Re: [qubes-users] Secure Handling of Encrypted Drives

2017-04-16 Thread Jean-Philippe Ouellet
On Sun, Apr 16, 2017 at 7:59 PM, Andrew David Wong  wrote:
> On 2017-04-12 13:05, Sam Hentschel wrote:
>> On Wednesday, April 12, 2017 at 3:20:30 PM UTC-4, Chris Laprise
>> wrote:
>>> On 04/12/2017 02:37 PM, Jean-Philippe Ouellet wrote:
 On Wed, Apr 12, 2017 at 2:07 PM, Sam Hentschel
  wrote:
> On Wednesday, April 12, 2017 at 4:15:08 AM UTC-4, Unman
> wrote:
>> On Tue, Apr 11, 2017 at 11:12:50PM -0400, Sam Hentschel
>> wrote:
>>> I am trying to figure out a way to securely handle my
>>> encrypted drives without two things: connecting the USB
>>> directly to the Vault (as this is obviously a bad idea
>>> for security), and decrypting the USB in sys-usb (also
>>> obviously a bad idea).
>>>
>>> As an example, I have some USB that I keep encrypted
>>> backups of my important documents that I keep with me in
>>> case an emergency happens (which now that I am using
>>> Qubes will probably also be in the Vault).  I have files
>>> on there that I need to move to Vault, and I need to be
>>> able to continue to put files onto it (whether from
>>> Vault or from a scan I have done.  >> writing some documentation hopefully on what I did giving
>>> DispVMs the sole ability to print and scan.>  Which I
>>> know is a whole different problem; so I want to focus on
>>> just the encrypted storage.
>>>
>>> Another example is my backup drives which are all
>>> encrypted, and that I would like to have access to for
>>> the standard reasons.  I have been pointed to [1] a
>>> couple days ago by JPO and I believe this is part of the
>>> soution, but not the whole thing.
>>>
>>> My two solutions that I have thought through are: doing
>>> PCI patthrough directly to the Vault (which is the least
>>> favorite of my ideas), and creating a separate VM for
>>> encryption that only houses software for encrypting and
>>> decrypting (dm-crypt or veracrypt).  This way the USB
>>> will be passed through to this VM and will never
>>> directly touch the Vault (except through
>>> qvm-move-to-vm).
>>>
>>> I had a third solution of adding this functionality to
>>> DispVMs, but I can't PCI pass the USB to the DispVMs
>>> when they are running.  So that one is out.
>>>
>>> Thanks in advance for the help; can't wait to see what I
>>> missed!
>>>
>>> [1] https://github.com/rustybird/qubes-split-dm-crypt
>>>
>>
>> Hi Sam,
>>
>> I'm obviously missing something here.
>>
>> One of your two solutions fits completely within the
>> current Qubes model and matches exactly the specification
>> you set; that is, qvm-block attach the encrypted drive to
>> a qube and decrypt it there. Can I ask what more you are
>> looking for?
>>
>> There's no need to do this in a separate decryptionVM -
>> you can use a disposableVM for the purpose.
>>
>> If you don't want to have the decryption software in a
>> standard template, then put it in a separate template,
>> build a distinct disposableVM from that template and use
>> my hack to fire up that disposableVM when you want to use
>> a decrypted drive.
>>
>> unman
>
> Unman,
>
> I was just making sure I wasn't missing something or there
> wasn't a better way.  Anyways, I can't set this up in a
> DispVM because you cannot PCI passthrough to a VM while it
> is running(?)

 Your understanding is incorrect on the following details:

 1) you *can* do pci passthrough to a vm while it's running.
 Depending on if the device supports function-level-reset or
 not, you may need to set pci_strictreset="False" for the VM in
 /var/lib/qubes/qubes.xml

 2) qvm-block is distinct from and not implemented with pci
 passthrough, it uses xen blk{front,back}. This is an entirely
 different and believed to be less dangerous interface to
 expose than PCI to your actual devices.


 That said, you might prefer to use a normal unencrypted
 filesystem, only interface with the filesystem in sys-usb, and
 use encrypted files instead.

 You could then use qvm-copy-to-vm to move the ciphertext from
 sys-usb into your other vm, {decrypt, manipulate, re-encrypt}
 them there, send back new ciphertext (again via
 qvm-copy-to-vm) to sys-usb, and put them back on the flash
 drive from there.

 This isolates your document processing from potential vulns in
 your filesystem manipulation code (such as fuse-exfat which
 appears to be the de-facto standard flash drive filesystem
 these days for maximum interoperability).
>>>
>>> This is confusing a fairly simple issue.
>>>
>>> What Sam is looking for is to use 'qvm-block -a' (or the attach
>>> menu in Qubes Manager) which indeed has nothing to do with PCI
>>> passthrough.
>>>

 This approach likely 

[qubes-users] Re: HOWTO: Compiling Kernels for dom0

2017-04-16 Thread Reg Tiangha
On 04/16/2017 07:16 PM, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-04-16 18:10, Marek Marczykowski-Górecki wrote:
>> On Fri, Apr 14, 2017 at 12:21:14PM -0600, Reg Tiangha wrote:
>>> Here's my contribution to the project.
>> Thanks!
>>
>> Andrew, maybe it would be good idea to at least link to this
>> thread somewhere in "Building" section of docs? Or copy this
>> instruction there (the part about actual building and customizing),
>> including adjustments here and in subsequent messages?
>>

Thanks for the comments you two; I'm new to the Git stuff but I'm trying
to learn fast.

