[qubes-users] Re: Qubes 3.1 Installer Hangs on Creating default DisposableVM

2017-01-14 Thread admin
For posterity, I was able to track the problem down to what appears to be an 
issue with the netvm acquiring pci devices that should ostensibly be network 
controllers. I wasn't able to get anywhere by simply removing my RAID 
controller so I removed the GPU (ATI HD) and was finally able to complete an 
installation on integrated graphics. When I reinstalled everything and booted 
back into Qubes networking was no longer functioning. I opened the netvm's 
settings and noticed that the only PCI device it had captured this time was my 
RAID controller:

RAID bus controller: LSI Logic / Symbios Logic MegaRAID SAS 2108 [Liberator] 
(rev 05)

I was able to get things running again by shutting down the netvm and its 
dependents then manually reassigning PCI devices. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4c01fdf1-0fc0-4377-805d-c0e2aab8edbb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: IPv6 connectivity and qubes proxy VM

2017-01-14 Thread Chris Laprise

On 01/13/2017 04:34 PM, raahe...@gmail.com wrote:

On Thursday, January 12, 2017 at 1:30:07 PM UTC-5, daltong defourne wrote:

On Thursday, January 12, 2017 at 6:47:00 PM UTC+3, daltong defourne wrote:

Hi!
I've created a VPN proxyvm (debian-8 based) according to existing documentation 
(more or less - I'm using the VPN provider's standalone client because, in a 
VM, why not?)

For IPv4 it works flawlessly.

For IPv6 it does not work at all for the VMs "behind" the proxyvm (VPN's IPv6 
support works for a browser launched within proxyvm itself, but any VM behind the proxyvm 
can only use IPv4)

what's up?
Can it be helped?

Found this commit.
https://github.com/marmarek/qubes-core-agent-linux/commit/789eb511266d9e8bd812e40f952ec2bce6d7a414

Managed to activate the qubes-ipv6 service (worked!) on the appvm, the 
firewallvm before the proxyvm, and the proxyvm.

No budge, IPv6 still missing in action :(

isn't ipv6 unsafe?  You sure this is not by design in qubes? lol.  I'm probably 
wrong don't mind me.


Maybe 'naive' is a better word for ipv6 addressing.

IIRC, ipv6 won't be officially supported until Qubes Release 4.

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/da8e7488-38f4-f12f-77e0-b61b0d956d4e%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DVM savefile creation failed

2017-01-14 Thread Chris Laprise

On 01/14/2017 10:13 AM, haaber wrote:

Hello,
I get the error message in the title when trying to open a  DispVM.
It is my firt try to play with disposable VMs in and out-of-the-box
install.  Where do I find log files on that? Thank you,Bernhard


You can try manually generating the savefile with this:
dom0$ qvm-create-default-dvm --default-template

It should complete without errors.

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93c0af66-bd62-e3f7-88e2-310b679b69f0%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Salt / qubesctl errors when configuring USB

2017-01-14 Thread Chris Laprise

Per my post on Qubes Issues...

