Re: [qubes-users] Internet does not work in kali linux VM

2018-12-13 Thread TitanoBOT
четверг, 13 декабря 2018 г., 21:15:55 UTC+3 пользователь Ivan Mitev написал:
> On 12/13/18 7:07 PM, TITANBOT wrote:
> > Hello. Forgive me for my bad english. I hope you can understand me. I 
> > installed Kali linux in my Qubes OS, but the internet is not working. When 
> > I made the kali installation, I needed to enter ip, netmask, gateway and 
> > DNS. VM in the settings shows
> > 10.137.0.15 255.255.255.255 10.137.0.6. But when installing, I can not 
> > specify the same parameters of the mask under the network. I can specify 
> > 255.255.255.0 but this is not true. How to configure the Internet in Qubes 
> > OS for Kali linux? I want to note that windows successfully works without 
> > any settings.
> 
> Assuming 10.137.0.15 is your VM's IP, try the following network settings:
> 
> ip: 10.137.0.15
> mask: 255.255.255.0 (/24)
> gateway: 10.137.0.6
> dns1: 10.139.1.1
> dns2: 10.139.1.2

But I have the address of the subnet mask 255.255.255.255
Would it be correct to write 255.255.255.0? This is the address I indicated 
when installing KALI VM, because 255.255.255.255 showed an error.
Can you write in more detail? I am a novice Linux user. You can write commands 
that I have to enter in order for the Internet to start working on Kali VM.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/059f1c9c-5354-4fdc-854e-7dd89487f712%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] TPM usage

2018-12-13 Thread John Smiley
>From the docs:
TPM with proper BIOS support (required for Anti Evil Maid)

Is that it?

Qubes does not use the TPM for disk encryption?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ce305de-c9c9-4252-bc39-bcd0bae79791%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Internet does not work in kali linux VM

2018-12-13 Thread TitanoBOT
Привет зёма. Спасибо, щас попробую.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63677bbb-f53b-4941-8cbc-849cdb8467b9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does anyone trust this for meaningful anonymity?

2018-12-13 Thread John Smiley
I only ask because my, admittedly limited, exposure left me with no confidence 
at all that it would protect me. I was hitting software and doc bugs left and 
right. They haven’t gotten basics down yet, so no way I can trust. Fun toy 
though.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/320e3d50-59e0-422d-973e-102305d32223%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] password style

2018-12-13 Thread John Smiley
Diceware dude

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa3b3017-8ffa-45b8-8002-09f9fe0dc6b8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes with newer hardware and error messages still safe enough?

2018-12-13 Thread Sphere
> It is not an option - it can't be disabled!
By Option I mean, an option whether or not to ride along with PSP despite the 
known horror it brings.
If only I could establish my own CPU production company I would definitely 
support libre hardware/libreboot/coreboot and such but sadly we are in a world 
with high demands to processing and stuff and due to how there is hardly any 
support for libre hardware, the processing needs are hardly filled out and even 
more so with limited budget.

I checked KGPE-D16 KCMA-D8 g505s coreboot and it seems good so long as you have 
enough budget. Say I would make a KVM server or ESXi server out of this for the 
purpose of gaming VMs running AAA games, which CPU and RAM models would you 
suggest?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e3150547-a9c8-4059-b29a-56e1b7fce537%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] password style

2018-12-13 Thread unman
On Thu, Dec 13, 2018 at 01:46:04PM -0500, Chris Laprise wrote:
> On 12/13/2018 09:03 AM, Mike Keehan wrote:
> > On Thu, 13 Dec 2018 03:43:33 -0800 (PST)
> > pulpw...@gmail.com wrote:
> > 
> > > no user login is possible. are there any unallowed chars in it? maybe
> > > too long?
> > > 
> > > the password was:
> > > +jSyq@12_0rRwY7G&/mBAQ=|?{\#53Ouw8910q@3201i+./\nFVsc
> > > 
> > 
> > Backslash character might be a problem, especially \n
> > Maybe the pipe symbol | and ampersand & too.
> > 
> > Mike.
> > 
> 
> Yes, I would try typing the password with the backslashes doubled; might
> work.
> 

Nothing wrong with that password. Works fine as it is.
Did you check the keyboard settings? Change them on setup?
There's a host of characters here that wont play nice with different
keyboard settings: my guess is that that's your problem.

