Re: [qubes-users] Re: desktop recommendations?

2018-04-03 Thread Drew White
I personally use one PC and one laptop.
PC is a Dell T5500, 12 threads, 24 GB RAM. I can upgrade that to 24 threads and 
128 GB RAM, I run 14 Guests at a time often. I rarely use all the CPU. RAM runs 
out if I start too many.
X5680 with DDR3 RAM.

Laptop is an HP EliteBook 8460p, 4 threads and 8 Gb RAM, can upgrade to 8 
threads and 16 GB RAM. I run 4-10 Guests at a time.
i7-2620M, SODIMM DDR3

(Guests referring to not the always active NetVM or ProxyVM.)





On Wednesday, 4 April 2018 11:12:54 UTC+10, Ted Brenner  wrote:
> What do people recommend for CPU? With running a lot of VMs, it would seem 
> having a lot of cores could be helpful. Is that accurate? Or is that not 
> really necessary?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6165bedd-92ac-4185-a34d-ee036f068b99%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: desktop recommendations?

2018-04-03 Thread 'awokd' via qubes-users
On Wed, April 4, 2018 1:12 am, Ted Brenner wrote:
> What do people recommend for CPU? With running a lot of VMs, it would
> seem having a lot of cores could be helpful. Is that accurate? Or is that
> not really necessary?

It's nice to have but often usage patterns don't require it because you're
only actively using one application at a time and the rest are idle. If
you're the type who has a compile going in one qube, some video
conversions in another, watching web video in another, etc. then there's
no substitute for cores (and RAM and fast disk).

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ebd06a1f719cbae19dbccb03bb43b560.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Tor security - browsing/downloading over http

2018-04-03 Thread 'awokd' via qubes-users
On Tue, April 3, 2018 11:42 pm, Giulio wrote:
> Just a note, it all depends on your threat model. Be careful that most of
> the solutions you explained have each very different implications: 1) Most
> website with a login do have https. If they are hidden services they do
> not need it as traffic does not go through an exit node. If none of the
> above apply you could still use a VPN or a tunnel on top of tor but you
> will loose some anonimity

I think you're saying many otherwise HTTP only sites still use HTTPS for
the login step (but not all)!

> 3) Not using tor in order to download files prevent only man in the
> middles attack coming from the tor network, your provider, your
> neighbors, your dns server etc may still tricks you the same way.

To jsnow's question on this, file modifications can be automated. The
attacker could have a selection of files already modified, then watch for
anyone trying to download it and substitute the poisoned one. Probably
other ways to dynamically patch filetypes (like all .EXE for example) on
the fly too. Check out "Quantum Insert". Tor helps here because it's much
more difficult to target specific recipients for poisoned files, so they
have to be sent to everyone who requests them which increases the
likelihood they will get discovered. Of course, that's not the case if
you're logging in to something.

> As a general rule, mixing any of your tor activities with your non tor
> activities do break the very purpose of tor, especially if you use the
> same accounts in and out. My suggestion is to first try to understand
> what the purpose of tor is and against which type of adversary you need
> protection and then make your choices on that basis.

What Giulio said. Sounds like the OP has a good understanding of the
various weaknesses and trade-offs.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/beceebd3874c8acc07bf44741deef8b1.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Lenovo G505S Coreboot

2018-04-03 Thread qubesthrowaway
Among other suggestions, I added an 8-cell battery to my G505s.  What kind of 
battery life are people getting with these?  Mine seems hardly better than the 
OEM 4-cell.  Just wondering if I got a bum battery or if the improvement isn't 
really that significant.

Thanks again to everyone for helping me get my G505s up and going with coreboot 
and for all the useful info on recommended upgrades here.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b9d5ae8-6650-47de-9de1-1d520e7b77d5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whats the deal with kernels?

2018-04-03 Thread sevas
Yes, thank you. I have read that entire page, as well as a few other good 
resources:

github.com/rtiangha/qubes-linux-kernel/blob/devel-4.14-hard/README.md
github.com/0spinboson/qubes-doc/blob/patch-1/managing-os/compiling-your-own-kernel.md


Im running into a problem right at the end.

rpm --add-sign /home/user/*.rpm 
You must set "%_gpg_name" in your macro file

I have made the missing file: ~/.rpmmarco
%_signature gpg
%_gpg_path /home/user/.gnupg
%_gpg_name (b4892c28 / mypgp)

I still get the error. Can I ignore this? 
Qubes-Builder docs suggests editing the builder.conf and changing NO_SIGN=1
but that doesnt exactly apply to kernels, does it?

I dont need to sign my packages, do I? Im not sure if the compiler is failing at
the rpm signing or if its ignoring and finished. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78ad93c4-42f4-481a-860e-3baa5cafeae7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: desktop recommendations?

2018-04-03 Thread Ted Brenner
What do people recommend for CPU? With running a lot of VMs, it would seem
having a lot of cores could be helpful. Is that accurate? Or is that not
really necessary?

On Sat, Mar 24, 2018 at 4:51 PM, cooloutac  wrote:

> On Friday, March 23, 2018 at 5:42:16 PM UTC-4, tai...@gmx.com wrote:
> > On 03/22/2018 10:01 PM, cooloutac wrote:
> >
> > > also just wanted to say the other reason I suggest the legacy ps2 port
> is if you plan to use usb 3.0 ports most boards route all the usb
> controllers into one when 3.0 controller (xhci) is enabled.  so you would
> need to use the usb proxy and it would not be safe using a keyboard this
> way.
> > >
> > > Although some mobos will let you manually route usb ports to specific
> controllers.   There is always two next to the ps2 port for keyboard and
> mouse on separate controller if you are fine with disabling 3.0 and don't
> want to use a ps2 adapter.
> > Telling people to use PS/2 is dangerous advice as all your keystrokes
> > are sent out via the ground wire, it is better to instead have two or
> > more physically separate USB controllers.
>
> Oh here we go again...  I"m just repeating what Joanna Rutkowska and the
> devs of this very OS you are using have advised people to do.
>
> And what if people ant to use a sys-usb and a keyboard and mouse and don't
> have two seperate usb controllers?  And I believe USB keyboard is more
> vulnerable,  then someone listening to your ground wire lmao...
> http://theinvisiblethings.blogspot.com/2011/06/usb-
> security-challenges.html again this is why the free software movement is
> never taken seriouslywow.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/d7496522-fc5b-4805-968f-5455872d11da%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>



-- 
Sent from my Desktop

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CANKZutxXKZ%2BxHLQLY5cohzWvLYjH%3DmM3AiUyRB0i%2BOYmM6LWOg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Cloudflare DNS-over-HTTPS in Qubes?

