Re: [qubes-users] Accessing Android phone photos

2017-05-13 Thread Vít Šesták
Maybe the phone resets its USB connection at that point (as it was unplugged 
and plugged again), so it appears in sys-usb again. Do you see it here?

Workarounds:

* Ideally, there would be a way to tell sys-usb not to communicate to the 
device when it reconnects and to somehow reconnect it as soon as it reappears. 
AFAIK, there is currently no such option.
* You might try to assing it again, but I am unsure if it will work.
* Can you set your phone to allow it without asking? This might prevent the 
reconnects…

Regards,
Vít Šesták 'v6ak'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c8156d2-0c92-4c78-b5c2-85f207a85bc5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4 Release Date

2017-05-13 Thread Vít Šesták
If you have issues with recent hardware, but you can install and boot it, you 
can try installing kernel from unstable repo. This version has resolved my 
issues.

The command from installing is cca: sudo qubes-dom0-update 
--enablerepo=qubes-dom0-unstable kernel, but I am writing it by heart, so there 
might be some minor mistakes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62f1e8ad-4a13-462b-9fc8-011daa145f3c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: "root=/dev/mapper/dmroot crashed"

2017-05-13 Thread devrana
Hmm.  Two devices with the same major:minor numbers? /dev/mapper/dmroot & 
/dev/dm-0

/dev/mapper/dmroot does not appear in Dom0, nor does any error appear in 
journalctl.  I do find that device in sys-{net,firewall,whonix,usb} and in 
those cases it always appears as:

ls -l /dev/mapper/dmroot
brw-rw 1 root disk 251, 0 May 13 20:11 /dev/mapper/dmroot

lsblk /dev/xvdc
NAME   MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT
xvdc   202:32   1 11.5G  0 disk 
├─xvdc1202:33   11G  0 part [SWAP]
└─xvdc2202:34   1 10.5G  0 part 
  └─dmroot 251:00   10G  0 dm   /

In each of these VM's I find only one error related to dmroot.  On a single 
bootup (but not subsequently) and in all the VM's:

May 13 02:56:21 fedora-25 systemd-udevd[7757]: conflicting device node 
'/dev/mapper/dmroot' found, link to '/dev/dm-0' will not be created

In all those VM's I also find:

ls -l /dev/dm-0
brw-rw 1 root disk 251, 0 May 13 20:11 /dev/dm-0

Notice the same major:minor numbers as /dev/mapper/dmroot

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5d3bc0b-62d9-4a32-891e-b729c83d57f4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VT-d breaks suspend/resume (Lenovo T460)

2017-05-13 Thread Myron Weber
On Saturday, May 13, 2017 at 12:18:19 PM UTC-7, Ed wrote:

> I had the same problem with a lenovo x1 carbon, there are a lot of threads 
> out there with this issue, with a lot of fixes (such as update the bios), but 
> for me I fixed it by disabling the security module (TPM) in bios.
> 
> Ed

Thanks - that did it for me, too. I guess I can pick any 2 out of 3: (1) 
suspend/resume, (2) VT-d, and (3) TPM. I'm not using AEM, so TPM loses.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2c360070-4f03-4f90-a1c5-4b6c6d4fa465%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: off topic - invite codes to 'riseup'

2017-05-13 Thread none:qmane
sara.m.antichi-re5jqeeqqe8avxtiumw...@public.gmane.org:
> Hey guys. I need two codes. If you could PM them to me that would be great!
> 
I have endless codes, but just read the whonix docs, and riseup sounds a
bit dubious at this point, if thats ok with you ...please show you
perused the whonix thread ?

https://forums.whonix.org/t/riseup-net-likely-compromised/3195


i'm not expert but hulahoop's final comment is enough for me, to
reconsider, i apologize for offering after having not read through most
of the whonix docs
https://www.whonix.org/wiki/E-Mail#riseup.net


thanks whonix devs and contributers, never knew tor was actually use-able :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7dc1892-7a4b-5fce-5e43-f7484d07447e%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] method for 2 language input and toggle?

2017-05-13 Thread yreb-bird
I've tried both in a Fedora AppVM and in dom0 to create a 2nd language
input,  however the Super+space  doesn't change the language in gedit
nor libreoffice,  after rebooting the AppVM

Is this supposed to work ? if so how or what am I not doing correct?
I've seen this type of interface in the settings  in  non qubes linux
distros, and otherwise been able to get it to work, fwiw, my keyboard is
plugged into a usb->ps2 adapter in the ps2 hole  :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d2618b22-23e7-99a3-60d3-a78c058a0421%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Accessing Android phone photos

2017-05-13 Thread cooloutac
On Thursday, May 11, 2017 at 6:20:58 PM UTC-4, Alex wrote:
> On 11 May 2017 23:05:42 BST, PR  wrote:
> 
>   
> 
> Hello Alex,
> 
> 
> 
> On 05/11/2017 11:41 PM, Alex wrote:
> 
> 
> 
>   I'm connecting my Android phone over USB to my Qubes 3.2 host and... 
> nothing happens. I'm using a Fedora 24 template and a USB Qube.
> 
> I've read the issues on github relating to this but have not found a simple 
> set of instructions for accessing my phone's files over MTP. What are the 
> steps?
> 
> 
> 
> 
> I have never attached my Android phone to Qubes before, but tried so
> a few minutes ago and could access it without any problems:
> 
> 
> 
> 1) attach phone via USB
> 
> 
> 
> 2) on the phone, switch from "Charging only" to "USB Data tranfser
> (MTP)"
> 
> 
> 
> 3) Launch a dom0 Terminal, you should see your phone after entering:
> 
>     [user@dom0 ~]$ qvm-usb
> 
>    ...
> 
>    sys-usb:3-3 04xx:88xx Android_Androidxxx
> 
>    ...
> 
> 
> 
> 4) mount your phone via sys-usb to your AppVM (I've choosen my
> untrusted AppVM in this case):
> 
>     [user@dom0 ~]$ qvm-usb -a untrusted
>   sys-usb:3-3
> 
> 
> 
> 5) Open a File Explorer in this AppVM
> 
>     [user@dom0 ~]$ qvm-run untrusted nautilus
> 
> 
> 
> 6) you should see your phone as an additional device beneath the
> Trash-Icon.
> 
>     If not, unmount and remount the phone once:
> 
>     [user@dom0 ~]$ qvm-usb -d sys-usb:3-3
> 
>     [user@dom0 ~]$ qvm-usb -a untrusted
>   sys-usb:3-3
> 
>     
> 
> 
> 
> Good luck
> 
> 
> 
> - P
> 
> 
> 
>   
> 
> Hello and thank you for the walkthrough! I do indeed see a "SAMSUNG Android" 
> in the file manager. As soon as I click on it, my phone prompts me to "Allow 
> access to device data". As soon as I click "Allow", the icon disappears. VM's 
> dmesg says:
> 
> vhci_hcd: connection closed
> 
> 
> 
> Any ideas how to troubleshoot? This works as expected on a FC25 laptop. 
> 
> 
> 
> Many thanks,
> 
> 
> 
> Alex