Or of course, you havent remembered the password properly - despite it's
being immediately memorable.  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181213231218.66b3opui4wxd27wo%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes with newer hardware and error messages still safe enough?

2018-12-13 Thread stefanneuhaus2018
Thx all! For my purpose i am satisfied. Struggling now with VPN installation...

> Nice setup. I have an 2950x under the tree waiting for qubes for my kiddo.

:-) Next year i give a try and update my CPU and Bios with AMD Ryzen 3000 
Series and much more cores. 
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/10292cf2-61a5-46ef-abb7-107e3d67a459%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes with newer hardware and error messages still safe enough?

2018-12-13 Thread taii...@gmx.com
On 12/12/2018 09:11 PM, Sphere wrote:
> On Thursday, December 13, 2018 at 9:59:27 AM UTC+8, tai...@gmx.com wrote:
>> On 12/12/2018 03:56 PM wrote:
>>> New to Qubes with basic Linux knowledge i installed successfully a desktop 
>>> system with follwing configuration:
>>>
>>> Qubes 4.0, CPU Ryzen 5 2400G, MB ASRock B450 Pro4, GPU Radeon R7 370, 32 GB 
>>> RAM
>>>
>>> I can update templates and install appvms without issues. Everything works.
>>>
>>> My question is now: On Boot screen i get some error messages (see following 
>>> screen). Possibly there is a lack of safety i can not estimate. Everything 
>>> works but under the surface i did not know if it is as safe as it should 
>>> be. Are there some basic tests which should be made? Or is it enough when 
>>> the system works?
>>>
>>
>> Well you are stuck with a system that has a very obvious frontdoor
>> backdoor called AMD PSP platform "security" processor (as in security
>> from you) that prevents you from doing as you please with the system
>> firmware hence it is not really your computer.
>>
>> If you want one that is owner controlled and has free (as in freedom)
>> open source firmware I have written many walls of text on this subject
>> so just use a non-google search engine to find my previous posts.
>>
>> You also are using gmail which is really bad if you care about not being
>> put of of work or murdered by a robot - your emails and re-captcha
>> solves are fed in to a massive database that helps googles AI research
>> including killer robots like project maven and also of course sold to
>> advertisers and anyone else who can pay.
>>
>> I do not load images from random people if you want help you have to
>> send text only.
> 
> How about give us keywords to help us search this and have it at the first 
> search result?

KGPE-D16 KCMA-D8 g505s coreboot - your keywords :D

Just search my email address and look at what I post on threads asking
for board recommendations

> 
> As for stefanne's inquiry, here are my thoughts:
> It's usually normal to see error messages on start of a linux system cause 
> consumer motherboards production processes still have no proper arrangement 
> to fully support Linux operating systems much to our dismay.
> To check the level of your safety, I recommend you produce one of these and 
> see the results:
> https://www.qubes-os.org/doc/hcl/#generating-and-submitting-new-reports
> 
> If it's a yes on HVM, IOMMU, and SLAT then that means your hardware works 
> very well on Qubes. To further increase security, I recommend you to turn off 
> SMT (Simultaneous Multi-threading) as recently there's been a high surge of 
> vulnerabilities involving multi-threading/hyperthreading and will probably 
> haunt us for years to come.

Nah that only applies to intel's HT and he has an AMD system.

> 
> Additionally, if you have an entry of IOMMU=no
> Go search around your BIOS setup for an option like AMD-Vi or IOMMU and set 
> that to enabled.
> Product another report to check and see if the entry changes to IOMMU=yes
> IOMMU is essential because it protects you from alot of complex attacks like 
> Direct Memory Access (DMA) attacks.
> 
> Lastly, check for updates everyday and never neglect them for maximum 
> security!
> After all this, you may want to configure a VPN.
> 
> As for the Platform Security Processor, well it's an option for people 
> whether or not they would go with it.

