[qubes-users] Re: how to forward webcam to a VM?

2018-08-17 Thread John S.Recdep
On 08/17/2018 02:54 AM, Aliaksandr Kavaliou wrote:
> 
> 
> On 11/26/17 16:10, Unman wrote:
>> On Sun, Nov 26, 2017 at 01:04:39PM +0100, evo wrote:
>>>
>>>
>>> Am 26.11.2017 um 00:58 schrieb awokd:
 On Sat, November 25, 2017 16:46, evo wrote:

> I have connected a webcam and i see it via lsusb on sys-usb. I also can
> use it with "cheese" programm on the sys-usb-VM. But how can i forward
> it to webcam-VM and use it there??

 Many webcams can be used over USB proxy. From dom0, enter "qvm-usb" with
 the webcam connected. You should see a list of available USB devices,
 including the webcam. From there, you'd enter "qvm-usb -a webcam-VM
 sys-usb:12.3". Use the correct name for your VM and sys-usb:device
 identifier for your webcam.

 See https://www.qubes-os.org/doc/usb/ for more instructions.


>>>
>>>
>>> Hey! Thanks!
>>> i installed qubes-usb-proxy on the webcam-VM and tried to attach it
>>> there, but i get this error: "device attach failed: Invalid speed received"
>>>
>>> find nothing about such error in the docs.
>>
>> Which Qubes version are you using?
>>
>> What's the device you are trying to use?
>> Can you provde more information?
>>
>> This is an error that has been reported before and there's an open
>> ticket on qubes issues.
>> It seems to be device and circumstance dependent. (e.g an android in
>> debug mode throws this error but the same device NOT in debug mode
>> attaches properly.)
>>
> 
> 
> Hey Guys!
> after some time i installed Qubes 4.0 and here the usb-proxy goes over
> the grafic icon. But i still can not run my webcam Logitech C920. I
> attach it to the webcam-VM, run the software (tox, but also cheese), but
> there is no device found.
> 
> hmm... can somebody help?
> 

so you tried it in both Fedora-28 and Debian-9  appvms?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f84884f7-7343-7c71-3b8e-667a10b4fda0%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.2 no longer booting after dom0 update today

2018-08-17 Thread vsanchezleighton


> Le 18 août 2018 à 00:51, awokd  a écrit :
> 
>> On Fri, August 17, 2018 10:34 pm, vsanchezleigh...@gmail.com wrote:
>> 
>> Thanks for your reply.
>> I tried upgrading the bios to the most recent version on Lenovo’s site
>> that cites it mitigates variant 4 and 3a of spectre (1.32).
> 
> Was hoping this would fix it!
> 
>> The problem remained the same in qubes though. And I noticed in dmesg for
>> dom0 a message during systemd[1] bring up that says ‘Failed to start Load
>> Kernel Modules.’ (It’s the only message in red).
> 
> You can ignore that error message. You were testing those templates out
> while running one of the older kernels, right? Only thing left is Xen
> then:
> https://www.qubes-os.org/doc/software-update-dom0/#how-to-downgrade-a-specific-package

Thanks for the quick reply. Yes I am using 4.4.14 kernel.

I’ll try downgrading Xen next...after some sleep :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7FF1E1AA-04ED-4045-B3D8-8C91460FE35E%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.2 no longer booting after dom0 update today

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 10:34 pm, vsanchezleigh...@gmail.com wrote:

> Thanks for your reply.
> I tried upgrading the bios to the most recent version on Lenovo’s site
> that cites it mitigates variant 4 and 3a of spectre (1.32).

Was hoping this would fix it!

> The problem remained the same in qubes though. And I noticed in dmesg for
> dom0 a message during systemd[1] bring up that says ‘Failed to start Load
> Kernel Modules.’ (It’s the only message in red).

You can ignore that error message. You were testing those templates out
while running one of the older kernels, right? Only thing left is Xen
then:
https://www.qubes-os.org/doc/software-update-dom0/#how-to-downgrade-a-specific-package


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ad54864ffba3a81a2c43235e2ef292d.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.2 no longer booting after dom0 update today

2018-08-17 Thread vsanchezleighton

Le 17 août 2018 à 14:33, awokd  a écrit :
> 
>> On Thu, August 16, 2018 11:28 pm, vsanchezleigh...@gmail.com wrote:
>> Hi,
>> 
>> 
>> I have been using qubes 3.2 for more than a year now on a Lenovo x250
>> thinkpad. Today after a qubes-dom0-update ( that appears in dnf history as
>> date: 2018-08-16 12:56 , Action: I,U , Modified: 11 E<) I turned off the
>> pc.
>> 
>> When I turned it on again a few hours later it simply wouldn’t finish
>> qubes boot and restarted every time before getting to the window manager.
>> So I got into grub from the splash screen to explore things and found an
>> empty xen.cfg file in qubes subdirectory : I replaced it with one found
>> in the qubes doc at the UEFI troubleshooting page (and tried out with the
>> three kernel versions present in the boot partition). It didn’t improve
>> things, boot still finished in restart. So I then chose the other items
>> in grub’s menu and suppressed the quiet option from the xen.cfg. In this
>> manner the subitem using kernel 4.14.57 could still not boot but the
>> other two could (partially) with 4.9.56 and 4.4.14. Partially, because in
>> both cases when the boot got through to the gui  neither sys-net nor
>> sys-firewall would start (the dom0 log indicates some crashing problems
>> after starting dom0, see pictures).
>> 
>> Any suggestions to help me get back to my previous stable situation ? How
>> difficult would it be to unroll completely the dom0 update that led to
>> this ? Thanks.
> 
> Invalid opcode in dom1 makes me think a template got updated and is trying
> to execute one of the new mitigations, but your microcode doesn't support
> it. Check for a firmware update for your system.
> 
> If there isn't one, try setting your VMs to not auto-start by editing
> /var/lib/qubes/qubes.xml, then seeing if you can get into Qubes and figure
> out which template is causing it. Then switch your VMs to use a different
> one.

Thanks for your reply. 
I tried upgrading the bios to the most recent version on Lenovo’s site that 
cites it mitigates variant 4 and 3a of spectre (1.32).

The problem remained the same in qubes though. And I noticed in dmesg for dom0 
a message during systemd[1] bring up that says ‘Failed to start Load Kernel 
Modules.’ (It’s the only message in red).

I tried -as you suggested- to boot with no vm in autoboot and changed their 
templates from fedora 27 to fedora 26. Then I tried to launch manually sys-net 
or templates or other vms. They all try to run sys-net (its state icon becomes 
yellow then disappears), then fail and -some time later- they report ‘Error 
starting VM: Cannot execute qrexec-daemon’. I also tried using debian-8 
template.

After each vm start failure dom0’s log (/var/log/xen/console/hypervisor.log 
attached) shows again a new iteration of the same ‘Unhandled invalid opcode 
fault/trap [#6, ec=]’ and a call to domain_crash_sync etc...

Any suggestions ?
Thanks again.

