[qubes-users] Re: *.brain files 3.18.5 - Open with - add (application)?
Hello, With the q-menue sync command I can bring the new app into the VM application menu: 1. start VM 2. terminal dom0 3. qvm-sync-appmenus vmname This works fine. But why nautilus / files 3.18.5 open with applications menue is not in sync afterwards? I would expect TheBrain Icon, run this file under the application... Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b966a3a5-1265-4ab6-a35f-57d01bb74572%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Error Debian Standalone restart
Hello, uner QR32 an D8 standalone restart via QM is running into the error line: assert no vm.is running() func: start_vm line_no: 1158 ?? Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ce3167d6-e1cf-41cd-bad8-570174523631%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] *.brain files 3.18.5 - Open with - add (application)?
Hello, I like to open in /Documents my file *.brain with TheBrain. PB7 can be started via the terminal... /rw/usrlocal/TheBrain/TheBrain I open the files 3.18.5 and found the help, which explains how I add a new application: 1. choose file ... *.brain 2. open with 3. press the button ADD But this button is inactive... What I must do that I can press this button? Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d998b154-3b85-4838-b221-a9227a35ca24%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can't seeem to get program to start via rc.local?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-14 20:35, pleom...@gmail.com wrote: > after reboot in systems should be to run also on cron > @ reboot > > but Qubes is build on Fedora mostly and it not have even cron. > In Qubes, cron is available in both dom0 and the standard Fedora TemplateVM. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYAbrDAAoJENtN07w5UDAwEV8P/2Yewgk8V2vnlF4pF23hH5RY o4+FCEGccOBknULgypbkXWEhLiwnmYWV4ODDTaGwhEDBggf6zN0lyUEBB8PSwGOa o25NnRfAJ4/GvyQOlzy6P0IBN3UO5VNTpUVvg+hsRdQa6wwNVw4TUdWgFmcmkEOY mvcVBsMRXhOvabBg1T7jjFH/+F6dBU8pMv04uzQL0FZRlVG2ViDrpibIgna7X3aX KULUkBHKxppoQo4w52h+g4MzgucVmyx/2R+AIJ1X5oAck1DUM2tJoq8FrjG39t2V NwQ/BXeVDxPo+K5oSmajeXc/PPZ3SnCXDmAxylBc8RMVpLqjRLbX1C5h38hVbcEJ M878mrWGoQNKOJkc8/g8SyIiKit+PeKaf1kQFhMoNkqY+a9jcQxkVw20HvTKqSpD aExkbJNgGVyqDjv7U/vJq+fzZ+teXOZAKt3MY+tRhFBB7ze/LEwgtqGF8RnoP4yD m5AQPKPlBrqSwbkIMCYzbnwgrD06ZCo6Ech/24+ZNvQjy2z+D5gDlMbzIUzHl+2W g6nRwGJQqtaZY0Ov4sop7JC6fVSAcLlH+rEdN4IoL921qiD7FjgQ3DeKoWIPpwMj y25r7Y5XYVjemoZM/8fj4UL5mPva0VA5zNsiJHrC/N9c7e6TfWeRcFj54qMbXMit 8kp5NENhVckCW3K3Xy6K =9YT9 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7c34381d-be0a-09f4-fa08-9bc8f55e5857%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: philosofy on qubes and other environment
And if there is some kind of exploaitaion so the secure system should not been build on the same topology as its qubes bcs of chain exploits.So this system under security measures dont have any value ... bcs its build on the same linux topology ... someone brake 1 pcs brake on chain logic whole environment. better way for secure environment is mix topology than duplicate or clone them. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a2b46023-ee37-4792-aa19-8721ae1c84f5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Restart sound card "state"..?
When I first installed Qubes, my webcam/mic was plugged in. I have since removed the webcam/mic physically. Since doing this, the sound no longer works on Qubes. I tried booting Ubuntu live disc, and sound works. So it's not a physical problem. I feel like Qubes initially detected a certain "state" or some kind of hardware detection. And now, it's different hardware, so it doesn't play sound anymore. Speakers, headphone sockets.. Simply no sound. How do I re-detect the sound hardware.. or restart the state.. or something along these lines..? Something like what Qubes would do when first installing.. Detecting the hardware..? Something like that. How do I do this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/265bd410-a892-46bf-9b14-811dde0ecc55%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: philosofy on qubes and other environment
yep i know someone exploit ur app and take control on ur environment.. but ... if app is in sandbox then he cant take any control on system bcs its a jail or sanbox. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a6a31f82-4e04-449d-a82a-55a7dff5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] philosofy on qubes and other environment
philosofy of qubes is that you are safe when your app is isolatet.This is wrong just keep app in sandboxes or jails and what wrong can be happen? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/06a0c291-f714-46eb-bb0b-88484af312c8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can't seeem to get program to start via rc.local?
after reboot in systems should be to run also on cron @ reboot but Qubes is build on Fedora mostly and it not have even cron. i think best way is to build on debian or FreeBSD not this stupid fedora.For sake this is so administratively wrong. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eb05956e-3b77-479b-ab2e-433a5041787c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to send wake on lan from qubes?