It is not an option - it can't be disabled!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b7cb4ce5-550e-27f2-6a16-8339cfc47658%40gmx.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] alternative to bloated templates for faster work and minimal boot time/resources used

2018-12-13 Thread Chris Laprise

On 12/13/2018 02:31 PM, 799 wrote:

Hello Chris,

On Wed, 12 Dec 2018 at 22:52, Chris Laprise > wrote:


But here's how you could start the loop:
qvm-ls --running -O name | (read line; while read line; do qvm-run -p
$line 'your vm command goes here'; done)
[...]


thanks for the hint.
I tried to run the following command which gives me a list of all 
running VMs (just to get the loop right):
qvm-ls --running -O name --raw-data | (read line; while read line; do 
echo $line; done)

In my case:
my-untrusted
my-vault
sys-firewall
sys-net
sys-usb

The command to get the information about the swap usage from a VM (here 
named APPVMNAME can be shown by running the following command in dom0:


echo APPVMNAME = `qvm-run --pass-io APPVMNAME "free" | tail -n +3 | gawk 
'{ print $3 }'`


But when I bring both peaces together I only get one result back, not 
the result for all AppVMs


Can't use both --raw-data and the first read line. Use only one or the 
other.




qvm-ls --running -O name --raw-data | (read line; while read line; do 
echo $line `qvm-run --pass-io $line "free" | tail -n +3 | gawk '{ print 
$3 }'` ; done)


Output in my case:
my-untrusted 256

So the output is only showing the output for one VM.
I don't understand why this is happening.

- O




--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a4cca108-5102-c6da-9078-faea4f6a8f2f%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] alternative to bloated templates for faster work and minimal boot time/resources used

2018-12-13 Thread Mike Keehan
On Thu, 13 Dec 2018 20:31:29 +0100
799  wrote:

> Hello Chris,
> 
> On Wed, 12 Dec 2018 at 22:52, Chris Laprise  wrote:
> 
> > But here's how you could start the loop:
> > qvm-ls --running -O name | (read line; while read line; do qvm-run
> > -p $line 'your vm command goes here'; done)
> > [...]
> >  
> 
> thanks for the hint.
> I tried to run the following command which gives me a list of all
> running VMs (just to get the loop right):
> qvm-ls --running -O name --raw-data | (read line; while read line; do
> echo $line; done)
> In my case:
> my-untrusted
> my-vault
> sys-firewall
> sys-net
> sys-usb
> 
> The command to get the information about the swap usage from a VM
> (here named APPVMNAME can be shown by running the following command
> in dom0:
> 
> echo APPVMNAME = `qvm-run --pass-io APPVMNAME "free" | tail -n +3 |
> gawk '{ print $3 }'`
> 
> But when I bring both peaces together I only get one result back, not
> the result for all AppVMs
> 
> qvm-ls --running -O name --raw-data | (read line; while read line; do
> echo $line `qvm-run --pass-io $line "free" | tail -n +3 | gawk
> '{ print $3 }'` ; done)
> 
> Output in my case:
> my-untrusted 256
> 
> So the output is only showing the output for one VM.
> I don't understand why this is happening.
> 
> - O
> 

Hi,

I can't figure out why the code above only returns the first VM's
result, but the following code works for me :-

for i in `qvm-ls --running -O name --raw-data|grep -v dom0`;
do
   echo $i = `qvm-run --pass-io $i "free"| tail -n +3 | gawk '{print
$3 }'`;
done

Mike.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181213205134.7d2dfb82.mike%40keehan.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Copy paste between qubes service stopped working

2018-12-13 Thread Adrian H
Hi,

Occasionally the copy/paste service in dom0 stops working and I have to restart 
the whole machine to get it back working.

Does anybody know which service it is that provides this functionality so I can 
do a simple restart command rather than having to reboot the whole machine.

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eccf5f0e-5022-4af1-8c6a-81d70f6e00cc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes with newer hardware and error messages still safe enough?

2018-12-13 Thread Eric Duncan
Nice setup. I have an 2950x under the tree waiting for qubes for my kiddo.

TPM is only used for the Anti-Evil Maid feature. You can read up on it and if 
your threat model includes such an attack or not.  Tip, the deal breaker 
decision: you loose sys-usb, USB isolation, if you enable AEM because it has to 
be attached to dom0. (Well, last I used it with R3.2 that was). My personal 
threat model are random USB sticks I use in various work a double client 
computers.  So I'd rather have the USB isolation than AEM, IMO. But each person 
should review their own threat models.  That's why we love qubes.

