Re: [qubes-users] Does anyone managed to have wireguard working on Fedora 29?

2019-07-28 Thread dhorf-hfref . 4a288f10
> This issue (https://github.com/QubesOS/qubes-issues/issues/3591) that > was closed marmarek states that the kernel-latest-(qubes-vm) contains > wireguard module out of the box, however I don't find it anywhere. to install the kernel-latest pkg (which includes wireguard.ko): dom0$ sudo

Re: [qubes-users] Does anyone managed to have wireguard working on Fedora 29?

2019-07-28 Thread dhorf-hfref . 4a288f10
On Sun, Jul 28, 2019 at 12:15:42PM +, mmo...@disroot.org wrote: > [xx@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing > kernel-latest-qubes-vm ... > Skipping packages with conflicts: > (add '--best --allowerasing' to command line to force their upgrade): >

Re: [qubes-users] Does anyone managed to have wireguard working on Fedora 29?

2019-07-28 Thread dhorf-hfref . 4a288f10
On Sun, Jul 28, 2019 at 12:34:25PM +, mmo...@disroot.org wrote: > Thanks the package is now successfully installed! good! (but actualy not required now that i think about it) > Now I changed the kernel of my sys-firewall to point to the new kernel > - 5.2.3-1 and tried to start the AppVM. >

Re: [qubes-users] Re: Does anyone managed to have wireguard working on Fedora 29?

2019-07-28 Thread dhorf-hfref . 4a288f10
mildly confused, cant resist to ask... On Sun, Jul 28, 2019 at 05:59:05PM +, Jon deps wrote: > 2) in dom0 do uname -a does it say kernel 4.19 , if so you don't need > "the wg package" whats "the wg package" there? and why would it depend on the dom0 kernel? afaict only the

[qubes-users] Re: split-mail setups

2020-02-12 Thread dhorf-hfref . 4a288f10
> > > mutt in a no-netvm mua-vault? > > > with fetchmail-vms feeding it through qubesrpc-procmail? > > > and separate vms for qubesrpc-msmtp for sending? > > > or msmtp-vms mixed with the fetchmail-vms based on credentials-overlap? > > however, I am afraid that you have already successfully

Re: [qubes-users] How to set the screensaver to either show keyboard language or not to lock screen ?

2020-02-13 Thread dhorf-hfref . 4a288f10
On Thu, Feb 13, 2020 at 06:27:13PM +0100, A E wrote: > So I hope someone can explain to me how I can get it to show the keyboard > layout or not locking the screen. not very qubes-specific afaict. google something like: how to configure xscreensaver > If that isn’t possible, can I then somehow

Re: [qubes-users] How to setup Win10 HVM ?

2020-02-13 Thread dhorf-hfref . 4a288f10
On Thu, Feb 13, 2020 at 10:33:45PM +0100, A E wrote: > When I try to use “*” around the domaine name, it says there doesn’t exist > any domain with that name. And I have checked it was spelled correctly. And > I get the same result if I use the root account. try using quotes ... as in regular ""

Re: [qubes-users] Where to find the directory of a attached mobile phone ?

2020-02-28 Thread dhorf-hfref . 4a288f10
On Fri, Feb 28, 2020 at 10:02:42PM +0100, A E wrote: > Thank you for your very quick response. and thanks for a good/comprehensive reply from you. > The mobile phone is listed as two devices: > 1) sys-usb: sda - Disk () > 2) sys-usb: 1-3 - ..._Mass_Storage_Device_... this is normal. go

Re: [qubes-users] Benefits of Sys-Firewall

2020-02-28 Thread dhorf-hfref . 4a288f10
On Fri, Feb 28, 2020 at 06:00:04PM -0600, Sven Semmler wrote: > You want your sys-firewall to be separate from sys-net for the same > reason: compartmentalization. as usual "depends on your threat model". if you are into outbound-firewalling of appvms, not doing so in the appvm makes a lot of

Re: [qubes-users] Where to find the directory of a attached mobile phone ?

2020-02-28 Thread dhorf-hfref . 4a288f10
On Fri, Feb 28, 2020 at 12:01:04PM -0800, A wrote: > I have attached my mobile phone to a VM, but can’t find its directory > in the file manager of that VM. in which way did you attach it? do qvm-block or qvm-usb show it as attached to the right vm? does it show up in /proc/partitions or lsusb in

Re: [qubes-users] Where to find the directory of a attached mobile phone ?

2020-02-29 Thread dhorf-hfref . 4a288f10
On Sat, Feb 29, 2020 at 08:02:25AM +0100, A E wrote: > When I execute "sudo mount /dev/xvdi /mnt" in the terminal of the VM, I get > this error: “mount: /dev/xvdi/mnt: can’t find in /etc/fstab. that error doesnt match the command. one of them must be incorrect. if the error is real, it indicates

Re: [qubes-users] Re: Tor not connecting over DSL

2020-03-05 Thread dhorf-hfref . 4a288f10
On Thu, Mar 05, 2020 at 04:54:45AM -0800, Rafael Reis wrote: > Could be and MTU issue. I had trouble with Qubes, VPNs, TOR and PPOE > connection due to it’s unusual MTU size (lower than 1500). Maybe the > experts could shed some light into how Qubes deals with MTU across VMs qubes? not at all.

Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-05 Thread dhorf-hfref . 4a288f10
could you please try to at least spell the name right? this is giving my inner monk a headache... On Thu, Mar 05, 2020 at 02:40:18PM +, Mark Fernandes wrote: > The only thing relevant to this topic in the guide, appears to be the > information on verifying signatures (which is of course

Re: [qubes-users] Usb modem passthrough error how to fix?

2020-03-03 Thread dhorf-hfref . 4a288f10
On Tue, Mar 03, 2020 at 09:43:56AM -0800, Eva Star wrote: > Get this error. Please, how to fix? Cable is fine. It work on non virtual > environment on other machine. > [ 64.124877] usb usb1-port1: Cannot enable. Maybe the USB cable is bad? this most likely means your device is not supported by

Re: [qubes-users] Usb modem passthrough error how to fix?

2020-03-03 Thread dhorf-hfref . 4a288f10
On Tue, Mar 03, 2020 at 12:20:57PM -0800, Eva Star wrote: > collection ticket: > > https://github.com/QubesOS/qubes-issues/issues/3778 > Thanks! Yes, exactly this issue. Can I use passthrough mode if I will > connect external 2.0 usb hub to my current notebook usb port and then >

Re: [qubes-users] Re: Mounting directories across VMs (losetup/block device solution for directories)?

2020-02-27 Thread dhorf-hfref . 4a288f10
On Wed, Feb 26, 2020 at 11:33:32PM -0800, alex.bari...@gmail.com wrote: > I suggest you explore the options of network shares using > NFS/SAMBA/FTP/WebDAV/etc - together with passing just that network port to > the target VM this can be a good solution. for an out-of-the-box solution, i would

Re: [qubes-users] System suspend works resume fails.

2020-02-28 Thread dhorf-hfref . 4a288f10
On Fri, Feb 28, 2020 at 09:13:13AM -0800, max Segundo wrote: > While running 4.19.94.1.pvops.qubes.x86_64 I am able to suspend the system > but not resume. I can get the desktop to awake from a ps/2 keyboard (but > not a usb Logitech-Unified) the fan noise etc. starts and sounds like it >

Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-05 Thread dhorf-hfref . 4a288f10
On Thu, Mar 05, 2020 at 03:30:26PM +, Mark Fernandes wrote: > So if your computer has been compromised, the methods you suggest may be if your computer has been compromised to the point where you dont trust it to verify a signature, you need a new computer to install qubes on. once you

Re: [qubes-users] New TemplateVMs Signatures/Master Signing Key

2020-02-26 Thread dhorf-hfref . 4a288f10
On Wed, Feb 26, 2020 at 03:47:34PM +, 'Yiyi50' via qubes-users wrote: > If you download a new TemplateVM inside an existing Qubes system, > using "sudo qubes-dom0-update qubes-template-debian-xx" does that > download have a signature file that needs to be verified with the > Qubes Master

Re: [qubes-users] Re: USB keyboard and mouse no longer work

2020-02-04 Thread dhorf-hfref . 4a288f10
On Tue, Feb 04, 2020 at 01:21:00PM -0800, galt...@gmail.com wrote: > bothered with a sys-usb so hopefully my keyboard and mouse won't get > locked out again. special move there: disable autostart for sys-usb that way you can fix your system a lot easier / more convenient if you manage to break

Re: [qubes-users] The domain (VmNmae) attempted to perform an invalid or suspicious GUI request error?

2020-01-30 Thread dhorf-hfref . 4a288f10
On Thu, Jan 30, 2020 at 09:59:17PM +, 'Aleksander Okonski' via qubes-users wrote: > I rebuilt the arch template today and was able to boot into it with no > problem. But once I updated 'qubes-vm-gui' (from 4.0.27-9) via the aur > pkg to 4.1.5-1 I am getting the same issue as before. yes,

Re: [qubes-users] Install git in dom0

2020-01-30 Thread dhorf-hfref . 4a288f10
On Thu, Jan 30, 2020 at 10:36:16AM -0800, Rene Galera wrote: > Can anyone tell me how to install git in dom0 "qubes-dom0-update git" but... > so I can install packages. this is unlikely to work, even with git installed. depending on _what_ you are trying to install, doing all the "git" parts

Re: [qubes-users] How to add swap space

2020-02-09 Thread dhorf-hfref . 4a288f10
On Sun, Feb 09, 2020 at 02:13:53PM +, 'awokd' via qubes-users wrote: > https://github.com/Qubes-Community/Contents/blob/master/docs/misc/iaq.adoc#how-can-i-provision-a-vm-with-a-largernon-standard-swap-and-tmp for "up to 10GB" and on a modern qubes with lvm-pool there is also ... just start

Re: [qubes-users] How to install software in an AppVM without loosing persistence?

2020-02-09 Thread dhorf-hfref . 4a288f10
On Sun, Feb 09, 2020 at 12:49:39PM -, 'Monsieur DuPont' via qubes-users wrote: > That looks like a good solution, unfortunately I couldn't find any easy way to > do it online (I have no experience in Linux terminal kung fu). So any help > with that regards would be deeply appreciated,

split-mail setups (was: Re: [qubes-users] Will Thunderbird 78 kill Qubes Split gpg?)