Works for me using a debian-based sys-usb.  once I click allow on the phone i 
can browse its directories in the file manager.

Maybe put your phone in developer mode and then try mtp again.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f67fbfce-c91a-4f9e-85a1-f6c7c119934f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Laptop with discrete graphics card, any chance it'll work?

2017-05-13 Thread cooloutac
On Saturday, May 13, 2017 at 1:07:21 PM UTC-4, lok...@gmail.com wrote:
> On Sunday, 14 May 2017 00:50:01 UTC+8, Grzesiek Chodzicki  wrote:
> > W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com 
> > napisał:
> > > I am about to buy a new laptop, and jst about the only requirements I 
> > > have is that it should be reasonably small, and that I am able to use the 
> > > GPU in it. The latter is because I need to do some development which 
> > > requires it.
> > > 
> > > I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware 
> > > of the potential security issues with that, but I am willing to accept it 
> > > if necessary (i.e. if there is no other solution).
> > > 
> > > Right now I'm considering buying the Dell XPS 15 laptop which has a 
> > > discrete Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd
> > > 
> > > Would this work? If not, is there another alternate for me? I really want 
> > > to be using Qubes on this machine, but if there is no way I can get a GPU 
> > > to work, I'm going to have to use a dedicated machine for the GPU work, 
> > > which means I have to get two laptops, and I'd rather not do that.
> > > 
> > > Any ideas?
> > 
> > 10 series Nvidia GPU's aren't supported by the version of nouveau Qubes 
> > ships with.
> 
> I'm aware of this, which is why I said that I'm ok with installing Nvidias 
> drivers. If I understand you correctly, you're suggesting that this is not an 
> option? 
> 
> Assuming that Noveau will eventually support it, will it be possible to to 
> utilise the GPU in a vm at that time?

Even if you managed to get the drivers to work if its not supported by 
noouveau.  there is currently no gpu passthrough so only 2s rendering in vms.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6d8376db-509f-4b6b-9944-6b1bcde96b5a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-13 Thread cooloutac
On Saturday, May 13, 2017 at 3:50:36 PM UTC-4, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-05-09 14:54, cooloutac wrote:
> > On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong 
> > wrote: On 2017-05-08 23:47, cooloutac wrote:
>  On Tuesday, May 9, 2017 at 12:47:11 AM UTC-4, cooloutac 
>  wrote:
> > On Sunday, May 7, 2017 at 12:33:54 PM UTC-4, 
> > nick...@kulinacs.com wrote:
> >> On May 7, 2017 10:39:22 AM CDT, Andrew David Wong 
> >>  wrote:
>  On 2017-05-07 10:32, nickl...@kulinacs.com wrote:
> > On May 7, 2017 10:23:54 AM CDT, Andrew David Wong 
> >  wrote: On 2017-05-07 10:10, 
> > nickl...@kulinacs.com wrote:
>  What benefit does this have over simply
>  ysing qubes-split-gpg-client-wrapper, like
>  done here:
>  https://github.com/kulinacs/pass-qubes It
>  seems like a lot of overhead for not a lot of
>  gain.
>  
>  On May 7, 2017 9:50:26 AM CDT, "Manuel Amador
>  (Rudd-O)"  wrote:
> > Building on the excellent pass 
> > (https://passwordstore.org), it gives me 
> > great pleasure to announce the initial 
> > release of qubes-pass — an inter-VM 
> > password manager and store for Qubes OS.
> > 
> > Check it out here!
> > 
> > https://github.com/Rudd-O/qubes-pass
> > 
> > 
> > What are the advantages of either of these over the
> > traditional Qubes model of having a normal password
> > manager in a vault VM and using the inter-VM
> > clipboard to copy/paste passwords out of it?
> > 
> > 
> > I prefer Pass because it uses GPG for encryption, 
> > meaning I can manage fewer secrets over all (as it 
> > backends into my normal GPG key) and then track my 
> > password files in git. To do this with the 
> > traditional Keepass method, you either need to
> > back up the password database somewhere secure or 
> > remember another password for it.
> > 
>  
>  Why not just back up the entire vault with qvm-backup?
>  
> >> 
> >> Git has less storage overhead (as you're backing up a 
> >> bunch of text files, not an entire VM), allows proper 
> >> versioning, so it is trivial to see your passwords at a 
> >> point in time, and can be used cross platform if you 
> >> chose to keep your GPG key on another system.
> > 
> > I just back up the database file. its encrypted.
>  
>  I don't think backing up the whole vault is a good idea if 
>  you don't have to.
>  
> > 
> > Why? No need to encrypt the database file if the whole VM is 
> > encrypted. Also, if your database file doesn't use authenticated 
> > encryption, that's another thing to worry about. You may also worry
> > about file-level metadata leakage.
> > 
> > 
> > the database file is automatically encrypted.  I just feel like 
> > vault more likely compromised then the file if something is.  but
> > I could be wrong.  plus way less space.
> > 
> 
> I don't see any basis for that reasoning. The files in an AppVM are
> only as safe as the AppVM itself, unless the VM is used only for
> storage or something.
> 
> If the vault VM is compromised, then the encrypted database file in
> the vault is only safe as long as it remains encrypted. An attacker
> who can compromise your vault can set a trigger that waits for you to
> decrypt the database the next time you want to use it, then grab the
> passphrase, decryption key, or the whole decrypted database.
> 
> > I think when we have paranoid mode it will be better.
> > 
> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJZF2N9AAoJENtN07w5UDAw8goP/itJWd/QiGchOPYmavzXB+AS
> HKycQy2y4lvqHjl1cltPXP0unThvoK8BSgCWdm2wRbj7T/Lc5EG7mtCScXyZP6uc
> ouFTMPjyjYECmINWaU/rNEOJRy5XR6q3AcVeObBRZxdst59g9GNtCXAgu47U7WjJ
> 8u+9wqEO1PD7Oo+ZlFZ971JMsYluU7uxHwqDYqFabPc+FvkD5hEIBM3tfXvmbJuo
> qlhpQpVyudYcgCs8Xtt6e1P1GcSc0pXT03nd7mw8QeMsZq3Ua6x8tOEtAnl93pba
> LXWoHEmLGg5BbYbkbXMeZYYTyM+e5f4MN78DkolaqzwD73IVITg+8ctJD+rNSgIB
> dJhNeAVtsddyQ+7+3IHxsOSgVvnBANoC2e7iBLkVxd0zqKnT6hdbSNQPfrftIQzV
> uATOBVgCy16/xjgOeqPENAbT9ElZfgIyEhN3HPQsOPhM0ASSdSgx+fHNH9RY/dZ7
> aoWbILGJRL52J1R4koumXvbaWSHLo2HAIv1xljstedltDt4jyjDQtRfJ2Zbf7jK1
> hGXZcsUtyZHyZklHyYb8ZiQa6gbGj3KBHQaz91TznTdgIV/G42iL+GFb1jej8TIS
> 2mBALx5WL82jo5Nmb/4GJ/5nb3ShBAeOm9YkfctQX0fXd3lweZ7h9i79rAocIrZ9
> o87ju6uck1ri3q3q01Pt
> =oKxB
> -END PGP SIGNATURE-

