Re: [qubes-users] Re: new Desktop build recommendation

2018-01-04 Thread Wael M. Nasreddine
I read a bit more on M/B connectors and
https://www.newegg.com/Product/Product.aspx?Item=N82E16817153218=1
has one EPS (8 pin) and one ATX (8 pin as well), so it's all good.

Taiidan, what GPU do you use? The board has only a VGA, which is OK for
setting it up, but I want to run a 1080p widescreen (one, for now, more for
later. I have a GeForce GTX 760
laying
around, would it work? It says required PCI-E 3 and the board has PCI-E 2
so probably not, but would be good to know.

On Wed, Jan 3, 2018 at 6:33 PM Wael M. Nasreddine 
wrote:

> This is even better
> https://www.newegg.com/Product/Product.aspx?item=N82E16817153218 for $280
> but it does not seem to come with 2 EPS (even though I see +12V1 and +12V2.
> I think one is EPS and another one is ATX. I read on coreboot that adapters
> can catch on fire, but not sure if that applies here as my understanding is
> adapters if for hooking up both CPUs in parallel. What do you think?
>
> On Wed, Jan 3, 2018 at 1:00 PM Wael M. Nasreddine <
> wael.nasredd...@gmail.com> wrote:
>
>> On Tue, Jan 2, 2018 at 10:57 AM Wael M. Nasreddine <
>> wael.nasredd...@gmail.com> wrote:
>>
>>> On Fri, Dec 29, 2017 at 9:53 PM taii...@gmx.com  wrote:
>>>
 On 12/29/2017 10:28 PM, Wael M. Nasreddine wrote:

 > On Fri, Dec 29, 2017 at 3:06 PM taii...@gmx.com 
 wrote:
 >
 >> Those dual 6386 are a good price I would get them if I was you, there
 >> will always be plenty of buyers if you want to sell the second one.
 >>
 > Ok got the CPU and the cooler.
 Man dual 6386, that is gonna be one speed demon :D lucky bastard!

>>> It'll be awesome.
>>>
>>> >   I'm struggling to find a good case.
 If you have the money I would get a supermicro 4U case, they are nice
 (one that comes with front drive trays preferably)

>>> I couldn't find a Supermicro that's compatible with EEB, is E-ATX the
>>> same as EEB? It has the same dimensions, but I think it has different
>>> mounting screws right?
>>>
>>> >   There
 > are plenty of choice, and since this would be my first server case
 build,
 > I'm not sure what to look for. For example, here's newegg search
 > <
 https://www.newegg.com/Product/ProductList.aspx?Submit=ENE=18044=1=4u%20case=And=EEB=1=36=BESTMATCH
 >
 > for 4U cases having EEB keyword (no EEB filter offered), this case
 seems
 > cheap enough
 > https://www.newegg.com/Product/Product.aspx?Item=N82E16811219020 but
 has
 > 80mm fans in the middle, not 120mm. I've seen a few cases with 120mm
 > mid-fans but did not support EEB. Do you have a link for a case you
 work
 > with?
 My case is a shorter model 80mil in the back 120 for both front drive
 bays no room for middle fans.

 That case seems fine, although can you tell me the price and shipping? I
 can't see it as I browse with JS off.

>>>
>>> That case is $86.99 free shipping.
>>>
>>> For the power supply, what do you think of this one
>>> https://www.newegg.com/Product/Product.aspx?Item=N82E16817338110 (sells
>>> for 119.99 + 4.99 shipping). Do you have an example for the power supply
>>> with modular cables?
>>>
>>
>> Actually, the above power supply wouldn't work (the board requires 24pin,
>> and I need about 700W. I found this one
>> https://www.newegg.com/Product/Product.aspx?Item=9SIAD245CD7980 for
>> $316, quite pricy for a PSU, any suggestion?
>>
>> What do you recommand for the TPM module?
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CA%2BkKtKAUZU021dYhFfbYvNP30%3DH__ExXPEGKc_6ozRopLEzHWg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Tweak Tool not working as expected after upgrade to Fedora 26

2018-01-04 Thread 'Tom Zander' via qubes-users
On Thursday, 4 January 2018 02:11:16 GMT Mark Malcom wrote:
> I downloaded fedora-26 template and after that my gnome-tweak-tool is
> completely ignored: no themes, no windows scaling anymore. Not just the
> Tweak Tool, but if I try to change the scale factor with gnomesettings,
> that is also ignored.

