[qubes-users] Qubes 4.0-RC4 – sys-usb – devices not detected after suspend/resume

2018-02-13 Thread rob_66
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hello.

Mostly, not always, usb devices are not detected any more after suspend/resume 
(e.g. via
Power Manager/Xscreensaver) on my machine (Asus Zenbook UX303LNB).

Which is no big deal with »standard« devices – but pretty annoying if you have 
a specific, rigid
Yubikey setup. ;)

Any hints or solutions? Perhaps forcing USB 2.0 modes?

Thanks, cheers,
Rob
-BEGIN PGP SIGNATURE-
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=AFFn
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/p5vs1j%24gae%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 4.0 / Qubes in general

2018-02-05 Thread rob_66
On Sun, 4 Feb 2018 12:17:41 -0800 (PST)
Yuraeitha  wrote:

> I think discussion is good and healthy, though I don't feel it's entirely 
> fair to paint it black
> and white like this. I can agree on many problems, but I think they look very 
> different in
> different light and perspectives, so lets try shake it up a bit. I'm not 
> claiming to be right,
> this is just my perspective of things. 
> 
> The ancient city Rom wasn't build in one day, it took many decades and even 
> centuries. And as
> awokd said, the security in Qubes is rapidly evolving in short time, which is 
> hard to deny. Qubes
> is heavily disrupting the security industry, which has been too stagnant and 
> slowly reactive
> developing over many years, rather than a proactive forward looking 
> perspective, which Qubes has. 
> 
> The priority is first and foremost security, right? Everything else besides 
> that is pretty much
> secondary or lower. Ease of use and emotional related things, such as good 
> looking and appeal,
> will come even lower than secondary (don't get me wrong though, I do love 
> good looking systems
> too my self). 
> 
> While the Qubes OS team could need more funding and donations, I don't think 
> they are feeling
> ready yet to go and market themselves before the security is on an even 
> higher level. And this I
> think is very justified in a logical sense seen from an understanding of 
> market perspective, once
> you start market it, if the security isn't good enough, then Qubes will just 
> become a short-lived
> fire-fly that only lives 24 hours, before everyone forgets about it again. 
> For proper marketing,
> you need to be ready before spreading the hype. This is why many open source 
> projects dye out
> too, they don't live long enough to be ready to deliver, or they deliver too 
> early or too late.
> As I see it, the Qubes developers are currently doing a good job enduring. 
> Security is also the
> main target group to begin with too, so I feel it's overall very justified to 
> focus all their
> energy on security and secondary ease-of-use problems, important mainstream 
> hardware support, and
> so on.
> 
> We're in early times, and as I see it, currently the fundamentals are being 
> build in Qubes. The
> structure which everything else ontop will be changed in the future. I think 
> it's very wrong to
> look at Qubes 4 as how Qubes will look like in the future. This is a deep 
> mistake from other
> Linux OS's which are very conservative, unchanging, and by all means have an 
> ingrained reactive
> thinking pattern, rather than proactively thinking pattern. I think the Qubes 
> developers have a
> good forward looking foresight, and this is part of the reason why I like it 
> so much. But for
> this reason too, Qubes is often misunderstood if they do things in Qubes 4, 
> which may first show
> its full potential in Qubes 5 or Qubes 6.
> 
> There is also the question of how much of this is upstream issues? Not 
> everything is Qubes to
> fix, and it certainly would be ill advized to start doing what for example 
> Red Hat is doing and
> change the code, which has to be done everytime a new update arrives from 
> upstream. Although I
> have to admit I have little understanding of codes. 
> 
> Also currently we're still seeing rapid development of security in Qubes, and 
> it's still going.
> The primary developers of Qubes are busy, so I don't think it's justified to 
> say any should shift
> focus to fix lower priority nice looks and appeals, like icons (although I do 
> enjoy good looking
> systems, but it's too soon as there are other things to be done in Qubes 
> first). Why are other
> developers from the outside not helping with this? The Qubes developers are 
> busy enough with the
> security aspect as it is after all. Also if more people helped, and more put 
> up donations
> (avoiding too early wide-spread hype though, there is a good timing for 
> everything), then perhaps
> we can get issues fixed like missing icons, and so earlier than otherwise.
> 
> Which programs and apps can't you run in Qubes? I mean, I can even run 
> Android with Android
> apps, it's pretty amazing. What sort of programs do you have that can't run 
> that well on Qubes?
> Maybe it can be fixed? 
> 
> Lets not forget, Qubes 4 was about future-proofing Qubes. Currently many 
> things need to be
> fixed again after having ripped everything apart and putting it together with 
> many new parts and
> design shape. Qubes 4 is in many ways, in my understanding, really about 
> making the upcoming
> Qubes 5 and onward possible, which is to say, Qubes 4 may not seem so 
> special, but I'm sure it
> will start to show and build up when we're seeing Qubes 5.
> 
> I agree there are problems, and I'm happy to discuss it too. But we must not 
> forget to put
> everything into different perspectives to see things in different ways. This 
> too is why
> discussions like these are so good and amazing, it 

[qubes-users] HCL Support File (.cpio.gz) / secure + private messaging?

