Re: [qubes-users] Salt management questions

2018-02-15 Thread Connor Page
Please consult
https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
https://www.qubes-os.org/news/2017/10/03/core3/
for more information about admin possibilities and how they’re supposed to 
work. There are simple demo examples as well.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c72a555c-8f94-48a8-9c4c-71c06a1407f2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] template debian-9 no network (Q4r4) ?

2018-02-06 Thread Connor Page
you probably ticked update over Tor option when installing.
templates do not connect to network directly, they use an updates proxy.
I' not sure it can be changed in GUI, but you can find the appropriate rpc 
policy in /etc/qubes-rpc
alternatively you can temporarily set template vm's network provider, but that 
is considered less secure.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3845366-0dc3-4751-a377-83e1e97f4a80%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] after update no VM 'starts' apps anymore.

2018-01-30 Thread Connor Page
sudo xl console -t serial Work

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/45dfccdf-1f00-4b08-92bf-fc5950bd6298%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 4.0-rc3

2018-01-10 Thread Connor Page
The official templates use nftables so shouldn’t be mixed with iptables. I 
didn’t have time to learn about nftables, so just removed nftables package from 
debian 9 template. YMMV.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3c4f1c36-44f1-4363-931f-07462dadf83c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Enable PCI_HOTPLUG

2018-01-03 Thread Connor Page
Hmmm, this kind of makes qvm-pci useless... I think this should be enabled in 
vm kernels and then users who want hotplug enabled could just add that kernel 
flavour to their grub.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2a08f453-cd23-4ac7-84a1-53f006187d3a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [HOWTO] use 2nd drive partition as 'home' drive.

2017-12-12 Thread Connor Page
I’ll disagree with comparison of btrfs to lvm. there is a very significant 
difference between btrfs and lvm. btrfs is like a namespace and lvm volumes are 
block devices. one can put a namespace on a block device. but yes, layers and 
layers of metadata processing required.

BTW, has anyone started a btrfs driver for storage pools? I think it could very 
tricky if at all possible.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7b559ee0-bf28-436f-8391-ba53d451b425%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [HOWTO] use 2nd drive partition as 'home' drive.

2017-12-12 Thread Connor Page
sudo lvcreate -L  --type thin-pool --thinpool  
qvm-pool --add  lvm_thin -o 
volume_group=,thin_pool=

qvm-create -P  ...
or
qvm-clone -P   
set desired private image size using standard tools.

 this will put the private volume in the new thin pool. private volumes are 
mounted in /rw

btrfs may be tricky but you can try in-place conversion in a test vm. don’t 
forget to check fstab. I don’t remember if the fs type is hardcoded there.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8fca5540-a2cb-430a-b2bc-c37b9c960ba7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] [HOWTO] use 2nd drive partition as 'home' drive.

2017-12-12 Thread Connor Page
I agree with Chris. Data specific to a qube should be stored on one of that 
qube’s volume. Backups work then.

so in short, first create a qubes storage pool
qvm-pool --add

qvm-create -P  

if you go for a thin pool, create it first and use volume group and thin pool 
names as options for qvm-pool.

P.S. I’m not sure lvm backend operates properly. File-based backend can also be 
used instead. Just mount the secondary drive in dom0 and use the old trusty 
file driver if worried.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fdeceedb-549a-4cb5-97b1-087199b34d8f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Q4: vm-templates and updates

2017-12-11 Thread Connor Page
Please refer to Qubes issue #3118 which spells it out.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27de156b-aed8-4167-b8fc-316793097622%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] [HOWTO] use 2nd drive partition as 'home' drive.

2017-12-11 Thread Connor Page
I hope you do understand that there is no encryption in what you propose.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2de3ab58-6409-4db7-91c3-fcd0739a5e3a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Q4: vm-templates and updates

2017-12-11 Thread Connor Page
did you update it in R4 before cloning and upgrading?

templates establish a connection to a proxy running in some netvm defined in 
dom0 over a vchan.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0c7b5ea-c3eb-4b40-8356-3cc1a7572842%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Q4: vm-templates and updates

2017-12-11 Thread Connor Page
did you update it in R4 before cloning and upgrading?

templates establish a connection to a proxy running in some netvm defined in 
dom0 over a vchan.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22d38540-b053-4a5f-9cf5-c23ab5260465%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Where is ability to backup and restore backups on 4?

2017-12-07 Thread Connor Page
There are more critical problems than lack of gui frontend at the moment.
Still, backup ui is on the devs' list. See issue #3354

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/615aef9e-5a9d-4f8e-ae38-d6a6b242d935%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] How to change / swap behavior of Ctrl, Alt, Win, and fn keys?

