[qubes-users] dispvms saving its sessions?

2017-11-16 Thread pandakaasftw
I just saw that in the directory containing my default dvm 
(/var/lib/qubes/appvms/whonix-ws-ws-dvm/) contains alot of files named like 
this:
disp1.conf
disp2.conf
disp3.conf
And it keeps going on for a while, but I cannot seem to discover where they are 
coming from, since creating new and restarting the dvms does not  solve it.
Is this normal behavior, or is this some weird configuration issue?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2bab838-2692-4a83-94a9-663c0d9dc685%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Local network access when using ProxyVM as VPN gateway using iptables and CLI scripts?

2017-11-16 Thread Michael Siepmann
On 11/16/2017 08:11 AM, Chris Laprise wrote:
> On 11/15/2017 10:17 PM, Michael Siepmann wrote:
>>
>> I've followed the instructions to "Set up a ProxyVM as a VPN gateway
>> using iptables and CLI scripts" at https://www.qubes-os.org/doc/vpn/
>> and it's working well so far but I need to be able to access my local
>> network 192.168.x.x. That worked when I was connecting to the VPN
>> with Network Manager in my NetVM. Is there a way to configure that
>> when using a ProxyVM as a VPN gateway? I'm guessing I need to do
>> something in /rw/config/qubes-firewall-user-script in my VPN ProxyVM
>> to configure iptables to allow bypassing the VPN for 192.168.x.x but
>> I'm not sure how to do that. Any help will be greatly appreciated!
>>
>
> Hi Michael,
>
> You're not the first to ask about LAN access via a VPN VM. Various
> posters in qubes-users have found ways around the anti-leak
> configuration to access particular nets directly.
>
> What I usually advise is to think of VPN proxy, sys-firewall or any
> other proxyVM as Qubes network primitives: Let the VPN VM do its thing
> in guarding against non-tunnel access, and use sys-firewall or
> specific proxyVM to access the LAN. This implies that any given appVM
> can have access to only one type of network (or, only one type at a
> time). This IMHO is the best way.
>
> OTOH, yes you can make the compromise in the VPN VM and allow
> non-tunnel traffic. In the firewall script, you can start by
> commenting-out these two lines:
>
> iptables -I FORWARD -o eth0 -j DROP
> iptables -I FORWARD -i eth0 -j DROP
>
> This removes almost all leak protection, but should suffice for
> initial testing. You may also have to add a route pointing to your
> local net (see Linux "ip route" documentation) because the VPN may
> have added its route as a default. If you wish to eventually reinstate
> the above anti-leak rules you can try adding exceptions after those
> two (so they will be listed _first_ in the FORWARD chain), for instance:
>
> iptables -I FORWARD -o eth0 -d 192.168.0.0/16 -j ACCEPT
> iptables -I FORWARD -i eth0 -s 192.168.0.0/16 -j ACCEPT
>
> A word of caution: Once you start modifying rules like this its easy
> to make mistakes that compromise security, even if you generally know
> what you're doing. That's one reason to use the Qubes-oriented net
> security model I mentioned initially. Another reason is, of course,
> that even creating correct exceptions to tunnel enforcement opens you
> up to certain kinds of threats. If your use case does not call for an
> appVM accessing both VPN and LAN at the same time then there should be
> no reason to make the compromise.
>

Hi Chris,

Thank you! I will try this and report back. My main use case here is
automatically doing an encrypted backup (with Borg Backup) of my files
once an hour to a NAS device, which in turn automatically copies the
backups to cloud storage at night, when I don't have competing needs for
the upload bandwidth. Another use case is file sync, e.g. with SyncThing
(which can work over the Internet, but much slower of course). However,
I can certainly see the security advantages of only letting an appVM
have access to one type of network, or only one type at a time.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e80071ff-f740-4de7-25a1-89ddf0798647%40TechDesignPsych.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] HCL - Razer Blade Stealth (Late 2016 Model)

