Re: [qubes-users] Web Conferencing software and QUbes
On Wednesday, May 25, 2016 at 1:24:04 AM UTC-4, J. Eppler wrote: > Hello, > > > > > If there is another web conferencing app that works better for qubes I would > be happy to try it. > > https://tox.chat/ > - you will find the clients here: https://tox.chat/download.html > - I would use qTox or uTox for desktop systems > > or another one: > > https://jitsi.org/ > > Best regards > J. Eppler Does TOX have video? if so how is the quality of the connection? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/88c30642-01d9-482d-859d-fe8c895cdb42%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] update icons not disappearing from qubes-manager
On Tuesday, May 24, 2016 at 9:06:40 PM UTC-4, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-05-24 11:00, raahe...@gmail.com wrote: > > I had updates for debian and fedora templates. but after > > successfully updating the icon is still in the state columng > > showing i have updates. I haven't rebooted, but is there some > > cache i can clear? > > > > This is currently being worked on for Debian templates: > > https://github.com/QubesOS/qubes-issues/issues/2009 > > But it should already have been fixed for Fedora templates: > > https://github.com/QubesOS/qubes-issues/issues/1476 > > Is it happening on both, or just Debian? > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXRPqSAAoJENtN07w5UDAwE+0P/irLi0zv4Jh+svPHPBY4dc8e > zj+BDPWf+A3QQWBttFH/b9JdV1cTZyk0OkuFkEnSjBlxAoVuyj1V7S1UVkzsBK5I > ymogMoc3+s8K5ndSVapLswyVF96YMaV3iT11CvN7oAsBIoKib2ycLhszBX6Jn7mr > k9ERUor9gjVPrauOOvNZszEtC8DsEu8Tu6jtVTKUsO8dZXhZ8rUO2zRhNd+4NBFZ > 6qaQom+B4Pw+aaYIVpHC4vuI23CA+cenDeSoe1+ra+u5FYL+ohrX1VaXNx2IJjnw > Iftc4UGNFCquBhfYweC+7lWj4wS930MwvMxCcl21VEsgBOOoAvIvB412MCIzFqTv > K358+eg13bpoDL9bpqE0QSabJdNxZ3/VGXr8RWlPrxKdfAldtB3XQuhAF3gSKLAK > ZkgHTGvnkyAHUaTzGT38C/CuwnG3Asr3Amj78FvbdBpCa7aUSwO3DbCCjXCe1r9B > D8fH/Ag9DRVosz0yZKJsL8nEf18bknAebU9Fhj8w7nRyqinTUR1RRsgUXaQaTIIP > 1/SC/bfi7IexYIQK4iiG5U0OBDXn2VOJR5RbNLZ6IWHb5rrfopuyYtifBVhmuRZ5 > o9YiRkhGuKDViEA6x8jycK0Oi8bJDqTWq6m8tHRAzf35IGte5rxVlWy/fNITbwn9 > lR4NUioEDncuXR10hZsV > =KbIh > -END PGP SIGNATURE- It happened on both, hasn't happened to me in a long while. A reboot fixed it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ec2172c9-58e0-4236-9eec-862a813c087e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] usbvm and internet access
On Wednesday, May 25, 2016 at 12:05:28 PM UTC-4, Niels Kobschätzki wrote: > > On May 25, 2016 at 2:20 PM Andrew David Wong wrote: > > > > On 2016-05-25 03:40, Niels Kobschätzki wrote: > > > Hi, > > > > > > I hope for the last time today ;) > > > > > > For online P&P-role playing sessions and for podcasting I need to > > > use a usb-webcam and usb-microphone. If I understand it correctly > > > the only way to get those working is to use a usbvm. So I > > > activated it and Cheese and Audacity are showing the expected > > > results. > > > > > > But I would need to use both in Chrome as well for Hangouts and > > > WebRTC-sessions. But the usbvm doesn't seem to have access to the > > > internet. In the VM settings I cannot choose a NetVM (probably > > > because it is a NetVM itself if I understand it correctly). There > > > is the NetworkManager to check though in Services. When I do an > > > "ip addr list" in the usbvm there is only a loopback-interface. > > > > > > What would be the best way to approach my problem? > > > > > > > Any AppVM can be a USBVM (by adding the USB controllers in the > > "Devices" tab in "VM settings"), so if a USBVM-as-NetVM doesn't work > > (can't test this myself at the moment), then a USBVM-as-AppVM should > > be able to get network access by assigning sys-firewall as its NetVM. > > Ok, I got that to work. When I tried it the first time I could add only one > controller but ran into the problem that the AppVM wouldn't start with an > error that the device driver is already in use by xendlight. I didn't get > that in the end the pci_strictreset False would be the solution to that > problem. The reason was that sys-usb worked with both controllers but the > appvm didn't work with just one (after fiddling around, it worked with both). > I ran into one wall after another. Now it seems to work. > > P.s.: Is there some sort of documentation wiki? I can only find the > > > "Docs" which are ok-ish for the beginning and the archive of this > > > mailing list. > > > > All of our documentation is here: > > > > https://www.qubes-os.org/doc/ > > > > I'm not sure what you mean by "for the beginning." As you can see, > > some pages go quite in depth, and there's also a section for > > developers, most of which is here: > > > > https://www.qubes-os.org/doc/system-doc/ > > Yes, I know that documentation and I mean exactly that. It is not very > beginner friendly imho but maybe I am just spoiled by the Arch- and > FreeBSD-documentation. > The problem I have that when I google for errors, you might find the mailing > list. In the documentation problems are described but typical concrete error > messages are not mentioned that occur in those cases, thus throwing error > messages into google do not lead to the documentation. > > > > I.e. is there a place where I could add the stuff I found out so > > > far by myself or asking in this mailing list, so it is easier to > > > find for others? > > > > Yes, there's an "Edit This Page" button on every page of the > > documentation. It's all written in Markdown, managed under Git, and > > hosted on GitHub. We happily accept pull requests containing quality > > contributions. :) > > I will see what I can do. I find the "create a pull request on github"-method > just harder than a wiki (that's why I asked about a wiki), where I can easily > add pages. I am not really a developer and I rarely create pull requests. I > will look into it :) > > > If you'd prefer just to send out some informal notes, then this > > mailing list is the right place to do it (and would also be > > appreciated!). > > Yeah, that's the thing. I am not sure where I put something like: "For > getting the teamviewer-client to work, don't use the offered packages but use > the tar.gz and start the binary" (in a a bit more detailled way for people > who do not know tar-options by heart). The documentation kind of looks that > such a thing doesn't fit there and a mailing list is also nothing where short > how-tos should be posted because of discoverability. > > I will learn the ways of this community :) So far you all are very helpful > and this is a real delight after my experiences in the Arch-community :) > > Niels I've been wondering about that specific xenlight error when trying to do the same thing too. Glad to know the pci_strictset false is how you fixed it. Curious though why you couldn't add a netvm to the usbvm. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/71c8d3b5-5369-4de6-914a-9e441ab602d0%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Debian 8 Template, can't install printers
On Wednesday, May 25, 2016 at 3:29:06 AM UTC-4, Drew White wrote: > I don't know what communicating with the printer has to do with anything, > it's the install of the driver that isn't working. > I can do it with Fedora Template, but not Debian template. > > The templates themselves have no such restriction that you are mentioning. > > Can anyone please help? A usb printer you are talking about? If its a network printer the template would need temporary internet access to talk to it since its blocked by default.What driver are you trying to install and how? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/73188b17-aac4-4c64-96ad-4acfda12a096%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] dispvm - firefox profile missing, won't start
On Friday, May 27, 2016 at 8:56:56 AM UTC-4, cubit wrote: > 27. May 2016 12:49 by a...@qubes-os.org: > If the TemplateVM on which your DVM template is based isn't > experiencing the same problem, I would just re-create the DVM template: > > qvm-create-default-dvm --default-template > > > > Thanks Andrew, got it fixed but not with above though you lead me in the > right direction. > > > My dispVM is using the default fedora-23 that comes with the system where as > my other appVM are use either a copy of the fedora-23 or debian8 templates. > > > I create a appvm based on the default fedora23 template and test firefox it > works, after that dispVM firefox start working again. > > > > > > > I've had this happen to me a couple times after viewing porn sites in a dispvm. it crashes and then I can't load another dispvm from anywhere afterwards. What I do is just show internal vms in the qubes manager. Then i just right click and remove the fedora-23-dvm and recreate another one from dom0 terminal with qvm-create-default-dvm fedora23 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/65b054ba-24ef-45cc-b6f4-4f75d39b0fc1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Tools for Windows definitly broken.
On Friday, May 27, 2016 at 1:18:21 AM UTC-4, Drew White wrote: > On Friday, 27 May 2016 14:53:30 UTC+10, Andrew David Wong wrote:-BEGIN > PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > > If you're referring to any or all of these issues, then Rafał is > > currently working on it/them: > > > > https://github.com/QubesOS/qubes-issues/issues/1861 > > https://github.com/QubesOS/qubes-issues/issues/1550 > > https://github.com/QubesOS/qubes-issues/issues/1896 > > > > > > I do not believe that it is related to any of those, because I had it working > at one point. Then I broke the VM, then I had to install it all again. > It still isn't working, even though I have done everything the same way I did > when it worked. > > #1896 : Doesn't matter what resolution, doesn't matter how many monitors or > what monitors, still doesn't work.#1550 : My issue doesn't correspond to this > much. Lots of differences, but maybe root cause is the same for all like > this?#1861 : I won't use Windows 8 or higher, so this isn't related. > So I am still confused. I've had it working at some point, but are there > Windows Updates that will break the Qubes Windows Tools? > Are there Windows Updates that need to be installed? > Are there things that need to be turned on for it to work properly? (services > or anything) seamless gui doesn't work for me for all programs. It will end up loading the whole desktop regardless. It might depend on the program you are installing I'm not sure. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cf87c2dc-f6ab-411d-9fd8-1b9416bcf80f%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Debian 8 Template, can't install printers
On Thursday, May 26, 2016 at 8:17:22 PM UTC-4, Drew White wrote: > Fedora method: > > 1. Start Template > 2. Open Printers Dialog > 3. Install printer by normal method > 4. Shut down template. > complete. what printer model? if its networked as been said you have to temp allow network access. Maybe you dont' realize your fedora template is being allowed network acess for some reason but the debian one is not? double check the firewall settings for each. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3cecc1da-e844-49ae-b02b-f036896be703%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Web Conferencing software and QUbes
I don't only have a problem assigning a usb controller to more then one vm. I also have the issue if I even delete the original usbvm and try to add it to a newly created one. I guess this is also for security purposes. I have to recreate the original usbvm and add it back to get it working again. even after a reboot. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e269fc91-cd15-4bd6-b421-17621bdf03e4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] usbvm and internet access
On Wednesday, May 25, 2016 at 4:53:21 PM UTC-4, Niels Kobschätzki wrote: > > On May 25, 2016 at 7:09 PM raahe...@gmail.com wrote: > > > > On Wednesday, May 25, 2016 at 12:05:28 PM UTC-4, Niels Kobschätzki wrote: > > > > > > On May 25, 2016 at 2:20 PM Andrew David Wong wrote: > > > > > > > > On 2016-05-25 03:40, Niels Kobschätzki wrote: > > I've been wondering about that specific xenlight error when trying to do > > the same thing too. Glad to know the pci_strictset false is how you fixed > > it. > > > > Curious though why you couldn't add a netvm to the usbvm. > > That's an easy one I think. The docs explain first how to create sys-usb: > 1: qubesctl top.enable qvm.sys-usb > 2: qubesctl state.highstate > > sys-usb is a NetVM and thus doesn't use sys-net or sys-firewall for the > virtual interfaces. At least that's how I understand it. And it didn't have > its own interfaces and when I activated NetworkManager, I saw in the kde > panel suddenly a second network manager, but the wifi-device was already > connected to another NetVM (and I couldn't figure out how or if it is even > possible to get a virtual interface into sys-usb and maybe route the traffic > through sys-firewall). > > Niels Oh I meant just adding sys-firewall as the usbvm's netvm to get internet access for it. It works for me or maybe i'm misunderstanding what you are trying to do. my apologies if thats the case. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a26dbc63-2c01-4e5e-83cc-1a25c0150e11%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Firefox in DispVM doesn't start anymore
On Friday, May 27, 2016 at 4:25:23 PM UTC-4, Niels Kobschätzki wrote: > On 16/05/27 20:54, Niels Kobschaetzki wrote: > >Hi, > > > > > I couldn't create or work with DVMs based on Fedora or Whonix. But I > could now create a new default-DVM with Debian as a base. So, it is > working now for me. > > Niels Did you make sure to delete the internal vm first? qvm-remove fedora-23-dvm, and then, qvm-create-default-dvm fedora-23 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/099f8bb2-9daa-4af8-b506-ec9f50b2eacd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Disposable netvm?
On Saturday, May 28, 2016 at 6:31:07 AM UTC-4, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-05-28 02:25, Bill Wether wrote: > > It seems to me that it would improve Qubes security if sys-net > > were a dispVM. That way, whatever nasties one picked up from the > > hotel wifi, for instance, would be gone at the next boot. > > > > Thoughts? > > > > Cheers > > > > BillW > > > > There's been a lot of discussion about this lately. In brief: > This (or something close) is planned for Qubes 4.0. For details, > see here: > > https://github.com/QubesOS/qubes-issues/issues/866#issuecomment- > 220495485 > > https://groups.google.com/d/msgid/qubes- > devel/20160517124118.GK25975%40mail-itl > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXSXNfAAoJENtN07w5UDAwZVsP/jYTpODQFv9pcZaO8Q1YlNCY > M9P72j2AkEOVoZiIGb9ffNYjxPnp7kjlMt4kzITrtTM49XhLdDhFOZxRWe1alZaQ > KwDqXeMN5aDsO2UgWowi3eqTpYIOGRZ/Ysb9b7TX9/fxGdJV0w8sEnnf57OaCgVa > ZKeMmbvce6ajdjKbOoJbDXd1Lo/3EGfnuTzEqKHstONF4wsd4xz4+8Ckd46GfXbX > qmzt8+kwICjQjUBqdXdEbJZsfdWYvADcnwh7KfyK3ef5v1FnefI4eZYYgHlLjm++ > nShiARVIzHEoCY+4x60y0j/GLVl72yZUwLqHUUUMUK4PcW9ZQrdYYqliKOYmMONm > yZmftSQ7FY/wQpuRO/oBz+pMLCKWKyId4cugXqK58Tmb/qBj9OwY3yIcWyI8tzWf > PdD49HgxTg7bk26bWLSyTayr0i7Ez1e+mGLC1djQsQxn2t45lFCqtE3YKNzYn9oh > ahVWkt1zeekWtjiiqYTPgMVycaPFrceX8H8pIXf+DytjWUDJC64enPbKEFdp0rzJ > jMi5HQkMaefw22qijVwDZc/HGR+KHP34nUXVJqsxdiY4zvJYjmwMdKS3h+BAfzIu > RwZtBKR9Yyy0V0NwMJmx5GOuxb4OoWfSGt6C+qI6YFuA1uf6uqtjykK55fJwFKnE > C5/V1+FTfu3gEFrxOBql > =pF8K > -END PGP SIGNATURE- great idea! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/26fda238-d4da-4ce7-bc59-de3e5e90870b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Tools for Windows definitly broken.