2017-08-06 Thread Connor Page
AFAIK fn does not emit a code and bios will process it only in combinations 
with predefined keys. other keys can probably be remapped. but from my 
exprience I failed to swap fn and ctrl.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/873db90b-1612-4b8f-8475-668684e2323e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] dispvm savefile creation fails when .qubes-dispvm-customized

2017-07-29 Thread Connor Page
qvm-create-default-dvm fedora-25

Try that to check if it fails. If not then starting dvms won't be a problem 
anymore. If it does then there's something wrong with your template.
I use a heavily customized F25 template for dvms and it never fails, but I 
always run qvm-create-default-dvm after any changes to its private image.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d2a6d463-b5db-4d2f-8ec9-e9df4b8b8852%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN-ProxyVM: "Leakproof VPN" by Rudd-O vs. "more involved" method in Qubes Wiki

2017-07-12 Thread Connor Page
On Thursday, February 2, 2017, Chris Laprise  wrote:

> On 02/01/2017 07:36 PM, Connor Page wrote:
>
>> actually I think that reliance on mangle can be avoided since routing
>> table selection can be done by source address rather than firewall marks.
>> marks are good to differentiate different types of traffic but in our case
>> all traffic should be trated the same.
>> there is difference in how traffic from the vpn vm is routed. this leads
>> to two different attack vectors by a potentially compromised server. for
>> the official solution routing tables can be manipulated, for Rudd-O's tool
>> problems may arise from martian packets. some thought need to be given to
>> proper firewalling.
>>
>
> That's why I have iptables block according to the *interface*, which
> bypasses issues caused by odd routing. Anti-leak measures are best
> performed by watching below the IP layer.
>
> Chris
>

after testing the 3 existing solutions I think the official command line
solution is t he most strict and protected.
I just don't get it why "sleep 2" is outside if statement in
qubes-user-firewall-script. why block all vpn traffic for 2 seconds every
time vms connect to or disconnect from the VPN vm?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ39Boo7r7yu%3DPo51SzmBJCokGH1A75Pa1gx-%2BksC%3DPBP9_J1g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] No Wifi Adapter in my-sys-net (based on fedora-24-minimal)

2017-07-03 Thread Connor Page
I guess you need to install any firmware packages for your network devices 
first.
IIRC it's called iwl7260-firmware or something like that.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5e5efdf8-0921-4dae-a49e-71d909297eb3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Bug in qubes-backup or tar?

2017-06-17 Thread Connor Page
qvm-backup has a different syntax and vms are excluded from rather than 
included in a backup.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/90133a68-60e2-404a-b3f2-3f6d14415779%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: PFSense

2017-06-05 Thread Connor Page
On Monday, 5 June 2017 01:42:40 UTC+1, Drew White  wrote:
> 
> So PFSense is NOT the first line of defense then?
> It is behind another guest?

It was the first line of defense from Internet threats. But at the same time it 
was connected to bridges in Fedora netvms that themselves were only connected 
or to be more precise provided bridging and routing services to an external NIC 
(for LAN) and internal VMs (some bridged, some routed). The netvms were not 
connected to the Internet.

> How do you set up multiple NICs for it though?

Somehow pfSense didn't recognise one of two identical NICs that I delegated to 
it. So in the end it had only 3 interfaces: one external physical and two 
internal xen devices to LAN and DMZ. Routing and filtering worked fine in 
pfSense in this setup. I could have possibly created another bridge vm with the 
NIC that didn't work but I thought that would be a waste of resources.

I didn't have much time to spend on this as the server had to be restored back. 
I think it's too early now. We should wait for or help implementing HVM netvms 
in R4.0. Should be trivial then.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84bc2fce-9bd0-43a2-b391-934eb2eaf53c%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: PFSense

2017-05-31 Thread Connor Page
I don't do hotplugging to pfSense. I've created separate Fedora based netvms 
with bridges named LAN and DMZ and connected pfSense to those at start. Then 
other VMs can use those netvms and connect either to a bridge or do the usual 
Qubes routing. Physycal NIC's can be added to tjose vms and bridges. In case of 
routing one needs to masquerade selectively on the bridge interface (qubes does 
masquerading on all interfaces except lo and vif+ by default). In case of 
bridging, vm's config file has to invoke vif-bridge script, provide source 
bridge name and vm's ip address. Then the script will do the rest. qvm-start 
--custom-config=...

This may be not optimal as bridges consume cpu cycles and irq processing. On 
the other hand Qubes currently doesn't support HVM netvms so until v4.0 that's 
the only solution I see. I'll keep playing with it but I suspect virtualised 
pfSense is not a good idea for real life use.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4e3f85fe-53ef-405d-8497-19caa5b144d1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: PFSense

2017-05-29 Thread Connor Page
I've encountered some problems myself. Out of two identical standard Realtek 
cards only one is recognised. :(

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/34ba6327-1bf2-465d-9750-43f7abcc637d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: PFSense

2017-05-24 Thread Connor Page
Drew, as I've said my wifi card is not supported . Perhaps, yours isn't either. 
I need to test something that pfsense can talk to.
all I changed in VM config was to do with virtual interfaces. those are 
correctly recognised as xn0 and xn1.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f353b9dc-b188-4c31-86a0-05d56e8b3bb9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] PFSense

2017-05-23 Thread Connor Page
I've managed to install pfSense as a HVM. not sure if it makes sense to run it 
as a trusted firewall but that is possible. I created 2 netvms called LAN and 
DMZ and created bridges in those. i made a copy of pfSense HVM config and 
changed interface type to bridge, added a second virtual interface and linked 
them to bridges in LAN and DMZ backends. a pci network interface was also 
delegated to that domain (thought it would become the WAN) but pfSense didn't 
recognize it.
I created an alternative config for a Manjaro HVM to connect to the bridge in 
LAN and after manually setting addresses on all network interfaces and bridges 
and a bit of tinkering with iptables I could login to pfSense admin portal from 
Manjaro
I think putting it together with standard appvms and proxyvms in one network 
topology is possible but I haven't tried yet.

