Re: [Solved, Bugfix] Re: [qubes-users] fedora-24-minimal and WiFi: Shows network, but does not connect
On Tuesday, December 6, 2016 at 4:10:51 PM UTC+1, Robert Mittendorf wrote: > I solved the problem using > > dnf install notification-daemon gnome-keyring > > without this it is not possible to store credentials for a new network > or change existing ones. confirmed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2296331f-5b9e-4d96-b1ea-0e547e01d42d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Qubes 3.2(R2) USB Connecting to DOM0 by Default
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-06 18:44, Ben Wika wrote: > On Thursday, 11 August 2016 22:38:27 UTC+10:30, ama...@riseup.net wrote: >> My understanding is that by default Qubes Dom0 is protected from USB >> attacks by disallowing access to USB's. >> To the contrary,on my system, USB's have direct access to Dom0 - I plug >> in a usb -popup shows it's connected to dom0 - i have direct access via >> dom0 to the files on the usb. >> >> Is it just me? or it it a system failure? > > so to be clear, having no usb qube makes dom0 vulnerable? (i had the same > setup until i got myself ps2 splitter) > Correct. If you're not using a USB qube (i.e., your USB controllers are left in dom0), then a malicious USB device plugged into a USB port can compromise dom0. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYR5dTAAoJENtN07w5UDAwhcoQAI6Qn3ECdHlOMZ+WlSC+mUfN LXjIzETlOuNNpfKwXb7YbBfpilldj0IwncXqWfwWVfRlTqi2oa8cmi3RbZbhi+j/ vamVGhAvKP/2B2b31tLFZiLkALxnT7sRw0A2a1ARvS2PWVujyZQKBH+9z5tDbSZq t0rTco73v3/KZqFbJtK/LyoDrhLE6AmGMstwLhTxN9AaeAr7lkYFKZetgwOiNqsb mQJCZiqJkxsrfAA3u5RxawwDxsE4c3R0a6ehfFaAEf0PCi9XXtDCLYuk9KX2FMz1 n3NshknLKTK3+mrGIgTNGPgY4wvDANorX1gvBafdWh+UVjgC1J6jZ42FO7AeudPc lGuvf3GUwc3pooSix65fYtkiVWJMeNSHdfbuMGnRzDRx36IjQpLQJ6qBpAHb7QBn G2roorRt1GujvQEwen40NOqgO3p4RhMpZra9mVPU34a6E5PcBjRl0Is3gBQgPeU9 a6p9IO+QIIT/exbB0MPguVBYYVbH9crHrJK+crzlyxNdnnFtH5Q2t96digr5rCaW c57yExsWKRVai8ijP1C22Ta+jF4l3qcta2SXwveXu8eTQZD4oR74q136qOCpbPmw EDt3HAsJaq8FwlyDVkkNL1I8RpSqYELCdEHBVCNdtH6PlEjmxeyGGGEbdOTJbXlS oUqq+RZ6xAXtaWbZZZGQ =MxBx -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/afcacc50-7cf1-4532-6c5a-ea020491211b%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] 2/3 of VMs randomly lose network access; sys-net, sys-firewall, and others normal
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-06 09:01, Eva Star wrote: > On 12/04/2016 05:19 PM, Marek Marczykowski-Górecki wrote: >> 3. Restart qubes-firewall service and see whether it helps: >> >> sudo systemctl restart qubes-firewall >> > > One my VM loss network access again. >> qubesdb-read /qubes-iptables-error > blank > >> sudo systemctl status qubes-firewall > give me this https://i.imgur.com/KUkHODf.png > it's the last call. > before all calls show me the same: > https://i.imgur.com/UwfdUSI.png (5 mins later, 9 mins later only difference) > > Then (sorry) I forget about step 3 from instruction and restart my VM. > It helps. And firewall after that show me 15 lines output (vs 14 lines before) > https://i.imgur.com/JoIaZxN.png > See the last line! It's show after I shutdown problem VM. > > As I'm already wrote I still think the problem with background updates... > Maybe race condition or something like this that freeze update task and all > network access? > FWIW, `systemctl restart qubes-firewall` fixed it for me last time. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYR5S1AAoJENtN07w5UDAwHLEQAIa4xd2D1aRU262ZQ7wHrQVX eyE6BdipuYKeJ8CmfEP7eo5pACFgyECjGhEZk3Zm/nsWnuIJvFYXhiej/iFWdtOh CUvIpZ/lYzPWY+RgnJmxf2JwJ8mwwdT5WewTPqEJKmMGHeOyfV5l5NsB1s4ChBUX dlR1Q0e4r2XWEnDeoeIRMdvVQJezWQ3GiMKvDTHBVwxt8jkbQxVwP2f1RuhvMk39 e7+luxLdSj3BAAt5jQUCIVTivVuUFBwQNrHU7ZOq+m5TrxsYN4srJOTVvMXFAXDb aF21vAIvm+H3dxnQUEGm7UvbjVoM/KfABWHe9ROGm7mk6F/imF3E9AHbJ39yWWmY vsWRE558N8qmNqMtaqLfW8aqtmnJfhq9bC8pAVjrtClKFnRzhPho6LG6QqmWbbn0 gPp6T3y5Qp0tom54MTte14jRVCF2HkLbOSUQ9g8M1RIc+A0eLP3eeIP0HMsXxAr5 s4++USG05dftv0mQ44zf2zmXR1NGSHSLi1TNHi4DZaSWAQQiGqSE7enYTHlj7Iu/ k89naxECNYbqnCKk/Nxh54jBv1gI1AxqeZ7oWGv0y084Zdx8H2sbglDerW6D3xrn DLaSGOuQqRY5eVTN0PyJbpFhzBijLE1b4jf3SuB+XlNhvZ8A5vDQUUJDo6K8T9OL BF5OM2TkSj6+sHhuW81H =YV5S -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8d5f866c-47e5-a900-0b25-99c8e213f688%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 3.2(R2) USB Connecting to DOM0 by Default
On Thursday, 11 August 2016 22:38:27 UTC+10:30, ama...@riseup.net wrote: > My understanding is that by default Qubes Dom0 is protected from USB > attacks by disallowing access to USB's. > To the contrary,on my system, USB's have direct access to Dom0 - I plug > in a usb -popup shows it's connected to dom0 - i have direct access via > dom0 to the files on the usb. > > Is it just me? or it it a system failure? so to be clear, having no usb qube makes dom0 vulnerable? (i had the same setup until i got myself ps2 splitter) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6a659dd0-b690-4918-893f-06fd3d23917a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Creating an OpenWrt netvm
