Re: [qubes-users] How to install Maple in a Fedora-30 template in Qubes OS R4.0 ?

2020-11-09 Thread 'awokd' via qubes-users

'M' via qubes-users:

I have received this file from a administrator at my workplace:
"Maple2020.1LinuxX64Installer.run" which I have downloaded to my work
domain.

My question is then: How can I install Maple in a Fedora-30 template in
Qubes OS R4.0. ... ?

Don't know Maple specifically, but if it's like most packages, you 
qvm-copy it to the template, then install it there. Be aware it will 
then be "installed" in all AppVMs based on that template.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b25663d3-7428-f7c6-850f-dddaf99e2104%40danwin1210.me.


Re: [qubes-users] Re: win7 seamless mode, teams, vmware

2020-11-09 Thread 'awokd' via qubes-users

Alex Smirnoff:

I would rather use native Teams client.

However, regarding Win7 seamless mode (to which I am yet to give a try), is
there a chance we will ever get rid of that ugly double window decorations?
:)

On Monday, November 2, 2020 at 12:50:27 PM UTC+2 Rasta Bude wrote:


Hello,
I try to run Windows 7 in seamless mode at my Qubes.


From looking at the create qube script and the batch file it calls, it 
appears to do the following to enable seamless mode:


reg add "HKLM\SOFTWARE\Invisible Things Lab\Qubes Tools\qga" /v 
SeamlessMode /t REG_DWORD /d 1 /f





--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f151197d-40ae-5ac3-7c6b-21cff8af1e6f%40danwin1210.me.


Re: [qubes-users] Potential Accidental Install of Unsigned Package

2020-10-27 Thread 'awokd' via qubes-users
'Yiyi50' via qubes-users:
> I'm running qubes 4.0 on a Purism Librem 13 v4. I've installed updates for my 
> templates without necessarily reading everything in the terminal before 
> clicking "y". How concerned should I be of having inadvertently installed an 
> unsigned package? Is there a command i can run to check the signatures on all 
> my installed packages? I should mention that I'm relatively new to linux and 
> qubes. How common is the installation of unsigned packages in Fedora or 
> Debian? Does the qubes team audit/review all template updates?
> 
If you haven't gone out of your way to add repos to your templates, you
would be using the default repos, which require signed packages. Your
chances are basically nil. No-one from Qubes audits updates that are not
from Qubes (with the possible exception here or there for security
critical ones like Xen); that is up to the maintainers of packages in
each distribution (Fedora/Debian).

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a15600bc-54f0-cdbe-2aa4-6debc0ce3a40%40danwin1210.me.


Re: [qubes-users] I broke qubes.UpdateProxy. Does anyone have a default version of it I can reference to fix it in dom0?

2020-10-27 Thread 'awokd' via qubes-users
setemera...@posteo.net:
> I was halfway through setting my updateProxy file to go off of a sys-vpn
> instead of sys-whonix. However I can't remember how it was supposed to
> be initially. Could someone show me a default one or otherwise tell me
> how to adjust this one? Thank you

Think this is default if you chose sys-whonix for updates:

$type:TemplateVM $default allow,target=sys-whonix
## Note that policy parsing stops at the first match,
## so adding anything below "$anyvm $anyvm action" line will have no effect

## Please use a single # to start your custom comments

# Upgrade all TemplateVMs through sys-whonix.
#$type:TemplateVM $default allow,target=sys-whonix

# Upgrade Whonix TemplateVMs through sys-whonix.
$tag:whonix-updatevm $default allow,target=sys-whonix

# Deny Whonix TemplateVMs using UpdatesProxy of any other VM.
$tag:whonix-updatevm $anyvm deny

# Default rule for all TemplateVMs - direct the connection to sys-net
$type:TemplateVM $default allow,target=sys-net

$anyvm $anyvm deny

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c615252f-6fb7-90da-f4cd-f37868728f27%40danwin1210.me.


Re: [qubes-users] finally got working broadcom bcm4360 on a macbook air 7,2 with qubes os

2020-10-27 Thread 'awokd' via qubes-users
OH MY PLUG:
> 
> i only installed the package broadcom-sta-dkms on debian 10 template, then 
> i changed the sys-net template from fedora 30 to debian 10
> 
Glad it was an easy fix!

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/40987cb3-6f7c-eec9-9021-888204c5eb36%40danwin1210.me.


Re: [qubes-users] Usability of Qubes Tools for Windows 10

2020-10-27 Thread 'awokd' via qubes-users
Knut von Walter:
> Hi,
> well I have read the documentation of installing Qubes Windows Tools
> ,link: https://www.qubes-os.org/doc/windows-tools/ Especially the known
> limitations of that software on, link:
> https://github.com/QubesOS/qubes-issues/issues/3585 . Also I discovered
> this video tutorial on you-tube:
> https://www.youtube.com/watch?v=1mGop1B-kqU . The author, Mr. Chris
> Titus, of this video, which is from October 27th in 2019. Came to the
> conclusion that it is at that moment not advisable to install Qubes
> Tools for Windows.
> Therefore I have this question: Do you think this issue changed in the
> meantime? Or is it better to wait for some time until the team of Qubes
> OS have programmed the necessary software. So that everything is running
> smoothly.

Check out https://github.com/elliotkillick/qvm-create-windows-qube for a
bit more updated info.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/249469b2-588a-187d-6460-bfe5a17891c4%40danwin1210.me.


Re: [qubes-users] Monitor all processes

2020-10-27 Thread 'awokd' via qubes-users
preill...@gmail.com:
> On 10/14/20 3:11 AM, mj.jos...@gmail.com wrote:

>>
>> I want to creat a 'Monitor' VM with absolutely no internet capability
>> using debian (i started learning Linux with Ubuntu, then moved onto
>> Kali and Arch, now im experimenting with Raspbian, so im much more
>> familiar with debian than Fedora). I want to have all my supervisory
>> programs on this VM, but simply peering thru the looking glass as it
>> were.  I found xentop on the qubes terminal helpful, but that only
>> tells me if a particular qube is peaking CPU or memory usage, not what
>> process is killing my performance.

There might be some way to develop something like that if you really had
to, but finding the problem VM with xl top/xentop then drilling into it
to see process details is the "standard" way...

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/df49d55a-8c6f-f5cd-2bbc-ec0aa23f0efc%40danwin1210.me.


Re: [qubes-users] wifi does not work after update on nitropad X230

2020-10-27 Thread 'awokd' via qubes-users
tms7:
> Hi all, 
> 
> I faced a wifi-related issue on Nitropad X230. Wifi used to work properly 
> at the beginning, but after update it stopped functioning. 
> 
> After entering the following commands (according to the documentation here: 
> https://www.qubes-os.org/doc/wireless-troubleshooting/)
> 
> `sudo rmmod iwldvm`
> `sudo modprobe iwldvm`
> 
> The wifi was on again, but unable to connect to any wifi with the message 
> “device not ready”. 
> 
> After [sys-net] reboot,  the first issue persisted. Neither the key binding 
> `fn+F5` nor the hardware (physical switch) seems to be working.
> 
> This might be related to drivers, but any help or hint on this issue would 
> be welcome. It is possible to post logs, if I knew where to look.
> 
> Thanks. 
> 
It's possible a kernel update broke your wifi driver. Try going into
Qube Settings on the sys-net (or wherever your wifi device is attached)
qube, and manually selecting a lower versioned kernel.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30c8ebf8-7562-a5bf-3d7e-3c639df666c2%40danwin1210.me.


Re: [qubes-users] Suddenly I can't get internet access from within one of my Win 10 HVM's but I can from another one

2020-10-27 Thread 'awokd' via qubes-users
'M' via qubes-users:
> 
> Suddenly I can't get internet access from within one of my Win 10 HVM's, 
> but I can from another one.
> 
> I have compared the internet settings under "Qube Settings". And it says 
> sys-whonix in both HVM's.
> 
> What can be the reason for not being able to get internet access from 
> within one of my Win 10 HVM's... ?
> 
> I have installed Win 10 by using this method: 
> https://groups.google.com/g/qubes-users/c/78DgmWxZf80/m/L8cJA2BUAwAJ
> 
Wouldn't have anything to do with your router since other connections
work. Double check your problem HVM is getting an IP address?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fbe6718e-1727-956c-8a65-afe5ce7c33e1%40danwin1210.me.


Re: [qubes-users] Troubleshooting Installation of Windows 10 in Qubes OS

2020-10-05 Thread 'awokd' via qubes-users
Qubes:
> On 10/5/20 10:21 AM, Knut von Walter wrote:
>> Hi,
>>
>> at the moment I am trying to install Windows 10 following this
>> instruction, link: _https://www.qubes-os.org/doc/windows-vm/_. However
>> Windows is not booting. After clicking on ”Boot from CDROM”. I get the
>> following error-message:
>>
>> Qube-Status: windows 10: Domain windows-10 has failed to start: Cannot
>> connect to qrexec agent for 60 seconds, see
>> /var/log/xen/console/guest-windows-10.log for details.
>>
>> Has anyone an idea how to solve this? All help is appreciated.
>>
>> Thank you.
>>
>> Best Knut von Walter
>>
>>  
> How much memory do you have assigned to the VM?
> 
Also recommend using
https://github.com/elliotkillick/qvm-create-windows-qube if you aren't,
just pay attention to the Windows 10 note. There's a mandatory manual
step at the end.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6f4412a1-9028-da42-22e8-1e83c33de9ab%40danwin1210.me.


Re: [qubes-users] Tunderbird in new anon-whonix is refusing to connect to internet

2020-09-29 Thread 'awokd' via qubes-users
taran1s:
> 
> 
> 'awokd' via qubes-users:

>> From your new anon-whonix AppVM, test using a different app like regular
>> Firefox and see if it can connect to the Internet. Also, verify its
>> NetVM is set to sys-whonix.
>>
> 
> As I mention, TB in the anon-whonix AppVM is able to connect to the
> internet, except Thunderbird. All email account settings are ok. The
> same settings are working in the old anon-whonix AppVM just well.
> 
Not TB, just regular Firefox.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a92fe12-40ee-bc8d-e534-3ca28855decc%40danwin1210.me.


Re: [qubes-users] Tunderbird in new anon-whonix is refusing to connect to internet

2020-09-22 Thread 'awokd' via qubes-users
taran1s:
> Hi, I am stuck with the following Thunderbird issue.
> 
> I created new anon-whonix AppVM where I would like to have my new email
> account in Thunderbord, but whatever I do, I get "Could not connect to
> server xxx connection was refused" immediately after clicking the Get
> Messages. At the same time, TB can nicely connect to the network from
> that AppVM.
> 
> Thunderbird in older anon-whonix AppVMs are connecting just ok. The
> settings are precisely the same in both - the old and new anon-whonix.
> The template is the same whonix-ws-15.
> 
> I tried to create anon-whonix through salt or directly from the Qube
> Manager with Create a new qube, but still the same issue.
> 
> Any idea how to solve this?

>From your new anon-whonix AppVM, test using a different app like regular
Firefox and see if it can connect to the Internet. Also, verify its
NetVM is set to sys-whonix.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3f372671-1b1a-81a7-aeff-5f0fd2d1903a%40danwin1210.me.


Re: [qubes-users] Boot Menu disappeared after 2-nd Qubes installation. Need Help!

2020-09-21 Thread 'awokd' via qubes-users
load...@gmail.com:
> Hi everyone, need any help, because I am stuck.
> 
> Today I got my External SSD and *I installed the 2-nd Qubes OS* on this 
> Drive (the first one was been installed on my internal Laptop drive.
> 
> But to my surprise, when I *tried to load my first Qubes OS*, I couldn't. 
> In BIOS my drive is visible like working device, but *in Boot Menu it does 
> not exist anymore*.

Search this mailing list for "efibootmgr"- you should find an example
command on how to recreate your Qubes EFI boot menu entry.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e19119e3-65d8-e4de-1a68-2862fa728af5%40danwin1210.me.


Re: [qubes-users] Re: Witch one is the best?

2020-09-21 Thread 'awokd' via qubes-users
Mélissa Ch.:

> Fist excuse for my english.
> I have instal Qube on a external hard-drive and use the silitech pc tower. 
> I have put in the bios the visualisation "on"  Evrething goes well, Qube 
> start, i can go in whit my loggin info. The only problem i have actualy is 
> i can't open any cube. They have a error message, 
> 
> Domain. has failed to start: failed to start an HVM qube whitc PCI 
> devices assigned - hadware does not support IOMMU/VT-d/AMD-Vi
> 
> The graphique card is: AMD Radeon hd 7470.processor (0x6778) compatible 
> advance micro device.   Pci 2.0 x16
> 
> The bios is a  AMI Po3-A1 version 2.7
> 
> Actualy i wait for my rooteur to arrived at end of October. After i will 
> try to make a update of the bios and see what is going to do.  Or i will 
> have to upgrade this tower or  

Bios update is a good idea, but double check to see if there is another
virtualization option in it to enable VT-d. Your motherboard, processor,
and Bios all need to support VT-d for it to work right.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17133fe6-51c3-4f67-a559-d8f1823138f9%40danwin1210.me.


