[qubes-users] Qubes OS 4.1 to receive extended security support until 2024-07-31

2024-05-10 Thread Andrew David Wong
Dear Qubes Community, Qubes OS 4.1 will reach official end-of-life (EOL) on 2024-06-18. After this date, Qubes OS 4.1 will continue to receive extended security support until 2024-07-31. This security support extension is sponsored by [Freedom of the Press Foundation

[qubes-users] Template manager fails to fetch template list after in place upgrade to 4.2

2024-05-10 Thread Flex
Hello, when opening/refreshing the template list in the Qubes Template Manager it shows: ERROR: qrexec call 'qubes.TemplateSearch' failed: unexpected data format. The same error is displayed when trying to install templates in the terminal. Does anyone know how to solve this issue? (might

[qubes-users] whonix update issues (The certificate is NOT trusted. The received OCSP status response is invalid.)

2024-05-08 Thread Ulrich Windl
Hi! When trying to update whonix-gateway-17 and whonix-workstation-17, both fail with a message like this: Updating whonix-gateway-17 Refreshing package info Refreshing packages. Fail to refresh InRelease: tor+https://deb.whonix.org bookworm InRelease from

[qubes-users] XSAs released on 2024-05-07

2024-05-08 Thread Andrew David Wong
Dear Qubes Community, The [Xen Project](https://xenproject.org/) has released one or more [Xen security advisories (XSAs)](https://xenbits.xen.org/xsa/). The security of Qubes OS is *not* affected. ## XSAs that DO affect the security of Qubes OS The following XSAs *do affect* the security of

Re: [qubes-users] Microphone disabled in firmware is showing in Qubes

2024-05-04 Thread alesser
qubist: The question probably comes down to: Does disabling the microphone make it invisible or just dysfunctional? Have you researched that? Disabled devices (like data transfer port) are normally invisible, but perhaps for microphone it is different. I will research. -- You received this

Re: [qubes-users] Where to run undervolt script?

2024-05-04 Thread alesser
qubist: PVM domUs have no direct access to hardware, so perhaps you won't be able to undervolt your CPU in a domU. Running it in dom0 seems the only option, however that is also the most dangerous one. Ok, so dom0 is only way. I will think about risk of installing here. Downloading arbitrary

Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread 'justanotherquber' via qubes-users
On Thu, May 02, 2024 at 02:44:09PM -, qubist wrote: > That's secondary, but in case you are interested, mpv gives better playback: > > https://forum.qubes-os.org/t/improving-video-playback-speed/21906/8 It does not seem to play back better to me, as well at most, especially not with the

Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread qubist
That's secondary, but in case you are interested, mpv gives better playback: https://forum.qubes-os.org/t/improving-video-playback-speed/21906/8 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving

Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread 'justanotherquber' via qubes-users
I also tried an untouched version of debian 12 minimal with updates and only mplayer added from apt. There was no mimeapps.list file in /usr/share/applications, /etc/xdg/, $HOME/.config or $HOME/.local/share/applications. I tried xdg-mime default mplayer.desktop video/x-matroska as the non-root

Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-02 Thread 'justanotherquber' via qubes-users
> Trying to copy the file first and then 'xdg-open TEST.pdf' in the > target VM, I get the same series of errors: > > $ xdg-open TEST.pdf > xdg-mime: mimetype argument missing > Try 'xdg-mime --help' for more information. > /usr/bin/xdg-open: 882: x-www-browser: not found > /usr/bin/xdg-open:

Re: [qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-01 Thread qubist
On Wed, 1 May 2024 11:15:42 +0200 'justanotherquber' via qubes-users wrote: > Hi, I've been trying to get a dvm to open media files in mplayer in a > disposable qube. Starting the disposable media qube from dom0 with > qvm-run --dispvm media-dvm --service -- qubes.StartApp+st works. > Copying

[qubes-users] xdg-open works in dvm, but qvm-open-in-dvm from other qube does not

2024-05-01 Thread 'justanotherquber' via qubes-users
Hi, I've been trying to get a dvm to open media files in mplayer in a disposable qube. Starting the disposable media qube from dom0 with qvm-run --dispvm media-dvm --service -- qubes.StartApp+st works. Copying files(same as the ones used to test qvm-open-in-vm/qvm-open-in-dvm) to the vm with

Re: [qubes-users] Some bugs I found?

