Re: [qubes-users] qubes 4.0rc2 install question

2017-11-19 Thread taii...@gmx.com

On 11/19/2017 05:13 PM, haaber wrote:

Hello,
I tried toinstall Q4.0-rc2 today. To my surprise the installer warns me
about hardware incompatibilities that should not exist, according to the
HCL : I have a i7-4600U cpu that has VT-x with EPT and VT-d as it should.
So I am confused ... qubes-hcl-report says "HVM not active", same for
"I/O MMU" and further "no HAP". Is this a maybe BIOS setting I have to
change? Or another (non-cpu) hardware incompatibility?  Thank you,
Bernhard
You gotta enable them in the BIOS configuration menu of course, assuming 
your motherboard has implemented those features.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b49d87f6-697e-6570-4b7f-abe8b2c7dd43%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: qvm-usb not functioning

2017-11-19 Thread Drew White
Hi folks, sys-usb still isn't functioning and allowing me to attach a device.

help please?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/995770a6-1be1-4186-af40-f494bd1df70a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copying file from Debian8(or Whonix) to a Fedora VM?

2017-11-19 Thread velcro
On Sunday, November 19, 2017 at 4:03:44 PM UTC-6, Chris Laprise wrote:
> On 11/19/2017 01:48 PM, v wrote:
> > I have been using Qubes 3.2 for about 5 months and love it...thank you all 
> > who have contributed!
> >
> > I am a noobie so be gentle...I am also by no means an expert at Linux 
> > however I have been forced to learn quick.
> >
> > I managed to upgrade my Fedora template to 25 and have most of my VMs 
> > running on Fedora25 except for the default Debian8(Which I have reinstalled 
> > since my initial Qubes installation), my Whonix WS and GW are also 
> > defaults. I have also periodically upgraded these templates.
> >
> > I have some basic questions I am hoping I can get some help with:
> >
> > 1) It seems that alot of the experts use Debian as thier working 
> > VMs(Personal, Work, Banking, etc...) and have Fedora as the sys-firewall, 
> > sys-net, etc...is it more secure to use Debian in this way? Am I just as 
> > secure as using Fedora for my working VMs? I would have to think hacking 
> > Xen, then Fedora, then Debian would be harder...
> 
> There are three issues that stand out for me:
> 
> * Fedora is the only distro I've seen that doesn't sign their repository 
> manifest. The idea is if you want full security for updates you pay $$$ 
> for RHEL (Red Hat controls the Fedora project).
> 
> * Fedora releases expire (stop getting security updates) after a 
> relatively short period (again, idea is pay $$$ to Red Hat for long-term 
> updates).
> 
> * Fedora repositories are pretty sparse compared to the software 
> available in Debian and Ubuntu.
> 
> These are the main reasons I choose to use Debian over Fedora. Debian 
> templates also work great for sys-net and firewall/VPN.
> 
> 
> > 2) I have been able to copy/move files from Fedora VMs to other Fedora VMs 
> > but I have struggled to try and copy/move files from Debian(or Whonix-ws) 
> > to Fedora? Fedora has the "File" option from my "Q" menu(top right), when I 
> > am in the files I can right click and "Copy to Other AppVM" or "Open in 
> > DispVM". How do I access Debians version?
> 
> The debian-8 template is close to a 'minimal' release and comes without 
> a file browser. You can copy from the terminal with the 'qvm-copy-to-vm' 
> command, or install a supported file browser (the one used in Fedora 
> template is nautilus).
> 
> When installing nautilus, remember that its meant to work in concert 
> with the rest of Gnome... it may not work right if you install it by 
> specifying 'nautilus' (also you will have to install the python-gtk2 
> package separately). The easiest way to get this working like it does in 
> Fedora is to run 'sudo tasksel' and select the Gnome desktop for 
> installation.
> 
> -- 
> 
> Chris Laprise, 
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

Thank you Chris...instead of asking a myriad of follow up questions, do you or 
anybody else have some good resources for detailed "how tos" on how to 
configure the Debian Template for the laymans use?

I managed to get LibreOffice loaded but my wish list would be an up-to-date 
Firefox, Nautilus(file manager) and what ever is required to get my wireless 
working with sys-net?

I tried changing sys-net to Debian and my wireless wouldn't turn on(Couldn't 
find the option in my network icon in the top right of my screen).

