[qubes-users] Re: attaching to VM consoles for debugging purposes

2017-10-27 Thread Foppe de Haan
you can try 'qvm-start-gui --all' first, to see if that helps; otherwise, your 
best bet is 'sudo xl console -t pv VMNAME'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2e80f269-74d6-4864-a07e-c0b2ca56f185%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Why is there no qubes manager in V4.0?

2017-10-27 Thread taii...@gmx.com
While I do know how to use the cli tools I enjoy a gui for at a glance 
viewing and tasks, it is much easier to press start/stop on a nice list 
rather than type two commands.


Thanks ADW!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd5ea172-38b8-a4fa-fd05-390dd852939f%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes 4.0rc2 install on corebooted Lenovo G505s (AMD)

2017-10-27 Thread awokd
On Wed, October 25, 2017 20:32, awokd wrote:
> Few issues on this attempt am hoping someone might have some insight into.
>
> 1) Installer warns "interrupt remapping" is not supported.
> qubes-hcl-report shows IOMMU as enabled but "Remapping" is not. What
> exactly are they looking for?
>
> 2) Install completes and reboots successfully after that but it only gets
> part way through the first default template installation (whonix-gw) then
> hard locks- no mouse or keyboard response. Is there a way to force these
> to install in compatible mode or something so I can work on fixing them
> later?
>
> 3) I can choose Do not configure anything and get logged in and to a
> terminal window, but without any templates or VMs am pretty lost on how to
> setup from scratch. qubes-template-fedora-25.noarch is listed in dnf but
> when I try to create an AppVM there's nothing in the template dropdown.
>
> When I boot debian stretch on the same machine, I see AMD-Vi enabling
> interrupt remapping. xl dmesg under 4.0 shows (Xen) enabling interrupt
> remapping. Qubes 3.2 worked fine on this too.
>
> Suggestions welcomed!

1) I found https://github.com/QubesOS/qubes-issues/issues/3208 which seems
to address this case and see "(XEN) Interrupt remapping enabled" [with
lowercase "r"] in my xl dmesg output too.

2) This might be related but I'm having trouble finding if this patch has
made it into the version of Xen Qubes uses.
http://xen.1045712.n5.nabble.com/Xen-4-6-0-Dom0-freezes-at-creation-of-HVM-domain-with-activated-IOMMU-td5731709.html

3) I see what seem to be partially installed templates under
/var/lib/qubes/vm-templates but fedora-25 for example has 4.5 1GB
root.img.part.0? files and no root.img.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b25cf08c50e94163ab503564692bf6c8%40elude.in.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] attaching to VM consoles for debugging purposes

2017-10-27 Thread Francesco Rmp
Hi,
i've just installed qubes 4.0 rc2, and i'm having some issues with VMs, they 
start correctly, i see them running, but for some reasons certain VMs don't run 
the applications, not even a terminal emulator.

since the VM is running i'd like to see what's the problem, so that i have 
something more useful to investigate or even ask about when coming here instead 
of just asking

"help with this VM i cant start firefox" which i know can be really annoying.

is there a way to attach to the console? i thought of virsh but it's not 
installed in dom0.

anyway, the VM that is giving me issues is whonix-ws it starts up but i cant 
run any application from the menu, even qvm-run doesn't return anything and 
stays hung there.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe2c1625-d303-4c38-9275-dfc1cadca774%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM and Word/docx - no go

2017-10-27 Thread Ryan Tate
Thank you. This fixed it perfectly. And I’ve become better acquainted with 
https://www.qubes-os.org/doc/dispvm-customization/
….which I probably should have found before!
:-)

Cheers!