On Tuesday, May 31, 2016 at 9:15:14 PM UTC-4, Drew White wrote: > On Saturday, 28 May 2016 03:57:26 UTC+10, raah...@gmail.com wrote:seamless > gui doesn't work for me for all programs. It will end up loading the whole > desktop regardless. It might depend on the program you are installing I'm > not sure. > > At least yours works for something. > Doesn't work for me, seamless just doesn't work. > What have you done to enable SOME things to work? actually, sometimes windows hvm errors and won't load when selecting an app from the startmenu. So usually I just start the win7 vm manually from the qubes-manager first before loading a program from it. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4fc8edcf-b63e-49a0-800d-23d6abef5d17%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Debian 8 Template, can't install printers
On Tuesday, May 31, 2016 at 9:12:49 PM UTC-4, Drew White wrote: > On Saturday, 28 May 2016 04:01:57 UTC+10, raah...@gmail.com wrote: > what printer model? if its networked as been said you have to temp allow > network access. Maybe you dont' realize your fedora template is being > allowed network acess for some reason but the debian one is not? double > check the firewall settings for each. > > It's a Konica Minolta. > > I'll go into more detail for you since you may not be understanding what I > meant because I didn't go into enough detail. > > 1. start Print Settings > 2. click Add button > 3. click on Network Printer. > 4. Find Network Printer. > 6. Enter Host IP of Printer. > 7. Click Find > 8. Select Konica Minolta from found printers list. > 9. Make sure hostname is correct for printer. > 10. Chance it to the IP instead of hostname and click Probe. > 11. Ensure the Queue is correct and Connection as well. > 12. Click Forward > 13. "Searching for Drivers" dialogue pops up, then vanishes, New Printer > window vanishes, Print Settings vanishes. > -- All other windows open stay there, it's only the print settings and sub > windows that vanish. > -- That was the first thing I checked. > -- If I perform the same thing in an AppVM, the whole Print Settings and > Add Printer all just lock up. instead of vanishing. How are you starting "print settings"? Did you try system-config-printer command from the terminal? And So it finds the printer on the network but crashes when it says searching for drivers?I'm not sure what you mean by print settings and sub windows. Wouldn't print settings be after you install it? Never even heard of that model maybe you have to manually download the driver from their website for fedora? not sure. You could also try asking on fedora forums. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7a3f3ee0-0a95-46ef-b91f-3b08e46dee48%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Error starting VM 'sys-net': Failed to kill old QubesDB instance (PID 1793 )
On Wednesday, June 1, 2016 at 6:18:44 PM UTC-4, tnt_b...@keemail.me wrote: > thats correct it will work , but as u know we should find out the correct > fixation to this problem. > > > 1. Jun 2016 10:53 by a...@qubes-os.org: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-06-01 03:47, tnt_b...@keemail.me wrote:well i have already opened > this topic in github before long time , > but now andrewdavidwong recommended me to send this topic to users > section:- > > https://github.com/QubesOS/qubes-issues/issues/1745#event-665419288 > > I've experienced this too. If I just wait about 10 seconds, then try > to start sys-net again, it always works. > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXTr67AAoJENtN07w5UDAwAMgQALQdF58VO2/RW520IgCx12jc > Jc506wDrBXlMHU3Qts3N3eQmKeNMjdJrLLP/ZONNC1az1sI0ssrIVjkT5XO8h2/P > b/lY67Qa+9WMQpf8tj0faz6tsnh/tBuUyImEKkpo/389GtAGJAtLrR25cPjDCNXQ > /KTFn6/B4VJxwHFxjJjk2yAxtM4VyO5cTOGtkcrJK07SrC7U9722KDOOhLKLv6Ul > OtaRR0gA7UG6PghvV2ilUOYEshzEFQXoaeaaL3uHcNVuIFW9eb42rYSrStDPF+tg > pox4FXiqG/UZfc9dYZWESYgGItsEwCxHiXZH0zruEaaK8Euea/yNRDHcKh5mwDzs > 82O66WmnGvjP2q1YtHlJD1p0TEJma8M0uviLY+sjyi9S6psRBpnX4dAzW5CtKcpw > CsEj+wcQYlXWJ+LmAueDICC2NF2zsi9KtGXFRFHBllMFtTYklUGNYm08MUulzdvE > G6ZCkXkdJ5kv94d8krax3iQalYxH1dhBoXUhVsqXccVCNUHbbaS9S3G/Lf2g9CBf > gCk+dtCMAOexRiK71bZlpSyIQKrYGYGza6vYu6UEUml2r1fRoa8pLI/KmeJicKhd > lKcgcjy75eHJwGvylMnoTZ8h8oLm7fvbe6zJvdjBdTtT3qTKHkFLgN3lUahSFqKp > fe0ZvgThe7OeqrSSRM/+ > =hin+ > -END PGP SIGNATURE- Happens to me too. It can happen when restarting it too quick I guess because it takes a couple secs for it to fully close the old instance. I guess the faster your computer the less it would happen. For example same thing happens to me with sys-firewall if I start it too quick after the sys-net, basically before the sys-net has internet connection, which will cause an error as well. To avoid this now, instaed of manually starting the sysnet or proxies, i just load the appvm i want to use. So this way the sys-net and sys-firewall and proxy is automatically started at the proper intervals one after the other avoiding me accidentally starting one of them too quick. But you still have to give it acouple secs after first closing the sys-net . -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d905d866-a122-4249-bf14-b488ef343437%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] WARNING: Whonix Meta Packages Test Result:
Whonix-Gateway detected, but the meta package qubes-whonix-gateway is not installed. Did you accidentally uninstall it? See also: https://www.whonix.org/wiki/Whonix_Debian_Packages If you know what you are doing, feel free to disable this check. Create a file /etc/whonix.d/50_whonixcheck_user.conf and add: whonixcheck_skip_functions+=" check_meta_packages " What does this mean? Only thing i noticed in past couple days is lots of huge updates for the whonix, and one day it was taking a real long time. How do I fix this? Thanks. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/97b29b8d-13b4-4a7d-bee5-09ce3945972a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Install media won't boot
On Thursday, June 2, 2016 at 11:57:43 PM UTC-4, hugh...@gmail.com wrote: > On Wednesday, 25 May 2016 01:56:41 UTC+10, John Messina wrote: > > I created an install USB drive from the 3.1 ISO using Rufus (DD image). I > > have secure boot off and have tried with legacy boot both on and off. At > > the boot menu I've tried "test and install", "install", and "troubleshoot". > > All have the same effect - the boot menu goes away and then immediately > > comes back up. Any ideas what might be preventing the install from > > working? The laptop is an HP with an AMD A6 processor. > > > > > > Thanks in advance! > > > > > > John > > So it turns out the installation media is fine and I can boot from another > computer. Just like John, the machine I want to use doesn't work. > I've made sure it supports vt-x and vt-d and they are set in the bios. I've > already installed the latest xen on this machine so I wonder what the problem > is. > It there a way to see what's going on as I get no display whatsoever? > > Hugh check bios for legacy boot setting which works better with qubes. or check for external drive boot settings somehwere. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/edc1cbfd-3156-4bf6-aec7-9cd939036988%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] WARNING: Whonix Meta Packages Test Result:
On Thursday, June 2, 2016 at 8:23:35 PM UTC-4, Patrick Schleizer wrote: > raahe...@gmail.com: > > Whonix-Gateway detected, but the meta package qubes-whonix-gateway is not > > installed. Did you accidentally uninstall it? > > See also: https://www.whonix.org/wiki/Whonix_Debian_Packages > > If you know what you are doing, feel free to disable this check. Create a > > file /etc/whonix.d/50_whonixcheck_user.conf and add: > > whonixcheck_skip_functions+=" check_meta_packages " > > > > What does this mean? Only thing i noticed in past couple days is lots of > > huge updates for the whonix, and one day it was taking a real long time. > > How do I fix this? > > > > Thanks. > > > > Please follow any 'See also: > https://www.whonix.org/wiki/Whonix_Debian_Packages ' links - they > usually contain explanation for exactly this. > > Also answered here: > > https://forums.whonix.org/t/warning-whonix-meta-packages-test-result > > Cheers, > Patrick So i just did the normal update from qubes manager again for both whonix templates. I rebooted didn't see that message again, but you're saying I'm definitely not properly updated unless I followed all those instruction steps you linked? And So just to be sure reinstalling those two meta packages is not enough, we also have to purge all those obsolete packages, autoremove old packages, and delete obsolete files manually? I just want to clarify before i go and do all that. Thanks, Rich. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/93ab57da-7040-46f5-a100-57203dace46b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Risk on secondhand equipment
On Tuesday, May 31, 2016 at 10:54:42 AM UTC-4, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-05-31 07:39, heqami...@runbox.com wrote: > > Hi, > > > > Do you see any problem while purchase on ebay computers or laptops > > secondhand? > > > > Thanks you > > > > H. > > > > You can find a brief discussion about the pros and cons of buying a > used computer for Qubes in this issue: > > https://github.com/QubesOS/qubes-issues/issues/1771 > > Basically, it depends on your threat model (e.g., how likely you are > to be specifically targeted by an adversary, how much money and effort > your adversary would be willing to expend to tamper with your hardware > before you come into possession of it, and so on). > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJXTaWnAAoJENtN07w5UDAwPboP/jfVrIK8kGO5Pj80UTKlKzyC > Rn370TiybIDH6ZIkY4INQtPF0YezFnMewmneGHg8e0huwK+LB14u8ucINih4mZTk > nos/h75L+r7pJu2q2cvLhMB3QWnIAEkuAOWKhNFHlqHyKxduf5fOYO+H5d1nohm1 > AQ3zFWbDPGs+u+jIm8ZnQEbv/qUM/zOXq5hJW7Yl7gHWPZa9hnW+Aq0hggfFX48I > gdUGnoq7JaoiBSnMcIkLXtFW+B8UUAzHrzz9xIEsFOFlHB8HvgssOU0APPoaTSRm > 9OBQ0TqMwkvaFlgx/ZBGcf60mQbxl9lznryBxwlmDODpy1w5+Hbzg8wC5Vgg1dq2 > IsRafO4sRVg6TEqTkbuROHn+eW9dst3GHNkbJe4h+Xhf3BBV5qG2KLl8Pfkvbwhd > eUsbGvXs5E/Cw40lEb75eaxSe1NggYb+bXaWiOfL3Nd1U6qhf3FvDnEgo1DycD3t > G5cqki8Xk/vIEnu8+sTB5ZHY9o6UG/RpexNRGOVth1D9o3gtYjn2QzlXS2udkm58 > pswc03/ZUItPKzAwSYtNUH/DYH0fOiKF2Z9Gv224iQk0KcFOUc2dbBqqnpON0Jv5 > sH9FRj4BXd+1KSboCN+wA5Pcb2i27LSZSaNCbaXVitYq4XgF0azRIRD/0hgkfzDz > v+SNRXbKdwRm2dWBg1Wv > =zQPV > -END PGP SIGNATURE- or could just be a computer being sold unknowingly with an infection. Or someone could be selling an infected computer to spy on a random person for fun. I guess there is alot of possibilities. I would say its safer to buy new and not refurbished, but there is no guarantee even a retail store is always being honest about that. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/697a94d3-5eab-4b05-b5ca-9e0afe743c92%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: WARNING: Whonix Meta Packages Test Result:
yes I got the warning again. So i'm going to follow those whonix directions step by step which also say to remove uneeded packages so I'll see what happens. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/01a9fcaa-1197-4841-b1be-f4eb2b121279%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Is there a standard procedure to reinstall whonix?
Whonix recently came out with a new updated release that requires some manual steps so its not you. Its happened to all of us. I followed these instructions on one machine. https://www.whonix.org/wiki/Upgrading_Whonix_12_to_Whonix_13 But on on another machine it was so borked i coudln't even update with apt-get. Kept telling me that the firewall wasn't starting or some error, so I ended up reinstalling the same way that Andrew explained. That really is the easiest way. Cheers. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f13bb685-3155-4f70-ae09-04bed6ad6548%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] clarification on usb qubes
On Sunday, June 5, 2016 at 4:07:17 PM UTC-4, Ilpo Järvinen wrote: > On Sun, 5 Jun 2016, Marek Marczykowski-Górecki wrote: > > > On Sat, Jun 04, 2016 at 06:13:45PM -0700, pixel fairy wrote: > > > > > Is it possible to have multiple usb qubes, one > > > for each controller? > > > > Yes, if you have multiple USB controllers. Which is quite rare > > nowadays... > > At least for recent desktop motherboards, that seems slightly incorrect > statement according to my research. Few desktop PCH datasheets I've > looked, indicate that there are two USB controllers (EHCI and XHCI), > however, it seems that typically on a modern MB the ports are > forwarded/routed by default so that they appear under a single controller > due to ease of use reasons (also Linux device driver code forces > forwarding all ports which allow forwarding). XHCI PCI config has XUSB2PR > register that might allow disabling the forwarding for a selected set of > registers. > > I'm yet to test if the forwarding/routing works for real because I lack > such a motherboard (I'll likely get one sooner than later though) but I > see no particular reason why it wouldn't work as documented. Probably > laptop PCH have similar arrangement and I might be able to test that one > soon if I find enough time to play with the usbvm kernel. Another thing > that needs testing, even if routing is configurable, is whether PCHs > really support EHCI and XHCI in different VMs or if there's some > other limiting depency between them. > > I've attached potentially working patch for Linux kernel. The mapping > between PCI register ports might not be consistent though so that the > patch might not exactly do what intented as is (usb3/superspeed port > might unintentionally be routed to EHCI, the docs are unclear on this > point). However, if any USB port would successfully appear as EHCI one > when using a kernel with that patch in usb vm, it is great success in > itself on truly separating the ports. > > At least X99/C612 and some recent Series X PCH datasheets listed the > required register (in case somebody is interested in testing this). > > I suspect that for a secure implementation Xen would need to somehow > arbitrate that PCI register as otherwise the xhci usb VM might be able > to steal the usb ports from the ehci VM. But this is already way beyond > my current level of understanding about Xen and PCI passthrough. > > > -- > >From what i"ve learned when building desktop for qubes and from my own >experience on desktop machines only.Older pc's without usb3, usually >have two controllers. One controller is for the two usb ports next to the ps2 >slot. I always assumed it was for mouse and kb at the slower usb1 speed (ahci) > And all the other usb ports on the 2nd controller(ehci). When building a newer qubes machine i5 1150 board (new for me) I was under the impression I would then get 3 controllers since it had usb3 (xhci) and i saw in the spec sheets it stated ahci, ehci, and xhci. But as Ilpo explained, all the controllers are automatically routed through the xhci controller. Which means that there is only actually a single controller, not 3. In most motherboard bios though you can disable xhci (usb3.0) which means you can use the other two controllers seperately. one for dom0 and one for usbvm. But then you won't get the super usb speeds, they will all be only at high speed (usb2.0). For super speed usb3.0 you can use the mouse proxy in qubes which worked well for me with the system only having a single usb controller on usbvm. But I set it up with a ps2 kb. (you can pick up a cheap usb to ps2 adapter since ps2 kb's are harder to come by. But you will need to use terminal when restarting the sys-usb after an update which is not too noob friendly for people not too computer illiterate. You can use a usb keyboard proxy too in qubes but that is a security risk and might be even more difficult for a nooby to manage. In order to have 3 usb controllers the only board I have found where this might be possible is with a 2011 socket board, and a board that has a bios that gives the ability to manually route the controllers. But who knows how compatible with linux the newer boards are at the moment, might run into other problems since not many people using them yet. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6f1f8379-ae10-4a8c-b527-e5cfb86b6b95%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: adding gresecurity to Qubes
On Friday, June 3, 2016 at 2:39:49 AM UTC-4, xopl...@gmail.com wrote: > Hello I was wondering if Qubes might ever add Gresecurity in the future?I > think adding it would be great since you'll have a hardened kernel It has been discussed before. Alot of it is privilege escalation protections which would be meaningless in qubes. Some of it would be nice. Some people in the mailing list have claimed to got a grsec kernel working if you search it, but it might be more trouble then its actually worth. I kind of believe in the philosophy that nothing is 100%, there is no such thing as completely stopping attacks, if attacker is persistent enough and you continue to use the services you use a computer to enjoy, you will be compromised eventually. There will always be bugs till the end of the time and the best thing to do is just mitigate the damage. For example in qubes the sys-net is assumed untrustworthy but it does its best to separate its exposure from rest of the system. Not sure if you know this, but Brad Spengler, the developer of grsecurity, doesn't even use his own kernels. He prefers to use windows. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f5d32976-bff9-4934-a039-8f8fb95cbeb8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: adding gresecurity to Qubes
He also just had a recent issue with one of his patches that was totally borked and suspect and blocked everyone from the grsec twitter account out of shame. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/622c6e05-36db-49c5-a87a-b049be55e140%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Where to install wireshark?
tcpdump has vulnerabilities doesn't it? you can use apparmor profile for it. then again so does wireshark prolly lol. Then again so does everything. I wouldn't use a program like this in a trusted vm though. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c83fa11a-e428-4e9f-905f-eefd34a5d025%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] clarification on usb qubes
Actually when looking at the manual looks like I'm wrong. "Allows you to determine whether to rout the USB 3.0 ports to the xHCI or EHCI controller before booting to OS, and also provides you with options to manually rout each USB3.0/2.0 port to xHCI or EHCI." Not sure if you will even get two controllers with usb3.0 on? I dunno i'd have to play with it to know. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3af58a27-0a7e-4f3e-9c6f-58363e0e01f5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] clarification on usb qubes
On Tuesday, June 7, 2016 at 4:41:15 AM UTC-4, Ilpo Järvinen wrote: > On Mon, 6 Jun 2016, raahe...@gmail.com wrote: > > > In order to have 3 usb controllers the only board I have found where > > this might be possible is with a 2011 socket board, and a board that > > has a bios that gives the ability to manually route the controllers. > > But who knows how compatible with linux the newer boards are at the > > moment, might run into other problems since not many people using them > > yet. > > Can you point me to some example motherboard? I've looked more than dozen > X99/C612 board manuals recently but I've not come across one so far with > such options. I'd be interested in seeing the bios part of the > motherboard's manual. Or do you refer to Sandybridge/Ivybridge MBs with > the "2011 socket"? If such a board really exists, it would further > reinforce that it may be possible also for the OS to play with > the forwarding (such forwarding forcing code already exists in Linux > XHCI driver anyway, it's just a question if the supported mask has > any/all bits enabled or not). If forwarding can be manipulated > successfully, then superspeed would not need to be disabled to > differentiate the USB ports to different controllers. > > Usually the manuals I've seen list only "legacy USB support", etc. > toggleable options. Although given the naming, I wouldn't be surprised > if some of those more standard bios options could be used to disable the > auto-forwarding. According to my understanding the reason behind > the forwarding is that if OS doesn't have necessary device drivers for > one of the controllers some of the ports wouldn't work, which would be > too confusing to many users. > > > -- > i. Most modern boards give you the option to shut off the usb 3.0. This "usually" means all the usb 3.0 ports will then become 2.0 ports. (and you will get two controllers as i described above) Here is a cheaper 2011 board with the manual routing option, and also an option to just not route to xhci which looks interesting. Gigabyte GA-X99-UD3P LGA 2011 It has intel vt, although it says its disabled by default. Most gigabyte boards have it enabled by default so that would worry me. But might be meaningless. Are you referring to the handoffs when you say forwarding for os without drivers? I always shut all that off never had a problem. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fe5996e6-97d7-4c95-a4cf-3fc80e7b03f1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] clarification on usb qubes
On Tuesday, June 7, 2016 at 12:56:31 PM UTC-4, raah...@gmail.com wrote: > Actually when looking at the manual looks like I'm wrong. > > "Allows you to determine whether to rout the USB 3.0 ports to the xHCI or > EHCI controller > before booting to OS, and also provides you with options to manually rout > each USB3.0/2.0 port to xHCI or EHCI." > > Not sure if you will even get two controllers with usb3.0 on? I dunno i'd > have to play with it to know. Well I can tell you with one of my machines. disabling xhci means I get two ehci controllers. one for the 2 ports by the ps2 port. and one for the rest. So maybe you can route the usb 3.0 ports to the xhci. and then usb2.0 to the ehci and have two, and maybe possibly 3. But I don't have a board like this to test. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/44fc36a6-572a-4733-9698-771bc017b6f4%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Is there a standard procedure to reinstall whonix?