2018-04-03 Thread Chris Laprise

On 04/03/2018 03:16 PM, Dominique St-Pierre Boucher wrote:

Hi,

Is there a way to have a DNS proxy in the sys-net interface that try to use 
DNS-over-HTTPS at 1.1.1.1 (cloudflare) and if not working standard DNS with 
what was received by the DHCP.

Is it possible

Thanks

Dominique




See this thread "DNS propagation in Qubes":

https://groups.google.com/d/msgid/qubes-users/9XVz-7viQEqd-6MPx8NvR4Fnk502VgBDJUYogFE056xaFr-k76ApY7WmEbi3oH6yQZQ7MEHbuqYbwCZInJ8LE9lysw_e3w8Dw93FrISL2hU%3D%40micahflee.com



--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90c0ce94-5c64-775d-8279-705b5e514d11%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] X230 won't boot into Qubes after installing 4.0

2018-04-03 Thread Andreas Rasmussen
Den søndag den 1. april 2018 kl. 10.53.43 UTC+2 skrev [ 799 ]:
> Hello Andreas,
> 
> 
> 
> Andreas Rasmussen  schrieb am So., 1. Apr. 2018, 
> 10:44:
> I tried to install Qubes 4.0 on my Lenovo Thinkpad X230. The install went 
> smoothly without having to do any work in the BIOS.
> 
> 
> 
> However, upon reboot/startup I get the following error and then a black 
> screen. Any clues to how I should continue?
> [...]
> 
> 
> Check this here:
> https://github.com/QubesOS/qubes-issues/issues/2841
> 
> 
> 
> I am unsure if iommu=no-igfx is the right option for the X230.
> I would press "e" on boot and edit the grub prompt, let us know how it works 
> with changing the iommu-setting upon boot.
> 
> 
> [799]

Thank you so much for taking your time to reply. Your solution didn't work.

In danish we have a term: "Errorcode 40". It means that the problem is sitting 
approximately 40 centimeters from the computer. That seems to be the case this 
time.

I don't know what went wrong, but my solution was the following:
- Remove the SSD from the x230 and connect it as an external drive to another 
laptop, do a full format.
- Reconnect it to the x230 
- Change bios-settings from "UEFI first" to "legacy only"
- Install Ubuntu (with the mere hope that this would fix grub, which it did)
- Install Qubes 4.0

I guess my primary problem was installing in uefi instead of legacy, but 
somehow during one of the first tries I've managed to destroy/delete something. 
I cannot tell you how or why, I wish I knew, but the solution posted above 
worked :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/88399622-6bc0-42fd-b0f1-1ea2ff08121d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Tor security - browsing/downloading over http

2018-04-03 Thread Giulio
Just a note, it all depends on your threat model. Be careful that most of the 
solutions you explained have each very different implications:
1) Most website with a login do have https. If they are hidden services they do 
not need it as traffic does not go through an exit node. If none of the above 
apply you could still use a VPN or a tunnel on top of tor but you will loose 
some anonimity

2) Which type of files are you talking about? If we are not talking about 
executables (i hope not) then Qubes do have disposable vms which should prevent 
an attacker from accessing sensitive files or gaining persistance. Also even 
for attacking the disposable vm the attacker would need an exploit for a reader 
software (evince, libreoffice etc).

3) Not using tor in order to download files prevent only man in the middles 
attack coming from the tor network, your provider, your neighbors, your dns 
server etc may still tricks you the same way.

As a general rule, mixing any of your tor activities with your non tor 
activities do break the very purpose of tor, especially if you use the same 
accounts in and out. My suggestion is to first try to understand what the 
purpose of tor is and against which type of adversary you need protection and 
then make your choices on that basis.

