Re: [qubes-users] Accessing Android phone photos
Maybe the phone resets its USB connection at that point (as it was unplugged and plugged again), so it appears in sys-usb again. Do you see it here? Workarounds: * Ideally, there would be a way to tell sys-usb not to communicate to the device when it reconnects and to somehow reconnect it as soon as it reappears. AFAIK, there is currently no such option. * You might try to assing it again, but I am unsure if it will work. * Can you set your phone to allow it without asking? This might prevent the reconnects… Regards, Vít Šesták 'v6ak' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0c8156d2-0c92-4c78-b5c2-85f207a85bc5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4 Release Date
If you have issues with recent hardware, but you can install and boot it, you can try installing kernel from unstable repo. This version has resolved my issues. The command from installing is cca: sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable kernel, but I am writing it by heart, so there might be some minor mistakes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/62f1e8ad-4a13-462b-9fc8-011daa145f3c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: "root=/dev/mapper/dmroot crashed"
Hmm. Two devices with the same major:minor numbers? /dev/mapper/dmroot & /dev/dm-0 /dev/mapper/dmroot does not appear in Dom0, nor does any error appear in journalctl. I do find that device in sys-{net,firewall,whonix,usb} and in those cases it always appears as: ls -l /dev/mapper/dmroot brw-rw 1 root disk 251, 0 May 13 20:11 /dev/mapper/dmroot lsblk /dev/xvdc NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT xvdc 202:32 1 11.5G 0 disk ├─xvdc1202:33 11G 0 part [SWAP] └─xvdc2202:34 1 10.5G 0 part └─dmroot 251:00 10G 0 dm / In each of these VM's I find only one error related to dmroot. On a single bootup (but not subsequently) and in all the VM's: May 13 02:56:21 fedora-25 systemd-udevd[7757]: conflicting device node '/dev/mapper/dmroot' found, link to '/dev/dm-0' will not be created In all those VM's I also find: ls -l /dev/dm-0 brw-rw 1 root disk 251, 0 May 13 20:11 /dev/dm-0 Notice the same major:minor numbers as /dev/mapper/dmroot -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a5d3bc0b-62d9-4a32-891e-b729c83d57f4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] VT-d breaks suspend/resume (Lenovo T460)
On Saturday, May 13, 2017 at 12:18:19 PM UTC-7, Ed wrote: > I had the same problem with a lenovo x1 carbon, there are a lot of threads > out there with this issue, with a lot of fixes (such as update the bios), but > for me I fixed it by disabling the security module (TPM) in bios. > > Ed Thanks - that did it for me, too. I guess I can pick any 2 out of 3: (1) suspend/resume, (2) VT-d, and (3) TPM. I'm not using AEM, so TPM loses. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2c360070-4f03-4f90-a1c5-4b6c6d4fa465%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: off topic - invite codes to 'riseup'
sara.m.antichi-re5jqeeqqe8avxtiumw...@public.gmane.org: > Hey guys. I need two codes. If you could PM them to me that would be great! > I have endless codes, but just read the whonix docs, and riseup sounds a bit dubious at this point, if thats ok with you ...please show you perused the whonix thread ? https://forums.whonix.org/t/riseup-net-likely-compromised/3195 i'm not expert but hulahoop's final comment is enough for me, to reconsider, i apologize for offering after having not read through most of the whonix docs https://www.whonix.org/wiki/E-Mail#riseup.net thanks whonix devs and contributers, never knew tor was actually use-able :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d7dc1892-7a4b-5fce-5e43-f7484d07447e%40riseup.net. For more options, visit https://groups.google.com/d/optout.
[qubes-users] method for 2 language input and toggle?
I've tried both in a Fedora AppVM and in dom0 to create a 2nd language input, however the Super+space doesn't change the language in gedit nor libreoffice, after rebooting the AppVM Is this supposed to work ? if so how or what am I not doing correct? I've seen this type of interface in the settings in non qubes linux distros, and otherwise been able to get it to work, fwiw, my keyboard is plugged into a usb->ps2 adapter in the ps2 hole :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d2618b22-23e7-99a3-60d3-a78c058a0421%40riseup.net. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Accessing Android phone photos
On Thursday, May 11, 2017 at 6:20:58 PM UTC-4, Alex wrote: > On 11 May 2017 23:05:42 BST, PRwrote: > > > > Hello Alex, > > > > On 05/11/2017 11:41 PM, Alex wrote: > > > > I'm connecting my Android phone over USB to my Qubes 3.2 host and... > nothing happens. I'm using a Fedora 24 template and a USB Qube. > > I've read the issues on github relating to this but have not found a simple > set of instructions for accessing my phone's files over MTP. What are the > steps? > > > > > I have never attached my Android phone to Qubes before, but tried so > a few minutes ago and could access it without any problems: > > > > 1) attach phone via USB > > > > 2) on the phone, switch from "Charging only" to "USB Data tranfser > (MTP)" > > > > 3) Launch a dom0 Terminal, you should see your phone after entering: > > [user@dom0 ~]$ qvm-usb > > ... > > sys-usb:3-3 04xx:88xx Android_Androidxxx > > ... > > > > 4) mount your phone via sys-usb to your AppVM (I've choosen my > untrusted AppVM in this case): > > [user@dom0 ~]$ qvm-usb -a untrusted > sys-usb:3-3 > > > > 5) Open a File Explorer in this AppVM > > [user@dom0 ~]$ qvm-run untrusted nautilus > > > > 6) you should see your phone as an additional device beneath the > Trash-Icon. > > If not, unmount and remount the phone once: > > [user@dom0 ~]$ qvm-usb -d sys-usb:3-3 > > [user@dom0 ~]$ qvm-usb -a untrusted > sys-usb:3-3 > > > > > > Good luck > > > > - P > > > > > > Hello and thank you for the walkthrough! I do indeed see a "SAMSUNG Android" > in the file manager. As soon as I click on it, my phone prompts me to "Allow > access to device data". As soon as I click "Allow", the icon disappears. VM's > dmesg says: > > vhci_hcd: connection closed > > > > Any ideas how to troubleshoot? This works as expected on a FC25 laptop. > > > > Many thanks, > > > > Alex Works for me using a debian-based sys-usb. once I click allow on the phone i can browse its directories in the file manager. Maybe put your phone in developer mode and then try mtp again. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f67fbfce-c91a-4f9e-85a1-f6c7c119934f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Laptop with discrete graphics card, any chance it'll work?