On Tuesday, June 7, 2016 at 1:36:03 AM UTC-4, Achim Patzner wrote: > Am 07.06.2016 um 01:02 schrieb Andrew David Wong: > > > I'm not sure if I understood the proposed two changes > > Steps 1 and 2: If someone starts poking around in sys-whonix, changing > settings arbitrarily and it suddenly fails to work one has to assume > that it isn't secure anymore. So instead of preserving sys-whonix and > anon-whonix they should be deleted and replaced, too. > > > Achim Yep thats how i feel with every anomaly, its why I love qubes. When in doubt, wipe it out! Qubes makes it too easy. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7756fa08-69ef-4fb1-a98c-7ef375276d5d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: DispVM was not starting - solved
On Tuesday, June 7, 2016 at 12:26:40 PM UTC-4, 09381'0239481'093248'109348'109438'019438'01943280 wrote: > Hello, > > suddenly I could not start the Disposal VM. > > I recreated it with the command: > > [joanna@dom0 ~]$ qvm-create-default-dvm > > and now all is fine again. > > https://www.qubes-os.org/doc/dispvm-customization/ > > But why this will happen? > (I thought it always will go back to the initial "snapshot", so no infection > should be persistent? > > Kind Regards It happens to me sometimes when I'm in a browser and it crashes. (like watching porn) And I wonder same thing. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1d384cf9-1707-4650-a381-b15a5a2bbe44%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: DispVM was not starting - solved
On Tuesday, June 7, 2016 at 1:09:53 PM UTC-4, raah...@gmail.com wrote: > On Tuesday, June 7, 2016 at 12:26:40 PM UTC-4, > 09381'0239481'093248'109348'109438'019438'01943280 wrote: > > Hello, > > > > suddenly I could not start the Disposal VM. > > > > I recreated it with the command: > > > > [joanna@dom0 ~]$ qvm-create-default-dvm > > > > and now all is fine again. > > > > https://www.qubes-os.org/doc/dispvm-customization/ > > > > But why this will happen? > > (I thought it always will go back to the initial "snapshot", so no > > infection should be persistent? > > > > Kind Regards > > It happens to me sometimes when I'm in a browser and it crashes. (like > watching porn) And I wonder same thing. It could just be it crashes cause I leave it on one cpu only, and watching many porn videos at the same time. and maybe something about it crashing. I dunnolol -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0de1388e-76b9-42b0-91f3-d5466a67b17c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: DispVM was not starting - solved
I should also state, that this is on a machine i dual boot on, and which doesn't have iommu... curious if that is the case for you too? Its never happened to me on another machine which does have iommu and only boots qubes. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d9ff2a58-62f3-4c73-9b29-1df498209f4a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: DispVM was not starting - solved
Although, seems to have happened to a bunch of people lately, so maybe it had to do with recent updates, the latest qubes, or fedora? Could also be the lesser cpu and ram and hdd speed causing it? Although its happened to me multiple times on said machine. I dunno just throwing ideas out there, I'll stop spamming now. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fb4e7573-c50e-48aa-af86-04ef6d479d36%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: DispVM was not starting - solved
On Tuesday, June 7, 2016 at 1:20:18 PM UTC-4, raah...@gmail.com wrote: > Although, seems to have happened to a bunch of people lately, so maybe it > had to do with recent updates, the latest qubes, or fedora? Could also be > the lesser cpu and ram and hdd speed causing it? Although its happened to me > multiple times on said machine. > > I dunno just throwing ideas out there, I'll stop spamming now. I also just wanna say its only happened to me only when crashing after watching porn. Never any other time. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/51fee679-5ea2-402d-8df8-5216dc7ad3bf%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?
On Wednesday, December 28, 2016 at 12:01:57 AM UTC-5, Vít Šesták wrote: > While I agree Debian is a fair choice in terms of security, I disagree with > your reasoning. The “encryption bypass” is rather a minor vulnerability (i.e. > if attacker has all prerequisities to abuse it, she probably could also > perform another attacks) and I don't believe that this is statistically > significant. On the other hand, there are also some Debian-specific > vulnerabilities. For example, recent APT vulnerability or not-so-recent > vulnerable SSH keys due to some Debian-specific tuning. This does not suggest > that Debian is less secure, this suggests it is not so clear. > > Regards, > Vít Šesták 'v6ak' There are alot of reasons why I feel Fedora and Debian are the two most secure mainstream linux distros. But thats not saying much at all, its why we use Qubes. Linux sucks imo and is no better then windows. Especially when using popular distros. These are just my personal opinions I might be living in a bubble. Yes, I was also trying to point out the choice of security between the two is not so clear.. But when it comes to the things that puts fedora up there like a default firewall or selinux , They don't matter for a Qubes dom0. But I think if hardware support is priority, fedora always optimized for a newer kernel and newer driver support and having newer software would be more ideal. If stability, then debian. Things like holding enter button down to bypass luks, or holding backspace down to bypass grub, or using siri and hitting pad a couple times to bypass ios phone lock(ion every single version). whether needing physical access or not, sure does make me wonder if they are not there on purpose. Like for police purposes. I've always felt the people behind ubuntu or fedora are not as trustworthy when it comes to privacy if not security then a distro like debian. I'm sure everyone knows all the common reasons why, so no need to list them all, but things like NSA, Search redirections, corporate greed, unknown network connections, services phoning home, etc always come up... When using a baremetal system I prefer debian system because I feel by default it gives more protection from itself then fedora will protect you from fedora. That includes both backdoors and stability. And if you want a conspiracy theory I think Russia has been undermining fedora especially starting with fedora 20. I have also felt every hardened fedora box I have ever owned has been hacked or maliciously destroyed. Every single one. Its never happened with a hardened debian, or even with a hardened windows 7. But again in this case for a Qubes dom0 I don't think it really matters. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/876ac1cb-9f9e-4aaa-b746-d0a464d3f280%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?
On Sunday, January 1, 2017 at 12:08:54 PM UTC-5, Jeremy Rand wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > pixel fairy: > > On Tuesday, October 1, 2013 at 6:32:41 PM UTC-7, ears...@gmail.com > > wrote: > >> We all know Fedora is a big name, but is it a good choice for a > >> Security Driven OS like QubeOS to be based around? What do others > >> here think? > > > > There are a lot of packages creating a bigger attack surface. but, > > bigger distros like fedora have companies behind them like red hat. > > red hat has been pretty good about actively looking for > > vulnerabilities in those packages. distros that automatically > > upgrade to the latest version (gentoo etc) can also burn you. they > > would make better template vms where your more likely to want newer > > software and new issues can be better contained. > > > > for dom0, newer distros are better at hardware compatibility with > > those fancy new processors, graphics cards and storage controllers > > in laptops. > > > > just personal opinion, but wayland is a better fit than x11 for > > qubes in the long run. fedora is the only distro with a dedicated > > security staff actively supporting it. > > > > anytime you abstract a layer, your diluting your resources. > > maintaining a dom0 isnt much more work than a domu template, but if > > you want to add slackware, arch, and gentoo, youve now more than > > doubled the developers distro maintanance work when they could be > > working on stability and features. > > Potentially worth noting here that in Ed Snowden's keynote at > Libreplanet 2016, he criticized the free software community's tendency > to use stable, outdated software. Snowden said that the attackers > move and adapt quickly, and it's dangerous to continue using outdated > software that doesn't have the latest security fixes/features just > because it's more stable or more backward-compatible. Snowden did not > explicitly mention any distros that he was talking about, but I got > the distinct impression that he was (at least in part) talking about > Debian. > > Of course, "appeal to authority" is a classic fallacy, so we shouldn't > do what Snowden says without questioning it, but I think it's at least > worth considering his argument seriously. > > Cheers, > - -Jeremy > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJYaTeQAAoJELPy0WV4bWVwbNgP+QG3jY+xlwsTnViOS+IFEHMP > Nyt+d9Cuq7iEnCsr1fuXbzjSNB8RDM0y2BY6rciELmo4kvyfsGoPYZod7nOlQPeV > xjgjubrlA3udMxSCsc5lc2DbP4IszehJECYGbZw4gaFabScs6ugt0P9gxKaiTIWR > pa9bAaSzJffZsJg9/efUJuo134Mdd8QBssKEC6idWCiEuM8YWHZI9xKfvhTjRrqj > g233nSNbvctg0yoUQbf2XHZ6gyGZ2p0Y1ab8o0o0MFVsuQIuPCKlWgr/WhjgdWDY > Ye4TCYZhonuLHRCiOt+ZuS2w8nj24O0qFvXra+asXAaW2mFzQa/Aq3CdLBE87nXE > z3dgNp2Z08dWi28ncbCwvn8mpw0w07yl1n6+2JlBC4pDTF2/r6BMgsp4DIS9sFDB > h+mFWCnqh80P/39SQeOoOcHATruMfHp8CUDVtOMVBRV4VpoA7YaKxiiiUXFnD21M > S6XP7QqxPkbPW0E77UeR53igB61QQ1t3Fb4QQRLZY1bhncKn3kM/OmUDnHzepLQn > 0/FLW/aJMBofOHeb6xqrfipeayGrdHLNuav9Nu1QRuX2lY6E0Sl40VZBwRERxfaW > t+Ck3n4Qw2Gru13zXPhHuE8OpTV3/RgkMzNMnADxfArhSIW2zwoYQvNCn8U/LNaq > P2HMZA0yehx6CZnBmdb/ > =RC2L > -END PGP SIGNATURE- I disagree with Snowden on this, if it aint broke don't fix it. What usually happens in reality is the newer software introduces even more bugs then were originally there imo for the sake of new shiny things. Many experts say we are actually less safe nowadays cause systems are already too complex.And if new exploits found in old software are patched with security updates then I think the freesoftware communities have it right when it comes to security. If he means old software thats no longer maintained and abandoned then he has a good point. There is plenty of that in every linux distro, some more then others. But saying attackers adapt quick, means to me adapting to something new, adapting to a new exploit, not a secret one they've already known about. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/faa57a13-6bae-4007-b311-5c89d7989718%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?
On Wednesday, January 4, 2017 at 7:37:42 PM UTC-5, raah...@gmail.com wrote: > On Sunday, January 1, 2017 at 12:08:54 PM UTC-5, Jeremy Rand wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > pixel fairy: > > > On Tuesday, October 1, 2013 at 6:32:41 PM UTC-7, ears...@gmail.com > > > wrote: > > >> We all know Fedora is a big name, but is it a good choice for a > > >> Security Driven OS like QubeOS to be based around? What do others > > >> here think? > > > > > > There are a lot of packages creating a bigger attack surface. but, > > > bigger distros like fedora have companies behind them like red hat. > > > red hat has been pretty good about actively looking for > > > vulnerabilities in those packages. distros that automatically > > > upgrade to the latest version (gentoo etc) can also burn you. they > > > would make better template vms where your more likely to want newer > > > software and new issues can be better contained. > > > > > > for dom0, newer distros are better at hardware compatibility with > > > those fancy new processors, graphics cards and storage controllers > > > in laptops. > > > > > > just personal opinion, but wayland is a better fit than x11 for > > > qubes in the long run. fedora is the only distro with a dedicated > > > security staff actively supporting it. > > > > > > anytime you abstract a layer, your diluting your resources. > > > maintaining a dom0 isnt much more work than a domu template, but if > > > you want to add slackware, arch, and gentoo, youve now more than > > > doubled the developers distro maintanance work when they could be > > > working on stability and features. > > > > Potentially worth noting here that in Ed Snowden's keynote at > > Libreplanet 2016, he criticized the free software community's tendency > > to use stable, outdated software. Snowden said that the attackers > > move and adapt quickly, and it's dangerous to continue using outdated > > software that doesn't have the latest security fixes/features just > > because it's more stable or more backward-compatible. Snowden did not > > explicitly mention any distros that he was talking about, but I got > > the distinct impression that he was (at least in part) talking about > > Debian. > > > > Of course, "appeal to authority" is a classic fallacy, so we shouldn't > > do what Snowden says without questioning it, but I think it's at least > > worth considering his argument seriously. > > > > Cheers, > > - -Jeremy > > -BEGIN PGP SIGNATURE- > > > > iQIcBAEBCgAGBQJYaTeQAAoJELPy0WV4bWVwbNgP+QG3jY+xlwsTnViOS+IFEHMP > > Nyt+d9Cuq7iEnCsr1fuXbzjSNB8RDM0y2BY6rciELmo4kvyfsGoPYZod7nOlQPeV > > xjgjubrlA3udMxSCsc5lc2DbP4IszehJECYGbZw4gaFabScs6ugt0P9gxKaiTIWR > > pa9bAaSzJffZsJg9/efUJuo134Mdd8QBssKEC6idWCiEuM8YWHZI9xKfvhTjRrqj > > g233nSNbvctg0yoUQbf2XHZ6gyGZ2p0Y1ab8o0o0MFVsuQIuPCKlWgr/WhjgdWDY > > Ye4TCYZhonuLHRCiOt+ZuS2w8nj24O0qFvXra+asXAaW2mFzQa/Aq3CdLBE87nXE > > z3dgNp2Z08dWi28ncbCwvn8mpw0w07yl1n6+2JlBC4pDTF2/r6BMgsp4DIS9sFDB > > h+mFWCnqh80P/39SQeOoOcHATruMfHp8CUDVtOMVBRV4VpoA7YaKxiiiUXFnD21M > > S6XP7QqxPkbPW0E77UeR53igB61QQ1t3Fb4QQRLZY1bhncKn3kM/OmUDnHzepLQn > > 0/FLW/aJMBofOHeb6xqrfipeayGrdHLNuav9Nu1QRuX2lY6E0Sl40VZBwRERxfaW > > t+Ck3n4Qw2Gru13zXPhHuE8OpTV3/RgkMzNMnADxfArhSIW2zwoYQvNCn8U/LNaq > > P2HMZA0yehx6CZnBmdb/ > > =RC2L > > -END PGP SIGNATURE- > > I disagree with Snowden on this, if it aint broke don't fix it. What > usually happens in reality is the newer software introduces even more bugs > then were originally there imo for the sake of new shiny things. Many > experts say we are actually less safe nowadays cause systems are already too > complex.And if new exploits found in old software are patched with > security updates then I think the freesoftware communities have it right when > it comes to security. > > If he means old software thats no longer maintained and abandoned then he has > a good point. There is plenty of that in every linux distro, some more then > others. > > But saying attackers adapt quick, means to me adapting to something new, > adapting to a new exploit, not a secret one they've already known about. I use to believe that always updating software would remove exploits currently in them. But usually in reality if not specifically addressed, since new software is still built upon the same old software, the old bugs still exist while new ones are now introduced as well. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e9374a34-a97f-41bd-b46c-d0aabf4ba8cd%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Trouble reading data CD under Qubes
On Saturday, December 31, 2016 at 7:06:46 AM UTC-5, Pawel Debski wrote: > W dniu niedziela, 4 grudnia 2016 00:48:36 UTC+1 użytkownik Marek > Marczykowski-Górecki napisał: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On Sat, Dec 03, 2016 at 03:21:48AM -0800, Pawel Debski wrote: > > > Folks, > > > > > > I have a PC with two SATA controllers: primary master holds my SDD with > > > Qubes, while secondary master has CD drive attached. > > > > > > When I insert a data CD it gets mounted by dom0 and the files are > > > accessible. I do not want to open these files in dom0 however. So in the > > > VM Manager I right click my favourite perssonal-full-sw appVM that I > > > created previously and select: > > > > > > Attach/detach block devices -> Attach dom0:sr0 > > > > > > and nothing happens. > > > > > > Even more: CD content is still visible in dom0 and /dev/sr0 is still > > > mounted in /run/media/pdebski/CDTITLE > > > > > > How can I better diagnose the problem? > > > > I think the problem is you have it mounted in dom0. If unmount it there, > > it should just work. > > > > - -- > > Best Regards, > > Marek Marczykowski-Górecki > > Invisible Things Lab > > A: Because it messes up the order in which people normally read text. > > Q: Why is top-posting such a bad thing? > > -BEGIN PGP SIGNATURE- > > Version: GnuPG v2 > > > > iQEcBAEBCAAGBQJYQ1nPAAoJENuP0xzK19cs7dkH/3tixTrrQAaozHR6A+J3Z/wX > > wqheJcIwYdGYxGYd4wKC2breqED7tuVertg771ZhwJsN+YOshLiPywfY13Xj52cV > > Yfr3JYLkSFyhuE8PSQjQm5Zzovhm/PNOoMuBBsVm2l/afTv66iDedxpoisEGk2PO > > fc38ZaCVy5eXtE8cWuIqIUDXoVelD2Qlr2rxIBbewykCFqK0DgcxTUkh2qwrBlF3 > > 7O1K1+hOmYkKFaOoM0lUoRuBUeG6Lh0hm+hHk0KlJuEW1uPzV/6SfWgZO2bu13UR > > 6x5LiXSMIxLzLnGyzzx0uMVhOAuWoNJeVPwm4AEi5AIsXyTek+LyU8F4WZVbF/k= > > =/m+X > > -END PGP SIGNATURE- > > How do I check whether it is really mounted in dom0? > (I think it is not, but maybe I'm doing something wrong notification bubble should pop up on the screen. I think its usually sr0 or something. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ff85ea9e-ab9d-44fe-87f6-640983689781%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: NetworkManager disconnecting WiFi upon dom0 update, also disconnects every 2-5min
