Re: [qubes-users] Suggestions as a user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 But one can't trust Intel right? How can one be sure that tests and warnings generating code is not malware. Open code is the 1st requirement for security right?! I don't think hidden security enhancing code is really enhancing security. Qubes is an extremely secure OS and with RISCV processors coming, Qubes should go towards removing trust from hardware. Atleast it should have option (another ISO, say qubes-libre.iso) for fully free software going ahead. Trusting Intel would be optional going ahead due to RISC-V cores or other open processors. And if not, Qubes should make their life difficult as much as possible by choosing linux-libre by default. Parabola is a perfectly usable OS, and so is hyperbola(it has few packages though). I use it on a flash drive. Except WiFi rest of the things work. I strongly think there is no unreadable code for security. There is only unreadable code or security. While the whole concept of qubes lies on protecting against malware by trusting it less, with free hardware ahead, having an option for no hidden code and actively preventing user from installing hidden code in most doms is impressive. -BEGIN PGP SIGNATURE- iQGzBAEBCAAdFiEEeMyXyyr6L/PtWnZUnZv6jjOfaEIFAl82mJ4ACgkQnZv6jjOf aEJFAQwApx6DuXLubFvoGdcdc9HCjuCvoHJWgpwRMEKMcjslUu7gQQ9enpPXCRjG PoCRczy6mCpPwpqquhK3Sbj/I/wnsmtH+sDkHf1HXLw/DX5eX88xiKTUeAdTTUPZ DE563CViX5DriVDJ1jwDjUkyAc3mtjFF85sMOBAWhEZTYd5067OB6IBUUMXGWtQq ssoxTTos/4xGwAQqAWs+A7d14vBU42ga6KY5XQBq3hhCo/JxqKqKq4CZwfuEB+p2 Ipmwtu0GSevcT7CwljEZdkIWTDYQy5NTJOi2g/viZly0GK2YOHh8MEiJyRXmNgua qOaQ/rC/JX7coYMOLM69UUE1fD+2bG/VdcGNNUxfyT3NgGM/ydygPLoGJxaWMPfa 1E0/xmVqEKfOKmOt75nkHQ7znG/GDT/gqO2zFbWGubLp5dxOxu07m1xKESfXaHRm Q0qrPCyYEjqtCTjBSTCxVLW4K474UlOP+g4CvYlg2gFVJdN7ZwVTlbPidXtHDZxY pDXpyw8L =UIF8 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d8be5e27-753e-4d59-b29c-24d7b2aff244o%40googlegroups.com.
[qubes-users] Suggestions as a user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello guys, I would like to suggest a few changes and while you may not have them in qubes by default, I ask you to give an option to the users such that they be able to make it easily. With GUI VM coming in 4.1, I request you to have linux-libre in dom0. Linux-libre for every template by default would be even better and certainly my choice. (atleast Freedora instead of Fedora). KDE instead of XFCE would be a better default option since it provides a better UI. It provides a premium feel and is a level above XFCE. Shifting focus to GNU recommended OSes like Hyperbola, Parabola, Guix is also a step ahead in my view. I state this because GNU has also had an aim to make a completely free software to be used on a computer. While they approach with security by correctness and by actively trying to demotivate nonfree software, I feel they might not get to the end. Also, they don't make it difficult for the user to install a problematic software by mistake like Qubes does. If Qubes combines such OSes (especially recommend Hyperbola, they are highly critical of any contaminating packages) with it own security by compartmentalization, it will be a step ahead. Thanking you Sagar Acharya P.S. I dream of having a stateless computer (Joanna 2015) with libreboot+Qubes having HyperbolaBSD in dom0 and Parabola, Guix and Hyperbola as available template VMs, with plasma as a DE. That would be ideal and a nightmare for malicious crackers. -BEGIN PGP SIGNATURE- iQGzBAEBCAAdFiEEeMyXyyr6L/PtWnZUnZv6jjOfaEIFAl8z+voACgkQnZv6jjOf aEJqFwv9Eb8RioP2sHOp91g2AtNxCRXcs88HvrJYwCBJWPuQBqAax+yWIcgB24F0 bmYsHewPWPYzguOVZ565C1ma1PbmAjUi0UYriv4ddstEbWpKnX6I2VtfsTeCpP9s j3NtDBXtbQXEAY+10soubiNm/CjLNNaCYidgkubnOXaXHAIgUukIchINA/Zxp/dz aw8VNapGzoayCFDATiz8rJXYCI4eGe3mRngjAcsXVNwPoxPVnUlMlGAf8RzRUXle /dsczJvk6jgyQoYETWgntfqG+er0dZm6D3whN4rVxqtqxO+9SR1rwi5Fi5Ly4AS3 yEeWo7fum7x6stJnp1N5CnQENN0heqev2qEcsvMniq1MRuGnKit4AmP8H2mVSwtm Oor2W6vZCivMB4dPkoeSBZ+zjjkPQwb5x3ljBoa3465BGeXnAGxblfW3RFM50Ml7 yQsxN3G1FsrGOcwz5GpdSzDCm7sMF/0P77VYBqtTgBEkSvOI/gWLEIeIHWzi7oAT enJPiihw =61lG -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2ff65e29-d9f1-46a7-92cc-21a7410f25e0o%40googlegroups.com.