On 12/06/2016 07:58 PM, jonathanri...@gmail.com wrote: Hi, I'd just like an update on this, as I am looking to do the same. OpenWRT seems the best for NetVM as it has all that I could think of. Also multiple instances for VPNs should not use too much ram. So if you got it running, could you post your config in git ? Thanks This might not be a good idea. Qubes security model says that NICs are high-risk devices that should be isolated by themselves. If you combine that with your firewall, VPN and other sensitive routing infrastructure then a breech caused by your NIC could allow an attacker to monitor and control your firewall, VPN etc. OTOH, combining firewall and VPN functions in the same VM is probably fine since those processes are relatively low-risk. Chris -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fd64d023-fc2d-7db9-efb7-7f0110f4f6c2%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: New Kernel Issues?
Never mind I figured it out :) If anyone has the same issues you can change the booted version by editing /boot/efi/EFI/qubes/xen.cfg Update the default var at the top and reboot. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/30272a7d-e616-4236-81c1-7c32a26f7851%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] New Kernel Issues?
Hey Guys, Just did some dom0 updates and after rebooting I am having lots of issues with graphics & listed memory available (4GB from 32GB), the system is also very sluggish. I can see that kernel-qubes-vm-4.4.31-11 was installed. Anyone have any ideas on how to revert back to kernel-qubes-vm-4.4.14-11 safely? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/72260be7-25c7-4343-886b-03baa4fea83a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Creating an OpenWrt netvm
Hi, I'd just like an update on this, as I am looking to do the same. OpenWRT seems the best for NetVM as it has all that I could think of. Also multiple instances for VPNs should not use too much ram. So if you got it running, could you post your config in git ? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/afc332f2-d246-4794-a51f-d1204ceb0333%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Dec 06, 2016 at 12:21:51PM -0800, Ronald Duncan wrote: > On Tuesday, 6 December 2016 13:30:05 UTC, Ronald Duncan wrote: > > Looks like I will need to reinstall since things are not working/strange > > and I remember that when it first started up it did not go through the > > initial set up smoothly, and then would not boot. > > > > Probably need to set up with nouveau.modeset=0 and then see the results:) > > Is there a way on the first boot after install prior to configuration to set > nouveau.modeset=0 You can add it from grub menu. In UEFI mode (where grub is not used), just after installation - before reboot - go to tty2 and edit /mnt/sysroot/boot/efi/EFI/qubes/xen.cfg and add nouveau.modeset=0 there (not sure if its mounted at exactly /mnt/sysroot - see `mount` output to be sure). > The configuration stage on first boot hangs and is buggy, and I would like to > have a clean boot to configure, I have access to the /boot and so can alter > config files. There is a big kernal config file, but no command line > parameters, and the boot seems to be immediate with no grub delay. No grub - you're probably using UEFI. See above. - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYR1bXAAoJENuP0xzK19csPOsH/23hRcP4/S/M1zmi9HNVLQ1z LtPjiBfPCtDIs60Xw8vJPUXZmT9Ucx7xk7mt5nR55dXmpAUJkfZVEA8//IluuRmv Z5Giu5n+xO9kc5HDEBmwOc1Yj4MmqX+Ld+qsLDIj5fAPFAQn29yoonvMYJHDI/4W unlsS3j2wyQZ5gHhpYg5PaSlysIOdCY1/zsfI9aUgrUgExaaN98cT8fV7GGSlJQ5 jn1za0tFm0cNjhWES6uu1vo9hlfmngh6/JOToVf72RFO3VIJWaTOW9h1GE+dUB32 HciOkEKjipNZL/q/CCzchev4s1HkElAKqgnWWaTmNVSVjQROi0bzEZRBtTslojE= =v9NJ -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161207002455.GA8061%40mail-itl. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Chainloading to the Qubes bootloader
On Tuesday, December 6, 2016 at 1:52:00 PM UTC-8, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Tue, Dec 06, 2016 at 12:18:09PM -0800, justin.h.holg...@gmail.com wrote: > > My primary OS is Ubuntu and it's likely to stay that way (I need > > vagrant/virtualbox for work), but I'd like to spend some time using Qubes > > when I can. > > > > In my ideal setup, my laptop would boot into Ubuntu by default, but have a > > grub entry to switch over to the Qubes bootloader on demand. > > > > This setup isn't covered by https://www.qubes-os.org/doc/multiboot/ so I > > figured I'd give it a shot myself. > > > > I installed Qubes, but elected not to make the install device bootable > > (since I want to keep Ubuntu in charge of booting). Then I found the Qubes > > bootloader partition at /dev/sda7 and attempted to add a chainloader entry > > to /etc/grub.d/40_custom like this: > > > > menuentry "Qubes Chainloader" { > > insmod chain > > insmod ext2 > > set root=(hd0,gpt7) > > chainloader /EFI/qubes/xen-4.6.1.efi > > } > > > > I can select 'Qubes Chainloader' at the grub menu, but it just flashes a > > message (I think it's something like "Loading xen-4.6.1.efi") for the > > briefest instant before dumping me back into grub. For what it's worth, I > > know it's at least finding the .efi file because it no longer complains > > that it can't. > > > > TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot > > partition at /dev/sda7? > > Is /dev/sda7 your ESP? If so, remove 'set root' line. I'm not sure it qualifies as "the" ESP (I don't know EFI very well), but /dev/sda7 holds the Qubes /boot partition. It's not the partition that boots by default; that would be /dev/sda1. If I do remove the setroot line, how will grub know that xen.efi is on /dev/sda7? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/229038f8-1bd4-44a4-a2d2-85d0fb0b8750%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Chainloading to the Qubes bootloader
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Dec 06, 2016 at 12:18:09PM -0800, justin.h.holg...@gmail.com wrote: > My primary OS is Ubuntu and it's likely to stay that way (I need > vagrant/virtualbox for work), but I'd like to spend some time using Qubes > when I can. > > In my ideal setup, my laptop would boot into Ubuntu by default, but have a > grub entry to switch over to the Qubes bootloader on demand. > > This setup isn't covered by https://www.qubes-os.org/doc/multiboot/ so I > figured I'd give it a shot myself. > > I installed Qubes, but elected not to make the install device bootable (since > I want to keep Ubuntu in charge of booting). Then I found the Qubes > bootloader partition at /dev/sda7 and attempted to add a chainloader entry to > /etc/grub.d/40_custom like this: > > menuentry "Qubes Chainloader" { > insmod chain > insmod ext2 > set root=(hd0,gpt7) > chainloader /EFI/qubes/xen-4.6.1.efi > } > > I can select 'Qubes Chainloader' at the grub menu, but it just flashes a > message (I think it's something like "Loading xen-4.6.1.efi") for the > briefest instant before dumping me back into grub. For what it's worth, I > know it's at least finding the .efi file because it no longer complains that > it can't. > > TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot > partition at /dev/sda7? Is /dev/sda7 your ESP? If so, remove 'set root' line. Generally take a look at issue 794[1], long story short - xen.efi does not work when loaded by grub using grub filesystem driver (instead of EFI filesystem handling). Not setting 'root' variable should trigger EFI internal filesystem handling. [1] https://github.com/qubesos/qubes-issues/issue/794 - -- Best Regards, Marek Marczykowski-Górecki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQEcBAEBCAAGBQJYRzL5AAoJENuP0xzK19csEDkH/ijAHRGnNZg9IbQLQbxbYAs0 Xzgo/WKThdzZLKK7PXfi7+tQyHFw/DmHs5UOmIvvDSYSRxDUP/FfGEfOm7nhxOcQ Lh+xKK/W7QCOnNERXtuXkcxHLGimYCMeen3ellAacJb8/Zg4ETTOP/O7OruAw3cr FOPMR5YnOwGU9UX6/yt0yi27W8e88jOJYV8QSp4gsGiEtWbi7tlJqzHsl28hWu+P PuW+wT7o3Y8bg+HsIu01d0zmavq9qI/+Smgm9kePdL6FiVq8ulpg9fI8GCYcdBdz 81+YIgzcTDraYjs0mFH62O78TSVW0F+uqnYGpZW4tHM4eN/NMfEB8hSoEa+dw+Y= =lHPA -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20161206215150.GC1149%40mail-itl. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: qubes r2b3 first run, I don't know how to set wireless connection
I just downloaded qubes 3.2 (my guess). Had a terrible time installing on a Toshiba Satellite. Now I can't connect to the Internet via WiFi. Found this post. I tried rfkill list all, with command not found. Not sure that would apply to this version any way. The other instructions mentioned above weren't helpful, I didn't see netvm, but I did see sys-net on Qubes VM Manager. Would appreciate any help with this. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a1d4f23e-f67b-43f3-8e62-b753d6f93e92%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Chainloading to the Qubes bootloader
On 12/06/2016 12:31 PM, justin.h.holg...@gmail.com wrote: > On Tuesday, December 6, 2016 at 12:24:08 PM UTC-8, Micah Lee wrote: >> On 12/06/2016 12:18 PM, justin.h.holg...@gmail.com wrote: >>> TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot >>> partition at /dev/sda7? >> >> It's kind of old at this point, but I wrote a blog post awhile ago about >> dual-booting Ubuntu and Qubes, including the chainloading details: >> >> https://micahflee.com/2014/04/dual-booting-qubes-and-ubuntu-with-encrypted-disks/ > > Right! I came across that and I was hoping to basically do the reverse, where > the Ubuntu bootloader comes first and has an option for Qubes. Unfortunately, > I couldn't get it to work. You could set chainloading to Ubuntu's grub as the default option in the Qubes grub. You'll boot to Qubes grub, wait 3 seconds, boot to Ubuntu grub, wait 3 seconds, boot to Ubuntu. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3ef8461d-5377-db0e-5da4-510b715a4df8%40micahflee.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Chainloading to the Qubes bootloader
