[qubes-users] Re: second sys-usb
Did you click on "configure strict reset for pci devices" in the devices settings of both VMs? Thats all i can think of. On Friday, November 29, 2019 at 11:50:47 AM UTC-8, haaber wrote: > > Hi there, I re-ask my problem differently. For flashing with unsecure > software via usb, I would like to exchange sys-usb temporarily with a > sys-flashing, say. I set up a debian-10 appvm in HVM mode and gave it > access to the usb-controller (as my true sys-usb). However, this qubes > will not start: > > "internal error: unable to reset PCI device :00:14.0: no FLR, PM > reset or bus reset available. " > > anyone knows what that means, please? > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1ef33ff5-d62c-43d9-ba44-7c843a4bd7ae%40googlegroups.com.
Re: [qubes-users] What's the logic behind many similar templates?
tetrahedra via qubes-users: By default Qubes comes with two templates for AppVMs: a Debian template and a Fedora one. But many people seem to clone templates, so they also have an e.g "fedora-minimal" template or a "-multimedia" one or any number of other variations. Why not just have "one template to rule them all" for each distribution (Fedora and Debian)? Smaller attack surface/faster. If you want to do this you might want a squid caching proxy to pass updates from a VM, through the proxy, to your previous update VM. https://github.com/rustybird/qubes-updates-cache You can have less network usage, it seems to work well. Read the security considerations, and the code if you are really serious. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44525d96-e13a-a0c5-db9f-627213d06ab4%40tt3j2x4k5ycaa5zt.onion.
Re: [qubes-users] Fedora 29 has reached EOL
On Fri, Nov 29, 2019 at 11:58:03PM -0600, Andrew David Wong wrote: No, those were not related to EOL. P.S. -- Please do not write to both lists. Ok thanks. Sorry for sending to both, I hit "reply all" and didn't look at the result. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191130065248.GB3966%40danwin1210.me.
[qubes-users] What's the logic behind many similar templates?
By default Qubes comes with two templates for AppVMs: a Debian template and a Fedora one. But many people seem to clone templates, so they also have an e.g "fedora-minimal" template or a "-multimedia" one or any number of other variations. Why not just have "one template to rule them all" for each distribution (Fedora and Debian)? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191130061640.GA3966%40danwin1210.me.
Re: [qubes-users] Fedora 29 has reached EOL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2019-11-29 8:37 PM, tetrahedra via qubes-users wrote: > On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote: >> Please note that no user action is required regarding the OS >> version in dom0. For details, please see our Note on dom0 and >> EOL. [6] > > There have been a lot of dom0 updates recently. Is this related to > EOL? > No, those were not related to EOL. P.S. -- Please do not write to both lists. - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3iBOoACgkQ203TvDlQ MDA47BAAqt7XyFShvwZzJbO96/dhkjEzsh8xBdeFjG6Dw0uBsX0Xs1yzJaXJ3cnE X1Jfyajl1TiBd0CRm2NrV1NKhEmpkavHkPV+SnLHfKBZX8JemJDv1b7TZeZCzA0I NJSl913h9oMOpAwu1uwHc7hhb2XjSy/SB8mPq/O3UMrv+fBRP5wd7OpDb9Pt20Vx XHYCIEj/6ptYyWMc6gXIpIWkXNm6aJLMyNZgb/paHq7AJKnwjNUGmSIAwXWpDByM 4BepGWA+tcym52UUgDq9qvtNR4r0h0jjM4SvBIkvI2honJj0o6Qty7KsnwrPe1cs C+6vYwDr4eQb+XuoJWBQj2xcgFrCRN0qutGvzmTmlBAntkNrdrlBA1QF1lm47+O1 C4wrxeWnTYvFHxGyc1h8cNpEsKkT8Q9AZI4t+IOnQDdu8gg6mChHfD30yFUYPcUS tpGiR7Iw2Akm2j/yga6Y14TrXEYO3sxQ5LuIRaxOAdwdOE3q8uyQpFwlnE4o97Uv UXc0BFS8jW30qbMYURu5JcvVcF0rz/1iTj/N24GOS5HQGpUQ7rdkCK0btVrvYNFg oDGoltJdRNiirfwtKIkWqYpXu9yttusDpjMdmLOVxKva8N0R46C5ie8hfaGGmy7+ O938WOqxDrysyltBBdEH96zZjU8fzArgGQsCM3bAcRMSl1P4KoM= =TL56 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6aca4332-ad5c-83a3-ef0e-93a772fdb110%40qubes-os.org.
Re: [qubes-users] Fedora 29 has reached EOL
On Fri, Nov 29, 2019 at 04:17:39AM -0600, Andrew David Wong wrote: Please note that no user action is required regarding the OS version in dom0. For details, please see our Note on dom0 and EOL. [6] There have been a lot of dom0 updates recently. Is this related to EOL? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191130023731.GA3570%40danwin1210.me.