Re: [qubes-users] Failed to shutdown or suspend. Help

2020-09-17 Thread 'awokd' via qubes-users
vin cen zo:

Forgot to respond to your other question in the previous email- I don't
think SATA controller going to ACPI would cause the shutdown problem,
but it could be a quick test to change it back to RAID mode and see. Put
back on ACPI if it doesn't help.

> It seems that some have also solved by putting acpi = force on the 
> bootloader, but having no devices to do an alternative booting I am 
> reluctant to change the bootloader options.

No USB port? Should be able to boot into Rescue mode from the Qubes
installer, or from some other live CD on a USB drive. This would let you
edit bootloader options more safely. Trying acpi=force is a good idea.

> If I had a key combination to change boot options, as in all other linux 
> distributions, I would certainly do a lot more testing. Like for example I 
> don't know why I have the iommu = no-igfx option since I use the integrated 
> graphics of the intel cpu.

Intel integrated graphics don't play well with iommu, so that boot
option disables it.

> 
> If it was really the fault of not unmounting the encrypted volume, what 
> could I do ..

I don't think that's it, because it continues on through to this point:

> Sep 17 03:57:12 sun0 systemd [1]: Reached target Unmount All Filesystems.
> Sep 17 03:57:12 dom0 systemd [1]: Removed slice system-systemd \ 
> x2dcryptsetup.slice.
> Sep 17 03:57:12 sun0 systemd [1]: Reached target Shutdown.
> Sep 17 03:57:12 sun0 systemd [1]: Reached target Final Step.
> Sep 17 03:57:12 dom0 systemd [1]: Starting Power-Off ...
> Sep 17 03:57:12 sun0 systemd [1]: Shutting down.
> Sep 17 03:57:12 dom0 systemd-shutdown [1]: Sending SIGTERM to remaining 
> processes ...
> Sep 17 03:57:12 dom0 dmeventd [1586]: dmeventd detected break while being 
> idle for 4 second (s), exiting.
> Sep 17 03:57:12 sun0 dmeventd [1586]: dmeventd shutting down.
> Sep 17 03:57:12 sun0 systemd-journald [1569]: Journal stopped

And journal stops cleanly at this point so it looks like dom0 is
shutting down successfully. This points to a Xen issue. How about
messages in those hypervisor.log* files? Might not be any messages if
filesystems are already unmounted by the time it encounters a problem.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ee99ebd4-84ff-2469-d053-fc95ec96e683%40danwin1210.me.


Re: [qubes-users] Intel Optane?

2020-09-17 Thread 'awokd' via qubes-users
Sandy Harris:

> Is 32G enough for that? du -h on my current Kubuntu system shows 29G
> for / and 18G of that is my home directory (which on the new system
> will not be on the root drive) so it looks to me like it should be
> fine. But how big is Qubes, assuming all VMs except perhaps Dom0 are
> on a separate drive?
> 
qubes_dom0_root is ~9GB on my system with a mostly empty ~. That does
not take into account the base templates, so figure +2GB for each
(Fedora, Debian, Whonix-WS, Whonix-GW) depending which you choose to
install. You can relocate or add them later to secondary storage to keep
the 32GB reserved for only Qubes, assuming Optane as a drive is Xen
compatible.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dad46bb6-2472-f036-683e-5eba10f929b0%40danwin1210.me.


Re: [qubes-users] Failed to shutdown or suspend. Help

2020-09-17 Thread 'awokd' via qubes-users
ioko8:
> Hi, for more than two months, qubes-os has not completed the shutdown and 
> has not entered into suspension. To turn it off, I must necessarily hold 
> down the power button.
> 
> further details:
> 1. after shutdown, at the end of the loading bar (which I didn't remember 
> being there) the computer remains on.
> 
> 2. The "sata operation mode" setting in the bios has been changed from 
> Rapid to Ahci. Could it be the cause?
> 
> For me it is a very important problem, I do not find anything in the log 
> files that allow me to understand and solve the problem.
> 
> Thanks to those who want to help me.
> 
In a dom0 terminal, check sudo journalctl. Look for messages just before
your most recent bootup. Also check /var/log/xen/console/hypervisor.log*
for same.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73756763-0bdb-a148-136a-710af12070e0%40danwin1210.me.


Re: [qubes-users] Issue verifying media

2020-09-11 Thread 'awokd' via qubes-users
'src11' via qubes-users:
> Trying to install the most recent version of Qubes from USB on a Purism 
> Librem 15 laptop. When I click verify media I get two of these errors:
> 
> dracut-pre-udev[463]: rpc.idmapd: conf_reinit: open ("(null)", 0_RDONLY) 
> failed
> 
> What does that refer to and is it ok to proceed?
> 
Don't know if I've seen that, but seems harmless enough. Try ignoring
and proceeding.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/506c1df8-bcdd-0493-465e-9f35e0fbdb41%40danwin1210.me.


Re: [qubes-users] Boot message

2020-09-10 Thread 'awokd' via qubes-users
'src11' via qubes-users:
> I recently purchased a new Librem 15 laptop from Purism and am installing 
> Qubes for the first time from a USB they sent me. When I boot it, before the 
> installer loads, a long message flashes quickly which reads:
> 
> Loading the new kernel:
> kexec -l /media/isolinux/xen.gz --command-line "console=none no-real-mode 
> reboot=no vga=current" --module "/media/isolinux/vmlinuz 
> inst.stage2=hd:LABEL=Qubes=R4.0.3-x86_64 i915.alpha_support=1 quiet rhgb 
> plymouth.ignore-serial-consoles intel_iommu=on " --module 
> "/media/isolinux/initrd.img "
> 
> What does that mean? Is it anything to be concerned about?
> 
No, that's a typical Qubes boot string.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/959ae3b2-c0e7-9409-2a61-260b0376d0bf%40danwin1210.me.


Re: [qubes-users] Nirokey fails to mount on Debian AppVMs

2020-09-09 Thread 'awokd' via qubes-users
sbstrkt:

>- I would to know where I could find the logs for the "mount fail". 
>- Maybe there is a known issue related to Debian specifically (maybe the 
>equivalent of missing drivers for nitrokeys on debian).  

Since it seems template related, do sudo journalctl from a terminal in
the AppVM where you're trying to mount.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/48203490-2dc4-d380-4702-2f4c3d3ec832%40danwin1210.me.


Re: [qubes-users] Hardening Guide for Paranoid Noobs?

2020-09-05 Thread 'awokd' via qubes-users
Stumpy:
> I was reminded about qubes hardening that Chris L has been working on
> and also noticed that Patrick/Whonix is now basing whonix on thier
> kicksecure distro and was trying (not so successfully) to absorb all of
> this. I got the impression that Chris's work wouldnt jive so well with
> kicksecure (fair enough, can just use it on non-whoinx setups) but wasnt
> sure. Also there is the idea of DVM sys-* (net/usb/firewall/etc) vms
> sounded like they would add an extra layer of security, maybe based on
> centos (I have seen conversations about how fedora doesnt sign or
> something apps in their repos? please dont troll me, i am not trying to
> pretend like i understand that) and some other things that i am sure i
> have missed (maybe a iptable/firewall gui [apart from whats built into
> qubes settings... i just dont find that intuitive).

Just running Qubes by itself is already more hardened than 99% of people
out there, so if your main concern is standard/driveby attacks against
mainstream OSes, you shouldn't be very much so. You cover multiple points:

- There is something in the works to allow custom kernels inside AppVMs.
Whonix and others can use them for additional hardening and/or
additional drivers. Don't think it's released yet.
- Chris's VM hardening works on regular qubes. Not sure if it will on
Whonix ones.
- DVM sys-* is pretty straight-forward, just follow the docs.
- Centos is unrelated. If you're concerned about Fedora's lack of
signing, switch to Debian templates, or some other that has signing.
- Mirage can be used as a sys-firewall replacement.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5fd60ae4-f73b-7392-8ef9-53a2e361a8e8%40danwin1210.me.


Re: [qubes-users] Digital art & 3D modeling/animation inside of Windows VM on Qubes?

2020-09-05 Thread 'awokd' via qubes-users
Lazy Lexicographer:
> 
> 
> Hello everyone.
> 
> So, I am a person who is interested in both digital art and cybersecurity. 
> I have been fascinated with the Qubes OS for quite sometime and, having 
> already tried it out, I plan on switching over to it completely in the near 
> future. The only reason why I have not so far is because of the 
> compatibility issue that exists between Qubes and digital art software I 
> use (much of which is only good for Mac and Windows.)
> 
> In the upcoming future I plan on obtaining a very powerful computer (24 
> core CPU and 64GB of RAM) and have thought about running Qubes on it. I 
> have considered the possibility of creating one Windows 10 VM on it and 
> using it solely for digital art. From what I have heard, however, 
> installing Windows 10 in Qubes is quite difficult. In addition, even with 
> the powerful hardware I possess, using software for digital illustration, 
> 3D modeling/animation and game design will still most likely be a serious 
> issue because of the nature of virtual machines. Then of course there is 
> the whole issue of graphics cards and GPU pass-through with a VM.

Neither is as individually hard as it used to be thanks to some
dedicated people. See
https://github.com/elliotkillick/qvm-create-windows-qube and
https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-gaming-hvm.md.
The latter is for Windows 7; unknown if it will work with 10.

> I would still like to get anybody's thoughts to help me in my 
> consideration. Would it be good enough to simply create a Windows 10 VM and 
> use all of my digital art stuff inside of it? Or would it be best to get an 
> entirely separate machine for the creative stuff and leave Qubes for 
> work/browsing? Any input would be much appreciated.

You could attempt Qubes + VM and see how it goes, but if you're doing
art for compensation of some type you should keep your old machine
around until you confirm the new setup works for you. It would be
easiest if you could switch to a Linux based art package, but they
probably aren't going to be as slick as proprietary ones. If Qubes + VM
doesn't work out, you could switch one system to Qubes for work and
other to proprietary.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2662cab8-5ed7-e624-3a1b-80080cd4b99b%40danwin1210.me.


Re: [qubes-users] Move SSD

2020-08-29 Thread 'awokd' via qubes-users
Magnus Borud:
> I have two almost identical PC's:
> Asus Q270M-C Motherboard's
> i5-7400 CPU's
> 64G ram on both
> Docking solution för SSD in the front so I easily can move the SSD between 
> the two PC's 
> 
> I installed Qubes 4.0.3 and it works fine. When I move the SSD to the other 
> PC, it will not boot. It goes into the BIOS. Only when the SSD is in the 
> origin PC, where I installed Qubes it boote in a correct way.
> 
> Does it have something to do with Legacy/UEFI selection?

Yes, UEFI. Once you move the SSD to the destination PC, boot in rescue
boot or from a Livecd and create a Qubes boot entry with efibootmgr.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dd562bb0-a454-3e8c-d252-3250efe5d26d%40danwin1210.me.


Re: [qubes-users] Alerts, notifications, calendar in Qubes

2020-08-29 Thread 'awokd' via qubes-users
evado...@gmail.com:
> Hello,
> 
> What apps do you use on Qubes to get notifications of upcoming events? 
> I'm searching for some app to manage notifications (want to start it 
> automatically on boot of my main appVM)
> 
Might look at Evolution/Thunderbird or some other calendar application.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/46c1d4f2-49a0-d3af-30e6-2cb16929c684%40danwin1210.me.


Re: [qubes-users] Recover vm after lvresize

2020-08-24 Thread 'awokd' via qubes-users
Filippo Merli:
> 
> Hi,
> 
> after shrink a standalone vm volume with lvresize is not possible anymore 
> access the volume data.
> The vm start but is not possible to open a terminal. Is there a way to 
> access the data from another vm or from dom0?

Enabling debug mode in Qube Settings might get you a terminal so you can
see what's wrong. Also can try sudo xl console [vmname] in dom0 when
it's powered on. It is possible to copy the volume to a file to attempt
recovery in another VM.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e055169c-fa3a-13f7-4bf0-1d037062e95c%40danwin1210.me.


Re: [qubes-users] Witch one is the best?

2020-08-23 Thread 'awokd' via qubes-users
Mélissa Ch.:

> Silitech
> 
> Intel(R)  Core(TM)  i5-3450 CPU @ 3.10 GHz   3.10GHz
> 
> Mémoire 16.0 Go ram
> 
> Système d’exploitation 64 bits
> 
> Windows 7 Familiale Premium
> 
> Carte graphique  ADM Radeon HD 7470

This one is the better Qubes candidate because of the AMD video card and
16GB RAM. Be aware Qubes can sometimes be more challenging to install
than Windows, so might need troubleshooting.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f800fa26-bf26-d095-4c23-fa7298698e01%40danwin1210.me.