for reference re multiple network interfaces connecting to bridges 
http://libvirt.org/formatdomain.html#elementsNICSVirtual

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0283ea0-6d6b-43ee-97de-f4d528357218%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] sys-net internet stops after a few minutes

2017-03-08 Thread Connor Page
you can create a debian-based sys-net and assign network cards to that. hope 
you can get Qubes working for you.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7f939573-976d-48c8-9c48-927c1c4fd764%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] traveling - best practice

2017-02-07 Thread Connor Page
if you're afraid of cameras, just cover it all when entering sensitive 
information like citizen four did.
don't ever enter LUKS passphrase if someone else had an opportunity to boot 
your laptop without your direct supervision.in that case yes, a live USB drive 
is your friend until it is safe to confirm that boot sequence wasn't altered 
and you can trust the bootloader, kernel etc.
I am not that paranoid, so just use a yubikey as a second factor for crowded 
places and under cameras.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2fa85933-7a19-4a24-8aa0-8c1a9a534d57%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] traveling - best practice

2017-02-07 Thread Connor Page
if you're afraid of cameras, just cover it all when entering sensitive 
information like citizen four did.
don't ever enter LUKS passphrase if someone else had an opportunity to boot 
your laptop without your direct supervision.in that case yes, a live USB drive 
is your friend until it is safe to confirm that boot sequence wasn't altered 
and you can trust the bootloader, kernel etc.
I am not that paranoid, so just use a yubikey as a second factor for crowded 
places and under cameras.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/df582865-94b2-43d3-af6c-77e0d6be401b%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Two ways of "true" security.

2017-02-02 Thread Connor Page
I have successfully castrated ME firmware on 2 Haswell laptops so I'd go for 
something more recent but well supported by Linux, reflash and put a non-Intel 
network card for peace of mind.
ideally a free BIOS would be desirable but that restricts the selection to 
quite old generations of chips where another problem exists - they all have 
errors that Intel either can't or won't fix...

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/77afe505-4ff9-4e1b-a19c-5413329ee550%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN-ProxyVM: "Leakproof VPN" by Rudd-O vs. "more involved" method in Qubes Wiki

2017-02-01 Thread Connor Page
actually I think that reliance on mangle can be avoided since routing table 
selection can be done by source address rather than firewall marks. marks are 
good to differentiate different types of traffic but in our case all traffic 
should be trated the same.
there is difference in how traffic from the vpn vm is routed. this leads to two 
different attack vectors by a potentially compromised server. for the official 
solution routing tables can be manipulated, for Rudd-O's tool problems may 
arise from martian packets. some thought need to be given to proper firewalling.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6603fa95-46f6-488b-8b90-13ee95543c18%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VPN-ProxyVM: "Leakproof VPN" by Rudd-O vs. "more involved" method in Qubes Wiki

2017-02-01 Thread Connor Page
Rudd-O's solution uses a separate routing table thus ensuring that all traffic 
from VMs go either to VPN or a "blackhole". This is more robust than relying on 
the main routing table that can be messed up. However, that requires relaxing 
the reverse path filter and I don't remember any mitigation for potential 
attacks by VPN servers exploiting this.
The main advantage is that an rpm package is produced so there's an easy way 
for creating and maintaining multiple VPN VMs based on the same template = 
easier updates.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1b7aff2c-c714-4520-a45c-b14314192c10%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Fedora 25

2017-01-30 Thread Connor Page
I guess qubes tools need to be recompiled against new libraries but userspace 
pulseaudio version is not a problem.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/51b13e2c-f5f0-4650-9516-b1806d2d0e79%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora 25

2017-01-30 Thread Connor Page
I've been using only f25 for about a month now. the upgrade was smooth. just 
needed to tweak qt5 styles and scaling.
looks like now there is a version conflict. qubes-gui-vm requires pulseaudio 9 
but I guess f25 has moved on to version 10.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c51a2258-2153-453c-a14b-800c4a3d5c13%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Linux HVM through Whonix Gateway or VPN

2017-01-26 Thread Connor Page
Linux HVMs don't get network settings from stub domains so all the IPs have to 
be set manually. When network topology is changed, new addresses have to be 
entered.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/737bba86-ff84-42e0-a762-02e36d7639ef%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Cannot persistently mount extra partitions

2017-01-25 Thread Connor Page
you can specify your modified config copy in qvm-start 
--custom-config=/path/to/config vm-name

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/642d1eae-a1d2-4961-b739-b7bc1b5071f5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Disable Intel ME

2017-01-13 Thread Connor Page
thank you for the link. I have successfuly tried it on a Haswell notebook. it 
doesn't disable ME but (supposedly) limits it's functionality by removing all 
modules but 2.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/443c2293-5cb6-4a44-bcc5-56ccc56a90e7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Query - Why unable to clone net-sys VM ?