[qubes-users] Nitropad Intel ME neutering
Disabling Intel ME completely will shut off the processor completely and so, the malicious part of the code has been suppressed according to the information given in the below link https://github.com/osresearch/heads-wiki/blob/master/Clean-the-ME-firmware.md Does ME cleaning achieve removing completely the access of it over hard disk files or is it just a better but incompletely secure state than Intel ME complete as in other laptops? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/81dbe48c-1ef4-45e8-a16d-c0546f53c331%40googlegroups.com.
Re: [qubes-users] Neither WiFi card nor USBs work
Qubes was meant to be for end users who wanted to be more secure, it wasn't meant for security experts or expert coders who would want to edit files and configure things for themselves. Without a doubt, the 4.0 version of Qubes hasn't been managed well. Updating dom0 with meant to be stable OS broke my system. It wouldn't boot up. My hardware satisfies all the conditions that Qubes has mentioned yet it is far from stable here. Switched back to parrot os. This is the 3rd time I expected something stable and had to go back On Thursday, September 26, 2019 at 6:05:58 PM UTC+5:30, acharya.s...@gmail.com wrote: > > It is > kernel doesn't support reset from sysfs for PCI devices > > and many more probably irrelevant things. I'm updating to Fedora 30 now. > Mostly it should update the driver. > > On Thursday, September 26, 2019 at 5:03:49 PM UTC+5:30, awokd wrote: >> >> acharya.s...@gmail.com: >> > I did it using GUI earlier. I again tried using permissive=true in dom0 >> > terminal and started sys-usb. I still get the error. >> > libxenlight failed to create new domain 'sys-usb' >> > >> > Updated dom0 using ethernet cable. Still broadcom WiFi and USBs do not >> work. >> > >> > On Wednesday, September 25, 2019 at 10:02:37 PM UTC+5:30, awokd wrote: >> >> >> >> acharya.s...@gmail.com : >> >>> I've made a fresh install of Qubes OS on my Laptop where I face the >> >> problem >> >>> of configuring USB and network devices to VMs >> >> >> >>> When I add 00:14.0 USB Controller: Intel Corp. Wildcat Point-LP USB >> xHCI >> >>> Controller (rev 03) to sys-net and try to start the VM, it gives me >> the >> >>> error >> >>> no FLR, PM reset or bus reset available. >> >>> >> >>> When I enable no strict reset for USB Controller, this error shows >> up. >> >>> Unable to reset USB Controller : libxenlight failed to create new >> domain >> >>> 'sys-net' >> >> >> >> Did you try enabling permissive mode in addition to no-strict-reset >> for >> >> the USB controller? When you get the "failed to create new domain" >> >> error, see if there is a more detailed error message in >> >> /var/log/libvirt/libxl/libxl-driver.log. >> >> Did you check the log? >> Wifi is probably something different. Make sure the drivers/firmware for >> your model wifi card are installed in the template used by sys-net. >> >> -- >> - don't top post >> Mailing list etiquette: >> - trim quoted reply to only relevant portions >> - when possible, copy and paste text instead of screenshots >> > I request all the developers of Qubes to have a meeting and completely redesign aspects of end user convenience. With questions like, "Will I be able to watch YouTube Videos on Qubes", you're trying to reach practically everyone and yet Qubes is too away from that point. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/18907dcd-8b92-40ec-a67a-20b8fd6902a7%40googlegroups.com.
