[qubes-users] Qubes 4.0-RC4 – sys-usb – devices not detected after suspend/resume
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello. Mostly, not always, usb devices are not detected any more after suspend/resume (e.g. via Power Manager/Xscreensaver) on my machine (Asus Zenbook UX303LNB). Which is no big deal with »standard« devices – but pretty annoying if you have a specific, rigid Yubikey setup. ;) Any hints or solutions? Perhaps forcing USB 2.0 modes? Thanks, cheers, Rob -BEGIN PGP SIGNATURE- iQKTBAEBCgB9FiEEn4MBjePgsWS+NbV8RR68spzrChwFAlqDc+VfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDlG ODMwMThERTNFMEIxNjRCRTM1QjU3QzQ1MUVCQ0IyOUNFQjBBMUMACgkQRR68spzr Chwq0g//ZFO/m7d09Tcl7MuBZEMz5KkJWxMLi/tBNf4wnt0MYh9k2vvGeTc6W5Wg I1g/M8UtLViRMhr/un/fHp3ZwITf4I9LDjhlfadLzR4Mdyk915uW3sqQsBhxIna4 N/QLGoBtq4MLp141CXkNZJKy6ydX3Ftdye5AEkq0E0OjC1Lh8tX+yOkNmag8ort3 Mgbq6XkGjVuoX4cxYdf+hxgUIfx7mgLwUP/MwqO4Y5KgA2Hcdtkyl/ARND9dC7/q GDIevxO8XMeDSOStufUSeToiMN4Xlieg1kkUncIl33ZUeZbRt0La/ccpXn0jz14t RhmahF40PtHZmg4vVevLCyVvpnm8WPCxbyK/8cBU78z9vnmqILNJjVhMqeeTSoGe b3jzS0HkP7J47tDD+U4bRi+ReJe3ZitbopRLpONb9xGaxHqgmSSsQM/non+stXa6 NDD5quMguCQL6YpOMZw4K9uDIBEVN3YmXoq8zFbAUGgMipBmEBTHZl4u6Zd2dgCP xOh7JA1r0fq6fB7/TYDf/jENhWbuUm7R8/6zQBE2EalHFQM8oPUzDSz5XBU9sFm9 rdUCai5HevcGDANXTkrP8nb2rmnUBe0TRIm0Z1rgEMkrP2jpBswW9mv+1KNj3YXb CWtgIHdXj5fAJLqii9AAuEc2A0lK8VUhJlhLutyql/NxQII78oY= =AFFn -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/p5vs1j%24gae%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 4.0 / Qubes in general
On Sun, 4 Feb 2018 12:17:41 -0800 (PST) Yuraeithawrote: > I think discussion is good and healthy, though I don't feel it's entirely > fair to paint it black > and white like this. I can agree on many problems, but I think they look very > different in > different light and perspectives, so lets try shake it up a bit. I'm not > claiming to be right, > this is just my perspective of things. > > The ancient city Rom wasn't build in one day, it took many decades and even > centuries. And as > awokd said, the security in Qubes is rapidly evolving in short time, which is > hard to deny. Qubes > is heavily disrupting the security industry, which has been too stagnant and > slowly reactive > developing over many years, rather than a proactive forward looking > perspective, which Qubes has. > > The priority is first and foremost security, right? Everything else besides > that is pretty much > secondary or lower. Ease of use and emotional related things, such as good > looking and appeal, > will come even lower than secondary (don't get me wrong though, I do love > good looking systems > too my self). > > While the Qubes OS team could need more funding and donations, I don't think > they are feeling > ready yet to go and market themselves before the security is on an even > higher level. And this I > think is very justified in a logical sense seen from an understanding of > market perspective, once > you start market it, if the security isn't good enough, then Qubes will just > become a short-lived > fire-fly that only lives 24 hours, before everyone forgets about it again. > For proper marketing, > you need to be ready before spreading the hype. This is why many open source > projects dye out > too, they don't live long enough to be ready to deliver, or they deliver too > early or too late. > As I see it, the Qubes developers are currently doing a good job enduring. > Security is also the > main target group to begin with too, so I feel it's overall very justified to > focus all their > energy on security and secondary ease-of-use problems, important mainstream > hardware support, and > so on. > > We're in early times, and as I see it, currently the fundamentals are being > build in Qubes. The > structure which everything else ontop will be changed in the future. I think > it's very wrong to > look at Qubes 4 as how Qubes will look like in the future. This is a deep > mistake from other > Linux OS's which are very conservative, unchanging, and by all means have an > ingrained reactive > thinking pattern, rather than proactively thinking pattern. I think the Qubes > developers have a > good forward looking foresight, and this is part of the reason why I like it > so much. But for > this