I would be happy to post these instructions back and submit them to the Qubes 
community if that is of value.

Thank you again...



I tried

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3cfa59a8-73af-4725-baa3-0843129a315b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Disk password

2017-11-19 Thread riggedeggcam
I guess you could keep the disk around for the highly unlikely event that some 
fatal exploit is discovered that would be applicable here. It's probably better 
to pretend it never existed, though, for the time being.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c91e7164-4a41-4d0f-8d6f-223db600c4c6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Disk password

2017-11-19 Thread riggedeggcam
I guess you could keep the disk around for the highly unlikely event that some 
fatal exploit is discovered that would apply to it. It's probably better to 
pretend it never existed, though, for the time being.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/682f767e-3142-4a1c-853d-bcd76fd211ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Disk password

2017-11-19 Thread tbennett1988
Everything was on that computer. I’ll give it a while to try to figure it out. 
If I can’t get in it I’ll just wipe it all and try to forget about it. As most 
of you knot btc has risen to a ridiculous amount. Considering what I paid for 
the btc I have on this computer and the profit I’d have now.. makes me sick.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/320e9b7d-7066-4188-82fe-18ee5f4612cd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Possible privacy concerns with Qubes 4 and the transition away from paravirtualization?

2017-11-19 Thread riggedeggcam
I've been reading about Qubes OS for the past few days, and I came across the 
blog post below, detailing the switch from paravirtualization to 
hardware-enforced memory virtualization in Qubes 4. As I understand, the switch 
is intended to improve security (and avoids the overhead added by conventional 
hardware-assisted virtualization by using SLAT).

https://www.qubes-os.org/news/2016/07/21/new-hw-certification-for-q4/

However, I noticed a few people voicing privacy concerns regarding the switch 
from paravirtualization to hardware-enforced memory virtualization. 

Here's one such comment, taken from an r/privacy Reddit thread. 

"Qubes v.4 does concern me though. I am NOT an expert here so I dont want to 
spread bad info but: Qubes 4 plans to ditch paravirtualization in favor of 
hardware-enforced memory virtualization (which I will call HEMV though I dont 
think it has an official acronym). This is good from a security standpoint- 
paravirtualization is vulnerable to code exploits (2 have happened to Xen, 
though never in the wild, KVM/Virtualbox/VMware have all had exploits), while 
HEMV is not. However, HEMV makes the profiling of hardware easier to 
accomplish. Given the recent spat of articles that talk about hardware 
profiling being used as a means to profile and track users, you can understand 
the basis for my concern- paravirtualization makes hardware profiling 
impossible unless an exploit is found to defeat it."

Does this hold any water? Does the switch from paravirtualization to HVM/SLAT 
degrade privacy by allowing easier hardware fingerprinting?

Sorry if this question has been asked and answered before; I searched around 
for a while, and found none. Also, feel free to correct me on anything I got 
wrong. Thanks! :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13b891e1-db96-462c-8410-f024fcf684e1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Possible privacy concerns with Qubes 4.0 and the transition away from paravirtualization?

2017-11-19 Thread riggedeggcam
I've been reading about Qubes OS for the past few days, and I came across the 
blog post below, detailing the switch from paravirtualization to 
hardware-enforced memory virtualization in Qubes 4. As I understand, the switch 
is intended to improve securiy (and avoids the overhead added by conventional 
hardware-assisted virtualization by using SLAT).

https://www.qubes-os.org/news/2016/07/21/new-hw-certification-for-q4/

However, I noticed a few people voicing privacy concerns regarding the switch 
from paravirtualization to hardware-enforced memory virtualization. 

Here's one such comment, taken from an r/privacy Reddit thread. 

"Qubes v.4 does concern me though. I am NOT an expert here so I dont want to 
spread bad info but: Qubes 4 plans to ditch paravirtualization in favor of 
hardware-enforced memory virtualization (which I will call HEMV though I dont 
think it has an official acronym). This is good from a security standpoint- 
paravirtualization is vulnerable to code exploits (2 have happened to Xen, 
though never in the wild, KVM/Virtualbox/VMware have all had exploits), while 
HEMV is not. However, HEMV makes the profiling of hardware easier to 
accomplish. Given the recent spat of articles that talk about hardware 
profiling being used as a means to profile and track users, you can understand 
the basis for my concern- paravirtualization makes hardware profiling 
impossible unless an exploit is found to defeat it."

