Re: [qubes-users] Debian 10 Minimal and qubes-gpg-split

2020-01-13 Thread unman
On Sun, Jan 12, 2020 at 11:57:34PM +, 'awokd' via qubes-users wrote:
> "Apt install qubes-gpg-split" wants to pull in 120 packages. Even with
> --no-install-recommends, it's still 23 packages including aspell,
> emacsen-common, a couple gstreamer libs, zenity, etc. Why are these
> required for gpg-split, and is there a way to trim them down further?
> 

iMost of it is zenity, which is a dependency and pulls in libwebkit2gtk, and 
*that*
pulls in most of the rest.
There's an open bug about the "stupid" zenity dependencies.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200114021636.GC23819%40thirdeyesecurity.org.


Re: [qubes-users] Re: Why does Qubes with XFCE use Gnome programs?

2020-01-13 Thread unman
On Mon, Jan 13, 2020 at 07:38:47AM -0800, trueriver wrote:
> Hi Defiant
> 
> Slightly off topic but this might be useful for you.
> 
> In my view, and this is purely personal, there is a slightly more coherent 
> feel to working under Debian templates anyway. In part that is because even 
> the full Debian template is less filled out than the fedora one, so that 
> forces you to be in more control of what software the template contains. So 
> my suggestion would be to go over to Debian, including thunar as the file 
> manager. As shroobi says, to get the qubes-specific exensions you need to 
> install the relevant .deb in the Debian template. 
> 
> Note also that the full Debian template, out of the box, does not support 
> sys-net -firewall -usb. If you want to do that, then add the packages 
> suggested in the docs that the Debian minimal template needs to support 
> those VMs. Some of the packages are already installed, but apt is clever 
> enough to tell you and skip over those, so its easier to "install" the lot 
> than figure out which ones are missing. 
> 
> On Sunday, 12 January 2020 22:59:54 UTC, qtpie wrote:
> >
> > Defiant: 
> > > Hello. 
> > > 
> > > I've a question about the Qubes default desktop setup. Basically, the 
> > > latest Qubes is running XFCE desktop environment, but I've noticed 
> > > certain default programs are actually from Gnome. I find those 
> > > particularly difficult to use. 
> > > 
> > > I was wondering why not use the XFCE equivalents of these programs 
> > > instead? For example, Qubes uses Nautilus (gnome files) as the default 
> > > file manager, but there is an existing XFCE file manager called Thunar 
> > > available. The other example I found is the current default text editor. 
> > > 
> > > Would it be a good idea to replace these with XFCE equivalents? 
> > > 
> > > I did a quick test installing Thunar and it seemed to work fine. 
> > > Although one thing I noticed is that certain functions like the "Open in 
> > > disposable VM" in right-click menus were missing. 
> > > 
> >
> > This is because of the separation between dom0 and domU. dom0 is created 
> > by the Qubes team and they chose XFCE as a window manager. Apps like 
> > thunar and nautilus run in a domU, based on a template that you control. 
> > There is no official Fedora flavour with XFCE and the default one uses 
> > GNOME so that is why you get XFCE with GNOME apps. But since you manage 
> > it, and you already started to do this, you can easily XFCEify your 
> > fedora template by installing the XFCE apps and changing the shortcuts 
> > in the Qubes start menu. 
> >
> >
> 

> Note also that the full Debian template, out of the box, does not support
> sys-net -firewall -usb.

This isnt (shouldnt be true). You should be able to just drop in a Debian qube 
to fill
all these roles, bar any necessary firmware. What packages are missing?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200114020515.GB23819%40thirdeyesecurity.org.


Re: [qubes-users] Xen Orchestra installation on Qubes-OS possible?