Vicente

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86A44A27-4A9C-4604-9A49-BC0534D8509A%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


hypervisor.log
Description: Binary data


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86A44A27-4A9C-4604-9A49-BC0534D8509A%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] screen randomly blanking on 4k with hdmi, onboard intel graphics card

2018-08-17 Thread pixel fairy
qubes-os 4.0 system76 lemur7 (i7 skylake) the hdmi port seems to only work well 
at hdmi. any other resolution and it randomly blanks the screen. tried running 
the ubuntu (pop-os) installer for about an hour watching youtube and the screen 
was fine. dont know if that was luck or a qubes-os problem.

does anyone else do 4k out of hdmi with the onboard intel grahpics?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/62c0094b-a4c1-4c89-b6f7-c7d5a83d9f63%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Incredible HD thrashing on 4.0

2018-08-17 Thread taii...@gmx.com
On a NUMA system it could also be swapping pages from an efficient node
to a less efficient distant node.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3a0006c-ef4c-ed8e-05d3-870437e01f82%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


0xDF372A17.asc
Description: application/pgp-keys


Re: [qubes-users] Re: how do you clear 'move/copy to other app vm' context windows

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 6:57 pm, John S.Recdep wrote:
> On 08/16/2018 09:34 PM, cubit wrote:
>

>> I think I was not too clear.   In the file browsers (nautilus) there is
>> a right click context menu option to copy or move a file to another
>> appvm.  I am trying to find how to clear these dialog boxes of the
>> appvm names that are saved in them.
>>
>>
>>
>>
>> CuBit
>>
>>
>
> And it's  Qubes 4.0 ?
>
>
> In 3.2 I remember a problem like this , I recall someone in here,
> probably Tasket,  saying the ability to go and manually remove old removed
> VM references  was now gone.
>
>
> If it is 3.2 it may be possible to do it manually,  in 4.0  better ask
> Unman or Awokd   .

Sorry, not sure. Didn't see any open or closed issue
(https://github.com/QubesOS/qubes-issues) on it though. Maybe open a new
one?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01686d63861909d0c71573ee3e7ff89f.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: please stay tuned on Whonix news re: 'updater'

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 7:19 pm, John S.Recdep wrote:

>>
>
> Actually the failing updates are back , if you don't mind I prefer to
> ask here for now: in whonix-ws-14 Konsole
>
> $sudo apt-get update
>
>
> Err:20
> tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.on
> ion stretch Release Connection failed
> Reading package lists... Done
>
>
>
> E: The repository
> 'tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.o
> nion stretch Release' does no longer have a Release file. N: Updating from
> such a repository can't be done securely, and is therefore disabled by
> default.
>
> N: See apt-secure(8) manpage for repository creation and user
> configuration details.

If it fails every time, make sure your Whonix templates are set to update
correctly with
https://forums.whonix.org/t/cant-update-whonix-templates/5631. The "does
no longer have a Release file" error means that repository is in process
of being updated with new content, and to try again later. You may see
this error with any Debian style repository.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/332fbaad067f4b1820e6f007509d3050.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installing Qubes 4.0 on a Dell XPS 9570 i9

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 3:01 pm, Ole wrote:
> Hi everyone,
>
>
> I have a new XPS 9570 i9 laptop and I'm trying to install Qubes 4.0 on
> it.
>
> I have the installer on a USB stick and when I boot from it, briefly some
> text shows up in the upper left corner, then screen goes blank and the
> system reboots some seconds later.
>
> Debian live isn't working either, it hangs with a black screen and fan
> noise.
>
> Ubuntu live is working though.
>
>
> Is there anything I could try?

Easiest thing to try might be to install in Legacy mode vs. UEFI.
Otherwise, check
https://www.qubes-os.org/doc/uefi-troubleshooting/#installation-freezes-before-getting-to-anaconda-qubes-40.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e7513cffdc57a76adf7650a41846dd96.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] how to forward webcam to a VM?

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 12:54 pm, Aliaksandr Kavaliou wrote:

>
>
> Hey Guys!
> after some time i installed Qubes 4.0 and here the usb-proxy goes over the
> grafic icon. But i still can not run my webcam Logitech C920. I attach it
> to the webcam-VM, run the software (tox, but also cheese), but there is no
> device found.

With some USB devices, I have to assign a spare USB controller (not the
one you're using for the keyboard/mouse!) directly to the VM before they
will work. This is not the best solution because you lose the benefits of
Qubes isolation, but might be the only way.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/181088f45648aa0efe0b046fb9fc4576.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installation help please

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 12:41 pm, Bengt Thuree wrote:

> GPU   : GigaByte GeForce GT 1030

Try adding nouveau.modeset=0. See
https://www.qubes-os.org/doc/nvidia-troubleshooting/#disabling-nouveau.

> ==> Q2 How do I input the encryption key when I use the text based
> installer?
> ==> Q3 How do I create and use a kickstart file?

These are good questions, but I don't know the answers!

> ==> Q4 I presume Qubes should work fine with my configuration?

There are a handful of people who got it running on Ryzen so it's probably
a question of if the motherboard/BIOS can handle it. Check
https://www.qubes-os.org/hcl/.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/caca4e35a5119395a012f39e30b3c3a8.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installation help please

2018-08-17 Thread John S.Recdep
On 08/17/2018 02:41 AM, Bengt Thuree wrote:
> Asus Prime A320M-E

you saw the HCL ?

 ASUS PRIME H270-PLUS/CSM
i7-7700 Kaby Lake HD Graphics   0808yes yes yes unknown 
R4.04.8.2
4.9.56-21   

set BIOS to Legacy OPROM only

I realize its not a exact match but
https://www.qubes-os.org/hcl/

the whole  legacy v. uefi  boot  I don't see mentioned in your  writeup
; & can be the 1st thing to try ; the crux of some installs

otherwise, another common Bios thing is to "disable discrete graphics"
if there exists such an option in the Bios,  otherwise,   it
shouldn't be that complicated  unless your doing something special,
of which much of your writeup   is beyond my level :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c8c6e941-daa7-5eed-cc75-8c6017ddac72%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] can not update fedora27 template (curl error 37)

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 10:13 am, evo wrote:
> Hi!
>
>
> I have problem updating fedora27-template and also one stande alone VM
> on the same basis.

Might be a temporary issue with Fedora's repositories. Try again later.
You might also want to switch to Fedora 28 instead.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f33e38716b6c66f9ae4ad84bad2c0d5a.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Audio and suspend issues; misc questions

2018-08-17 Thread 'awokd' via qubes-users
On Thu, August 16, 2018 6:56 pm, AJ Jordan wrote:

> === SOUND ===

> All volumes in the "Playback" tab are set to 100% and are unmuted. In
> the "Output Devices" tab, it's unmuted and set to 100%, and I can see the
> volume indicator going up and down. Plugging in headphones does not help.

Check the Configuration tab all the way to the right, too. If that still
doesn't help, and you have more than one output device listed, try to
disable the ones you aren't using completely. That said, I had one AMD
card where HDMI out worked with Qubes, and another model that I could
never get it to work.

> === SUSPEND ===

Common issue but no common fix, unfortunately.

> === DOM0 SOFTWARE ===
>
>
> It's unclear to me exactly how bad I should feel installing stuff into
> dom0. Specifically, I've installed a program called Redshift[1] through
> qubes-dom0-update (i.e. the Fedora repos).

It's so-so; ideally the less software in dom0 the better but that one
seems pretty benign.

>
> === DETACHING USB BLOCK DEVICES ===
>
>
> If I attach a USB block device to a Qube and mount then unmount the
> filesystem, do I really need to detach the block device from the Qube? Or
> can I just pull the drive?