On Tuesday, December 6, 2016 at 12:24:08 PM UTC-8, Micah Lee wrote: > On 12/06/2016 12:18 PM, justin.h.holg...@gmail.com wrote: > > TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot > > partition at /dev/sda7? > > It's kind of old at this point, but I wrote a blog post awhile ago about > dual-booting Ubuntu and Qubes, including the chainloading details: > > https://micahflee.com/2014/04/dual-booting-qubes-and-ubuntu-with-encrypted-disks/ Right! I came across that and I was hoping to basically do the reverse, where the Ubuntu bootloader comes first and has an option for Qubes. Unfortunately, I couldn't get it to work. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d02d0dd4-307b-44c8-9fae-89e37b5f3cfc%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Chainloading to the Qubes bootloader
On 12/06/2016 12:18 PM, justin.h.holg...@gmail.com wrote: > TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot > partition at /dev/sda7? It's kind of old at this point, but I wrote a blog post awhile ago about dual-booting Ubuntu and Qubes, including the chainloading details: https://micahflee.com/2014/04/dual-booting-qubes-and-ubuntu-with-encrypted-disks/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5b0c20d2-d221-575c-49fe-f8063173c159%40micahflee.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install
On Tuesday, 6 December 2016 13:30:05 UTC, Ronald Duncan wrote: > Looks like I will need to reinstall since things are not working/strange and > I remember that when it first started up it did not go through the initial > set up smoothly, and then would not boot. > > Probably need to set up with nouveau.modeset=0 and then see the results:) Is there a way on the first boot after install prior to configuration to set nouveau.modeset=0 The configuration stage on first boot hangs and is buggy, and I would like to have a clean boot to configure, I have access to the /boot and so can alter config files. There is a big kernal config file, but no command line parameters, and the boot seems to be immediate with no grub delay. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/365b0738-f05e-4445-9edf-2f864d2e9009%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Chainloading to the Qubes bootloader
My primary OS is Ubuntu and it's likely to stay that way (I need vagrant/virtualbox for work), but I'd like to spend some time using Qubes when I can. In my ideal setup, my laptop would boot into Ubuntu by default, but have a grub entry to switch over to the Qubes bootloader on demand. This setup isn't covered by https://www.qubes-os.org/doc/multiboot/ so I figured I'd give it a shot myself. I installed Qubes, but elected not to make the install device bootable (since I want to keep Ubuntu in charge of booting). Then I found the Qubes bootloader partition at /dev/sda7 and attempted to add a chainloader entry to /etc/grub.d/40_custom like this: menuentry "Qubes Chainloader" { insmod chain insmod ext2 set root=(hd0,gpt7) chainloader /EFI/qubes/xen-4.6.1.efi } I can select 'Qubes Chainloader' at the grub menu, but it just flashes a message (I think it's something like "Loading xen-4.6.1.efi") for the briefest instant before dumping me back into grub. For what it's worth, I know it's at least finding the .efi file because it no longer complains that it can't. TL/DR: what can I put in /etc/grub.d/40_custom to chainload the Qubes /boot partition at /dev/sda7? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b9c7e827-b344-4d01-8063-7e584acf4987%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Asus Transformer 3 Pro T303UA, Thunderbolt issues
The only thing I could find is this, from dom0s dmesg: [ 29.251207] xhci_hcd :05:00.0: remove, state 1 [ 29.251216] usb usb4: USB disconnect, device number 1 [ 29.251218] usb 4-1: USB disconnect, device number 2 [ 29.251219] usb 4-1.1: USB disconnect, device number 3 [ 29.251220] usb 4-1.1.1: USB disconnect, device number 4 [ 29.253988] xhci_hcd :05:00.0: USB bus 4 deregistered [ 29.254071] xhci_hcd :05:00.0: remove, state 1 [ 29.254079] usb usb3: USB disconnect, device number 1 [ 29.254081] usb 3-1: USB disconnect, device number 2 [ 29.254084] usb 3-1.1: USB disconnect, device number 3 [ 29.254086] usb 3-1.1.2: USB disconnect, device number 6 [ 29.289813] usb 3-1.1.4: USB disconnect, device number 7 [ 29.290279] usb 3-1.2: USB disconnect, device number 4 [ 29.399835] xhci_hcd :05:00.0: USB bus 3 deregistered [ 29.400369] pciback :05:00.0: seizing device [ 29.400479] xen: registering gsi 18 triggering 0 polarity 1 [ 29.400484] Already setup the GSI :18 [ 29.803790] loop: module loaded [ 30.366119] xen_pciback: vpci: :05:00.0: assign to virtual slot 0 [ 30.366446] pciback :05:00.0: registering for 1 [ 30.367301] xen_pciback: vpci: :3a:00.0: assign to virtual slot 1 [ 30.367631] pciback :3a:00.0: registering for 1 [ 