Because more attack vector. Seems like common sense for me.  The whole point of 
paranoid mode isn't it?

As for attacker getting the key to the database file thats 

Re: [qubes-users] debian minimal

2017-05-13 Thread Unman
On Sat, May 13, 2017 at 02:38:18PM +0200, Bernhard wrote:
> Hello,
> I ask again about a debian-8/9-minimal (preferably with coldkernel). I
> know there was already a discussion on the subject, but I could not
> gather enough information yet to start myself. There is a conf file
> debian-8-minimal-3.0.2-201505170018.conf on github. The date "2015" is
> not completely re-assuring. Is there a newer one? Even if it were
> up-to-date, what do I do with this file? Could someone give me a brief
> summary (or give diff's to the well documented archlinux building process)?
> 
> Thank you!  Bernhard
> 

Hello Bernhard

I thought that this had been adequately dealt with before.


If you want to follow the instructions for archlinux, do so.
Step 2 is optional - you do not need a github account.
Step 5 is optional - you are able to deselect Fedora23 during setup
stage.

At step 6, (run ./setup)  follow the instructions until the "Builder
Plugin Selection" screen - Select builder-debian instead of
builder-archlinux. (If you skipped Step5 you will have to leave
builder-fedora selected.)

At the "Template distribution selection" screen, (deselect fedora-23 if
selected), select jessie+minimal.

Follow the rest of the instructions.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170513224957.GA23088%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4 Release Date

2017-05-13 Thread Jon Solworth
On Tuesday, March 7, 2017 at 2:04:18 AM UTC-6, qub...@tutanota.com wrote:
> Back in July 16 Joanna announced 
> (http://qubesos4z6n4.onion/news/2016/07/21/new-hw-certification-for-q4) 
> that Qubes 4 was due to be released later that year in Sept 16.
> Has Qubes 4 been scrapped? Anyone any idea if/when it will be released?
> 
> 
> --
> 
> 
> Securely sent with Tutanota. Claim your encrypted mailbox today!
> 
> 
> https://tutanota.com

I don't see any rush on releasing Qubes, it does after all have as its primary 
goal security, not release dates.

There is, however, a need to enable current hardware to run qubes.  It would be 
great if a 3.2 unstable installer was available to enable kernels which work 
with current chipsets.

Is there anything available like this?


Jon

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7bc996e4-d682-4d60-9830-ea8fbce6bb4c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Onion site stuck in redirect loop

2017-05-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-05-09 15:33, qubenix wrote:
> his page (maybe more?):
> http://qubesos4z6n4.onion/doc/firewall/ gets stuck in a
> redirection loop.
> 

Thank you for reporting this. Tracking:

https://github.com/QubesOS/qubes-issues/issues/2807

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=m56d
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7e5fbf00-c1ee-bff3-5910-e3038ba690de%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] network connection has been disconeccted

2017-05-13 Thread Rainer Hörbe
Took me a while to come back to this. Removing the interface and adding it 
again in sys-net did help.

