[qubes-users] Re: Qubes 4.0 rc 1 connecting USB drive to hvm

2017-08-23 Thread jamesreeves
I just wanted to add a little more info.

The sys-usb seems to work (mostly) as expected.

I am able to insert a micro USB card and bridge the device to a HVM and it will 
recognize the mmcblk device.

The device I am trying to use (which fails) is LVM partitioned device.  Maybe 
this is part of the issue?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9c0fbeb3-e632-40d9-ad2b-4ced8294fb4a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Network Manager: 'Device not ready' after suspend.

2017-08-23 Thread Reg Tiangha
On 2017-08-23 3:08 PM, Andrew Morgan wrote:
> I tried that kernel on sys-net with no change yes, but dom0's kernel has
> not changed.
> 
> Would it perhaps be an issue with xen's PCI passthrough functionality?
> Could it be left in a broken state after a suspend and thus sys-net is
> not able to have proper access to the network device?
> 
> Thanks for helping with testing and debugging.
> 
> Andrew Morgan
> 


Have you guys tried blacklisting your wireless driver modules as per
these instructions here:

https://www.qubes-os.org/doc/wireless-troubleshooting/#automatically-reloading-drivers-on-suspendresume

The people who have been experiencing the same issues say that this
workaround works.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/onlfpa%24jsj%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unofficial forward-ported grsec 4.9 Qubes kernel branch

2017-08-23 Thread Reg Tiangha
On 2017-08-23 9:01 AM, nicholas roveda wrote:
> I'm trying to build your port, but I,ve actually had to to some changes to 
> `kernel.spec` because the script exits with an error at line 136: 
> `%_sourcedir/check-for-config-changes .config.orig .config`.
> 

Actually, if you mean that 'make rpms' fails by default, that's
intentional. It's because there isn't a 'config' file in the main repo
directory like there is in the other kernel branches.

The grsecurity kernel options include separate settings for 'host' and
'guest' depending on where the kernel is to be used. So for dom0, you
would configure a 'host' grsec kernel, and for a vm you'd configure a
'guest' grsec kernel.

With that in mind, there are two config files in the repo, config-guest
and config-host, with the only difference between the two is that single
option for host vs guest. It's not intuitive, but what you need to do is
copy one of those to be the main 'config' file for the repo before
running 'make rpms'

That said, I can't exactly tell *what* effect using one or the other has
on the kernel. No other kernel options change, so I don't know what it
does behind the scenes. Furthermore, running either kernel the other way
(ex. using a kernel configured to be a host kernel as a vm kernel
instead) seems to work fine. So at the end of the day, I suppose it
doesn't matter what configuration you use...?

The way I do it for my machine is I compile two kernels, using the
config-host file for my dom0 kernel, and the config-guest file for my
VMs. You can do this by installing the kernel rpm with the host
configuration, and the kernel-qubes-vm rpm with the guest configuration.
Or you can also change the rel number on the second compile to something
different and you can install both sets of packages at the same time
(although you may need to run rpm -ivh --force). "Many paths up a mountain."

So try reverting the check-for-config-changes script back to the way it
was and copying one of the kernel config files already included in the
repo to be the main 'config' file and run 'make rpms' and it should work
fine.

If you want to customize the config file, delete the 'config' file, run
'make rpms' and wait for the patching to complete (the process will also
stop when it can't find a 'config' file). Then copy the config file you
want to customize to the kernel-4.9.XX/linux-4.9.XX directory and name
it .config and then run 'make menuconfig' to go through the interface.
When done, copy back the new .config file to the root directory,
renaming it back to 'config' and then run 'make rpms'

Hope that helps!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/onlceu%24cdv%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] XSA-235 does not affect the security of Qubes OS

2017-08-23 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

The Xen Project has published Xen Security Advisory 235 (XSA-235).
This XSA does *not* affect the security of Qubes OS, and no user
action is necessary.

This XSA has been added to the XSA Tracker:

https://www.qubes-os.org/security/xsa/#235

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=ivJC
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6808a1b4-3b0c-de10-f879-ecb5e82d2cba%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 rc 1 connecting USB drive to hvm

2017-08-23 Thread jamesreeves
Greetings.

