[qubes-users] Re: Updated HCL report - Dell Precision 5520

2018-12-04 Thread robertwickstrom
On Sunday, May 6, 2018 at 9:46:32 AM UTC-4, Yassine wrote:
> Updating previous report as reinstalling from 4.0-rc3 to 4.0
> 
> Needed to edit xen EFI config to remove mapbs/noexitboot keys and disable 
> nouveau modesetting (nouveau.modeset=0)

Jim,
Were you able to successfully install Qubes UEFI from the dd produced usb on 
your Dell Precision 5520? 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d0d873d3-ef2f-4cdd-b53f-4e759184f602%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Paste not working from one appvm to another appvm's bash (4.0)

2018-12-04 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/4/18 6:06 PM, s.w.i.m.on.qu...@gmail.com wrote:
> I also do not have a middle mouse key, again, somewhere online
> said that could be used as well.

Yep, that's how I do it

> Is there some way I can do this?

Sure.

1) pipe the output of the program that prints the cypher into a file...

# my_cipher_program > cipher_output.sh

2) send that text file to the other qube via

# qvm-copy cipher_output.sh

3) in the target qube, edit the ciper_output.sh file to contain only
the cipher and before that whatever command line statement this cipher
is a parameter to.

4) make the script executable

# chmod +x ciper_output.sh

5) run it

# ./ciper_output.sh


/Sven
-BEGIN PGP SIGNATURE-
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=JsNQ
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/730d8e55-d18d-0af8-f027-6aed09c6e9e0%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Paste not working from one appvm to another appvm's bash (4.0)

2018-12-04 Thread s . w . i . m . on . qubes
I have a Fedora minimal install hat I need to copy a very long cipher key into 
it's terminal from a file on another appvm. In the source appvm I can hit Ctl+C 
then Ctl+Shift+C and it will say 1Kb copied from 'appvm'. Going into the 
destination appvm xterm window (using passwordless sudo, qvm-run -u root 
'appvm' xterm) I cannot paste using Ctl+V or Ctl+Shift+V. It will say "Qubes 
clipboard has been copied to the VM and wiped" but nothing prints into Xterm.

Right clicking in the window does nothing.
My keyboard does not have an Insert key, I read somewhere that can be used.
I also do not have a middle mouse key, again, somewhere online said that could 
be used as well.

Is there some way I can do this? I have already tried transcribing the cipher 
but the length of the cipher makes error checking nearly impossible without 
going crazy.

Destination vm is a Fedora 27 minimal install with only 
qubes-core-agent-networking installed and the particular program I wanted to 
install on it. There didnt seem to be a specific 'clipboard' qubes dependency 
to install.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/79ca34ef-aa93-45b2-929e-f2ffeecd4614%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Installed KDE, removed KDE, now lightdm and startx are broken

2018-12-04 Thread Ranguvar
On Tue, Dec 4, 2018 at 5:41 PM  wrote:

> Hey all!
>
> Using Qubes 4.0.1-rc1, been updating with qubes-dom0-update
> --releasever=4.0
>
> I installed @kde-desktop-qubes, and then later uninstalled it.
>
> This seems to have ripped out lightdm and some other parts of X/Xfce.
>
> Now I don't have lightdm to login, and startx fails to load any video
> driver.
>
> I can't seem to reinstall @xfce-desktop-qubes or similar.
>
> Any way to find all RPMs included in that group and download on another
> machine to pass to the Qubes partition after opening with cryptsetup?
>
> Or, any other solution to this seem apparent?
>
> Thanks!
>
> - Devin
>

 `startxfce4` allows me to get a graphical display up, but then I
completely lose all input.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAHe59t73ZhojpHrU9bE%3DvvsUcOXvq6aE9wgLCHcWGgvYwVYbbA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Installed KDE, removed KDE, now lightdm and startx are broken

2018-12-04 Thread ranguvar13
Hey all!

Using Qubes 4.0.1-rc1, been updating with qubes-dom0-update --releasever=4.0

I installed @kde-desktop-qubes, and then later uninstalled it.

This seems to have ripped out lightdm and some other parts of X/Xfce.

Now I don't have lightdm to login, and startx fails to load any video driver.

I can't seem to reinstall @xfce-desktop-qubes or similar.

Any way to find all RPMs included in that group and download on another machine 
to pass to the Qubes partition after opening with cryptsetup?

