[qubes-users] X11 forwarding stopped working in fedora-26, still works in debian-9

2018-05-10 Thread pixel fairy
sometime in the last couple days, ssh -X stopped working in fedora-26 
templates, at least on my box. still works from debian-9. 

anyone else notice this? anything change?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b567e4c-3838-44e3-83c7-d258ded406f3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] ProxyVM in Qubes 4.0

2018-05-10 Thread Ivan Mitev


On 05/10/2018 11:08 PM, Quentin Le Guennec wrote:
> From the docs (https://www.qubes-os.org/doc/vpn/)
> 
> "Create a new VM, name it, click the ProxyVM radio button, and choose a
> color and template."
> 
> On Qubes 4.0, I don't see that radio button. I don't see anything about
> that in the manual page of qvm-create either. Am I missing something?

"ProxyVMs" in 4.0 are simply AppVMs with the "provides_network" pref set
to true (or the "provides network" radio button checked when creating a
VM with the gui)

BTW you may want to check Chris Laprise's VPN code

https://www.mail-archive.com/qubes-users@googlegroups.com/msg21339.html

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e87ac105-26a6-b8a3-7e12-a400a1c9f3ca%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] Re: gpg-split revoke command $ export QUBES_GPG_DOMAIN=work-gpg

2018-05-10 Thread john

On 05/08/18 20:56, qubes-fan-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote:

I am playing with gpg-split and I did a missclick. I would need to revoke the 
command.

I executed the  command
$ export QUBES_GPG_DOMAIN=work-gpg
by mistake in vault qube instead of work-gpg cube.

Is there a way to revoke it?

Thank you

this could be wrong, but I went throught the whole setup, but then in my 
Enigmail VM, it told me something about the 0x232jljla   key could not 
be found in my keyring,  though I had the pub/sec  key  in  the 
splitgpgVM ..so I gave up and just changed  the


command back  eg

$ export QUBES_GPG_DOMAIN=EnigmailVM

and turned the Enigmail preferences off, and it was repaired , so if it 
is not in Bash .config , as some newer post references, apparently it 
doesn't survive VM reboot anyhow


This gpg is so complicated, all I can do is cut and paste through the 
directions, might be something simple and it would have been working, 
but I guess some encryption without splitgpg  is better than no 
encryption .



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/207c4a59-1664-ecdb-9366-ed3d8e71ed12%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] opening links in another VM opens two browsers

2018-05-10 Thread qubenix
Hey everyone! Hope you are all doing well.

I followed the guide here: https://www.qubes-os.org/doc/tips-and-tricks/
so links clicked in one debian-9 AppVM will open in separate debian-9
AppVM. What actually happens is interesting.

If I have firefox running in the destination VM already, everything
works as expected. The link opens a new tab in the proper AppVM.
However, if firefox is not currently running, a clicked link will open
the link in a browser in both VMs.

Any ideas?

-- 
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47091bca-90fe-286a-e851-008d3f8af1c4%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Keyboard Problems - Corsair Gaming K65 Lux RGB

2018-05-10 Thread Yethal
W dniu czwartek, 10 maja 2018 22:44:06 UTC+2 użytkownik fe...@oxley.org napisał:
> HI,
> 
> I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes.
> 
> When I boot my system:
> 
> 1. Press F11 to get to boot selection menu
> 2. Select boot drive containing Qubes
> 3. Initial boot and then hard disk drive encryption key in requested.
> 
> At (3) the keyboard no longer works. It is frozen, none of the basic 
> functionality works (e.g. Caps Lock or letters/numbers) but also the keyboard 
> has locked up e.g. the built in keyboard functions for switching the 
> backlight off and on do not work.
> 
> I haven't had any issues when running Ubuntu :-)
> 
> I am just posting this to share the information but if anyone has suggestions 
> that would be great.
> 
> Thanks
> Felix

You probably have USB controllers blacklisted in Dom0, which makes it 
impossible to type the encryption key using that keyboard. Plug it usin USB to 
PS/2 adapter (if your PC has a PS/2 port) and it should work just fine.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20b71929-2f34-461a-95fb-fc1484ee96c5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Keyboard Problems - Corsair Gaming K65 Lux RGB

2018-05-10 Thread felix
HI,

I have a Corsair Gaming K65 Lux RGB keyboard which does not work for Qubes.

When I boot my system:

1. Press F11 to get to boot selection menu
2. Select boot drive containing Qubes
3. Initial boot and then hard disk drive encryption key in requested.

At (3) the keyboard no longer works. It is frozen, none of the basic 
functionality works (e.g. Caps Lock or letters/numbers) but also the keyboard 
has locked up e.g. the built in keyboard functions for switching the backlight 
off and on do not work.

I haven't had any issues when running Ubuntu :-)

I am just posting this to share the information but if anyone has suggestions 
that would be great.

Thanks
Felix

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/054be405-cf51-46f4-b959-7a2837dbe30e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] ProxyVM in Qubes 4.0

2018-05-10 Thread Quentin Le Guennec
>From the docs (https://www.qubes-os.org/doc/vpn/)

"Create a new VM, name it, click the ProxyVM radio button, and choose a
color and template."

On Qubes 4.0, I don't see that radio button. I don't see anything about
that in the manual page of qvm-create either. Am I missing something?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a80ebf87-0fb2-e8c0-da15-1e845696efdb%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


[qubes-users] HCL - HP_ZBook_15_G4

2018-05-10 Thread Tom Marciniak
Hello Qubes Team,

See attached for .yml file with my hardware information.

I haven't had a chance to test TPM/AEM yet, because I'm having trouble
accessing the BIOS after installing Qubes.