|$ sudo qubesctl top.enable qvm.f24-clone [ERROR ] An un-handled 
exception was caught by salt's global exception handler: 
SaltRenderError: Could not find relpath for qvm.f24-clone.top Traceback 
(most recent call last): File "/bin/qubesctl", line 91, in  
salt_call() File "/usr/lib/python2.7/site-packages/salt/scripts.py", 
line 227, in salt_call client.run() File 
"/usr/lib/python2.7/site-packages/salt/cli/call.py", line 71, in run 
caller.run() File "/usr/lib/python2.7/site-packages/salt/cli/caller.py", 
line 236, in run ret = self.call() File 
"/usr/lib/python2.7/site-packages/salt/cli/caller.py", line 138, in call 
ret['return'] = func(*args, **kwargs) File 
"/srv/salt/_extensions/modules/topd.py", line 74, in enable return 
TopUtils(__opts__, **kwargs).enable(paths, saltenv) File 
"/srv/salt/_extensions/utils/toputils.py", line 600, in enable toppaths, 
unseen = self.prepare_paths(paths) File 
"/srv/salt/_extensions/utils/toputils.py", line 453, in prepare_paths 
toppath = self.toppath(path) File 
"/srv/salt/_extensions/utils/toputils.py", line 332, in toppath saltenv 
= saltenv or self.saltenv(path, saltenv) File 
"/srv/salt/_extensions/utils/pathutils.py", line 127, in saltenv relpath 
= self.relpath(path) File "/srv/salt/_extensions/utils/pathutils.py", 
line 485, in relpath return self.path(path, saltenv) File 
"/srv/salt/_extensions/utils/toputils.py", line 269, in path return 
super(TopUtils, self).path(path, saltenv, path_type=path_type) File 
"/srv/salt/_extensions/utils/pathutils.py", line 444, in path raise 
SaltRenderError('Could not find relpath for {0}'.format(path)) 
SaltRenderError: Could not find relpath for qvm.f24-clone.top Traceback 
(most recent call last): File "/bin/qubesctl", line 91, in  
salt_call() File "/usr/lib/python2.7/site-packages/salt/scripts.py", 
line 227, in salt_call client.run() File 
"/usr/lib/python2.7/site-packages/salt/cli/call.py", line 71, in run 
caller.run() File "/usr/lib/python2.7/site-packages/salt/cli/caller.py", 
line 236, in run ret = self.call() File 
"/usr/lib/python2.7/site-packages/salt/cli/caller.py", line 138, in call 
ret['return'] = func(*args, **kwargs) File 
"/srv/salt/_extensions/modules/topd.py", line 74, in enable return 
TopUtils(__opts__, **kwargs).enable(paths, saltenv) File 
"/srv/salt/_extensions/utils/toputils.py", line 600, in enable toppaths, 
unseen = self.prepare_paths(paths) File 
"/srv/salt/_extensions/utils/toputils.py", line 453, in prepare_paths 
toppath = self.toppath(path) File 
"/srv/salt/_extensions/utils/toputils.py", line 332, in toppath saltenv 
= saltenv or self.saltenv(path, saltenv) File 
"/srv/salt/_extensions/utils/pathutils.py", line 127, in saltenv relpath 
= self.relpath(path) File "/srv/salt/_extensions/utils/pathutils.py", 
line 485, in relpath return self.path(path, saltenv) File 
"/srv/salt/_extensions/utils/toputils.py", line 269, in path return 
super(TopUtils, self).path(path, saltenv, path_type=path_type) File 
"/srv/salt/_extensions/utils/pathutils.py", line 444, in path raise 
SaltRenderError('Could not find relpath for {0}'.format(path)) 
salt.exceptions.SaltRenderError: Could not find relpath for 
qvm.f24-clone.top DOM0 configuration failed, not continuing |



Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2d335ea-eace-7b9d-4be1-1a713401ec50%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Updates, security

2017-01-14 Thread haxy
> On Sat, Jan 14, 2017 at 12:08:25AM -, haxy wrote:
>> Going back to the first post.
>>
>> "Qubes repository will allow changing the
>> "http" to "https" in the qubes entry /etc/apt/sources.list.d/."
>>
>> How would one implement that on a qubes-fedora template?
>>
>> Looking at Installing and updating software in VMs
>> "http://qubesosmamapaxpa.onion/doc/software-update-vm/;
>>
>> It looks like https mirrors are used for fedora and that other entries
>> in
>> yum.repos.d including qubes-*.repo could be changed from http to https.
>>
>> Would that work?
>> Although onion service would be preferred, might be a bit better than
>> clearnet after exit node.
>>
>>
> Yes, that will work as you think. The benefits are marginal.
>
>
>
Thanks Unman.
A marginal benefit is still a benefit. Especially if easily done.
Would be nice if the devs could make that change in an upcoming update, at
least until onion service repos are implemented.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba911d4c9ae83c66a0116d05b3f57af3.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Lenovo 10HYS0NE00 [ThinkCentre M700]

2017-01-14 Thread 60i2pu+bskm7bh1dhimo via qubes-users
Installed surprisingly quickly and cleanly.