On Saturday, May 13, 2017 at 1:07:21 PM UTC-4, lok...@gmail.com wrote: > On Sunday, 14 May 2017 00:50:01 UTC+8, Grzesiek Chodzicki wrote: > > W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com > > napisał: > > > I am about to buy a new laptop, and jst about the only requirements I > > > have is that it should be reasonably small, and that I am able to use the > > > GPU in it. The latter is because I need to do some development which > > > requires it. > > > > > > I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware > > > of the potential security issues with that, but I am willing to accept it > > > if necessary (i.e. if there is no other solution). > > > > > > Right now I'm considering buying the Dell XPS 15 laptop which has a > > > discrete Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd > > > > > > Would this work? If not, is there another alternate for me? I really want > > > to be using Qubes on this machine, but if there is no way I can get a GPU > > > to work, I'm going to have to use a dedicated machine for the GPU work, > > > which means I have to get two laptops, and I'd rather not do that. > > > > > > Any ideas? > > > > 10 series Nvidia GPU's aren't supported by the version of nouveau Qubes > > ships with. > > I'm aware of this, which is why I said that I'm ok with installing Nvidias > drivers. If I understand you correctly, you're suggesting that this is not an > option? > > Assuming that Noveau will eventually support it, will it be possible to to > utilise the GPU in a vm at that time? Even if you managed to get the drivers to work if its not supported by noouveau. there is currently no gpu passthrough so only 2s rendering in vms. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6d8376db-509f-4b6b-9944-6b1bcde96b5a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS
On Saturday, May 13, 2017 at 3:50:36 PM UTC-4, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2017-05-09 14:54, cooloutac wrote: > > On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong > > wrote: On 2017-05-08 23:47, cooloutac wrote: > On Tuesday, May 9, 2017 at 12:47:11 AM UTC-4, cooloutac > wrote: > > On Sunday, May 7, 2017 at 12:33:54 PM UTC-4, > > nick...@kulinacs.com wrote: > >> On May 7, 2017 10:39:22 AM CDT, Andrew David Wong > >>wrote: > On 2017-05-07 10:32, nickl...@kulinacs.com wrote: > > On May 7, 2017 10:23:54 AM CDT, Andrew David Wong > > wrote: On 2017-05-07 10:10, > > nickl...@kulinacs.com wrote: > What benefit does this have over simply > ysing qubes-split-gpg-client-wrapper, like > done here: > https://github.com/kulinacs/pass-qubes It > seems like a lot of overhead for not a lot of > gain. > > On May 7, 2017 9:50:26 AM CDT, "Manuel Amador > (Rudd-O)" wrote: > > Building on the excellent pass > > (https://passwordstore.org), it gives me > > great pleasure to announce the initial > > release of qubes-pass — an inter-VM > > password manager and store for Qubes OS. > > > > Check it out here! > > > > https://github.com/Rudd-O/qubes-pass > > > > > > What are the advantages of either of these over the > > traditional Qubes model of having a normal password > > manager in a vault VM and using the inter-VM > > clipboard to copy/paste passwords out of it? > > > > > > I prefer Pass because it uses GPG for encryption, > > meaning I can manage fewer secrets over all (as it > > backends into my normal GPG key) and then track my > > password files in git. To do this with the > > traditional Keepass method, you either need to > > back up the password database somewhere secure or > > remember another password for it. > > > > Why not just back up the entire vault with qvm-backup? > > >> > >> Git has less storage overhead (as you're backing up a > >> bunch of text files, not an entire VM), allows proper > >> versioning, so it is trivial to see your passwords at a > >> point in time, and can be used cross platform if you > >> chose to keep your GPG key on another system. > > > > I just back up the database file. its encrypted. > > I don't think backing up the whole vault is a good idea if > you don't have to. > > > > > Why? No need to encrypt the database file if the whole VM is > > encrypted. Also, if your database file doesn't use authenticated > > encryption, that's another thing to worry about. You may also worry > > about file-level metadata leakage. > > > > > > the database file is automatically encrypted. I just feel like > > vault more likely compromised then the file if something is. but > > I could be wrong. plus way less space. > > > > I don't see any basis for that reasoning. The files in an AppVM are > only as safe as the AppVM itself, unless the VM is used only for > storage or something. > > If the vault VM is compromised, then the encrypted database file in > the vault is only safe as long as it remains encrypted. An attacker > who can compromise your vault can set a trigger that waits for you to > decrypt the database the next time you want to use it, then grab the > passphrase, decryption key, or the whole decrypted database. > > > I think when we have paranoid mode it will be better. > > > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJZF2N9AAoJENtN07w5UDAw8goP/itJWd/QiGchOPYmavzXB+AS > HKycQy2y4lvqHjl1cltPXP0unThvoK8BSgCWdm2wRbj7T/Lc5EG7mtCScXyZP6uc > ouFTMPjyjYECmINWaU/rNEOJRy5XR6q3AcVeObBRZxdst59g9GNtCXAgu47U7WjJ > 8u+9wqEO1PD7Oo+ZlFZ971JMsYluU7uxHwqDYqFabPc+FvkD5hEIBM3tfXvmbJuo > qlhpQpVyudYcgCs8Xtt6e1P1GcSc0pXT03nd7mw8QeMsZq3Ua6x8tOEtAnl93pba > LXWoHEmLGg5BbYbkbXMeZYYTyM+e5f4MN78DkolaqzwD73IVITg+8ctJD+rNSgIB > dJhNeAVtsddyQ+7+3IHxsOSgVvnBANoC2e7iBLkVxd0zqKnT6hdbSNQPfrftIQzV > uATOBVgCy16/xjgOeqPENAbT9ElZfgIyEhN3HPQsOPhM0ASSdSgx+fHNH9RY/dZ7 > aoWbILGJRL52J1R4koumXvbaWSHLo2HAIv1xljstedltDt4jyjDQtRfJ2Zbf7jK1 > hGXZcsUtyZHyZklHyYb8ZiQa6gbGj3KBHQaz91TznTdgIV/G42iL+GFb1jej8TIS > 2mBALx5WL82jo5Nmb/4GJ/5nb3ShBAeOm9YkfctQX0fXd3lweZ7h9i79rAocIrZ9 > o87ju6uck1ri3q3q01Pt > =oKxB > -END PGP SIGNATURE- Because more attack vector. Seems like common sense for me. The whole point of paranoid mode isn't it? As for attacker getting the key to the database file thats
