[qubes-users] Re: lemur7 Unable to reset PCI device

2017-01-03 Thread Sean
For Wifi, in sys-net keep 02:00.0, but remove (03:00.0 and) 03:00.1.

If you need Ethernet, good luck. I have been unable to get the Realtek Ethernet 
devices to function reliably -- barely at all -- on my Lemur, but Wifi works 
great. 

For the error that you're getting, you need to add 03:00.0 to sys-net. However, 
even with that change, I was only sometimes able to get Ethernet connectivity. 

Similar: 
https://groups.google.com/forum/#!topic/qubes-users/Fs94QAc3vQI
https://github.com/QubesOS/qubes-issues/issues/1393

I played around with permissive settings but ultimately it is unneeded for Wifi 
and did not seem to impact the reliability of the Ethernet.

My experience:
Sometimes Ethernet would work only to not work upon reboot, regardless of the 
kernel version or configurations I attempted; although, my Linux 
troubleshooting skills are minimal so maybe I missed something in the 
kernel/xen and other logs. Yet, it seemed strange that it would work during one 
session but not after a VM and/or system reboot. Something about the 03:00.0/1 
device does not play well with Xen/Qubes. So, unless you really need Ethernet, 
I recommend only connecting your Wifi device to sys-net. The 8260 works great 
when on its own. 

On Monday, January 2, 2017 at 10:27:27 PM UTC-8, pixel fairy wrote:
> used a working desktop to install and update to qubes-unstable. this time the 
> lemur was able to boot, but sys-net could not run. heres an hcl-report 
> followed by a typescript session showing pci devices and the error. adding 
> pci devices to sys-net in the qubes-manager gave the same result.
> 
> ---
> layout:
>   'hcl'
> type:
>   'notebook'
> hvm:
>   'yes'
> iommu:
>   'yes'
> slat:
>   'yes'
> tpm:
>   'unknown'
> brand: |
>   System76, Inc
> model: |
>   Lemur
> bios: |
>   5.12
> cpu: |
>   Intel(R) Core(TM) i7-7500U CPU @ 2.70GHz
> cpu-short: |
>   FIXME
> chipset: |
>   Intel Corporation Device [8086:5904] (rev 02)
> chipset-short: |
>   FIXME
> gpu: |
>   Intel Corporation Device [8086:5916] (rev 02) (prog-if 00 [VGA controller])
> gpu-short: |
>   FIXME
> network: |
>   Intel Corporation Wireless 8260 (rev 3a)
>   Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 PCI Express Gigabit 
> Ethernet Controller (rev 12)
> memory: |
>   32655
> scsi: |
>   Samsung SSD 850  Rev: 1B6Q
>   CT750MX300SSD1   Rev: 0100
> 
> versions:
> 
> - works:
> 'FIXME:yes|no|partial'
>   qubes: |
> R3.2
>   xen: |
> 4.6.3
>   kernel: |
> 4.8.12-12
>   remark: |
> FIXME
>   credit: |
> FIXAUTHOR
>   link: |
> FIXLINK
> 
> ---
> 
> Script started on Mon 02 Jan 2017 09:33:34 PM PST
>  ]0;user@dom0:~ [user@dom0 ~]$ lspci
> 00:00.0 Host bridge: Intel Corporation Device 5904 (rev 02)
> 00:02.0 VGA compatible controller: Intel Corporation Device 5916 (rev 02)
> 00:08.0 System peripheral: Intel Corporation Skylake Gaussian Mixture Model
> 00:14.0 USB controller: Intel Corporation Sunrise Point-LP USB 3.0 xHCI 
> Controller (rev 21)
> 00:14.2 Signal processing controller: Intel Corporation Sunrise Point-LP 
> Thermal subsystem (rev 21)
> 00:16.0 Communication controller: Intel Corporation Sunrise Point-LP CSME 
> HECI #1 (rev 21)
> 00:17.0 SATA controller: Intel Corporation Sunrise Point-LP SATA Controller 
> [AHCI mode] (rev 21)
> 00:1c.0 PCI bridge: Intel Corporation Device 9d10 (rev f1)
> 00:1c.2 PCI bridge: Intel Corporation Device 9d12 (rev f1)
> 00:1c.5 PCI bridge: Intel Corporation Sunrise Point-LP PCI Express Root Port 
> #6 (rev f1)
> 00:1f.0 ISA bridge: Intel Corporation Device 9d58 (rev 21)
> 00:1f.2 Memory controller: Intel Corporation Sunrise Point-LP PMC (rev 21)
> 00:1f.3 Audio device: Intel Corporation Device 9d71 (rev 21)
> 00:1f.4 SMBus: Intel Corporation Sunrise Point-LP SMBus (rev 21)
> 02:00.0 Network controller: Intel Corporation Wireless 8260 (rev 3a)
> 03:00.0 Unassigned class [ff00]: Realtek Semiconductor Co., Ltd. RTL8411B PCI 
> Express Card Reader (rev 01)
> 03:00.1 Ethernet controller: Realtek Semiconductor Co., Ltd. 
> RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 12)
>  ]0;user@dom0:~ [user@dom0 ~]$ qvm-start sys-net
> --> Creating volatile image: /var/lib/qubes/servicevms/sys-net/volatile.img...
> --> Loading the VM (type = NetVM)...
> Traceback (most recent call last):
>   File "/usr/bin/qvm-start", line 136, in 
> main()
>   File "/usr/bin/qvm-start", line 120, in main
> xid = vm.start(verbose=options.verbose, 
> preparing_dvm=options.preparing_dvm, start_guid=not options.noguid, 
> notify_function=tray_notify_generic if options.tray else None)
>   File "/usr/lib64/python2.7/site-packages/qubes/modules/005QubesNetVm.py", 
> line 122, in start
> xid=super(QubesNetVm, self).start(**kwargs)
>   File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", line 
> 1966, in start
> self.libvirt_domain.createWithFlags(libvirt.VIR_DOMAIN_START_PAUSED)
>   File "/usr/lib64/python2.7/site-packages/libvirt.py", line 1059, 

Re: [qubes-users] Best way to install qubes on mixed ssd and sata disks

2017-01-03 Thread Swâmi Petaramesh
Le 03/01/2017 à 17:38, Ronald Duncan a écrit :
> Looking to reinstall qubes from scratch and would like to optimise the use of 
> the ssd so I execute as much as possible on the ssd and use the sata for 
> storage.
> 
> I have a 500gig ssd and 1 tb sata.
> 
> Thoughts appreciated
> 
> At the moment I installed qubes on the sata drive to test out and experiment 
> on.

Yo can go on from there by following this :


https://groups.google.com/forum/#!msg/qubes-users/ArHTEeQAH8A/r9zzY0DLBQAJ

ॐ


-- 
Swâmi Petaramesh  PGP 9076E32E

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd6a9a9a-866e-52e0-40dd-4f0ee449064e%40petaramesh.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Kali VM is unusable

2017-01-03 Thread involuntarycomputer
I have a Kali VM (installed in a new vm via iso). 90% of the screen is 
gray. The Kali top bar appears at the bottom of the screen, and most of 
the desktop is not even onscreen. Has anyone else encountered this?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d664c4db39dd7fd16ff5b2ff079ba8d5%40airmail.cc.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to set file association in disposable VMs?