Thanks, Rainer


> Am 11.03.2017 um 17:51 schrieb Unman :
> 
> On Sat, Mar 11, 2017 at 07:42:23AM -0800, Rainer Hörbe wrote:
>> I installed Qubes R3.2 on a Gigabyte Brix and it worked nicely for a couple 
>> of weeks. Recently id started displaying the notification "Disconnected - 
>> the network connection has been disconnected" after login. And in fact no IP 
>> was acquired from the DHCP server.
>> 
>> When I boot from CentOS etc. there is no problem to connect via ethernet. I 
>> reinstalled Qubes, but the problem remains. I can, however, attache to Wifi.
>> 
>> I looked into various VMs, but the networking concept is quite different to 
>> plain vanilla linux and I did not find a doc page to troubleshoot the 
>> problem.
>> 
>> - Rainer
>> 
> 
> The network connection is controlled in sys-net (assuming that you have
> kept the default install).
> If you open a terminal there you will find it's just vanilla linux as
> far as networking goes. You dont say what the wifi card is,but it's
> possible that you need to update your drivers or set a specific
> configuration.
> Remember to do this in the template that sys-net uses.
> 
> Also, it's very simple to switch the template and see if you have more
> success in maintaining a connection using a Debian template. You can
> make this change from the Qubes manager, by looking at and changing
> qube settings. (You will need to reboot sys-net to start suing the new
> Template.)
> 
> Hope this helps
> 
> unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2DF320C6-D959-4822-BB3D-F2E166D9CCEB%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help adding documentation to Qubes Repository

2017-05-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-05-13 14:27, Zbigniew Łukasiak wrote:
> This is something I am also struggling with - but shouldn't there
> be a sign-off line in all the commit comments as described in 
> https://www.qubes-os.org/doc/license/ ?

No, that only applies to Qubes OS code.

> And by the way - shouldn't that be somehow linked (or maybe moved
> into) from 
> https://github.com/QubesOS/qubes-doc/blob/master/CONTRIBUTING.md ?
> 

It's already linked there.

P.S. - Please don't top-post.

> 
> On Fri, May 12, 2017 at 3:49 AM, Zrubi  wrote: On
> 05/12/2017 09:39 AM, Zrubi wrote:
 On 05/11/2017 11:51 PM, 'PR' via qubes-users wrote:
> Hello,
 
> I need some help understanding how the collaborative 
> documentation with GitHub works.
 
 https://www.qubes-os.org/doc/doc-guidelines/
 
 TL;DR: you only missed the create a pull request part.
 
 
> 
> Or if it is your pull request: 
> https://github.com/QubesOS/qubes-doc/pull/418
> 
> Then you made it right. Now you just have to wait for someone to
> review and accept it into the official doc's
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=l6Wr
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/74d3b336-ee1b-5c7a-a69b-5b2d3694e312%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-05-11 20:53, Manuel Amador (Rudd-O) wrote:
> On 05/09/2017 07:54 PM, cooloutac wrote:
>> On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong 
>> wrote:
>> 
>> Why? No need to encrypt the database file if the whole VM is 
>> encrypted. Also, if your database file doesn't use authenticated
>>  encryption, that's another thing to worry about. You may also 
>> worry about file-level metadata leakage.
>> 
>>> the database file is automatically encrypted. I just feel like 
>>> vault
> more likely compromised then the file if something is. but I could 
> be wrong. plus way less space. > > I think when we have paranoid 
> mode it will be better. > Backing up using anything like
> qvm-backup is always going to be much slower — and require the VM
> to be off —than any file-level alternative. Plus, if you need to
> sync your keyring between different devices, that eliminates the
> possibility of using qvm-backup in any efficient way.
> 

I agree that qvm-backup is slower, bigger, and less efficient than
file-level backup/syncing methods, but the tradeoffs are pretty
reasonable for a lot of use cases. Since I can just start a script and
walk away, it doesn't really matter to me whether it takes a few extra
minutes while I'm not there.

Don't get me wrong, though. I'd love to see a more efficient solution
that combines some of the best effects of both (e.g., incremental
backup).

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=3/mC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eae91840-9d76-4a38-f923-ff3c5b668e70%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-05-12 06:53, Holger Levsen wrote:
> On Sun, May 07, 2017 at 12:23:47PM -0500, Andrew David Wong wrote:
>> 1. LUKS passphrase 2. Backup passphrase 3. Screen locker
>> passphrase Managing these three allows me to have an arbitrary
>> number of additional secrets in VMs without having to remember
>> anything else.
> 
> you really dont protect your gpg key with a passphrase??
> 

See: https://www.qubes-os.org/doc/split-gpg/

> and I assume you dont change the backup passphrase, because it
> needs to be high entropy, despite being visible with "ps fax"…
> 

Why is that a problem? It's only visible in dom0. If an attacker is in
dom0, it's already game over.

