[qubes-users] How to find which AppVM launched particular DispVM?

2020-05-14 Thread Martin Habovštiak
 

I'd love to query from command line which AppVM called an RPC (`qvm-run 
--dispvm`) that caused particular dispvm (of which I have the name) to 
start. I can't find it anywhere - I looked in prefs, tags, features, 
qubesdb - nothing. Does anyone have a clue?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a374d4a-3fa2-4fc0-9c67-ce99f425176b%40googlegroups.com.


Re: [qubes-users] Qubes, video thumbnails?

2020-05-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Thu, May 14, 2020 at 06:07:43PM +0200, 'Correspondent' via qubes-users wrote:
> Please tell me how to enable video thumbnails?

The answer to this question will depend highly on which OS runs in your
used template (e.g. fedora) and which file manager you are using (e.g.
nautilus, thunar, dolphin).

There should be nothing Qubes specific about this question, so once you
know which OS and which file manager you will be able to find many
answers using a search website of your choice.

If you are using Qubes the way it is installed by default you are likely
using Nautilus in Fedora. 

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-BEGIN PGP SIGNATURE-
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=wzap
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200515002402.GA1297%40app-email-private.


Re: [qubes-users] What are the components of Qubes?

2020-05-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Thu, May 14, 2020 at 08:57:50AM -0700, wirsindei...@gmail.com wrote:
> What are the components of Qubes?
> Since I'm building a forum

Please provide some background about what you are doing and why. Is this
meant for a German speaking Qubes-Community? ... the translation effort
that was discussed a few days ago with praticipants of this list?

If you'd like to enlist people here to help it would be appreciated to
be more open and detailed about goals, motivations etc.

To your question: personally I don't see the need to break the "Qubes"
topic up in smaller parts. But if you'd insist this is how I'd go about
it:

- Base System (aka Dom0)
- Installation
- Backup/Restore
- XFCE
- KDE
- I3
- Qubes (aka AppVMs)
- System Qubes (aka ServiceVMs / ProxyVMs)
- Disposable Qubes (aka DispVMs)
- StandaloneVMs
- Templates (aka TemplateVMs)

I expect there are as many oponions as people answering. Looking forward
to hear about what you are trying to do.

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-BEGIN PGP SIGNATURE-
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=Bqob
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200515000548.GA1289%40app-email-private.


[qubes-users] Cannot install on Dell XPS 15 7590 laptop (4k display)

2020-05-14 Thread d...@airmail.cc
Hello,

I've copied installation ISO (Qubes-R4.0.3-x86_64.iso) to USB using dd.

When I try to boot it, I get these 4 lines of text and then the system
restarts.
|XEN 4.8.5-14.fc25 (c/s ) EFI loader|
|Using configuration file 'BOOTX64.cfg'|
|vmlinuz: 0x0055dec000-0x00.5643bca0|
|initrd.img: 0x00.54a1f000-0x0055debb1c|

Doing this

(nouveau.modeset=0) didn't help. Neither did changing bios settings to
default, or turning secure boot on/off. Legacy boot mode is not
available on the laptop.

Note: Linux Mint is installed on the system (it works with secure boot off).

Any idea what's wrong?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0dafddff-db6d-38a4-4439-8bdd5cfbf64b%40airmail.cc.


[qubes-users] using salt - how to debug?

2020-05-14 Thread liked2

Hi!

I'm trying to get salt examples running but failing at the simplest one.

I've a enabled top-file:

base:
  dom0:
- doSmth

  AppVmTobeChanged:
- doSmthDifferent
-
top file was enabled by: qubesctl top.enable ...

But "doSmthDifferent" will never be executed, when I call: qubesctl 
--show-output state.highstate

Any hints where to look at? How to debug it?

Current references:
https://www.qubes-os.org/doc/salt/
https://github.com/unman/notes/blob/master/salt/Index

Best, P

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/60f159f9-3bed-fec9-f3c0-2f522b172936%40gmx.de.


Re: [qubes-users] Qubes better dove tailed for Journalists, and Human Rights Workers.

2020-05-14 Thread Chris Laprise

On 5/9/20 8:45 PM, donov...@unseen.is wrote:
There are some that are both tech and investigators. I personally found 
Qubes to be a solution I wish I had found long before I did. In fact, 
for me it was easier to move from Windows (and DOS before that) to Linux 
as my primary work environment via Qubes rather than just a standalone 
linux box or VM because it provided two solutions in one  - move away 
from Windows and provide multiple more secure and isolated environments 
for my work. The technology landscape and associated threat vectors are 
very fluid and Qubes is part of the foundation for dealing with that. I 
even go so far as to suggest that Qubes should actually be the default 
OS for any computer user, but that is unrealistic of course.


I cringe at the occasional post that suggests or implies that Qubes is 
difficult. My background is almost exclusively M$ with the odd *nix 
appliance thrown in, hardly the foundation for moving essentially 
cold-turkey to Qubes that, for me, is based on an unfamiliar hypervisor 
and linux vms. It is a tool, albeit one that is a bit specialized to 
emphasize security. And like any tool, you have to learn how to use it 
to maximize its intended purpose. It's not rocket surgery or brain 
science, but it's also not a toaster. That said, I personally feel that 
moving to LibreOffice and Thunderbird in the Windows environment many 
years ago made the transition much easier and more familiar. My prior 
profession also required that I maintain some level of proficiency at 
the command/terminal prompt. That can be a big hurdle for people 
considering the transition to Qubes from Windows. That said, I still 
struggle with some tasks in Linux for which I have not developed any 
"muscle memory" for - yet. But it gets easier daily.


I tend to agree with this assessment of Qubes. I think more techies 
adopt it bc they understand what Qubes is doing for them under the hood. 
But otherwise its still a pretty friendly environment that presents its 
biggest challenges at install time.


