Re: [qubes-users] Re: Qubes R4.0.2-RC2 Custom Partition Fresh Install Issue
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2019-11-07 8:59 AM, Rafael Reis wrote: > It's done! > > https://github.com/QubesOS/qubes-doc/pull/881 > > Glad to help. Added a TODO note on the pull request to, in the future, add > instructions for GPT / UEFI Installations. I ran into this issue. Did the > whole thing which implies a MBR disk (step 2) and couldn't boot afterwards. > Had to redo the disk initialization from a Live CD to GPT, and figure out > the different mount points and filesystems for /boot/efi . I could propose > instructions but I'd rather have someone more experienced review it. > > Rafael > Thank you! - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3E7/wACgkQ203TvDlQ MDAjmg/9HGJCpsPR8JnYZjO8v+UjCJsSQzkeINhePluOwrrqKIGTIWQt1HnjVRV/ 3xNqjjkjybpn2ojsaRigk5RwxXJe2tMpWtO/hB9EBKO8y5RZ3Vmy0cyNyrwiAHa9 mHAMtZJgSkpUViYXgyMj5t438SRNuqfEfyK+nXQwQ1iUAMYiVyV22sSiT9vziCVE 1sNQfJQjtNtVW4D6mXo9CBHrrNyPEiTytSHX+UZ7Ls2m53O+PvTjB7cRuYjRTRFv d8TgzaEFrFGQU4H19rwJxFK5JMyBJROAn3dTn7yk1oM2vgW9XJBjGXp1hBmlY9ZV 4afokn+uM80dKOfj+oOohqxhzTF92VkMUPhB068IUUGqUYfK8l6YIO+cV5kAZS1C A4lhdKh5daauyUMk9nrhAPFz7zq9IdI3qEJa99YXC5GJgRpR1zrxzn08N8meM9lF bKRGBtmmOM6lKG/ss4jwNFUhE+ZjoBW2YTbQPQa2QC9uZeQCU/MSc2et68MkNLTI GYFxvlsrorcjPnR53Jqk+m4bhpIBp7JrCitoaE/8iLtl//Y5vtnXXq1UkePz9MVk x0Q6zyl/zzrYl/J6zEJULOOXs4kuj3LQJbCMHbvV6ycEKSzkxbCPstSVY4ZpvhRC xVQTbPYU0C93n8ggISNOxUS+sPVOY+eJbX/tFNt8oJLGptoun7E= =CKqg -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/05dc00e0-e432-9c4a-86b7-5f166fd9341c%40qubes-os.org.
[qubes-users] Re: HCL HP EliteDesk 800 G1 SFF
Good to hear, i just bought the exact same thing! On Tuesday, February 13, 2018 at 3:14:01 PM UTC-6, John wrote: > > Qubes R4 rc4 on USB 3.0 stick - no problems to report > > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/755902a1-2ec4-4a33-a651-f3132657c5c4%40googlegroups.com.
Re: [qubes-users] Qubes VPN routing
Hey Chris, Thanks for your reply. I checked presence of a gateway route with "ip route get 192.168.10.0/24" and got the output "192.168.10.1 dev eth0 src 10.137.0.10 uid 0" so I guess a route is set. I also tried calling qubes-setup-dnat-to-ns and checked connection again, but it seems like nothing happened. Do I have to run it on proxyVM (as resolv.conf is only altered in this vm)? I had another idea regarding network devices. If I list all devices with ifconfig, only eth0 and lo are shown. Keeping in mind that every AppVM has its own nat device, I looked up any net device with "cat /proc/net/dev" and then another device "vif17.0" showed up. Does this interfere with routing? Do I have to setup rules regarding this device? Regards, Supraleiter Am 05.11.2019 22:29 schrieb Chris Laprise: On 11/5/19 8:41 AM, Supraleiter wrote: Hello Guys, I have a problem concerning ipsec routing in qubes. After setup of a network providing app-vm (former “Proxy-VM”) with a strongswan client, I try to connect to a publicly available ikev2 vpn server over WAN. The client tells me that a connection is established and everything seems to work fine, but when trying to ping any host in the private subnet, nothing happens. I already tried to add following suggested iptable rules in proxyVM (despite the fact that I believe it is not necessary for the client but for a gateway): iptables -t nat -A POSTROUTING -s 10.137.0.0/24 -o eth0 -m policy --dir out --pol ipsec -j ACCEPT iptables -t nat -A POSTROUTING -s 10.137.0.0/24 -o eth0 -j MASQUERADE iptables -t nat -I POSTROUTING -m policy --pol ipsec --dir out -j ACCEPT I also tried to use “sys-net” VM as network provider as alternative to “sys-firewall” to circumvent any firewall related problem, but it does not work, too. Are there any other (maybe Qubes specific) settings I have to set up to make the proxyVM send traffic over ipsec tunnel (strongswan does not install a virtual network device)? Several config files and shell outputs are given below. Thank you very much. Hi, I'm not familiar with IPsec routing policies, but have you checked the routing table after connecting? Other VPN clients declare tunnel IPs as gateways by default, and I'm wondering if a gateway route is what's missing here. Also make sure your initial ping attempts use the subnet's IP address and not host names. And after resolv.conf is modified, you should run '/usr/lib/qubes/qubes-setup-dnat-to-ns' to setup nat for downstream VM DNS. Finally, once you get the link working, you may want to setup an anti-leak barrier in forwarding, such as what is shown in the Qubes Network Manager VPN doc (i.e. block all forwarding to eth0). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44653856099d7209e7b43c21d7de3633%40posteo.de.