Rudd-O might be you so nice and explain why it dosent work https://groups.google.com/forum/#!topic/qubes-users/E2NBXnYazUk -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/613fbb6e-a247-4a82-95aa-26d9e6f51d01%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Bug or Feature? DispVM inherits settings from calling VM
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-14 15:18, raahe...@gmail.com wrote: > On Friday, October 14, 2016 at 6:16:16 PM UTC-4, raah...@gmail.com wrote: >> On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote: > On 2016-10-13 03:45, Robert Mittendorf wrote: > Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com: >> >> feature. I use to make menu shortcuts to launch programs in dispvms >> inheriting firewall rules. But xfce only lets you edit already existing >> rules, not create new ones :( editing a config file is a little too >> much effort for me lol. >> > You can edit the rules in Xfce-Dom0 via the Qubes VM Manager?! > > How can this "feature" be disabled? I want to start a normal DispVM, not > a "special" DispVM. > > Use Case: Mail VM is only allowed to access Mail-Server. I want to start > a Browser in DispVM for urls in Mails. > This works fine, but those "special" DispVMs have the same limitations. I > want just a normal DispVM like the one started via Dom0. The only way to > achieve this afaik is to let the special DispVM connect to NetVM, so no > ProxyVM is used. But this means that the DispVM has access to the > intranet. > > > This is precisely the use case I described in issue #1296, which I linked in > my previous message: > > https://github.com/QubesOS/qubes-issues/issues/1296 > >> >> couldn't you just use a normal dispvm then? meaning why even launch >> anything from within an appvm? Just run it from dom0, like the default >> firefox dispvm menu item. > > only reason i'd launch a program in a dispvm from within an appvm, is to > inherit its firewall rules. > Starting a new DispVM from dom0 and setting its NetVM is a lot more labor-intensive than simply clicking a link in an email and having the rest work automatically. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYAZ06AAoJENtN07w5UDAwJJoQAIvVrJe8k7MWk2PxHc3sXvv/ C4MGgOLJ31WiZAfk1EAz/3MmVgZzG5nNII3ViDEXqGBppk7jxlF3p9UhpmMJNBju xZB3z1MgVzSm5hXkHQ+enU/hv6RoO5iE+MdBSUnE9QGZiSf1Vg3xkCWzabGgjmuV jGBXaRJXt1ioeBpvpke+NGwmtcd52/KJbGJLo9HRDZhBSz7us0T6e2Kh7Z9snDNe mXTYpUvwriFbxnB4VEkfa52V4druYN3DWx39+nBsKZAzHSMpGfqAI7g0ZKdrLpHw J8MQ4YxM1qaMZKOBQX2BOgTQs0V92255u5RiX1atVJmctYFZ4GQEdeJ/nln0I7VT 86+mhkemBhzHVxvZkyPalZLi6+5INyjR8noJZpqkIsUUV50HmX0ZjG4yYPv88yTa EQvglEY+/wjed9mE+M9dB73E7DLFMJr858ime5AYtDai8Baotf1bIRW5XjsxNPdf h5zDU1ciEpoTYsX5O4bx4Fj+nF7+RMH5g0wC/o0/9A/3ougqEQ+9/sn7CWWBnPgA Ucv4c7sd9A3zU80PYy1RSZiW2MxdTkKNMD+rCL97JaeKgUxHWLE2M6wPQbkMRl9d XmbVBZpsj97ifpasDRRmA/zIeDqZT+Fg7F6GhuIyRUV2ym0UT8VvqOznp3Znvaj6 9RV4PZn2lL6pywgVQfY2 =BVEY -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e184223e-a9cb-b701-08df-66cfc5c19761%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: View: Qubes discussion should be migrated away from Google Groups
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-14 10:44, 109278409178304917834093 wrote: > Hello, > > I would appreciate more anonymity (I think there is a french group-chat > platform...). > It's quite possible to participate on both Qubes mailing lists anonymously (or pseudonymously). I did so for several years under the pseudonym "Axon," and many others still do. You can read about all the possible ways of interacting with the lists here: https://www.qubes-os.org/mailing-lists/ > Nice would be some good structure, before you dive inside the big hep of > discussions. > > Installation > Newbie questions > Bugs > ... > > This forum makes a perfect job for onboarding into a new community: > > http://forums.thebrain.com/ > > And the innovative discussions about future features are bundled here for the > normal non-techie users (and works well too): > > https://thebrain.uservoice.com/forums/4597-thebrain-feature-suggestions > > I look forward to see some improvements. > > Kind Regards > We've previously discussed the possibility of having an official Qubes forum, but we ultimately decided against it: https://groups.google.com/d/topic/qubes-users/2rqas38ncFA/discussion Note that this is in no way meant to deter anyone from creating an unofficial Qubes forum. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYAZp9AAoJENtN07w5UDAwsBsQAKULwhmL6tP+Iplsew82yfZs 21QykNraoSCurM6XX1E+hZ7aM6QmAV21+vWIGXFgMtZ4li/7ErqxSY2TE0HtJ62K IOeFNm9Qdii/8Im2Mr0KAqf0eYZcjK6469LaPPLbrwzgIIS+RYs3vl19eN6DvGb1 wN629/9GzLQ1eay5dw1op5pBiNN+ISS4tPwd2c6QCKtW9HqARmDIvwyNliLMduhY LEPO2+UjZ7O8HBkEFRgq6Z+YB5qNhtAjRUcvKlA0xcjwETkTUx3MxE3U0tPqOG3r TmgVj8GW9aQ7eoFd2AIzq4Mv61jRn8WdUG5pHo74ijchJ9zZ8z1Owoyz3bapBf3q 2b4O6tPdeN+kpJLST6WMlqP8qKKzeGpLIEtWaCS+TIfNzk2VMxrjaBLYHsP1GSNs +8Vj0fC4Y/Aa1I5KZ2rqJ7f4R7xI+vblhxck9hn/ACcAxNwXa3SqlyXK8BxkRgZ4 BKTQhxAlrA42T7Wp9LBgP/DiyqGZEMx2COnFCAzWxT/vQajYQPZp3FtTf0B8n+NR dwFbfGFuibRtZiIntgQEp71lPrk9iwNKzx7Tj4gyri6zimFY04YvMQaoHDiYpRHh gPqkGLKel9OQ7mOpEqEFHItgCRvZbdo97K22iQEhLRN1qGBWw6KIbN8mjb6xzwRQ Xcb9di/5GFEEhhrKdrld =vgzM -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/acfcdded-0bdc-65fd-0db8-1076e43094db%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] View: Qubes discussion should be migrated away from Google Groups