2020-02-11 Thread dhorf-hfref . 4a288f10
On Tue, Feb 11, 2020 at 11:35:19AM -0600, Sven Semmler wrote: > Makes me happy I switched to mutt late last year. But that's not really > a solution for the masses. mutt in a no-netvm mua-vault? with fetchmail-vms feeding it through qubesrpc-procmail? and separate vms for qubesrpc-msmtp for

Re: [qubes-users] Running sshd on an AppVM

2020-02-17 Thread dhorf-hfref . 4a288f10
On Mon, Feb 17, 2020 at 08:16:32AM +, tetrahedra via qubes-users wrote: > But sshd doesn't appear to be installed on any template, nor does it > appear to be installable (`dnf search sshd` only returns apache-sshd). the pkg is called "openssh-server". after installing it in the template, i

Re: [qubes-users] Telegram desktop installation

2020-02-17 Thread dhorf-hfref . 4a288f10
On Mon, Feb 17, 2020 at 10:49:43AM +0100, 'Ase' via qubes-users wrote: > I am not sure how to properly install telegram-desktop. > As you may know Telegram desktop is a portable application so would > you install it in the appVM where it is supposed to run or would you > install it in a

Re: [qubes-users] Running sshd on an AppVM

2020-02-17 Thread dhorf-hfref . 4a288f10
On Mon, Feb 17, 2020 at 08:59:18AM +, tetrahedra via qubes-users wrote: > like only debian's `apt-search` will search the binary names, fedora's > `dnf search` appears not to. dnf whatprovides sshd -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Qubes, boot from SD card?

2020-01-08 Thread dhorf-hfref . 4a288f10
On Wed, Jan 08, 2020 at 07:39:12AM -0800, gorked wrote: > My question being, If I purchased an intel based Chromebook with 4 GB RAM, > and a 16 GB SSD. Could I boot QUBES or other Linux on it. 4GB ram is not enough to use qubes. 8GB ram _might_ work if you were a really experienced qubes

Re: [qubes-users] Are there any security benefits of setting up standalonevm instead of appvm?

2020-01-08 Thread dhorf-hfref . 4a288f10
On Wed, Jan 08, 2020 at 06:30:32PM +0100, Vasiliy wrote: > Are there any security benefits of setting up standalonevm instead of appvm? dont see any. if anything, it might reduce your security posture. i consider the volatility of the root volume of a templated appvm a good thing. not really a

Re: [qubes-users] Re: Recommended laptop?

2020-01-04 Thread dhorf-hfref . 4a288f10
On Sat, Jan 04, 2020 at 05:48:29AM -0800, gorked wrote: > Privacy Beast. I suspect that I might brick a Lenovo X230 trying to put > Core Boot on it. I know the guys at a local computer shop are capable, but the main "trick" here is to have a solid unbricking strategy. if you have an

Re: [qubes-users] What happened to "paranoid mode"?

2020-01-04 Thread dhorf-hfref . 4a288f10
On Sat, Jan 04, 2020 at 03:56:49PM +0530, Anil Eklavya wrote: > A better way to backup and restore will make Qubes much more usable, > preferably at some point using something like rsync, as they have > already been considering. This is one crucial feature that makes it > difficult for common

Re: [qubes-users] What happened to "paranoid mode"?

2020-01-04 Thread dhorf-hfref . 4a288f10
On Sat, Jan 04, 2020 at 05:05:01PM +0530, Anil Eklavya wrote: (please dont TOFU) > I wasn’t aware of these options. Thanks for pointing out. I will > certainly try them out. this is all "some assembly required" stuff, but i will try to describe a working borg setup with some variations and try

Re: [qubes-users] Does the latest Linux kernel improve security for qubes?

2020-01-04 Thread dhorf-hfref . 4a288f10
On Sat, Jan 04, 2020 at 09:01:35AM -0800, fiftyfourthparal...@gmail.com wrote: > Quick question: In terms of security, does it matter if I install and use > the latest Linux kernel (5.4) or not? quick answer: not different wrt security. > the potential instability, if there is any? quick

Re: [qubes-users] Re: State of Arch Template?

2020-01-01 Thread dhorf-hfref . 4a288f10
> now someone who understands arch needs to add diffutils to the > pkg-list for the arch builder plugin. :) correction: someone already did, 5 days ago. https://github.com/QubesOS/qubes-builder-archlinux/commit/09a435fcc6bdcb19144d198ea20f7a27826c1d80 so it should be fixed for all new arch

Re: [qubes-users] Re: State of Arch Template?

2020-01-01 Thread dhorf-hfref . 4a288f10
On Tue, Dec 31, 2019 at 02:53:57PM -0800, Daniel Sanders wrote: > So I still don't know the root cause of the issue (why the private.img > image contains no ext4 filesystem) but I hope it will help its resolution. "private.img"? *cough* (this means you are running qubes3 or a qubes4 with a

Re: [qubes-users] kali template upgrade error

2019-12-26 Thread dhorf-hfref . 4a288f10
On Thu, Dec 26, 2019 at 03:01:26PM +, lik...@gmx.de wrote: > dpkg: error processing archive > /var/cache/apt/archives/kali-themes_2020.1.0_all.deb (--unpac > k): > trying to overwrite '/etc/xdg/Trolltech.conf', which is also in package > qubes-gui-agent 4.0 feels crude but

Re: [qubes-users] Qubes OS 4.0.2 has been released!