Does this hold any water? Does the switch from paravirtualization to HVM/SLAT 
degrade privacy by allowing easier hardware fingerprinting?

Sorry if this question has been asked and answered before; I searched around 
for a while, and found none. Also, feel free to correct me on anything I got 
wrong. Thanks! :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ca25af97-cb0d-4b99-bf55-70eb99dd92b7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Disk password

2017-11-19 Thread Finsh
Well...at that point you should get used to the fact that the btc are 
lost.Depending on the Amount, it would be most likely more expensive 
bruteforcing it.
Are you absolutely sure you dont have your wallet-seed somewhere?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b9d92be-b229-4b2a-8438-41c2f47edbfc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] qubes 4.0rc2 install question

2017-11-19 Thread haaber
Hello,
I tried toinstall Q4.0-rc2 today. To my surprise the installer warns me
about hardware incompatibilities that should not exist, according to the
HCL : I have a i7-4600U cpu that has VT-x with EPT and VT-d as it should.
So I am confused ... qubes-hcl-report says "HVM not active", same for
"I/O MMU" and further "no HAP". Is this a maybe BIOS setting I have to
change? Or another (non-cpu) hardware incompatibility?  Thank you,
Bernhard

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/399a05fb-fecb-0864-1046-f3ed338cea9a%40web.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Copying file from Debian8(or Whonix) to a Fedora VM?

2017-11-19 Thread Chris Laprise

On 11/19/2017 01:48 PM, vel...@tutamail.com wrote:

I have been using Qubes 3.2 for about 5 months and love it...thank you all who 
have contributed!

I am a noobie so be gentle...I am also by no means an expert at Linux however I 
have been forced to learn quick.

I managed to upgrade my Fedora template to 25 and have most of my VMs running 
on Fedora25 except for the default Debian8(Which I have reinstalled since my 
initial Qubes installation), my Whonix WS and GW are also defaults. I have also 
periodically upgraded these templates.

I have some basic questions I am hoping I can get some help with:

1) It seems that alot of the experts use Debian as thier working VMs(Personal, 
Work, Banking, etc...) and have Fedora as the sys-firewall, sys-net, etc...is 
it more secure to use Debian in this way? Am I just as secure as using Fedora 
for my working VMs? I would have to think hacking Xen, then Fedora, then Debian 
would be harder...


There are three issues that stand out for me:

* Fedora is the only distro I've seen that doesn't sign their repository 
manifest. The idea is if you want full security for updates you pay $$$ 
for RHEL (Red Hat controls the Fedora project).


* Fedora releases expire (stop getting security updates) after a 
relatively short period (again, idea is pay $$$ to Red Hat for long-term 
updates).


* Fedora repositories are pretty sparse compared to the software 
available in Debian and Ubuntu.


These are the main reasons I choose to use Debian over Fedora. Debian 
templates also work great for sys-net and firewall/VPN.




2) I have been able to copy/move files from Fedora VMs to other Fedora VMs but I have struggled to try and copy/move 
files from Debian(or Whonix-ws) to Fedora? Fedora has the "File" option from my "Q" menu(top 
right), when I am in the files I can right click and "Copy to Other AppVM" or "Open in DispVM". How 
do I access Debians version?


The debian-8 template is close to a 'minimal' release and comes without 
a file browser. You can copy from the terminal with the 'qvm-copy-to-vm' 
command, or install a supported file browser (the one used in Fedora 
template is nautilus).


When installing nautilus, remember that its meant to work in concert 
with the rest of Gnome... it may not work right if you install it by 
specifying 'nautilus' (also you will have to install the python-gtk2 
package separately). The easiest way to get this working like it does in 
Fedora is to run 'sudo tasksel' and select the Gnome desktop for 
installation.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9affcebb-a1e9-8e8c-1283-e73151edf431%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Disk password

2017-11-19 Thread rysiek
On Sunday, November 19, 2017 1:29:03 PM UTC tbennett1...@gmail.com wrote:
> I have no idea the order any of it was put in

You can still try to bruteforce it, but I would start getting used to the fact 
that the contents of this drive are lost for good.

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5010802.BaddXavdCM%40qubuntu.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: This is a digitally signed message part.