31.693098] xen-blkback: event-channel 17 [ 31.693193] xen-blkback: /local/domain/1/device/vbd/51712:using single page: ring-ref 8 [ 31.693323] xen-blkback: ring-pages:1, event-channel 17, protocol 1 (x86_64-abi) persistent grants [ 31.705391] xen-blkback: event-channel 18 [ 31.705512] xen-blkback: /local/domain/1/device/vbd/51728:using single page: ring-ref 9 [ 31.705603] xen-blkback: ring-pages:1, event-channel 18, protocol 1 (x86_64-abi) persistent grants [ 31.713185] xen-blkback: event-channel 19 [ 31.713372] xen-blkback: /local/domain/1/device/vbd/51744:using single page: ring-ref 10 [ 31.713503] xen-blkback: ring-pages:1, event-channel 19, protocol 1 (x86_64-abi) persistent grants [ 31.721737] xen-blkback: event-channel 20 [ 31.721815] xen-blkback: /local/domain/1/device/vbd/51760:using single page: ring-ref 11 [ 31.721890] xen-blkback: ring-pages:1, event-channel 20, protocol 1 (x86_64-abi) persistent grants [ 32.696932] pciback :05:00.0: Driver tried to write to a read-only configuration space field at offset 0x8a, size 2. This may be harmless, but if you have problems with your device: 1) see permissive attribute in sysfs 2) report problems to the xen-devel mailing list along with details of your device obtained from lspci. [ 32.697621] pciback :05:00.0: enabling device ( -> 0002) Permissive mode is already enabled for the device, so I think the only remaining thing is to report this to the xen-devel list... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8ccfeef3-4576-4199-aa55-313429e66388%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Persistent audio issues in a particular appvm (Qubes 3.1)
Thanks Marek, using the start-pulseaudio-with-vchan script does the trick and fixes the problem. I had already looked through journalctl and couldn't see anything obvious, I'll look at the .xsession-errors as you suggested perhaps that will explain things. Jon -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5f8780f1-dcfa-4476-951b-f1bf2e30527b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] 2/3 of VMs randomly lose network access; sys-net, sys-firewall, and others normal
On 12/04/2016 05:19 PM, Marek Marczykowski-Górecki wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Nov 30, 2016 at 09:19:06PM +0300, Eva Star wrote: On 11/27/2016 02:04 AM, Marek Marczykowski-Górecki wrote: Do you see some correlation with: - starting/stopping another VM? - affected VMs have or not firewall rules? Also, check if restarting qubes-firewall service in sys-firewall helps (and check it status first). Seems I have the same issue! (Maybe) I think it's correlate with CHECKING UPDATES on dom0 or templates. When Qubes do that check - other VM still not responsive. I wrote about this at the Xen 4.6.3 thread. More troubleshooting steps: 1. When problem appears, try in sys-firewall: qubesdb-read /qubes-iptables-error This should print last error of firewall reload. I guess it may be about some DNS resolution failure (if any rule use DNS name instead of IP). This shouldn't affect all the VMs - only the one for which name resolution failed, but maybe something is wrong here. 2. Check status and logs of qubes-firewall service: sudo systemctl status qubes-firewall Should be "active (running)" and a series of "qubes-firewall[xxx]: /qubes-iptables" messages. If you see anything else, let me know. 3. Restart qubes-firewall service and see whether it helps: sudo systemctl restart qubes-firewall One my VM loss network access again. > qubesdb-read /qubes-iptables-error blank > sudo systemctl status qubes-firewall give me this https://i.imgur.com/KUkHODf.png it's the last call. before all calls show me the same: https://i.imgur.com/UwfdUSI.png (5 mins later, 9 mins later only difference) Then (sorry) I forget about step 3 from instruction and restart my VM. It helps. And firewall after that show me 15 lines output (vs 14 lines before) https://i.imgur.com/JoIaZxN.png See the last line! It's show after I shutdown problem VM. As I'm already wrote I still think the problem with background updates... Maybe race condition or something like this that freeze update task and all network access? -- Regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5ccfd8b9-99d9-23d1-f0ab-85ce32efd2a4%40openmailbox.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes' Firefox and videos