Had to enable vt-x/vt-d from BIOS and had to disable secure booting.

Had to use manual partitioning because it wanted to resize the regrettable 
default Win-10 installation.

WiFi remains untested, though the device does appear under the sys-net devices 
tab. I'm not precisely sure how you're supposed to go about configuring WiFi 
with Qubes and didn't want to do anything that might be considered stupid. I 
would estimate that WiFi would work if one had the knowledge and were so 
inclined.

The status of Bluetooth is a mystery. It seems to be integrated with the WiFi 
adapter.

TPM appears blank in the yml file, but a TPM is present as per the console 
output.

Suspend/Resume seems to work just fine.

Only has USB for KB/M input. Probably not ideal.






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com//abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3716fbc20346229d02900d8b9a243812d684%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-10HYS0NE00-20170114-185016.yml
Description: application/yaml


Re: [qubes-users] Is Qubes OS compatilable with Ledger Nano S/Trezor/Keepkey?

2017-01-14 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sat, Jan 14, 2017 at 09:17:32PM +0100, Maksymilian Skica wrote:
> Hi,
> 
> Does anyone actually make Qubes OS working with some bitcoin hardware
> wallet? I want to buy one now and my first requirement is that it will
> work with Qubes.

Yes, it should work using qvm-usb. At least Trezor do work.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJYetLfAAoJENuP0xzK19csHIMH/ihx8tx2LUGlVgvUSptwa52h
Oor7Y/zeaDbeZzDsFCXwca2XVtfhm+idkqehmk6VamYeVRAeVg9iBYGlLWG4sC8M
hBsIiz4ZOWBqWokBSRFO72PZDqbwkz6E2cCuWXFanRkPrWfTNFGruf3OjYN52fCC
gCLpLWgsAMVEQH4OunrQJSDkBgcIfEobtDwFqxckdGVen/pos+C0sI0DBO8WVQiK
y3rw7MRp5X0brRycbVJ531TRsFVK+nZCcFdO4x/aSQDaXIQlm+RfxR6VQQzIjC+c
qP3vxy1IbNOGQYPmhQTVIU0BHysT6cJBt58GdUEiLz3u7RYCjMuQvjXPYnfE+P8=
=8Z0H
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170115013942.GB3974%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] MacBook Pro retina 2015

2017-01-14 Thread densmore . andrew
I was planning on installing qubes on my macbook pro 2015 but even if it is 
compatible, is it worth having to deal with all the apparent problems with 
installing on a mac or should I just try to dual boot it on my PC?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c3ceaaa4-6d4e-4aae-b73d-1b3aab3b8581%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Can anyone recommend a video card for Qubes

2017-01-14 Thread qmastery16
Saturday, 14 January 2017 г., 14:20:23 UTC-5 tai...@gmx.com wrote:
> On 01/14/2017 12:15 PM, qmastery wrote:
> 
> > Saturday, 14 January 2017 г., 5:01:34 UTC-5 Chris Willard написал:
> >> Hello All,
> >>
> >> I  am  using my on-board video but only getting 1024x768 resolution so
> >> wondered if there is another video card type I could use.
> >>
> >> -- 
> >> Best regards,
> >> Chris
> >>
> > any AMD graphic card should be great for Qubes, because AMD has pretty good 
> > open source drivers for Linux. Dont get NVIDIA because in that case you 
> > would have to use NVIDIA closed source drivers with hidden backdoors and 
> > proven telemetry; nouveau is still not in a good shape, probably because no 
> > real assistance from NVIDIA - they want everyone to use their closed source 
> > stuff
> >
> Wait the nvidia linux drivers have telemetry?
> I thought it was only windows, and only if you install the "geforce 
> experience".
> 
> Irreguardless nvidia is an awful company that adds "bugs" to nerf 
> featuresets on non-windows platforms, and they make it hard to attach 
> the card to a virtual machine (ex: error 43).
> 
> Just say NO to binary blobbed hardware.