Tracked here, BTW:
https://github.com/QubesOS/qubes-issues/issues/1582

> I'm really not convinced this is a good setup, though of cause
> everything depends on the thread model! :-)
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJZF2SYAAoJENtN07w5UDAwMf0P/1YRlQPo/C0/eUd1M/ZOjk+c
0niJvtOEQkJoo4QrOZqdJ/9CZa3KUYKlH6ktkzbg4TjrODgqRiffPhtTYmTmfxTL
8CMdD4HWSvXVLt4SEJYuX81NwS0BioHqk0lY5bA9dQCDFdb29O4cUvUX43h1+0Je
hQSK4Rcytp8vjelGSPTT9qDzMuVHu6tpUgYIYTwGPS67aeeVvnlT6VY6Q+QfUGr6
+GQWvGkspxTRg3ASml1UtMd4vglxkKvlwmVJTziY0IE/TN50xiTaXIVAvgyVQnf/
hn2gAyn2o5+ciP7Od18XhfXIlqcb8+R5Vn2nvyXtLAJP0zouNGtGDUiACAXXVFJ2
gwpP1yD/e0nmqsUMVYdG2GtuLKF1Y0fxtHswQpnHiPKP6N6hwcqmuRhgnN/GRlGS
jmcQWEETw3zEa/CwOiSyJhwVLxx8nHEjxTRnci2P7L9DHiXJTG+isZQ0innHSXV7
kHmv12Bf4pnpyxilpgDfJH7epZYuMWK1cUwDBDzEOvaH3ScHQyxU9rRd8sDYKlZO
28aK9NgT0xo6DTjgcLh+4z6ph5phrH2pRzrdniyCAyP79nDI4wBC3/bj/Q68aCij
q7jiQH5KxKxXNlr06DhNS4nGK0ugok0q1J5GFZtp4RIrktfopkEF8H4rrn2efoxa
vx2NzWi4br54hWbhS0RF
=Vyk2
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0db7489c-30ab-d905-92dd-e749c56bdc7a%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-13 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-05-09 14:54, cooloutac wrote:
> On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong 
> wrote: On 2017-05-08 23:47, cooloutac wrote:
 On Tuesday, May 9, 2017 at 12:47:11 AM UTC-4, cooloutac 
 wrote:
> On Sunday, May 7, 2017 at 12:33:54 PM UTC-4, 
> nick...@kulinacs.com wrote:
>> On May 7, 2017 10:39:22 AM CDT, Andrew David Wong 
>>  wrote:
 On 2017-05-07 10:32, nickl...@kulinacs.com wrote:
> On May 7, 2017 10:23:54 AM CDT, Andrew David Wong 
>  wrote: On 2017-05-07 10:10, 
> nickl...@kulinacs.com wrote:
 What benefit does this have over simply
 ysing qubes-split-gpg-client-wrapper, like
 done here:
 https://github.com/kulinacs/pass-qubes It
 seems like a lot of overhead for not a lot of
 gain.
 
 On May 7, 2017 9:50:26 AM CDT, "Manuel Amador
 (Rudd-O)"  wrote:
> Building on the excellent pass 
> (https://passwordstore.org), it gives me 
> great pleasure to announce the initial 
> release of qubes-pass — an inter-VM 
> password manager and store for Qubes OS.
> 
> Check it out here!
> 
> https://github.com/Rudd-O/qubes-pass
> 
> 
> What are the advantages of either of these over the
> traditional Qubes model of having a normal password
> manager in a vault VM and using the inter-VM
> clipboard to copy/paste passwords out of it?
> 
> 
> I prefer Pass because it uses GPG for encryption, 
> meaning I can manage fewer secrets over all (as it 
> backends into my normal GPG key) and then track my 
> password files in git. To do this with the 
> traditional Keepass method, you either need to
> back up the password database somewhere secure or 
> remember another password for it.
> 
 
 Why not just back up the entire vault with qvm-backup?
 
>> 
>> Git has less storage overhead (as you're backing up a 
>> bunch of text files, not an entire VM), allows proper 
>> versioning, so it is trivial to see your passwords at a 
>> point in time, and can be used cross platform if you 
>> chose to keep your GPG key on another system.
> 
> I just back up the database file. its encrypted.
 
 I don't think backing up the whole vault is a good idea if 
 you don't have to.
 
> 
> Why? No need to encrypt the database file if the whole VM is 
> encrypted. Also, if your database file doesn't use authenticated 
> encryption, that's another thing to worry about. You may also worry
> about file-level metadata leakage.
> 
> 
> the database file is automatically encrypted.  I just feel like 
> vault more likely compromised then the file if something is.  but
> I could be wrong.  plus way less space.
> 

I don't see any basis for that reasoning. The files in an AppVM are
only as safe as the AppVM itself, unless the VM is used only for
storage or something.

If the vault VM is compromised, then the encrypted database file in
the vault is only safe as long as it remains encrypted. An attacker
who can compromise your vault can set a trigger that waits for you to
decrypt the database the next time you want to use it, then grab the
passphrase, decryption key, or the whole decrypted database.

> I think when we have paranoid mode it will be better.
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=oKxB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ef317c14-5796-bba4-19b1-a123abe9d2a1%40qubes-os.org.
For more options, visit 

Re: [qubes-users] Help adding documentation to Qubes Repository

2017-05-13 Thread Zbigniew Łukasiak
This is something I am also struggling with - but shouldn't there be a
sign-off line in all the commit comments as described in
https://www.qubes-os.org/doc/license/ ? And by the way - shouldn't
that be somehow linked (or maybe moved into) from
https://github.com/QubesOS/qubes-doc/blob/master/CONTRIBUTING.md ?

Cheers,
Zbigniew

On Fri, May 12, 2017 at 3:49 AM, Zrubi  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 05/12/2017 09:39 AM, Zrubi wrote:
>> On 05/11/2017 11:51 PM, 'PR' via qubes-users wrote:
>>> Hello,
>>
>>> I need some help understanding how the collaborative
>>> documentation with GitHub works.
>>
>> https://www.qubes-os.org/doc/doc-guidelines/
>>
>> TL;DR: you only missed the create a pull request part.
>>
>>
>
> Or if it is your pull request:
> https://github.com/QubesOS/qubes-doc/pull/418
>
> Then you made it right.
> Now you just have to wait for someone to review and accept it into the
> official doc's
>
>
> - --
> Zrubi
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v2
>
> iQIcBAEBCAAGBQJZFWkXAAoJEH7adOMCkunmdnsP/RDMnkUZLHsYt1FfEOK9tFDM
> 7yhrqJzszYd99zWjJesdvne1ojUUekCA8hcyAfYYz2MbUhVvhGLX95P7Qv/TEgzI
> gREkt3+dAJDgOM/FdW2Jw8PFb60ufQOdnTGyGmP4U0NS6Su1ir2HFKYRkub8lfiw
> SOBgzZ2HDE2whcP9f4HS/JHaoBPjuDpR6VMAjLf2/Rrmx8oupGpGOr4BR9VFDZVG
> ITzdcUBmEZYsAKRnpKW4xAXwxTMZlYmViS4OrDIafYxJJJ1xCUTpEfyKr64JIpMM
> Fdn4MqEcC3bu9FoDxQBQxxlzCpeC+uqXwMKkws/J64Oe9e6o2eol2cPYvBgW0uvs
> 4uBaKz9EvVgkKpVBgiodHTduUVB1c+rsHZ6HiRmOxPxVT0gwOqMk5ymS6h1iPa8Z
> fBW8VZpmWvO7wE8k9VUKF4RUyde8/q5tOkL+cpwblNJ9uxYKmyG+UZd1p8DX97K6
> zLuyvOH4T3GxVZ/CCIT536LE6ArErJ/d2k22lJogIwNec/2iv+P0Z+nhWbrNq1u7
> s6c7Gh9X3/WzltsGC2Ws91BU+FYKxKYBpXq57q6oVQh6WnXa2pq9lLyiIrn9/wxr
> ndPLFHLKO/tI17Dpql4IFV9xdVY8G4SSZFrIe4zjvSgYyabDC1frJieA8u2i83pT
> wN9jb3AwifHWw72J/8f6
> =+nLj
> -END PGP SIGNATURE-
>
> --
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/4eca89c0-b10c-3787-f6ca-6dabfd9d6b32%40zrubi.hu.
> For more options, visit https://groups.google.com/d/optout.