Re: [qubes-users] debian minimal
On Sat, May 13, 2017 at 02:38:18PM +0200, Bernhard wrote: > Hello, > I ask again about a debian-8/9-minimal (preferably with coldkernel). I > know there was already a discussion on the subject, but I could not > gather enough information yet to start myself. There is a conf file > debian-8-minimal-3.0.2-201505170018.conf on github. The date "2015" is > not completely re-assuring. Is there a newer one? Even if it were > up-to-date, what do I do with this file? Could someone give me a brief > summary (or give diff's to the well documented archlinux building process)? > > Thank you! Bernhard > Hello Bernhard I thought that this had been adequately dealt with before. If you want to follow the instructions for archlinux, do so. Step 2 is optional - you do not need a github account. Step 5 is optional - you are able to deselect Fedora23 during setup stage. At step 6, (run ./setup) follow the instructions until the "Builder Plugin Selection" screen - Select builder-debian instead of builder-archlinux. (If you skipped Step5 you will have to leave builder-fedora selected.) At the "Template distribution selection" screen, (deselect fedora-23 if selected), select jessie+minimal. Follow the rest of the instructions. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170513224957.GA23088%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 4 Release Date
On Tuesday, March 7, 2017 at 2:04:18 AM UTC-6, qub...@tutanota.com wrote: > Back in July 16 Joanna announced > (http://qubesos4z6n4.onion/news/2016/07/21/new-hw-certification-for-q4) > that Qubes 4 was due to be released later that year in Sept 16. > Has Qubes 4 been scrapped? Anyone any idea if/when it will be released? > > > -- > > > Securely sent with Tutanota. Claim your encrypted mailbox today! > > > https://tutanota.com I don't see any rush on releasing Qubes, it does after all have as its primary goal security, not release dates. There is, however, a need to enable current hardware to run qubes. It would be great if a 3.2 unstable installer was available to enable kernels which work with current chipsets. Is there anything available like this? Jon -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7bc996e4-d682-4d60-9830-ea8fbce6bb4c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Onion site stuck in redirect loop
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-05-09 15:33, qubenix wrote: > his page (maybe more?): > http://qubesos4z6n4.onion/doc/firewall/ gets stuck in a > redirection loop. > Thank you for reporting this. Tracking: https://github.com/QubesOS/qubes-issues/issues/2807 - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJZF3/5AAoJENtN07w5UDAwdUkP/RbvJ8oyDfWCGBdCI4olZcQ6 IcFAn0Yh6N3nj8luCNjHF4X7S50DEF6JUU2muXiIr73oigetP5qz/YqpHv2Y2vSH YAURnL4bHv9OrF0u9rrQOMn45p1MAx6+N/BoWmv+e/2IwZTSLnlYPP35TWySl5fm MmvYHJii6Xzn8T7G7a3MiLqju/bA6Uzs5hl5xRw1QjRN3EeJ4NQrFAmIpv0d+7Kw 0Z0dQSv5ff0QKO8uCoHvsVRlGWg3ovJwC/TggfPGKFTBv6i53lAmIgXWI6p85kD8 O6u9NwkJTAZB3+HjfOyXUUJNvaki3trnhXxLwy8lk56jAkf4o089uYqDYh7qrVea m7gTdP3+cZkxGuuYJG5Q/M2H7jLfWipIMQot/mXgEFPVpqBSn2V0rcT00Ucs5Ewi TriEBY/obOQqoUEXfClez1z2zC4BdOYKajkSpPkYJY+YWN8R842HaVXVh24KVQtC YWjM+8vmTrh9DCjJfvr3gATaB1uwwDf6mPB8R5M7d247VC8A/nFuUXem4ZUrxR1I AuF+WdW16OeeziIuh6ggJeRlWeXUxSvdagf0+y7CcUR0B1xuePISMQqortM2xtkT udfctziXR9LSRn22nkMGbLeDn4z+cdXzwxZGhPuhoG1sH/PRVjuVzgTDZ3eSJs9P 2Y9tbu9CquFAGJOpWnQn =m56d -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7e5fbf00-c1ee-bff3-5910-e3038ba690de%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] network connection has been disconeccted
Took me a while to come back to this. Removing the interface and adding it again in sys-net did help. Thanks, Rainer > Am 11.03.2017 um 17:51 schrieb Unman: > > On Sat, Mar 11, 2017 at 07:42:23AM -0800, Rainer Hörbe wrote: >> I installed Qubes R3.2 on a Gigabyte Brix and it worked nicely for a couple >> of weeks. Recently id started displaying the notification "Disconnected - >> the network connection has been disconnected" after login. And in fact no IP >> was acquired from the DHCP server. >> >> When I boot from CentOS etc. there is no problem to connect via ethernet. I >> reinstalled Qubes, but the problem remains. I can, however, attache to Wifi. >> >> I looked into various VMs, but the networking concept is quite different to >> plain vanilla linux and I did not find a doc page to troubleshoot the >> problem. >> >> - Rainer >> > > The network connection is controlled in sys-net (assuming that you have > kept the default install). > If you open a terminal there you will find it's just vanilla linux as > far as networking goes. You dont say what the wifi card is,but it's > possible that you need to update your drivers or set a specific > configuration. > Remember to do this in the template that sys-net uses. > > Also, it's very simple to switch the template and see if you have more > success in maintaining a connection using a Debian template. You can > make this change from the Qubes manager, by looking at and changing > qube settings. (You will need to reboot sys-net to start suing the new > Template.) > > Hope this helps > > unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2DF320C6-D959-4822-BB3D-F2E166D9CCEB%40gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Help adding documentation to Qubes Repository