Giulio

On April 4, 2018 1:23:56 AM GMT+02:00, "js...@riseup.net"  
wrote:
>Hi everyone,
>
>I've been thinking about ways i can increase security when using tor in
>a whonix vm, and i had a few questions about the security risks of
>browsing/downloading files over http.
>
>I've looked up some info about it and i know it presents a security
>risk, but i don't really know what i'm talking about so i thought i'd
>ask you guys. Please let me know if i'm wrong about anything here
>(which
>is likely!) Sorry this is so long!
>
>Anyways, let's say i want to use a site that doesn't use https (http
>only) that i can do 3 things on:
>
>1. general browsing/reading content
>2. download small files
>3. log into an account, which is required to download large files
>
>I'm browsing the site in a relatively unsecure vm that i don't
>necessarily care much about, but i'll probably want to move some of the
>files to another vm to use elsewhere, or to a usb stick to transfer to
>another machine.
>
>If i use the site over tor, the exit node operator can read all the
>unencrypted traffic, and possibly maliciously modify files downloaded,
>which is why it's recommended to always use https when possible over
>tor. Qubes helps with this since i can do all my browsing on the site
>in
>a separate vm, but there's still a security risk especially if i
>transfer files elsewhere.
>
>It seems to me that i basically have 4 options:
>
>1. Do everything over tor, including downloading files and logging into
>the account. This is bad because the exit node operator can see my
>username/password, and i don't think there's any way of really reducing
>the risk from this.
>
>2. Browse the site and download small files (without logging in) over
>tor, but use a non-tor VM to log into the account to download larger
>files. This is better than option 1 because exit node operators never
>see me log into the account, but still presents a security risk because
>they can maliciously modify files i download.
>
>It seems to me that exit node operators doing something like this
>(modifying files downloaded over http to compromise my vm) is something
>that would have to be done manually, in real time, but please let me
>know if i'm wrong about that! I also don't know how likely this is to
>actually happen.
>
>But it seems to me that a way to reduce the risk here is to use the
>"get
>a new tor circuit" option right before downloading the file. That way
>the new exit node operator would have not much warning/time to do
>something bad before i download the file. Would that help?
>
>3. Do general browsing in tor, but download all files outside of tor.
>This is better than option 2 from a security standpoint because i'm not
>downloading files in a risky way over tor that will then be transfered
>elsewhere, and if the vm i'm browsing the site in using tor gets
>compromised, i don't really care. But it's a pain to have to switch to
>a
>non-tor vm every time to download a file (and i know it's recommended
>not to have tor and non-tor connections to the same site at the same
>time).
>
>4. Do everything on the site outside of tor because the site doesn't
>support https. This is best from a security perspective, but worst from
>a privacy/anonymity perspective because i can't use tor to browse the
>site.
>
>If i really wanted to only use https over tor, i could enable the
>"block
>http connections" option in https everywhere, but couldn't this
>increase
>fingerprintability of browser since most tor users don't block http
>connections? The same reason it's recommended not to use additional
>browser plugins in tor browser.
>
>What do you guys think is the best way to go about it? Am i wrong about
>anything 

Re: [qubes-users] Re: Help with 4.0 transition from 3.2?

2018-04-03 Thread js...@riseup.net
cooloutac:
> On Tuesday, April 3, 2018 at 8:54:48 AM UTC-4, vel...@tutamail.com wrote:
>> 7) It is my understanding that 4.0 introduces a remote admin functionhow 
>> do I confirm this is OFF and can never be turned on?
> 
> 7.  first I've heard of this got any links to exactly what you are referring? 
>  

I think they're talking about this?

https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/

Not sure if that's been implemented yet tho.

-Jackie

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6601056f-e89b-93e5-0a41-6aaeae34f108%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Tor security - browsing/downloading over http

2018-04-03 Thread js...@riseup.net
Hi everyone,

I've been thinking about ways i can increase security when using tor in
a whonix vm, and i had a few questions about the security risks of
browsing/downloading files over http.

I've looked up some info about it and i know it presents a security
risk, but i don't really know what i'm talking about so i thought i'd
ask you guys. Please let me know if i'm wrong about anything here (which
is likely!) Sorry this is so long!

Anyways, let's say i want to use a site that doesn't use https (http
only) that i can do 3 things on:

1. general browsing/reading content
2. download small files
3. log into an account, which is required to download large files

I'm browsing the site in a relatively unsecure vm that i don't
necessarily care much about, but i'll probably want to move some of the
files to another vm to use elsewhere, or to a usb stick to transfer to
another machine.

If i use the site over tor, the exit node operator can read all the
unencrypted traffic, and possibly maliciously modify files downloaded,
which is why it's recommended to always use https when possible over
tor. Qubes helps with this since i can do all my browsing on the site in
a separate vm, but there's still a security risk especially if i
transfer files elsewhere.

It seems to me that i basically have 4 options:

1. Do everything over tor, including downloading files and logging into
the account. This is bad because the exit node operator can see my
username/password, and i don't think there's any way of really reducing
the risk from this.

2. Browse the site and download small files (without logging in) over
tor, but use a non-tor VM to log into the account to download larger
files. This is better than option 1 because exit node operators never
see me log into the account, but still presents a security risk because
they can maliciously modify files i download.

It seems to me that exit node operators doing something like this
(modifying files downloaded over http to compromise my vm) is something
that would have to be done manually, in real time, but please let me
know if i'm wrong about that! I also don't know how likely this is to
actually happen.

But it seems to me that a way to reduce the risk here is to use the "get
a new tor circuit" option right before downloading the file. That way
the new exit node operator would have not much warning/time to do
something bad before i download the file. Would that help?

3. Do general browsing in tor, but download all files outside of tor.
This is better than option 2 from a security standpoint because i'm not
downloading files in a risky way over tor that will then be transfered
elsewhere, and if the vm i'm browsing the site in using tor gets
compromised, i don't really care. But it's a pain to have to switch to a
non-tor vm every time to download a file (and i know it's recommended
not to have tor and non-tor connections to the same site at the same time).

4. Do everything on the site outside of tor because the site doesn't
support https. This is best from a security perspective, but worst from
a privacy/anonymity perspective because i can't use tor to browse the site.

If i really wanted to only use https over tor, i could enable the "block
http connections" option in https everywhere, but couldn't this increase
fingerprintability of browser since most tor users don't block http
connections? The same reason it's recommended not to use additional
browser plugins in tor browser.

What do you guys think is the best way to go about it? Am i wrong about
anything here or missing something?

I know this may be too long to read, sorry!

-Jackie

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3d12c7d6-4b38-4356-9f80-fa749db2280b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: network issues on R4.0

2018-04-03 Thread cooloutac
On Monday, April 2, 2018 at 3:19:30 AM UTC-4, yon...@gmail.com wrote:
> I have multiple issue regarding network with R4.0
> 
> The main issue is that net-vm crashes after a long sleep.
> It doesn't happen 100% of the time but many times coming back from sleep it 
> will be completely unresponsive and will have to be killed.
> 
> Other times it will be responsive but will not be able to access the wifi 
> card unless rebooted.
> 
> On top of all that if I change the network of a running disp vm to none and 
> than back to sys-firewall it will not be able to access the network. so if I 
> have a running disposable VMs when net-vm needs a restart they will not be 
> able to access the network after the restart

I can't use sleep on my system either.  in 3.2 it would be unstable I figured 
due to ssd.but in 4.0 i get the network not working either.