> On Oct 20, 2017, at 12:34 PM, Noor Christensen  
> wrote:
> 
> On Thu, Oct 19, 2017 at 11:08:07AM -0400, Ryan Tate wrote:
>> In Qubes 3.2 from a fedora 25 AppVM, when I try and open a docx (Word)
>> file via DispVM via the right-click menu, I just get a directory
>> listing inside the DispVM. Instead of opening the file with
>> LibreOffice it appears to unzip the file and show the underlying dir
>> structure. (The docx format is zipped.)
>> 
>> I have LibreOffice available to the app vm via the Fedora 25 template.
>> Is there somewhere else I need to put it to make it available to the
>> DispVM? Or is this a known/expected behavior for DispVM?
> 
> First of all, you need to make sure that LibreOffice is installed in
> your DispVM.
> 
> Regenerate your DispVM image using that fedora-25 template you mentioned:
> 
>$ qvm-create-default-dvm fedora-25
> 
> When it has completed, try opening the document in a DispVM again.
> 
> -- noor
> 
> |_|O|_|
> |_|_|O|  Noor Christensen
> |O|O|O|  0x401DA1E0
> 
> --
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/20171020163437.6d25pqhwhvckzl5j%40mail.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/56A5B1C1-E926-4D13-B2F4-465E6F36141A%40ryantate.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Message signed with OpenPGP


Re: [qubes-users] Ledger Nano S works great with Qubes OS R3.2 [Debian 8 and Fedora 24 AppVMs]

2017-10-27 Thread Patrick Schleizer
Does it still work for your with Qubes R4?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b48660a-f523-33f2-c212-54f7f01ae548%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Setting up Jack Audio - can not detect virtual output

2017-10-27 Thread Cranix
Hello,
I'm using QubesOS 3.2 with default fedora 24 template
for app vms and i'm struggling with getting Jack Audio working.

I have installed packages with both jackdbus and pulseaudio modules for
jack.
I tried to follow tutorial for intergrating pulseaudio and jack
from offitial jackaudio documentation.
When i'm trying to load module via pacmd or pactl i'm getting Load
failed, both duckduckgo and google did not helped much.

Pulseaudio properly detects qubes vchan sink and uses it to output
audio. My problem is that i can not instruct jack audio to send data to
this output.
I tried to look for more documentation of qubes sound architecture but
without sucess.
Alsamixer shows me (in app vm) nonly 'default soundcard'
pavucontrol finds qubes vchan sink.

Before installation of pulseaduio jack modules i was able to launch
jackdbus via jack_control start, it used dummy output,
jack fails to even start without telling me much what is wrong.

I can paste apropiate logs etc, just please tell me what would be
useful.

-- 
Cranix

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171027170656.GC54552%40hackerspace.pl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes OS 4.0 second candidate (rc2) has been released!

2017-10-27 Thread David Hobach
2. Upgrade your templates to rc2 (make sure to keep some AppVMs running 
in case you need them), then do an offline re-partitioning of your 
template VMs (a 5-10 line script with losetup, fdisk & dd should 
suffice) either in dom0 or in a running AppVM, if you don't want your 
template VMs' file systems to be read inside dom0.

Then upgrade dom0 & restart.


I tested that one and it seems to work.
(I think I was on rc2 even before knowing it...)

I also noticed:
- There are no additional repos for rc2, i.e. a straightforward rc1 dom0 
update & template update should suffice.
- rc1 partitioned templates also work in rc2. That may of course change. 
I guess they use the uuid so that partitioning doesn't really matter as 
long as you don't want to resize the image.

- Other than that losetup, sfdisk & dd seem to do the trick.


Make sure you have a backup before testing any of these though... Yes, at least 
make a copy of the original template root.img...


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/971573f3-f483-476c-e51d-d72c957388ef%40hackingthe.net.
For more options, visit https://groups.google.com/d/optout.


smime.p7s
Description: S/MIME Cryptographic Signature


Re: [qubes-users] Qubes 4.0-rc2 :: VMs fail to start

2017-10-27 Thread Chris Laprise

On 10/25/17 13:26, '[799]' via qubes-users wrote:

Hello,

As at least one other Qubes user has the same problem, that VMs won't 
start, I'll add this as special topic.


I've made a clean install of Qubes 4-rc2 but ~70% of the time I can't 
boot the VMs.

This includes sys-net, sys-firewall, but also others.

I tried to check the logs but I don't get any valuable information.
See screenshot.

I started the following command in dom0:

watch -n 1 xl list

When I try to launch a VM I can see that the VMs appears in the xl 
list output, but the State is -- and the Time(s) is 0.0.
After ~30sec the start is aborted with error message: Cannot execute 
qrexec-daemon.