In theory you can just pull it, but I like to do the detach. Maybe just
for good luck?


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eedb856d5f4d6698153bab85760d4dab.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whonix 14 has been Released

2018-08-17 Thread smcmj
"P.S. I would like to thank Patrick Schleizer for his feedback this past week. 
His effort has not gone unnoticed."

I'd second this!! "Ich bin ein berliner"

Thanks Patrick for this extra effort to make us safer... 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ebd23fc-939c-4119-8164-555aed8b917a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to open 'green' URL's in a new red window?

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 2:26 pm, Marcus Linsner wrote:

> Was this the second version:
> https://groups.google.com/d/msg/qubes-devel/fsIAQO1xFkU/u1C61kxCBgAJ ?
> that is: https://github.com/raffaeleflorio/qubes-url-redirector I ask
> because it says: "Furthermore, through context menu entries, you can open
> a specific link in a custom way. Currently you can open links in: DVM, a
> default-VM, a specific VM and in this VM."
>
> I haven't checked it yet, but sounds great!

Yes, that's one of them! The second method was simpler, I think it
involved creating a custom menu entry but it would always be hardcoded to
a specific disposable VM. Can't find it in my notes.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f5f12a900ad39f35e353577e587819e4.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Whonix 14 - Update errors?

2018-08-17 Thread smcmj
...again I want to thank the Whonix/Qubes team for everything they do!! You are 
awesome...

In the spirit of feedback:

I just tried updating Whonix-ws-14 and started receiving errors? I saw another 
post with similar 
issues(https://groups.google.com/forum/#!topic/qubes-users/ppdbaDAavRY), I 
thought it best to call out the specific issue in the subject so it might help 
others with this issue:

The error I get, when using the "Qubes Manager" -> "Whonix-ws-14" -> "Update 
qube" is:


Err:20
tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion
stretch Release
  Connection failed
Reading package lists... Done


E: The repository
'tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion
stretch Release' does no longer have a Release file.

N: Updating from such a repository can't be done securely, and is
therefore disabled by default.

N: See apt-secure(8) manpage for repository creation and user
configuration details. 

Whats strange is that I tried the update again while writing this post and it 
appeared no updates were needed

I think I am OK but wanted to share.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cf715b93-3a66-4429-aea3-9caf151329c0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Lenovo Thinkpad T480

2018-08-17 Thread aedcop
On Monday, April 16, 2018 at 12:51:07 PM UTC+2, bbrr...@gmail.com wrote:
> On Sunday, April 15, 2018 at 4:15:31 AM UTC+1, vel...@tutamail.com wrote:

> > Your HCL states you have the vPro...
> > 
> > Would you or anybody know if you can get all the functionality including 
> > AEM with the i7-8550U (with out the vPro)?
> > 
> > Is there a higher risk of attack with the vPro?
> > 
> > Thanks for doing this HCL...
> 
> Yes, the T480 is brand new. I haven't tried the AEM .

Thanks for posting the HCL entry. Have you tried AEM since your last post?

I am considering acquiring a T480 and using it with AEM, but it seems to have 
TPM 2.0 which is a priori incompatible with AEM. However, I stumbled upon a 
blog post [1] which mentions (in the section "BIOS Configuration") that the TPM 
of a slightly older ThinkPad model (I think T460p) can be configured to work 
according to the TPM 1.2 specification and with TXT, so I thought that the 
newer models could also have such an option. Do you (or anyone else) know if 
this is the case for T480?

-- Aedin Copper

PS: Since we're at it: The blog post also mentions that Intel AMT can be 
disabled as well. Can anyone confirm that this is also the case for T480?

[1] 
https://medium.com/@securitystreak/living-with-qubes-os-r3-2-rc3-for-a-week-1a37e04c799e

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f1e5c74-8666-44f5-ab04-4ae88d6758ef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whonix 14 - Updated, just lost Tor Browser for Whonix-dvm??

2018-08-17 Thread John S.Recdep
On 08/16/2018 02:34 PM,
bm-2ctjsegdfzqngqwuqjswro6jrwlc9b3mn3-A7g8B5KuuXnx/jn5l+7...@public.gmane.org
wrote:
> On Wed, 15 Aug 2018 12:59:06 -0700 (PDT)
> smcmj-2xk3N/kkaK1Wk0Htik3J/w...@public.gmane.org wrote:
> 
>> I just transitioned to the new Whonix 14 templates, everything was
>> working great however I just updated both the -gw and -ws templates
>> and lost the Tor Browser(AnonDist) from the whonix-ws-14-dvm after
>> update? When I launch a "whonix-ws-14-dvm" browser I get a pop-up
>> asking: "Tor Browser not installed/Start Tor Browser download?".
>>
>> What I tried:
>>
>> To customize the -dvm's in Debian and Fedora I have run the following
>> to customize -dvm's (other then whonix):
>>
>> [user@dom0 ~]$ qvm-run -a debian-dvm gnome-terminal
>>
>> Then in new terminal of “-dvm” type “firefox” to launch firefox, then
>> I customize the browser.
>>
>> I tried the following with Whonix-dvm:
>> [user@dom0 ~]$ qvm-run -a whonix-ws-14-dvm gnome-terminal
>>
>> The problem I am having is:
>> 1) The "whonix-ws-14-dvm" starts but no gnome terminal launches?
>> 2) Since whonix doesn't use "Firefox" what would I type to launch the
>> "Tor Browser"? Assuming I eventually get a gnome terminal to launch
>> 3) How do I install the Tor Browser safely into either the template
>> or -dvm?
>>
>> Other notes:
>> - I created an AppVM using the updated "whonix-ws-14" template,
>> received a popup that "Tor Browser" is not installed, installed the
>> oldest browser per the recommendation on the pop-up, however after
>> installing another pop-up states: "Signature looks quite old
>> already...check signature looks sane".  I was able to navigate to an
>> Onion site, whonix check came back OK.
>>
>>
>> Thanks again for the help...
>>
> 
> 
> The same happened to me after updates. Running 'update-torbrowser' in
> whonix-ws fixed the problem. 
> 

thx this solved the same issue I was having ; i had thought maybe it was
normal to be asked everytime to d/l  torbrowser lol

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/31000cc9-9656-0da9-4945-772fd8afb658%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: please stay tuned on Whonix news re: "updater"

2018-08-17 Thread John S.Recdep
On 08/16/2018 05:37 PM, John S.Recdep wrote:
> On 08/15/2018 07:23 PM, Patrick Schleizer wrote:
>> It is important to read the latest Whonix news to stay in touch with
>> ongoing developments. This way users benefit from notifications
>> concerning important security vulnerabilities and improved releases
>> which address identified issues, like those affecting the updater or
>> other core elements.
>>
>> Read more:
>> https://www.whonix.org/wiki/Stay_Tuned
>>
> 
> did something happen?
> 
> by "updater"  meaning sudo apt-get update && sudo apt-get dist-upgrade   ?
> 
> seemed to be broken the other day, but seems ok
> don't see anything new on vuln issues
> https://forums.whonix.org/c/news
> 
> guess I can check again next month  :)
> 

Actually the failing updates are back , if you don't mind I prefer to
ask here for now:
in whonix-ws-14 Konsole

$sudo apt-get update

Err:20
tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion
stretch Release
  Connection failed
Reading package lists... Done


E: The repository
'tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion
stretch Release' does no longer have a Release file.
N: Updating from such a repository can't be done securely, and is
therefore disabled by default.