2017-01-13 Thread Connor Page
you would have to create a new VM, configure it properly and then copy the 
private image from the source VM.
same limitation apply to proxyvms :(

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9272b630-7042-4de0-9906-71912fe07cd6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-09 Thread Connor Page
Sorry Drew, you asked what needs to be installed to make another dom0, not the 
bare minimum that is required. Every Qubes specific package provides a list of 
prerequisites and version conflicts. For instance,
Name:   qubes-core-dom0
Version:%{version}
Release:1%{dist}
Summary:The Qubes core files (Dom0-side)

Group:  Qubes
Vendor: Invisible Things Lab
License:GPL
URL:http://www.qubes-os.org
BuildRequires:  ImageMagick
BuildRequires:  systemd-units
# FIXME: Enable this and disable debug_package
#BuildArch: noarch
Requires(post): systemd-units
Requires(preun): systemd-units
Requires(postun): systemd-units
Requires:   python, pciutils, python-inotify, python-daemon
Requires:   qubes-core-dom0-linux >= 3.1.8
Requires:   qubes-core-dom0-doc
Requires:   qubes-db-dom0
Requires:   python-lxml
Requires:   python-psutil
# TODO: R: qubes-gui-dom0 >= 2.1.11
Conflicts:  qubes-gui-dom0 < 1.1.13
Requires:   libvirt-python
%if x%{?backend_vmm} == xxen
Requires:   xen-runtime
Requires:   xen-hvm
Requires:   libvirt-daemon-xen >= 1.2.20-6
%endif
Requires:   createrepo
Requires:   gnome-packagekit
Requires:   cronie
Requires:   bsdtar
# for qubes-hcl-report
Requires:   dmidecode
Requires:   PyQt4

Dom0 is created by installing qubes tools that pull in their dependencies and 
so on. Yum Extender in dom0 can give you all the prerequisites. Of course here 
we rely on developers being precise when defining them.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7df0a801-2325-4a52-b144-27f266ed1506%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Fedora Really A Good Choice For QubeOS?

2017-01-06 Thread Connor Page
why wouldn't you consult the list of actually installed packages?
https://github.com/QubesOS/qubes-installer-qubes-os/blob/master/conf/comps-qubes.xml

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ddaf1b18-3b91-475d-b998-9c1a9597f534%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] mounting a disk image or volume in app-vm, fast backups

2016-11-14 Thread Connor Page
On Monday, 14 November 2016 19:24:06 UTC, Unman  wrote:
> qvm-block -A allows you to attach an image file to a qube.

BTW, what's the correct way to detach one image file? it's not mentioned in the 
man page :(

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0c1f7742-b9f6-4db2-bd55-e025802c4960%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: mounting a disk image or volume in app-vm, fast backups

2016-11-14 Thread Connor Page
On Monday, 14 November 2016 18:52:27 UTC, pixel fairy  wrote:
> how do you attach an image file to an appvm? 
qvm-block -A  :
for your purpose the file or volume can be in the backupvm.
> 
> what would you recommend for for resizable, or ideally, automatically 
> resizing volume for this? 
lvm or btrfs but inside an image file in dom0 which kind of removes any 
advantage of resizable volumes. parsing partition tables and filesystem 
metadata in dom0 should be avoided.

> 
> the idea is to attach an image an appvm, rsync the data you want to backup. 
> then remount it in a dedicated backupvm which only runs rdiff-backup to an 
> external disk. that way, the backup is fast (rsync and rdiff) and is 
> protected from any malware trying to write to the past, and can be done 
> without having to shutdown any vm.
you may get inconsistent backups. it would make sense to stop it temporarily in 
a consistent state and then send the private image from dom0 to the backupvm. 
this should work work full backups. partial backups would probably have to be 
done your way.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cc1d22b1-798e-4bcd-ad36-2cec5eb92dbc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display Calibration

2016-11-11 Thread Connor Page
the filename of the colour profile .icc-file is stored in the X atom 
_ICC_PROFILE. perhaps, if that is available then the correct profile can be 
selected by gnome settings manager which currently says there are no colour 
managed devices in vms. I think colord service would need to be enabled as 
well. darktable should work  then out of box.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac07ec85-322b-452b-8bc6-ae347dfa4346%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display Calibration

2016-11-09 Thread Connor Page
darktable and firefox can use a defined profile without colord. the profile has 
to be in a specific place and selected as the display profile (with colord 
option switched off). for firefox the full path to the profile should be 
entered in some property that I don't remember exactly right now but it starts 
with "gfx". the rendering intent and colour management mode is set there as 
well. those are documented by Mozilla, you need to google what those codes 
actually mean.

I never found the time to write my own guide but I could possibly review or 
contribute to yours. sorry I can't be more specific as I'm travelling without 
my qubes laptop now.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3b0601c1-7142-4e42-a903-804b6785ab22%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display Calibration and Audio Equalizer for Dom0 ?