Actually, now that  Foppe de Haan found some extra packages to install
to make everything work, I wouldn't mind having a chance to re-write it
and submit it. What's the best way to do that? Fork some kind of repo,
create a new file, and then submit a pull request?  If so, which repo?
If not, what's the best/easiest way to submit a re-written guide to you
guys?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/od15aa%24o3b%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: remote code execution via UDP packets (CVE-2016-10229) in the context of Qubes // and kernel update recommendations

2017-04-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-04-14 06:54, Unman wrote:
> I think everyone should calm down. :-)
> 
> If you look at the source for 4.4.38 used to build the kernel used 
> in Qubes, you will see that it already contains the patch. That's 
> linux-4.4.38 from 10-Dec-2016
> 
> Qubes kernel version 4.4.38-11 was built 12-Dec-2016, and 
> incorporates that patch, so if you keep your system updated you
> are already covered.
> 

Marek has also confirmed that 4.4.38 contains the fix.

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJY9BfqAAoJENtN07w5UDAwKfgQAKppdoaL7U1Cggjxl6ZkOMkk
DlG5Rb6BCnjzwSXJ8Iad0Y2rxoVa6JVvlCcEN9Ml44FLCKkN5F+ROxomOUuPHkoT
TaY71yC6SO8T+xwM+SExynfpV3maTDXDFmPaZB/ydVRgIlLDk70vU2L1W9WnPT9d
FOWti4RCM7eFaUMORGnClzKtU3d0ayKL6HiQMiT63CDXMteqR2ZJx1kHPooZ+ZLs
zndcu345S2iM6q0UMJGo74NIkwreFmjswHATF2MiBsdzyxr62sOevtdJSmK1hHGn
K/A+/VsrW0GS7/Nnc5gFy3uZcbv3HaygAJUxxhCG9Ad8fFkwY9CUkcOj8W5RnT4v
eM8m/dqEsP+a7zfUPcbZnZAC57zqn+SIq6I1wN90d76WwEMbKxIJMiSwX1TsQ3NE
HCFZj3060zQuW+rHxS4CUNbJQ5mZxp0cYcjsb6YB8/TASWNUJ2y8vIpCp9s72lk0
eV+n30FJK7yRMiXhUpdX+Kl/IJp+pi3RSIvkYqN1TFM61k9H/IoatBk08Ejcd+Gh
ge+ccIhEDM6VytZ6NswAjjUfrQ6jPk1lNEFRhsBx1BmsWgSdNf8o2kZ8E5jCtYUY
8xZRuPj3+Y3vAMqmtsRurPUVuVS4r153/m9V+APB8h+Zmn1K88G4tRpFDxGI5Flk
RFGRENsnulmB8mC6ipCd
=aOPi
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9ce549e8-9b66-8cf1-ef44-e511f2e755c2%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HOWTO: Compiling Kernels for dom0

2017-04-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-04-16 18:10, Marek Marczykowski-Górecki wrote:
> On Fri, Apr 14, 2017 at 12:21:14PM -0600, Reg Tiangha wrote:
>> Here's my contribution to the project.
> 
> Thanks!
> 
> Andrew, maybe it would be good idea to at least link to this
> thread somewhere in "Building" section of docs? Or copy this
> instruction there (the part about actual building and customizing),
> including adjustments here and in subsequent messages?
> 

Good idea. I've just linked to thread for now, in case more useful
replies are added in the near future. Maybe someday someone can submit
a nice Markdown version to replace it. :)

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJY9BddAAoJENtN07w5UDAwnuUP/i2TtLmmDZk6J+Ll86rumDYw
qK4cDtzozWxG5figs6zd4WiguyFs/SfuEU1DxJ7e/4+G730t2Purfy3ZUp1fWEhc
SLurA+NpJCM/6dfkGXswmNNTYv/ncKtfX/7L7ntr7F8D8PSaE/I2+zpwGFRWmnol
rr0vHmp6pqtYZFaV+ByYCIYmNHESOYtbuO4+SAOfbwzijWDckZXtkAoNpJdD3ypJ
go72WZAZeDjiCw2dFi8mThcWylxQ7WRd21mRUJIf2lEkHfXVTBP6OMJa02pjfolp
/J0j+6G9OG2yk7iJ05bLf2b7Y5MjhRgsJdFWBBxgH1AlxgBChLO3EYqzxDyHUq88
rZo7ePGMY38nEZofIA4pIIgYV/87Vg6BVddUm0MEVHwNjMsxh05pGTv7OzkM+Hc6
N2uH7E0vmYZERWwX34ASgiMG1RZZIswat2HSm/GEBEb1vpieOMDNAKdj7/tqNzK/
Nx82FOYWnHwkDI1sxDh4hWGsd/WeKKyk3A3kMvzsGS8JAPoQeRA3bes4+UtOBCDw
mygAbvHzxmz+Kx1JptrNBFRfs9ULJ6T3+E8adqNxd31R6mzHTo3g4JDJ0hOGINRq
MdZ8tZyUFCrAGRDNVN8vhdNMtq3WIJezWUhm6RaVSRb/8Ep9lcx/xQcTjpMVj9+O
KlAmJ+Y+CAmxyEnpwXdK
=OBeX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/356d870a-4549-c105-9750-19c1c8b6dd25%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HOWTO: Compiling Kernels for dom0

2017-04-16 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Apr 14, 2017 at 12:21:14PM -0600, Reg Tiangha wrote:
> Here's my contribution to the project.