2020-01-06 Thread dhorf-hfref . 4a288f10
On Mon, Jan 06, 2020 at 08:35:07PM +0100, Diederik de Haas wrote: > On vrijdag 3 januari 2020 03:21:07 CET Andrew David Wong wrote: > > Qubes 4.0.2 is available on the Downloads page: > I'm only seeing 4.0.2-rc3, but not the final one on that page. retracted because a critical kernel bug made it

Re: [qubes-users] Sys-net not sharing internet

2020-01-07 Thread dhorf-hfref . 4a288f10
On Tue, Jan 07, 2020 at 10:42:22AM -0800, paulos elias wrote: > sys-firewall starts just fine. It just doesn't have internet access. you mentioned using a very nonstandard network setup earlier. have you tried just using a plain qubes default network setup? does that work? if you "customized"

Re: [qubes-users] Syncing clock with ntp

2019-12-27 Thread dhorf-hfref . 4a288f10
On Fri, Dec 27, 2019 at 11:51:25AM -0800, John Maher wrote: > understanding is that the ClockVM, which is usually sys-net, runs ntp and > and communicates the time to dom0, which communicates the time to all of > the other VMs. actualy in qubes4 dom0+appvms "fetch" the time from clockvm, though

Re: [qubes-users] HOWTO: Enable screen poweroff (instead of blanking)

2019-12-27 Thread dhorf-hfref . 4a288f10
On Sun, Dec 22, 2019 at 02:45:34PM +, Claudia wrote: > overrides the XFCE Power Manager settings. Xscreensaver is only > configured to blank the screen; I'm not sure if it even supports > powering it off. To return control to XFCE, go to Menu > System Tools it does, and it works (for me).

Re: [qubes-users] Lost USB-Controller, lost tty-credentials, emergency

2019-12-28 Thread dhorf-hfref . 4a288f10
On Sat, Dec 28, 2019 at 04:42:30PM +, Claudia wrote: > I think he means he uses his yubikey as an emulated keyboard to type > his disk password, and probably enabled a USB Qube and now the yubikey > can't type in early userspace. oh, thats even easier to work around: just plug the yubikey

Re: [qubes-users] Lost USB-Controller, lost tty-credentials, emergency

2019-12-28 Thread dhorf-hfref . 4a288f10
On Sat, Dec 28, 2019 at 08:00:46AM -0800, mastor wrote: > my USB controller is attached to nothing, but needed for Yubikey login. > I lost my tty2-credentials (the username), so I'm locked out of the system. > BIOS changes don't help. > Is there any way to "free" USB during boot? Or get rid of

Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-05 Thread dhorf-hfref . 4a288f10
On Thu, Mar 05, 2020 at 03:56:55PM +, Mark Fernandes wrote: > Well that's an idea. But still what if the software you are being 'fed' is > all tampered software, so that after replacing the computer, as soon as you > use software, you are compromised again? > Purchasing a new computer can also

Re: [qubes-users] HVM sound, webcam, microphone, resolution

2020-03-05 Thread dhorf-hfref . 4a288f10
On Thu, Mar 05, 2020 at 05:48:36PM +, 'Ian' via qubes-users wrote: > I've just started using Qubes and I'm trying to ease transition from > my current virtualbox based setup by just importing my virtualbox VMs > as HVMs. good strategy! > 1. Resolution above 1920x1080 (the host is 2560x1440,

Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-05 Thread dhorf-hfref . 4a288f10
On Thu, Mar 05, 2020 at 01:21:47PM -0500, Chris Laprise wrote: > You can also qualify the model somewhat and say that an attacker cannot > successfully infect all of your (hopefully diverse) computers, so that makes the diversity bit is important. and if its mainly about validating a download,

Re: [qubes-users] Installing templates.

2020-03-11 Thread dhorf-hfref . 4a288f10
On Wed, Mar 11, 2020 at 10:46:12AM -0700, redpoll...@gmail.com wrote: > I've downloaded some ubuntu templates with the .rpm extension. I have been > told by someone that I need to put the rpm file into dom0 and then install > via cli with dnf etc. this means you are giving the person who

Re: [qubes-users] Intel Management Engine and RNG

2020-04-17 Thread dhorf-hfref . 4a288f10
On Fri, Apr 17, 2020 at 02:53:01PM -0700, Catacombs wrote: > I would have thought someone could suggest a more trustworthy RNG. there is no real problem with using the intel RNG. if it is as part of a proper software RNG setup. (just dont use anything handpatched by debian devs... *coughs*) >

Re: [qubes-users] Re: NTP and/or clock issue

2020-04-20 Thread dhorf-hfref . 4a288f10
On Mon, Apr 20, 2020 at 01:12:20AM -0700, l319...@gmail.com wrote: > I have tried what Matthew did and you pointed to but I still have dom0 time > an hour behing from what it supposed to be. Weird as both dom0 timedatectl > and sys-net vm how same timezone a) run "qubes-prefs clockvm" in dom0.

