Re: [qubes-users] Re: dom0 uses 105%+ of cpu

2018-09-18 Thread Ivan Mitev



On 9/19/18 1:11 AM, Guy Frank wrote:
> Could someone clue me in on whether it's unusual for dom0 to be perpetually 
> running the processor at at least 105% all the time according to xentop?

What does 'top' in dom0 show ?

If you see that xenstored is using a lot of cpu, a fix is to revert to
an older version of xen-hvm-stubdom-linux [1]. That's assuming you're on
R4.0 though.


[1] https://github.com/QubesOS/qubes-issues/issues/4191

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5aca42ca-4d30-d48f-878b-b19ffeaec734%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Accurate time in AppVM

2018-09-18 Thread Ivan Mitev



On 9/19/18 5:17 AM, Gaijin wrote:
> Running Qubes R3.2
> 
> I have some software that I run in an AppVM that needs to be accurate to
> within a second or two of NTP server time in order to work. I have
> finally figured out how to get my ClockVM to sync to an NTP server and
> for timesyncd.service to run when sys-net boots.
> 
> My problem is that my AppVM slowly loses several seconds after some
> time, and I can't figure out a way to manually or automatically force it
> to resync itself. 

I don't have a R3.2 to test, but if it's like R4 your VM has a systemd
timer that updates the time every 6 hours [1]. In that case you could:
- change the definition of the timer so that it's run more frequently
- disable the timer and run a ntp client ; that'll be the best solution
if your software is very time sensitive, but it increases the attack
surface because of the ntp client.


[1]
https://github.com/Qubes-Community/Contents/blob/master/docs/system/clock-time.md

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e41b359b-9acc-78bd-000a-28f164858d34%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Accurate time in AppVM

2018-09-18 Thread Gaijin
Running Qubes R3.2

I have some software that I run in an AppVM that needs to be accurate to
within a second or two of NTP server time in order to work. I have
finally figured out how to get my ClockVM to sync to an NTP server and
for timesyncd.service to run when sys-net boots.

My problem is that my AppVM slowly loses several seconds after some
time, and I can't figure out a way to manually or automatically force it
to resync itself. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2671003d5e715bea5a63bced125d753d%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Chris Laprise

On 09/18/2018 12:39 PM, Wolf moon wrote:


see > https://nordvpn.com/tutorials/linux/openvpn/

Followed it to a T in both the nord appvm terminal and the disposable fedora 26 
vm terminal an voila! both worked and completed the vpn link in the terminal 
just like on my raspberry pi!...However...On opening the firefox pages of both 
then googling ip tracker...well in the nord appvm it wont go onto the internet 
at all and that is with allowing network etc..on the disposable fedora 26 
firefox it goes on the internet but still says exactly where I am even when I 
deleted history again ( which shouldnt matter as it deletes the who history and 
vm every time you close it )

So I am puzzled...



Its understandable that the NordVPN guide would connect but not route 
traffic to your appVMs because there are no Qubes-specific steps.


A few points to make here:

1. Please try only one approach/guide at a time. It doesn't make sense 
to mix them unless you're an expert and have unusual needs.


2. Qubes-vpn-support is the easiest and most complete guide for now.

3. NordVPN doesn't have a guide for Qubes and won't be able to help much 
(if at all) in addressing special Qubes networking requirements. From 
what I can tell, however, their service is very traditional (using 
openvpn) so accessing it from Qubes should be the same as accessing 
other VPN services from Qubes (i.e. following Qubes-specific 
instructions is best).


What you do need NordVPN for is to supply the configs and you already 
have those.


The point of Qubes guides like Qubes-vpn-support is to have the user 
take their VPN's configs and add them to the Qubes-specific scripts. The 
same is true for qubes-os.org/doc/vpn script guide, but with that guide 
you'll also have to edit files manually and the result won't run as 
smoothly as Qubes-vpn-support - you can trust me on this because I wrote 
both of them. :)


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/76ea1b89-0f93-f32d-e912-fb6f2d127204%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: dom0 uses 105%+ of cpu

2018-09-18 Thread Holger Levsen
On Tue, Sep 18, 2018 at 03:11:10PM -0700, Guy Frank wrote:
> Could someone clue me in on whether it's unusual for dom0 to be perpetually 
> running the processor at at least 105% all the time according to xentop?

13% here, when not displaying anything else on the screen. 27% when
playing music...

(with 3.2)


-- 
cheers,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180918225644.qeifmww7mrpr6aui%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: PGP signature


[qubes-users] Re: dom0 uses 105%+ of cpu

2018-09-18 Thread Guy Frank
Could someone clue me in on whether it's unusual for dom0 to be perpetually 
running the processor at at least 105% all the time according to xentop?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6534d899-bafc-4349-b02b-dadda98cbb17%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] kushal das told me to do it

2018-09-18 Thread 'awokd' via qubes-users
Wolf moon:
> Guys I was told the fedora 26 that came with my latest version of qubes 4.0 
> is out of date so after a google search I found kushal das's page telling me 
> to open up dom 0 and enter sudo qubes-dom0-update qubes-template-fedora-28
> 
> https://kushaldas.in/posts/fedora-28-template-is-available-on-qubesos.html
> 
> It ran and installed fine.
> 
> The thing is..( as rick would say )..I still have fedora 26-dvm default 
> (sys-firewall) in my qubes manager and all my templates are still saying 
> fedora-26.
> 
> Any ideas what and where I should go from here?


https://www.qubes-os.org/doc/templates/#how-to-switch-templates-40

You might want to check out some of the other docs available in
https://www.qubes-os.org/doc too. When I was new to Qubes they helped a
lot in figuring out what it could do.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2abe3694-902b-7c11-2d15-0ebe9f8bcbf0%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Stuart Perkins



On Tue, 18 Sep 2018 10:17:25 -0700 (PDT)
Wolf moon  wrote:

>On Tuesday, 18 September 2018 10:46:44 UTC+1, Антон Чехов  wrote:
>> On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote:  
>> > On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:  
>> > > Hi guys New to Qubes ( which is an amazing feat of cyber security 
>> > > engineering ) all working fine and learning my way around it. 
>> > > 
>> > > My only issue is logging into my vpn service. 
>> > > 
>> > > I have followed the Qubes instructions ( which the images are different 
>> > > to Qubes 4.0 and after searching the net on this matter someone said 
>> > > that this is a shot of the previous Qubes so not helpful there ) I also 
>> > > contacted my vpn service on the matter. They read up on the Qubes 
>> > > instructions and emailed me back a step by step guide but still no joy. 
>> > > 
>> > > My vpn service works well on my Raspberry Pi 3 in the command line ( 
>> > > which I found simple instructions for elsewhere on the internet ) and 
>> > > works fine on my windows 10 system as its got an app interface you 
>> > > download.
>> > > 
>> > > Its just Qubes I am having issues with. I am by no means a hardcore 
>> > > techy, I am learning and not afraid or unfamiliar using the command line 
>> > > in linux. 
>> > > 
>> > > I have contacted the Qubes team after trying my best effort to resolve 
>> > > this on my own as I know they are a small team of 5 or so last time I 
>> > > checked.
>> > > 
>> > > Any help and advice would be greatly appreciated.
>> > > 
>> > > Best,
>> > > 
>> > > Wolf Moon  
>> > 
>> > Okay guys so I am signed up to Nordvpn. ( To note: I always update 
>> > everything in Qube manager )
>> > 
>> > I started off by google searching how to set up a vpn on qubes. I dont 
>> > have every forum page be it google groups or reddit page saved I read 
>> > unfortunately. 
>> > 
>> > But they generally instructed me to do go through the steps to set up a 
>> > vpn as Qubes instructs on their page 
>> > https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
>> > 
>> > Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI 
>> > scripts
>> > 
>> > What I was referencing referring to the diagram/photo being outdated or of 
>> > the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It 
>> > just comes up looking different which is what one of the OPs mentioned on 
>> > one of the how to guides I found. 
>> > 
>> > Moving forward.
>> > 
>> > Certain commands didn't work like sudo which after googling one forum 
>> > posted in Qubes you dont use sudo much, dnf ( what ever that is ) is used 
>> > instead which is what I used.
>> > 
>> > I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > 
>> > sys-net 
>> > Appvm
>> > 
>> > From there the rest of the instructions didn't work on Qubes for me.
>> > 
>> > Apart from downloading the nord config files successfully which are in my 
>> > nordvpn documents folder with all the server addresses as txt files eg 
>> > uk648.nordvpn.comtcp443.ovpn
>> > 
>> > Also was instructed to download nano reader and a few other things.
>> > 
>> > My cd ls in my nordvpn terminal is as follows 
>> > 
>> > DesktopMusic  Templates   nano.save
>> > Documents  Pictures   Videos  openvpn-client.ovpn.txt
>> > Downloads  Public  auth-user-pass  pass.txt
>> > 
>> > ( To note and jumping ahead: following tasket's Reddit page on Qubes vpn 
>> > set up instructions I added vpn-handler-openvpn to services in the appvm I 
>> > named Nordvpn )
>> > 
>> > So from there comes Nordvpns reply ( they were very helpful before helping 
>> > me successfully setting up my vpn link on my Raspberry Pi )
>> > 
>> > I received this email: 
>> > 
>> > Hello, Adam,
>> > 
>> > I have checked your OS documentation and it would be great if you could 
>> > test out the following setup:
>> > Disable any auto-starting service that comes with the software package. 
>> > For example for OpenVPN.
>> > sudo systemctl disable openvpn.service
>> > You may also wish to install nano or another simple text editor for 
>> > entering the scripts below. Now run the following command to create VPN 
>> > directory:
>> > sudo mkdir /rw/config/vpn
>> > Enter the directory using the following command:
>> > cd 
>> > /rw/config/vpn
>> > 
>> > Then our website - https://nordvpn.com/servers/#recommended , on the 
>> > server picker you will see recommended server number. Then open 
>> > https://nordvpn.com/ovpn/ website and download recommended server file. 
>> > You can download directly to device and transfer to your VM or use command 
>> > to download from the hyperlink:
>> > sudo wget 
>> > https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn
>> > (Change the last line of server name to download the correct file). Then 
>> > rename downloaded file to client.ovpn
>> > The VPN client 

[qubes-users] kushal das told me to do it

2018-09-18 Thread Wolf moon
Guys I was told the fedora 26 that came with my latest version of qubes 4.0 is 
out of date so after a google search I found kushal das's page telling me to 
open up dom 0 and enter sudo qubes-dom0-update qubes-template-fedora-28

https://kushaldas.in/posts/fedora-28-template-is-available-on-qubesos.html

It ran and installed fine.