Thanks!

Andrew, maybe it would be good idea to at least link to this thread
somewhere in "Building" section of docs? Or copy this instruction there
(the part about actual building and customizing), including adjustments
here and in subsequent messages?

> On my GitHub account, I've now got branches tracking kernels from 4.4
> all the way to 4.10. 

I assume you've also seen devel-* branches on my github account.

> My intent is to keep them up-to-date with upstream
> as much as possible, but all I can really test is to see is if they
> still compile and/or install/boot. If there are any issues with new
> versions, let me know, but I make no guarantees that I can actually
> *fix* any regressions that may be introduced by upstream. That said, if
> some people want to compile the latest kernel in a supported branch
> themselves on their own schedules optimized for their specific hardware
> setups, I hope this makes things a little easier you.
> 
> https://github.com/rtiangha/qubes-linux-kernel/
> 
> 
> HOWTO:
> 
> - You'll need at least 4GB of free space in /home for each kernel you
> hope to compile.
> 
> - In a Fedora TemplateVM matching the version running in your dom0,
> install git and the qubes-kernel-vm-support package:
> 
> sudo dnf install git qubes-kernel-vm-support
> 
> I believe that should pull in everything you need to compile a kernel.
> At the moment, if you want to build a kernel higher than 4.8, you'll
> need to temporarily enable the current-testing repository since the
> version that's in stable right now is too old to work with kernels 4.9
> and above. That'll probably change eventually.
> 
> - Download sources:
> 
> git clone https://github.com/rtiangha/qubes-linux-kernel.git
> 
> - Enter directory:
> 
> cd qubes-linux-kernel
> 
> - Switch to the branch that you'd like to compile. For example, to
> switch to the 4.4 branch:
> 
> git checkout stable-4.4

Some signature verification of downloaded code would be useful here. I
see you sign your commits, so it should be easy (look for "Good
signature" at the top, also check if the key is what you expect):

git show --show-signature

Or in machine readable format:

git show -s --format=%G?

(should output "G" for good signature made with trusted key, see `git
show --help` for details)

Of course you need to have appropriate public key in your keyring first.

> You can also choose from devel-4.8, stable-4.9, and devel-4.10.
> 
> - Compile rpms:
> 
> make rpms
> 
> - The rpms will be stored in the rpms/x86_64 directory. Copy those to
> dom0 using these instructions:
> 
> https://www.qubes-os.org/doc/copy-from-dom0/
> 
> - Install rpms. In dom0, run:
> 
> dnf install kernel-.rpm kernel-qubes-vm-.rpm

Some, probably obvious warning: this will also execute some
pre/post-installation scripts in the package. It means that if the
building VM is compromised, it can include some code in the rpm package,
that will compromise dom0 when you install it.

> - Reboot and see if it works
> 
> 
> TIPS:
> 
> By default, the kernel configuration is set up for a very generic build
> to work with a variety of hardware. If you're going to go through the
> hassle of compiling your own kernels, you might as well optimize for
> your particular hardware configuration.  For example, if all you have
> are AMD machines and no Intel machines, rather than compiling a kernel
> for a generic x86_64 CPU, you can set the kernel to optimize for AMD
> CPUs specifically and you may net some performance improvements as a result.
> 
> - To do this, first download the kernel sources (make rpms automatically
> does this for you):
> 
> make get-sources

Don't forget about 'make verify-sources' (check signature on downloaded
tarball). It's better to call:

make get-sources verify-sources

> - Then extract the source files:
> 
> tar Jxf linux-.tar.xz
> 
> - Move into the directory:
> 
> cd linux-.tar.xz

cd linux-

> - Copy the default Qubes kernel configuration into the directory:
> 
> cp ../config .config
> 
> - Now, sometimes new drivers or kernel options will be introduced
> in-between kernel versions. It is always useful to check for that and to
> merge in anything new that you may find desirable. To do so, first run:
> 
> make oldconfig
> 
> What that will do is check the current kernel configuration file against
> what's available in the new kernel version. If there's nothing new, then
> it will exit gracefully. If there are some new things, it'll prompt you
> on whether or not you want to include them. If you have no idea what to
> do, you can probably just accept the default choices or just say No and
> still be safe if the current kernel configuration works for you.
> 
> - Customize your kernel:
> 
> make menuconfig
> 
> - You'll be presented with a menu with a whole lot of options. The
> easiest ones to play with if

[qubes-users] Re: Network Manager icons-Fedora 23

2017-04-16 Thread Drew White
On Saturday, 15 April 2017 01:52:33 UTC+10, pete...@hushmail.com  wrote:
> Hi
> I don't know when and why but sometimes my Fedora 23 network manager icons 
> that are in the right down corner of my desktop, suddenly go in the top left 
> corner.

What GUI are you using?

