Re: [qubes-users] My farewell to Qubes OS!

2018-10-28 Thread HawKing
On Thu, 25 Oct 2018 12:21:44 +0200
Joanna Rutkowska  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> Hello Qubes devs and users!
> 
> It's been nearly 9 years[*] since I sent the first internal email
> within ITL to Rafał Wojtczuk and Alex Tereshkin with the original idea
> for making Qubes OS. Shortly after this, we started drafting the
> original architecture and writing some early PoC code...
> 
> Today, I've made an announcement I'm switching focus to another area
> of work and joining the Golem Project as a Chief {Strategy, Security}
> Officer:
> 
> https://www.qubes-os.org/news/2018/10/25/the-next-chapter/
> 
> https://blog.golemproject.net/joanna-rutkowska-joins-golem-as-chief-strategy-security-officer-13f12f0c11c0
> 
> I'd like to thank all the people who made Qubes OS possible, which
> includes: the whole ITL team, all the community contributors, and, of
> course, all the Qubes OS users!
> 
> Qubes OS will continue under the lead of Marek Marczykowski-Górecki,
> who have been a de-facto lead for all the day-to-day development for
> quite some time already!
> 
> Thanks, Marek! Thank you, all!
> 
> Cheers,
> joanna.
> 
> [*] FWIW, the exact date was November 11th, 2009.
> -BEGIN PGP SIGNATURE-
> 
> iQIzBAEBCAAdFiEEtR14vbBDAuE0X2Ly1F2dklVl1NIFAlvRmTYACgkQ1F2dklVl
> 1NIiDxAAtwm3qM1Rq3ow67q5bLu+1VnuM0NQrN/crLu+FDOdaa9XNzSsdWz97UoN
> 2VsRO+RICNttrR7MAaWSgTXtBKOMuSXYc7s5r7VVFtx4qW0xyRaxbr7vBqJRDM5n
> 6eCLdjAFf1Xh8Ju5eDnBJGx41EIywO4Jba3z9+Ww2xyBycQAYY22yRQf6ANlWfwW
> XE0HgBuaJtAEReJc7qpzlG/iwLa/de1eqVa9kOS4HrESllE9wP7qXLrnmwr/yH19
> 2twe3QVS29uVYzPOam6PiCg1PN4AjsYKvihy/Tap11bYfdr1L8OjmE9+KrDPFPek
> MaWlkl/OoiFZsQHhj1somMfFNKH82oTW3zIAZCmmOZgQHgt6T1KDzjehFTASJeFp
> WNmvmowDYfcVYEdjEXQKP78mpxlYz6fChr/A4x3TX64+KsltdZA7l266OMfpXvL4
> Mja4SUvEKqLbyEQxCaDnOwm4cV7k/dHtOXE5fREzUfi+YVu14yVNkPRxg9UpgtCa
> sV/PY7AwOe4JqxV+8VlWWmX0amNf8ZEtz51F2eH6NZZYGaRtTXxTKW6Aad0XHg7p
> 8m2gvH8YWnGPX7ckofcpL7NHR5B6EauXoHKeQZgV9Ix0NQf2CNvBv5ZxZ7IYannH
> mJEcpgRYMtG5b8+x05hBCb7CP5T/tQpt2r5jIK3eqwEzcPY//H8=
> =1ZqA
> -END PGP SIGNATURE-

With only meager success in remote trustless computation (using
homomorphic encryption for example), a system that enables a reasonably
secure, robust, trust-less or verifiable design for general purpose
software and infrastructure actually running in the "cloud" is, in my
opinion, perhaps the hardest and most impactful problem in computer
security currently. If anyone can solve a problem like that in a
realistic way, leave it to Joanna!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6F2075AC-069C-4C45-864F-B891D552CFE4%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] default sys-whonix vs Tor browser bundle bandwidth anomaly

2017-06-12 Thread HawKing
When I route a VM through sys-whonix, I'm getting 5k/s internet
speeds, but when I use the standard tor browser bundle in a VM attached
to the firewall VM, I get my standard 300-800K/s on tor, and without tor
about 12M/s. This is now consistently reproducible every day for about 1
week, and I am a bit puzzled. It's not just happening with browsing, but
other attached applications as well. It makes internet through Tor
basically unusable. As background, I installed the sys-whonix with
defaults, it was working normally until about a week ago, and I've
changed no settings. Does anyone have any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8499B31D-817C-4D6D-8E12-34A2EA04AA11%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Yubikey, luks disk encryption password, and usb-vm ?