The thing is..( as rick would say )..I still have fedora 26-dvm default 
(sys-firewall) in my qubes manager and all my templates are still saying 
fedora-26.

Any ideas what and where I should go from here?

Best,

Wolf moon

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/09568ee0-9fdc-40ce-af89-f029d732183a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread Jonathan Seefelder
Hello, yes,

altough i personally never used HEADS productive, ive set it up,  the
last time is quite some time ago tough. I remember i had to troubleshoot
quite a bit.

About petitboot, i just started to look into it myself, so i wont be
much help there probably, what exactly are you trying to achieve?

I will send you a grub.cfg  which is working tomorrow morning, you will
have to edit /adjust it tough.(either change the uuid in the config file
ore the uuid of /boot )

I used kernelsigning, but i wasnt to happy with it in the long run, for
usability, 2fa with one partition  or /boot and /root encrypted so far
is the best , we use it every day.

Talking about usability, i highly recommend to add SEAbios as a
secondary payload, at least if you want to boot live-usb  from time to time.


cheers


On 9/18/18 3:20 PM, get wrote:
> вторник, 18 сентября 2018 г., 20:16:10 UTC+3 пользователь Jonathan Seefelder 
> написал:
>> yes its possible, do you want to encrypt /boot and /root separately so
>> you will need a different password for each partition, or do you want to
>> encrypt it all together with 2fa etc?
>>
>> The first one is relatively easy, you will have to modify the grub.cfg
>> of your coreboot image.Also, the uuid will have to match, you can either
>> do a "normal" install and change the uuid in the grub.cfg, or change the
>> uuid of  /root.
>>
>> check out the libreboot-side, there should be all the necessary
>> information. I will write a tutorial some day.
>>
>> cheers
>>
>>
>> On 9/18/18 1:02 PM, 'awokd' via qubes-users wrote:
>>
>>> get:
 FDE in my understanding this is a scheme partition look like

 sda  8:00 9,9G  0 disk 
 └─sda1   8:10 9,9G  0 LUKS
 └──luks-   crypt
 ├─qubes_dom0-boot   lvm /boot (encrypted)
 ├─qubes_dom0-swap   lvm [SWAP] (encrypted)
 └─qubes_dom0-root   lvm  / (encrypted)

 FDE = cryptsetup whole disk (including /boot). Not only root partition.
 Anaconda can't do it by default. Installation success only with grub 
 missing.
 OS research HEADS can't kexec into FDE disk.

 Is it only possible to boot from grub2 coreboot ?

 cryptomount -a
 set root='hd0,msdos1'
 linux=... vmlinuz=...

 I have been trying to do the coreboot firmware for a month already 
 to get a load of Qubes with full disk encryption (including /boot). Is it 
 possible? Can anyone help me ?:)
>>> I've seen others on this list report it as successful, but haven't done
>>> it myself. I think they had to use the Seabios payload for the initial
>>> install, then switch to coreboot's grub2. Afraid that's about all I know...
>>>
>> -- 
>> Kind Regards 
>> Jonathan Seefelder
>> CryptoGS IT-Security Solutions
> Hi, Jonathan Seefelder.
>
> I'm looking for different ways of how to encrypt the whole disk (include 
> /boot) and load it using coreboot modifications.
>
> I know how to load this way Parabola FDE (include /boot)
>
> menuentry 'Linux-libre kernel' {
> cryptomount -a (ahci0,msdos1)
> set root='lvm/matrix-rootvol'
> linux /boot/vmlinuz-linux-libre root=/dev/matrix/rootvol 
> cryptdevice=/dev/sda1:root
> initrd /boot/initramfs-linux-libre.img
>  }
>  
> Is the same method for xen?
>
> Did you try Heads/Petitboot?
>
> https://www.raptorengineering.com/content/kb/1.html
> https://github.com/osresearch/heads
>
> Did you try to add 
> https://en.wikipedia.org/wiki/PBKDF2 to grub use qubes FDE?
>
> Did you try add gpg keys?
>
> Thanks.
>
-- 
Kind Regards 
Jonathan Seefelder
CryptoGS IT-Security Solutions


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e9da4fd-befb-24cc-b8e3-ad52f1756c03%40seefelder-web.de.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread get
вторник, 18 сентября 2018 г., 20:16:10 UTC+3 пользователь Jonathan Seefelder 
написал:
> yes its possible, do you want to encrypt /boot and /root separately so
> you will need a different password for each partition, or do you want to
> encrypt it all together with 2fa etc?
> 
> The first one is relatively easy, you will have to modify the grub.cfg
> of your coreboot image.Also, the uuid will have to match, you can either
> do a "normal" install and change the uuid in the grub.cfg, or change the
> uuid of  /root.
> 
> check out the libreboot-side, there should be all the necessary
> information. I will write a tutorial some day.
> 
> cheers
> 
> 
> On 9/18/18 1:02 PM, 'awokd' via qubes-users wrote:
> 
> > get:
> >> FDE in my understanding this is a scheme partition look like
> >>
> >> sda  8:00 9,9G  0 disk 
> >> └─sda1   8:10 9,9G  0 LUKS
> >> └──luks-   crypt
> >> ├─qubes_dom0-boot   lvm /boot (encrypted)
> >> ├─qubes_dom0-swap   lvm [SWAP] (encrypted)
> >> └─qubes_dom0-root   lvm  / (encrypted)
> >>
> >> FDE = cryptsetup whole disk (including /boot). Not only root partition.
> >> Anaconda can't do it by default. Installation success only with grub 
> >> missing.
> >> OS research HEADS can't kexec into FDE disk.
> >>
> >> Is it only possible to boot from grub2 coreboot ?
> >>
> >> cryptomount -a
> >> set root='hd0,msdos1'
> >> linux=... vmlinuz=...
> >>
> >> I have been trying to do the coreboot firmware for a month already 
> >> to get a load of Qubes with full disk encryption (including /boot). Is it 
> >> possible? Can anyone help me ?:)
> > I've seen others on this list report it as successful, but haven't done
> > it myself. I think they had to use the Seabios payload for the initial
> > install, then switch to coreboot's grub2. Afraid that's about all I know...
> >
> -- 
> Kind Regards 
> Jonathan Seefelder
> CryptoGS IT-Security Solutions

Hi, Jonathan Seefelder.

I'm looking for different ways of how to encrypt the whole disk (include /boot) 
and load it using coreboot modifications.

I know how to load this way Parabola FDE (include /boot)

menuentry 'Linux-libre kernel' {
cryptomount -a (ahci0,msdos1)
set root='lvm/matrix-rootvol'
linux /boot/vmlinuz-linux-libre root=/dev/matrix/rootvol 
cryptdevice=/dev/sda1:root
initrd /boot/initramfs-linux-libre.img
 }
 
Is the same method for xen?

Did you try Heads/Petitboot?

https://www.raptorengineering.com/content/kb/1.html
https://github.com/osresearch/heads

Did you try to add 
https://en.wikipedia.org/wiki/PBKDF2 to grub use qubes FDE?

Did you try add gpg keys?

Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0734ef03-a091-46a8-9e3f-456fa392c595%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread get
вторник, 18 сентября 2018 г., 20:02:19 UTC+3 пользователь awokd написал:
> get:
> > FDE in my understanding this is a scheme partition look like
> > 
> > sda  8:00 9,9G  0 disk 
> > └─sda1   8:10 9,9G  0 LUKS
> > └──luks-   crypt
> > ├─qubes_dom0-boot   lvm /boot (encrypted)
> > ├─qubes_dom0-swap   lvm [SWAP] (encrypted)
> > └─qubes_dom0-root   lvm  / (encrypted)
> > 
> > FDE = cryptsetup whole disk (including /boot). Not only root partition.
> > Anaconda can't do it by default. Installation success only with grub 
> > missing.
> > OS research HEADS can't kexec into FDE disk.
> > 
> > Is it only possible to boot from grub2 coreboot ?
> > 
> > cryptomount -a
> > set root='hd0,msdos1'
> > linux=... vmlinuz=...
> > 
> > I have been trying to do the coreboot firmware for a month already 
> > to get a load of Qubes with full disk encryption (including /boot). Is it 
> > possible? Can anyone help me ?:)
> 
> I've seen others on this list report it as successful, but haven't done
> it myself. I think they had to use the Seabios payload for the initial
> install, then switch to coreboot's grub2. Afraid that's about all I know...

Hi, awokd. I agree, this is also the only way I know.

http://www.zerocat.org/coreboot-machines/md_doc_build-coreboot-x220.html
http://www.zerocat.org/coreboot-machines/md_doc_build-coreboot-x230.html

Do you mean that? seabios (main) + grub2(elf payload)

I'm trying to learn HEADS, but it's quite difficult. there is a built-in 
cryptsetup and kexec. but I have not yet found the information how to boot 
without a loader to FDE Qubes (include /boot use kexec. Also branch "master" 
only 4.7 coreboot version, 
found this
https://github.com/flammit/heads/tree/coreboot-4.8
I can not compile (build fails).

Also I tried to add gpg keys to the firmware
https://libreboot.org/docs/gnulinux/grub_hardening.html#GPG keys

cfbstool test.rom print - writes that everything is fine, but after the flash 
firmware in the heads (initrd/etc/.gnupg) there are no keys

seal-totp works strange.

Have you any experience?

unfortunately, too little information is available



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fddee08c-0703-4540-bb53-0d220ae927c6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qube Manager no longer starts

2018-09-18 Thread dangmadzyu
On Tuesday, September 18, 2018 at 11:43:37 AM UTC-7, dangm...@gmail.com wrote:
> [anonymous@dom0 ~]$ qubes-qube-manager 
> Traceback (most recent call last):
>   File "/usr/bin/qubes-qube-manager", line 9, in 
> load_entry_point('qubesmanager==4.0.20', 'console_scripts', 
> 'qubes-qube-manager')()
>   File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 
> 542, in load_entry_point
> return get_distribution(dist).load_entry_point(group, name)
>   File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 
> 2575, in load_entry_point
> return ep.load()
>   File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 
> 2235, in load
> return self.resolve()
>   File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 
> 2241, in resolve
> module = __import__(self.module_name, fromlist=['__name__'], level=0)
>   File "/usr/lib/python3.5/site-packages/qubesmanager/qube_manager.py", line 
> 32, in 
> import quamash
> ImportError: No module named 'quamash'


nevermind



sudo qubes-dom0-update 


installed python-quamash, and other updates



Fixed the problem.


Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b25955f-26c7-4d64-bc0a-2ec1481a083a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qube Manager no longer starts

2018-09-18 Thread dangmadzyu
[anonymous@dom0 ~]$ qubes-qube-manager 
Traceback (most recent call last):
  File "/usr/bin/qubes-qube-manager", line 9, in 
load_entry_point('qubesmanager==4.0.20', 'console_scripts', 
'qubes-qube-manager')()
  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 542, 
in load_entry_point
return get_distribution(dist).load_entry_point(group, name)
  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 2575, 
in load_entry_point
return ep.load()
  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 2235, 
in load
return self.resolve()
  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 2241, 
in resolve
module = __import__(self.module_name, fromlist=['__name__'], level=0)
  File "/usr/lib/python3.5/site-packages/qubesmanager/qube_manager.py", line 
32, in 
import quamash
ImportError: No module named 'quamash'

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73d4b003-63f2-42cc-b4f7-486b90863023%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Wolf moon
On Tuesday, 18 September 2018 10:46:44 UTC+1, Антон Чехов  wrote:
> On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote:
> > On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> > > Hi guys New to Qubes ( which is an amazing feat of cyber security 
> > > engineering ) all working fine and learning my way around it. 
> > > 
> > > My only issue is logging into my vpn service. 
> > > 
> > > I have followed the Qubes instructions ( which the images are different 
> > > to Qubes 4.0 and after searching the net on this matter someone said that 
> > > this is a shot of the previous Qubes so not helpful there ) I also 
> > > contacted my vpn service on the matter. They read up on the Qubes 
> > > instructions and emailed me back a step by step guide but still no joy. 
> > > 
> > > My vpn service works well on my Raspberry Pi 3 in the command line ( 
> > > which I found simple instructions for elsewhere on the internet ) and 
> > > works fine on my windows 10 system as its got an app interface you 
> > > download.
> > > 
> > > Its just Qubes I am having issues with. I am by no means a hardcore 
> > > techy, I am learning and not afraid or unfamiliar using the command line 
> > > in linux. 
> > > 
> > > I have contacted the Qubes team after trying my best effort to resolve 
> > > this on my own as I know they are a small team of 5 or so last time I 
> > > checked.
> > > 
> > > Any help and advice would be greatly appreciated.
> > > 
> > > Best,
> > > 
> > > Wolf Moon
> > 
> > Okay guys so I am signed up to Nordvpn. ( To note: I always update 
> > everything in Qube manager )
> > 
> > I started off by google searching how to set up a vpn on qubes. I dont have 
> > every forum page be it google groups or reddit page saved I read 
> > unfortunately. 
> > 
> > But they generally instructed me to do go through the steps to set up a vpn 
> > as Qubes instructs on their page 
> > https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
> > 
> > Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI 
> > scripts
> > 
> > What I was referencing referring to the diagram/photo being outdated or of 
> > the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It just 
> > comes up looking different which is what one of the OPs mentioned on one of 
> > the how to guides I found. 
> > 
> > Moving forward.
> > 
> > Certain commands didn't work like sudo which after googling one forum 
> > posted in Qubes you dont use sudo much, dnf ( what ever that is ) is used 
> > instead which is what I used.
> > 
> > I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > 
> > sys-net 
> > Appvm
> > 
> > From there the rest of the instructions didn't work on Qubes for me.
> > 
> > Apart from downloading the nord config files successfully which are in my 
> > nordvpn documents folder with all the server addresses as txt files eg 
> > uk648.nordvpn.comtcp443.ovpn
> > 
> > Also was instructed to download nano reader and a few other things.
> > 
> > My cd ls in my nordvpn terminal is as follows 
> > 
> > DesktopMusic  Templates   nano.save
> > Documents  Pictures   Videos  openvpn-client.ovpn.txt
> > Downloads  Public  auth-user-pass  pass.txt
> > 
> > ( To note and jumping ahead: following tasket's Reddit page on Qubes vpn 
> > set up instructions I added vpn-handler-openvpn to services in the appvm I 
> > named Nordvpn )
> > 
> > So from there comes Nordvpns reply ( they were very helpful before helping 
> > me successfully setting up my vpn link on my Raspberry Pi )
> > 
> > I received this email: 
> > 
> > Hello, Adam,
> > 
> > I have checked your OS documentation and it would be great if you could 
> > test out the following setup:
> > Disable any auto-starting service that comes with the software package. For 
> > example for OpenVPN.
> > sudo systemctl disable openvpn.service
> > You may also wish to install nano or another simple text editor for 
> > entering the scripts below. Now run the following command to create VPN 
> > directory:
> > sudo mkdir /rw/config/vpn
> > Enter the directory using the following command:
> > cd 
> > /rw/config/vpn
> > 
> > Then our website - https://nordvpn.com/servers/#recommended , on the server 
> > picker you will see recommended server number. Then open 
> > https://nordvpn.com/ovpn/ website and download recommended server file. You 
> > can download directly to device and transfer to your VM or use command to 
> > download from the hyperlink:
> > sudo wget 
> > https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn
> > (Change the last line of server name to download the correct file). Then 
> > rename downloaded file to client.ovpn
> > The VPN client may not be able to prompt you for credentials when 
> > connecting to the server. Create a file in the /rw/config/vpn folder with 
> > your credentials and using a directive. For 

Re: [qubes-users] Qubes can't FDE?

2018-09-18 Thread Jonathan Seefelder
yes its possible, do you want to encrypt /boot and /root separately so
you will need a different password for each partition, or do you want to
encrypt it all together with 2fa etc?

The first one is relatively easy, you will have to modify the grub.cfg
of your coreboot image.Also, the uuid will have to match, you can either
do a "normal" install and change the uuid in the grub.cfg, or change the
uuid of  /root.

check out the libreboot-side, there should be all the necessary
information. I will write a tutorial some day.

cheers


On 9/18/18 1:02 PM, 'awokd' via qubes-users wrote:

> get:
>> FDE in my understanding this is a scheme partition look like
>>
>> sda  8:00 9,9G  0 disk 
>> └─sda1   8:10 9,9G  0 LUKS
>> └──luks-   crypt
>> ├─qubes_dom0-boot   lvm /boot (encrypted)
>> ├─qubes_dom0-swap   lvm [SWAP] (encrypted)
>> └─qubes_dom0-root   lvm  / (encrypted)
>>
>> FDE = cryptsetup whole disk (including /boot). Not only root partition.
>> Anaconda can't do it by default. Installation success only with grub missing.
>> OS research HEADS can't kexec into FDE disk.
>>
>> Is it only possible to boot from grub2 coreboot ?
>>
>> cryptomount -a
>> set root='hd0,msdos1'
>> linux=... vmlinuz=...
>>
>> I have been trying to do the coreboot firmware for a month already 
>> to get a load of Qubes with full disk encryption (including /boot). Is it 
>> possible? Can anyone help me ?:)
> I've seen others on this list report it as successful, but haven't done
> it myself. I think they had to use the Seabios payload for the initial
> install, then switch to coreboot's grub2. Afraid that's about all I know...
>
-- 
Kind Regards 
Jonathan Seefelder
CryptoGS IT-Security Solutions


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/439d4e54-7594-7e87-704f-884c346a2a44%40seefelder-web.de.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Re: whonix-ws-14 apt-get autoremove broke the template

2018-09-18 Thread qubes-fan
After the install, did you just use:

sudo apt update && apt dist-upgrade 
# than
sudo apt autoremove

?


Sep 18, 2018, 3:21 PM by sbore...@gmail.com:

> Am Montag, 17. Septe 2018 23:48:27 UTC+2 schrieb > qube...@tutanota.com 
> > :
>
>> hi, after the last update of the whonix-ws-14 template with recommended 
>> apt-get autoremove, the template got broken. 
>> - Most of the apps disappeared
>> - torbrowser doesnt connect to net
>> - template itself cant be updated. 
>>
>> user@host:~$ sudo apt-get update
>> Reading package lists... Done
>> E: Could not get lock /var/lib/apt/lists/lock - open (11: Resource 
>> temporarily unavailable)
>> E: Unable to lock directory /var/lib/apt/lists/
>>
>> Upon launching TorBrowser, the wellcome page is "File not found". Upon 
>> trying to connect to a web page, "Secure connection failed".
>>
>> any ideas?
>>
>
> Hi,
>
> was bitten by this as well. The whonix repos must have been in a strange 
> state yesterday (Sep 17), and a dist-upgrade removed too much stuff (with 
> essentially
> the symptoms you describe).
>
> I bit the bullet and just reinstalled the whonix templates, followed by
> apt update/dist-upgrade/autoremove and today everything behaved as expected.
>
> It would be great though if it were possible to avoid these 'flaky' states of
> the whonix repos ..
>
> Best,
>
> Stefan
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to > qubes-users+unsubscr...@googlegroups.com 
> > .
> To post to this group, send email to > qubes-users@googlegroups.com 
> > .
> To view this discussion on the web visit > 
> https://groups.google.com/d/msgid/qubes-users/d3458446-379c-4b54-967f-c9d82cf028c2%40googlegroups.com
>  
> >
>  .
> For more options, visit > https://groups.google.com/d/optout 
> > .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LMhbVbN--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Wolf moon
On Tuesday, 18 September 2018 11:21:54 UTC+1, Антон Чехов  wrote:
> On Tuesday, September 18, 2018 at 12:02:51 PM UTC+2, Wolf moon wrote:
> > On Tuesday, 18 September 2018 10:46:44 UTC+1, Антон Чехов  wrote:
> > > On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote:
> > > > On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> > > > > Hi guys New to Qubes ( which is an amazing feat of cyber security 
> > > > > engineering ) all working fine and learning my way around it. 
> > > > > 
> > > > > My only issue is logging into my vpn service. 
> > > > > 
> > > > > I have followed the Qubes instructions ( which the images are 
> > > > > different to Qubes 4.0 and after searching the net on this matter 
> > > > > someone said that this is a shot of the previous Qubes so not helpful 
> > > > > there ) I also contacted my vpn service on the matter. They read up 
> > > > > on the Qubes instructions and emailed me back a step by step guide 
> > > > > but still no joy. 
> > > > > 
> > > > > My vpn service works well on my Raspberry Pi 3 in the command line ( 
> > > > > which I found simple instructions for elsewhere on the internet ) and 
> > > > > works fine on my windows 10 system as its got an app interface you 
> > > > > download.
> > > > > 
> > > > > Its just Qubes I am having issues with. I am by no means a hardcore 
> > > > > techy, I am learning and not afraid or unfamiliar using the command 
> > > > > line in linux. 
> > > > > 
> > > > > I have contacted the Qubes team after trying my best effort to 
> > > > > resolve this on my own as I know they are a small team of 5 or so 
> > > > > last time I checked.
> > > > > 
> > > > > Any help and advice would be greatly appreciated.
> > > > > 
> > > > > Best,
> > > > > 
> > > > > Wolf Moon
> > > > 
> > > > Okay guys so I am signed up to Nordvpn. ( To note: I always update 
> > > > everything in Qube manager )
> > > > 
> > > > I started off by google searching how to set up a vpn on qubes. I dont 
> > > > have every forum page be it google groups or reddit page saved I read 
> > > > unfortunately. 
> > > > 
> > > > But they generally instructed me to do go through the steps to set up a 
> > > > vpn as Qubes instructs on their page 
> > > > https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
> > > > 
> > > > Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI 
> > > > scripts
> > > > 
> > > > What I was referencing referring to the diagram/photo being outdated or 
> > > > of the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. 
> > > > It just comes up looking different which is what one of the OPs 
> > > > mentioned on one of the how to guides I found. 
> > > > 
> > > > Moving forward.
> > > > 
> > > > Certain commands didn't work like sudo which after googling one forum 
> > > > posted in Qubes you dont use sudo much, dnf ( what ever that is ) is 
> > > > used instead which is what I used.
> > > > 
> > > > I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > 
> > > > sys-net 
> > > > Appvm
> > > > 
> > > > From there the rest of the instructions didn't work on Qubes for me.
> > > > 
> > > > Apart from downloading the nord config files successfully which are in 
> > > > my nordvpn documents folder with all the server addresses as txt files 
> > > > eg uk648.nordvpn.comtcp443.ovpn
> > > > 
> > > > Also was instructed to download nano reader and a few other things.
> > > > 
> > > > My cd ls in my nordvpn terminal is as follows 
> > > > 
> > > > DesktopMusic  Templates   nano.save
> > > > Documents  Pictures   Videos  openvpn-client.ovpn.txt
> > > > Downloads  Public  auth-user-pass  pass.txt
> > > > 
> > > > ( To note and jumping ahead: following tasket's Reddit page on Qubes 
> > > > vpn set up instructions I added vpn-handler-openvpn to services in the 
> > > > appvm I named Nordvpn )
> > > > 
> > > > So from there comes Nordvpns reply ( they were very helpful before 
> > > > helping me successfully setting up my vpn link on my Raspberry Pi )
> > > > 
> > > > I received this email: 
> > > > 
> > > > Hello, Adam,
> > > > 
> > > > I have checked your OS documentation and it would be great if you could 
> > > > test out the following setup:
> > > > Disable any auto-starting service that comes with the software package. 
> > > > For example for OpenVPN.
> > > > sudo systemctl disable openvpn.service
> > > > You may also wish to install nano or another simple text editor for 
> > > > entering the scripts below. Now run the following command to create VPN 
> > > > directory:
> > > > sudo mkdir /rw/config/vpn
> > > > Enter the directory using the following command:
> > > > cd 
> > > > /rw/config/vpn
> > > > 
> > > > Then our website - https://nordvpn.com/servers/#recommended , on the 
> > > > server picker you will see recommended server number. Then open 
> > > > https://nordvpn.com/ovpn/ website and download recommended 

[qubes-users] Qubes can't FDE?

2018-09-18 Thread get
FDE in my understanding this is a scheme partition look like

sda  8:00 9,9G  0 disk 
└─sda1   8:10 9,9G  0 LUKS
└──luks-   crypt
├─qubes_dom0-boot   lvm /boot (encrypted)
├─qubes_dom0-swap   lvm [SWAP] (encrypted)
└─qubes_dom0-root   lvm  / (encrypted)

FDE = cryptsetup whole disk (including /boot). Not only root partition.
Anaconda can't do it by default. Installation success only with grub missing.
OS research HEADS can't kexec into FDE disk.

Is it only possible to boot from grub2 coreboot ?

cryptomount -a
set root='hd0,msdos1'
linux=... vmlinuz=...

I have been trying to do the coreboot firmware for a month already 
to get a load of Qubes with full disk encryption (including /boot). Is it 
possible? Can anyone help me ?:)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/694e85c7-a80d-4334-a2c5-5a35764fa900%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Dracut failing on ASUS Z270A Motherboard

2018-09-18 Thread Aaron Gray
On Tuesday, 18 September 2018 11:27:01 UTC+1, awokd  wrote:
> Aaron Gray:
> > Okay installed sort of ish on an old AMD machine the net-sys process did 
> > not install properly.
> > 
> > Anyway swapped the disk over to the Intel and it booted okay apart from 
> > net-sys. AFAICS VM's are running okay except net-sys so no networking.
> > 
> > Will post better reports tomorrow as its late...
> > 
> > On Monday, 17 September 2018 17:52:54 UTC+1, Aaron Gray  wrote:
> >> Dracut failing on ASUS Z270A Motherboard based on Intel Z270 chipset 
> >>
> >> Attached rdsosreport.txt
> >> ~~
> >>
> >> + cat /lib/dracut/dracut-046-2.git20170811.fc25
> >> dracut-046-2.git20170811.fc25
> > ...
> 
> Glad you got it installed at least. You probably have to add the Intel
> machine's NIC to sys-net in Qube Settings/Devices. If that doesn't work,
> use the "Configure strict reset..." button at the bottom of that same
> tab. If it still doesn't work, see
> https://www.qubes-os.org/doc/assigning-devices/#pci-passthrough-issues.

Thanks, have tried that now, but I think this is the issue :-

https://github.com/QubesOS/qubes-issues/issues/4309

Its in the 4.1 milestones :-

https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.1%22

224 issues for the 4.1 milestone, looks like a long wait...

--
Aaron

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2e1801d6-a5d2-46f6-b469-2d3d88e9ce4c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: whonix-ws-14 apt-get autoremove broke the template

2018-09-18 Thread qubenix
sbore...@gmail.com:
> Am Montag, 17. September 2018 23:48:27 UTC+2 schrieb qube...@tutanota.com:
>> hi, after the last update of the whonix-ws-14 template with recommended 
>> apt-get autoremove, the template got broken. 
>> - Most of the apps disappeared
>> - torbrowser doesnt connect to net
>> - template itself cant be updated. 
>>
>> user@host:~$ sudo apt-get update
>> Reading package lists... Done
>> E: Could not get lock /var/lib/apt/lists/lock - open (11: Resource 
>> temporarily unavailable)
>> E: Unable to lock directory /var/lib/apt/lists/
>>
>> Upon launching TorBrowser, the wellcome page is "File not found". Upon 
>> trying to connect to a web page, "Secure connection failed".
>>
>> any ideas?
> 
> Hi,
> 
> was bitten by this as well. The whonix repos must have been in a strange 
> state yesterday (Sep 17), and a dist-upgrade removed too much stuff (with 
> essentially
> the symptoms you describe).
> 
> I bit the bullet and just reinstalled the whonix templates, followed by
> apt update/dist-upgrade/autoremove and today everything behaved as expected.
> 
> It would be great though if it were possible to avoid these 'flaky' states of
> the whonix repos ..
> 
> Best,
> 
> Stefan
> 

Happened to me from the `testers` repo yesterday too. Luckily I noticed
all the packages to be removed, declined the upgrade, and switched to
`stretch-proposed-updates` repo.

Don't forget you can always use `qvm-volume` to revert your template
changes (as long as you haven't restarted the vm since breaking it)
instead of reinstalling. See `qvm-volume --help` for details.

-- 
qubenix
PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
OTR: qube...@chat.freenode.net
OTR: 3AAF6650 F818BDBE 267C7866 E4A0C614 DBD5EEAD


-- 
qubenix
PGP: 96096E4CA0870F1C5BAF7DD909D159E1241F9C54
OTR: qube...@chat.freenode.net
OTR: 3AAF6650 F818BDBE 267C7866 E4A0C614 DBD5EEAD

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d1a16eec-7308-5298-fc45-286078540a91%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Forbidding VM create/delete/edit network settings from within dom0 for enterprise use-case

2018-09-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Sep 14, 2018 at 09:18:38AM -0700, Yethal wrote:
> W dniu piątek, 14 września 2018 13:21:14 UTC+2 użytkownik Nils Amiet napisał:
> > Hi everyone,
> > 
> > I would like to lock-down Qubes OS so that VMs can't be created or deleted, 
> > nor edited (e.g. modify the associated NetVM).
> > 
> > I already read documentation about qrexec policies, the Admin API and 
> > qubes-core-admin extensions.
> > 
> > If I understand correctly, the Admin API cannot be used to prevent the user 
> > from creating a VM from dom0. For example, from the dom0 terminal I tried 
> > adding the following line to `/etc/qubes-rpc/policy/admin.vm.Create.AppVM`:
> > 
> > ```
> > $adminvm $adminvm deny
> > ```
> > 
> > But then I am still able to run `qvm-create test --label blue`. Is there 
> > something I am missing here or is the policy not being honored on dom0? Why 
> > is that?
> > 
> > I also noticed that the Qubes extensions fire some events and it is 
> > possible to write hooks for those events 
> > (https://dev.qubes-os.org/projects/core-admin/en/latest/qubes-ext.html). 
> > Would it be possible to write a Qubes extension that hooks to some event 
> > that is fired whenever a VM is created and use that mechanism to block VM 
> > creation?
> > 
> > Would the GUI domain that is planned for Qubes OS 4.1 change the situation 
> > or help implementing this at all?
> > 
> > The workaround I'm thinking about is to run Xfce4 in kiosk mode, remove 
> > application menu entries, keyboard shortcuts, desktop right click menu to 
> > prevent access to dom0 but this is just a workaround and it probably we 
> > can't be sure that it will work with upcoming Qubes OS releases. Any 
> > thoughts on that?
> > 
> > Thank you,
> > 
> > Nils
> 
> Wait for 4.1. The plan is that users will not have direct access to dom0. 
> Instead gui domain will have api access to management functions and it will 
> be possible to restrict it for corporate use case.

Yethal is right - "the proper" solution is using GUI domain, which will
be isolated from dom0 and can have policies applied. Right now, with
direct dom0 access, qrexec policy is not enforced when the action is
performed from dom0.

Alternatively the workaround you propose could work, but needs to be
extended to also Admin API - local user must be excluded from "qubes"
group (which gives direct access to qubes services) and instead add a
proxy which checks qrexec policy even if action is performed from dom0.
That is not unthinkable, but definitely require some work, and still it
is a workaround.