Tai's valid concerns is that AMD has implemented a remote system monitoring and 
maintenance utility that remote sys admins use to manage the system, same as 
Intel ME (now called vPro I think that had wider and wireless adoption).  
Intel's ME can be neutered to still pass TLS validation given the right 
hardware (or like me, disable the NIC port and change the vPro wireless device 
from 9265 to a non-vPro 9260).  However, there is no such disabling for AMD - 
mostly because no one has tried. And no, disabling it in your bios does not 
turn it off. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/67a8430f-067f-41fe-9e1d-ea1732406205%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] alternative to bloated templates for faster work and minimal boot time/resources used

2018-12-13 Thread 799
Hello Chris,

On Wed, 12 Dec 2018 at 22:52, Chris Laprise  wrote:

> But here's how you could start the loop:
> qvm-ls --running -O name | (read line; while read line; do qvm-run -p
> $line 'your vm command goes here'; done)
> [...]
>

thanks for the hint.
I tried to run the following command which gives me a list of all running
VMs (just to get the loop right):
qvm-ls --running -O name --raw-data | (read line; while read line; do echo
$line; done)
In my case:
my-untrusted
my-vault
sys-firewall
sys-net
sys-usb

The command to get the information about the swap usage from a VM (here
named APPVMNAME can be shown by running the following command in dom0:

echo APPVMNAME = `qvm-run --pass-io APPVMNAME "free" | tail -n +3 | gawk '{
print $3 }'`

But when I bring both peaces together I only get one result back, not the
result for all AppVMs

qvm-ls --running -O name --raw-data | (read line; while read line; do echo
$line `qvm-run --pass-io $line "free" | tail -n +3 | gawk '{ print $3 }'` ;
done)

Output in my case:
my-untrusted 256

So the output is only showing the output for one VM.
I don't understand why this is happening.

- O

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2v9Mz4wpH5Tz%3D7Sh-P49ZiCnrX%3Da1x6O8-qadnr23TZww%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: R4.0: sys-net, sys-firewall and other network VM(s) forced to always be on

2018-12-13 Thread mike
On Thursday, December 13, 2018 at 2:52:06 AM UTC+2, reby wrote:
 
> IIRC sys-net sometimes can be stubborn if one is not patient enough so 
> use qvm-kill if in a hurry . personally I don't see a downside of it 
> autostarting, though I guess one might have reasons to not want that, 
> any way

My sys-net starts when I log in to Qubes (not during boot as it would if it was 
configured to start on boot). It also starts immediately after being shut down. 
Same is for sys-firewall.
Maybe I wouldn't even have noticed that, because normally I want it to always 
be on, but I currently have a particular reason I would like to shut it down 
and can't. :)


# qvm-prefs sys-net
autostart -  False
backup_timestamp  -  1543343438
debug D  False
default_dispvmD  fedora28dvm
default_user  D  user
gateway   D  10.137.0.5
gateway6  D  
include_in_backupsD  True
installed_by_rpm  D  False
ipD  10.137.0.5
ip6   D  
kernelD  4.14.74-1
kerneloptsD  nopat iommu=soft swiotlb=8192
klass D  AppVM
label -  red
mac   D  00:...
maxmemD  4000
memory-  400
name  -  sys-net
netvm -  None
provides_network  -  True
qid   -  5
qrexec_timeoutD  60
start_timeD  1544692438.38
stubdom_mem   U
stubdom_xid   D  -1
template  -  fedora-28
template_for_dispvms  D  False
updateableD  False
uuid  -  db...
vcpus D  2
virt_mode -  pv
visible_gateway   D  
visible_gateway6  D  
visible_ipD  10.137.0.5
visible_ip6   D  
visible_netmask   D  
xid   D  1

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa395344-1c7d-49fc-83d9-4f6266a72592%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] password style

2018-12-13 Thread Chris Laprise

On 12/13/2018 09:03 AM, Mike Keehan wrote:

On Thu, 13 Dec 2018 03:43:33 -0800 (PST)
pulpw...@gmail.com wrote:


no user login is possible. are there any unallowed chars in it? maybe
too long?

the password was:
+jSyq@12_0rRwY7G&/mBAQ=|?{\#53Ouw8910q@3201i+./\nFVsc



Backslash character might be a problem, especially \n
Maybe the pipe symbol | and ampersand & too.

Mike.



