Re: [qubes-users] Doubts

2019-09-14 Thread 'awokd' via qubes-users
'jrsrrs33' via qubes-users:

> I used to think my communications where private doing this changes, until I 
> started to realize that It was not.

The IT security rabbit hole is pretty deep. I believe at the bottom it
ends with securely disposing all your electronics, but I'm not prepared
to do that quite yet. :) Try to find a balance between realistic threats
to you and counter-measures to oppose them.

> I decide to verify the ISO (4.0.1) that I download of your canonical webiste 
> [qubes-os.org](http://qubes-os.org/), so I have a windows program called md5 
> & sha Checksum utility and it says it all right (open digest and confirm that 
> iso sha256 is the same as in the hash sha 256 of website 
> (https://mirrors.edge.kernel.org/qubes/iso/Qubes-R4.0.1-x86_64.iso.DIGESTS)).
> 
> I decide also to try to do it with gpg4win program, but I do not know how to 
> do it because is an iso, I do it with exe.
> I also try with the instructions of your website, but I do not know how to 
> follow.
> How will be the process? Did I do it good or bad verifying the ISO with 
> checksum utility?

Verifying the SHA256 hash is good. You can be pretty confident the ISO
hasn't been tampered with, but the only way to be sure is to verify
signatures per
https://www.qubes-os.org/security/verifying-signatures/#how-to-verify-qubes-iso-signatures.
If you can't figure out how to do that with gpg4win, you might want to
get some practice with a GNU/Linux distribution instead. You can live
boot Mint for example, and I think Debian 10 too
https://www.debian.org/CD/live/#choose_live. Then you can use native gpg
to verify the ISO. You could also install Virtualbox in Windows and run
Debian or whatever in a VM to get familiar with it first.

> Why do I have to verify Qubes Repos if I had verify the iso? Are Qubes Repos 
> different from the iso, or complements for the software?

You do not have to verify the repos if you've verified the ISO.

> Qubes was created in September 3, 2012. What has happened with the other 
> developers of 2012 (I do not see in your web)?

https://www.qubes-os.org/team/

> All the instructions are for apple users? It because it is writed "sudo" in 
> the steps.

Apple runs BSD, which also uses sudo. Instructions are for Linux users
which is why it will be helpful if you practice first before committing
to Qubes.

> "Untrustworthy firmware. (Firmware can be malicious even if the drive is new. 
> Plugging a drive with rewritable firmware into a compromised machine can also 
> compromise the drive. Installing from a compromised drive could compromise 
> even a brand new Qubes installation.)"

This is one of those rabbit holes. You need a secure machine to build a
secure machine. If you suspect yours is already compromised, get one
that isn't. Here's where you have find a balance against realistic
threats to you.

> I read  article of badusb, but what usb do you recommend (because I do not 
> find)?

Name brand in factory packaging, not something you found laying on the
street.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/af17aa97-cb6b-53f4-05e2-8670bd20e798%40danwin1210.me.


Re: [qubes-users] Wifi Antenna Boosters

2019-09-14 Thread alteration2121
Thanks a lot! That seams way better.
So one just attach it and I works straight away? With no need to alter 
Qubes or install any software? 

And from and security point of view? Will it add any additional risk 
when connection to a public network using Tor?

And any ideer how long the is reach? I guess the answer is in this numbers 
300 Mbps, 125 Nand flash. The antenna I considered earlier could add 200 
meters the the original retch of the wifi. I presume this one a lot 
more powerfull. 