2018-02-04 Thread rob_66
Hello. 

Whereto could I send my HCL Support File (.cpio.gz)?

Would it still be helpful? (Qubes 4.0-rc4 on Asus »Zenbook« UX303LNB)

Best regards, R.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/p5854k%24ng6%242%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Asus »Zenbook« UX303LNB - Qubes 4.0-rc4

2018-02-04 Thread rob_66
Just my first impressions from a quite fresh Qubes 4.0-rc4 install on Asus 
»Zenbook« UX303LNB.

Needs further testing/playing around, of course, but basically it seems to run 
without severe
problems. And that's all I need at this stage. Thank you VERY much, Qubes Team! 

Once again, the installation process is incredibly smooth and simple. (I chose 
all the proposed
options, including Whonix.)

I restored my AppVMs (no dom0, no templates) from latest Qubes 3.2 without big 
issues (so far).
I call the AppVMs qubes now. ;)

Best regards, Rob

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/p583tu%24ng6%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-ASUSTeK_COMPUTER_INC_-UX303LNB-20180204-234606.yml
Description: application/yaml


[qubes-users] Qubes 3.2 after patching

2018-01-30 Thread rob_66
Hello.

So, I received Xen packages, version 4.6.6-36, via dom0 
--enablerepo=qubes-dom0-security-testing.

I changed 1) the (xscreensaver) password and 2) LUKS passphrase.

Now the questions: 

Can I start with 3) disk reencrypting (reinstalling Qubes 3.2., restoring from
backup) and 4) generating new secrets (PGP, passwords …) now – or do I have to 
wait until Xen
4.6.6-36 has landed in the stable repository?

Or do I start 1)–4) of Qubes' »Suggested actions after patching« anew after Xen
4.6.6-36 has landed in stable repository?

And how do I know when 4.6.6-36 has landed there? (I'm always updating Qubes 
via dom0 with
--enablerepo=qubes-dom0-security-testing enabled and never faced problems with 
that.)

Please excuse my confusion.

Thanks, r.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/p4q7t2%241cg%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: How to deal with Yubikey ?

2018-01-25 Thread rob_66
On Mon, 22 Jan 2018 22:47:55 -0800 (PST)
ThierryIT  wrote:
 
> I have today to deal with two problems:
> 
> 1) I am using Yubikey to be authentified on some web site like
> Github ... 2) I am using Yubikey to stock my PGP keys and to use them
> with mainly my emails (Thinderbird+Enigmail)
> 
> What to do under Qubes to make this possible ?
> I have already sys-usb running. 

Hi.

I studied and followed
https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key as
well as https://mig5.net/content/yubikey-challenge-response-mode-qubes
and it works perfectly fine on Qubes 3.2, Fedora 26. And my skills
are mediocre. 

(Sending *63* bits, »variable«, you'll recognize later.)

However, Qubes' own tutorial can, of course, work flawlessly with your
set-up:

https://www.qubes-os.org/doc/yubi-key/

If you like to dig in deeper, see the discussions on Github: 

https://www.qubes-os.org/doc/yubi-key/

Best regards,
r.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180125113702.770c2005.robotico%40posteo.es.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Announcement: Fedora 26 TemplateVM Upgrade

2018-01-08 Thread rob_66
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Sat, 6 Jan 2018 18:15:21 -0600
Andrew David Wong  wrote:

> 
> Dear Qubes Community,
> 
> Fedora 25 reached EOL ([end-of-life]) on 2017-12-12. We sincerely
> apologize for our failure to provide timely notice of this event. 


Dear Qubes team and developers,

please don't apologize for your incognizable hard and
important work. ;)

Cheers,

rob
-BEGIN PGP SIGNATURE-
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=ZumN
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/p2vhhl%24kae%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 3.2 Split GPG with Claws mail client?

2018-01-02 Thread rob_66
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hello.