Swami On Tue, Dec 6, 2016 at 8:14 AM, Swâmi Petaramesh wrote: > Hi, > > I'm a longtime Linux user, but I have been using Qubes for "only" 3 months. > > I have noticed that a lot of videos that work well in Firefox on my other > "usual" distributions do not work in the Firefox that comes with Qubes > (i.e. all videos embedded in Twitter, most videos embedded in news > sites...). > > I've tried to install more codecs and Flashplayer in the template VM, but > to no avail. > > Does anybody have a clue ? > > Also, although I have installed the system in my own language, in my > AppVMs I get everything in english. That's not much of an issue, but I'd > prefer to get my own language interface and I'm not sure where to change > this in the Qubes context. > On template, sudo gnome-control-center is very easy to use and works perfectly to change the language of all applications. Once It was about selecting the personal ragional language icon, then change the language or add a language in the language tab, then go to system tab and click on copy setting. This change remains after reboot. Then something changed, but it is even easier You will have no problems. English is not my mother language, but I prefer to keep it in English because when I get some error message in English it is much more straightforward to search for similar problems and solutions. Best Fran > > TIA for any help. > > Kind regards. > > -- > ॐ > > Swâmi Petaramesh PGP 9076E32E > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/ms > gid/qubes-users/3aca4178-0a95-395f-2bc4-b55806bd4d37%40petaramesh.org. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qD6-Of0X8WtOg0TA9uDNfYaNb9Zfi5g-8Sj__oFW6egVA%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[Solved, Bugfix] Re: [qubes-users] fedora-24-minimal and WiFi: Shows network, but does not connect
I solved the problem using dnf install notification-daemon gnome-keyring without this it is not possible to store credentials for a new network or change existing ones. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fa238679-eae8-2052-2c40-a1e0f8edf658%40digitrace.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL - Acer Aspire F5 573-55LV
Workable aside from issue with Ethernet + SD reader (could be sorted out down the road or not) but usable via wireless Atheros to at least have network (have to leave Ethernet out or you don't get the WiFi to setup/work in Qubes). Installed 3.2 with only a day or so of fiddling/consideration. Has both a space for 2.5" SSD & an M.2 (used for Windows 256MB stick) & supports up to 32GB of working RAM & is 7th generation Intel. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAN5pPfPBTgS5UTwxYc2Bsbb%2BhoD7LSZuxZqEaLEeD3QF-GpU7Q%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-Acer-Aspire_F5_573-20161203-030412.yml Description: application/yaml Qubes-HCL-Acer-Aspire_F5_573-20161203-030412.cpio.gz Description: application/gzip
[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install
Looks like I will need to reinstall since things are not working/strange and I remember that when it first started up it did not go through the initial set up smoothly, and then would not boot. Probably need to set up with nouveau.modeset=0 and then see the results:) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8dc044d0-2c1d-490c-a012-8751df9c9afe%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install
On Tuesday, 6 December 2016 13:11:41 UTC, Ronald Duncan wrote: > Changing grub config to boot with nouveau.modeset=0 gave me a good > repeatable boot. > > Now qubes is usable will investigate if everything else works:) Thanks to Marek Marczykowski-Górecki -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cc72ddfe-6249-4db1-8f17-3c6d2131a884%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Asus ROG GL752VW-GS71-HID6 Install
Changing grub config to boot with nouveau.modeset=0 gave me a good repeatable boot. Now qubes is usable will investigate if everything else works:) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0e2bc5bd-dbdd-45cb-a9dd-3dff077e3b27%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Stuck during boot with processor stuck - now with journalctl logs
On Sunday, 27 November 2016 21:21:01 UTC, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > This assume you can boot your system. Does the hang happen all the time, > or only sometimes? If the former, try disabling nouveau driver (which > looks to be the problematic one), for example using nouveau.modeset=0 > kernel option. Just got back from travelling. Changing grub to boot with nouveau.modeset=0 gave me a good boot :) Just tried rebooting and it shutdown cleanly and booted up fine. Big Thanks!! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2d6fead8-9f5b-4b34-84f9-c1cc51f66550%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Trouble installing Windows SP1 7 64-bit on Qubes 3.2