On Friday, December 30, 2016 at 5:20:18 PM UTC-5, anoa wrote: > Hi all, > > I've been dealing with a rather frustrating problem lately. Since the > past week or so, my sys-net VM which is based on Fedora-24 has been > disconnecting from WiFi every 2-5min. I'm not entirely sure what causes > it but I've now found a way to reproduce it reliably. > > Whenever I update dom0 with `sudo qubes-dom0-update`, the WiFi on the > sys-net nm-applet immediately shows that it's been disconnected, even > though the update itself is running on sys-firewall. After switching > sys-firewall to debian-8 and running the update I get the same issue. I > cannot seem to find the correct driver for my WiFi card on debian (Intel > Corporation Wireless 7260 rev bb), so switching that VM to debian is not > an option. > > Here are the relevant journalctl and dmesg outputs for both sys-net and > sys-firewall: > > journalctl > sys-firewall: http://ix.io/1OJO > sys-net: http://ix.io/1OJP > > dmesg > sys-firewall: http://ix.io/1OJR > sys-net: http://ix.io/1OJQ > > Any ideas why the update in dom0 may be causing sys-net to lose > connection, or it losing connection every 2-5 minutes? > > Thanks > anoa maybe you should try a diff kernel? Have you tried deleting the sys-net and sys-firewall and recreating them? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6a260951-bef4-4246-b776-2bafa6536a90%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Wifi Issues Atheros QCA9377
On Tuesday, January 3, 2017 at 10:09:22 PM UTC-5, wes@gmail.com wrote: > Hello Qubes World. > > I have spent the better part of 5-6 hours trying to figure out why my > wifi will not show up in sys-net, it has never worked. I have read through > every forum/post I could find and wasn't able to figure out the exact issue. > I feel as if this is my last resort, I have to travel in a few weeks and if I > can't get it working I'll have to abandon my 3 week qubes exerience. I'll > provide as much information as possible to aid in troubleshooting. Appreciate > any help given, thanks. > > Laptop: Acer Aspire E 15 E5-575G-76YK > > When I first start sys-net I typically have to kill it a couple times > before it will even recognize my ethernet..what a pain. As for the Wifi I run > dmesg and dont see any errors regarding that the device has failedbut i'm > not really sure what to look for... I will post the output below ...can't > figure out how to make a link to it yet so sorry for the expanded output. > I've attempted to manually add the Wifi SSID and crap through the Network > Manager and that didn't work either. It appears that it just isn't loading > when sys-net starts up even though I've added the device in the devices tab. > A lot of the ubuntu forums say to install "linux-headers-generic" and > "build-essential" but those aren't listed in the repo > > The output of lspci shows the wireless adapter but one thing that I noticed > is that it doesn't say "Kernel driver in use" like the others say (part of > the problem?) > > 00:00.0 Network controller [0280]: Qualcomm Atheros QCA9377 802.11ac Wireless > Network Adapter [168c:0042] (rev 30) > Subsystem: Lite-On Communications Inc Device [11ad:0806] > Kernel modules: ath10k_pci > > The drivers are installed as listed in /lib/firmware/ath10k/QCA9377/hw1.0 > > sudo modprobe -D ath10k_pci > > insmod /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/net/rfkill/rfkill.ko > insmod /lib/modules/ > 4.4.31-11.pvops.qubes.x86_64/kernel/net/wireless/cfg80211.ko > insmod > /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/net/mac80211/mac80211.ko > insmod/lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath.ko > > insmod > /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath10k/ath10k_core.ko > > insmod > /lib/modules/4.4.31-11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath10k/ath10k_pci.ko > > > > Current linux firmware is 20160923-68.git42ad5367.fc24.noarch > > When I run the command "nmcli g" it shows the wifi enabled and wwan enabled. > > STATE CONNECTIVITY WIFI-HW WIFI WWAN-HW WWAN > connected full enabled enabled enabled enabled > > ifconfig output: > enp0s1f1: flags=4163 mtu 1500 > inet 192.168.1.60 netmask 255.255.255.0 broadcast 192.168.1.255 > inet6 fe80::b353:2725:5528:1f78 prefixlen 64 scopeid 0x20 > ether 54:ab:3a:81:38:24 txqueuelen 1000 (Ethernet) > RX packets 25634 bytes 32481540 (30.9 MiB) > RX errors 0 dropped 0 overruns 0 frame 0 > TX packets 13396 bytes 1586775 (1.5 MiB) > TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 > > lo: flags=73 mtu 65536 > inet 127.0.0.1 netmask 255.0.0.0 > inet6 ::1 prefixlen 128 scopeid 0x10 > loop txqueuelen 1 (Local Loopback) > RX packets 84 bytes 8028 (7.8 KiB) > RX errors 0 dropped 0 overruns 0 frame 0 > TX packets 84 bytes 8028 (7.8 KiB) > TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 > > vif5.0: flags=4163 mtu 1500 > inet 10.137.1.1 netmask 255.255.255.255 broadcast 0.0.0.0 > inet6 fe80::fcff::feff: prefixlen 64 scopeid 0x20 > ether fe:ff:ff:ff:ff:ff txqueuelen 32 (Ethernet) > RX packets 13246 bytes 1385694 (1.3 MiB) > RX errors 0 dropped 0 overruns 0 frame 0 > TX packets 24267 bytes 32251590 (30.7 MiB) > TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 > > > I've attempted to install the kvalo ath10k firmware listed on github but it > did no good. md5sums of the files were the same as what I had anyways > > modinfo ath10k_pci produces the following output > > filename: /lib/modules/4.4.31- > 11.pvops.qubes.x86_64/kernel/drivers/net/wireless/ath/ath10k/ ath10k_pci.ko > firmware: ath10k/QCA9377/hw1.0/board.bin > firmware: ath10k/QCA9377/hw1.0/firmware-5.bin > firmware: ath10k/QCA6174/hw3.0/board-2.bin > firmware: ath10k/QCA6174/hw3.0/board.bin > firmware: ath10k/QCA6174/hw3.0/firmware-5.bin > firmware: ath10k/QCA6174/hw3.0/firmware-4.bin > firmware: ath10k/QCA6174/hw2.1/board-2.bin > firmware: ath10k/QCA6174/hw2.1/board.bin > firmware: ath10k/QCA6174/hw2.1/firmware-5.bin > firmware: ath10k/QCA6
[qubes-users] Re: Gaming on Qubes OS?
On Thursday, January 5, 2017 at 5:44:30 PM UTC-5, stevenwi...@gmail.com wrote: > Is it actually possible to game on Linux like on Windows 7 and up or is there > any special requirement neccessary for this? > > And would passing through a GPU via devices tab in VM settings actually be > enough? yes it is possible to game on linux. I game on steam on a barebones debian system. cs:go and dota2 are some supported games. Some games are playable with play onlinux scripts using wine.But in Qubes-os vms do not have 3d graphics rendering, so you can't really game in qubes. It might be possible to pasthrough your gpu to a vm, but this is not officially supported and not too many people have been sucessful. On another note and imo, playing online games defeats any security you have every time. There is no such thing as security on your machine if gaming online. Especially when your gpu gets infected. Gaming online is where most cyber criminals get started. They are the most hacked networks. It is where Edward Snowden learned to hack people, Sabu, Kim Dotcom was notorious in q2. Online gaming communities, where only hackers are left playing, are as dangerous as irc or the dark web. They don't just want to ragequite you ddos the game offline and steal your credit cards, they want to destroy your hardware. Especially if you are not one of them (Russian) Some argue if you have a separate gpu that is isolated from dom0 and only loads in a vm then maybe this would be safe. But I still have my doubts. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e574032a-b1e8-40fa-9e16-a0949d16a3fb%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Trouble reading data CD under Qubes
On Thursday, January 5, 2017 at 5:49:35 AM UTC-5, Pawel Debski wrote: > How do I check whether it is really mounted in dom0? > (I think it is not, but maybe I'm doing something wrong > > > notification bubble should pop up on the screen. I think its usually sr0 > or something. > > What would be the right command in Konsole? > > > > > > > > > > > Z powazaniem / Best Regards > > Mit freundlichen Gruessen / Meilleures salutations > > Pawel Debski hmm fdisk? blkid? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/03f00ee6-5643-45e6-8d22-0ca52d4e71ae%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Odd failure when trying to use Asus WL-167G with Qubes (both Fedora and Debian 8 VMs). Help :(
On Tuesday, December 27, 2016 at 7:11:09 PM UTC-5, alefo...@gmail.com wrote: > On Wednesday, December 28, 2016 at 2:52:28 AM UTC+3, alefo...@gmail.com wrote: > > Steps to reproduce: > > 1) have WL-167G > > 2) have a separate USB controller (aside from the one mouse and keyboard > > are set to) > > 3) create a VM (we'll use a Debian 8 one, fedora has exactly same bug, at > > least 23rd one), make it a network VM (it'll be using a wifi usb dongle > > after all) > > 4) forward the USB controller to the VM > > 5) connect WL-167G to the usb port > > 6) install drivers in the VM (sudo apt-get install firmware-realtek) > > 7) restart VM > > 8) enjoy internet for a brief time (connects okay) > > 9) start a long download such as Qubes fedora 24 ( sudo qubes-dom0-update > > qubes-template-fedora-24) > > 10) about 10 minutes in, connection permanently dies, and stays dead until > > VM reboot. Dmesg does not have any new messages after connection death, and > > neither does sudo journalctl -u NetworkManager > > > > Please help. I don't have any other wifi dongles and won't have for a > > while, plus now I'm really really worried they will fail like this too. > > Oh, and the adapter is the v3 version, supposedly well-supported by Qubes I have an issue like this sometimes on an old lappy wifi. Not sure what causes it, but maybe a problem with the kernel. see if you reloading the module helps instead of rebooting. thats what I have to do. but I can go weeks without it happening before it happens. Making think something happens in the air. but might have to make a bug report to fedora or debian. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/30439cce-4484-4d3c-ad3c-cc924f37e055%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: [FAILED] Failed to start Load Kernel Modules
On Tuesday, December 27, 2016 at 6:12:57 PM UTC-5, Patrick Bouldin wrote: > On Thursday, November 3, 2016 at 4:15:08 PM UTC-4, Douglas Harding wrote: > > I have reinstalled 4 times. Every time it was from a fresh install. > > > > A red "FAILED" pops up stating `[FAILED] Failed to start Load Kernel > > Modules` > > > > Then I get failed messages at the bottom: > > > > `nouveau :01:00.0: gr: failed to load fecs_inst` > > `nouveau :01:00.0: DRM: Pointer to flat panel table invalid` > > > > then it freezes so I have to do a hard reset. > > > > The only issue I could think of (because nouveau) is that it's my graphics > > card, as nVidia has issues. However, when attempting to use the guide on > > the official Qubes website -- I do not have the ability to click > > `“failsafe” boot menu`as the only thing that shows up is: > > > > `Qubes, with Xen hypervisor` > > `Advanced Options for Qubes (with Xen hypervisor)` > > > > When I follow "Advanced" I don't have options... However, [FAILED] is no > > longer red, it's just grey. > > > > > > -- > > What I have tried: > > > > * reinstall several times > > * make sure VT-D is enabled > > * I hit "e" to do a temp edit the grub, added "failsafe" after "quiet boot" > > * I'm unable to access any logs, command sends me to the grub command > > prompt. > > * unplugging all but 1 monitor > > > > - > > Specs: > > > > CPU: i5-4570k > > GPU: GTX 970 > > RAM: 24GB (well over the min. requirements) > > SSD: 240GB (plenty of space) > > > > > > Can anyone offer assistance on this? Qubes has been my favorite distro to > > use out of the several I had been testing over the last few months. > > > > Thank you for your time, > > Douglas Harding > > Hi, > > I've been getting this message ever since loading 3.2 from scratch. It > doesn't appear to have any effect though. > > Does anyone know the implication of this? Should I fix? > > Thanks, > Patrick > Dallas I believe its harmeless. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/4bad5e26-0979-4eb1-813b-7acef79c18ec%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Gaming on Qubes OS?
On Thursday, January 5, 2017 at 7:12:09 PM UTC-5, stevenwi...@gmail.com wrote: > Im more talking about a Windows VM here. Is it enough to pass through a GPU > in the devices tab of the settings or is there anything else that should be > done? > > And how would it be performance-wise overall? > > Especially with Windows 8+ cause theres no official Qubes Tools Support there. I've had no success passing through a pci device to a windows hvm. But it give it a shot and try. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d70db341-b733-4602-b364-1b57df2bcb50%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] notify about updates of cloned template
On Saturday, January 7, 2017 at 9:34:48 AM UTC-5, Eva Star wrote: > On 12/29/2016 07:17 AM, Andrew David Wong wrote: > > > > > Update checks are typically run in VMs based on the template, so if > > you haven't had any VMs running based on that template that can reach > > update repos, that's probably why. > > > After you message I run AppVm made from this clone template, and > nothing. Updates still does not check automatically.. > > > > -- > Regards does it have network access and using the sys-firewall? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ae017169-3f6d-4f1f-a730-89d6bc8d8b5b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: After installing Libre apps can't get them on a shortcut
On Friday, January 6, 2017 at 7:57:49 PM UTC-5, Patrick Bouldin wrote: > On Friday, January 6, 2017 at 7:40:51 PM UTC-5, Patrick Bouldin wrote: > > Hello, > > > > I've added apps to the template before, and then on the app vm I could then > > create a shortcut. I installed all the Libre apps on the template. I then > > go to the app vm and they are there, but they don't show up on the "add > > shortcut" menu. > > > > Any clue? > > > > Thanks, > > Patrick > > PS - I see the following to add shortcuts to app that didn't make them > available: https://www.qubes-os.org/doc/signal/ > > But I still confused with step 1. Am I even on the right track? What shortcut > has been created in step 1 of the Signal example? How did he "get" the > shortcut? > Patrick yes if you mean that the programs are not showing as available to add to the vm shortcust list, then yes qvm-sync-appmenus templatename should work. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8c2d59ce-301a-4b67-88d7-afc03e8d5729%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Bug - Qubes fails to boot if a USB Audio device is connected to the PC
On Sunday, January 8, 2017 at 12:14:17 PM UTC-5, Grzesiek Chodzicki wrote: > W dniu niedziela, 8 stycznia 2017 18:03:47 UTC+1 użytkownik Andrew David Wong > napisał: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > On 2017-01-08 08:30, Grzesiek Chodzicki wrote: > > > I know that this sounds rather bizarre, but my Qubes instance > > > consistently gets stuck after GRUB menu if a USB Audio device is > > > connected to the computer. So far I have a 3/3 repro rate on that. > > > What type of logs/information should I gather from my machine in > > > order to troubleshoot that? XL dmesg does print a RMRR warning > > > about USB controllers > > > > > > Qubes 3.2 Kernel 4.8.12-12 I use a sys-usb AppVM with all > > > controllers hidden from Dom0. > > > > > > > Is your sys-usb set to autostart? If so, try disabling that to see > > whether the system can boot. > > > > - -- > > Andrew David Wong (Axon) > > Community Manager, Qubes OS > > https://www.qubes-os.org > > -BEGIN PGP SIGNATURE- > > > > iQIcBAEBCgAGBQJYcnDpAAoJENtN07w5UDAw8NcP/iQTveiRfsgdJbeweJC84k6V > > d3UdLc8i7OrFuh4Cya0opcH341OKvCid4Rv3jIVAhRhE+TSVgobKQkXXEEE9UO8u > > 8l2ugFuUg3gYUv//WIJUmCNZXRXTTT7Tk7JFjXXhyKUjrkD1B9oAhlVPcK3UaUiQ > > 2lkAgMWVPDpo9mJMoc4GaQlWZX9sDwJ14M75lMa0lPtbN93nmFOOiye6FNIQ20bH > > pmbuu6bfyI1w53bVMA84HZIXs1msvXfLLO2CaVksntEk8TaiO/MBM8wmXYA9IQrF > > I3yxsAVm6pjqlkAIABTkGzM6wOrUeHQjgqTewvmQYO+ch5K00r/Jy2/zZwmNYOOx > > p/qHn0q82GcITe73xDTD2vp6QILkqV3VCeFBPc9JzqrFYYRONtPr3vDyD48EJ2Nb > > ButtRJXAxqe6QIkfWs614tfZYWzHMgOVSHokiGnoHMIG5OfU8jDD+ywwzLGyt+2Y > > QZsAL7dKVxxfEybAFIacumC0HyAIJWtbZDcfl6mnP3qmrGbIo8PebzwpOGCkDMFu > > NS4aC+dmqJQSqfl2yufNYbr+2eZGoPmhE206qfIL0KBM3Cch8M2RytEXHjyBCH4s > > u5SGaOALrvlM5zWADoTWyhd6PEg9EWEHkl9vo2MkFYq90o7/VIzWQBX15H5uCsYJ > > wIyI9Itq6I/JD32gR2i0 > > =lqgz > > -END PGP SIGNATURE- > > Hello Andrew, > > The issue still occurs after disabling autostart of the sys-usb AppVM. Did you make sure you followed these directions? https://www.qubes-os.org/doc/external-audio/ what type of bios boot are you using? Try legacy boot.How much ram does your system have? What if you just remove the sys-usb and try booting qubes without it while device is attached? Did you create it manually? After removing the sys-usb vm then rebooting and seeing if qubes boots with the usb attached. Then recreate sys-usb using qubes commands qubesctl top.enable qvm.sys-usb qubesctl state.highstate and repeat audio device instructions. Try disabling vt-d to identify the bios iommu as possibly the problem. Doublecheck bios options. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f8d244fe-8900-4b55-a379-b5e083dd043b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How i can play video?