I recently installed Qubes 4.0 and am enjoying it.  I realize that it is not 
yet complete and may have issues.

I have familiarized myself with the USB device management interface and it 
generally works just fine.  

I have noticed that there seems to be issues when I connect a SATA HDD over USB 
using a USB3.0 to SATA adapter cable (not sure if adapter cable makes a 
difference but worth mentioning).

When running command [qvm-block list] the block device is found in dom0.

When using the sys-usb hvm icon in the upper right corner of GUI to bridge the 
usb device to HVM, the HVM fails to recognize that any block devices have been 
attached.

when using [qvm-block attach hvm-name dom0:sdx] I get an error similar to 
[qvm-block error: dom0 does not expose usb device].

Can anyone suggest any alternative methods I could try to use my USB drive 
within an hvm?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c474b911-7269-46b9-a4e0-fbff3d73ff16%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 rc1

2017-08-23 Thread jamesreeves

Greetings.

I recently installed Qubes 4.0 and am enjoying it.  I realize that it is 
not yet complete and may have issues.


I have familiarized myself with the USB device management interface and 
it generally works fine.  I have noticed that there seems to be issues 
when I connect a SATA HDD over USB using a USB3.0 to SATA adapter cable.


When running command [qvm-block list] the block device is found in dom0.

When using the sys-usb hvm icon in the upper right corner of GUI to 
bridge the usb device to HVM, the HVM fails to recognize that any block 
devices have been attached.


when using [qvm-block attach hvm-name dom0:sdx] I get an error similar 
to [qvm-block error: dom0 does not expose usb device].


Can anyone suggest any alternative methods I could try to use my USB 
drive within an hvm?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0eec31dd5230a2f9fcba617961c03489%40cock.li.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Problem connecting via VPN ProxyVM (VPN works, but AppVM can't connect)

2017-08-23 Thread 'PhR' via qubes-users

Hello Chris,

On 08/22/2017 05:37 PM, Chris Laprise wrote:

Working with OpenConnect would be great.


There is also a GUI part that needs to be installed: 
NetworkManager-openconnect-gnome in Fedora.

I tried all hints you have given, but nothing seems to work.
At least I was able to get a fedora-25 based proxy VM up and running and 
my work AppVm could connect through the proxy (without any VPN involved)


I've decided to try to setup AnyConnect from within my Work AppVM and 
use openconnect-gnome to connect to our Cisco ASA.


I have therof created a new template based on a fedora 25 clone and made 
sure that NetworkManager-openconnect-gnome is installed in the template.


But if I start the AppVM and start Network Manager I can open the Create 
new VPN window but all options are still greyed out - can someone 
reproduce this problem on Qubes 3.2


- Launch Network Connections from the App Menu
- Right Click > Edit Connections
- Add
- Connection Type = VPN
- Cisco AnyConnect Compatible VPN (openconnect)
- Create
- all options are greyed out in the next Screen

Any options how to make this work?

Finally, I should mention leak prevention measures. If you are able to 
get the VPN to function with proxyVM + appVMs, you can then add these 
commands in proxyVM to prevent appVMs from having non-VPN access:


iptables -I FORWARD -o eth0 -j DROP
iptables -I FORWARD -i eth0 -j DROP

These need to show up at the _top_ of the FORWARD chain, which is why 
'-I' insert is used; You can ensure they'll be at the top by executing 
them last after a connection is made (probably from 
/rw/config/qubes-firewall-user-script).

I'll try to get VPN up and running first, then I can harden it.

- PhR

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c250aa2e-73c1-3e1e-4fae-1f09329791a0%40googlemail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] nice to have WiFi Bandwithe

2017-08-23 Thread QubesOS-ML

hello
would be nice to have in the top bar not only the signal of the wifi but 
also a information about the bandwith used on wifi (like on a MacBook)

have a nice day
vinc

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e1791b5e6760c1839b79b1edef1bb78e%40kozo.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes-R4.0-rc1-x86_64 how to Install a Browser