 

Den torsdag 12 september 2019 kl. 22:35:47 UTC+2 skrev Francesco:nnn
>
>
>
> On Thu, Sep 12, 2019 at 11:53 AM > 
> wrote:
>
>> Hi, I need a Wifi Antenna Boosters (attached to the usb). Can a Wifi 
>> Antenna Boosters be used with qubes? 
>>
>> I guess question is whether or not the software will work.
>>
>>
> Not only that, it should be linux compatible, it is also a matter of 
> sharing the connection with others VMs.
>
> There is an option during Qubes installation to have sys-net and sys-usb 
> in the same VM. That may simplify the matter of sharing.
>
> But to simplify your life I would buy a small router with antennas, such 
> as this one, which uses open wrt:
>
> https://www.amazon.com/GL-iNet-GL-AR300M-Pre-installed-Performance-Compatible/dp/B01K6MHRJI/ref=pd_sbs_147_4/145-4592551-8089030?_encoding=UTF8_rd_i=B01K6MHRJI_rd_r=388bcea2-90ba-4dba-8fbe-ea1e08a2ddb7_rd_w=Ao4jy_rd_wg=3bMus_rd_p=d66372fe-68a6-48a3-90ec-41d7f64212be_rd_r=80SCACTM536CX08Y5K1D=1=80SCACTM536CX08Y5K1D
>
> With a router you do not need to touch your Qubes settings and security 
> and the signal will be available for your phone and your close friends as 
> well.
>
> Also you have the option to buy a couple of stronger antennas if you want.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0d292b1a-1721-4d1e-8503-b530392423e3%40googlegroups.com.


[qubes-users] Re: Unsure about network device attachment to VMs

2019-09-14 Thread Anil Eklavya
The ethernet link is down in sys-net. I tried using ip and ifconfig and ifup 
commands to bring it up, but it is still down. On finally giving for now and 
pulling out the ethernet adapter, the system froze completely again, like it 
was doing before I reinstalled.

Regards,

Anil

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/89BE667B-79B1-49FA-B09F-D239D06B4D72%40gmail.com.


[qubes-users] Re: Unsure about network device attachment to VMs

2019-09-14 Thread Anil Eklavya


> Can someone help with this problem, right now just for getting my Qubes 
> installation started, keeping ethernet and other USB devices separate, and 
> with VPN installed somewhere. Detailed documentation can come later.

Right now, I have the wireless device connected to sys-net, but I am trying to 
get ethernet through sys-usb. On installation, the list of services in sys-usb 
included network-manager, which was causing ethernet based networking to be 
connected directly in sys-usb and that was being used in sys-net (as far as I 
can understand). Now I have removed network-manager service from sys-usb and 
put it in sys-net. I then manually attach the LAN device to sys-net. However, 
this doesn’t seem to allow me to connect to network through ethernet. Running 
lsusb doesn’t show the LAN device in sys-net even after attaching. I am missing 
something basic here, it seems. When I try to create an ethernet connection in 
sys-net, there is no ethernet device to be connected to.

Regards,

Anil

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/945C39B4-2A71-46B3-ABC5-7EC995468980%40gmail.com.


[qubes-users] Unsure about network device attachment to VMs

2019-09-14 Thread Anil Eklavya
I am reinstalling Qubes, but I am not sure how to which devices to attach to 
sys-usb and which to sys-net. Earlier the network devices were directly 
attached to sys-usb and sys-usb was providing the network. This is the setting 
my new install started with. I am trying to avoid getting network directly from 
sys-usb. There seems to be some trivial thing that I am missing.

For context, my laptop (Dell XPS 13 9370) has two thunderbolt USB-C ports and 
one normal USB-C port. It is the third port which is practically the only port 
I can use as things are setup, since it seems to be unadvisable to attach 
thunderbolt devices to Qubes. So I mostly use a USB-C hub, which has the 
ethernet port as well other ports.

The laptop is not in the HCL list, but it seems to work fine with some issues.

The documentation for Qubes is pretty good, but one problem is that it is 
better for those who either have no technical knowledge or have deep technical 
knowledge of how Linux and OS work, along with networking. I fall somewhere in 
the middle, so both kinds of advised are not very useful. I think, given that 
the online threats come from network, there should be a more detailed, 
technically middle-grounded documentation for setting up network on Qubes, 
including where should VPN go (various options and their pros and cons).