2024-04-28 Thread Andrew David Wong
On 4/27/24 7:39 AM, ales...@magenta.de wrote: > one bug: man page for qube-dom0-update refers to yum instead of dnf. > > another bug: system went to sleep / suspend when it was in the middle of > downloading updates with Qubes Update command. Not good. I have to myself > disable suspend in

Re: [qubes-users] Microphone disabled in firmware is showing in Qubes

2024-04-27 Thread qubist
The question probably comes down to: Does disabling the microphone make it invisible or just dysfunctional? Have you researched that? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from

Re: [qubes-users] Where to run undervolt script?

2024-04-27 Thread qubist
On Sat, 27 Apr 2024 14:30:00 + ales...@magenta.de wrote: > I still need to know what is best way for undervolt.py to run. There is no best way to run potentially dangerous software. > For best way I mean for security and without making more performance > hit like maybe running a new qube. >

[qubes-users] Some bugs I found?

2024-04-27 Thread alesser
one bug: man page for qube-dom0-update refers to yum instead of dnf. another bug: system went to sleep / suspend when it was in the middle of downloading updates with Qubes Update command. Not good. I have to myself disable suspend in settings until it is finished. last bug: many of my qubes

Re: [qubes-users] Where to run undervolt script?

2024-04-27 Thread alesser
ales...@magenta.de: What is the safest way to use undervolt script in Qubes? https://github.com/georgewhewell/undervolt.git This is running on Python. Is it better to use new service qube for this or can I run it in dom0/sys-net/sys-firewall? I still need to know what is best way for

[qubes-users] Microphone disabled in firmware is showing in Qubes

2024-04-27 Thread alesser
I have just seen that there is a microphone device listed in the devices menu. I have already disabled built in microphone with firmware setting and this doesn't shown in Ubuntu but is shown in Qubes. This laptop doesn't have another microphone device. How can Qubes see this device? -- You

Re: [qubes-users] Ethernet socket device not available in Network Connections

2024-04-27 Thread alesser
'unman' via qubes-users: Have you assigned the device to sys-net in the "devices" tab of sys-net settings. I didn't know I had to do this. Now is fixed, thank you. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group

[qubes-users] NFC and other creative communications with your qubes-os

2024-04-20 Thread 'haaber' via qubes-users
I have a simple question, around "things that you have" (like sec. tokens, etc). Many "fido tokens" (yubi, nitro, google) allow NFC communication, most  computers as well, but i do not find anything in my qubes (maybe the chips acts as USB client and my USB is down by default?) => Is there a

Re: [qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-16 Thread Boryeu Mao
Thank you very much for the help. Time for a crash course on qubes-core-admin. On Mon, Apr 15, 2024 at 9:30 AM Rusty Bird wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Rusty Bird: > > Boryeu Mao: > > > An attempt to shutdown `sys-firewall` in `Qube Manager` receive a > warning

Re: [qubes-users] Re: Qubes 4.2 installation problems due to Salt alone - what to do?

2024-04-16 Thread Michael Singer
Thank you! The hardware clock had the wrong date. Therefore the error with salt. Hmm, You might find it more useful to join the Qubes Forum, https://forum.qubes-os.org/ I wanted to reply, so you felt someone will help. Perhaps Clarify some things. Seems from your discussion of SALT, you

[qubes-users] HCL : NitroPC 2 - MSI Z790-P Intel i9 14900K

2024-04-16 Thread code9n
HCL report NitroPC 2 - MSI Z790-P Intel i9 14900K This is Qubes certified, of course, but here's an HCL report anyway. --- layout: 'hcl' type: 'Desktop' hvm: 'yes' iommu: 'yes' slat: 'yes' tpm: 'unknown' remap: 'yes' brand: | Micro-Star International Co., Ltd. model: |

Re: [qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-15 Thread 'Rusty Bird' via qubes-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Rusty Bird: > Boryeu Mao: > > An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning > > about running processes in the qube; similarly on command line > > `qvm-shutdown sys-firewall` fails with an error. Is it possible to > >

Re: [qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-15 Thread 'Rusty Bird' via qubes-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Boryeu Mao: > An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning > about running processes in the qube; similarly on command line > `qvm-shutdown sys-firewall` fails with an error. Is it possible to > designate an appVM to

[qubes-users] Re: Qubes 4.2 installation problems due to Salt alone - what to do?

2024-04-15 Thread Catacombs
Hmm, You might find it more useful to join the Qubes Forum, https://forum.qubes-os.org/ I wanted to reply, so you felt someone will help. Perhaps Clarify some things. Seems from your discussion of SALT, you know something of Linux. If the standard install did not finish correctly. I am

[qubes-users] Installing a managed windows VPS on qubes.

