[qubes-users] No network

2019-09-13 Thread kegdeg8


Same problem as this guy: 

https://github.com/QubesOS/qubes-issues/issues/3349

I get to the point where the guy installs nc4 ando switches tv-d off, but I do 
not know how to do that, even less  in  qubes. How to fix that to get my 
network up and  running?

Regards,
Keg

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78449380-3417-4db5-a540-27faf74d0e07%40googlegroups.com.


Re: [qubes-users] error starting a dvm

2019-09-13 Thread 'awokd' via qubes-users
lik...@gmx.de:

> Now I'm getting the following error after creating a new DVM and trying to 
> start it:
> 
> Start failed: operation failed: domain 'MyDVM' already exists with uuid 
> 63f9fc91-e16c-4f17-0f22-c1a2d1fbc5c5, see 
> /var/log/libvirt/libxl/libxl-driver.log for details

Reboot!

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e11459b3-9143-109d-9f95-b1eb9a0d80a1%40danwin1210.me.


[qubes-users] Re: Whonix Tor Browser Starter safest setting fails

2019-09-13 Thread 'b17b7bdb' via qubes-users
‐‐‐ Original Message ‐‐‐
On Friday, September 13, 2019 5:16 PM, b17b7bdb <> wrote:

> On 9/13/19 9:31 AM, 'awokd' via qubes-users wrote:> 'b17b7bdb' via 
> qubes-users:
>>> Setting tb_security_slider_safest=true (either by selecting Yes in the Tor 
>>> Browser Starter screen or by creating a line in 
>>> /etc/torbrowser.d/50_user.conf) does not result in the expected behavior.
>>
>>> Actual Behavior:
>>> - Shield icon is fully colored
>>> - Security Level is set to Safest in about:preferences#privacy
>>> - JavaScript is ALLOWED on selected sites.
>>> To view these sites click on the NoScript Preferences button in the 
>>> about:addons page and then select the Per-Site Permissions tab.
>>>
>> When I do this in a fresh DispVM with the above setting, I see no sites
>> listed on the Per-Site Permissons tab. Are you using a disposable VM?
>>
>
> That's correct.  I observed the same behavior in the Whonix DispVMs on two 
> different machines, one of which is a fresh (and updated) install of R4.0.1.  
> Notably, if I manually set the security level to safer in 
> about:preferences#privacy then the per-site permissions disappear.
>
> These permissions are clearly the default permissions included with no-script 
> add-on.  For example, a variety of google, microsoft, yahoo, paypal, and 
> netflix sites are default trusted, among others.

> We might be miscommunicating. I'm saying when I set
> /etc/torbrowser.d/50_user.conf with tb_security_slider_safest=true and
> start a new DispVM (on current-testing), I see zero sites listed. Did
> you add the setting in whonix-ws-15 template? I tried it in the DVM
> template first, but it didn't stick. I do see what you mean with about
> 30 sites listed when I start a DispVM (on a different client on current)
> without that setting. Is your Tor Browser 8.5? Odd that you're
> experiencing different behavior. Might want to mention on qubes-whonix
> forum too.
>

Yes, I created /etc/torbrowser.d/50_user.conf in the whonix-ws-15 template and 
added the line tb_security_slider_safest=true, which persisted across all 
DispVMs.  Everything worked as expected, no TB starter window and js was 
disabled for all sites, except for the per-site permissions listed as trusted 
by no-script.  I observed the same behavior after commenting out the line and 
choosing yes in the starter window.  Both machines have TB 8.5.5 installed.  It 
is indeed surprising that we're observing different behaviors.

(Btw, my apologies if this creates another new thread.  Not sure how to get 
around this since I'm not able to respond directly in protonmail.)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/PMtFoDg5HNlRT-9u1RcVMLW93gD1uyX_fVzQsqwTIihKWiS1TdYUD-waqpg0LsdNub8QR0wvUVwAD3hvlcKwunqBtW-66qMbcn-tb9Oeb8s%3D%40protonmail.ch.


Re: [qubes-users] Kernel Panic at Boot (Account Services) & Changing the Grub Boot Menu Order

2019-09-13 Thread 'awokd' via qubes-users
'noir.virgil' via qubes-users:

> I was hoping someone knew if the GRUB Boot Menu (Legacy BIOS) order could be 
> changed.
> How may I boot Xen 4.8.5-7.fc25 and Linux 4.14.74-1.pvops.qubesx86_64 
> automatically instead of having to select it in advanced options every time?

