[qubes-users] detecting malicious usb devices
can the a usbvm be used to detect malicious usb devices? has anyone tried this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/98750f78-6182-4203-a4a4-581ef766683e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ssd migration block/unit size, tune and benchmark
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-24 14:45, Eva Star wrote: > Migrated to the new SSD from old: > > 1) How to check "ssd partition alignment" on Qubes as we do on Windows? If > need to correct it, how to do that? > > 2) The same for block/unit size. Need I change it on the new SSD? How to > check yes or no? How to do that if need? > Neither of these should be necessary for a fresh Qubes installation on a new SSD, unless you're doing some kind of non-standard/custom installation, in which case you should be able to handle both with either fdisk or parted. > 3) How to check new SSD performance? Need to do this on dom0? I'm about some > tests like we have on Windows (read/write, random read/write, different block > sizes) > Yes, this would have to be done in dom0, or using a different distro (e.g., live CD). You can find software to do this on the web or included in some distros. > 4) SECURITY ISSUE: Is it secure to keep the old *clone* of the drive on old > SSD with the same master table of cryptsetup and the same password? > This can be a risk under certain circumstances: https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions#6-backup-and-data-recovery - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDvcOAAoJENtN07w5UDAwBW4QAL12NBrmbGApiXV/iW42tXIs 68GOKUTNGGYTcJzkvuqR9NwgSaCSF27jxijT95qNarVFTCuRzzp8ljQmxH/kbDwd Q3gpOszADXfe/Y52xHnWpOCzpwyiQs7y0yU9Pm691hZGnV5fhHuzrX/1Di/Yk70C PrB+u+GcxxAFpG3P/JaJ9QaMQkRJYmWyZB9M9AkM66GJPUC46+BRIy+lN66/HI9M NMGYQIWDxNPEdV0HwHGHtIBgFDMWvioIsoAN4dGM41HoSRmTWptedna+mvPYVLz9 wkqdaro/Qmoptt2VzbVI+A4VKeJHL/5IRWXzfYUroKLbJfs6ET2o7k2EPCmW940o HS3+OvBngAKFSxYKT7HhVFOtslyzPd7AgaTGEd0Qu6QNyJ2Ki4tNNXtlI/+gvJkc q1Bj2fOzSSZUdLfLmKCNPhfr735Jkz+9C5xusjY4IBNS6YxizYowONlkY/YT6xYr f84XgK77LHFKiJMHVa2/J7+n7H6yvvB+shi38q2gGz4WonUGLOUaKHYarx/9ieHh m1vXtUXeCuGe4jQmbV0PPsT/dK8IQaz4Qq0/94IAYV9f3V5X2Dy/4YseOKt352aV PsB+fnWMA/xl+qNDYijGbcjTznB+hOP38DWeoxGQayuA87aP0k+pjUGpCeyL3pTL YeoSJOf4ttsIc0t38/zs =UvA/ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/989dcf41-63c1-c3dc-3e6d-0e8d1f6d6582%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Can't figure out how to install a couple of things in dom0
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-23 09:17, cestar...@gmail.com wrote: >> Does this page answer your questions? >> >> https://www.qubes-os.org/doc/software-update-dom0/ > > Only in part, it answers how package management should be done in Qubes, not > how to enable RPMFusion for dom0 nor which repo I should enable to find Krita > or Xorg Wacom drivers and even if they are within these repos, no way was > provided to search the repo for a package list to find out what the package > names are since that varies from distro to distro. > Enabling RPMFusion in dom0 is generally not recommended, but it should be possible if you're willing to accept the risks. I would start by trying doing it in the standard Fedora way (but I haven't tried this myself). As for searching for packages, you can pass most of the standard yum/dnf commands to qubes-dom0-update. Personally, I like to do the searches (`dnf search`) in an AppVM, then, once I've found the correct package names, install them in dom0 (`qubes-dom0-update package-name`). - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDvVTAAoJENtN07w5UDAwgiEP/1mh6rqPuCaQjIWD2W7Ntlgl qalwVztTUYNLPSKcYYPoee3wBOJp5aw4QqemCgyGDWL0ux8CsZiOFh2Y5gQvPF/Z clhhZ2/yOIUZzX1YZsGCh8BpmUuC8PO2KlETUAzbbM+L+eK/qt6a7mxuxOJjjCw3 8ErHfibFC7pHX6ZtVco+S7CK6qCtQz5zYGvmv/daue5xJbEoN6OW+hcQAn+AVR5M E8S02akgY60qV7YWcNNf2QwjCOOKfZH1e9Ht021rt1rIK7eH8Z4FXU6r+SwyutK6 KRKpmRD+WJYBIw5aZlWxpNhHTNmnkYW98nMXq23JxinWHBbj35ddK1/fFtLqYjxR ahznH3s5MdJ5O0WgpskTj3q070T3+n98Bhv71gmirvgw9N6ZLog5JB2LXI8wzxxD 43RqMTJ4r5iCR1Y69yha9QLVCQd916R9BKXvMCcIRqeAoXVCm1qd0Ae4yA5kpqnH drjhCheQufw5ldbIJWuRzy4rhG0x6viCl9zkU3mGggmUDwGBZY3RwhdvrI/ipyy7 JRQ7TAUaxxHslQ5pCDWQQL36f5/68zlLRtldAhho0fPzCuMZak79nF/7wok7Q9BG flupZ7ppsHeVWHOfXD4xaQhdrlPRYVukO7zDviF9wbhemZdcEL1GlrXo6WhHEixX j9/dBumB/5kOomUn9fCT =LzNl -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1b8c7212-6e33-58cf-3430-a9763d82979c%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: install on a partition?