2017-06-04 Thread HawKing
On Sun, 4 Jun 2017 22:29:57 +0200
Patrik Hagara  wrote:

> On 06/04/2017 10:03 PM, hawk...@bitmessage.ch wrote:
> > When using a usb-vm, my usb keyboard is not accessible at boot time,
> > and thus my disk encryption password must be typed on the built-in
> > keyboard. 
> > 
> > When not using a usb-vm, a usb keyboard can be used to enter the
> > disk encryption password.
> > 
> > When using a simple static password at boot typed by the yubikey
> > (which acts like a keyboard), it has the same limitations as the
> > usb keyboard, wherein it can't type the disk password when a usb-vm
> > is being used. 
> > 
> > I could not determine whether the documentation discussing
> > challenge-response addresses this problem with boot-time disk
> > passwords as some sub-component
> > ( https://www.qubes-os.org/doc/yubi-key/ ). I only see the
> > screensaver discussed, but not disk passwords at boot. 
> > 
> > While still using a usb-vm to manage all usb devices, is there any
> > way to authorize the yubikey automatically at boot time so it can
> > type in a password for me?
> > 
> > Also, here: ( https://github.com/adubois/qubes-app-linux-yubikey),
> > am I missing the referenced qubes-yubikey-vm and qubes-yubikey-dom0
> > in the repos, because they don't seem to exist?
> > 
> > Thanks!  
> 
> With USB VM enabled, all USB devices are hidden from dom0 even during
> the Linux kernel boot (but not before). If you need to use USB devices
> during Qubes OS boot (keyboard, yubikey, anti-evil-maid, ...) and
> don't mind rigorously checking nobody has plugged any suspicious USB
> devices into your machine before powering it on (as you should be
> doing anyway), you can follow the steps outlined below.
> 
> There's a Linux kernel command line argument you need to remove from
> /etc/default/grub -- find the line starting with "GRUB_CMDLINE_LINUX"
> and drop the "rd.qubes.hide_all_usb" argument. Save the changes and
> rebuild grub configuration using `sudo grub2-mkconfig -o
> /boot/grub2/grub.cfg` and then reboot.
> 
> Please note that if you have anti-evil-maid installed, you also need
> to re-run `anti-evil-maid-install` script on your AEM device.
> Unsealing of your secrets will, as expected, fail during next boot.
> 
> Once you reboot without this option, you can use any USB device
> normally.
> 
> 
> Cheers,
> Patrik
> 

Thanks for the clear answer! It took some searching, but it looks like
that for me, that flag was only present in /boot/efi/EFI/qubes/xen.cfg
and it does not seem to require rebuilding grub to work. I didn't see
that location discussed here https://www.qubes-os.org/doc/usb/ under
"Removing a USB qube" either. 

Now, to see if I can get the luks challenge response working rather
than just a static password ...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9B2FFA9B-A748-43F5-A40C-8DB9D57365FA%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Making 2 or more NetVMs available to one Qube

2017-06-04 Thread HawKing

On Sun, 4 Jun 2017 11:02:46 -0700 (PDT)
michael.vandeloe...@gmail.com wrote:

> Greetings fellow qubes users! Long time tinkerer, first time poster
> so I apologize if I make some mistakes here and will gladly correct
> them.
> 
> On to my issue: I have been operating a media server on my home
> network using openmediavault for some time now. I recently acquired a
> desktop that was a perfect donor for a qubes setup. After some trials
> and tribulations and the installation of a few forks, I've managed to
> get OMV to operate as a VM and I have access to it and it's services
> through my network. My issue is that I use the CouchPotato and
> Sickbeard plugins, which use a transmission torrent plugin to
> download television programming and movies. For obvious reasons, I
> would prefer to torrent over Tor. OMV works flawlessly when connected
> to sys-firewall but not when connected to sys-whonix - I lose the
> ability to reach the server from every device. Is there a way to feed
> both to my OMV VM so that I could use sys-firewall to offer services
> to the network and sys-whonix for anon downloads?
> 
> Thanks in adance for your time! 
> 

I'm not sure about how UDP forced through an isolating tor proxy works,
but here is some discussion I've seen:

https://tor.stackexchange.com/questions/64/how-can-bittorrent-traffic-be-anonymized-with-tor
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea
https://www.grepular.com/Making_BitTorrent_Safe_to_Use_Over_Tor

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/83E11A98-33BF-4700-9EE4-F3A9DC7505E5%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Yubikey, luks disk encryption password, and usb-vm ?

2017-06-04 Thread HawKing
When using a usb-vm, my usb keyboard is not accessible at boot time,
and thus my disk encryption password must be typed on the built-in
keyboard. 

When not using a usb-vm, a usb keyboard can be used to enter the disk
encryption password.

When using a simple static password at boot typed by the yubikey (which
acts like a keyboard), it has the same limitations as the usb keyboard,
wherein it can't type the disk password when a usb-vm is being used. 

I could not determine whether the documentation discussing
challenge-response addresses this problem with boot-time disk passwords
as some sub-component ( https://www.qubes-os.org/doc/yubi-key/ ). I only
see the screensaver discussed, but not disk passwords at boot. 

While still using a usb-vm to manage all usb devices, is there any way
to authorize the yubikey automatically at boot time so it can type in
a password for me?

Also, here: ( https://github.com/adubois/qubes-app-linux-yubikey),  am I
missing the referenced qubes-yubikey-vm and qubes-yubikey-dom0 in the
repos, because they don't seem to exist?

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4F165EA4-C4D7-46BA-A053-938D9B012387%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] HCL - Dell Lattitude E5570

2017-06-02 Thread HawKing
On Sun, 19 Feb 2017 20:49:43 -0500
"'Qubes Lovitt' via qubes-users"  wrote:

> Everything working great so far
> 
> -Windows7 HVM template & appvms fine.
> -sys-usb fine and able to pass through individual USB devices
> -PCI passthrough working (sound, usb, SD card reader) -- will try
> external thunderbolt 3 GPU enclosure next month and report GPU
> passthrough results once/if working -Contacted smartcard working with
> PGP/Enigmail. Next will try contactless NFC along with -fingerprint
> scanner and will report any results of where I got that working -TPM
> available but booting in UEFI mode so have not tried AEM yet
> 
> I believe this notebook should be Qubes 4.0-ready based on what I
> have seen.
> 
> Cheers. Attached HCL tool YML output.
> 
> 
> 
> 


If you have the touchscreen version of the Dell Lattitude E5570, were
you able to pass the touchscreen back to dom0? 

The touchscreen on the lattitude E5570 works great without a usb-vm. 

Though other usb devices can be passed via usb-vm just fine, I'm getting
an error with the touchscreen:

"ValueError: Dom0 do not have libvirt object"

As best I can tell, all of the usb devices are on one controller for
this model Dell.

I'm not sure if anyone at all has had luck with touchscreens passed via
usb-vm, or whether the effort has been wholly unsuccessful so far:

https://github.com/QubesOS/qubes-issues/issues/2281

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3252BC87-65A9-429F-8C90-A0E1F15DC785%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Accessing Android phone photos

2017-05-30 Thread HawKing

On Mon, 29 May 2017 21:41:02 -0700 (PDT)
Vít Šesták

wrote:

> You are right, support for USB touchscreen is incomplete, see
> https://github.com/QubesOS/qubes-issues/issues/2281 . Maybe it would
> not require much work.
> 
> You can also try to start sys-usb temporarily and then (when you have
> no remaining connected device) to reassign the USB controller back to
> dom0:
> https://www.qubes-os.org/doc/assigning-devices/#bringing-pci-device-back-to-dom0
> 
> Note that starting a non-HVM with USB controller (or any other PCI
> device) might be a little challenging sometimes, because PV with PCI
> require unfragmented memory. You can:
> 
> * Hope you will be lucky all the time.
> * Give sys-usb as low memory as possible. (200MiB should be enough.)
> * Attach USB controller to a HVM (which will probably consume more
> memory, but it won't require it unfragmented) – requires VT-d/IOMMU.
> * Shut some VMs down, ideally with temporarily disabled qmemman.
> * Wait for Qubes 4. It will use HVMs (or probably slightly different
> technology in 4.1) instead of PVs, so it won't require unfragmented
> memory. Requires VT-d/IOMMU and few other virtualization features.
> 
> Regards,
> Vít Šesták 'v6ak'
> 

Thanks again! As a slightly cruder solution to android photo access, I
see that saving photos to a micoSD in the phone, removing it and
sticking the card into a regular SD card adapter, and using that in the
built in card-reader in my computer, allows access just like a USB
stick or external hard drive, with the microSD appearing just like any
external storage in the Qubes VM manager. 

Cheers.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3A6D62A0-0A40-46BE-9F2B-1278E3264508%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Accessing Android phone photos

2017-05-29 Thread HawKing


On Sun, 28 May 2017 23:21:09 -0700 (PDT)
Vít Šesták

wrote:

> The qubes-usb-proxy is needed in both VMs (in this case, you would
> have to install in dom0).
> 
> Well, it might work in dom0, but I am not sure if it is the intended
> usage.
> 
> What's your reason for not using sys-usb? Do you use some USB device
> that needs to be connected directly to dom0?
> 
> Regards,
> Vít Šesták 'v6ak'
> 
> -- 


Thanks. Yes, my touchscreen breaks when choosing usb-vm on install. I
suspect it is possible to pass it back to dom0, but haven't had time to
figure it out. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CDAF878A-E42B-48E1-8063-67E299381D6A%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Accessing Android phone photos

2017-05-28 Thread HawKing
On Fri, 12 May 2017 00:05:42 +0200
"'PR' via qubes-users"  wrote:

> Hello Alex,
> 
> On 05/11/2017 11:41 PM, Alex wrote:
> > /I'm connecting my Android phone over USB to my Qubes 3.2 host
> > and... nothing happens. I'm using a Fedora 24 template and a USB
> > Qube. I've read the issues on github relating to this but have not
> > found a simple set of instructions for accessing my phone's files
> > over MTP. What are the steps? /  
> 
> I have never attached my Android phone to Qubes before, but tried so
> a few minutes ago and could access it without any problems:
> 
> 1) attach phone via USB
> 
> 2) on the phone, switch from "Charging only" to "USB Data tranfser
> (MTP)"
> 
> 3) Launch a dom0 Terminal, you should see your phone after entering:
>  [user@dom0 ~]$ qvm-usb
> ...
> sys-usb:3-3 04xx:88xx Android_Androidxxx
> ...
> 
> 4) mount your phone via sys-usb to your AppVM (I've choosen my
> untrusted AppVM in this case):
>  [user@dom0 ~]$ qvm-usb -a untrusted sys-usb:3-3
> 
> 5) Open a File Explorer in this AppVM
>  [user@dom0 ~]$ qvm-run untrusted nautilus
> 
> 6) you should see your phone as an additional device beneath the
> Trash-Icon. If not, unmount and remount the phone once:
>  [user@dom0 ~]$ qvm-usb -d sys-usb:3-3
>  [user@dom0 ~]$ qvm-usb -a untrusted sys-usb:3-3
> 
> 
> Good luck
> 
> - P
> 


Can attaching an android phone be accomplished without having a usb-vm? 

When I try the above method substituting my devices and dom0 instead
of sys-usb, I get this error:

qubes-usb-proxy not installed in the VM

qubes-usb-proxy is installed in the destination VM, but I don't have a
sys-usb. 

Thanks!