Two of the biggest Qubes pitfalls are the template upgrade snafus (as 
originally described) and lack of access to AppVM internal configuration 
which is never presented in the menu by default.




I see a lot of posters attempting to use Qubes in much the same manner 
as they might a standalone box and sometimes with less than sterling 
results. All of that adds to the knowledge base of Qubes, but everything 
that I have read tells me that being a reasonably secure OS on a 
computer in a connected, information-centric production environment (as 
in, making a living) is the primary purpose for its creation. It serves 
that purpose well in my view. It'll likely not be a gaming box, a 
screaming video or CAD rendering beast or even support bleeding-edge 
hardware.


Qubes is a serious tool in the very serious and uncompromising world 
where the bar for what is considered dangerous information is lowered on 
a daily basis.


--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3c1299e-3281-f76c-6773-7b7493578479%40posteo.net.


Re: [qubes-users] Qubes better dove tailed for Journalists, and Human Rights Workers.

2020-05-14 Thread Chris Laprise

On 5/9/20 5:02 PM, Steve Coleman wrote:


On Fri, May 8, 2020 at 7:13 PM Catacombs > wrote:


A Journalist or a Human Rights investigator, I think are more
comfortable with ease of use, not secure.

There is always a trade-off between security and usability for sure. One 
trade-off for the non geek users is to enable networking in the software 
template so that you can run the "Software" application to pick and 
choose your required desktop applications.  The journalist may not know 
how to use DNF at the command line but the Software installer will 
clearly let them pick and choose from several decent word processors. If 
only the Software application used the same proxy method to search the 
repository for packages then turning on the networking would not be 
necessary. The average desktop user would have a much easier time 
installing what they need.


The main thing for them to *not do* is to run any applications in the 
template VM itself. Never test things in the template unless you 
absolutely need to pre-configure something, and if so, do it with 
networking turned off if you have that choice. Clearly this is not easy 
for a non-geek, but it can be made a little easier.


So, I bet this has been talked about before.  As I was doing the
upgrade to Fedora 31, I realized a Journalist is not likely to be
very happy doing that.  After that, I had to search to find a Text
Editor, (Gedit is what I used)  A Journalist would expect that the
things 



LibreOffice is what you want for journalists.

Then I tried to watch a Video.   Gee guys, a Journalist just expects
this stuff to work.  I , on the other hand, am concerned our
mythical investigator not realizing the possible security
implications of opening what kind of app, when.


If you enable rpmfusion repos you will be able to access more video 
codecs, but again that is a security trade-off.


Since protecting otherwise naive users is the topic, I would suggest 
making a much simpler choice which is to use Debian. That will get you 
codec support without messing with repo configs, and the user will have 
an OS that is thoroughly tested and stabilized (i.e. meant for 
production environments) and properly protected against MITM during 
updates the way Fedora is not.




What you can do is have one template with all the DRMed codecs providing 
for one or two AppVMs or DVMs that can run the videos, while keeping the 
remaining AppVMs for investigations more secure without all the extra 
risky additions. You just have to train them how to open the video URLs 
in one of the special VMs.



Tech people do not think like Journalists of Human Rights Workers,
nor vice versa.


Perhaps not, but very likely we are trainable.



--
Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8b4136bf-760b-d2dd-7663-c48d436997c4%40posteo.net.


[qubes-users] HCL search facility

2020-05-14 Thread Andrew Sullivan
Good evening

Is there a way to search the HCL? If not, could such a function be provided? 
The list is long, and presumably will get longer, so it would save a lot of 
scrolling.

Just a thought.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51016560-70d4-4b27-899d-d6606eb9e642%40googlegroups.com.


Re: [qubes-users] dom0:mmcblk0 regularly disappearing (usb storage mounting)

2020-05-14 Thread sairus . tro
I think this is what we are looking for:
|__ Port 11: Dev 4, If 0, Class=Chip/SmartCard, Driver=, 12M
ID 058f:9540 Alcor Micro Corp. AU9540 Smartcard Reader

This, btw appears amongst the devices even after the mmcblk0 disappears, 
but connecting it to a cube does nothing. 

Here is the whole listing from sys-usb in case I missed something:
[user@sys-usb ~]$ lsusb -tv
/:  Bus 03.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/10p, 5000M
ID 1d6b:0003 Linux Foundation 3.0 root hub
/:  Bus 02.Port 1: Dev 1, Class=root_hub, Driver=ehci-pci/6p, 480M
ID 1d6b:0002 Linux Foundation 2.0 root hub
|__ Port 1: Dev 2, If 0, Class=Human Interface Device, Driver=usbhid, 
480M
ID 0627:0001 Adomax Technology Co., Ltd 
/:  Bus 01.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/16p, 480M
ID 1d6b:0002 Linux Foundation 2.0 root hub
|__ Port 8: Dev 2, If 1, Class=Video, Driver=uvcvideo, 480M
ID 5986:0706 Acer, Inc 
|__ Port 8: Dev 2, If 0, Class=Video, Driver=uvcvideo, 480M
ID 5986:0706 Acer, Inc 
|__ Port 9: Dev 3, If 0, Class=Vendor Specific Class, Driver=, 12M
ID 138a:0090 Validity Sensors, Inc. VFS7500 Touch Fingerprint Sensor
|__ Port 11: Dev 4, If 0, Class=Chip/SmartCard, Driver=, 12M
ID 058f:9540 Alcor Micro Corp. AU9540 Smartcard Reader
|__ Port 13: Dev 5, If 0, Class=Human Interface Device, Driver=usbhid, 
1.5M
ID 0765:5010 X-Rite, Inc. X-Rite Pantone Color Sensor
|__ Port 14: Dev 6, If 0, Class=Wireless, Driver=btusb, 12M
ID 8087:0a2b Intel Corp. 
|__ Port 14: Dev 6, If 1, Class=Wireless, Driver=btusb, 12M
ID 8087:0a2b Intel Corp. 