2017-11-16 Thread Guerlan
How did you install in UEFI mode? Mine will show a terminal with some text for 
less than 1 second and turn back to the installation menu. Secure boot is 
disabled. The far I get is the first menu that appears

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba2a8b81-2a58-4b22-aa44-ad4ae478adab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How To Fix Libvirt Internal Error

2017-11-16 Thread Person
Should I update libvirt, install new drivers, or reinstall the hypervisor?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/59d96b89-dcb5-4719-a762-4297ab0cc70a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How To Fix Libvirt Internal Error

2017-11-16 Thread Person
Whenever I try to attach an ISO to a VM, I receive an error: “internal error: 
libxenlight failed to create new domain”.

I have tried running different commands on Qubes. Disabling AppArmor doesn’t 
work, and starting xendriverdomain.service doesn’t work, because it’s not even 
installed. Some suggest getting xen-hvm-stubdom-linux (or they call it 
vmm-xen-stubdom-linux), but I don’t even know how to get it. I’ve tried 
downgrading libvirt, but all my packages are already at the lowest possible 
level. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b085d7b8-f994-41ad-a281-32a4b21362d7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes RC2 updated, and no vms starting

2017-11-16 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Nov 16, 2017 at 04:07:29PM -0800, linuxcomputer...@gmail.com wrote:
> I did sudo lvs and saw this:
> vm-debian-8-private-snap
> vm-debian-8-private-tmp
> What should i do? Same with fedora VM

Did your system crashed during debian-8 shutdown?
Anyway try this:

sudo lvrename qubes_dom0 vm-debian-8-private-tmp vm-debian-8-private

Try similar thing with fedora-25-root (look for fedora-25-root-tmp).

Then, lets try to find the root cause. Search sudo journalctl -u qubesd
for things about fedora-25-root (and debian-8-private).

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJaDiprAAoJENuP0xzK19csJe4H/3hYpwiwwMfGLxff0lzYDgLy
u0GbVS20SP0iqwOCBVzUcymjEiUKIHcxJc0JLqf+/7JrUe+I7jXyNRA9bvNvvhmb
c8xIMA5MqiLhA/+yE0T07E+UIxEzsWmKFdhJD1hTKd0B/Fn0Zep199U+2QDU6gPU
eNzKoqiY90aFZikmAHDqNXg6wlGUEkVShOTTXOWfVJlff4dQZ3tVphV1hQhD6JfX
2o6u8rLs7d34IyzYBE9y0jEsPTG1SA+BLaDRm7OZftMhycO4h0+ZKa6J/cMBtN1z
KvK7aeHWcsf9N43YqmTwhKoemtw5MCtS+T23u3UFrcj6mjEPKIKwxfbeqSZwokk=
=CCWB
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171117001640.GB2450%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes RC2 updated, and no vms starting

2017-11-16 Thread linuxcomputersec
I did sudo lvs and saw this:
vm-debian-8-private-snap
vm-debian-8-private-tmp
What should i do? Same with fedora VM

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8f1fa655-c300-41c7-b32e-66b543c32df4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes RC2 updated, and no vms starting

2017-11-16 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, Nov 16, 2017 at 01:58:46PM -0800, linuxcomputer...@gmail.com wrote:
> I have already changed templates two debian and i get this:
> RESULT: volume qubes_dom0/vm-debian-8-private missing
> What should i do? I need to fix this asap

Check `sudo lvs` to see what volumes are there. Do you see
vm-debian-8-private (or this with some suffix)?