Lets check if its an environment issue;

if you start a terminal on a VM.
In that terminal do an;
  export GDK_SCALE=2.3
and then start something like chromium or any gtk app.
does that work?

If yes, then you know its most likely a problem with environment variables 
in your VM in one way or another.
-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1643950.2kKg6ph7nQ%40mail.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread rysiek
Dnia Thursday, January 4, 2018 9:33:04 AM CET Andrew David Wong pisze:
> We've just published an announcement about this:
> 
> https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/

Thank you, much appreciated. Good luck to the whole team in dealing with this.

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5334706.ITVnm1lE8D%40lapuntu.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: This is a digitally signed message part.


[qubes-users] XSA-253 does not affect the security of Qubes OS

2018-01-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The Xen Project has published Xen Security Advisory 253 (XSA-253).
This XSA does *not* affect the security of Qubes OS, and no user
action is necessary.

This XSA has been added to the XSA Tracker:

https://www.qubes-os.org/security/xsa/#253

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=gT4o
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e10a1c84-855b-214a-863e-62e74dd453fa%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] specter, meltdown, and dom0

2018-01-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-01-03 18:01, pixel fairy wrote:
> Since someone has to start this thread,
> 
> Does dom0 matter here, or would patching xen fix this?
> 

We've just published an announcement about this:

https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=e1p2
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9286dfa-03ad-10bf-ca4d-4d60a52dac21%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2018-01-03 05:55, stephenatve...@gmail.com wrote:
> https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
> 
> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
> 
> It seems as if Linux countermeasures will involve a significant rewrite aka. 
> FUCKWIT.
> 
> Is this perhaps why there is no final 4.0 release?
> 

We've just published an announcement about this:

https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlpOSSkACgkQ203TvDlQ
MDCm1A/8CB9dT3qUWt3KkrjRSd0kYBLnHyEHUVs828gHIT8J+QrIvWAkw1hKyVR9
mMas3QIKPCZiWh7/d69OES0YBFZLA8P79u1jJHaMGOh5j1JkQiqyMQ9dM9fH7pK7
cr1UKIbkhM9Yicp8F73FVuwQZe4zwOreUBW0PkPFtS5yNm9mYVqeGMvgFBdq+m+7
/e2R5uVk8WKtNxuIxqYm/fZAec8hNi9B+YxCrnO7w3a2VWLMu99yCTM7BaCvZcUe
igoocDJ1Y3He/3TaV9dGcjmrOkih7iBTWS4jXr9B6XYSAhp4VyAqyldy9QQM3Icz
CWKMxfuJzUaw+UYF3O85o8PAEKgzWxDqqGzR+1VVDJbDwzixolqWgpcl80PkLPRf
Wdu9HZVXYeG0g0JA/Ys+KifKKRzFOaIHezTagJpxCt+qGct9wKjbyjdL/6bsi2dP
P1AHQzcDJiHEQ9Uz91jqnRV0Ri2/+Dz+luiSbAlock7HjaQ7j9GvbRcGk72RU/lK
qizFfPPLvHhR8OiSPPtl8sLNMMgxM+sC5lTJOzJtRkszKGpT8+DXonYviNjGbbSO
qkLxoga1FMqDQlKb2sNPOqRs1/CtEqKsqSNuejDen5fl9STHoZKsuBr7/Ko6R3Gn
Ty8l7AKg4fWyN9flc3LOUo2WAHACRhkQ4yCYR5hx3Xwc62lshis=
=p5v8
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93dada0b-7635-2227-e49b-337941ededb5%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Announcement regarding the Meltdown and Spectre attacks

2018-01-04 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

The Qubes Security Team is currently investigating the extent to which
[XSA-254] (and the [Meltdown] and [Spectre] attacks more generally)
affect the security of Qubes OS. The practical impact of these attacks
on Qubes is currently unclear. While the Qubes Security Team is a
member of the [Xen predisclosure list], [XSA-254] was disclosed on an
accelerated timetable ahead of schedule, so our team has not yet had a
chance to analyze these attacks, nor has the Xen Project released any
patches associated with [XSA-254]. We are continuing to monitor the
situation closely. Once the Security Team makes a determination about
the impact on Qubes, we will make another announcement, update the
[XSA Tracker], and, if appropriate, issue a [Qubes Security Bulletin]
with information about patching.