But Qubes 4.1 is still in development and I think will not be ready this
year, maybe Q1 2019, depending on progress. GUI domain related stuff can
be tracked here:
https://github.com/QubesOS/qubes-issues/issues/833

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlug/b4ACgkQ24/THMrX
1yzFpwf+OcFW/oMb+kbnkIAj05wLc5rFoRqTni0qpjfs/V+enUg00fJpFlxg0XTy
tIwjVs9Lz4Y/OsjhNQrtzaKFJOtDhBmJjnbpORg22iQ0Lxazg3cbZ2LWTdEhD/I3
P2lrkYEelJ/qUAJ0Lybfdv2Xj+nIdDhakbRNyWo6t/0F2aXXKIVPu5LNGzh9tHmp
QcDKA9hE6nKz4Vg/EJbiuvg8ENKFR5CLkOt/7aKzFCcTcBvAeeVHMPB9d5x11DSU
ibNBA0Nuw6EGAE4xSP0T1DJgWB39yM4KYozhskWqUyIH19kv7pglh5rTT1UXtuvL
KxyysvSKm5fSutIef/BjVlKZK2EJ9w==
=+3cX
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180918132935.GB1577%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: whonix-ws-14 apt-get autoremove broke the template

2018-09-18 Thread sboresch
Am Montag, 17. September 2018 23:48:27 UTC+2 schrieb qube...@tutanota.com:
> hi, after the last update of the whonix-ws-14 template with recommended 
> apt-get autoremove, the template got broken. 
> - Most of the apps disappeared
> - torbrowser doesnt connect to net
> - template itself cant be updated. 
> 
> user@host:~$ sudo apt-get update
> Reading package lists... Done
> E: Could not get lock /var/lib/apt/lists/lock - open (11: Resource 
> temporarily unavailable)
> E: Unable to lock directory /var/lib/apt/lists/
> 
> Upon launching TorBrowser, the wellcome page is "File not found". Upon trying 
> to connect to a web page, "Secure connection failed".
> 
> any ideas?

Hi,

was bitten by this as well. The whonix repos must have been in a strange state 
yesterday (Sep 17), and a dist-upgrade removed too much stuff (with essentially
the symptoms you describe).

I bit the bullet and just reinstalled the whonix templates, followed by
apt update/dist-upgrade/autoremove and today everything behaved as expected.

It would be great though if it were possible to avoid these 'flaky' states of
the whonix repos ..

Best,

Stefan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3458446-379c-4b54-967f-c9d82cf028c2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: qubes-u2f not installing on templates

2018-09-18 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Mon, Sep 17, 2018 at 04:14:00PM +0300, Ivan Mitev wrote:
> 
> 
> On 9/17/18 3:32 PM, digitalintag...@gmail.com wrote:
> > On Monday, September 17, 2018 at 6:24:45 AM UTC-6, digital...@gmail.com 
> > wrote:
> >> https://www.qubes-os.org/news/2018/09/11/qubes-u2f-proxy/
> >>
> >> Wojtek shared this on 9/11/18.
> >>
> >> Following the instructions, I'm not able to install qubes-u2f on either my 
> >> debian or fedora templates. Anyone else have similar issues?
> 
> The packages are still in the current-testing repositories, and you
> likely didn't enable them.
> 
> 
> > to clarify, the package manager doesn't find the named package on either 
> > distro.
> I don't use the graphical package manager so no idea how to enable
> current-testing there, but if you use a terminal it's pretty
> straightforward:
> 
> For dom0:
> 
> sudo qubes-dom0-update \
>   --enablerepo=qubes-dom0-current-testing qubes-u2f-dom0
> 
> And for a fedora (template)VM:
> 
> sudo dnf --enablerepo=qubes-vm-r4.0-current-testing install \
>   qubes-u2f
> 
> 
> There should be something similar for debian's apt-get

All u2f-related packages area already in stable repository (since
yesterday), so the above is not needed anymore.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAlug+oAACgkQ24/THMrX
1yynlQgAjCg01eBO5X2ZlVraOB7bzuO1a2LvYFiAMIqFYDk/x3t8F0eBXjg3dlDZ
vCYhO6Xi3b1PzaIyKMy8yaU5LmGnnAPsd2Bbiwnge7q8JYQumQJS+s2IG3Y3Om5z
S+9mZqEgpTALBwQ3ra5w6sGite722JC4477wq581sT6BvH0eeWBgzHqVYv/+oVCF
bOUdxgy/GCyv8/3njx+j4ZbQymFz2NMfatsm4D3T5rAhCOhBbCUUNsTHzLt0q6Jy
GXIhJe8UBRsxevgeHklozjObbK3X2giJPbMct4iNwQVc7ea0xgiHXZ7sH2gEwNIr
iGSjD6P3J9VhYUx6x2n4k/XimbSRaw==
=PV37
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180918131545.GA1577%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Error Installing Virtualbox guest Additions in dom0

2018-09-18 Thread 'awokd' via qubes-users
otenyo philip:
> Hi Team,
> I am new to QubesOS and just downloaded  and installed v3.2 successuflly on
> Virtualbox. I would like to check it out for a few days/weeks before I
> install it on my laptop bare metal. My current challenge is to install
> Virtualbox guest additions into dom0 so that i can have the full graphics
> resolutions and seamless integration with my host OS. I get the error
> ‘Please install the Linux Kernel “header” files matching the current kernel
> for adding new hardware support to the system."
> My kernel version (as per uname -r)  is 4.4.14-11
> But if i execute ‘sudo qubes-dom0-update qubes-kernel-vm-support
> kernel-devel’ I get a different version (4.14.67-1) of kernel headers
> installed in dom0. How can I force the dom0 to install the kernel headers
> for version 4.4.14-11?

Have you ran just "sudo qubes-dom0-update"? 4.4.14-11 sounds like the
version originally shipped with R3.2.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d9587e1-c86b-627f-5008-d1690c503908%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Dracut failing on ASUS Z270A Motherboard

2018-09-18 Thread 'awokd' via qubes-users



Aaron Gray:
> Okay installed sort of ish on an old AMD machine the net-sys process did not 
> install properly.
> 
> Anyway swapped the disk over to the Intel and it booted okay apart from 
> net-sys. AFAICS VM's are running okay except net-sys so no networking.
> 
> Will post better reports tomorrow as its late...
> 
> On Monday, 17 September 2018 17:52:54 UTC+1, Aaron Gray  wrote:
>> Dracut failing on ASUS Z270A Motherboard based on Intel Z270 chipset 
>>
>> Attached rdsosreport.txt
>> ~~
>>
>> + cat /lib/dracut/dracut-046-2.git20170811.fc25
>> dracut-046-2.git20170811.fc25
> ...

Glad you got it installed at least. You probably have to add the Intel
machine's NIC to sys-net in Qube Settings/Devices. If that doesn't work,
use the "Configure strict reset..." button at the bottom of that same
tab. If it still doesn't work, see
https://www.qubes-os.org/doc/assigning-devices/#pci-passthrough-issues.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ea27271-ec9e-548a-4559-3072a1a99145%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread 'Антон Чехов' via qubes-users
On Tuesday, September 18, 2018 at 12:02:51 PM UTC+2, Wolf moon wrote:
> On Tuesday, 18 September 2018 10:46:44 UTC+1, Антон Чехов  wrote:
> > On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote:
> > > On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> > > > Hi guys New to Qubes ( which is an amazing feat of cyber security 
> > > > engineering ) all working fine and learning my way around it. 
> > > > 
> > > > My only issue is logging into my vpn service. 
> > > > 
> > > > I have followed the Qubes instructions ( which the images are different 
> > > > to Qubes 4.0 and after searching the net on this matter someone said 
> > > > that this is a shot of the previous Qubes so not helpful there ) I also 
> > > > contacted my vpn service on the matter. They read up on the Qubes 
> > > > instructions and emailed me back a step by step guide but still no joy. 
> > > > 
> > > > My vpn service works well on my Raspberry Pi 3 in the command line ( 
> > > > which I found simple instructions for elsewhere on the internet ) and 
> > > > works fine on my windows 10 system as its got an app interface you 
> > > > download.
> > > > 
> > > > Its just Qubes I am having issues with. I am by no means a hardcore 
> > > > techy, I am learning and not afraid or unfamiliar using the command 
> > > > line in linux. 
> > > > 
> > > > I have contacted the Qubes team after trying my best effort to resolve 
> > > > this on my own as I know they are a small team of 5 or so last time I 
> > > > checked.
> > > > 
> > > > Any help and advice would be greatly appreciated.
> > > > 
> > > > Best,
> > > > 
> > > > Wolf Moon
> > > 
> > > Okay guys so I am signed up to Nordvpn. ( To note: I always update 
> > > everything in Qube manager )
> > > 
> > > I started off by google searching how to set up a vpn on qubes. I dont 
> > > have every forum page be it google groups or reddit page saved I read 
> > > unfortunately. 
> > > 
> > > But they generally instructed me to do go through the steps to set up a 
> > > vpn as Qubes instructs on their page 
> > > https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
> > > 
> > > Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI 
> > > scripts
> > > 
> > > What I was referencing referring to the diagram/photo being outdated or 
> > > of the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It 
> > > just comes up looking different which is what one of the OPs mentioned on 
> > > one of the how to guides I found. 
> > > 
> > > Moving forward.
> > > 
> > > Certain commands didn't work like sudo which after googling one forum 
> > > posted in Qubes you dont use sudo much, dnf ( what ever that is ) is used 
> > > instead which is what I used.
> > > 
> > > I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > 
> > > sys-net 
> > > Appvm
> > > 
> > > From there the rest of the instructions didn't work on Qubes for me.
> > > 
> > > Apart from downloading the nord config files successfully which are in my 
> > > nordvpn documents folder with all the server addresses as txt files eg 
> > > uk648.nordvpn.comtcp443.ovpn
> > > 
> > > Also was instructed to download nano reader and a few other things.
> > > 
> > > My cd ls in my nordvpn terminal is as follows 
> > > 
> > > DesktopMusic  Templates   nano.save
> > > Documents  Pictures   Videos  openvpn-client.ovpn.txt
> > > Downloads  Public  auth-user-pass  pass.txt
> > > 
> > > ( To note and jumping ahead: following tasket's Reddit page on Qubes vpn 
> > > set up instructions I added vpn-handler-openvpn to services in the appvm 
> > > I named Nordvpn )
> > > 
> > > So from there comes Nordvpns reply ( they were very helpful before 
> > > helping me successfully setting up my vpn link on my Raspberry Pi )
> > > 
> > > I received this email: 
> > > 
> > > Hello, Adam,
> > > 
> > > I have checked your OS documentation and it would be great if you could 
> > > test out the following setup:
> > > Disable any auto-starting service that comes with the software package. 
> > > For example for OpenVPN.
> > > sudo systemctl disable openvpn.service
> > > You may also wish to install nano or another simple text editor for 
> > > entering the scripts below. Now run the following command to create VPN 
> > > directory:
> > > sudo mkdir /rw/config/vpn
> > > Enter the directory using the following command:
> > > cd 
> > > /rw/config/vpn
> > > 
> > > Then our website - https://nordvpn.com/servers/#recommended , on the 
> > > server picker you will see recommended server number. Then open 
> > > https://nordvpn.com/ovpn/ website and download recommended server file. 
> > > You can download directly to device and transfer to your VM or use 
> > > command to download from the hyperlink:
> > > sudo wget 
> > > https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn
> > > (Change the last line of 

