[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep
On 1/26/19 5:22 AM, John S.Recdep wrote: > > When I remove the whonix templates I get about 12 errors complaining > about /var/lib/qubes/vm-templates/whonix-ws-14/app.tempicons > /vm-whitelisted-appmenus.list > > etc > > no such file or directory >

[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep
somewhere in this large thread it probably states there is an error in the original whonix install invocation right ? if one just uses community-testing they end up with 2018 version so use the --enablerepo=qubes*testing instead -- You received this message because you are subscribed

[qubes-users] Re: QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep
When I remove the whonix templates I get about 12 errors complaining about /var/lib/qubes/vm-templates/whonix-ws-14/app.tempicons /vm-whitelisted-appmenus.list etc no such file or directory I suppose just another one of those mystery errors to

Re: [qubes-users] Re: looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 25/01/2019 8.02 PM, Eric wrote: > Personally I will not instal anything into dom0 that is not from an > ITL authorised repo. > > Is a real PITA that the inter appVM cut and paste does not work for > dom0 - can there be a switch somewhere that

[qubes-users] Re: looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread Eric
Personally I will not instal anything into dom0 that is not from an ITL authorised repo. Is a real PITA that the inter appVM cut and paste does not work for dom0 - can there be a switch somewhere that says I am going to be careful and do it? Feature request? Only for package names into dom0 and

[qubes-users] Re: looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread gone
799 wrote on Sat, 26 January 2019 00:40 > Hello, > > Feel free to use this script, which needs xclip to be > installed in dom0 and > also the AppVM. > > https://github.com/one7two99/my-qubes/blob/master/home/bin/q > vm-xclip-from-vm > > There is also a never version which can copy from/to >

[qubes-users] Re: looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread gone
haaber wrote on Sat, 26 January 2019 00:01 > On 1/25/19 9:04 PM, gone wrote: > I am annoyed by the same thing, but maybe there is a > security > consideration I do not know. So I copy a text with > mouse, cat it in a > txt file and copy-to-vm it away in my mail-vm for > example. Don't know if >

Re: [qubes-users] looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread 799
Hello, Am Fr., 25. Jan. 2019, 21:04 hat gone geschrieben: > 1st of all, I have read this: > https://www.qubes-os.org/doc/copy-from-dom0/ > > Maybe I just draw a mental blank but I can't find a really > quick way to copy text (not files) from dom0-Terminal to > another VM (into a post like this

Re: [qubes-users] clock nightmare

2019-01-25 Thread haaber
which I read that I have to check that the right service installed in sys-net. Now here are the services in sys-net's /var/run/qubes-service -rw-r--r-- 1 root root 0 Jan 24 17:54 network-manager -rw-r--r-- 1 root root 0 Jan 24 17:54 qubes-firewall -rw-r--r-- 1 root root 0 Jan 24 17:54

Re: [qubes-users] looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread haaber
On 1/25/19 9:04 PM, gone wrote: 1st of all, I have read this: https://www.qubes-os.org/doc/copy-from-dom0/ Maybe I just draw a mental blank but I can't find a really quick way to copy text (not files) from dom0-Terminal to another VM (into a post like this for instance). I thinking of some easy

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread john s.
>> >> Tasket, >> >> Does this mean that a upgrade to testing  is as good as   uninstalling - >> re-installing templates ? > > Yes. Everything in the template's root and private volumes is wiped > before the new package is added. > > However we found out this doesn't work for Whonix if your

[qubes-users] Cannot add new user to Thunderbird address book

2019-01-25 Thread John Goold
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 There is only one issue in my complete transition to a Qubes system. This is the first. When I attempt to add a "New Contact" to Thunderbird's address book, the "OK" button will change to show it is selected, but does not do anything. The same

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread Chris Laprise
On 01/25/2019 03:01 PM, John S.Recdep wrote: On 1/23/19 9:52 PM, Chris Laprise wrote: On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: Patching = If you are a Qubes user, you should remove all APT-based (including Debian and Whonix) TemplateVMs and StandaloneVMs, then

[qubes-users] looking for quickest way to copy text from dom0-Terminal to another VM

2019-01-25 Thread gone
1st of all, I have read this: https://www.qubes-os.org/doc/copy-from-dom0/ Maybe I just draw a mental blank but I can't find a really quick way to copy text (not files) from dom0-Terminal to another VM (into a post like this for instance). I thinking of some easy and logical keyboardcshortcuts

[qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread John S.Recdep
On 1/23/19 9:52 PM, Chris Laprise wrote: > On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: > >> Patching >> = >> >> If you are a Qubes user, you should remove all APT-based (including >> Debian and Whonix) TemplateVMs and StandaloneVMs, then install fresh >> ones. You can do