On Wednesday, January 11, 2017 at 9:07:30 AM UTC-5, Repairing wrote: > Still trying to figure out Qubes, > > > > When i open movies with "videos application", i get: > > > > AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) decoder are > required to play the file, but are not installed. > > > > > I also tried: > > > > Banshee > > Parole > > Snappy > > > > But there's just black background with them. > > > > Your time is much appreciated. Use VLC media player. and just make sure to change video output settings to x11. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c22989a6-effc-46ea-843a-12d41167ff3e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Fedora "/tmp"
I've had to increase this on past fedora qubes vms so long videos wouldn't time out. Never had an issue with debian though. And I haven't had the issue on fresh system with the latest fedora. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/be8763fa-4836-411a-9c91-802260b97cd8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can NOT get Broadcom BCM43602 Wifi Card working , DELL XPS 15 9950- Qubes sys-net freezes/ crashes
On Tuesday, January 10, 2017 at 6:42:51 PM UTC-5, tai...@gmx.com wrote: > On 01/10/2017 06:28 PM, solved1 wrote: > > > I had the same problem the easiest thing is to replace the broadcom wifi > > card. > > its really simple to do that. > > > > order yourself an Intel Wifi card like me. costs around 45 USD > > it will work without doing anything once you replaced the broadcom card no > > need > > to type in any commands. > > > Intel wi-fi requires binary blobs which are a black box and will stop > working eventually. > > Get yourself one with a realtek or atheros chipset that doesn't require > blobs such as A5K or A9K series, they will cost less than an intel > chipset as well. You can check this list if you want to make sure it libre. https://h-node.org/wifi/catalogue/en/1/1/undef/undef/yes? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2d5baff8-43e1-44be-9047-45fd9e8f6225%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Domains Have Internet But Templates No
On Wednesday, January 11, 2017 at 12:38:00 PM UTC-5, Repairing wrote: > There's no problem to connect to the internet with domains: > > anon-whonix > > personal > > untrusted > > > > But i need to connect through templates: > > fedora > > debian > > > > There's no connection, white blank screen when i use firefox, how i can > connect to the firefox with templates? why do you need to use firefox in the template? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/aa5578ef-6f63-4ea2-9262-048fd286afd8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: What's your DispVM high score?
On Wednesday, January 11, 2017 at 3:21:40 PM UTC-5, Andrew wrote: > Today I impressed myself when the DispVM I launched was "disp52" (in ~1 > week of uptime). /pats self on back > > What's your highest DispVM number you've accomplished through legitimate > daily use? > > (This is purely for fun. Don't let meaningless numbers get in the way > of updates!) > > Andrew when I bought my psu for the pc I built for qubes the salesman thought I was building a nas, but I shut my pc off every night...lol i think disp7 is highest I've gone only. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6363108c-86fa-431e-896b-c885deb4b9ef%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Bad GPG sig on R3.2 release
worked for me gpg -v --verify Qubes-R3.2-x86_64.iso.DIGESTS gpg: armor header: Hash: SHA256 gpg: armor header: Version: GnuPG v2 gpg: original file name='' gpg: Signature made Tue 20 Sep 2016 01:37:03 PM EDT using RSA key ID 03FA5082 gpg: using PGP trust model gpg: Good signature from "Qubes OS Release 3 Signing Key" gpg: textmode signature, digest algorithm SHA256 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d39bdfb3-c605-4876-9fa5-32a46f666987%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How i can play video?
On Wednesday, January 11, 2017 at 4:14:07 PM UTC-5, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 01/11/17 07:14, Unman wrote: > > On Wed, Jan 11, 2017 at 09:07:17AM -0500, 'Repairing' via qubes-users wrote: > >> Still trying to figure out Qubes, > >> > >> When i open movies with "videos application", i get: > >> > >> AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) decoder > >> are required to play the file, but are not installed. > >> > >> > >> I also tried: > >> > >> Banshee > >> Parole > >> Snappy > >> > >> But there's just black background with them. > >> > >> Your time is much appreciated. > >> > > > > This comes up so often it should be a FAQ. > > Added: https://www.qubes-os.org/doc/user-faq/#how-do-i-play-video-files > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJYdp//AAoJENtN07w5UDAwGGwQALIFTo6zJ4s/uyAb4NZyhwTO > eLqQtyylHJF73t0F7NW7Rw+Y/dFDqX5tV/7T+I/is2ok9sEhxf0yTyeqSzfuUA0P > SNKqh0yD4MSfKQ6N7JFQpA55UBrKUp3uC6/2kpq3WK8xoerXC4zNPSwHC/nIMGzN > 6mqlVromWRlWd7x+9kpDdlgEnNQxD+BzNL/a9xKdJy1FTx2oYGZBfs1cMaUlzRz3 > /AemPcTrmp0cYCGxY9p5LMsubtA2OGDsRbiWm70RunpYbWDHC+KuvtbJ+HHOT8FI > l6HcUNrGehTrcNfD2pxq8SFcpbXorS3qlUQWQ3Xypy9dKLUg2Du0mSROP3q5GEgf > s8RpprIhk49txImZLM+FsnijXoDesQnd1QX3qbJ2WvWRLwzeWp6YuegSSvF5djM+ > YMsRQJBd50JhfMrQKUspAbQGAhw/9DyDyrP5zCRTRD4pxEiWH/5Qtv6tIspea5i7 > ORQR69ASC8aqzuvvm9xTWoxctqPo2w/Rso78+PUsu/t8IuuGEZA2gAN8Zg4zRRYQ > 5Q4XxHeRh4jgEEhkvDLg13cqvtOE7lBr9Cgw3YdbpBcCEJEjf7qboApfoXr8NZcw > pSOHzqNOxCUUNnyIrHVI3g3hJZD1vPcaJB5VexIS6tmdhcUgKa2qnKc1KCJVvRNS > W7mO8rQkjRpAfyO2Qxif > =f8Yo > -END PGP SIGNATURE- ah nice i was looking everywhere for the easy way to enable rpmfusion without having to download it. I remember you had mentioned it before on here but couldn't find the thread. You might want to add to set the output mode in vlc to x11, otherwise it use too much cpu%. Hey Andrew I seen you on an episode of the new screensavers, nice job promoting Qubes! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b94224bc-3734-4bf5-93d7-d4cf7a791aac%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] bluetooth support in dom0
On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote: > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com wrote: > > > > > > > I don't know much about the security side of things, but I'm happy to > > > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if > > > > > > > that was the only issue. > > > > > > > > > > > > > > > > > > > Why not use Windows then? Or Mac? :) > > > > Because they don't offer the other nice features such as the app domains > > and disposable VMs. Which I assume would still help against remote threats > > such as web browser exploits. > > > > > > > > > Or should I be avoiding Qubes if I can't figure this stuff out > > > > > > > myself? ;) > > > > > > > > > > > > > > I'm just an amateur Linux user mildly interested in increased > > > > > > > security/privacy. > > > > > > > > > > > > > > Side musing: Have the developers considered allowing *optional* > > > > > > > support for things that have security issues, in the spirit of > > > > > > > compromise...? > > > > > > > > > > > > Qubes OS is an open platform, you can configure it however you like, > > > > > > disabling potentially all security feature, if you really want. The user > > > > > > is the ultimate boss. > > > > > > > I should rephrase that as "easy to use", even GUI based, configurability. > > Perhaps you aren't targeting such "novice" users. > > > > > > > > > > > For instance, I absolutely do choose convenience and > > > > > > > even necessity over security (to the tune of bluetooth, full graphics > > > > > > > card support for game dev work), yet wouldn't there still be > > > > > > > something to be gained by using Qubes even with those security holes? > > > > > > > When the choice is Qubes with these holes vs just any regular Linux > > > > > > > distro. > > > > > > > > > > > > > > > > > > > Modern Windows and OSX offer a "reasonable compromise" of security, I > > > heard. > > > > Haha! > > Any update regarding this? hahaha -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20acfdfc-4dbf-4ca9-83c1-7d27d00bd628%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Bad USB with USB devices in VM
On Thursday, January 12, 2017 at 2:26:02 AM UTC-5, Steve wrote: > On Thursday, January 12, 2017 at 10:09:56 AM UTC+4, Steve wrote: > > If a memory stick infected with Bad USB is inserted into a laptop running > > Qubes with the USB devices running in a VM, does the laptop USB firmware > > get rewritten by the Bad USB ? > > What can I do on a fresh installation on a brand new laptop to ensure that > once installed with Qubes the laptop firmware cannot be over written written > (assuming I am using an optical drive for installation,) thx Qubes installs a usbvm called sys-usb by default. so where you get the iso I guess is the real question. And what usb stick you use to write it on. Maybe someone has some comments on a good usb brand to buy. I buy microcenter. Where you get the iso is another story. so use your brand new computer to download it. hopefully its coming with an os pre-installed? maybe harden windows first follow these instructions before you boot the os. www.hardenwindows10forsecurity.com, (read the instructions on an older computer not your new one) make sure to follow the qubes install instructions how to verify the key signatures. and then hope for the best. use good security practices. keep stuff as compartmentalized as your mind can handle. I been in my amazon videos qube mostly since the holidays. ANd so all i do in that vm is watch videos nothing else. I use about a dozen diff vms for different tasks I do on the pc. I log into this yellow colored qube, the default personal, to log into my webmail, google, stuff where i'm not devastated if the password gets stolen. more sensitive stuff in another. Actually its not true about my amazon qube. I'm actually always in a disposable vm the most out of anything. I use it for all random tasks that don't need credentials. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/63af3ddb-ee07-459d-b463-0c502da4b75c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Bad USB with USB devices in VM
use rawrite32.exe if your burning it from windows. https://www.netbsd.org/~martin/rawrite32/download.html -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f21e5829-0cf8-4984-b6a3-660392f3fe69%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How i can play video?
On Thursday, January 12, 2017 at 12:35:14 AM UTC-5, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2017-01-11 20:21, raahe...@gmail.com wrote: > > On Wednesday, January 11, 2017 at 4:14:07 PM UTC-5, Andrew David Wong wrote: > > On 01/11/17 07:14, Unman wrote: > >>>> On Wed, Jan 11, 2017 at 09:07:17AM -0500, 'Repairing' via qubes-users > >>>> wrote: > >>>>> Still trying to figure out Qubes, > >>>>> > >>>>> When i open movies with "videos application", i get: > >>>>> > >>>>> AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) > >>>>> decoder are required to play the file, but are not installed. > >>>>> > >>>>> > >>>>> I also tried: > >>>>> > >>>>> Banshee > >>>>> Parole > >>>>> Snappy > >>>>> > >>>>> But there's just black background with them. > >>>>> > >>>>> Your time is much appreciated. > >>>>> > >>>> > >>>> This comes up so often it should be a FAQ. > > > > Added: https://www.qubes-os.org/doc/user-faq/#how-do-i-play-video-files > > > > > > ah nice i was looking everywhere for the easy way to enable rpmfusion > > without having to download it. I remember you had mentioned it before on > > here but couldn't find the thread. > > > > You might want to add to set the output mode in vlc to x11, otherwise it > > use too much cpu%. > > > > Are you sure that's required? I've never had a problem with it on the default > settings. > > > Hey Andrew I seen you on an episode of the new screensavers, nice job > > promoting Qubes! > > > > Thanks, raahelps! > > - -- > Andrew David Wong (Axon) > Community Manager, Qubes OS > https://www.qubes-os.org > -BEGIN PGP SIGNATURE- > > iQIcBAEBCgAGBQJYdxWFAAoJENtN07w5UDAwJHEP/3RIfke/ML8/gqplrAdSadtt > B0AyHT74FDQflOM0Uk36AqSbqY2GPrWbI/gLemLjfKGPUiS6ys9tl1XXrsEWM1mQ > JVUIyJGklJArlbFscmy/RgN7i2UZ30SM0zEnKgoyoyPC7A6To/762vg6hfPTyv35 > hET/Hy7G3FR8V5c89BzUjDUecdJogWp3gY2JiCFMozOQjd+xumP8YaZQmOCgcZIc > xH5Zxqtw62CUp1YzfyEI7Qhx0Z4ccZ8YPdAbwXa7puGYGwGpOvrkfEZQ0InTgd7c > hDsTuCrPAQLO2JHKyBF4armVIOH0+L+LGSl3mWCLd7LxUyLkrJpextvz1te9BlIG > Wi6TwRSDBS9wF+NEX5btTqNWvbHLWgnL6ALc2N/uxX1fyMvL5RhPZ/EpTU1QzLKP > BdJGuebnNM7FfLagvV7JsKzd7HNxSzwiIeyAwydSCM3n2p2ktdDRbCw3VkRafCiY > h/cOlBE1CsQmkPFwVmVFMwpBgz9FYx8tFRgrtwwxpTle9kh/WhpDFn5DxiGcGDsS > 1PKOPX8FwwiOU8HBgm5OlrkawHI5yDxn+y8yz2lOlvklC7uDQTWluPCUgktIb+Ym > XW7Evmb2vTgg+3cJM6IJkFW9wKwgFbsdhadgJE5KShv27CuaWpMmS8O9eD865wOT > lYQmvkO+bWcfWdvcmeV/ > =R5f7 > -END PGP SIGNATURE- ya my cpu% goes way down. somethign like 60% to in the 20s. Its a Qubes thing but setting that gives me the cpu% I would get on baremetal. I get worried about heat sometimes. I thought others have had slowdown issues too on the mailing list too but maybe its just me. I do have an older amd cpu on this machine. Not sure if I actually tested the diff on the i5. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ca2cc095-5038-4449-85a5-4b2d25ba4e12%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How i can play video?