[qubes-users] sudo root or sudo bash without password for building Qubes
I tried to make things work using Qubes built iso but the updates (dom0) instead of stabilizing the system, broke it. I couldn't boot up! I'm trying to build Qubes in which I face problem in making "sudo bash" run without password. While there are some solutions which ask to make edit in /etc/sudoers and change some lines with /path/to/script/ I have to run the command "make qubes-os-iso". I'm unaware how the linking happens. As far as I know make is the command. How do I make sudo bash run without password OR What's the path to qubes-os-iso? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c41055dd-39fb-4677-bf38-2afb678042ba%40googlegroups.com.
Re: [qubes-users] Neither WiFi card nor USBs work
It is kernel doesn't support reset from sysfs for PCI devices and many more probably irrelevant things. I'm updating to Fedora 30 now. Mostly it should update the driver. On Thursday, September 26, 2019 at 5:03:49 PM UTC+5:30, awokd wrote: > > acharya.s...@gmail.com : > > I did it using GUI earlier. I again tried using permissive=true in dom0 > > terminal and started sys-usb. I still get the error. > > libxenlight failed to create new domain 'sys-usb' > > > > Updated dom0 using ethernet cable. Still broadcom WiFi and USBs do not > work. > > > > On Wednesday, September 25, 2019 at 10:02:37 PM UTC+5:30, awokd wrote: > >> > >> acharya.s...@gmail.com : > >>> I've made a fresh install of Qubes OS on my Laptop where I face the > >> problem > >>> of configuring USB and network devices to VMs > >> > >>> When I add 00:14.0 USB Controller: Intel Corp. Wildcat Point-LP USB > xHCI > >>> Controller (rev 03) to sys-net and try to start the VM, it gives me > the > >>> error > >>> no FLR, PM reset or bus reset available. > >>> > >>> When I enable no strict reset for USB Controller, this error shows up. > >>> Unable to reset USB Controller : libxenlight failed to create new > domain > >>> 'sys-net' > >> > >> Did you try enabling permissive mode in addition to no-strict-reset for > >> the USB controller? When you get the "failed to create new domain" > >> error, see if there is a more detailed error message in > >> /var/log/libvirt/libxl/libxl-driver.log. > > Did you check the log? > Wifi is probably something different. Make sure the drivers/firmware for > your model wifi card are installed in the template used by sys-net. > > -- > - don't top post > Mailing list etiquette: > - trim quoted reply to only relevant portions > - when possible, copy and paste text instead of screenshots > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7a48eeba-f501-40af-8698-252c65c74b42%40googlegroups.com.
Re: [qubes-users] Neither WiFi card nor USBs work
I did it using GUI earlier. I again tried using permissive=true in dom0 terminal and started sys-usb. I still get the error. libxenlight failed to create new domain 'sys-usb' Updated dom0 using ethernet cable. Still broadcom WiFi and USBs do not work. On Wednesday, September 25, 2019 at 10:02:37 PM UTC+5:30, awokd wrote: > > acharya.s...@gmail.com : > > I've made a fresh install of Qubes OS on my Laptop where I face the > problem > > of configuring USB and network devices to VMs > > > When I add 00:14.0 USB Controller: Intel Corp. Wildcat Point-LP USB xHCI > > Controller (rev 03) to sys-net and try to start the VM, it gives me the > > error > > no FLR, PM reset or bus reset available. > > > > When I enable no strict reset for USB Controller, this error shows up. > > Unable to reset USB Controller : libxenlight failed to create new domain > > 'sys-net' > > Did you try enabling permissive mode in addition to no-strict-reset for > the USB controller? When you get the "failed to create new domain" > error, see if there is a more detailed error message in > /var/log/libvirt/libxl/libxl-driver.log. > > -- > - don't top post > Mailing list etiquette: > - trim quoted reply to only relevant portions > - when possible, copy and paste text instead of screenshots > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/42f2dd38-bfa3-45e9-a45e-fd375a834907%40googlegroups.com.