I need to verify that TXT and TPM are both enabled there and possibly
update the BIOS firmware.

Thanks for all your efforts on this badass platform!

-- 
Take care,
Tom Marciniak

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPqQ4qoeO40eZb8n3u2Ev%3D_LMSBHeCz%2B_U2MuOOUoOVP9dkp_w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-HP-HP_ZBook_15_G4-20180510-122011.yml
Description: application/yaml


Re: [qubes-users] trouble with whonix-14-dvm

2018-05-10 Thread mossy
mossy:
> 'awokd' via qubes-users:
>> Think I got it working with the -14 templates from unstable. In dom0:
>>
>> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable
>> qubes-template-whonix-gw-14
>> qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black
>> qvm-prefs sys-whonix-14 provides_network True
>>
>> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable
>> qubes-template-whonix-ws-14
>> qvm-features whonix-ws-14 whonix-ws 1
>> qvm-create whonix-ws-dvm-14 --class AppVM --template whonix-ws-14 --label
>> green
>> qvm-features whonix-ws-14-dvm appmenus-dispvm 1
>> qvm-prefs whonix-ws-dvm-14 template_for_dispvms true
>> qvm-prefs whonix-ws-dvm-14 netvm sys-whonix-14
>> qvm-prefs whonix-ws-dvm-14 default_dispvm whonix-ws-dvm-14
>>
>> I suspect once these templates get released to stable, the salt command
>> will take care of all that for us.
>>
> 
> Plus, to ensure updates will work, run the following as well in dom0:
> 
> qvm-tags whonix-gw-14 a whonix-updatevm
> qvm-tags whonix-ws-14 a whonix-updatevm
> 
> And thanks for this, I was not aware of qvm-features or some of those
> the qvm-prefs flags.  Whonix 13 to 14 upgrade worked for me on R4_rc5
> but not final R4.0, but installing fresh templates from unstable did the
> trick.
> 
> -m0ssy
> 

also, if you want whonix updates to go through the new sys-whonix-14, in
dom0 edit the file:
/etc/qubes-rpc/policy/qubes.UpdatesProxy

modify the top line:
$tag:whonix-updatevm $default allow,target=sys-whonix

to become:
$tag:whonix-updatevm $default allow,target=sys-whonix-14

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/065ee013-76df-6866-50a5-f1a123acce9d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot

2018-05-10 Thread Ilpo Järvinen
On Thu, 10 May 2018, qubes-...@tutanota.com wrote:

> I set up the split-gpg with vault-safe VM, where my private keys are stored,
> and the work VM, with pub keys and server communication.
> 
> All runs well after executing the
> [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe
> 
> The issue is, that the export doesnt survive rebooting the work VM, and I
> need to export it again. Is it a Qubes preset, and needs to be executed
> every reboot, or am I missing something?

Put that export into the startup file of the shell.


-- 
 i.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/alpine.DEB.2.20.1805101853480.1344%40whs-18.cs.helsinki.fi.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] trouble with whonix-14-dvm

2018-05-10 Thread mossy
'awokd' via qubes-users:
> Think I got it working with the -14 templates from unstable. In dom0:
> 
> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable
> qubes-template-whonix-gw-14
> qvm-create sys-whonix-14 --class AppVM --template whonix-gw-14 --label black
> qvm-prefs sys-whonix-14 provides_network True
> 
> sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable
> qubes-template-whonix-ws-14
> qvm-features whonix-ws-14 whonix-ws 1
> qvm-create whonix-ws-dvm-14 --class AppVM --template whonix-ws-14 --label
> green
> qvm-features whonix-ws-14-dvm appmenus-dispvm 1
> qvm-prefs whonix-ws-dvm-14 template_for_dispvms true
> qvm-prefs whonix-ws-dvm-14 netvm sys-whonix-14
> qvm-prefs whonix-ws-dvm-14 default_dispvm whonix-ws-dvm-14
> 
> I suspect once these templates get released to stable, the salt command
> will take care of all that for us.
> 

Plus, to ensure updates will work, run the following as well in dom0:

qvm-tags whonix-gw-14 a whonix-updatevm
qvm-tags whonix-ws-14 a whonix-updatevm

And thanks for this, I was not aware of qvm-features or some of those
the qvm-prefs flags.  Whonix 13 to 14 upgrade worked for me on R4_rc5
but not final R4.0, but installing fresh templates from unstable did the
trick.

-m0ssy

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53a8bd93-3df4-9ab3-44d1-2c92221e346f%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot

2018-05-10 Thread mossy
qubes-...@tutanota.com:
> I set up the split-gpg with vault-safe VM, where my private keys are stored, 
> and the work VM, with pub keys and server communication. 
> 
> All runs well after executing the 
> [user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe
> 
> The issue is, that the export doesnt survive rebooting the work VM, and I 
> need to export it again. Is it a Qubes preset, and needs to be executed every 
> reboot, or am I missing something?
> 

You should add `export QUBES_GPG_DOMAIN=vault-safe`  to your
~/.bash_profile

good luck!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2cf2253-9462-ab1e-492a-d51771b79142%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] split-gpg export QUBES_GPG_DOMAIN doesnt survive the reboot

2018-05-10 Thread qubes-fan
I set up the split-gpg with vault-safe VM, where my private keys are stored, 
and the work VM, with pub keys and server communication. 

All runs well after executing the 
[user@work ~]$ export QUBES_GPG_DOMAIN=vault-safe

The issue is, that the export doesnt survive rebooting the work VM, and I need 
to export it again. Is it a Qubes preset, and needs to be executed every 
reboot, or am I missing something?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LC8YldD--Z-0%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.