On Thursday, May 14, 2020 at 7:10:25 PM UTC+2, dhorf-hfr...@hashmail.org 
wrote:
>
> On Thu, May 14, 2020 at 06:06:43AM -0700, sair...@gmail.com  
> wrote: 
> > Does anyone have an idea what is wrong and how to fix it? 
>
> "dom0:mmcblk0" and "usb storage" doesnt match up too well. 
> on this computer the dom0:mmcblk0 is a pci device entirely unrelated 
> to anything USB. 
>
> check what kind of device you are actualy dealing with first. 
>
>
> "lspci -kv" in dom0 might show something like: 
>
> 00:1e.4 SD Host controller: Intel Corporation Device 9d2b (rev 21) 
> Kernel driver in use: sdhci-pci 
>
>
> or "lsusb -tv" in sys-usb might show something like: 
>
> Port 4: Dev 3, If 0, Class=Mass Storage, Driver=usb-storage, 5000M 
> ID 05e3:0747 Genesys Logic, Inc. 
>
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27f53396-cf11-4c4c-950d-1b4d841e9cba%40googlegroups.com.


[qubes-users] Windows replacement by ReactOS

2020-05-14 Thread onelovecisco via qubes-users
Hello, Qubes Community!

Is there any news? Really replacing Windows is a great idea.
I found this. But nightly builds iso doesnt work with hvm (disk detection error)

https://groups.google.com/forum/#!searchin/qubes-users/reactos%7Csort:date/qubes-users/QMkUuTMKgbM/nnlrr7kUBgAJ
https://jira.reactos.org/browse/CORE-13358
https://github.com/QubesOS/qubes-issues/issues/2809#issuecomment-377487490


-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7JRCAH--B-2%40tuta.io.


Re: [qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread onelovecisco via qubes-users
If Qubes-builder cannot do this, maybe its possible to migrate template from 
Proxmox or XCP-ng to Qubes?because the hypervisor is the same, Xen... no one 
tried to do this?

-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com


May 14, 2020, 20:42 by qubes-users@googlegroups.com:

> Hello, dhorf-hfref.4a288f10!
> after that basic install, you could try if that OS supports pvh mode
> You mean i need set gui to "false" on hvm and switch hvm to pvh? Or i need 
> install qubes-meta packages on it?
> I read about openbsd and another xen > implementation
> but I don’t understand how it can be applied correctly in Qubes.
> https://wiki.xen.org/wiki/FreeBSD_PVH
> https://xcp-ng.org/forum/topic/2582/guest-tools-for-openbsd/5
>
> ostype=$(sysctl -n kern.ostype)
> osrelease=$(sysctl -n kern.osrelease)
>
> # PV driver version
> hostctl attr/PVAddons/MajorVersion 6
> hostctl attr/PVAddons/MinorVersion 2
> hostctl attr/PVAddons/MicroVersion 0
> hostctl attr/PVAddons/BuildVersion 76888
> hostctl attr/PVAddons/Installed 1
>
> # OS version
> hostctl data/os_name "$ostype $osrelease"
> hostctl data/os_uname $osrelease
> hostctl data/os_distro $ostype
>
> # Update XenStore
> hostctl data/updated 1
>
> -- 
> Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
> https://tutanota.com
>
>
> May 14, 2020, 20:15 by dhorf-hfref.4a288...@hashmail.org:
>
>> On Thu, May 14, 2020 at 06:56:56PM +0200, onelovecisco via qubes-users wrote:
>>
>>> In PHV mode like Fedora-31 or Debian-10. 
>>> Is the Qubes-builder capable of this?
>>>
>>
>> qubes-builder most certainly can not build bsd templates.
>>
>> but like almost any PC OS, you can install it in hvm mode, 
>> and that should give you a single graphical interface window, 
>> xl console and network access.
>>
>> after that basic install, you could try if that OS supports pvh mode.
>> but that is probably an interesting can of worms.
>>
>
>
>
>
> --
>  You received this message because you are subscribed to the Google Groups 
> "qubes-users" group.
>  To unsubscribe from this group and stop receiving emails from it, send an 
> email to > qubes-users+unsubscr...@googlegroups.com> .
>  To view this discussion on the web visit > 
> https://groups.google.com/d/msgid/qubes-users/M7JGymo--7-2%40tuta.io 
> >
>  .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7JJoQ5--3-2%40tuta.io.


Re: [qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread onelovecisco via qubes-users
Hello, dhorf-hfref.4a288f10!
after that basic install, you could try if that OS supports pvh mode
You mean i need set gui to "false" on hvm and switch hvm to pvh? Or i need 
install qubes-meta packages on it?
I read about openbsd and another xen implementation
but I don’t understand how it can be applied correctly in Qubes.
https://wiki.xen.org/wiki/FreeBSD_PVH
https://xcp-ng.org/forum/topic/2582/guest-tools-for-openbsd/5

ostype=$(sysctl -n kern.ostype)
osrelease=$(sysctl -n kern.osrelease)

# PV driver version
hostctl attr/PVAddons/MajorVersion 6
hostctl attr/PVAddons/MinorVersion 2
hostctl attr/PVAddons/MicroVersion 0
hostctl attr/PVAddons/BuildVersion 76888
hostctl attr/PVAddons/Installed 1

# OS version
hostctl data/os_name "$ostype $osrelease"
hostctl data/os_uname $osrelease
hostctl data/os_distro $ostype

# Update XenStore
hostctl data/updated 1

-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com


May 14, 2020, 20:15 by dhorf-hfref.4a288...@hashmail.org:

> On Thu, May 14, 2020 at 06:56:56PM +0200, onelovecisco via qubes-users wrote:
>
>> In PHV mode like Fedora-31 or Debian-10. 
>> Is the Qubes-builder capable of this?
>>
>
> qubes-builder most certainly can not build bsd templates.
>
> but like almost any PC OS, you can install it in hvm mode, 
> and that should give you a single graphical interface window, 
> xl console and network access.
>
> after that basic install, you could try if that OS supports pvh mode.
> but that is probably an interesting can of worms.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7JGymo--7-2%40tuta.io.