Questions:
1) is anyone running Qubes 4.0-rc2 on a Lenovo X230?
2) is someone additionaly running Coreboot?
3) I am running the Qubes Installation with the default settings, any 
options to tweak on the Grub command line




I created an issue for my VM start problems:

https://github.com/QubesOS/qubes-issues/issues/3221

There is no libxenlight error, and I think the problem may be related to 
the initial run of sys-net. Shutting down sys-net (and all VMs) and 
starting it again seems to make a difference. Also, there is a RAM 
allocation problem that (so far) hasn't shown up after I re-start sys-net.


Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1ce1b0a4-5e39-a446-65c1-8ffa0b295f82%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 4.RC2 CANT create / install VM from local iso

2017-10-27 Thread Outback Dingo
So we need updated docs or somethings broken...

i copied the iso to /home/user from the AppVM tried to create an hvm
appvm got a unrecognized argument... ok
then tried without --hvm... seems ok however. qvm-start
results in a traceback

[dingo@dom0 ~]$ qvm-create BSD --hvm --label blue
usage: qvm-create [-h] [--verbose] [--quiet] [--class CLS]
  [--property NAME=VALUE] [--pool VOLUME_NAME=POOL_NAME]
  [-P POOL_NAME] [--template VALUE] [--label VALUE]
  [--help-classes]
  [--root-copy-from FILENAME | --root-move-from FILENAME]
  [VMNAME]
qvm-create: error: unrecognized arguments: --hvm
[dingo@dom0 ~]$ qvm-create BSD  --label blue
sudo qvm-start BSD --cdrom=/home/dingo/FreeBSD-11.1-RELEASE-amd64-disc1.iso
Traceback (most recent call last):
  File "/bin/qvm-start", line 9, in 
load_entry_point('qubesadmin==4.0.9', 'console_scripts', 'qvm-start')()
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_start.py",
line 160, in main
drive_assignment = get_drive_assignment(args.app, args.drive)
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_start.py",
line 98, in get_drive_assignment
backend_domain_name, ident = drive_str.split(':', 1)
ValueError: not enough values to unpack (expected 2, got 1)
[dingo@dom0 ~]$ qvm-start BSD
--cdrom=/home/dingo/FreeBSD-11.1-RELEASE-amd64-disc1.iso
Traceback (most recent call last):
  File "/usr/bin/qvm-start", line 9, in 
load_entry_point('qubesadmin==4.0.9', 'console_scripts', 'qvm-start')()
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_start.py",
line 160, in main
drive_assignment = get_drive_assignment(args.app, args.drive)
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_start.py",
line 98, in get_drive_assignment
backend_domain_name, ident = drive_str.split(':', 1)
ValueError: not enough values to unpack (expected 2, got 1)
[dingo@dom0 ~]$ qvm-start BSD
--cdrom=/home/dingo/FreeBSD-11.1-RELEASE-amd64-disc1.iso
Traceback (most recent call last):
  File "/usr/bin/qvm-start", line 9, in 
load_entry_point('qubesadmin==4.0.9', 'console_scripts', 'qvm-start')()
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_start.py",
line 160, in main
drive_assignment = get_drive_assignment(args.app, args.drive)
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_start.py",
line 98, in get_drive_assignment
backend_domain_name, ident = drive_str.split(':', 1)
ValueError: not enough values to unpack (expected 2, got 1)

[user@personal dom0]$

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAKYr3zxnfkSioGJF%3Dvj2JmMdW0YKs5XK7zG2uya5n_vi6S_KhA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Wifi problems on recent updates

2017-10-27 Thread Dan Ballard
On Tuesday, October 24, 2017 at 8:50:18 PM UTC-7, Dan Ballard wrote:
> I upgraded my netbook from Linux 4.4.67 to 4.9.35 and lost wifi ability on 
> it. I believe it was an Atheros chip using the ath9k driver. At least with it 
> I've been able to boot the old 4.4.67 kernel and retain wireless. 
> 
> This week I upgraded my laptop to 4.9.45 and it also lost wifi ability with 
> an Intel iwlwifi driver. And worse, booting old 4.4 kernels is not working 
> for it.
> 
> What data do I need to gather to help troubleshoot this and fix it?