Re: [qubes-users] HCL - Purism Librem 13 v2

2018-09-18 Thread 'awokd' via qubes-users
qubes-...@tutanota.com:
> Looks like it is a bit of a blind way. To use the reasonably secure OS 
> without possibility to use it on the reasonably secure HW, is an issue which 
> needs to be addressed a bit. I originally guessed that Qubes would run on the 
> RYF devices well, and I am quite surprised it doesn't (doesnt it?). Is there 
> any strong issue which prevents Qubes to function with RYF devices? 

There are no RYF laptops with CPUs that support Intel VT-x with EPT /
AMD-V with RVI (SLAT) and Intel VT-d / AMD-Vi (aka AMD IOMMU).

> Am I missing something on the assumption that RYF devices, with disabled 
> IME-AMT known security hole, with the coreboot  instead of BIOS and so on, 
> are more secure-potential than the non-RYFs? 
> 
> I need a working laptop. Desktop is not an option. 

Check the scale I posted for options. A corebooted Lenovo G505s with
microcode update comes close to RYF.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9a44d182-b1ac-6937-b373-aa67a265f76a%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL - Purism Librem 13 v2

2018-09-18 Thread 'awokd' via qubes-users



taii...@gmx.com:
> On 09/16/2018 02:51 AM, 'awokd' via qubes-users wrote:

>> At present, RYF has not certified any laptops with hardware capable of
>> running Qubes 4.0, but there are a couple older AMDs that can. A scale of
>> hardware openness/owner control from most to least would be something
>> like:
>>
>> 10: OpenPOWER, RYF certified x86 with all blobs replaced- Qubes 4.0 can't
>> run on either
> 
> Since you mention power and there aren't currently any laptops do you
> mean laptops or desktops? In terms of desktops there are a variety that
> qubes 4.0 can run on.

You're right, forgot the RYF desktops which support 4.0.

> The future is POWER for all...
> 
>> 8: older AMD like A10-5750M- a couple blobs required but Qubes 4.0 works
>> on these and the rest listed
>> 6: pre-Skylake Intel with ME/HAP tweaks- a few more blobs and 2 ME modules
>> required
>> 4: Skylake+ Intel with ME/HAP tweaks, AMD Ryzen with PSP disabled in UEFI
>> config- more blobs and modules required
> 
> That doesn't disable it! you are simply asking nicely for it to shut off
> and hoping that it does so. It is not at all equivilant to say pre-core
> intel systems where one really could disable it or even better one that
> doesn't have any black boxes like the talos.

I know, that's why I didn't rate this higher on my invented scale.

>> 0: Intel/AMD x86 with no tweaks- most shipping volume today
>>
>> ARM (& possibly RISC) is a special case in that the integrator can decide
>> where on the scale they want to deliver their product, but neither support
>> Qubes 4.0.
>>
> 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ceb457f-53f8-0ec0-c219-2347544cd3a9%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] whonix-ws-14 apt-get autoremove broke the template

2018-09-18 Thread 'awokd' via qubes-users
qubes-...@tutanota.com:
> hi, after the last update of the whonix-ws-14 template with recommended 
> apt-get autoremove, the template got broken. 
> - Most of the apps disappeared
> - torbrowser doesnt connect to net
> - template itself cant be updated. 
> 
> user@host:~$ sudo apt-get update
> Reading package lists... Done
> E: Could not get lock /var/lib/apt/lists/lock - open (11: Resource 
> temporarily unavailable)
> E: Unable to lock directory /var/lib/apt/lists/
> 
> Upon launching TorBrowser, the wellcome page is "File not found". Upon trying 
> to connect to a web page, "Secure connection failed".
> 
> any ideas?

There's a lock on apt update. Let it sit for 15 minutes and try again.
If that doesn't help, roll back to a previous version of the template
from a backup or reinstall it. You might also try the Qubes-Whonix forum.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ef1b95a-8b31-1fc1-9eb1-36d0543e3864%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Calling qubes expets VPN sign in headache! Nordvpn wont work

2018-09-18 Thread Wolf moon
On Tuesday, 18 September 2018 09:44:17 UTC+1, Антон Чехов  wrote:
> On Tuesday, September 18, 2018 at 8:48:16 AM UTC+2, Wolf moon wrote:
> > Guys despite going through guides like 
> > https://github.com/tasket/Qubes-vpn-support etc there are parts that qubes 
> > gets stuck on like in the mentioned guide I get to step 2 and it does not 
> > recognise command 1n which sticks me at that stage. 
> > 
> > I have all the config files downloaded from nord. 
> > 
> > Can you show me either a simpler way to sign on to my vpn account or point 
> > me in the right direction of a guide that actually works.
> > 
> > I had no issues signing into my vpn service via the command line on my 
> > raspberry pi and on my windows 10 machine it was even easier as it could 
> > download an app. 
> > 
> > Best,
> > 
> > Wolf moon
> 
> If you don't know exactly what you are doing it is best to copy & paste the 
> commands. In Qubes this is done a little differently, so be sure to read this 
> first:
> https://www.qubes-os.org/doc/copy-paste/
> 
> The command is LN in lower case ln, not 1n. 
> https://en.wikipedia.org/wiki/Ln_(Unix) 
> 
> It should work but if it doesn't you could still try the "old" command line 
> approach, explained here:
> https://www.qubes-os.org/doc/vpn/
> The instructions you should try start under the headline "Set up a ProxyVM as 
> a VPN gateway using iptables and CLI scripts"
> 
> Good luck!

Great reply thank you

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a9137f69-2b63-4375-96c4-7af4a68517e4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Wolf moon
On Tuesday, 18 September 2018 10:46:44 UTC+1, Антон Чехов  wrote:
> On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote:
> > On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> > > Hi guys New to Qubes ( which is an amazing feat of cyber security 
> > > engineering ) all working fine and learning my way around it. 
> > > 
> > > My only issue is logging into my vpn service. 
> > > 
> > > I have followed the Qubes instructions ( which the images are different 
> > > to Qubes 4.0 and after searching the net on this matter someone said that 
> > > this is a shot of the previous Qubes so not helpful there ) I also 
> > > contacted my vpn service on the matter. They read up on the Qubes 
> > > instructions and emailed me back a step by step guide but still no joy. 
> > > 
> > > My vpn service works well on my Raspberry Pi 3 in the command line ( 
> > > which I found simple instructions for elsewhere on the internet ) and 
> > > works fine on my windows 10 system as its got an app interface you 
> > > download.
> > > 
> > > Its just Qubes I am having issues with. I am by no means a hardcore 
> > > techy, I am learning and not afraid or unfamiliar using the command line 
> > > in linux. 
> > > 
> > > I have contacted the Qubes team after trying my best effort to resolve 
> > > this on my own as I know they are a small team of 5 or so last time I 
> > > checked.
> > > 
> > > Any help and advice would be greatly appreciated.
> > > 
> > > Best,
> > > 
> > > Wolf Moon
> > 
> > Okay guys so I am signed up to Nordvpn. ( To note: I always update 
> > everything in Qube manager )
> > 
> > I started off by google searching how to set up a vpn on qubes. I dont have 
> > every forum page be it google groups or reddit page saved I read 
> > unfortunately. 
> > 
> > But they generally instructed me to do go through the steps to set up a vpn 
> > as Qubes instructs on their page 
> > https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
> > 
> > Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI 
> > scripts
> > 
> > What I was referencing referring to the diagram/photo being outdated or of 
> > the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It just 
> > comes up looking different which is what one of the OPs mentioned on one of 
> > the how to guides I found. 
> > 
> > Moving forward.
> > 
> > Certain commands didn't work like sudo which after googling one forum 
> > posted in Qubes you dont use sudo much, dnf ( what ever that is ) is used 
> > instead which is what I used.
> > 
> > I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > 
> > sys-net 
> > Appvm
> > 
> > From there the rest of the instructions didn't work on Qubes for me.
> > 
> > Apart from downloading the nord config files successfully which are in my 
> > nordvpn documents folder with all the server addresses as txt files eg 
> > uk648.nordvpn.comtcp443.ovpn
> > 
> > Also was instructed to download nano reader and a few other things.
> > 
> > My cd ls in my nordvpn terminal is as follows 
> > 
> > DesktopMusic  Templates   nano.save
> > Documents  Pictures   Videos  openvpn-client.ovpn.txt
> > Downloads  Public  auth-user-pass  pass.txt
> > 
> > ( To note and jumping ahead: following tasket's Reddit page on Qubes vpn 
> > set up instructions I added vpn-handler-openvpn to services in the appvm I 
> > named Nordvpn )
> > 
> > So from there comes Nordvpns reply ( they were very helpful before helping 
> > me successfully setting up my vpn link on my Raspberry Pi )
> > 
> > I received this email: 
> > 
> > Hello, Adam,
> > 
> > I have checked your OS documentation and it would be great if you could 
> > test out the following setup:
> > Disable any auto-starting service that comes with the software package. For 
> > example for OpenVPN.
> > sudo systemctl disable openvpn.service
> > You may also wish to install nano or another simple text editor for 
> > entering the scripts below. Now run the following command to create VPN 
> > directory:
> > sudo mkdir /rw/config/vpn
> > Enter the directory using the following command:
> > cd 
> > /rw/config/vpn
> > 
> > Then our website - https://nordvpn.com/servers/#recommended , on the server 
> > picker you will see recommended server number. Then open 
> > https://nordvpn.com/ovpn/ website and download recommended server file. You 
> > can download directly to device and transfer to your VM or use command to 
> > download from the hyperlink:
> > sudo wget 
> > https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn
> > (Change the last line of server name to download the correct file). Then 
> > rename downloaded file to client.ovpn
> > The VPN client may not be able to prompt you for credentials when 
> > connecting to the server. Create a file in the /rw/config/vpn folder with 
> > your credentials and using a directive. For 