Re: [qubes-users] bind-dirs configuration not persisting to dvm

2020-08-20 Thread 'awokd' via qubes-users
Qubes:
> I have an appVM that I changed into a dvm template, but I need to
> increase the size of tmpfs /run/user/1000 from the default 10% of memory
> size to e.g. 40% when an application in the dvm is opened (and the
> disp gets created).
> 
> To do this I edited /etc/systemd/logind.conf in the appVM and changed
> RuntimeDirectorySize=40%.
> 
> To make this stick between reboots, I used bind-dirs.
> 
> If I reboot the appVM and look at 'df -h' and 'cat
> /etc/systemd/logind.conf' I can see that my changes have persisted.
> 
> The problem is after I change my appVM into a dvm template, 'qvm-prefs
>  template_for_dispvms True' in my dvm 'tmpfs /run/user/1000' is
> at default 10%, 'df -h' confirms. And my customization to
> '/etc/systemd/logind.conf' is not there.
> 
> However, 'cat /rw/bind-dirs/etc/systemd/logind.conf' still shows
> 
> user@disp9640:~$ cat /rw/bind-dirs/etc/systemd/logind.conf
> RuntimeDirectorySize=40%
> 
> Is that a bug or does that have something to do with how and when
> '/rw/config/qubes-bind-dirs.d/50_user.conf' is parsed? because this is
> where '/etc/systemd/logind.conf' is binded.
> 
To simplify the problem a bit, maybe use a different template for your
dvm template and edit /etc/systemd/logind.conf directly in the base
template?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc1d1326-a3f2-3cda-225a-4b4b688dcd74%40danwin1210.me.


Re: [qubes-users] Suspend and high load issues on AppVM shutdown

2020-08-20 Thread 'awokd' via qubes-users
Johnboy3@eclipso.email:
> Hello,
> 
> i'm new to qubes and i like the security aspect it provides. During testing i 
> noticed 2 problems i couldn't solve.

Welcome.

> 1. The resume from suspend function doesn't work for me. The Computer powers 
> on again, but the screen stays black. Keyboard and mouse don't work either. 
> Using other linux distributions force me to use acpi_sleep=old_ordering to 
> make suspend work. Trying to boot qubes with that kernel option @multiboot 
> and @module in grub doesn't help.

This is often a challenge. Search this mailing list and the Qubes HCL
for your laptop make & model. Maybe someone else has solved already.

> 2. Having AppVMs with several hundred GB, e.g. 500GB in vault leaves the 
> system crippled and often completly unresponsive for 1-2 minutes. Some 
> kworkerd process in dom0 eats up 100% of a single core. This happens every 
> time, even when i boot up the AppVM in question and shut it down immediately 
> again. The more GB the AppVM uses the longer the shutdown takes. Seeing the 
> HDD Led flashing nonstop during the shutdown made me curious about the 
> snapshot feature. Unfortunately, setting the qvm-volume revert snapshot 
> config from 1 to 0 didnt help. Neither with existing AppVMs nor with newly 
> created AppVMs.

I have a AppVMs around that size on HDD (vs. SDD), but haven't seen
this. Maybe try switching to a different template (Debian vs. Fedora for
example) in case there's something in the one you're using.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4eb3dc98-faef-eeb9-0a77-0e53521e244f%40danwin1210.me.


Re: [EXT] Re: [qubes-users] Google requiring login to access qubes-users

2020-08-18 Thread 'awokd' via qubes-users
54th Parallel:

> As someone who has had an open tab on the Google Groups page for a long 
> time, I want to add that activity has dropped *dramatically* since Google 
> started mandating logins. Like, it has fallen off a cliff and now the place 
> has a ghost town vibe to it. 

I imagine China's policy requiring real ID to use the Internet has
Google salivating all over itself.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/edcb6af7-0ae8-6182-be10-93330bc99774%40danwin1210.me.


Re: [Fwd: Re: [qubes-users] how to install virtualbox?]

2020-08-14 Thread 'awokd' via qubes-users
unman:

> Running in a Debian standalone.
> Install the virtualbox package and dependencies, as normal.
> Edit the file, /usr/lib/virtualbox/vboxdrv.sh and comment out the Xen
> test at lines 269-271
> 
> That's minimum to get you running. You'll be limited in what you can run
> and vbox will complain if you have VT-x etc enabled, but it may do.

Interesting, thought it would be on the same level as Qubes in Qubes.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/89a2c584-8b53-b20e-0c6f-1554f00a49eb%40danwin1210.me.


Re: [qubes-users] how to install virtualbox?

2020-08-13 Thread 'awokd' via qubes-users
afdskjbkjds...@secmail.pro:
> Is it even possible to do that? I tried to make some mistakes, but it
> didn't work out.

Nothing is impossible, but it's too difficult and time consuming to
recommend. Qubes is already a hypervisor running multiple VMs. Why would
you want another one like Virtualbox on top of it?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e9f6599e-d73e-c90b-014b-1944f969c5a3%40danwin1210.me.


Re: [qubes-users] Re: sys-usb issues recognizing devices & maintaining drive connections

2020-08-12 Thread 'awokd' via qubes-users
'Антон Чехов' via qubes-users:

> I don't need the Personalization Tool very often. On the contrary, once the 
> slots are configured they usually stay that way for a long time.
> 
> My conclusion for now is, that I can live with this message. Or is this not 
> the expected  behavior? What do you think about it?
> It may be connected with some policy file for the Yubikey but I don't know 
> and didn't have the time to seriously investigate these policy files & 
> documentation. 

I've been meaning to try out a Yubikey or equivalent, but haven't gotten
there yet. Hopefully someone else has more thoughts on it.

> I am thinking about setting up 'sys-usb' as a disposable VM along the lines 
> of the following documentation.
> https://www.qubes-os.org/doc/disposablevm-customization/
> Have you or others tried that out and is this documentation up to date?
> 
Yes, it worked when I tried it. Don't think much has changed in that
regard since, so it should still work.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa313650-8621-8b3c-b7c1-5b7fd8055a46%40danwin1210.me.


Re: [qubes-users] Problem with VMs not launching

2020-08-12 Thread 'awokd' via qubes-users
BGW:

> I have a personal debian app vm that starts automatically with qubes. I 
> can't launch anything within the vm. If I stop the vm it will then restart 
> automatically without being told to do so. But I still can't launch 
> anything in the vm (browser, files etc).

Temporarily disable autostarting this appvm in case there's some type of
race condition, then reboot and retest.

> Other vms which do not start automatically, when manually started do not 
> work. And, like above, if I stop the vms once I have started them they will 
> will restart themselves by themselves.

Are the sys-* ones working correctly?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8add2e14-f29b-517b-87d3-6bfe4cf77e60%40danwin1210.me.


Re: [qubes-users] HP Elitebook 2570P - sys-usb fails to start

2020-08-11 Thread 'awokd' via qubes-users
pblackhurs...@gmail.com:
>> Tried the following to fix the sys-usb problem: 
>> qvm-pci detach sys-usb dom0:00_14.0 
>> qvm-pci attach --persistent -o no-strict-reset=True sys-usb dom0:00_14.0 
>> Still get the same error. Tried the same for 00_1a.0 and 00_1d.0. Same 
> error. 
> 
> Excellent that worked. Removed all USB controllers except 00_1a.0 and 
> re-attached
> with --persistent -o no-strict-reset=true and sys-usb started.
> 
> Thanks for your help much appreciated.
> 
> 
> 
> On Monday, 10 August 2020 23:29:05 UTC+1, awokd wrote:
>>
>> 'c1nturion' via qubes-users: 
>>
>>> Clicked OK to continue the install anyway and finishes ok apart from the 
>> sys-usb problem above. When I try to start sys-usb it fails to start with 
>> error: 
>>> "Domain sys-usb has failed to start: internal error: 
>>> Unable to reset PCI device :00:14.0: internal error:libxenlight 
>> failed to create new domain 'sys-usb'. 
>>>
>>> Everything else with install is good. 
>>>
>>> Tried the following to fix the sys-usb problem: 
>>> qvm-pci detach sys-usb dom0:00_14.0 
>>> qvm-pci attach --persistent -o no-strict-reset=True sys-usb dom0:00_14.0 
>>> Still get the same error. Tried the same for 00_1a.0 and 00_1d.0. Same 
>> error. 
>>> Tried to delete sys-usb and recreate but problem persists. 
>>
>> Good troubleshooting steps. I'd expect EHCI controllers to be more 
>> pass-through compatible than XHCI, so focus on 00_1a.0 alone for now. 
>> Remove all USB controllers except that one from sys-usb. Attach with 
>> no-strict-reset=true like you have been, but you may also need to add 
>> the permissive option. After attempting to start sys-usb, also check to 
>> see if there are any related messages in 
>> /var/log/libvirt/libxl/libxl-driver.log. 

Good. In that case, you should also be able to add 00_1d.0 to sys-usb if
needed, but the single one is fine if that provides enough ports for
your use.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e5e245a-cb7f-1f25-9e72-3e9b370f04f2%40danwin1210.me.


Re: [qubes-users] Can't get Debian-11 template updated

2020-08-10 Thread 'awokd' via qubes-users
TheGardner:
> I recently got some templates (bullseye, kali and Debian-11) installed on 
> my system, but I can't get them updated. So speaking first about Denian-11, 
> I always get the following message, when I try to update the qube via 
> "Update Qube" function:
> 
> 
> 
> *Failed to apply DSA-4371 fix: dpkg-query: package 'libapt-pkg5.0' is not 
> installed and no information is availableUse dpkg --info (= dpkg-deb 
> --info) to examine archive files.*
> *Error: Failed to get apt version.*
> 
> Anyone, who could point me to the next steps to get this working? dpkg 
> --info and/or dpkg-deb --info didn't help to find out, whats wrong here.
> 
> btw. a 'sudo qubes-dom0-update qubes-template-debian-11' always brings up a 
> 'No match for argument qubes-template-debian-11' altough my Debian11 
> template is called Debian-11

Debian 11 is not supported under Qubes yet. It's usually a month or two
after it fully releases out of freeze (not scheduled to start until Jan.
2021) before it is supported. Either switch back to 10 or review the
code and package dependencies to determine how to make it compatible
with 11.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/53812571-0230-7c3f-b042-b5adf7c0d828%40danwin1210.me.


Re: [qubes-users] HP Elitebook 2570P - sys-usb fails to start

2020-08-10 Thread 'awokd' via qubes-users
'c1nturion' via qubes-users:

> Clicked OK to continue the install anyway and finishes ok apart from the 
> sys-usb problem above. When I try to start sys-usb it fails to start with 
> error:
> "Domain sys-usb has failed to start: internal error:
> Unable to reset PCI device :00:14.0: internal error:libxenlight failed to 
> create new domain 'sys-usb'.
> 
> Everything else with install is good.
> 
> Tried the following to fix the sys-usb problem:
> qvm-pci detach sys-usb dom0:00_14.0
> qvm-pci attach --persistent -o no-strict-reset=True sys-usb dom0:00_14.0
> Still get the same error. Tried the same for 00_1a.0 and 00_1d.0. Same error.
> Tried to delete sys-usb and recreate but problem persists.

Good troubleshooting steps. I'd expect EHCI controllers to be more
pass-through compatible than XHCI, so focus on 00_1a.0 alone for now.
Remove all USB controllers except that one from sys-usb. Attach with
no-strict-reset=true like you have been, but you may also need to add
the permissive option. After attempting to start sys-usb, also check to
see if there are any related messages in
/var/log/libvirt/libxl/libxl-driver.log.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8921ff3e-5360-f8e6-0306-df300ff2f184%40danwin1210.me.


Re: [qubes-users] Re: sys-usb issues recognizing devices & maintaining drive connections

2020-08-09 Thread 'awokd' via qubes-users
'Антон Чехов' via qubes-users:

> I have a handful ob Yubikeys (v.2 to v.4) and I really want to make use of 
> them with Qubes as well. So the next thing will be U2Fproxy and 
> YubikeyLogin. 
> There is some weird (?) behavior when attaching a Yubikey and the 
> Personalization Tool in sys-usb is open. The key is recognized but I get a 
> never-ending loop of warnings: "Denied: qubes.InputKeyboard
> Denied qubes.InputKeyboard from sys-usb to dom0"
> 
> I think that this is the right behavior but as long as I switch to the 
> Personalization Tool these warnings never stop. Elsewhere I get this 
> warning just the one time when I plug the key in.

From
https://www.qubes-os.org/doc/usb-qubes/#enable-a-usb-keyboard-for-login
under Manual setup, I wonder if you can edit
/etc/qubes-rpc/policy/qubes.InputKeyboard to something like sys-usb
sys-usb ask,default_target=sys-usb. Should be more documentation on that
file somewhere out there.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/52ef28ba-7f7e-baf4-76cc-a2828ad8ad3f%40danwin1210.me.