-- 
Zbigniew Lukasiak
http://brudnopis.blogspot.com/
http://perlalchemy.blogspot.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAGL_UUtCozfq%2BOte33h1gPpO-%2BN-xaCkHO09r3%2B%2BK7Jq2AfxeQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VT-d breaks suspend/resume (Lenovo T460)

2017-05-13 Thread Ed

On May 13, 2017 1:54 PM, Myron Weber  wrote:
>
> I had v3.2 installed and running great with VT-d disabled. When I enabled it 
> in the BIOS, everything else seems OK but when the laptop suspends, it will 
> no longer wake up. I have to hold down the power button for a hard power off 
> to restart. 
>
> This is a recent, new install of Qubes OS v. 3.2 on a Lenovo T460. 
>
> Disable/enable of VT-d a couple times and testing the suspend/resume confirms 
> that VT-d is the culprit in this behavior. 
>
> Can anyone provide insight on how to fix or at least begin to diagnose? 
>
> Thanks. 
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group. 
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com. 
> To post to this group, send email to qubes-users@googlegroups.com. 
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/5aab4348-84b4-45b0-99f0-0f69c18580f0%40googlegroups.com.
>  
> For more options, visit https://groups.google.com/d/optout. 

I had the same problem with a lenovo x1 carbon, there are a lot of threads out 
there with this issue, with a lot of fixes (such as update the bios), but for 
me I fixed it by disabling the security module (TPM) in bios.

Ed

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/E1d9cYF-0008P3-Iy%40mailfront10.runbox.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Unable to install Qubes OS 3.2 on Dell Latitude E4310

2017-05-13 Thread taii...@gmx.com

On 02/11/2017 07:58 AM, kevin.allem...@gmail.com wrote:


Hi !

I have some problem to install Qubes OS with USB.
When I boot on USB key with UEFI mode, Qubes OS install freeze after 
initrd.img. I have message like this :
Xen 4.6.1 (c/s) EFI loader
Using configuration file 'Xen.cfg'
vmlinuz : 0x00...
initrd.img : 0x00...
0x00...
0x00...

I try to resolve this problem with solution 1 (add /mapbs /noexitboot) on this 
page : https://www.qubes-os.org/doc/uefi-troubleshooting/ but I have the same 
result.

I try too solution 2 (add -- efi=attr=uc), it's not working but I have a 
different error message :
[Image of pingus]
efi: EFI_MEMMAP is not enable
esrt: ESRT header is not in a memory map.

If I boot my USB key with Legacy bios mode, I have a graphic bug, I can see 
nothing, the screen display distortion.
A bit like that : 
http://image.shutterstock.com/z/stock-photo-colorful-abstract-background-texture-glitches-distortion-on-the-screen-broadcast-digital-tv-433387279.jpg

Anyone has a solution?

Thanks for your help,

K.

Configuration :
Dell Latitude E4310
BIOS A14
Intel i5-520M
Intel Graphics 4500
4Gb memory
SSD 500Go
TPM 1.2


I have one of these laptops, and it works fine.
Have you enabled HVM, IOMMU, TXT, etc?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/05969c1c-ecec-4ed9-2bc1-b9152b43db00%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VT-d breaks suspend/resume (Lenovo T460)

2017-05-13 Thread Myron Weber
I had v3.2 installed and running great with VT-d disabled. When I enabled it in 
the BIOS, everything else seems OK but when the laptop suspends, it will no 
longer wake up. I have to hold down the power button for a hard power off to 
restart. 

This is a recent, new install of Qubes OS v. 3.2 on a Lenovo T460.

Disable/enable of VT-d a couple times and testing the suspend/resume confirms 
that VT-d is the culprit in this behavior.

Can anyone provide insight on how to fix or at least begin to diagnose?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5aab4348-84b4-45b0-99f0-0f69c18580f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Laptop with discrete graphics card, any chance it'll work?

2017-05-13 Thread lokedhs
On Sunday, 14 May 2017 00:50:01 UTC+8, Grzesiek Chodzicki  wrote:
> W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com 
> napisał:
> > I am about to buy a new laptop, and jst about the only requirements I have 
> > is that it should be reasonably small, and that I am able to use the GPU in 
> > it. The latter is because I need to do some development which requires it.
> > 
> > I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware of 
> > the potential security issues with that, but I am willing to accept it if 
> > necessary (i.e. if there is no other solution).
> > 
> > Right now I'm considering buying the Dell XPS 15 laptop which has a 
> > discrete Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd
> > 
> > Would this work? If not, is there another alternate for me? I really want 
> > to be using Qubes on this machine, but if there is no way I can get a GPU 
> > to work, I'm going to have to use a dedicated machine for the GPU work, 
> > which means I have to get two laptops, and I'd rather not do that.
> > 
> > Any ideas?
> 
> 10 series Nvidia GPU's aren't supported by the version of nouveau Qubes ships 
> with.