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJaDid7AAoJENuP0xzK19csEZQH/3uKL8C2/52EXY4kiAjTcrw3
6RxbTTbN4+cjQsDSz4fwycJolp2pdAtwUWFlQsSVsdTxLYB+KUbl1vdD/VVOWmqZ
OvBpmbNc9gsgHCuqOtTaCHxP6z+MFZ6tp83CZBWuoBy97HEv/NsoNmDjMTk0S8Ym
Li9zt5MgOPw5zLgQMF0BGp4l5MYwz2tLyuDT5ltUYtJIn8KSBGAvtuhi9vYSK36t
G4EZO37kOvt8hokuYLT2N/pdYNksTxIkG1fKdj6wl2D0JR5kBrbvJQw1pZEiFPBw
cyZHt2KVC+nHnIl3Eatw+RZSaRrgK+rqOOYXlG9t2jRiaI71mzJZK9s1c2Y12Ak=
=QvVu
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171117000408.GA2450%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes RC2 updated, and no vms starting

2017-11-16 Thread linuxcomputersec
I have already changed templates two debian and i get this:
RESULT: volume qubes_dom0/vm-debian-8-private missing
What should i do? I need to fix this asap

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8e05cc3e-d884-4316-b10c-b2df0d6cf40e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes RC2 updated, and no vms starting

2017-11-16 Thread linuxcomputersec
I have already tried changing templates two debian, still not starting and 
giving those errors.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4efffe3c-e785-40fe-a810-e1a4772137b1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] When transferring file between Qubes, MD5 changes.

2017-11-16 Thread entr0py
vegetarianst...@gmail.com:
> I am transferring a windows ISO file between qubes.. however, the file's MD5 
> sum changes every time I complete the transfer.  
> 
> Why might this be so?
> 


Shouldn't be happening. I suspect faulty checksum tools in Windows. Use one of 
the following options:

1. (cmd.exe) CertUtil -hashfile  SHA256

2. (PowerShell 4 or higher) Get-FileHash -Algorithm SHA256 

Compare with `sha256sum` in Linux.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6feedb94-cd4f-445b-40aa-0903fe3b%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Ubuntu Template

2017-11-16 Thread Unman
On Thu, Nov 16, 2017 at 10:42:08AM +0100, rysiek wrote:
> Hye,
> 
> Dnia Tuesday, November 14, 2017 1:55:06 AM CET Unman pisze:
> > I've just put in a couple of PRs to allow building for Xenial in 4.0.
> 
> Are these the ones you're talking about?
> https://github.com/QubesOS/qubes-gui-agent-linux/pull/23
> https://github.com/QubesOS/qubes-core-agent-linux/commit/
> 54867b6eabed3a6dca0e932ff77f67aedfe43e03
> 
> The latter is merged, I believe, and the former I applied manually. However, 
> while building, now I get:
> 
> mkdir: cannot create directory ‘chroot-qubuntu’: File exists
> mount: mount point chroot-qubuntu/tmp/qubes-deb does not exist
> /home/qubes/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:275: 
> recipe for target 'update-repo-prepare' failed
> make[1]: *** [update-repo-prepare] Error 32
> Makefile:297: recipe for target 'template-local-xenial' failed
> make: *** [template-local-xenial] Error 1
> 
> Not sure where to dig now. 
> 
> More debug info below.

The error message is self explanatory.
Delete chroot-qubuntu and try to build again

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171116195424.e3odvc5e5ved7kek%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] When transferring file between Qubes, MD5 changes.

2017-11-16 Thread Unman
On Wed, Nov 15, 2017 at 11:35:33PM -0800, vegetarianst...@gmail.com wrote:
> I am transferring a windows ISO file between qubes.. however, the file's MD5 
> sum changes every time I complete the transfer.  
> 
> Why might this be so?
> 

Please identify the Qubes version, and which Templates you are using.
On 3.2 with Debian templates (various) I have never seen this, and I
religiously check iso images before using.
I don't have a Windows iso to test with, but I cant imagine that makes
any difference. Just in case though, can you test with some other iso
image?
Are the file sizes identical?

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171116195026.l454255hyb3aclcd%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: "Qubes" BOOT option DISAPPEARD in my Bios (thus I can't boot Qubes!), HOW TO BRING IT BACK?

2017-11-16 Thread Lorenzo Guerra
It is strange that the boot section has been corrupted. After a quick search on 
google, I found this:
https://www.qubes-os.org/doc/uefi-troubleshooting/
Maybe it can be helpful.
Regards,

L. G.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d259cad-4352-49b1-bc65-d47ecfec41be%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 3.2 backup of template VM fails - device out of space

2017-11-16 Thread cyberian
I have a template VM im trying to back up which is rather larger, 185gb or so.  