ticket for the intel issue 

https://github.com/QubesOS/qubes-issues/issues/3235

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a5a3202-cab9-4066-9f8e-6153a627806d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Wifi problems on recent updates

2017-10-27 Thread Dan Ballard
On Tuesday, October 24, 2017 at 8:50:18 PM UTC-7, Dan Ballard wrote:
> I upgraded my netbook from Linux 4.4.67 to 4.9.35 and lost wifi ability on 
> it. I believe it was an Atheros chip using the ath9k driver. At least with it 
> I've been able to boot the old 4.4.67 kernel and retain wireless. 
> 
> This week I upgraded my laptop to 4.9.45 and it also lost wifi ability with 
> an Intel iwlwifi driver. And worse, booting old 4.4 kernels is not working 
> for it.
> 
> What data do I need to gather to help troubleshoot this and fix it?

So I accidently discover this under an Ubuntu live usb but then it worked under 
Qubes too
With my laptop with the intel wifi chip, while it boots up and rfkill lists it 
as hard blocked... putting it to sleep and waking it back up somehow fixes this.
I have no idea

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53810750-0582-4095-8a85-0e8c67ade884%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


AW: Re: [qubes-users] Re: Update sys-net and sys-firewall to fedora-25?

2017-10-27 Thread '[799]' via qubes-users
Hello,

>> I hope we can still use a gui with mouse
>> clicks to do this stuff in 4.0 lmao

I also hope that there is a replacement for Qubes Manager as (even as regular 
Qubes 3.2 User) Qubes 4.x feels much more complicated, compared to 3.2.

The Qubes Manager which was running on an own Workspace was the best way to see 
what is going on with one glance.
It was also possible to make adaptions to several VMs in one go.
If I want to switch the Net Template for 3 VMs it is much easier doing so from 
Qubes Manager instead of opening the upper left menu and click through the 
submenus to open AppVM Preferences.

>> Otherwise once 3.2 is eol, my family
>> will find other solutions...

As it seems more users have issues with the current release (VMs not starting) 
and because of hardware dependencies I hope that 4 0 get "fixed".
I don't want to buy new hardware for Qubes 4 as I like to stay with Coreboot 
and the possible hardware which has enough power, is in 12" form factor and 
support Coreboot AND (!) Qubes 4.x seems to be small.

I still don't know if my X230 + Coreboot will run 4.x
Thereof I have also migrated back to 3.2.

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/jzXYriBYjxKmyG-MqyDxc5tq5eGg7nqIUm4qFUAQjDpclobtK8v2qd7jtgob6nnW59Rp8Pbi3MclMRi3iuIScJ5jPKJLcz0iXlMYnGMvRHw%3D%40protonmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: resize vm partition / 4.0RC2

2017-10-27 Thread Jon Solworth
On Friday, October 27, 2017 at 1:58:31 AM UTC-5, Outback Dingo wrote:
> Ok so how do we resize a vm partition in 4.0RC2 i see the qvm-resize
> is no longer there.

qubes-vm-preferences vmname

and then change private storage max size

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa1bf86b-7419-46e5-a710-0e8739810317%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Update sys-net and sys-firewall to fedora-25?

2017-10-27 Thread cquick197
I am testing 4.0r2 right now, and the lack of qubes-manager is a bit difficult 
to grasp as I didn't use the command line management stuff too much. I'm sure 
it will come together though.

OT: I ended up downloading the official fedora-25 templates and changed to 
those on 3.2. Thanks all!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/96186ef7-6cb8-4700-a733-420ffed9ca37%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Update sys-net and sys-firewall to fedora-25?