2017-08-23 Thread QubesOS-ML

Hello
after rebooting the Qubes OS Laptop and restarting with
qvm-start fedora-25

i got a error
b' Snapshot origin LV vm-fedora25-privat not found Volume group 
qubes_dom0 .\n


have a nice day
vinc

Am 2017-08-23 22:18, schrieb Yethal:
W dniu środa, 23 sierpnia 2017 22:17:15 UTC+2 użytkownik QubesOS-ML 
napisał:

if i click on template: fedora-25 --> Start
just nothing happen ;-)

Am 2017-08-22 22:16, schrieb Yethal:
> W dniu wtorek, 22 sierpnia 2017 19:59:39 UTC+2 użytkownik QubesOS-ML
> napisał:
>> hello
>> maybe a strange question, but how do i install a Webbroser?
>> have a nice day
>> vinc
>
> Fedora 25 template should come with Firefox preinstalled.


try starting it from the terminal
qvm-start fedora-25


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5d0bbe641adfd4d45725cd778d2a92e3%40kozo.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Network Manager: 'Device not ready' after suspend.

2017-08-23 Thread Andrew Morgan
I tried that kernel on sys-net with no change yes, but dom0's kernel has not 
changed.

Would it perhaps be an issue with xen's PCI passthrough functionality? Could it 
be left in a broken state after a suspend and thus sys-net is not able to have 
proper access to the network device?

Thanks for helping with testing and debugging.

Andrew Morgan

On August 23, 2017 2:02:36 PM PDT, djeff...@linuxfoundation.org wrote:
>On Wednesday, August 23, 2017 at 2:38:11 PM UTC-6, Andrew Morgan wrote:
>> I did perform a dom0 update a few days ago, but I think this behavior
>only started after restarting Qubes fully.
>> 
>> 
>> 
>> Do you have security-testing enabled in dom0? Perhaps it is an issue
>with an unstable kernel/xen version.
>> 
>I have been exploring that possibility. Right now I'm back at
>4.9.35-19.pvops.qubes.x86_64 and seeing the same issue. You said you
>rolled back to 4.4.67-13 and were still seeing it, though, right? That
>has me wanting to look closer at any qubes-specific changes that may
>have been in the last update. I've been seeing this happen on 3 out of
>4 identical-hardware systems and trying to figure out why the 4th one
>is fine.
>
>Right now I'm trying to chase down the freezing issues I'm getting on
>one system, which seem to be a different problem and not something I'm
>seeing on any of the other identical hardware, but I'll look into the
>update notes after that.
>
>Dan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/B79CD505-D729-43E7-A768-3C4699B67C11%40amorgan.xyz.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Network Manager: 'Device not ready' after suspend.

2017-08-23 Thread djeffery
On Wednesday, August 23, 2017 at 2:38:11 PM UTC-6, Andrew Morgan wrote:
> I did perform a dom0 update a few days ago, but I think this behavior only 
> started after restarting Qubes fully.
> 
> 
> 
> Do you have security-testing enabled in dom0? Perhaps it is an issue with an 
> unstable kernel/xen version.
> 
I have been exploring that possibility. Right now I'm back at 
4.9.35-19.pvops.qubes.x86_64 and seeing the same issue. You said you rolled 
back to 4.4.67-13 and were still seeing it, though, right? That has me wanting 
to look closer at any qubes-specific changes that may have been in the last 
update. I've been seeing this happen on 3 out of 4 identical-hardware systems 
and trying to figure out why the 4th one is fine.

Right now I'm trying to chase down the freezing issues I'm getting on one 
system, which seem to be a different problem and not something I'm seeing on 
any of the other identical hardware, but I'll look into the update notes after 
that.

Dan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9a7bb5e-0c0b-4497-b359-3347495c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes-R4.0-rc1-x86_64 how to Install a Browser

2017-08-23 Thread QubesOS-ML

Hello
thanks for the fast feedback, i have done it - a Terminal startet and 
the system startet running - but after a while it was finish without a 
windows did open.
After a second/third time of entering the command nothing happens 
again...