[XSA-254]: https://xenbits.xen.org/xsa/advisory-254.html
[Meltdown]: https://meltdownattack.com/
[Spectre]: https://spectreattack.com/
[Xen predisclosure list]: https://www.xenproject.org/security-policy.html
[XSA Tracker]: https://www.qubes-os.org/security/xsa/
[Qubes Security Bulletin]: https://www.qubes-os.org/security/bulletins/

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/01/04/xsa-254-meltdown-spectre/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-BEGIN PGP SIGNATURE-
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=gdii
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2fefb7c6-0e8e-036c-09ef-d1692d655d65%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0 rc3 boot and performance is quite slow

2018-01-04 Thread 'Tom Zander' via qubes-users
On Thursday, 4 January 2018 11:49:45 GMT Fabrizio Romano Genovese wrote:
> Looking at the console messages at startup, it looks like the problem is
> that Qubes takes more than one minute to boot sys-net, sys-firewall,
> sys-usb and sys-whonix. That was not the case in 3.2.
> 
> Also, when giving
> qvm-start someVM
> the startup time is again quite slow. Could it be that my VMs are based on
> Fedora26?

Can you try giving your VMs more initial memory?
I saw that the default of 400MB is causing VMs to swap like crazy on 
startup. I change it to 1000MB and stuff starts significantly faster.

I also removed swap in fstab on all templates, the only effect this has had 
so far is show that the memory balancer is in need of work. It fails to give 
hosts memory when they use significantly more than others.

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4469951.fVkcPeMF00%40mail.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread stephenatverdi
On Wednesday, 3 January 2018 12:55:54 UTC+1, stephen...@gmail.com  wrote:
> https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
> 
> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
> 
> It seems as if Linux countermeasures will involve a significant rewrite aka. 
> FUCKWIT.
> 
> Is this perhaps why there is no final 4.0 release?

Some news from rootkovska via Twatter:

Re the #Meltdown/#Spectre attacks:
1. Practical impact on Qubes is unclear to us ATM,
2. No advanced info has been shared with us on Xen predisclosure list, so we've 
had no time to evaluate yet,
3. Xen published XSA 254 unexpectedly last night,
4. Xen offers no patches ATM...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd9731dc-f8f9-4f9d-aa11-e43d16cfdfe4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread 'awokd' via qubes-users
On Thu, January 4, 2018 1:28 am, awokd wrote:
> On Thu, January 4, 2018 12:03 am, rysiek wrote:
>
>
>> And here we are:
>> https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-yo
>> u- need.html
>> https://googleprojectzero.blogspot.pt/2018/01/reading-privileged-memory
>> -w
>> ith-side.html https://meltdownattack.com/meltdown.pdf
>> https://spectreattack.com/spectre.pdf
>>
>
> Xen Security Advisory (not Qubes)
> https://xenbits.xen.org/xsa/advisory-254.html

This part is interesting, but might not be a lot of good if it doesn't
include PCI passthrough:

"For guests with legacy PV kernels which cannot be run in HVM mode, we
have developed a "shim" hypervisor that allows PV guests to run in PVH
mode.  Unfortunately, due to the accelerated schedule, this is not yet
ready to release.  We expect to have it ready for 4.10, as well as PVH
backports to 4.9 and 4.8, available over the next few days."

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4bd20e5453e42b2b49142b038ed119ce.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Donations with Bitcoin (Cash) - BCH

2018-01-04 Thread piotrpm7
W dniu czwartek, 4 stycznia 2018 13:31:30 UTC+1 użytkownik 
eva...@openmailbox.org napisał:
> Due to high fees and heavy losses to donator at Bitcoin Core (BTC) network I 
> suggest to at Bitcoin Cash (BCH) donation address as alternative. 
> Nobody want to donate 50$ and lose 40$ as fees. 
I would suggest using bech32 native SegWit address and not sending donations 
during congestion.
For example, I estimate that currently standard (1 input, 2 outputs) Bitcoin 
transaction would cost 9USD and 6USD for bech32 SegWit.

W dniu czwartek, 4 stycznia 2018 14:42:31 UTC+1 użytkownik 
eva...@openmailbox.org napisał:
> > I want to also add that the current address publicly displayed will work 
> > just fine on Bitcoin Cash, which may be useful to know.
> 
> POSSIBLE: NOT
> I'm not sure that it's possible to use current Qubes address with the same 
> private keys at Bitcoin Cash (BCH) network. I guess that this 700 is already 
> lost, but I maybe wrong! 
> Because they have address started with 3*** it's SegWit address and it's not 
> complete with Bitcoin (BCH).
It is not certain. 3*** are "pay to script hash" address and they were 
primarily used for multi-signature addresses (which is also possible in Bitcoin 
Cash). Using "3***" for SegWit is relatively new purpose for "3***" address.

