Re: [qubes-users] more spontaneous rebooting, or, i’m as mad as hell and i’m not gonna take this anymore!

2019-05-16 Thread Jon deps
On 5/12/19 11:51 PM, google-urqzgfyzkpiwjxpxxpr...@public.gmane.org wrote: related: https://www.mail-archive.com/qubes-users-/jypxa39uh5tlh3mboc...@public.gmane.org/msg27890.html system may appear stable for over a month then flat-out reboot or may reboot within days. quite unpredictable.

Re: [qubes-users] Where can I find the documentation for qube services?

2019-05-16 Thread unman
On Wed, May 15, 2019 at 11:44:40PM -0700, Eccentric Butterfly wrote: > Services include for example: clocksync, cups, qubes-firewall. > > I would in particular like to know what meminfo-writer does as > https://qubes-os.org/doc/disposablevm-customization/ tells you to disable the > service on

Re: [qubes-users] Re: [qubes-devel] QSB #49: Microarchitectural Data Sampling speculative side channel (XSA-297)

2019-05-16 Thread 'Ilpo Järvinen' via qubes-users
On Thu, 16 May 2019, g80vmgm...@riseup.net wrote: > From XSA297: > """ > Work is ongoing on xen-devel to develop core-aware scheduling, which > will mitigate the cross-domain leak by ensuring that vcpus from > different domains are never concurrently scheduled on sibling threads. > However, this

Re: [qubes-users] How would an adversary hack into your appVMs?

2019-05-16 Thread 'awokd' via qubes-users
Eccentric Butterfly: I'm curious if and how someone could hack into your appVMs if there is a firewall VM in the way. How would they detect that there is a VM on your PC that is accessing the network connection provided by that VM? Would it just appear to them that all the network traffic is

Re: [qubes-users] Where can I find the documentation for qube services?

2019-05-16 Thread 'awokd' via qubes-users
Eccentric Butterfly: Services include for example: clocksync, cups, qubes-firewall. I would in particular like to know what meminfo-writer does as https://qubes-os.org/doc/disposablevm-customization/ tells you to disable the service on any new sys-net VM that you create. This is confusing

[qubes-users] AppVM Qube date created ?

2019-05-16 Thread Jon deps
Hello is there any way to see the date an AppVM/s were created ? This would be convenient. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

Re: [qubes-users] Re: [qubes-devel] QSB #49: Microarchitectural Data Sampling speculative side channel (XSA-297)

2019-05-16 Thread g80vmgmsqw
Ilpo Järvinen: > On Thu, 16 May 2019, g80vmgm...@riseup.net wrote: > >> From XSA297: >> """ >> Work is ongoing on xen-devel to develop core-aware scheduling, which >> will mitigate the cross-domain leak by ensuring that vcpus from >> different domains are never concurrently scheduled on sibling

Re: [qubes-users] more spontaneous rebooting, or, i’m as mad as hell and i’m not gonna take this anymore!

2019-05-16 Thread google
On 2019-05-15 12:48, unman wrote: x230 i7 16GB on docking station. x230 i7 16GB - coreboot x230 i7 12GB alright, i'll report back once i've done some testing. thank you unman! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe

Re: [qubes-users] Re: Spontaneous rebooting

2019-05-16 Thread google
On 2019-05-14 11:33, goo...@subvertising.org wrote: calling unman et al. : what systems are sporting 60+ days uptime? according to unman, the i7 X230 does not reboot spontaneously. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

[qubes-users] Re: [qubes-devel] QSB #49: Microarchitectural Data Sampling speculative side channel (XSA-297)

2019-05-16 Thread g80vmgmsqw
Marek Marczykowski-Górecki: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Dear Qubes Community, > > We have just published Qubes Security Bulletin (QSB) #49: Microarchitectural > Data Sampling speculative side channel (XSA-297). > The text of this QSB is reproduced below. > This QSB

[qubes-users] Installing dom0 updates from source

2019-05-16 Thread 'Public Email Account' via qubes-users
For the newest security updates mention in https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-049-2019.txt how can I install the security updates from security-testing repo but from source code? I prefer to compile or install everything from source code. I do not trust pre-baked

Re: [qubes-users] Bluetooth devices

2019-05-16 Thread Franz
On Tue, May 7, 2019 at 12:51 PM wrote: > Hello everyone! > > I would like to know if it's possible to use Bluetooth devices (mouse, > keyboard...) on Qubes OS? > > I use Qubes 4.0 on a SanDisk Extreme Pro 256gb USB 3.1 key. > > There is no way to get any form of security with bluetooth. So it is

[qubes-users] whonix-gw: 'Hash sum mismatch' on update

2019-05-16 Thread Chris Laprise
I'm getting a hash sum error when updating my whonix-gw-14 template today. No error occurred when updating whonix-ws-14. See below for the apt-get output... -- Chris Laprise, tas...@posteo.net https://github.com/tasket https://twitter.com/ttaskett PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106

[qubes-users] Re: [qubes-devel] QSB #49: Microarchitectural Data Sampling speculative side channel (XSA-297)

2019-05-16 Thread Chris Laprise
On 5/15/19 6:24 PM, Marek Marczykowski-Górecki wrote: Only Intel processors are affected. I think the pattern showing AMD to be more conscientious in their processor designs is now undeniable. Even if its only a matter of degree, the difference appears to be rather substantial. You should

[qubes-users] Why does the spectre poc still work?

2019-05-16 Thread Marco Marais
I already have all the patches installed including the ones fixing MDS. And all CVEs are reported to be NOT VULNERABLE by this tool. https://github.com/speed47/spectre-meltdown-checker Also, same result by the one whonix provides. But this poc still works, why?

[qubes-users] Re: Do you need to harden sys-firewall in any way?

2019-05-16 Thread Claudio Chinicz
On Thursday, 16 May 2019 09:49:25 UTC+3, Eccentric Butterfly wrote: > There seems to not be much information on this. Are there any steps you can > or should take to harden your firewall vm? There are services in the qube > settings called: qubes-firewall, qubes-network, qubes-update-check, >

[qubes-users] How would an adversary hack into your appVMs?

2019-05-16 Thread Eccentric Butterfly
I'm curious if and how someone could hack into your appVMs if there is a firewall VM in the way. How would they detect that there is a VM on your PC that is accessing the network connection provided by that VM? Would it just appear to them that all the network traffic is coming from

[qubes-users] Do you need to harden sys-firewall in any way?

2019-05-16 Thread Eccentric Butterfly
There seems to not be much information on this. Are there any steps you can or should take to harden your firewall vm? There are services in the qube settings called: qubes-firewall, qubes-network, qubes-update-check, qubes-updates-proxy. Neither of them are used in sys-net or sys-firewall.

[qubes-users] Where can I find the documentation for qube services?

2019-05-16 Thread Eccentric Butterfly
Services include for example: clocksync, cups, qubes-firewall. I would in particular like to know what meminfo-writer does as https://qubes-os.org/doc/disposablevm-customization/ tells you to disable the service on any new sys-net VM that you create. This is confusing because the service