[qubes-users] Neither WiFi card nor USBs work
I've made a fresh install of Qubes OS on my Laptop where I face the problem of configuring USB and network devices to VMs It's quite similar to https://groups.google.com/forum/#!searchin/qubes-users/balance_when_enough_memory|sort:date/qubes-users/8Q4bc_51fyc/r6Lkd299BwAJ When I add 00:14.0 USB Controller: Intel Corp. Wildcat Point-LP USB xHCI Controller (rev 03) to sys-net and try to start the VM, it gives me the error no FLR, PM reset or bus reset available. When I enable no strict reset for USB Controller, this error shows up. Unable to reset USB Controller : libxenlight failed to create new domain 'sys-net' sys-net starts when I have no USB Controller added to it. I have no access to usbs (tethering) nor WiFi on my laptop through which I can make my first update. Ethernet shows up which will be my last try to update through a wired connection. Any suggestions are welcome. 4.0.2-rc1 problems I installed 4.0.2-rc1 before 4.0.1 and it fails to proceed (hangs) while "Configuring network" or "Configuring Qubes Interface step" (final). Tried it 3 times with complete reinstallation. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5271497c-5e02-4f64-929f-126940934465%40googlegroups.com.
Re: [qubes-users] Structure of qubes
I mean Fedora 29 qube above, not template. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ad8fb0e0-8526-40d3-be24-a9c0726efc9b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
Can someone from the qubes managers please try yumdownloader --resolve xorg-x11-drv-nvidia yumdownloader --source nvidia-kmod sudo dnf install kernel-latest-devel-4.20.3-1.pvops.qubes.x86_64.rpm rpm-build kmodtool sudo rpmbuild --nodeps -D "kernels 4.20.3-1.pvops.qubes.x86_64" --rebuild nvidia-kmod-410.66-1.fc29.src.rpm in a Fedora 29 template. This should work according to docs but doesn't with the above error. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3a61e5e0-eb93-4563-948e-6a5024de2670%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
I tried booting up with just the APU plugged in and found out that the recent kernel is also not compatible with the APU providing the graphics. My sys-firewall and sys-whonix wouldn't start. I went back to square 1, installing NVIDIA drivers in dom0 with rpm and found that earlier I was using the wrong kernel-devel tool. Installed kernel-latest-vm 4.20.3-1 which upgrade the kernels of my fedora template and installed the compatible kernel-latest-devel. When executing, sudo rpmbuild --nodeps -D "kernels 4.20.3-1.pvops.qubes.x86_64" --rebuild nvidia-kmod-410.66-1.fc29.src.rpm I get the following error: Package has no %description: kmod-nvidia-4.20.3-1.pvops.qubes.x86_64 Checked the spec file in rpmbuild folder and it contains %description line And I do not see any file named kmod-nvidia-4.20.3-1.pvops.qubes.x86_64 anywhere. Please help. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c3426d0a-b47d-47ac-bfe6-9591f627b63a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
> lsmod confirms that is LKM : you can also check by looking in > /proc/modules Thank you. I'm on it! :D I'm not switching back to Ubuntu, I'm getting things done here. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2be89c68-1b41-492e-b088-24ce264d63ca%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
> Not sure of the answer, but all you should have to do to use that option > is add it to your kernel= line. I think this is an important decision. I need to be sure. There are 2 different ways to proceed as shown here... https://wiki.xen.org/wiki/Xen_PCI_Passthrough It maybe a point of no return if I choose the wrong path. In fact, that can be the reason people haven't been able to implement. I want to be correct at each step. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/155612f2-d0d2-4147-bdd4-9f7ff6b8fef1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
Thanks awokd, Is xen-pciback compiled in the kernel or is it compiled as a module in qubes? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2a9a1c14-4013-4eab-a472-ddea544df707%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
I updated the kernel of dom0 to 4.20 and qubes booted with Integrated Graphics from Ryzen APU as in one of the earlier posts. When I change the NVIDIA pci device (VGA compatible controller) from dom0 to fedoraDev template, my system crashes which means it's using GTX 1060 as graphics after initial booting up. How to change this? After this, I intend to do just the 1st part of https://www.qubes-os.org/doc/install-nvidia-driver/ that is building kernels in fedoraDev template so that NVIDIA Graphics Card is installed for template based VMs. Please help guys. I don't know anything here in the hardware software interaction area. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c13d80e2-c7bb-4916-9b4e-d1d89041c694%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