2024-04-14 Thread Oliver
I bought a managed windows VPS that I want to add to QubesOS/whonix(Debian-12). How do I proceed? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

[qubes-users] 'locking' a vm possible? (to prevent accidental shutdown)

2024-04-14 Thread Boryeu Mao
An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning about running processes in the qube; similarly on command line `qvm-shutdown sys-firewall` fails with an error. Is it possible to designate an appVM to behave similarly so it won't get shutdown accidentally? -- You

[qubes-users] Qubes 4.2 installation problems due to Salt alone - what to do?

2024-04-14 Thread Michael Singer
Dear Qubes Community, I am trying to install Qubes 4.2. in vain, not because the hardware is incompatible, but because of Salt problems. I verified the downloaded ISO according to the instructions, burned the ISO with various programs on a USB stick, among others with the DD command: dd

[qubes-users] XSAs released on 2024-04-09

2024-04-10 Thread Andrew David Wong
Dear Qubes Community, The [Xen Project](https://xenproject.org/) has released one or more [Xen security advisories (XSAs)](https://xenbits.xen.org/xsa/). The security of Qubes OS *is affected*. ## XSAs that DO affect the security of Qubes OS The following XSAs *do affect* the security of Qubes

[qubes-users] QSB-102: Multiple speculative-execution vulnerabilities: Spectre-BHB, BTC/SRSO (XSA-455, XSA-456)

2024-04-10 Thread Andrew David Wong
Dear Qubes Community, We have published [Qubes Security Bulletin (QSB) 102: Multiple speculative-execution vulnerabilities: Spectre-BHB, BTC/SRSO (XSA-455, XSA-456)](https://github.com/QubesOS/qubes-secpack/blob/b1891ece2e914f644a9141b1d6f8e8ae07091dab/QSBs/qsb-102-2024.txt). The text of this

[qubes-users] Let's close this thread ...

2024-04-05 Thread Viktor Ransmayr
On Thu, 4 Apr 2024, 19:45 Viktor Ransmayr, wrote: > Hello 'Haaber' & Qubes OS community, > > Am Di., 20. Feb. 2024 um 20:12 Uhr schrieb Viktor Ransmayr < > viktor.ransm...@gmail.com>: > >> ... >> Am Di., 20. Feb. 2024 um 11:10 Uhr schrieb 'haaber' via qubes-users < >>

Re: [qubes-users] Need help after a failed in-place upgrade attempt

2024-04-04 Thread Viktor Ransmayr
Hello 'Haaber' & Qubes OS community, Am Di., 20. Feb. 2024 um 20:12 Uhr schrieb Viktor Ransmayr < viktor.ransm...@gmail.com>: > ... > Am Di., 20. Feb. 2024 um 11:10 Uhr schrieb 'haaber' via qubes-users < > qubes-users@googlegroups.com>: > >> ... >> >> all updates go via tor network (sys-whonix)

[qubes-users] S0ix (s2idle sleep) on 13th gen intel draining battery

2024-04-03 Thread Peter Palensky
Dear all, My 13th gen intel raptor lake Dell laptop only supports one sleep mode: s2idle a.k.a. S0ix, which drains the battery 7%/h -> empty over night. I am not the only one with that problem https://discussion.fedoraproject.org/t/please-improve-the-s0ix-experience-under-linux/79113/2

Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-04-02 Thread Andrew David Wong
On 4/2/24 1:20 AM, qubist wrote: > On Mon, 1 Apr 2024 16:33:13 -0700 Andrew David Wong wrote: > >> [...] to the average user [...] > > Targeting abstract entities is confusing. > Feel free to replace that part with "to the vast majority of users," then. -- You received this message because

[qubes-users] Per computer model wiki

2024-04-02 Thread Sébastien Chaumat
Hello, Is there any official, user editable documentation, where we can submit configuration tips for specific computer models ? Once the initial HCL report is out, it would be great to link from there to specific instructions for a given model to fix remaining issues when possible. For

Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-04-02 Thread qubist
On Mon, 1 Apr 2024 16:33:13 -0700 Andrew David Wong wrote: > [...] to the average user [...] Targeting abstract entities is confusing. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails

Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-04-01 Thread Andrew David Wong
On 4/1/24 2:38 PM, Demi Marie Obenour wrote: > On Sun, Mar 31, 2024 at 03:45:29PM -0700, Andrew David Wong wrote: >> On 3/27/24 2:57 AM, qubist wrote: >>> On Tue, 26 Mar 2024 14:46:12 -0700 Andrew David Wong wrote: >>> ## What's new in Qubes OS 4.2.1? [...] For more

Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-04-01 Thread Demi Marie Obenour
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Sun, Mar 31, 2024 at 03:45:29PM -0700, Andrew David Wong wrote: > On 3/27/24 2:57 AM, qubist wrote: > > On Tue, 26 Mar 2024 14:46:12 -0700 Andrew David Wong wrote: > > > >> ## What's new in Qubes OS 4.2.1? > >> > >> [...] > >> > >> For more

Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-04-01 Thread qubist
Thanks for explaining. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit

Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-03-31 Thread Andrew David Wong
On 3/27/24 2:57 AM, qubist wrote: > On Tue, 26 Mar 2024 14:46:12 -0700 Andrew David Wong wrote: > >> ## What's new in Qubes OS 4.2.1? >> >> [...] >> >> For more information about the changes included [...] > > It would be much better to have a more detailed (yet concise) > changelog. It is

Re: [qubes-users] sshuttle?

2024-03-30 Thread Peter Palensky
Thanks Tim! In my case (Qubes 4.2) it was nft add rule ip qubes custom-input iifname "vif*" accept On Saturday, March 30, 2024 at 3:00:59 PM UTC+1 Tim Faber wrote: > Hi Peter, > > that does the trick for me (in /rw/config/rc.local on Qubes 4.1): > iptables -I INPUT 2 -i vif+ -j ACCEPT > ip

Re: [qubes-users] sshuttle?

2024-03-30 Thread Tim Faber
Hi Peter, that does the trick for me (in /rw/config/rc.local on Qubes 4.1): iptables -I INPUT 2 -i vif+ -j ACCEPT ip route add local default dev lo table 100 ip rule add fwmark 1 lookup 100 sshuttle --dns -D --method tproxy --exclude REMOTE_SERVER --exclude 10.0.0.0/8 --disable-ipv6 --listen

Re: [qubes-users] sshuttle?

2024-03-30 Thread Peter Palensky
I need a sys-sshuttle qube to encapsulate traffic via sshuttle. Locally (from sys-sshuttle) it works, but connected qubes get the previously mentioned "no connection to host" message. Played around with various nft ideas, but no success. tcpdump on the vif shows requests (e.g. DNS, http,

Re: [qubes-users] Tails VM: network broken since Qubes r4.2 (was online in r4.1)

2024-03-29 Thread Stickstoff
Thank you for looking into this! Does using the static route you have in Debian, and adding static neighbor entries for the peer, fix the problem? I noticed the default routes actually differ a bit more between Tails and Debian [8] than I wrote in my original mail (I have to type anything

Re: [qubes-users] Tails VM: network broken since Qubes r4.2 (was online in r4.1)

2024-03-28 Thread Demi Marie Obenour
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Thu, Mar 28, 2024 at 10:29:15PM +, Stickstoff wrote: > Hello everyone, > > I have a difficult time with my Tails VM in Qubes (which I need for Tails > specific developing and documentation work). > It gets no network connectivity no matter

[qubes-users] Tails VM: network broken since Qubes r4.2 (was online in r4.1)

2024-03-28 Thread Stickstoff
Hello everyone, I have a difficult time with my Tails VM in Qubes (which I need for Tails specific developing and documentation work). It gets no network connectivity no matter what I try. With "network connectivity" I mean the Tails VM can't even ping any network VM. I set up a Tails VM [1]

Re: [qubes-users] Star Labs StarBook certified with intel only?

2024-03-27 Thread 'జిందం వాఐి' via qubes-users
On 2024-03-26 23:05, 'జిందం వాఐి' via qubes-users wrote: On 2024-03-26 22:18, Andrew David Wong wrote: On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote: As you can see, only Intel processors are listed. I'm not personally aware of any changes since then, but when it comes to

Re: [qubes-users] Qubes OS 4.2.1 has been released!

2024-03-27 Thread qubist
On Tue, 26 Mar 2024 14:46:12 -0700 Andrew David Wong wrote: > ## What's new in Qubes OS 4.2.1? > > [...] > > For more information about the changes included [...] It would be much better to have a more detailed (yet concise) changelog. It is highly unlikely that the user will read pages upon

Re: [qubes-users] Star Labs StarBook certified with intel only?

2024-03-26 Thread 'జిందం వాఐి' via qubes-users
On 2024-03-26 22:18, Andrew David Wong wrote: On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote: As you can see, only Intel processors are listed. I'm not personally aware of any changes since then, but when it comes to Qubes-certified hardware, you should always consult the vendor's

Re: [qubes-users] Star Labs StarBook certified with intel only?