reason too, Qubes is often misunderstood if they do things in Qubes 4, > which may first show > its full potential in Qubes 5 or Qubes 6. > > There is also the question of how much of this is upstream issues? Not > everything is Qubes to > fix, and it certainly would be ill advized to start doing what for example > Red Hat is doing and > change the code, which has to be done everytime a new update arrives from > upstream. Although I > have to admit I have little understanding of codes. > > Also currently we're still seeing rapid development of security in Qubes, and > it's still going. > The primary developers of Qubes are busy, so I don't think it's justified to > say any should shift > focus to fix lower priority nice looks and appeals, like icons (although I do > enjoy good looking > systems, but it's too soon as there are other things to be done in Qubes > first). Why are other > developers from the outside not helping with this? The Qubes developers are > busy enough with the > security aspect as it is after all. Also if more people helped, and more put > up donations > (avoiding too early wide-spread hype though, there is a good timing for > everything), then perhaps > we can get issues fixed like missing icons, and so earlier than otherwise. > > Which programs and apps can't you run in Qubes? I mean, I can even run > Android with Android > apps, it's pretty amazing. What sort of programs do you have that can't run > that well on Qubes? > Maybe it can be fixed? > > Lets not forget, Qubes 4 was about future-proofing Qubes. Currently many > things need to be > fixed again after having ripped everything apart and putting it together with > many new parts and > design shape. Qubes 4 is in many ways, in my understanding, really about > making the upcoming > Qubes 5 and onward possible, which is to say, Qubes 4 may not seem so > special, but I'm sure it > will start to show and build up when we're seeing Qubes 5. > > I agree there are problems, and I'm happy to discuss it too. But we must not > forget to put > everything into different perspectives to see things in different ways. This > too is why > discussions like these are so good and amazing, it
[qubes-users] HCL Support File (.cpio.gz) / secure + private messaging?
Hello. Whereto could I send my HCL Support File (.cpio.gz)? Would it still be helpful? (Qubes 4.0-rc4 on Asus »Zenbook« UX303LNB) Best regards, R. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/p5854k%24ng6%242%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] HCL - Asus »Zenbook« UX303LNB - Qubes 4.0-rc4
Just my first impressions from a quite fresh Qubes 4.0-rc4 install on Asus »Zenbook« UX303LNB. Needs further testing/playing around, of course, but basically it seems to run without severe problems. And that's all I need at this stage. Thank you VERY much, Qubes Team! Once again, the installation process is incredibly smooth and simple. (I chose all the proposed options, including Whonix.) I restored my AppVMs (no dom0, no templates) from latest Qubes 3.2 without big issues (so far). I call the AppVMs qubes now. ;) Best regards, Rob -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/p583tu%24ng6%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout. Qubes-HCL-ASUSTeK_COMPUTER_INC_-UX303LNB-20180204-234606.yml Description: application/yaml
[qubes-users] Qubes 3.2 after patching
Hello. So, I received Xen packages, version 4.6.6-36, via dom0 --enablerepo=qubes-dom0-security-testing. I changed 1) the (xscreensaver) password and 2) LUKS passphrase. Now the questions: Can I start with 3) disk reencrypting (reinstalling Qubes 3.2., restoring from backup) and 4) generating new secrets (PGP, passwords …) now – or do I have to wait until Xen 4.6.6-36 has landed in the stable repository? Or do I start 1)–4) of Qubes' »Suggested actions after patching« anew after Xen 4.6.6-36 has landed in stable repository? And how do I know when 4.6.6-36 has landed there? (I'm always updating Qubes via dom0 with --enablerepo=qubes-dom0-security-testing enabled and never faced problems with that.) Please excuse my confusion. Thanks, r. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/p4q7t2%241cg%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: How to deal with Yubikey ?