[qubes-users] Re: Template based VM not updating when I install software in the template
My error. I forgot to turn off and turn on the template VM for debian-10. Once I did that and then turned on the template based vm, it came up. Sorry for the newbie mistake. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a5d52ed2-6ca3-406a-aa69-63d3970908a1%40googlegroups.com.
[qubes-users] 4.0.1RC2 KDE unusable on HP 15t laptop
I installed KDE . The installation went fine, though of course the touchscreen doesn't work (which has been written about before). The graphical interaction for blender was actually better in KDE than it was in Xfce. However... after a minute or two, the left mouse button became unresponsive, either on usb mouse or touchpad when dealing with either panels, menus, or the KDE settings tool. It seemed like there was suddenly a huge delay -- if I clicked the mouse once, then the appropriate action would eventually occur in 30 -40 seconds. During that time, there's a lot of flickering and seemingly random things being highlighted, as if there's noise in the mouse signal. The right mouse button seemed to work. The middle button worked, but the wheel did not. This occurred even when I set the compositor to xrender. I turned off sddm and turned on lightdm, which flipped me back into Xfce -- I guess you can't run kde using lightdm. It's doing fine, though again, the touchscreen isn't working. I forgot to test the touchscreen before I installed kde, so I don't know if it would work on a clean installation or not. billo -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8b872703-54a5-4928-96b2-37f7f4c0db89%40googlegroups.com.
[qubes-users] Template based VM not updating when I install software in the template
So, this is odd. I installed 4.0.2rc2 and: 1) Changed the template for untrusted: to debian-10. That seemed to work fine. 2) Went to the debian 10 template and installed Blender. That seemed to work fine -- blender will run if I invoke it from the debian-10 template terminal 3) Restarted untrusted: VM.Blender shows up in the available apps in the qubes settings. I move it to selected. It shows up in the menu. 4) Blender does not run when I choose it from the untrusted: menu. Moreover, it will not run from the untrusted: terminal. When I look at /usr/bin in untrusted:, blender is not there (and it still is there in the debian-10 template). -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/118f6758-7945-424c-b3ac-ccc14d5634bf%40googlegroups.com.
Re: [qubes-users] Bluetooth USB dongle
Thanks Francesco! On Thursday, 7 November 2019 13:53:13 UTC+2, Francesco wrote: > > > > On Thu, Nov 7, 2019 at 8:13 AM Claudio Chinicz > wrote: > >> Hi, >> >> I want to buy a Bluetooth USB to connect my PC with Qubes 4 to an ear >> phone. The device I'm considering says its compatible with Fedora and Linux >> Kernel 3.0.34, 3.2.20, 3.4 and later. >> >> Has anyone done it before? Can I use it with an AppVM created from the >> Fedora 30 Template? >> > > Yes, but not any appVM, I would use the one to which the USB controller is > assigned, that is sys-usb or sys-net, according to what you selected during > Qubes installation. Obviously it will work ONLY with what is played in > either sys-net or sys-usb. > > Will I need to change the Template and install any driver? >> > > probably not, check you BT adapter manual > > If you need to route the audio of all appVMs to BT, there is a way even if > the audio quality may decrease a bit. There are external hardware 3.5 audio > jack converters to BT. It works perfectly and they are cheap. > Best > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/58428130-311a-480c-8a6e-b8d393d32c1f%40googlegroups.com.