Re: [qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread dhorf-hfref . 4a288f10
On Thu, May 14, 2020 at 06:56:56PM +0200, onelovecisco via qubes-users wrote:

> In PHV mode like Fedora-31 or Debian-10. 
> Is the Qubes-builder capable of this?

qubes-builder most certainly can not build bsd templates.

but like almost any PC OS, you can install it in hvm mode, 
and that should give you a single graphical interface window, 
xl console and network access.

after that basic install, you could try if that OS supports pvh mode.
but that is probably an interesting can of worms.




-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200514171541.GI1079%40priv-mua.


Re: [qubes-users] dom0:mmcblk0 regularly disappearing (usb storage mounting)

2020-05-14 Thread dhorf-hfref . 4a288f10
On Thu, May 14, 2020 at 06:06:43AM -0700, sairus@gmail.com wrote:
> Does anyone have an idea what is wrong and how to fix it?

"dom0:mmcblk0" and "usb storage" doesnt match up too well.
on this computer the dom0:mmcblk0 is a pci device entirely unrelated
to anything USB.

check what kind of device you are actualy dealing with first.


"lspci -kv" in dom0 might show something like:

00:1e.4 SD Host controller: Intel Corporation Device 9d2b (rev 21)
Kernel driver in use: sdhci-pci


or "lsusb -tv" in sys-usb might show something like:

Port 4: Dev 3, If 0, Class=Mass Storage, Driver=usb-storage, 5000M
ID 05e3:0747 Genesys Logic, Inc. 



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200514171018.GH1079%40priv-mua.


[qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread onelovecisco via qubes-users
Hello, Qubes Community.

In PHV mode like Fedora-31 or Debian-10. 
Is the Qubes-builder capable of this?

I once did it on 3.1 version, but now this is no longer relevant. 
https://www.qubes-os.org/doc/netbsd/
and I could only get there through "xl console"


-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7J6WR9--3-2%40tuta.io.


[qubes-users] Qubes and Salt question

2020-05-14 Thread onelovecisco via qubes-users
Hello, Qubes Community!

Can you help me how to correctly use Salt in dom0 for automate tasks.
For example, i need to clone debian-10 template and install toolchain on it.

apt install -y \
build-essential \
zlib1g-dev uuid-dev libdigest-sha-perl \
libelf-dev \
bc \
bzip2 \
bison \
flex \
git \
gnupg \
iasl \
m4 \
nasm \
patch \
python \
wget \
gnat \
cpio \
ccache \
pkg-config \
cmake \
libusb-1.0-0-dev \
pkg-config \
texinfo \

Qubes Salt files stored at /srv folder as root. 
where do i need to put my custom *.sls files?and how launch it use qubesctl 
from dom0?
Thanks.
-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7J0Asf--3-2%40tuta.io.


[qubes-users] Qubes, video thumbnails?

2020-05-14 Thread 'Correspondent' via qubes-users
Hi.

Please tell me how to enable video thumbnails?

Thank you.





-- 
 Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
 https://tutanota.com

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/M7IwFEW--3-2%40tuta.io.


[qubes-users] What are the components of Qubes?

2020-05-14 Thread wirsindeins0
What are the components of Qubes?
Since I'm building a forum


Aus welchen Bestandteile besteht Qubes?
Da ich ein Forum aufbaue

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47ddce05-b306-43b3-9513-54713801fd45%40googlegroups.com.


Re: [qubes-users] Connect to wifi - settings doesnt load

2020-05-14 Thread unman
On Thu, May 14, 2020 at 11:13:31AM +0300, Alaa Ashkar wrote:
> Much appreciated, i will check it out.
> 
> On Thu, May 14, 2020, 10:06 Jarrah  wrote:
> 
> >
> > > I think my problem is common and also new, i read the thread you sent me
> > > and many more but couldnt understand how to do the workaround? I read
> > that
> > > intel ax201 works on fedora perfectly, but on qubes no, how should i
> > update
> > > the fw? Can you please explain the steps or refer me to a good reference?
> > > That would save me a lot of time.
> > >
> > You're right, it is a common problem for that card on Qubes.
> >
> > As described in https://github.com/QubesOS/qubes-issues/issues/5615,
> > there is no simple answer to this one. You will have to patch and
> > re-compile the kernel or replace the card. Is there an option to use a
> > wired network while you wait for the patch to be pulled by upstream?
> >
> > If not, and you decide you want to learn how to patch and compile the
> > kernel, there is quite a long (but very enlightening) path ahead of you.
> > Start with https://www.qubes-os.org/doc/qubes-builder/. You will want to
> > follow the steps in "Making a customized build" and insert the patch
> > into src/linux-kernel/ and apply it in the spec file. The command `make
> > kernel` should then result in a "kernel-qubes-vm" package that you can
> > install in dom0.
> >
> > As I said, this will not be something that is easy, but you will learn a
> > lot. The alternative is replacing the Wifi card with something supported
> > (I can vouch for the Intel 9462 series being supported) or using wired
> > ethernet for now.
> >

You might find it somewhat easier to install an Ubuntu template (if you
don't want to build your own you can download pre-built from
https://qubes.3isec.org), and use that for sys-net.