[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread 'Антон Чехов' via qubes-users
On Tuesday, September 18, 2018 at 10:37:06 AM UTC+2, Wolf moon wrote:
> On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> > Hi guys New to Qubes ( which is an amazing feat of cyber security 
> > engineering ) all working fine and learning my way around it. 
> > 
> > My only issue is logging into my vpn service. 
> > 
> > I have followed the Qubes instructions ( which the images are different to 
> > Qubes 4.0 and after searching the net on this matter someone said that this 
> > is a shot of the previous Qubes so not helpful there ) I also contacted my 
> > vpn service on the matter. They read up on the Qubes instructions and 
> > emailed me back a step by step guide but still no joy. 
> > 
> > My vpn service works well on my Raspberry Pi 3 in the command line ( which 
> > I found simple instructions for elsewhere on the internet ) and works fine 
> > on my windows 10 system as its got an app interface you download.
> > 
> > Its just Qubes I am having issues with. I am by no means a hardcore techy, 
> > I am learning and not afraid or unfamiliar using the command line in linux. 
> > 
> > I have contacted the Qubes team after trying my best effort to resolve this 
> > on my own as I know they are a small team of 5 or so last time I checked.
> > 
> > Any help and advice would be greatly appreciated.
> > 
> > Best,
> > 
> > Wolf Moon
> 
> Okay guys so I am signed up to Nordvpn. ( To note: I always update everything 
> in Qube manager )
> 
> I started off by google searching how to set up a vpn on qubes. I dont have 
> every forum page be it google groups or reddit page saved I read 
> unfortunately. 
> 
> But they generally instructed me to do go through the steps to set up a vpn 
> as Qubes instructs on their page 
> https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager
> 
> Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI scripts
> 
> What I was referencing referring to the diagram/photo being outdated or of 
> the old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It just 
> comes up looking different which is what one of the OPs mentioned on one of 
> the how to guides I found. 
> 
> Moving forward.
> 
> Certain commands didn't work like sudo which after googling one forum posted 
> in Qubes you dont use sudo much, dnf ( what ever that is ) is used instead 
> which is what I used.
> 
> I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > 
> sys-net 
> Appvm
> 
> From there the rest of the instructions didn't work on Qubes for me.
> 
> Apart from downloading the nord config files successfully which are in my 
> nordvpn documents folder with all the server addresses as txt files eg 
> uk648.nordvpn.comtcp443.ovpn
> 
> Also was instructed to download nano reader and a few other things.
> 
> My cd ls in my nordvpn terminal is as follows 
> 
> DesktopMusic  Templates   nano.save
> Documents  Pictures   Videos  openvpn-client.ovpn.txt
> Downloads  Public  auth-user-pass  pass.txt
> 
> ( To note and jumping ahead: following tasket's Reddit page on Qubes vpn set 
> up instructions I added vpn-handler-openvpn to services in the appvm I named 
> Nordvpn )
> 
> So from there comes Nordvpns reply ( they were very helpful before helping me 
> successfully setting up my vpn link on my Raspberry Pi )
> 
> I received this email: 
> 
> Hello, Adam,
> 
> I have checked your OS documentation and it would be great if you could test 
> out the following setup:
> Disable any auto-starting service that comes with the software package. For 
> example for OpenVPN.
> sudo systemctl disable openvpn.service
> You may also wish to install nano or another simple text editor for entering 
> the scripts below. Now run the following command to create VPN directory:
> sudo mkdir /rw/config/vpn
> Enter the directory using the following command:
> cd 
> /rw/config/vpn
> 
> Then our website - https://nordvpn.com/servers/#recommended , on the server 
> picker you will see recommended server number. Then open 
> https://nordvpn.com/ovpn/ website and download recommended server file. You 
> can download directly to device and transfer to your VM or use command to 
> download from the hyperlink:
> sudo wget 
> https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn
> (Change the last line of server name to download the correct file). Then 
> rename downloaded file to client.ovpn
> The VPN client may not be able to prompt you for credentials when connecting 
> to the server. Create a file in the /rw/config/vpn folder with your 
> credentials and using a directive. For example for OpenVPN, edit:
> auth-user-pass
> to:
> auth-user-pass pass.txt
> 
> Save file /rw/config/vpn/client.ovpn. Make sure a /rw/config/vpn/pass.txt 
> file actually exists.
> sudo nano /rw/config/vpn/pass.txt
> Add:
> username
> password
> Replace username and password with your actual username and 

[qubes-users] Re: Archlinux template for Qubes R4 build is working

2018-09-18 Thread 'Антон Чехов' via qubes-users
On Wednesday, May 30, 2018 at 5:37:17 PM UTC+2, qubes...@secmail.pro wrote:
> Archlinux template seems to be fully working and building completely but
> requires minor changes:
> 
> run ./setup
> release 4.0 stable
> select archlinux
> 
> edit the file
> qubes-src/builder-archlinux/scripts/04_install_qubes.sh
> 
> find the line:
> echo "  --> Registering Qubes custom repository..."
> cut out what is in 4 lines after this one echo and paste this instead:
> su -c 'echo "[qubes] " >> $INSTALLDIR/etc/pacman.conf'
> su -c 'echo " #QubesTMP" >> $INSTALLDIR/etc/pacman.conf'
> su -c 'echo "SigLevel = Optional TrustAll " >> $INSTALLDIR/etc/pacman.conf'
> su -c 'echo " #QubesTMP" >> $INSTALLDIR/etc/pacman.conf'
> su -c 'echo "Server = file:///tmp/qubes-packages-mirror-repo/pkgs " >>
> $INSTALLDIR/etc/pacman.conf'
> su -c 'echo " #QubesTMP" >> $INSTALLDIR/etc/pacman.conf'
> 
> The build script has some problem with #comments.
> Not sure why this fix works but different fixes were not, was about to
> give up but then it worked.
> 
> Another couple of edits (taken from 2 day old fix on github)
> /qubes-src/gui-agent-linux/archlinux/PKGBUILD
> In line 11
> 
> makedepends=(pkg-config make gcc patch git automake autoconf libtool
> pulseaudio xorg-server-devel xorg-util-macros xf86dgaproto libxcomposite
> qubes-vm-gui-common qubes-libvchan-xen qubes-db-vm libxt pixman)
> 
> pixman is added just to be sure but im unsure how it helps, as said on
> github too.
> 
> within the same file edit line 62:
> 'xorg-server>=1.19.0' 'xorg-server<1.21.0'
> 
> changed from "1.20.0" to "1.21.0"
> 
> and that would be it. Builds.
> 
> The qubes repository with archlinux binaries has its pgp signature expired
> for over 2 months so Qubes- stuff does not upgrade from within template.
> [qubes-r4.0]
> Server = http://olivier.medoc.free.fr/archlinux/current
> thats why it does not matter (much) if it is left disabled by default.
> 
> the only leftover would be to edit /etc/pacman.conf and remove last 3
> lines which were used during template build.
> 
> Thank you all

Hello,

I am having some difficulties building the Arch Linux template for Qubes 4.0.

I have been following the steps along the lines of this guide:
https://github.com/QubesOS/qubes-issues/issues/3185

Everything is looking fine until “make template”.

The logfile is showing this error message:

--> Updating pacman sources...
warning: config file /etc/pacman.conf, line 104: directive '[qubes] # QubesTMP'$
error: config file /etc/pacman.conf, line 105: invalid value for 'SigLevel' : '$
error: config file /etc/pacman.conf, line 105: invalid value for 'SigLevel' : '$
make[1]: *** [Makefile:64: rootimg-build] Error 1

I changed the SigLevel in the pacman.conf to “Optional TrustAll” and started 
the whole process again but nothing changed. 

I tried cutting out the lines and pasting these but there were more error 
messages instead suggesting that there is something wrong in these lines. Has 
anybody an idea what went wrong and what I could do?

A little help would be very welcome. I’ve been using Arch for quite some time 
and it would be great to have it as a template.

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3d386ac1-3e29-4cee-a179-9518e5ce49ab%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Wolf moon
On Sunday, 16 September 2018 12:30:51 UTC+1, unman  wrote:
> On Fri, Sep 14, 2018 at 08:21:53PM -0700, Wolf moon wrote:
> > Hi guys New to Qubes ( which is an amazing feat of cyber security 
> > engineering ) all working fine and learning my way around it. 
> > 
> > My only issue is logging into my vpn service. 
> > 
> > I have followed the Qubes instructions ( which the images are different to 
> > Qubes 4.0 and after searching the net on this matter someone said that this 
> > is a shot of the previous Qubes so not helpful there ) I also contacted my 
> > vpn service on the matter. They read up on the Qubes instructions and 
> > emailed me back a step by step guide but still no joy. 
> > 
> > My vpn service works well on my Raspberry Pi 3 in the command line ( which 
> > I found simple instructions for elsewhere on the internet ) and works fine 
> > on my windows 10 system as its got an app interface you download.
> > 
> > Its just Qubes I am having issues with. I am by no means a hardcore techy, 
> > I am learning and not afraid or unfamiliar using the command line in linux. 
> > 
> > I have contacted the Qubes team after trying my best effort to resolve this 
> > on my own as I know they are a small team of 5 or so last time I checked.
> > 
> > Any help and advice would be greatly appreciated.
> > 
> > Best,
> > 
> > Wolf Moon
> > 
> 
> Hi Wolf Man
> 
> Welcome to Qubes.
> 
> It would be easier to help if you gave some idea of what the problem is:
> "still no joy" doesn't mean anything.
> 
> Also, "the Qubes instructions" cover a number of different approaches.
> Which one did you try?
> How did the instructions provided by your provider differ from the Qubes?
> 
> Can you say what provider is involved, and what flavour of vpn you are
> trying to put in place.
> Look in the log files for the service, and post relevant extracts - I
> mean take some time to review the log yourself and then post.
> 
> The more relevant information you provide, the easier it will be to
> help.
> 
> cheers
> 
> unman

HI Unman check my detailed reply at the bottom. Thank you for the reply. Hope 
this helps us get further! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c11c8ef3-4065-4477-9c3a-811c451d900d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Calling qubes expets VPN sign in headache! Nordvpn wont work