[qubes-users] Re: Disk password

2017-11-19 Thread tbennett1988
I have no idea the order any of it was put in

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8e6ef0ec-6fbe-4ebd-a24f-2839c75817bb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] R4.0, Ubuntu, and Salt

2017-11-19 Thread rysiek
On Saturday, November 18, 2017 10:30:49 PM UTC Marek Marczykowski-Górecki 
wrote:
> On Sat, Nov 18, 2017 at 06:36:17PM +, rysiek wrote:
> > Also, started playing with Salt, wrote a nice sls file to install all the
> > stuff I need in the Kubuntu VM, but... each time I run it I get an
> > "ERROR". I am guessing this is related to the less-than-stellar support
> > for Ubuntu templates in Qubes R4.0.
> 
> Run qubesctl with --show-output, or check /var/log/qubes/mgmt-*.log for
> details.

Thanks. This only gives me this error:
2017-11-19 22:06:19,000 calling 'state.highstate'...
2017-11-19 22:06:55,812 output: qubuntu:
2017-11-19 22:06:55,813 output: --
2017-11-19 22:06:55,813 output: _error:
2017-11-19 22:06:55,814 output: Failed to return clean data
2017-11-19 22:06:55,814 output: retcode:
2017-11-19 22:06:55,814 output: 1
2017-11-19 22:06:55,814 output: stderr:
2017-11-19 22:06:55,814 output: stdout:
2017-11-19 22:06:55,814 exit code: 20

is tehre any way to enable more debug output?

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1905541.GLcTUDNXif%40qubuntu.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: This is a digitally signed message part.


[qubes-users] Re: Disk password

2017-11-19 Thread Finsh
If you remember it that specific, you probably know at least parts of the 
password? Otherwise, it would be almost impossible to bruteforce such a long 
Password.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a8b4d7f9-9c82-41f1-863e-f37842599206%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disk password

2017-11-19 Thread tbennett1988
Mine was 22 letters symbols and numbers. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46f766d4-67b3-44a1-abd1-a9c9c7278dfb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disk password

2017-11-19 Thread rysiek
On Sunday, November 19, 2017 11:15:01 AM UTC tbennett1...@gmail.com wrote:
> I have bitcoin in a vm wallet. So it turns into a very costly issue.

Depending on how much time and money you're willing to invest, how long and 
complicated the password is, and how much of the password you remember, you 
might be able bruteforce your way in.

Qubes uses LUKS to encrypt the disk:
https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup

There is a number of LUKS bruteforcing tools you might try and resources you 
might dive into:
https://github.com/glv2/bruteforce-luks
http://irq5.io/2014/11/19/bruteforcing-luks-volumes-explained/
https://www.hacker10.com/other-computing/brute-force-linux-encryption-with-luks-volume-cracker/

Note the second link -- it talks about LUKS headers, which is the only thing 
you need to copy off of your drive to start bruteforcing on other machines. 
Don't try bruteforcing on your laptop, it will take forever. Instead, get the 
LUKS header off of it, get some solid CPU power somewhere and use that.

When I needed to recover a lost LUKS password (it was a 6-word diceware 
passphrase, 4 words and the first letter of the 5th I remembered), it took me 
~30h of bruteforcing on some 20 cores to get it.

Good luck!

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2206727.TezqhYYeyA%40qubuntu.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: This is a digitally signed message part.


Re: [qubes-users] Disk password

2017-11-19 Thread tbennett1988
I have bitcoin in a vm wallet. So it turns into a very costly issue.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3584a46c-1bdd-4821-82cf-e1def1c72751%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Disk password

2017-11-19 Thread rysiek
On Sunday, November 19, 2017 10:48:11 AM UTC tbennett1...@gmail.com wrote:
> Haven’t used my computer for a few months, can’t remember the disk password
> to boot the os. Possible to change it?

The whole point of full disk encryption is making sure that without the 
password nobody can get in... So, no.

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1686166.FoxXDqDcxE%40qubuntu.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: This is a digitally signed message part.


[qubes-users] Copying file from Debian8(or Whonix) to a Fedora VM?

2017-11-19 Thread velcro
I have been using Qubes 3.2 for about 5 months and love it...thank you all who 
have contributed!

I am a noobie so be gentle...I am also by no means an expert at Linux however I 
have been forced to learn quick.