Yes, I would try typing the password with the backslashes doubled; might 
work.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b0f9267-9156-c141-1c7c-dd3a4f61a663%40posteo.net.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] i3 Tap to Click

2018-12-13 Thread Todd Lasman
Works! Thanks!

On 12/13/18 9:16 AM, Sven Semmler wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 12/13/18 10:35 AM, Todd Lasman wrote:
>> Just can't get it to work. Any thoughts? I'm on Qubes 4.0, using a
>> ThinkPad T430.
> I'm using Qubes R4 with I3 on a ThinkPad P51 and got it to work.
> Attached is my /etc/X11/xorg.conf.d/99-synaptics-overrides.conf
> (contains all variations I found, one of them makes it work ... didn't
> spend time to figure out which).
>
> /Sven
>
>
>
> -BEGIN PGP SIGNATURE-
>
> iQIzBAEBCAAdFiEE18ry22WNibwI1qeq2m4We49UH7YFAlwSlAUACgkQ2m4We49U
> H7YY+hAAs0DDhEUieBm1frnaJncjksyQ5Unz1/AqFcQ7D46PwnNwSWE9ZvB0+P/E
> yyiEA7ACfarbD7FQselzhVNyaWAgNS6NLZIfqP3+JBkQ6C9IM+TWt8JQmZRj1mSZ
> O1zi+m/CrcoaiZvM7THv7Wo7qOIZCNY06dU4cOoml2FzcQbkMX1J9H5+4p/KSvh0
> B/ogCdTWcau3BoPp0+4f6MtvspsZcX1nQCA9gVPlWBQK94FfwRgXs5lMl2W09X7c
> mIvot2i09nmN8dTJ+axQ4fRkq1KQuWJH8qlTgxnpyCkIUnX4X73lBrcfdjWaU4KW
> Vw/68tbLzsNBvrc5+nkgRuHoa7F7k9olUnK5h3TSDzuD4Q8diCrxIEjWq/4wM4vu
> U/Omly990L7/Ta9AJrmAAL38E+0gidmqEMxL4R3DeUFeDkVQZ6vU3oYuahRq5+hG
> gtRSlPYYgQFPFBNxaRTzcVAkZP8Hds/oonLkIks4fROkmlBI7KHJG5jwHQ2hScN1
> GGbz0/Qy1ZOaVqsIwE0KQGfM/8CFyDbhra1CTGVsgu2waKm8dY5cfdE9RufneKQm
> QhTZtyPcZvy2JmHplKLsE5hDin4E+jFvjlNzVz5RMfp36Zw5lWvteh1Nc5mEGUlI
> VtMMevpgZt6/mNOclS4B3+/LOxpUmFYH02N4LbXxH3NaIuoYAOU=
> =2xrT
> -END PGP SIGNATURE-
>

-- 
*Todd E. Lasman, MD, FCCP*
GPG: 0xBA94243695B358F4


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94043da0-c662-12a6-c5ba-10ac008d16f3%40nowlas.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: OpenPGP digital signature


Re: [qubes-users] Internet does not work in kali linux VM

2018-12-13 Thread Ivan Mitev




On 12/13/18 7:07 PM, microtita...@gmail.com wrote:

Hello. Forgive me for my bad english. I hope you can understand me. I installed 
Kali linux in my Qubes OS, but the internet is not working. When I made the 
kali installation, I needed to enter ip, netmask, gateway and DNS. VM in the 
settings shows
10.137.0.15 255.255.255.255 10.137.0.6. But when installing, I can not specify 
the same parameters of the mask under the network. I can specify 255.255.255.0 
but this is not true. How to configure the Internet in Qubes OS for Kali linux? 
I want to note that windows successfully works without any settings.


Assuming 10.137.0.15 is your VM's IP, try the following network settings:

ip: 10.137.0.15
mask: 255.255.255.0 (/24)
gateway: 10.137.0.6
dns1: 10.139.1.1
dns2: 10.139.1.2

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8ed5b16a-4a06-b7cc-7f1c-3e626d1226cd%40maa.bz.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] whonix + Protonmail Bridge + TorryBirdy?

2018-12-13 Thread 22rip
Has anybody set this up with Whonix in Qubes 4.0? Are you willing to share 
instructions and opinions?