"we have switched today to a multi-signature wallet for our Qubes bitcoin fund."
from https://www.qubes-os.org/news/2016/07/13/qubes-distributed-fund/

You can also see one of outgoing transaction from donation address:
https://btc.com/a3fdc9f293862a5e91d3feabad2e259719d717bc99d0dfb65f826295be12dc7d
As "Size" is equal to "Virtual size" I would say it is not SegWit address, so 
it should be possible to get any Bitcoin Cash funds sent to this address.

That said, fees for "6 of 13 multisig" in Bitcoin are going to be very big.

Maybe there should be additional, non-multisig address for low amount donations 
to lower the cost of fees? It could be periodically sweept into secure multisig 
address.


--
Best regards,
Piotr Machała pm7

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5fb0d6ae-ee10-481a-a629-87024b283fe5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Netowork Manager not running (minimal VM)

2018-01-04 Thread 'awokd' via qubes-users
On Thu, January 4, 2018 11:46 am, Fabrizio Romano Genovese wrote:


> I suspect there is some service that needs to be started when the VM
> boots that I haven't specified, but I don't know how to proceed.

Try adding NetworkManager to the Services tab on your sys-net VM?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/667d7f10ccd344a2802e4351b8c8c53d.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Tweak Tool not working as expected after upgrade to Fedora 26

2018-01-04 Thread Markus Kilås
On 01/04/2018 03:11 AM, Mark Malcom wrote:
> Well guys, just trying to see if anyone is facing the same issue here:
> 
> I downloaded fedora-26 template and after that my gnome-tweak-tool is 
> completely ignored: no themes, no windows scaling anymore. Not just the Tweak 
> Tool, but if I try to change the scale factor with gnomesettings, that is 
> also ignored.
> This is true for new and existing appVMs and also, an upgrade from Fedora 25 
> to 26 with subsequent qubes trimming yields the same result.
> 
> It is really annoying as I have a 4K display and now had to downgrade the 
> resolution and still getting very small windows.
> 
> Maybe could anyone shed a light what can be done to get these settings back 
> again? I'm not sure if there is any other package that needs installed and 
> configured for the Tweak Tool to work, plus gnome scaling settings.
> 
> Thanks everyone.
> 

It could maybe be that the gnome settings daemon thing is not running.

I followed the suggestion of having xsd-xsettings autostart from this
comment and got scaling back to work:
https://github.com/QubesOS/qubes-issues/issues/3108#issuecomment-353786604

Cheers,
Markus

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4a15fd1-3b24-ff93-6c10-f3b8cefa505e%40xn--kils-soa.se.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How do I install and configure a template vm in Qubes 4?

2018-01-04 Thread aaq via qubes-users
> The same functionality is present in Qubes4, just not via a GUI.
> 
> open a terminal in dom0 (adminvm) and type;
> 
> qvm-prefs -s YOURVMNAME netvm sys-firewall
> 
> When you are done downloading consider unsetting the netvm with;
> qvm-prefs -s YOURVMNAME netvm ""

I thought so, I just can't seem to find any information anywhere. I might just 
be stupid, or not looking closely enough.

I can see I need to read the documentation more carefully too, and look into 
all the new tools.

Thanks a bunch!

> 
> I'll add the warning that you should be careful what you do in a TemplateVM, 
> anything you run or download has sudo and can install or change data which 
> then will cause all your VMs based on this template to be contaminated.
> Be safe.

Yeah, I know. I am only installing open source stuff, and things I actually 
trust. It is primarily for my template for private usage. I wouldn't install 
weird stuff in there :)

Again thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/715c7e94-5f1e-4357-9b49-7dae276cc98c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How do I install and configure a template vm in Qubes 4?

2018-01-04 Thread 'Tom Zander' via qubes-users
On Thursday, 4 January 2018 10:40:56 GMT 'Ahmed Al Aqtash' via qubes-users 
wrote:
> In 3.2 you could allow network access in a template rather easily through
> the GUI, and thus be able to pull software from other destinations than
> just repos.