I managed to upgrade my Fedora template to 25 and have most of my VMs running 
on Fedora25 except for the default Debian8(Which I have reinstalled since my 
initial Qubes installation), my Whonix WS and GW are also defaults. I have also 
periodically upgraded these templates.

I have some basic questions I am hoping I can get some help with:

1) It seems that alot of the experts use Debian as thier working VMs(Personal, 
Work, Banking, etc...) and have Fedora as the sys-firewall, sys-net, etc...is 
it more secure to use Debian in this way? Am I just as secure as using Fedora 
for my working VMs? I would have to think hacking Xen, then Fedora, then Debian 
would be harder...

2) I have been able to copy/move files from Fedora VMs to other Fedora VMs but 
I have struggled to try and copy/move files from Debian(or Whonix-ws) to 
Fedora? Fedora has the "File" option from my "Q" menu(top right), when I am in 
the files I can right click and "Copy to Other AppVM" or "Open in DispVM". How 
do I access Debians version?

Thanks in advance for any help...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/00c1d251-d9a4-46bb-b808-6c9097f486ce%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Disk password

2017-11-19 Thread tbennett1988
Haven’t used my computer for a few months, can’t remember the disk password to 
boot the os. Possible to change it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ffb4dae3-7155-4dce-a30e-c8076695c8d2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Qubes 4.0rc2 install on corebooted Lenovo G505s (AMD)

2017-11-19 Thread taii...@gmx.com

Reposting in the other thread.

On 11/18/2017 03:30 PM, awokd wrote:


I have a Corebooted G505S and it's hard locking up on the RC2 install.
Still haven't figured out how to begin to troubleshoot it, but it's not
working for me. See the thread:
https://mail-archive.com/qubes-users@googlegroups.com/msg15824.html
I will assist you with this, I provide free expert tech support for the 
free firmware owners (anyone who has a device with open source silicon 
init can email me off list for hardware/firmware/virt support)


> 1) Installer warns "interrupt remapping" is not supported.
> qubes-hcl-report shows IOMMU as enabled but "Remapping" is not. What
> exactly are they looking for?
IR is an additional security and performance measure, it is supported in 
the firmware so I don't understand as to why it isn't present. I would 
say that is a xen issue.


> 2) Install completes and reboots successfully after that but it only 
gets
> part way through the first default template installation (whonix-gw) 
then

> hard locks- no mouse or keyboard response. Is there a way to force these
> to install in compatible mode or something so I can work on fixing them
> later?

I would install qubes on different hardware on the same drive then swap 
the drive back so we can get a better shell and see what is happening.


> When I boot debian stretch on the same machine, I see AMD-Vi enabling
> interrupt remapping. xl dmesg under 4.0 shows (Xen) enabling interrupt
> remapping. Qubes 3.2 worked fine on this too.
I would take a guess and say this is probably a xen issue, if you do the 
above we can get more info maybe change the version/update to fix it.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ec45aaa-bf20-3a5e-d810-e4745ab2dcbd%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes on iMac 27" late 2009

2017-11-19 Thread taii...@gmx.com

On 11/19/2017 12:01 PM, m...@openmailbox.org wrote:


Dear,
I've an iMac 27 late 2009 (2,66 GHz Intel Core i5).

When I tried to install Qubes OS 4.0 rc2, I get following message:

"Unsupported Hardware Detected

This hardware lack features required by Qubes OS

Missing features: HVM/VT-x/AMD-V, IOMMU/VT-d/AMD-Vi, HAP/SLAT/EPT/RVI,

Interrupt remapping"

Is it possible to solve this issue by activating something?
You would have to enable HVM and IOMMU in the BIOS but it seems in 
apples infinite wisdom they never included a configuration menu. I am 
not sure of any other way to do so but I am sure apple has some super 
secret VIP method so I would ask on a third party apple forum.


Your CPU isn't going to support interrupt remapping anyways making the 
protection of IOMMU a paper tiger so I would get new hardware (tell me 
what you want and I will advise you on what to buy in terms of hardware 
that is owner controlled and qubes supporting)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/596f639b-b1ae-8770-7284-2a954473678f%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes on iMac 27" late 2009

2017-11-19 Thread m . g
Dear,
I've an iMac 27 late 2009 (2,66 GHz Intel Core i5).