I thought there were steps detailing this somewhere, but can't locate.
Anyways:
go to dom0 terminal
awk -F\' '/menuentry / { print i++, $2}' /boot/grub/grub.cfg
sudo grub2-set-default ### [whichever number you want, or the full text
string here in quotes]

Once you get a working kernel or boot options, you can return default to
default with:
sudo grub2-set-default 0

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e0dd26d5-cdd5-ca44-bf24-d463ba32d938%40danwin1210.me.


[qubes-users] HCL - Aspire VN7-791

2019-09-13 Thread MissAphonic
>Everything Works Flawlessly Including almost all Function Keys (Keyboard 
Backlight,Volume,Brightness,Mute,Display Switch, Dupiclate Display,etc)

>All USB Ports working including CDROM Reader (SD Card Reader Doesn't work)

>Ethernet and Wifi All working

>Mousepad seems to be not working so you'll have to use a mouse for that

>Mic and Camera Attaching to VM's working

>Random MAC Address from Ethernet and Wifi works

>Windows HVM and APPVM works 

>Other HVM works aswell including but not limited to (Blackarch,Kali,Ubuntu 
Studio,Parrot OS,Windows 7/10, etc..)

>RDP from windows VM works aswell as RDP from a physical Windows PC outside 
Qubes

>Installation using USB to boot installer


- This Includes all my test for now I might update in the future

> Tested From  4.0.1 to 4.0.2-rc1

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c2a5b943-6516-493c-9341-cd2e7231de32%40googlegroups.com.


Qubes-HCL-Acer-Aspire_VN7_791-20190913-134442.yml
Description: Binary data


Re: [qubes-users] Using Salt to update TemplateVMs

2019-09-13 Thread Brian C. Duggan
On 7/18/19 10:40 AM, unman wrote:
> I cant post my files, but I've put up an example which shows how to
> create a qube for building Qubes.
> Here: - https://github.com/unman/notes/tree/master/config/build
> 
> There are some notes I used in training which are a very basic
> hands on intro to salt in Qubes:
> https://github.com/unman/notes/tree/master/salt
> 
> In the build example,you'll see:
> 1. Create.sls - Create a new qube: installing fedora-30-minimal if not already
> there, cloning to new template, using new template to create qube,
> configure the new qube, and configure dom0.
> 2. install.sls - installs required software in template.
> 3. config.sls - Configures new qube as needed.
> 
> I've broken this down to make it as clear as possible, and kept it
> simple.
> You could run each section like:
> qubesctl state.sls build.create
> qubesctl --skip-dom0 --targets=template-builder state.sls build.install
> qubesctl --skip-dom0 --targets=builder state.sls build.config
> 
> Of course, you can do everything here using scripting. But for some
> things, (like targeting packages and configuration at distro and version),
> salt is somewhat easier.
> 
> unman
> 

Thanks for these great resources, unman.

I would like to synchronize Salt formulas or entire Salt configurations
between Qubes machines.

What does that process look like? Should users edit and sign Salt
configurations in dom0? Where should users keep those configurations
under version control? How should they import them in to another dom0
and verify their integrity?

In an earlier thread on the topic, Marek mentioned that he synchronizes
Salt configurations by transferring signed tarballs. But it's unclear to
me where those tarballs are created and signed.

Brian

-- 
Brian C. Duggan
he/him/his


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f147edf6-ed9d-a0cd-4195-cf313506c31b%40dugga.net.


Re: [qubes-users] Using Salt to update TemplateVMs

2019-09-13 Thread Brian C. Duggan
On 7/18/19 10:40 AM, unman wrote:
> I cant post my files, but I've put up an example which shows how to
> create a qube for building Qubes.
> Here: - https://github.com/unman/notes/tree/master/config/build
> 
> There are some notes I used in training which are a very basic
> hands on intro to salt in Qubes:
> https://github.com/unman/notes/tree/master/salt
> 
> In the build example,you'll see:
> 1. Create.sls - Create a new qube: installing fedora-30-minimal if not already
> there, cloning to new template, using new template to create qube,
> configure the new qube, and configure dom0.
> 2. install.sls - installs required software in template.
> 3. config.sls - Configures new qube as needed.
> 
> I've broken this down to make it as clear as possible, and kept it
> simple.
> You could run each section like:
> qubesctl state.sls build.create
> qubesctl --skip-dom0 --targets=template-builder state.sls build.install
> qubesctl --skip-dom0 --targets=builder state.sls build.config
> 
> Of course, you can do everything here using scripting. But for some
> things, (like targeting packages and configuration at distro and version),
> salt is somewhat easier.
> 
> unman
> 

Thanks for these great resources, unman. Wish I had known about them when I got 
started.