N: See apt-secure(8) manpage for repository creation and user
configuration details.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d1bc2438-879f-2fd6-c397-3c345d4afa23%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: how do you clear "move/copy to other app vm" context windows

2018-08-17 Thread John S.Recdep
On 08/16/2018 09:34 PM, cubit wrote:
> 17. Aug 2018 03:24 by yrebstv-sgozh3hwpm2stnjn9+b...@public.gmane.org 
> :
> 
>> On 08/16/2018 08:32 AM, cubit wrote:
>>> Is there a way to copy the suggested VMs in the "move/copy to other app vm" 
>>> as I have a few entries that no longer exist and would like to get rid of 
>>> them?
>>>
>>>
>>> CuBit
>>>
>>
>> I suppose you've tried  qvm-sync-appmenus in dom0
>>
>> and/or  in the VMM  "refresh applications" 
>>
>>
>> though, just a wild guess not an educated one
>>
> 
> 
> 
> 
> 
> 
> 
> I think I was not too clear.   In the file browsers (nautilus) there is a 
> right click context menu option to copy or move a file to another appvm.  I 
> am trying to find how to clear these dialog boxes of the appvm names that are 
> saved in them.
> 
> 
> 
> 
> CuBit
> 

And it's  Qubes 4.0 ?

In 3.2 I remember a problem like this , I recall someone in here,
probably Tasket,  saying the ability to go and manually remove old
removed VM references  was now gone.

If it is 3.2 it may be possible to do it manually,  in 4.0  better ask
Unman or Awokd   .

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8edb2385-4cc7-4fc0-bef0-4cc2142e7c9c%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Whonix 14 - upgrade or re-install? Whats more smooth, less troublesome?

2018-08-17 Thread John S.Recdep
On 08/12/2018 08:16 AM,
qubes-fan-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote:
> I am planning to move from my Whonix 13 to Whonix 14 on Qubes. My question is 
> what way it should be easier, based on the Q user experiences. What would you 
> propose - upgrade or re-install? Are there any known issues which would call 
> for one or other way?
> 
> I have few VMs based on the Whonix template with data and settings on it. 
> Will the contents of these VMs remain, or will it be destroyed - re-install 
> vs upgrade?
> 
> Thank you
> 


https://github.com/Qubes-Community/Contents/blob/master/docs/misc/iaq.md#manually-install-whonix-14-templates


worked for me, I'd call it a new install not a "re-install"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2e70610c-96c3-53d5-7e12-23ed43be7903%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggested order for loading Qubes 4.0?

2018-08-17 Thread John S.Recdep
On 08/17/2018 03:13 AM, 'awokd' via qubes-users wrote:
> On Fri, August 17, 2018 6:03 am, Patrick Bouldin wrote:
>> On Thursday, August 16, 2018 at 11:34:48 PM UTC-4, John S.Recdep wrote:
>>
>>> On 08/16/2018 04:25 AM, Patrick Bouldin wrote:
>>>
 Hello, I got some great advice about having two hard drives since I
 want Windows on one drive and qubes on another. So I now have a good
 I7 laptop with two - 1/2 TB SSDs. I had in mind to load it this way,
 is the following correct?

 I'm starting with both SSDs empty, no OS on either.


 1 Physically install both drives


 2 Install Windows on disk 1 after booting to flash drive with windows
 ISO


 3 Unplug windows based SSD drive just to be sure I'm on the right
 drive next

 4 Boot to bios, modify bios to change 2nd SSD (to be Qubes) FROM
 Windows UEFI to other OS (correct?)


 5 Boot to a flash drive loaded with the Qubes 4.0 install ISO


 This is the part I'm really not clear about, remember I'm working
 with two drives, booting to either the drive to windows or the drive
 to qubes. So, am I following the advice here?:
 https://www.qubes-os.org/doc/multiboot/
 - select custom layout, assign existing /boot partition as /boot,
 deselect the 'Format' option, continue with installation.


 Or, do I let Qubes install in automatic configuration and then
 manually modify the grub file?


 Thanks,
 Patrick


>>>
>>> Sounds like what I did/do   with windows 10 ; since it doesn't involve
>>> Grub ,  probably won't be a problem ..
>>>
>>>
>>> In my case however,  the uefi, I believe doesn't label the drive with
>>> the  drive name, but changes it to  "windows" or "qubes" , which concerns
>>> me , as I think it incorrect, I think that may be how uefi works  ymmv,
>>> why not try it
>>>
>>> what is a "windows uefi" ? looks to me like
>>> https://www.qubes-os.org/doc/multiboot
>>>
>>>
>>> doesn't apply to you, its for single disk dual booting
>>
>> Hi John and thanks. I agree but I think after I install qubes then I will
>> need to delay the grub screen in order to be able to choose either Win 10
>> or Qubes. And I think I have to somehow tell qubes to look for the
>> windows drive and then allow to choose it...  Anyway you're right, I
>> think once I have them both loaded I hope to figure it out.
> 
> UEFI uses an EFI partition on one of your drives, so if you pull the
> Windows drive it might get confused. You can try it, but if you have
> problems might want to re-install with legacy/grub boot for both OSes.
> 
> 

I don't think Grub has to be involved at all, you just change  the boot
order in  the  Bios-Uefi

If it doesn't work pulling the drive,  just leave it, When I put either
win10 or Q4.0   , there is no Grub choice  being asked

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d7d4483-7c69-2794-101d-be085b77454d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Guide: Monero wallet/daemon isolation w/qubes+whonix

2018-08-17 Thread 0xB44EFD8751077F97
Patrick Schleizer:
> https://getmonero.org/resources/user-guides/cli_wallet_daemon_isolation_qubes_whonix.html
> is missing how to actually use it.
> 
> I guess it is simply: run `monero-wallet-cli` or monero gui in
> monero-wallet-ws."

Yes, I aimed for brevity and flexibility, targeting the advanced user in
my first rendition. Looking back on this now I see at least a few
improvements that I intend to make. Thank you for taking an interest in
this!