2024-03-26 Thread Andrew David Wong
On 3/25/24 11:25 AM, 'జిందం వాఐి' via qubes-users wrote: > * i see an option to purchase > laptop for amd also on their > website > * is this certified with only > intel? > As far as I know, that's correct, but you should check with Star Labs to be sure. The original certification announcement

[qubes-users] Qubes OS 4.1 reaches EOL on 2024-06-18

2024-03-26 Thread Andrew David Wong
Dear Qubes Community, Qubes OS 4.1 is scheduled to reach end-of-life (EOL) on 2024-06-18, approximately three months from the date of this announcement. ## Recommended actions If you're already using Qubes 4.2, then you don't have to do anything. This announcement doesn't affect you. If

[qubes-users] Qubes OS 4.2.1 has been released!

2024-03-26 Thread Andrew David Wong
Dear Qubes Community, We're pleased to announce the stable release of Qubes OS 4.2.1! This [patch release](#what-is-a-patch-release) aims to consolidate all the security patches, bug fixes, and other updates that have occurred since the release of Qubes 4.2.0. Our goal is to provide a secure

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-26 Thread Michael Belless
Also, in the future. This might be faster to get responses https://forum.qubes-os.org/ Welcome to our forum. On Mon, Mar 25, 2024 at 6:12 PM Catacombs wrote: > HI, Not exactly sure if this is what you want. > It is an excellent question for a newcomer. > Upper right hand side of screen.

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread Catacombs
I am sorry I was slow to reply. I was having problems today, apparently from the large solar flares we have been having the last several days. Some of it is reflective of a earlier version, but https://www.qubes-os.org/doc/ On Monday, March 25, 2024 at 5:12:23 PM UTC-5 Catacombs wrote: >

[qubes-users] Star Labs StarBook certified with intel only?

2024-03-25 Thread 'జిందం వాఐి' via qubes-users
* i see an option to purchase laptop for amd also on their website * is this certified with only intel? -- regards, జిందం వాఐి [ jindam, vani ] web_ jindam.neocities.org [matrix]_ @jindam:oikei.net -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread Catacombs
HI, Not exactly sure if this is what you want. It is an excellent question for a newcomer. Upper right hand side of screen. Red, Two red terminals. Click on this. What do you get? On Monday, March 25, 2024 at 11:43:31 AM UTC-4 Bapak Ireng wrote: > Sorry, i discuss in the Qubes

[qubes-users] Update for QSB-101: Register File Data Sampling (XSA-452) and Intel Processor Return Predictions Advisory (INTEL-SA-00982)

2024-03-25 Thread Andrew David Wong
Dear Qubes Community, *Update*: Marek Marczykowski-Górecki’s PGP signature is now available (see below). We have updated [Qubes Security Bulletin (QSB) 101: Register File Data Sampling (XSA-452) and Intel Processor Return Predictions Advisory

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'Bapak Ireng' via qubes-users
Sorry, i discuss in the Qubes Communityfaster responses, better systemthen google groups Bapak Ireng schrieb am Montag, 25. März 2024 um 16:32:33 UTC+1: > i tried sudo /usr/libexec/initial-setup/initial-setup-graphical > > and the following is the output / result: > > > > > i tried to

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'Bapak Ireng' via qubes-users
i tried sudo /usr/libexec/initial-setup/initial-setup-graphical and the following is the output / result: i tried to sent pictures, but google did not let me sent them. Sh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'haaber' via qubes-users
Hi, after successfully installing Qubes 4.2 i am left all alone to configure network (internet) Access. I appreciate it very much if somebody could guide me to the right options. The question is so vague, no one can reasonably answer it. Does sys-net start on boot? Does it have access to

[qubes-users] Configure Network Qubes 4.2

2024-03-25 Thread 'Bapak Ireng' via qubes-users
Hi, after successfully installing Qubes 4.2 i am left all alone to configure network (internet) Access. I appreciate it very much if somebody could guide me to the right options. Best regards, Bapak Hitam -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Re: Qubes 4.2: Attach usb audio device to appvm

2024-03-20 Thread 'Rune Philosof' via qubes-users
It was not fixed... Apparently just an example of how random it is. It was working for an hour or so. Now it is back to mic not working, just sending out that beep beep sound. On Wed, Mar 20, 2024 at 9:16 AM 'Rune Philosof' via qubes-users < qubes-users@googlegroups.com> wrote: > Installing a

[qubes-users] Re: HVM standalone: no mouse after suspend-to-ram

2024-03-20 Thread Stickstoff
Dear group, After I wake Qubes from suspend-to-ram, the mouse doesn't work in Tails any more. this issue resolved itself after reinstalling qubes r4.2 freshly, on another hardware. Maybe because it was a fresh install, maybe because it was directly r4.2 and not upgraded from earlier