Where do you edit the salt files and how do you keep them under version 
control? Earlier, Marek said he synchronized his configuration using
signed tarballs, manually:

https://groups.google.com/d/msg/qubes-users/PtzhBZ8pT4w/8hyG1KWiCAAJ

But it's unclear to me whether he edits, signs, and tars in dom0 and transfers 
those *out* of dom0, or does those things in a VM and transfers
them *in* to dom0.

I ask because it's obviously much more convenient to edit, sign, and version 
control those files in a VM with the latest editors, gnupg, and
git. But copying data in to dom0 is generally undesirable and slows salt config 
iteration.

Brian

-- 
Brian C. Duggan
he/him/his

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/29603147-9e53-fbb2-7740-f260ee0a7272%40dugga.net.


[qubes-users] Re: HCL Report

2019-09-13 Thread MissAphonic
>Everything Works Flawlessly Including almost all Function Keys (Keyboard 
Backlight,Volume,Brightness,Mute,Display Switch, Dupiclate Display,etc) 

>All USB Ports working including CDROM Reader (SD Card Reader Doesn't work)

>Ethernet and Wifi All working

>Mousepad seems to be not working so you'll have to use a mouse for that 

>Mic and Camera Attaching to VM's working

>Random MAC Address from Ethernet and Wifi works

>Windows HVM and APPVM works  

>Other HVM works aswell including but not limited to (Blackarch,Kali,Ubuntu 
Studio,Parrot OS,Windows 7/10, etc..)

>RDP from windows VM works aswell as RDP from a physical Windows PC outside 
Qubes



- This Includes all my test for now I might update in the future

*Tested From  4.0.1 to 4.0.2-rc1

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fefb4486-f39f-4581-a2f3-776327c6b5a7%40googlegroups.com.


[qubes-users] HCL Report

2019-09-13 Thread Kix


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAkPqUs1qrRjCmWP6V1NKqG7nK%2BB_cr92TSKksRdaHG1bbKiYw%40mail.gmail.com.


Qubes-HCL-Acer-Aspire_VN7_791-20190913-134442.yml
Description: application/yaml


Re: [qubes-users] Re: Whonix Tor Browser Starter safest setting fails

2019-09-13 Thread 'awokd' via qubes-users
'b17b7bdb' via qubes-users:
> On 9/13/19 9:31 AM, 'awokd' via qubes-users wrote:> 'b17b7bdb' via 
> qubes-users:
>>> Setting tb_security_slider_safest=true (either by selecting Yes in the Tor 
>>> Browser Starter screen or by creating a line in 
>>> /etc/torbrowser.d/50_user.conf) does not result in the expected behavior.
>>
>>> Actual Behavior:
>>> - Shield icon is fully colored
>>> - Security Level is set to Safest in about:preferences#privacy
>>> - JavaScript is ALLOWED on selected sites.
>>> To view these sites click on the NoScript Preferences button in the 
>>> about:addons page and then select the Per-Site Permissions tab.
>>>
>> When I do this in a fresh DispVM with the above setting, I see no sites
>> listed on the Per-Site Permissons tab. Are you using a disposable VM?
>>
> 
> That's correct.  I observed the same behavior in the Whonix DispVMs on two 
> different machines, one of which is a fresh (and updated) install of R4.0.1.  
> Notably, if I manually set the security level to safer in 
> about:preferences#privacy then the per-site permissions disappear.
> 
> These permissions are clearly the default permissions included with no-script 
> add-on.  For example, a variety of google, microsoft, yahoo, paypal, and 
> netflix sites are default trusted, among others.
> 
We might be miscommunicating. I'm saying when I set
/etc/torbrowser.d/50_user.conf with tb_security_slider_safest=true and
start a new DispVM (on current-testing), I see zero sites listed. Did
you add the setting in whonix-ws-15 template? I tried it in the DVM
template first, but it didn't stick. I do see what you mean with about
30 sites listed when I start a DispVM (on a different client on current)
without that setting. Is your Tor Browser 8.5? Odd that you're
experiencing different behavior. Might want to mention on qubes-whonix
forum too.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a083911d-408b-7ac9-53de-80575af1d6ed%40danwin1210.me.


