[qubes-users] Re: remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-13 Thread Reg Tiangha
On 04/13/2017 10:00 PM, Reg Tiangha wrote:
> On 04/13/2017 09:33 PM, cooloutac wrote:
>> On Thursday, April 13, 2017 at 11:26:07 PM UTC-4, cooloutac wrote:
>>> So probably the kernels are not actually vulnerable, They fixed it a year 
>>> ago with patches,  and with Qubes you assume this sort of priv escl thing 
>>> regardless which is why they don't even bother with sudo.
>> Actually when it comes to redhat they claim the code was never there to 
>> exploit.  But redhat might not apply to fedora kernel so I'm kind of curious 
>> myself now.
>>
> For those who are concerned, this is what is currently in the Qubes
> repository for dom0:
>
> current:  kernel-4.4.38, kernel-qubes-vm-4.4.38
>
> current-testing: kernel-4.4.55, kernel-qubes-vm-4.4.55
>
>
> From what I can tell, the Qubes Kernel is built from the stock kernel
> source, so if this bug was fixed months ago, you could probably install
> either and be fine (assuming you're running R3.2).
>
>
> If you're really paranoid, you can build the latest 4.4 kernel (as of
> now, it's 4.4.61) yourself and install via rpm with very little
> modification using the existing Qubes build scripts.
>
> Assuming you have a Fedora 23 VM with git, gcc and make installed (maybe
> a few other things; I'm not sure), run:
>
> git clone https://github.com/QubesOS/qubes-linux-kernel.git
>
> - Switch to the 4.4 branch:
>
> git checkout stable-4.4
>
> - Edit the 'version' file and replace 4.4.55 with 4.4.61
>
> - Then compile:
>
> make rpms
>
> And then copy the kernel and kernel-qubes-vm rpms to dom0 and install
> them there using rpm or dnf.
>
> I just did it myself with the 4.4 branch and it builds fine. I haven't
> installed it though since I run 4.10 (which is a bit more involved since
> some of the patches need to be migrated; I've been applying them by hand
> using diff -Nuar so I just need to figure out how to create a patch file
> *properly* that doesn't require manual intervention, and then I'll
> probably throw up my work on GitHub so others can use it for both 4.9
> and 4.10; this GitHub stuff and figuring out how to patch things isn't
> my forte yet).
>
>
Actually, you'll need a few more things, most notably
qubes-kernel-vm-support. I believe that package will pull in everything
you need to compile a kernel for Qubes. If you're going to attempt to
build a 4.9 kernel or higher, grab version 3.2.4 (install both in your
build vm and dom0) out of current-testing since it hasn't been pushed
into stable yet and 3.2.3 only works with kernels up to 4.8.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ocpkq8%24fr%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-13 Thread Reg Tiangha
On 04/13/2017 09:33 PM, cooloutac wrote:
> On Thursday, April 13, 2017 at 11:26:07 PM UTC-4, cooloutac wrote:
>> So probably the kernels are not actually vulnerable, They fixed it a year 
>> ago with patches,  and with Qubes you assume this sort of priv escl thing 
>> regardless which is why they don't even bother with sudo.
> Actually when it comes to redhat they claim the code was never there to 
> exploit.  But redhat might not apply to fedora kernel so I'm kind of curious 
> myself now.
>
For those who are concerned, this is what is currently in the Qubes
repository for dom0:

current:  kernel-4.4.38, kernel-qubes-vm-4.4.38

current-testing: kernel-4.4.55, kernel-qubes-vm-4.4.55


>From what I can tell, the Qubes Kernel is built from the stock kernel
source, so if this bug was fixed months ago, you could probably install
either and be fine (assuming you're running R3.2).


If you're really paranoid, you can build the latest 4.4 kernel (as of
now, it's 4.4.61) yourself and install via rpm with very little
modification using the existing Qubes build scripts.