Yes, you are correct, maybe I am wrong here... After that experience when I 
uninstalled a Geforce Experience from my friend's Windows PC, but telemetry 
"virus" wasn't removed and continued to work until I wiped those nvidia 
telemetry executable files manually using Ubuntu LiveCD - the remains of my 
trust to this company has been completely lost. Maybe it is more safe to assume 
that their telemetry is in all their software, and the best way to avoid it is 
to stop using NVIDIA products. The source is closed, and we just can't verify 
with 100% confidence that their latest Linux drivers don't have a telemetry as 
well, they had plenty of time to build in telemetry into Linux drivers and 
conceal it

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20649aef-b739-4409-8023-35e1c3efe1aa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] install-run

2017-01-14 Thread Unman
On Fri, Jan 13, 2017 at 12:03:59PM -0800, titoto...@gmail.com wrote:
> I am probably the most software ignorant person attempting to use this 
> os---nowhere near getting it to work. I am used to: "download", "install", 
> "run". 
> 
> I am using a 5 or 6 year old Dell xps 15 running windows 10 operating system. 
>  
> The qubes install instructions for version 3.2 end after usb install advice. 
> I followed it but, if something was supposed to happen automatically---it 
> didn't. After double clicking on some of the downloaded files, I have no idea 
> how to get this thing to work. Any files that offer to open are requesting 
> that I describe what method to use. I have no idea. And, after reading the 
> first 50 "install" posts I don't think I will find answers that I can 
> understand.  
> 
> If my message doesn't find a generous and patient helper then I am bound for 
> the computer shop---let the technician figure it out. Maybe my very a limited 
> digital vocabulary precludes any chance of getting qubes to work without 
> hours and hours of remedial education. 
> 
> 
It sounds to me as if you have downloaded the files, but don't know what
to do with them.
You cant double click on them in windows - it sounds as if that is what
you are doing. You need to copy the ISO on to the installation media, as
described in the installation guide. Then reboot your computer and boot
from the USB or DVD. 
Once you have done that THEN you will get to the install stage.

PLEASE read the section on dual booting if you want to keep your
windows install and make sure that you have full backups of your system
before you set out on this.

The installer is relatively straightforwrad to follow. Let us know how
you get on. Exciting times.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170114202507.GC14174%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qvm-ls

2017-01-14 Thread Unman
On Sat, Jan 14, 2017 at 04:38:46PM +0100, john.david.r.smith wrote:
> hi.
> two questions about qvm-ls
> 1)
> qvm-ls displays ip, ip back an gateway/DNS.
> what is ip back?
> 2)
> how does the --raw-data flag work?
> can someone post an example?
> i tried things like
> qvm-ls --raw-data ip sys-tor
> but i always end up with a traceback of qvm-ls ('line 225
> fields[f]["max_width"] = len(f)')
> 
> - john

ip back is the IP address of the vif interfaces for a ProxyVM.
It is the address that downstream qubes see at first hop upstream, and is
default gateway for those qubes, (and default nameserver too.)

You misunderstand the use of --raw-data: it's not for VMs.
--raw-list just gives you names, --raw data gives you values for specific
keys:
qvm-ls --raw-data netvm will show ordered list of the netvms for each VM.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170114201534.GB14174%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] how to print on a network printer out of a standalone windows hvm?