I use XFCE and I have no issue with it any more since I changed to XFCE. KDE 
often had that issue though.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/094dd666-2047-429e-907c-84457f6e4aae%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] qubes manager add start terminal

2017-04-16 Thread Unman
On Mon, Apr 17, 2017 at 02:29:05AM +0300, Eva Star wrote:
> I'm get tired that Qubes Manager till now do NOT have "Start Terminal" at
> right click menu of each vm, but only "Run command in VM".
> 
> I want to patch it to add "Run terminal". I found that need to duplicate
> "Run command" entry, name it "Run Terminal" and predefined "gnome-terminal"
> on the input field.
> 
> I need to modify action. On the repository I see actions at mainwindow.ui
> file. But I can not find it on the disk to add new action!
> 
> 
>
> 
>  :/run-command.png:/run-command.png
> 
> 
> Where is mainwindow.ui with actions???
> 
> If I will found it I will add new function to process this action by
> duplicating action_run_command_in_vm_triggered(self) and predefined
> "gnome-terminal" into it.
> 
> 

I've done some manager hacking myself - some of it now incorporated in
release.
If you dont want to build a package then you can simply start hacking in 
/usr/lib64/python2.7/site-packages/qubesmanager.
(Back this up first, of course.)

Beside the ui elements in ui_mainwindow the slots are in main.py. If
you're going to hack these remember to remove the compiled files.
I'd recommend using xterm, as it's in all the templates afaik.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170417001102.GA9735%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Secure Handling of Encrypted Drives

2017-04-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-04-12 13:05, Sam Hentschel wrote:
> On Wednesday, April 12, 2017 at 3:20:30 PM UTC-4, Chris Laprise 
> wrote:
>> On 04/12/2017 02:37 PM, Jean-Philippe Ouellet wrote:
>>> On Wed, Apr 12, 2017 at 2:07 PM, Sam Hentschel 
>>>  wrote:
 On Wednesday, April 12, 2017 at 4:15:08 AM UTC-4, Unman 
 wrote:
> On Tue, Apr 11, 2017 at 11:12:50PM -0400, Sam Hentschel 
> wrote:
>> I am trying to figure out a way to securely handle my 
>> encrypted drives without two things: connecting the USB 
>> directly to the Vault (as this is obviously a bad idea 
>> for security), and decrypting the USB in sys-usb (also 
>> obviously a bad idea).
>> 
>> As an example, I have some USB that I keep encrypted 
>> backups of my important documents that I keep with me in 
>> case an emergency happens (which now that I am using 
>> Qubes will probably also be in the Vault).  I have files 
>> on there that I need to move to Vault, and I need to be 
>> able to continue to put files onto it (whether from
>> Vault or from a scan I have done.  > writing some documentation hopefully on what I did giving
>> DispVMs the sole ability to print and scan.>  Which I
>> know is a whole different problem; so I want to focus on
>> just the encrypted storage.
>> 
>> Another example is my backup drives which are all 
>> encrypted, and that I would like to have access to for 
>> the standard reasons.  I have been pointed to [1] a 
>> couple days ago by JPO and I believe this is part of the 
>> soution, but not the whole thing.
>> 
>> My two solutions that I have thought through are: doing 
>> PCI patthrough directly to the Vault (which is the least 
>> favorite of my ideas), and creating a separate VM for 
>> encryption that only houses software for encrypting and 
>> decrypting (dm-crypt or veracrypt).  This way the USB 
>> will be passed through to this VM and will never
>> directly touch the Vault (except through
>> qvm-move-to-vm).
>> 
>> I had a third solution of adding this functionality to 
>> DispVMs, but I can't PCI pass the USB to the DispVMs
>> when they are running.  So that one is out.
>> 
>> Thanks in advance for the help; can't wait to see what I 
>> missed!
>> 
>> [1] https://github.com/rustybird/qubes-split-dm-crypt
>> 
> 
> Hi Sam,
> 
> I'm obviously missing something here.
> 
> One of your two solutions fits completely within the 
> current Qubes model and matches exactly the specification 
> you set; that is, qvm-block attach the encrypted drive to
> a qube and decrypt it there. Can I ask what more you are 
> looking for?
> 
> There's no need to do this in a separate decryptionVM -
> you can use a disposableVM for the purpose.
> 
> If you don't want to have the decryption software in a 
> standard template, then put it in a separate template, 
> build a distinct disposableVM from that template and use
> my hack to fire up that disposableVM when you want to use
> a decrypted drive.
> 
> unman
 
 Unman,
 
 I was just making sure I wasn't missing something or there 
 wasn't a better way.  Anyways, I can't set this up in a 
 DispVM because you cannot PCI passthrough to a VM while it
 is running(?)
>>> 
>>> Your understanding is incorrect on the following details:
>>> 
>>> 1) you *can* do pci passthrough to a vm while it's running. 
>>> Depending on if the device supports function-level-reset or 
>>> not, you may need to set pci_strictreset="False" for the VM in 
>>> /var/lib/qubes/qubes.xml
>>> 
>>> 2) qvm-block is distinct from and not implemented with pci 
>>> passthrough, it uses xen blk{front,back}. This is an entirely 
>>> different and believed to be less dangerous interface to
>>> expose than PCI to your actual devices.
>>> 
>>> 
>>> That said, you might prefer to use a normal unencrypted 
>>> filesystem, only interface with the filesystem in sys-usb, and 
>>> use encrypted files instead.
>>> 
>>> You could then use qvm-copy-to-vm to move the ciphertext from 
>>> sys-usb into your other vm, {decrypt, manipulate, re-encrypt} 
>>> them there, send back new ciphertext (again via
>>> qvm-copy-to-vm) to sys-usb, and put them back on the flash
>>> drive from there.
>>> 
>>> This isolates your document processing from potential vulns in 
>>> your filesystem manipulation code (such as fuse-exfat which 
>>> appears to be the de-facto standard flash drive filesystem 
>>> these days for maximum interoperability).
>> 
>> This is confusing a fairly simple issue.
>> 
>> What Sam is looking for is to use 'qvm-block -a' (or the attach 
>> menu in Qubes Manager) which indeed has nothing to do with PCI 
>> passthrough.
>> 
>>> 
>>> This approach likely has a higher chance of protecting your 
>>> document-proc