You can use AX200 with a bionic template installing the
backport-iwlwifi-dkms package, and for AX201 you should be able to use a
focal template as is, I think - maybe with relevant firmware added? (Don't
have that card so cant test this)
In either case you'll want to use the qube kernel rather than one
provided by dom0 (HVM mode and set qvm-prefs kernel=none)
Worth a try: you'll learn something, but not as much as rolling your own
kernel.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200514130832.GC15104%40thirdeyesecurity.org.


[qubes-users] dom0:mmcblk0 regularly disappearing (usb storage mounting)

2020-05-14 Thread sairus . tro
Hi fellas,

After a fresh restart, and inserting a SD card into my computer I see 
"mmcblk0" showing up on top of the device manager. I forward it to a Debian 
cube and everything works great, I can mount it no problem.
After putting my computer to sleep a couple of times however, this option 
stops showing up .. and thus I cannot forward it anymore, unless I restart 
the computer again.
All I see is new sys-usb devices appearing, but I forward those to virtual 
machines to no avail, I cannot mount my sd cards afterwards.

Does anyone have an idea what is wrong and how to fix it?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1e77170a-109e-4742-997d-024d2de15ce3%40googlegroups.com.


Re: [qubes-users] Re: What's your flow for new templateVM?

2020-05-14 Thread unman
On Thu, May 14, 2020 at 07:21:52AM +0100, lik...@gmx.de wrote:
> > > 
> > 
> >  From another post:
> > I ran some training a few years back, and the notes are here:
> > https://github.com/unman/notes/tree/master/salt
> > 
> > They start with the simplest use of `qubesctl`, and work up to quite
> > complex configurations, but should be easy to understand.
> > There are examples in (naturally) "examples".
> > 
> 
> Let's assume I'm managing all my configuration in /srv/salt/myConfig
> 
> From this post, it seems that these directories are not backuped by default 
> by the qubes-backup:
> https://groups.google.com/forum/#!searchin/qubes-users/doesn$27t$20fully$20restore%7Csort:date/qubes-users/FiGImnZ87sY/yK5h7gcsAgAJ
> 
> How do you backup them? By linking from /home? Copying all to /home before a 
> backup? What's the best practice?
> 

My practice is to maintain an encrypted tar archive - I can pull that
down, copy it to offline disposableVM, decrypt there, and copy in to
dom0.
For general system configuration, I load the directories from an encrypted USB 
drive.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200514125416.GB15104%40thirdeyesecurity.org.


Re: [qubes-users] Re: HCL - Dell Latitude E5470 + Docking Station

2020-05-14 Thread Rafael Reis
Hey Andrew,

Glad I could help.

Yes you can manually enable and disable drives on BIOS, although it is a
somewhat cumbersome workflow if you dual boot a lot. Especially if you have
BIOS password enabled as well.

Windows sees the Qubes drive enabled, initialized but not formatted. It
does not touch the drive and does not prompt to format it or anything. Yes,
it is there, exposed but again, depending on your threat model this isn’t
that big of a deal. I have custom software highest encryption bitlocker
enabled on the windows drive as well.

You may always encrypt qubes boot partition as well. It’s one more
password. There’s docs for that.

As far as laptop size goes that’s entirely personal. I’m 95% of the time
docked, with a full desktop setup around me, so I favor the portability
when on the go. You may consider the dock station + monitors + keyboard
mouse combo. You also get a ton of additional I/O, charging, and many perks
with this configuration. It’s awesome, and a Single eject away of being
untethered.

I’ve worked with the precisions before, and to me they are absolute
mammoths. But I’d probably go for a bigger laptop if I didn’t have the
docking setup.

Good luck on your Qubes adventure.

Rafael

Em qui, 14 de mai de 2020 às 09:13, Andrew Sullivan <
andrew.t.sulli...@gmail.com> escreveu:

>
>
> On Monday, 11 May 2020 23:13:21 UTC+1, Rafael Reis wrote:
>>
>> Hey Andrew!
>>
>> Sorry for the late reply, haven't checked the mailing list in a while.
>>
>> I have a 5470 service tag # 5V2GBG2
>> You may see the full original config here
>> 
>> .
>>
>> Basically it came stock with a quad core i7-6820HQ. Sata drive with the
>> tiny sata cable. No m.2 bracket or SSD installed to the NVME ngff slot.
>> Nothing installed on the wwan ngff slot, and intel's wifi card installed to
>> the ngff wireless slot.
>>
>> It has 3 ngff slots (M.2 NVME, WIFI, WWAN) keyed differently (Key A, B
>> etc) and the sata data+power cable for 1 sata drive.
>>
>> I've upgraded ram to 2x8GB DDR4, removed the stock sata hdd and replaced
>> it with a sata ssd. Since I needed more capacity than performance, I got a
>> 512GB Crucial BX500. It was way more affordable than an nvme drive atm, and
>> I didn't have the m.2 bracket either, which would mean I would only be able
>> to secure the nvme ssd with double sided tape or other improvised solution.
>> The BX500 is known to have an exploitable hardware encryption, so be
>> advised to use only software encryption on that drive.
>>
>> That drive became my Windows 10 drive, GPT / UEFI enabled.
>> Started using Qubes on a USB 3.0 64GB flash drive, it worked pretty well
>> considering the constraints, but decided I needed a drive for Qubes itself.
>>
>> After some deep research I discovered that the WWAN slot indeed takes a
>> SATA M.2 SSD. (source
>> 
>> ).
>> You'd better go for the shorter ones, otherwise they'll collide with the
>> inner plastic frame and won't fit. I believe you can fit 32 and 40mm length
>> drives without any trouble.  I couldn't find an affordable SATA M.2 with at
>> least 256GB for Qubes (that was my personal need), so I ended up getting a
>> regular 80mm lenght one. To make it fit, I had to "mod" the inner plastic
>> frame, and disassemble 50% of the laptop.  I opted simply to break pieces
>> of the plastic frame in order to free space for the lengthier drive. Then,
>> I isolated the surroundings with tape and secured the ssd (don't remember
>> how, if I was able to bolt it in, tape it, or pressure). The SSD I used in
>> the WWAN port is https://www.lexar.com/portfolio_page/ssd-nm100/ 256GB
>> version
>>
>> You have to change BIOS settings under drive configuration to enable the
>> required sata ports.
>>
>> Initialized that drive as GPT, and installed Qubes to it.
>>
>> You are right regarding the "dual boot". I don't have Grub. I use the
>> "BIOS" UEFI bootmanager to choose which OS I'd like to boot. All I have to
>> do is press F12 after powering up. I've renamed Qubes to Recovery, so it is
>> inconspicuous. Default boot drive is the BX500 with windows.
>>
>> The level of compatibility of the E5470 with Qubes is outstanding. The
>> performance is incredible.
>> The only thing that didn't work OOB was the SD card reader, which was
>> easily fixed by opting to  kernel-latest . Docking station works 100%, with
>> multiple monitors. Even 2 monitors + laptop monitor works perfectly. I wish
>> it was possible to nuke Intel ME on 6th gen laptops and have it fully
>> Opensource. It would make a great candidate for certification.
>>
>> My only concern right now is the decisions for the GUI of Qubes 4.1. I
>> wonder if the separation of the GUI and dom0 would result in
>> incompatibility with E5470 or even a big decrease in performance. This
>> thing is perfect for Qubes if 