On Thursday, January 12, 2017 at 2:50:49 AM UTC-5, raah...@gmail.com wrote: > On Thursday, January 12, 2017 at 12:35:14 AM UTC-5, Andrew David Wong wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > On 2017-01-11 20:21, raahe...@gmail.com wrote: > > > On Wednesday, January 11, 2017 at 4:14:07 PM UTC-5, Andrew David Wong > > > wrote: > > > On 01/11/17 07:14, Unman wrote: > > >>>> On Wed, Jan 11, 2017 at 09:07:17AM -0500, 'Repairing' via qubes-users > > >>>> wrote: > > >>>>> Still trying to figure out Qubes, > > >>>>> > > >>>>> When i open movies with "videos application", i get: > > >>>>> > > >>>>> AC-3 (ATSC A/52) decoder, MPEG-4 Video (advanced simple profile) > > >>>>> decoder are required to play the file, but are not installed. > > >>>>> > > >>>>> > > >>>>> I also tried: > > >>>>> > > >>>>> Banshee > > >>>>> Parole > > >>>>> Snappy > > >>>>> > > >>>>> But there's just black background with them. > > >>>>> > > >>>>> Your time is much appreciated. > > >>>>> > > >>>> > > >>>> This comes up so often it should be a FAQ. > > > > > > Added: https://www.qubes-os.org/doc/user-faq/#how-do-i-play-video-files > > > > > > > > > ah nice i was looking everywhere for the easy way to enable rpmfusion > > > without having to download it. I remember you had mentioned it before on > > > here but couldn't find the thread. > > > > > > You might want to add to set the output mode in vlc to x11, otherwise it > > > use too much cpu%. > > > > > > > Are you sure that's required? I've never had a problem with it on the > > default settings. > > > > > Hey Andrew I seen you on an episode of the new screensavers, nice job > > > promoting Qubes! > > > > > > > Thanks, raahelps! > > > > - -- > > Andrew David Wong (Axon) > > Community Manager, Qubes OS > > https://www.qubes-os.org > > -BEGIN PGP SIGNATURE- > > > > iQIcBAEBCgAGBQJYdxWFAAoJENtN07w5UDAwJHEP/3RIfke/ML8/gqplrAdSadtt > > B0AyHT74FDQflOM0Uk36AqSbqY2GPrWbI/gLemLjfKGPUiS6ys9tl1XXrsEWM1mQ > > JVUIyJGklJArlbFscmy/RgN7i2UZ30SM0zEnKgoyoyPC7A6To/762vg6hfPTyv35 > > hET/Hy7G3FR8V5c89BzUjDUecdJogWp3gY2JiCFMozOQjd+xumP8YaZQmOCgcZIc > > xH5Zxqtw62CUp1YzfyEI7Qhx0Z4ccZ8YPdAbwXa7puGYGwGpOvrkfEZQ0InTgd7c > > hDsTuCrPAQLO2JHKyBF4armVIOH0+L+LGSl3mWCLd7LxUyLkrJpextvz1te9BlIG > > Wi6TwRSDBS9wF+NEX5btTqNWvbHLWgnL6ALc2N/uxX1fyMvL5RhPZ/EpTU1QzLKP > > BdJGuebnNM7FfLagvV7JsKzd7HNxSzwiIeyAwydSCM3n2p2ktdDRbCw3VkRafCiY > > h/cOlBE1CsQmkPFwVmVFMwpBgz9FYx8tFRgrtwwxpTle9kh/WhpDFn5DxiGcGDsS > > 1PKOPX8FwwiOU8HBgm5OlrkawHI5yDxn+y8yz2lOlvklC7uDQTWluPCUgktIb+Ym > > XW7Evmb2vTgg+3cJM6IJkFW9wKwgFbsdhadgJE5KShv27CuaWpMmS8O9eD865wOT > > lYQmvkO+bWcfWdvcmeV/ > > =R5f7 > > -END PGP SIGNATURE- > > ya my cpu% goes way down. somethign like 60% to in the 20s. Its a Qubes thing > but setting that gives me the cpu% I would get on baremetal. I get worried > about heat sometimes. I thought others have had slowdown issues too on the > mailing list too but maybe its just me. I do have an older amd cpu on this > machine. Not sure if I actually tested the diff on the i5. Videocard might make a diff too. I have nvidia on this one. intel on the other. I'll test it tomorrow if I can. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5b5a92e3-6c53-4065-8631-589d01844c0b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] How i can play video?
it also might be the type of vids I'm watching haha -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b33e27c9-2934-43f9-a620-7ec87140f7fa%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Bad USB with USB devices in VM
On Thursday, January 12, 2017 at 2:45:23 AM UTC-5, Steve wrote: > On Thursday, January 12, 2017 at 11:37:06 AM UTC+4, raah...@gmail.com wrote: > > > Qubes installs a usbvm called sys-usb by default. > > If the USB controller is installed in this sys-usb and a bad usb memory stick > tried to write to the firmware, am I correct in assuming it is effectively > writing to virtual firmware and therefore the actual firmware stays intact ? I don't believe so but hopefully your machines bios supports enabling iommu/vt-d, so at least the controller will be isolated from the other vms. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/dc1ec7e0-d9c0-4f0a-9966-9d1c6b78c7f3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Bad USB with USB devices in VM
I thought you meant infecting your pc out the box. But ya your wireless card is not considered safe either. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c0ee2f6d-6c71-45be-aa14-76c1261b1916%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] bluetooth support in dom0
On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote: > On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote: > > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote: > > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com wrote: > > > > > > > > > > > I don't know much about the security side of things, but I'm happy > > > > > > to > > > > > > > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if > > > > > > > > > > > that was the only issue. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Why not use Windows then? Or Mac? :) > > > > > > > > Because they don't offer the other nice features such as the app > > > > domains and disposable VMs. Which I assume would still help against > > > > remote threats such as web browser exploits. > > > > > > > > > > > > > > > Or should I be avoiding Qubes if I can't figure this stuff out > > > > > > > > > > > myself? ;) > > > > > > > > > > > > > > > > > > > > > > I'm just an amateur Linux user mildly interested in increased > > > > > > > > > > > security/privacy. > > > > > > > > > > > > > > > > > > > > > > Side musing: Have the developers considered allowing *optional* > > > > > > > > > > > support for things that have security issues, in the spirit of > > > > > > > > > > > compromise...? > > > > > > > > > > > > > > > > > > > > Qubes OS is an open platform, you can configure it however you like, > > > > > > > > > > disabling potentially all security feature, if you really want. The > > > > > user > > > > > > > > > > is the ultimate boss. > > > > > > > > > > > > > I should rephrase that as "easy to use", even GUI based, > > > > configurability. Perhaps you aren't targeting such "novice" users. > > > > > > > > > > > > > > > > > > > For instance, I absolutely do choose convenience and > > > > > > > > > > > even necessity over security (to the tune of bluetooth, full > > > > > > graphics > > > > > > > > > > > card support for game dev work), yet wouldn't there still be > > > > > > > > > > > something to be gained by using Qubes even with those security > > > > > > holes? > > > > > > > > > > > When the choice is Qubes with these holes vs just any regular Linux > > > > > > > > > > > distro. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Modern Windows and OSX offer a "reasonable compromise" of security, I > > > > > heard. > > > > > > > > Haha! > > > > > > Any update regarding this? > > > > hahaha > > You manage to figure it out lol? I'm sorry i was laughing at Joanna's comments. Do you mean how to enable it manually, or if Qubes is going to support it? I personally wouldn't want bluetooth either man. Maybe you hold your phone too close to it one day haha. Or someone uses some booster outside your house to reach it who knows. i mean anything can happen and taking over dom0 is game over. defeats the purpose of using Qubes which tries to isolate hardware from dom0. It is recommended to use usb with a computer that has the Qubes hardware requirements to be able to isolate the usb controllers from dom0. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/fbc29b17-6576-4228-a29e-c5cb0a60eee9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] bluetooth support in dom0
On Thursday, January 12, 2017 at 3:08:59 AM UTC-5, raah...@gmail.com wrote: > On Thursday, January 12, 2017 at 2:36:43 AM UTC-5, John Smith wrote: > > On Thursday, January 12, 2017 at 12:26:21 AM UTC-7, raah...@gmail.com wrote: > > > On Thursday, January 12, 2017 at 2:23:16 AM UTC-5, John Smith wrote: > > > > On Wednesday, March 12, 2014 at 4:40:16 PM UTC-6, danf...@gmail.com > > > > wrote: > > > > > > > > > > > > > I don't know much about the security side of things, but I'm > > > > > > > happy to > > > > > > > > > > > > > blindly ignore any "in my local neighbourhood" kind of attacks if > > > > > > > > > > > > > that was the only issue. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Why not use Windows then? Or Mac? :) > > > > > > > > > > Because they don't offer the other nice features such as the app > > > > > domains and disposable VMs. Which I assume would still help against > > > > > remote threats such as web browser exploits. > > > > > > > > > > > > > > > > > > Or should I be avoiding Qubes if I can't figure this stuff out > > > > > > > > > > > > > myself? ;) > > > > > > > > > > > > > > > > > > > > > > > > > > I'm just an amateur Linux user mildly interested in increased > > > > > > > > > > > > > security/privacy. > > > > > > > > > > > > > > > > > > > > > > > > > > Side musing: Have the developers considered allowing *optional* > > > > > > > > > > > > > support for things that have security issues, in the spirit of > > > > > > > > > > > > > compromise...? > > > > > > > > > > > > > > > > > > > > > > > > Qubes OS is an open platform, you can configure it however you like, > > > > > > > > > > > > disabling potentially all security feature, if you really want. The > > > > > > user > > > > > > > > > > > > is the ultimate boss. > > > > > > > > > > > > > > > > I should rephrase that as "easy to use", even GUI based, > > > > > configurability. Perhaps you aren't targeting such "novice" users. > > > > > > > > > > > > > > > > > > > > > > > For instance, I absolutely do choose convenience and > > > > > > > > > > > > > even necessity over security (to the tune of bluetooth, full > > > > > > > graphics > > > > > > > > > > > > > card support for game dev work), yet wouldn't there still be > > > > > > > > > > > > > something to be gained by using Qubes even with those security > > > > > > > holes? > > > > > > > > > > > > > When the choice is Qubes with these holes vs just any regular > > > > > > > Linux > > > > > > > > > > > > > distro. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Modern Windows and OSX offer a "reasonable compromise" of security, > > > > > > I heard. > > > > > > > > > > Haha! > > > > > > > > Any update regarding this? > > > > > > hahaha > > > > You manage to figure it out lol? > > I'm sorry i was laughing at Joanna's comments. Do you mean how to enable it > manually, or if Qubes is going to support it? I personally wouldn't want > bluetooth either man. > Maybe you hold your phone too close to it one day haha. Or someone uses some > booster outside your house to reach it who knows. i mean anything can > happen and taking over dom0 is game over. defeats the purpose of using Qubes > which tries to isolate hardware from dom0. > > It is recommended to use usb with a computer that has the Qubes hardware > requirements to be able to isolate the usb controllers from dom0. or at least isolate a controller to dom0 dedicated to only your mouse and keyboard. Just don't use wireless. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e2af9a2e-e791-4eb4-a206-576a0328d222%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to autorun startup script on login/reboot in dom0 with i3wm?
On Friday, January 13, 2017 at 1:41:20 AM UTC-5, John Smith wrote: > I just installed i3wm and it switches my 2 displays from extended to > mirrored. In effort to fix this, I wrote a simple script called rc.local > containing the following commands: > > xrandr --output DP-1 --auto > xrandr --output VGA-1 --right-of DP-1 > xrandr --output VGA-1 --mode 1920x1080 > > The script works fine when I execute it manually from the terminal (I've > already done chmod+x). However, at the end of my /etc/i3/config file i added > the line: > > exec /etc/rc.local > > I added this line to automatically run the script when i reboot my computer > but for some reason it doesn't work. I've tried it with single and double > quotes as well as exec_always and --no-startup-id but nothing seems to work. > Any ideas how I can get this working? I've also tried putting the commands > directly into the config without calling the script but that didn't work > either. Even echo test >> /tmp/testfile didn't output anything. Any ideas > would be much appreciated, thanks. wouldn't it just work like a normal baremetal linux system? I been using windows so much lately right now I'm drawing a blank lol. I think you got a choice of whole whost of diff directories to try, google fedora. last time I had to do this I made a .desktop file. Does that work in xfce? I'm not sure. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5ccba0ee-3471-44f9-80a8-09238e266f9b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: install-run
On Friday, January 13, 2017 at 3:03:59 PM UTC-5, tito...@gmail.com wrote: > I am probably the most software ignorant person attempting to use this > os---nowhere near getting it to work. I am used to: "download", "install", > "run". > > I am using a 5 or 6 year old Dell xps 15 running windows 10 operating system. > > The qubes install instructions for version 3.2 end after usb install advice. > I followed it but, if something was supposed to happen automatically---it > didn't. After double clicking on some of the downloaded files, I have no idea > how to get this thing to work. Any files that offer to open are requesting > that I describe what method to use. I have no idea. And, after reading the > first 50 "install" posts I don't think I will find answers that I can > understand. > > If my message doesn't find a generous and patient helper then I am bound for > the computer shop---let the technician figure it out. Maybe my very a limited > digital vocabulary precludes any chance of getting qubes to work without > hours and hours of remedial education. play with the bios options. like boot mode, , hdd mode, usb options, is there options for vt-d or iommu? Qubes can be picky with the bios settings. make sure you using a new usb stick at least 8gb. check the key sigs. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bf49bc3f-debe-4e9f-86f8-32d7953f20d9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: FYI: Experimental Qubes coldkernel support now available
On Friday, January 13, 2017 at 12:21:50 PM UTC-5, Marek Marczykowski-Górecki wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On Thu, Dec 15, 2016 at 03:11:29PM -0600, Colin Childs wrote: > > Hi everyone, > > > > Sorry for not getting on this list sooner, however it looks like testing > > of coldkernel on Debian is largely going well! I see the most recent > > issue from foppe, and will be attempting to reproduce later this evening. > > > > If you run into issues that require coldhak attention, please do not > > hesitate to open tickets at > > https://github.com/coldhakca/coldkernel/issues, or email us directly at > > cont...@coldhak.ca. > > > > Thanks, and happy testing! > > What are the plans for next stages here? I guess fixing Fedora support, > right? > > What about binary packages in general: I've heard there are some > benefits from compiling the grsec-enabled kernel yourself, as some parts > are randomized compile-time. Is that true? How much benefit it gives? > > Anyway, I think in the end we need some packages in the repository for > this. > > - -- > Best Regards, > Marek Marczykowski-Górecki > Invisible Things Lab > A: Because it messes up the order in which people normally read text. > Q: Why is top-posting such a bad thing? > -BEGIN PGP SIGNATURE- > Version: GnuPG v2 > > iQEcBAEBCAAGBQJYeQymAAoJENuP0xzK19csj0cH/jh4eCtY4XoZgTd06EE+n3j6 > jBi6SmvafBAewpJkTjpRM4l8OrybuBJ/7l32LkyEtquZCaZWWxZo+sRCMm5N2stc > bjYUrROaOYmXbh7T0cwH4L9uRjgZda0IUGlGcA0324TYtLR9VUds4fncH8c/h7lE > kmNB3xX8x8KyTWH1v19dtoPyay20626eJP32qzeoDptcc0cyfpOKDZR5YNmf3b/K > SZXNz2O10rbpBK+odtfY/VAHQqD3P6TKGeTKAF7WBeXHLqOjB6CBXjN/Aj9p9X94 > l/xeXIW+/EWwZtCBmgcRjVcUVYXVbHdGYTrS1OArRa9KSchBY/ENBedYRCs8GBs= > =Rk3u > -END PGP SIGNATURE- you have to update it alot thats the thing. I think that is too much time for most repos so most people prolly always end up compiling it themselves to have the latest version. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/979d888d-9a26-48f5-977f-357a259945e8%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Problem: Convert to Trusted PDF Hangs