2016-11-04 Thread Connor Page
On Friday, 28 October 2016 12:19:56 UTC+1, Laszlo Zrubecz  wrote:

> Can you please describe in more details what and how you achieved?
> 

Found this in bash history backup:

dispcal -H -y l -R
(this is to adjust the brightness to the recommended level)

dispcal -v -m -y l -q l -t 6500 -g 2.2 lenovo_6500_22
(this creates the calibration file with selected quality, white point and 
gamma. inspect the file,  transfer it to dom0 and apply with dispwin 
.cal )

targen -v -d 3 -G -f 128 lenovo_6500_22
(creates a set of patches,you can change the number of patches)

dispread -v -N -H -y l -k lenovo_6500_22.cal lenovo_6500_22
(shows patches and measures them)

colprof -v -D "Lenovo Yoga 2 40% 6500K 2.2" -C "2016 CP" -q m -a G -n c 
lenovo_6500_22
(generates an ICC profile, try that, see if you need to tweak settings to 
improve it)


The Gnome calibration tool uses the same utilities as above but it doesn't know 
that the calibration curves don't get applied in a vm. It should work in dom0 
with direct access to USB and X server though. In any case don't forget to 
apply the calibration file in dom0! 

Hope this helps.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f74cf4fc-a77c-4511-adcc-232b42339100%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Display Calibration and Audio Equalizer for Dom0 ?

2016-11-04 Thread Connor Page
On Friday, 28 October 2016 12:19:56 UTC+1, Laszlo Zrubecz  wrote:
> On 09/03/2016 12:49 AM, Connor Page wrote:
> > I have calibrated my yellow screen using argyllcms. 
> > I don't attach usb devices to dom0 so installed it in sys-usb as well. 
> > used 
> > https://encrypted.pcode.nl/blog/2013/11/24/display-color-profiling-on-linux/
> >  as a rough guide. 
> > to get the calibration done you just need to run dispcal and then transfer 
> > the calibration file to dom0.
> > then test it with "dispwin xxx.cal" in dom0. if happy, create an autostart 
> > item with that command (probably,
> > using the full path to the calibration file) and you're done.
> 
> I just started to experiment with display color correction things.
> 
> I wonder how it is workig in Qubes because as far as i know:
> 
> - the display profile is used only the programs are aware of icc profiles.

Some window managers do this too.
> 
> - the X server runs in dom0, the apps are in AppVMs - but no
> communication about display prifiles (colord) because of the qubes gui
> protocol.

True. There's even no display object to have profile attributes, so colord is 
useless.
> 
> > I went further and created an icc profile for use in firefox and photo 
> > software. 
> If no colord is runnin in an appvm, how they apply your prifile then?
> You just manually configure all of the icc profile aware apps??
> 
Yes and no. ICC profiles consist of two parts, vcgt and colour correction. vcgt 
is used by X server to set gamma and white point. it can be produced separately 
("calibration file"), and loaded by dispwin in dom0. this corrects tint and 
sets midtones as you need them (gamma).
when calibration is working then you can create a colour correction matrix for 
the specific rendering intent you're going to use in icc aware applications. 
that matrix can be saved as an icc profile for vms and manually selected in 
apps. that profile should be used only with the calibration file that was 
loaded when creating the icc profile. as I use only one display and at a 
specific brightness setting then there's no need to change settings anymore. 
when re-calibration is due then files can just be overwritten with new ones.
> 
> Can you please describe in more details what and how you achieved?

follow the guide I referenced above and remember to transfer the calibration 
file to dom0 and apply it there before proceeding. the settings in the guide 
are rather crude but for a first pass they're ok. if it works for you then you 
can try higher quality settings.
> 
> Thanks.
> 
> 
> -- 
> Zrubi

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0182eb7-7313-41c7-b8f2-6ba898d63efd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] проблемы с установкой usb wi-fi адаптера rtl8188eus

2016-10-19 Thread Connor Page
контроллер usb должен быть в той же виртуальной машине.
please use English on this mailing list.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0848d9f3-95bf-446b-b95c-9ac520843ef4%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Proper way of implementing unlock with keyfile instead of passphrase

2016-09-28 Thread Connor Page
so effectively your disk is not encrypted. try adding dracut module crypt-gpg, 
encrypt the key and use it with .gpg extension in the CMDLINE. if that works 
delete the weak passphrase, otherwise there's no benefit for doing all this. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/89d1f5f4-7c1c-4587-8968-15b5d72959c6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: BTRFS?

2016-09-23 Thread Connor Page
Thanks Rusty. People should be aware of this. I think I did reclaim all space 
but fiddled too much with the settings. Anyway, it was a good excercise, I 
learned about btrfs, LUKS and dracut, that wouldn't happen otherwise.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/395b69cc-e910-4e59-a921-6acdfd6627a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] BTRFS?

2016-09-22 Thread Connor Page
In fact, I think the right question is "Will Qubes 4 be compatible with btrfs 
root if vm storage is expected to reside on a LVM thin pool?"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/faba39bf-b1fb-4071-a361-a99a0dcf0366%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: BTRFS?