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-10-24 08:16, raahe...@gmail.com wrote: > On Sunday, October 23, 2016 at 11:33:42 AM UTC-4, Sven Hansen wrote: >> Hdd is for testing. Hdd has 3 nfts partitions, sda1, sda2 and sda3. How do I >> get qubes installed on sda1? >> Can qubes be installed side by side with trisquel 7 and subgraph? Thank you. > > yes, but it is not officially supported cause one of the other o/s can modify > the qubes boot partition, or has better chance to infect bios or firmwares. > It also takes more tweaking to add other os entries to the qubes grub, > because I believe it has no os-prober. > > I found it easier to add my qubes entry to the trisquel grub instead, in the > /etc/grub.d/40_custom file. In there you paste the XEN section copied from > the qubes boot partition /boot/grub2/grub.cfg file. then update-grub. > Probably should repeat the step when qubes updates its kernel or initramfs. > > An easy way to reinstall the trisquel grub after installing qubes is here > https://community.linuxmint.com/tutorial/view/245 > Also take a look at this page: https://www.qubes-os.org/doc/multiboot/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYDvWBAAoJENtN07w5UDAwVc0QAKOWzsw7xgWqwUP3Q8EsAUdB hFTgQOt1TRkvJTWVo4EXav2Ep5gywUZQbtlkPLq+ncm51SNHs7+YU/QM4xI3keLX ewsmLWZz/CBxIQP3ZzIOimmNqVS6I8qApQvwpXGuaLyedCMx6EXr1U350LK8wZHa XwjyGEE14iKr3Sp8T32JpKqjkeDcA/iLLMchVWFJC/QJdzT6iT5B6rafeIXFiYwx EsAI/98RfDcg1/EKJQWIi4PSxx+e2RUZxXvY+WDbPEdA0TPQQMSJPpsAUN4MA5rV hPLucmXdkuP5wwnNy7Qfl09u3OeUSwZnknfamdQEIb0D2Om7acyR9VkpCNDG0Z3x 77JtH+9oTHZio1SCNV5AeWnSlHC16uyrVdxahWuCHtEsisARQpIvIrq8+u75AyZ4 0MpTlq45CUmF/yvUNv4blvyTgm73J+c9HYzj7H4L+KmSkgwcF+9M2XfG7QX6T1QT kHCZ6vA0FeBDm20HX03+vMQNuPuCG/gXpOAABx9V5oRmyu5RL0jVEXTeZxh6R+0r cygbstt0afcViWuSHZ9v0oWDkgtRfdfYOVU9ED2qrWCn6XjZ8O470+LM9L+gjN9q JIwZoT0yHOVoqnDhPpMKAtwwAoHQK27oG39eothP1rSkCq7g1I2YvOwN24vJO/72 yMbqx7ftcCRdV2QzkUux =hmRz -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c6408b37-c39c-6125-bb6a-30936e806bc0%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes Windows Tools 3.2.2-3 released
On Tuesday, 25 October 2016 12:22:29 UTC+11, zack...@gmail.com wrote: > On Monday, October 24, 2016 at 9:02:18 PM UTC-4, Drew White wrote: > > On Tuesday, 25 October 2016 11:50:53 UTC+11, zack...@gmail.com wrote: > > Is there a set method to updating the windows tools in the vm itself (after > > updating the version in dom0 and such). When I try to install the new one > > over top of the old one, or to uninstall the old one first (old version was > > 3.2.1), windows crashes and only boots in safe mode > > > > Essentially, it's just boot to install windows tools, or attach the ISO. > > Run the executable. > > Follow the prompts. > > Make sure you are NOT running in Seamless Mode when you start though. > > Run in non-seamless, and turn on debugging. > > Figured out the issue. I had the xen pv disk drivers installed before and > when I tried to update them, windows just hung (but no BSOD). What would be > the best method to install the disk drivers now? Before, I uninstalled the > whole windows tools and reinstalled it since the installer doesn't give you > the option to go the component selection menu if it's already installed It does give you the option. It says it requires a restart to complete, then it does what it has to, then restarts. After that, before login to windows, it starts the installation and does the install including option selection. Thus, you don't uninstall then install, you just install. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/df424209-6636-4048-906d-5600ea057036%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL - Intel NUC DN2820FYK