[qubes-users] Re: qubes manager add start terminal

2017-04-16 Thread Reg Tiangha
On 04/16/2017 05:29 PM, Eva Star wrote:
> I'm get tired that Qubes Manager till now do NOT have "Start Terminal"
> at right click menu of each vm, but only "Run command in VM".
>
> I want to patch it to add "Run terminal". I found that need to
> duplicate "Run command" entry, name it "Run Terminal" and predefined
> "gnome-terminal" on the input field.
>
> I need to modify action. On the repository I see actions at
> mainwindow.ui file. But I can not find it on the disk to add new action!
>
> 
>
> 
>  :/run-command.png:/run-command.png
> 
>
> Where is mainwindow.ui with actions???
>
> If I will found it I will add new function to process this action by
> duplicating action_run_command_in_vm_triggered(self) and predefined
> "gnome-terminal" into it.
>
>

I don't know the answer to your question, but the problem with that is
that not every TemplateVM has gnome-terminal installed (for example, the
Fedora or Debian minimal templates). If you wanted to make something
more generic, you'd probably be safer with 'xterm' even though it isn't
as convenient to use. That's what gets called whenever you click on
'Update VM' (except in Whonix, where it's Konsole).

But if you're just doing it for yourself, you can launch whatever you want.

That said, being able to right-click in Qubes Manager and quickly launch
any kind of terminal program would be a super useful feature to have.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/od0vk7%24pmn%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Protect AppVM init startup scripts:

2017-04-16 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-04-10 08:43, Chris Laprise wrote:
> Here is a small script for Linux templates that protects files
> executed on startup by...
> 
> bash sh Gnome KDE Xfce X11
> 
> Together with enabling sudo authentication, this is a simple way to
> make template-based VMs less hospitable to malware.
> 
> LINK: https://github.com/tasket/Qubes-VM-hardening
> 

Looks great, thanks!

Issue: https://github.com/QubesOS/qubes-issues/issues/2748
CDFT: https://www.qubes-os.org/qubes-issues/#qubes-vm-hardening

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJY9AGeAAoJENtN07w5UDAw7C8P/1Spas/Knt0MxGk7cD0Ld90k
SSrgcd25AZhBgvmkxVZo5RqoczFzGMp+wVkrGSoLRUjQ26xikzvNrIB4+DSUOK44
f/pWjeyUWj3rqXHK/2rfNWJBYuFN5RetQD6zNK+6+QrARZi9MWnP/ii38WG2A57v
fAMYmGLDE9e1OClYRKLrymLdbgFn/O5ioULKX0qFtd/iln+qPIhBZxzaUsm2COgb
i46oqX3WvAQkcqL9MJ/0hWKvoShr5r9DG3/BScCsZxByVg76YB7iigCrCkJtC1gI
jdV3Dy/7oiKHsJsV1A8TL/7y7OCGtrIDQk8P3gIbCbCkf6bq0FFbcq/IZxiVpf7Y
Lx6xDXtZfJcGxbCIorft4f8aQjSgwbzP7gKUi13mxQjGGCZWusR5CHeUqxlqvtII
G0ojdH+GAUjH9GP86NFs25zv6kHy7rkW7FPYqyn+T9UNolpgUokFvJ85Cb/xQe42
SRGSrGNP5udwQ/MqdW3qdgzkZiezLNHZdlFLtM39ni5I0Okk9ga3OEYhp8dd3rOs
i+Gg557mW5D+Vtliir1QvJKijEWZk3bVWuwSfUSS2PUXFKwvxKvBbt1fuhmxxt95
u3ryfSAbx/4iRIcFs8PYEVMO1nDkS616a9qbGXW38vsU+6M8/JWX9KfUgPAC+Vrn
5kWgLvAqb9KXBDtenikt
=Z3KN
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/171f47af-3d63-31d3-2112-139ff783de42%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qubes manager add start terminal

2017-04-16 Thread Eva Star
I'm get tired that Qubes Manager till now do NOT have "Start Terminal" 
at right click menu of each vm, but only "Run command in VM".


I want to patch it to add "Run terminal". I found that need to 
duplicate "Run command" entry, name it "Run Terminal" and predefined 
"gnome-terminal" on the input field.


I need to modify action. On the repository I see actions at 
mainwindow.ui file. But I can not find it on the disk to add new action!



   

 :/run-command.png:/run-command.png


Where is mainwindow.ui with actions???

If I will found it I will add new function to process this action by 
duplicating action_run_command_in_vm_triggered(self) and predefined 
"gnome-terminal" into it.