Am attempting to backup to an external usb-connected sata drive with about half 
a terabyte of space on it.

Less than 10% into the backup a failure message appears informing me that 
"device is out of space" where in reality the device has only had a small 
portion of it's 500GiB used.

actual file size of backup after failure is only around 100MiB

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/95f0c6ff-179a-46bd-a981-74b2d181642d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qubes 3.2 backup fails: device out of space

2017-11-16 Thread cyberian
I have a template VM im trying to back up which is rather larger, 185gb or so.  

Am attempting to backup to an external usb-connected sata drive with about half 
a terabyte of space on it.

Less than 10% into the backup a failure message appears informing me that 
"device is out of space" where in reality the device has only had a small 
portion of it's 500GiB used.

actual file size of backup is only around 100MiB

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/06a5574d-80ba-4704-a441-b0df7c5c92c9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Local network access when using ProxyVM as VPN gateway using iptables and CLI scripts?

2017-11-16 Thread Chris Laprise

On 11/15/2017 10:17 PM, Michael Siepmann wrote:


I've followed the instructions to "Set up a ProxyVM as a VPN gateway 
using iptables and CLI scripts" at https://www.qubes-os.org/doc/vpn/ 
and it's working well so far but I need to be able to access my local 
network 192.168.x.x. That worked when I was connecting to the VPN with 
Network Manager in my NetVM. Is there a way to configure that when 
using a ProxyVM as a VPN gateway? I'm guessing I need to do something 
in /rw/config/qubes-firewall-user-script in my VPN ProxyVM to 
configure iptables to allow bypassing the VPN for 192.168.x.x but I'm 
not sure how to do that. Any help will be greatly appreciated!




Hi Michael,

You're not the first to ask about LAN access via a VPN VM. Various 
posters in qubes-users have found ways around the anti-leak 
configuration to access particular nets directly.


What I usually advise is to think of VPN proxy, sys-firewall or any 
other proxyVM as Qubes network primitives: Let the VPN VM do its thing 
in guarding against non-tunnel access, and use sys-firewall or specific 
proxyVM to access the LAN. This implies that any given appVM can have 
access to only one type of network (or, only one type at a time). This 
IMHO is the best way.


OTOH, yes you can make the compromise in the VPN VM and allow non-tunnel 
traffic. In the firewall script, you can start by commenting-out these 
two lines:


iptables -I FORWARD -o eth0 -j DROP
iptables -I FORWARD -i eth0 -j DROP

This removes almost all leak protection, but should suffice for initial 
testing. You may also have to add a route pointing to your local net 
(see Linux "ip route" documentation) because the VPN may have added its 
route as a default. If you wish to eventually reinstate the above 
anti-leak rules you can try adding exceptions after those two (so they 
will be listed _first_ in the FORWARD chain), for instance:


iptables -I FORWARD -o eth0 -d 192.168.0.0/16 -j ACCEPT
iptables -I FORWARD -i eth0 -s 192.168.0.0/16 -j ACCEPT

A word of caution: Once you start modifying rules like this its easy to 
make mistakes that compromise security, even if you generally know what 
you're doing. That's one reason to use the Qubes-oriented net security 
model I mentioned initially. Another reason is, of course, that even 
creating correct exceptions to tunnel enforcement opens you up to 
certain kinds of threats. If your use case does not call for an appVM 
accessing both VPN and LAN at the same time then there should be no 
reason to make the compromise.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e66f84c8-15f3-2965-ccb3-65b8d5742c4f%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Can't login to VM after upgrade to fedora 26

2017-11-16 Thread Daniel Moerner
Hi,

qubes-gui-vm needs to be rebuilt against the newer version of pulseaudio. This 
should be fixed as of commit 4cf2d11 in qubes-gui-agent-linux, but it looks 
like it still needs to be built and pushed to the repositories. 

