Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?
> On 5. Oct 2020, at 16:16, Stumpy stumpy-at-posteo.co wrote: > My computer actiing strange like some appvms not opening so i decided to > restart and restarted normally and booted back up fine except now i can > hardly open anything. Appvms will not start, I tried to do a backup from dom0 > term and that gave me an error, tried to run qubes-qube-manager and that gave > me a similar error... I'm at a loss. Of course I just finished doing some > important work and didnt immediately backp (usually bkup weekly). > I am not thrilled about reinstalling but can do it, but really really really > want to back up my appvms before nuking everything. If i cant use the regular > backup is there a way i can just copy things? I think I can still mount an > external drive... This should give you all the information necessary to get your data saved: https://www.qubes-os.org/doc/mount-from-other-os/ Regards, Frank -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/14455-1601963217-340060%40sneakemail.com.
Re: [qubes-users] Any Advantage to using OpenHAB on qubes?
On 30/09/2020 15.35, Stumpy wrote: > > I want OpenHAB to stay up to date but do not want it to be accessible > via the internet so i was thinking if I have a template with OpenHAB > installed that would install OpenHAB and hopefully plugins? > The thing is I am hoping to have wifi cameras, or at least PoE cameras > connected so it was less clear to me if i would be able to have an > OpenHAB appvm that was not connected to the internet, or blocked from > the network, but able to communicate with these various wireless devices? > Qubes can support restrictions on outbound traffic of your OpenHAB instance by using the firewall rules built into the qube settings screen. If you want to support inbound traffic you can use https://github.com/rudd-o/qubes-network-server but you will then have to manage your firewall rules on your own directly in the OpenHAB qube. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e83e72eb-9bdb-06ef-0c4e-2e739de87319%40rudd-o.com.
Re: [qubes-users] Firewall issue
On 22/09/2020 07.05, 'src11' via qubes-users wrote: > When I go into any qube settings for the firewall there is only an > option to create and edit rules for outgoing traffic, nothing at all > for incoming connections. Is that right? When I look at screenshots > online it shows options for creating both outgoing and incoming > connection rules. Latest version of Qubes. To support inbound connections you will need https://github.com/rudd-o/qubes-network-server and after installing it as per the instructions you will have to adjust nftables / iptables rules in the target VM. -- Rudd-O http://rudd-o.com/ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a67d8ab0-b363-2f9d-5a71-6751594e6fe5%40rudd-o.com.
[qubes-users] Article: "New Gentoo templates and maintenance infrastructure" by Frédéric Pierret
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Qubes Community, Frédéric Pierret has just published the following article: https://www.qubes-os.org/news/2020/10/05/new-gentoo-templates-and-maintenance-infrastructure/ The plain text of this article is reproduced below. === "New Gentoo templates and maintenance infrastructure" by Frédéric Pierret _This is the third article in the "What's new in Qubes 4.1?" series. Previously: [The New Qrexec Policy System](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/) and [The GUI Domain](https://www.qubes-os.org/news/2020/03/18/gui-domain/)._ New Gentoo templates - The work I've been doing on Gentoo templates is finally ready to be released! The corresponding issue is [#4412](https://github.com/QubesOS/qubes-issues/issues/4412), where you can find almost every related piece of work. I would like to highlight that this has been a great opportunity to collaborate with the Gentoo core team, and multiple improvements have been implemented on the Gentoo side thanks to the help of Gentoo devs **mgorny** and **zmedico**. When I encountered issues, I appreciated the quick response from several maintainers of different Gentoo components. Why a Gentoo template? Gentoo is designed for users who want to customize a Linux distribution to fit their specific needs. The benefit in Qubes is that it allows one to create highly customized and hardened TemplateVMs (or StandaloneVMs). For example, one could customize the Gentoo Qubes Builder to create a [ClipOS](https://clip-os.org/en/) build. The new Gentoo templates are available in tree flavors. The [default (Gnome)](https://www.qubes-os.org/doc/templates/gentoo/), [minimal](https://www.qubes-os.org/doc/templates/minimal/), and [XFCE](https://www.qubes-os.org/doc/templates/xfce/). Currently, they