Am 2017-08-23 22:18, schrieb Yethal:
W dniu środa, 23 sierpnia 2017 22:17:15 UTC+2 użytkownik QubesOS-ML 
napisał:

if i click on template: fedora-25 --> Start
just nothing happen ;-)

Am 2017-08-22 22:16, schrieb Yethal:
> W dniu wtorek, 22 sierpnia 2017 19:59:39 UTC+2 użytkownik QubesOS-ML
> napisał:
>> hello
>> maybe a strange question, but how do i install a Webbroser?
>> have a nice day
>> vinc
>
> Fedora 25 template should come with Firefox preinstalled.


try starting it from the terminal
qvm-start fedora-25


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4cb7b52b767a6c43269ea38dc2d74599%40kozo.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Network Manager: 'Device not ready' after suspend.

2017-08-23 Thread Andrew Morgan
I did perform a dom0 update a few days ago, but I think this behavior only 
started after restarting Qubes fully.

Do you have security-testing enabled in dom0? Perhaps it is an issue with an 
unstable kernel/xen version.

Andrew Morgan

On August 23, 2017 11:00:56 AM PDT, djeff...@linuxfoundation.org wrote:
>> As of late (past couple days), I have been unable to connect to WiFi
>> networks without a full shutdown and restart of sys-net. After every
>> time I suspend the computer I get the message that my WiFi card says
>> 'device not ready', and it is unable to scan for WiFi networks.
>> Restarting NetworkManager.service does not fix the issue.
>> 
>> Looking at dmesg, it seems to be some problem relating to Intel
>> micro-code? I am using an Intel WiFi card (Intel 7260 rev bb)
>> 
>I'm fighting the same problem at the moment (along with some random
>freezing) that seems to have started with the last dom0 update. Does
>that seem to correlate with the time you saw this behavior start?
>
>I'm running an Intel 7265 rev 59.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/BC45DCD6-F428-4432-97F7-E2F7F78261A2%40amorgan.xyz.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] python3-dnf-plugins-qubes-hooks-3.2.18-1.fc23.x86_64: checksum doesn't match

2017-08-23 Thread Pete Howell
Running a fresh install of Qubes-R3.2, and when doing an FC23 update, all the 
packages download until you get to 
python3-dnf-plugins-qubes-hooks-3.2.18-1.fc23.x86_64, which fails with a 
checksum doesn't match error.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3e2af2c4-332c-4d40-bbb6-66bdde6338b8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes-R4.0-rc1-x86_64 how to Install a Browser

2017-08-23 Thread Yethal
W dniu środa, 23 sierpnia 2017 22:17:15 UTC+2 użytkownik QubesOS-ML napisał:
> if i click on template: fedora-25 --> Start
> just nothing happen ;-)
> 
> Am 2017-08-22 22:16, schrieb Yethal:
> > W dniu wtorek, 22 sierpnia 2017 19:59:39 UTC+2 użytkownik QubesOS-ML 
> > napisał:
> >> hello
> >> maybe a strange question, but how do i install a Webbroser?
> >> have a nice day
> >> vinc
> > 
> > Fedora 25 template should come with Firefox preinstalled.

try starting it from the terminal
qvm-start fedora-25

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d69e9b5-cf56-4430-9261-417b873e1b30%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes-R4.0-rc1-x86_64 how to Install a Browser

2017-08-23 Thread QubesOS-ML

if i click on template: fedora-25 --> Start
just nothing happen ;-)

Am 2017-08-22 22:16, schrieb Yethal:
W dniu wtorek, 22 sierpnia 2017 19:59:39 UTC+2 użytkownik QubesOS-ML 
napisał:

hello
maybe a strange question, but how do i install a Webbroser?
have a nice day
vinc


Fedora 25 template should come with Firefox preinstalled.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/129711d3c9a161d81b653d3e4c7e7168%40kozo.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Windows 10?

2017-08-23 Thread Pete Howell
I tried to pull from the testing repository with the following:

> qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools

It lists version 3.2.2-3 as available, but downloaded failed -- "All mirrors 
were tried".

How can one get the test version?