I dug many things. The docs on qubes official site are old. I tried both the ways to install my NVIDIA GTX 1060 and the problem is even after installing, it's unclear whether I would be able to use it outside dom0. I found a better method. I have a Ryzen 3 2200G APU which I intend to use for basic qubes graphics in dom0 and want to install NVIDIA GTX card in the work domain fedoraDev as a secondary card. In this way dom0 would remain more secure and I could use tensorflow-gpu in work VM(atleast that's my conjecture). However, when I change the settings in Booting menu to Integrated Graphics Device and change the connection of HDMI to motherboard from Graphics Card, Qubes doesn't bootup. It stops at Starting Show Plymouth Boot Screen... It doesn't move forward. I have 2 questions, is this configuration of APU for dom0 and GPU for 1 cloned template possible? And how to boot with IGD after installing with GPU? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1bd11866-f691-4f90-8c64-cd522344b304%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Structure of qubes
Yes, unman, it was installed in /home/user I made /tmp/site_packages and added a line export PIP_TARGET='/tmp/site_packages' in ~./bashrc Now, pandas is installed in /tmp/site_packages and pip3 freeze doesn't even detect it in template. Anyways, it looks solvable. I can't get around rpmfusion though. I'm having trouble with package manager dnf. How do I add the repo? What's the repo name? Where will the GPU drivers be installed? Will I be able to use them from work qube with tensorflow-gpu? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9b76a69e-d1ba-4621-aa92-c9234310ceb0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Structure of qubes
I wanted to understand the tree structure of qubes. So my guess is this. dom0 is the owner of every other thing. There are 4 template VMs, fedora, debian, 2 whonix ones. When a domain restarts, it takes it settings from the template on which it is based and it's own home directory and other couple ones which are just in it, I guess stored in ROM. I created another fedoraDev template for my development purposes on which my work qube is based. work has no net access. When I installed pandas in my fedoraDev template, it didn't reflect in work after restarts. When I changed work netVM to sys-firewall and run "pip install pandas", there's no internet! Also, I want to install nvidia drivers from rpmfusion for which I need to add repos. I don't know where is dnf is. It's in dom0 but it is not connected to internet. I need to make them in fedora. In my personal domain connected to internet, there's no dnf. I need to know the structure of qubes better to understand dnf and my python pandas installation. I'm certainly missing something. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/488dc19e-7080-4d3c-94d3-d83f40af4648%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to connect to usb tethering of my mobile to sys-net qube
Solved the tethering problem. Stuart pointed the solution out but I used it after understanding a few things. Tethering is automatically configured by the qube in which the USB bus exists. So, we just have to make sure that the USB exists in that VM. I made sys-usb because I didn't think sys-net was preconfigured well. Maybe it was, I didn't try. Go to dom0. In terminal use lsusb and figure out the bus on which your usb device(tethering mobile connection) is. My was on bus 1. I made sys-usb, shut it down, under it's settings, went to advanced changed it to HVM, went to devices, located the PCI address of my USB port (shown in https://www.qubes-os.org/doc/assigning-devices/ ), selected it, pressed the greater than sign. Goes to right side. Reset PCI Device(selected one). Restart VM. Assign it as sys-firewall's NetVM. Tethering switch. Boom! Tethering done! I'll do the adapter configuring soon. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b98ad5b7-cf06-49d4-a9e6-16bb08f98c21%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to connect to usb tethering of my mobile to sys-net qube