Or, any other solution to this seem apparent?

Thanks!

- Devin

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4fa4176-fbba-4253-8001-9671426cee4b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Q4 qube-manager broke after dom0 software update yesterday

2018-12-04 Thread Steve Coleman
I was away for a week and dutifully did all my software updates upon 
returning. After updating Dom0 the qube-manager that was running started 
having problems, so I restarted it, but it then refused to run.


RuntimeError: the PyQt4.QtCore and PyQt5.QtCore modules both wrap the 
QtObject class


The problem appears to be qube-manager/python3 is first picking up 
references to PyQt5 when first launching, and later it is picking up 
some PyQt4 references via 
/usr/lib64/python3.5/site-packages/qubesadmin/__pycache__/*.pyc files, 
which then load files from 
/usr/lib64/python3.5/site-packages/PyQt4/__pycache__/* , and thus 
PyQt4/QtGui.so gets loaded.


It looks like the qubes-manager-4.0.22-1.noarch is the latest, though I 
can't help but think this is a case of cache poisoning or some Qt4/Qt5 
environment issue. If so, can the __pycache__/*.pyc files be removed and 
regenerated, or is there another way to avoid the mixing of PyQt versions?


thanks,

Steve

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6de8368-4610-3aad-22f8-41654217fc73%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.

dom0> qube-manager
Traceback (most recent call last):
  File "/bin/qubes-qube-manager", line 9, in  
load_entry_point('qubesmanager==4.0.22', 'console_scripts', 
'qubes-qube-manager')()

  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 542, 
in load_entry_point return get_distribution(dist).load_entry_point(group, name)

  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 2575, 
in load_entry_point return ep.load()

  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 2235, 
in load return self.resolve()

  File "/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", line 2241, 
in resolve module = __import__(self.module_name, fromlist=['__name__'], level=0)

  File "/usr/lib/python3.5/site-packages/qubesmanager/qube_manager.py", line 
41, in  from PyQt4 import QtGui  # pylint: disable=import-error

RuntimeError: the PyQt4.QtCore and PyQt5.QtCore modules both wrap the QObject 
class


dom0> sudo strace qube-manager
...
open("/usr/lib64/python3.5/asyncio/__pycache__/sslproto.cpython-35.pyc", 
O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt5/__pycache__/__init__.cpython-35.pyc",
 O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt5", 
O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt5/QtCore.so", O_RDONLY|O_CLOEXEC) 
= 3
...
open("/usr/lib64/python3.5/site-packages/sip.so", O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt5/QtGui.so", O_RDONLY|O_CLOEXEC) = 
3
...
open("/lib64/libXau.so.6", O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt5/QtWidgets.so", 
O_RDONLY|O_CLOEXEC) = 3
...
open("/usr/lib/python3.5/site-packages/qubesadmin/__pycache__/tags.cpython-35.pyc",
 O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib/python3.5/site-packages/qubesadmin/events/__pycache__/__init__.cpython-35.pyc",
 O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt4/__pycache__/__init__.cpython-35.pyc",
 O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt4", 
O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt4/QtGui.so", O_RDONLY|O_CLOEXEC) = 
3
...
open("/lib64/libuuid.so.1", O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib64/python3.5/site-packages/PyQt4/QtCore.so", O_RDONLY|O_CLOEXEC) 
= 3
open("/bin/qubes-qube-manager", O_RDONLY|O_CLOEXEC) = 3
...
open("/usr/lib/python3.5/site-packages/pkg_resources/__init__.py", 
O_RDONLY|O_CLOEXEC) = 3
open("/usr/lib/python3.5/site-packages/qubesmanager/qube_manager.py", 
O_RDONLY|O_CLOEXEC) = 3
/usr/lib/python3.5/site-packages/qubesadmin/label.py:
:py:meth:`PyQt4.QtGui.QIcon.fromTheme`'''


dom0> find /usr/lib/python3.5/site-packages/qubesadmin -type f -exec grep -Hi 
Qt4 {} \; 
Binary file 
/usr/lib/python3.5/site-packages/qubesadmin/__pycache__/label.cpython-35.pyc 
matches
Binary file 
/usr/lib/python3.5/site-packages/qubesadmin/__pycache__/label.cpython-35.opt-1.pyc
 matches


Re: [qubes-users] Q4.0 qvm-prefs kernel property vs the installed/latest kernel

2018-12-04 Thread Steve Coleman

On 11/22/18 8:00 PM, unman wrote:

On Tue, Nov 20, 2018 at 01:03:43PM -0500, Steve Coleman wrote:

I have two up to date fedora-26 templates, that have long since been
upgraded to fc28, that are both apparently 'stuck' at kernel version
4.14.74-1. I apparently can not set either template to a newer kernel. There
are a lot of customizations involved so I am hoping not to have to go back
to the fc28 rpm and start all over.