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 16:16, Unman wrote:
> On Tue, Jan 03, 2017 at 08:57:58AM +, Robin Green wrote:
>> On Tue, 3 Jan 2017 at 03:14 Unman  wrote:
>>
>  Original Message 
> Subject: [qubes-users] How to set file association in disposable VMs?
> Local Time: December 29, 2016 7:48 PM
> UTC Time: December 29, 2016 11:48 AM
> From: gree...@gmail.com
> To: qubes-users 
>
> I have configured Nautilus in an AppVM to open PDF files with Okular,
>>> and
> I've then done the same configuration (as user "user") in the
>>> TemplateVM
> that the disposable VMs are also based on. However, when I choose
>>> "Open in
> disposable VM" from that reconfigured AppVM, even though the dispvm
> savefile is updated before launching the dispvm, it still uses the
>>> default
> PDF viewer instead of Okular.
>
>
> Sounds similar to this:
>
>
>>> https://groups.google.com/forum/#!searchin/qubes-users/open$20in$20dvm|sort:relevance/qubes-users/GZ2zWcoMuwc/vwAzmYS5DgAJ
>
> --WillyPillow
>
>>>
>>> You don't say *how* you have changed the association.
>>>
>>
>> I changed it using Nautilus, by right-clicking on the file, Properties.
>>
>>
>>> Try changing the file association in the template:
>>> mimeopen -d file.pdf will allow you to set the default application.
>>> Close down the template.
>>> Then make sure the dvm file is regenerated before opening the dispVM,
>>> as you have done.
>>>
>>
>> That didn't work either. Please note, as noted already in this thread, this
>> is a known bug.
>>
> 
> Did you actually read that bug report? I'm amazed it's still open.
> 

Would you mind explaining why you think it should be closed?

> I assume that you are using a Fedora template since 'mimeopen'
> works for a vanilla Debian template.
> 
> For Fedora based dvms, the dvm does NOT pick up the association from the
> template. It's therefore necessary to customize the DispVM: there are
> instructions for doing this in the docs.
> 
> In brief, for a fedora-24-dvm:
> qvm-run -a fedora-24-dvm xterm
> 
> In the dvm:
> mimeopen -d test.pdf
> touch /home/user/.qubes-dispvm-customized
> sudo halt
> 
> Regenerate DispVM template using qvm-create-default-dvm:
> qvm-create-default-dvm fedora-24
> 

If this solves the problem in the aforementioned issue, we can add this
to the documentation (as a way of closing that issue).

> 
> I haven't tested this with Okular, but it works for setting other default
> applications. Can you confirm it with Okular?
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYbH01AAoJENtN07w5UDAwBqoP+wZmMw2YtKRloYd6uS042NGM
nKrp1BmPYyDsjiGscEiH8k2xsoteltstm/dV+AO5NiJdhqiC588SjIFuwZXzxZxI
tyW7OjOH/2QAc9lVGgagfDM3JYABfgBRzyyyB2D9Ehy3UVTTsvM/wKmIfD41Qppj
P4Xo3S44ns2mDl/IFggGgDt4mX7lJiAnrBDbOpBQpASmxfetcqcn5PifPMG/T3wc
iLG0XyCsAzRLozYLBah4fMg0XrjP3ZE95wLf8iKtW9ftL8bSnmYpeFqPm/MR6CSS
s8tvxWQtBBEhBGf3IhSphMM96rPYQsgrG2681Oa2S5nULEcVfYYCEH4HjKLOOv35
dtqWGTZ4UN5nj2i7ois3ob+Dccgid05FyLAMKcQ8EqNq90vQV4/xCWy80KeAqxXd
Spqno1VUR/Gztux/o3o6g18aiiNVWg37IEPGFg3BAGdzq2cn/kYzFkykO/pa0QSE
5bMVX8FJ6FtSZ3jHnITliO9NTgobzElkxeCKlqT59beubCn77t7wCtY4nbIj7qKe
Fa1hQG2stN8kWGnc1q/aBymq1JMRbsxYWSqkrAlM02t2Fd7WYMPCitKP8LzYDalN
p7IA/s3eaY4sHuiIRZD4Q4u6QZbMo9LngYSzz9N7ow/Si+Ys3xFSH1mzCcg09e4e
/zJHMzlEATJTY1nK+rPX
=dhsc
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bf597435-73eb-c0dc-d71e-1a512ca4848c%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Computer Models Guaranteed to work with Qubes 4.0?

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 15:41, James Funkhauser wrote:
> The lowest bar is the minimal requirements.[2] Even the minimal 
> requirements for 4.x are quite secure, since they now include VT-d 
> and VT-x (which weren't minimally required in previous Qubes 
> releases). VT-d is required for isolating devices (e.g., 
> networking, USB),[3] and VT-x is required for running certain
> kinds of VMs (e.g., Windows).[4] This should be relatively easy to 
> achieve, but you have to attend to more than just the CPU's 
> properties. For example, it's not enough that the CPU alone 
> supports VT-d. The motherboard has to support it also.
> 
> I see. I can then shop around for devices that have one of the
> CPUs listed as being compatible. But what about motherboards? Is
> there a compatibility list for those?
> 

Not one that I'm aware of. Typically, you have to check the specs for
the motherboard you're considering purchasing.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=huBa
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/684a49cf-ead9-205f-1ba2-9b333d72498b%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Otto Kratik
On Tuesday, January 3, 2017 at 8:55:58 PM UTC-5, Unman wrote:
> On Tue, Jan 03, 2017 at 04:12:28PM -0800, Otto Kratik wrote:
> > On Tuesday, January 3, 2017 at 6:02:09 PM UTC-5, Marek Marczykowski-Górecki 
> > > 
> > 
> > > Try running `xdg-desktop-menu forceupdate`.
> > 
> > Ran it as su from dom0 terminal. Command was accepted, but no noticeable 
> > effect or change, or output.
> > 
> 
> Have you checked the menu files?
> 
> For xfce, in /etc/xdg/menus/xfce-applications.menu you should have a
>  section with  System that references 
> qubes-System-Tools.directory
> There should be an  section containing 
> and Excludes for X-Qubes_VM and X-Xfce-Toplevel
> 
> The actual desktop files should be in /usr/share/applications: check
> that they are there.
> Confirm the Categories of a sample desktop file.
> 
> I can't imagine that these have been deleted - if they have then you don't
> need to reinstall, just replace the missing files.
> 
> let us know what you find (or not, as the case may be).


Here are the contents of the xfce-applications.menu file:

**
http://www.freedesktop.org/standards/menu-spec/1.0/menu.dtd;>


Xfce







X-Xfce-Toplevel


exo-file-manager.desktop
exo-mail-reader.desktop
exo-web-browser.desktop



/usr/local/share/applications


xfce4-run.desktop
exo-terminal-emulator.desktop

System



xfce4-about.desktop
xfce4-session-logout.desktop



System
qubes-System-Tools.directory




X-Xfce-Toplevel
X-Qubes-VM



xfce-settings-manager.desktop









***

In /usr/share/applications I see:

kde (folfer)
kde4 (folder)
screensavers (folder)
gnome-mimeapps.list
kde-mimeapps.list
mimeapps.list
mineinfo.cache
xfce-mimeapps.list


Does that reveal anything? What should I be looking for within this location 
further?