Re: [qubes-users] Dividing Qubes Into Separate Networks (FAILED)

2020-05-14 Thread unman
On Thu, May 14, 2020 at 03:08:44AM +, 'Zsolt Bicskey' via qubes-users wrote:
> > > Now how should I configure it?
> > 
> 
> > Hmm, I had the impression that you hadalready configured the VLAN on
> 
> I had it configured on the ens6 interface and I tried connecting to the 
> network like that. Since that is how the fedora liveboot connected. I never 
> tried to configure VLAN on Linux before with nmcli or any other way. I never 
> had to. In the past anytime I built a network I was able to connect to the 
> VLAN with DHCP or static addressing the interface. That's why I didn't look 
> for the the modprobe 8021q becuase I never heard of it. That is why I cannot 
> wrap my mind around why this is not working on the Qubes sys-net. I am not a 
> Linux expert for sure but never had such issue ever before. 
> 

OK.
You say that you have read configuration guides - please follow the
instructions in a recent Fedora guide, (which includes the modprobe
instruction), and see if that solves your issue.
If you still have a problem, then report back with details of what you
have done, and what errors you encountered.
If you fix it, just drop a line, saying "Followed *this* guide - now
working". Then it's useful for someone in the future.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200514124722.GA15104%40thirdeyesecurity.org.


[qubes-users] some remarks on dom0 updates (current-testing)

2020-05-14 Thread haaber

Since ever I run my qubes on current-testing; Sometimes problems occur,
but that is a way of learning more on qubes. Anyways. I observed since
the begin of the year 2020 a strange behaviour that bothers me: after
any dom0 update & reboot (there were 3-4), the laptop-lid close/open
will finish with a black screen, no password entry possible, and force a
reboot. No log info neither. Alright, that is annoying, but happens.

But it is worse: after 4-5 reboots, this odd behaviour disappears and
the machine runs as expected. To be honest, such non-deterministic
behaviour bothers me even more than any dysfunction (especially since I
won't complain since I run, as said, "testing"). Does someone share this
strange experience ???  Cheers

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f39ff8a7-963a-9973-3582-16619018665c%40web.de.


[qubes-users] Re: HCL - Dell Latitude E5470 + Docking Station

2020-05-14 Thread Andrew Sullivan


On Monday, 11 May 2020 23:13:21 UTC+1, Rafael Reis wrote:
>
> Hey Andrew!
>
> Sorry for the late reply, haven't checked the mailing list in a while. 
>
> I have a 5470 service tag # 5V2GBG2 
> You may see the full original config here 
> 
> . 
>
> Basically it came stock with a quad core i7-6820HQ. Sata drive with the 
> tiny sata cable. No m.2 bracket or SSD installed to the NVME ngff slot. 
> Nothing installed on the wwan ngff slot, and intel's wifi card installed to 
> the ngff wireless slot. 
>
> It has 3 ngff slots (M.2 NVME, WIFI, WWAN) keyed differently (Key A, B 
> etc) and the sata data+power cable for 1 sata drive.
>
> I've upgraded ram to 2x8GB DDR4, removed the stock sata hdd and replaced 
> it with a sata ssd. Since I needed more capacity than performance, I got a 
> 512GB Crucial BX500. It was way more affordable than an nvme drive atm, and 
> I didn't have the m.2 bracket either, which would mean I would only be able 
> to secure the nvme ssd with double sided tape or other improvised solution. 
> The BX500 is known to have an exploitable hardware encryption, so be 
> advised to use only software encryption on that drive.
>
> That drive became my Windows 10 drive, GPT / UEFI enabled.
> Started using Qubes on a USB 3.0 64GB flash drive, it worked pretty well 
> considering the constraints, but decided I needed a drive for Qubes itself.
>
> After some deep research I discovered that the WWAN slot indeed takes a 
> SATA M.2 SSD. (source 
> 
> ).
> You'd better go for the shorter ones, otherwise they'll collide with the 
> inner plastic frame and won't fit. I believe you can fit 32 and 40mm length 
> drives without any trouble.  I couldn't find an affordable SATA M.2 with at 
> least 256GB for Qubes (that was my personal need), so I ended up getting a 
> regular 80mm lenght one. To make it fit, I had to "mod" the inner plastic 
> frame, and disassemble 50% of the laptop.  I opted simply to break pieces 
> of the plastic frame in order to free space for the lengthier drive. Then, 
> I isolated the surroundings with tape and secured the ssd (don't remember 
> how, if I was able to bolt it in, tape it, or pressure). The SSD I used in 
> the WWAN port is https://www.lexar.com/portfolio_page/ssd-nm100/ 256GB 
> version
>
> You have to change BIOS settings under drive configuration to enable the 
> required sata ports. 
>
> Initialized that drive as GPT, and installed Qubes to it.
>
> You are right regarding the "dual boot". I don't have Grub. I use the 
> "BIOS" UEFI bootmanager to choose which OS I'd like to boot. All I have to 
> do is press F12 after powering up. I've renamed Qubes to Recovery, so it is 
> inconspicuous. Default boot drive is the BX500 with windows. 
>
> The level of compatibility of the E5470 with Qubes is outstanding. The 
> performance is incredible.
> The only thing that didn't work OOB was the SD card reader, which was 
> easily fixed by opting to  kernel-latest . Docking station works 100%, with 
> multiple monitors. Even 2 monitors + laptop monitor works perfectly. I wish 
> it was possible to nuke Intel ME on 6th gen laptops and have it fully 
> Opensource. It would make a great candidate for certification.
>
> My only concern right now is the decisions for the GUI of Qubes 4.1. I 
> wonder if the separation of the GUI and dom0 would result in 
> incompatibility with E5470 or even a big decrease in performance. This 
> thing is perfect for Qubes if your threat model isn't government agencies 
> high.
>
> Hope I could help, and let me know if you have further questions.
> Em quarta-feira, 6 de maio de 2020 20:51:29 UTC-3, andrew@gmail.com 
> escreveu:
>>
>> Hi Rafael
>>
>> Interested to see you got an SSD drive to work in the WWAN slot in your 
>> E5470. Could you tell me what drive you used, and the spec for your laptop. 
>> Am I right in thinking that you have Windows installed on one drive and 
>> Qubes on the other, and that you actually choose which drive to boot from 
>> at power up? So it's not "dual-boot" in the usual sense (ie multiple OSs on 
>> the same drive)?
>>
>> Thanks
>>
>
Hi Rafael