On Monday, February 25, 2019 at 10:32:34 PM UTC+5:30, acharya.sa...@gmail.com wrote: > This is harder than it looks guys. I got my WiFi adapter today. > > I found out that sys-net already has USB 2.0 assigned in it(Bus 001). lsusb > under sys-net gives them. I plugged my wifi adapter in 2.0 USB (Bus 001) > still I don't get any connection. > > I tried making sys-wifi assuming sys-net will have some incorrect settings > but when I try to attach the USB device to it, it shows > backend vm 'dom0' doesn't expose device 'PCIaddressOfUsb' > > I really don't know how to proceed. It should atleast show the device. Why > aren't any USB devices not linked to storage recognized? > > Is my device there? Do I need to install it's drivers? *not recognized I found Bus 001 Device 002 is RaLink ... under dom0 and ID 0627:0001 Adomax Technology Co., Ltd under sys-net -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b05732bc-7cd4-4587-9ccf-1f3bbcd14490%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to connect to usb tethering of my mobile to sys-net qube
This is harder than it looks guys. I got my WiFi adapter today. I found out that sys-net already has USB 2.0 assigned in it(Bus 001). lsusb under sys-net gives them. I plugged my wifi adapter in 2.0 USB (Bus 001) still I don't get any connection. I tried making sys-wifi assuming sys-net will have some incorrect settings but when I try to attach the USB device to it, it shows backend vm 'dom0' doesn't expose device 'PCIaddressOfUsb' I really don't know how to proceed. It should atleast show the device. Why aren't any USB devices not linked to storage recognized? Is my device there? Do I need to install it's drivers? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/799137ea-94da-4b0f-9b47-86a9a024ad2e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to connect to usb tethering of my mobile to sys-net qube
Stuart, I read things on tethering earlier and there's no clear indication that the people were able to solve the problem and get the connection. So I have ordered a WiFi adapter and I'll install it in a couple of days reading relevant sources. Regarding USB, there's a nice GUI + sign tool on top right corner in R4 which I intend to use and nothing more. Once you plug in a USB device, it is detected in the tool and I'll distribute the trusted and untrusted ones in different qubes. Also, I have 8 usb buses. So I can use different ones to connect to different VMs. unman, there's no difference in both responses tethered and untethered here. I executed qvm-usb and qvm-device ls Got BACKEND:DEVID DESCRIPTION USED BY & Got empty response from qubesd. See journalctl in dom0 for details respectively. Why don't I connect devices to sys-net? Again quoting the Joanna article above. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/879b75f0-f390-430e-bb3a-8a3460aaa484%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How to connect to usb tethering of my mobile to sys-net qube
I don't have a sys-usb. If I assign my usbs to sys-usb, then how will the net VM have access to it? Also according to Joanna here, networking stacks lie in NetVM https://blog.invisiblethings.org/2017/10/03/core3.html So I want to move my USB bus of the mobile connection to sys-net. When I tried the command qvm-pci -a sys-net 08:00.3 which is the address of my usb bus, it shows error regarding 'sys-net' Also, Under dom0, when I execute commmand qvm-block With tethered usb it doesn't show any device and without tethered usb, it shows dom0:sr0 File-Stor_Gadget (CDROM) which means once I start tethering, the USB connection somehow dissappears. Thanks Stuart -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/93fc4b80-e7af-4c97-a102-6e354e96b318%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to connect to usb tethering of my mobile to sys-net qube
I understand that the other VM which have firewall as their NetVM get the network which gets filtered through firewall VM to secure the system. The firewall system in turn receives network from sys-net. I connected my mobile and flipped the switch of USB tethering but am not sure how to configure it. I'm at the network connection page of sys-net where I need help of how to configure the network. There's not any material related to qubes USB tethering elsewhere. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8c01d368-322d-4dd1-b692-a5b5f81a8b74%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Pane is dead error
To add, I haven't installed any drivers yet Because i haven't been able to install any OS yet -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/af9076a4-2889-4dc3-9692-2a5d457ec89f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Pane is dead error
I am using integrated Vega graphics in AMD Ryzen 3 and my installer fails to load xen. CPU 2 and CPU 3 error is shown as I can see in statements. When I tried both options "install Qubes4.0" and "test media and install qubes 4.0", I ultimately get to pane is dead. Please help me. It's a new pc with 240 gb ssd and amd ryzen 3 2200g. Thanks in advance -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5a7a5100-198e-4e50-97bf-47239002026b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.