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-05-13 14:27, Zbigniew Łukasiak wrote: > This is something I am also struggling with - but shouldn't there > be a sign-off line in all the commit comments as described in > https://www.qubes-os.org/doc/license/ ? No, that only applies to Qubes OS code. > And by the way - shouldn't that be somehow linked (or maybe moved > into) from > https://github.com/QubesOS/qubes-doc/blob/master/CONTRIBUTING.md ? > It's already linked there. P.S. - Please don't top-post. > > On Fri, May 12, 2017 at 3:49 AM, Zrubiwrote: On > 05/12/2017 09:39 AM, Zrubi wrote: On 05/11/2017 11:51 PM, 'PR' via qubes-users wrote: > Hello, > I need some help understanding how the collaborative > documentation with GitHub works. https://www.qubes-os.org/doc/doc-guidelines/ TL;DR: you only missed the create a pull request part. > > Or if it is your pull request: > https://github.com/QubesOS/qubes-doc/pull/418 > > Then you made it right. Now you just have to wait for someone to > review and accept it into the official doc's > - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJZF2ryAAoJENtN07w5UDAwryIP/j344AB6YXwkrKB/gR5mXCCF 45Drzthugz6ZeK2NYbE5Z7XSSVBkHejOccEHmGAQ3GobsAAG3UHsrtXDaSKRk2B6 +rZ1mR8t9Ur87w3BlCFgkaAyoCsPGZoivwFDPOZC6F09H+c342yNd77HVrhwk6uQ tu6/cm5BhlJVksv7hpsopVLs15/ByNX3jltUAYIx16cY69DwEW0QyQ6PtFvhE/AL cyRWAg/oIbGW3por+BNt2fSyNAITdIm74+8ls9Aytq1Hvj/ieRJnZu7Xoe6ZB9aw o2lfN+urrfMgm3YQ8rgJ12KZEPpQFdpzgXfj6mEeTofRWYlb2ZEk5xXTcJW06/EQ I9422uz8KaX0SNNQVQBzBPw67QoMOX6Ulopg2nJWO/QqEZYNoUA2LYJjOX7DFXyO Npne14BWnLhsa8HVxCcLMn93PMnKz9Fu6BdjFxhbQ8XIpHdkiKkThkwLhj/D3aur fSCPL+XDwhdRDc1RCvvPqq/8EHKtBpGs+m0fVsn33QZmid5WbCQEKMvRGJEjDlMU OlnyNQfbxofwO0t8HRSVEr4BQpmyZxrjz0pIXdd5dJgaNLRr9feiQWEGePxe0MH+ +MPvf4dc35dlyRYVCM8ctHoxfbpJLrroxAgwnO2kuv9B7JNYi9fW0RYskpk1o8Qn 68PPonpwYiTK3fg3MK0d =l6Wr -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/74d3b336-ee1b-5c7a-a69b-5b2d3694e312%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-05-11 20:53, Manuel Amador (Rudd-O) wrote: > On 05/09/2017 07:54 PM, cooloutac wrote: >> On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong >> wrote: >> >> Why? No need to encrypt the database file if the whole VM is >> encrypted. Also, if your database file doesn't use authenticated >> encryption, that's another thing to worry about. You may also >> worry about file-level metadata leakage. >> >>> the database file is automatically encrypted. I just feel like >>> vault > more likely compromised then the file if something is. but I could > be wrong. plus way less space. > > I think when we have paranoid > mode it will be better. > Backing up using anything like > qvm-backup is always going to be much slower — and require the VM > to be off —than any file-level alternative. Plus, if you need to > sync your keyring between different devices, that eliminates the > possibility of using qvm-backup in any efficient way. > I agree that qvm-backup is slower, bigger, and less efficient than file-level backup/syncing methods, but the tradeoffs are pretty reasonable for a lot of use cases. Since I can just start a script and walk away, it doesn't really matter to me whether it takes a few extra minutes while I'm not there. Don't get me wrong, though. I'd love to see a more efficient solution that combines some of the best effects of both (e.g., incremental backup). - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJZF2XJAAoJENtN07w5UDAwUL0P/i9TXn0XxN7U65Y8lmquVo2Y 29iUCeW6sfaXbBBsMmiO+Ptf400QAO4RQa0Yylrg9StROOScsXubbLo1ZBh9alsC ohGxBIDaG0dUsaAqKnlHLBmyieYBZIbZ5qf93PwvldIJG1M8s8dfuvtKQFZa1zrF E4ALvxs0qwkcO4zsXIrom2IwXLU5+DVov2N02qegxr3GBYTQEpq+k+meSNNEbpQi N2CE+LU1oSSK7nI9zITVsICLJ3gROboh/h3EtgqS0BfmXLkHAgZ6EBMvw8KzkodM HzJjRGfLKNo+kmJ/A+vdwfqO8FSKjBiC9cj2+vMrxmPbJYyc56pI7ircOVuTZETX 7COnAXveluyiej3qyXVUwgTaA6a1TAmaUJntEdtS1MWKlJ97nawPrPQFvGlh5IVg yNZE3VphAbwJqyTFNI4ls5VrpVXgQ69lplcZFjWfe1OUqdWkiNwpBFi6yyWsRIq8 ZrBpVkNhlQe9Il2gX0iAsyKjjMgQxRPI50rNQ2EykLOeieRmJVv/cYkd7zOLU1t4 Lc760+odYqNW/ldXd1ndQIdhmlGbxOIc3ripLfklitlQtnYubAC28IYvp5jN30M/ 4N7/N1HILAn8ssK4PTQycTPHNDLATG2wevvsM2K/ULjDHSrdjl2ir+Xn0VATjWXR 3fL65dRUR+U8aUYzCDp6 =3/mC -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/eae91840-9d76-4a38-f923-ff3c5b668e70%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-05-12 06:53, Holger Levsen wrote: > On Sun, May 07, 2017 at 12:23:47PM -0500, Andrew David Wong wrote: >> 1. LUKS passphrase 2. Backup passphrase 3. Screen locker >> passphrase Managing these three allows me to have an arbitrary >> number of additional secrets in VMs without having to remember >> anything else. > > you really dont protect your gpg key with a passphrase?? > See: https://www.qubes-os.org/doc/split-gpg/ > and I assume you dont change the backup passphrase, because it > needs to be high entropy, despite being visible with "ps