tirsdag 6. desember 2016 11.07.52 UTC+1 skrev Swâmi Petaramesh følgende: > Hello, > > I run Qubes 3.2 on an HP ProBook 6470b laptop > > I'm trying to install Windows 7 64-bit SP1 following instructions : > https://www.qubes-os.org/doc/hvm/ > > I'm using an ISO file sitting in an AppVM. > > I could create the VM and start it, it first starts in character mode > and displays a "Windows is loading files..." progress bar (so I'm sure > that the VM boots and can access the ISO image), then shifts to graphics > mode and displays "Starting Windows" in a nice font, and then... sits > there forever without any visible activity, and no error message. > > Any clue ? > > I know that my Qubes setup is able to run Windows 7 in an HVM as I have > created another Win7 HVM, with a Windows 7 converted from a VirtualBox > installation, and it works good. But this one is 32-bit, and I'm trying > to install a 64-bit version as I read that Qubes Windows tools support > only a 64-bit Windows installation... > > Thanks in advance for your help. > > Kind regards. I have experienced the same thing (and was actually just now about to create a new topic when I saw you beat me to it). As far as I can tell the problem is caused by some update to the system (using qubes-dom0-update) as everything works just fine on a fresh Qubes 3.2 system. This is my experience: 1. Installed Qubes 3.2 2. Installed Windows 32-bit HVM just fine. 3. (started testing QubesOS, including updating dom0) 4. Discovered that I should have installed win7-x64 in the first place. 5. Tried installing win7-x64, but booting the install media hung at exactly the same place as described by thread starter. 6. Made a fresh install of Qubes 3.2 and now win7-x64 installed just fine. 7. (started testing QubesOS, including updating dom0) 8. Now I want to make a win7-x64 Template, using the same install media, and I am once again stuck... How should we proceed to debug what is causing this problem? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7f10d8b5-f9e8-4705-a5cd-8de7b05aa1f3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Qubes' Firefox and videos
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-12-06 03:14, Swâmi Petaramesh wrote: > Hi, > > I'm a longtime Linux user, but I have been using Qubes for "only" 3 months. > > I have noticed that a lot of videos that work well in Firefox on my other > "usual" distributions do not work in the Firefox that comes with Qubes (i.e. > all videos embedded in Twitter, most videos embedded in news sites...). > > I've tried to install more codecs and Flashplayer in the template VM, but to > no avail. > > Does anybody have a clue ? > > Also, although I have installed the system in my own language, in my AppVMs I > get everything in english. That's not much of an issue, but I'd prefer to get > my own language interface and I'm not sure where to change this in the Qubes > context. > > TIA for any help. > > Kind regards. > Make sure hardware acceleration is disabled in your browser's settings. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJYRqLyAAoJENtN07w5UDAwQT4P/jTroDE1DPz8KXYxS3LA/KV6 GmjQPwbWAWRkhW2Wv0k+mFEmtenNoNbGAaFGoj6oKnvBVf4nHs4x3EJnVuKo3DAG 2/U7swRP+uAoBTlGccLSf9AKJfDxz0Dvj74iGCGTbl3GeazHhuVr45TuIDwjpXdB 4MiIP8I1iTngGjwyfWmlUF397c16G3+4vArFTF3QYIp5fEF/AI+JJgugn2/xf8iB dbIs/2e6A5ahozdNM8ONYw+FVIznWxSXreOKFjKMgbuE89IYTE7FvAnvIJ19mtbv bndbq6BxVCUVAma7jclsU46lQqMYjSva3xhL8kSbPvuZp/M4dUUIsI8+E8orYPHh G5j+Wx14SmME6gBR04v2rCIiTO/mMh76BnXr6WWINrv/b+54VukzNdaEWbHCHlgh rOOTTRsJh61CCMQQipV3neRK8xmrC/0G5egDhyvOVcM5o/fioByDmpP/zNW/+D2T jeeOn9uUKyEXfMkOGdtwOBmwfka/UG7WJ4PepxLe69VX7ZdARnmfeHMs5Q7I94Pq FKBgzB+ELRIcHm7ooI2rumFTPgVLCMUPOfq8CfYL9mXrnAF9WMxSFCkmk7RNIK/h W0ixhxSM+cE77/kQL6E/8ZRMqicChuxybd7QBEyjWztgXcCtqPUobaS+IcnxcUGd J7zp2qkeXwLQc1KCczWm =skYY -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44d9cf23-8b39-01b5-5378-0c7654241cc0%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Thinkpad T460
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Le 03/12/2016 à 21:53, Jan Betlach a écrit : > On Saturday, December 3, 2016 at 8:41:49 PM UTC+1, Bernd Lorenzen > wrote: >> Hello, >> >> my Question is how i set the charge thresholds for my Lenovo >> Thinkpad T460. >> >> I have installed the following packages tlp, >> tlp-rdw,tp-smapi-dkms and acpi-call-dkms in both fedora aind >> debian template. Afterwards i changed the thresholds in the >> config file /etc/default/tlp in both templates and in dom0. But >> it doesn`t work. Do you know a workaround for this. I hope did >> not forget some useful information for you. >> >> Kind regards >> >> >> Bernd Lorenzen > > > Has the service been started? # systemctl status tlp > Hi, If this is like the T450, ensure that you have correctly compile the acpi_call module. Do you really have it? lsmod|grep -q acpi_call && echo "Installed" Personnaly I have allways trouble with dkms, I have manually build from /usr/src/akmods/*.src.rpm, -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJYRdAIAAoJEN6tUq35EFbDzgkP/A/WFRueW2GXGRZ16vCAIMcA o0Q5hjGFtvolD4fPiogW8a0KGE9k/ejggn45FaIGki+IS/QyjmZhhFkiADAhx1j0 x3WkBIn55sesWZOOzU4L6g+a5YPfU8B/DS0k0nJ59d6IUAExoW9tI5447a35fJ0Y DCM/4CRpCIH8ArVJxNq2kn9LY1TGNZyE2ddMqMSlDFF6JNDNaFsMEhPvKaPBDq++ 64Ul6QyWwnX9Q0zhBEBZux6CySh4IgYg6poWs6JBBEOnq3zcyAxSxoAdM1evzLrS bDZZzpS3zmTHhJ3cpX+sUKS2rP1gCdanqMuCzmIpn1O0OLP6/Qw+WQsGPYuX6UUw vTgegwmLGZnlHik+7pRjfTRpXup+0RXDQFwW0AKfoHJiCVfRtSP3oXuMxf5N/boy UeyeKzTrkculZUp7Ltd+r0+7xwOvibl2jQE8Jg+YozDLUBJhGWLfXhoA+IL42lxc 2DS4flwQIZ3fzc9Bo2VybXJHv6TrUAWXZUMk1F4vTCm479H37sAvSau3mYTQDgZV qb2xybMr1NBy+UEcSxVMmd2yHWv6+Yt+vPj8T2A/gZBm744Bn14HQbbTG8Y5Smja J0owh7stLToSA7tSKjDq2q57dPtz7C7uCnBf0ov2LJjy4MYyEMP6F77tAcNBrJxq 3A840duc9pRxuXZGNGfT =qtrp -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/o24j6d%24mhn%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Asus Transformer 3 Pro with Thunderbolt dock problems