2016-09-22 Thread Connor Page
I have root, home and var as subvolumes on a btrfs volume. I intended to create 
snapshots before updates. The tricky bit was to put it on a LUKS partition as 
somehow the installer encrypted only the swap partition. Maybe it was my fault, 
not sure now. Anyway, if you do it check that it is on top of an encrypted 
partition. If not, you're in for some practice in manipulating btrfs volumes 
and manual setup of dm-crypt ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c1ca2764-84f6-4a9f-92f9-7dc35840b1d9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: rc.local iptables persistence on reboot

2016-09-22 Thread Connor Page
world writable script executed as root is the worst advice I've ever seen on 
this mailing list.
please don't do that!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e7e78db5-7bcb-43f0-9464-518747a10d37%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: rc.local iptables persistence on reboot

2016-09-21 Thread Connor Page
I once managed to add a line break before the shebang. Took me a bit of time to 
figure it out why vm services did not start.
I can't see what could fail in your script other than $PATH being incomplete or 
unset.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/61641b02-1786-4580-b698-dacc998b602d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Does QubesOs does not source ~/.profile on purpose?

2016-09-20 Thread Connor Page
the source code of qvm-run is your best documentation of how applications are 
run without logging in :)
here is the session that is started in vms. I like the hangman :)
https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/appvm-scripts/usrbin/qubes-session

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9cf3e541-d1ea-4e56-99f1-42bb8d5bd181%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: rc.local iptables persistence on reboot

2016-09-20 Thread Connor Page
would you mind posting the whole script?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c57c2660-fa29-4895-9e68-454a776b2226%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Blank screen after 10 minutes

2016-09-20 Thread Connor Page
try Presentation mode in the power manager panel plugin.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2aeeb353-0061-4c94-ab59-21519323781f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Proper way of implementing unlock with keyfile instead of passphrase

2016-09-18 Thread Connor Page
https://www.kernel.org/pub/linux/utils/boot/dracut/dracut.html#_crypto_luks_key_on_removable_device_support

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/84b34823-f1e7-4eaa-ac94-2e21782b9cba%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] rc.local iptables persistence on reboot

2016-09-18 Thread Connor Page
does it start with this?
#!/bin/sh

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8b9442e-92eb-4c19-8e56-57277ca0e1da%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Does QubesOs does not source ~/.profile on purpose?

2016-09-18 Thread Connor Page
technically the user "user" is not logged in so the profile files are not 
sourced. use .bashrc if you want to modify terminal sessions.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6bf2d450-a8e6-4aac-8f05-6d61c38b7575%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: netvm doesn't recognize physical hardware switch state

2016-09-15 Thread Connor Page
no. it looks exactly as acpi problem. have you tried a Fedora live dvd/usb? If 
it doesn't work then the problem is not specific to Qubes. please try.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b9bf38a1-c63c-4e97-9faa-59cd41146cdd%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: netvm doesn't recognize physical hardware switch state

2016-09-14 Thread Connor Page
with such a fairly fresh kernel you probably should make sure you also have the 
latest bios. some people also claim that resetting bios settings miraculously 
makes their wifi work in Linux. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/31c41e26-5c1c-48a9-afec-07c54e853081%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] netvm doesn't recognize physical hardware switch state

2016-09-13 Thread Connor Page
does it work in plain Fedora?
your problem most probably is not directly related to the network card itself. 
it could be caused by bios settings and wrong acpi config in kernel. I used to 
have the same problem when I first tried Qubes R2 on Lenovo Yoga 2 13. 
ideapad_laptop module back then would work for all models except for my Yoga. 
nothing could help but patching the module and recompiling dom0 kernel. then 
around kernel version 3.18 it was fixed upstream and Qubes kernel has been good 
for me ever since. live distros based on Debian stable ( kernel version 3.16) 
can never initialise the built-in wifi card. i found the patch on some Ubuntu 
forum.
you haven't provided any information about the kernel and Qubes versions that 
you've tried but I hope this information can be helpful. and check your bios 
settings just in case.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/930c8f51-0690-45c4-a2f9-dfe868b80e6f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Streisand - AntiCensorship software

2016-09-08 Thread Connor Page
it's on the front page:
"All software runs on ports that have been deliberately chosen to make 
simplistic port blocking unrealistic without causing massive collateral damage. 
OpenVPN, for example, does not run on its default port of 1194, but instead 
uses port 636, the standard port for LDAP/SSL connections that are beloved by 
companies worldwide."

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f3165c9a-5114-4861-b5e2-7c23fa34ae59%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Newbie Qubes questions.. please help!

2016-09-08 Thread Connor Page
Think of Whonix as a possible compartment of your digital life that gives more 
anonymity online. It would be more or less securely separated from other 
compartments. In order to save space and admin effort common parts of these 
compartments (i.e., the root filesystem, kernels, modules) are made as 
templates. Templates cannot be persistently modified by a running vm based on 
that template. this is quite different from plain virtualbox machines. 
moreover, the type of virtualisation of Linux-based vms is different for the 
time being.
you can compile your own kernel for dom0 but then you're on your own. there is 
a good reason to stick to LTS version though.
no boot partition won't stop from decrypting and mounting a LUKS partition from 
any live DVD/ISO if the passphrase is known. wrong LUKS header may actually 
help (if you carry the correct one on a USB stick) but that is a very dangerous 
route.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/250a1f5f-d419-4e24-8cba-2e0e34e0ce28%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Streisand - AntiCensorship software

2016-09-07 Thread Connor Page
agree, when I looked at it some time ago I could not imagine why I would need 
all of that. too large an attack surface for my taste. however, I did 
investigate what individual elements are capable of and borrowed some ideas, 
like using port 636 and tls-auth for openvpn.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5bcb49ca-8310-43c7-8d93-778f05c3f9fc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: Request for test: Re: [qubes-users] Fedora 24?