The install failed in UEFI mode so I installed in legacy. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1439579607.171173237.1477363485397.JavaMail.zimbra%40mailid.telus.net. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-_-_-20161024-203845.cpio.gz Description: application/cpio-compressed --- layout: 'hcl' type: 'desktop' hvm: 'yes' iommu: 'no' slat: 'yes' tpm: 'unknown' brand: | . model: | . bios: | FYBYT10H.86A.0032.2014.0414.1437 cpu: | Intel(R) Celeron(R) CPU N2830 @ 2.16GHz cpu-short: | FIXME chipset: | Intel Corporation Atom Processor Z36xxx/Z37xxx Series SoC Transaction Register [8086:0f00] (rev 0e) chipset-short: | FIXME gpu: | Intel Corporation Atom Processor Z36xxx/Z37xxx Series Graphics & Display [8086:0f31] (rev 0e) (prog-if 00 [VGA controller]) gpu-short: | FIXME network: | Intel Corporation Wireless 7260 (rev 73) Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 0c) memory: | 3973 scsi: | KINGSTON SV300S3 Rev: BBF0 versions: - works: 'FIXME:yes|no|partial' qubes: | R3.2 xen: | 4.6.1 kernel: | 4.4.14-11 remark: | FIXME credit: | FIXAUTHOR link: | FIXLINK ---
[qubes-users] Re: Qubes Windows Tools 3.2.2-3 released
On Monday, October 24, 2016 at 9:02:18 PM UTC-4, Drew White wrote: > On Tuesday, 25 October 2016 11:50:53 UTC+11, zack...@gmail.com wrote: > Is there a set method to updating the windows tools in the vm itself (after > updating the version in dom0 and such). When I try to install the new one > over top of the old one, or to uninstall the old one first (old version was > 3.2.1), windows crashes and only boots in safe mode > > Essentially, it's just boot to install windows tools, or attach the ISO. > Run the executable. > Follow the prompts. > Make sure you are NOT running in Seamless Mode when you start though. > Run in non-seamless, and turn on debugging. Figured out the issue. I had the xen pv disk drivers installed before and when I tried to update them, windows just hung (but no BSOD). What would be the best method to install the disk drivers now? Before, I uninstalled the whole windows tools and reinstalled it since the installer doesn't give you the option to go the component selection menu if it's already installed -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cce5b3a6-d8b5-4386-90f8-00769d990038%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes Windows Tools 3.2.2-3 released
On Tuesday, 25 October 2016 11:50:53 UTC+11, zack...@gmail.com wrote: > > > Is there a set method to updating the windows tools in the vm itself > (after updating the version in dom0 and such). When I try to install the > new one over top of the old one, or to uninstall the old one first (old > version was 3.2.1), windows crashes and only boots in safe mode Essentially, it's just boot to install windows tools, or attach the ISO. Run the executable. Follow the prompts. Make sure you are NOT running in Seamless Mode when you start though. Run in non-seamless, and turn on debugging. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/815ff2f8-f143-4f5b-9698-bac4c7986f3b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes Windows Tools 3.2.2-3 released
On Monday, October 24, 2016 at 2:09:56 AM UTC-4, Drew White wrote: > On Sunday, 23 October 2016 00:26:08 UTC+11, omeg wrote: > > Changelog: > > - - Updated Xen PV drivers to be in line with upstream > > > - - Private disk image is now initialized during setup making the > > install process require one less reboot > > Need to give the option to allow choosing of the label, because having spaces > in a label is not good, nor having a label that long. Maybe it's just the > fact I'm a programmer and a developer that I think this way. > > > - - Added handler for qubes.OpenURL qrexec service > > > - - Fixed a bug that could make moving user profiles to the private > > image fail if there were files with