Thanks...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4caa2ffd-447d-491d-afe6-f20adf77114e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] OnionShare

2017-01-03 Thread Unman
On Wed, Jan 04, 2017 at 03:02:48AM +, Unman wrote:
> On Wed, Jan 04, 2017 at 12:39:39AM -, haxy wrote:
> > > On Mon, Jan 02, 2017 at 11:35:22PM -, haxy wrote:
> > >> Does OnionShare work safely in Qubes?
> > >>
> > >> Gave it a try with an AppVm based on a qubes-debian template but wasn't
> > >> able to get it working.
> > >>
> > >> Haven't been able to find any posts in the qubes users or devel forums
> > >> about this. Did see some discussion on the whonix forum but that looks
> > >> to
> > >> still be in the development stage.
> > >>
> > >> Would it be possible using a non-qubes debian or fedora hvm?
> > >>
> > >>
> > >
> > > You don't say why you weren't able to get it working, or what steps you
> > > took to troubleshoot the problem.
> > > I can confirm that it works fine on a standard Debian appVM.
> > >
> > > From your reference to whonix, I suspect that that is your problem. I
> > > don't use whonix so cant check this but I believe that onionshare relies
> > > on access to a tor control port opened with Tor Browser. I think that
> > > the whonix design would preclude this.
> > >
> > > You can try with a normal qube connected to sys-firewall. You can't use
> > > the normal qubes torVM because that doesn't have the control port open,
> > > but with some minor modifications you can fix this, and then try to run
> > > onionshare there.
> > >
> > > I don't believe there are any "safety" issues.
> > >
> > > unman
> > 
> > @ unman:  Thanks and you are right.  I should have included the steps
> > taken to troubleshoot.
> > 
> > Steps taken:
> > 
> > 1. Using a cloned qubes-debian template created an AppVM.
> > 2. Installed onionshare via debian apt-get.
> > 3. Was able to open onionshare but not able to connect using sys-firewall
> > as the Net-VM.
> > 4. Deleted the AppVM, created new AppVM and reinstalled via debian
> > apt-get.  Although onionshare appeared to install properly, onionshare was
> > not accessable via konsole nor visible in file manager.
> > 5. Installed in the cloned template with the same results.
> > 
> > unman quote: I can confirm that it works fine on a standard Debian appVM.
> > 
> > As I'm unsure, are you referring to an AppVM based on the included qubes
> > debian template?
> > 
> > Maybe a problem with the debian repo?  Did you install via debian repo or
> > do a build?
> > 
> 
> I used a qube based on the standard Debian template.
> Cloned with git and installed the dependencies, and the TBB.
> Started the TorBrowser.
> Ran the onionshare-gui script.
> Tested the connection to TorBrowser from File-Settings.
> Shared a file.
> 
> I'll check using the Debian package.
> 

OK, well apart from the huge dependencies pulled in, everything seemed
to work.
Created qube based on standard Debian template.
Installed the onionshare package with apt-get.
Started onionshare-gui from xterm.
I had to start TBB - why? The install pulled in tor and started it.
Once TBB running and checked, I could share files.

In view of your later email I'd suggest testing with a standard TBB.
You can follow progress from the term where you started onionshare, and
you should see the connection established to the control port and then
the HS being set up.
Obviously you will need to test the TBB is working.

unman


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104033109.GC28071%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] OnionShare

2017-01-03 Thread Unman
On Wed, Jan 04, 2017 at 12:39:39AM -, haxy wrote:
> > On Mon, Jan 02, 2017 at 11:35:22PM -, haxy wrote:
> >> Does OnionShare work safely in Qubes?
> >>
> >> Gave it a try with an AppVm based on a qubes-debian template but wasn't
> >> able to get it working.
> >>
> >> Haven't been able to find any posts in the qubes users or devel forums
> >> about this. Did see some discussion on the whonix forum but that looks
> >> to
> >> still be in the development stage.
> >>
> >> Would it be possible using a non-qubes debian or fedora hvm?
> >>
> >>
> >
> > You don't say why you weren't able to get it working, or what steps you
> > took to troubleshoot the problem.
> > I can confirm that it works fine on a standard Debian appVM.
> >
> > From your reference to whonix, I suspect that that is your problem. I
> > don't use whonix so cant check this but I believe that onionshare relies
> > on access to a tor control port opened with Tor Browser. I think that
> > the whonix design would preclude this.
> >
> > You can try with a normal qube connected to sys-firewall. You can't use
> > the normal qubes torVM because that doesn't have the control port open,
> > but with some minor modifications you can fix this, and then try to run
> > onionshare there.
> >
> > I don't believe there are any "safety" issues.
> >
> > unman
> 
> @ unman:  Thanks and you are right.  I should have included the steps
> taken to troubleshoot.
> 
> Steps taken:
> 
> 1. Using a cloned qubes-debian template created an AppVM.
> 2. Installed onionshare via debian apt-get.
> 3. Was able to open onionshare but not able to connect using sys-firewall
> as the Net-VM.
> 4. Deleted the AppVM, created new AppVM and reinstalled via debian
> apt-get.  Although onionshare appeared to install properly, onionshare was
> not accessable via konsole nor visible in file manager.
> 5. Installed in the cloned template with the same results.
> 
> unman quote: I can confirm that it works fine on a standard Debian appVM.
> 
> As I'm unsure, are you referring to an AppVM based on the included qubes
> debian template?
> 
> Maybe a problem with the debian repo?  Did you install via debian repo or
> do a build?
> 

I used a qube based on the standard Debian template.
Cloned with git and installed the dependencies, and the TBB.
Started the TorBrowser.
Ran the onionshare-gui script.
Tested the connection to TorBrowser from File-Settings.
Shared a file.

I'll check using the Debian package.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104030248.GB28071%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Unman
On Tue, Jan 03, 2017 at 04:12:28PM -0800, Otto Kratik wrote:
> On Tuesday, January 3, 2017 at 6:02:09 PM UTC-5, Marek Marczykowski-Górecki > 
> 
> > Try running `xdg-desktop-menu forceupdate`.
> 
> Ran it as su from dom0 terminal. Command was accepted, but no noticeable 
> effect or change, or output.
> 

Have you checked the menu files?

For xfce, in /etc/xdg/menus/xfce-applications.menu you should have a
 section with  System that references 
qubes-System-Tools.directory
There should be an  section containing 
and Excludes for X-Qubes_VM and X-Xfce-Toplevel

The actual desktop files should be in /usr/share/applications: check
that they are there.
Confirm the Categories of a sample desktop file.

I can't imagine that these have been deleted - if they have then you don't
need to reinstall, just replace the missing files.

let us know what you find (or not, as the case may be).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104015557.GA28071%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] OnionShare

2017-01-03 Thread haxy
Another thought not related to the inability to access onionshare the
second time...
Could using TBB hardened vice stable version make the connection fail?





-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63a7fc2b8cd911bb078e5aa8fe3feee8.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: How do I get Qubes 4.0 pre-release/dev build?

2017-01-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Dec 30, 2016 at 05:29:05PM -0800, HiringQubesExperts wrote:
> On Wednesday, 30 November 2016 17:49:06 UTC+1, bent...@cloudctrl.nl  wrote:
> > Hi, 
> > 
> > I've been using Qubes-OS since R2, and I would like to start using the 
> > development build so I can try and do some testing for some unikernel and 
> > mirage-based security stuff I want to implement.
> > 
> > Can someone tell me where I can get the files? Any tips or hints when it 
> > comes to running the latest build? 
> > 
> > Hope someon can help me get it.
> > 
> > P.S.
> > How long before the first rc will be released? This shouldnt be much longer 
> > right?
> 
> Hello? Can someone please give me an update on this topic? I would really 
> like to build 4.0 ... 

Have you seen this message:

https://groups.google.com/d/topic/qubes-devel/2DMBT2eBbyw/discussion

?