2018-09-18 Thread 'Антон Чехов' via qubes-users
On Tuesday, September 18, 2018 at 8:48:16 AM UTC+2, Wolf moon wrote:
> Guys despite going through guides like 
> https://github.com/tasket/Qubes-vpn-support etc there are parts that qubes 
> gets stuck on like in the mentioned guide I get to step 2 and it does not 
> recognise command 1n which sticks me at that stage. 
> 
> I have all the config files downloaded from nord. 
> 
> Can you show me either a simpler way to sign on to my vpn account or point me 
> in the right direction of a guide that actually works.
> 
> I had no issues signing into my vpn service via the command line on my 
> raspberry pi and on my windows 10 machine it was even easier as it could 
> download an app. 
> 
> Best,
> 
> Wolf moon

If you don't know exactly what you are doing it is best to copy & paste the 
commands. In Qubes this is done a little differently, so be sure to read this 
first:
https://www.qubes-os.org/doc/copy-paste/

The command is LN in lower case ln, not 1n. 
https://en.wikipedia.org/wiki/Ln_(Unix) 

It should work but if it doesn't you could still try the "old" command line 
approach, explained here:
https://www.qubes-os.org/doc/vpn/
The instructions you should try start under the headline "Set up a ProxyVM as a 
VPN gateway using iptables and CLI scripts"

Good luck!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/86a3b28a-a5a7-4ab2-b861-20dec8b1b922%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Wolf moon
On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> Hi guys New to Qubes ( which is an amazing feat of cyber security engineering 
> ) all working fine and learning my way around it. 
> 
> My only issue is logging into my vpn service. 
> 
> I have followed the Qubes instructions ( which the images are different to 
> Qubes 4.0 and after searching the net on this matter someone said that this 
> is a shot of the previous Qubes so not helpful there ) I also contacted my 
> vpn service on the matter. They read up on the Qubes instructions and emailed 
> me back a step by step guide but still no joy. 
> 
> My vpn service works well on my Raspberry Pi 3 in the command line ( which I 
> found simple instructions for elsewhere on the internet ) and works fine on 
> my windows 10 system as its got an app interface you download.
> 
> Its just Qubes I am having issues with. I am by no means a hardcore techy, I 
> am learning and not afraid or unfamiliar using the command line in linux. 
> 
> I have contacted the Qubes team after trying my best effort to resolve this 
> on my own as I know they are a small team of 5 or so last time I checked.
> 
> Any help and advice would be greatly appreciated.
> 
> Best,
> 
> Wolf Moon

Okay guys so I am signed up to Nordvpn. ( To note: I always update everything 
in Qube manager )

I started off by google searching how to set up a vpn on qubes. I dont have 
every forum page be it google groups or reddit page saved I read unfortunately. 

But they generally instructed me to do go through the steps to set up a vpn as 
Qubes instructs on their page 
https://www.qubes-os.org/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager

Specifically Set up a ProxyVM as a VPN gateway using iptables and CLI scripts

What I was referencing referring to the diagram/photo being outdated or of the 
old version of Qubes prior to 4.0 was the Dom0 create a new Vm. It just comes 
up looking different which is what one of the OPs mentioned on one of the how 
to guides I found. 

Moving forward.

Certain commands didn't work like sudo which after googling one forum posted in 
Qubes you dont use sudo much, dnf ( what ever that is ) is used instead which 
is what I used.

I created a Qube named it Nordvpn > Template > Fedora-26 > Networking > sys-net 
Appvm

>From there the rest of the instructions didn't work on Qubes for me.

Apart from downloading the nord config files successfully which are in my 
nordvpn documents folder with all the server addresses as txt files eg 
uk648.nordvpn.comtcp443.ovpn

Also was instructed to download nano reader and a few other things.

My cd ls in my nordvpn terminal is as follows 

DesktopMusic  Templates   nano.save
Documents  Pictures   Videos  openvpn-client.ovpn.txt
Downloads  Public  auth-user-pass  pass.txt

( To note and jumping ahead: following tasket's Reddit page on Qubes vpn set up 
instructions I added vpn-handler-openvpn to services in the appvm I named 
Nordvpn )

So from there comes Nordvpns reply ( they were very helpful before helping me 
successfully setting up my vpn link on my Raspberry Pi )

I received this email: 

Hello, Adam,

I have checked your OS documentation and it would be great if you could test 
out the following setup:
Disable any auto-starting service that comes with the software package. For 
example for OpenVPN.
sudo systemctl disable openvpn.service
You may also wish to install nano or another simple text editor for entering 
the scripts below. Now run the following command to create VPN directory:
sudo mkdir /rw/config/vpn
Enter the directory using the following command:
cd 
/rw/config/vpn

Then our website - https://nordvpn.com/servers/#recommended , on the server 
picker you will see recommended server number. Then open 
https://nordvpn.com/ovpn/ website and download recommended server file. You can 
download directly to device and transfer to your VM or use command to download 
from the hyperlink:
sudo wget 
https://downloads.nordcdn.com/configs/files/ovpn_legacy/servers/us1310.nordvpn.com.udp1194.ovpn
(Change the last line of server name to download the correct file). Then rename 
downloaded file to client.ovpn
The VPN client may not be able to prompt you for credentials when connecting to 
the server. Create a file in the /rw/config/vpn folder with your credentials 
and using a directive. For example for OpenVPN, edit:
auth-user-pass
to:
auth-user-pass pass.txt

Save file /rw/config/vpn/client.ovpn. Make sure a /rw/config/vpn/pass.txt file 
actually exists.
sudo nano /rw/config/vpn/pass.txt
Add:
username
password
Replace username and password with your actual username and password.
Test your client configuration: Run the client from a CLI prompt in the ‘vpn’ 
folder, preferably as root. For example:
sudo openvpn --cd /rw/config/vpn --config client.ovpn
Watch for status messages that indicate whether the connection is successful 
and test from another VPN VM terminal 

[qubes-users] Error Installing Virtualbox guest Additions in dom0

2018-09-18 Thread otenyo philip
Hi Team,
I am new to QubesOS and just downloaded  and installed v3.2 successuflly on
Virtualbox. I would like to check it out for a few days/weeks before I
install it on my laptop bare metal. My current challenge is to install
Virtualbox guest additions into dom0 so that i can have the full graphics
resolutions and seamless integration with my host OS. I get the error
‘Please install the Linux Kernel “header” files matching the current kernel
for adding new hardware support to the system."
My kernel version (as per uname -r)  is 4.4.14-11
But if i execute ‘sudo qubes-dom0-update qubes-kernel-vm-support
kernel-devel’ I get a different version (4.14.67-1) of kernel headers
installed in dom0. How can I force the dom0 to install the kernel headers
for version 4.4.14-11?
Thanks,
Philip

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAKgvgKPiu%3D6djTOAkSUGPAMsUv8N-kAEprqYx%3DFbm2G8YG5Ykw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Wolf moon
On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> Hi guys New to Qubes ( which is an amazing feat of cyber security engineering 
> ) all working fine and learning my way around it. 
> 
> My only issue is logging into my vpn service. 
> 
> I have followed the Qubes instructions ( which the images are different to 
> Qubes 4.0 and after searching the net on this matter someone said that this 
> is a shot of the previous Qubes so not helpful there ) I also contacted my 
> vpn service on the matter. They read up on the Qubes instructions and emailed 
> me back a step by step guide but still no joy. 
> 
> My vpn service works well on my Raspberry Pi 3 in the command line ( which I 
> found simple instructions for elsewhere on the internet ) and works fine on 
> my windows 10 system as its got an app interface you download.
> 
> Its just Qubes I am having issues with. I am by no means a hardcore techy, I 
> am learning and not afraid or unfamiliar using the command line in linux. 
> 
> I have contacted the Qubes team after trying my best effort to resolve this 
> on my own as I know they are a small team of 5 or so last time I checked.
> 
> Any help and advice would be greatly appreciated.
> 
> Best,
> 
> Wolf Moon

To note. I am running my Raspberry pi on one monitor on my desk to reply to 
this forum whilst Qubes is up and running on a separate machine and monitor on 
my desk so I can live mutlitask today and/or when ever I receive a reply. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e59ef5e3-df40-4a6a-98c9-86d236674c45%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: New to Qubes having issues logging into my vpn service despite following the Qubes instructions

2018-09-18 Thread Wolf moon
On Saturday, 15 September 2018 04:21:53 UTC+1, Wolf moon  wrote:
> Hi guys New to Qubes ( which is an amazing feat of cyber security engineering 
> ) all working fine and learning my way around it. 
> 
> My only issue is logging into my vpn service. 
> 
> I have followed the Qubes instructions ( which the images are different to 
> Qubes 4.0 and after searching the net on this matter someone said that this 
> is a shot of the previous Qubes so not helpful there ) I also contacted my 
> vpn service on the matter. They read up on the Qubes instructions and emailed 
> me back a step by step guide but still no joy. 
> 
> My vpn service works well on my Raspberry Pi 3 in the command line ( which I 
> found simple instructions for elsewhere on the internet ) and works fine on 
> my windows 10 system as its got an app interface you download.
> 
> Its just Qubes I am having issues with. I am by no means a hardcore techy, I 
> am learning and not afraid or unfamiliar using the command line in linux. 
> 
> I have contacted the Qubes team after trying my best effort to resolve this 
> on my own as I know they are a small team of 5 or so last time I checked.
> 
> Any help and advice would be greatly appreciated.
> 
> Best,
> 
> Wolf Moon

Hi guys sorry I didnt see the replies but I have now and thank you for them. 
Yes you are right of course I do need to add a lot more detail. I will go ahead 
and add as much detail of what has gone on so far and where I am at. 

Best,

Wolf moon

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5bfbcf7-9dd1-4645-ad69-63d982b940a1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Calling qubes expets VPN sign in headache! Nordvpn wont work

2018-09-18 Thread Wolf moon
Guys despite going through guides like 
https://github.com/tasket/Qubes-vpn-support etc there are parts that qubes gets 
stuck on like in the mentioned guide I get to step 2 and it does not recognise 
command 1n which sticks me at that stage. 

I have all the config files downloaded from nord. 

Can you show me either a simpler way to sign on to my vpn account or point me 
in the right direction of a guide that actually works.

I had no issues signing into my vpn service via the command line on my 
raspberry pi and on my windows 10 machine it was even easier as it could 
download an app. 

Best,

Wolf moon

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0cebf7eb-e86f-484b-9d3d-0e000280a730%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.