Re: [qubes-users] Intel Management Engine and RNG

2020-04-17 Thread dhorf-hfref . 4a288f10
On Fri, Apr 17, 2020 at 02:06:19AM -0700, Catacombs wrote: > It is my understanding that “the “Number Generator” is on the MOBO. > Could the “Intel Management Engine” be changed to alter the RNG > to create weakened Encryption? yes. > Could the IME be altered to load malware to steal

Re: [qubes-users] Increase the size of disk image and root file system

2020-03-25 Thread dhorf-hfref . 4a288f10
On Wed, Mar 25, 2020 at 03:12:04PM +0100, GD rub wrote: > You can't do that on the root filesystem. resize2fs is permissible only if > the partition is unmounted. actualy, no, resize2fs works just fine on a mounted filesystem. > > > Device BootStart End Sectors Size Id Type > >

Re: [qubes-users] Increase the size of disk image and root file system

2020-03-25 Thread dhorf-hfref . 4a288f10
On Wed, Mar 25, 2020 at 04:21:29PM +0100, GD rub wrote: > Device BootStart End Sectors Size Id Type > /dev/xvda1 *2048 29360127 29358080 14G 83 Linux > /dev/xvda2 18946048 20969471 2023424 988M 82 Linux swap / Solaris urgh! be super careful there. your xvda2 is

Re: [qubes-users] Boot qubes-os from net?

2020-04-27 Thread dhorf-hfref . 4a288f10
On Mon, Apr 27, 2020 at 11:34:30AM +0800, Sandy Harris wrote: > Can the OS be booted from the network? short answer: no. > Can I avoid the problem by booting Qubes-OS from the network? what problem? "i dont trust the vendor bios"? how would running an even more complex untrusted bios solve the

Re: [qubes-users] Qubes-device-applet

2020-04-25 Thread dhorf-hfref . 4a288f10
On Sat, Apr 25, 2020 at 06:45:11PM +0200, 'Max Andersen' via qubes-users wrote: > ert > > Hi there, > > After upgrades to latest kernel and several other updates, enabling > sound, I still need support for t your message looks incomplete/corrupted. but the most likely answer to your unasked

Re: [qubes-users] Contradictory measures of disk space in a VM

2020-04-28 Thread dhorf-hfref . 4a288f10
On Tue, Apr 28, 2020 at 03:26:44PM -0300, Franz wrote: > > a) check what the actual size is: > > dom0$ sudo lvs -a | grep yourvmname > > => whats the size of the yourvm-private volume? > did it, but there is no unit, so number are difficult to interpreter, > snapshot enclosed not

Re: [qubes-users] TPM settings for Qubes OS

2020-04-26 Thread dhorf-hfref . 4a288f10
On Sat, Apr 25, 2020 at 05:09:46PM -0700, Harold Smith wrote: > Hello, I'm getting ready to Intall Qubes onto a machine, I can't find any > information about TPM settings, apart from that TPM is required. where did you get that impression? qubes doesnt use a TPM, much less require one. > and

Re: [qubes-users] Contradictory measures of disk space in a VM

2020-04-29 Thread dhorf-hfref . 4a288f10
On Wed, Apr 29, 2020 at 03:10:48PM -0300, Franz wrote: > I tried fsck on dom0, but got the enclosed terror screen. it would have helped if you had tried to fsck the right filesystem: fsck /dev/qubes_dom0/vm-per-dec-private and if it is asking for repair a bazillion times, perhaps with

Re: [qubes-users] Qubes Certified Desktop

2020-05-01 Thread dhorf-hfref . 4a288f10
On Fri, May 01, 2020 at 11:19:45AM +0530, Anil wrote: > system perhaps? Or better, some older version of NUC or other mini PC? NUCs will not allow you to do anything weird with the firmware, so no me_cleaner or coreboot or so. they work reasonably well with qubes. > I know Purism is selling a

Re: [qubes-users] external CD writer

2020-05-02 Thread dhorf-hfref . 4a288f10
On Sat, May 02, 2020 at 01:23:53AM +0200, Olaf Klinke wrote: > just lacking the knowledge how different writing to a CD is from > reading from CD, on the hardware level. Is there more to burning a CD > than a single block special device? try attaching it as a USB-device instead of a block device.

Re: [qubes-users] Dividing Qubes Into Separate Networks (FAILED)

2020-05-02 Thread dhorf-hfref . 4a288f10
On Sat, May 02, 2020 at 03:14:42AM +, 'Zsolt Bicskey' via qubes-users wrote: > > Set the VLAN correctly? > yes, as I said if I connect a Windows latptop it works right away > > Set all parameters necessary to satisfy any port security on the switch? > Yes, same answer as above actualy, those

Re: [qubes-users] Re: Fedora 30 approaching EOL, Fedora 31 TemplateVM available, Fedora 32 TemplateVM in testing

2020-05-01 Thread dhorf-hfref . 4a288f10
On Fri, May 01, 2020 at 04:33:55PM -0500, Sven Semmler wrote: > So make sure to remove those from your grub/EFI config before rebooting! yes, that would be what the second qubesctl call does. there should be no need for manual config editing during this. > The USB qube will work anyway but if

Re: [qubes-users] Re: Fedora 30 approaching EOL, Fedora 31 TemplateVM available, Fedora 32 TemplateVM in testing

2020-05-01 Thread dhorf-hfref . 4a288f10
On Fri, May 01, 2020 at 10:33:08PM +0200, Olaf Klinke wrote: > > > and my keyboard / mouse uses sys-usb. I need to have this appVM > > > running to use the peripheral obviously. But, since the appVM > > > running, I can't update the templateVM? if you really _need_ sys-usb (== only

Re: [qubes-users] Re: Fedora 30 approaching EOL, Fedora 31 TemplateVM available, Fedora 32 TemplateVM in testing

2020-05-02 Thread dhorf-hfref . 4a288f10
> was really unrisky and straightforward scripting, why did the Qubes OS > installer not offer this choice, let alone just do it? a mix of historic reasons and expecting users to do their homework. without a sys-usb, you can not really use usb devices with qubes. and _trying_ to use them will

Re: Solved: [qubes-users] external CD writer

2020-05-02 Thread dhorf-hfref . 4a288f10
On Sat, May 02, 2020 at 11:01:06PM +0200, Olaf Klinke wrote: > I presume dom0 did not recognize the drive as a USB device and hence > refuses to attach as such? `qvm-usb` yields the empty list. oh right, you just came full circle: attaching USB devices is not going to work without a usbVM. >

Re: [qubes-users] Removing Template VMs?