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYbEWGAAoJENuP0xzK19cs3h4H/3gh2Bfkfm3fuO46zlkICGo+
uYk1MnjELy7/u4+YaBLWA9bmC9+s3xmGbMR0KmjmgeCnw9DFPVJe8LdAN6MvYmNy
XQJW4wqnE7QhvlzZkQpiIoRxg8qCcATFPCXEzAuNCpTXnVGMvlGFgswc6bbZ3TjE
hPhdDUCNF5KikXUFSxNjchozlirVQ1htHwjnzi3VS2yXVRN9KA4VNgx8nVxx5qT2
epmf5nqd+j3wQOtk0aYsCuYpuJUgwtheK4Oev7uFjBH6hnsUfguVJK89MsiJZ7Bi
RZvP8o7JdHKJ2AfNeDEJhrFo3+9EQyAKzvXKjSD/8aIMm6SULe+QOpESJyj5qDE=
=bAWY
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104004453.GF5268%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] OnionShare

2017-01-03 Thread haxy
> On Mon, Jan 02, 2017 at 11:35:22PM -, haxy wrote:
>> Does OnionShare work safely in Qubes?
>>
>> Gave it a try with an AppVm based on a qubes-debian template but wasn't
>> able to get it working.
>>
>> Haven't been able to find any posts in the qubes users or devel forums
>> about this. Did see some discussion on the whonix forum but that looks
>> to
>> still be in the development stage.
>>
>> Would it be possible using a non-qubes debian or fedora hvm?
>>
>>
>
> You don't say why you weren't able to get it working, or what steps you
> took to troubleshoot the problem.
> I can confirm that it works fine on a standard Debian appVM.
>
> From your reference to whonix, I suspect that that is your problem. I
> don't use whonix so cant check this but I believe that onionshare relies
> on access to a tor control port opened with Tor Browser. I think that
> the whonix design would preclude this.
>
> You can try with a normal qube connected to sys-firewall. You can't use
> the normal qubes torVM because that doesn't have the control port open,
> but with some minor modifications you can fix this, and then try to run
> onionshare there.
>
> I don't believe there are any "safety" issues.
>
> unman

@ unman:  Thanks and you are right.  I should have included the steps
taken to troubleshoot.

Steps taken:

1. Using a cloned qubes-debian template created an AppVM.
2. Installed onionshare via debian apt-get.
3. Was able to open onionshare but not able to connect using sys-firewall
as the Net-VM.
4. Deleted the AppVM, created new AppVM and reinstalled via debian
apt-get.  Although onionshare appeared to install properly, onionshare was
not accessable via konsole nor visible in file manager.
5. Installed in the cloned template with the same results.

unman quote: I can confirm that it works fine on a standard Debian appVM.

As I'm unsure, are you referring to an AppVM based on the included qubes
debian template?

Maybe a problem with the debian repo?  Did you install via debian repo or
do a build?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9cee31f9b667534fd695f3ec64c487e.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to set file association in disposable VMs?

2017-01-03 Thread Unman
On Tue, Jan 03, 2017 at 08:57:58AM +, Robin Green wrote:
> On Tue, 3 Jan 2017 at 03:14 Unman  wrote:
> 
> > > >  Original Message 
> > > > Subject: [qubes-users] How to set file association in disposable VMs?
> > > > Local Time: December 29, 2016 7:48 PM
> > > > UTC Time: December 29, 2016 11:48 AM
> > > > From: gree...@gmail.com
> > > > To: qubes-users 
> > > >
> > > > I have configured Nautilus in an AppVM to open PDF files with Okular,
> > and
> > > > I've then done the same configuration (as user "user") in the
> > TemplateVM
> > > > that the disposable VMs are also based on. However, when I choose
> > "Open in
> > > > disposable VM" from that reconfigured AppVM, even though the dispvm
> > > > savefile is updated before launching the dispvm, it still uses the
> > default
> > > > PDF viewer instead of Okular.
> > > >
> > > >
> > > > Sounds similar to this:
> > > >
> > > >
> > https://groups.google.com/forum/#!searchin/qubes-users/open$20in$20dvm|sort:relevance/qubes-users/GZ2zWcoMuwc/vwAzmYS5DgAJ
> > > >
> > > > --WillyPillow
> > > >
> >
> > You don't say *how* you have changed the association.
> >
> 
> I changed it using Nautilus, by right-clicking on the file, Properties.
> 
> 
> > Try changing the file association in the template:
> > mimeopen -d file.pdf will allow you to set the default application.
> > Close down the template.
> > Then make sure the dvm file is regenerated before opening the dispVM,
> > as you have done.
> >
> 
> That didn't work either. Please note, as noted already in this thread, this
> is a known bug.
> 

Did you actually read that bug report? I'm amazed it's still open.

I assume that you are using a Fedora template since 'mimeopen'
works for a vanilla Debian template.

For Fedora based dvms, the dvm does NOT pick up the association from the
template. It's therefore necessary to customize the DispVM: there are
instructions for doing this in the docs.

In brief, for a fedora-24-dvm:
qvm-run -a fedora-24-dvm xterm

In the dvm:
mimeopen -d test.pdf
touch /home/user/.qubes-dispvm-customized
sudo halt

Regenerate DispVM template using qvm-create-default-dvm:
qvm-create-default-dvm fedora-24


I haven't tested this with Okular, but it works for setting other default
applications. Can you confirm it with Okular?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170104001653.GA27422%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Otto Kratik
On Tuesday, January 3, 2017 at 6:02:09 PM UTC-5, Marek Marczykowski-Górecki > 

> Try running `xdg-desktop-menu forceupdate`.

Ran it as su from dom0 terminal. Command was accepted, but no noticeable effect 
or change, or output.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d9ecc53c-b93d-4dfb-ba42-b5146d6ef987%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Shading doesn't work as it's meant to.

2017-01-03 Thread Drew White
Hi folks,

I've been shading for a long time, and I've found that it's glitchy and buggy, 
and doesn't work the way that it's supposed to in Qubes.

This needs to be fixed.

One VM, I shade the window, click on the window behind that's in the same VM, 
and all I do is click on the content of the window I just shaded.

In linux, shading normally works fine, but it seems that the shading may not 
actually be transferring to the guests either.

This really needs to be resolved ASAP. It's the most annoying thing when using 
Linux the way it's able to be used. Well, maybe not the MOST annoying, because 
there are other things that I've mentioned in the past that have yet to be 
resolved that are annoying issues too. But they will eventually get fixed in 
3.2 or even when 3.3 comes out.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b28fa59c-f903-44af-9a15-6876a0889664%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Computer Models Guaranteed to work with Qubes 4.0?

2017-01-03 Thread 'James Funkhauser' via qubes-users
The lowest bar is the minimal requirements.[2] Even the minimal
requirements for 4.x are quite secure, since they now include VT-d and
VT-x (which weren't minimally required in previous Qubes releases). VT-d
is required for isolating devices (e.g., networking, USB),[3] and VT-x
is required for running certain kinds of VMs (e.g., Windows).[4] This
should be relatively easy to achieve, but you have to attend to more than
just the CPU's properties. For example, it's not enough that the CPU
alone supports VT-d. The motherboard has to support it also.

I see. I can then shop around for devices that have one of the CPUs listed as 
being compatible. But what about motherboards? Is there a compatibility list 
for those?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/NFxdUlBeNwXu8EJh5WZB3WTYOPoRQVCUBG0V-_USoSxri19StS4t4dQIIuXSUwQoLhk4ZKivgxx7N1r9A-GEtpYh77r_oDDkAUUwAZ5zgAI%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-03 Thread Drew White
On Wednesday, 4 January 2017 02:19:20 UTC+11, Ronald Duncan  wrote:
> This thread just sprung to life again.
> 
> I had a quick look at
> 
> https://www.qubes-os.org/doc/templates/
> 
> And along with Debian which is installed by default both 
> 
> Arch and
> Ubuntu
> 
> Are available...
 
But not for Dom0... that is the main issue for me.
Need a Slackware build. At least then there will be no SystemD crap.


> My personal preference in Ubuntu because it generally just works, and Arch 
> because it has the latest version of everything when every you have the 
> problem that xyz does not work because it needs the latest version.  That the 
> distribution maintainer has not yet made available in your favourite distro.  
> I have not yet tried these templates.
> 
> Since I am a xfce fan I love qubes UI along with all the other parts.

I am an xFCE fan as well. It's a simple interface and just works smoothly, 
unlike KDE and Gnome which are so bloated.
 
> Only gripe is no Win10 template ( and the various issues getting Windows to 
> work - no password ).

I have found no issues getting windows to work with no password. I just set the 
auto Login, and done.