Does anybody know how to configure Claws mail client using Qubes' Split
GPG?

Would it be possible at all?

Thanks, R.
-BEGIN PGP SIGNATURE-

iQJ8BAEBCgBmBQJaS4bOXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5RDk5RjYwMjVBMjMwQTc0NjExNkJCOERD
NEZDQzQwQjUwMTY1NDg1AAoJEMT8xAtQFlSFRoUP/0yDOtK86UKySAQUgzJHz6fF
QYPJdhEv2q+iEe6YsnK6WICEiQJmUerkQI8ofd8Rto8awZosouLirhYzNRb5rr5I
QIP6qD9EYTM+aOYudNPoZpPpoyzInX5r2g1Y0tOPUVCSKbNMNSahsIdGiZPZqX6Z
uSgfnXUW9h0NhM1UDMc5QaGmvVH2mq854ohZH0K9u6TCVUWEjQXu7pZk870hbdyK
NZ2nSQ0US6UaxmMNZjUV5cQRO8SiANWruTBHXsmZPkFf85uIi0YEQYg28L8QBSRF
75iXUcONFt5cXM08U0bbvziPoCq+9Eg8dOHVBy+aaH5qiQfPX5Ui+2czLuHCUvbV
nzULnzK5hnKD0k2seLpEDAIU1f9Bd2onf6cLKzciZ5d6H/K53H4dofLwWVTkMFuS
w1N/sYo8Df6ahuYb6A11hrNs2gYkZxPZmL/SSE80mCqZKcv+EcSuUGcSl/1lERSY
Nm+FMar9O954tL2lge7Jx2jWGDMQV/+/+6yzNT0gQehnA1Gn9DRQZE4MsTOPW1zM
a9uKDaNUO2+I1+uGr7HpzYhNt7mkPR2JcbFnHluWfI1w0u2VcTHNCGWpdzGlk3Gp
yH+S3wfNKn6lEsT0sqAHt7BCzyV9dyzYM8+BVgYyLR/ZdAr+tXthUcQ/c/ioLzSW
9bardbg4rqkQvLLdPaOA
=GOFk
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180102131910.2f4f0627.robotico%40posteo.es.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Yubikey challenge-response in Qubes 3.2., Xscreensaver etc

2017-12-20 Thread rob_66
Hi,

I'm not able to answer (technical issues) to the already existing
corresponding emails here, so I'm trying to send this seperately.

There's a quite new Qubes discussion/set-up here – not finished yet?:

https://github.com/QubesOS/qubes-issues/issues/3307
https://github.com/QubesOS/qubes-doc/pull/478

I've also been following/studying mig5's proposals here:

https://mig5.net/content/yubikey-challenge-response-mode-qubes
https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key

*Test it with Xscreensaver first in order to not lock you out of the
system.*

It looks like you have to play around with 'variable input' and 'fixed
64 bytes' in Yubikey personalization tool and sending 63 or 64 bytes
in the yubikey-auth script.

For me, Qubes 3.2., Fedora 25 sys-usbVM, it may differ for your set-up,
mig5's version  for now, not mixing up anything from the Qubes proposals
 worked perfectly, i.e., sending 63 bytes in the auth script, no spaces
in the auth script for AES key, 'variable input' in Yubikey programming.

*Adjust your new Yubikey settings at the right time for other apps, e.g.
KeePassXC where challenge-response is working well.*

Best regards.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/p1eaiu%241l5%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Yubikey in Challenge Response mode in Qubes 3.2

2017-11-26 Thread rob_66
Hi.

Can anybody confirm, set-up(s) described in the links below – thanks,
mig5 ! – still work today, in completely updated Qubes 3.2, Yubikey Neo,
usbVM Fedora 25?

I'm not interested in locking me out of the system. ;)

( https://mig5.net/content/yubikey-challenge-response-mode-qubes )
https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key

Cheers, thanks,

Rob

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ovfdoi%24sgq%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Apparmor profiles whonix-ws

2017-11-13 Thread rob_66
Hi.

Is there anybody out there with some working Apparmor profiles for
Thunderbird 52.4.0/Torbirdy/Enigmail/Split-GPG via Whonix?

Thanks, cheers!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ouc8p0%24gfd%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Thunderbird 52.2.1 and Enigmail (1.8.2 in Debian 8/Jessie)

2017-07-26 Thread rob_66
Hi all.

This probably belongs to Whonix or Debian itself, but just to inform you
(and ask 1 question): Enigmail seems to stop working with the update to
Thunderbird/Icedove 52.2.1.