--
Regards

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f8d6b2c5-09c4-8d4a-e7fd-730f1ca74c19%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Status of dvm support

2017-04-16 Thread cooloutac
On Sunday, April 16, 2017 at 7:25:51 PM UTC-4, cooloutac wrote:
> On Saturday, April 15, 2017 at 12:27:18 AM UTC-4, cooloutac wrote:
> > On Saturday, April 15, 2017 at 12:25:43 AM UTC-4, cooloutac wrote:
> > > On Friday, April 14, 2017 at 5:51:47 PM UTC-4, Unman wrote:
> > > > On Thu, Apr 13, 2017 at 10:06:11AM -0700, justusranv...@gmail.com wrote:
> > > > > I've experienced problems with DVMs on every Qubes install I've ever 
> > > > > done. I currently have no devices running Qubes on which dvms work.
> > > > > 
> > > > > Based on several threads from last year I found on this issue, and 
> > > > > this issue:
> > > > > 
> > > > > https://github.com/QubesOS/qubes-issues/issues/2182
> > > > > 
> > > > > Is it correct that once this bug with the dvm savefile is triggered, 
> > > > > then dvms will never work on your system again unless you manually 
> > > > > patch xen and recompile?
> > > > > 
> > > > > Are there instructions anywhere for doing this?
> > > > > 
> > > > 
> > > > 
> > > > There are instructions at www.qubes-os.org/doc/ under the Build
> > > > heading.
> > > > 
> > > > Basically you set up the Build environment and Qubes Builder as 
> > > > detailed on
> > > > those links, and then you will need to patch the Xen source tree before
> > > > running 'make vmm-xen'.
> > > > 
> > > > What interests me most about this is that I have never had problems with
> > > > disposableVMs on any install I've done, and that's coming up to 60
> > > > installs now, on a wide variety of machines.
> > > > I would be completely lost without disposableVMs - I use them a lot.
> > > > 
> > > > So what is it that triggers this bug for some users, and not others? I
> > > > don't recall any systematic effort to track down what's happening at 
> > > > root
> > > > cause.
> > > > 
> > > > unman
> > > 
> > > to me it happens where I get the bug that a dispvm won't start.  You 
> > > click it from start menu and nothing happens.  I just delete the internal 
> > > dvm template file and create a new one.  I think some people might have 
> > > the issue of trying to create them without deleting old one first.
> > > 
> > > But one time I even noticed I must of went to some bad webpage or that 
> > > the firefox couldn't handle it and it crashed out.  I mean closed and 
> > > disappeared.  after that dispvms wouldn't start.  could of been a porn 
> > > page,  or a news site I can't remember.   Not sure how to trace anything 
> > > with that.
> > 
> > has only happened no more then a handful of times the few years I've used 
> > Qubes.
> 
> I forgot on one of my machines for over a week now,  every time I start a 
> dispvm it has a yellow triangle for not allrequested memory being returned.  
> I shut down the vm and triangle goes away, start it and it comes back.  
> Deleting the dvm and recreating it is not fixing this, nor is rebooting. Even 
> if its the only vm I load.  Only recent anomaly.  no idea what log to look 
> at,  makes me uncomfortable using it on that machine.

also the vm on this machine is running terribly slow even with more cpu cores 
enabled.  I thought it was slow internet just now and realized its osmething 
wrong with this dvm.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/abe5e1c2-503d-443f-b8b8-942b10f8bef4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Status of dvm support

2017-04-16 Thread cooloutac
On Saturday, April 15, 2017 at 12:27:18 AM UTC-4, cooloutac wrote:
> On Saturday, April 15, 2017 at 12:25:43 AM UTC-4, cooloutac wrote:
> > On Friday, April 14, 2017 at 5:51:47 PM UTC-4, Unman wrote:
> > > On Thu, Apr 13, 2017 at 10:06:11AM -0700, justusranv...@gmail.com wrote:
> > > > I've experienced problems with DVMs on every Qubes install I've ever 
> > > > done. I currently have no devices running Qubes on which dvms work.
> > > > 
> > > > Based on several threads from last year I found on this issue, and this 
> > > > issue:
> > > > 
> > > > https://github.com/QubesOS/qubes-issues/issues/2182
> > > > 
> > > > Is it correct that once this bug with the dvm savefile is triggered, 
> > > > then dvms will never work on your system again unless you manually 
> > > > patch xen and recompile?
> > > > 
> > > > Are there instructions anywhere for doing this?
> > > > 
> > > 
> > > 
> > > There are instructions at www.qubes-os.org/doc/ under the Build
> > > heading.
> > > 
> > > Basically you set up the Build environment and Qubes Builder as detailed 
> > > on
> > > those links, and then you will need to patch the Xen source tree before
> > > running 'make vmm-xen'.
> > > 
> > > What interests me most about this is that I have never had problems with
> > > disposableVMs on any install I've done, and that's coming up to 60
> > > installs now, on a wide variety of machines.
> > > I would be completely lost without disposableVMs - I use them a lot.
> > > 
> > > So what is it that triggers this bug for some users, and not others? I
> > > don't recall any systematic effort to track down what's happening at root
> > > cause.
> > > 
> > > unman
> > 
> > to me it happens where I get the bug that a dispvm won't start.  You click 
> > it from start menu and nothing happens.  I just delete the internal dvm 
> > template file and create a new one.  I think some people might have the 
> > issue of trying to create them without deleting old one first.
> > 
> > But one time I even noticed I must of went to some bad webpage or that the 
> > firefox couldn't handle it and it crashed out.  I mean closed and 
> > disappeared.  after that dispvms wouldn't start.  could of been a porn 
> > page,  or a news site I can't remember.   Not sure how to trace anything 
> > with that.
> 
> has only happened no more then a handful of times the few years I've used 
> Qubes.