2017-10-27 Thread cooloutac
On Saturday, October 21, 2017 at 9:39:44 AM UTC-4, [799] wrote:
> Hello,
> 
> 
> 
> here you can find my scripts, which will rebuild all your sys-vms:
> 
> All scripts must be made executable with chmod +x FILENAME
> 
> 
> 
> 1) qvm-destroy.sh
> 
> this script  is a helper script which can be used to kill and remove a VM in 
> one step
> 
> I'd like to see an option in qvm-kill to get this done:
> 
> something like: qvm-kill --purge 
> 
> Until then, this script should work (Warning: it will kill the VM without any 
> further questions :-)
> 
> 
> 
> #!/bin/bash
> 
> # Kill a running AppVM and remove it
> 
> # Usage: qvm-destroy 
> 
> echo "Killing VM: $1"
> 
> qvm-kill $1
> 
> echo "Removing VM: $1"
> 
> qvm-remove $1
> 
> echo "Waiting for 5s (just to be sure)"
> 
> sleep 5s
> 
> 
> 
> 2) create-t-fedora-25-minimal.sh
> 
> Built a custom template which will be used to create the new sys-vms
> 
> mytemplatevm is the name of the new template, which will then be used in step 
> 3 to build the sys-vms.
> 
> I like to work with clones of the default templates, so that I can always go 
> back to a standard template.
> 
> I name my VMs with t-... to indicate that this VM is a template VM.
> 
> 
> 
> #!/bin/bash
> 
> # Variables
> 
> templatebasevm=fedora-25-minimal
> 
> mytemplatevm=t-fedora-25-minimal
> 
> # Install templatebasevm (just to make sure it is available)
> 
> sudo qubes-dom0-update qubes-template-$templatebasevm
> 
> # Remove existing Template VM
> 
> echo "Killing VM: $mytemplatevm"
> 
> qvm-kill $mytemplatevm
> 
> echo "Removing VM: $mytemplatevm"
> 
> qvm-remove $mytemplatevm
> 
> echo "Waiting for 10s until everything is finished"
> 
> sleep 10s
> 
> # Create a new template based on default template
> 
> echo "Clone $templatebasevm to $mytemplatevm"
> 
> qvm-clone $templatebasevm $mytemplatevm
> 
> # Hide original template
> 
> qvm-prefs -s $templatebasevm internal true
> 
> qvm-prefs -s $mytemplatevm internal false
> 
> # Launch new template
> 
> echo Launch new template-vm $mytemplatevm
> 
> qvm-start --tray $mytemplatevm
> 
> echo "Wait for 10sec until $mytemplatevm VM is up"
> 
> sleep 10s
> 
> # Install Updates and additional packages
> 
> echo "Install updates and additional applications in $mytemplatevm"
> 
> qvm-run $mytemplatevm 'xterm -e "sudo dnf -y update && \
> 
>    sudo dnf -y install mc nano pass langpacks-en langpacks-de 
> glibc-locale-source qubes-usb-proxy \
> 
>    qubes-input-proxy-sender gnome-terminal terminus-fonts 
> less dejavu-sans-fonts \
> 
>    NetworkManager NetworkManager-wifi 
> network-manager-applet wireless-tools dbus-x11 \
> 
>    tinyproxy notification-daemon gnome-keyring 
> iwl6000g2a-firmware keepass \
> 
>    linux-firmware && \
> 
>    shutdown -h now "'
> 
> echo "Wait until all updates have been installed"
> 
> read -p "Press Enter to continue"
> 
> 
> 
> 3) create-my-sysvms.sh
> 
> This script will actually build the new sys-vms (and remove the old one 
> before).
> 
> It will use the template you have created in step 2)
> 
> 
> 
> #!/bin/bash
> 
> systemplate=t-fedora-25-minimal
> 
> ## Kill and remove existing vms
> 
> ./qvm-destroy sys-firewall
> 
> ./qvm-destroy sys-net
> 
> ./qvm-destroy sys-usb
> 
> ## Create a new Net VM
> 
> qvm-create --template $systemplate --label=red --net --mem=300 --vcpus=2 
> sys-net
> 
> # Disable PCI_Strictreset
> 
> # Attach PCI-Controllers  to AppVM
> 
> qvm-pci --add-class sys-net net
> 
> # Fix Wifi when waking up from Resume
> 
> # https://www.qubes-os.org/doc/wireless-troubleshooting
> 
> sleep 10s
> 
> qvm-run --auto sys-firewall 'xterm -e "sudo echo iwlmvm  >> 
> /rw/config/suspend-module-blacklist && \
> 
>     sudo echo iwlwifi >> 
> /rw/config/suspend-module-blacklist "'
> 
> qvm-shutdown --wait --force sys-net
> 
> ## Create a new Firewall VM
> 
> qvm-create --template $systemplate --label=orange --proxy --mem=300 --vcpus=2 
> sys-firewall
> 
> #  Set Net-VM
> 
> qvm-prefs sys-firewall -s netvm sys-net
> 
> ## Create a new USB Qube
> 
> qvm-create --template $systemplate --label=red --net --mem=1024 --vcpus=2 
> sys-usb
> 
> # Disable PCI_Strictreset
> 
> qvm-prefs sys-usb -s pci_strictreset false
> 
> # Enable Autostart
> 
> qvm-prefs sys-usb -s autostart true
> 
> # Attach USB-Controllers  to AppVM
> 
> qvm-pci --add-class sys-usb usb
> 
> ## Start sys-vms
> 
> qvm-start sys-firewall
> 
> qvm-start sys-usb
> 
> 
> 
> 4) create-default-sys-vms.sh
> 
> This script can be used to revert to the default sys-vms (based on the full 
> fedora-25 default image, not the minimal image)
> 
> 
> 
> #!/bin/bash
> 
> ## Kill and remove existing vms
> 
> ./qvm-destroy sys-firewall
> 
> ./qvm-destroy sys-net
> 
> ./qvm-destroy sys-usb
> 
> ## Create a new Net VM
> 
> qvm-create --template fedora-25 --label=red --net --mem=300 --vcpus=2 sys-net
> 
> # Disable PCI_St