[qubes-users] Re: Whonix Tor Browser Starter safest setting fails

2019-09-13 Thread 'b17b7bdb' via qubes-users
On 9/13/19 9:31 AM, 'awokd' via qubes-users wrote:> 'b17b7bdb' via qubes-users:
>> Setting tb_security_slider_safest=true (either by selecting Yes in the Tor 
>> Browser Starter screen or by creating a line in 
>> /etc/torbrowser.d/50_user.conf) does not result in the expected behavior.
>
>> Actual Behavior:
>> - Shield icon is fully colored
>> - Security Level is set to Safest in about:preferences#privacy
>> - JavaScript is ALLOWED on selected sites.
>> To view these sites click on the NoScript Preferences button in the 
>> about:addons page and then select the Per-Site Permissions tab.
>>
> When I do this in a fresh DispVM with the above setting, I see no sites
> listed on the Per-Site Permissons tab. Are you using a disposable VM?
>

That's correct.  I observed the same behavior in the Whonix DispVMs on two 
different machines, one of which is a fresh (and updated) install of R4.0.1.  
Notably, if I manually set the security level to safer in 
about:preferences#privacy then the per-site permissions disappear.

These permissions are clearly the default permissions included with no-script 
add-on.  For example, a variety of google, microsoft, yahoo, paypal, and 
netflix sites are default trusted, among others.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/rfw47hJPVkOO1jkWxDuue2dwqS3Ga3MJkphci1lXAbxY_lXjy7xxwUcizvnkjAMADJeN7MYVw2-eArkTaZgKDLZYcwRjgDTafZWpoSljk4M%3D%40protonmail.ch.


[qubes-users] error starting a dvm

2019-09-13 Thread liked2
Hi

seems that I scruwed up my vms. I've a script which creates, performs some 
tasks and deletes afterwards some dvms. During debugging I seem to often 
pressed CRTL+C so that probably some qubes script were interrupted. :(

Now I'm getting the following error after creating a new DVM and trying to 
start it:

Start failed: operation failed: domain 'MyDVM' already exists with uuid 
63f9fc91-e16c-4f17-0f22-c1a2d1fbc5c5, see 
/var/log/libvirt/libxl/libxl-driver.log for details

The logs do not contain any details. Any ideas how I can fix it again? Creating 
and deleting the DVM haven't helped.

Thanks in advance, Pete

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/abbb9503-1dd1-8126-3d47-40648704b855%40gmx.de.


Re: [qubes-users] Whonix Tor Browser Starter safest setting fails

2019-09-13 Thread 'awokd' via qubes-users
'b17b7bdb' via qubes-users:
> Setting tb_security_slider_safest=true (either by selecting Yes in the Tor 
> Browser Starter screen or by creating a line in 
> /etc/torbrowser.d/50_user.conf) does not result in the expected behavior.

> Actual Behavior:
> - Shield icon is fully colored
> - Security Level is set to Safest in about:preferences#privacy
> - JavaScript is ALLOWED on selected sites.
> To view these sites click on the NoScript Preferences button in the 
> about:addons page and then select the Per-Site Permissions tab.
> 
When I do this in a fresh DispVM with the above setting, I see no sites
listed on the Per-Site Permissons tab. Are you using a disposable VM?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f551d217-fe0b-34bd-dd75-dcdc0661d1af%40danwin1210.me.


Re: [qubes-users] F2 stoped working after last kernel update

2019-09-13 Thread 'awokd' via qubes-users
dimi:
> We used to be able to switch to console when typing password or after to 
> see messages, now just black screen. 
> Pressing F2 again shows GUI.
> 
Check to make sure "rhgb quiet" didn't get added to your boot options.
Also, isn't it ctrl-alt-F2, or is that only once inside XFCE?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3caf71ea-12ab-63d3-8287-dde6212606b7%40danwin1210.me.