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-14 09:13, epicd...@gmail.com wrote: > I imagine the requirement of a Google account deters many from contributing > to discussion. All Google accounts require SMS verification of a phone, which > is very de-anonymizing, and sort of out of line with the privacy centric > nature of Qubes and its users. > Andrew is correct. A Google account is not required to participate on either of the Qubes mailing lists: https://www.qubes-os.org/mailing-lists/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYAZl3AAoJENtN07w5UDAwul0P/18RZzqQlrvWZFqF2smDD/3k M0nP2qPeO9cphHyipXfRUG4zb6uoDnG4rS1yPqZvQLPrbbMTiiEarhpq4XsHNx/i bwTvqU0FhxOYJF4zmpya2fE4Ssi1/OWaD5WS4TJme0WJNIQzbM8NVjTePzQmcrrA FUDH9gcHLTidz2hZXv4aOn7LY0fs7D/Qh1t6UY10CFj+3NBr5G5TZ/hR2/orpHnq v4as/Jlc0NihAs0Efe/bwUjb9cyb9SLUHfr/v45wBtOEn2mSAhRp6PurYgQLfUfG Mh9qfpgu7aJ/groTPpZrHo1cFG096m113pJUMOCcJEcHlTByEB4VNFWPztEzPVhy LPHPTyU2PMFCy1GUvslUTv9oSBdaBCHySLrGu1LfX6O4UQqB3Wd2J0Hv5x1vJN4H ONGk2+qBNbPi2/6li01rkYDl6kFVRihrTK5iQ+VI+hCPh8JXUvecqccrFrQIVq2A a6915j5dN/Zlp035093LltOtayaB3m95z9B+rF0eZWNamTa81nMsD8eUIFoodI4i XQQLJqRUb/fVjIN9kiv2VUIXyvOB4TGn8cPrqvUuYXIumj6Sja39tJcr1OnPJA/U ugtqv3ZWSZRFZl6lnEU+REEd24X/3i0gGHr15Z8zYf5BgKbXEfVvyHIDnp1XvbVj S9Fzz2zUyKOE2YmkUxpw =tO02 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/735aadac-7226-d5c5-e928-6920ebd4dae9%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Why it's so big secret?
On 10/13/2016 02:12 AM, nezna...@xy9ce.tk wrote: >> Then set up the Repos. > Pls tell me how you did it? Usually you can do this with a chrooted yum. Mock is the right tool to use. -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e5f06203-a353-b116-4c2c-03c11eff6a63%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can't seeem to get program to start via rc.local?
On Friday, October 14, 2016 at 8:03:21 PM UTC-4, Unman wrote: > On Fri, Oct 14, 2016 at 04:27:16PM -0700, raahe...@gmail.com wrote: > > On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com > > wrote: > > > On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote: > > > > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com > > > > wrote: > > > > > I have been trying to get a program to startup when the AppVM that > > > > > its setup in starts up by adding a line to the rc.local file. > > > > > > > > > > I changed rc.local to executable, and after the first few tries added > > > > > in programs that should definitely start (I thought) like firefox > > > > > (just to test). But still every time I start the appvm, nothing? Is > > > > > it the rc.local that is supposed to be used or another init file? > > > > > > > > it doesn't really start gui programs if thats what you were trying. you > > > > have to add those to autostart. You can create ~/.config/autostart/ > > > > and add a .desktop file in there. > > > > > > I tried the .profile option before I saw your post but it seems to have > > > worked (for a file syncing service frontend). I didn't quite follow your > > > .desktop suggestion though would I add the path to the x file in the > > > .desktop file? (could come in handy later so might as will understand it > > > now). > > > > I don't quite understand what you are asking. maybe this will help. > > https://linuxcritic.wordpress.com/2010/04/07/anatomy-of-a-desktop-file/ > > You can also look in your system for examples usually in > > /etx/xdg/autostart. > > > > If it helps I have this in one of my qubes: > .config/autostart/xterm.desktop > > [Desktop Entry] > Name=Xterm > Exec=xterm > Terminal=false > Type=Application > > When the qube starts it spawns an xterm. > The crucial line , of course, is Exec=xterm > > unman you can put the full path in exec line and can always just point to a script. path line for working directory I use one for pglgui -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/da2a60bc-5eaa-4dd9-b03a-57b410eef308%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can't seeem to get program to start via rc.local?
On Fri, Oct 14, 2016 at 04:27:16PM -0700, raahe...@gmail.com wrote: > On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com wrote: > > On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote: > > > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com > > > wrote: > > > > I have been trying to get a program to startup when the AppVM that its > > > > setup in starts up by adding a line to the rc.local file. > > > > > > > > I changed rc.local to executable, and after the first few tries added > > > > in programs that should definitely start (I thought) like firefox (just > > > > to test). But still every time I start the appvm, nothing? Is it the > > > > rc.local that is supposed to be used or another init file? > > > > > > it doesn't really start gui programs if thats what you were trying. you > > > have to add those to autostart. You can create ~/.config/autostart/ > > > and add a .desktop file in there. > > > > I tried the .profile option before I saw your post but it seems to have > > worked (for a file syncing service frontend). I didn't quite follow your > > .desktop suggestion though would I add the path to the x file in the > > .desktop file? (could come in handy later so might as will understand it > > now). > > I don't quite understand what you are asking. maybe this will help. > https://linuxcritic.wordpress.com/2010/04/07/anatomy-of-a-desktop-file/ > You can also look in your system for examples usually in /etx/xdg/autostart. > > If it helps I have this in one of my qubes: .config/autostart/xterm.desktop [Desktop Entry] Name=Xterm Exec=xterm Terminal=false Type=Application When the qube starts it spawns an xterm. The crucial line , of course, is Exec=xterm unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161015000319.GA19245%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Chromium asking about choosing password for new keyring?