2020-01-13 Thread n1ete


Am Montag, 13. Januar 2020 17:18:31 UTC+1 schrieb steve.coleman:
>
> On 2020-01-13 09:50, n1ete wrote: 
>
> > I recently played with xcp-ng in my lab and discovered the "Xen 
> > Orchestra Unified Appliance". its an xen-ready vm to manage and 
> > orchestrate xcp-ng backends. 
> > 
> > is it possible to deploy the disk image on qubes aswell? this would be 
> > realy great, since i dont have a free xen-hypervisor in my lab, but 
> qubes. 
>
>  From reading the docs, I don't think you can do both Qubes and the "Xen 
> Orchestra" (XO) simultaneously. Both apparently need to be on the bare 
> metal and in control of the hardware. XO requires a webserver running on 
> dom0 to control XenServer and Qubes denys any apps with network access 
> by design. They are intended for different audiences. Qubes purpose is 
> security, XO's is not. 
>
> You could however investigate a dual-boot configuration in which you 
> choose which system to boot at any point in time, but you would need a 
> lot of extra disk space to support that. 
>
> For testing purposes you can simply install XO on a USB stick and use 
> the BIOS boot menu to boot and play with XO, but I would strongly 
> caution you against trying to mix the two. They are intended for two 
> very different purposes and their architecture is quite different even 
> though they both use Xen under the hood. 
>
> The question I would ask is why do you feel you need a webserver to 
> control your guest VMs? Perhaps you like the fancy graphing and 
> statistics displays? What exactly is your goal, because there may be a 
> way to add those specific capabilities while retaining the security of 
> the system that Qubes is designed to protect. 
>
> Steve 
>

Thanks for your help Steve, 


The whole xoa web managment gui is optional and runs fully isolated in an 
vm, therefore it can be run for example (and thats how i want to use it) on 
your mobile workstation to manage remote headless xen-servers all arround 
the globe. ;)

meanwhile i found out that the "XOA managment appliance" is based on debian 
buster and can be build from sources or converting the provided .xva image
After converting the ready xva file to whatever i need (ova vmdk qcow etc.) 
or compiling it, it can then be used on a lot of vm-solutions. 

i have already a smartos cluster running and using it as my main 
hypervisor, managed by ansible/terraform playbooks via cli and i think 
smartos is the only hypervisor i will ever need for enterprises and 
homelabbing.
for now i just wanted to try and play with a new hypervisor and its tools  
and installed xcp-ng with xoa on a small intel nuc with 8gb of ram wich was 
half used without running anything on it. Thats why tried to save 2gb on 
the machine and running it without the xoa.
thanks again for your help
cheers

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/770852b5-04a0-4613-9dda-38bafc7ceb48%40googlegroups.com.


Re: [qubes-users] Debugging a sleep/suspend problem on Razer Blade Stealth 2016 - Qubes

2020-01-13 Thread Abel Luck
Hi there,

I'm debugging similar resume issues, though on different hardware. 
Hopefully you don't mind if we share tips in this thread.
 

> > I couldn't find anything related to those acpi devices. I thougth first 
> that there was a driver for
> > them, so I should just rmmod those drivers before sleep and insmod when 
> wakeup, but couldn't find
> > anything. There's this issue 
> https://ubuntuforums.org/archive/index.php/t-2393029.html which have
> > those exact hash matches, but no answer.
>
> I don't know a lot about pm_trace, but it seems like there might be a 
> problem decoding the hash.
> Normally it should show you a PCI address, /sys device name, driver name, 
> or something more
> specific (see example in link below).
>
> According to s2ram kernel documentation:
>
> If no device matches the hash (or any matches appear to be false 
> positives), the culprit may be a
> device from a loadable kernel module that is not loaded until after the 
> hash is checked. You can
> check the hash against the current devices again after more modules are 
> loaded using sysfs:
>
> cat /sys/power/pm_trace_dev_match
>
> https://www.kernel.org/doc/html/latest/power/s2ram.html#using-trace-resume
>
> However, in qubes we may also have the opposite problem. Qubes takes over 
> your network cards and
> sometimes USB controllers in early userspace, so the drivers are not 
> available anytime. To disable
> this behavior for USB controllers, remove rd.qubes.hide_all_usb from the 
> kernel cmdline. For
> network cards it's a little more complicated.
>
> You can try modifying the qubes initramfs hook. First, make sure there are 
> no VMs configured to
> start automatically at boot. Move 
> /usr/lib/dracut/modules.d/90qubes-pciback/ to your home
> directory, or open the qubes-pciback.sh file and comment out the last 9 or 
> so lines (from "for dev
> in $HIDEPCI"). Rebuild the initramfs. Then, do the pm_trace again as you 
> did before. Then, try
> pm_trace_dev_match as described in the link above.
>
> It might give you better information about the problem device, or it might 
> just give you the same
> info as before, but it's something to try.
>
> If it doesn't work, don't forget to put that file back how it was, and 
> rebuild initramfs again.
>