Re: [qubes-users] Inconsistency between `qvm-template list` and `qvm-template-gui`

2024-03-20 Thread 'unman' via qubes-users
Without seeing the screenshot, I think I know the issue. They are from the same repository. qvm-template lists *all* the template in the repo, whereas qvm-template-gui filters to only show the most recent supported versions. -- I never presume to speak for the Qubes team. When I comment in the

[qubes-users] Re: Qubes 4.2: Attach usb audio device to appvm

2024-03-20 Thread 'Rune Philosof' via qubes-users
Installing a new template fixed it. I installed fedora-39 and switched to it. The old template had been upgraded in-place several times, back from fedora-36, I think. Maybe something is missing in the upgrade from 4.1 to 4.2, or in the instructions on how to upgrade existing templates to 4.2.

[qubes-users] Where exactly does qubesdb-write write the data?

2024-03-19 Thread qubist
Hi, Where exactly does qubesdb-write write the data? What RPC policy is necessary for qube A to be able to read/write '/somepath' of qube B? (but *no* other paths) What can this be used for (safely)? -- You received this message because you are subscribed to the Google Groups "qubes-users"

[qubes-users] Update for QSB-101: Register File Data Sampling (XSA-452) and Intel Processor Return Predictions Advisory (INTEL-SA-00982)

2024-03-18 Thread Andrew David Wong
Dear Qubes Community, We have updated [Qubes Security Bulletin (QSB) 101: Register File Data Sampling (XSA-452) and Intel Processor Return Predictions Advisory (INTEL-SA-00982)](https://github.com/QubesOS/qubes-secpack/blob/c5693c8a4b81b3afb7cd7e6e44db3bbc36987049/QSBs/qsb-101-2024.txt). The

[qubes-users] Qubes OS 4.2.1-rc1 is available for testing

2024-03-16 Thread Andrew David Wong
Dear Qubes Community, We're pleased to announce that the first [release candidate (RC)](#what-is-a-release-candidate) for Qubes OS 4.2.1 is now available for [testing](https://www.qubes-os.org/doc/testing/). This [patch release](#what-is-a-patch-release) aims to consolidate all the security

Re: [qubes-users] Qubes OS Summit 2024: September 20-22 in Berlin

2024-03-13 Thread Leo28C
Anybody going from USA willing to take me in their luggage hit me up. I bring my own food and oxygen On Wed, Mar 13, 2024 at 3:56 PM Andrew David Wong wrote: > Dear Qubes Community, > > In conjunction with [3mdeb](https://3mdeb.com/), the sixth edition of our > Qubes OS Summit will be held live

[qubes-users] Qubes OS Summit 2024: September 20-22 in Berlin

2024-03-13 Thread Andrew David Wong
Dear Qubes Community, In conjunction with [3mdeb](https://3mdeb.com/), the sixth edition of our Qubes OS Summit will be held live this year from September 20 to 22 in Berlin, Germany! For more information about this event, please see: If

[qubes-users] XSAs released on 2024-03-12

2024-03-13 Thread Andrew David Wong
Dear Qubes Community, The [Xen Project](https://xenproject.org/) has released one or more [Xen security advisories (XSAs)](https://xenbits.xen.org/xsa/). The security of Qubes OS *is affected*. ## XSAs that DO affect the security of Qubes OS The following XSAs *do affect* the security of Qubes

[qubes-users] QSB-101: Register File Data Sampling (XSA-452)

2024-03-13 Thread Andrew David Wong
Dear Qubes Community, We have published [Qubes Security Bulletin 101: Register File Data Sampling (XSA-452)](https://github.com/QubesOS/qubes-secpack/blob/main/QSBs/qsb-101-2024.txt). The text of this QSB and its accompanying cryptographic signatures are reproduced below. For an explanation of

[qubes-users] Error updating Whonix Workstation 17

2024-03-12 Thread Ulrich Windl
I had updated the Whonix Workstation 17 successfully, but a System Check suggested that there are updates outstanding, so I tried another round: Unfortunately there was an odd error: ... Get:20 tor+https://deb.debian.org/debian bookworm-backports/main amd64 Packages

[qubes-users] Qubes Canary 038

2024-03-11 Thread Andrew David Wong
Dear Qubes Community, We have published [Qubes Canary 038](https://github.com/QubesOS/qubes-secpack/blob/main/canaries/canary-038-2024.txt). The text of this canary and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for

Re: [qubes-users] Windows 10 and Qubes OS Dualboot

2024-03-07 Thread 'Marcelo' via qubes-users
Hi one7two99, I have Qubes and Linux already installed in different partitions in legacy mode and both work fine. Now I need to install windows 10 (to run Fusion 360 for personal use). I don't want to install it as a qube as my hardware is not very powerful. I don't need Bitlocker. Could you