Re: [qubes-users] Re: Shutting down a VM when applications close
On Fri, Nov 29, 2019 at 11:03:49AM +, lik...@gmx.de wrote: On 2019-11-27 12:52, tetrahedra via qubes-users wrote: DispVMs shut down automatically when the launched application closes. Is it possible to enable this for certain applications in certain AppVMs as well? For example I may not want my "resource-heavy-apps-vm" to keep running after MemoryHungryApp closes, because that ties up half my system RAM. How would I configure "resource-heavy-apps-vm" to shutdown automatically when MemoryHungryApp closes? You could also use a feature of qubes to shutdown a VM after a certain time. You can find steps to enable it to a particular vm in this thread: https://groups.google.com/forum/#!topic/qubes-users/lyABSZGmKdM Now it also works for debian templates. Great! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191130015932.GA3362%40danwin1210.me.
[qubes-users] Failed to get initiator name from iscsi firmware
Hello, I'm trying to install Qubes 4 on an XMG P407 laptop. Unfortunately I get the error "failed to get initiator name from iscsi firmware", coming from here: https://github.com/fepitre/qubes-installer-qubes-os/commit/2ee1f1ad93d0e51cb264aefdb3d6147223136eb7 Reading Reddit it seems like P407 should work: https://www.reddit.com/r/Qubes/comments/be38ee/what_is_the_best_laptop_for_qubes_os/ I have installed Qubes previously on another laptop (Gigabyte) and it works fine. However trying to reinstall it on that laptop now just for testing also gives me the same error. What does work is installing Qubes on my desktop computer, but that is not my goal... Any pointers? Best regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5dc5c666-fa9b-459e-8f2c-36766e9d3f21%40googlegroups.com.
[qubes-users] Problem installing Qubes on two laptops
Hello, I'm trying to install Qubes 4 on an XMG P407 laptop. Unfortunately I get the error "failed to get initiator name from iscsi firmware", coming from here: https://github.com/fepitre/qubes-installer-qubes-os/commit/2ee1f1ad93d0e51cb264aefdb3d6147223136eb7 Reading Reddit it seems like P407 should work: https://www.reddit.com/r/Qubes/comments/be38ee/what_is_the_best_laptop_for_qubes_os/ I have installed Qubes previously on another laptop (Gigabyte) and it works fine. However trying to reinstall it on that laptop now just for testing also gives me the same error. What does work is installing Qubes on my desktop computer, but that is not my goal... I've had this "name from iscsi" error before but cannot figure out how I solved it last time. I'm grateful for any help! Best regards -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/233bbbdd-8cd6-44e0-8458-f4669defe846%40googlegroups.com.
Re: [qubes-users] attach /dev/ttyUSB0 to some qube
On Thursday, November 28, 2019 at 5:10:43 PM UTC-5, awokd wrote: > > haaber: > > Hi, I try to play with an programmable esp32 (pretty much like arduino, > > but with wireless on board). The problem I have arises from sys-usb: the > > usb widget spills out the odd error "QubesException - device attach > > failed: no device info received. Connection faild. Check backend for > > details". No clue what that means. In sys-usb this device appears as > > /dev/ttyUSB0 . What do I have to do to attach that successfully to a > > "esp-flashing qube" that I specially designed for that? Cheers! Bernhard > > > Try using qvm-usb instead. If that doesn't work, try using it directly > from sys-usb (which is not ideal). > > -- > - don't top post > Mailing list etiquette: > - trim quoted reply to only relevant portions > - when possible, copy and paste text instead of screenshots > Greetings, I find this usb-sys or usb QVM discussion very interesting; however, I am a bit lost in your discussion as my computer recognizes usb devices, yet I don't know what type of security settings is included in the OS point version. So, in order to practice what you're describling, I would need to know what are the parameters. I just need to figure out how to create a sys/VM that reads USB drives, while keeping the drive, domO, Temps/standalone, safe. How would you create a sys for USBs (files, apps, etc) ? sys USB mouse(if needed)? (currently works, but I don't see sys-usb in the drop down menu, but is it safe?) sys USB biometric reader? (potentially a way to speed up logins or temperature readings) thanks, -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/39adaf61-9733-4e54-8b37-99d6975c4f24%40googlegroups.com.