> 
> 0xB44EFD8751077F97:
>> Patrick Schleizer:
>>> I didn't notice this thread until now.
>>>
>>> Interesting!
>>>
>>> Now reference here:
>>> https://www.whonix.org/wiki/Monero
>>>
>>>
>>> I am wondering how to save users from as many manual steps as possible.
>>>
>>>
>>> To save users from having to edit /rw/config/rc.local...
>>>
 socat TCP-LISTEN:18081,fork,bind=127.0.0.1 EXEC:"qrexec-client-vm
>>> monerod-ws user.monerod"
>>>
>>> Could maybe replaced by file:
>>>
>>> /etc/anon-ws-disable-stacked-tor.d/40_monero.conf
>>>
>>> content:
>>>
>>> $pre_command socat TCP-LISTEN:18081,fork,bind=127.0.0.1
>>> EXEC:"qrexec-client-vm monerod-ws user.monerod"
>>>
>>> Should work after reboot (or after "sudo systemctl restart
>>> anon-ws-disable-stacked-tor").
>>>
>>> Untested.
>>>
>>> Reference:
>>> https://github.com/Whonix/anon-ws-disable-stacked-tor/blob/master/etc/anon-ws-disable-stacked-tor.d/30_anon-dist.conf
>>>
>>
>> Tested, works on Whonix 14/Qubes 4.0.
>>
>> Would you consider shipping this as a default Whonix file, or maybe part
>> of a package?
> 
> In package https://github.com/Whonix/qubes-whonix when using socket
> activation, yes.
> 
> Similar to:
> 
> -
> https://github.com/Whonix/anon-ws-disable-stacked-tor/blob/master/lib/systemd/system/anon-ws-disable-stacked-tor_autogen_port_9050.socket
> 
> -
> https://github.com/Whonix/anon-ws-disable-stacked-tor/blob/master/lib/systemd/system/anon-ws-disable-stacked-tor_autogen_port_9050.service
> 
> File name should not contain "anon-ws-disable-stacked-tor" / "autogen".
> 
> File names...?
> 
> /lib/systemd/system/qubes-whonix-monerod.socket
> /lib/systemd/system/qubes-whonix-monerod.service
> 
> Replace "ExecStart=/lib/systemd/systemd-socket-proxyd 10.152.152.10:9050"
> 
> with:
> 
> socat TCP-LISTEN:18081,fork,bind=127.0.0.1 EXEC:"qrexec-client-vm
> monerod-ws user.monerod"
> 
> Untested. Does that work?
> 

I wasn't able to get this one working. Are these both to be enabled on
monero-wallet-ws? What port is the socket supposed to be on? Can't be
the same as where socat listens in the service unit.

I'm not familiar with this method, so I most likely made some mistakes.
I won't have much time to play with it until this weekend.

> Would this break monerod for users not using this Monero wallet/daemon
> isolation? I mean, does monerod use local port 18081 by default? In that
> case we'd need to change that port.

By default monerod will use the following ports (depending on what
network you're on):

{1,2,3}8080 = mainnet,testnet,stagenet p2p-bind-port
{1,2,3}8081 = mainnet,testnet,stagenet rpc-bind-port
{1,2,3}8082 = mainnet,testnet,stagenet zmq-rpc-bind-port

We should avoid these ports, as you say.

> 
>> If not, the user will have to put this on the TemplateVM
>> or config bind-dirs; which are both additional steps.
>>>
>>>
>>> /etc/qubes-rpc/policy/user.monerod could maybe become:
>>> /etc/qubes-rpc/policy/whonix.monerod
>>>
>>> To have users from manually creating it, could be dropped here:
>>>
>>> https://github.com/QubesOS/qubes-core-admin-addon-whonix/tree/master/qubes-rpc-policy
>>>
>>> If you like, create a pull request and see what Marek thinks.
>>>
>>
>> This would be useful. It's on my radar.
>>
>>>
>>>
>>> /home/user/monerod.service would be better in /rw so only root can write
>>> to it. Even better perhaps systemd user services?
>>>
>>> https://www.brendanlong.com/systemd-user-services-are-amazing.html
>>>
>>> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820111
>>>
>>>
>>
>> Interesting, I didn't know about this. I don't see how moving the file
>> from /home/user/ to /home/user/.config/systemd/user is more secure,
>> though.
> 
>> I think moving it to /rw may be slightly better, but
>> passwordless sudo kind of negates that.
> 
> Indeed only useful for users of these:
> 
> - https://www.qubes-os.org/doc/vm-sudo/
> - https://github.com/tasket/Qubes-VM-hardening
> 
> Qubes-VM-hardening will be easily available one day probably.
> 
> https://github.com/QubesOS/qubes-issues/issues/2748
> 
> I guess password protected sudo will get more and more easy in Qubes so
> very much worth going for proper access rights.
> 

Ok, I plan on that.

>> The best would be to put it on the TemplateVM in /lib/systemd/system/,
>> but, again, this is more steps for the user.
>>
>> In regards to monero being in stretch-backports now, I think it might be
>> an equal number of steps or more than there is now, and more confusing
>> for the user, to add stretch-backports to the TemplateVM's sources and
>> 

Re: [qubes-users] Best Laptop for Qubes 4+ and Heads

2018-08-17 Thread Franz
On Sat, Aug 11, 2018 at 1:36 AM, Chris Laprise  wrote:

> On 08/10/2018 08:25 PM, Franz wrote:
>
>>
>>
>> On Fri, Aug 10, 2018 at 5:23 PM, Jonathan Brown <
>> jonbrownmaste...@gmail.com > wrote:
>>
>> How bad does the RAM issue affect your VM number you want to run vs
>> what you can run? Can it handle all the required VMs needed by
>> default along with both Whonix templates and split GPG?
>>
>> yes, a part from the system VMs, I usually run 6 VMs. When the machine is
>> fresh started I can easily reach 9 VMs.  But after a couple of days working
>> it doesn't let me start new VMs.
>>
>> How does it actually run performance wise?
>>
>>
>> Smooth and fast.
>>
>> But I never tried gaming or specially intensive tasks.
>>
>
> The ivy bridge CPUs are pretty fast.. the last generation before Intel cut
> max wattage in half with haswell.
>
> BTW there are little tricks to improving RAM usage, as my regular system
> has 8GB. Net and proxy VMs can usually be set to max 350MB RAM, and I find
> dom0+KDE works smoothly with max RAM at 1500MB. Most personal and work VMs
> do fine with max RAM at 1500 - 2000MB.
>
>
I tried reducing RAm allocated to various VMs and dom0  and it much
improved: I am able to get 27 concurring open VMs

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAUffB4J5O%3DKJFxgA91VQ35kJbGbRJk1CA7ESka02wXcA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installing Qubes 4.0 on a Dell XPS 9570 i9

2018-08-17 Thread Ole
Hi everyone,

I have a new XPS 9570 i9 laptop and I'm trying to install Qubes 4.0 on it.

I have the installer on a USB stick and when I boot from it, briefly some text 
shows up in the upper left corner, then screen goes blank and the system 
reboots some seconds later.

Debian live isn't working either, it hangs with a black screen and fan noise.

Ubuntu live is working though.

Is there anything I could try?

Is there anyway to give a prognosis whether this will work eventually?

Thanks in advance!
Ole

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b6345724-db5d-4ec7-9a9f-b2d859bacf1c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to open 'green' URL's in a new red window?

2018-08-17 Thread Marcus Linsner
On Friday, August 17, 2018 at 3:09:33 PM UTC+2, awokd wrote:
> On Fri, August 17, 2018 4:46 am, Marcus Linsner wrote:
> > On Monday, February 16, 2015 at 11:00:29 AM UTC+1, Laszlo Zrubecz wrote:
> >
> >> On 02/16/15 10:53, kerste...@gmail.com wrote:
> >>
> >>> Hello,
> >>>
> >>>
> >>> I have the document D1 with the URL1 inside the green Domain.
> >>>
> >>>
> >>> If I click on this domain, than the green Domain with the firefox is
> >>> starting...
> >>>
> >>> Can I define, that all URL's, which get opened by clicking on the
> >>> URL, are opend in another domain with the appropiate web-security
> >>> level, e.g. red?
> >>
> >> You can define it in OS level (default applications in GUI)
> >> You can use qvm-open-in-vm or qvm-open-in-dvm commands to open new
> >> links...
> >>
> >>
> >> --
> >> Zrubi
> >>
> >
> > Has anyone added a new menu entry such as "Open Link in New qube VM" to
> > Firefox's context menu, maybe under "Open Link in New Tab" for example?
> > If not, I'll post a link to it when I've finished it (would require
> > recompiling firefox btw - and I'm still learning how to do it under
> > Fedora 28) because I really need something like this in order to open
> > links from my google-search-VM into other VM(s).
> 
> I've seen a couple versions of this. One was discussed on qubes-devel a
> few months ago, but forget where I saw the second...