Assuming you have a Fedora 23 VM with git, gcc and make installed (maybe
a few other things; I'm not sure), run:

git clone https://github.com/QubesOS/qubes-linux-kernel.git

- Switch to the 4.4 branch:

git checkout stable-4.4

- Edit the 'version' file and replace 4.4.55 with 4.4.61

- Then compile:

make rpms

And then copy the kernel and kernel-qubes-vm rpms to dom0 and install
them there using rpm or dnf.

I just did it myself with the 4.4 branch and it builds fine. I haven't
installed it though since I run 4.10 (which is a bit more involved since
some of the patches need to be migrated; I've been applying them by hand
using diff -Nuar so I just need to figure out how to create a patch file
*properly* that doesn't require manual intervention, and then I'll
probably throw up my work on GitHub so others can use it for both 4.9
and 4.10; this GitHub stuff and figuring out how to patch things isn't
my forte yet).


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ocphg4%24ag4%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-13 Thread cooloutac
On Thursday, April 13, 2017 at 11:26:07 PM UTC-4, cooloutac wrote:
> So probably the kernels are not actually vulnerable, They fixed it a year ago 
> with patches,  and with Qubes you assume this sort of priv escl thing 
> regardless which is why they don't even bother with sudo.

Actually when it comes to redhat they claim the code was never there to 
exploit.  But redhat might not apply to fedora kernel so I'm kind of curious 
myself now.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30177442-2381-4c2e-8db5-bb16171a939f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-13 Thread cooloutac
So probably the kernels are not actually vulnerable, They fixed it a year ago 
with patches,  and with Qubes you assume this sort of priv escl thing 
regardless which is why they don't even bother with sudo.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a7b2a30e-a7e9-4059-8e25-585d7139e2e2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-13 Thread cooloutac
On Thursday, April 13, 2017 at 8:18:20 PM UTC-4, Joonas Lehtonen wrote:
> https://nvd.nist.gov/vuln/detail/CVE-2016-10229
> > udp.c in the Linux kernel before 4.5 allows remote attackers to
> > execute arbitrary code via UDP traffic [...]
> 
> fixed in [1] (2015-12-30)
> 
> It never affected Fedora according to:
> https://bugzilla.redhat.com/show_bug.cgi?id=1439740#c2
> > This fix was committed upstream in the 4.5 kernel merge window (Dec
> > 2015). It has never impacted any of the currently supported versions of
> > Fedora.
> 
> In Debian it got fixed on 2016-01-5
> https://www.debian.org/security/2016/dsa-3434
> 3.16.7-ckt20-1+deb8u2
> https://security-tracker.debian.org/tracker/CVE-2016-10229
> 
> Since Qubes VMs depend on dom0 for kernel updates, Qubes user do not get
> kernel updates from upstream distros.
> 
> - Qubes currently ships kernel 4.4.38 for VMs
> Kernel 4.4.38 has been released on 2016-12-10 so I assume it contains
> the fix?
> 
> - Have Qubes VM kernels (provided by dom0) ever been affected (in the
> past of R3.2)?
> 
> Since Qubes does not frequently release VM kernel updates*:
> Do you recommend to switch to pvgrub and in-VM kernels to be able to
> take advantage of regular distro kernel updates?
> 
> The upcoming/planed binary packages of coldkernel probably address this
> topic as well.
> 
> thanks!
> Joonas
> 
> 
> *) I know, that in-VM security is/should not be relevant for the
> isolation between VMs but if someone can compromise all networked VMs
> via vulnerabilities in the UDP/TCP/IP stack it is probably as bad as
> having no isolation.
> 
> 
> [1]
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=197c949e7798fbf28cfadc69d9ca0c2abbf93191

read this discussion, kernel verison might not mean much here.  
https://news.ycombinator.com/item?id=14105718

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5dba8d6a-3eea-4eda-b583-9c1c953f2901%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Status of dvm support