ACLs explicitly disallowing SYSTEM > > access > > > - - Fixed handling qrexec service requests for non-existing services > > When I had the tools installed, it loaded into Seamless mode, and it > proceeded to tell me that QREXEC was not installed. And also that it needed > the GUI tools to me installed to use seamless mode. > > Not sure if this is a bug, or you designed it to restart twice at this point > by making us click the stop button? > > > - - Minor log readability improvements Is there a set method to updating the windows tools in the vm itself (after updating the version in dom0 and such). When I try to install the new one over top of the old one, or to uninstall the old one first (old version was 3.2.1), windows crashes and only boots in safe mode -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8bcc7d1b-1ce5-467e-806f-e0e1462b42f4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Inconsistent Screen Resolution for Fedora VMs
Thanks! I'm without a computer right now but I will look into soon to see if I can figure out exactly where it's messing up. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/051dacf3-4e6c-42bc-bc27-8fc25df9edbb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] ssd migration block/unit size, tune and benchmark
Migrated to the new SSD from old: 1) How to check "ssd partition alignment" on Qubes as we do on Windows? If need to correct it, how to do that? 2) The same for block/unit size. Need I change it on the new SSD? How to check yes or no? How to do that if need? 3) How to check new SSD performance? Need to do this on dom0? I'm about some tests like we have on Windows (read/write, random read/write, different block sizes) 4) SECURITY ISSUE: Is it secure to keep the old *clone* of the drive on old SSD with the same master table of cryptsetup and the same password? Thanks -- Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9ab3d4a1-f7e0-25c7-2b97-5c9307d8c9d9%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Import a .img file (Windows7) into Qubes?
Am 23.10.2016 um 23:30 schrieb jidar : > > qemu-img has worked for an "enterprise" VM I use without any issue (going > from VMDK to raw/qcow2). If the disk is encrypted you might be SOL though. It was the LanDesk Manager that killed me last time… Achim -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/F1EDB378-64C4-46D4-8CE8-F1E0A06D9E0C%40noses.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to Install acpi_call on dom0? ( Usefull for lenovo )
Le lundi 24 octobre 2016 17:42:34 UTC+2, cyrinux a écrit : > Hi, > > I would like to know if anyone success on install acpi_call, or more > globally, how to build a module on dom0? > > For lenovo users, we need acpi_call for manage batteries thresholds with tlp. > > Thanks you -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8e03dd42-b2f9-42bc-9eb4-6bbb020436df%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Import a .img file (Windows7) into Qubes?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Oct 24, 2016 at 07:12:53AM -0700, Grzesiek Chodzicki wrote: > W dniu niedziela, 23 października 2016 23:10:06 UTC+2 użytkownik Marek > Marczykowski-Górecki napisał: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On Sun, Oct 23, 2016 at 12:29:32PM -0700, Dima Puntus wrote: > > > Is it possible at all? I'm trying to virtualize my windows machine and > > > move > > > entirely to Qubes. Some of the applications can't be reinstalled so fresh > > > install isn't an option. > > > > Should be possible, but probably you'll need to install some drivers (as > > the emulated hardware is most likely different than your real one). > > After that, you can simply copy your disk into .img file (using dd) and > > point to that file when creating HVM, like: > > > > qvm-create --hvm --label red --root-move-from=/path/to/file.img > > some-vm-name > > > > You'll need a lot of disk space for this... You can make it smaller by > > first filling all free space of the (windows) disk with zeros (create > > big file with zeros, then remove it). And then add "conv=sparse" to dd > > command. It will not copy unused space. > > can the root.img be kept in an AppVM filesystem for this? Not easily. You'll need to modify VM libvirt configuration and start the VM with "qvm-start --custom-config=..." every time. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYDkvGAAoJENuP0xzK19csNg0H/3jkBKBH5ZF36PrBcrfhl5FY GdEj4btZ0phjfXCIBHN9Z6E/MRe0l9X9lFW5gTeItg7XUnxBSrYhdc+zZeeuSqSM 7wvrX7arHCc7xtg4zFug60JYh+VBHN4xfFKneUk2hdThl8czBPFMn+EiKJjSdTch vb+aj8ch2OgvJT0/vAjMz37rlyXJH5L6Kxz1IY7UaqiaUt1sPVd6RNQxSU5h3/+S OaoMFFVKVMZgbWDucbsjifoycpHz46gR0Zk/9GvY9o9dlqVGXU5LkXv/HimkklDa +XiK7FN9vq6IR7/0y/t6zc7RlaZapGcc+IYL4+s8h7pzyy1JWij8NuKRgkyR/6E= =D9Bf -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161024175827.GP1136%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Remnder: Ubuntu-template anyone?
> > > > Last night I built Xenial - I'll put in a PR today, > > Has this happened? I'd like to build a 16.04 template, but the Qubes Builder > in the offical QubesOS repository does not offer Xenial - neither does the > one in Mareks repository... I'd also be very interested in this. I have created a Vivid template and upgraded that to Wily successfully (Wily is already out of support, however), but had no luck with upgrading from Wily to Xenial. The upgrades does work and the VM boots successfully, but the Xorg install is broken so the Qubes GUI integration does not work - it complains about the ABI major version not matching. Any advice would be greatly appreciated. Best regards, Richard -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5df82ce7-0041-47a9-8caa-182976b359e8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to Install acpo_call on dom0? ( Usefull for lenovo )
Hi, I would like to know if anyone success on install acpi_call, or more globally, how to build a module on dom0? For lenovo users, we need acpi_call for manage batteries thresholds with tlp. Thanks you -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e961746c-ec19-41de-8323-23941c1df6b3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Future plans for KDE on Qubes?
Am 23.10.2016 um 23:14 schrieb Marek Marczykowski-Górecki: > I think we can keep its current state. Shouldn't be a problem for Qubes > 4.0 and later. At least until next major incompatible changes in KDE... I'm wondering whether I should try to get one of the discontinued Lenovo P50 with 3840x2160 dots at 15" just to make someone's eyes bleed enough... Believe me, even with all available settings it is not usable with xfce; not everything in a window will be text and not every application is taking care of adapting to Xft.dpi. Achim -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3ff2a1f6-3bbf-ba59-5e78-4973de4d1221%40noses.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: install on a partition?
On Sunday, October 23, 2016 at 11:33:42 AM UTC-4, Sven Hansen wrote: > Hdd is for testing. Hdd has 3 nfts partitions, sda1, sda2 and sda3. How do I > get qubes installed on sda1? > Can qubes be installed side by side with trisquel 7 and subgraph? Thank you. yes, but it is not officially supported cause one of the other o/s can modify the qubes boot partition, or has better chance to infect bios or firmwares. It also takes more tweaking to add other os entries to the qubes grub, because I believe it has no os-prober. I found it easier to add my qubes entry to the trisquel grub instead, in the /etc/grub.d/40_custom file. In there you paste the XEN section copied from the qubes boot partition /boot/grub2/grub.cfg file. then update-grub. Probably should repeat the step when qubes updates its kernel or initramfs. An easy way to reinstall the trisquel grub after installing qubes is here https://community.linuxmint.com/tutorial/view/245 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4c8e51c2-b779-422b-b366-a4b9627d2af9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Dual Boot - Live CD Knoppix & USB-SSD Qubes?