Was this the second version: 
https://groups.google.com/d/msg/qubes-devel/fsIAQO1xFkU/u1C61kxCBgAJ ?
that is: https://github.com/raffaeleflorio/qubes-url-redirector
I ask because it says: "Furthermore, through context menu entries, you can open 
a specific link in a custom way. Currently you can open links in: DVM, a 
default-VM, a specific VM and in this VM."

I haven't checked it yet, but sounds great!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f6100492-4c1a-488a-b1c3-d2195c1f1bb1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Suggested order for loading Qubes 4.0?

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 6:03 am, Patrick Bouldin wrote:
> On Thursday, August 16, 2018 at 11:34:48 PM UTC-4, John S.Recdep wrote:
>
>> On 08/16/2018 04:25 AM, Patrick Bouldin wrote:
>>
>>> Hello, I got some great advice about having two hard drives since I
>>> want Windows on one drive and qubes on another. So I now have a good
>>> I7 laptop with two - 1/2 TB SSDs. I had in mind to load it this way,
>>> is the following correct?
>>>
>>> I'm starting with both SSDs empty, no OS on either.
>>>
>>>
>>> 1 Physically install both drives
>>>
>>>
>>> 2 Install Windows on disk 1 after booting to flash drive with windows
>>> ISO
>>>
>>>
>>> 3 Unplug windows based SSD drive just to be sure I'm on the right
>>> drive next
>>>
>>> 4 Boot to bios, modify bios to change 2nd SSD (to be Qubes) FROM
>>> Windows UEFI to other OS (correct?)
>>>
>>>
>>> 5 Boot to a flash drive loaded with the Qubes 4.0 install ISO
>>>
>>>
>>> This is the part I'm really not clear about, remember I'm working
>>> with two drives, booting to either the drive to windows or the drive
>>> to qubes. So, am I following the advice here?:
>>> https://www.qubes-os.org/doc/multiboot/
>>> - select custom layout, assign existing /boot partition as /boot,
>>> deselect the 'Format' option, continue with installation.
>>>
>>>
>>> Or, do I let Qubes install in automatic configuration and then
>>> manually modify the grub file?
>>>
>>>
>>> Thanks,
>>> Patrick
>>>
>>>
>>
>> Sounds like what I did/do   with windows 10 ; since it doesn't involve
>> Grub ,  probably won't be a problem ..
>>
>>
>> In my case however,  the uefi, I believe doesn't label the drive with
>> the  drive name, but changes it to  "windows" or "qubes" , which concerns
>> me , as I think it incorrect, I think that may be how uefi works  ymmv,
>> why not try it
>>
>> what is a "windows uefi" ? looks to me like
>> https://www.qubes-os.org/doc/multiboot
>>
>>
>> doesn't apply to you, its for single disk dual booting
>
> Hi John and thanks. I agree but I think after I install qubes then I will
> need to delay the grub screen in order to be able to choose either Win 10
> or Qubes. And I think I have to somehow tell qubes to look for the
> windows drive and then allow to choose it...  Anyway you're right, I
> think once I have them both loaded I hope to figure it out.

UEFI uses an EFI partition on one of your drives, so if you pull the
Windows drive it might get confused. You can try it, but if you have
problems might want to re-install with legacy/grub boot for both OSes.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c8c19149b1399665e3509da082bc254.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to open 'green' URL's in a new red window?

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 4:46 am, Marcus Linsner wrote:
> On Monday, February 16, 2015 at 11:00:29 AM UTC+1, Laszlo Zrubecz wrote:
>
>> On 02/16/15 10:53, kerste...@gmail.com wrote:
>>
>>> Hello,
>>>
>>>
>>> I have the document D1 with the URL1 inside the green Domain.
>>>
>>>
>>> If I click on this domain, than the green Domain with the firefox is
>>> starting...
>>>
>>> Can I define, that all URL's, which get opened by clicking on the
>>> URL, are opend in another domain with the appropiate web-security
>>> level, e.g. red?
>>
>> You can define it in OS level (default applications in GUI)
>> You can use qvm-open-in-vm or qvm-open-in-dvm commands to open new
>> links...
>>
>>
>> --
>> Zrubi
>>
>
> Has anyone added a new menu entry such as "Open Link in New qube VM" to
> Firefox's context menu, maybe under "Open Link in New Tab" for example?
> If not, I'll post a link to it when I've finished it (would require
> recompiling firefox btw - and I'm still learning how to do it under
> Fedora 28) because I really need something like this in order to open
> links from my google-search-VM into other VM(s).

I've seen a couple versions of this. One was discussed on qubes-devel a
few months ago, but forget where I saw the second...


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a268f0e574ab61f4339159b0579a7f58.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Confused about verifying signatures

2018-08-17 Thread 'awokd' via qubes-users
On Fri, August 17, 2018 5:58 am, Patrick Bouldin wrote:

>>> On 2018-08-16 15:47, Patrick Bouldin wrote:
>>>
 Hi trying to validate 4.0. I downloaded the
 qubes-master-signing-key.asc and then not able to progress. I did
 find Joanna's qubes master signing key footprint, but I don't know
 how to compare or take the next step...

>
> Thanks and a quick question. I did get a final "Good signature", but
> curious, does that process actually modify the iso at all? Just would
> like to know because I pulled the iso file from my other pc and it will
> be easier to build the flash there.

Assuming you're still talking about the validation process; no, that would
not modify the iso.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3921c39f6da73478b34d77ff5c96bb3a.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Ubuntu templates and packages

2018-08-17 Thread Unman
I've put in some PRs to allow build of a bionic template in
qubes-builder. This is still the recommended way of getting your Ubuntu
templates.

If you want to build it yourself, then the changes required are
minimal, as you'll see on github.

If you cant wait, I've posted a bionic template for 4.0, together with
updated Xenial for 3.2 and 4.0, at
http://qubes.3isec.org/
I've also posted updated packages for 3.2 and 4.0 to the repository
there.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180817130101.5fhqkp33jm3lbwlk%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] how to forward webcam to a VM?