On Friday, October 14, 2016 at 6:02:43 PM UTC-4, gaikokuji...@gmail.com wrote: > I made a appvm (fedora 23) just for chromium and started it up and then > started Chromium and another windows came up saying: > > "Choose password for new keyring > An application wants to create a new keyring called 'Default keyring'. Choose > the password you want to use for it." > > What exactly is it asking for? a password for the browser itself? For a site > (didn't seem like a site) or is it related to the appvm? I wanted to ask > before creating something I didn't entirely understand. I think chrome wants to use the linux gnome-keyring. If you leave it blank and just hit continue it won't ask again. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/01743bf8-a3a7-412b-a76a-cf5667c87839%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can't seeem to get program to start via rc.local?
On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com wrote: > On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote: > > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com > > wrote: > > > I have been trying to get a program to startup when the AppVM that its > > > setup in starts up by adding a line to the rc.local file. > > > > > > I changed rc.local to executable, and after the first few tries added in > > > programs that should definitely start (I thought) like firefox (just to > > > test). But still every time I start the appvm, nothing? Is it the > > > rc.local that is supposed to be used or another init file? > > > > it doesn't really start gui programs if thats what you were trying. you > > have to add those to autostart. You can create ~/.config/autostart/ and > > add a .desktop file in there. > > I tried the .profile option before I saw your post but it seems to have > worked (for a file syncing service frontend). I didn't quite follow your > .desktop suggestion though would I add the path to the x file in the .desktop > file? (could come in handy later so might as will understand it now). I don't quite understand what you are asking. maybe this will help. https://linuxcritic.wordpress.com/2010/04/07/anatomy-of-a-desktop-file/ You can also look in your system for examples usually in /etx/xdg/autostart. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b5a2f134-c87c-4325-abe0-e8d18b41048d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Possible to run a launcher (like Synapse) in Qubes?
given qubes separation is it possible to run something like Synapse (or some similar launcher) in Qubes? It would be awesome to have times that one could say start typing the VM Name then start typing the app . For those of use using Qubes on a laptop with a miserable touchpad a proper launcher is sorely missed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAGpWZxOEMnsc1%2BXW%2BU%2Bm39AWuMsdbfhDsKrgWXrYjTeYEoX1dA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to send wake on lan from qubes?
On Thursday, October 13, 2016 at 8:28:51 AM UTC-4, gal...@gmail.com wrote: > I'm trying to remotely wake a computer from qubes with these commands: > > sudo ether-wake -b MAC > sudo ether-wake MAC > > Neither version works and I get no error messages. > > The remote computer wakes remotely from other (non qubes) computers. > > I've tried from a template VM and a normal VM. > > ether-wake is not available in the dom0 terminal. > > Is there some setting I need to configure in qubes to make this work? did you try from sys-net? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f604d52f-f1a4-4e42-97a6-0162c8336d76%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can't seeem to get program to start via rc.local?
On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote: > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com wrote: > > I have been trying to get a program to startup when the AppVM that its > > setup in starts up by adding a line to the rc.local file. > > > > I changed rc.local to executable, and after the first few tries added in > > programs that should definitely start (I thought) like firefox (just to > > test). But still every time I start the appvm, nothing? Is it the rc.local > > that is supposed to be used or another init file? > > it doesn't really start gui programs if thats what you were trying. you have > to add those to autostart. You can create ~/.config/autostart/ and add a > .desktop file in there. I tried the .profile option before I saw your post but it seems to have worked (for a file syncing service frontend). I didn't quite follow your .desktop suggestion though would I add the path to the x file in the .desktop file? (could come in handy later so might as will understand it now). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1d504956-af1f-403b-a0e6-8429bc06a7ed%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Bug or Feature? DispVM inherits settings from calling VM
On Friday, October 14, 2016 at 6:16:16 PM UTC-4, raah...