Both methods of inspection show the old kernel:

QubeManager /QubeSettings/advanced/kernel/

qvm-prefs --get  kernel

The current/latest installed fc28 kernel version appears to be 4.18.18-200,
yet this latest kernel does not even show up under the QubeManager settings,
nor qvm-prefs, and absolutely refuses to set/update this 'kernel' key to
this latest kernel version number.

The qvm-prefs utility simply claims that this newer kernel version is not
installed, yet "rpm-qa | grep 4.18.18-200" clearly shows that it is. In fact
rpm says that the older kernel 4.14.74-1 is *not* installed. If so, then how
is this template even running? I'm using it daily!

I know dnf can block a package from upgrading, but that is clearly not what
is happening here. The packages do update but apparently Qubes is just not
seeing them, as to be able to display any in Qube-Manager or set/use them
using qvm-prefs.

The "Qubes Global Settings" shows the default kernel as 4.14.74-1, and I
can't even change that, because the newer kernels are not listed there
either.

A file system scan for the old version number yields /usr/lib/modules/*
directory that shows up with 4.14.74-1 as an *fc26* module rather than a
fc28 module, so this whole version disparity appears to be due to some kind
of botched fc26 --> fc28 system/module check routine during a past upgrade?
At least that I my best guess at the moment of what broke and when.

In fact /usr/lib/modules/4.14.74-1.pvops.qubes.x86_64/build/
is the only *build directory* where as all the newer kernels this is merely
a symlink into /usr/src/kernels/*/

Is there anywhere that I would find a Qubes "version setting" that switches
from fc26 modules to fc28 modules? Or is it just somehow scanning for this
"build" directory and then ignoring the newer symlinks?

Any clues of what this should be doing might be very helpful about now.

thanks,

Steve



Steve,

The appVMs are booting using kernels set in dom0.
You can find more recent kernels in the testing repositories.
Install them in dom0 and they will become available
  to use in your qubes.

They are kernel-qubes-vm.. and kernel-latest-qubes-vm

sudo qubes-dom0-update --enablerepo=current-testing --action=search
kernel-latest-qubes-vm

I think the "latest" is now 4.19.2, but you can specify earlier versions
if you wish



Thank you for that wonderful explanation. It turns out that the issue 
was that the package "kernel-latest-qubes-vm" was not installed in Dom0. 
So, no wonder I could not set any newer kernel version number.


Not sure how that happened unless it was some kind of dependency being 
removed via some kind of conflict resolution. The only thing is there is 
absolutely *no rpm history* for this package! This gets chalked in as 
being a mystery in my book.


thanks,

Steve 8*}

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/798cc4fa-c84e-dfb6-765c-be56f9978ceb%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] connecting AppVM via jack to remote jack for sound output

2018-12-04 Thread dimi
No specific requirements, i just knew about Jack and there is a plethora of 
options jack1, jack2, netjack, JackTrip etc. but i will now dive into 
pulseaudio and see where it leads me, thanks for the hint Ivan.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/701438f3-bc8b-4d76-b8a1-ec976e4a9b3c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] connecting AppVM via jack to remote jack for sound output

2018-12-04 Thread Ivan Mitev




On 12/4/18 5:16 PM, dimi wrote:


Have been reading up on jack audio control kit and decided to try out to get 
sound from my surfing AppVM over to a rpi3 which is connected to my PA.
I'd prefer not to lay 25m Audio cables which is bad for sound quality and
it also would free up my Desk from this little ugly Boxessess.

Does anyone have any experience and success storys or can point me to a 
painless solution?


IMHO your best bet would be to use pulseaudio over the network. I used 
that setup years ago but lost my notes so can't help with specifics, but 
searching "pulseaudio over network" on the web give plenty of useful 
info. It boils down to setting up pulseaudio on the rpi3 with the 
module-native-protocol-tcp module and configuring your AppVM to use a 
sink that sends audio to the network server instead of dom0.