Nowadays I can't rarely ever use sleep on a windows system either without 
instability or bad driver issues.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/473f3727-5ab1-4b85-b9c1-7343d98b5b9b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Cloudflare DNS-over-HTTPS in Qubes?

2018-04-03 Thread cooloutac
On Tuesday, April 3, 2018 at 3:16:54 PM UTC-4, Dominique St-Pierre Boucher 
wrote:
> Hi,
> 
> Is there a way to have a DNS proxy in the sys-net interface that try to use 
> DNS-over-HTTPS at 1.1.1.1 (cloudflare) and if not working standard DNS with 
> what was received by the DHCP.
> 
> Is it possible
> 
> Thanks
> 
> Dominique

Not sure what you are trying to do but yes I believe so.  You can just make a 
whole nother separate custom proxyvm separate from sys-firewall.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90254167-8421-473c-b40a-5ad5c8c19f57%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Quebes and whonix

2018-04-03 Thread cooloutac
On Tuesday, April 3, 2018 at 3:17:59 PM UTC-4, Black Beard wrote:
> Jear,
> 
> sounds hear really cool. This community is really nice and helpful. Thanks 
> for this. 👍🙂
> 
> Okay, i will make a backup tommorow and will install Quebes. 👍✌
> 
> Windows will come into virtualbox. Iam a Linux Newbie. Can someone recommend 
> some good sites or Videos to install Quebes Os correctly? 
> 
> For Linux i need a swap and home partition. Which sizes are good for that? 
> Are 40 GB enough for the Swap partion?
> 
> Thanks for our tipps and feedbacks.

Look at instructions for how to install fedora,  and it is very similar.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/012bdbc4-a1e0-46f6-83d5-4a56a7db0619%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whats the deal with kernels?

2018-04-03 Thread cooloutac
On Monday, April 2, 2018 at 10:42:14 PM UTC-4, sevas wrote:
> Ive been looking at kernel compiling. Ive amounted certain information,
> but not enough.
> 
> I see 3 git repos with kernels: qubes-linux-kernel, rtiangha and fepitre.
> 
> I know I can change versions with $ git checkout *version*
> 
> I also know that I can download the sources and build them and I would 
> preferably
> edit a .config file to edit my options and hardware.
> 
> What I need to know:
> -how to use the gen-config file.
> -whats the difference between the config-base, config-qubes and 
> config-qubes-minimal? (well the minimal part is obvious)
> -I can edit one of these config files to build with my kernel, correct?
> -I have built a .config using the '$ make oldconfig' command and it was a
> nightmare. The most effective way to configure a .config is to use '$ make 
> menuconfig' correct? A good balance between my time and control?
> -Is there a convenient way to merge an existing .config with the qubes 
> .config?
> 
> Any other tips?
> Is there a qubes doc on this?

https://groups.google.com/forum/#!topic/qubes-users/yBeUJPwKwHM

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b72b1d86-afeb-4972-8eaa-59c3b2f77bc4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whats the deal with kernels?

2018-04-03 Thread cooloutac
On Monday, April 2, 2018 at 10:42:14 PM UTC-4, sevas wrote:
> Ive been looking at kernel compiling. Ive amounted certain information,
> but not enough.
> 
> I see 3 git repos with kernels: qubes-linux-kernel, rtiangha and fepitre.
> 
> I know I can change versions with $ git checkout *version*
> 
> I also know that I can download the sources and build them and I would 
> preferably
> edit a .config file to edit my options and hardware.
> 
> What I need to know:
> -how to use the gen-config file.
> -whats the difference between the config-base, config-qubes and 
> config-qubes-minimal? (well the minimal part is obvious)
> -I can edit one of these config files to build with my kernel, correct?
> -I have built a .config using the '$ make oldconfig' command and it was a
> nightmare. The most effective way to configure a .config is to use '$ make 
> menuconfig' correct? A good balance between my time and control?
> -Is there a convenient way to merge an existing .config with the qubes 
> .config?
> 
> Any other tips?
> Is there a qubes doc on this?

Search the mailing list for Reg Tiangha I forget how to spell the last name,  
or building qubes kernel till you see his thread.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0221589c-585b-4296-89ec-972da2c9ee21%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Options for securing /boot

2018-04-03 Thread cooloutac
On Tuesday, April 3, 2018 at 4:24:21 AM UTC-4, tai...@gmx.com wrote:
> On 04/02/2018 09:32 PM, cooloutac wrote:
> 
> > On Monday, April 2, 2018 at 3:43:50 PM UTC-4, tai...@gmx.com wrote:
> >> On 09/08/2017 07:12 AM, Leo Gaspard wrote:
> >>
> >>> Just a datapoint: secure boot is *not* microsoft-controlled (unless you
> >>> assume the manufacturer put in some kind of backdoor, in which case
> >>> you're screwed anyway).
> >> Yes it is microsoft controlled, they're the ones who made the standard
> >> and conveniently left out the owner controlled mandate in sb 2.0 once
> >> the attention died down.
> >> It will eventually be used to prevent people from running linux all
> >> together at least your own linux not one that is approved by red hat.
> > Where are these boards. I've never seen one that doesnt' let you shut it 
> > off or use your own keys?
> The MS ARM "Windows RT" tablets for one - with those they test the waters.
> SB 2.0 leaves out the owner control mandate - go examine the specs and
> see for yourself.
> 
> Smartphones were actually the first area the walled garden was tested on.
> I am old enough to remember the PalmOS era when installing apps on a
> smartphone was the same as the  average win32 model of downloading
> something off the internet not a walled garden app store - folks like
> apple/ms have the masses convinced that it has always been a walled
> garden but that is not the case.
> > Time will tell,  but right now as Richard Stallman thinks "its failed its 
> > intended purpose"
> This is a slow burn effort - doing it all at once straight away would
> lead to protest.
> > and Why Red Hat? 
> Red hat controls linux and is microsoft friendly - because their
> developers control many critical linux programs they ARE a modern
> desktop linux. Why do you think so distros suddenly adopted systemd
> against the opinions of their users? or why so many core programs now
> require red hat controlled systemd? (like gnome and udev)
> Red hat accepted "secure" boot and got a grub and kernel signed by MS -
> such an action is a betrayal.
> 
> Soon you will not even be able run the apps you please on the average
> store bought computer enforcing a MS monopoly where they get a cut of
> every app sale.
> MS says "Windows 10 S is not well-suited for many app
> developers/hackers, admins & IT pro's!"
> How do you create the next generation of those? They ALL learn on their
> parents computer not some "developer edition" which not even wealthy
> parents buy their children.
> Windows S, a locked down walled garden PC is the future of computing.