Re: [qubes-users] Re: Update sys-net and sys-firewall to fedora-25?

2017-10-27 Thread cooloutac
On Saturday, October 21, 2017 at 9:39:44 AM UTC-4, [799] wrote:
> Hello,
> 
> 
> 
> here you can find my scripts, which will rebuild all your sys-vms:
> 
> All scripts must be made executable with chmod +x FILENAME
> 
> 
> 
> 1) qvm-destroy.sh
> 
> this script  is a helper script which can be used to kill and remove a VM in 
> one step
> 
> I'd like to see an option in qvm-kill to get this done:
> 
> something like: qvm-kill --purge 
> 
> Until then, this script should work (Warning: it will kill the VM without any 
> further questions :-)
> 
> 
> 
> #!/bin/bash
> 
> # Kill a running AppVM and remove it
> 
> # Usage: qvm-destroy 
> 
> echo "Killing VM: $1"
> 
> qvm-kill $1
> 
> echo "Removing VM: $1"
> 
> qvm-remove $1
> 
> echo "Waiting for 5s (just to be sure)"
> 
> sleep 5s
> 
> 
> 
> 2) create-t-fedora-25-minimal.sh
> 
> Built a custom template which will be used to create the new sys-vms
> 
> mytemplatevm is the name of the new template, which will then be used in step 
> 3 to build the sys-vms.
> 
> I like to work with clones of the default templates, so that I can always go 
> back to a standard template.
> 
> I name my VMs with t-... to indicate that this VM is a template VM.
> 
> 
> 
> #!/bin/bash
> 
> # Variables
> 
> templatebasevm=fedora-25-minimal
> 
> mytemplatevm=t-fedora-25-minimal
> 
> # Install templatebasevm (just to make sure it is available)
> 
> sudo qubes-dom0-update qubes-template-$templatebasevm
> 
> # Remove existing Template VM
> 
> echo "Killing VM: $mytemplatevm"
> 
> qvm-kill $mytemplatevm
> 
> echo "Removing VM: $mytemplatevm"
> 
> qvm-remove $mytemplatevm
> 
> echo "Waiting for 10s until everything is finished"
> 
> sleep 10s
> 
> # Create a new template based on default template
> 
> echo "Clone $templatebasevm to $mytemplatevm"
> 
> qvm-clone $templatebasevm $mytemplatevm
> 
> # Hide original template
> 
> qvm-prefs -s $templatebasevm internal true
> 
> qvm-prefs -s $mytemplatevm internal false
> 
> # Launch new template
> 
> echo Launch new template-vm $mytemplatevm
> 
> qvm-start --tray $mytemplatevm
> 
> echo "Wait for 10sec until $mytemplatevm VM is up"
> 
> sleep 10s
> 
> # Install Updates and additional packages
> 
> echo "Install updates and additional applications in $mytemplatevm"
> 
> qvm-run $mytemplatevm 'xterm -e "sudo dnf -y update && \
> 
>    sudo dnf -y install mc nano pass langpacks-en langpacks-de 
> glibc-locale-source qubes-usb-proxy \
> 
>    qubes-input-proxy-sender gnome-terminal terminus-fonts 
> less dejavu-sans-fonts \
> 
>    NetworkManager NetworkManager-wifi 
> network-manager-applet wireless-tools dbus-x11 \
> 
>    tinyproxy notification-daemon gnome-keyring 
> iwl6000g2a-firmware keepass \
> 
>    linux-firmware && \
> 