Re: [qubes-users] Can’t download large files

2020-08-09 Thread 'awokd' via qubes-users
Steve Coleman:
> On Sat, Aug 8, 2020, 1:50 PM  wrote:
> 
>> Thanks for the reply. The system still prioritizes the tmp file even after
>> I change the settings and use a usb. Do you know any other command that can
>> disable the tmp folder?
>>
https://support.mozilla.org/en-US/questions/1195088
(Might be a new "feature".)

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d436dbb-03eb-c147-3781-ec8bc12d0ad1%40danwin1210.me.


Re: [qubes-users] Qubes dom0-update-guard script

2020-08-09 Thread 'awokd' via qubes-users
fiftyfourthparal...@gmail.com:

> Another option is to have the offline AppVM handle cross-checking between 
> Tor and HTTPS repodata as well, so all Whonix does is fetch. Which sounds 
> better?
> 
Probably this option, mostly because it seems simpler to copy both data
sources to the same AppVM responsible for cross-checking.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a356d79b-e5a8-71c5-6571-437ca7b216ca%40danwin1210.me.


Re: [qubes-users] Qubes dom0-update-guard script

2020-08-08 Thread 'awokd' via qubes-users
fiftyfourthparal...@gmail.com:

> I have Awokd, Chris, *and* Unman replying to my post--I feel pampered.  

It's an interesting security exercise; but agree, don't think our open
source availability syncs up very often. :)

> So the new overview of the script is: have a dedicated (and hardened?) tor 
> VM --basically, whonix-ws-- download the metadata from a few mirror sites, 
> compare them to the metadata from Tor, and if all checks out, compare the 
> tor version to the packages installed in dom0. If it doesn't check out, 
> alert user and ask whether to proceed. To do this entirely in dom0 (keeping 
> it safe and simple for a newbie at programming), I'm going to use qvm-run 
> with --pass-io somewhere in my script, along with something to read the 
> whonix output and run cross checks.

To stay in keeping with Qubes philosophy, at most dom0 should only run
jobs inside VMs and copy files between VMs. You don't want it to parse
results, but you could let dom0 copy/move output files to a separate VM,
then kick off a job to handle the parsing inside the destination VM.

> A concern: I've noticed that a lot of Qubes mirrors are often offline. 
> Would this create vulnerabilities?

Probably want your script to alert if under 3 reporting.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a705282f-bb56-3383-a840-bb9077b61a9c%40danwin1210.me.


Re: [qubes-users] Qubes dom0-update-guard script

2020-08-07 Thread 'awokd' via qubes-users
fiftyfourthparal...@gmail.com:

> Right now my plan is to take the output of 'rpm -qa' or 'yum list 
> installed' and compare it via some sort of 'match' or 'crosscheck' function 
> to a repo list pulled from somewhere secure (i.e. not tampered with by 
> potential adversaries) and maybe imported into dom0 from a specialized 
> secure appVM, creating a security tradeoff.
> 
"[P]ulled from somewhere secure"- if the concern is someone tampering
with your HTTPS traffic in particular, you will probably want to use a
different method of obtaining the repo list. Tor might work.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fa2e1c89-c057-55f7-3a2c-abff63f1cdc5%40danwin1210.me.


Re: [qubes-users] Qube 4 Restore Backup succesful but doesn't show up in Q Menu

2020-08-07 Thread 'awokd' via qubes-users
ebarrowsy_o1...@xedmi.com:
> Hello,
> 
> I go through the Backup process and everything is OK
> 
> I restore without any issue (BackUp source, decryption, templateVM exists, 
> nothing missing) and I have a successful message :
> 
> Finished successfully!
> 
> -> Done.
> 
> But, I cannot see my Qube in the Q-Menu (for example: Domain:name with 
> colour) 
> and all the AppVMs going with the backup.
> 
> Am I missing something? I don't see any information

That should be all you have to do. Maybe reboot after the restore, but I
don't remember ever needing to do that. Is your Qubes up to date (either
use Qubes Updater or in dom0 "sudo qubes-dom-update")?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3314f455-11ec-2d71-561c-647cf5156065%40danwin1210.me.


Re: [qubes-users] RTL8111/8168/8411 requires power cycle after Windows 10

2020-08-07 Thread 'awokd' via qubes-users
Ulrich Windl:
> Hi!
> 
> I had reported problems with the RTL8111/8168/8411 ethernet controller
> and Qubes OS before. In the meantime I found out that it does not work
> when Windows 10 was running, and after a "restart" Qubes SO is booted.
> 
> The effect is interesting: The card detects whether the link goes up or
> down, detects the proper speed, tries DHCP, but never gets an address.
> 
> Only when I power don the PC and reboot Qubes OS, I get an address from
> DHCP.  I suspect that the card isn't fully reset when Qubes OS boots.
> 
> 03:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd.
> RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller (rev 11)

Does that card support strict reset, and if so, does enabling it help? I
think the order of operations with strict reset enabled goes like:

1. Power on PC
2. Card partially initializes with pciback xen driver
3. Power on VM with pass-through NIC
4. Strict reset sent to NIC
5. Card fully initializes with VM's drivers
6. Power off VM
7. Card gets reattached to pciback

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84f76354-2f3f-851e-b250-3551a55d7782%40danwin1210.me.


Re: [qubes-users] Qubes Backup Warning

2020-08-07 Thread 'awokd' via qubes-users
'taran1s' via qubes-users:
> When I backup my qubes, after I click on the backup icon in the Qube
> Manager, I can see in the bottom following warning that was not there
> before:
> 
> Warning: unrecognized data found in configuration files.
> 
> I didn't make any changes to dom0. I am running latest Qubes 4.0. I
> think it happened after the last dom0 update.
> 
> What does it mean and how could I fix it?

Think that's just telling you /etc/qubes/backup/qubes-manager-backup has
junk in it. Close Qubes Backup, mv that file somewhere else (like to ~),
open again and see.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5fcfb150-7ee2-d717-1bb5-cb084e10c7e7%40danwin1210.me.


Re: [qubes-users] Re: sys-usb issues recognizing devices & maintaining drive connections

2020-08-07 Thread 'awokd' via qubes-users
'Антон Чехов' via qubes-users:
> Hi,
> 
> I just wanted to ask if there is hope getting sys-usb to work on the G505s 
> in the future? I tried sys-usb in Qubes 4.0 and 4.1 with and without 
> kernelopts irqpoll but unfortunately it doesn't work for me. 
> 
> Off-topic:
> Suspend doesn't work in 4.0 but it works in 4.1.
> 
Sys-usb works on mine with that irqpoll option, but it's pretty slow.
Might be picky about USB devices. Suspect it's actually something to do
with how Coreboot set up interrupt tables, not Qubes, but could be way off.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/69fa8bcb-3e93-0cc0-eed8-5c65edfbb211%40danwin1210.me.


Re: [qubes-users] qvm-usb does not see any usb devices

2020-08-07 Thread 'awokd' via qubes-users
Cranix:
> After bunch of reboots system started to see devices
> connected to two usb ports(3.0), I have a few usb 2.0 ports
> that are still not visible to sytem.
> 
> Any ideas how i can debug this?
> On another os all ports work fine.
> 
Review sys-usb's journalctl/syslog for errors as you plug and unplug USB
devices. Try also changing sys-usb to a different template temporarily.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3176e502-2422-0736-6987-b79429a20a02%40danwin1210.me.


Re: [qubes-users] Memory snapshot

2020-08-07 Thread 'awokd' via qubes-users
martinga...@gmail.com:
> Hello, I'm running a VM which is suspected to contain malware. Therefore I 
> would like to get a snapshot of the VM's RAM in order to further analyze it.
> 
> Can this be done in Qubes? 

Qvm-pause might do it. Not sure where it saves the file for memory.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9470e018-70d2-240c-89b9-e604d31f1036%40danwin1210.me.


Re: [qubes-users] network installation of qubes

2020-08-07 Thread 'awokd' via qubes-users
flatten:
> I know the traditional way of installing qubes using usb drives. Can qubes
> provide network installation (using iPXE or something else)?

I remember someone got Qubes installed by PXE boot. Search for how to
install Fedora via PXE, it would be similar.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5b9427d6-4bc9-1035-eeae-29d755532556%40danwin1210.me.


Re: [qubes-users] Barebones templates (stripping down minimal templates)

2020-08-04 Thread 'awokd' via qubes-users
fiftyfourthparal...@gmail.com:

>- How much more can one strip from minimal templates while allowing them 
>to start and retain basic Qubes functions? 
>- Are the current minimal templates really the absolute minimum? 
>- Are there diminishing returns to increases in security by reduction 
>that make this simply not worth the time or effort?  
>- How would you go about probing which packages/functions to remove? 
>(especially since I'm not technical--tech-savvy, but not technical)
> Tried it a number of years ago. Building a Debian template with
-no-install-recommends (something like that) initially resulted in fewer
packages, but installing required qubes packages pulled many of them
back in. That way you start with the absolute minimum, and only add back
in what you need. However, the delta between minimal and my custom
template wasn't big enough for me to continue using/maintaining it.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/455aa06b-b47d-3db2-526c-ef43e0cf8015%40danwin1210.me.


Re: [qubes-users] Expanding dom0 after partition size increase

2020-08-04 Thread 'awokd' via qubes-users
groverj:
> I have a dual boot set up, and have recently increased the size of the hd 
> partition I wish to allocate to QubesOS.
> 
> N.B. I made sure to clone the entire disk before starting as a precaution!
> 
> Here is what I have attempted thus far:
> 
> I successfully increased the size of the dev/sda4 partition using a live 
> usb of gparted, and subsequently the /sda5 partition within - this worked, 
> but of course, the LUKS encrypted partition on which dom0 resides does not 
> automatically expand as a result. Qubes boots exactly the same as before, 
> showing no changes.
> 
> From what I've read, I believe this to be a multi stage process requiring a 
> resize of the file system, but most of the instructions I can find seem to 
> refer to an older version of gparted (and use commands such as 'resize' 
> that apparently do not work on versions of libparted 3+).
> 
> What would be the next step in expanding the space available to dom0?
> 
> 
Nothing unique to Qubes, so any existing docs covering resizing LUKS
encrypted LVM partitions would be similar (e.g.
https://help.ubuntu.com/community/ResizeEncryptedPartitions). Only
wrinkle is most Debian LiveCDs don't include the thin-provisioning-tools
package, so apt install it before resizing.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f5254918-b9d8-5c50-b331-f6c035ee6558%40danwin1210.me.