Hi! I got an Asus Transformer 3 Pro tablet and installed qubes on it. This works unexpectedly well. The resolution is difficult (2880px on a 12" display), but the touchscreen works and the stylus works very well. But the Transformer having only one USB controller and no Ethernet is a drawback. I hoped to fix this with the Thunderbolt docking station, which has an additional USB controller and network device integrated. But I have not been able to pass those USB devices through to sys-net. I'll post some lspci and lsusb logs here after rebooting, to show the whole picture. Has anyone tried getting Thunderbolt devices to work in a qube? Kind regards, Benjamin -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/93ba58b2-e934-4cd5-944d-760301ed1661%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes' Firefox and videos
Hi, I'm a longtime Linux user, but I have been using Qubes for "only" 3 months. I have noticed that a lot of videos that work well in Firefox on my other "usual" distributions do not work in the Firefox that comes with Qubes (i.e. all videos embedded in Twitter, most videos embedded in news sites...). I've tried to install more codecs and Flashplayer in the template VM, but to no avail. Does anybody have a clue ? Also, although I have installed the system in my own language, in my AppVMs I get everything in english. That's not much of an issue, but I'd prefer to get my own language interface and I'm not sure where to change this in the Qubes context. TIA for any help. Kind regards. -- ॐ Swâmi Petaramesh PGP 9076E32E -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3aca4178-0a95-395f-2bc4-b55806bd4d37%40petaramesh.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Trouble installing Windows SP1 7 64-bit on Qubes 3.2
Hello, I run Qubes 3.2 on an HP ProBook 6470b laptop I'm trying to install Windows 7 64-bit SP1 following instructions : https://www.qubes-os.org/doc/hvm/ I'm using an ISO file sitting in an AppVM. I could create the VM and start it, it first starts in character mode and displays a "Windows is loading files..." progress bar (so I'm sure that the VM boots and can access the ISO image), then shifts to graphics mode and displays "Starting Windows" in a nice font, and then... sits there forever without any visible activity, and no error message. Any clue ? I know that my Qubes setup is able to run Windows 7 in an HVM as I have created another Win7 HVM, with a Windows 7 converted from a VirtualBox installation, and it works good. But this one is 32-bit, and I'm trying to install a 64-bit version as I read that Qubes Windows tools support only a 64-bit Windows installation... Thanks in advance for your help. Kind regards. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/10214626-eb3c-9bde-631f-3f36bc67c47e%40petaramesh.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] VT-d support in hcl report
On 11/26/2016 07:14 PM, te...@outoftheblue.pl wrote: On Thu, 24 Nov 2016 09:33:23 +0100 Zrubi wrote: Well, as you noted the qubes-hcl-report tool relays on xl info, and xl dmesg output. If both states tat IOMMU is enabled: virt_caps: hvm hvm_directio (XEN) I/O virtualisation enabled what else can it say? If you 100% sure that this is a false positive, then we should address this issue for sure. However I can't see how we can check if IOMMU is really working? Maybe we can try DMA attack PoC script and try to break out from a netvm for example? (of course not as part of the hcl report :) Thanks for your reply. After reading it I realized that I should probably ask at Xen devel mailing list. I am not 100% sure, but the specs about my HW says so(and I am 100% sure about what HW I have). Anyway, I like the idea of DMA PoC attack. Sounds like a definitve measure of VT-d separation. Are there any PoCs publicly available? Regards, tezeb One of the side problems is that interrupt remapping support (or the lack of it) is not mentioned at all in HCL reports/tests and not mentioned to the average user who doesn't understand intels weird marketing speak [1], even some newer devices where the chipset theoretically supports it have it not activated for whatever reason. [1] intel says "VT-d" instead of IOMMU, to make it seem like they are the only ones with the technology, and they fail to mention what version of it the chips feature (newer versions have better performance and the first few versions lack interrupt remapping which sucks and entirely breaks their shitty TXT/TPM technologies - intels reply to support message "buy a new computer") -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b387c86a-ffad-f281-f372-b67bc43d5997%40gmx.com. For more options, visit https://groups.google.com/d/optout.