tablets and phones?   I'd have to see it to believe it.  Qubes is a beast for a 
beastly desktop.  it got me back into building them lol.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e5cb0dd0-95f6-4105-9fbf-2c3aff9f63b0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Upgrade from RC3 to final release

2018-04-03 Thread cooloutac
On Tuesday, April 3, 2018 at 4:39:42 PM UTC-4, awokd wrote:
> On Tue, April 3, 2018 8:44 am, kotot...@gmail.com wrote:
> 
> 
> > [MIRROR] qubes-release-4.0-0.4.noarch.rpm: Curl error (7): Couldn't
> > connect to server for
> > http://yum.qubes-os.org/r4.0/current/dom0/fc25/rpm/qubes-release-4.0-0.4.
> > noarch.rpm [Failed to connect to yum.qubes-os.org port 80: Connection
> > refused] [FAILED] qubes-release-4.0-0.4.noarch.rpm: No more mirrors to try
> > - All mirrors were already tried without success
> 
> https://github.com/QubesOS/qubes-issues/issues/3737#issuecomment-376348366

I saw that link when I had similar problems but could not find that file on my 
system.

might of had something to do with the fact i chose to use whonix to install 
dom0 and templates from.  so I ended up reinstalling without that option after 
realizing fedora wouldn't update with whonix.  Instead rom qubes manager after 
install selecting global settings and set default update vm as sys-whonix.  
Doing it that way doesn't seem to have any errors but only dom0 uses sys-whonix 
not fedora or debian.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/765a14a9-8202-49bf-b9a0-603794a0230a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Qubes 4.0] Debian 9 unusable

2018-04-03 Thread cooloutac
On Tuesday, April 3, 2018 at 4:48:41 PM UTC-4, awokd wrote:
> On Tue, April 3, 2018 4:22 pm, schwoerera...@gmail.com wrote:
> > Le mardi 3 avril 2018 03:13:29 UTC+2, awokd a écrit :
> >
> >> On Mon, April 2, 2018 3:34 pm, FerFrc via qubes-users wrote:
> >>
> >>> Le lundi 2 avril 2018 10:38:04 UTC+2, awokd a écrit :
> >>>
> >>>
>  On Sun, April 1, 2018 6:45 pm, schwoerera...@gmail.com wrote:
> 
> 
> > Hello all.
> > I was on Qubes 3.2 and I've switched of Qubes 4.0 but I have some
> > problems : In fact, I can't use and update/upgrade Debian 9.
> >
> >>
> >>>
> >>> Hello, I'm using Debian 9 template that came with Qubes 4.0.
> >>>
> >>
> >> Need more details. Is your network working? What happens when you try
> >> to upgrade, etc.
> >
> > My network worked.
> > When I tried to update, Debian 9 didn't work, impossible to run a
> > terminal, and it did nothing when I clicked on "update the VM" by the VM
> > Manager.
> 
> That's the problem I was having with the restored R3.2 templates. In dom0,
> try "dnf list installed qubes-template-debian-9" and check the version.
> Mine says 4.0.0-201803270258.

you definitely would run into problems restoring default template names in 3.2. 
 maybe the same in 4.0 probably.   Give it a cloned name first.  But in my 
upgrade to 4.0 i didnt' restore any templates at all.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/65b21dba-934a-4707-ade9-7c71bfe33e56%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Help with 4.0 transition from 3.2?

2018-04-03 Thread cooloutac
On Tuesday, April 3, 2018 at 8:54:48 AM UTC-4, vel...@tutamail.com wrote:
> I recently transitioned to the new 4.0thank you Qubes Developers and 
> Community for the effort and help. I really appreciate the better security.
> 
> I managed to get 4.0 installed however I am having some challenges and 
> concerns:
> 
> 1) I am getting numerous ACPI erros when I boot? 4.0 seems to boot, I can 
> login and function but I am concerned. Is this a concern? I didn't get these 
> errors when booting 3.2.
> 
> 2) I used to be able to download a .iso file, keep it in a VM and boot it 
> from another VM. 3.2 even had a "Boot from .iso" function. I managed to get 
> this working with 4.0 but it is extremely slow and sometimes doesn't work. 
> Was the boot from .iso functionality removed?
> 
> 3) I am struggling with customizing the DVMs. Specifically I can't delete a 
> DVM. I tried the steps on this link: 
> https://www.qubes-os.org/doc/dispvm-customization/ but it just didn't delete. 
> Are there other instructions available? Maybe some one is willing to post 
> there steps/commands?
> 
> 4) I am unsure how to add a wireless printer into a DVM? I either can't 
> install the driver i.e. Do I install software into e.g. Print-dvm(based on 
> Debian-9-Gnome), Debian-9-Gnome Template, other?
> 
> 5) Could be related to 4) above but I have been unable to get my printer to 
> even provide an error(possible networking issue). In 3.2 I would add the 
> printer to the Debian-9-Gnome template and then generate a new "DVM"
> 
> 6) When I attempt to update Dom0 after install I get the pop-up from Dom0 
> that something is happening, I get the "green update" window(similar to 3.2) 
> but then it just stops...no message about "No updates needed" or any 
> response. Is my Dom0 up-to-date?
> 
> 7) It is my understanding that 4.0 introduces a remote admin functionhow 
> do I confirm this is OFF and can never be turned on?
> 
> Please understand this is by no means critism...I truly do appreciate the new 
> version and sense it is more secure with the PVH default and with the new 
> code that is under the hood.
> 
> Some things that worked well:
> * VPN by Tasket works great.
> * Love the clean and updated Debian/Fedora templates
> * Ability to swap templates and a VM and get the new programs refreshed
> * The potential of multiple DVMs and additional drop downs beyond just Firefox
> 
> Any help with my questions above would be greatly appreciated and I would be 
> happy to summarize the instructions for users having similar challenges now 
> or going forward.
> 
> Thanks again for the effort,