On Saturday, September 17, 2016 at 1:55:58 AM UTC-6, Pawel Debski wrote:
> Folks,
> 
> I have Qubes 3.2 up, updated &
> running like a charm. Now the Microsoft challenge. The doc @
> https://www.qubes-os.org/doc/windows-appvms/ instructs to use
> Windows 7. Do you suggest to stick with version 7 or go ahead to
> 10 / 8?
> 
>   
> 
> -- 
> 
>   
> 
> Z powazaniem / Best Regards
> 
> Mit freundlichen Gruessen / Meilleures salutations
> 
> Pawel Debski

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/497fb2ae-1927-455c-938d-bfcd31f77224%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL Dell Latitude 7480 + dock usb-c problems (dell wd15)

2017-08-23 Thread Sean Dilda
I spent a while fighting with this myself with the same dock.  Turns out
the dock adds USB and ethernet support via PCI hot adding some new PCI
devices.  The Qubes kernel has also disabled PCI hot add disabled in order
to block some attack vectors.

Everything on the dock should work if you turn on the the laptop with the
dock plugged in.  This isn't great though.  I did this and assigned the new
USB controller to my sys-usb VM.  Later on I rebooted the laptop and
sys-usb wouldn't start up because it couldn't find one of the PCI devices
that was supposed to be passed through to it.

I'd love a better way to work with these docks and qubes, but I don't know
of one right now.

On Sun, Aug 20, 2017 at 7:17 AM cyrinux  wrote:

> Hi,
>
> I have successfully install qubes-os 3.2 and 4.0 on this new laptop, I
> must build hid_alps for get the touchpad working.
>
> All was almost good but, the big big problem, is i can't working with the
> dock.
>
> I don't find how to play correctly with
>
>
> http://www.dell.com/en-us/shop/dell-dock-wd15-with-180w-adapter/apd/450-aeuo/pc-accessories
>
> * display output are working,
> * the network and usb are NOT working, i can't attach them to  the
> sys-usb/sys-net VM,
> is see sort of 4 "bridges" in devices list, i suppose for usb and network
> but this is not clear. If I valid the form after enable those bridge, i get
> an error.
>
> Somebody allready get working a such device? Thanks for your help.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/0a5c568a-8abc-410f-a9f6-4a07f4fd8906%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAKZBO1_mQ8LauxySFLVHK3N7D2cadu2%3DgECgiGC117%3Dwxo_S7w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-devel] Re: Announcement: Recommended Fedora 25 TemplateVM Upgrade for Qubes 3.2

2017-08-23 Thread Lorenzo Lamas
On Saturday, August 5, 2017 at 1:26:51 AM UTC+2, Michael Carbone wrote:
> Lorenzo Lamas:
> > Because Fedora 25 has a newer version of NetworkManager, can the same
> > method for MAC randomization for Debian now be used for Fedora
> > instead of using macchanger as described here? 
> > https://www.qubes-os.org/doc/anonymizing-your-mac-address/
> 
> yes that is correct. I have just submitted a pull request to update that
> doc to reflect that fact:
> 
> https://github.com/QubesOS/qubes-doc/pull/452
> 
> -- 
> Michael Carbone
> 
> Qubes OS | https://www.qubes-os.org
> @QubesOS 
> 
> PGP fingerprint: D3D8 BEBF ECE8 91AC 46A7 30DE 63FC 4D26 84A7 33B4

THanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e5d78193-4827-4724-b986-186088bf8e0b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Security Bulletin #32: Xen hypervisor and Linux kernel vulnerabilities (XSA-226 through XSA-230)

2017-08-23 Thread Lorenzo Lamas
Is it necessary to install corresponding Xen packages in TemplateVM's from the 
security-testing repository for VM's?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3f6e7c5f-07dc-4c78-8f55-6ea4c5b515d5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Network Manager: 'Device not ready' after suspend.

2017-08-23 Thread djeffery
> As of late (past couple days), I have been unable to connect to WiFi
> networks without a full shutdown and restart of sys-net. After every
> time I suspend the computer I get the message that my WiFi card says
> 'device not ready', and it is unable to scan for WiFi networks.
> Restarting NetworkManager.service does not fix the issue.
> 
> Looking at dmesg, it seems to be some problem relating to Intel
> micro-code? I am using an Intel WiFi card (Intel 7260 rev bb)
> 
I'm fighting the same problem at the moment (along with some random freezing) 
that seems to have started with the last dom0 update. Does that seem to 
correlate with the time you saw this behavior start?