I have managed to get this setup with a debian template/appvm but wanted to 
explore doing this within a Whonix template/appvm? The bridge is only in "beta" 
today and they email the instructions and attachments which seems not as 
secure. I also get an email when an updated version is available.

My questions are:
- How should the bridge be updated? Is this automatic with a template update?
- I have noticed Torybirdy is dated? It seems Torbirdy is "..incompatable with 
Thunderbird 60.3.0" according to the message in the current Whonix-14 
Thunderbird template?
- I know whonix is a debian derivative but what would be the specific commands?
- I was able to get this working using a Debian template + Appvm + whonix-14-gw 
but it seems whonix would be a more secure solution? Is this true?


Any thoughts, help or ideas? 

Thx
(I understand protonmail is not perfect but I am not prepared to host my own 
email, nor do I trust google/gsuite as an alternative...)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e32477f-7a43-4c67-ad73-36431840b874%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] i3 Tap to Click

2018-12-13 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/13/18 10:35 AM, Todd Lasman wrote:
> Just can't get it to work. Any thoughts? I'm on Qubes 4.0, using a
> ThinkPad T430.

I'm using Qubes R4 with I3 on a ThinkPad P51 and got it to work.
Attached is my /etc/X11/xorg.conf.d/99-synaptics-overrides.conf
(contains all variations I found, one of them makes it work ... didn't
spend time to figure out which).

/Sven



-BEGIN PGP SIGNATURE-
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=2xrT
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/02854917-a472-8f9e-d167-d3022f61ccab%40SvenSemmler.org.
For more options, visit https://groups.google.com/d/optout.
Section "InputClass"
Identifier "touchpad overrides"
MatchDriver "synaptics"
Option "TapButton1" "1"
Option "VertEdgeScroll" "1"
Option "RBCornerButton" "3"
EndSection

Section "InputClass"
Identifier "tap-by-default"
MatchIsTouchpad "on"
MatchDriver "libinput"
Option "Tapping" "on"
EndSection

Section "InputClass"
Identifier "tap-by-default"
MatchIsTouchpad "on"
MatchDriver "synaptics"
Option "TapButton1" "1"
EndSection



99-synaptics-overrides.conf.sig
Description: Binary data


[qubes-users] Internet does not work in kali linux VM

2018-12-13 Thread microtitanum
Hello. Forgive me for my bad english. I hope you can understand me. I installed 
Kali linux in my Qubes OS, but the internet is not working. When I made the 
kali installation, I needed to enter ip, netmask, gateway and DNS. VM in the 
settings shows
10.137.0.15 255.255.255.255 10.137.0.6. But when installing, I can not specify 
the same parameters of the mask under the network. I can specify 255.255.255.0 
but this is not true. How to configure the Internet in Qubes OS for Kali linux? 
I want to note that windows successfully works without any settings.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5a1075a7-42c5-4ea3-9537-0b5bbf0bd58b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] i3 Tap to Click

2018-12-13 Thread Todd Lasman
I just can't get i3 to respect my synaptics touch to click!

I've put this snippet in a variety of places (both in dom0 and the
template), including:
/etc/X11/xorg.conf.d/50-synaptics.conf
/usr/share/X11/xorg.conf.d/50-synaptics.conf

Section "InputClass"
Identifier "touchpad catchall"
Driver "synaptics"
MatchIsTouchpad "on"
Option "TapButton1" "1"
EndSection

Just can't get it to work. Any thoughts?
I'm on Qubes 4.0, using a ThinkPad T430.

Thanks.
-- 

-
Todd Lasman
GPG: AE5D 3FBC 304F 1C8C 5266  2871 BA94 2436 95B3 58F4

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181213163534.GA20708%40d1stkfactory.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


[qubes-users] disk space management

2018-12-13 Thread dimi
Having fun with qubes r4 but can't help myself with this problem.

sudo lvs, shows me a bunch of deleted VM's that 'seem' to eat up my disk space.


1) Mostly used  Qubes Manager to delete them. How do you delete appVM's / 
TemplateVM's the right way so that no zombies will up on sudo lvs?