I just found this hint so far:
https://www.mail-archive.com/debian-user@lists.debian.org/msg718242.html

Did you find more?

Thanks, cheers,
Rob

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ol9pfb%24311%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Qubes Blog ? and/or Fedora 25 notices ?

2017-07-25 Thread rob_66
yreb-qusw:
> updated to F25? that may be
> recommended ?

I did it four weeks ago (upgraded the existing F24 templates) an haven't
been run in no issues at all.

So: recommended from my point of view.

https://www.qubes-os.org/doc/template/fedora/upgrade-24-to-25/

Cheers, Rob

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/416c605a-46c0-cbae-424d-4ea3dac5800b%40posteo.es.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Partially off-topic: best OpenVPN-Set-up with Qubes 3.2, AirVPN and Turris Omnia router?

2017-05-28 Thread rob_66
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

rob_66:
>> What do you think would produce the best balance between security
>> and speed?
>> 
>> 1. Running AirVPN's client 'Eddie' in sys-netVM.
>> 
>> 2. Putting AirVPN's OpenVPN config into Turris Omnia 2 GB
>> router.
>> 
>> 3. Setting up a VPN gateway in Qubes as described in Qubes'
>> docs.
>> 
>> Hardware: Asus »Zenbook«, Intel i5-5200U, 2.20 GHz, 12 GB RAM.


Chris Laprise:
> Best overall approach is to download your service's openvpn config
> files and continue with the doc instructions or the slightly
> fancier setup here:
> 
> https://github.com/tasket/Qubes-vpn-support
> 
> The one at the link (my own project) configures the link as a
> systemd service... gives you more control. The anti-leak measures
> are the same.
> 
> I haven't looked at 'Eddie' but usually these proprietary tools
> assume you are configuring a traditional PC. OTOH, Qubes proxyVMs
> are akin to _routers_ so protection features in Eddie et al might
> not work. (Anyway it would go in a proxyVM, not sys-net.) There was
> some discussion here I think about Mullvad and that service's
> special tool, and ultimately it was better to download the config
> files and use the Qubes-specific instructions.
> 
> As for Turris Omnia router setup, it depends on how much you trust
> the security of that router -- generally, openvpn is safer in Qubes
> than in router hardware (even the 'impressive' ones).


Hello again.

Even as a medium talented/experienced Qubes and Linux user I managed
to run your »slightly fancier« setup successfully in less than an
hour, following the instructions slowly, step by step.

Speeds are impressive also, > 60 MBit/s (100 MBit max. according to
the ISP) – I never reached this with my VPN before, neither with the
»impressive« Turris Omnia.

AirVPN's 'Eddie' client seems to work fine, too, but I'm not sure if
the protection features are working correctly. Maybe more advanced
users would get a grip on 'Eddies' numerous settings.

Thank you so much, Chris!

Best regards,

rob

-BEGIN PGP SIGNATURE-
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=Y/Xw
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d991e9f3-9435-8fe7-2853-9b6a97dc786e%40posteo.es.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Partially off-topic: best OpenVPN-Set-up with Qubes 3.2, AirVPN and Turris Omnia router?

2017-05-27 Thread rob_66
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hello all.

What do you think would produce the best balance between security and
speed?

1. Running AirVPN's client 'Eddie' in sys-netVM.

2. Putting AirVPN's OpenVPN config into Turris Omnia 2 GB router.

3. Setting up a VPN gateway in Qubes as described in Qubes' docs.

Hardware: Asus »Zenbook«, Intel i5-5200U, 2.20 GHz, 12 GB RAM.

Any hint is very much appreciated.