2016-09-07 Thread Connor Page
and forgot to mention, I followed the documentation for upgrade from 21 to 23, 
i.e. used an additional disk image for cache and modules. otherwise it would 
fail with my densely populated templates.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/348c7a33-d201-429a-aed9-f907e203e4d3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: Request for test: Re: [qubes-users] Fedora 24?

2016-09-07 Thread Connor Page
I upgraded all fedora-based vms to 24 about a month ago when I noticed a qubes 
repo for that. all upgrades went smooth but I suggest backups first because of 
different versions of software. things may break if you switch back to 23. I 
had this problem with remmina, it couldn't work properly with config from 23 
but after changes in 24 and switching back to 23 it was again broken. in the 
end I just stopped using it.
I think f24 is more memory hungry. because of that I created a separate update 
vm so that RAM can be quickly freed up after updating dom0.
I haven't noticed any downgrade in performance but that may happen for users 
with limited RAM and swaps on HDDs.
f24 pushes substantial amount of updates daily, however delta RPMs don't 
consume much bandwidth.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8dfcfac1-eac6-4b67-9e14-181cb6ba58a0%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] 3.2-rc1, xfce4 volume control

2016-09-07 Thread Connor Page
volumed and mixer are not maintained by xfce team anymore [1]
since audio relies on pulseaudio it would make sense to use pulseaudio plugin 
and key bindings in dom0.

[1] http://www.xfce.org/about/news/?post=1425081600

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2af979d-b61a-48d6-91e6-7a5fa66fb484%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Networking between Linux and Windows VMs

2016-09-05 Thread Connor Page
they should be connected to the same firewallvm, not netvm. iptables in netvms 
are set up differently.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3955b649-e8b3-495d-8a4c-7315f3c2909f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] yubikey challenge-response

2016-09-05 Thread Connor Page
are you trying to login or unlock? the documentation covers only unlocking the 
screensaver.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/50183660-d1ea-4f65-b21c-69cc45455646%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Recovery Disk & Suggest Live Linux CD to recovery system like WinPE

2016-09-04 Thread Connor Page
I think nowadays many live installers that have capability to install on 
encrypted partitions give possibility use the tools in a terminal window. For 
instance, when I realised that somehow only a swap partition got encrypted in a 
fresh Qubes install I launched Manjaro live ISO, dd root partition to a temp 
location, created a new dm-crypt/LUKS partition, mounted that, dd root 
partition back, chroot'ed into that updated crypttab and grub config, rebooted 
and was happy.
I think it would be most appropriate to use a distro with a recent kernel not 
much older or newer than Qubes dom0 kernel.

Caution: you should trust the recovery system.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/25b714fa-2f13-42ac-a44e-ad77c6e17098%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] security question: keepass vault password

2016-09-04 Thread Connor Page
it makes an evil maid's mission a bit more complicated

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47b5f46c-0719-403b-9e65-b8eb223cc3f7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Display Calibration and Audio Equalizer for Dom0 ?

2016-09-02 Thread Connor Page
I have calibrated my yellow screen using argyllcms. I don't attach usb devices 
to dom0 so installed it in sys-usb as well. used 
https://encrypted.pcode.nl/blog/2013/11/24/display-color-profiling-on-linux/ as 
a rough guide. to get the calibration done you just need to run dispcal and 
then transfer the calibration file to dom0. then test it with "dispwin xxx.cal" 
in dom0. if happy, create an autostart item with that command (probably, using 
the full path to the calibration file) and you're done.

I went further and created an icc profile for use in firefox and photo 
software. note that some displays use proprietory colour-mixing algorithms so 
Linux tools may be ineffective with them :( (e.g., pentile matrix on some very 
high resolution screens)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c473caf8-240d-420e-b08b-77a0c998543e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Suggestions for running media server?

2016-09-02 Thread Connor Page
No. 4 makes sense. sys-usb shouldn't know the encryption keys. encrypted block 
device can be attached to a server vm where it would be appropriately decrypted 
and mounted, possibly from dom0 via qvm-run (you can start a vm, attach 
storage, decrypt and mount it by a short script using qvm-* command line tools) 
. server software should be run as a different user that can't login or use 
sudo. enabling services is a bit tricky in template-based vms, so the easiest 
solution is to create a small template with just the bare necessities for the 
server software, enable the service in it and then use it just for one server 
vm.
I would suggest attaching that server vm to a separate firewall vm. that way 
allowing incoming traffic in iptables should be both easier and more secure. 
firewall rules are created in different scripts in proxyvm vs netvm and appvm. 
follow Qubes documentation and don't forget to make scripts executable :)
although I used to run file and web servers on a Qubes PC I now tend to think 
that Qubes is meant to protect clients, not servers. 