On Friday, January 13, 2017 at 8:19:38 AM UTC-5, Pushpins4u wrote: > Greetings, > > > > I recently began downloading PDFs in an anon-whonix VM and wanted to sanitize > them to move over to an offline VM attached to a storage USB. Weeks ago I > was able to navigate to my downloaded PDFs in the anon-whonix Tor Browser > folder, right-click, and convert the PDFs successfully. Copying them to my > offline VM and attached USB drive worked fine. > > > > When I try this process now, the PDF conversion progress window gets to like > 95% full and then hangs. I'm notified that a script appears to have hung and > asked if it should be terminated. This is happening consistently with the > same PDF. > > > > I'm up-to-date on my dom0. Running on an HP EliteBook with i5 processor. > > > > Ideas? > > > > Thanks, > > PP > > > > > > > Sent with ProtonMail Secure Email. copy the file to some other untrusted or disposablevm and see if it works there. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a4437306-c2da-46e5-95d4-703ff6f3e71c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: DispVM does not work anymore
On Thursday, January 12, 2017 at 9:01:03 AM UTC-5, mitte...@digitrace.de wrote: > Hey there, > > today I noticed that my dispVM is no longer working (not in Dom0 and not > in AppVMs). There is the notification that the DispVM starts, but > nothing shows up. > If I start the internal fedora-23-dvm I boots up without any problems > and also allows me to start tools (e.g. Firefox) > > any idea what is wrong? > > Thanks open qubes-manager window. click view and show internal vms. Then remove the dvm qube. then in a dom0 terminal make a new one. qvm-create-default-dvm fedora-24. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/46875d53-e37f-4097-84c3-72ffcd5b204a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Resolution Issues In Qubes
On Thursday, January 12, 2017 at 4:05:01 PM UTC-5, Cameron wrote: > I'm new to Qubes so please forgive me if I'm asking an obvious question. I > finished installing Qubes 3.1 to an external hard disk and am having a > difficult time getting Qubes to run at 1920x1080. Currently the only options > I have are 1024X768. From my research in the backlogs of the mailing list I'm > thinking it might be a driver issue. I have an AMD R9 380 installed and no > integrated gpu to fall back on. I've seen lots in the back logs about > installing NVIDIA drivers but not so much on AMD. I'd appreciate any tips > anyone has for me. > > Thanks. Have you run this graphics card on a baremetal fedora system? If not you might want to ask on their forums as well. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c276a7f1-f6ac-462c-9c16-db651246601d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: IPv6 connectivity and qubes proxy VM
On Thursday, January 12, 2017 at 1:30:07 PM UTC-5, daltong defourne wrote: > On Thursday, January 12, 2017 at 6:47:00 PM UTC+3, daltong defourne wrote: > > Hi! > > I've created a VPN proxyvm (debian-8 based) according to existing > > documentation (more or less - I'm using the VPN provider's standalone > > client because, in a VM, why not?) > > > > For IPv4 it works flawlessly. > > > > For IPv6 it does not work at all for the VMs "behind" the proxyvm (VPN's > > IPv6 support works for a browser launched within proxyvm itself, but any VM > > behind the proxyvm can only use IPv4) > > > > what's up? > > Can it be helped? > > Found this commit. > https://github.com/marmarek/qubes-core-agent-linux/commit/789eb511266d9e8bd812e40f952ec2bce6d7a414 > > Managed to activate the qubes-ipv6 service (worked!) on the appvm, the > firewallvm before the proxyvm, and the proxyvm. > > No budge, IPv6 still missing in action :( isn't ipv6 unsafe? You sure this is not by design in qubes? lol. I'm probably wrong don't mind me. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/98efa0e1-ffaf-48f5-b180-fd12b7877387%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Prob installing VLC in Fedora24 Template
On Thursday, January 12, 2017 at 1:11:02 PM UTC-5, Arnulf Maria Bultmann wrote: > When I try to install vlc als described in the faq and elsewhere I get this > error: > > Downloading Packages: > (1/60): aalib-libs-1.4.0-0.29.rc5.fc24.x86_64.r 126 kB/s | 70 kB 00:00 > > [MIRROR] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: Interrupted by > header callback: Server reports Content-Length: 15400 but expected size is: > 1605926 > [FAILED] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: No more mirrors to > try - All mirrors were already tried without success > (3-4/60): libcaca-0. 5% [= ] 708 kB/s | 1.6 MB 00:37 > ETA > The downloaded packages were saved in cache until the next successful > transaction. > You can remove cached packages by executing 'dnf clean packages'. > Error: Error downloading packages: > Cannot download vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: All > mirrors were tried > > I tried it several times and got always the same error. > > Procedure: > sudo dnf upgrade --refresh > sudo dnf install vlc > > Any advice? did you try this? You can remove cached packages by executing 'dnf clean packages' -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6b51104d-f1b5-4426-ad97-0bbe8793f2ee%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Prob installing VLC in Fedora24 Template
On Friday, January 13, 2017 at 4:35:13 PM UTC-5, raah...@gmail.com wrote: > On Thursday, January 12, 2017 at 1:11:02 PM UTC-5, Arnulf Maria Bultmann > wrote: > > When I try to install vlc als described in the faq and elsewhere I get this > > error: > > > > Downloading Packages: > > (1/60): aalib-libs-1.4.0-0.29.rc5.fc24.x86_64.r 126 kB/s | 70 kB 00:00 > > > > [MIRROR] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: Interrupted by > > header callback: Server reports Content-Length: 15400 but expected size is: > > 1605926 > > [FAILED] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: No more mirrors > > to try - All mirrors were already tried without success > > (3-4/60): libcaca-0. 5% [= ] 708 kB/s | 1.6 MB 00:37 > > ETA > > The downloaded packages were saved in cache until the next successful > > transaction. > > You can remove cached packages by executing 'dnf clean packages'. > > Error: Error downloading packages: > > Cannot download vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: All > > mirrors were tried > > > > I tried it several times and got always the same error. > > > > Procedure: > > sudo dnf upgrade --refresh > > sudo dnf install vlc > > > > Any advice? > > did you try this? You can remove cached packages by executing 'dnf clean > packages' try in an appvm and see if anything different happens. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/336b0c30-ee0b-45a6-a99e-21482e888539%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Prob installing VLC in Fedora24 Template
On Friday, January 13, 2017 at 4:36:03 PM UTC-5, raah...@gmail.com wrote: > On Friday, January 13, 2017 at 4:35:13 PM UTC-5, raah...@gmail.com wrote: > > On Thursday, January 12, 2017 at 1:11:02 PM UTC-5, Arnulf Maria Bultmann > > wrote: > > > When I try to install vlc als described in the faq and elsewhere I get > > > this error: > > > > > > Downloading Packages: > > > (1/60): aalib-libs-1.4.0-0.29.rc5.fc24.x86_64.r 126 kB/s | 70 kB > > > 00:00 > > > [MIRROR] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: Interrupted by > > > header callback: Server reports Content-Length: 15400 but expected size > > > is: 1605926 > > > [FAILED] vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: No more mirrors > > > to try - All mirrors were already tried without success > > > (3-4/60): libcaca-0. 5% [= ] 708 kB/s | 1.6 MB > > > 00:37 ETA > > > The downloaded packages were saved in cache until the next successful > > > transaction. > > > You can remove cached packages by executing 'dnf clean packages'. > > > Error: Error downloading packages: > > > Cannot download vlc-3.0.0-19.20170104gitf8f5395.fc24.x86_64.rpm: All > > > mirrors were tried > > > > > > I tried it several times and got always the same error. > > > > > > Procedure: > > > sudo dnf upgrade --refresh > > > sudo dnf install vlc > > > > > > Any advice? > > > > did you try this? You can remove cached packages by executing 'dnf clean > > packages' > > try in an appvm and see if anything different happens. maybe also if you have one based on a diff fedora template. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/b616a941-631d-49fc-840b-09763a1c8818%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Prob installing VLC in Fedora24 Template
sorry, you could also always just use a debian template instead. if not, check the netvm or firewall. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f2560b31-915f-42b8-a379-32edd7032a46%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: VM chaining visualisation tool
On Friday, January 13, 2017 at 5:02:02 PM UTC-5, raah...@gmail.com wrote: > On Thursday, January 12, 2017 at 1:11:48 AM UTC-5, Steve wrote: > > Is there a way I can get a real time visualisation of the VM chaining , for > > example a Domain chaining through a firewall through a VPN and sys Network ? > > for seeing network connections i use etherape. But i don't run it in > sys-firewall, which would show which vm making the connection, cause I feel > it unsafe. but nice thing about qubes safe to use in sys-net, not as > detrimental. I mean anything listening is not safe. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/0ab7ee4f-3e72-4e37-a0cc-a6ef6b4b4d64%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: VM chaining visualisation tool
On Thursday, January 12, 2017 at 1:11:48 AM UTC-5, Steve wrote: > Is there a way I can get a real time visualisation of the VM chaining , for > example a Domain chaining through a firewall through a VPN and sys Network ? for seeing network connections i use etherape. But i don't run it in sys-firewall, which would show which vm making the connection, cause I feel it unsafe. but nice thing about qubes safe to use in sys-net, not as detrimental. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8887133a-baa4-4359-aa5c-3c6a6b26a708%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to get bluetooth keyboard working in dom0?
On Thursday, January 12, 2017 at 2:32:09 AM UTC-5, John Smith wrote: > Anyone know how to get a bluetooth keyboard working in dom0 (so I can use it > with all AppVMs). I'm aware of the security risks but I have an ergonomic > split keyboard which I would really like to use with Qubes. The keyboard I'm > trying to connect is called the Kinesis Freestyle2 Blue. It uses a > non-proprietary bluetooth dongle. Regular logitech proprietary bluetooth > keyboards seem to work out of the box with their own dongles but I couldn't > get Qubes to detect my non-proprietary usb bluetooth dongle. Can someone > please provide me the step by step info to get this working? I'm running a > fresh default install of the latest version of Qubes 3.2. Thanks in advance. maybe this will help http://forums.fedoraforum.org/showthread.php?t=303654 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/175938fe-0f70-4ce3-9b84-df0c6cf255ec%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Domains Have Internet But Templates No
if its because you want to install something you can use a dispvm to download it and transfer it over to the template, if worried webpage malicious. But then you'd have to worry about the file you transferred over, depends if you trust it or not. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5aa5777a-9eee-40ae-8706-8b785722e46a%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Removing unwanted menu items under xfce?
On Saturday, January 7, 2017 at 5:36:37 PM UTC-5, Otto Kratik wrote: > I recently did a fresh install of Qubes R3.2, and then proceeded to restore > several VM's from my previous installation, among them a Windows 7 HVM. I > also installed qubes-windows-tools, which I also previously had installed. > > As a result of that restore/install, xfce has placed about 50 win7-related > app shortcuts in both the win7 sub-menu of the start menu (expected and > desired) and also simultaneously into the "System Tools" sub-menu of the > start menu (not wanted), intermingled among the normal items one usually > expects to find there (terminal, file manager etc). > > KDE is not affected, and logging into that environment shows the proper > expected behavior: win7 shortcuts in the win7 sub-menu only, and system tools > shortcuts where they belong. > > What is the easiest way to edit the entries appearing under the System Tools > sub-menu of xfce, so as to remove the approximately 50 win7-related shortcuts > that I don't want appearing there? > > Thanks.. wonder why that happened. I'm not sure you have to reinstall qubes windows tools when restoring the windows7 vm. I haven't had any issues. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ac5ada25-10f3-44b2-8394-26a4819b6398%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Have Windows VM open and play video in Linux VM?
On Monday, January 2, 2017 at 9:34:41 AM UTC-5, Jarle Thorsen wrote: > As there is currently no audio support for Windows in Qubes OS: > > Can I use any of the Qubes windows tools to copy a video file to a Linux vm > and have it start playing there? > > The file should only be copied to a temp directory, and not put in > QubesIncomming. > > Which tool/syntax will let me do this? just copy it to a dispvm. open vlc in a dispvm. copy the file there. very easy. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/39d5a108-6d36-42b9-8889-98cbef56a287%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Have Windows VM open and play video in Linux VM?
On Monday, January 2, 2017 at 10:49:01 AM UTC-5, john.david.r.smith wrote: > On 02/01/17 15:34, Jarle Thorsen wrote: > > As there is currently no audio support for Windows in Qubes OS: > > > > Can I use any of the Qubes windows tools to copy a video file to a Linux vm > > and have it start playing there? > > > > The file should only be copied to a temp directory, and not put in > > QubesIncomming. > > > > Which tool/syntax will let me do this? > > > there are two ways: > 1) (the better way if you can get a working setup) > for sound/video you can use streaming software (i did this some time ago). > you have a windows vm W and some linux vm N. > you set N as netvm for W. > then you use some virtual soundcard (i think i used hifi cable) and some > streaming software to stream the sound to the linux vm (i can't remember > what i used.) > on N you receive the stream. > since you can hear all audio output of a linux vm, you will hear sound > from W. > > my setup was fiddly and had about 2 sec audio delay. (but i did not > really bother to fix it, so you probably can do better) > > 2) > again have some linux vm N as netvm of a windows vm W. > then you can use public folders on W and mount the public folder on N. > now you can play the video from N. > > i used both methods for a while (until i completely switched to linux > for all my work-flows). > in both cases i did not use the windows tools. > > if you have working windows tools, you should have a qvm-open-in-dispvm > command . > you could also try this command. > (i am not really sure whether the windows tools contain this command) sounds like this would be great for a big music playlist. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e876e69a-0e37-479f-99dc-7c67aba8a52e%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: qubes-windows-tools installation failure
On Tuesday, January 17, 2017 at 5:30:38 PM UTC-5, Hariharan Gopalan wrote: > Hello Group > > I am getting the following error while trying to install qubes-windows-tools: > > [1848:184C][2017-01-17T22:22:27]i299: Plan complete, result: 0x0 > [1848:184C][2017-01-17T22:22:27]i300: Apply begin > [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to wait for > child to connect to pipe. > [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to connect to > elevated child process. > [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to actually > elevate. > [1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to elevate. > [1848:184C][2017-01-17T22:23:03]i399: Apply complete, result: 0x800700e8, > restart: None, ba requested restart: No > > I followed the instructions on the page: > https://www.qubes-os.org/doc/windows-appvms. > > Thanks > Hari What windows version? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/73effc12-413b-4b2c-bff1-33591e3b3a32%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Firewall Rules for Printer Access?