There are no tools for Win10, so until then, all good. But if you want to use 
the tools, stick to version 3.2.1.3 until they fix them, because the tools got 
broken in version 3.2.2.3, and I have not seen a version that is fixed yet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/42d41a16--4cb7-b106-b815841d5d38%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Jan 02, 2017 at 08:35:14PM -0800, Otto Kratik wrote:
> I am using Qubes R3.2. Suddenly almost all of the KDE shortcuts usually found 
> under applications-> system tools have completely vanished. I have no 
> konsole, file manager, system settings etc. Only four remain:
> 
> DispVM: Terminal
> DispVM: Web Browser
> Screen Capture Program
> Software Management
> 
> Everything else is gone. They were there one minute, and then gone the next. 
> I have performed Dom0 updates and rebooted afterward to see if it fixed the 
> issue, without success.
> 
> What is the recommended course of action?

Try running `xdg-desktop-menu forceupdate`.


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYbC1rAAoJENuP0xzK19csMXkIAIs1PHY7V62dpSzxl2JfqWTC
swLK8RSqJmj6uqWzLJoSRkTkErS4gEClZmcas49GIaPnxKnusWjFOpGSPXzH7bIC
zBKV8JLGOgG5819CS116HTJW52LLw6rx1ps13NvQUmf6xikgVy5ABqG57q8SfKl9
1U0dDXi+GEyeghvpTcm5MYmWnjAhKfuU/TxPbuWy1SUZBF7VeFGwhXFEjyRs7RaD
O/IvXWTCzQI5GNq7vE5+H3Oc3PhgOv1bUIqY7V/MHPGrH5oRmkBPKuo9gCSEyZpW
a5lwNtDrTpVHemRoO3jatZ70CZJadTHnw9Tz4Z5dYUYnN8kyPBxddS4T1lA1lmc=
=6x9c
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170103230203.GD5268%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Otto Kratik
On Tuesday, January 3, 2017 at 4:32:11 PM UTC-5, Andrew David Wong wrote:

> I'm afraid I don't have any special insight into this problem. (I
> vaguely recall that it happened to me once on 3.1, then I think I
> ignored the problem and it eventually reverted itself somehow.)
> 
> However, it occurs to me that what you're asking about is primarily a
> KDE issue, and the information you seek should, in principle, be
> available from a KDE source (docs, devs) or even Fedora or another
> distro that uses KDE. To clarify: The *cause* may be Qubes-related (I
> have no idea), but the default file/list for KDE System Tools should
> probably be the same as in non-Qubes KDE installations. At least, it's
> worth checking.

The file may possibly be in the same place, but of course in the case of Qubes 
it is a customized one containing entries like "Qubes VM Manager" etc, so I 
would need that specific one. I don't know the default location.

Also as noted however, it makes no difference whether I use Xfce or KDE. In 
either case I have no menu item available anywhere for "Qubes VM Manager" which 
I normally would, so it is a pan-desktop-environment issue, likely related to 
Qubes itself rather than one of the DE's.

So far I have not found any solution to this, and am looking at a complete 
system re-install in order to fix one single interface issue.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c49af7bb-2d47-4783-85c5-a9d1b72205ca%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removing of f23 template did not go as planned

2017-01-03 Thread cubit
3. Jan 2017 21:05 by a...@qubes-os.org:

> Not sure why the removal failed, but you can clean up any remnants by 
> following these instructions:
>
> https://www.qubes-os.org/doc/remove-vm-manually
>







Fixed,  the dnf remove cleaned up everything but the .desktop files.  rm'ing 
those got rid of the app menu entries












-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/K_aI0Cg--7-0%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] SSD cache breaks Anti Evil Maid completely

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 07:03, Swâmi Petaramesh wrote:
> Hi,
> 
> I added an SSD cache to my Qubes installation, following Eric Shelton's
> instructions :
> 
> https://groups.google.com/forum/#!msg/qubes-users/ArHTEeQAH8A/r9zzY0DLBQAJ
> 
> It worked smoothly and well, and I can immediately see that my system
> became much faster and responsive.
> 
> On the other hand, it completely broke my Anti-Evil-Maid installation.
> Once the SSD cache is configured per instructions, if I try to boot with
> AEM, it exits immediately to an emergency shell in initramfs,
> complaining that it has found the root FS to be unexpectedly unencrypted
> - most probably because AEM is unable to figure out the LVM cache setup
> properly.
> 
> Uninstalling an reinstalling AEM after the cache is setup, unfortunately
> doesn't help.
> 
> So I had to trade AEM for an SSD cache (which, in my own use case, is
> not dramatically critical, anyway AEM didn't work properly on my HP
> system...)
> 
> But I wanted to document this to the list : SSD cache works plain good,
> but breaks AEM.
> 
> ॐ
> 

Thanks for the report! Added:

https://www.qubes-os.org/doc/anti-evil-maid/#known-issues

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=uxnl
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/253f6fab-fc8d-2e9d-da01-fe8074a96ccf%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] QTW status in Qubes 3.2

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 12:22, Raymond Rizzuto wrote:
> I'm looking to find out the status of Qubes tools for Windows in 
> Qubes 3.2.  Is it stable enough that I could run a Windows VM for 
> things like Quicken?  Does it support audio devices yet?
> 

Still in testing/development, but might be stable enough for your
usage. (Consider testing it if you can.) No audio yet, AFAIK.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=7wXs
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e62cd9b2-68b2-448b-e6b8-43084ab7451d%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Best way to install qubes on mixed ssd and sata disks

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 08:38, Ronald Duncan wrote:
> Looking to reinstall qubes from scratch and would like to optimise
>  the use of the ssd so I execute as much as possible on the ssd and
>  use the sata for storage.
> 
> I have a 500gig ssd and 1 tb sata.
> 
> Thoughts appreciated
> 
> At the moment I installed qubes on the sata drive to test out and 
> experiment on.
> 
> Regards Ronald
> 

Personally, I install Qubes on an SSD and leave all of my
frequently-accessed VMs on there. For infrequently-accessed,
bulk-storage VMs, I use this method:

https://www.qubes-os.org/doc/secondary-storage/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=OxIo
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0d219517-bb6a-37ba-e5b5-6d15398f0744%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 09:55, Otto Kratik wrote:
> On Tuesday, January 3, 2017 at 6:54:24 AM UTC-5, Fred wrote:
> 
>> I can't help but I had this happen once using Xfce as the
>> desktop. All my 'start menu' disappeared bar a few.
> 
> It happened to me at least once before under R3.1 as well, also 
> randomly with no obvious or apparent cause. The System Tools menu 
> items stayed gone for several weeks, then one day after new Dom0 
> updates they magically re-appeared again, with no explanation.
> 
> I can also confirm that at the login screen if I choose xfce as
> the desktop environment, the missing shortcut issue still persists,
> so it isn't an intrinsic KDE thing indeed, as surmised.
> 
> On a related note, I'm not even sure whether entries like "DispVM: 
> Web Browser" are meant to appear under System Tools in R3.2, or if 
> that is a menu glitch as well. Previously DispVM had its own 
> top-level menu entry like any other AppVM, under which different
> app shortcuts appeared, so I don't know if something else has gone 
> wrong.
> 
> Is there a text file somewhere in Dom0, from which the System
> Tools menu obtains its default list of items? And if so, is it
> possible for someone with a functioning menu to "dump" the contents
> of that file here in this thread, so that I can copy and paste them
> into my presumably broken source file here, if such a thing is
> even possible?
> 
> 
>> I re-installed. Possibly a bug then in this case?
> 
> I would really, really, really like to avoid having to re-install
> my entire operating system just to fix some missing menu entries, 
> especially since it could presumably happen again at any given
> time thereafter. No other template or app vm's are affected, only
> Dom0. Surely there must be some alternative way to fix this issue,
> without resorting to ssuch drastic measures. Anyone?
> 

I'm afraid I don't have any special insight into this problem. (I
vaguely recall that it happened to me once on 3.1, then I think I
ignored the problem and it eventually reverted itself somehow.)

