script by the user manually). Technical details here (more
iptables modifications vs separate route table) are just technical
details. Both approaches should work.

The nice thing of manual one (in current shape) is also blocking traffic
going from ProxyVM itself (and not originated by VPN software). But it
should be trivial to add the same to the other one. This should not
affect AppVMs behind such ProxyVM in anyway.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYAMmSAAoJENuP0xzK19csNroIAJpPS2jnDHdUBMKImgEMTzJZ
AWtgDbMpUpYDT7aX+LC8W84DrNHciDfbOhbNaVwxOgLX2iSd5iafv62M73D3oSsr
2+nO5isSnpY72CnJZgxPiS5jZ0R6WoF5zQcuDx3PREgU4Nr0hKCUQbITAMRhW6I+
XF3lemLX9InUzowYFgLFxc+8x1N0FSBToFor73W1tBFZI5SuS0mYoTCLsncFTBDC
QGOGd74V24aoQv3y++gD/wwaME8+oRLv5wqun75DuKx+hcSXUJEfwouemfKsyEva
8R42R1ZaF671jL+POORZPKL+AnLvrxwFC+FnArOQtt2STL5lrIcKW64PR5Iju8k=
=CCiA
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20161014120331.GW15776%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Thoughts about installed software

2016-10-14 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Jeremy!

> In Qubes 3.0, I noticed that source files for the "move to VM"
> command would be deleted even if the move failed due to
> insufficient disk space in the destination VM.  (It goes without
> saying that this is a Very Bad Thing.)

That was fixed in R3.1:
https://github.com/QubesOS/qubes-issues/issues/1355

> I'm not sure if this is still the case in newer releases of Qubes.

I don't think it is. There's also another commit somewhere to call
syncfs() after copying. So qvm-move-to-vm *should* be safe since R3.1
(unless the destination VM was debian-7 based, which had an old glibc
without syncfs() support).

Rusty
-BEGIN PGP SIGNATURE-
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=Bj5/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b71cd9a-d072-5c8c-d891-3ac641591a9b%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.