1.  what acpi errors? what they say?

2.  dunno, no idea, maye for security purposes?

3.  I only can't delete the default dvms. Make sure no other vms are using them 
as netvm first.I can delete any custom ones I create though np.

4.  install and run system-config-printer on the template you are using for the 
dvm templateyou wish to use for printing. the main template.  It is much more 
confusing its like an extra template.  not the one that says dvm,  the black 
colored one.  in 4.0 Temporary allow it network access first from qubes manager 
or qubes-prefs by giving it a network vm first.

6.  try update from dom0 terminal and see wha it says.

7.  first I've heard of this got any links to exactly what you are referring?  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ef36e92-ce65-43fb-9a28-12420e4773f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Help with 4.0 transition from 3.2?

2018-04-03 Thread 'awokd' via qubes-users
On Tue, April 3, 2018 12:54 pm, vel...@tutamail.com wrote:

>
> 4) I am unsure how to add a wireless printer into a DVM? I either can't
> install the driver i.e. Do I install software into e.g. Print-dvm(based
> on Debian-9-Gnome), Debian-9-Gnome Template, other?

Probably Debian-9-Gnome.

> 5) Could be related to 4) above but I have been unable to get my printer
> to even provide an error(possible networking issue). In 3.2 I would add
> the printer to the Debian-9-Gnome template and then generate a new
> "DVM"

Try it from the DVM.

> 6) When I attempt to update Dom0 after install I get the pop-up from Dom0
> that something is happening, I get the "green update" window(similar to
> 3.2) but then it just stops...no message about "No updates needed" or any
> response. Is my Dom0 up-to-date?

Use command line instead- "sudo qubes-dom0-update".

Not sure on the others, have you tried searching
https://github.com/QubesOS/qubes-issues/issues ?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23d271984d9e7dca864c40c466c93f44.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Quebes and whonix

2018-04-03 Thread 'awokd' via qubes-users
On Tue, April 3, 2018 7:17 pm, Black Beard wrote:
> Jear,
>
>
> sounds hear really cool. This community is really nice and helpful.
> Thanks for this. 👍🙂
>
>
> Okay, i will make a backup tommorow and will install Quebes. 👍✌
>
>
> Windows will come into virtualbox. Iam a Linux Newbie. Can someone
> recommend some good sites or Videos to install Quebes Os correctly?
>
> For Linux i need a swap and home partition. Which sizes are good for
> that? Are 40 GB enough for the Swap partion?

If you want to erase everything on your drive, Qubes is usually easy to
install. You don't need to specify sizes then. Use automatic partitioning,
look for the "make additional space available" and tell it to erase
everything. Windows 10 will be gone!


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4fb836ae9fc9699ef351bbbe9fd71cea.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Qubes 4.0] Debian 9 unusable

2018-04-03 Thread 'awokd' via qubes-users
On Tue, April 3, 2018 4:22 pm, schwoerera...@gmail.com wrote:
> Le mardi 3 avril 2018 03:13:29 UTC+2, awokd a écrit :
>
>> On Mon, April 2, 2018 3:34 pm, FerFrc via qubes-users wrote:
>>
>>> Le lundi 2 avril 2018 10:38:04 UTC+2, awokd a écrit :
>>>
>>>
 On Sun, April 1, 2018 6:45 pm, schwoerera...@gmail.com wrote:


> Hello all.
> I was on Qubes 3.2 and I've switched of Qubes 4.0 but I have some
> problems : In fact, I can't use and update/upgrade Debian 9.
>
>>
>>>
>>> Hello, I'm using Debian 9 template that came with Qubes 4.0.
>>>
>>
>> Need more details. Is your network working? What happens when you try
>> to upgrade, etc.
>
> My network worked.
> When I tried to update, Debian 9 didn't work, impossible to run a
> terminal, and it did nothing when I clicked on "update the VM" by the VM
> Manager.

That's the problem I was having with the restored R3.2 templates. In dom0,
try "dnf list installed qubes-template-debian-9" and check the version.
Mine says 4.0.0-201803270258.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e312b2ce5fd81f0d21ad128930e2dbf.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Upgrade from RC3 to final release

2018-04-03 Thread 'awokd' via qubes-users
On Tue, April 3, 2018 8:44 am, kotot...@gmail.com wrote:


> [MIRROR] qubes-release-4.0-0.4.noarch.rpm: Curl error (7): Couldn't
> connect to server for
> http://yum.qubes-os.org/r4.0/current/dom0/fc25/rpm/qubes-release-4.0-0.4.
> noarch.rpm [Failed to connect to yum.qubes-os.org port 80: Connection
> refused] [FAILED] qubes-release-4.0-0.4.noarch.rpm: No more mirrors to try
> - All mirrors were already tried without success

https://github.com/QubesOS/qubes-issues/issues/3737#issuecomment-376348366


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30a58729cedba5ed08ab9647b107cce1.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Quebes and whonix

2018-04-03 Thread Black Beard
Hey,

i found all informations on the main site. But sometimes it can be, that 
someone have outher good sites. 