Fixing this is important because --allowerasing is needed for some updates from 
Fedora 25 to Fedora 26 because of this upstream bug: 
https://bugzilla.redhat.com/show_bug.cgi?id=1467060.

Best,
Daniel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2c624deb-e849-42ef-99c3-33139f42cf86%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] When transferring file between Qubes, MD5 changes.

2017-11-16 Thread rysiek
Dnia Thursday, November 16, 2017 9:16:49 AM CET Chris Laprise pisze:
> On 11/16/2017 02:35 AM, vegetarianst...@gmail.com wrote:
> > I am transferring a windows ISO file between qubes.. however, the file's
> > MD5 sum changes every time I complete the transfer.
> > 
> > Why might this be so?
> 
> It might be a bug?
> 
> What version of Qubes? And what OS are the source & destination VMs? Is
> the same mdsum program being using on both ends?

Also, what if you transfer the file with the changed md5 back into the 
original VM? Does the md5 sum change back to what it was, or to something 
different yet?

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1817646.1gal37gNey%40lapuntu.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: This is a digitally signed message part.


Re: [qubes-users] When transferring file between Qubes, MD5 changes.

2017-11-16 Thread Chris Laprise

On 11/16/2017 02:35 AM, vegetarianst...@gmail.com wrote:

I am transferring a windows ISO file between qubes.. however, the file's MD5 
sum changes every time I complete the transfer.

Why might this be so?


It might be a bug?

What version of Qubes? And what OS are the source & destination VMs? Is 
the same mdsum program being using on both ends?


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ec439c10-f808-23e5-c6ab-1759c692df42%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Ubuntu Template

2017-11-16 Thread rysiek
Hye,

Dnia Tuesday, November 14, 2017 1:55:06 AM CET Unman pisze:
> I've just put in a couple of PRs to allow building for Xenial in 4.0.

Are these the ones you're talking about?
https://github.com/QubesOS/qubes-gui-agent-linux/pull/23
https://github.com/QubesOS/qubes-core-agent-linux/commit/
54867b6eabed3a6dca0e932ff77f67aedfe43e03

The latter is merged, I believe, and the former I applied manually. However, 
while building, now I get:

mkdir: cannot create directory ‘chroot-qubuntu’: File exists
mount: mount point chroot-qubuntu/tmp/qubes-deb does not exist
/home/qubes/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:275: 
recipe for target 'update-repo-prepare' failed
make[1]: *** [update-repo-prepare] Error 32
Makefile:297: recipe for target 'template-local-xenial' failed
make: *** [template-local-xenial] Error 1

Not sure where to dig now. 

More debug info below.