By the way, do you have any specific requirement for using JACK ? It's 
mostly used for low-latency/low-jitter audio stuff - which is orthogonal 
with tcp/udp.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46920fca-01b8-de3c-1c02-4ff61c2ea02c%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Decrypting and mounting a partition while qube starts

2018-12-04 Thread tinseal374

mike:



I would decrypt in dom0 and attach decrypted to qubes. You can script
this in dom0 as part of startup process - if you are content with dom0
encryption you can store the password, rather than enter it each time.


Cool -- I like the idea!

What approach would you recommend for these:
a) if the partition was to be decrypted during dom0 boot -- where to script it?
b) if the partition was to be decrypted right before a qube's start -- is there 
a pre-domain-boot script kind of thing?
c) if the password was to be typed -- any idea how to pop up some password 
input dialog box?


Many thanks unman!

Mike



I'm decrypting my drive with two partitions and connect them to the VMs on 
startup like this in dom0:

Keyfile: /root/my-drive-decrypt/keyfile

Script: /root/my-drive-decrypt/my-drive-decrypt.sh

#! /bin/bash
case "$1" in
  start)
cryptsetup --cipher=XXX --offset=XXX 
--key-file=/root/my-drive-decrypt/keyfile --key-size=XXX open --type=plain 
/dev/disk/by-id/XXX my-drive
kpartx -a /dev/mapper/my-drive
vgchange -ay my-drive
qvm-block d my-drive1-vm $(qvm-block l my-drive1-vm | cut -f1 -d ' ')
qvm-block d my-drive2-vm $(qvm-block l my-drive2-vm | cut -f1 -d ' ')
qvm-block a --persistent -o frontend-dev=xvdi my-drive1-vm $(qvm-block 
l | grep my-drive1 | cut -f1 -d ' ')
qvm-block a --persistent -o frontend-dev=xvdi my-drive2-vm $(qvm-block 
l | grep my-drive2 | cut -f1 -d ' ')
;;
  stop)
qvm-block d my-drive1-vm $(qvm-block l my-drive1-vm | cut -f1 -d ' ')
qvm-block d my-drive2-vm $(qvm-block l my-drive2-vm | cut -f1 -d ' ')
vgchange -an my-drive
sleep 1
kpartx -d /dev/mapper/my-drive
cryptsetup close my-drive
;;
  status)
;;
  *)
echo $"Usage: $0 {start|stop|status}"
exit 2
esac

exit 0

Service: /etc/systemd/system/my-drive-decrypt.service

[Unit]
Description="Decrypt my-drive"
Requires=qubes_core.service
After=qubes_core.service

[Service]
Type=oneshot
RemainAfterExit=true
ExecStart=/root/my-drive-decrypt/my-drive-decrypt.sh start
ExecStop=/root/my-drive-decrypt/my-drive-decrypt.sh stop

[Install]
WantedBy=multi-user.target

Enable service:
systemctl enable my-drive-decrypt.service

-

ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/780a6837-db03-70dd-622b-1e9ed185eede%40vfemail.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] connecting AppVM via jack to remote jack for sound output

2018-12-04 Thread dimi

Have been reading up on jack audio control kit and decided to try out to get 
sound from my surfing AppVM over to a rpi3 which is connected to my PA.
I'd prefer not to lay 25m Audio cables which is bad for sound quality and
it also would free up my Desk from this little ugly Boxessess.

Does anyone have any experience and success storys or can point me to a 
painless solution?

I have found this two links but they achieve something different.
https://www.qubes-os.org/doc/external-audio/
https://github.com/zamaudio/qubes-jack

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8dd9cd2a-3621-4a74-8fd3-18fc619b9b1f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Decrypting and mounting a partition while qube starts

2018-12-04 Thread mike

> I would decrypt in dom0 and attach decrypted to qubes. You can script
> this in dom0 as part of startup process - if you are content with dom0
> encryption you can store the password, rather than enter it each time.

Cool -- I like the idea!

What approach would you recommend for these:
a) if the partition was to be decrypted during dom0 boot -- where to script it?
b) if the partition was to be decrypted right before a qube's start -- is there 
a pre-domain-boot script kind of thing?
c) if the password was to be typed -- any idea how to pop up some password 
input dialog box?


Many thanks unman!

Mike

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6c9c0c8f-b5af-461f-b1a3-a9f96917fa94%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.