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/C0DD71FA-7929-45DD-AA3B-D0271A676690%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display section of XFCE panel from another VM in Dom0?

2017-02-20 Thread HawKing
On Mon, 20 Feb 2017 22:27:22 +
Unman  wrote:

> On Mon, Feb 20, 2017 at 12:06:28PM -0600, hawk...@bitmessage.ch wrote:
> > On Mon, 20 Feb 2017 12:02:16 -0600
> >  wrote:
> >   
> > > On Mon, 20 Feb 2017 02:05:41 -0800
> > > Andrew David Wong  wrote:
> > >   
> > > > -BEGIN PGP SIGNED MESSAGE-
> > > > Hash: SHA512
> > > > 
> > > > On 2017-02-17 13:06, hawk...@bitmessage.ch wrote:
> > > > > As a generalization of my previous question:
> > > > > 
> > > > > I've seen screenshots (Joanna's:
> > > > > https://cloud.githubusercontent.com/assets/10212863/16384754/7e131672-3c8a-11e6-8fc7-62bf9a1d90bf.png)
> > > > > where a section of the panel seems to be showing the XFCE
> > > > > menubar from another VM, such as sys-firewall. Perhaps I'm
> > > > > interpreting the colors wrong, but I can't seem to figure out
> > > > > how to accomplish this. Does anyone have any tips?
> > > > >   
> > > > 
> > > > I actually don't see what you describe in that screenshot. Can
> > > > you explain in more detail what you mean?
> > > > 
> > > > P.S. - Please don't top-post.
> > > 
> > > It looks to me like the little green monitor bars and green text
> > > in the upper right might be displaying sys-firewall data. I could
> > > be wrong, but am curious either way.
> > > 
> > >   
> > > > 
> > > > > 
> > > > > On Tue, 14 Feb 2017 16:09:10 -0600
> > > > >  wrote:
> > > > >   
> > > > >> The network monitor plugin displays nicely colorized current
> > > > >> network traffic rate on the XFCE panel. I would like to get
> > > > >> this displaying the netVM's traffic rate, next to the red
> > > > >> netvm in Dom0's panel. However, typically it doesn't run in
> > > > >> the "notification area", and I'm not sure how to get it
> > > > >> displayed in Dom0 (as the netvm icon is). 
> > > > >>
> > > > >> Can anyone point me in the right direction ?
> > > 
> > > I've attached a screenshot of the XFCE network monitor (in a
> > > normal XFCE install) that I was hoping to display in dom0, but
> > > with real-time data from netvm or firewall. The goal is to see all
> > > current network traffic easily.
> > > 
> > > Thanks!  
> > 
> > and the screenshot is attached... 
> >   
> 
> It seems to me that the issue here is that you want to attach a panel
> applet from sys-net to the dom0 panel. I don't think this can be
> easily done.
> 
> You can, of course, open a xfce-panel and run the applet in that, but
> this wont be locked to the dom0 panel, and will be a freefloating
> window.

So install XFCE in the fedora template, restart, run "xfce4-panel
--preferences" in the netvm, and add a new panel via the panel gui,
followed by the applet?

> 
> An alternative would be to choose a monitor that uses the system tray
> because Qubes will automatically incorporate this in to the dom0
> system tray, (like the nm-applet). 
> For example, you could install indicator-multiload and have it
> automatically start configured to show network traffic - this should
> appear in the system tray. I think that shows graphs so it isn't
> exactly what you are looking for.
> I'm probably missing something obvious but this solution will work as
> you want. 
> 
> Another approach might be to run conky configured semi-transparent so
> you retain the output but don't lose screen space.
> 
> unman


I thought that indicator-multiload was debian/ubuntu only? I think it's
on the wish-list for the Fedora repos.

I guess Conky might be a good way to go.

Thanks! 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37C4D9C4-A112-454F-A64C-4F55F66CCFAB%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display section of XFCE panel from another VM in Dom0?