2017-01-14 Thread Arnulf Maria Bultmann
Am Donnerstag, 12. Januar 2017 00:01:22 UTC+1 schrieb Ángel:
> kreil...@gmail.com wrote:
> > My question is:
> > how can I manage to print directly on my network printer? 
> > or:
> > how to copy files (without using a usb hdd or something like this)from my 
> > windows hvm to my printer appvm?
> 
> You could connect the Windows VM to a printer-vm per
> https://www.qubes-os.org/doc/firewall/#enabling-networking-between-two-qubes
> 
> At that point you could:
> a) Make Windows print to the cups service in the printer-vm
> or
> b) Copy the files to the printer-vm (eg. with samba)
> 
> 
> Connecting directly to the real network printer may be from simple (eg.
> just providing an IP address, because it's just autodiscovery that
> fails) to quite complicated.

thanks for your advice. It works now by using windows directly ... ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/98c07440-aac9-42bd-b68f-492103dea7fc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Prob installing VLC in Fedora24 Template

2017-01-14 Thread Arnulf Maria Bultmann
Am Freitag, 13. Januar 2017 22:35:13 UTC+1 schrieb raah...@gmail.com:
> On Thursday, January 12, 2017 at 1:11:02 PM UTC-5, Arnulf Maria Bultmann 
> wrote:
> > When I try to install vlc als described in the faq and elsewhere I get this 
> > error:
> > 
> > Downloading Packages:
> > (1/60): aalib-libs-1.4.0-0.29.rc5.fc24.x86_64.r 126 kB/s |  70 kB 00:00 
> >
> > [MIRROR] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: Interrupted by 
> > header callback: Server reports Content-Length: 15400 but expected size is: 
> > 1605926
> > [FAILED] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: No more mirrors 
> > to try - All mirrors were already tried without success
> > (3-4/60): libcaca-0.  5% [=   ] 708 kB/s | 1.6 MB 00:37 
> > ETA
> > The downloaded packages were saved in cache until the next successful 
> > transaction.
> > You can remove cached packages by executing 'dnf clean packages'.
> > Error: Error downloading packages:
> >   Cannot download vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: All 
> > mirrors were tried
> > 
> > I tried it several times and got always the same error.
> > 
> > Procedure:
> > sudo dnf upgrade --refresh
> > sudo dnf install vlc
> > 
> > Any advice?
> 
> did you try this?  You can remove cached packages by executing 'dnf clean 
> packages'

Yes I tried it several times with the same result

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90de1a3c-3c5a-42b1-89ef-cf81e2fe773c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Unable to install Qubes : Black Screen - reboot - several EFI parameters tested w/ success

2017-01-14 Thread iamnotanumber666
Hi all

I'm not able to install Qubes 3.2 on my workstation.
The install process go to the menu while booting on a usb key.
Then if i choose install .black screen then rebooting ..got back to same menu.

I've tried different parameters with grub presented in :
https://www.qubes-os.org/doc/uefi-troubleshooting/

1) chainloader line add /mapbs /noexitboot.
==> it reboot after doing ctrl +x .. going back to same install menu :(

2) At the end of chainloader line add -- efi=attr=uc
==> idem.

I've checked Intel VT is enabled in my computer, and tried both PC ROM Priority 
: with EFI Compat Rom and with Legacy Rom 
=> idem.

Some specs here :
Processor   4x Intel(R) Core(TM) i5-2500K CPU @ 3.30GHz
Memory  8141MB

BIOS
Date11/01/2012
Vendor  American Megatrends Inc. (www.ami.com)
Version 3602

MBoard
NameP8P67 PRO
Vendor  ASUSTeK Computer INC

DiskATA Samsung SSD 850 


Thanks !

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6c955e7-053d-451a-af14-c8f1666a8f40%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] USB & PCIe devices management questions

2017-01-14 Thread B
Hello, for starters, pardon my ignorance, I am at the very beginning of the 
learning curve.
I am planning out a new workstation build, I want to plan it out with Qubes in 
mind. But I have few questions, as I do not have a Qubes compatible desktop 
right now, and my laptops are not really good to experiment with it.