@gmail.com wrote: > On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > On 2016-10-13 03:45, Robert Mittendorf wrote: > > > Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com: > > >> > > >> feature. I use to make menu shortcuts to launch programs in dispvms > > >> inheriting firewall rules. But xfce only lets you edit already existing > > >> rules, not create new ones :( editing a config file is a little too > > >> much effort for me lol. > > >> > > > You can edit the rules in Xfce-Dom0 via the Qubes VM Manager?! > > > > > > How can this "feature" be disabled? I want to start a normal DispVM, not > > > a "special" DispVM. > > > > > > Use Case: Mail VM is only allowed to access Mail-Server. I want to start > > > a Browser in DispVM for urls in Mails. > > > This works fine, but those "special" DispVMs have the same limitations. I > > > want just a normal DispVM like the one started via Dom0. The only way to > > > achieve this afaik is to let the special DispVM connect to NetVM, so no > > > ProxyVM is used. But this means that the DispVM has access to the > > > intranet. > > > > > > > This is precisely the use case I described in issue #1296, which I linked > > in my previous message: > > > > https://github.com/QubesOS/qubes-issues/issues/1296 > > > > - -- > > Andrew David Wong (Axon) > > Community Manager, Qubes OS > > https://www.qubes-os.org > > -BEGIN PGP SIGNATURE- > > > > iQIcBAEBCgAGBQJX/9QlAAoJENtN07w5UDAweRkP/0uhxA8ARtTJuYuroi0znFNb > > gXb/LRC0rCy9F1TdiwXAhj7kHMSx+HObeXCqTGFlvCYl6sJGkTW0GWulN2M6XtCj > > KLHQ+vS6YpMTB4EYrDu2QBVlMuFoZoNuj+O/XVcup3aK1MUvpeJJwX6VzCc/X2Y4 > > NHYthK8PtbPZ8WHEdsdAYWBrKWw14ewtaQY9bIsx4SBjf/iq0sr/vGeWOR6Trok1 > > 0SCYo0UBgWKKDPCUeRFUKPSrL/ZCPzeF5fC+F4oG+LZE5xHM5Vu8++U5D9lCuOoS > > pfqfWI9zKib4WTjwv+tQth5G3khM+W9vfmLJfkwuO6bIGO2B59gKSwwh/DCcTH0q > > jPUgGv7dn4Ypobh15YKxynvilYMNXBLoN5nst/3ZWh2tGMwsJ9Qicc7LRg5lUpWq > > Gm+V27OEmwf40G3ejFKXr937Jc3j+GjiBAMN3hhTbfb9FkMjTS5HJqVl0rpTOX7V > > p6YW+JfdtiRGEPhiCY/24ld0p//TIyL72Ry5mT4naSP2mJyViFt3cZr91Uvcr4/p > > 5BltNOzPvpGvlR+S1CM8Kn3LcV9GZb1uKdHBGRfAVA0Y6Ikh8t8N/i1h28e0gSdr > > 02Wf9tssdixLIJL5kNQDew36kwqcW79c28qJTsfv60EM+nYHFfhrPSoZyyzrT4ty > > Jv8Ojecj2huxgn9KS0ln > > =uR2N > > -END PGP SIGNATURE- > > couldn't you just use a normal dispvm then? meaning why even launch anything > from within an appvm? Just run it from dom0, like the default firefox dispvm > menu item. only reason i'd launch a program in a dispvm from within an appvm, is to inherit its firewall rules. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a36758a3-7a85-42fb-a6b6-2fcea9463102%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Bug or Feature? DispVM inherits settings from calling VM
On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-10-13 03:45, Robert Mittendorf wrote: > > Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com: > >> > >> feature. I use to make menu shortcuts to launch programs in dispvms > >> inheriting firewall rules. But xfce only lets you edit already existing > >> rules, not create new ones :( editing a config file is a little too > >> much effort for me lol. > >> > > You can edit the rules in Xfce-Dom0 via the Qubes VM Manager?! > > > > How can this "feature" be disabled? I want to start a normal DispVM, not a > > "special" DispVM. > > > > Use Case: Mail VM is only allowed to access Mail-Server. I want to start a > > Browser in DispVM for urls in Mails. > > This works fine, but those "special" DispVMs have the same limitations. I > > want just a normal DispVM like the one started via Dom0. The only way to > > achieve this afaik is to let the special DispVM connect to NetVM, so no > > ProxyVM is used. But this means that the DispVM has access to the > > intranet. > > > > This is precisely the use case I described in issue #1296, which I linked in > my previous message: > > https://github.com/QubesOS/qubes-issues/issues/1296 > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJX/9QlAAoJENtN07w5UDAweRkP/0uhxA8ARtTJuYuroi0znFNb > gXb/LRC0rCy9F1TdiwXAhj7kHMSx+HObeXCqTGFlvCYl6sJGkTW0GWulN2M6XtCj > KLHQ+vS6YpMTB4EYrDu2QBVlMuFoZoNuj+O/XVcup3aK1MUvpeJJwX6VzCc/X2Y4 > NHYthK8PtbPZ8WHEdsdAYWBrKWw14ewtaQY9bIsx4SBjf/iq0sr/vGeWOR6Trok1 > 0SCYo0UBgWKKDPCUeRFUKPSrL/ZCPzeF5fC+F4oG+LZE5xHM5Vu8++U5D9lCuOoS > pfqfWI9zKib4WTjwv+tQth5G3khM+W9vfmLJfkwuO6bIGO2B59gKSwwh/DCcTH0q > jPUgGv7dn4Ypobh15YKxynvilYMNXBLoN5nst/3ZWh2tGMwsJ9Qicc7LRg5lUpWq > Gm+V27OEmwf40G3ejFKXr937Jc3j+GjiBAMN3hhTbfb9FkMjTS5HJqVl0rpTOX7V > p6YW+JfdtiRGEPhiCY/24ld0p//TIyL72Ry5mT4naSP2mJyViFt3cZr91Uvcr4/p > 5BltNOzPvpGvlR+S1CM8Kn3LcV9GZb1uKdHBGRfAVA0Y6Ikh8t8N/i1h28e0gSdr > 02Wf9tssdixLIJL5kNQDew36kwqcW79c28qJTsfv60EM+nYHFfhrPSoZyyzrT4ty > Jv8Ojecj2huxgn9KS0ln > =uR2N > -END PGP SIGNATURE- couldn't you just use a normal dispvm then? meaning why even launch anything from within an appvm? Just run it from dom0, like the default firefox dispvm menu item. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ed12f24e-eb0f-4b2a-8232-c4f13a496877%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Chromium asking about choosing password for new keyring?
I made a appvm (fedora 23) just for chromium and started it up and then started Chromium and another windows came up saying: "Choose password for new keyring An application wants to create a new keyring called 'Default keyring'. Choose the password you want to use for it." What exactly is it asking for? a password for the browser itself? For a site (didn't seem like a site) or is it related to the appvm? I wanted to ask before creating something I didn't entirely understand. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/784373a7-64ab-4605-afd4-bd223dc58270%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Can't seeem to get program to start via rc.local?
On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com wrote: > I have been trying to get a program to startup when the AppVM that its setup > in starts up by adding a line to the rc.local file. > > I changed rc.local to executable, and after the first few tries added in > programs that should definitely start (I thought) like firefox (just to > test). But still every time I start the appvm, nothing? Is it the rc.local > that is supposed to be used or another init file? it doesn't really start gui programs if thats what you were trying. you have to add those to autostart. You can create ~/.config/autostart/ and add a .desktop file in there. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/71e40f12-c88f-4ec2-8147-62b713238197%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't seeem to get program to start via rc.local?