When I tried to install Qubes OS 4.0 rc2, I get following message: 

"Unsupported Hardware Detected

This hardware lack features required by Qubes OS

Missing features: HVM/VT-x/AMD-V, IOMMU/VT-d/AMD-Vi, HAP/SLAT/EPT/RVI,

Interrupt remapping"

Is it possible to solve this issue by activating something?

Or do I have to buy a new computer?

Thank you for your help.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171119170124.DC7704E003D%40mta-1.openmailbox.og.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Prebuilt Fedora 26 template now available for 3.2

2017-11-19 Thread Rusty Bird
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Lorenzo Lamas:
> It was already possible to update your F25 templates to F26, but
> fresh F26 templates are now also available to install. (Both normal
> and minimal)

Just a heads up, to use that version of the _minimal_ template (i.e
201711170336) as a NetVM/ProxyVM, you'll have to manually install the
iptables package. Or wait just a little longer for probably the next
qubes-core-vm (r3.2) or qubes-core-agent-networking (r4.0) update.

https://github.com/QubesOS/qubes-core-agent-linux/pull/73
https://github.com/QubesOS/qubes-core-agent-linux/pull/74

Rusty
-BEGIN PGP SIGNATURE-
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=MF5Q
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20171119162036.GA1029%40mutt.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Prebuilt Fedora 26 template now available for 3.2

2017-11-19 Thread fepitre
You have to do only once: dnf update --best --allowerasing .There is some 
conflicting packages requirements between F25 and F26. Also, if you encounter 
problem with pulseaudio you have to enable current-testing (see 
https://groups.google.com/d/msg/qubes-users/o5aWFKvz8-g/bCOTbqQ3BAAJ) until 
some packages will be pushed in current.

Le dimanche 19 novembre 2017 13:58:06 UTC+1, Lorenzo Lamas a écrit :
> It was already possible to update your F25 templates to F26, but fresh F26 
> templates are now also available to install. (Both normal and minimal)
> https://ftp.qubes-os.org/repo/yum/r3.2/templates-itl/rpm/
> 
> With F27 released, F25 will go EOL after a few weeks so it is advised to 
> update.
> 
> 
> The fresh F26 template gives errors on updating:
>  Problem 1: package salt-2017.7.2-1.fc26.noarch requires dnf-utils, but none 
> of the providers can be installed
>   - package dnf-utils-2.1.5-1.fc26.noarch conflicts with yum-utils < 
> 1.1.31-513 provided by yum-utils-1.1.31-512.fc26.noarch
>   - package dnf-utils-2.1.1-1.fc26.noarch conflicts with yum-utils < 
> 1.1.31-513 provided by yum-utils-1.1.31-512.fc26.noarch
>   - cannot install the best update candidate for package 
> yum-utils-1.1.31-512.fc26.noarch
>   - cannot install the best update candidate for package 
> salt-2016.11.5-3.fc26.noarch
>  Problem 2: problem with installed package yum-utils-1.1.31-512.fc26.noarch
>   - package dnf-utils-2.1.5-1.fc26.noarch conflicts with yum-utils < 
> 1.1.31-513 provided by yum-utils-1.1.31-512.fc26.noarch
>   - package salt-2017.7.2-1.fc26.noarch requires dnf-utils, but none of the 
> providers can be installed
>   - package dnf-utils-2.1.1-1.fc26.noarch requires dnf-plugins-core = 
> 2.1.1-1.fc26, but none of the providers can be installed
>   - package salt-ssh-2017.7.2-1.fc26.noarch requires salt = 2017.7.2-1.fc26, 
> but none of the providers can be installed
>   - cannot install both dnf-plugins-core-2.1.1-1.fc26.noarch and 
> dnf-plugins-core-2.1.5-1.fc26.noarch
>   - cannot install the best update candidate for package 
> salt-ssh-2016.11.5-3.fc26.noarch
>   - cannot install the best update candidate for package 
> dnf-plugins-core-2.1.5-1.fc26.noarch

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a33a51a-47ef-4fd4-ba4b-925ba99aa932%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Last dom0 update broke 3.2

2017-11-19 Thread Franz
On Nov 18, 2017 17:36, "Ron Qubed"  wrote:

On Sunday, November 12, 2017 at 12:52:10 PM UTC-7, Francesco wrote:
> After last dom0 update it properly restarted but gave some qubes manager
errors.
>
>
> Second restart keeps restarting on a loop Every time giving the enclosed
screen.
>
>
> Best
> Fran

I ran into something similar after my first Qubes 3.2 install. I did some
tinkering with the USB to get my USB keyboard and mouse working again after
setting up sys-usb the default way (having missed the warning). I think I
broke something along the way. It worked for a while with some warnings
messages during boot. But finally, one of the updates broke it completely,
and I couldn't boot without a kernel panic.