Thanks for this tip. Using this method I was able to get a "hash matches" 
line in my dmesg whereas before I didn't get one.

I am also debugging a suspend resume issue but with a Asus z390 I Aorus Pro 
Wifi motherboard on a desktop (and an nvidia gpu unfortunately).

Some interesting facts:

1) the pci device that matched was "INT34B9:00". I can't really find 
much info about what this device is, it doesn't correspond to anything 
under lspci. /sys/bus/acpi/devices/INT34B9:00/uid contains the value 
"SerialIoUart1"

2) suspend and resume works when I execute "echo mem > /sys/power/state". 
However when I execute the suspend from xfce or run systemctl suspend, the 
resume fails (with a black screen but the keyboard lights up).
 

> > I also tried `pcie_aspm=force` on `/boot/efi/EFI/qubes/xen.cfg` (is this 
> where I put kernel
> > parameters?) like this:
>
> Yes on R4.0 you use xen.cfg. On other releases, you use /etc/default/grub. 
> Unfortunately I don't
> know anything about ASPM so you probably know more than I do.
>

I also don't know much about ASPM, but I noticed my bios had a section for 
"Active State Power Management" which was disabled, I enabled it (and the 
sub-options that appeared) but still haven't had luck.


> If anyone has other debug ideas, I'm very thankful!
>
> Just some general tips: try kernel-latest, and Qubes R4.1, if you haven't 
> yet.
>

I'm still on 4.0, how does one try 4.1 without a full re-install?
 

> Also make sure your
> firmware is up to date. If your machine has a dGPU, disable it in BIOS.
>
> It doesn't sound like the CPUID Xen panic I had on my machine, but you 
> could try the Xen patch
> anyway, if nothing else works. In my case, only the fan came back on, but 
> not the screen backlight
> or anything else.
>
> I also had to pin dom0 to CPU 0 to fix a different problem (my SATA 
> controller was broken after
> resume). Add the following to your Xen cmdline ("options=", not 
> "kernel="!): "dom0_max_vcpus=1
> dom0_vcpus_pin"
>
>
Will give these a try.

I have both iwlifi and nouveau, which are definitely top suspects however 
they haven't given me any issues and so far no evidence points to them 
being responsible.

~abel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47fbbab7-4fff-41fd-b5ea-21ca1ede668b%40googlegroups.com.


Re:[qubes-users] Xen Orchestra installation on Qubes-OS possible?

2020-01-13 Thread Steve Coleman

On 2020-01-13 09:50, n1ete wrote:

I recently played with xcp-ng in my lab and discovered the "Xen 
Orchestra Unified Appliance". its an xen-ready vm to manage and 
orchestrate xcp-ng backends.


is it possible to deploy the disk image on qubes aswell? this would be 
realy great, since i dont have a free xen-hypervisor in my lab, but qubes.


From reading the docs, I don't think you can do both Qubes and the "Xen 
Orchestra" (XO) simultaneously. Both apparently need to be on the bare 
metal and in control of the hardware. XO requires a webserver running on 
dom0 to control XenServer and Qubes denys any apps with network access 
by design. They are intended for different audiences. Qubes purpose is 
security, XO's is not.