On Fri, Oct 14, 2016 at 12:57:06PM -0700, gaikokujinkyofu...@gmail.com wrote: > I have been trying to get a program to startup when the AppVM that its setup > in starts up by adding a line to the rc.local file. > > I changed rc.local to executable, and after the first few tries added in > programs that should definitely start (I thought) like firefox (just to > test). But still every time I start the appvm, nothing? Is it the rc.local > that is supposed to be used or another init file? > Depending on what you want to start rc.local is almost certainly not the best place. It's too early in the boot. For user stuff like firefox you could add an entry to .profile: this will start the program when you start the qube. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161014212759.GA17469%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] awesome wm issues
Thanks for packaging awesome wm for qubes. It mostly works well, but I have a couple of issues. (1) the menubar does not scroll. Annoying if you have more vms than can fit in it. I had a glance at qubes.lua and it looks like there's no easy way to add sub-directories to split the vms (e.g. anything starting with sys- should go under system-vms, etc). (2) notifications are not displayed (e.g. vpn and tor connect/disconnect messages). If anyone has work arounds for these issues, that would be... awesome. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/653703b4169ef29f46f3aa9388670fe5.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: ReactOS instead of Win7?
On Thursday, October 13, 2016 at 9:59:08 PM UTC-4, Drew White wrote: > On Thursday, 13 October 2016 23:26:31 UTC+11, gaikokuji...@gmail.com wrote: > > On Wednesday, October 12, 2016 at 10:12:48 PM UTC-4, Drew White wrote: > > > On Thursday, 13 October 2016 07:48:24 UTC+11, Gaiko Kyofusho wrote: > > > > I haven't seen much mention of ReactOS on the list but was thinking it > > > > *might* be worth trying a ReactOS AppVM as an alternative to a MS > > > > Windows AppVM but before I put myself through the frustration I thought > > > > I'd ask #1 The wisdom (or not) of the idea and #2 If its been tried > > > > already and doesn't work yet. > > > > > > > > Thx > > > > > > Qubes tools will NOT work. ROS is only 32 bit. It's still only 2003/XP > > > based. > > > I'm looking at doing something with the Qubes Tools to enable at least > > > copy/paste/qrexec. > > > > > > But at this time, it just won't have that option available if you use > > > ReactOS. > > > > Thats too bad, it would have been nice to use OSS to run win apps but > > anyway thanks for the answer! Saved me a bit of frustration trying to make > > it work. > > No problem, I just talked to the ReactOS people to find out. > during the chat, I may have worked out exactly how to get them working > though, as some of them have patches/cracks to get win7 stuff to work on ROS. > Not always well, but it does work. > > On the other hand, I may just write an interpreter for ReactOS to work just > like the tools normally would. It shouldn't be that hard since the code is > already available. But who knows. I will probably encounter many issues. But > I think that it will be beneficial in the end. > > At the moment there are other things I'm working on in Qubes to get it to > work right, you know, bridged networking and all. and I mean completely > bridged, not just forwarding. > So that's my first priority, then I'll get onto this other thing and see what > I can pull off, or if it is even possible. It should be possible, and > shouldn't take too long if it is possible. > > I'll let you know how it goes. Totally understand the priorities part. But hey, its great to hear that it will/might be added in the future as I think ReactOS fits (ethos wise) fairly well with Qubes. Look'n forward to it. Thanks!! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3081a644-6b19-4945-83d5-017d03e430ca%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Can't seeem to get program to start via rc.local?
I have been trying to get a program to startup when the AppVM that its setup in starts up by adding a line to the rc.local file. I changed rc.local to executable, and after the first few tries added in programs that should definitely start (I thought) like firefox (just to test). But still every time I start the appvm, nothing? Is it the rc.local that is supposed to be used or another init file? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ed3c4d70-2700-489c-b45a-75c7bfe12762%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] sys-usb mouse issues when copying files to USB
Hello! I am really not where to start or look to troubleshoot so suggestions are welcome. Since upgrading to 3.2 any time I copy files in sys-usb to USB stick, my external mouse becomes hard to use. Moving the cursor is no longer smooth and seems to lag and as a result jumps when moving it across the screen. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/KU3igwr--3-0%40tutanota.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] View: Qubes discussion should be migrated away from Google Groups
epicd...@gmail.com: > I imagine the requirement of a Google account deters many from contributing > to discussion. All Google accounts require SMS verification of a phone, which > is very de-anonymizing, and sort of out of line with the privacy centric > nature of Qubes and its users. > You are mistaken. A Google account is not required to join the mailing list. I agree about the invasiveness of SMS-based "authentication", though. Andrew -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1aaefa9c-e0b4-39f8-e660-1c34b833036d%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: View: Qubes discussion should be migrated away from Google Groups
Hello, I would appreciate more anonymity (I think there is a french group-chat platform...). Nice would be some good structure, before you dive inside the big hep of discussions. Installation Newbie questions Bugs ... This forum makes a perfect job for onboarding into a new community: http://forums.thebrain.com/ And the innovative discussions about future features are bundled here for the normal non-techie users (and works well too): https://thebrain.uservoice.com/forums/4597-thebrain-feature-suggestions I look forward to see some improvements. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/826c3cb1-4ef1-4fc6-a8f8-76cd243e0630%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Hard to run TheBrain - better alternatives?