I just re-installed and did the USB setup right the second time around.
Didn't lose anything essential thanks to having moved the appvms to a
separate drive (though it took me a little while to figure out how to
restore them).


Thanks, but I did not move the appvms to a separate drive. Just default
installation. Is there a way to reinstall without loosing them?


Ron

--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/
msgid/qubes-users/63d8d582-7bbb-40e1-aa03-1b4458bdc047%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBOfYBXCDeGGFb4zt18YPRP9Aq7uhuF4DzJnDHcG8q6QQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VM autostart order

2017-11-19 Thread Lorenzo Lamas
I've enabled VM autostart on some of my AppVM's, but now they're they're 
autostarted before some of my ServiceVM's. Is there any way to change the order 
of autostarting VM's so my AppVM's are started last?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4381f051-3794-4805-8f91-d2f70035940e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: R3.2 Upgrading Fedora 25 --> 26 templates - PulseAudio issue

2017-11-19 Thread fepitre
For pulseaudio issue in Fedora 26, you need to enable the current-testing to 
update the qubes-gui-agent-linux for which the spec has been updated (see 
https://github.com/fepitre/qubes-gui-agent-linux/commit/251f5a4be505d6a268fd16bf15e33d9957c36b49).
 Also, if you want, you can build the Fedora 26 for R3.2 and soon Fedora 27 
(see my post 
https://groups.google.com/d/msg/qubes-devel/MLjj0RNYTe8/H-85bI8cBQAJ).

Do not hesitate to check what happen on the qubes-devel list notably for such 
problem related to newer version of Fedora.