You could however investigate a dual-boot configuration in which you 
choose which system to boot at any point in time, but you would need a 
lot of extra disk space to support that.


For testing purposes you can simply install XO on a USB stick and use 
the BIOS boot menu to boot and play with XO, but I would strongly 
caution you against trying to mix the two. They are intended for two 
very different purposes and their architecture is quite different even 
though they both use Xen under the hood.


The question I would ask is why do you feel you need a webserver to 
control your guest VMs? Perhaps you like the fancy graphing and 
statistics displays? What exactly is your goal, because there may be a 
way to add those specific capabilities while retaining the security of 
the system that Qubes is designed to protect.


Steve

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d7dae92e-1ad2-adc4-1188-45cdbe15dc05%40jhuapl.edu.


Re: [qubes-users] Re: Qubes OS 4.0.2 has been released!

2020-01-13 Thread trueriver


On Friday, 10 January 2020 01:16:58 UTC, Marek Marczykowski-Górecki wrote:
>
>
> No, it doesn't affect security. It simply crashes (and reboot). If it 
> works on your particular hardware, then you're lucky and should be safe 
> to continue using it. 
>
>
I got through install, and had problems restoring from backups. Those 
problems were
not cnsistent, but included

- sometimes the machine crashed without warning
- complaints from the backup process that a "file list" was missing
- creating space on the LVM for the restored machines but then announcing 
BOTH
 in green that the restore had worked AND in red that it failed
- on exactly one occasion actually working

I am guessing that the critical bug is one that is timing dependent in some 
way, and in fairness
to your testers those are the hardest ones to spot as they depend on the 
hardware, on the
day of the week, and possibly the conjunction of Mercury and Mars...

Anyway, after a thorough test of my drive, and on similar symptoms 
appearing on a second
machine, I reverted to rc3 and those problems resolved.

Let me know if you would believe it would be useful to add these comments 
to the -issues
facility:  I won't unless you ask

Warmly
R~~
Those problems went away 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8e672e67-28e5-429e-954b-e21b75e83389%40googlegroups.com.


Re: [qubes-users] Qubes booting in machine with Windows and Linux

2020-01-13 Thread trueriver


On Tuesday, 12 November 2019 17:40:13 UTC, Charles Peters wrote:
>
> ...
> You can reinstall grub to the master boot loader using the OS which 
> originally controlled grub, (ie, something like grub-install /dev/sda". then 
> regenerate the grub menu with "update-grub".  Or you can modify the grub 
> settings in qubes to provide the menus you want.
>
>
This does not work, because the standard Linux grub-install and grub-update 
commands rely on the existence of grub.cfg to pick up each target system.

The way I "solved" it was to leave the machine booting into grub by 
defualt, but to bring up the boot menu when I wanted Qubes. This has a 
slight security-by-obscurity advantage in that it is good for demonstrating 
that this is a fully working system, witout making the presence of Qubes 
obvious to a casual check. However, as with all s-by-obs its no defence 
against expert opposition!

I continue to seek a full solution, especially as one of my machines 
refuses to bring up the boot menu: manufacturer advice is to select an 
alternative boot target before closing down windows 10. Happily my machine 
has not had W 10 since half an hour after I unboxed it... and that is the 
hidden flaw (for some hardware systems) with Rafael's suggestion.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2b802b90-3f25-4bce-b31f-a1c7a8760446%40googlegroups.com.


[qubes-users] Re: Why does Qubes with XFCE use Gnome programs?

2020-01-13 Thread trueriver
Hi Defiant

Slightly off topic but this might be useful for you.

In my view, and this is purely personal, there is a slightly more coherent 
feel to working under Debian templates anyway. In part that is because even 
the full Debian template is less filled out than the fedora one, so that 
forces you to be in more control of what software the template contains. So 
my suggestion would be to go over to Debian, including thunar as the file 
manager. As shroobi says, to get the qubes-specific exensions you need to 
install the relevant .deb in the Debian template. 