Re: [qubes-users] Re: Qubes R4.0.2-RC2 Custom Partition Fresh Install Issue
It's done! https://github.com/QubesOS/qubes-doc/pull/881 Glad to help. Added a TODO note on the pull request to, in the future, add instructions for GPT / UEFI Installations. I ran into this issue. Did the whole thing which implies a MBR disk (step 2) and couldn't boot afterwards. Had to redo the disk initialization from a Live CD to GPT, and figure out the different mount points and filesystems for /boot/efi . I could propose instructions but I'd rather have someone more experienced review it. Rafael Em quinta-feira, 7 de novembro de 2019 04:06:40 UTC-3, Andrew David Wong escreveu: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2019-11-06 2:44 PM, Rafael Reis wrote: > > Hey, > > > > So I was able to figure this one out on my own. > > > > The installer expects you to format filesystems prior to allocating > > the mountpoints. I honestly wasn't sure which FSes I should use. So > > i checked out what auto mode would do, and mimicked it with the > > custom created pools. As soon as I check Reformat option and choose > > the appropriate FS, the mountpoint box is whited out and I can move > > on with the installation. > > > > Maybe this step and the clarification of point 1 on my previous > > email could make it into the documentation, for improved clarity. > > > > Regards, > > > > Rafael > > > > Would you mind contributing this change to the documentation? Here is > a guide for how to do so: > > https://www.qubes-os.org/doc/doc-guidelines/#how-to-contribute > > Thank you! > > > Em quarta-feira, 6 de novembro de 2019 15:58:20 UTC-3, Rafael Reis > > escreveu: > >> > >> Hey guys, > >> > >> TLDR> Qubes Installer does not let me assign mountpoints to the > >> manually created lvm pools. (attachment) > >> > >> > >> After trying out Qubes for a while on a 64GB USB Drive, decided > >> to pull the plug and get a dedicated 256GB disk for it in my > >> laptop. Went for the custom partitioning route, to increase > >> encryption levels as > >> per:https://www.qubes-os.org/doc/custom-install/ Followed the > >> guide to the letter. Ran into the following issues: > >> > >> 1 - Step 6 says "Proceed with the installer. At the disk > >> selection screen, select:" Does that mean I should reboot and > >> restart installation? Or is there a command to resume > >> installation from the shell? Since I didn't know the command I > >> went for the reboot. > >> > >> 2 - The installer detects the luks volume, decrypts it just > >> fine. But the LVM pools although seemingly correctly created, > >> have the mountpoints options greyed out (attachment) If I set for > >> the defaults instead of the custom partitioning, it appears to > >> move with the install just fine. > >> > >> Since I'm reinstalling from scratch, I'd like to take the > >> opportunity to use the higher encryption levels instead of the > >> defaults. > >> > >> Regards, > >> > >> Rafael > >> > > > > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > > -BEGIN PGP SIGNATURE- > > iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3Dwm8ACgkQ203TvDlQ > MDCigRAAtNFoYoE9sU5TtapNwgV2ZvjxYGpBoOhCzp0YZ+TVXa0/SzLoTY0zhQVQ > iLfNGh55StiHpmAeZBx0fTy5fW2UnptkXCk55/2kBTF0i5ZFXWIdStzYut6ZAqSP > MGhcM9ewZsxbLqLXu6YOxRWt3i/J1SYjCqX/wDdemd2us3PkktN12eyMFWw97WPA > Eg1Dq91Dc7qCCEswzg78dPs58BS7oO9/OTbsJvJEjSEPReHKpEKOIjic5rNGH62r > rBPh29X9FImC30jbC/c7Ouefq8qFt+1LG11wvkUe93a84pH/D3m13MbRa/6B/jXm > w3zx86lQD2t1k2VV3du2+Zqz0HmYxUCJugfpjRuZrxTdbr8pwh0xe7NcJPXHfCPI > XY/r+JBxvMAimvYqrQjOuSVqnD3w7Ia0OqORRzSFTcjgXDwctartxclSmVdZCjVu > VNChcyOzLvu7Dh7tVZaXlslywS0DB3PmD3w6/FoQ3fdViOQMg6soNoegxEv/RxL0 > Gy9yVSRidrrNyH3wXo6XVsT/7qJVDQyxkLTpGHD/2E95qGP8QZy+M2o7tD+yNwzw > Rd5EeNaGx/gTZrXhdyXNrUPb+AokUcfoAU538q2MJMh7DQvqnYNuMsVfzPz8DtMg > 38rhnmZq3wosJuL2bC5sOzYubPkkraJBQmmEH4lS6ZlpaAATvJk= > =AD0F > -END PGP SIGNATURE- > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cf462821-6ff6-4d81-9808-dff8a928acae%40googlegroups.com.
[qubes-users] 4.0.2-RC2 minor issue when changing untrusted template, with easy fix
So, for my "untrusted" qube, I decided I wanted Debian, and I changed it in the Qubes settings. That worked fine. However, when I did that, Firefox stopped coming up when I clicked on untrusted:Firefox (though it came up fine from the terminal when I typed "firefox"). So... I went back to the Qubes Settings -> Applications and only Files and Terminal were in the "Selected" column, though "Firefox ESR" was in the "Available" column. I moved Firefox ESR into the Selected column and it started coming up. So, I gather, Firefox and Firefox extended release are not the same, and if you switch to the Debian template, you will need to change that... billo -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c4b0bdd6-8f8d-4f47-8f00-27943a3b10be%40googlegroups.com.