I want to add and assign a secondary GPU to a Windows based VM, to be used as a 
gaming and CAD machine. If I do that, what about monitor output, if primary GPU 
is in dom0, do I need to connect second GPU to a monitor, or can I route the 
signal somehow without additional hardware?
I want to use few, separate, color coded USB hubs(spray paint for the win), 
each attached to different domain, with same color coding. I want it to work as 
seamlessly as possible, preferably with no additional steps after I 
attach/detach any device to/from a hub. It simply shows into a VM and acts 
accordingly. I have problem understanding how the qvm-pci and USB management 
works in this area. Is my planned use case even achievable or do I need to 
manage each device every single time I attach it?
Is assigning devices to vms persistent after booting, or can be made persistent?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e4a33c2-8f1f-47eb-b0a7-c513299babc4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qvm-ls

2017-01-14 Thread john.david.r.smith

hi.
two questions about qvm-ls
1)
qvm-ls displays ip, ip back an gateway/DNS.
what is ip back?
2)
how does the --raw-data flag work?
can someone post an example?
i tried things like
qvm-ls --raw-data ip sys-tor
but i always end up with a traceback of qvm-ls ('line 225 
fields[f]["max_width"] = len(f)')


- john

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b6ebe2fa-779b-0e0b-bbb9-7a10a2344a92%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] DVM savefile creation failed

2017-01-14 Thread haaber
Hello,
I get the error message in the title when trying to open a  DispVM.
It is my firt try to play with disposable VMs in and out-of-the-box
install.  Where do I find log files on that? Thank you,Bernhard

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03aea006-b911-dbe4-3f11-f0fe4668c16a%40web.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] question about policy permission declarations

2017-01-14 Thread john.david.r.smith

hi.
when looking at the policy permissions in '/etc/qubes-rpc/policy' i 
noticed the only line 'qubes.USB' contains is:

$anyvm $anyvm deny

why is that line there?
as far as i understood it has no effect as any other declaration of the 
form:

$anyvm  deny
since deny is the default action and this rule will catch any vm. (the 
only effect would be that all following permission declarations 
targeting the destination are ignored.


but now i am not sure anymore..
so can someone tell me whether my understanding of the permissions is 
correct?


-john

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b5b9b15c-5b26-8cf3-6698-f55e1e0a2988%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - HP Elitebook 8570p

2017-01-14 Thread Jos Bredek
Works 95% out of the box. Only wireless drivers (bc43) have to be 
installed manually.


Sleep works

For Windows7 hvm, cirrus entry in video section cfg file needed.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01b3caf0d06fadabaf28aa914a349168%40mailbox.nederhost.net.
For more options, visit https://groups.google.com/d/optout.
---
layout:
  'hcl'
type:
  'notebook'
hvm:
  'yes'
iommu:
  'yes'
slat:
  'yes'
tpm:
  ''
brand: |
  Hewlett-Packard
model: |
  HP EliteBook 8570p
bios: |
  68ICF Ver. F.66
cpu: |
  Intel(R) Core(TM) i7-3540M CPU @ 3.00GHz
cpu-short: |
  FIXME
chipset: |
  Intel Corporation 3rd Gen Core processor DRAM Controller [8086:0154] (rev 09)
chipset-short: |
  FIXME
gpu: |
  Intel Corporation 3rd Gen Core processor Graphics Controller [8086:0166] (rev 
09) (prog-if 00 [VGA controller])
gpu-short: |
  FIXME
network: |
  Intel Corporation 82579LM Gigabit Network Connection (rev 04)
  Broadcom Limited BCM43228 802.11a/b/g/n
memory: |
  8055
scsi: |
  MTFDDAK256MAM-1K Rev: 08TH
  CDDVDW SN-208DB  Rev: HH01

versions:

- works:
'yes'
  qubes: |
R3.2
  xen: |
4.6.3
  kernel: |
4.4.31-11
  remark: |
Wireless bc43 legacy drivers needed. For Windows 7 installation, cirrus 
video card  entry in cfg file needed.
  credit: |
Jos Bredek
  link: |
FIXLINK