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-07 Thread qubist
On Wed, 6 Mar 2024 14:48:54 -0800 Andrew David Wong wrote: > I rejected it, because although it contains a "Why did you implement > XYZ this way...?" question, the rest of the message implies a "How do > I...?" request for help or support. Well, it was rather "I am trying to modify existing

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread Demi Marie Obenour
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Thu, Mar 07, 2024 at 01:52:58AM +0100, Marek Marczykowski-Górecki wrote: > On Wed, Mar 06, 2024 at 06:16:03PM -0500, Demi Marie Obenour wrote: > > On Wed, Mar 06, 2024 at 10:49:11PM +0100, Marek Marczykowski-Górecki wrote: > > > On Wed, Mar 06,

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Mar 06, 2024 at 06:16:03PM -0500, Demi Marie Obenour wrote: > On Wed, Mar 06, 2024 at 10:49:11PM +0100, Marek Marczykowski-Górecki wrote: > > On Wed, Mar 06, 2024 at 06:13:50PM +0100, Ulrich Windl wrote: > > > Haven't done it for ages, but

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread Demi Marie Obenour
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Wed, Mar 06, 2024 at 10:49:11PM +0100, Marek Marczykowski-Górecki wrote: > On Wed, Mar 06, 2024 at 06:13:50PM +0100, Ulrich Windl wrote: > > Haven't done it for ages, but can't you configure the size using X > > resources? > > Like this: > > Now

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread Andrew David Wong
On 3/6/24 10:37 AM, qubist wrote: > On Wed, 6 Mar 2024 18:14:53 +0100 Marek Marczykowski-Górecki wrote: > >> The way that console works does not support sending information about >> window size (changes). > > Do I understand correctly there is no way to change it and it is > impossible, hence

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Mar 06, 2024 at 06:13:50PM +0100, Ulrich Windl wrote: > Haven't done it for ages, but can't you configure the size using X resources? > Like this: > Now to set the size of the console itself, you would add this to the > ~/.Xresources

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread qubist
On Wed, 6 Mar 2024 18:14:53 +0100 Marek Marczykowski-Górecki wrote: > The way that console works does not support sending information about > window size (changes). Do I understand correctly there is no way to change it and it is impossible, hence not planned? > You must subscribe to

Re: [qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Wed, Mar 06, 2024 at 03:42:23PM -, qubist wrote: > Hello, > > What is the reason for the '80x24' geometry of xterm used by > qvm-console-dispvm through the management_dispvm? > > I tried to remove the option in the policy file in order to

[qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread Ulrich Windl
Haven't done it for ages, but can't you configure the size using X resources? Like this: Now to set the size of the console itself, you would add this to the ~/.Xresources file:xterm*geometry: 127x37 -- You received this message because you are subscribed to the Google Groups "qubes-users"

[qubes-users] 80x24 geometry used by qvm-console-dispvm

2024-03-06 Thread qubist
Hello, What is the reason for the '80x24' geometry of xterm used by qvm-console-dispvm through the management_dispvm? I tried to remove the option in the policy file in order to utilize the full available workspace, as well as to change it to a bigger window, but in both cases it just stops

[qubes-users] Re: HCL - Dell Inspiron 5570 (P75F, P75F001)

2024-03-05 Thread Anirban Kar
My, Dell Inspiron 15 5570 has i5 8250, 12GB DDR RAM , 1TB SATA HDD. I have created a bootable Qubes 4.2.0 with dd command in Ubuntu and trying to boot my Dell Inspiron with it. However it is failing to boot and restarting and falling back to Ubuntu 23.10. Should I try to boot in legacy BIOS

Re: [qubes-users] HCL - Beelink SER5 Ryzen 7 5800H AMD Integrated Graphics (RX Vega 8)

2024-03-05 Thread 'bozoslivehere' via qubes-users
Suspend works On Monday, March 4th, 2024 at 2:33 PM, 'bozoslivehere' via qubes-users wrote: > ---layout: >   'hcl' > type: >   'Mini PC' > hvm: >   'yes' > iommu: >   'yes' > slat: >   'yes' > tpm: >   '2.0' > remap: >   'yes' > brand: | >   AZW > model: | >   SER > bios: | >   5800H603 > cpu:

[qubes-users] HCL - Beelink SER5 Ryzen 7 5800H AMD Integrated Graphics (RX Vega 8)