However, it occurs to me that what you're asking about is primarily a
KDE issue, and the information you seek should, in principle, be
available from a KDE source (docs, devs) or even Fedora or another
distro that uses KDE. To clarify: The *cause* may be Qubes-related (I
have no idea), but the default file/list for KDE System Tools should
probably be the same as in non-Qubes KDE installations. At least, it's
worth checking.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=aXp6
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d498e413-0bac-a9b0-6c47-b83041adf85b%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Computer Models Guaranteed to work with Qubes 4.0?

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 13:01, 'James Funkhauser' via qubes-users wrote:
> I would like to start saving up for a desktop that will run 4.0 out
> of the box. Price isn't really an issue; what's important is that I
> have a computer that meets all the standards necessary for running
> 4.0. I have looked at the HCL list, but none of the machines have
> been tested with 4.0 (which I understand, given that it is still in
> alpha). Would it be sufficient to just get a machine with one of the
> processors listed in the ark.intel link on your site's "Minimum
> requirements for 4.x" page? Or could I even just replace my current
> processor with one of those listed there?
> 
> Otherwise, if anyone can point me toward a machine (or better yet, a
> few different machines) that will meet all the necessary
> requirements, run the OS with sufficient hardware isolation, etc., I
> would be most grateful. Thanks in advance for your time.

There are a few different levels of compatibility. The highest is
Qubes-certified hardware. Unfortunately, I'm not aware of any machines
that meet all the certification requirements for Qubes 4.x.[1] But this
shouldn't be too surprising, given that those requirements are
exceptionally stringent and intentionally aspirational.

The second level is the recommended requirements.[2] The fast SSD and
Intel IGP requirements are mainly about convenience and compatibility
(e.g., avoiding the troubleshooting hassles of discrete graphics cards).
A TPM is required for AEM, but if you don't plan on using AEM, then it's
not necessary. A non-USB keyboard or multiple USB controllers is required
if you wish to have a dedicated USB qube and to use it safely, since
otherwise it would control your keyboard (and either your keyboard
controls dom0, or you don't control dom0).

The lowest bar is the minimal requirements.[2] Even the minimal
requirements for 4.x are quite secure, since they now include VT-d and
VT-x (which weren't minimally required in previous Qubes releases). VT-d
is required for isolating devices (e.g., networking, USB),[3] and VT-x
is required for running certain kinds of VMs (e.g., Windows).[4] This
should be relatively easy to achieve, but you have to attend to more than
just the CPU's properties. For example, it's not enough that the CPU
alone supports VT-d. The motherboard has to support it also.

[1] https://www.qubes-os.org/news/2016/07/21/new-hw-certification-for-q4/
[2] https://www.qubes-os.org/doc/system-requirements/#qubes-release-4x
[3] 
https://www.qubes-os.org/doc/user-faq/#can-i-install-qubes-on-a-system-without-vt-d
[4] 
https://www.qubes-os.org/doc/user-faq/#can-i-install-qubes-on-a-system-without-vt-x

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=m5/i
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/55e1d319-12ba-977f-3901-bcaa34179d3f%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] removing of f23 template did not go as planned

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-03 11:48, cubit wrote:
> Has anyone else run into this.  I was attempting to remove the Fedora 23  
> template as I no longer use it.
> 
> I removed my cloned F23 templates with the gui manager and that went OK but 
> when I did a dnf remove from terminal in dom0  for the main template I got a 
> bunch of file not found errors and even though it says it removed the 
> template and can't be found with dnf list or in qubes manager,  the template 
> entry is still in my application menu.
> 
> Any suggestions on how to clean this up properly would be appreciated
> 
> Below if the output of dnf remove
> 
> $ sudo dnf remove qubes-template-fedora-23
> Dependencies resolved.
> 
>  Package  Arch   Version   Repository  
> Size
> 
> Removing:
>  qubes-template-fedora-23 noarch 3.0.6-201608081228@qubes-dom0-cached 3.3 
> G
> 
> Transaction Summary
> 
> Remove  1 Package
> 
> Installed size: 3.3 G
> Is this ok [y/N]: y
> Running transaction check
> Transaction check succeeded.
> Running transaction test
> Transaction test succeeded.
> Running transaction
> A VM with the name 'fedora-23-dvm' does not exist in the system.
> --> Removing menu shortcuts...
>   Erasing : qubes-template-fedora-23-3.0.6-201608081228.noarch  
> 1/1 
> warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.03: remove 
> failed: No such file or directory
> warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.02: remove 
> failed: No such file or directory
> warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.01: remove 
> failed: No such file or directory
> warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.00: remove 
> failed: No such file or directory
> warning: file /var/lib/qubes/vm-templates/fedora-23/apps.templates: remove 
> failed: No such file or directory
> warning: file /var/lib/qubes/vm-templates/fedora-23/apps.tempicons: remove 
> failed: No such file or directory
> warning: file /var/lib/qubes/vm-templates/fedora-23/apps: remove failed: No 
> such file or directory
>   Verifying   : qubes-template-fedora-23-3.0.6-201608081228.noarch  
> 1/1 
> 
> Removed:
>   qubes-template-fedora-23.noarch 3.0.6-201608081228  
>   
> 
> Complete!
> 

Not sure why the removal failed, but you can clean up any remnants by following 
these instructions:

https://www.qubes-os.org/doc/remove-vm-manually/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=9s6J
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/80f8884f-df7b-8652-8512-21eb993305ec%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Computer Models Guaranteed to work with Qubes 4.0?

2017-01-03 Thread 'James Funkhauser' via qubes-users
I would like to start saving up for a desktop that will run 4.0 out of the box. 
Price isn't really an issue; what's important is that I have a computer that 
meets all the standards necessary for running 4.0. I have looked at the HCL 
list, but none of the machines have been tested with 4.0 (which I understand, 
given that it is still in alpha). Would it be sufficient to just get a machine 
with one of the processors listed in the ark.intel link on your site's "Minimum 
requirements for 4.x" page? Or could I even just replace my current processor 
with one of those listed there?

Otherwise, if anyone can point me toward a machine (or better yet, a few 
different machines) that will meet all the necessary requirements, run the OS 
with sufficient hardware isolation, etc., I would be most grateful. Thanks in 
advance for your time.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cYX4B2e7z_zFKlAp5kUSuy0HIUAwQfdwR6Y5XwayCbhjbQkAMEU4javhYhGW_QTIj_n4GioIQkZhaYBo8bAtagFzlZKIXLZiXZXgK97oT48%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] QTW status in Qubes 3.2

2017-01-03 Thread Raymond Rizzuto
I'm looking to find out the status of Qubes tools for Windows in Qubes 3.2.  Is 
it stable enough that I could run a Windows VM for things like Quicken?  Does 
it support audio devices yet?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/145da196-c243-4548-85b7-bc4cf8833e8d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] removing of f23 template did not go as planned

2017-01-03 Thread cubit
Has anyone else run into this.  I was attempting to remove the Fedora 23  
template as I no longer use it.

I removed my cloned F23 templates with the gui manager and that went OK but 
when I did a dnf remove from terminal in dom0  for the main template I got a 
bunch of file not found errors and even though it says it removed the template 
and can't be found with dnf list or in qubes manager,  the template entry is 
still in my application menu.

Any suggestions on how to clean this up properly would be appreciated

Below if the output of dnf remove

$ sudo dnf remove qubes-template-fedora-23
Dependencies resolved.