I'm aware of this, which is why I said that I'm ok with installing Nvidias 
drivers. If I understand you correctly, you're suggesting that this is not an 
option? 

Assuming that Noveau will eventually support it, will it be possible to to 
utilise the GPU in a vm at that time?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/882cd36d-453f-4a01-9b08-ff595d4ef8fa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Laptop with discrete graphics card, any chance it'll work?

2017-05-13 Thread Grzesiek Chodzicki
W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com napisał:
> I am about to buy a new laptop, and jst about the only requirements I have is 
> that it should be reasonably small, and that I am able to use the GPU in it. 
> The latter is because I need to do some development which requires it.
> 
> I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware of 
> the potential security issues with that, but I am willing to accept it if 
> necessary (i.e. if there is no other solution).
> 
> Right now I'm considering buying the Dell XPS 15 laptop which has a discrete 
> Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd
> 
> Would this work? If not, is there another alternate for me? I really want to 
> be using Qubes on this machine, but if there is no way I can get a GPU to 
> work, I'm going to have to use a dedicated machine for the GPU work, which 
> means I have to get two laptops, and I'd rather not do that.
> 
> Any ideas?

10 series Nvidia GPU's aren't supported by the version of nouveau Qubes ships 
with.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6d8f3e11-9dc8-40bc-a340-fada38b56926%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] debian minimal

2017-05-13 Thread u+qbsu
Are these instructions of any help? You basically just follow the
instructions for building Arch.

https://groups.google.com/d/msgid/qubes-users/20170428154944.xt4ggq6xhhd3wxe3%40bestemt.no

-- 
ubestemt

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170513161449.hy6nq7vasvbfhp4u%40bestemt.no.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Upgraded Fedora-23 template to Fedora-25 ... "Houston, we have a problem!"

2017-05-13 Thread Grzesiek Chodzicki
W dniu sobota, 13 maja 2017 13:21:54 UTC+2 użytkownik dev...@gmail.com napisał:
> Ok, for anyone else who makes such a stupid mistake, you can change the 
> templates of all the VM's through the Dom0 command line.  To get the list of 
> properties of a VM, use: 
> 
> qvm-prefs -l 
> 
> Then, change the the template property (not the root_img property) for each 
> of the VM's:
> 
> qvm-prefs -s  template fedora-25
> 
> --
> 
> Now, the only question left - how to remove "Template:fedora-23" from the 
> Applications menu?

 sudo rm /etc/xdg/menus/applications-merged/*

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3a7a2ad6-5e05-4f4a-baf5-8b52cb9105af%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Subject: Errors when trimming VM

2017-05-13 Thread paulstansell
Since posting my question above I found the following
https://groups.google.com/forum/#!topic/qubes-users/23tna6I9gE4

It guided me to a solution which was to run

  rm -rf /var/lib/qubes/appvms/trim-debian-8
  virsh -c xen:/// undefine trim-debian-8
  qvm-trim-template debian-8

This fixes the problem.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b1a97232-62a2-485e-8737-36d4dc109950%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS

2017-05-13 Thread Manuel Amador (Rudd-O)
On 05/12/2017 03:02 PM, Tom Hutchinson wrote:
> Thanks for the contribution Manuel. I'll check it out.

My pleasure :-)

Agreed about the passwords thing!

-- 
Rudd-O
http://rudd-o.com/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2aed9aa-0147-d008-ce2a-64e0d087afe2%40rudd-o.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Laptop with discrete graphics card, any chance it'll work?

2017-05-13 Thread lokedhs
I am about to buy a new laptop, and jst about the only requirements I have is 
that it should be reasonably small, and that I am able to use the GPU in it. 
The latter is because I need to do some development which requires it.

I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware of the 
potential security issues with that, but I am willing to accept it if necessary 
(i.e. if there is no other solution).

Right now I'm considering buying the Dell XPS 15 laptop which has a discrete 
Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd

Would this work? If not, is there another alternate for me? I really want to be 
using Qubes on this machine, but if there is no way I can get a GPU to work, 
I'm going to have to use a dedicated machine for the GPU work, which means I 
have to get two laptops, and I'd rather not do that.

Any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1f4e83e3-1543-4f17-abc8-eaff48e7f660%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] "root=/dev/mapper/dmroot crashed"

2017-05-13 Thread devrana
I'm getting this error in a popup login:

> Oops!

> We're sorry, it looks like root=/dev/mapper/dmroot crashed.
> Please contact the developer if you want to report the issue.

I haven't identified any problems, though. It happened subsequent to this 
mistake and repair: 
https://groups.google.com/forum/#!topic/qubes-users/HP1XyUuXFtc

Any thoughts?

Thanks /D.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/336fd84d-12a7-4fbe-bc0a-be509806814e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: HCL - ASUS UX305FA

2017-05-13 Thread Gregoire Robinson
Got it to work thanks! I'll try to add it to the hardware compatibility
list. I had to do the wireless troubleshooting step of re-loading iwlmvm
firmware that Qubes suggests on their website. Aside from that everything
seems to work properly. It was even easier to configure than Debian.