[qubes-users] Re: cannot reinstall qubes, wont recognize freespace
me too i am trying to install qebes from youtuybe and qubes instructions and my flashdrive wont shgow up in windows anymore , why cant i get rid of your software on my flash disk , its the latest version and the install image on the drive bugs out at language selection . ie useless to me like ubuntu so far , please inform windows users how to reformat and recover their writable media on usb . the system is too bugged to install on amd phenom tripple core with ssd and 6gb ram . I rather want to try next year so there is time to work around this buggy install media . help On Wednesday, June 15, 2016 at 10:58:28 PM UTC+2, boromi...@sigaint.org wrote: > > Im trying to reinstall qubes since the stupid users guide instructed me to > brick my installation, but now when i go to install it will recognize my > disk but it wont recognize the freespace on it. > > When i first got my usb it was preformatted as fat32, qubes would > recognize it but say it has no reclaimable space, so i deleted the > partition and tried it again, it worked and it recognized the free space > so i was able to install. > > Now that qubes has already been installed on it once this no longer works. > Ive recreated partitions on it and then wiped it clean and then deleted > the partition and it still wont recognize it. Ive used the kingston repair > tool and that only sets it back to FAT and then qubes wont recognize it > for some reason. Over and over again for hours now and it wont let me > reclaim it. > > Qubes disk selection area gives an option to reclaim space but it wont let > it, it says 0 reclaimed and 0 used and it shows the full disk space. This > is rediculous, when i install windows it will let me create and delete > partitions but there is no such tool on qubes and it refuses to do > anything under any condition. This is a brand new USB there is no reason > why this should not be working. > > So what do i do now? What magical setting does my usb need to be formatted > with to get qubes to install on it? > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c82bd860-4ce8-40e3-9eb8-f2fdf2981838%40googlegroups.com.
[qubes-users] How to get newer Xen versions on R4.0?
Is there any way to get a newer Xen on the R4.0 series? Short of building it myself, that is. Current-testing and unstable both appear have the newest at 4.8.5-13 (current is 4.8.5-12), despite R4.1 being on Xen 4.12. Does Qubes receive updates for newer versions of Xen? Or is the Xen version locked in with the Qubes minor version? BTW, I noticed 4.8 is going to lose security support at the end of this month? https://wiki.xenproject.org/wiki/Xen_Project_Release_Features - This free account was provided by VFEmail.net - report spam to ab...@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1fdd6d16-b3cd-9ff2-46eb-76a9d059bc12%40vfemail.net.
[qubes-users] second sys-usb
Hi there, I re-ask my problem differently. For flashing with unsecure software via usb, I would like to exchange sys-usb temporarily with a sys-flashing, say. I set up a debian-10 appvm in HVM mode and gave it access to the usb-controller (as my true sys-usb). However, this qubes will not start: "internal error: unable to reset PCI device :00:14.0: no FLR, PM reset or bus reset available. " anyone knows what that means, please? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8abeae9d-1f98-e716-6280-210a76ce2add%40web.de.
[qubes-users] IKEv2 vpn still not working in proxyVM
Hello again, Based on my last question about ipsec routing in Qubes, I’ve done additional research but still coud not get my vpn to work. The vpn client is a strongswan ipsec client, I want to connect the machine to my workplace LANCOM router using plain IKEv2 and certificate based authentication. First, I installed my vpn setup in a standard Debian environment on a test machine without using qubes. This worked perfectly fine and I had nothing to do more than just copy the certificates and the configuration scripts ipsec.conf and ipsec.secrets. The next step was to install strongswan on a proxy vm exactly the same way as before. As qubes vms uses nat-based networking, I setup port forwarding for udp port 500 from sys-net to sys-firewall to proxy-vm as described here: https://www.qubes-os.org/doc/firewall/#port-forwarding-to-a-qube-from-the-outside-world Unfortunately, this obviously didn't work. After the connection has established, virtual ip address 192.168.10.205 was assigned, as well as two new dns server adresses 192.168.10.1 and another one. I ran configuration script /usr/lib/qubes/qubes-setup-dnat-to-ns, created a new disposable vm using proxy-vm as network provider and tried connecting to a random website and ping 192.168.10.1. Both did not work. A ping to 8.8.8.8 surprisingly succeded, though. So my question is: Which extra steps do I have to do to make vpn working in a proxy-vm? I am not using a network manager plugin because strongstran plugin version does not establish a connection and seems buggy. The current version is very old and seems to not support the network manager version installed in qubes. Does anyone have managed to succeed in installing an ipsec vpn with qubes? It is really important for me as my boss is getting seriously impatient with me (I try to setup vpn with many different machines since half a year. At least i managed to get the router, windows clients and standard linux clients to work, but qubes is very important to him). Thank you very much for help. Supraleiter -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e378fe5a932bb27ef8f8ec397f1d40c8%40posteo.de.