On Sunday, October 23, 2016 at 4:55:32 PM UTC-4, 1'0934178'09384'1092438'091432 wrote: > Hello, > > if nobody can control the BIOS, if it is maybe or maybe not clean and > infected with a root-kit in some way... > > Will it not be some advantage, if the stateless laptop has a firmware-module, > which is mobile? $ > So I can unplug the firmware, the PC-body is without interest, because it has > no persistent Memory (like the lapdoc of Motorola). > The best, would be, if the mobile module exists of two components, the SSD > disk and the firmware module. > Both can be stored on a safe place and replaced by plug an play. > In advantage, with a second module some Dual Host system will run also. Safe > Plug and Play for Qubes or Windows or Ubuntu or... > > Sure, there should be a disaster recovery plan for the firmware module, how > you make sure, that you came back to a clean System with Firmware Security, > so you can start a real clean re-installation of the OS, if necessary. > > And in the last case a cheap replacement of the Firmware-Module (e.g. that > for security reasons you will replace it all 30 days, because it might be > some cheap electronic device, instead of the hole PC). > > The firmware/hardware must be complete in some sense, so you need only to > update the BIOS with security considerations, but not to expand the > configuration-stuff in some way (This leads to a more complete systems, > including touch screen, 3D). > > Will this work in some way? > > So you would have different ways to start with a proofen clean Firmware? > > Kind Regards sounds interesting if you can manufacture it. Some experts say it is possible to infect bios and these firmwares remotely as well, not just physically. As some experts claimed with hacking teams bios malware that infected insyde uefi bios in oem systems. I would also suggest if very worried about this type of attack to use something like AEM to detect if something did indeed change, hopefully. I would like see qubes get secure boot eventually also that can be used alongside aem for even better measurement. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/596e219b-7a2b-4a4d-a128-f615eb38e06c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Why it's so big secret?
On Sunday, October 23, 2016 at 11:34:42 PM UTC-4, nezn...@xy9ce.tk wrote: > > lol typical linux stuff lol. so you are saying your graphics card doesn't > > work with the default open source driver? dam that sucks. what if you > > just disable one of the gpu's in the bios? > > There is a 3 things: > 1. Nvidia created automatic(!) technology and name it - Optimus. There is no > the opportunity to disable it. > 2. Torvald showed finger to Nvidia. And Nvidia did not pay much attention to > the drivers for Linux. > 3. MSI created laptop (which i bought) with stupid bios, which have no > function "disable integrated devices". I cant disable GPU or camera or > something else. > > Funny, right? oh wow never seen a bios like that, dam. I use nvidia, but I'm on a desktop using a 650 ti which is well tested with linux. Might get better help with bumblebee on fedora forums for your system. I have no experience with it, but Bumblee issues are one of the most common problems in linux help channels. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cb46fecf-4049-4c32-a492-ffc6fb2e9b16%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Import a .img file (Windows7) into Qubes?