are available in the `qubes-templates-community-testing` repo, and they'll soon be in the `qubes-templates-community` repo. Maintenance infrastructure - -- In order to keep the new Gentoo template in good working condition, we need a set of automated tests. The bare minimum is continually testing whether just building the template still works. Due to the nature of Gentoo, such tests require far more resources (time, CPU power) than are available for open-source projects on Travis CI (which we use for testing other templates). We use Travis CI as a bare minimum for validating every pull request, then it generally goes to openQA. Here, the issue with Gentoo is that, by definition, it's a source distribution, so everything needs to be rebuilt. Travis allows a maximum timeout of something like 50 minutes for jobs. Simply rebuilding a Qubes component for Gentoo takes several hours (and more than half a day for each template). So, Travis is out. I've set up in our pull request pipeline the use of a feature of Gentoo that allows us to get pre-built binaries from a mirror. For that, when I build a full template, I push a fresh repository with every package built on my mirror. But still, even when doing this, hours are needed for jobs. I didn't want to give up on this, so, after evaluating several options, I decided to set up my own self-hosted GitLab CI instance. For that, I've developed a service that I call [qubes-g2g-continuous-integration](https://github.com/fepitre/qubes-g2g-continuous-integration/), forwarding selected GitHub pull requests to my GitLab CI instance. In consequence, I can manage the allocated resources for Gentoo builds, and we now have the means to validate every pull request for each component that has been integrated into Gentoo. A check status appears on GitHub side-by-side with Travis checks for other distros where everyone can access the build logs too. Here is an [example](https://gitlab.notset.fr/fepitre-bot/qubes-app-linux-input-proxy/-/pipelines/346). By the way, this is also what we use for automatically checking kernel pull requests. Here is a [recent pull request](https://github.com/QubesOS/qubes-linux-kernel/pull/276). When viewing the checks, you can see the results for the kernel builds. Once again, it's because the build time is superior to what Travis allows. Conclusion - -- All this infrastructure is intended not only for the kernel and Gentoo, but also to help Arch Linux users. Depending on the needed resources, we could also add the longer Arch Linux jobs into my GitLab CI instance, because we currently don't properly validate the template itself. In general, this new infrastructure allows us to create and test pipelines that require a lot of resources. Combined with Travis and openQA, we have another layer to rely on for validating and automating the building of cutting edge templates like Gentoo and Arch Linux. While the same kinds of features are available on paid GitLab plans, I preferred to do
[qubes-users] Announcement: "Qubes OS contributed packages are now available" by Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Dear Qubes Community, Marek has just published the following announcement: https://www.qubes-os.org/news/2020/10/05/qubes-os-contributed-packages/ The plain text of this announcement is reproduced below. == "Qubes OS contributed packages are now available" by Marek Marczykowski-Górecki We are happy to announce the availability of Qubes OS contributed packages under the [QubesOS-contrib] GitHub Project. This is a place where our community can [contribute Qubes OS related packages, additions and various customizations][package-contrib]. Meanwhile, we provide the infrastructure and [review process] necessary to make them available easily and safely to users within standard Qubes installations. [Frédéric Pierret] built the infrastructure based on a similar setup for building official packages. This means that it features the same [Qubes build security] measures, including keeping the signing keys separate in a dedicated VM, downloading packages over Tor, publishing build logs in a non-spoofable way and more. Frédéric is also the maintainer of [QubesOS-contrib]. The source code repositories of the packages and infrastructure-related parts are also hosted under [QubesOS-contrib]. To contribute a package, follow the process described at [package contributions]. You will find a few helpful tips there, including a [skeleton repository] with example RPM packaging and [Qubes Builder] integration. Since the project has been running for some time already, there are already some submitted packages available there. To name a few: - [qubes-tunnel] - [qvm-screenshot-tool] - [qmenu] You