2) Why do i see these deleted VMs in /dev/qubes_dom0/ better yet these deleted 
VM's leave stuff / traces on disk in,
/dev/mapper/
/dev/qubes_dom0/
/home/XXX/.config/menus/applications-merged/user-vmName-vm.menu
/var/log/qubes/
/var/log/xen/

3) sudo lvdisplay is showing me backups, vm--number-back, are these 
actual backups?
Aince i do manual backups to another disk, how do i disable these?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6a684a0b-3550-4ae8-8f21-d1644ba37efe%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] password style

2018-12-13 Thread Mike Keehan
On Thu, 13 Dec 2018 03:43:33 -0800 (PST)
pulpw...@gmail.com wrote:

> no user login is possible. are there any unallowed chars in it? maybe
> too long?
> 
> the password was:
> +jSyq@12_0rRwY7G&/mBAQ=|?{\#53Ouw8910q@3201i+./\nFVsc
> 

Backslash character might be a problem, especially \n 
Maybe the pipe symbol | and ampersand & too.

Mike.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181213140308.246607be.mike%40keehan.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] New HCL Report

2018-12-13 Thread stefan neuhaus
Hi Qubes Team, here my HCL Report. With integrated Radeon Vega Graphics it
didn´t work, but with additional Radeon R7 370 there was no issue. In EFI
settings all virtualization options and ftpm has to be enabled. best, stefan
layout:
   'hcl'
type:
   'desktop'
hvm:
   'yes'
iommu:
   'yes'
slat:
   'yes'
tpm:
   'unknown'
remap:
   'yes'
brand: |
   ASRock
model: |
   B450 Pro4
bios: |
   P1.40
cpu: |
   AMD Ryzen 5 2400G with Radeon Vega Graphics
cpu-short: |
   FIXME
chipset: |
   Advanced Micro Devices, Inc. [AMD] Device
chipset-short: |
   FIXME
gpu: |
   Advanced Micro Devices, Inc. [AMD/ATI] Curacao PRO [Radeon R7 370 /
R9 270/370 OEM] )
gpu-short: |
   FIXME
network: |
   Realtek Semiconductor Co., Ltd.  PCI Express Gigabit
Ethernet Controller (rev 15)
memory: |
   32697
scsi: |
   Samsung SSD 860
usb: |
   3
versions:

- works:
 'FIXME:yes|no|partial'
   qubes: |
 R4.0
   xen: |
 4.8.4
   kernel: |
 4.14.74-1
   remark: |
 FIXME
   credit: |
 FIXAUTHOR
   link: |
 FIXLINK

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CA%2B3ek4ZDsbtMpWTC2j4m1f7agKS-Pts8RgoVY95sFxhJVyQPqg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes with newer hardware and error messages still safe enough?

2018-12-13 Thread stefanneuhaus2018
Hi. thx for your answers!!

@ Sphere
result
hvm:'yes'
iommu:'yes'
slat:'yes'
tpm:'unknown'
remap:'yes'
it seems everything works fine. thank you very much for the link. i will report 
the results to qubes-users email

@ Tseng Wynn
after update kernel-latest it didn#t boot correctly. i tried it already a few 
weeks ago and had to install qubes from the scratch.

@ Taiidan
thx. interesting. do you have some keywords for the search to get more infos?

--
ps i have an ASRock TPM Modul (TPM2-S). would it be a good idea to install on 
mainboard? i am a little cautious as its running now.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a576ad06-44af-403b-8093-900098d96c5c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] password style

2018-12-13 Thread pulpwave
no user login is possible. are there any unallowed chars in it? maybe too long?

the password was: +jSyq@12_0rRwY7G&/mBAQ=|?{\#53Ouw8910q@3201i+./\nFVsc

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6d504405-c5d1-47a7-abb3-0ed7b15c2646%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] updating CentOS-7 templates

2018-12-13 Thread Achim Patzner
Am Donnerstag, den 13.12.2018, 06:12 + schrieb Wynn Tseng:
> Yes, mine happened too. 
> 
> Post error log about /var/log/Xorg.0.log in centos-7 template.
> 
> In dom0, use sudo xl console (insert centos vmname here)to access
> centos7 vm

I did that; that's why I know that there was X11 breakage.

So: Which packages (of the few millions) is the one to back out or what
would have to be added again?


Achim


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aeab7ef45df15fa767e04ce20dd81aecfd334856.camel%40noses.com.
For more options, visit https://groups.google.com/d/optout.