I forgot on one of my machines for over a week now,  every time I start a 
dispvm it has a yellow triangle for not allrequested memory being returned.  I 
shut down the vm and triangle goes away, start it and it comes back.  Deleting 
the dvm and recreating it is not fixing this, nor is rebooting. Even if its the 
only vm I load.  Only recent anomaly.  no idea what log to look at,  makes me 
uncomfortable using it on that machine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3100df3a-6f84-4731-a49f-c35600bd82df%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Anbox?

2017-04-16 Thread Vít Šesták
Yes, /system being read-only is a standard situation on Android. On some 
devices, you can perform mount -o remount,rw /system to get it RW, but there 
are some drawbacks on some devices:

* Some devices come with NAND lock. This was (is?) usually the case of HTC 
devices and it is likely also the case of Anbox – since snaps contain RO 
images, it seems to be the natural way to implement it.
* Some devices use dm-verity to reject booting of tampered system. This is the 
case of BlackBerry, but more vendors are likely to go this way, because this 
isn't specific for BlackBerry. But I doubt Anbox goes this way.
* Even if you manage to modify /system and then to boot, you are going to have 
troubles with updates. You can think of /data and /system in Android as rough 
equivalents of /rw and / in template-based VMs in Qubes. There are some 
differences (different update mechanisms and no CoW snapshot in Android), but 
the basic principles are the same. Moreover, in Android, you usually exchange 
one vendor-provided /system for another vendor-provided /system image (even if 
you use incremental update), so, unlike template-based VMs, you cannot easily 
customize it this way.

If you don't want to touch /system, you can go several ways:

* mount --bind (and manage its content to be up-to-date)
* mount -t tmpfs and copy old content (I probably have some script for that)
* modify / – this is a ramdisk you can write to after performing mount -o 
remount,rw / and there is even some directory on $PATH.

In all those cases, your modification gets lost after reboot. But you can write 
some script like adb wait-for-device && adb shell su -c /data/busybox/install. 
You will probably want to run this script as user in order not to have troubles 
with permissions when using adb later.

Specifically for busybox, its installation consists of just two steps:

1. Copy it to some directory on $PATH.
2. Install symlinks (IIRC by the following command: busybox --install 
/directory/to/install)

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/168560fb-7d50-4403-bf0a-ba95bcd7c3ca%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Anbox?

2017-04-16 Thread Reg Tiangha
On 04/16/2017 03:35 AM, Reg Tiangha wrote:
> On 04/16/2017 01:44 AM, Vít Šesták wrote:
>> Yes, other apps are working after reboot. Maybe I broke it with pm.
>>
>> * `pm` command in Android seems to be broken – it segfaults and it seems 
>> that no app can be started then (though other will continue working)
>> * Calculator app works, Settings app works, E-Mail app seems to work, too.. 
>> Maybe the Gallery 3D just has some 3D acceleration issues, but other apps 
>> are OK.
>> * adb lolcat and adb shell are your friends, it shows what is happening
>> * adb shell might be needed before adb lolcat
>> * don't worry about timeouts – app window can be shown even after timeout
>> * Somewhat laggy and CPU hog – maybe related to OpenGL.
>> * Not sure how to install apps. I've tried adb install FDroid.apk and it 
>> passed, but it does not seem to be installed.
>> * The desktop files sometimes disappear.
>>
>> Maybe we should turn off GPU rendering in developer options. Unfortunately, 
>> I cannot enable developer mode in Settings app. It seems we sould have to 
>> disable ro.kernel.qemu.gles and qemu.gles in /system/build.prop, but I am 
>> not sure if this is easy. The build.prop might be a RO part of the snap. 
>> There is a similar file in /data, not sure what we can override there.
>>
>> I am not sure if Anbox utilizes OpenGL. Maybe some lowlevel approach 
>> bypasses the mesa library, which can decide to use llvmpipe.
>>
>> Regards,
>> Vít Šesták 'v6ak'
>>
> You're right; everything in the
> snap/anbox/common/app-data/applications/anbox directory disappears for
> some reason. No idea what to do about that. However, you can still
> launch stuff from the command line if you remember the commands from the
> ..desktop files. When they reappeared again after a VM reboot, I copied
> them all to another directory just so I could see the launch commands
> when I needed them.
>
> I've installed stuff with FDroid and adb and it does work; .desktop
> files do get generated in that directory. But as you said, they
> disappear sometimes.
>
> I managed to enable Developer Mode, but clicking on it does nothing.
> Clicking on it from the side menu just kicks you back to the main
> Settings screen. The Anbox people say this is a slimmed down version of
> Android 7.1.1; is it possible that Developer Mode wasn't compiled in?
>
> I installed Build.prop editor from F-Droid and tried to set
> ro.kernel.qemu.gles and qemu.gles to 0 using that. I'm not sure if it
> did anything, but after a reboot, Gallery 3D doesn't even start. I don't
> know how to revert what I changed though to see if it really had an
> effect (can't find a way to delete those entries; long pressing does
> nothing and I don't know where it saves its data to) but maybe that's a
> route to go if it does work. Make sure to back up the VM first, though.
>
> Does this Android image allow for root? If so, it might be possible to
> install a text editor that works with root to try and see if editing
> /system/build.prop persists across a reboot. But I too am now out of
> time again at the moment.
>
> One last idea:  The Anbox docs say it's possible to use your own Android
> image file. So maybe it's possible to build one that doesn't have the gl
> stuff enabled. That could be another thing to try as a last resort,
> especially if build.prop is read-only.
>

One last thing:  I tried to install Busybox from F-Droid, and while it
said that /data had about 4.6GB free, /system has 0GB, which implies to
me that /system is either read-only or really is just an image file that
you can't modify.