 Package  Arch   Version   Repository  Size

Removing:
 qubes-template-fedora-23 noarch 3.0.6-201608081228    @qubes-dom0-cached 3.3 G

Transaction Summary

Remove  1 Package

Installed size: 3.3 G
Is this ok [y/N]: y
Running transaction check
Transaction check succeeded.
Running transaction test
Transaction test succeeded.
Running transaction
A VM with the name 'fedora-23-dvm' does not exist in the system.
--> Removing menu shortcuts...
  Erasing : qubes-template-fedora-23-3.0.6-201608081228.noarch  1/1 
warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.03: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.02: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.01: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/fedora-23/root.img.part.00: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/fedora-23/apps.templates: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/fedora-23/apps.tempicons: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/fedora-23/apps: remove failed: No 
such file or directory
  Verifying   : qubes-template-fedora-23-3.0.6-201608081228.noarch  1/1 

Removed:
  qubes-template-fedora-23.noarch 3.0.6-201608081228    

Complete!




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/K__s8p3--3-0%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Otto Kratik
As one approach, is there any command that will force a re-download and 
re-install of ALL dom0 packages and components, despite cache showing them as 
already up to date? If one or more elements are broken or corrupted, a refresh 
update might do the trick.

Similar to if I'd made a dom0 backup and wanted to restore it completely. But 
since I don't have such a backup, can dom0 be effectively restored with a 
terminal command that will force-refresh everything from the repository?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ada30a0-635b-4f0d-a0b6-1efea184a708%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Otto Kratik
On Tuesday, January 3, 2017 at 6:54:24 AM UTC-5, Fred wrote:

> I can't help but I had this happen once using Xfce as the desktop. All
> my 'start menu' disappeared bar a few.

It happened to me at least once before under R3.1 as well, also randomly with 
no obvious or apparent cause. The System Tools menu items stayed gone for 
several weeks, then one day after new Dom0 updates they magically re-appeared 
again, with no explanation.

I can also confirm that at the login screen if I choose xfce as the desktop 
environment, the missing shortcut issue still persists, so it isn't an 
intrinsic KDE thing indeed, as surmised.

On a related note, I'm not even sure whether entries like "DispVM: Web Browser" 
are meant to appear under System Tools in R3.2, or if that is a menu glitch as 
well. Previously DispVM had its own top-level menu entry like any other AppVM, 
under which different app shortcuts appeared, so I don't know if something else 
has gone wrong.

Is there a text file somewhere in Dom0, from which the System Tools menu 
obtains its default list of items? And if so, is it possible for someone with a 
functioning menu to "dump" the contents of that file here in this thread, so 
that I can copy and paste them into my presumably broken source file here, if 
such a thing is even possible?


> I re-installed. Possibly a bug then in this case?

I would really, really, really like to avoid having to re-install my entire 
operating system just to fix some missing menu entries, especially since it 
could presumably happen again at any given time thereafter. No other template 
or app vm's are affected, only Dom0. Surely there must be some alternative way 
to fix this issue, without resorting to ssuch drastic measures. Anyone?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4224ce3a-0cf9-4b11-abd9-824ee30f88b9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to install sabnzb+ in qubes

2017-01-03 Thread kreillor
Hi folks,
I installed sabnzb+ inside a appvm with debian-8 as template. the problem is 
that sabnzbd van't connect with a usenet server on port 5563 and the 
serveroption for ssl connection is greyed out.
Does anyone use sabnzb+ succesfully?
Help would be appreciated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0dd86915-5c0a-4f26-93f1-bc91ab0b0c70%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Best way to install qubes on mixed ssd and sata disks

2017-01-03 Thread Ronald Duncan
Looking to reinstall qubes from scratch and would like to optimise the use of 
the ssd so I execute as much as possible on the ssd and use the sata for 
storage.

I have a 500gig ssd and 1 tb sata.

Thoughts appreciated

At the moment I installed qubes on the sata drive to test out and experiment on.

Regards
Ronald

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ad0b6e3-5586-436e-aed6-29f6d2eb6e99%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-03 Thread Ronald Duncan
This thread just sprung to life again.

I had a quick look at

https://www.qubes-os.org/doc/templates/

And along with Debian which is installed by default both 

Arch and
Ubuntu

Are available...

My personal preference in Ubuntu because it generally just works, and Arch 
because it has the latest version of everything when every you have the problem 
that xyz does not work because it needs the latest version.  That the 
distribution maintainer has not yet made available in your favourite distro.  I 
have not yet tried these templates.

Since I am a xfce fan I love qubes UI along with all the other parts.

Only gripe is no Win10 template ( and the various issues getting Windows to 
work - no password ).

Regards
Ronald

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/99bf19f6-e364-4c03-917a-fc15ced62787%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] SSD cache breaks Anti Evil Maid completely

2017-01-03 Thread Swâmi Petaramesh
Hi,

I added an SSD cache to my Qubes installation, following Eric Shelton's
instructions :

https://groups.google.com/forum/#!msg/qubes-users/ArHTEeQAH8A/r9zzY0DLBQAJ

It worked smoothly and well, and I can immediately see that my system
became much faster and responsive.

On the other hand, it completely broke my Anti-Evil-Maid installation.
Once the SSD cache is configured per instructions, if I try to boot with
AEM, it exits immediately to an emergency shell in initramfs,
complaining that it has found the root FS to be unexpectedly unencrypted
- most probably because AEM is unable to figure out the LVM cache setup
properly.

Uninstalling an reinstalling AEM after the cache is setup, unfortunately
doesn't help.

So I had to trade AEM for an SSD cache (which, in my own use case, is
not dramatically critical, anyway AEM didn't work properly on my HP
system...)

But I wanted to document this to the list : SSD cache works plain good,
but breaks AEM.

ॐ

-- 
Swâmi Petaramesh  PGP 9076E32E

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/70021590-fb3a-4f95-9ce5-4b340530ddbf%40petaramesh.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] lemur7 Unable to reset PCI device

2017-01-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-02 22:27, pixel fairy wrote:
> used a working desktop to install and update to qubes-unstable.
> this time the lemur was able to boot, but sys-net could not run.
> heres an hcl-report followed by a typescript session showing pci
> devices and the error. adding pci devices to sys-net in the
> qubes-manager gave the same result.
> 
> [...]

Sounds like you might have the same device assigned to more than one
VM. When you try to start sys-net, is there already a VM running
(e.g., autostarting) with one or more of the same devices as those
assigned to sys-net?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYa7dIAAoJENtN07w5UDAwWjsP/Av7m3ts3Bb7LMcuancJptZC
WOm2hHlDY52dxjVtVc3OC8dEtmNCUTaVnEpf6RmDu0WUdT3ejMIduMe7+jOnp9dK
ee9R7kuqlBJPBRJvvHSLteWPk/+SSZ+ZzsH1LeSYdg/F3v6Yzy9KoaE5Pia5+aUI
4MKBrpt9TFXvPmFGEyHnDWxx1SxG/AORPTFf/GQVIJI2/NMkPYKeP9uc8lwbnZRc
tPBznNWYbTtxlSTFOfXgAgMET7coqNYhO53F3rzSccViGoj9p/M4nIX+D9tzNWX+
0S/qzGveMoagmgt97rFjf+h/rkEinEHBravkiW54Nu8PHUwGbgIBwQknTt3PoAPU
IwEGwPCMoinZAOwTAe5WLuKoBjZKORlm7rqYmty0zJGeFXcXMhS9E8IYHojetcwy
Z+99ULnsH1ZbwP+Bc/neuhnE1PHvzZr8b/YKZ2+jU5DG/DQuQSyq4K4ujGhI/Ur2
hjABiuIN6DlpOj+dQO+CuvcVv1CYtUTSzwhsqTlNsbPyKfojcQmrjbfUTy/8ScYu
wqmVUtNuMNsiqn9HCj+fNc5TyX8jRlMhfrR1WIZWxe8VAQwzc6RjyVdG3W3I3Jhh
NtkixpjjH5LvLJqgG1zSRks+TWMfo+5NnfxhNcpQq6SAwJKhMLhwQFOy7CA++BrZ
x7zjbQ3uBZwQXqalNGVn
=9gJh
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/52e055f1-7c93-1b3f-6630-da8251f977b0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] lemur7 Unable to reset PCI device