>    shutdown -h now "'
> 
> echo "Wait until all updates have been installed"
> 
> read -p "Press Enter to continue"
> 
> 
> 
> 3) create-my-sysvms.sh
> 
> This script will actually build the new sys-vms (and remove the old one 
> before).
> 
> It will use the template you have created in step 2)
> 
> 
> 
> #!/bin/bash
> 
> systemplate=t-fedora-25-minimal
> 
> ## Kill and remove existing vms
> 
> ./qvm-destroy sys-firewall
> 
> ./qvm-destroy sys-net
> 
> ./qvm-destroy sys-usb
> 
> ## Create a new Net VM
> 
> qvm-create --template $systemplate --label=red --net --mem=300 --vcpus=2 
> sys-net
> 
> # Disable PCI_Strictreset
> 
> # Attach PCI-Controllers  to AppVM
> 
> qvm-pci --add-class sys-net net
> 
> # Fix Wifi when waking up from Resume
> 
> # https://www.qubes-os.org/doc/wireless-troubleshooting
> 
> sleep 10s
> 
> qvm-run --auto sys-firewall 'xterm -e "sudo echo iwlmvm  >> 
> /rw/config/suspend-module-blacklist && \
> 
>     sudo echo iwlwifi >> 
> /rw/config/suspend-module-blacklist "'
> 
> qvm-shutdown --wait --force sys-net
> 
> ## Create a new Firewall VM
> 
> qvm-create --template $systemplate --label=orange --proxy --mem=300 --vcpus=2 
> sys-firewall
> 
> #  Set Net-VM
> 
> qvm-prefs sys-firewall -s netvm sys-net
> 
> ## Create a new USB Qube
> 
> qvm-create --template $systemplate --label=red --net --mem=1024 --vcpus=2 
> sys-usb
> 
> # Disable PCI_Strictreset
> 
> qvm-prefs sys-usb -s pci_strictreset false
> 
> # Enable Autostart
> 
> qvm-prefs sys-usb -s autostart true
> 
> # Attach USB-Controllers  to AppVM
> 
> qvm-pci --add-class sys-usb usb
> 
> ## Start sys-vms
> 
> qvm-start sys-firewall
> 
> qvm-start sys-usb
> 
> 
> 
> 4) create-default-sys-vms.sh
> 
> This script can be used to revert to the default sys-vms (based on the full 
> fedora-25 default image, not the minimal image)
> 
> 
> 
> #!/bin/bash
> 
> ## Kill and remove existing vms
> 
> ./qvm-destroy sys-firewall
> 
> ./qvm-destroy sys-net
> 
> ./qvm-destroy sys-usb
> 
> ## Create a new Net VM
> 
> qvm-create --template fedora-25 --label=red --net --mem=300 --vcpus=2 sys-net
> 
> # Disable PCI_St

[qubes-users] Re: Best laptop for qubes 4.0 ?

2017-10-27 Thread Hugo Costa
On Friday, 27 October 2017 09:17:49 UTC+1, rodge...@gmail.com  wrote:
> 0. bios 
> 
> coreboot 
> 
> https://firmware.intel.com/learn/fsp/about-intel-fsp
> http://blog.ptsecurity.com/2017/08/disabling-intel-me.html
> 
> 1. cpu 
> 
> SLAT (EPT) Intel VT-x 
> 
> https://ark.intel.com/Search/FeatureFilter?productType=processors&ExtendedPageTables=true&MarketSegment=Mobile
> 
> 2. ram 32-64gb 
> 
> 3. video 
> 
> integrated intel HD or nVidia Quadro (?)
> 
> 4. SSD 1TB +
> 
> 5. Disabled micro and webcam
> 
> Is that correctly ? such a laptop will cost about 2000 dollars, maybe its top 
> Thinkpad workstation, but coreboot flashes only T2xx/T4xx old models.