Hello, It is hard to get TheBrain run perfect under QubesOS. - no deep link content search (attach a file to PB and type a search-keyword in the search field and press enter), which seams not to work - new node F6 and press the type or tag button, which seams not to work - node, context menue, new type, select a color, which seams not to work TheBrain is more than a mindmapping tool, so also file management will work fine - so this could also give a central searchable place - in theory - for Qubes. In my eye a real killer application. But with weaknesses: - javabased and this might or might not be super secure - no real DB and this might or might not be super stable for the long time usage (PB-Backups, btfrs, daily Linux-Backups or QVM-Backups would be recommended, if you like to get full access of all your data, even in "bad" situations - somethimes thebrain becomes a little or more corrupted. An than perhaps or perhaps not you might safe your data). - keylogger - cloud (optinal) But, ok. Is there some similar tool, which works today seamless together with Qubes? Are there any suggestions, how to integrate, comment and search on a big stack of informations? http://alternativeto.net/software/personal-brain/ I use thebrain normally for: - configuration management - knowlege management - file management - search (or better find my things) And sure I would be happy, if PB7 will work perfect togehter / inside Qubes. But I'm also open to better solutions, instead to be in the bug-patch-loop, I like more the fast productive working. In general I like the simple NT-style of QR32, as long it works and I can generate content. Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0eef6a1b-47d5-4108-9c21-5fe953b94958%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Error converting vmdk disk to raw
https://wiki.xenproject.org/wiki/Migration_from_VMware -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cedceb28-334d-46fc-9afc-b48d4f27f95a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Error converting vmdk disk to raw
https://wiki.xenproject.org/wiki/Migration_from_VMware -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/481e81d5-b902-4d02-9895-fe5a4e76f158%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Error converting vmdk disk to raw
> I'm having same issue, I know there is enough space because df -h shows > 198G available and qemu-img-xen info image.vmdk shows that the virtual > disk size is 8G I've had cases with the qemu tools where it reported a write error because it had trouble reading one of the input files (corrupted, I think it was, or maybe a usage error). Put a "strace -o /tmp/log.txt" before your command, and go look at the system calls that resulted in it giving that error message. You might see a read error, or more specifics on the nature of the write failure. JJ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/188acf2835438040b31c2bfdd6b70c65.webmail%40localhost. For more options, visit https://groups.google.com/d/optout.
[qubes-users] View: Qubes discussion should be migrated away from Google Groups
I imagine the requirement of a Google account deters many from contributing to discussion. All Google accounts require SMS verification of a phone, which is very de-anonymizing, and sort of out of line with the privacy centric nature of Qubes and its users. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e05730c6-fdd6-4384-80a0-fba658ad59b8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: ANN: Leakproof Qubes VPN
Hello, what is the difference between this implementation and just following the VPN guide on the Qubes website? Both seem to create a proxyVM. https://www.qubes-os.org/doc/vpn/ Is your version more leak proof, if so, how? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3b14278f-f0c6-4d79-be6c-ad6db633760a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: ANN: Leakproof Qubes VPN
What im doing wrongso so its not working on fedora-23-minimal i follow this steps 1.install openvpn in fedora minimal template 2.copy to fedora min template qubes-vpn*.noarch.rpm that i build in git qubes 3.sudo dnf install qubes-vpn*noarch.rpm && mkdir /rw/config/qubes-vpn 4 copy VPN .ovpn config files there 5.create file qubes-vpn.creds 1 line username 2 line pass 6 mv vpn-config.ovpn qubes-vpn.conf 7.edit qubes-vpn.conf and add auth-user-pass qubes-vpn.creds auth-retry nointeract 8.create vpn vm from fedora minimal - check box proxy vm trugh sys-fireewall 9 in VPN vm i add qubes-vpn to service 1- add firewall restrict in firewall tab * port 11 test config : openvpn --config qubes-vpn.conf SUCCES connect 12.shutdown VPN vm 13 set WORK VM to use VPN insted sys-firewall 14 start WORK vm 15 VPN starts automaticaly 16 Firefox in WORK start and it wont connect -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a562c8b2-e5b4-4f90-8316-7ff2fb5ee7a1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: ANN: Leakproof Qubes VPN
What im doing wrongso so its not working on fedora-23-minimal i follow this steps 1.install openvpn in fedora minimal template 2.copy to fedora min template qubes-vpn*.noarch.rpm that i build in git qubes 3.mkdir /rw/config/qubes-vpn 4 copy VPN .ovpn config files there 5.create file qubes-vpn.creds 1 line username 2 line pass 6 mv vpn-config.ovpn qubes-vpn.conf 7.edit qubes-vpn.conf and add auth-user-pass qubes-vpn.creds auth-retry nointeract 8.create vpn vm from fedora minimal - check box proxy vm trugh sys-fireewall 9 in VPN vm i add qubes-vpn to service 1- add firewall restrict in firewall tab * port 11 test config : openvpn --config qubes-vpn.conf SUCCES connect 12.shutdown VPN vm 13 set WORK VM to use VPN insted sys-firewall 14 start WORK vm 15 VPN starts automaticaly 16 Firefox in WORK start and it wont connect -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/43b74b3f-679b-42dc-a397-efdeb2fdc250%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] TVM ASLR-exploit-proof?
On 10/14/2016 01:26 PM, 917832409173409178324097 wrote: > Hello, > > can ASLR tech help to build a hard template VM for Qubes? > > https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/ > > checksec.sh: > How important it is that all libs and executables are PIE-compiled? > Are 100% of the TVM PIE compliant? > > https://www.blackhat.com/docs/asia-16/materials/asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems.pdf > > Will ASLR-NG mitigate the ASLR-weaknesses? > > The rerandomization should be fast enough or be able to detect some > brute-force attacks. > > There are other exploit-strategies, which sould be taken into account, so > that the TVM is hard enough to resist the contact with the web (ebanking) - > or the QAchitecture is adressing all of them? > > Heap-Spraying? > Egg-Hunting? > ROP? > DEP? > SEHOP? > SafeSEZ? > Stack Cockies? > SEH overflows? > stack overflows? > > or others? > > It looks that there are many methods around to inject shellcode in some way... > > https://www.corelan.be/index.php/2013/02/19/deps-precise-heap-spray-on-firefox-and-ie10/ > > Kind Regards > This would be really nice, but basically you're talking about hardening Fedora, so this should probably be done with upstreaming the work in mind. Perhaps we begin with a template on Qubes OS that we can use, and piece by piece, the modifications to that template can get upstreamed. Eventually the template will no longer be necessary. -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3fa020b9-2b92-df63-0dce-70ed805321bd%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] TVM ASLR-exploit-proof?