The same functionality is present in Qubes4, just not via a GUI.

open a terminal in dom0 (adminvm) and type;

qvm-prefs -s YOURVMNAME netvm sys-firewall

When you are done downloading consider unsetting the netvm with;
qvm-prefs -s YOURVMNAME netvm ""


I'll add the warning that you should be careful what you do in a TemplateVM, 
anything you run or download has sudo and can install or change data which 
then will cause all your VMs based on this template to be contaminated.
Be safe.

-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6475371.V95BB4TYbR%40mail.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread Holger Levsen
On Thu, Jan 04, 2018 at 05:40:27AM -0800, stephenatve...@gmail.com wrote:
> On Thursday, 4 January 2018 13:39:46 UTC+1, eva...@openmailbox.org  wrote:
> > 3.2 affected? When patch will be available? :(
> My impression is that 3.2 isn't being patched pending 4.0, but I could be 
> wrong there.

you are wrong.

3.2 will be supported for one more year after the release of 4.0.
(Normally it's just for half a year.)


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180104135930.7iwsg2n4slydmsgj%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: PGP signature


Re: [qubes-users] Donations with Bitcoin (Cash) - BCH

2018-01-04 Thread John Doe
Bitcoin cash (BCASH) is a scam, I'm sure Qubes devs are smart enough to 
see that.


And please, use the full name "Bitcoin Cash" or the shortname "BCASH" 
when you are referring to that altcoin or you may confuse the casual reader.


J.


On 01/04/2018 02:33 PM, evas...@openmailbox.org wrote:



I want to also add that the current address publicly displayed will work
just fine on Bitcoin Cash, which may be useful to know.


POSSIBLE: NOT
I'm not sure that it's possible to use current Qubes address with the same 
private keys at Bitcoin Cash (BCH) network. I guess that this 700 is already 
lost, but I maybe wrong!
Because they have address started with 3*** it's SegWit address and it's not 
complete with Bitcoin (BCH).
As I remember only 1*** addresses is equivalent.
Please, google or 
https://news.bitcoin.com/hundreds-bitcoin-cash-stuck-segwit-addresses-might-way-get-back/

Anyway I suggest to add clear Bitcoin (BCH) address.


Big companies like bitpay (biggest bitcoin payment processor) have already
stated they will no longer accept any Bitcoin internet payments under $100,
which you can understand means it can no longer be used for the majority of
Internet payments. They are working on switching to Bitcoin Cash instead.



Yes, thanks for good description. And not every person want and can to send 
$100 donations and afford to lose at fees.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d480545f-4fa5-a0e5-fce3-551a131e2c13%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Donations with Bitcoin (Cash) - BCH

2018-01-04 Thread evastar

> I want to also add that the current address publicly displayed will work 
> just fine on Bitcoin Cash, which may be useful to know.

POSSIBLE: NOT
I'm not sure that it's possible to use current Qubes address with the same 
private keys at Bitcoin Cash (BCH) network. I guess that this 700 is already 
lost, but I maybe wrong! 
Because they have address started with 3*** it's SegWit address and it's not 
complete with Bitcoin (BCH).
As I remember only 1*** addresses is equivalent. 
Please, google or 
https://news.bitcoin.com/hundreds-bitcoin-cash-stuck-segwit-addresses-might-way-get-back/
 

Anyway I suggest to add clear Bitcoin (BCH) address.

> Big companies like bitpay (biggest bitcoin payment processor) have already 
> stated they will no longer accept any Bitcoin internet payments under $100, 
> which you can understand means it can no longer be used for the majority of 
> Internet payments. They are working on switching to Bitcoin Cash instead.
> 

Yes, thanks for good description. And not every person want and can to send 
$100 donations and afford to lose at fees.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180104133352.39A80566330%40mta-1.openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread stephenatverdi
On Wednesday, 3 January 2018 12:55:54 UTC+1, stephen...@gmail.com  wrote:
> https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
> 
> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
> 
> It seems as if Linux countermeasures will involve a significant rewrite aka. 
> FUCKWIT.
> 
> Is this perhaps why there is no final 4.0 release?