Le samedi 4 novembre 2017 05:36:11 UTC+1, Gaijin a écrit :
> On Qubes R3.2 following the template upgrade instructions
> https://www.qubes-os.org/doc/template/fedora/upgrade-24-to-25/ to
> upgrade from Fedora 25 to Fedora 26, I'm running into some issues.
> 
> There are several updates that I can't make:
> 
> ---
> Problem 1: package qubes-gui-vm-3.2.18-1.fc26.x86_64 requires pulseaudio
> = 10.0, but none of the providers can be installed
>   - cannot install both pulseaudio-11.1-2.fc26.x86_64 and
> pulseaudio-10.0-4.fc26.x86_64
>   - cannot install both pulseaudio-10.0-4.fc26.x86_64 and
> pulseaudio-11.1-2.fc26.x86_64
>   - cannot install the best update candidate for package
> qubes-gui-vm-3.2.18-1.fc26.x86_64
>   - cannot install the best update candidate for package
> pulseaudio-10.0-4.fc26.x86_64
>  Problem 2: package salt-2017.7.2-1.fc26.noarch requires dnf-utils, but
> none of the providers can be installed
>   - package dnf-utils-2.1.5-1.fc26.noarch conflicts with yum-utils <
> 1.1.31-513 provided by yum-utils-1.1.31-512.fc26.noarch
>   - package dnf-utils-2.1.1-1.fc26.noarch conflicts with yum-utils <
> 1.1.31-513 provided by yum-utils-1.1.31-512.fc26.noarch
>   - cannot install the best update candidate for package
> yum-utils-1.1.31-512.fc26.noarch
>   - cannot install the best update candidate for package
> salt-2016.11.5-3.fc26.noarch
>  Problem 3: package qubes-vm-dependencies-3.2.3-1.fc26.noarch requires
> qubes-gui-vm, but none of the providers can be installed
>   - package qubes-gui-vm-3.2.18-1.fc26.x86_64 requires pulseaudio =
> 10.0, but none of the providers can be installed
>   - package pulseaudio-10.0-4.fc26.x86_64 requires
> libpulsecommon-10.0.so()(64bit), but none of the providers can be
> installed
>   - cannot install both pulseaudio-libs-11.1-2.fc26.x86_64 and
> pulseaudio-libs-10.0-4.fc26.x86_64
>   - cannot install both pulseaudio-libs-10.0-4.fc26.x86_64 and
> pulseaudio-libs-11.1-2.fc26.x86_64
>   - cannot install the best update candidate for package
> qubes-vm-dependencies-3.2.3-1.fc26.noarch
>   - cannot install the best update candidate for package
> pulseaudio-libs-10.0-4.fc26.x86_64
>  Problem 4: problem with installed package
> qubes-gui-vm-3.2.18-1.fc26.x86_64
>   - package qubes-gui-vm-3.2.18-1.fc26.x86_64 requires pulseaudio =
> 10.0, but none of the providers can be installed
>   - cannot install both pulseaudio-11.1-2.fc26.x86_64 and
> pulseaudio-10.0-4.fc26.x86_64
>   - cannot install both pulseaudio-10.0-4.fc26.x86_64 and
> pulseaudio-11.1-2.fc26.x86_64
>   - package pulseaudio-module-bluetooth-11.1-2.fc26.x86_64 requires
> libpulsecore-11.1.so()(64bit), but none of the providers can be
> installed
>   - cannot install the best update candidate for package
> pulseaudio-module-bluetooth-10.0-4.fc26.x86_64
>  Problem 5: problem with installed package
> yum-utils-1.1.31-512.fc26.noarch
>   - package dnf-utils-2.1.5-1.fc26.noarch conflicts with yum-utils <
> 1.1.31-513 provided by yum-utils-1.1.31-512.fc26.noarch
>   - package salt-2017.7.2-1.fc26.noarch requires dnf-utils, but none of
> the providers can be installed
>   - package dnf-utils-2.1.1-1.fc26.noarch requires dnf-plugins-core =
> 2.1.1-1.fc26, but none of the providers can be installed
>   - package salt-ssh-2017.7.2-1.fc26.noarch requires salt =
> 2017.7.2-1.fc26, but none of the providers can be installed
>   - cannot install both dnf-plugins-core-2.1.1-1.fc26.noarch and
> dnf-plugins-core-2.1.5-1.fc26.noarch
>   - cannot install the best update candidate for package
> salt-ssh-2016.11.5-3.fc26.noarch
>   - cannot install the best update candidate for package
> dnf-plugins-core-2.1.5-1.fc26.noarch
>  Problem 6: problem with installed package
> qubes-vm-dependencies-3.2.3-1.fc26.noarch
>   - package qubes-vm-dependencies-3.2.3-1.fc26.noarch requires
> qubes-gui-vm, but none of the providers can be installed
>   - package qubes-gui-vm-3.2.18-1.fc26.x86_64 requires pulseaudio =
> 10.0, but none of the providers can be installed
>   - cannot install both pulseaudio-11.1-2.fc26.x86_64 and
> pulseaudio-10.0-4.fc26.x86_64
>   - cannot install both pulseaudio-10.0-4.fc26.x86_64 and
> pulseaudio-11.1-2.fc26.x86_64
>   - package pulseaudio-module-x11-11.1-2.fc26.x86_64 requires
> libpulsecore-11.1.so()(64bit), but none of the providers can be
> installed
>   - cannot install the best update candidate for package
> pulseaudio-module-x11-10.0-4.fc26.x86_64
> 

Re: [qubes-users] Re: R3.2 Upgrading Fedora 25 --> 26 templates - PulseAudio issue

2017-11-19 Thread Nicola Schwendener
Hi all,
I've the same issue with Fedora 26 and Qubes R3.2. trying to update the image I 
got the same result.
hoping someone could help us
Nick

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d6dee632-0652-4165-aa6e-a5221d690c17%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: R3.2 Upgrading Fedora 25 --> 26 templates - PulseAudio issue

2017-11-19 Thread Gaijin
On 2017-11-06 22:42, Gaijin wrote:
> 
> Well, there are Fedora 26 templates
> https://ftp.qubes-os.org/repo/yum/r3.2/current/vm/
> However, I'm still stuck with this PulseAudio issue...

Nobody else has run into this issue of an older version of PulseAudio
being required for the Fedora 26 templates in R3.2?

I can update some packages manually, but this dependency in the Qubes
Fedora 26 template messes up updating from the GUI Qubes Manager. All
templates always show that an update is needed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a7c06e25f2b34446396297df9a4524d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.