2017-04-13 Thread cooloutac
On Thursday, April 13, 2017 at 1:06:11 PM UTC-4, justus...@gmail.com wrote:
> I've experienced problems with DVMs on every Qubes install I've ever done. I 
> currently have no devices running Qubes on which dvms work.
> 
> Based on several threads from last year I found on this issue, and this issue:
> 
> https://github.com/QubesOS/qubes-issues/issues/2182
> 
> Is it correct that once this bug with the dvm savefile is triggered, then 
> dvms will never work on your system again unless you manually patch xen and 
> recompile?
> 
> Are there instructions anywhere for doing this?

I never heard of that.  Have you tried to just delete the dvm from qubes 
manager, then from dom0 terminal type qvm-create-default-dvm fedora-24?  That 
always works for me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4ad3b21-0812-4429-aaa7-25df592861ea%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread cooloutac
I've done that before man, it can happen to anybody.  Just reinstall qubes from 
the usb stick again and do the password over, 
 this time one that will work for both keyboard if possible.  Or one you can 
remember how to type on both.

I also have a similar issue on raspberry pi where no matter what I do when I 
reboot ro plug in my kb it goes to uk layout and some keys are diff so in the 
passwords so I have to use one that works for both.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1e445d6f-52a8-496e-8c91-3037f3ba2ec7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-13 Thread Joonas Lehtonen
https://nvd.nist.gov/vuln/detail/CVE-2016-10229
> udp.c in the Linux kernel before 4.5 allows remote attackers to
> execute arbitrary code via UDP traffic [...]

fixed in [1] (2015-12-30)

It never affected Fedora according to:
https://bugzilla.redhat.com/show_bug.cgi?id=1439740#c2
> This fix was committed upstream in the 4.5 kernel merge window (Dec
> 2015). It has never impacted any of the currently supported versions of
> Fedora.

In Debian it got fixed on 2016-01-5
https://www.debian.org/security/2016/dsa-3434
3.16.7-ckt20-1+deb8u2
https://security-tracker.debian.org/tracker/CVE-2016-10229

Since Qubes VMs depend on dom0 for kernel updates, Qubes user do not get
kernel updates from upstream distros.

- Qubes currently ships kernel 4.4.38 for VMs
Kernel 4.4.38 has been released on 2016-12-10 so I assume it contains
the fix?

- Have Qubes VM kernels (provided by dom0) ever been affected (in the
past of R3.2)?

Since Qubes does not frequently release VM kernel updates*:
Do you recommend to switch to pvgrub and in-VM kernels to be able to
take advantage of regular distro kernel updates?

The upcoming/planed binary packages of coldkernel probably address this
topic as well.

thanks!
Joonas


*) I know, that in-VM security is/should not be relevant for the
isolation between VMs but if someone can compromise all networked VMs
via vulnerabilities in the UDP/TCP/IP stack it is probably as bad as
having no isolation.


[1]
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=197c949e7798fbf28cfadc69d9ca0c2abbf93191

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/639daa54-56a6-abba-4e78-3fdd18a25518%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Anbox?

2017-04-13 Thread elsiebuck105
This sounds interesting: 
https://www.slashgear.com/anbox-runs-android-apps-on-linux-just-like-native-apps-13481922/
Will this work on Qubes?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7d73c79a-4226-4f92-8293-56c7f44736fb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread pomonamikey
On Thursday, April 13, 2017 at 4:22:28 PM UTC-4, rubb...@gmail.com wrote:
> I know I could solve it that way but the only thing on my pc I can do right 
> now is to try the 'disk password'. I think there is no way that I can get 
> into my bios from that only screen I can see.