Redhat has now posted speculative execution mitigation patches.  I've no idea 
to what extent they fix all possible Spectre-like side-channel attacks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f328aa39-720b-4ddf-9efd-a43ba5660c2a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread stephenatverdi
On Thursday, 4 January 2018 13:39:46 UTC+1, eva...@openmailbox.org  wrote:
> 3.2 affected? When patch will be available? :(

My impression is that 3.2 isn't being patched pending 4.0, but I could be wrong 
there.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/daed3c17-3dd1-416c-b374-8e668a0bc798%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Donations with Bitcoin (Cash) - BCH

2018-01-04 Thread 'Tom Zander' via qubes-users
On Thursday, 4 January 2018 12:28:27 GMT evas...@openmailbox.org wrote:
> Happy New Year Qubes Community!
> 
> Due to high fees and heavy losses to donator at Bitcoin Core (BTC) network
> I suggest to at Bitcoin Cash (BCH) donation address as alternative.
> Nobody want to donate 50$ and lose 40$ as fees.

As a long time Bitcoin developer, I completely agree with this sentiment.


I want to also add that the current address publicly displayed will work 
just fine on Bitcoin Cash, which may be useful to know.

Big companies like bitpay (biggest bitcoin payment processor) have already 
stated they will no longer accept any Bitcoin internet payments under $100, 
which you can understand means it can no longer be used for the majority of 
Internet payments. They are working on switching to Bitcoin Cash instead.

Curiously, looking at the Qubes donation page I see that the address you 
have shows that the Qubes organization in actual fact already owns a some 
funds in Bitcoin Cash (BCH).
https://bch.btc.com/3GakuQQDUGyyUnV1p5Jc3zd6CpQDkDwmDq
Around € 700 worth.

To the Qubes-guys; please consider updating your website and if you post it 
on something like reddits rBtc forum, you likely will get some more 
publicity out of it as well.

If you want any details, feel free to ask me more in private email.
-- 
Tom Zander
Blog: https://zander.github.io
Vlog: https://vimeo.com/channels/tomscryptochannel


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1537277.lEZcpCop9W%40mail.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread evastar
3.2 affected? When patch will be available? :(

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180104123237.97B825671B5%40mta-1.openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Donations with Bitcoin (Cash) - BCH

2018-01-04 Thread evastar
Happy New Year Qubes Community!

Due to high fees and heavy losses to donator at Bitcoin Core (BTC) network I 
suggest to at Bitcoin Cash (BCH) donation address as alternative. 
Nobody want to donate 50$ and lose 40$ as fees. 
Also it's not possible with current Core address to donate low amount like 
1$-5$ to the project with Bitcoin.

https://www.qubes-os.org/donate/

p.s. I'm personally believe that Bitcoin (BTC) was dead, because it goes on the 
evil path of a dictatorship, censorship and it's not true Bitcoin described at 
Bitcoin whitepaper after SegWit, therefor 
I do not use it anymore and I'm not alone. Qubes need Bitcoin (BCH) donation 
address at least for this reason as alternative for such ppl who only use only 
Bitcoin (BCH).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180104122828.7F7E050A8E8%40mta-1.openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4rc3: More space needed on the / filesystem.

2018-01-04 Thread Fabrizio Romano Genovese
> On Wednesday, 3 January 2018 16:16:13 GMT Fabrizio Romano Genovese wrote:
> > I am trying to install texlive on a fedora-26 template vm. The package is
> > quite big, nevertheless it is correctly downloaded. After this, when the
> > actual installation process would be supposed to start, it fails with the
> > message:
> > 
> > At least *MB more space needed on the / filesystem
> 
> Have you considered making the root filesystem of your VM have more space?
> 
> In the settings dialog for a VM its the "System storage max size" item which 
> you can change. Be aware that the VM likely needs to restart to access the 
> extra space.

I did and I solved the problem now, thanks. I have to say that the problem here 
was the absence of qubes-manager: I wasn't able to see where to set the root 
partition dimensions. Also, I am using i3, so the idea of moving "all the 
relevant stuff" to the start menu is like saying "we really, really hate our i3 
users" :D

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21bfa3ea-93eb-48f8-8369-ba254e7e2207%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 rc3 boot and performance is quite slow

2018-01-04 Thread Fabrizio Romano Genovese
As the title says, Qubes 4.0rc3 boot is very slow compared to Qubes 3.2.

Looking at the console messages at startup, it looks like the problem is that 
Qubes takes more than one minute to boot sys-net, sys-firewall, sys-usb and 
sys-whonix. That was not the case in 3.2. 

Also, when giving 
qvm-start someVM
the startup time is again quite slow. Could it be that my VMs are based on 
Fedora26?