Well, those requirements, I'd go for a W5XX, I believe it's the workstation 
series that should handle your requests.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/486d5625-4ad5-4ce6-b301-06121c1f85f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Hardware not supported on Qubes 4.0 rc2

2017-10-27 Thread Sergio Matta
Em quinta-feira, 26 de outubro de 2017 15:37:10 UTC-2, Anirban Kar  escreveu:
> My Hardware:
> Processor- AMD Athlon X2 5200
> Mobo- Asrock 960GC-GS FX
> RAM- DDR2 800 MHz 2× 2GB
> HDD - Seagate 250 GB SATA 7200 rpm
> 
> 
> I can install and use Qubes 3.2 without any hassel but facing a hardware 
> incompatibility notification while installing Qubes 4.0 rc2. Ignoring the 
> notification and installing Qubes 4.0 rc2 results to a system which does not 
> have a sys-net vm. I am adding a screenshot of the notification. I am quite 
> sure that my processor supports AMD-V.

Dear Anirban, I have the same problem and I will change my motherboard. But 
until there, I changed to PV, insert some ip commands(ip link, ip addr, ip 
route) in /rw/config/rc.local (sys-net and sys-firewall) to enable networking. 
It is not the best solution but works.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/97bbb59d-2570-449f-b47e-36777a3fd870%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Hardware not supported on Qubes 4.0 rc2

2017-10-27 Thread joeviocoe
On Thursday, 26 October 2017 13:37:10 UTC-4, Anirban Kar  wrote:
> My Hardware:
> Processor- AMD Athlon X2 5200
> Mobo- Asrock 960GC-GS FX
> RAM- DDR2 800 MHz 2× 2GB
> HDD - Seagate 250 GB SATA 7200 rpm
> 
> 
> I can install and use Qubes 3.2 without any hassel but facing a hardware 
> incompatibility notification while installing Qubes 4.0 rc2. Ignoring the 
> notification and installing Qubes 4.0 rc2 results to a system which does not 
> have a sys-net vm. I am adding a screenshot of the notification. I am quite 
> sure that my processor supports AMD-V.

iommu:
  'no'

Says it all.
Read the release notes and blog posts on rc1 and rc2.  PV vs. HVM was the 
difference between the two.

qvm-prefs sys-net virt_mode pv

This may work, but future versions of qubes are going away from PV all 
together, so AMD-Vi (IOMMU) will be a requirement.
I upgraded my hardware for this reason.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e711662-fa28-47f4-b1db-009a8485d2a3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Best laptop for qubes 4.0 ?

2017-10-27 Thread rodgerdeny
0. bios 

coreboot 

https://firmware.intel.com/learn/fsp/about-intel-fsp
http://blog.ptsecurity.com/2017/08/disabling-intel-me.html

1. cpu 

SLAT (EPT) Intel VT-x 

https://ark.intel.com/Search/FeatureFilter?productType=processors&ExtendedPageTables=true&MarketSegment=Mobile

2. ram 32-64gb 

3. video 

integrated intel HD or nVidia Quadro (?)

4. SSD 1TB +

5. Disabled micro and webcam

Is that correctly ? such a laptop will cost about 2000 dollars, maybe its top 
Thinkpad workstation, but coreboot flashes only T2xx/T4xx old models.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f645d542-03f2-4258-ab94-3e6d706ab2ff%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Hardware not supported on Qubes 4.0 rc2

2017-10-27 Thread Anirban Kar
On Friday, 27 October 2017 08:58:55 UTC+5:30, Anirban Kar  wrote:
> Here is the HCL attached as per your request.

Also sending the .cpio.gz as attachment.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9144d45c-9cb0-4d8d-b1f1-71b440cffb0d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-ASRock-960GC_GS_FX-20171027-123548.cpio.gz
Description: Binary data