2020-05-04 Thread dhorf-hfref . 4a288f10
On Mon, May 04, 2020 at 12:28:27PM -0700, viktor.ransm...@gmail.com wrote: > If I'd like to remove any old & **unused** Template VMs (e.g. Debian 9, > Fedora 29, etc.) all I have to do is to start the Qubes Manager, select the > template I'd like to remove - and - select 'Delete qube' ... this

Re: Antw: [EXT] Re: [qubes-users] Contradictory measures of disk space in a VM

2020-05-04 Thread dhorf-hfref . 4a288f10
On Mon, May 04, 2020 at 09:12:59PM +0200, Ulrich Windl wrote: > Is it possible to set a flag that makes fsck do a full filesystem > check on the next boot? > Havent found one for ext3... use tune2fs to set the current-mountcount (-C) to something bigger than the max-mountcount (check with -l,

Re: Solved: [qubes-users] external CD writer

2020-05-04 Thread dhorf-hfref . 4a288f10
On Mon, May 04, 2020 at 11:21:18PM +0200, Olaf Klinke wrote: > Where in the documentation is that stated? The manpage of qvm-device > does not mention this. The only hint is that all examples of qvm-usb in > the documentation show sys-usb as backend. for example in the documentation about usb

Re: [qubes-users] qubes AppVM nameservers

2020-04-26 Thread dhorf-hfref . 4a288f10
On Sun, Apr 26, 2020 at 09:17:10PM +0200, Olaf Klinke wrote: > it seems that some iptables rules are set on VM boot that redirect port > 53 requests, but I can't get iptables inside the AppVM to divulge these those rules should exist in your external netvm (sys-net), and point to the "real"

Re: [qubes-users] TPM settings for Qubes OS

2020-04-26 Thread dhorf-hfref . 4a288f10
On Sun, Apr 26, 2020 at 01:16:42PM -0700, Harold Smith wrote: > TPM and TXT were listed as required for AEM in the recommended section, so > i'll disable TXT and TPM, I have vt-x with ept and vt-d and I;ll try again. you can also just keep them enabled. you can use the TPM for whatever you

Re: [qubes-users] QUBES Friendly Version

2020-04-28 Thread dhorf-hfref . 4a288f10
and just to shred that last bit of misinformation the other two responses skipped ... On Tue, Apr 28, 2020 at 12:44:38AM +, '[NOTIFICATION]' via qubes-users wrote: > It would be great if you opened up QUBES for worldwide editing and > audit and development. https://github.com/QubesOS/

Re: [qubes-users] Contradictory measures of disk space in a VM

2020-04-28 Thread dhorf-hfref . 4a288f10
On Mon, Apr 27, 2020 at 09:06:41PM -0300, Franz wrote: > So, it seems that Qubes Manager, Nautilus and df are consistent, telling > that available space is almost 5GB totally used. > > But Qubes VM settings with Private Storage Max Size of 18524 MB is totally a) check what the actual size is:

Re: [qubes-users] Contradictory measures of disk space in a VM

2020-04-29 Thread dhorf-hfref . 4a288f10
On Wed, Apr 29, 2020 at 08:11:37AM -0300, Franz wrote: > Did it with Fedora 30, but with exactly the same result > But checking other VMs I am getting the same error on some of them :(( > So this is a widespread problem. did you try to google your problem? because at this point it is starting to

Re: [qubes-users] Pulseaudio update error - fedora-31

2020-04-22 Thread dhorf-hfref . 4a288f10
On Wed, Apr 22, 2020 at 11:29:30PM +0200, Frédéric Pierret wrote: whats with the top-posting, eh? :P > From a brief look, it's due to newer Fedora pulseaudio and our Qubes > package requires older one. I'll try to fix that soon. actualy it seems to have been fixed some days ago and is now in

Re: [qubes-users] Mistakenly deleted MBR & system partitions to install, can't boot Qubes

2020-05-17 Thread dhorf-hfref . 4a288f10
On Sat, May 16, 2020 at 07:25:59PM -0700, sjill...@gmail.com wrote: > nvme0n1p 953G (hd1) > nvme0n1p1 1MBIOS boot efi (hd1,1) this is WAY too small. make it at least 100M, better 500M or even 1GB. here a single set of xen+linux+initrd is about 35-40MB, and in general you

Re: [qubes-users] Re: Install of the Fedora-32 templateVM failed

2020-05-18 Thread dhorf-hfref . 4a288f10
On Mon, May 18, 2020 at 03:33:02AM -0700, TheGardner wrote: > - Setting the space up to 4096 on sys-firewall > same result the default download location in udaptevm is /var/lib/qubes/dom0-updates so with a default appvm layout that is inside the rootfs (or its overlay). you can check if this is