[qubes-users] Re: Qubes' Thunderbird Add-On
On 11/28/19 1:57 AM, cubit wrote: > With the recent upgrade to Thunderbird 68.2 and the depreciation of old > style add-ons. Are there any plans to bring back the Qubes Add-on to allow > opening of email in dispVM as needed/by default? > > Cu- > whoops, I just saw this after I posted same question, guess I still don't know how to use thunderbird gmane search correctly :) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d01364eb-9909-10ff-35fb-ba169dd8ce55%40riseup.net.
[qubes-users] thunderbird qubes add-on
Hello, using Debian-10 as my template with Thunderbird 68.2.2, I no longer have the Qubes integration add-on, so can't 'open attachements in DVM' directly. How would I go about getting back the qubes integration or is this a 'known issue' etc and just wait ? recce -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/420dcec7-cfb3-476e-2d31-14c64f74c86b%40riseup.net.
[qubes-users] Re: Shutting down a VM when applications close
On 2019-11-27 12:52, tetrahedra via qubes-users wrote: DispVMs shut down automatically when the launched application closes. Is it possible to enable this for certain applications in certain AppVMs as well? For example I may not want my "resource-heavy-apps-vm" to keep running after MemoryHungryApp closes, because that ties up half my system RAM. How would I configure "resource-heavy-apps-vm" to shutdown automatically when MemoryHungryApp closes? You could also use a feature of qubes to shutdown a VM after a certain time. You can find steps to enable it to a particular vm in this thread: https://groups.google.com/forum/#!topic/qubes-users/lyABSZGmKdM Now it also works for debian templates. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c22daf1f-7b83-1716-e5b9-2c1b483f1941%40gmx.de.
[qubes-users] Fedora 29 has reached EOL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Qubes Community, Fedora 29 has reached EOL (end-of-life). [1] We strongly recommend that all Qubes users upgrade their Fedora 29 TemplateVMs and StandaloneVMs to Fedora 30 immediately. We provide step-by-step upgrade instructions for upgrading Fedora TemplateVMs. [2] For a complete list of TemplateVM versions supported for your specific version of Qubes, see the Supported TemplateVM Versions page. [3] We also provide a fresh Fedora 30 TemplateVM package through the official Qubes repositories, which you can install in dom0 by following the standard installation instructions. [4] After upgrading your TemplateVMs, please remember to switch all qubes that were using the old template to use the new one. [5] Please note that no user action is required regarding the OS version in dom0. For details, please see our Note on dom0 and EOL. [6] [1] https://fedoraproject.org/wiki/End_of_life [2] https://www.qubes-os.org/doc/template/fedora/upgrade/ [3] https://www.qubes-os.org/doc/supported-versions/#templatevms [4] https://www.qubes-os.org/doc/templates/fedora/#installing [5] https://www.qubes-os.org/doc/templates/#switching [6] https://www.qubes-os.org/doc/supported-versions/#note-on-dom0-and-eol This announcement is also available on the Qubes website: https://www.qubes-os.org/news/2019/11/29/fedora-29-eol/ - -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl3g8EEACgkQ203TvDlQ MDB6DRAApKyBdyl3iFnnF34u8f1zpgYcC7569tv4CztoZpHVyvfS9p9L8oLUjySo Xqa+fXDJhOs51VGY7ixyZXL6pwg5aU9Icc7M6pfjLb3lu/4dAjauOvylkmPBNFNN fg+U/bAiL/GX4mEdrQBq9bzJWLHWEw2aexbncXoZ4YmYbRXsg5g16CFHivJrtwQG 6l0/4NT+KaYnJbhX8p2p8FnNX41nL7IYXu5/fNDLPIu+6z8OK2FQsHpQmU6h4+ZY fdRix/wG/SSASDu2I3vfxBI7Bz8htOfcOrLyJHgKT55Y1vzdfXjpLB4bgGjvnXBf gk3x8vMjibKgBm+Gc4w7N57HRxGBfCxpWGfUGMbk9q+OHVTv+GpFLo5Zt5rHhYUE D+xHP/TnnGv21TnKpNrG5XNRF6PnbmROv2rixl1aOrU6w5hyCO9kAA2PrZfrANIk vxd5il2y9LZx5CUOdb/XR86g90NwHbR9B2/BZtVmGciiNO8mavQNABVt5/T4a/R9 935XQA1MgrSfSCPxGrSw+C0NmMHNYQ0QvBvr4lOeggdI9y2WfMcdyItcXbSts3gA jWG9WkOldlVj8VD1Wz9DBImyJf5JWlobEnp1YvCYe3ufqTleqXHhX3zvC7mX1p4B bqRgNvYSJQpqh2z5GZB/v4RcUjeFbikj/cMvcWLAoFJiFdoXL/s= =dhPh -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6188c25a-9edf-8b95-586f-e06e7733e92c%40qubes-os.org.