On Mon, 22 Jan 2018 22:47:55 -0800 (PST) ThierryITwrote: > I have today to deal with two problems: > > 1) I am using Yubikey to be authentified on some web site like > Github ... 2) I am using Yubikey to stock my PGP keys and to use them > with mainly my emails (Thinderbird+Enigmail) > > What to do under Qubes to make this possible ? > I have already sys-usb running. Hi. I studied and followed https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key as well as https://mig5.net/content/yubikey-challenge-response-mode-qubes and it works perfectly fine on Qubes 3.2, Fedora 26. And my skills are mediocre. (Sending *63* bits, »variable«, you'll recognize later.) However, Qubes' own tutorial can, of course, work flawlessly with your set-up: https://www.qubes-os.org/doc/yubi-key/ If you like to dig in deeper, see the discussions on Github: https://www.qubes-os.org/doc/yubi-key/ Best regards, r. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180125113702.770c2005.robotico%40posteo.es. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Announcement: Fedora 26 TemplateVM Upgrade
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Sat, 6 Jan 2018 18:15:21 -0600 Andrew David Wongwrote: > > Dear Qubes Community, > > Fedora 25 reached EOL ([end-of-life]) on 2017-12-12. We sincerely > apologize for our failure to provide timely notice of this event. Dear Qubes team and developers, please don't apologize for your incognizable hard and important work. ;) Cheers, rob -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJaU0npXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5RDk5RjYwMjVBMjMwQTc0NjExNkJCOERD NEZDQzQwQjUwMTY1NDg1AAoJEMT8xAtQFlSF9pIQAJcFYJlhDRulHcz+YGyFL5Kg 7gnOnsGcdSTjVJZ2pk1of+WhQHcx0xrdqxU5cnqxTyikXkeL4HPVL1wYtsCRpsZV jX9IETx75AXulMMCgEvRKGnB78AacVpuagzq7co/O/BthstW1vnxunNgRMBYLVmM XAYgf/JH+lfN7cARp6uW9OinXlHQg0MiU9MO+UboxZ5cpS8V5D6IWyLIxFG7sHO+ o+AHWg6Kk94ul/HawkvqPquEaC6FKdIjcoKIncqdpAzCEuMMwsowcEGx+ppvOeWJ oywccLydz/Zsl3seZODws8wchl06BYgSusAuPGWQt7jn4w66GX+XRmm9y5VpSicy vDa6JD+U0ski2Q1T5i7c7IuVCwQoiNwiRkDGqb1sSQTi5gPM3rj0U27h/G9nrD3S SryOuTDbwZRXyLeJMqydldBbjSygAMj+durBbGLg99JoqIfYUqxAmwfPdy4csnjR qVT2E9SA/11pDIUzWAIBe7wi75XFVxlKMa56eblMOPS1g1MQ/b+Q+OGeJKrI3N5s rRdqvDBQMVDyX3Ko/vp3CDH92hCSCL1L8x9DNYiuK8OleC43HYCfmL92Svy6EDL4 wj1AFz9y35KJpQdyP+Cnd03b9EsF+ThnCRAS4z6j0sd2h1YNGET2faltm6DBes+l 317JxVdFj64VGKAyvsdH =ZumN -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/p2vhhl%24kae%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Qubes 3.2 Split GPG with Claws mail client?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello. Does anybody know how to configure Claws mail client using Qubes' Split GPG? Would it be possible at all? Thanks, R. -BEGIN PGP SIGNATURE- iQJ8BAEBCgBmBQJaS4bOXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5RDk5RjYwMjVBMjMwQTc0NjExNkJCOERD NEZDQzQwQjUwMTY1NDg1AAoJEMT8xAtQFlSFRoUP/0yDOtK86UKySAQUgzJHz6fF QYPJdhEv2q+iEe6YsnK6WICEiQJmUerkQI8ofd8Rto8awZosouLirhYzNRb5rr5I QIP6qD9EYTM+aOYudNPoZpPpoyzInX5r2g1Y0tOPUVCSKbNMNSahsIdGiZPZqX6Z uSgfnXUW9h0NhM1UDMc5QaGmvVH2mq854ohZH0K9u6TCVUWEjQXu7pZk870hbdyK NZ2nSQ0US6UaxmMNZjUV5cQRO8SiANWruTBHXsmZPkFf85uIi0YEQYg28L8QBSRF 75iXUcONFt5cXM08U0bbvziPoCq+9Eg8dOHVBy+aaH5qiQfPX5Ui+2czLuHCUvbV nzULnzK5hnKD0k2seLpEDAIU1f9Bd2onf6cLKzciZ5d6H/K53H4dofLwWVTkMFuS w1N/sYo8Df6ahuYb6A11hrNs2gYkZxPZmL/SSE80mCqZKcv+EcSuUGcSl/1lERSY Nm+FMar9O954tL2lge7Jx2jWGDMQV/+/+6yzNT0gQehnA1Gn9DRQZE4MsTOPW1zM a9uKDaNUO2+I1+uGr7HpzYhNt7mkPR2JcbFnHluWfI1w0u2VcTHNCGWpdzGlk3Gp yH+S3wfNKn6lEsT0sqAHt7BCzyV9dyzYM8+BVgYyLR/ZdAr+tXthUcQ/c/ioLzSW 9bardbg4rqkQvLLdPaOA =GOFk -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20180102131910.2f4f0627.robotico%40posteo.es. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Yubikey challenge-response in Qubes 3.2., Xscreensaver etc
Hi, I'm not able to answer (technical issues) to the already existing corresponding emails here, so I'm trying to send this seperately. There's a quite new Qubes discussion/set-up here – not finished yet?: https://github.com/QubesOS/qubes-issues/issues/3307 https://github.com/QubesOS/qubes-doc/pull/478 I've also been following/studying mig5's proposals here: https://mig5.net/content/yubikey-challenge-response-mode-qubes https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key *Test it with Xscreensaver first in order to not lock you out of the system.* It looks like you have to play around with 'variable input' and 'fixed 64 bytes' in Yubikey personalization tool and sending 63 or 64 bytes in the yubikey-auth script. For me, Qubes 3.2., Fedora 25 sys-usbVM, it may differ for your set-up, mig5's version for now, not mixing up anything from the Qubes proposals worked perfectly, i.e., sending 63 bytes in the auth script, no spaces in the auth script for AES key, 'variable input' in Yubikey programming. *Adjust your new Yubikey settings at the right time for other apps, e.g. KeePassXC where challenge-response is working well.* Best regards. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/p1eaiu%241l5%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Yubikey in Challenge Response mode in Qubes 3.2
Hi. Can anybody confirm, set-up(s) described in the links below – thanks, mig5 ! – still work today, in completely updated Qubes 3.2, Yubikey Neo, usbVM Fedora 25? I'm not interested in locking me out of the system. ;) ( https://mig5.net/content/yubikey-challenge-response-mode-qubes ) https://mig5.net/content/yubikey-2fa-qubes-redux-adding-backup-key Cheers, thanks, Rob -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ovfdoi%24sgq%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Apparmor profiles whonix-ws
Hi. Is there anybody out there with some working Apparmor profiles for Thunderbird 52.4.0/Torbirdy/Enigmail/Split-GPG via Whonix? Thanks, cheers! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ouc8p0%24gfd%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Thunderbird 52.2.1 and Enigmail (1.8.2 in Debian 8/Jessie)
Hi all. This probably belongs to Whonix or Debian itself, but just to inform you (and ask 1 question): Enigmail seems to stop working with the update to Thunderbird/Icedove 52.2.1. I just found this hint so far: https://www.mail-archive.com/debian-user@lists.debian.org/msg718242.html Did you find more? Thanks, cheers, Rob -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ol9pfb%24311%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Qubes Blog ? and/or Fedora 25 notices ?