2017-01-03 Thread Jon Nash
I have a similar issue on a modern laptop with a workaround for you which may 
help. My acer f5 573 55lv will also only work properly with either the wireless 
in the devices for sys-net or the wired (collectively or separately - as you 
have the same bridging as i do with a card reader plus ethernet arrangement - 
that i use so infrequently i forget if have just the ethernet & not the reader 
is ok). It's all down to the conflicts caused by the necessary evil of bridging 
& the demands of dealing with how xen currently copes (due to current 
capabilities & security). Give a try like this - boot laptop up, shutdown sys 
vms if they ever got started & then enter the device list of qubes vm qui 
specific to the sys-net & make sure that only either bdf 03:00.1 is listed or 
both 03 devices if you want wired access to work, bdf 02:00.0 if you want 
wireless to be possible. Then try to start sys-net & if it starts ok then try 
sys-firewall. I have noticed also issues where if you could get both wired & 
wireless devices assigned (different hardware) the nm solution seemed to only 
cope with the wireless from the gui if you disabled the wired from the sys-net 
devicelist (or i am misremembering something).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e849f81b-805a-4f3e-888d-b3580c4479ad%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Synaptic touchpad not working through usbVM

2017-01-03 Thread Fred

On 28/12/2016 21:33, Marek Marczykowski-Górecki wrote:
> Interesting, do you have that touchpad really as a USB device? If so,
> it's probably not supported by InputMouse service - probably we need
> InputTouchpad, or sth like this.

That's a good question. It's an Acer laptop. The usbVM shows it in lsusb
as a USB device but it's not listed in /dev/input.

I'll install that tool and report back here with the results.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3df36252-e897-a6aa-7878-b3cc808e7afe%40gmsl.co.uk.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] botched 3.1 -> 3.2 upgrade: reset dom0 password

2017-01-03 Thread Jake

On 01/02/2017 08:51 PM, Unman wrote:


On Thu, Dec 29, 2016 at 02:52:12PM -0600, Jake wrote:

hello list,

i have taken a R3.1 system installed from the ISO and attempted to upgrade
it to R3.2 by following the instructions from the docs (
https://www.qubes-os.org/doc/upgrade-to-r3.2/ ), but i have encountered an
unusually irritating problem in the process: after getting to step 7 of the
dom0 upgrade, the machine was rebooted and i cannot log into dom0 using the
password that worked fine with R3.1. i am 100% certain that this is not a
PEBCAK error and that my previously working password for dom0 is no longer
working.

that said, this is typically an easy enough problem to fix on most *nix
systems: drop to single user mode during boot and reset the password for
root or whatever user. i have searched the qubes-users archives, found no
advice on how to do this and had no luck trying this myself. i have used the
install ISO to boot into "rescue mode", manually mounted the LUKS volume and
attempted to reset the password to no avail. it would appear that the passwd
installed in dom0 does not support the -R option, nor does passwd work
properly inside a chroot, e.g. mount / filesystem on /mnt, run 'chroot /mnt'
and run 'chroot '.

if there is a trick to interrupting the qubes boot process to drop into
single user mode, i would greatly appreciate someone sharing that
information. it seems the issue is that this must occur between unlocking
the LUKS volume and arriving at the password prompt for dom0.

regards,

jake


Hi Jake

Sorry to hear of your problem. I havent encountered this in a number of
upgrades.


unman,

thanks for the feedback on the upgrade process. i'll try to repro the 
issue on identical hardware.


the extra steps to make passwd work are appreciated, i'll give them a 
try if i can reproduce this failure.


regards,
jake


If you want to use a chroot, then you need to do something like this:
Mount the decrypted disk to /mnt
$ sudo mount ‐‐bind /dev /mnt/dev
$ sudo mount ‐‐bind /proc /mnt/proc
$ sudo mount ‐‐bind /sys /mnt/sys
Then chroot, and the passwd command should work within the chroot.

(If you've already tried this, apologies - it isnt clear from your
post.)

unman




--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d54b8fb2-7885-1326-3114-c22a2a70cf3d%40companyzero.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Dom0 (System tools) shortcuts suddenly disappeared

2017-01-03 Thread Fred
On 03/01/2017 04:35, Otto Kratik wrote:
> I am using Qubes R3.2. Suddenly almost all of the KDE shortcuts
> usually found under applications-> system tools have completely
> vanished. I have no konsole, file manager, system settings etc. Only
> four remain:

I can't help but I had this happen once using Xfce as the desktop. All
my 'start menu' disappeared bar a few.

I re-installed. Possibly a bug then in this case?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94a635b3-9e5f-9f12-97e8-b311c90e19d8%40gmsl.co.uk.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] [solved] installing vlc media player in FC24 template vm

2017-01-03 Thread Pawel Debski
Folks, I've just had a small fight to install vlc. Here is what solved my issue:

http://unix.stackexchange.com/a/333775/189220
(rpmfusion was installed, but not enabled so dependencies had been being not 
resolved)

PD

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/196b3a10-d870-42d3-8126-32c1e61d8f51%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL + Lenovo ThinkPad T430

2017-01-03 Thread jimmyoutlaw87
вторник, 3 января 2017 г., 12:15:19 UTC+3 пользователь jimmyo...@gmail.com 
написал:
> BIG thanks to all Qubes Developers. Works fine.
> 
> Problem with four penguins solved by 
> https://www.qubes-os.org/doc/uefi-troubleshooting/
> 
> Proof - http://imgur.com/oQXIpjH

Qubes ver.  Qubes-R3.2-x86_64

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a691502e-837f-499e-9411-d4dbb6c27daa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL + Lenovo ThinkPad T430

2017-01-03 Thread jimmyoutlaw87
BIG thanks to all Qubes Developers. Works fine.

Problem with four penguins solved by 
https://www.qubes-os.org/doc/uefi-troubleshooting/

Proof - http://imgur.com/oQXIpjH

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5eb8df6-f88a-48ee-a12e-0d71e501405d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to set file association in disposable VMs?

2017-01-03 Thread Robin Green
On Tue, 3 Jan 2017 at 03:14 Unman  wrote:

> > >  Original Message 
> > > Subject: [qubes-users] How to set file association in disposable VMs?
> > > Local Time: December 29, 2016 7:48 PM
> > > UTC Time: December 29, 2016 11:48 AM
> > > From: gree...@gmail.com
> > > To: qubes-users 
> > >
> > > I have configured Nautilus in an AppVM to open PDF files with Okular,
> and
> > > I've then done the same configuration (as user "user") in the
> TemplateVM
> > > that the disposable VMs are also based on. However, when I choose
> "Open in
> > > disposable VM" from that reconfigured AppVM, even though the dispvm
> > > savefile is updated before launching the dispvm, it still uses the
> default
> > > PDF viewer instead of Okular.
> > >
> > >
> > > Sounds similar to this:
> > >
> > >
> https://groups.google.com/forum/#!searchin/qubes-users/open$20in$20dvm|sort:relevance/qubes-users/GZ2zWcoMuwc/vwAzmYS5DgAJ
> > >
> > > --WillyPillow
> > >
>
> You don't say *how* you have changed the association.
>

I changed it using Nautilus, by right-clicking on the file, Properties.


> Try changing the file association in the template:
> mimeopen -d file.pdf will allow you to set the default application.
> Close down the template.
> Then make sure the dvm file is regenerated before opening the dispVM,
> as you have done.
>

That didn't work either. Please note, as noted already in this thread, this
is a known bug.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CACVBcp4j5ufmszR-mJe-BDv%3DOnLMs_CJXZphS0GxtMMNRtnQBQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.