-> Building meta-packages (debian) for xenial vm (logfile: build-logs/meta-
packages-vm-xenial.log)
╔══ DEBUG 
══
║ Repo Variables
╠───
║ SRC_DIR: qubes-src 
║ CHROOT_DIR:  /home/qubes/qubes-builder/chroot-xenial
║ CHROOT_REPO_DIR: chroot-qubuntu
║ CHROOT_DEBIAN_DIR:   /home/qubes/qubes-builder/chroot-xenial//
║ BUILDER_REPO_DIR:/home/qubes/qubes-builder/qubes-packages-mirror-repo/
xenial
╠───
║ Chroot Variables
╠───
║ DIST_BUILD_DIR:  /home/user
║ DIST_SRC:
║ DIST_SRC_DEBIAN_DIR: /
╠───
║ Build Variables
╠───
║ DEBIAN_PARSER:   /home/qubes/qubes-builder/qubes-src/builder-debian//
scripts/debian-parser
║ DEBIAN_PLUGIN_DIR:   /home/qubes/qubes-builder/qubes-src/builder-debian/
║ OUTPUT_DIR:  pkgs/xenial
║ PACKAGE_LIST:
║ DISTRIBUTION:qubuntu
║ DIST:xenial
║ DEBIANVERSION:   xenial
║ UPDATE_REPO: /home/qubes/qubes-builder/qubes-src/linux-template-
builder/pkgs-for-template/xenial
║ REPO_SUFFIX: 
║ DISTRIBUTION_CAP:Qubuntu
║ REPO_PROXY:  
║ APT_GET_OPTIONS: 
║ CHROOT_ENV:  BACKEND_VMM=xen 
╚═══
╔══ DEBUG 
══
║ Repo Variables
╠───
║ SRC_DIR: qubes-src
║ CHROOT_DIR:  /home/qubes/qubes-builder/chroot-xenial
║ CHROOT_REPO_DIR: chroot-qubuntu
║ CHROOT_DEBIAN_DIR:   /home/qubes/qubes-builder/chroot-xenial//debian-vm/
debian
║ BUILDER_REPO_DIR:/home/qubes/qubes-builder/qubes-packages-mirror-repo/
xenial
╠───
║ Chroot Variables
╠───
║ DIST_BUILD_DIR:  /home/user
║ DIST_SRC:
║ DIST_SRC_DEBIAN_DIR: /debian-vm/debian
╠───
║ Build Variables
╠───
║ DEBIAN_PARSER:   /home/qubes/qubes-builder/qubes-src/builder-debian//
scripts/debian-parser
║ DEBIAN_PLUGIN_DIR:   /home/qubes/qubes-builder/qubes-src/builder-debian/
║ OUTPUT_DIR:  pkgs/xenial
║ PACKAGE_LIST:debian-vm/debian
║ DISTRIBUTION:qubuntu   
║ DIST:xenial
║ DEBIANVERSION:   xenial
║ UPDATE_REPO: /home/qubes/qubes-builder/qubes-src/linux-template-
builder/pkgs-for-template/xenial
║ REPO_SUFFIX:
║ DISTRIBUTION_CAP:Qubuntu   
║ REPO_PROXY:
║ APT_GET_OPTIONS:
║ CHROOT_ENV:  BACKEND_VMM=xen
╚═══
mkdir: cannot create directory ‘chroot-qubuntu’: File exists
mount: mount point chroot-qubuntu/tmp/qubes-deb does not exist
/home/qubes/qubes-builder/qubes-src/builder-debian/Makefile.qubuntu:275: 
recipe for target 'update-repo-prepare' failed
make[1]: *** [update-repo-prepare] Error 32
Makefile:297: recipe for target 'template-local-xenial' failed
make: *** [template-local-xenial] Error 1


-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web 

Re: [qubes-users] Baffled About Passphrases

2017-11-16 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 11/16/2017 08:01 AM, Ron Allen Smith wrote:
> Hi,
> 
> I'm new to Qubes/Linux and would like to know how to
> change/add/remove passphrases applied to the USB I installed Qubes
> 3.2 on. I looked around at Qubes FAQs and elsewhere, which was
> helpful, but not giving a step-by-step of what to do.
> 
> [user@untrusted ~]$ lsblk NAME   MAJ:MIN RM  SIZE RO TYPE
> MOUNTPOINT xvdc   202:32   1 11.5G  0 disk ├─xvdc2202:34
> 1 10.5G  0 part │ └─dmroot 253:00   10G  0 dm   / └─xvdc1
> 202:33   11G  0 part [SWAP] xvda   202:01   10G  1
> disk └─dmroot   253:00   10G  0 dm   / xvdd   202:48   1
> 500M  1 disk /usr/lib/modules/4.9.56-21.pvops.qubes.x86_64 xvdb
> 202:16   12G  0 disk /rw
> 
> Although I selected default encryption during the Qubes install, I
> can't determine whether or not enryption is actually set.
> 
> I also looked at 'man cryptsetup', but unsure of how to use it, or
> even if I should use it.
> 
> Can anyone set me on the right path?
> 

https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption#Cryptset
up_actions_specific_for_LUKS

https://unix.stackexchange.com/questions/252672/how-do-i-change-a-luks-p
assword

- -- 
Zrubi
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=f8MO
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4fde44df-7c27-2099-516a-edde9e6c697d%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.