Note also that the full Debian template, out of the box, does not support 
sys-net -firewall -usb. If you want to do that, then add the packages 
suggested in the docs that the Debian minimal template needs to support 
those VMs. Some of the packages are already installed, but apt is clever 
enough to tell you and skip over those, so its easier to "install" the lot 
than figure out which ones are missing. 

On Sunday, 12 January 2020 22:59:54 UTC, qtpie wrote:
>
> Defiant: 
> > Hello. 
> > 
> > I've a question about the Qubes default desktop setup. Basically, the 
> > latest Qubes is running XFCE desktop environment, but I've noticed 
> > certain default programs are actually from Gnome. I find those 
> > particularly difficult to use. 
> > 
> > I was wondering why not use the XFCE equivalents of these programs 
> > instead? For example, Qubes uses Nautilus (gnome files) as the default 
> > file manager, but there is an existing XFCE file manager called Thunar 
> > available. The other example I found is the current default text editor. 
> > 
> > Would it be a good idea to replace these with XFCE equivalents? 
> > 
> > I did a quick test installing Thunar and it seemed to work fine. 
> > Although one thing I noticed is that certain functions like the "Open in 
> > disposable VM" in right-click menus were missing. 
> > 
>
> This is because of the separation between dom0 and domU. dom0 is created 
> by the Qubes team and they chose XFCE as a window manager. Apps like 
> thunar and nautilus run in a domU, based on a template that you control. 
> There is no official Fedora flavour with XFCE and the default one uses 
> GNOME so that is why you get XFCE with GNOME apps. But since you manage 
> it, and you already started to do this, you can easily XFCEify your 
> fedora template by installing the XFCE apps and changing the shortcuts 
> in the Qubes start menu. 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2f43b61-a444-4154-a022-dc6df62e2ef1%40googlegroups.com.


[qubes-users] Xen Orchestra installation on Qubes-OS possible?

2020-01-13 Thread n1ete
I recently played with xcp-ng in my lab and discovered the "Xen Orchestra 
Unified Appliance". its an xen-ready vm to manage and orchestrate xcp-ng 
backends.

is it possible to deploy the disk image on qubes aswell? this would be 
realy great, since i dont have a free xen-hypervisor in my lab, but qubes.


thanks for hints and for Qubes-OS in advance ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/40e32f8d-523f-4463-8924-958b40b27633%40googlegroups.com.


Re: [qubes-users] Re: I passedthrough GPU pci to win7 but can't install driver on windows

2020-01-13 Thread John Mitchell
With QEMU/KVM you can hide the VM from the driver.  I don't know how to do 
this with qubes maybe someone else can step in.  I didn't want Nvidia 
breaking my setup in a future driver update so I am using an AMD RX590 
avoiding Nvidia's shortsightedness.  And they lost a sale.

On Friday, January 10, 2020 at 10:20:28 AM UTC+1, Matthias Horn wrote:
>
> I think Nvidia have logic in the (consumer) driver to detect when it’s 
> running under XEN (and other hypervisors) and will refuse to load/install 
> in that environment.
> https://wiki.xen.org/wiki/Xen_VGA_Passthrough_Tested_Adapters
>
> Sent from my iPhone
>
> On 10 Jan 2020, at 05:15, xyzo > wrote:
>
> 
>
> -- 
> You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to qubes...@googlegroups.com .
> To view this discussion on the web visit 
> https://groups.google.com/d/msgid/qubes-users/fe3f992a-4749-4090-baaf-b3de26a55fb7%40googlegroups.com
>  
> 
> .
> 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/678093c9-2515-40fb-89ab-8d8d9b2f62ff%40googlegroups.com.


[qubes-users] qvm-create-windows-qube 2.0

2020-01-13 Thread brendan . hoar
Having manually set up windows VMs in  in the pst, I can say that Elliot’s work 
here is quite the time saver.

Just invoke the script, go off and do something for a bit, come back later with 
some windows VM installs completed, including the add on software you wanted.