I'm running an Intel 7265 rev 59.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/52e8797c-a381-45df-aadc-5b18848ee6db%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Suggestions for video card

2017-08-23 Thread taii...@gmx.com
You're going to want AMD, they release officially supported linux 
drivers that are almost open source and they are cool with 
virtualization on their gamer cards.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ad20ff5-9c6c-cd50-4b79-36f10a76f01b%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Audio broken in R4.0 rc1 / qvm-run fails to start AppVM

2017-08-23 Thread Yethal
W dniu środa, 23 sierpnia 2017 17:08:17 UTC+2 użytkownik nicholas roveda 
napisał:
> I've used Qubes 3.2 and everythings there worked fine, but now I'm trying 
> R4.0 rc1 and I can't figure out why the sound doesn't work.
> 
> `qvm-pci` reports 2 Intel Audio Devices (00:03.0  and 00:1b.0), so I've tried 
> to attach them to an base AppVm, such personal and start it with `qvm-run`, 
> but it returns:
> "Start failed: internal error: libxenlight failed to create new domain 
> 'personal'",
> while without those audio devices the VM starts without any problems.
> 
> 
> Related Bug Issue:
> https://github.com/QubesOS/qubes-issues/issues/3042

Check whether VT-d is enabled on your machine. This message is usually 
displayed when one starts a VM with a PCI device on a machine without VT-d

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/efb6c91e-d57c-4b3d-b344-49bee6ef4d13%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to avoid hostname leaks when using MAC randomization in debian-9

2017-08-23 Thread 'Brotherfill' via qubes-users
Hi,
To avoid hostname leaks I add # at the beginning of line 'send 
host-name=gethostname' in /etc/dhcp/dhclient.conf
Do you suggest to use this method or to set a static ip?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/HFTeIvK7EySV3XQ89rxI9NcNTrfXg6H8of4MVHpKThqsoNVRSwDFd0OVdj9h41SDysq00GdkXtNv77MdyUUF4gwUBXtur7ckeLTTfZUYZQs%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Audio broken in R4.0 rc1 / qvm-run fails to start AppVM

2017-08-23 Thread nicholas roveda
I've used Qubes 3.2 and everythings there worked fine, but now I'm trying R4.0 
rc1 and I can't figure out why the sound doesn't work.

`qvm-pci` reports 2 Intel Audio Devices (00:03.0  and 00:1b.0), so I've tried 
to attach them to an base AppVm, such personal and start it with `qvm-run`, but 
it returns:
"Start failed: internal error: libxenlight failed to create new domain 
'personal'",
while without those audio devices the VM starts without any problems.


Related Bug Issue:
https://github.com/QubesOS/qubes-issues/issues/3042

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e3b8a4cb-6221-4e9d-93f1-0b01bf86c307%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Audio broken in R4.0 rc1 / qvm-run fails

2017-08-23 Thread nicholas roveda
I've used Qubes 3.2 and everythings there worked fine, but now I'm trying R4.0 
rc1 and I can't figure out why the sound doesn't work.

`qvm-pci` reports 2 Intel Audio Devices (00:03.0  and 00:1b.0), so I've tried 
to attach them to an base AppVm, such personal and start it with `qvm-run`, but 
it returns:
"Start failed: internal error: libxenlight failed to create new domain 
'personal'",
while without those audio devices the VM starts without any ptoblems.


Related Bug Issue:
https://github.com/QubesOS/qubes-issues/issues/3042

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a741e02a-04eb-4cc3-aad2-0f1c53ff0693%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Unofficial forward-ported grsec 4.9 Qubes kernel branch

2017-08-23 Thread nicholas roveda
I'm trying to build your port, but I,ve actually had to to some changes to 
`kernel.spec` because the script exits with an error at line 136: 
`%_sourcedir/check-for-config-changes .config.orig .config`.

So, here are my changes.