can find the full list at [QubesOS-contrib]. If you want to install one of these packages, first you need to enable the repository in your system (dom0 and/or templates). This can be done by installing the `qubes-repo-contrib` package. This package includes the repository definition and keys necessary to download, verify, and install [QubesOS-contrib] packages. In dom0, use `qubes-dom0-update`: sudo qubes-dom0-update qubes-repo-contrib In a Fedora-based template, use `dnf`: sudo dnf install qubes-repo-contrib In a Debian-based template, use `apt`: sudo apt update && sudo apt install qubes-repo-contrib [QubesOS-contrib]: https://github.com/QubesOS-contrib/ [package-contrib]: https://www.qubes-os.org/doc/package-contributions/ [review process]: https://www.qubes-os.org/doc/package-contributions/#review-procedure [Frédéric Pierret]: https://www.qubes-os.org/team/#fr%C3%A9d%C3%A9ric-pierret [Qubes build security]: https://www.qubes-os.org/news/2016/05/30/build-security/ [package contributions]: https://www.qubes-os.org/doc/package-contributions/ [skeleton repository]: https://github.com/QubesOS-contrib/qubes-skeleton/ [Qubes Builder]: https://www.qubes-os.org/doc/qubes-builder/ [qubes-tunnel]: https://github.com/QubesOS-contrib/qubes-tunnel [qvm-screenshot-tool]: https://github.com/QubesOS-contrib/qvm-screenshot-tool [qmenu]: https://github.com/QubesOS-contrib/qmenu == -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAl97wZ8ACgkQ203TvDlQ MDCXUxAAkurl2jyJSCEZxPlUel8G1rUhFFBPm3LFgpyTg3odC3GSD0fho0XiEKHh zY0ifGJO76n0b/INU9DK1RdDsMI5hM0w9uXEhnrk27xGLyYgtyBzZ7wV/ok3xQlr aEsjO4+SdRCNgIGt/MMRHtjnE1GgySo4UpExucilbKkmSXoSabY9r02DFMQIdsBL d3k+MIpgz5YlEAO3pvvTcKEN/k10s9oGalLrpIDjSlpieeXKzSrblDDSWhbN6hPA zMDjtoBnEHU9QX4OxoGN1qE8QDnfJK4LCqYz5II7HLWrRWywZ6E1+sCiqQRBg1H7 Osj+oWX03fZeh9HGRQGX7r5bDO5qRpFHge4SEQ0eiIwyeuijEY+w819spC2cfRN2 3hDnSKVOJl2E9Vth1/VF30kBsJsstgIomGoHmm49iGk8PzzAFUqPpklDiIJ/OpJl BTFUgdYXIwqae5JkfkQb866GkaMmeDsMT5hKdtWuKB26Idb4nboQ8rVQ7jD76lAR adXBJPMqmPr7mpI+xjqqBEvObau9zrLDaUFhS4FlsxLpqaSKWxQGkbLpBe+yL5/U +IW7Hsfjb/UELkW0sEPxXS+D6+Uxne7fWORBaxIbIJypw/fseOtchXBYbIzEpZGG O6gODRsAEad5YcgiZfwcNsa3BXu9qUYu9PUw95uP1wDIbLmpn44= =tYPp -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d25ebc13-6944-f035-1c2d-d9e3df17070e%40qubes-os.org.
Re: [qubes-users] Installing QubesOS on a System76 with Coreboot
Has anyone had success installing QubesOS on a System76 laptop that uses Coreboot? Yes, search this list for "Guide to installing Qubes on System76 Darter Pro". -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2fbba5d4-0615-8aa0-49b5-6e759e646e5f%40gmail.com.
[qubes-users] Can hardly run anything? every dom0 command results in Errrno2?
My computer actiing strange like some appvms not opening so i decided to restart and restarted normally and booted back up fine except now i can hardly open anything. Appvms will not start, I tried to do a backup from dom0 term and that gave me an error, tried to run qubes-qube-manager and that gave me a similar error [1]... I'm at a loss. Of course I just finished doing some important work and didnt immediately backp (usually bkup weekly). I am not thrilled about reinstalling but can do it, but really really really want to back up my appvms before nuking everything. If i cant use the regular backup is there a way i can just copy things? I think I can still mount an external drive... Links: -- [1] https://pasteboard.co/JufhRoH.jpg -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9706eff53bd976879c1f41c54335cc5c%40posteo.net.
Re: [qubes-users] Troubleshooting Installation of Windows 10 in Qubes OS
Qubes: > On 10/5/20 10:21 AM, Knut von Walter wrote: >> Hi, >> >> at the moment I am trying to install Windows 10 following this >> instruction, link: _https://www.qubes-os.org/doc/windows-vm/_. However >> Windows is not booting. After clicking on ”Boot from CDROM”. I get the >> following error-message: >> >> Qube-Status: windows 10: Domain windows-10 has failed to start: Cannot >> connect to qrexec agent for 60 seconds, see >> /var/log/xen/console/guest-windows-10.log for details. >> >> Has anyone an idea how to solve this? All help is appreciated. >> >> Thank you. >> >> Best Knut von Walter >> >> > How much memory do you have assigned to the VM? > Also recommend using https://github.com/elliotkillick/qvm-create-windows-qube if you aren't, just pay attention to the Windows 10 note. There's a mandatory manual step at the end. -- - don't top post Mailing list etiquette: - trim quoted reply to only relevant portions - when possible, copy and paste text instead of screenshots -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6f4412a1-9028-da42-22e8-1e83c33de9ab%40danwin1210.me.