Yes, by the time you see the Qubes "disk password" it is too late.  Anything is 
possible, but it would be a strange BIOS that gave you no way to get into BIOS 
setup.  The answer might be in the motherboard manual or whatever else came 
with your new computer.  Or just randomly try pressing F2, F12, F9, Del, Esc, 
Tab right after power-on.  Usually some of those do things.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e562225-4422-4fe5-a63b-7f114e5efee8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread rubboe928
I know I could solve it that way but the only thing on my pc I can do right now 
is to try the 'disk password'. I think there is no way that I can get into my 
bios from that only screen I can see.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/39585921-c62e-4074-a646-346fced86dc3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Status of dvm support

2017-04-13 Thread justusranvier
I've experienced problems with DVMs on every Qubes install I've ever done. I 
currently have no devices running Qubes on which dvms work.

Based on several threads from last year I found on this issue, and this issue:

https://github.com/QubesOS/qubes-issues/issues/2182

Is it correct that once this bug with the dvm savefile is triggered, then dvms 
will never work on your system again unless you manually patch xen and 
recompile?

Are there instructions anywhere for doing this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d0e928b1-f08d-42ab-9a13-f851e99c2e0b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread pomonamikey
On Thursday, April 13, 2017 at 4:04:26 AM UTC-4, rubb...@gmail.com wrote:
> I will try with qwerty keyboard. But there is no possibilitie to undo the 
> qubes installation and get everything back to my windows? Because I think 
> it's safer for me to use windows instead of Qubes

Disk encryption can't stop you from erasing the disk.  I don't know how Windows 
is installed, but if you can get any installer to load and run, it should work 
fine.  See what boot options your BIOS has.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa4cd553-639e-466e-ad5d-bd2baaa0dce1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] My Windows VM always stops after a while

2017-04-13 Thread lokedhs
On Thursday, 13 April 2017 14:41:16 UTC+8, Robert Fisk  wrote:

> I notice this problem when a Windows VM is left running, but doesn't
> receive any user input for 30min or more. The window will disappear
> when I'm not looking and I later find the VM stopped.
> 
> In my case the solution is to use the VM, and it is reliable until the
> work is finished and I shut it down. Just a thought - have a look
> through the power saving & sleep options. It might be trying to "save
> power"  and causing problems with Xen.

Thank you. That seems to be the cause. Power saving was indeed enabled with the 
system configured to suspend after 30 minutes. I turned it off, and the Windows 
VM hasn't crashed yet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e3b2c2b-9133-466e-b74c-c37a860c60cc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: M.2 SSD Not recognized as a bootable device

2017-04-13 Thread mystresser01
Hey, thats for your reply.
I ll try to run a tool to clone it, and i will let you know.
My M.2 is working, i used windows 10 on it, and kali linux. but when i 
installed kali linux, i needed to run a couple of commands after the 
installation end. I dont remember what commands haha. I tried to install qubes 
on my m.2 without encryption and its the same, so i ll just try to clone it.
Thanks 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0541a736-8ec3-48b7-866e-efcec43ce36e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Stripping down dom0 kernels: Any tips?

2017-04-13 Thread elsiebuck105
On Tuesday, April 11, 2017 at 6:29:40 PM UTC-4, Reg Tiangha wrote:
...
> I'll probably start playing around with seeing how far I can cut down
> the dom0 kernel this weekend, but figured in the meantime I'd ask the
> list if they have any advice or tips if they've tried something like
> this in the past.

Very interesting. Please keep us posted.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9525ae03-ee56-40e3-abea-23f273db7df4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread rubboe928
I will try with qwerty keyboard. But there is no possibilitie to undo the qubes 
installation and get everything back to my windows? Because I think it's safer 
for me to use windows instead of Qubes

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f80d-2c35-43e7-9421-46fe7920a486%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread Sae
Yes,

When you have to input the decryption key, a lot, if not all of your
Operating system isn't loaded yet, so it didn't apply your custom
keyboard layout settings yet.