2018-08-17 Thread Aliaksandr Kavaliou



On 11/26/17 16:10, Unman wrote:
> On Sun, Nov 26, 2017 at 01:04:39PM +0100, evo wrote:
>>
>>
>> Am 26.11.2017 um 00:58 schrieb awokd:
>>> On Sat, November 25, 2017 16:46, evo wrote:
>>>
 I have connected a webcam and i see it via lsusb on sys-usb. I also can
 use it with "cheese" programm on the sys-usb-VM. But how can i forward
 it to webcam-VM and use it there??
>>>
>>> Many webcams can be used over USB proxy. From dom0, enter "qvm-usb" with
>>> the webcam connected. You should see a list of available USB devices,
>>> including the webcam. From there, you'd enter "qvm-usb -a webcam-VM
>>> sys-usb:12.3". Use the correct name for your VM and sys-usb:device
>>> identifier for your webcam.
>>>
>>> See https://www.qubes-os.org/doc/usb/ for more instructions.
>>>
>>>
>>
>>
>> Hey! Thanks!
>> i installed qubes-usb-proxy on the webcam-VM and tried to attach it
>> there, but i get this error: "device attach failed: Invalid speed received"
>>
>> find nothing about such error in the docs.
> 
> Which Qubes version are you using?
> 
> What's the device you are trying to use?
> Can you provde more information?
> 
> This is an error that has been reported before and there's an open
> ticket on qubes issues.
> It seems to be device and circumstance dependent. (e.g an android in
> debug mode throws this error but the same device NOT in debug mode
> attaches properly.)
> 


Hey Guys!
after some time i installed Qubes 4.0 and here the usb-proxy goes over
the grafic icon. But i still can not run my webcam Logitech C920. I
attach it to the webcam-VM, run the software (tox, but also cheese), but
there is no device found.

hmm... can somebody help?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7a1a6e71-62d0-7a1c-b05a-4aa2a6d03a7f%40sozialekunst.eu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Has anyone tried to run non-classical OS/nix* on the Qubes 4 machine?

2018-08-17 Thread Unman
On Wed, Aug 08, 2018 at 02:47:21AM -0700, get wrote:
> For example, NixOS/GuixSD/Sabotage/Plan9 and other.
> Any guides please?
> 

I've tried some of these - NixOS and GuixSD were straightforward.
Plan9 I got nowhere with, but I was able to run inferno reaonably well -
that was on 3.2 and I havent tried on 4.
If you search the Xen forums there's often help on installing other OS as
domU in Xen which you can adapt to the Qubes case.
Varieties of BSD are again relatively straightforward to install, and
use.
Have fun.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180817124941.xyqh5na4xjpzvbbg%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installation help please

2018-08-17 Thread Bengt Thuree
Hi All

I have just assembled my new Desktop consisting of the following main 
components.

Motherboard : Asus Prime A320M-E
CPU : AMD Ryze 7 2700 (No internal video handling)
GPU : GigaByte GeForce GT 1030
SSD : Samsung 970 Pro NVMe M.2
RAM : 16GB DDR4

First, this is my first attempt in installing Qubes, so I probably have made 
some stupid misstakes...

I downloaded the latest Qubes 4.0, and dd'it to my USB stick.
Confirmed the check sum was ok.

Booted up the qubes installer, and tried both options on first page (Install, 
Verify and Install).
None worked due to X-Issues.

Loads of Firmware Bug popped up.
X statup failed, aborting installation
(WARN anaconda: X startup failed, Xorg existed with status 1)
(DEBUG blivet: IGNORED: blivet.safe_dbus.DBusCalError: Failed to call 
Introspect method on /org/freedesktop/UDisks2/Manager with None arguments:
GDBus.Error.=:org.freedesktop.DBus.Error.ServiceUnknown: The name 
org.freedesktop.UDisks2 was not provided by any .service files)

The /tmp/X.log has the following info at the end.
Screen(s) found, but none have a usable configuration.

Basic Graphics mode did not work either.

So this did not work, so I found some information on how to do it in the old 
fashion way, just text terminal.

I added inst.text to the boot prompt.
And I got further

But now it stops on Partitioner don't have LUKS password!
1) Selected the SSD
2) Use all Space
3) LVM Thin Provisioning
---> And the following output appears
Generating updated storage configuration
storage configuration failed: autopart failed:
Encryption requested for LUKS device nvme0n1p2 but no encryption key specified 
for this device

I thought I could perhaps use a kickstart file (found reference to it via 
Google), but could not find the kickstart file on the SSD disk. I presume it is
created when installation starts, which it will not do since there is an Error 
checking storage configuration.
Some questions...

==> Q1 How do I get the graphical installer to work for me?
==> Q2 How do I input the encryption key when I use the text based installer?
==> Q3 How do I create and use a kickstart file?
==> Q4 I presume Qubes should work fine with my configuration?

Looking forward to any hints or tips or suggestions

Cheers

Bengt

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0f0586bc79f094b62a3d6552d1ad7bbf026f4dcb.camel%40thuree.com.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: This is a digitally signed message part


Re: [qubes-users] Whonix 14 - upgrade or re-install? Whats more smooth, less troublesome?

2018-08-17 Thread 'awokd' via qubes-users
On Thu, August 16, 2018 11:28 am, qubes-...@tutanota.com wrote:
> Hi Patrick, I summed up how I understand it. Correct me if I am wrong:
>
>
> - I back up the whonix(13) VMs of choice
> - I clone the sys-whonix, anon-whonix, whonix-ws and whonix-gw to -backup
> (whonix-gw is a base template for the sys whonix, and must be deleted
> before install procedure too, right?) - I assign sys-whonix-backup to
> whonix-gw-backup template; anon-whonix-backup to whonix-ws-backup
> template, so they dont suffer the deletion of the whonix-13 templates -
> delete the anon-whonix and sys-whonix VMs - detele whonix-ws and whonix-gw
> templates - [user@dom0 ~]$ sudo qubesctl state.sls qvm.anon-whonix
> - if error appears: 
> [user@dom0 ~]$ sudo qubes-dom0-update
> --enablerepo=qubes-dom0-current-testing
> qubes-mgmt-salt-dom0-virtual-machines -if needed, edit the
> /etc/yum.repos.d/qubes-templates.repo as per guide
> -  clone the -backup VMs to its original names like sys-whonix-backup to
> sys-whonix, and anon-whonix-backup to anon-whonix

Instead of cloning these back, I would use qvm-copy to copy files you want
to keep.

> - assign new renamed
> sys-whonix to whonix-gw(14) and anon-whonix to whonix-ws(14) templates

New ones should already have the 14 templates assigned.

> - delete anon-whonix-backup, sys-whonix-backup, whonix-ws-backup,
> whonix-gw-backup

Rest looked right to me.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7950df8d21d75c7bd28d3e60579d83ef.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to open "green" URL's in a new red window?

2018-08-17 Thread Unman
On Thu, Aug 16, 2018 at 09:46:44PM -0700, Marcus Linsner wrote:
> On Monday, February 16, 2015 at 11:00:29 AM UTC+1, Laszlo Zrubecz wrote:
> > On 02/16/15 10:53, kerste...@gmail.com wrote:
> > > Hello,
> > > 
> > > I have the document D1 with the URL1 inside the green Domain.
> > > 
> > > If I click on this domain, than the green Domain with the firefox is 
> > > starting...
> > > 
> > > Can I define, that all URL's, which get opened by clicking on the URL, 
> > > are opend in another domain with the appropiate web-security level, e.g. 
> > > red?
> > 
> > You can define it in OS level (default applications in GUI)
> > You can use qvm-open-in-vm or qvm-open-in-dvm commands to open new links...
> > 
> > 
> > -- 
> > Zrubi
> 
> Has anyone added a new menu entry such as "Open Link in New qube VM" to 
> Firefox's context menu, maybe under "Open Link in New Tab" for example? If 
> not, I'll post a link to it when I've finished it (would require recompiling 
> firefox btw - and I'm still learning how to do it under Fedora 28) because I 
> really need something like this in order to open links from my 
> google-search-VM into other VM(s).
> 

This is a long standing open issue 
(https://github.com/QubesOS/qubes-issues/issues/1661).
If you do make progress, link to it there also.
Good luck
unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180817120801.npyxjrmpbm66zm6h%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fedora 26 appvm crashes, how to debug?