yreb-qusw: > updated to F25? that may be > recommended ? I did it four weeks ago (upgraded the existing F24 templates) an haven't been run in no issues at all. So: recommended from my point of view. https://www.qubes-os.org/doc/template/fedora/upgrade-24-to-25/ Cheers, Rob -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/416c605a-46c0-cbae-424d-4ea3dac5800b%40posteo.es. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Partially off-topic: best OpenVPN-Set-up with Qubes 3.2, AirVPN and Turris Omnia router?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 rob_66: >> What do you think would produce the best balance between security >> and speed? >> >> 1. Running AirVPN's client 'Eddie' in sys-netVM. >> >> 2. Putting AirVPN's OpenVPN config into Turris Omnia 2 GB >> router. >> >> 3. Setting up a VPN gateway in Qubes as described in Qubes' >> docs. >> >> Hardware: Asus »Zenbook«, Intel i5-5200U, 2.20 GHz, 12 GB RAM. Chris Laprise: > Best overall approach is to download your service's openvpn config > files and continue with the doc instructions or the slightly > fancier setup here: > > https://github.com/tasket/Qubes-vpn-support > > The one at the link (my own project) configures the link as a > systemd service... gives you more control. The anti-leak measures > are the same. > > I haven't looked at 'Eddie' but usually these proprietary tools > assume you are configuring a traditional PC. OTOH, Qubes proxyVMs > are akin to _routers_ so protection features in Eddie et al might > not work. (Anyway it would go in a proxyVM, not sys-net.) There was > some discussion here I think about Mullvad and that service's > special tool, and ultimately it was better to download the config > files and use the Qubes-specific instructions. > > As for Turris Omnia router setup, it depends on how much you trust > the security of that router -- generally, openvpn is safer in Qubes > than in router hardware (even the 'impressive' ones). Hello again. Even as a medium talented/experienced Qubes and Linux user I managed to run your »slightly fancier« setup successfully in less than an hour, following the instructions slowly, step by step. Speeds are impressive also, > 60 MBit/s (100 MBit max. according to the ISP) – I never reached this with my VPN before, neither with the »impressive« Turris Omnia. AirVPN's 'Eddie' client seems to work fine, too, but I'm not sure if the protection features are working correctly. Maybe more advanced users would get a grip on 'Eddies' numerous settings. Thank you so much, Chris! Best regards, rob -BEGIN PGP SIGNATURE- iQIwBAEBCgAaBQJZKrlRExxyb2JvdGljb0Bwb3N0ZW8uZXMACgkQxPzEC1AWVIXX OQ//UqX2moA7iIYJRC4+JqZotFtV/AyqLg6Iiw4w684y6paQRUTvR9T/NfBNSrv9 H7OrEndjGpMlzklRRlXmHEYnSsZyOHWc0dlPnrqfd/8uuaNDjqCNR2XhrjxSBTrs Szdn4StKqg8McKkAurli6r1mhQNT0hcyC5KU/mnu0tW2f3HNk4giK4Rv9zIQdjbi u8XfWxAlApgbYgMaTFNtUASBCJYVc8SFdTwRy1i+Jl24ga8B/uBmM0mZEXEZ5NOa OpF6PRbs89I8UiQE0PhtsrPuIupX+8BpZpOuNFbpXNc0gKJWIMOMtOYgbNZpouFu 7JlJe+UwuNS6EZbgKLqw7f6eQz0zGf3YMZHbx61TmAYRDzcJiKzwApZ6eHRr9WL5 wYKBTdSDdobC5VxsfDYOXN6HEc2DvRiajBPSpUgPPNDIfh1Qx+Yz308koYCBW5CS o8iRaH76q/bwQByHc/4QfLfAZqwTlgLmV9HsJb7pPe0LhUADh9HUL7Zae/VOygEz puIA97EUqn3GgyXuKANfT6mfMqZPtcQQSvfz/+dRjxMPJP+4xsJ6couYdEtPJCxj q0mTztLotME064ica9aECONRHERqQairezVgsy2wpPkqcSqZbYCMIAy4olkFGw7N 1/DL9B0BvA9j8/BqnMtwaBm6ZoeRJwVTCBAcDH7SYNaO83g= =Y/Xw -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d991e9f3-9435-8fe7-2853-9b6a97dc786e%40posteo.es. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Partially off-topic: best OpenVPN-Set-up with Qubes 3.2, AirVPN and Turris Omnia router?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello all. What do you think would produce the best balance between security and speed? 1. Running AirVPN's client 'Eddie' in sys-netVM. 2. Putting AirVPN's OpenVPN config into Turris Omnia 2 GB router. 3. Setting up a VPN gateway in Qubes as described in Qubes' docs. Hardware: Asus »Zenbook«, Intel i5-5200U, 2.20 GHz, 12 GB RAM. Any hint is very much appreciated. Best regards, rob -BEGIN PGP SIGNATURE- iQIwBAEBCgAaBQJZKfkXExxyb2JvdGljb0Bwb3N0ZW8uZXMACgkQxPzEC1AWVIWA ARAAjsidL/LbmAmfwL0u+9F3rmcm6sLA/dLlI2NEJbNAA64YwP2UUbCOGh1+ELz2 pzrmeKdAmkBU2pu2XP7AuH85rNSf0t+PoN9mqYBJjkWL78QNYSHB1i+E4exwr4EF l+F+0+rJHx6+OGQJBqXxahPCiAckA1AnGg/O5ttRFu/YzyHyLWooGUnjObfAlu8D gwPF+7vtCSygWYPumq2E9A50NeO0NmLHmhQ7IjzXcs/EVQ+sh+fkQWLXNwa0reEY XMAbYXyRqL5lKcMiUtRVuRDuNDNEqg1dgqRQQ1lUpg0oBGjVaYctmMScDpU9BZ0w KUYtX815mx8gPep+iOKzLpBWVt2l5+Rt4bfPeg4vSmb20sAy+wwvmB/eiCFMs0zM JwNnG20q8rf+O7qklkLSe5MhK4tz0+BV/Mp4cyWKrcLrObtvIGB9BS3QuogbLDG2 Yx0bAwLRTBl50swx82jQ666b82NT4ZxIzmfQRlmbGQ0hOIFS1UpDsw1uTgtWOkYy Rl0pqftFpyqzmvuiFL3G9jJPFgtyv+CSFUDpspDggMiZWCGva+Ip/azlBg93l7iC 6IODaS/iwPouSv4EAh50H/HpMZc1DvzRsgcLknbpm/2JpaJMbh10oSYnZbIFHiy0 cfETKcy1Ksr6beW+DTfbgGGnycT7CDfAAr4W0711SXsXlig= =yvA1 -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d4f6795a-96b1-a951-17b3-dfbe6b591b0c%40posteo.es. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Re: Maccchanger, debian9 template, Screensave
Finsh: > 1: Maccchanger. > maybe debian is missing the hardware-driver? > if so, how do i get and install it in the terminal? Hi, Finsh. I'm not an expert either, but the following worked for me on my – different – machine: In your macchanger-debian9-VM, let's call it 'spoofVM', you open a terminal and perform this to get (above the output of my computer): user@spoofVM:~$ lspci -knn 00:00.0 Network controller [0280]: Intel Corporation Wireless 7265 [8086:095a] (rev 59) Subsystem: Intel Corporation Dual Band Wireless-AC 7265 [8086:5100] Kernel driver in use: iwlwifi Kernel modules: iwlwifi If you're lucky, the iwlwifi package (https://packages.debian.org/stretch/firmware-iwlwifi) contains your network controller as well, and you follow the installation instructions here: https://wiki.debian.org/iwlwifi (replace Debian 8 "Jessie" with Debian 9 "Stretch") If not, at least the prodedure should be clear. > 3. Eyecandy > Is there a possibility to customize the Xscreensaver wallpaper? Did you already play around with 'System Tools > Screensaver' under the white on blue 'Q'-menu (probably in the top left corner)? Good luck and best regards, rob -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/5b80cbb0-3cb0-ebc0-d8d6-ddc73ebcf633%40posteo.es. For more options, visit https://groups.google.com/d/optout.