Re: [qubes-users] Re: YouTube Sound & Video

2020-07-24 Thread 'awokd' via qubes-users
Pmonf:
> Thanks for the help. I don't know what I am looking at but here is the 
> whole ball of wax down to the software rendering line: cat Xorg.0.log
> [   159.890] 
> X.Org X Server 1.19.3
> Release Date: 2017-03-15
> [   159.890] X Protocol Version 11, Revision 0
> [   159.890] Build Operating System:  4.9.3-200.fc25.x86_64 
> [   159.890] Current Operating System: Linux dom0 
> 4.19.128-1.pvops.qubes.x86_64 #1 SMP Sun Jun 28 06:19:18 UTC 2020 x86_64
> [   159.890] Kernel command line: root=/dev/mapper/qubes_dom0-root 
> rd.luks.uuid=luks-cc9a361d-df73-48c7-bccb-e6f389932480 
> rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap i915.alpha_support=1 
> rhgb quiet rd.qubes.hide_all_usb plymouth.ignore-serial-consoles
> [   159.890] Build Date: 15 March 2017  06:37:12PM
> [   159.890] Build ID: xorg-x11-server 1.19.3-1.fc25 
> [   159.890] Current version of pixman: 0.34.0
> [   159.890] Before reporting problems, check http://wiki.x.org
> to make sure that you have the latest version.
> [   159.890] Markers: (--) probed, (**) from config file, (==) default 
> setting,
> (++) from command line, (!!) notice, (II) informational,
> (WW) warning, (EE) error, (NI) not implemented, (??) unknown.
> [   159.890] (==) Log file: "/var/log/Xorg.0.log", Time: Fri Jul 24 
> 15:40:39 2020
> [   159.891] (==) Using config directory: "/etc/X11/xorg.conf.d"
> [   159.891] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
> [   159.893] (==) No Layout section.  Using the first Screen section.
> [   159.893] (==) No screen section available. Using defaults.
> [   159.893] (**) |-->Screen "Default Screen Section" (0)
> [   159.893] (**) |   |-->Monitor ""
> [   159.893] (==) No monitor specified for screen "Default Screen Section".
> Using a default monitor configuration.
> [   159.893] (==) Automatically adding devices
> [   159.893] (==) Automatically enabling devices
> [   159.893] (==) Automatically adding GPU devices
> [   159.894] (==) Automatically binding GPU devices
> [   159.894] (==) Max clients allowed: 256, resource mask: 0x1f
> [   159.894] (==) FontPath set to:
> catalogue:/etc/X11/fontpath.d,
> built-ins
> [   159.894] (==) ModulePath set to "/usr/lib64/xorg/modules"
> [   159.894] (II) The server relies on udev to provide the list of input 
> devices.
> If no devices become available, reconfigure udev or disable 
> AutoAddDevices.
> [   159.894] (II) Loader magic: 0x825e00
> [   159.894] (II) Module ABI versions:
> [   159.894] X.Org ANSI C Emulation: 0.4
> [   159.894] X.Org Video Driver: 23.0
> [   159.894] X.Org XInput driver : 24.1
> [   159.894] X.Org Server Extension : 10.0
> [   159.895] (++) using VT number 1
> 
> [   159.895] (II) systemd-logind: logind integration requires -keeptty and 
> -keeptty was not provided, disabling logind integration
> [   159.897] (--) PCI:*(0:0:2:0) 8086:9b41:17aa:5079 rev 2, Mem @ 
> 0xb000/16777216, 0xa000/268435456, I/O @ 0x3000/64, BIOS @ 
> 0x/131072
> [   159.898] (II) LoadModule: "glx"
> [   159.898] (II) Loading /usr/lib64/xorg/modules/extensions/libglx.so
> [   159.911] (II) Module glx: vendor="X.Org Foundation"
> [   159.911] compiled for 1.19.3, module version = 1.0.0
> [   159.911] ABI class: X.Org Server Extension, version 10.0
> [   159.911] (==) Matched intel as autoconfigured driver 0
> [   159.911] (==) Matched modesetting as autoconfigured driver 1
> [   159.911] (==) Matched fbdev as autoconfigured driver 2
> [   159.911] (==) Matched vesa as autoconfigured driver 3
> [   159.911] (==) Assigned the driver to the xf86ConfigLayout
> [   159.911] (II) LoadModule: "intel"
> [   159.911] (II) Loading /usr/lib64/xorg/modules/drivers/intel_drv.so
> [   159.914] (II) Module intel: vendor="X.Org Foundation"
> [   159.914] compiled for 1.19.3, module version = 2.99.917
> [   159.914] Module class: X.Org Video Driver
> [   159.914] ABI class: X.Org Video Driver, version 23.0
> [   159.914] (II) LoadModule: "modesetting"
> [   159.914] (II) Loading /usr/lib64/xorg/modules/drivers/modesetting_drv.so
> [   159.915] (II) Module modesetting: vendor="X.Org Foundation"
> [   159.915] compiled for 1.19.3, module version = 1.19.3
> [   159.915] Module class: X.Org Video Driver
> [   159.915] ABI class: X.Org Video Driver, version 23.0
> [   159.915] (II) LoadModule: "fbdev"
> [   159.915] (II) Loading /usr/lib64/xorg/modules/drivers/fbdev_drv.so
> [   159.917] (II) Module fbdev: vendor="X.Org Foundation"
> [   159.917] compiled for 1.18.99.901, module version = 0.4.3
> [   159.917] Module class: X.Org Video Driver
> [   159.917] ABI class: X.Org Video Driver, version 23.0
> [   159.917] (II) LoadModule: "vesa"
> [   159.917] (II) Loading /usr/lib64/xorg/modules/drivers/vesa_drv.so
> [   159.917] (II) Module vesa: vendor="X.Org Foundation"
> [   159.917] compiled for 1.18.99.901, module version = 2.3.2
> [   159.917] Module class: 

Re: [qubes-users] Whonix configuration

2020-07-24 Thread 'awokd' via qubes-users
E:
> Greetings,
> 
> 
> I had a question about configuring the Whonix network connection.  It
> has to do with a possible timer associated with an exterior facing IP
> address.  How can a exiting IP become static. On several occasions,
> websites log out a user for changing the IP address.  Somehow, it's
> associated with a timer.  Would that be the network timer at the bottom
> of the network tab in qubes settings?

No. Tor periodically changes exit nodes for a site if there is no
activity. If you must use a site like that and want to remain anonymous,
the only solution might be VPN over Tor, but it's easy to shoot yourself
in the foot by purchasing VPN access in a way that can be tied back to
your identity.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/18ccbf6a-453d-4dd6-3d39-731a963ace9d%40danwin1210.me.


Re: [qubes-users] wired problems with 4 screens and 2 graphics boards: ps/2 mouse and kbd lock up, machine still running, but not usable.

2020-07-24 Thread 'awokd' via qubes-users
ludwig jaffe:
> I disabled hyper-threading, and the box feels more stable.
> But I am not sure if it was the problem.
> 
> On Tuesday, July 21, 2020 at 1:35:01 PM UTC, ludwig jaffe wrote:
>>
>> Hi, the machine still crashed, so I need to give it a long memtest
>> to see if it has any loose bits, but ECC memory should protect against
>> such.
>> Other suggestions?
>>
>>
>>
>> On Monday, July 20, 2020 at 6:36:24 AM UTC, ludwig jaffe wrote:
>>>
>>> So thanks for the tip, I have now put videoram min to 36000 and overhead 
>>> to 0.
>>> Lets see if the machine still bugs around.
>>>
>>> BTW, any thoughts on fighting the ME using qubes, so no more
>>> complete disassembly of laptops, de-soldering flash chips,
>>> soldering some small circuits to the south bridge and so on.

All 4 monitors on the same graphics card is a good idea. You might also
try a different DE than XFCE. I'm basing that on some past posts here,
so don't have any specific recommendations on ones that better handle
multiple displays.

Disabling ME is specific to your hardware, and not really Qubes related
per se. Only recommendation there is to carefully shop for Qubes
compatible hardware that comes with ME already as disabled as possible,
or older AMD hardware that doesn't have one.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e10b89a9-8c5b-197f-72c0-350e664ec101%40danwin1210.me.


Re: [qubes-users] Re: YouTube Sound & Video

2020-07-24 Thread 'awokd' via qubes-users
Pmonf:
> An update: I found this which appeared to describe my problem: 
> https://www.qubes-os.org/doc/intel-igfx-troubleshooting/
> 
> I checked /var/log/Xorg.0.log and found  the "reverting to software 
> rendering" line. I then followed the recommended fix for EFI by adding "
> i915.preliminary_hw_support=1" to the xen.cfg file. I then rebooted but the 
> boot failed. Since the drive was encrypted I could see no way to get back 
> to change xen.cfg back to the original. So I used a live LM 19.2 stick to 
> see if I could access the file from it. It did ask for my encrypt password 
> but would not access the drive. I finally had to re-install the Qubes OS. 
> No loss, except the time involved. But I can still not watch videos.

Good troubleshooting steps. That i915 is a bit dated though, so I
suspect you have some other Intel video driver related issue. Further
review the Xorg.0.log file prior to the line about software rendering,
and see if you can locate a reason for it being unable to use hardware
acceleration. There may also be clues in dom0's "sudo journalctl -b" log.

PS You should have been able to edit xen.cfg using your method, but
without decrypting. For future reference at least, it's located under
/boot/efi/EFI/qubes.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b61c84a9-2a59-f21f-c36e-e5bd9b5cc878%40danwin1210.me.


Re: [qubes-users] Deleting a user created template VM, using dom0

2020-07-23 Thread 'awokd' via qubes-users
E:

> Could some one help with the code to delete an appVM from the qubes VM
> drop down menu using dom0.

Might be able to fix in dom0 terminal with qvm-sync-appmenus, or look
around under ~/.local/share.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50279973-29e1-408b-2894-810f60aadb77%40danwin1210.me.


Re: [qubes-users] File syncing between Qubes

2020-07-16 Thread 'awokd' via qubes-users
Michael Haynes:

> *Question: Is there a simple way to setup a dedicated "server" VM*
> *using WebDAV to allow qubes to [automatically / periodically] exchange
> encrypted data even without Internet access?  If so, what are the
> security implications of doing this?  If not, what are some alternative
> ways of automating data transfers between qubes?
> *

Not really a simple way to do it, because like you said, the point of
Qubes is isolation. However, Qubes does have a mechanism (Qubes RPC) to
transfer data between qubes. Look into split-gpg or
https://github.com/freedomofpress/securedrop-proxy, for example. I don't
know if that mechanism could be adapted for your use case. There are
several security implications common to browser extensions in general:

- As an extension, it may have access to your browser history among
other browser contents. Some extensions have been found surreptitiously
phoning home that data.
- Some extensions can uniquely mark your requests, so web browsing
across different qubes could be linked.
- Probably more I'm not thinking of.

Simplest approach might be to only have one Joplin enabled web browser,
then copy & paste links you want to keep to it from browsers in other
qubes. You could then script a qvm-copy to run periodically, or develop
something with qubes-rpc to make it available to other qubes.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/275c600c-90fc-36a4-1b4a-a91dda3055cd%40danwin1210.me.


Re: [qubes-users] Re: Does qubes protect against all firmware viruses ?

2020-07-16 Thread 'awokd' via qubes-users
tomas.schutz...@gmail.com:
> Wait a minute... How checking account number, can represent security risk? 

https://www.consumer.ftc.gov/articles/0196-automatic-debit-scams

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/45f37846-04e8-b96e-74c7-42c9a4b3a73f%40danwin1210.me.


Re: [qubes-users] Verifying VM updates and packages

2020-07-16 Thread 'awokd' via qubes-users
E:
> Logic would dictate that an update is pushed to the all affected VM. 
> But, what I am now concerned with is the update packages that might be
> altered in transit from ISP.
> 
> **Side note, I came to Qubes because I was not satisfied with the
> security protocols offered by MS OS.**
> 
> 
> I will try updating from the terminal session.  can you correct me on
> the command:
> 
> 
> user@VM $ sudo update ???   (are update commands package specific)
> 
> Bizarrely, I've seen some VM are now labeled localhost?
> 
> 
> I am concerned about the file system corruption.  How can I change the
> system, or should I attempt a new install?
> 
> 
> Thanks,
> 
> 
> 
> On 7/14/20 8:19 PM, 'awokd' via qubes-users wrote:
>> E. Foster:
>>
>>> Or do some updates occur because a template VM has been changed in a
>>> repository, and the update package  is then pushed to the respective VMs
>>> using the template?
>> This. Qubes Updater (Qubes menu/System Tools) runs periodically and
>> checks for updates in repos.
>>
>>> Bizarrely, I have a VM and Template VM that keeps requesting to be
>>> updated
>>> and fails.
>> Try updating the template from a terminal session on it.
>>
>>> And lastly, how many times can a device be rebooted before you should be
>>> concerned about Xen issues.
>> Until the hardware fails, I guess. Unless you're talking about hard
>> power offs, in which case I'd be most concerned about file system
>> corruption over any Xen issues.
>>
> 
Preventing packages from being altered in transit relies on the various
distributions' security measures, not anything specific to Qubes. I feel
you can reduce the likelihood of an attack by utilizing onion
repositories where possible. Documentation on how to switch exists.

Update commands are specific to the distribution running in the
template. Debian is apt update then apt upgrade (as sudo). Fedora uses
dnf. These are not specific to Qubes either.

If you have frequently hard powered off Qubes instead of a proper
shutdown and are now concerned about file system corruption, be aware
that fsck runs on every boot. It can often correct minor corruption, but
if you want to be sure, a fresh reinstall choosing to delete and
recreate the disk partitions should resolve it.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/78b7ed09-30f9-a04f-090a-c5e5792a2c71%40danwin1210.me.


Re: [qubes-users] Qubes in a corporate network behind HTTP proxy [R4.0.x]

2020-07-16 Thread 'awokd' via qubes-users
unman:
> On Wed, Jul 15, 2020 at 11:41:57PM -0700, pr0xy wrote:
>> On 2020-07-15 09:28, pr0xy wrote:

>>> proxy.example.com:8080 
>>>
>>> In R4.0.x how and where would I set this proxy for the Qubes Updates
>>> Proxy? sys-net? sys-firewall? TemplateVMs?

https://github.com/QubesOS/qubes-doc/pull/603/files#diff-50cf93c6cf4fa87fc6b6612d706874a1
may be useful, but possibly also in need of correction.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f07c8424-0320-e649-8399-93c06406b6fb%40danwin1210.me.


Re: [qubes-users] Re: DisposableVM Help

2020-07-14 Thread 'awokd' via qubes-users
Robert Spigler:

> How would I go about properly creating a fedora-32-dvm with the 
> 'template_for_dvms' flag set?

https://www.qubes-os.org/doc/disposablevm-customization/

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7718f51e-31fc-3734-bf71-47501bca04ca%40danwin1210.me.