Can someone help with this problem, right now just for getting my Qubes 
installation started, keeping ethernet and other USB devices separate, and with 
VPN installed somewhere. Detailed documentation can come later.

Regards,

Anil

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/D9D6B664-465E-4C2A-A8B9-A25D52628917%40gmail.com.


[qubes-users] Doubts

2019-09-14 Thread 'jrsrrs33' via qubes-users
It is because I need help.

So, I am worried about privacy in the world of electronic communications. I 
heard about the existence of the NSA mass surveillance software, and from other 
countries ([prism-break.org](http://prism-break.org/)). I also usually read 
privacy policy and terms and conditions of what I am using.

---
A little of my history, it is not necessary to read 
---
So I decide to use protonmail and tutanota for email services
I decide to navegate in invite mode on google chrome.
To install other mobile application in my phone that organize my email other 
than gmail.
I discover thunderbird.
I discover criptext. (https://criptext.com/)
Run a vpn (reading terms and conditions & privacy policy: because there are 
someone that keeps logs and do not accept bitcoin)

I used to think my communications where private doing this changes, until I 
started to realize that It was not.

I discover a few articles saying that protonmail was not enough private. 
(https://eprint.iacr.org/2018/1121.pdf)
This page says tutanota is not secure. (https://prxbx.com/email/)
I read privacy policy of thunderbird saying they transfer clients data to the 
US. (https://www.mozilla.org/en-US/privacy/thunderbird/)
I read criptext privacy policy and there is a lot of transfer data about each 
client outside the country Panama.
I contacted with two organizations of mobile phone apps: mailbird and mymail 
asking why they have the same privacy policy and a few questions of their 
privacy policy
I discover this article against windows, my OS. 
(https://www.gnu.org/proprietary/malware-microsoft.en.html)

---
So I decide to install qubes os, to improve my security (I also read Edward 
Snowden recommendation and Edward Snowden case).

First I saw three videos of people talking about qubes and their 
characteristics, one in livestream and two in youtube.
Then I decide to follow step by step your instructions, but I have a lot of 
problems. I read that the website is hosted on github, but I discover in readme 
file that there is another website with other instructions.

I decide to verify the ISO (4.0.1) that I download of your canonical webiste 
[qubes-os.org](http://qubes-os.org/), so I have a windows program called md5 & 
sha Checksum utility and it says it all right (open digest and confirm that iso 
sha256 is the same as in the hash sha 256 of website 
(https://mirrors.edge.kernel.org/qubes/iso/Qubes-R4.0.1-x86_64.iso.DIGESTS)).

I decide also to try to do it with gpg4win program, but I do not know how to do 
it because is an iso, I do it with exe.
I also try with the instructions of your website, but I do not know how to 
follow.
How will be the process? Did I do it good or bad verifying the ISO with 
checksum utility?

Another question: what do you recomment to clone github and then run a 
localhost server?
I only know a program that you install with npm commands that is called: litte 
server.
I read readmd from github, and
with docker you can not do it because you have to have windows enterprise or 
pro (I only have windows home).

If I have an ISO, and I have check with sha256, why do I want to verify with 
signatures of the others repositores? Where do I have to write all that 
commands?

Do you need that someone host the website with url 
[qubes-os.org](http://qubes-os.org/)? It is because I do not understand one 
thing: I verify a software that could be manipulated by third parties, but the 
signature key too; isn´t it?
So It makes sense verify the software when downloading only of third website, 
isn't it?

Why do I have to verify Qubes Repos if I had verify the iso? Are Qubes Repos 
different from the iso, or complements for the software?

Qubes was created in September 3, 2012. What has happened with the other 
developers of 2012 (I do not see in your web)?
All the instructions are for apple users? It because it is writed "sudo" in the 
steps.