2017-02-20 Thread HawKing
On Mon, 20 Feb 2017 12:02:16 -0600
 wrote:

> On Mon, 20 Feb 2017 02:05:41 -0800
> Andrew David Wong  wrote:
> 
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> > 
> > On 2017-02-17 13:06, hawk...@bitmessage.ch wrote:  
> > > As a generalization of my previous question:
> > > 
> > > I've seen screenshots (Joanna's:
> > > https://cloud.githubusercontent.com/assets/10212863/16384754/7e131672-3c8a-11e6-8fc7-62bf9a1d90bf.png)
> > > where a section of the panel seems to be showing the XFCE menubar
> > > from another VM, such as sys-firewall. Perhaps I'm interpreting
> > > the colors wrong, but I can't seem to figure out how to accomplish
> > > this. Does anyone have any tips?
> > > 
> > 
> > I actually don't see what you describe in that screenshot. Can you
> > explain in more detail what you mean?
> > 
> > P.S. - Please don't top-post.  
> 
> It looks to me like the little green monitor bars and green text in
> the upper right might be displaying sys-firewall data. I could be
> wrong, but am curious either way.
> 
> 
> >   
> > > 
> > > On Tue, 14 Feb 2017 16:09:10 -0600
> > >  wrote:
> > > 
> > >> The network monitor plugin displays nicely colorized current
> > >> network traffic rate on the XFCE panel. I would like to get this
> > >> displaying the netVM's traffic rate, next to the red netvm in
> > >> Dom0's panel. However, typically it doesn't run in the
> > >> "notification area", and I'm not sure how to get it displayed in
> > >> Dom0 (as the netvm icon is). 
> > >>
> > >> Can anyone point me in the right direction ?  
> 
> I've attached a screenshot of the XFCE network monitor (in a normal
> XFCE install) that I was hoping to display in dom0, but with
> real-time data from netvm or firewall. The goal is to see all
> current network traffic easily.
> 
> Thanks!

and the screenshot is attached... 

> 
> 
> > 
> > - -- 
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> > -BEGIN PGP SIGNATURE-
> > 
> > iQIcBAEBCgAGBQJYqr9yAAoJENtN07w5UDAwS4UQAJGW2Rh7guMBIHdZSStECOzL
> > B7lLSkRd3o7FpGerui4RVsc/Wf/G0zq2QTxmLYte1mEcnnL3WA1B1jqi0BZ/gVX6
> > i4napzVVuXA7xJHsVtYxHYL43Vx9XlhU54LgJlJluoiG1reyOTq0DI05Hqp+qPOc
> > Tf9f6aI6mPa3S3faLChY6Mqw1BV15YUNMJs8sehmc0pzDIbyec3uhFiadNjbPUFD
> > 65VIg9RWiD3uQ9aaqZ52agB16q46Zsw4jT+uYvwWBRxpAaxrDPh9ftsgTCO95ys8
> > YjOX/TWZo9HAoXB7yPdJQxSP+bIIbtuokFQ/LbB/t4e7hS+XmHyV0+JzQzw+UpLZ
> > qsEjIPKPZox4VmFHKjR4bUbgdJKfrYuxXCleP2de7zqnzShCsdAMaxYfSgm4+bQd
> > DB8LC1LhwxYhQNA0uJtyja3I6+qAgId/VlL3kHycRZ5GvkZkrktUn+SOlf6+PrJD
> > vFqHW2cfJgoi9UXXj9uhKRihguVKLCRlR0aRJJ5RvYG20aaRqbQ5XB45H9ADN2FY
> > qwCkXlDjcIobRXugn6MBVa+51CWIYs+u08XsJiO9LH8b2LnN1sNaxEB1hKWbwFt6
> > wOYR9zHOcek6Zhbedixwnr2Ca6pMBLYjqOgZhI3zRVSaps/k6Hk8xZz70CTiehf9
> > afX9jnwJV38fczZKGwSC
> > =YHT3
> > -END PGP SIGNATURE-
> >   
> 
> 
> -- 
> You received this message because you are subscribed to the Google
> Groups "qubes-users" group. To unsubscribe from this group and stop
> receiving emails from it, send an email to
> qubes-users+unsubscr...@googlegroups.com. To post to this group, send
> email to qubes-users@googlegroups.com. To view this discussion on the
> web visit
> https://groups.google.com/d/msgid/qubes-users/D048C965-4D5F-464F-ACC5-CC56A0AB02EC%40mail.bitmessage.ch.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/29E36098-1657-482D-9611-2B6D19C3CA31%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display section of XFCE panel from another VM in Dom0?