P.S. Qubes networking uses NAT so LAN won't actually see any broadcast messages 
from the server unless it runs in a netvm.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4ab36370-8472-4b28-b72c-f337654b3bfc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - MacBookPro8_1

2016-08-30 Thread Connor Page
just a word of caution, your network cards and thunderbolt devices will have 
access to all memory they can address and at least one USB controller will be 
in dom0 as the keyboard is USB. that controller actually has an external port. 
don't count on Qubes to prevent hardware attacks or keep it safe from buggy 
drivers.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c7070c86-e37c-401f-a53b-043e0df8e1fc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Custom initramfs

2016-08-27 Thread Connor Page
after giving it a thought I decided keep usb devices out of dom0. the solution 
for debian is real 2FA but ykfde is for lazy people. I gave it as an example of 
dracut hooks. theoretically you can rearrange hooks so that yubikey 
authentification happens before rd.qubes.hide_all_usb is processed but there is 
a risk that qubes hooks might fail and leave usb controllers in dom0. if you 
already have a controller in dom0 then perhaps it wouldn't make security worse.
while initially I thought it would be interesting to try, the only situation 
when yubikey could actually improve security is having to boot a Qubes PC under 
unavoidable surveilance.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20ae7d75-db1c-42eb-be2a-b66c8644dd5a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Custom initramfs

2016-08-26 Thread Connor Page
this is an interesting idea. initramfs is generated by dracut. read this 
https://github.com/nj0y/ykfde/blob/master/README-dracut.md

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/67468a7d-dc9d-4fa3-9dc7-8e8871f6221a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Manual dpi control in vm's for HIDPI diplays

2016-08-26 Thread Connor Page
this is not a universal approach but should work fine for gnome apps. you 
should type them in terminal applications in each vm.

a more comprehensive approach to cover all bases is to set proper dpi for X 
server, Xft, gsettings (if gnome-settings-daemon runs), xsettings (IIRC Debian 
template needs that), dom0 desktop environment (KDE, Xfce) and use hidpi 
themes/window decorations.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f8570bd-8f60-4c52-be07-d8c221608a7f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Burning a USB attached CDROM

2016-08-26 Thread Connor Page
you should use the drive as normal in sys-usb. just make the private image 
large enough and copy whatever it is you want to burn to that vm.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3ea6bbf7-dc4a-4d1b-b61f-da61ce9bc3b7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Fedora Minimal ProxyVPN template?

2016-08-09 Thread Connor Page
you can install dunst for minimalist notifications.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cabbb300-d9a5-4243-843a-794e9e8bc3df%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Fedora Minimal ProxyVPN template?

2016-08-05 Thread Connor Page
The reality of life is that you can't clone netvms and proxyvms in 
qubes-manager. However, if you create a separate template with all 
customisation saved in /rw and /etc then you will be able to create many copies 
as /rw will be inherited. 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a0f2ee8d-59eb-4870-b45e-3679e571cd5a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Play Audio from AppVm on device attached to USB Cube

2016-07-30 Thread Connor Page
Read the last part at https://www.qubes-os.org/doc/usb/
This should solve your problem unless you want to mix sound from multiple vms.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03a8699f-3bc5-4964-aa5f-6c2fd40b8ebc%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: What do you think about the idea of a FileVM?

2016-07-30 Thread Connor Page
I used to run samba server on Archlinux inside Qubes. Actual data was stored on 
a separate volume group and mounted in the server vm on boot. The main 
difficulty was to do routing and firewalling properly on every change of 
network topology. The main risk was that eventually many vms had to be 
connected to one proxyvm and that was not safe. When I realised that the data 
is more often accessed from outside than inside I just created a NAS (Turnkey 
fileserver running in an unprivileged container actually :) )

Having done all that I believe there should be no traditional network services 
inside Qubes. A storage domain owning storage controllers and disconnected from 
network would make sense but it would require great care in dealing with 
concurrent file access. And it definitely must not have access to images of 
other vms.

I agree with Axon. A need for simulteneous access can be justified only in case 
of different OS'es. My solution to that is simple - ditch Windows :)))

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b44ac1e8-a1c2-484f-85b8-bff7f0b81324%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: No longer able to play videos on youtube after the upgrade.

2016-07-27 Thread Connor Page
I played full HD videos on youtube yesterday after a full update without a 
problem. Have you updated both the template AND dom0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2308b002-6c5e-4b7d-90c8-1fa72fbf0625%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VIF interfaces

2016-07-08 Thread Connor Page
use arp to see ip and mac addresses of vms connected to interfaces. lookup ip 
in qvm-ls -n or qubes-manager
mac addresses are visible in qvm-prefs. assuming your vms don't spoof these 
addresses ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9ce6bad1-e08f-4df4-b81e-8810e676dabf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DispVM available space

2016-06-08 Thread Connor Page
Thank you Marek. I guess the setting should be greyed out same as root image 
size.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/209d800b-268f-4a6f-b501-5c0f6cb3d0c2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] DispVM available space

2016-06-08 Thread Connor Page
I've noticed that there is no private image mounted in /rw in disposable vms.
1. What is the point of private image size setting in Qubes Manager then?
2. Is there an easy way to expand dvm storage without affecting it's template?
3. Am I missing something?

I need to load large files in dvm, check them and then move to another vm. 
There is not enough RAM to use ramdisk.
Any quick hints will be appreciated.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a931885-00e6-47fa-b946-9fd0cd821ff2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.