"Untrustworthy firmware. (Firmware can be malicious even if the drive is new. 
Plugging a drive with rewritable firmware into a compromised machine can also 
compromise the drive. Installing from a compromised drive could compromise even 
a brand new Qubes installation.)"
I read  article of badusb, but what usb do you recommend (because I do not 
find)?

Curious question: what the people is normally asking when sending an email to 
business inquiries?

Thank

Sent from ProtonMail Mobile

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/mjQ589xhjSL4GXfwbnVA1drizY-ItX5Ttbac5kd2-eNelV4Bdwg8Ee1bjcyKU491XLnHOn36-aJQ4nwgIGyuK7PAX2xlBmWz3Uex5khzUD8%3D%40protonmail.com.

[qubes-users] Re: SSH to QUBES VM

2019-09-14 Thread liked2
On 9/14/19 10:39 AM, 'awokd' via qubes-users wrote:
> Aly Abdellatif:
>> Hello everyone,
>>
>> Could some please tell how can I configure a Vm in Qubes with SSH.
>>
>> I would like to be able to connect to this VM from another computer using 
>> ssh.
>
> https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world
>
>

There's script on github which helped my a lot to automize the procedure 
described above:
https://gist.github.com/Joeviocoe/6c4dc0c283f6d6c5b1a3f5af8793292b

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d8add538-3b01-a633-4272-66396b23df93%40gmx.de.


[qubes-users] Re: error starting a dvm [SOLVED]

2019-09-14 Thread liked2
On 9/13/19 4:29 PM, liked2-mmb7mzph...@public.gmane.org wrote:
> Hi
>
> seems that I scruwed up my vms. I've a script which creates, performs some 
> tasks and deletes afterwards some dvms. During debugging I seem to often 
> pressed CRTL+C so that probably some qubes script were interrupted. :(
>
> Now I'm getting the following error after creating a new DVM and trying to 
> start it:
>
> Start failed: operation failed: domain 'MyDVM' already exists with uuid 
> 63f9fc91-e16c-4f17-0f22-c1a2d1fbc5c5, see 
> /var/log/libvirt/libxl/libxl-driver.log for details
>
> The logs do not contain any details. Any ideas how I can fix it again? 
> Creating and deleting the DVM haven't helped.
>
> Thanks in advance, Pete
>

Could solve the issue by doing:
virsh -c xen:/// undefine MyDVM

Not sure whether it's clean now or some other parts are still left. But at 
least I can launch my vms again.

This issue helped for resolving:
https://github.com/QubesOS/qubes-issues/issues/1910

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/eaf7f7a0-8021-e4f6-2fb1-fdddf58926c5%40gmx.de.


Re: [qubes-users] Kernel Panic at Boot (Account Services) & Changing the Grub Boot Menu Order

2019-09-14 Thread 'awokd' via qubes-users
awokd:
> 'noir.virgil' via qubes-users:
> 
>> I was hoping someone knew if the GRUB Boot Menu (Legacy BIOS) order could be 
>> changed.
>> How may I boot Xen 4.8.5-7.fc25 and Linux 4.14.74-1.pvops.qubesx86_64 
>> automatically instead of having to select it in advanced options every time?
> 
> [sudo grub2-set-default steps]
> 
Thought I had this working yesterday, but when I went to document it, it
refused to cooperate. If the previous steps didn't work for you, try the
grub section here instead:

https://github.com/awokd/qubes-doc/blob/patch-5/user/common-tasks/software-update-dom0.md#changing-default-kernel

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ec8e70df-d839-48ee-52e7-e63c2c946cbe%40danwin1210.me.


Re: [qubes-users] Qubes on Dell Vostro 5581?