Re: [qubes-users] Fetching updates after disabling qubes-update-check in clearnet qubes

2020-07-14 Thread 'awokd' via qubes-users
haaber:
>>  <<--snip-->>
>> Though it's not clear to me whether this is actually an issue, I figured
>> I'd do it anyways. My question is, if I wanted to disable
>> qubes-update-check service, how would I go about updating my templates
>> over tor? Do I create debian and fedora templates linked to sys-whonix
>> just to get updates?
> 
> AFAIK the updates themselves run over sys-whonix by default. So, if you
> run e.g. "apt-get update" on your debian-10 template, this connection
> goes over tor. However, the notification about updates to run (yellow
> update wheel widget in the right top corner) goes by standard over
> the AppVM and so, most of the time over the clear (as your clock, that
> updates over sys-net).
> 
> Since user-action is required (by running the update widget, or, as me,
> doing it all by hand), the notification is rather uncorrelated to the
> download action, I second Marek here.
> 
> It is, as always, a convenience-vs-security question. You may uninstall
> the qubes-update-check service and run (checks for) updates by hand (or
> script) periodically in your template-VMs. The gain is small, the pain
> is high, so most people don't do it. That is my pov, maybe there is some
> contradicting one?
> 
In either case, don't forget to have a line in
/etc/qubes-rpc/policy/qubes.UpdatesProxy like:

$type:TemplateVM $default allow,target=sys-whonix

.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3488ef52-ec01-ddd5-eb7f-fb89207703e8%40danwin1210.me.


Re: [qubes-users] Trouble installing Whonix 15

2020-07-14 Thread 'awokd' via qubes-users
shamaarmarti...@gmail.com:
> I wanted to use the uninstall reinstall method to upgrade whonix 14 to 15 on 
> qubes 4.0
> 
> Procedure:
> 1. Delete all whonix template packages 
> 2. Make sure dom0 is updated
> 3. Adjust whonix version to 15
> 4. Attempt to download and configure TemplateVMs with the command:
> sudo qubesctl state.sls qvm.anon-whonix
> 
> Results: various errors
> virtual machine does not exist!
> Got empty response from qubessd
> 7 succeeded 
> 6 Failed
> 
Try installing the whonix-gw-15 and whonix-ws-15 templates manually,
then run that Salt command again.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3300deac-7785-00d9-5fb0-94e94c843202%40danwin1210.me.


Re: [qubes-users] Re: Does qubes protect against all firmware viruses ?

2020-07-14 Thread 'awokd' via qubes-users
tomas.schutz...@gmail.com:
> I am still looking into this, it is a lot of to think of. Do you know any 
> sites where is threat modeling for average user? I was trying dozens of 
> phrases... and i didn't find any threat model website. Everything only for 
> companies and developers, which were completely useless, i even banned 
> these words in my search...
> 
"Threat model" is a generic security term. See
https://www.macobserver.com/tips/how-to/security-build-threat-model/ for
a short example of how to develop one. Very basically, identify what you
want to protect, and against who/what. Then you can identify means to
defend it.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e1d80bef-3c53-c54c-35f2-ad1862c4ad61%40danwin1210.me.


Re: [qubes-users] Can’t get rid off black screen

2020-07-14 Thread 'awokd' via qubes-users
shamaarmarti...@gmail.com:
> I turned off auto start rebooted turned it back on rebooted again. Now I have 
> what appears to be a command screen but I can’t interact with it. The screen 
> is blocking the qubes icon and I keep restarting it and it’s lets me type for 
> a second then disappears back to a black screen. I would reinstall but I 
> didn’t back up the wallet on this qube. Any advice would be helpful. Thanks.
> 
What does auto start have to do with it; are you only getting the black
screen when you start a certain VM?

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/472fe1da-d349-77e0-ca02-ca1c8c2219f8%40danwin1210.me.


Re: [qubes-users] Reattaching PCI device to dom0 via console. Error in documentation.

2020-07-14 Thread 'awokd' via qubes-users
alexhisf via qubes-users:
> 
> The solution at 
> http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/doc/pci-devices/
> Bringing PCI Devices Back to dom0
> echo  > /sys/bus/pci/drivers/pciback/unbindMODALIAS=`cat 
> /sys/bus/pci/devices//modalias`MOD=`modprobe -R $MODALIAS | head -n 
> 1`echo  > /sys/bus/pci/drivers/$MOD/bind
> is not working.
> 1st string - successful
> 2nd string - successful
> 3rd string - successful
> 4th string - error: -bash: /sys/bus/pci/drivers/$MOD/bind : Ambiguous redirect
> 4th string causes error and not working, so impossible to reattach pci device 
> via console.
> 
> Previously i attached my (Primary) GPU to whonix-ws-15. When i clicked to 
> start whonix-ws-15 my PC has reboot. Now after password entering while 
> booting the system, monitor vision disappearing after few minutes. OS is 
> booting normally but without monitor view.
> I switched off system. Inserted 2nd Graphic card and when OS booted i can 
> recieve view from 2nd graphic card but only in console mode. And i can not 
> reattach my 1st Graphic card to dom0 because of represented error. qvm-pci 
> always shows my card at whonix-ws-15. Meanwhile whonix-ws-15 switched to 
> start while  system booting but it doesn't.Thank you.
> 
Try removing the graphic card via qvm-pci or from whonix-ws-15 Qube
Settings/Devices.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/452ea85c-0647-e1b2-e138-bac9bf4caee8%40danwin1210.me.


Re: [qubes-users] Re: need help or support

2020-07-14 Thread 'awokd' via qubes-users
Frédéric Pierret:
> Hi
> 
> On 2020-07-07 11:50, david russo wrote:


>> The main issu is when I want to use internet acces as Firefox comboned with 
>> TOR, I checked my IP on the websit « monip » and Nothing change, tor doesn’t 
>> support the hide IP.

If I understand you right, you are using Firefox to browse to monip and
it shows your real IP, not a Tor one. Make sure you are using the right
Firefox. If you have a fresh install of Qubes, try the one in
Disposable: whonix-ws-15-dvm/TorBrowser (Anondist).

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1822b3dc-16ca-ab39-404c-5e0445ba87db%40danwin1210.me.


Re: [qubes-users] Verifying VM updates and packages

2020-07-14 Thread 'awokd' via qubes-users
E. Foster:

> Or do some updates occur because a template VM has been changed in a 
> repository, and the update package  is then pushed to the respective VMs 
> using the template?  

This. Qubes Updater (Qubes menu/System Tools) runs periodically and
checks for updates in repos.

> Bizarrely, I have a VM and Template VM that keeps requesting to be updated 
> and fails. 

Try updating the template from a terminal session on it.

> And lastly, how many times can a device be rebooted before you should be 
> concerned about Xen issues. 

Until the hardware fails, I guess. Unless you're talking about hard
power offs, in which case I'd be most concerned about file system
corruption over any Xen issues.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/81043d0a-e113-c1d3-eb3e-9db0191a9377%40danwin1210.me.


Re: [qubes-users] LUKS passphrase failures

2020-07-14 Thread 'awokd' via qubes-users
joshkane...@gmail.com:
> Booting into Kali (forensics mode) and unlocking the ssd failed.
> 
> I typed out the passphrase to a text document, confirmed it was correct, 
> and pasted it into the prompt.
> 
> "incorrect passphrase"
> 
> This implies to me that the header was altered in some way.  2 days ago, my 
> battery has completely died...and my laptop is now for all intents and 
> purposes a desktop.  Would that kind of power issue affect the ssd in such 
> a way as to alter the header?
> 
> I regret not having a backup or hash of the headernot so much to 
> recover data, but at this point, to see if it has been altered...or if the 
> passphrase itself was changed somehow...but I'd rather not go down that 
> rabbit-hole of paranoia. 
> 
> There is always the slim chance I am continuing to miss-type 
> somethingafter all.
> 
> On Sunday, July 5, 2020 at 6:03:12 PM UTC-4, haaber wrote:
>>
>>  
>>> I have tried this process with the other kernel options available as 
>>> well, to no avail. 
>>>
>>> Any help or advice (successful or not) is appreciated. 
>>
>> sounds daunting. So did you use a live-linux that has luks 'onboard' 
>> (like tails) ? That way you could distinguish between luks problems and 
>> qubes problems. It would also allow emergency backups before trying to 
>> unbug the actual qubes installation (for that question I cannot help). 
>> Do not play around before data is safe, or, if you can't resist, don't 
>> complain; If you need help with emergency-backup pm me, please. 
>>
> 
I haven't used Kali, but make sure you're trying to decrypt the right
device. It's actually a partition on the SSD you want to mount and
decrypt, not the entire SSD device.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f480901-d8a4-b4c1-d47e-e1713c951dd3%40danwin1210.me.


Re: [qubes-users] Updating Linux and Whonix

2020-07-01 Thread 'awokd' via qubes-users
E. Foster:
> Thanks for the reply, 
> 
> I finally started working on the appVMs with the docs in hand.  I've had to 
> restart my apps designs from the start after reading some of the docs.  
> You're right, there a lot of apps.  I am now trying to find the libre 
> office ones to install in a template hopefully I can get in done in the 
> next few days.  As a matter of fact, I found this passage.  
> 
> in disposablevm-customization.md qvm-prefs: 
> 
> 
> You can set an appVM as a template for a disposableVM.  
> 
> *qvm-prefs fedora-26-dvm template_**for_**dispvms True*
> 
> However, when I tried it I would get the following returned messages: 
> 
> *qvm-prefs: error: no such property: 'template_for_dispVM'*
> 
> *qvm-prefs: error: no such property: 'template_for_dispms'*
> 
> 
> However the exact syntax in the in the Docs show *template_**for_**dispms*.  
> Where for is in italics.  
> 
> How would you activate italics in Dom0 to write the exact syntax?  Or is 
> there another script that will accomplish the feat?  
> 
> 
> thanks,  
> 
> On Friday, June 26, 2020 at 4:50:23 PM UTC, m...@militant.dk wrote:
>>
>> fredag den 26. juni 2020 kl. 17.06.22 UTC+2 skrev E. Foster:
>>>
>>>
>>> None the less, I am still a little worried about what I did during the 
>>> upgrade process.  Because, I can't seem to have any peripheral programs 
>>> such libre office or other in an accessible or visible manner.  ( Currently 
>>> working on the installs).   There are a lot of programs available for quick 
>>> install but once you believe you installed them.  I can't find them in any 
>>> drop down menu.  Perhaps, I did something wrong.  
>>>
>>
>> Whatever programs you need in your AppVM's, needs to be installed in your 
>> template VM's, the AppVM's are based on. Then you have to "refresh" the 
>> menu, becuase you might not want everything in the menu. That is mentioned 
>> here:https://www.qubes-os.org/doc/managing-appvm-shortcuts/
>>
>> However, I am still working on the Zoom install, hopefully, I can figure 
>>> out how to upgrade to fedora 31, ---snip
>>>
>>
>> This might work if you change 30 with 31: 
>> https://www.qubes-os.org/news/2019/05/30/fedora-30-template-available/ or 
>> follow the guide mentioned earlier:
>> On Thursday, June 25, 2020 at 6:12:03 PM UTC, dhorf-hfr...@hashmail.org 
>> wrote:
>>>
>>> fedora 30 is unsupported. 
>>> you should install fedora 31 or 32 first. 
>>> https://www.qubes-os.org/news/2020/04/30/fedora-31-template-available/ 
>>> 
>>>  
>>>
>>
>> Sincerely
>> Max
>>
> 
Which document are you referring to? You shouldn't have random *'s in
the command or parameters. Try "qvm-prefs fedora-26-dvm" (without
quotes) to get a list of valid parameters and what they're currently set to.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/81d4939c-e7ff-6342-8743-958d72148b24%40danwin1210.me.


Re: [qubes-users] Re: Getting started with Qubes (in steps)

2020-07-01 Thread 'awokd' via qubes-users
E. Foster:
> Thanks for responding, 
> 
> I was busy trying to figure out what to do, 1) work on 4.0.1 or 2)start 
> with 4.0.3.  Finally, I decided to go with 4.0.3.  So the install occurred 
> last week with the help of some members of the community.  So now, I'd deep 
> dived into the config stuff.  It's quite interesting and logical but the 
> comands-syntax is a bit rough.  I just hope I don't comprimize my device 
> while I am it.  If it weren't for my ISP trying to slow steam downloads I 
> might have sent you this email a few days ago.  
> 
> thanks, 
> 
> Greetings, 
>>
>> I've been having a lot of difficulty over the past year with Qubes and I 
>> wanted to know if I could get some help with the parameters, and 
>> dependencies. 
>>
>> *1 set up the network connections*
>>  i.e. Wifi
>>
>> *2 set up sys-firewall*
>>
>> *3 set up the sys-net*
>> to use Wifi and Firewall
>>
>> *4 set up  sys-Whonix-gw*
>> to use the wifi, firewall and/sys-net
>>  
>> And a random DSVM that I could use to visit the net for instance.  

Not sure who you're replying to, but all of the above except #1 should
work out of the box on a fresh install. For #1, click the network icon
top right corner by the clock, and configure it from there.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/17872093-e9df-a9f9-fd17-f0a3f7918d58%40danwin1210.me.