Re: [qubes-users] How to bridge a subnet ot the firewall

2020-05-06 Thread dhorf-hfref . 4a288f10
On Wed, May 06, 2020 at 06:17:58PM +, 'Matt Drez' via qubes-users wrote: > My problem is that I don't see their individual IP addresses in the > capture just a NAT'd address of SPS's eth0. I supposed I have to > create a bridge somehow but that's way beyond my skills. you are simply sniffing

Re: [qubes-users] Password not working a day after reinstall

2020-05-05 Thread dhorf-hfref . 4a288f10
On Tue, May 05, 2020 at 11:25:53PM +0530, Anil wrote: > I tried to use a USB keyboard, but of course that won't work in Qubes. that is not a "of course" qubes thing but your choice / configuration. you can use a USB keyboard with qubes if you want to, including for entering luks passphrase. >

Re: [qubes-users] Re: Password not working a day after reinstall

2020-05-05 Thread dhorf-hfref . 4a288f10
On Tue, May 05, 2020 at 11:36:27PM +0530, Anil wrote: > By the way, as I write this mail, the keyboarding is again acting up: > sometimes eating up space, sometimes emitting two for one key press. > It was working well the whole day. did you try asking the internet about this problem? like,

Re: [qubes-users] Removing Template VMs?

2020-05-07 Thread dhorf-hfref . 4a288f10
On Wed, May 06, 2020 at 09:31:50PM -0700, viktor.ransm...@gmail.com wrote: > >> i recommend to keep your one-generation-outdated mainline-template > >> around (even if it is EOL) if you can spare the diskspace. > >> if you manage to wreck your new mainline template some way, it is > >> easier

Re: [qubes-users] Grub with encrypted boot

2020-05-06 Thread dhorf-hfref . 4a288f10
On Wed, May 06, 2020 at 06:21:00AM +, lamboicarus via qubes-users wrote: > I am wondering if anyone knows how I might install grub for use with > an encrypted boot partition, or no boot partition at all. I have > recently decided to use btrfs, and I have grub working fine. The > grub2-efi

Re: [qubes-users] LVM not using full partition size

2020-05-10 Thread dhorf-hfref . 4a288f10
(please dont top post) On Sun, May 10, 2020 at 07:51:01PM +0200, jiggermas...@posteo.de wrote: > Yes, that's what I mean, mixed up terminology there. The pool has now > 584 GiB, before the reinstall it had around 670 GiB - I am wondering > where that additional 84 GiB ended up (and I need it,

Re: [qubes-users] LVM not using full partition size

2020-05-10 Thread dhorf-hfref . 4a288f10
On Sun, May 10, 2020 at 05:12:04PM +0200, jiggermas...@posteo.de wrote: > The partition size for the LVM correctly shows about 700 GiB, but the > root storage then only gets 584, and I am not able to set it higher. the root partition is just the root partition for dom0. if you want to see how

Re: [qubes-users] LVM not using full partition size

2020-05-10 Thread dhorf-hfref . 4a288f10
On Sun, May 10, 2020 at 08:21:03PM +0200, jiggermas...@posteo.de wrote: > [user@dom0 ~]$ sudo vgs >   VG #PV #LV #SN Attr   VSize   VFree  >   qubes_dom0   1 168   0 wz--n- 701.28g 100.00g this means the VG is already the right size. for resizing the pool, google "how to resize an lvm

Re: [qubes-users] Re: HCL - Latitude E6230

2020-05-11 Thread dhorf-hfref . 4a288f10
On Sun, May 10, 2020 at 06:00:49PM -0700, Catacombs wrote: > am trying to find a USB Wireless Dongle which comes pre installed in > the Kernel. But. there is only exactly _one_ wifi usb dongle that is documented to work with qvm-usb (aka linux usbip) _and_ has a driver included in mainline

Re: [qubes-users] Can I have Windows & Qubes on the same laptop?

2020-05-11 Thread dhorf-hfref . 4a288f10
On Mon, May 11, 2020 at 01:48:58AM -0700, matteochicarella...@gmail.com wrote: > Firstly, is it safe to have Windows and Qubes on the same machine? I > use VeraCrypt for full disc encryption veracrypt does not support actual full disc encryption. > Also, I've got a 2TB external HDD, would it

Re: [qubes-users] Installation failed to install several software and VMs

2020-05-16 Thread dhorf-hfref . 4a288f10
> > stderr: “qubes-prefs:error: “No such domain:\’fedora-30\”” this indicates you do not have a fedora-30 template. did you deselect templates during install? you need at least one usable template, and in general for a q4.0.3 install that means fedora-30. (and the first thing you should do

Re: [qubes-users] Installation failed to install several software and VMs

2020-05-16 Thread dhorf-hfref . 4a288f10
On Sat, May 16, 2020 at 06:22:20AM -0700, sarru1...@gmail.com wrote: > > you need at least one usable template, and in general for a q4.0.3 > > install that means fedora-30. > but I'm not able to connect to the internet. It's not showing sys-net, > nothing. How can I troubleshoot for an

Re: [qubes-users] Re: Install of the Fedora-32 templateVM failed

2020-05-18 Thread dhorf-hfref . 4a288f10
On Mon, May 18, 2020 at 02:38:34PM -0700, TheGardner wrote: > [user@sys-firewall ~]$ df -h /var/lib/qubes/dom0-updates > /dev/xvda3 9.6G 8.7G 450M 96% / > sudo mkfs.ext4 /dev/xvdc3 > sudo mount /dev/xvdc3 /var/lib/qubes/dom0-updates > Do I have to change (back) somethings, after I