[qubes-users] Re: Data point: QubesR4.02-RC2 installed fine on HP laptop model 15t-da000
On Thursday, November 7, 2019 at 8:01:41 AM UTC-5, bill...@gmail.com wrote: > > Just a quick data point. Installed without a hitch on my HP laptop with > 256G SSD and a 1TB SATA (installed on my SSD only). The SSD makes it a > *lot* more snappy. > Actually that's a 15t-da000, not 5t. Bad typing... -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/292a1215-4ac5-46aa-8fd4-97f717327a89%40googlegroups.com.
Re: [qubes-users] Bluetooth USB dongle
On Thu, Nov 7, 2019 at 8:13 AM Claudio Chinicz wrote: > Hi, > > I want to buy a Bluetooth USB to connect my PC with Qubes 4 to an ear > phone. The device I'm considering says its compatible with Fedora and Linux > Kernel 3.0.34, 3.2.20, 3.4 and later. > > Has anyone done it before? Can I use it with an AppVM created from the > Fedora 30 Template? > Yes, but not any appVM, I would use the one to which the USB controller is assigned, that is sys-usb or sys-net, according to what you selected during Qubes installation. Obviously it will work ONLY with what is played in either sys-net or sys-usb. Will I need to change the Template and install any driver? > probably not, check you BT adapter manual If you need to route the audio of all appVMs to BT, there is a way even if the audio quality may decrease a bit. There are external hardware 3.5 audio jack converters to BT. It works perfectly and they are cheap. Best -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CAPzH-qBXgzW7XjUnH_mTUuvYky46NMFdq6XATnKs8f2XMiOcXg%40mail.gmail.com.
[qubes-users] Bluetooth USB dongle
Hi, I want to buy a Bluetooth USB to connect my PC with Qubes 4 to an ear phone. The device I'm considering says its compatible with Fedora and Linux Kernel 3.0.34, 3.2.20, 3.4 and later. Has anyone done it before? Can I use it with an AppVM created from the Fedora 30 Template? Will I need to change the Template and install any driver? Thanks in advance for any feed-back. Claudio -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/74ce0eb3-ca6d-4ffd-9fd4-436c6b708322%40googlegroups.com.
Re: [qubes-users] Re: Qubes R4.0.2-RC2 Custom Partition Fresh Install Issue
Rafael Reis: Hey, So I was able to figure this one out on my own. The installer expects you to format filesystems prior to allocating the mountpoints. I honestly wasn't sure which FSes I should use. So i checked out what auto mode would do, and mimicked it with the custom created pools. As soon as I check Reformat option and choose the appropriate FS, the mountpoint box is whited out and I can move on with the installation. Maybe this step and the clarification of point 1 on my previous email could make it into the documentation, for improved clarity. Regards, Rafael Em quarta-feira, 6 de novembro de 2019 15:58:20 UTC-3, Rafael Reis escreveu: Hey guys, TLDR> Qubes Installer does not let me assign mountpoints to the manually created lvm pools. (attachment) After trying out Qubes for a while on a 64GB USB Drive, decided to pull the plug and get a dedicated 256GB disk for it in my laptop. Went for the custom partitioning route, to increase encryption levels as per:https://www.qubes-os.org/doc/custom-install/ Followed the guide to the letter. Ran into the following issues: 1 - Step 6 says "Proceed with the installer. At the disk selection screen, select:" Does that mean I should reboot and restart installation? Or is there a command to resume installation from the shell? Since I didn't know the command I went for the reboot. 2 - The installer detects the luks volume, decrypts it just fine. But the LVM pools although seemingly correctly created, have the mountpoints options greyed out (attachment) If I set for the defaults instead of the custom partitioning, it appears to move with the install just fine. Since I'm reinstalling from scratch, I'd like to take the opportunity to use the higher encryption levels instead of the defaults. Regards, Rafael 1: You can go back to the graphical installer from the shell using ctrl-alt-f6 (or one of the other F-keys, I forget which one). Then click "rescan devices." But rebooting works too. 2: I haven't quite figured out the Qubes/Fedora installer yet. It seems it won't touch any filesystem it didn't format itself, so you always have to let the installer format it. Looks like you figured that out. This is, for example, why you can't use custom cryptsetup options and btrfs at the same time - the installer refuses to install to an existing filesystem, but it also won't let you create btrfs on dm-crypt. Glad to hear you got it working. - This free account was provided by VFEmail.net - report spam to ab...@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/39c449ac-4582-80de-f3e8-ff6bbbe7b53a%40vfemail.net.