2018-08-17 Thread Jarle Thorsen
> VM logs should be in /var/log/xen/console, IIRC. But note that Fedora 26
> is EOL a few months ago. You should probably upgrade to the Fedora 28
> template instead: "sudo qubes-dom0-update qubes-template-fedora-28".

Thanks a lot. Upgraded to Fedora-28 now, hopefully problem solved :)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/59674e72-8242-4cc2-a76b-ef7275d1bee7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] about [Dom0] Session and Startup - Application Autostart items

2018-08-17 Thread Marcus Linsner
All the app links in xfce4's "[Dom0] Session and Startup" window under the tab 
"Application Autostart" (see screenshot) cannot be Edit-ed which is probably 
because they reside in /etc/xdg/autostart/ as *.desktop files; another way to 
see what command they execute is looking at the tooltip shown by hovering the 
mouse on them.

I needed to see what's the command for that blue "Q" in systray(aka 
Notification Area) because it went away after some dialog popped up.

The answer is: it's one of the "Domains Tray" items(there are two) whose 
command is:
$ python3 -mqui.tray.domains &
(added the "&" to let it go into background for when running it inside the dom0 
terminal; without the "&", Ctrl+Z then "$ bg" also works)

This post was supposed to be a question but before posting it I've figured it 
out, but I'm still posting it just in case it might be useful to someone or 
even future me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/44c9cf27-4861-40d2-b9db-b620988f026a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] can not update fedora27 template (curl error 37)

2018-08-17 Thread evo
Hi!

I have problem updating fedora27-template and also one stande alone VM
on the same basis.

There comes the following message:

warning:
/var/cache/dnf/rpmfusion-free-updates-d6a95764d888d197/packages/rpmfusion-free-appstream-data-27-3.fc27.noarch.rpm:
Header V4 RSA/SHA1 Signature, key ID 7d838377: NOKEY
Curl error (37): Couldn't read a file:// file for
file:///etc/pki/rpm-gpg/RPM-GPG-KEY-rpmfusion-free-fedora-27 [Couldn't
open file /etc/pki/rpm-gpg/RPM-GPG-KEY-rpmfusion-free-fedora-27]

thanks for help! :)
regards
evo

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2fb32477-8e62-00bf-ca0d-7dccd3416e78%40aliaks.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: how do you clear "move/copy to other app vm" context windows

2018-08-17 Thread cubit
17. Aug 2018 03:24 by yreb...@riseup.net :

> On 08/16/2018 08:32 AM, cubit wrote:
>> Is there a way to copy the suggested VMs in the "move/copy to other app vm" 
>> as I have a few entries that no longer exist and would like to get rid of 
>> them?
>>
>>
>> CuBit
>>
>
> I suppose you've tried  qvm-sync-appmenus in dom0
>
> and/or  in the VMM  "refresh applications" 
>
>
> though, just a wild guess not an educated one
>







I think I was not too clear.   In the file browsers (nautilus) there is a right 
click context menu option to copy or move a file to another appvm.  I am trying 
to find how to clear these dialog boxes of the appvm names that are saved in 
them.




CuBit

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LK5nau3--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix 14 - upgrade or re-install? Whats more smooth, less troublesome?

2018-08-17 Thread 'awokd' via qubes-users
On Thu, August 16, 2018 10:57 am, qubes-...@tutanota.com wrote:
> Hi Patrick, should one switch the Qubes Tor networking backed normally by
> the sys-whonix to newly created sys-whonix-backup? It make sense to
> update/upgrade whonix through Tor. thx

That's how I did mine too.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/137f07ba2a631dcdcd1cf51b3bd34749.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fedora 26 appvm crashes, how to debug?

2018-08-17 Thread 'awokd' via qubes-users
On Thu, August 16, 2018 8:59 am, Jarle Thorsen wrote:
> I'v been running Qubes 3.2 for a long time and never had problems with
> crashing appvms...
>
> Suddenly one of my appvms based on Fedora 2.6 has begun to randomly shut
> down on me. It seems to be related to me using the gnome file manager
> (related to file activity on mounted samba shares?).
>
>
> Does Qubes come with any debug information that can help me debug what is
> causing my vm to shut down?

VM logs should be in /var/log/xen/console, IIRC. But note that Fedora 26
is EOL a few months ago. You should probably upgrade to the Fedora 28
template instead: "sudo qubes-dom0-update qubes-template-fedora-28".

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6a5092299e376accf3efe1e750c4ebdc.squirrel%40tt3j2x4k5ycaa5zt.onion.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Suggested order for loading Qubes 4.0?

2018-08-17 Thread Patrick Bouldin
On Thursday, August 16, 2018 at 11:34:48 PM UTC-4, John S.Recdep wrote:
> On 08/16/2018 04:25 AM, Patrick Bouldin wrote:
> > Hello, I got some great advice about having two hard drives since I want 
> > Windows on one drive and qubes on another. So I now have a good I7 laptop 
> > with two - 1/2 TB SSDs. I had in mind to load it this way, is the following 
> > correct?
> > 
> > I'm starting with both SSDs empty, no OS on either.
> > 
> > 1 Physically install both drives
> > 
> > 2 Install Windows on disk 1 after booting to flash drive with windows ISO
> > 
> > 3 Unplug windows based SSD drive just to be sure I'm on the right drive next
> > 
> > 4 Boot to bios, modify bios to change 2nd SSD (to be Qubes) FROM Windows 
> > UEFI to other OS (correct?)
> > 
> > 5 Boot to a flash drive loaded with the Qubes 4.0 install ISO 
> > 
> > This is the part I'm really not clear about, remember I'm working with two 
> > drives, booting to either the drive to windows or the drive to qubes. So, 
> > am I following the advice here?: https://www.qubes-os.org/doc/multiboot/
> >   - select custom layout, assign existing /boot partition as /boot, 
> > deselect the 
> > 'Format' option, continue with installation.   
> > 
> > Or, do I let Qubes install in automatic configuration and then manually 
> > modify the grub file?
> > 
> > 
> > Thanks,
> > Patrick
> > 
> 
> Sounds like what I did/do   with windows 10 ; since it doesn't involve
> Grub ,  probably won't be a problem ..
> 
> In my case however,  the uefi, I believe doesn't label the drive with
> the  drive name, but changes it to  "windows" or "qubes" , which
> concerns me , as I think it incorrect, I think that may be how uefi
> works  ymmv,  why not try it
> 
> what is a "windows uefi" ?
> looks to me like
> https://www.qubes-os.org/doc/multiboot
> 
> doesn't apply to you, its for single disk dual booting

Hi John and thanks. I agree but I think after I install qubes then I will need 
to delay the grub screen in order to be able to choose either Win 10 or Qubes. 
And I think I have to somehow tell qubes to look for the windows drive and then 
allow to choose it...  Anyway you're right, I think once I have them both 
loaded I hope to figure it out.

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/89bad39d-924e-4ba8-81a4-bdc7fd92f10d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.