On 13/04/2017 09:56, rubboe...@gmail.com wrote:
> During the installation I choose azerty, is it possible that it is now qwerty?
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01a7633c-bf92-a443-04a5-8234911ca255%40nopping.eu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Question to Mirage OS firewall users

2017-04-13 Thread Thomas Leonard
On Wednesday, April 12, 2017 at 10:32:11 PM UTC+1, Foppe de Haan wrote:
> Any clue why Windows 7 won't boot when I have MirageOS selected as the 
> firewall?

I've never tried it. Do the mirage-firewall logs show anything interesting when 
you try to boot Windows?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e36e3c71-1c55-41e6-98d4-ad4731809857%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread rubboe928
During the installation I choose azerty, is it possible that it is now qwerty?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2373eeb-40b4-4ba5-a733-9698b7ebeb35%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-13 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/13/2017 09:15 AM, rubboe...@gmail.com wrote:
> Hi,
> 
> I'm new to Qubes and yesterday i've installed qubes, everything
> went fine. When qubes was almost done it asked me for my disk
> password. So I thought that that would be the passphrase, i entered
> the passphrase but it was wrong. I litteraly tried evey possible
> answer. Is there a possibbilitie to delete qubes or something
> because i'm completely stuck. I can't do something else with my
> pc I hope someone could help, because this is just a new pc and
> this is already a big problem...
> 

It can be a keyboard layout problem, if you not using the default US

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=JEqX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92f2c467-abf5-f18b-d026-7af8ad2fbfcf%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Big problem?

2017-04-13 Thread rubboe928
Hi,

I'm new to Qubes and yesterday i've installed qubes, everything went fine. When 
qubes was almost done it asked me for my disk password. So I thought that that 
would be the passphrase, i entered the passphrase but it was wrong. I litteraly 
tried evey possible answer. Is there a possibbilitie to delete qubes or 
something because i'm completely stuck. I can't do something else with my pc
I hope someone could help, because this is just a new pc and this is already a 
big problem...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9e8fba3-beb9-40c7-8b1b-7c4ba6a42c62%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: off topic - invite codes to 'riseup'

2017-04-13 Thread incognitomisterz
Hi im in need also of invite code. I would really appreciate it if you anyone 
could give me one. Thank you! :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4ba2cc0-8027-405e-8f12-13f9dfe91bb6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Adding more users/pass phrases to Qubes default disk encryption?

2017-04-13 Thread Johannes Graumann

On Sun, 2017-04-09 at 20:40 -0700, Andrew David Wong wrote:
> On 2017-04-08 10:20, Johannes Graumann wrote:
> > Hello,
> > 
> > Are there any pointers at how to achieve adding more users/pass
> > phrases to the disk encryption setup as produced by a default Qubes
> > install?
> > 
> > Sincerely, Joh
> > 
> 
> This is not Qubes-specific, so you can do this with cryptsetup as you
> normally would on a standard Linux distro.

Trivial indeed (and figured out now).

Joh

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1492067147.7285.0.camel%40graumannschaft.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] My Windows VM always stops after a while

2017-04-13 Thread Robert Fisk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 04/13/2017 05:24 PM, loke...@gmail.com wrote:
> I have a Windows VM where I run Outlook for work purposes. It works
> great and I keep it in a separate xfce workspace. I'm running it in
> desktop mode (i.e. the Windows desktop is in a single Xfce
> window).
> 
> After a certain amount of time (hard to say how long, but I'd guess
> it's in the 30 minute to 1 hour range) the Windows desktop
> disappears, and in the Qubes manager the Windows VM is marked as
> yellow. It will stay yellow until I hard-kill the VM.
> 
> Does anyone have any idea what is going on, and what I can do to
> fix it?
> 

I notice this problem when a Windows VM is left running, but doesn't
receive any user input for 30min or more. The window will disappear
when I'm not looking and I later find the VM stopped.

In my case the solution is to use the VM, and it is reliable until the
work is finished and I shut it down. Just a thought - have a look
through the power saving & sleep options. It might be trying to "save
power"  and causing problems with Xen.