---



Re: [qubes-users] New Lenovo laptops: X1 (4th Gen), T460/p, and T560

2017-01-14 Thread qmastery16
26 December 2016 г., 18:00:43 UTC-5 tai...@gmx.com написал:
> Lenovo is a shitty company if you care about security, they have stuck 
> irremovable rootkits their BIOS 4 separate times and they are partially 
> owned by the PRC government

Having a PRC backdoor is better than NSA one! (most laptop companies are 
American, so...) By the way, why not to get a Lenovo G505S laptop?
1) It is the latest AMD-based laptop which is supported by coreboot open source 
BIOS (so no closed source BIOS backdoors), and it does not have Intel ME 
backdoor. G505S's APUs are Richland - the last generation before AMD started to 
embed their own version of Intel ME, "AMD Security Processor" or PSP ( 
http://www.extremetech.com/wp-content/uploads/2013/11/AMDRoadmap-Mobility.png ) 
Although a closed source vga blob is still required for working graphics, 
luckily a coreboot's YABEL prevents the possible undocumented accesses of vga 
blob to other PCI devices
2) Supported by Qubes 3.2 - see HCL, 
https://groups.google.com/d/msg/qubes-users/TS1zfKZ7q8w/JQFkVF4xBgAJ . Most 
likely to be supported by Qubes 4.0 ( HVM=y, IOMMU=y, SLAT=y) and seems to meet 
its certification criteria so far - 
https://www.qubes-os.org/news/2016/07/21/new-hw-certification-for-q4/ <-- 
webcam could be covered, speakers and wireless card are not soldered and could 
be removed, and just checked the last concerning thing - embedded microphone is 
a PCI device, not USB connected ;) 
3) High end version of G505S has a top of the Richland generation A10-5750M 
APU, 3352 score at Passmark cpu-benchmark. If to compare with i5-6200U of 
Lenovo T460s, 3933 score - 17% faster. But i5-6200U is dual core, while 
A10-5750M is quad core. Also, despite being three years older, A10-5750M 
integrated graphics is faster than of i5-6200U. According to Passmark: Intel HD 
520 - 844 G3D score, AMD HD 8650G - 950 G3D score, 13% faster.
3) In contrast with many modern laptops, G505S has two slots for RAM (instead 
of one) and its RAM is not soldered. That means: when your RAM fails a memtest 
after some years, instead of paying a fortune for the RAM chips replacement you 
could just remove RAM and install a new one. Also you could easily upgrade to 
16 GB RAM (2x8GB), which helps not to think of RAM usage while using Qubes 
(currently running 14 VMs at the same time, with a lot of applications started, 
and they eat just 13 GB out of 16 GB)
4) G505S has either integrated or both integrated and discrete graphics 
(depends on G505S version). In any case, it is AMD only - which has great open 
source drivers for Linux. No need for NVIDIA closed source proprietary drivers 
with telemetry...
5) Almost all the components could be replaced by user, even a CPU is not 
soldered. Easy to tear down a laptop and assemble it back. Thanks to open 
source BIOS, no WiFi card whitelist, so possible to install any wireless card 
which has open source drivers for Linux (such as AR9462)
Currently it is almost impossible to buy a new G505S, but the used ones are 
selling for cheap (e.g. 3 auctions currently at eBay for G505S version with 
A10-5750M APU, 1 UK and 2 US-based, one of them with buy it now price $250 - 
half of the original $500)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e475d58-682b-4a38-973e-f19d45521cab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to switch to xfce in Whonix?

2017-01-14 Thread 6057tx+48r8anehh4c4wazsony08z2dlvc via qubes-users
Hello @all,

I noticed that Whonix (in particular whonix-ws) uses a lot of RAM.
It seems to me that this is due in part to the fact that it is
based on KDE. So how can I disable KDE in it and switch to xfce?

Thanks in advance.