W dniu niedziela, 23 października 2016 23:10:06 UTC+2 użytkownik Marek Marczykowski-Górecki napisał: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Sun, Oct 23, 2016 at 12:29:32PM -0700, Dima Puntus wrote: > > Is it possible at all? I'm trying to virtualize my windows machine and move > > entirely to Qubes. Some of the applications can't be reinstalled so fresh > > install isn't an option. > > Should be possible, but probably you'll need to install some drivers (as > the emulated hardware is most likely different than your real one). > After that, you can simply copy your disk into .img file (using dd) and > point to that file when creating HVM, like: > > qvm-create --hvm --label red --root-move-from=/path/to/file.img > some-vm-name > > You'll need a lot of disk space for this... You can make it smaller by > first filling all free space of the (windows) disk with zeros (create > big file with zeros, then remove it). And then add "conv=sparse" to dd > command. It will not copy unused space. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJYDScpAAoJENuP0xzK19csctoH/A+l9gz55qsArSJTtekdITew > /S2zv2mvEJykiz50utUV4IphMsuYxTg6K4siw757b3Y3/yYVOSD0+k/gaLiF7BTd > 5yTGOoXvwrRO6uHeQwpjhe1SnRSBvp0rU80ELKaCsy7m3hPh+NWR5xnJYUC4VQuK > A9J9pJJKyoYgN13qJsurytrqebhb/7aYwEJtylBowKSafvAFYBSSpUIfr/JQ8ikL > A7oCuOYlsaZSio1rfMFwxR/azCOBINMghrj4zI0jAy3LPXdEEjXVMkZaAF43tWRq > kKiZXPhbtHY3idLQv1q4Wgp0Xu5VU4OUOWyGcpHyKVnpBHOuSR1M2/2j1aKcpjw= > =r5BK > -END PGP SIGNATURE- can the root.img be kept in an AppVM filesystem for this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d6c5b1fd-33ea-4f05-b212-669cfd01feff%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] GUI Issues: Active window on top, scroolbar without scrooling buttons
Hello fellow Qubes users, today I have a few questions about the GUI handling in Qubes. I use Qubes 3.2 with Xfce desktop dom0. 1) If a window that already exists is set to active, it is not shown on top. Example: I open up a programm that is alrady running and that starts only a single instance (per Qube/VM) - is there a fix? 2) The scroolingbar of Thunderbird is a little weird. There are no scrooling buttons (up/down) and when I click somewhere in the range of the scroolbar the windows content will directly jump to that very position, instead of just moving one screen towards that direction. I created the ~/.config/gtk-3.0/gtk.css as follows: .scrollbar { -GtkScrollbar-has-backward-stepper: true; -GtkScrollbar-has-forward-stepper: true; } Now the terminal has scroolbar buttons, but Thunderbird still doesnt. Even if I use a new thunderbird profile.. I have tried solving the second issue for about 3 hours now. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cb4cb89b-d7f3-17e6-b34d-695253b28c67%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] AEM, no stick ... no boot
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, Oct 23, 2016 at 06:50:04AM -0700, James Bisno wrote: > Is there a way to forbid or obstruct grub from booting up a disk encrypted > Qubes when grub is loaded from the harddrive, so that a removable AEM device > is required to load Qubes? You can keep /boot on external device (AEM). Simply - after AEM installation, wipe /boot from internal hard drive. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYDc59AAoJENuP0xzK19cswV8IAJH+OyVdCitxvAI3uYqbTPV2 b7IUA6yMZZcHCGNutmAsoQ0IP8bEw6QbgVGwHF54sHhxL0/SDAyUmsjjwxdewIkV tCHVs6DShMedVb7WQeuwrUt5RYcJud/+OzyubasB9ieosEZHC374Stwhi9oJ2Sqv NBimcSqbAl74lWLaHSzoMHyemkDJ+unVEQUpXKOxxeStRJQVjTQ9zauwmTYQaVwA 3iASueULKbY2i7sWHrpfj4I9k+hL3NCuClvFZsFMFs/EH9PmbU1312IFOXBz7grK 82UiYLytEirmnCeIGVSXCwMEwx75ZUQk1v1wrrcc+Y+GWzIbac8zNML52Z4jJqI= =7dFo -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161024090355.GC1136%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Future plans for KDE on Qubes?
On 10/23/2016 11:14 PM, Marek Marczykowski-Górecki wrote: >> Good to see that I'm not the only Qubes user out there who finds KDE to >> be more usable than the alternatives. Totally agree -- I really hope >> KDE continues to be supported on Qubes for those who prefer it. I'm also chosed to use the new version of the "broken" KDE instead of switching to Xfce. > I think we can keep its current state. Shouldn't be a problem for Qubes > 4.0 and later. At least until next major incompatible changes in KDE... The problem is that the old KDE 4 was mature enough to just leave it as it was packed by the Fedora 18, 20. But KDE 5 is heavily developed so not even bugfixes gonne be released to F23 - we currently using in dom0 So KDE 5 support would means to me: - keep an up to date Fedora release in dom0 - and/or backport KDE 5 packages to the actual dom0 release - whatever it is based on. -- Zrubi -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/968de8fb-b5aa-f055-ef2f-5b0c32afefb7%40zrubi.hu. For more options, visit https://groups.google.com/d/optout. signature.asc Description: OpenPGP digital signature