2017-02-20 Thread HawKing
On Mon, 20 Feb 2017 02:05:41 -0800
Andrew David Wong  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> On 2017-02-17 13:06, hawk...@bitmessage.ch wrote:
> > As a generalization of my previous question:
> > 
> > I've seen screenshots (Joanna's:
> > https://cloud.githubusercontent.com/assets/10212863/16384754/7e131672-3c8a-11e6-8fc7-62bf9a1d90bf.png)
> > where a section of the panel seems to be showing the XFCE menubar
> > from another VM, such as sys-firewall. Perhaps I'm interpreting the
> > colors wrong, but I can't seem to figure out how to accomplish
> > this. Does anyone have any tips?
> >   
> 
> I actually don't see what you describe in that screenshot. Can you
> explain in more detail what you mean?
> 
> P.S. - Please don't top-post.

It looks to me like the little green monitor bars and green text in
the upper right might be displaying sys-firewall data. I could be
wrong, but am curious either way.


> 
> > 
> > On Tue, 14 Feb 2017 16:09:10 -0600
> >  wrote:
> >   
> >> The network monitor plugin displays nicely colorized current
> >> network traffic rate on the XFCE panel. I would like to get this
> >> displaying the netVM's traffic rate, next to the red netvm in
> >> Dom0's panel. However, typically it doesn't run in the
> >> "notification area", and I'm not sure how to get it displayed in
> >> Dom0 (as the netvm icon is). 
> >>
> >> Can anyone point me in the right direction ?

I've attached a screenshot of the XFCE network monitor (in a normal
XFCE install) that I was hoping to display in dom0, but with
real-time data from netvm or firewall. The goal is to see all
current network traffic easily.

Thanks!


> 
> - -- 
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
> 
> iQIcBAEBCgAGBQJYqr9yAAoJENtN07w5UDAwS4UQAJGW2Rh7guMBIHdZSStECOzL
> B7lLSkRd3o7FpGerui4RVsc/Wf/G0zq2QTxmLYte1mEcnnL3WA1B1jqi0BZ/gVX6
> i4napzVVuXA7xJHsVtYxHYL43Vx9XlhU54LgJlJluoiG1reyOTq0DI05Hqp+qPOc
> Tf9f6aI6mPa3S3faLChY6Mqw1BV15YUNMJs8sehmc0pzDIbyec3uhFiadNjbPUFD
> 65VIg9RWiD3uQ9aaqZ52agB16q46Zsw4jT+uYvwWBRxpAaxrDPh9ftsgTCO95ys8
> YjOX/TWZo9HAoXB7yPdJQxSP+bIIbtuokFQ/LbB/t4e7hS+XmHyV0+JzQzw+UpLZ
> qsEjIPKPZox4VmFHKjR4bUbgdJKfrYuxXCleP2de7zqnzShCsdAMaxYfSgm4+bQd
> DB8LC1LhwxYhQNA0uJtyja3I6+qAgId/VlL3kHycRZ5GvkZkrktUn+SOlf6+PrJD
> vFqHW2cfJgoi9UXXj9uhKRihguVKLCRlR0aRJJ5RvYG20aaRqbQ5XB45H9ADN2FY
> qwCkXlDjcIobRXugn6MBVa+51CWIYs+u08XsJiO9LH8b2LnN1sNaxEB1hKWbwFt6
> wOYR9zHOcek6Zhbedixwnr2Ca6pMBLYjqOgZhI3zRVSaps/k6Hk8xZz70CTiehf9
> afX9jnwJV38fczZKGwSC
> =YHT3
> -END PGP SIGNATURE-
> 