Cao 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/deeb66b3-09c6-4c63-a782-c08b5a5b5062%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Quebes and whonix

2018-04-03 Thread Black Beard
Jear,

sounds hear really cool. This community is really nice and helpful. Thanks for 
this. 👍🙂

Okay, i will make a backup tommorow and will install Quebes. 👍✌

Windows will come into virtualbox. Iam a Linux Newbie. Can someone recommend 
some good sites or Videos to install Quebes Os correctly? 

For Linux i need a swap and home partition. Which sizes are good for that? Are 
40 GB enough for the Swap partion?

Thanks for our tipps and feedbacks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d034854c-0ff3-4f94-8886-eb01a2121324%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Cloudflare DNS-over-HTTPS in Qubes?

2018-04-03 Thread Dominique St-Pierre Boucher
Hi,

Is there a way to have a DNS proxy in the sys-net interface that try to use 
DNS-over-HTTPS at 1.1.1.1 (cloudflare) and if not working standard DNS with 
what was received by the DHCP.

Is it possible

Thanks

Dominique

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69f2a4e5-54fe-48e4-8c99-d85c3e52d238%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [Qubes 4.0] Debian 9 unusable

2018-04-03 Thread schwoereraxel
Le mardi 3 avril 2018 03:13:29 UTC+2, awokd a écrit :
> On Mon, April 2, 2018 3:34 pm, FerFrc via qubes-users wrote:
> > Le lundi 2 avril 2018 10:38:04 UTC+2, awokd a écrit :
> >
> >> On Sun, April 1, 2018 6:45 pm, schwoerera...@gmail.com wrote:
> >>
> >>> Hello all.
> >>> I was on Qubes 3.2 and I've switched of Qubes 4.0 but I have some
> >>> problems :
> >>> In fact, I can't use and update/upgrade Debian 9.
> 
> >
> > Hello, I'm using Debian 9 template that came with Qubes 4.0.
> 
> Need more details. Is your network working? What happens when you try to
> upgrade, etc.

My network worked.
When I tried to update, Debian 9 didn't work, impossible to run a terminal, and 
it did nothing when I clicked on "update the VM" by the VM Manager.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d2a28e8e-fa9f-4daf-a8e6-1021916f10f0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Help with 4.0 transition from 3.2?

2018-04-03 Thread velcro
I recently transitioned to the new 4.0thank you Qubes Developers and 
Community for the effort and help. I really appreciate the better security.

I managed to get 4.0 installed however I am having some challenges and concerns:

1) I am getting numerous ACPI erros when I boot? 4.0 seems to boot, I can login 
and function but I am concerned. Is this a concern? I didn't get these errors 
when booting 3.2.

2) I used to be able to download a .iso file, keep it in a VM and boot it from 
another VM. 3.2 even had a "Boot from .iso" function. I managed to get this 
working with 4.0 but it is extremely slow and sometimes doesn't work. Was the 
boot from .iso functionality removed?

3) I am struggling with customizing the DVMs. Specifically I can't delete a 
DVM. I tried the steps on this link: 
https://www.qubes-os.org/doc/dispvm-customization/ but it just didn't delete. 
Are there other instructions available? Maybe some one is willing to post there 
steps/commands?

4) I am unsure how to add a wireless printer into a DVM? I either can't install 
the driver i.e. Do I install software into e.g. Print-dvm(based on 
Debian-9-Gnome), Debian-9-Gnome Template, other?

5) Could be related to 4) above but I have been unable to get my printer to 
even provide an error(possible networking issue). In 3.2 I would add the 
printer to the Debian-9-Gnome template and then generate a new "DVM"

6) When I attempt to update Dom0 after install I get the pop-up from Dom0 that 
something is happening, I get the "green update" window(similar to 3.2) but 
then it just stops...no message about "No updates needed" or any response. Is 
my Dom0 up-to-date?

7) It is my understanding that 4.0 introduces a remote admin functionhow do 
I confirm this is OFF and can never be turned on?

Please understand this is by no means critism...I truly do appreciate the new 
version and sense it is more secure with the PVH default and with the new code 
that is under the hood.

Some things that worked well:
* VPN by Tasket works great.
* Love the clean and updated Debian/Fedora templates
* Ability to swap templates and a VM and get the new programs refreshed
* The potential of multiple DVMs and additional drop downs beyond just Firefox

Any help with my questions above would be greatly appreciated and I would be 
happy to summarize the instructions for users having similar challenges now or 
going forward.

Thanks again for the effort,

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c1b39fdf-44f1-43b2-a1ca-31ddc085e557%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Upgrade from RC3 to final release

2018-04-03 Thread kototamo
I used RC3 and always update from stable repo, never from testing. Do I have 
now the good repos in yum? I think I have outdated yum repos and cannot update 
to final.

Can somebody paste the content of its /etc/yum.repos.d/qubes-dom0.repo file?

How am I supposed to ugprade to the final candidate?

UpdateVM to download updates for Dom0; this may take some time...
Last metadata expiration check: 0:28:30 ago on Tue Apr  3 10:07:04 2018.
Dependencies resolved.