fax"… > Why is that a problem? It's only visible in dom0. If an attacker is in dom0, it's already game over. Tracked here, BTW: https://github.com/QubesOS/qubes-issues/issues/1582 > I'm really not convinced this is a good setup, though of cause > everything depends on the thread model! :-) > - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJZF2SYAAoJENtN07w5UDAwMf0P/1YRlQPo/C0/eUd1M/ZOjk+c 0niJvtOEQkJoo4QrOZqdJ/9CZa3KUYKlH6ktkzbg4TjrODgqRiffPhtTYmTmfxTL 8CMdD4HWSvXVLt4SEJYuX81NwS0BioHqk0lY5bA9dQCDFdb29O4cUvUX43h1+0Je hQSK4Rcytp8vjelGSPTT9qDzMuVHu6tpUgYIYTwGPS67aeeVvnlT6VY6Q+QfUGr6 +GQWvGkspxTRg3ASml1UtMd4vglxkKvlwmVJTziY0IE/TN50xiTaXIVAvgyVQnf/ hn2gAyn2o5+ciP7Od18XhfXIlqcb8+R5Vn2nvyXtLAJP0zouNGtGDUiACAXXVFJ2 gwpP1yD/e0nmqsUMVYdG2GtuLKF1Y0fxtHswQpnHiPKP6N6hwcqmuRhgnN/GRlGS jmcQWEETw3zEa/CwOiSyJhwVLxx8nHEjxTRnci2P7L9DHiXJTG+isZQ0innHSXV7 kHmv12Bf4pnpyxilpgDfJH7epZYuMWK1cUwDBDzEOvaH3ScHQyxU9rRd8sDYKlZO 28aK9NgT0xo6DTjgcLh+4z6ph5phrH2pRzrdniyCAyP79nDI4wBC3/bj/Q68aCij q7jiQH5KxKxXNlr06DhNS4nGK0ugok0q1J5GFZtp4RIrktfopkEF8H4rrn2efoxa vx2NzWi4br54hWbhS0RF =Vyk2 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0db7489c-30ab-d905-92dd-e749c56bdc7a%40qubes-os.org. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-05-09 14:54, cooloutac wrote: > On Tuesday, May 9, 2017 at 1:40:03 AM UTC-4, Andrew David Wong > wrote: On 2017-05-08 23:47, cooloutac wrote: On Tuesday, May 9, 2017 at 12:47:11 AM UTC-4, cooloutac wrote: > On Sunday, May 7, 2017 at 12:33:54 PM UTC-4, > nick...@kulinacs.com wrote: >> On May 7, 2017 10:39:22 AM CDT, Andrew David Wong >>wrote: On 2017-05-07 10:32, nickl...@kulinacs.com wrote: > On May 7, 2017 10:23:54 AM CDT, Andrew David Wong > wrote: On 2017-05-07 10:10, > nickl...@kulinacs.com wrote: What benefit does this have over simply ysing qubes-split-gpg-client-wrapper, like done here: https://github.com/kulinacs/pass-qubes It seems like a lot of overhead for not a lot of gain. On May 7, 2017 9:50:26 AM CDT, "Manuel Amador (Rudd-O)" wrote: > Building on the excellent pass > (https://passwordstore.org), it gives me > great pleasure to announce the initial > release of qubes-pass — an inter-VM > password manager and store for Qubes OS. > > Check it out here! > > https://github.com/Rudd-O/qubes-pass > > > What are the advantages of either of these over the > traditional Qubes model of having a normal password > manager in a vault VM and using the inter-VM > clipboard to copy/paste passwords out of it? > > > I prefer Pass because it uses GPG for encryption, > meaning I can manage fewer secrets over all (as it > backends into my normal GPG key) and then track my > password files in git. To do this with the > traditional Keepass method, you either need to > back up the password database somewhere secure or > remember another password for it. > Why not just back up the entire vault with qvm-backup? >> >> Git has less storage overhead (as you're backing up a >> bunch of text files, not an entire VM), allows proper >> versioning, so it is trivial to see your passwords at a >> point in time, and can be used cross platform if you >> chose to keep your GPG key on another system. > > I just back up the database file. its encrypted. I don't think backing up the whole vault is a good idea if you don't have to. > > Why? No need to encrypt the database file if the whole VM is > encrypted. Also, if your database file doesn't use authenticated > encryption, that's another thing to worry about. You may also worry > about file-level metadata leakage. > > > the database file is automatically encrypted. I just feel like > vault more likely compromised then the file if something is. but > I could be wrong. plus way less space. > I don't see any basis for that reasoning. The files in an AppVM are only as safe as the AppVM itself, unless the VM is used only for storage or something. If the vault VM is compromised, then the encrypted database file in the vault is only safe as long as it remains encrypted. An attacker who can compromise your vault can set a trigger that waits for you to decrypt the database the next time you want to use it, then grab the passphrase, decryption key, or the whole decrypted database. > I think when we have paranoid mode it will be better. > - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJZF2N9AAoJENtN07w5UDAw8goP/itJWd/QiGchOPYmavzXB+AS HKycQy2y4lvqHjl1cltPXP0unThvoK8BSgCWdm2wRbj7T/Lc5EG7mtCScXyZP6uc ouFTMPjyjYECmINWaU/rNEOJRy5XR6q3AcVeObBRZxdst59g9GNtCXAgu47U7WjJ 8u+9wqEO1PD7Oo+ZlFZ971JMsYluU7uxHwqDYqFabPc+FvkD5hEIBM3tfXvmbJuo qlhpQpVyudYcgCs8Xtt6e1P1GcSc0pXT03nd7mw8QeMsZq3Ua6x8tOEtAnl93pba LXWoHEmLGg5BbYbkbXMeZYYTyM+e5f4MN78DkolaqzwD73IVITg+8ctJD+rNSgIB dJhNeAVtsddyQ+7+3IHxsOSgVvnBANoC2e7iBLkVxd0zqKnT6hdbSNQPfrftIQzV uATOBVgCy16/xjgOeqPENAbT9ElZfgIyEhN3HPQsOPhM0ASSdSgx+fHNH9RY/dZ7 aoWbILGJRL52J1R4koumXvbaWSHLo2HAIv1xljstedltDt4jyjDQtRfJ2Zbf7jK1 hGXZcsUtyZHyZklHyYb8ZiQa6gbGj3KBHQaz91TznTdgIV/G42iL+GFb1jej8TIS 2mBALx5WL82jo5Nmb/4GJ/5nb3ShBAeOm9YkfctQX0fXd3lweZ7h9i79rAocIrZ9 o87ju6uck1ri3q3q01Pt =oKxB -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ef317c14-5796-bba4-19b1-a123abe9d2a1%40qubes-os.org. For more options, visit
Re: [qubes-users] Help adding documentation to Qubes Repository