2024-03-04 Thread 'bozoslivehere' via qubes-users
---layout:   'hcl' type:   'Mini PC' hvm:   'yes' iommu:   'yes' slat:   'yes' tpm:   '2.0' remap:   'yes' brand: |   AZW model: |   SER bios: |   5800H603 cpu: |   AMD Ryzen 7 5800H with Radeon Graphics cpu-short: |   FIXME chipset: |   Advanced Micro Devices, Inc. [AMD] Renoir/Cezanne Root

[qubes-users] Qubes-certified NovaCustom NV41 Series laptop now available with Heads firmware

2024-03-03 Thread Andrew David Wong
Dear Qubes Community, Last year, we [announced](https://www.qubes-os.org/news/2023/05/03/novacustom-nv41-series-qubes-certified/) that the [NovaCustom NV41 Series](https://novacustom.com/product/nv41-series/) became a [Qubes-certified computer](https://www.qubes-os.org/doc/certified-hardware)

Re: [qubes-users] Ethernet socket device not available in Network Connections

2024-03-02 Thread 'unman' via qubes-users
[quote] my sys-net is also sys-usb because I used the USB ethernet adapter so I think this is the problem but I don't know how to fix. [/quote] I doubt that this is the problem. Have you assigned the device to sys-net in the "devices" tab of sys-net settings. When sys-net boots up, can you run

[qubes-users] Ethernet socket device not available in Network Connections

2024-03-02 Thread alesser
I was using USB ethernet adapter before, but now I have enabled my laptop's own Gb socket and I would like to use this. The device is listed in lspci: > Ethernet controller: Intel Corporation Ethernet Connection blabla The device is not listed in Network Connections application. The only

[qubes-users] Where to run undervolt script?

2024-03-02 Thread alesser
What is the safest way to use undervolt script in Qubes? https://github.com/georgewhewell/undervolt.git This is running on Python. Is it better to use new service qube for this or can I run it in dom0/sys-net/sys-firewall? -- You received this message because you are subscribed to the Google

Re: [qubes-users] Screen sleep doesn't disable backlight

2024-03-02 Thread alesser
Neil du Preez: On 2024-02-24 16:19, ales...@magenta.de wrote: On Qubes 4,2, when the screen goes to sleep after idle time or when I lock the screen, the screen is black but the backlight is still on. Only when the system goes to Suspend is the backlight turned off. How can I fix this? Hi, I

Re: [qubes-users] Qubes 4.2 error: Failed to remove old efi boot entry.

2024-03-02 Thread alesser
Neil du Preez: On 2024-02-24 16:02, ales...@magenta.de wrote: In my fresh install of 4.2 this error appeared. The following error occurred while installing the boot loader. The system will not be bootable. Would you like to ignore this and continue with installation? Failed to remove old

[qubes-users] Qubes 4.2: Attach usb audio device to appvm

2024-02-29 Thread 'Rune Philosof' via qubes-users
After upgrading to 4.2 my audio device does not work. I plug in a usb audio device, then attach that usb device to an appvm and try to use it in e.g. meet.google.com. For some reason it only works for the audio microphone or the speaker, not both. Example: 1. I attach the usb device to the

[qubes-users] XSAs released on 2024-02-27

2024-02-27 Thread Andrew David Wong
Dear Qubes Community, The [Xen Project](https://xenproject.org/) has released one or more [Xen security advisories (XSAs)](https://xenbits.xen.org/xsa/). The security of Qubes OS *is not affected*. ## XSAs that DO affect the security of Qubes OS The following XSAs *do affect* the security of

[qubes-users] [Qubes 4.1] issue with thunderbird after recent debian update

2024-02-26 Thread 'haaber' via qubes-users
Hi, since a recent update, thunderbird throws artefacts on xfce screen (parts of its menu), that spawn virtual screen, survive log off & on again, but disappear if VM is closed. And re-appear when thunderbird is restarted. Very annoying! Am I alone with this type of glitch? Thanks, best,

Re: [qubes-users] 4.2 issue with pam_sss.so

2024-02-25 Thread David Hobach
https://github.com/QubesOS/qubes-issues/issues/8595 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this

Re: [qubes-users] 4.2 issue with pam_sss.so

2024-02-25 Thread Manuel Amador (Rudd-O)
Install sssd_client package and it goes away. On January 20, 2024 1:26:00 AM GMT+01:00, Ulrich Windl wrote: >Hi! > > >I just noticed these messages (in my upgraded Qubes OS): > >Jan 20 01:22:39 dom0 sudo[25013]: PAM unable to >dlopen(/usr/lib64/security/pam_sss.so):

  1   2   3   4   5   6   7   8   9   10   >