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread Chris Laprise
/home and /rw ! Template VM halted Attempting to operate on template of UpdateVM... backing up whonix-gw-14 to whonix-gw-14-backup-20190125-mhQ qvm-clone: error: VM name must be shorter than 32 characters ERROR: Unable to make backup of UpdateVM template! This looks like a qubes-dom0-update bug

[qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread gone
files in template's /home and /rw ! Template VM halted Attempting to operate on template of UpdateVM... backing up whonix-gw-14 to whonix-gw-14-backup-20190125-mhQ qvm-clone: error: VM name must be shorter than 32 characters ERROR: Unable to make backup of UpdateVM template! I had already cloned t

[qubes-users] Re: Archlinux template for Qubes R4 build is working

2019-01-25 Thread Foppe de Haan
For me, the template builds just fine, but thunderbird-qubes and the GUI )file transfer agent integrated with thunar are missing. (invoking these via the CLI works fine, though.) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe

[qubes-users] Re: clock nightmare

2019-01-25 Thread John S.Recdep
On 1/24/19 6:11 AM, haaber wrote: > Hello, could someone please help me out of the clock nightmare? dom0 > keeps setting itself at -1day, and helpless sys-whonix follows, which > disturbs tor, the time stamp of this email ETC. > Concrete question: in which timezone should live  respectively dom0 

[qubes-users] QSB #46: APT update mechanism experience

2019-01-25 Thread qubes-fan
Hi, I am just sharing my experience from the update mechanism process described here: http://sik5nlgfc5qylnnsr57qrbm64zbdx6t4lreyhpon3ychmxmiem7tioad.onion/news/2019/01/23/qsb-46/ Note please, that

Re: [qubes-users] Fedora-26 template unable to update

2019-01-25 Thread Mike Keehan
On Fri, 25 Jan 2019 02:47:50 -0800 edalva...@riseup.net wrote: > I've been struggling to update my Fedora-26 template for a while. So > far none of the various bug-reports I've found on the issue seem to > help. > > I've checked that all URL's in /etc/yum.repos.d/qubes-r4.repo use > https as

Re: [qubes-users] post-apt-reinstall-issues sys-whonix not connecting to tor

2019-01-25 Thread qubes-fan
Jan 25, 2019, 4:26 PM by marma...@invisiblethingslab.com: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Fri, Jan 25, 2019 at 04:20:50PM +0100, > qubes-...@tutanota.com > > wrote: > >> Jan 25, 2019, 4:13 PM by >> marma...@invisiblethingslab.com >>

Re: [qubes-users] post-apt-reinstall-issues sys-whonix not connecting to tor

2019-01-25 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jan 25, 2019 at 04:20:50PM +0100, qubes-...@tutanota.com wrote: > Jan 25, 2019, 4:13 PM by marma...@invisiblethingslab.com: > > > On Fri, Jan 25, 2019 at 04:04:02PM +0100, > qubes-...@tutanota.com > > >

Re: [qubes-users] post-apt-reinstall-issues sys-whonix not connecting to tor

2019-01-25 Thread qubes-fan
Jan 25, 2019, 4:13 PM by marma...@invisiblethingslab.com: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Fri, Jan 25, 2019 at 04:04:02PM +0100, > qubes-...@tutanota.com > > wrote: > >> Thank you. Will the existing anon-whonix be recreated together with

Re: [qubes-users] clock nightmare

2019-01-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/24/19 11:47 AM, haaber wrote: > I use Qubes since 3.2 and feel quite comfortable :) Your message is > just discouraging though. Sorry, I don't wanted to discourage for sure. > which I read that I have to check that the right service

Re: [qubes-users] post-apt-reinstall-issues sys-whonix not connecting to tor

2019-01-25 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jan 25, 2019 at 04:04:02PM +0100, qubes-...@tutanota.com wrote: > Thank you. Will the existing anon-whonix be recreated together with > sys-whonix as well? I have an anon-whonix AppVM already existing. Should I > back it up or chenge its

Re: [qubes-users] post-apt-reinstall-issues sys-whonix not connecting to tor

2019-01-25 Thread qubes-fan
Thank you. Will the existing anon-whonix be recreated together with sys-whonix as well? I have an anon-whonix AppVM already existing. Should I back it up or chenge its name to prevent data loss? Jan 25, 2019, 4:36 AM by a...@qubes-os.org: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 >

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread Chris Laprise
On 01/24/2019 10:12 PM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 23/01/2019 3.52 PM, Chris Laprise wrote: On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: Patching = If you are a Qubes user, you should remove all APT-based (including