This is something I am also struggling with - but shouldn't there be a sign-off line in all the commit comments as described in https://www.qubes-os.org/doc/license/ ? And by the way - shouldn't that be somehow linked (or maybe moved into) from https://github.com/QubesOS/qubes-doc/blob/master/CONTRIBUTING.md ? Cheers, Zbigniew On Fri, May 12, 2017 at 3:49 AM, Zrubiwrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 05/12/2017 09:39 AM, Zrubi wrote: >> On 05/11/2017 11:51 PM, 'PR' via qubes-users wrote: >>> Hello, >> >>> I need some help understanding how the collaborative >>> documentation with GitHub works. >> >> https://www.qubes-os.org/doc/doc-guidelines/ >> >> TL;DR: you only missed the create a pull request part. >> >> > > Or if it is your pull request: > https://github.com/QubesOS/qubes-doc/pull/418 > > Then you made it right. > Now you just have to wait for someone to review and accept it into the > official doc's > > > - -- > Zrubi > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQIcBAEBCAAGBQJZFWkXAAoJEH7adOMCkunmdnsP/RDMnkUZLHsYt1FfEOK9tFDM > 7yhrqJzszYd99zWjJesdvne1ojUUekCA8hcyAfYYz2MbUhVvhGLX95P7Qv/TEgzI > gREkt3+dAJDgOM/FdW2Jw8PFb60ufQOdnTGyGmP4U0NS6Su1ir2HFKYRkub8lfiw > SOBgzZ2HDE2whcP9f4HS/JHaoBPjuDpR6VMAjLf2/Rrmx8oupGpGOr4BR9VFDZVG > ITzdcUBmEZYsAKRnpKW4xAXwxTMZlYmViS4OrDIafYxJJJ1xCUTpEfyKr64JIpMM > Fdn4MqEcC3bu9FoDxQBQxxlzCpeC+uqXwMKkws/J64Oe9e6o2eol2cPYvBgW0uvs > 4uBaKz9EvVgkKpVBgiodHTduUVB1c+rsHZ6HiRmOxPxVT0gwOqMk5ymS6h1iPa8Z > fBW8VZpmWvO7wE8k9VUKF4RUyde8/q5tOkL+cpwblNJ9uxYKmyG+UZd1p8DX97K6 > zLuyvOH4T3GxVZ/CCIT536LE6ArErJ/d2k22lJogIwNec/2iv+P0Z+nhWbrNq1u7 > s6c7Gh9X3/WzltsGC2Ws91BU+FYKxKYBpXq57q6oVQh6WnXa2pq9lLyiIrn9/wxr > ndPLFHLKO/tI17Dpql4IFV9xdVY8G4SSZFrIe4zjvSgYyabDC1frJieA8u2i83pT > wN9jb3AwifHWw72J/8f6 > =+nLj > -END PGP SIGNATURE- > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/4eca89c0-b10c-3787-f6ca-6dabfd9d6b32%40zrubi.hu. > For more options, visit https://groups.google.com/d/optout. -- Zbigniew Lukasiak http://brudnopis.blogspot.com/ http://perlalchemy.blogspot.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAGL_UUtCozfq%2BOte33h1gPpO-%2BN-xaCkHO09r3%2B%2BK7Jq2AfxeQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] VT-d breaks suspend/resume (Lenovo T460)
On May 13, 2017 1:54 PM, Myron Weberwrote: > > I had v3.2 installed and running great with VT-d disabled. When I enabled it > in the BIOS, everything else seems OK but when the laptop suspends, it will > no longer wake up. I have to hold down the power button for a hard power off > to restart. > > This is a recent, new install of Qubes OS v. 3.2 on a Lenovo T460. > > Disable/enable of VT-d a couple times and testing the suspend/resume confirms > that VT-d is the culprit in this behavior. > > Can anyone provide insight on how to fix or at least begin to diagnose? > > Thanks. > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To post to this group, send email to qubes-users@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/5aab4348-84b4-45b0-99f0-0f69c18580f0%40googlegroups.com. > > For more options, visit https://groups.google.com/d/optout. I had the same problem with a lenovo x1 carbon, there are a lot of threads out there with this issue, with a lot of fixes (such as update the bios), but for me I fixed it by disabling the security module (TPM) in bios. Ed -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/E1d9cYF-0008P3-Iy%40mailfront10.runbox.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Unable to install Qubes OS 3.2 on Dell Latitude E4310
On 02/11/2017 07:58 AM, kevin.allem...@gmail.com wrote: Hi ! I have some problem to install Qubes OS with USB. When I boot on USB key with UEFI mode, Qubes OS install freeze after initrd.img. I have message like this : Xen 4.6.1 (c/s) EFI loader Using configuration file 'Xen.cfg' vmlinuz : 0x00... initrd.img : 0x00... 0x00... 0x00... I try to resolve this problem with solution 1 (add /mapbs /noexitboot) on this page : https://www.qubes-os.org/doc/uefi-troubleshooting/ but I have the same result. I try too solution 2 (add -- efi=attr=uc), it's not working but I have a different error message : [Image of pingus] efi: EFI_MEMMAP is not enable esrt: ESRT header is not in a memory map. If I boot my USB key with Legacy bios mode, I have a graphic bug, I can see nothing, the screen display distortion. A bit like that : http://image.shutterstock.com/z/stock-photo-colorful-abstract-background-texture-glitches-distortion-on-the-screen-broadcast-digital-tv-433387279.jpg Anyone has a solution? Thanks for your help, K. Configuration : Dell Latitude E4310 BIOS A14 Intel i5-520M Intel Graphics 4500 4Gb memory SSD 500Go TPM 1.2 I have one of these laptops, and it works fine. Have you enabled HVM, IOMMU, TXT, etc? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/05969c1c-ecec-4ed9-2bc1-b9152b43db00%40gmx.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] VT-d breaks suspend/resume (Lenovo T460)
I had v3.2 installed and running great with VT-d disabled. When I enabled it in the BIOS, everything else seems OK but when the laptop suspends, it will no longer wake up. I have to hold down the power button for a hard power off to restart. This is a recent, new install of Qubes OS v. 3.2 on a Lenovo T460. Disable/enable of VT-d a couple times and testing the suspend/resume confirms that VT-d is the culprit in this behavior. Can anyone provide insight on how to fix or at least begin to diagnose? Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5aab4348-84b4-45b0-99f0-0f69c18580f0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Laptop with discrete graphics card, any chance it'll work?