Re: [qubes-users] dom0 /qubes version how

2020-07-01 Thread 'awokd' via qubes-users
anon:
> I see there is a 4.0.3 in the website.
> 
> I believe I am using 4.0.1 , dumb question but how do I confirm what
> version am I using?
> 
> 
> I just do the dom0 updates, so imagine things are fine, but shouldn't I
> be on 4.0.3 if that is what is offered on the website?
> 
If your dom0 updates are current, and your template major versions (e.g.
Whonix 15 vs. 14) match and are up to date, you are effectively on
4.0.3. IIRC, there was a change in the installer for partition sizes for
4.0.3 which you wouldn't get unless you did a full reinstall, but the
code is the same.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9d1595f-1b8e-f90a-f930-49947520c713%40danwin1210.me.


Re: [qubes-users] DisposableVM Closing/Stopping Unexpectedly

2020-06-29 Thread 'awokd' via qubes-users
Qubes:
> On 6/29/20 10:03 PM, haaber wrote:
>> On 6/29/20 9:25 PM, Qubes wrote:
>>> On 6/29/20 3:42 PM, Qubes wrote:
 If I try to open a terminal in a dvm, I have tried in both the dvm's
 that are installed by default (Disposable: fedora-31-dvm and
 Disposable: whonix-ws-15-dvm) and one that I created on my own by just
 creating a qube and setting the "Disposable VM Template" flag.

 When I open a terminal in any of these the new disposable VM gets
 created, is started, and the terminal opens briefly, but then closes
 immediately after and the disposable VM gets deleted.

 Which log should I look at to troubleshoot?

Use xterm instead. Gnome terminal does that with dvms because of how it
starts.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/089a9775-ef9d-0a29-29af-d3c1835d3969%40danwin1210.me.


Re: [qubes-users] Qubes Won't Boot with 4.19.125-1 Kernel

2020-06-26 Thread 'awokd' via qubes-users
Qubes:
> On 6/26/20 10:17 PM, 'awokd' via qubes-users wrote:
>>> Should be able to boot with an older kernel.
>>> https://www.qubes-os.org/doc/software-update-dom0/#changing-default-kernel
>>>
> 
> That requires decrypting and booting, but the boot failing and you going
> to a recovery screen from where you can change to an older kernel. You
> cannot change anything while it is encrypted.
> 
/boot is not encrypted, and can be edited by booting the computer from
another OS. Xen.cfg is straight-forward to edit. Grub.cfg can also be
edited, but I don't know what changes to make if you haven't enabled
submenus previously.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9bef6aa7-fbf6-e4f9-6bec-439210a17f2e%40danwin1210.me.


Re: [qubes-users] Qubes Won't Boot with 4.19.125-1 Kernel

2020-06-26 Thread 'awokd' via qubes-users
Qubes:
> On 6/26/20 9:49 PM, qubes via qubes-users wrote:
>> On 6/13/20 5:36 PM, pudding wrote:
>>> I updated dom0 from the security-testing repo today due to the new CPU
>>> hardware bug. After finishing update and rebooting my laptop, it is
>>> stuck on the black screen forever, and will not load the LUKS decryption
>>> screen.
>>> ..
>>
>> Same problem on Lenovo t460 but "standard" repo/update.
>>
>>
>>
> That is a real problem. I guess it is game over without a backup.
> 
> You should be able to get your files off of the disk. I am sure I read a
> procedure in the documentation to mount the encrypted volume elsewhere
> to recover your data. I have not checked if it is possible to decrypt
> the drive while connected elsewhere, whether that is internal or
> connected externally with USB. Or even booted with live media or
> something like tinycore.
> Should be able to boot with an older kernel.
https://www.qubes-os.org/doc/software-update-dom0/#changing-default-kernel

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd40d8c7-f112-ae66-62e7-bccf530d3b85%40danwin1210.me.


Re: [qubes-users] How to split into two gateways

2020-06-26 Thread 'awokd' via qubes-users
'Matt Drez' via qubes-users:
>> Are you sure the second NIC works under Qubes, even by itself? Also, if
>> it's dual ports on a single card, try adding a separate physical NIC card.
> 
> Great thinking! That was one of the first things I have tried. And just to 
> clarify the first NIC is integrated on the mobo and the second one is was 
> added later into a pci slot. Both are single port NICs. 
> 
Might have missed it then, so the second NIC works by itself if you
assign it to the original netvm? If not, the drivers for it may not be
installed/loading correctly. Check sudo journalctl inside netvm for
messages relating to the NIC's init.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/93858191-1cbb-c3d7-fde9-9b88b80eaf68%40danwin1210.me.


Re: [qubes-users] How to split into two gateways

2020-06-26 Thread 'awokd' via qubes-users
'Matt Drez' via qubes-users:
>> Try just doing the passthrough first. If you can get the NICS to show up
>> in `lspci` in the two sys-nets and configure networking so you can ping
>> out.
>>
> 
>> Command to attach the NIC: `qvm-pci attach sys-net2 dom0:`.
>>
> 
>> PCI-address can be found in the output of `qvm-pci`.
> 
> Those are the exact steps I tried but no luck. 
> 
> 
> I have no problem passing the NIC to the gw and it shows up with lspci but it 
> won't acquire an IP. The "funny" thing is that as soon as the sys-net starts 
> the green light goes out on the the NIC. If I issue an `ip addr` command I 
> cannot even see its MAC. 
> 
> 
> I even tried connecting the second NIC to a completely different network and 
> router but made no difference. 
> 
Are you sure the second NIC works under Qubes, even by itself? Also, if
it's dual ports on a single card, try adding a separate physical NIC card.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/65aa0552-99d1-a195-60ac-3807934d10d5%40danwin1210.me.


Re: [qubes-users] Qubes OS and clonezilla

2020-06-26 Thread 'awokd' via qubes-users
didier.pelli...@gmail.com:
> Hi,
> 
> I'm using EFI and a NVME SSD.
> 
> Here is a screenshot of the error
> 
> [image: IMG_20200618_164119.jpg]
> 
> 
> 
> 
> Le mercredi 17 juin 2020 23:22:49 UTC+2, awokd a écrit :
>>
>> didier@gmail.com : 
>>> Hi, 
>>>
>>> Has anyone had any luck with cloning a crypted Qubes installation using 
>>> Clonezilla? 
>>>
>>> Even using DD the clone just won't boot 
>>>
>>> Thanks 
>>>
>> Should work if you are using legacy BIOS boot on both source & 
>> destination. UEFI boot might need a command on the destination system to 
>> add the new boot source, something like efibootmgr. 
>>
>> -- 
>> - don't top post 
>> Mailing list etiquette: 
>> - trim quoted reply to only relevant portions 
>> - when possible, copy and paste text instead of screenshots 
>>
> 
> Le mercredi 17 juin 2020 23:22:49 UTC+2, awokd a écrit :
>>
>> didier@gmail.com : 
>>> Hi, 
>>>
>>> Has anyone had any luck with cloning a crypted Qubes installation using 
>>> Clonezilla? 
>>>
>>> Even using DD the clone just won't boot 
>>>
>>> Thanks 
>>>
>> Should work if you are using legacy BIOS boot on both source & 
>> destination. UEFI boot might need a command on the destination system to 
>> add the new boot source, something like efibootmgr. 
>>
That's interesting, if you're getting that far in the boot process it
seems like the rest is right. Maybe try to put NVME in SATA
compatibility mode, if it lets you.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/dfb0e4a6-695a-9e01-390a-d94783b8ce6f%40danwin1210.me.


Re: [qubes-users] Qubes OS and clonezilla

2020-06-17 Thread 'awokd' via qubes-users
didier.pelli...@gmail.com:
> Hi,
> 
> Has anyone had any luck with cloning a crypted Qubes installation using 
> Clonezilla?
> 
> Even using DD the clone just won't boot
> 
> Thanks
> 
Should work if you are using legacy BIOS boot on both source &
destination. UEFI boot might need a command on the destination system to
add the new boot source, something like efibootmgr.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a800e8c9-90ac-4a6a-1905-770b7368%40danwin1210.me.


Re: [qubes-users] How to disable or set the qrexec timeout for more than 60 seconds? getting halted because "cannot connect to qrexec agent for 60 seconds"

2020-04-16 Thread 'awokd' via qubes-users
Guerlan:
> "Domain windows10 failed to start (after 60 seconds using it): cannot 
> connect to qrexec agent for 60 seconds"
> 
> 
> After installing qubes-windows-tools, it failed on moving the users folder 
> to the D disk. I followed a guide: 
> https://www.tenforums.com/tutorials/1964-move-users-folder-location-windows-10-a.html
>  
> but after doing it, it reboots. Upon startup, the windows keeps loding 
> (possibly moving the folder, I don't know). Then, since it wont start in 
> less than 60 seconds, Qubes closes it by saying 60 seconds has passed and 
> it couldn't communicate with qrexec. Sometimes it happens even if the 
> windows is up, I guess the windows qrexec fils to load sometimes.
> 
> Anyways, setting it to 0 by doing
> 
> 
> qvm-features windows10 qrexec 0
> 
> 
> has no effect
> 
To give it more time to start up, you can do:
qvm-prefs windows10 qrexec_timeout 300
where "300" is # of seconds allowed.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c367c417-41ec-a672-e382-5b6c5b5cf9f0%40danwin1210.me.


Re: [qubes-users] TALOSII for QubesOS

2020-04-16 Thread 'awokd' via qubes-users
tukaisute:
> I'm thinking of buying a Talos2 for QubesOS, which one do you recommend?
> https://www.raptorcs.com/TALOSII/
> Is anyone using QubesOS with Talos2?
> I looked for it, but it's not listed on HCL.
> 
Unfortunately, Qubes can't currently run on that architecture. See
https://github.com/QubesOS/qubes-issues/issues/4318.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/33c4afd6-f282-5cb4-2c2b-321b2a10a990%40danwin1210.me.


Re: [qubes-users] Creating ones own Insurgo

2020-04-16 Thread 'awokd' via qubes-users
Sven Semmler:
> On Thu, Apr 16, 2020 at 09:16:40AM -0700, Catacombs wrote:
>> As I read on the git hub Skulls page.  There is an individual who bricked 
>> his Lenovo X230 with trying to install CoreBoot.  and can not reinstall his 
>> back up of his original BIOS/EFI.  Not a lot of advice on that board.  
> 
> I share your reluctance, which is why my ME remains for now. 
> 
>> So my question is how do I disable the Intel WiFi driver.  Might easier to 
>> just open back of computer and remove chip.Maybe the Intel Whitelist of 
>> WiFi is just a hoax. I should just try the Atheros chip.  Probably lead to 
>> two hours of re installing QUBES.  Any thoughts?
> 
> The ME runs on a separate processor with it's own OS. Absolutely nothing
> you do in your installed OS has any effect whatsoever on ME. 

True, but he should be able to use a non-Intel USB wifi adapter for
networking and disable the on-board Intel wifi in BIOS config or remove
the card entirely. It's unlikely (but not impossible) ME has drivers
built in that support networking over a 3rd party USB adapter.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a1fc1915-d9ef-ff4a-273a-a0960f2cec31%40danwin1210.me.


Re: [qubes-users] can't open anything in standalone vm ?

2020-04-13 Thread 'awokd' via qubes-users
Stumpy:

> oops. only relied to awokd (sorry).
> repost:
> 
> 
> Thanks,
> gave it a try and either i am misunderstanding the command or something
> else?
> 
> [sam@dom0 ~]$ sudo xl console miffed
> miffed is an invalid domain identifier (rc=-6)
> 
No problem; did you see my reply? Miffed has to be powered on first.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/264338e3-29e7-a89d-aaf1-f97cbc1670de%40danwin1210.me.


Re: [qubes-users] Build USB install with kernel 5+

2020-04-13 Thread 'awokd' via qubes-users
'Max Andersen' via qubes-users:

> I can actually put in an older wireless usb in the machine, and it sees it 
> with lsusb in dom0, but I Dont know how To enable it in vm

In dom0, use qvm-usb to try to attach that device to sys-net. Some USB
devices don't passthrough very well, though.

> Tried qvm-pci
> 
> It showed usb controller on that?
> 
> When runming qvm-pci a sys-net-clone-1 dom0:00_14.0 it failed with got empty 
> response from qubesd and hung

You might be trying to attach the USB controller itself to
sys-net-clone-1. This can work, if you're sure nothing else is on it
(like your keyboard & mouse). Many systems only have one controller
though, so try USB passthrough first.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/98b80349-4b57-ee17-ba72-87af296f55fc%40danwin1210.me.


Re: [qubes-users] Audio Intel PCH card 0 disappeared in DOM0

2020-04-13 Thread 'awokd' via qubes-users
facethefrag:
> Hello 
> (and sorry for previous post as an answer and not new thread...)
> 
> I'm using Ques OS since 4 months and have an audio issue in DOM0 since last 
> Wednesday (04/08/2020), and I'm unable to fix it...
> 
> Any help or advise will be welcome !
>   
> Issue Explanation:
> 
> Intel PCH Audio card 0 is no more present in pulseaudio GUI, only the 
> NVIDIA HDMI audio card 1 is present.
> Although hardware is OK (verified with my previous debian hard drive today).