Re: [qubes-users] Qubes 4.0.x - Linux kernel 4.19.15 package available in testing repository

2019-01-25 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Jan 25, 2019 at 01:58:59PM +0100, Patrik Hagara wrote: > On 1/24/19 5:18 PM, Patrik Hagara wrote: > > On 1/20/19 1:57 AM, Marek Marczykowski-Górecki wrote: > >> Hi all, > >> > >> There is updated "kernel" package available in current-testing

Re: [qubes-users] Backup stops when the backup file reaches 3Gb

2019-01-25 Thread Mike Keehan
On Thu, 24 Jan 2019 11:29:50 + unman wrote: > On Thu, Jan 24, 2019 at 01:00:15AM -0500, Chris Laprise wrote: > > On 01/23/2019 08:15 PM, js...@bitmessage.ch wrote: > > > Mike Keehan: > > > > Hi, > > > > > > > > I'm using Qubes Backup to save some of my qubes into another VM. > > > > The

[qubes-users] R.I.S.K.S. - Relatively Insecure System for Keys and Secrets (for Qubes OS)

2019-01-25 Thread 19hundreds
I just published R.I.S.K.S. (https://19hundreds.github.io/risks-workflow ). The source repo is  https://github.com/19hundreds/risks-workflow  . I've been searching for a viable system for managing my

Re: [qubes-users] Don't give focus to new windows in certain work-spaces

2019-01-25 Thread Chris Laprise
On 01/25/2019 12:01 AM, Frozentime345 wrote: I like when it automatically gives focus to new windows most of the time, but when Im entering passwords it's sometimes a pain. Any way to off the feature for just one workspace? You could probably do this under KDE window rules or Kwin scripts.

Re: [qubes-users] Qubes 4.0.x - Linux kernel 4.19.15 package available in testing repository

2019-01-25 Thread Patrik Hagara
On 1/24/19 5:18 PM, Patrik Hagara wrote: > On 1/20/19 1:57 AM, Marek Marczykowski-Górecki wrote: >> Hi all, >> >> There is updated "kernel" package available in current-testing >> repository - it's a Linux long term support 4.19.x series, as an update >> over 4.14.x before. Since the upgrade

Re: [qubes-users] clock nightmare

2019-01-25 Thread haaber
On 1/24/19 7:42 AM, haaber wrote: I forgot to specify that I use fedora-28-minimal as net-vm (and clock-vm). Is the problem in the "minimal" ? The minimal teplates are not suitable for any service without installing additional packages. That template is just a base for advanced users to create

[qubes-users] Fedora-26 template unable to update

2019-01-25 Thread edalvarez
I've been struggling to update my Fedora-26 template for a while. So far none of the various bug-reports I've found on the issue seem to help. I've checked that all URL's in /etc/yum.repos.d/qubes-r4.repo use https as suggested. CONTENT OF /etc/yum.repos.d/qubes-r4.repo (disabled repos not

Re: [qubes-users] HCL - 20HRCTO1WW Lenovo Thinkpad X1 Carbon

2019-01-25 Thread Jean-Philippe Ouellet
On Wed, Jan 23, 2019 at 11:45 PM Berne Campbell wrote: > > Lenovo Thinkpad X1 Carbon 20HRCTO1WW > > I had to disable secure-boot to boot of USB stick for installation (Used > Rufus in Windows in DD mode, MBR partition scheme). Perhaps a signed shim > could be used to ease installation. > >

Re: [qubes-users] Qubes 4.0.1 installer no grub menu

2019-01-25 Thread Frédéric Pierret
Check the post https://groups.google.com/forum/#!msg/qubes-devel/pr8EzL7PjqE/DUFJbAItAQAJ Frédéric On 1/25/19 6:15 AM, gunnarmar...@gmail.com wrote: > I can't get to the GRUB menu of the 4.0.1 installer, is there one? I can't > successfully install qubes without it. > > When I try to boot the

Re: [qubes-users] clock nightmare

2019-01-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/24/19 7:11 AM, haaber wrote: > Concrete question: in which timezone should live respectively dom0 > and whonix-* ? How/Where do I configure TZ without messing all up? > Thank you, Bernhard timedatectl is your friend. You can set different

Re: [qubes-users] clock nightmare

2019-01-25 Thread Zrubi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/24/19 7:42 AM, haaber wrote: > I forgot to specify that I use fedora-28-minimal as net-vm (and > clock-vm). Is the problem in the "minimal" ? The minimal teplates are not suitable for any service without installing additional packages. That