Hello, can ASLR tech help to build a hard template VM for Qubes? https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/ checksec.sh: How important it is that all libs and executables are PIE-compiled? Are 100% of the TVM PIE compliant? https://www.blackhat.com/docs/asia-16/materials/asia-16-Marco-Gisbert-Exploiting-Linux-And-PaX-ASLRS-Weaknesses-On-32-And-64-Bit-Systems.pdf Will ASLR-NG mitigate the ASLR-weaknesses? The rerandomization should be fast enough or be able to detect some brute-force attacks. There are other exploit-strategies, which sould be taken into account, so that the TVM is hard enough to resist the contact with the web (ebanking) - or the QAchitecture is adressing all of them? Heap-Spraying? Egg-Hunting? ROP? DEP? SEHOP? SafeSEZ? Stack Cockies? SEH overflows? stack overflows? or others? It looks that there are many methods around to inject shellcode in some way... https://www.corelan.be/index.php/2013/02/19/deps-precise-heap-spray-on-firefox-and-ie10/ Kind Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2a99b301-e162-4069-b131-91ab9d12925f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ANN: Leakproof Qubes VPN
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Thu, Oct 13, 2016 at 11:22:08PM -0400, Chris Laprise wrote: > On 10/13/2016 09:31 PM, Manuel Amador (Rudd-O) wrote: > > > > Oops about what? Unlike the official Qubes VPN documentation, which > > counsels people to write scripts that make non-atomic modifications to > > their firewall, which actually and demonstrably have a leak between > > Qubes firewall updates and VPN rules setup, my work doesn't leak traffic > > in-between the addition of iptables rules. > > The qubes-firewall-user-script is a feature of Qubes firewall. And its one > of the original Qubes docs that encourage people to use it. So, yes, there > is a vulnerability in Qubes firewall, and it should be noted foremost in the > Known Issues for the project. ip_forwarding is disabled for the time of reloading rules. Anyway, guys, please. Both solutions are fine. One is easier to understand, convert to other VPN software and apply to ProxyVM without modifying any template. The other one is OpenVPN specific (at least currently) and easier to package (so do not require copying any script by the user manually). Technical details here (more iptables modifications vs separate route table) are just technical details. Both approaches should work. The nice thing of manual one (in current shape) is also blocking traffic going from ProxyVM itself (and not originated by VPN software). But it should be trivial to add the same to the other one. This should not affect AppVMs behind such ProxyVM in anyway. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYAMmSAAoJENuP0xzK19csNroIAJpPS2jnDHdUBMKImgEMTzJZ AWtgDbMpUpYDT7aX+LC8W84DrNHciDfbOhbNaVwxOgLX2iSd5iafv62M73D3oSsr 2+nO5isSnpY72CnJZgxPiS5jZ0R6WoF5zQcuDx3PREgU4Nr0hKCUQbITAMRhW6I+ XF3lemLX9InUzowYFgLFxc+8x1N0FSBToFor73W1tBFZI5SuS0mYoTCLsncFTBDC QGOGd74V24aoQv3y++gD/wwaME8+oRLv5wqun75DuKx+hcSXUJEfwouemfKsyEva 8R42R1ZaF671jL+POORZPKL+AnLvrxwFC+FnArOQtt2STL5lrIcKW64PR5Iju8k= =CCiA -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161014120331.GW15776%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Thoughts about installed software
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Jeremy! > In Qubes 3.0, I noticed that source files for the "move to VM" > command would be deleted even if the move failed due to > insufficient disk space in the destination VM. (It goes without > saying that this is a Very Bad Thing.) That was fixed in R3.1: https://github.com/QubesOS/qubes-issues/issues/1355 > I'm not sure if this is still the case in newer releases of Qubes. I don't think it is. There's also another commit somewhere to call syncfs() after copying. So qvm-move-to-vm *should* be safe since R3.1 (unless the destination VM was debian-7 based, which had an old glibc without syncfs() support). Rusty -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJYAJr5XxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ4NEI1OUJDRkM2MkIxMjlGRTFCMDZEMDQ0 NjlENzhGNDdBQUYyQURGAAoJEEadePR6ryrfMj4P/0g3dif0bYm1fYO3E3Cs+zQC GtsFZX6As/7XL+RliVDK0GB7c9XuB0ycaXCbcnu3uNNhknm76wEkxkAe3Gq4dxPC t/NDwTQY0oSzlOxYrJ8jAqWUWSfe4buSecV+u5vC2iKO0UrGe8YIEZvM2+YhpsQT FOdKSNUvw4MJqy9xmjeYLtH6wtWzJyEN2B9n+yVScpTaA1MBO5WnmTu3pts1WmjT iUVHNr84Qzf/rcZnZIfTYThH+HSA8gJgN/RAeOE9ghzyEzcKkrznPWyMSuaW8SmO FW+djKx6lTOcJKg50BJHH/aSwrJxnIfIa1MtoLseMPEsDf+UHcAY6ASKRROt+7pn v9ORB/uB/uERBigik1yd9bAivauqqLbi8Dj7hBwc4XteEikvVUXAsOsEJl7lmaC1 I7Wzb8YXxvEAyJFINXItK5ZJT1x0D/5m+07oKD5oBf8aNY8CFHTEPUUQFmTQLOId XZg/pBhIOpmIsx3z+Zk3+VJCIz7tzR9BpRCAvN8FOZPs5HEG4Hu914Eb01ErwDE3 keM5Bu1mW/HsGcAvnXBGLfQ6MtFFmdNoqbS5Jrj2cv0q/9yGPmf44u4NqTNbQiAu mlqKx+8mx6H5/EBagZKNxVmFqUy+ShpsIhro9VlHaCoNF21ttjOr8/B4zaPb2igx 9SChvvIPXA5HKfR4FK5H =Bj5/ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5b71cd9a-d072-5c8c-d891-3ac641591a9b%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.