On Sat, May 13, 2017 at 9:17 AM, Gregoire Robinson <
greg.robinso...@gmail.com> wrote:

> Got it to work thanks! I'll try to add it to the hardware compatibility
> list. I had to do the wireless troubleshooting step of re-loading iwlmvm
> firmware that Qubes suggests on their website. Aside from that everything
> seems to work properly. It was even easier to configure than Debian.
>
> On Sat, May 13, 2017 at 12:49 AM, cooloutac  wrote:
>
>> On Friday, May 12, 2017 at 5:14:01 PM UTC-4, greg.ro...@gmail.com wrote:
>> > On Tuesday, March 7, 2017 at 5:10:14 AM UTC-5, CF wrote:
>> > > On 03/04/2017 11:31 PM, Jane Jok wrote:
>> > > > Hi!
>> > > > Could you please tell more about your experience with Qubes on
>> UX305FA? I am considering ordering a notebook with  M-5Y10c CPU for use
>> with Qubes but I'd like to know more
>> > > >
>> > > > On Tuesday, February 14, 2017 at 9:49:59 AM UTC+3, CF wrote:
>> > > >> Works well. I was able to use a bluetooth external speaker in a
>> > > >> fedora-24 based VM:
>> > > >> sudo dnf install pavucontrol pulseaudio-module-bluetooth bluez
>> blueman
>> > > >> sudo service bluetooth restart
>> > > >> pactl load-module module-bluetooth-driver
>> > > >> blueman-manager &
>> > > >> pavucontrol &
>> > > >
>> > > Hi,
>> > >
>> > > What do you want to do with that notebook?
>> > >
>> > > 4GB of RAM is the minimum system requirement but if you can have more,
>> > > it is better. I have no issue with UX305FA...
>> >
>> > I have an Asus Zenbook UX305CA. Does qubes work for you in terms of
>> wireless, graphics, etc.? How hard is it to use compared with Debian for
>> example? Thanks!
>>
>> see if the wireless work on baremetal fedora 24, if it does should work
>> with qubes too.  Qubes don't use any 3d gpu rendering.  its only used for
>> desktop effects.
>>
>> --
>> You received this message because you are subscribed to a topic in the
>> Google Groups "qubes-users" group.
>> To unsubscribe from this topic, visit https://groups.google.com/d/to
>> pic/qubes-users/dTHePrk3ARc/unsubscribe.
>> To unsubscribe from this group and all its topics, send an email to
>> qubes-users+unsubscr...@googlegroups.com.
>> To post to this group, send email to qubes-users@googlegroups.com.
>> To view this discussion on the web visit https://groups.google.com/d/ms
>> gid/qubes-users/787644ae-e7fd-439d-82af-19d42db75345%40googlegroups.com.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAA_AVTvSV86ot9BtMUR_FOmwCBgSBm8c3Vk1P54-RGbx_oQr%2BQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] debian minimal

2017-05-13 Thread Bernhard
Hello,
I ask again about a debian-8/9-minimal (preferably with coldkernel). I
know there was already a discussion on the subject, but I could not
gather enough information yet to start myself. There is a conf file
debian-8-minimal-3.0.2-201505170018.conf on github. The date "2015" is
not completely re-assuring. Is there a newer one? Even if it were
up-to-date, what do I do with this file? Could someone give me a brief
summary (or give diff's to the well documented archlinux building process)?

Thank you!  Bernhard


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1cccd7ad-008a-6b69-7231-5b3cc092eeb4%40web.de.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Subject: Errors when trimming VM

2017-05-13 Thread paulstansell
Hello,

I have the following error when I try to trim my debian-8 template VM

  qvm-trim-template debian-8
Disk usage before:
6212224 /var/lib/qubes/vm-templates/debian-8/root.img
Creating temporary VM...
Traceback (most recent call last):
  File "/usr/bin/qvm-trim-template", line 172, in 
main()
  File "/usr/bin/qvm-trim-template", line 115, in main
fstrim_vm.create_on_disk()
  File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", 
line 1292, in create_on_disk
self.storage.create_on_disk(verbose, source_template)
  File "/usr/lib64/python2.7/site-packages/qubes/storage/__init__.py", line 
175, in create_on_disk
os.mkdir (self.vmdir)
OSError: [Errno 17] File exists: '/var/lib/qubes/appvms/trim-debian-8'


I tried the following naive solution but it didn't work

  mv /var/lib/qubes/appvms/trim-debian-8  
/var/lib/qubes/appvms/trim-debian-8.old

  qvm-trim-template debian-8
Disk usage before:
6212224 /var/lib/qubes/vm-templates/debian-8/root.img
Creating temporary VM...
Traceback (most recent call last):
  File "/usr/bin/qvm-trim-template", line 172, in 
main()
  File "/usr/bin/qvm-trim-template", line 115, in main
fstrim_vm.create_on_disk()
  File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", 
line 1314, in create_on_disk
self._update_libvirt_domain()
  File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", 
line 761, in _update_libvirt_domain
raise e
libvirt.libvirtError: operation failed: domain 'trim-debian-8' already 
exists with uuid 7f653418-846b-4ddd-b42f-52d800fc478c


I thought about trying to recover a backup qubes.xml from
/var/lib/qubes/backup, but the UUID 7f653418-846b-4ddd-b42f-52d800fc478c
does not appear in any them and I'm not sure which one to use because
I've run updates since.


If I then do 

  rm -rf /var/lib/qubes/appvms/trim-debian-8
  mv /var/lib/qubes/appvms/trim-debian-8.old /var/lib/qubes/appvms/trim-debian-8

I'm back to where I started.


Can anyone please tell me how to fix this problem.

Thanks,

Paul

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e077f192-651f-456e-a537-d42558214975%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Upgraded Fedora-23 template to Fedora-25 ... "Houston, we have a problem!"

2017-05-13 Thread devrana
Ok, for anyone else who makes such a stupid mistake, you can change the 
templates of all the VM's through the Dom0 command line.  To get the list of 
properties of a VM, use: 

qvm-prefs -l 

Then, change the the template property (not the root_img property) for each of 
the VM's:

qvm-prefs -s  template fedora-25

--

Now, the only question left - how to remove "Template:fedora-23" from the 
Applications menu?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/41b8bf6c-b457-4bb9-ac09-d95ff0795ac1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes proposal on StackExchange needs more people involved

2017-05-13 Thread qubesthebest
It's been more than 9 months and yet the Qubes OS proposal
gathered only 109 commits,
https://area51.stackexchange.com/proposals/98519/qubes-os

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/Kk-v-TZ--3-0%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.