Re: [qubes-users] feature request: qvm-print command

2020-05-19 Thread dhorf-hfref . 4a288f10
On Tue, May 19, 2020 at 11:14:45AM +0200, haaber wrote: > Hello there, I was thinking about the usefulness of a qvm-print command > that takes an input file, sends it to the "printing-VM" (defined in some > config file), and launches there a document viewer (defined in the > config file) in order

Re: [qubes-users] dom0:mmcblk0 regularly disappearing (usb storage mounting)

2020-05-14 Thread dhorf-hfref . 4a288f10
On Thu, May 14, 2020 at 06:06:43AM -0700, sairus@gmail.com wrote: > Does anyone have an idea what is wrong and how to fix it? "dom0:mmcblk0" and "usb storage" doesnt match up too well. on this computer the dom0:mmcblk0 is a pci device entirely unrelated to anything USB. check what kind of

Re: [qubes-users] Is it possible to build any BSD template on QubesOS?

2020-05-14 Thread dhorf-hfref . 4a288f10
On Thu, May 14, 2020 at 06:56:56PM +0200, onelovecisco via qubes-users wrote: > In PHV mode like Fedora-31 or Debian-10. > Is the Qubes-builder capable of this? qubes-builder most certainly can not build bsd templates. but like almost any PC OS, you can install it in hvm mode, and that should

Re: [qubes-users] template and dependent qube show different behaviour

2020-05-07 Thread dhorf-hfref . 4a288f10
On Thu, May 07, 2020 at 08:30:14AM -0300, Franz wrote: > I installed into Fedora 31 template a proprietary banking rpm > application/plugin/extension which is supposed to work with the browsers > during banking tasks. This is called warsaw_setup_fedora_64.rpm this sounds like a terrible idea

Re: [qubes-users] Salt worm

2020-05-06 Thread dhorf-hfref . 4a288f10
sm1> Qubes uses Salt, and there's something nasty going around: sm1> https://saltexploit.com/ sm2> to be used "by hand only" we could enforce risk = 0 by the above formula sm2> and keeping fingers off salt for a while. Thanks! sm3> There was today an update for all templates related to the

Re: [qubes-users] Set Battery thresholds x230

2020-03-18 Thread dhorf-hfref . 4a288f10
On Wed, Mar 18, 2020 at 11:56:31AM -0300, Franz wrote: > When a laptop is always connected to power, e very good behavior to > strongly prolong battery life is to avoid charging it to 100% and limiting > it to lower threshold, perhaps 80%. i am using a (perl) script for doing this on my qubes

Re: [qubes-users] Compatibility

2020-03-21 Thread dhorf-hfref . 4a288f10
On Fri, Mar 20, 2020 at 11:07:55PM +, 'jrsrrs33' via qubes-users wrote: > to understandif my computer is compatible or not and in this case, > what should I install? qubes 3.2 or qubes 4.0.3? do not use qubes 3.x ... it has been deprecated for a long time now. please do use qubes 4.0.3 ...

Re: [qubes-users] How can I recover my Qube'sVM if I cannot boot anymore ?

2020-03-22 Thread dhorf-hfref . 4a288f10
On Sun, Mar 22, 2020 at 11:57:38AM +0100, haaber wrote: > > Assuming you didn't make backups before the crash: You need to have a > > running Qubes system to backup VMs the normal way. > Does that mean Chris, that in case of a disaster, there is no way to > backup your data "by hand" (booting a

Re: [qubes-users] Re: Fedora-31 template

2020-03-22 Thread dhorf-hfref . 4a288f10
On Sun, Mar 22, 2020 at 05:07:44AM -0700, max via qubes-users wrote: > [max@dom0 ~]$ sudo qubes-dom0-update > --enablerepo=qubes-dom0-current-testing qubes-template-fedora-31 wrong repo. try with --enablerepo=qubes-templates-itl-testing -- You received this message because you are subscribed

Re: [qubes-users] Associate office files to win7 VM and prevent qvm-open-in-vm pop-up

2020-03-23 Thread dhorf-hfref . 4a288f10
On Mon, Mar 23, 2020 at 05:48:29AM -0700, peebl...@gmail.com wrote: > asking me in which VM i want to open the file.. So it seems the command > line parameter for VM is not taken into account.. it probably is, but you need to authorize it anyways: security. > How can I fix this?

Re: [qubes-users] Is it possible to get an app like WinAuth for Linux or what do you use for 2 step verification ?

2020-03-07 Thread dhorf-hfref . 4a288f10
On Sat, Mar 07, 2020 at 03:08:13PM -0800, A wrote: > Is it possible to get an app like WinAuth for Linux or what do you use > for 2 step verification ? https://www.qubes-os.org/doc/multifactor-authentication/ -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Salt worm

2020-05-06 Thread dhorf-hfref . 4a288f10
On Wed, May 06, 2020 at 12:02:55PM +0200, haaber wrote: > > https://labs.f-secure.com/advisories/saltstack-authorization-bypass > Thanks for the source. How do you infer that this "doesn't apply" (and > maybe "did never apply") to qubes? Recall my question: where does salt the vulnerabilities

  1   2   >