Haven’t tried the newer version yet as I have to review the 10 windows 7 VMs I 
created under the old version to be sure I can wipe them all first!

B

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d125d8e2-5d10-4181-b5ee-27abcd766165%40googlegroups.com.


[qubes-users] Does Lenovo LEGION Y530 support "Interrupt Remapping"?

2020-01-13 Thread DavidDTU
 

Hi,

I’m a newcomer. Please be patient with my ignorance. Thank you in advance.



*Wojtczuk and Rutkowska (2011)*

*“Intel VT-d and Intel TXT are the two most important technologies for 
building secure *

*operating systems”*



*My laptop:*

*Lenovo LEGION Y530 15.6" FHD IPS, Intel Core i7-8750H (2.2GHz up to 
4.1GHz), NVIDIA GeForce GTX 1050 Ti 4GB, 8GB DDR4, 512GB SSD*



*Question 1:*

Does* Lenovo LEGION Y530* support "Interrupt Remapping"?



*Question 2:*

Compatible laptop (*Lenovo LEGION Y530*) for installing Qubes OS? Yes/No?


 

*Question 3:*

Are there any other security concerns I should be aware of, for ensuring 
the most secure setup with the current laptop (Lenovo LEGION Y530)? Or 
should I be investing in another device?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/111e13d4-d92c-4f54-a1c5-a668df495d6e%40googlegroups.com.


[qubes-users] qvm-create-windows-qube 2.0

2020-01-13 Thread 'Elliot Killick' via qubes-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hello, all!

Not too long ago I released qvm-create-windows-qube but quit pushing
changes for a while because I realized there was still a of work to be
done and I wanted to get it out of the dev/beta phase before releasing a
new version.

Well, it's over 200 commits later and I would say it's well out of
beta now.

Biggest new features include:

  * Use a much newer Windows 7 7601 ISO for Windows 7
  * Support Windows 8.1-10 Pro/Enterprise (ISO downloads from Microsoft
included)
  * Support Windows 10 Enterprise LTSC (Also download provided)
  * Support Windows Server 2008 R2 - Windows Server 2019 (Also downloads
provided)
  * Chocolatey integration
  * Option to slim down Windows installation (Similar to the following
but much more refined due to especially the disabling of services I
found could break things in a way that would result in a bad UX,
also expanded for Windows 10:
https://www.qubes-os.org/doc/windows-template-customization/)
  * Test signing Qubes GUI driver is now enabled during Windows
installation process to skip a reboot
  * Hardcoding trial product key in answer files (or anywhere) is no
longer necessary, Windows will use embedded trial key without any
user interaction by default
  * windows-mgmt is air gapped
  * Travis CI is being used for integration testing
  * Tons of code cleanup, reorganization and refactoring  (I'm of the
OpenBSD mindset where having clean (correct) code is just as
important as having functional code, so a lot of stuff just got
rewritten)
  * Everything is much more stable (No more lame sleeps for arbitrary
amounts of time)
  * MIT license

Additionally, I made a PGP key (also using Qubes Split GPG) so hopefully
my code and anything I else I make can reach you a lot more securely.

Repo can be found here, please star if you find it useful :)

https://github.com/elliotkillick/qvm-create-windows-qube

I'm working towards having this project be similar (or superior) to
VMWare's Windows "Easy Install" feature but on Qubes:
https://www.youtube.com/watch?v=1OpDXlttmE0

Regards,

Elliot
-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQQBj7nebfoT+xj7VVL5uQ1E+D3V8gUCXhw9CQAKCRD5uQ1E+D3V
8iT9AQDlMN4TUEQV8SrvfBj3Df0utv3i/GIDLlt+6DpxnNmSAAD/Uz7tihtwjHXz
/Dl6qtbYhoph8DSHLKwIevhP/iKArw8=
=tnno
-END PGP SIGNATURE-


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/751f6bbd-087a-8d0d-70b9-1175e6f79d5d%40zohomail.eu.