 Package Arch VersionRepositorySize

Reinstalling:
 qubes-release   noarch   4.0-0.4qubes-dom0-current50 k

Transaction Summary


Total download size: 50 k
DNF will only download packages for the transaction.
Downloading Packages:
[MIRROR] qubes-release-4.0-0.4.noarch.rpm: Curl error (7): Couldn't connect to 
server for 
http://yum.qubes-os.org/r4.0/current/dom0/fc25/rpm/qubes-release-4.0-0.4.noarch.rpm
 [Failed to connect to yum.qubes-os.org port 80: Connection refused]
[FAILED] qubes-release-4.0-0.4.noarch.rpm: No more mirrors to try - All mirrors 
were already tried without success

The downloaded packages were saved in cache until the next successful 
transaction.
You can remove cached packages by executing 'dnf clean packages'.
Error: Error downloading packages:
  Cannot download rpm/qubes-release-4.0-0.4.noarch.rpm: All mirrors were tried
[user@dom0 ~]$ ls /etc/yum.repos.d/ 
fedora.repo  fedora-updates.repo  qubes-dom0.repo  qubes-templates.repo
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
Using sys-net as UpdateVM to download updates for Dom0; this may take some 
time...
Failed to synchronize cache for repo 'qubes-dom0-current', disabling.
Failed to synchronize cache for repo 'qubes-dom0-current-testing', disabling.
Last metadata expiration check: 0:32:26 ago on Tue Apr  3 10:07:04 2018.
Dependencies resolved.
Nothing to do.
Complete!
No packages downloaded
Qubes OS Repository for Dom0
   108 MB/s | 244 kB 00:00
[user@dom0 ~]$ sudo qubes-dom0-update 
Using sys-net as UpdateVM to download updates for Dom0; this may take some 
time...
Last metadata expiration check: 0:32:37 ago on Tue Apr  3 10:07:04 2018.
Dependencies resolved.
Nothing to do.
Complete!
No packages downloaded
Qubes OS Repository for Dom0
   112 MB/s | 244 kB 00:00

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/54e64a8d-6c3b-4abc-b59b-f16365fdeefc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Options for securing /boot

2018-04-03 Thread taii...@gmx.com
On 04/02/2018 09:32 PM, cooloutac wrote:

> On Monday, April 2, 2018 at 3:43:50 PM UTC-4, tai...@gmx.com wrote:
>> On 09/08/2017 07:12 AM, Leo Gaspard wrote:
>>
>>> Just a datapoint: secure boot is *not* microsoft-controlled (unless you
>>> assume the manufacturer put in some kind of backdoor, in which case
>>> you're screwed anyway).
>> Yes it is microsoft controlled, they're the ones who made the standard
>> and conveniently left out the owner controlled mandate in sb 2.0 once
>> the attention died down.
>> It will eventually be used to prevent people from running linux all
>> together at least your own linux not one that is approved by red hat.
> Where are these boards. I've never seen one that doesnt' let you shut it off 
> or use your own keys?
The MS ARM "Windows RT" tablets for one - with those they test the waters.
SB 2.0 leaves out the owner control mandate - go examine the specs and
see for yourself.

Smartphones were actually the first area the walled garden was tested on.
I am old enough to remember the PalmOS era when installing apps on a
smartphone was the same as the  average win32 model of downloading
something off the internet not a walled garden app store - folks like
apple/ms have the masses convinced that it has always been a walled
garden but that is not the case.
> Time will tell,  but right now as Richard Stallman thinks "its failed its 
> intended purpose"
This is a slow burn effort - doing it all at once straight away would
lead to protest.
> and Why Red Hat? 
Red hat controls linux and is microsoft friendly - because their
developers control many critical linux programs they ARE a modern
desktop linux. Why do you think so distros suddenly adopted systemd
against the opinions of their users? or why so many core programs now
require red hat controlled systemd? (like gnome and udev)
Red hat accepted "secure" boot and got a grub and kernel signed by MS -
such an action is a betrayal.

Soon you will not even be able run the apps you please on the average
store bought computer enforcing a MS monopoly where they get a cut of
every app sale.
MS says "Windows 10 S is not well-suited for many app
developers/hackers, admins & IT pro's!"
How do you create the next generation of those? They ALL learn on their
parents computer not some "developer edition" which not even wealthy
parents buy their children.
Windows S, a locked down walled garden PC is the future of computing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b78210fd-9edf-d31b-6654-546770ec427c%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


0xDF372A17.asc
Description: application/pgp-keys


Re: [qubes-users] Whats the deal with kernels?

2018-04-03 Thread taii...@gmx.com
On 04/02/2018 10:25 PM, sevas wrote:
> -how to use the gen-config file.
gen config as in general, most of the options enabled for a general PC.
> -whats the difference between the config-base, config-qubes and 
> config-qubes-minimal? (well the minimal part is obvious)
Base for a regular kernel, qubes for a qubes kernel.
> -I can edit one of these config files to build with my kernel, correct?
Yeah.
> -I have built a .config using the '$ make oldconfig' command and it was a 
> nightmare.
Which is why its called oldconfig :P
> The most effective way to configure a .config is to use '$ make menuconfig' 
> correct? A good balance between my time and control?
Yeah you get all the same stuff only in a nice ncurses graphical menu.

Honestly I don't really see a reason to compile a kernel but not compile
anything else unless for instance you want a bleeding edge feature or
you want to disable some lame shit like IPv6.

I hope some day qubes will have an easy-compile system like gentoo so
one can compile the base distro and all updates from source when
downloaded for maximum security.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2a5b904-f44f-3893-2cd9-f00621ffabbb%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


0xDF372A17.asc
Description: application/pgp-keys


Re: [qubes-users] network issues on R4.0

2018-04-03 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/02/2018 09:19 AM, yon...@gmail.com wrote:
> I have multiple issue regarding network with R4.0
> 
> The main issue is that net-vm crashes after a long sleep. It
> doesn't happen 100% of the time but many times coming back from
> sleep it will be completely unresponsive and will have to be
> killed.
> 
> Other times it will be responsive but will not be able to access
> the wifi card unless rebooted.
> 
> On top of all that if I change the network of a running disp vm to
> none and than back to sys-firewall it will not be able to access
> the network. so if I have a running disposable VMs when net-vm
> needs a restart they will not be able to access the network after
> the restart
> 

You probably have hit by several bugs, including this one:
https://github.com/QubesOS/qubes-issues/issues/3657


- -- 
Zrubi
-BEGIN PGP SIGNATURE-
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=7y7s
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e8b01b5-3a31-708d-5929-efea93b75f2b%40zrubi.hu.
For more options, visit https://groups.google.com/d/optout.