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf8c3f00-9b40-4f67-a633-233430679430%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Netowork Manager not running (minimal VM)

2018-01-04 Thread Fabrizio Romano Genovese
I am trying to set up a sys-net based on fedora-26-minimal. I installed all the 
suggested packages in https://www.qubes-os.org/doc/templates/fedora-minimal/

When I start sys-net I can see the network-manager applet, but if I click on it 
it says "NetworkManager is not running..."

If I manually give 
sudo NetworkManager then I can see all the wireless networks I usually see in 
my place (hence the network card is recognized) but when I try to connect to 
one of them I receive the message
(1) Not authorized to control networking.

I suspect there is some service that needs to be started when the VM boots that 
I haven't specified, but I don't know how to proceed.

Cheers,
Fab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b9463d9-2407-45a1-9a3c-3e74d047785f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread stephenatverdi
On Wednesday, 3 January 2018 12:55:54 UTC+1, stephen...@gmail.com  wrote:
> https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
> 
> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
> 
> It seems as if Linux countermeasures will involve a significant rewrite aka. 
> FUCKWIT.
> 
> Is this perhaps why there is no final 4.0 release?

I guess the good news is that this debacle is going to force hardware designers 
and OS developers (including Qubes) to work together on minimising the chances 
chip-level bugs like this.

Also Intel, AMD, ARM & Co. will be 'motivated' to pay attention to hardware 
virtualisation security issues.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/10abb949-fd99-4b81-bb1b-51d1309adcfc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How do I install and configure a template vm in Qubes 4?

2018-01-04 Thread 'Ahmed Al Aqtash' via qubes-users
Hello all!

I have recently installed Qubes 4 RC3 (I used Qubes 3.2, but when I
switched laptops the installer was outdated, and I was forced to use
something else..)

In 3.2 you could allow network access in a template rather easily through
the GUI, and thus be able to pull software from other destinations than
just repos.

In 4 however, I cannot allow access to my template vm, thus preventing me
from, e.g. pulling my config files from github to my template, installing
other software from github or otherwise configuring and pulling software
from where ever I like.

So my question is basically:
Is it possible to open the template more up temporarily like in Qubes 3.2
so that I can install and customise the template however I like and how?

OR

Are we forced to use Qubes in a more 'standalone' manner, meaning that we
should use standalone vm's more than templates now?

I am sorry if this has already been cleared somewhere, I was unable to find
anything related to this.

Thanks in advance for any answers!
I think I am most of all just puzzled.

Regards!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CA%2B3%2BOvi_RddeDt7uBSEi6eJ9RwLxzqkE3wKtGheJvY%2B%3DhaZY1w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread stephenatverdi
On Thursday, 4 January 2018 09:56:44 UTC+1, stephen...@gmail.com  wrote:
> On Wednesday, 3 January 2018 12:55:54 UTC+1, stephen...@gmail.com  wrote:
> > https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
> > 
> > http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
> > 
> > It seems as if Linux countermeasures will involve a significant rewrite 
> > aka. FUCKWIT.
> > 
> > Is this perhaps why there is no final 4.0 release?
> 
> There is a Xen fix available here, at least to the Meltdown manifestation to 
> the chip-makers SNAFU:
> 
> https://xenbits.xen.org/xsa/advisory-254.html
> 
> This I assume will be in the 4.0 release version of Qubes.
> 
> The best explanation of the field that I can find is here: 
> https://www.theregister.co.uk/2018/01/04/intel_amd_arm_cpu_vulnerability/
> 
> Oder?

Or at least the Meltdown (= SP3?) parts thereof.  Against Spectre there is no 
known defence, which generally seems to break VM isolation against an attack.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e64448c-b159-40c0-8a19-5c6d6bde8864%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes effected by the Intel kernel memory leaking bug?

2018-01-04 Thread stephenatverdi
On Wednesday, 3 January 2018 12:55:54 UTC+1, stephen...@gmail.com  wrote:
> https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
> 
> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
> 
> It seems as if Linux countermeasures will involve a significant rewrite aka. 
> FUCKWIT.
> 
> Is this perhaps why there is no final 4.0 release?

There is a Xen fix available here, at least to the Meltdown manifestation to 
the chip-makers SNAFU:

https://xenbits.xen.org/xsa/advisory-254.html

This I assume will be in the 4.0 release version of Qubes.

The best explanation of the field that I can find is here: 
https://www.theregister.co.uk/2018/01/04/intel_amd_arm_cpu_vulnerability/

Oder?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3bcfaab5-95c4-4a5c-b55f-bc4e8411a033%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.