2019-09-14 Thread Tomáš Vondra


On Saturday, September 14, 2019 at 12:57:41 PM UTC+2, 799 wrote:
>
> Hello Tomas,
>
> Tomáš Vondra > schrieb am Sa., 14. Sep. 
> 2019, 12:07:
>
> has anyone tried running Qubes on Dell Vostro 5581 laptop? I've been using 
> a different Dell laptop until now, but I may need a replacement and this 
> seems reasonable.
>
>
> The Dell Vostro 5581 is not on the Qubes Hardware Compatible List (HCL)
> https://www.qubes-os.org/hcl/
>
>
Yes, I know - checking HCL was the first thing I did, sorry for not 
mentioning that.
 

> But it seems to work with Linux:
> https://certification.ubuntu.com/hardware/201808-26383
>
>
Yup. It seems to be a somewhat different configuration, though. It has an 
i3 CPU (although from the same generation and with the same feature set) 
and Atheros wifi (the model I'm looking at seems to use Intel).
 

> Therefore I think it _should_ work fine with Qubes.
> If you test Qubes on it, please submit a HCL Report, so that users might 
> get an answer to your question.
>
>
Sure. Long time ago I've submitted HCL for the laptop I've been using until 
now, I'll do the same with the new one.

regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/11bff770-52b6-4ae1-9654-f4f4f5281538%40googlegroups.com.


Re: [qubes-users] Qubes on Dell Vostro 5581?

2019-09-14 Thread 799
Hello Tomas,

Tomáš Vondra  schrieb am Sa., 14. Sep. 2019, 12:07:

has anyone tried running Qubes on Dell Vostro 5581 laptop? I've been using
a different Dell laptop until now, but I may need a replacement and this
seems reasonable.


The Dell Vostro 5581 is not on the Qubes Hardware Compatible List (HCL)
https://www.qubes-os.org/hcl/

But it seems to work with Linux:
https://certification.ubuntu.com/hardware/201808-26383

Therefore I think it _should_ work fine with Qubes.
If you test Qubes on it, please submit a HCL Report, so that users might
get an answer to your question.

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2tdEo8cPcmDV1Ji3D0ve0Si0D9-OX6O2jdGbXF6Wo5SoA%40mail.gmail.com.


[qubes-users] Qubes on Dell Vostro 5581?

2019-09-14 Thread Tomáš Vondra
Hi,

has anyone tried running Qubes on Dell Vostro 5581 laptop? I've been using 
a different Dell laptop until now, but I may need a replacement and this 
seems reasonable.

The specification seems reasonable - i5-8265U does include the VT-x/VT-d 
features, it should have Intel 9560/9462 wifi, which seems to be supported 
since kernel 4.14.

Dell does not offer it with Linux, though, so I wonder if there might be 
some gotcha.


thanks
Tomas

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe0df813-f62c-420c-9ed6-2a80cd085fe4%40googlegroups.com.


Re: [qubes-users] No network

2019-09-14 Thread 'awokd' via qubes-users
kegd...@gmail.com:
> 
> 
> Same problem as this guy: 
> 
> https://github.com/QubesOS/qubes-issues/issues/3349
> 
> I get to the point where the guy installs nc4 ando switches tv-d off, but I 
> do not know how to do that, even less  in  qubes. How to fix that to get my 
> network up and  running?
> 
99% of the time, switching VT-d off is the wrong solution. You should be
installing Qubes 4.01, not an earlier RC. What network card(s) are you
using? Check the "sudo journalctl -b" log inside sys-net to see if their
drivers are loading correctly. If not, try changing sys-net's template
from Fedora to Debian or vice-versa. Also, search this mailing list with
your network card model if you haven't already- someone may have already
solved.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/76979e3d-23d9-0f2a-d024-e4f609a1da5c%40danwin1210.me.


Re: [qubes-users] SSH to QUBES VM

2019-09-14 Thread 799
Hello Aly

Aly Abdellatif  schrieb am Sa., 14. Sep.
2019, 11:21:

> (...)
> Could some please tell how can I configure a Vm in Qubes with SSH.
> I would like to be able to connect to this VM from another computer using
> ssh.
> (...)