Original:

117 if [ -f %_sourcedir/config-%{version} ]; then
118cp %_sourcedir/config-%{version} .config
119 else
120cp %_sourcedir/config .config
121 fi
...
130 MAKE_ARGS="$MAKE_ARGS -C %build_src_dir O=$PWD"
131 if test -e %_sourcedir/TOLERATE-UNKNOWN-NEW-CONFIG-OPTIONS; then
132yes '' | make oldconfig $MAKE_ARGS
133 else
134cp .config .config.orig
135make silentoldconfig $MAKE_ARGS < /dev/null
136%_sourcedir/check-for-config-changes .config.orig .config
137rm .config.orig
138 fi


My version:

117 if [ -f %_sourcedir/config-%{version} ]; then
118cp %_sourcedir/config-%{version} .config
119 else
120cp %_sourcedir/config .config
+++cat /proc/config.gz | unzip > .config.current
121 fi
...
130 MAKE_ARGS="$MAKE_ARGS -C %build_src_dir O=$PWD"
131 if test -e %_sourcedir/TOLERATE-UNKNOWN-NEW-CONFIG-OPTIONS; then
132yes '' | make oldconfig $MAKE_ARGS
133 else
134cp .config .config.orig
+++cp .config.current .config
135make silentoldconfig $MAKE_ARGS < /dev/null
---%_sourcedir/check-for-config-changes .config.orig .config
+++%build_src_dir/scripts/kconfig/merge_config.sh .config .config.orig
137rm .config.orig
138 fi


I don't know if this issue is related to my configuration or not, let me know.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/43f8cc63-8b11-41a0-a9fc-a68fc13b4f9c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Installer Bug - has not been fixed since I reported it in Qubes 2.0 installer.

2017-08-23 Thread Steve Coleman

On 08/22/2017 08:15 AM, jespernexojorgen...@gmail.com wrote:


I guess the next step would be to see if VMWare will work with the graphical 
installer :)


Qubes-OS is a HVM visualization system that works directly with the 
hardware, and its use under another virtualization system is likely to 
have many problems. The security that it provides depends on this being 
the right hardware, and the virtualized hardware just isn't the same. In 
short, don't test is under VirtualBox/VMWare and expect to see what it 
will be like, because that is simply not a valid way to test it.


There used to be a Live DVD you could boot to test it, but that DVD is 
ancient at this point. The better way to test (imho) is to instead 
install it onto a fast bootable USB drive and then use grub or your BIOS 
boot sequence to boot from that drive. Then Qubes will be running 
natively on your real hardware, and the only difference is that the 
locally installed system will likely run much faster, since the external 
USB IO is likely much slower than your actual system drive.


best of luck,

Steve

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92a947a4-0109-8f8e-88c7-b0e9ff504c9d%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Lenovo Thinkpad T460p

2017-08-23 Thread miguel
I was unable to resume from suspend. After closing laptop lid, it is impossible 
to wake laptop back up.


On Monday, December 26, 2016 at 10:32:38 PM UTC+1, sti...@gmail.com wrote:
> Suspend works fine, resume does not work at all.
> 
> Updating from kernel 4.4.x to kernel 4.8.12 from the unstable repository 
> reduced idle power usage from ~15 W to 8 W.
> 
> Tuning the power usage further with values recommended by powertop reduces 
> power usage to 6.8 W.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37db1138-6729-40df-92f4-ccc41960a2c3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggestions for video card

2017-08-23 Thread Epitre
Le vendredi 21 juillet 2017 08:08:36 UTC+2, Fun Zork a écrit :
> I installed Qubes on my laptop and I love it, but now I want to install it on 
> my desktop, but my desktop has a GTX 1080 video card and a CPU without Intel 
> graphics.  Apparently nobody has actually gotten Qubes to work on recent 
> nVidia cards (but let me know if you have the secret!).  So, I am trying to 
> figure out if there is any video card out there that works with Qubes that 
> supports 4k resolutions.  The official documentation appears to only suggest 
> Intel integrated graphics and some ancient Radeon cards.  Does anybody have a 
> suggestion for a standalone card that supports 4k that works with Qubes?  
> Thanks!

You can try the kernel-4.12 with Qubes 3.2 
(https://groups.google.com/d/msg/qubes-devel/17qazOdsQ74/mAQLiQ1dBgAJ) it 
should work with latest NVIDIA cards as it does for my GTX970 who had a lot of 
trouble before this kernel version.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a44af3e6-82dc-4c2e-8949-fcb8b37bb8fc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.