On Sunday, 14 May 2017 00:50:01 UTC+8, Grzesiek Chodzicki wrote: > W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com > napisał: > > I am about to buy a new laptop, and jst about the only requirements I have > > is that it should be reasonably small, and that I am able to use the GPU in > > it. The latter is because I need to do some development which requires it. > > > > I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware of > > the potential security issues with that, but I am willing to accept it if > > necessary (i.e. if there is no other solution). > > > > Right now I'm considering buying the Dell XPS 15 laptop which has a > > discrete Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd > > > > Would this work? If not, is there another alternate for me? I really want > > to be using Qubes on this machine, but if there is no way I can get a GPU > > to work, I'm going to have to use a dedicated machine for the GPU work, > > which means I have to get two laptops, and I'd rather not do that. > > > > Any ideas? > > 10 series Nvidia GPU's aren't supported by the version of nouveau Qubes ships > with. I'm aware of this, which is why I said that I'm ok with installing Nvidias drivers. If I understand you correctly, you're suggesting that this is not an option? Assuming that Noveau will eventually support it, will it be possible to to utilise the GPU in a vm at that time? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/882cd36d-453f-4a01-9b08-ff595d4ef8fa%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Laptop with discrete graphics card, any chance it'll work?
W dniu sobota, 13 maja 2017 15:30:07 UTC+2 użytkownik lok...@gmail.com napisał: > I am about to buy a new laptop, and jst about the only requirements I have is > that it should be reasonably small, and that I am able to use the GPU in it. > The latter is because I need to do some development which requires it. > > I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware of > the potential security issues with that, but I am willing to accept it if > necessary (i.e. if there is no other solution). > > Right now I'm considering buying the Dell XPS 15 laptop which has a discrete > Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd > > Would this work? If not, is there another alternate for me? I really want to > be using Qubes on this machine, but if there is no way I can get a GPU to > work, I'm going to have to use a dedicated machine for the GPU work, which > means I have to get two laptops, and I'd rather not do that. > > Any ideas? 10 series Nvidia GPU's aren't supported by the version of nouveau Qubes ships with. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6d8f3e11-9dc8-40bc-a340-fada38b56926%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] debian minimal
Are these instructions of any help? You basically just follow the instructions for building Arch. https://groups.google.com/d/msgid/qubes-users/20170428154944.xt4ggq6xhhd3wxe3%40bestemt.no -- ubestemt -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170513161449.hy6nq7vasvbfhp4u%40bestemt.no. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Upgraded Fedora-23 template to Fedora-25 ... "Houston, we have a problem!"
W dniu sobota, 13 maja 2017 13:21:54 UTC+2 użytkownik dev...@gmail.com napisał: > Ok, for anyone else who makes such a stupid mistake, you can change the > templates of all the VM's through the Dom0 command line. To get the list of > properties of a VM, use: > > qvm-prefs -l > > Then, change the the template property (not the root_img property) for each > of the VM's: > > qvm-prefs -s template fedora-25 > > -- > > Now, the only question left - how to remove "Template:fedora-23" from the > Applications menu? sudo rm /etc/xdg/menus/applications-merged/* -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3a7a2ad6-5e05-4f4a-baf5-8b52cb9105af%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Subject: Errors when trimming VM
Since posting my question above I found the following https://groups.google.com/forum/#!topic/qubes-users/23tna6I9gE4 It guided me to a solution which was to run rm -rf /var/lib/qubes/appvms/trim-debian-8 virsh -c xen:/// undefine trim-debian-8 qvm-trim-template debian-8 This fixes the problem. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b1a97232-62a2-485e-8737-36d4dc109950%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] ANN: qubes-pass — an inter-VM password manager and store for Qubes OS
On 05/12/2017 03:02 PM, Tom Hutchinson wrote: > Thanks for the contribution Manuel. I'll check it out. My pleasure :-) Agreed about the passwords thing! -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b2aed9aa-0147-d008-ce2a-64e0d087afe2%40rudd-o.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Laptop with discrete graphics card, any chance it'll work?