System:
* device: Anbox
* android: 7.1.1
* architecture: x86_64

Free space:
* /data: 4.6G
* /system: 0

Latest BusyBox:
* version: v1.25.1-meefik
* applets: 334 items
* size: 1665860 bytes
* md5: 146921ec514d4828748a226dbed2fc25

Installed BusyBox:
* not installed



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ocveba%24mhd%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Anbox?

2017-04-16 Thread Reg Tiangha
On 04/16/2017 01:44 AM, Vít Šesták wrote:
> Yes, other apps are working after reboot. Maybe I broke it with pm.
> 
> * `pm` command in Android seems to be broken – it segfaults and it seems that 
> no app can be started then (though other will continue working)
> * Calculator app works, Settings app works, E-Mail app seems to work, too. 
> Maybe the Gallery 3D just has some 3D acceleration issues, but other apps are 
> OK.
> * adb lolcat and adb shell are your friends, it shows what is happening
> * adb shell might be needed before adb lolcat
> * don't worry about timeouts – app window can be shown even after timeout
> * Somewhat laggy and CPU hog – maybe related to OpenGL.
> * Not sure how to install apps. I've tried adb install FDroid.apk and it 
> passed, but it does not seem to be installed.
> * The desktop files sometimes disappear.
> 
> Maybe we should turn off GPU rendering in developer options. Unfortunately, I 
> cannot enable developer mode in Settings app. It seems we sould have to 
> disable ro.kernel.qemu.gles and qemu.gles in /system/build.prop, but I am not 
> sure if this is easy. The build.prop might be a RO part of the snap. There is 
> a similar file in /data, not sure what we can override there.
> 
> I am not sure if Anbox utilizes OpenGL. Maybe some lowlevel approach bypasses 
> the mesa library, which can decide to use llvmpipe.
> 
> Regards,
> Vít Šesták 'v6ak'
> 

You're right; everything in the
snap/anbox/common/app-data/applications/anbox directory disappears for
some reason. No idea what to do about that. However, you can still
launch stuff from the command line if you remember the commands from the
.desktop files. When they reappeared again after a VM reboot, I copied
them all to another directory just so I could see the launch commands
when I needed them.

I've installed stuff with FDroid and adb and it does work; .desktop
files do get generated in that directory. But as you said, they
disappear sometimes.

I managed to enable Developer Mode, but clicking on it does nothing.
Clicking on it from the side menu just kicks you back to the main
Settings screen. The Anbox people say this is a slimmed down version of
Android 7.1.1; is it possible that Developer Mode wasn't compiled in?

I installed Build.prop editor from F-Droid and tried to set
ro.kernel.qemu.gles and qemu.gles to 0 using that. I'm not sure if it
did anything, but after a reboot, Gallery 3D doesn't even start. I don't
know how to revert what I changed though to see if it really had an
effect (can't find a way to delete those entries; long pressing does
nothing and I don't know where it saves its data to) but maybe that's a
route to go if it does work. Make sure to back up the VM first, though.

Does this Android image allow for root? If so, it might be possible to
install a text editor that works with root to try and see if editing
/system/build.prop persists across a reboot. But I too am now out of
time again at the moment.

One last idea:  The Anbox docs say it's possible to use your own Android
image file. So maybe it's possible to build one that doesn't have the gl
stuff enabled. That could be another thing to try as a last resort,
especially if build.prop is read-only.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ocvdsl%24bnt%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Anbox?

2017-04-16 Thread Vít Šesták
Theoretically, /data/local.prop allows to override system properties. But I've 
tried and after Ubuntu reboot, I see the same values (checked by getprop 
command). No time to investigate it further ATM.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ec2bea6-f796-4f65-83b2-7ea39007cc5e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Anbox?

2017-04-16 Thread Vít Šesták
Yes, other apps are working after reboot. Maybe I broke it with pm.

* `pm` command in Android seems to be broken – it segfaults and it seems that 
no app can be started then (though other will continue working)
* Calculator app works, Settings app works, E-Mail app seems to work, too. 
Maybe the Gallery 3D just has some 3D acceleration issues, but other apps are 
OK.
* adb lolcat and adb shell are your friends, it shows what is happening
* adb shell might be needed before adb lolcat
* don't worry about timeouts – app window can be shown even after timeout
* Somewhat laggy and CPU hog – maybe related to OpenGL.
* Not sure how to install apps. I've tried adb install FDroid.apk and it 
passed, but it does not seem to be installed.
* The desktop files sometimes disappear.

Maybe we should turn off GPU rendering in developer options. Unfortunately, I 
cannot enable developer mode in Settings app. It seems we sould have to disable 
ro.kernel.qemu.gles and qemu.gles in /system/build.prop, but I am not sure if 
this is easy. The build.prop might be a RO part of the snap. There is a similar 
file in /data, not sure what we can override there.

I am not sure if Anbox utilizes OpenGL. Maybe some lowlevel approach bypasses 
the mesa library, which can decide to use llvmpipe.

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/945a6597-08f8-4264-9fbc-ae9f9f182c39%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Big problem?

2017-04-16 Thread rubboe928
It just do not accept the password... but there is probably no way to get to 
windows back? I'm do stupid

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/33425111-41d6-4858-a2c3-5afb79b8b88f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.