Regards,
Robert
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=rA5D
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c78781fc-7b4c-953a-3217-e91273b861cf%40fastmail.fm.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Assigning a specific xfce virtual desktop to a VM-program pair

2017-04-13 Thread Hack

On 04/12/2017 10:26 PM, daltong defourne wrote:
> On Wednesday, April 12, 2017 at 10:08:20 PM UTC+3, Hack wrote:
>> On 04/12/2017 08:35 PM, daltong defourne wrote:
>>> On Wednesday, April 12, 2017 at 8:48:30 PM UTC+3, cooloutac wrote:
 On Wednesday, April 12, 2017 at 1:16:36 PM UTC-4, daltong defourne 
wrote:
> I know this (and similar matters) has been discussed in different 
places, on and off

>
> For example here:
> 
https://groups.google.com/forum/#!topic/qubes-users/jtjyq8N6bY0/discussion

> https://groups.google.com/forum/#!topic/qubes-users/gCklOzk9xYg
> https://github.com/QubesOS/qubes-issues/issues/2627
>
> However, now I am solidly confused and don't know what to do and how.
>
> What I want
>
> have firefox running in RedAppVM-One start on xfce desktop 1
>
> have firefox running in RedAppVM-Two start on xfce desktop 6
>
> Ideally, I'd also like to make ~all~ software from RedAppVM-One 
to start on desktop 1 , but even "solving for firefox" would be an okay 
start for me.


 I think you can do this on KDE,  for xfce you probably have to 
install a 3rd party tool to dom0.

>>>
>>> Devilspie2 does not seem to play nice with qubes (ref: 
https://github.com/QubesOS/qubes-issues/issues/2627 ) but if there is a 
"low bloodshed" way to make it work with qubes it would be nice.

>>>
>>> And yes, I'm on xfce...
>>>
>>
>> Where do you read that Devilspie2 does not play nice with Qubes? I am
>> using both of them, and it works nicely, since months! (And I was the
>> one who started this tread…)
> Hi Hack!
>
Hi!

> I have linked to the qubes-issues thread where it seemingly came up.
> The full problem quote is:
>
> "I tried to install devilspie2 for testing purposes on Qubes. 
Currently, it's not work on Qubes.
> Devilspie2 function get_window_name() return Windows names without 
AppVM labels. Therefore, it's not possible to sort windows on desktops 
by AppVM name."

>
> I reckon it is not actually correct and the lua scripts you provided 
work in Qubes 3.2 "as is"?

>

Yes, because those who failed to make it works used get_window_name() 
instead of get_class_instance_name()!!!


> If so, if I may ask a few questions:
> 1) do the lua provided "stick" the window to a given desktop (as in, 
I won't be able to send a window to a different virtual desktop even if 
I try) ?


Well, every time you launch a program, it will be automatically send to 
the chosen virtual desktop. But you can then send this program where you 
want.


With the script I provided, every program from "RedAppVM-One" will be 
send to workspace 1. But after that, if you want to send this program to 
workspace 6, you can.


You can customize it easily:
Change only these values:
dom = 'RedAppVM-One';
workspace = 1


> 2) if no, does devilspie2 provide a way to do that ?

See above.

> 3) if yes, is there a way to avoid sticking (as in, always start in 
desktop 1, but can be sent to any other desktop) ?


See 1)

But I repeat, once you have launched a program, you can then move it 
where you want.


> 4) could you please write up a quick primer on using devilspie2 with 
qubes (any caveats, etc?)

>

It works like a charm!

Devilspie2 is even quite flexible, but be careful, because if you write 
something like "RedAppVM" in dom variable, and 1 for workspace, without 
adding "-One", and so one to the name "RedAppVM", every new windows 
starting with 'RedAppVM*' will be send to the same workspace, here 1.



> Thank you very much
>

You are welcome.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ocn56k%24pk7%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.