On Thursday, December 29, 2016 at 6:13:34 PM UTC-5, superlative wrote: > On Thursday, December 22, 2016 at 7:34:55 PM UTC-8, raah...@gmail.com wrote: > > you will have to print from a sys-usb qubes then most likely if using usb. > > the template you install printer drivers to is that one. You can try to add > > single usb device instead if using latest qubes. > > https://www.qubes-os.org/doc/usb/ > > > > Scroll to "Attaching a single USB device to a qube (USB passthrough)" > > > > Then you can attach the single usb device to an appvm and possibly print to > > it? No idea though I've never tried it, maybe someone with more > > experience can chime in. Actually I have dont it with an android phone and > > its worked. Before I would have to transfer files from the usbvm. So > > maybe it works for printers too I would give it a shot. > > > > Though, most people use network printer from a disposable vm using a > > whole separate template. cause printer drivers is untrusted. first virus > > i ever got as a young child was from a printer driver disk straight from > > factory. > > That worked. I opened a terminal on Fedora-23 template VM, ran "sudo dnf > install qubes-usb-proxy" without quotes, opened a XTerm from the System Tools > Xfce start menu, ran "qvm-usb", found my printer listed, then ran "qvm-usb -a > disp[#] sys-usb:[#-#]" replacing # with whatever number the disposable app VM > I had open that I wanted to print from and the other #s replaced with the > numbers listed next to my printer with the previous command "qvm-usb" and no > brackets or quotes. Printed just fine. I wish qvm-usb was available through > the GUI Qubes VM Manager. Since it's not I have to save a Firefox bookmark to > the page https://www.qubes-os.org/doc/usb/ so I don't forget the commands I > need to use to attach my printer to another disposable VM next time I need to > print. > > Thanks for all your help you guys. My printer now works! in meantime you can use the up arrow in a terminal to use your last commands, instead of retyping. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/71d865ac-fdbd-438b-b8de-3a1ec284dfb5%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Accidental malware protection effect
On Monday, January 16, 2017 at 2:38:40 PM UTC-5, Alex wrote: > Has it ever been considered a feature the fact that all of the activity > of a user in Qubes OS happens in a VM, from the point of view that a lot > of malware has anti-debugging features that usually alter their > behaviour when they detect they are run in a VM? > > I don't have any statistic data for malware having such protections, and > I believe that some anti-debugging features just compare hardware cpu > timers to better discern an actual debugging session from a running VM > (otherwise, this could prevent the malware from running on vps > platforms). But it could be a nice side effect... > > -- > Alex probably, I know some malware will do this if detects user running monitoring programs. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/cb50900c-1ad1-4c16-9b2b-a03ee324bdec%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: AppVM unexpectedly changes kernel
On Monday, January 16, 2017 at 11:57:30 AM UTC-5, Doug Hill wrote: > Recently two appvms refused to start, reporting that: > > VM: VM kernel does not exist: /var/lib/qubes/vm-kernels/4.4.12-9/vmlinuz > > Qubes Manager shows the kernel is set to 4.4.38-11. > > Using 'qvm-prefs myappvm -s kernel 4.4.38.11' fixed the issue. > > The appvm templates are debian-8 and whonix-ws based. Anything I should > be concerned about here? > > Thanks! you can always just wipe the whole vm and recreate it to be on the safe side lol. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/960e87e9-a30d-4c79-b6ea-e136a9f2646c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can anyone recommend a video card for Qubes
On Saturday, January 14, 2017 at 2:20:23 PM UTC-5, tai...@gmx.com wrote: > On 01/14/2017 12:15 PM, qmaster...@gmail.com wrote: > > > суббота, 14 января 2017 г., 5:01:34 UTC-5 пользователь Chris Willard > > написал: > >> Hello All, > >> > >> I am using my on-board video but only getting 1024x768 resolution so > >> wondered if there is another video card type I could use. > >> > >> -- > >> Best regards, > >> Chris > >> > > any AMD graphic card should be great for Qubes, because AMD has pretty good > > open source drivers for Linux. Dont get NVIDIA because in that case you > > would have to use NVIDIA closed source drivers with hidden backdoors and > > proven telemetry; nouveau is still not in a good shape, probably because no > > real assistance from NVIDIA - they want everyone to use their closed source > > stuff > > > Wait the nvidia linux drivers have telemetry? > I thought it was only windows, and only if you install the "geforce > experience". > > Irreguardless nvidia is an awful company that adds "bugs" to nerf > featuresets on non-windows platforms, and they make it hard to attach > the card to a virtual machine (ex: error 43). > > Just say NO to binary blobbed hardware. no not open source drivers. It really don't matter if its amd or nvidia. I actually think the nvidia drivers are way better then amd for linux. I use a gtx 650 and its always run great on linux. proprietary drivers better for gaming. open source better for the linux desktops.What you would want to do is just research the card model how it performs with linux. and even more compatible would be the onboard intel like you are already using. But I guess you would have to update the board in that case to get latest resolutions and desktop effects. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/22f67b9a-bb4c-4085-a7ab-594f3430afe7%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Prob installing VLC in Fedora24 Template
On Saturday, January 14, 2017 at 12:15:17 PM UTC-5, Arnulf Maria Bultmann wrote: > > > did you try this? You can remove cached packages by executing 'dnf clean > > > packages' > > > > Yes I tried it several times with the same result > > I solved my problem by downloading the rpm in a appvm and then copying it to > the template vm. But it should work in the template vm without work around. > Or? ya weird. not sure why, did you make any changes to the template? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/c8997baf-88e6-44b9-977a-cf8ec2705121%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Prob installing VLC in Fedora24 Template
On Tuesday, January 17, 2017 at 11:26:27 PM UTC-5, raah...@gmail.com wrote: > On Saturday, January 14, 2017 at 12:15:17 PM UTC-5, Arnulf Maria Bultmann > wrote: > > > > did you try this? You can remove cached packages by executing 'dnf > > > > clean packages' > > > > > > Yes I tried it several times with the same result > > > > I solved my problem by downloading the rpm in a appvm and then copying it > > to the template vm. But it should work in the template vm without work > > around. Or? > > ya weird. not sure why, did you make any changes to the templates is there a clean all command maybe u can try. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a3d58963-0b8f-4610-b29d-5a46c2b8f3f2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: USB & PCIe devices management questions
On Saturday, January 14, 2017 at 10:43:35 AM UTC-5, B&B wrote: > Hello, for starters, pardon my ignorance, I am at the very beginning of the > learning curve. > I am planning out a new workstation build, I want to plan it out with Qubes > in mind. But I have few questions, as I do not have a Qubes compatible > desktop right now, and my laptops are not really good to experiment with it. > > I want to add and assign a secondary GPU to a Windows based VM, to be used as > a gaming and CAD machine. If I do that, what about monitor output, if primary > GPU is in dom0, do I need to connect second GPU to a monitor, or can I route > the signal somehow without additional hardware? > I want to use few, separate, color coded USB hubs(spray paint for the win), > each attached to different domain, with same color coding. I want it to work > as seamlessly as possible, preferably with no additional steps after I > attach/detach any device to/from a hub. It simply shows into a VM and acts > accordingly. I have problem understanding how the qvm-pci and USB management > works in this area. Is my planned use case even achievable or do I need to > manage each device every single time I attach it? > Is assigning devices to vms persistent after booting, or can be made > persistent? don't thnk its supported yet. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/495be3e1-b801-464c-9e7f-d151c7f6b178%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Fw: Re: Problem: Convert to Trusted PDF Hangs
On Saturday, January 14, 2017 at 9:03:15 AM UTC-5, Pushpins4u wrote: > Forwarding to list. > > > > > > copy the file to some other untrusted or disposablevm and see if it works > there. > > > > That gave a clue. Copying the untrusted PDF to my untrusted domain and > attempting the conversion there resulted in the same behavior. However, > instead of receiving a "script hanging" error I received this message: > > "Merging pages failed: convert: unable to extent pixel cache `No such file or > directory' @ fatal/cache.c/CacheSignalHandler/3394." > > > > Each time after I received the OS pop-up message: > > "Warning: insufficient memory to start disp" > > > > And this error window: > > "The remote party return invalid no of pages, aborting!" > > > > -pp4u > > > > > Sent with ProtonMail Secure Email. > > > > Original Message > > Subject: Re: Problem: Convert to Trusted PDF Hangs > > Local Time: January 13, 2017 9:26 PM > > UTC Time: January 13, 2017 9:26 PM > > From: raah...@gmail.com > > To: qubes-users > > pushp...@protonmail.com > > > > On Friday, January 13, 2017 at 8:19:38 AM UTC-5, Pushpins4u wrote: > > > Greetings, > > > > > > > > > > > > I recently began downloading PDFs in an anon-whonix VM and wanted to > > sanitize them to move over to an offline VM attached to a storage USB. > > Weeks ago I was able to navigate to my downloaded PDFs in the anon-whonix > > Tor Browser folder, right-click, and convert the PDFs successfully. > > Copying them to my offline VM and attached USB drive worked fine. > > > > > > > > > > > > When I try this process now, the PDF conversion progress window gets to > > like 95% full and then hangs. I'm notified that a script appears to have > > hung and asked if it should be terminated. This is happening consistently > > with the same PDF. > > > > > > > > > > > > I'm up-to-date on my dom0. Running on an HP EliteBook with i5 processor. > > > > > > > > > > > > Ideas? > > > > > > > > > > > > Thanks, > > > > > > PP > > > > > > > > > > > > > > > > > > > > > Sent with ProtonMail Secure Email. > > > > copy the file to some other untrusted or disposablevm and see if it works > there. well maybe someone who knows what those errors mean can chime in. so only with the same pdf? is it a very large file? u sure you not running out of ram or space? Are you using fedora or debian? whats your pc specs? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8bb4d7e6-f3c8-4ab1-8357-802b8f360d5d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: All audio on streaming video out of sync
On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote: > All of the audio for videos played on my AppVMs, regardless of what > template it's based on (Fedora 24/Debian 8), or what browser I try > (Firefox/Chrome/Vivaldi), is completely out of sync. It's not just > YouTube, but Vimeo, self-hosted, etc. > > I tried uncommenting audio_low_latency in /etc/qubes/quid.conf in dom0 > That didn't fix things. > I tried playing with the realtime-priority in /etc/pulse/daemon.conf > That didn't seem to make any difference. > > Are there any other places where I could try to fix this latency issue? > I assume it's dom0 as everything is affected. whats your pc specs/ what soundcard? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1c5619e2-90e5-4ab4-a682-36f18100b11b%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Detection - Best Way
On Wednesday, January 18, 2017 at 12:27:54 AM UTC-5, Asterysk wrote: > It struck me that Qubes could be very useful for Detection of "malware" by > placing a monitoring capability . My question is in two parts: > > (1) Is Wireshark the best tool to use for this within Qubes > (2) Should it be placed in Dom 0 (if indeed thats possible) or in the sys-net > or sys-firewall would be safer in sys-net, although sys-firewall would tell you which vm making the connection. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/526e10af-725a-4e45-a54c-4d2d2bac7c5c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Prob installing VLC in Fedora24 Template
On Wednesday, January 18, 2017 at 5:01:54 AM UTC-5, Arnulf Maria Bultmann wrote: > > > > > > ya weird. not sure why, did you make any changes to the templates > > > > is there a clean all command maybe u can try. > > sorry I don't understand what you mean writing "is there a clean all command > ...". > The template itself is unchange I mean try sudo dnf clean all. Not sure why it works when installed in the appvm but not the template. Maybe try removing the rpmfusion repos. then dnf update. then add them again? Maybe someone else can chime in. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9077a887-b017-484c-ba9c-06f75e9a83c9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: Can anyone recommend a video card for Qubes
On Wednesday, January 18, 2017 at 5:00:14 AM UTC-5, qmast...@gmail.com wrote: > среда, 18 января 2017 г., 7:21:37 UTC+3 пользователь raah...@gmail.com > написал: > > On Saturday, January 14, 2017 at 2:20:23 PM UTC-5, tai...@gmx.com wrote: > > > On 01/14/2017 12:15 PM, qmaster...@gmail.com wrote: > > > > > > > суббота, 14 января 2017 г., 5:01:34 UTC-5 пользователь Chris Willard > > > > написал: > > > >> Hello All, > > > >> > > > >> I am using my on-board video but only getting 1024x768 resolution so > > > >> wondered if there is another video card type I could use. > > > >> > > > >> -- > > > >> Best regards, > > > >> Chris > > > >> > > > > any AMD graphic card should be great for Qubes, because AMD has pretty > > > > good open source drivers for Linux. Dont get NVIDIA because in that > > > > case you would have to use NVIDIA closed source drivers with hidden > > > > backdoors and proven telemetry; nouveau is still not in a good shape, > > > > probably because no real assistance from NVIDIA - they want everyone to > > > > use their closed source stuff > > > > > > > Wait the nvidia linux drivers have telemetry? > > > I thought it was only windows, and only if you install the "geforce > > > experience". > > > > > > Irreguardless nvidia is an awful company that adds "bugs" to nerf > > > featuresets on non-windows platforms, and they make it hard to attach > > > the card to a virtual machine (ex: error 43). > > > > > > Just say NO to binary blobbed hardware. > > > > no not open source drivers. It really don't matter if its amd or nvidia. > > I actually think the nvidia drivers are way better then amd for linux. I > > use a gtx 650 and its always run great on linux. proprietary drivers > > better for gaming. open source better for the linux desktops.What you > > would want to do is just research the card model how it performs with > > linux. and even more compatible would be the onboard intel like you are > > already using. But I guess you would have to update the board in that case > > to get latest resolutions and desktop effects. > > People who are using QubesOS usually care a lot about security, so: while > NVIDIA closed source drivers probably have a better quality/performance than > AMD open source drivers, NVIDIA closed source drivers are not an option just > because their source code is closed (and also because it is a painful > experience to update/maintain them) > > Last time I tested, 1 year ago it was like that (">" means "better than") : > NVIDIA closed source > AMD open source > AMD closed source > NVIDIA open > source (nouveau) > > Meanwhile, AMD drivers have been improving quickly during the recent times, > so it could be just a matter of time before AMD open source drivers become > better than NVIDIA closed source drivers (both in quality and performance) they only have better performance in gaming. Like steam. When it comes to xfce and kde desktops. the open source drivers give BETTER performance with my nvidia card then proprietary. Meaning no screen flickering with opengl effects in kde as example. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ef2a1ffb-8152-456d-b098-2e82022ef017%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: USB & PCIe devices management questions
On Wednesday, January 18, 2017 at 4:58:00 AM UTC-5, Grzesiek Chodzicki wrote: > W dniu sobota, 14 stycznia 2017 16:43:35 UTC+1 użytkownik B&B napisał: > > Hello, for starters, pardon my ignorance, I am at the very beginning of the > > learning curve. > > I am planning out a new workstation build, I want to plan it out with Qubes > > in mind. But I have few questions, as I do not have a Qubes compatible > > desktop right now, and my laptops are not really good to experiment with it. > > > > I want to add and assign a secondary GPU to a Windows based VM, to be used > > as a gaming and CAD machine. If I do that, what about monitor output, if > > primary GPU is in dom0, do I need to connect second GPU to a monitor, or > > can I route the signal somehow without additional hardware? > > I want to use few, separate, color coded USB hubs(spray paint for the win), > > each attached to different domain, with same color coding. I want it to > > work as seamlessly as possible, preferably with no additional steps after I > > attach/detach any device to/from a hub. It simply shows into a VM and acts > > accordingly. I have problem understanding how the qvm-pci and USB > > management works in this area. Is my planned use case even achievable or do > > I need to manage each device every single time I attach it? > > Is assigning devices to vms persistent after booting, or can be made > > persistent? > > GPU passthrough should work out of the box now so that's doable although I'm > afraid You're going to need a second monitor for that to work. > > As for the hubs, this might be tricky without a large number of separate USB > controllers. oh wow thats great. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/de77d4fc-9bff-4b79-9d69-794c6b79983d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes 3.1 and 3.2(rc2) video driver question
On Sunday, August 7, 2016 at 12:29:24 PM UTC-4, Dima Puntus wrote: > Hi, > > > I'd like to know if there's a way to fix the terrible screen tearing that I'm > getting both on internal laptop screen and external monitor. > > > System info: > > > HP Elitebook 2570p: > Intel HD4000 graphics > CPU i7-3840QM > > > I know there's an Intel Graphics driver for Linux package by 01 dot org, but > I'm unable to install it in dom0 due to multiple dependencies which are > missing. What's the best approach to update the video driver? > > > Thank you > Dimitry > Have you used this machine on a baremetal linux? IMO this is a linux desktop issue. You can google the many solutions on how to fix this, but it might be in vain. Sometimes open vs prop drivers make a diff, sometimes playing with compositing and opengl settings helps. But don't get your hopes up. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/66a99758-718f-466d-baf5-baf46afad5a3%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Re: All audio on streaming video out of sync
On Wednesday, January 18, 2017 at 12:44:28 AM UTC-5, Gaijin wrote: > On 2017-01-18 04:35, raahe...@gmail.com wrote: > > On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote: > >> All of the audio for videos played on my AppVMs, regardless of what > >> template it's based on (Fedora 24/Debian 8), or what browser I try > >> (Firefox/Chrome/Vivaldi), is completely out of sync. It's not just > >> YouTube, but Vimeo, self-hosted, etc. > >> > >> I tried uncommenting audio_low_latency in /etc/qubes/quid.conf in dom0 > >> That didn't fix things. > >> I tried playing with the realtime-priority in /etc/pulse/daemon.conf > >> That didn't seem to make any difference. > >> > >> Are there any other places where I could try to fix this latency > >> issue? > >> I assume it's dom0 as everything is affected. > > > > whats your pc specs/ what soundcard? > > I'm running Qubes R3.2 > Sound is going through an nVidia GeForce GTX 560 Ti card. I don't have > nVidia drivers installed. > This machine has an Intel Core i7 2600 @ 3.40GHz CPU and 16.0GB > Dual-Channel DDR3 @ 665MHz RAM. How are you plugging it in? HDMI? if so you got further then I did. I dont' get sound from hdmi only video. Why not just use the onboard sound card? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d42d175e-30cb-40ec-b0fd-36727a837349%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Web video suddenly plays at 1/6 speed
On Friday, January 13, 2017 at 6:48:06 PM UTC-5, justin.h...@gmail.com wrote: > I have a recent desktop machine running Qubes 3.2 on a 4GHz i7 with 16GB of > RAM > and integrated Intel graphics. Until yesterday, I'd been happily watching > Netflix and Youtube videos without any trouble. > > Then I boot up my PC one day and suddenly playback on those sites is at about > 1/6 speed--totally unwatchable. It's the same whether the Qube is based on > fedora-23, fedora-24, debian-8, or debian-9. It also doesn't matter whether I > use Firefox or Chrome. It still happens on a fresh Qube made from an untouched > template. > > Performance otherwise is great--my connection is testing at about 50Mb, > applications (including browsers) are fast and responsive as ever. I can even > watch videos in VLC without any problems. It's only browser-based playback > that > doesn't work, and it never works no matter what. > > I didn't do anything unusual before this started happening except trim all the > templates (which I'd never done) and update all the templates (which I do > regularly). > > I'm completely baffled by this, so I'm turning to the list for help. Any > ideas? I've believed appvms are trimmed already and only dom0 might need manually trimming. But I could be wrong. Weird how its only your browsers affected. Have you tried deleting the appvm's and recreating them? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8053ec24-9d16-4e6c-9f15-cb4436dfee69%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Emergency Mode after Idle
On Sunday, July 21, 2013 at 7:52:23 PM UTC-4, Qubes Fan wrote: > Whenever I leave my Qubes machine on overnight and come back in the morning, > I am greeted by a screen which says "Welcome to emergency mode!..." > > It says to enter the root password. Trying to enter my disk encryption > password doesn't do anything, and there is only one chance to enter the > password before all input is just printed on the screen as plaintext. The > only solution is ctrl-alt-del, which then shows the normal Qubes shutdown > screen (blue, with Qubes logo in center, and progress bar). This happens when > VMs are running and the computer is left unattended. It also happens even > when no VMs are running (i.e. only dom0 is running) and the computer is left > unattended. The computer does not suspend (suspend has been turned off in the > Power Management setting), so that can't be it. Any ideas? all of a sudden I'm having similar issues. I believe the pc did not wake proplery after suspending for over 5 hours. Cause when I went to updat3 fedora24 vm it gave me read only errors on a lib64.so.1 file I think it was. Then I went to update dom0 and got segfaults. SO then I rebooted the pc, it is now only booting into emergency mode right after I enter encryption password. Yikes, I'm not sure what to do here? Try to mount /mnt/sysimage and reinstall grub? is there something else I can check/try? I haven't backed up in a month and would like to save some data before reinstalling. I was just telling someone how I haven't had any real isuses with qubes since using it. I must of jinxed myself, cause it doesn't get worse then this lol. HDD health is ok. so I guess I should also probably give up on suspend. I originally had issues of it freezing alot in 3.1, but I've changed settings to suspend after two hours, and have had it suspend for hours many times since with no issue until today. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/31734d86-697e-49a9-a9d6-ae21c625d3e6%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.