Possibly try an older kernel in dom0? See
https://www.qubes-os.org/doc/software-update-dom0/#changing-default-kernel
if needed.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f4c552f1-1564-8437-ce1a-49b12a83ee62%40danwin1210.me.


Re: [qubes-users] Where can I find the .cfg file for my VMs in qubes?

2020-04-13 Thread 'awokd' via qubes-users
Guerlan:
> I found
> 
> /var/lib/qubes/appvms
> 
> has folders for each VM, but inside each folder there's only firewall.xml 
> and icon.png
> 
> where can I find the .cfg file that xen uses? And how can I start these VMs 
> using this .cfg? I want to do some xen tests
> 
You were close. All VM definitions are in /var/lib/qubes/qubes.xml. See
https://github.com/Qubes-Community/Contents/blob/master/docs/misc/iaq.adoc#what-is-the-process-flow-when-starting-an-appvm-under-qubes-r4-x
for the full process. Make sure to make a copy of that qubes.xml and be
careful if you want to try editing it directly. Test stopping and
starting sys-net & sys-firewall before rebooting if you do.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2455c374-2971-fe42-cd33-3d6c5c7fb0dc%40danwin1210.me.


Re: [qubes-users] Which version of Xen does Qubes uses? Shouldn't it support OVMF already (HVM EFI boot)?

2020-04-13 Thread 'awokd' via qubes-users
Guerlan:

> Can you tell me more about what is QEMU/stubdomain? Do you know of any 
> reasons for them to not compile xen with efi boot support?

I meant to say libvirt (https://wiki.xen.org/wiki/Libvirt) more than
QEMU. Qubes uses libvirt calls to interact with Xen. Sometimes Xen
specific functionality (possibly OVMF as an example) aren't coded into
libvirt, so Qubes can't use that functionality without direct Xen calls.
I think they try to avoid those, in general. On top of that, the Qubes
utilities may not surface the option, even if it's available in Libvirt.
Different hard drive controllers are an example. It can be added, but
would take a programmer to add it to the layers.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5ccb9dea-6774-0c2d-742a-1ea8878aa384%40danwin1210.me.


Re: [qubes-users] Nyx in sys-whonix - Tor 0.4.2.6 unrecommended

2020-04-10 Thread 'awokd' via qubes-users
taran1s:
> Most probably, the
> "unrecommended" notice is just something in the Nyx monitor which
> preferes some other versions?

Probably. Check the Nyx documentation; unlikely it's related to Qubes
(or Whonix).

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/509e6f5d-07ff-71c4-e88c-a79be920370c%40danwin1210.me.


Re: [qubes-users] Cannot exec qubesdb-daemon

2020-04-10 Thread 'awokd' via qubes-users
General:
> I ran out of space on a thin lvm pool due to a runaway process. This 
> corrupted /var/lib/qubes/qubes.XML which I restored from a backup.
> 
> To recover space, I cleared 2GB of logs RM -rf /var/log/*
> 
> I then had to mkdir /var/log/qubes
> 
> Now qubesd service starts, but on  reboot no VMs start at all, error is 
> "Cannot execute qubesdb-daemon"
> 
Double-check perms on /var/lib/qubes/qubes.xml. Should be 660
root:qubes. If that doesn't do it, likely something else got corrupted
and it's time for reinstall & restore. :(

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9c9d45ed-e5b2-cbd5-0fc7-260fd2a9ff21%40danwin1210.me.


Re: [qubes-users] can't open anything in standalone vm ?

2020-04-10 Thread 'awokd' via qubes-users
Stumpy:
> I recently made a fedora 30 based standalone VM so i wouldnt have to
> goop up my templates with some employer-required programs.
> 
> It was working fine for a day or two but earlier today I sat down and
> wasnt able to start any programs up in this standalown vm?
> I hhave tried from the appfinder menu nada. from the "run command in
> qube" option in the qubes manager, nada. and from a dom0 terminal
> "qvm-run -u root StandaloneVM xterm", nada.
> 
> The vm will start up, and I am able to update it via the update option
> but i cant seem to open any application in this VM. As this is for work
> I really do need to access it but am not sure what to try next?
> 
sudo xl console StandaloneVM

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/464522ad-14dd-5748-a8f3-0104325140fc%40danwin1210.me.


Re: [qubes-users] Domain win10 failed to start (after 60 seconds using it): cannot connect to qrexec agent for 60 seconds

2020-04-10 Thread 'awokd' via qubes-users
Guerlan:
> 
> 
> My Qubes is closing my windows 10 VMs which are based on my Win10 template 
> after 60 seconds, even though they are ok. It says
> 
> 
> Domain win10 failed to start: cannot connect to qrexec agent for 60 seconds
> 
> 
> even though it already had started and I was using it.
> 
> 
> It happened after I installed qubes-windows-tools
> 
Sounds like they didn't install right. In dom0 terminal, check:
qvm-features win10
"Qrexec" is probably set to 1. Try removing with:
qvm-features win10 qrexec ''

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc777528-1dc8-d613-5972-9a6bc195e6d7%40danwin1210.me.


Re: [qubes-users] Which version of Xen does Qubes uses? Shouldn't it support OVMF already (HVM EFI boot)?

2020-04-10 Thread 'awokd' via qubes-users
Guerlan:
> Xen 4.4 has support for OVMF. Which version of Xen does Qubes uses? 
> Shouldn't it already have this option?
> 
"xl info" in dom0 will tell you exactly. Mine says 4.8.5-14. Xen might
be able to support it (although looks like it's not in the default
build), but not the Qubes or QEMU/stubdomain tooling on top of Xen.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f08944d5-8165-44c7-f6b7-d164f560a626%40danwin1210.me.


Re: [qubes-users] Building a new pc for running Qubes OS

2020-04-08 Thread 'awokd' via qubes-users
Mark Fernandes:

> But surely it would be better just to buy it brand new in a shrink-wrapped 
> condition over the counter at a physical store, where you randomly select 
> the hardware from many alternatives? In the UK, we have a store called PC 
> World that seems set-up for such buying strategies in mind.
> 
> Any thoughts?

Good point, that could work too. There is yet another perspective where
everything new that contains ME or PSP is already compromised out of the
box, whereas older hardware lets you disable more thoroughly or avoid.
On the other hand, could just be a cost issue with new hardware. No real
"right" answer, all depends on how you weight probabilities and your
monetary units.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a139e660-92f1-f41a-ca02-157f27e094e0%40danwin1210.me.


Re: [qubes-users] Building a new pc for running Qubes OS

2020-04-08 Thread 'awokd' via qubes-users
Mark Fernandes:

> Forgive my ignorance, but I would have thought that if you were planning on 
> using Qubes OS , you would be looking at 
> obtaining hardware least likely to have been compromised, and so would 
> probably exclude from consideration such second-hand items.
> 
> If anyone has any contrary insights regarding this, would be very happy to 
> be corrected concerning this. Maybe I'm just mistaken?

Not really a contrary insight, but viewpoint perhaps: Depends on if and
how someone might be targeted. For example, shipments with your name on
them can be reliably and surreptitiously intercepted and modified,
whereas the possibility of second hand hardware bought in person with no
advance notice being compromised at the hardware level (i.e. a drive
format won't fix it) is relatively slim.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d235f013-93d0-33fe-e3a0-29ecc2ac94fe%40danwin1210.me.


Re: [qubes-users] Device () available / removed

2020-03-06 Thread 'awokd' via qubes-users
Sven Semmler:

> -> apparently at the same time I also had a VM with qubes-builder
> running

That would do it. It frequently sets up loop devices while doing a
build, so you'd see those messages.


-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7139de52-6a46-42ea-c38b-7cd69e3fd4d3%40danwin1210.me.


Re: [qubes-users] Serial ports in Qubes appvms

2020-03-06 Thread 'awokd' via qubes-users
donov...@unseen.is:
> I'd like to use serial console (via a serial port on the mobo and appropriate 
> cable) into a piece of equipment using an appVM. I tried using dmesg, but 
> dom0 term says "operation not permitted". 
> 
> DM 
> 
Don't believe Xen/Qubes supports serial (or parallel) port redirection.
Options would be to use some basic package in dom0 directly on the
serial port, get a PCI card with serial ports on it and redirect the
card to the AppVM, or a USB to serial adapter and redirect that.

Not sure how you're trying to use dmesg, but you probably have to sudo
to use a /dev/tty serial device directly in dom0.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db51e2d4-2cf8-44e1-af2b-0bb8ada6df7e%40danwin1210.me.


Re: [qubes-users] Obtaining genuine Qubos installer

2020-03-06 Thread 'awokd' via qubes-users
Chris Laprise:

[Snip most of Chris's well-written response; where is the thumbs up
button on my email client?]

> That's why things that would have been shocking (like shutting Linux out
> of recent TCG updates 

Hadn't heard this one, but my first thought was wondering what they were
trying to hide. Do you have a link handy? Searches coming up empty.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/45b6f2f7-7eff-0b23-d5c2-3659154bc92f%40danwin1210.me.


Re: [qubes-users] Secure Boot on Dell 5590 UEFI - failed signature verification

2020-03-06 Thread 'awokd' via qubes-users
Claudio Chinicz:
> Hi,
> 
> I have Qubes running on this machine. It boots UEFI from disk.
> 
> On the boot menu I've checked the Secure Boot and it was unchecked (never 
> changed before). I've checked the box and reboot. So it failed signature 
> verification and I had to uncheck it and continue without secure boot.
> 
> Is there a way to change it and use secure boot? I mean, considering "I 
> trust" what I have now on disk and I want to define the current state as 
> trusted.
> 
> Thanks to all
> 
The OS also needs to support Secure Boot, but Qubes is not one of those.
See https://github.com/QubesOS/qubes-issues/issues/4371 for a longer
discussion.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e24540ad-d7ed-44e1-7d49-01bb012e6de1%40danwin1210.me.


Re: [qubes-users] Fedora30 doesn't update KeePassXC database

2020-03-06 Thread 'awokd' via qubes-users
'Merlin's Beard' via qubes-users:
> When I add a new entry to my KeePassXC database, the .kdbx-file is updated on 
> the system (last modified timestamp is updated), but upon re-opening it the 
> new entry is nonexistent. This happens on Fedora30 qubes, but Debian10 qubes 
> work perfectly fine. The workaround for me is to simply not use Fedora30, but 
> that's not ideal. I haven't tried to see if the same problem exist with other 
> programs/files.
> 
Is the .kdbx file saved in the same location, i.e. somewhere under
/home/user? If you create other files in the same location on the Fedora
based qube, do they disappear too? Try creating a new AppVM based on the
Fedora template, and make sure it's not disposable.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2822b95-9318-da4c-4a7b-2b2253513069%40danwin1210.me.


Re: [qubes-users] debian-10 dvm and Terminal

2020-03-06 Thread 'awokd' via qubes-users
Ulrich Windl:
> Hi!
> 
> I have an odd issue with a debian-10 DVM and the Terminal: If I try to launch 
> a DVM opening the Terminal, the VM starts, the terminal appears for a short 
> moment, then disappears and the DVM is stopped.
> However when I try the other commands (each starting a new DVM): Files, 
> Firefox, Thunderbird, Help, the all work.
> I'm writing this message with a debian-10 DVM using Firefox...
> 
> I'm rather clueless. When using "Terminal" on the fedora-30 based DVMs, it 
> works as expected.
> 
> Any ideas?

Try using xterm instead of terminal. Gnome terminal spawns a separate
process, so Qubes thinks the VM is ready to shutdown. I'm not sure how
it would work under Fedora.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5b02003-c761-acf1-36fa-e03780e8ff87%40danwin1210.me.


Re: [qubes-users] Kernel panic when booting with Kernel 4.19.100 - reinstall kernel?

2020-03-06 Thread 'awokd' via qubes-users
r.wiesb...@web.de:
> Obviously something went wrong with the kernel update, because with
> Kernel 4.19.100 I get a kernel panic error (failed to mount / ), but
> Kernel 4.19.94 works fine. In qubes, how can I reinstall the new kernel?
> 
> thanks
> 
Usually it's "sudo qubes-dom0-update --action=reinstall [packagename]".
Sometimes the kernel package installs, but the dracut update fails
afterwards. In that case, you can rerun dracut with appropriate
parameters. However, it's possible that kernel version installed
correctly and is not compatible with your hardware. In that case, it
would be good to search to see if others have had that issue, and if
not, open one.

-- 
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/db9aeb5b-6cbf-4725-5d58-bbfc5c13d1f8%40danwin1210.me.


  1   2   3   4   5   6   7   8   9   10   >