Best regards,
rob
-BEGIN PGP SIGNATURE-

iQIwBAEBCgAaBQJZKfkXExxyb2JvdGljb0Bwb3N0ZW8uZXMACgkQxPzEC1AWVIWA
ARAAjsidL/LbmAmfwL0u+9F3rmcm6sLA/dLlI2NEJbNAA64YwP2UUbCOGh1+ELz2
pzrmeKdAmkBU2pu2XP7AuH85rNSf0t+PoN9mqYBJjkWL78QNYSHB1i+E4exwr4EF
l+F+0+rJHx6+OGQJBqXxahPCiAckA1AnGg/O5ttRFu/YzyHyLWooGUnjObfAlu8D
gwPF+7vtCSygWYPumq2E9A50NeO0NmLHmhQ7IjzXcs/EVQ+sh+fkQWLXNwa0reEY
XMAbYXyRqL5lKcMiUtRVuRDuNDNEqg1dgqRQQ1lUpg0oBGjVaYctmMScDpU9BZ0w
KUYtX815mx8gPep+iOKzLpBWVt2l5+Rt4bfPeg4vSmb20sAy+wwvmB/eiCFMs0zM
JwNnG20q8rf+O7qklkLSe5MhK4tz0+BV/Mp4cyWKrcLrObtvIGB9BS3QuogbLDG2
Yx0bAwLRTBl50swx82jQ666b82NT4ZxIzmfQRlmbGQ0hOIFS1UpDsw1uTgtWOkYy
Rl0pqftFpyqzmvuiFL3G9jJPFgtyv+CSFUDpspDggMiZWCGva+Ip/azlBg93l7iC
6IODaS/iwPouSv4EAh50H/HpMZc1DvzRsgcLknbpm/2JpaJMbh10oSYnZbIFHiy0
cfETKcy1Ksr6beW+DTfbgGGnycT7CDfAAr4W0711SXsXlig=
=yvA1
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d4f6795a-96b1-a951-17b3-dfbe6b591b0c%40posteo.es.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Maccchanger, debian9 template, Screensave

2017-05-27 Thread rob_66
Finsh:
> 1: Maccchanger.
> maybe debian is missing the hardware-driver?
> if so, how do i get and install it in the terminal?

Hi, Finsh.
I'm not an expert either, but the following worked for me on my –
different – machine:

In your macchanger-debian9-VM, let's call it 'spoofVM', you open a
terminal and perform this to get (above the output of my computer):

user@spoofVM:~$ lspci -knn
00:00.0 Network controller [0280]: Intel Corporation Wireless 7265
[8086:095a] (rev 59)
Subsystem: Intel Corporation Dual Band Wireless-AC 7265 [8086:5100]
Kernel driver in use: iwlwifi
Kernel modules: iwlwifi

If you're lucky, the iwlwifi package
(https://packages.debian.org/stretch/firmware-iwlwifi) contains your
network controller as well, and you follow the installation instructions
here: https://wiki.debian.org/iwlwifi (replace Debian 8 "Jessie" with
Debian 9 "Stretch")

If not, at least the prodedure should be clear.

> 3. Eyecandy
> Is there a possibility to customize the Xscreensaver wallpaper?

Did you already play around with 'System Tools > Screensaver' under the
white on blue 'Q'-menu (probably in the top left corner)?

Good luck and best regards,
rob

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b80cbb0-3cb0-ebc0-d8d6-ddc73ebcf633%40posteo.es.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL – Asus UX303LNB "Zenbook", and more

2016-12-03 Thread rob_66
Hello everybody. Just some setup information.

As a quite unexperienced, unprofessional linux user (18 months) I
switched over to wonderful Qubes about a week ago. This is hard work, to
be honest, but I like it.

A very similar machine is already on the list: https://www.qubes-os.org/hcl/

Everything seems to work fine – no extreme-tuning yet, intense video
testing, very special key combinations etc.

Network printer Samsung SCX-4500 (printing via disposable VM), scanning
not tested
Asus wifi router RT-AC56U, Merlin, OpenVPN
Second display 21,5-inch Full HD (Mini DisplayPort)
Mouse and USB keyboard – I know ... (via sys-usb)

Minor issue: NetworkManager doesn't remember wifi password. Certainly my
fault somewhere.

MAC address anonymizing (macchanger, scripts, fedora 24, following
https://www.qubes-os.org/doc/anonymizing-your-mac-address/) killed
networking completely. Resetting the router was painful. Project
discontinued.

And here are the VMs and Templates, WIP, all set up following
https://www.qubes-os.org/doc/:

sys-net : fed-24-mini-clone
sys-firewall : fed-24-mini-clone
sys-usb : fedora-24 as NetVM (will be switched over to fed-24-mini-clone)
internet : fedora-24
vault : fedora-24 : no NetVM, of course
personal : fedora-24 : no NetVM
work : fedora-24 : no NetVM
mail (with Split GPG): fedora-24 : just contacts mail provider
banking : fedora-24 : just contacts bank
fedora-24-disposable-dvm : fedora-24-disposable
offline-bitcoin : debian-8-backports
watching-bitcoin : debian-8-backports

Send all your Bitcoins. Now!;) https://www.qubes-os.org/donate/

Best,

rob

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o1uf38%24gu5%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-ASUSTeK_COMPUTER_INC_-UX303LNB-20161203-021814.yml
Description: application/yaml