[qubes-users] Focal template and packages
I've put in PRs to allow for build of focal packages and template, on Fedora 32 build system. These should be merged soon, and will allow you to select Focal as a target in ./setup, run make get-sources, make qubes-vm, and make template. As always, I recommend that you build from source yourself - it really isn't difficult. If you are not sure about building for yourself, or don't have time, I've made a pre-built template available at https://qubes.3isec.org/Templates All my templates, packages and repositories are signed with my Qubes Signing key - you can get this from any keyserver. You should check this against other sources - the Qubes-Users mailing list, [GitHub](https://github.com/unman/unman/blob/master/gpg-keys.asc), maybe another keyserver over Tor. You should do something like this, in a disposableVM: Download the template from https://qubes.3isec.org/Templates Once you have downloaded and confirmed my "Qubes OS signing key", add it to your rpm keyring: `sudo rpm --import ` Check the signature on the template: `rpm -K ` If all is well you will see "digests signatures OK" Once you are satisfied, install the Template. To do this you will need to copy it to dom0. In dom0 run: `qvm-run -p 'cat ' > focaltemplate` Then install, in dom0 : `sudo dnf install focaltemplate` You can also add the repository to a StandAlone focal qube, and install normal range of Qubes packages, for better integration with the system. Cheers unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20201005140147.GA15434%40thirdeyesecurity.org.
[qubes-users] adnroid in qubes / anbox
anbox dot io is it possible to start use with qubes? Looks promising! But request some kernel modules and as I understand it is the problem. Any ideas how to run it? or any other alternative? thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9b453701-376f-4044-a1d9-569183ad29a8n%40googlegroups.com.
Re: [qubes-users] Troubleshooting Installation of Windows 10 in Qubes OS
On 10/5/20 10:21 AM, Knut von Walter wrote: Hi, at the moment I am trying to install Windows 10 following this instruction, link: _https://www.qubes-os.org/doc/windows-vm/_. However Windows is not booting. After clicking on ”Boot from CDROM”. I get the following error-message: Qube-Status: windows 10: Domain windows-10 has failed to start: Cannot connect to qrexec agent for 60 seconds, see /var/log/xen/console/guest-windows-10.log for details. Has anyone an idea how to solve this? All help is appreciated. Thank you. Best Knut von Walter How much memory do you have assigned to the VM? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/591ae9b3-ed12-febb-f6e3-e7c19ae618e4%40ak47.co.za.
[qubes-users] Troubleshooting Installation of Windows 10 in Qubes OS
Hi, at the moment I am trying to install Windows 10 following this instruction, link: _https://www.qubes-os.org/doc/windows-vm/_. However Windows is not booting. After clicking on ”Boot from CDROM”. I get the following error-message: Qube-Status: windows 10: Domain windows-10 has failed to start: Cannot connect to qrexec agent for 60 seconds, see /var/log/xen/console/guest-windows-10.log for details. Has anyone an idea how to solve this? All help is appreciated. Thank you. Best Knut von Walter -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fb87b3da-fec8-5d88-6cab-96cd2d59d997%40websecur.eu.
[qubes-users] Re: Thunderbird 78.2.1
Le 2020-09-10 à 09:09, Frédéric Pierret a écrit : > Hi, > Just a little update to let you know that I've built Thunderbird 78.2.1 for > Fedora 31 and 32 (33 soon I need to debug a failing build): > https://copr.fedorainfracloud.org/coprs/fepitre/thunderbird-78/build/1654837/ > > If someone wants to try it (**don't upgrade your template** or do it at your > own risk): > > $ sudo dnf copr enable -y fepitre/thunderbird-78 > $ sudo dnf update thunderbird > > As we are currently implementing tests > (https://github.com/fepitre/qubes-app-linux-split-gpg/tree/tb78) for > Thunderbird 78 and their PGP implementation, until Fedora and other distros > have upgraded their version, we plan to use my COPR repo for validating the > Qubes Slit GPG mechanism. > > Best regards, > Frédéric > Hi, Following my previous email, Fedora is now building and testing Thunderbird 78.3.1 for rawhide (https://src.fedoraproject.org/rpms/thunderbird). They will certainly upgrade current stable versions soon. We have made a specific documentation for Thunderbird 78 and higher for configuring Split GPG without Enigmail. Please have a look here: https://www.qubes-os.org/doc/split-gpg/#thunderbird-78-and-higher. You can already try to configure and test yourself by using builds I've made for Fedora 31 and 32 on my COPR repository. Best regards, Frédéric -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/de72f17f-a589-5632-6bed-460566d4bf0b%40qubes-os.org. signature.asc Description: OpenPGP digital signature