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/D048C965-4D5F-464F-ACC5-CC56A0AB02EC%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] no strg+c-possibility in Icedove by using pgp-mails

2017-02-17 Thread HawKing
On Fri, 17 Feb 2017 22:16:32 +0100
evo  wrote:

> Hello!
> 
> i had this problem already in xfce.
> icedove don't allow to copy and paste in the password window for
> pgp-mails, if you use xfce.
> 
> do somebody has a solution for this??
> 
> or do you just use pgp-passwords that you have in your head??
> i use keepassx for that... but i can not paste the password in the
> window of icedove.
> 
> thanks!
> 
> -- 


If you use the mouse to manage Keepassx, it will auto-type for you into
the popup box. In newer versions, this annoying behavior has been
disabled. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/B5A2C7F5-48A7-4DC6-A5EA-0F70C61B06E4%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] How to manage shortcuts to applications in DispVM?

2017-02-17 Thread HawKing
On Fri, 17 Feb 2017 21:02:39 +0100
u+q...@bestemt.no wrote:

> Hi!
> 
> How can I add or remove application shortcuts for the DispVM? I've had
> no problems managing these for TemplateVMs and AppVMs, but the DispVM
> lacks the "Add more shortcuts..." entry (in i3, anyways), and I
> haven't been able to locate the appropriate configuration file
> either. I've also tried to add and remove application shortcuts of
> the DispVM's internal VM and its TemplateVM without any effects for
> the DispVM; "Firefox web browser" and "xterm" remain its only
> application shortcuts.
> 
> Thanks in advance!
> 
> -- 
> Ubestemt
> 
> -- 


You could add a new "launcher" button to the XFCE panel, and for it's
execute command, follow this example for the tor browser (under section:
How to use Tor Browser behind TorVM), but other applications should
work in the same way:
https://www.qubes-os.org/doc/torvm/


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/AE263B41-E6D7-43BA-8CCA-DADE412AD5E0%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Display section of XFCE panel from another VM in Dom0?

2017-02-17 Thread HawKing
As a generalization of my previous question:

I've seen screenshots (Joanna's:
https://cloud.githubusercontent.com/assets/10212863/16384754/7e131672-3c8a-11e6-8fc7-62bf9a1d90bf.png)
where a section of the panel seems to be showing the XFCE menubar from
another VM, such as sys-firewall. Perhaps I'm interpreting the colors
wrong, but I can't seem to figure out how to accomplish this. Does
anyone have any tips?



On Tue, 14 Feb 2017 16:09:10 -0600
 wrote:

> The network monitor plugin displays nicely colorized current network
> traffic rate on the XFCE panel. I would like to get this displaying
> the netVM's traffic rate, next to the red netvm in Dom0's panel.
> However, typically it doesn't run in the "notification area", and I'm
> not sure how to get it displayed in Dom0 (as the netvm icon is). 
> 
> Can anyone point me in the right direction ?
> 
> -- 
> You received this message because you are subscribed to the Google
> Groups "qubes-users" group. To unsubscribe from this group and stop
> receiving emails from it, send an email to
> qubes-users+unsubscr...@googlegroups.com. To post to this group, send
> email to qubes-users@googlegroups.com. To view this discussion on the
> web visit
> https://groups.google.com/d/msgid/qubes-users/37CFE930-E72A-44A8-86BC-36A437CF6727%40mail.bitmessage.ch.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7D4A3280-B661-4FDF-87EF-573AE1A17D1C%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Make xfce4-netload-plugin display next to netvm icon?

2017-02-14 Thread HawKing
The network monitor plugin displays nicely colorized current network
traffic rate on the XFCE panel. I would like to get this displaying
the netVM's traffic rate, next to the red netvm in Dom0's panel.
However, typically it doesn't run in the "notification area", and I'm
not sure how to get it displayed in Dom0 (as the netvm icon is). 

Can anyone point me in the right direction ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37CFE930-E72A-44A8-86BC-36A437CF6727%40mail.bitmessage.ch.
For more options, visit https://groups.google.com/d/optout.