I am about to buy a new laptop, and jst about the only requirements I have is that it should be reasonably small, and that I am able to use the GPU in it. The latter is because I need to do some development which requires it. I am OK with installing Nvidia's proprietary drivers on dom0. I'm aware of the potential security issues with that, but I am willing to accept it if necessary (i.e. if there is no other solution). Right now I'm considering buying the Dell XPS 15 laptop which has a discrete Nvidia 1050 card: http://www.dell.com/sg/p/xps-15-9560-laptop/pd Would this work? If not, is there another alternate for me? I really want to be using Qubes on this machine, but if there is no way I can get a GPU to work, I'm going to have to use a dedicated machine for the GPU work, which means I have to get two laptops, and I'd rather not do that. Any ideas? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1f4e83e3-1543-4f17-abc8-eaff48e7f660%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] "root=/dev/mapper/dmroot crashed"
I'm getting this error in a popup login: > Oops! > We're sorry, it looks like root=/dev/mapper/dmroot crashed. > Please contact the developer if you want to report the issue. I haven't identified any problems, though. It happened subsequent to this mistake and repair: https://groups.google.com/forum/#!topic/qubes-users/HP1XyUuXFtc Any thoughts? Thanks /D. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/336fd84d-12a7-4fbe-bc0a-be509806814e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: HCL - ASUS UX305FA
Got it to work thanks! I'll try to add it to the hardware compatibility list. I had to do the wireless troubleshooting step of re-loading iwlmvm firmware that Qubes suggests on their website. Aside from that everything seems to work properly. It was even easier to configure than Debian. On Sat, May 13, 2017 at 9:17 AM, Gregoire Robinson < greg.robinso...@gmail.com> wrote: > Got it to work thanks! I'll try to add it to the hardware compatibility > list. I had to do the wireless troubleshooting step of re-loading iwlmvm > firmware that Qubes suggests on their website. Aside from that everything > seems to work properly. It was even easier to configure than Debian. > > On Sat, May 13, 2017 at 12:49 AM, cooloutacwrote: > >> On Friday, May 12, 2017 at 5:14:01 PM UTC-4, greg.ro...@gmail.com wrote: >> > On Tuesday, March 7, 2017 at 5:10:14 AM UTC-5, CF wrote: >> > > On 03/04/2017 11:31 PM, Jane Jok wrote: >> > > > Hi! >> > > > Could you please tell more about your experience with Qubes on >> UX305FA? I am considering ordering a notebook with M-5Y10c CPU for use >> with Qubes but I'd like to know more >> > > > >> > > > On Tuesday, February 14, 2017 at 9:49:59 AM UTC+3, CF wrote: >> > > >> Works well. I was able to use a bluetooth external speaker in a >> > > >> fedora-24 based VM: >> > > >> sudo dnf install pavucontrol pulseaudio-module-bluetooth bluez >> blueman >> > > >> sudo service bluetooth restart >> > > >> pactl load-module module-bluetooth-driver >> > > >> blueman-manager & >> > > >> pavucontrol & >> > > > >> > > Hi, >> > > >> > > What do you want to do with that notebook? >> > > >> > > 4GB of RAM is the minimum system requirement but if you can have more, >> > > it is better. I have no issue with UX305FA... >> > >> > I have an Asus Zenbook UX305CA. Does qubes work for you in terms of >> wireless, graphics, etc.? How hard is it to use compared with Debian for >> example? Thanks! >> >> see if the wireless work on baremetal fedora 24, if it does should work >> with qubes too. Qubes don't use any 3d gpu rendering. its only used for >> desktop effects. >> >> -- >> You received this message because you are subscribed to a topic in the >> Google Groups "qubes-users" group. >> To unsubscribe from this topic, visit https://groups.google.com/d/to >> pic/qubes-users/dTHePrk3ARc/unsubscribe. >> To unsubscribe from this group and all its topics, send an email to >> qubes-users+unsubscr...@googlegroups.com. >> To post to this group, send email to qubes-users@googlegroups.com. >> To view this discussion on the web visit https://groups.google.com/d/ms >> gid/qubes-users/787644ae-e7fd-439d-82af-19d42db75345%40googlegroups.com. >> For more options, visit https://groups.google.com/d/optout. >> > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAA_AVTvSV86ot9BtMUR_FOmwCBgSBm8c3Vk1P54-RGbx_oQr%2BQ%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] debian minimal
Hello, I ask again about a debian-8/9-minimal (preferably with coldkernel). I know there was already a discussion on the subject, but I could not gather enough information yet to start myself. There is a conf file debian-8-minimal-3.0.2-201505170018.conf on github. The date "2015" is not completely re-assuring. Is there a newer one? Even if it were up-to-date, what do I do with this file? Could someone give me a brief summary (or give diff's to the well documented archlinux building process)? Thank you! Bernhard -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1cccd7ad-008a-6b69-7231-5b3cc092eeb4%40web.de. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Subject: Errors when trimming VM
Hello, I have the following error when I try to trim my debian-8 template VM qvm-trim-template debian-8 Disk usage before: 6212224 /var/lib/qubes/vm-templates/debian-8/root.img Creating temporary VM... Traceback (most recent call last): File "/usr/bin/qvm-trim-template", line 172, in main() File "/usr/bin/qvm-trim-template", line 115, in main fstrim_vm.create_on_disk() File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", line 1292, in create_on_disk self.storage.create_on_disk(verbose, source_template) File "/usr/lib64/python2.7/site-packages/qubes/storage/__init__.py", line 175, in create_on_disk os.mkdir (self.vmdir) OSError: [Errno 17] File exists: '/var/lib/qubes/appvms/trim-debian-8' I tried the following naive solution but it didn't work mv /var/lib/qubes/appvms/trim-debian-8 /var/lib/qubes/appvms/trim-debian-8.old qvm-trim-template debian-8 Disk usage before: 6212224 /var/lib/qubes/vm-templates/debian-8/root.img Creating temporary VM... Traceback (most recent call last): File "/usr/bin/qvm-trim-template", line 172, in main() File "/usr/bin/qvm-trim-template", line 115, in main fstrim_vm.create_on_disk() File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", line 1314, in create_on_disk self._update_libvirt_domain() File "/usr/lib64/python2.7/site-packages/qubes/modules/000QubesVm.py", line 761, in _update_libvirt_domain raise e libvirt.libvirtError: operation failed: domain 'trim-debian-8' already exists with uuid 7f653418-846b-4ddd-b42f-52d800fc478c I thought about trying to recover a backup qubes.xml from /var/lib/qubes/backup, but the UUID 7f653418-846b-4ddd-b42f-52d800fc478c does not appear in any them and I'm not sure which one to use because I've run updates since. If I then do rm -rf /var/lib/qubes/appvms/trim-debian-8 mv /var/lib/qubes/appvms/trim-debian-8.old /var/lib/qubes/appvms/trim-debian-8 I'm back to where I started. Can anyone please tell me how to fix this problem. Thanks, Paul -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e077f192-651f-456e-a537-d42558214975%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Upgraded Fedora-23 template to Fedora-25 ... "Houston, we have a problem!"
Ok, for anyone else who makes such a stupid mistake, you can change the templates of all the VM's through the Dom0 command line. To get the list of properties of a VM, use: qvm-prefs -l Then, change the the template property (not the root_img property) for each of the VM's: qvm-prefs -s template fedora-25 -- Now, the only question left - how to remove "Template:fedora-23" from the Applications menu? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/41b8bf6c-b457-4bb9-ac09-d95ff0795ac1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes proposal on StackExchange needs more people involved
It's been more than 9 months and yet the Qubes OS proposal gathered only 109 commits, https://area51.stackexchange.com/proposals/98519/qubes-os -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/Kk-v-TZ--3-0%40tutanota.com. For more options, visit https://groups.google.com/d/optout.