Sent using Guerrillamail.com
Block or report abuse: 
https://www.guerrillamail.com//abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5270bdfc2cb17045ab431e03689fbcd8e529%40guerrillamail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Can anyone recommend a video card for Qubes

2017-01-14 Thread Chris Willard
Hello All,

I  am  using my on-board video but only getting 1024x768 resolution so
wondered if there is another video card type I could use.


-- 
Best regards,
Chris

P.S. Drowning in email? I use SaneBox to instantly clean up my Inbox: 
http://sanebox.com/t/k3bk9

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/MTAwMDAwOS5hbmF0b21pYw.1484388091%40quikprotect.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Web video suddenly plays at 1/6 speed

2017-01-14 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-01-13 15:48, justin.h.holg...@gmail.com wrote:
> I have a recent desktop machine running Qubes 3.2 on a 4GHz i7 with
> 16GB of RAM and integrated Intel graphics. Until yesterday, I'd
> been happily watching Netflix and Youtube videos without any
> trouble.
> 
> Then I boot up my PC one day and suddenly playback on those sites
> is at about 1/6 speed--totally unwatchable. It's the same whether
> the Qube is based on fedora-23, fedora-24, debian-8, or debian-9.
> It also doesn't matter whether I use Firefox or Chrome. It still
> happens on a fresh Qube made from an untouched template.
> 
> Performance otherwise is great--my connection is testing at about
> 50Mb, applications (including browsers) are fast and responsive as
> ever. I can even watch videos in VLC without any problems. It's
> only browser-based playback that doesn't work, and it never works
> no matter what.
> 
> I didn't do anything unusual before this started happening except
> trim all the templates (which I'd never done) and update all the
> templates (which I do regularly).
> 
> I'm completely baffled by this, so I'm turning to the list for
> help. Any ideas?
> 

Make sure hardware acceleration is disabled in your browsers' settings.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=CF/0
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/06c5e5b0-5f80-c9e2-2394-b23c9b26da35%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Disable Intel ME

2017-01-14 Thread qmastery16
On 14 January 2017, 3:50:52 Reg Tiangha wrote:
> On 2017-01-13 5:57 PM, Connor Page wrote:
> > thank you for the link. I have successfuly tried it on a Haswell notebook. 
> > it doesn't disable ME but (supposedly) limits it's functionality by 
> > removing all modules but 2.
> > 
> 
> I'm curious:  Does one absolutely need an external hardware flasher to
> do this procedure, or are there software tools that can be used within
> Windows or Linux to flash the ME with the modified image?

Yes, of course you need an external hardware flasher, because it is a laptop. 
Laptops have EC embedded controller, which interferes with "software" internal 
flashing and makes it either fail completely, or write a corrupted BIOS image 
(which would result in computer not booting next time). That is why in 
flashrom, a flag for internal flashing on laptops is: -p 
internal:laptop=force_I_want_a_brick . See more information here - 
https://www.flashrom.org/Laptops
About external hardware flashing: this method is described in great detail here 
- http://dangerousprototypes.com/docs/Flashing_a_BIOS_chip_with_Bus_Pirate 
although most of the time it talks about Bus Pirate programmer, this method is 
almost the same for CH341A - which is the cheapest hardware programmer 
supported by flashrom (costs just $2-$3). Just a slightly different flashrom 
command - mentioned at the end of this article. It will be great if you could 
reproduce this method - not just for the sake of reflashing a BIOS of your 
laptop to remove ME, but also you will be able to reflash other laptops who 
failed a BIOS update and now not booting, - probably earning some good money on 
it

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f3c9d94a-9501-49ba-8667-60e7025200c9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Disable Intel ME

2017-01-14 Thread Reg Tiangha
On 2017-01-13 5:57 PM, Connor Page wrote:
> thank you for the link. I have successfuly tried it on a Haswell notebook. it 
> doesn't disable ME but (supposedly) limits it's functionality by removing all 
> modules but 2.
> 

I'm curious:  Does one absolutely need an external hardware flasher to
do this procedure, or are there software tools that can be used within
Windows or Linux to flash the ME with the modified image?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o5coog%24ppe%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.