Very many thanks for your comprehensive reply, lots of good information 
there.  What I hope to end up with is pretty similar to what you have - a 
large(ish) drive with Windws and Linux Mint in a conventional dual boot 
setup, and a drive in the WWAN slot to run Qubes.  I think it is possible 
to inactivate drives individually on Dell laptops so if I feel it necessary 
I could switch off the W/LM drive when using Qubes and vice versa.  I think 
this would largely get around the potential risk of the Qubes /boot 
partition getting compromised when using one of the other OSs?  Depends how 
paranoid I feel!

Regarding choice of laptop, I am torn between the E5470 and the 

[qubes-users] HCL - Dell XPS 15 7590

2020-05-14 Thread Adam Grodowski
Dear Qubes Users,

Happy to report that after some little manual labour, Dell XPS 15 7590 is
working with Qubes OS and Win 10 (dual OS)

Things I have done to make it work:
- Shrink Win root partition to make some space for Qubes
- Burn Qubes 4.0.3 to USB
- Disable EFI runtime services completely (
https://www.qubes-os.org/doc/uefi-troubleshooting/#installation-freezes-before-displaying-installer--disable-efi-runtime-services)
otherwise we have XEN kernel panic at "ENABLING IO-APIC IRQs, Using old ACK
method"
- Update BIOS from 1.5 to 1.6 (not sure if needed, probably not)
- Switch off the secure boot in BIOS: Secure Boot > Secure Boot Enable
- Modify SATA in BIOS: System Configuration > SATA Operation > AHCI
- Boot from USB (F12 for the boot menu)
- Install Qubes carefully within the empty space, not to damage the Win
partitions
- Ready any usb wifi dongle, because the wifi does not work (Killer(R)
Wi-Fi 6 AX1650x 160MHz Wireless Network Adapter (200NGW))
- Did not check for NVIDIA drivers, not needed for my work

For Win 10, I enable secure boot and set SATA to Raid
For Qubes, I disable secure boot and set SATA to AHCI

With kind regards,
Adam

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAM%3DdSs-uiF_Qdwq7%3DpaVjYM%3Dp-dvYarBBGSYnM_nKCgDhCuaSQ%40mail.gmail.com.


Qubes-HCL-Dell_Inc_-XPS_15_7590-20200514-105114.cpio.gz
Description: application/gzip


Qubes-HCL-Dell_Inc_-XPS_15_7590-20200514-105114.yml
Description: application/yaml


Re: [qubes-users] App menu not syncing

2020-05-14 Thread jiggermast47


On 5/11/20 3:20 PM, jiggermas...@posteo.de wrote:
> Hi,
>
> I can't sync app menus from one of my standalone Debian 10 VMs. In dom0
> I get:
>
> [user@dom0 ~]$ qvm-sync-appmenus VMNAME
>
> Traceback (most recent call last):
>   File "/usr/bin/qvm-sync-appmenus", line 9, in 
>     load_entry_point('qubesdesktop==4.0.20', 'console_scripts',
> 'qvm-sync-appmenus')()
>   File "/usr/lib/python3.5/site-packages/qubesappmenus/receive.py", line
> 397, in main
>     new_appmenus = retrieve_appmenus_templates(vm, use_stdin=use_stdin)
>   File "/usr/lib/python3.5/site-packages/qubesappmenus/receive.py", line
> 373, in retrieve_appmenus_templates
>     new_appmenus = get_appmenus(vm if not use_stdin else None)
>   File "/usr/lib/python3.5/site-packages/qubesappmenus/receive.py", line
> 155, in get_appmenus
>     "Error getting application list")
> qubesadmin.exc.QubesException: Error getting application list
>
>
> .x-session-errors in the VM shows:
>
> executed QUBESRPC qubes.GetAppmenus dom0 pid 10029
> send exit code 2
> pid 10029 exited with 2
>
> When I install something via apt, I get this, maybe a hint:
>
> Processing triggers for qubes-core-agent (4.0.55-1+deb10u1) ...
> execv: Permission denied
>
>
> Any idea where to look?
>
> Best
>

Hi,

Any ideas? I noticed this is valid for all my Debian StandaloneVMs.

Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/55147bac-f625-5c3c-bba9-b1622700d4ee%40posteo.de.


Re: [qubes-users] Connect to wifi - settings doesnt load

2020-05-14 Thread Alaa Ashkar
Much appreciated, i will check it out.

On Thu, May 14, 2020, 10:06 Jarrah  wrote:

>
> > I think my problem is common and also new, i read the thread you sent me
> > and many more but couldnt understand how to do the workaround? I read
> that
> > intel ax201 works on fedora perfectly, but on qubes no, how should i
> update
> > the fw? Can you please explain the steps or refer me to a good reference?
> > That would save me a lot of time.
> >
> You're right, it is a common problem for that card on Qubes.
>
> As described in https://github.com/QubesOS/qubes-issues/issues/5615,
> there is no simple answer to this one. You will have to patch and
> re-compile the kernel or replace the card. Is there an option to use a
> wired network while you wait for the patch to be pulled by upstream?
>
> If not, and you decide you want to learn how to patch and compile the
> kernel, there is quite a long (but very enlightening) path ahead of you.
> Start with https://www.qubes-os.org/doc/qubes-builder/. You will want to
> follow the steps in "Making a customized build" and insert the patch
> into src/linux-kernel/ and apply it in the spec file. The command `make
> kernel` should then result in a "kernel-qubes-vm" package that you can
> install in dom0.
>
> As I said, this will not be something that is easy, but you will learn a
> lot. The alternative is replacing the Wifi card with something supported
> (I can vouch for the Intel 9462 series being supported) or using wired
> ethernet for now.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAB2TdYDEZipr0Or4O4WAES%3D_bRmN%2Bz-wS024Rx3JG882s1mvRA%40mail.gmail.com.


Re: [qubes-users] Connect to wifi - settings doesnt load

2020-05-14 Thread Jarrah


> I think my problem is common and also new, i read the thread you sent me
> and many more but couldnt understand how to do the workaround? I read that
> intel ax201 works on fedora perfectly, but on qubes no, how should i update
> the fw? Can you please explain the steps or refer me to a good reference?
> That would save me a lot of time.
>
You're right, it is a common problem for that card on Qubes.

As described in https://github.com/QubesOS/qubes-issues/issues/5615,
there is no simple answer to this one. You will have to patch and
re-compile the kernel or replace the card. Is there an option to use a
wired network while you wait for the patch to be pulled by upstream?

If not, and you decide you want to learn how to patch and compile the
kernel, there is quite a long (but very enlightening) path ahead of you.
Start with https://www.qubes-os.org/doc/qubes-builder/. You will want to
follow the steps in "Making a customized build" and insert the patch
into src/linux-kernel/ and apply it in the spec file. The command `make
kernel` should then result in a "kernel-qubes-vm" package that you can
install in dom0.

As I said, this will not be something that is easy, but you will learn a
lot. The alternative is replacing the Wifi card with something supported
(I can vouch for the Intel 9462 series being supported) or using wired
ethernet for now.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bab27ff3-139d-73c1-aae6-4e5a01e26e4d%40undef.tools.


Re: [qubes-users] unidentified USB keyboard detected

2020-05-14 Thread Sven Semmler
On Thu, May 14, 2020 at 01:43:27AM -0500, Sven Semmler wrote:
> Turns out my Acer integrated webcam is somehow recognized as a webcam.
... as a keyboard. ;-)

Time to sleep.

/Sven

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200514064511.GA1363%40app-email-private.


Re: [qubes-users] unidentified USB keyboard detected

2020-05-14 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Wed, May 13, 2020 at 10:15:32PM -0500, Sven Semmler wrote:
> Just now I am using my Thinkpad in another place and there are no USB
> devices attached (no dongle, nothing else). When I restarted all my
> qubes I got the dom0 popup asking me whether I'd like to allow an action
> from sys-net to dom0 refering to qubes.InputKeyboard policy.
> 
> What was that? How can I find out what exactly get's detected as a
> keyboard in sys-net that then would trigger this notification?

Ok, via lsusb and searching for the respective devices I found a
qubes-users thread that ultimately lead me to this issue:
https://github.com/QubesOS/qubes-issues/issues/3604

Turns out my Acer integrated webcam is somehow recognized as a webcam.
So after adding:

ENV{ID_MODEL}=="*Camera", GOTO="qubes_input_proxy_end"

in /etc/udev/rules.d/90-qubes-input-proxy.rules as mentioned in the
github issue I no longer get the extra prompt. 

/Sven

- -- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-BEGIN PGP SIGNATURE-
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=fFL5
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200514064327.GA1294%40app-email-private.


[qubes-users] Re: What's your flow for new templateVM?

2020-05-14 Thread liked2




 From another post:
I ran some training a few years back, and the notes are here:
https://github.com/unman/notes/tree/master/salt

They start with the simplest use of `qubesctl`, and work up to quite
complex configurations, but should be easy to understand.
There are examples in (naturally) "examples".



Let's assume I'm managing all my configuration in /srv/salt/myConfig

From this post, it seems that these directories are not backuped by default by 
the qubes-backup:
https://groups.google.com/forum/#!searchin/qubes-users/doesn$27t$20fully$20restore%7Csort:date/qubes-users/FiGImnZ87sY/yK5h7gcsAgAJ

How do you backup them? By linking from /home? Copying all to /home before a 
backup? What's the best practice?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1e8abd43-619b-d688-8339-bdb3c6268e25%40gmx.de.