Have you read the Firewall howto for Qubes OS.
https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world

If not please do so and then come back if you need further help.

[799]

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ3yz2v7SOqVusYT83fS01kX6zSeOuMBRvj5AKx9SJZrg9qQEg%40mail.gmail.com.


Re: [qubes-users] SSH to QUBES VM

2019-09-14 Thread 'awokd' via qubes-users
Aly Abdellatif:
> Hello everyone,
> 
> Could some please tell how can I configure a Vm in Qubes with SSH.
> 
> I would like to be able to connect to this VM from another computer using ssh.

https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world


-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/76c7f81d-c3fb-303a-6aa1-9ef2d3f99fa5%40danwin1210.me.


Re: [qubes-users] R4.0.1 UEFI black screen after boot [SOLVED]

2019-09-14 Thread 'awokd' via qubes-users
duc...@disroot.org:

> Thanks, applying steps 11 and 12 as suggested was the answer.

Good.

> The hardest part was figuring out how to reach a GRUB menu from UEFI, as
> it turns out. I might suggest a change to the webpage you linked so that
> the  "Accessing installer Rescue mode on UEFI" section is elevated to an
> NB: at the top rather than the bottom of the page.
> 
I have a submission in the works to make that document more clear in
general, and just added the "black screen" symptom:
https://github.com/awokd/qubes-doc/blob/patch-4/user/advanced-configuration/uefi-troubleshooting.md#installation-completes-successfully-but-then-boot-loops-or-hangs-on-black-screen.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f25668b-0640-51ef-58a3-bb78d88bed4d%40danwin1210.me.


[qubes-users] SSH to QUBES VM

2019-09-14 Thread Aly Abdellatif
Hello everyone,

Could some please tell how can I configure a Vm in Qubes with SSH.

I would like to be able to connect to this VM from another computer using ssh.

Best Regards
Aly Abdellatif

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/D4037724-6CD4-40E4-9958-14875658ABA1%40gmail.com.


Re: [qubes-users] R4.0.1 UEFI black screen after boot [SOLVED]

2019-09-14 Thread duc01k
'awokd' via qubes-users:
> duc...@disroot.org:
>> 'awokd' via qubes-users:
> 
>>> Intel integrated GPU usually works well as is. Are you getting the black
>>> screen when you boot the installer, or after it completes and reboots?
>>>
>> The installer boots just fine, no issues at all. It's only after it
>> completes and I try to boot Qubes OS proper that I've just installed
>> that I get this problem.
>>
> OK, you should be pretty close then. If you still have Qubes installed
> on your HDD, try this:
> 
> -
> https://www.qubes-os.org/doc/uefi-troubleshooting/#accessing-installer-rescue-mode-on-uefi
> - it will tell you where it mounted your HDD, think it's /mnt/sysimage
> - cd /mnt/sysimage/boot/efi/EFI/qubes
> - ls should list xen.cfg, nano it
> - do steps 11 & 12 in
> https://www.qubes-os.org/doc/uefi-troubleshooting/#cannot-start-installation-installation-completes-successfully-but-then-bios-loops-at-boot-device-selection-hangs-at-four-penguins-after-choosing-test-media-and-install-qubes-os-in-grub-menu
> 
> If that doesn't help, reboot into Rescue mode and nano xen.cfg again.
> Remove those mapbs and noexitboot lines, then add efi=attr=uc to the end
> of each options line (step 5 for "3.2" in
> https://www.qubes-os.org/doc/uefi-troubleshooting/#system-crashrestart-when-booting-installer).
> 
Thanks, applying steps 11 and 12 as suggested was the answer.

The hardest part was figuring out how to reach a GRUB menu from UEFI, as
it turns out. I might suggest a change to the webpage you linked so that
the  "Accessing installer Rescue mode on UEFI" section is elevated to an
NB: at the top rather than the bottom of the page.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94ba99e2-f7cb-fb01-7f96-5dd78447386b%40disroot.org.