Re: [qubes-users] Re: Q: Upgrading whonix-ws, auto-remove packages?

2021-10-06 Thread Franz
On Wed, Oct 6, 2021 at 8:30 AM Bernhard  wrote:

> > always use 'sudo apt autoremove' afterwards and never run into problems.
> > So you probably can follow, what the upgrade function told you.
> >
> >
> > Cheers :)
> >
> > Ulrich Windl schrieb am Dienstag, 5. Oktober 2021 um 23:53:02 UTC+2:
>
> > Following the instructions, my upgrade ended with this message:
> > The following packages were automatically installed and are no longer
> > required:
>
>[50 lines removed]
>
> > acl anon-iceweasel-warning apt-file binaries-freedom bsdmainutils
> > bsdtar
> > I'm wondering whether those qubes packages may actually be removed.
> > I'm afraid to break my system when doing so.
>
> I do not share TheGardner's opinion. removing libraries like libcrypto
> or removing python or qubes-core-agent looks *very* suspicious to me.
> I'd think apt got lost. Was there some version change in the repos ??
> (like underlying debian-10 to 11 that was messed up?)
>
>
try to clone the template and update the template, to see if it works with
no risk

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAsVP%3DU%2Be4bq1%3DyMJtZTvTtyKBqqPe2bece%3Da2LubRDgQ%40mail.gmail.com.


Re: [qubes-users] Firefox Account SyncVM

2021-10-02 Thread Franz
On Thu, Jan 17, 2019 at 10:38 PM unman  wrote:

> On Thu, Jan 17, 2019 at 10:20:31AM -0800, R A F wrote:
> > Hi Everyone,
> >
> > I'm trying to find a way to sync firefox bookmarks but I do not want to
> use firefox account. So my question to all of you is:
> > Does anyone knows if there is a possible way to create local account
> that will be hosted on standalone VM so I could connect all Firefox Apps to
> connect to that source ans sync bookmarks, plugins, etc. The whole point
> here is to keep all bookmarks in safe place that same way some people keep
> their passwords keys etc.
> > Maybe if there is no such a solution someone could start new project? I
> would do that myself, but currently do not have advanced coding skills :-(
> >
> > Thanks for all replays
> > BR
> > Raf
> >
>
> Search the archives of this list for discussions on this topic: Firefox
> Bookmarks should get you relevant posts, and links to some sample
> scripts.
> The biggest danger is that your bookmarks will carry identifying
> information between qubes, breaking the isolation model. If you plan for
> this and are aware of the risks then you can adopt anything between
> storing/syncing whole profiles between one "storage" qube and other
> qubes, and copy/pasting bookmarks from storage qube in to other firefox
> qubes as needed.
>
>
A "storage" qubes for bookmarks would need to be "charged"  with bookmarks
from various other qubes, which is both cumbersome and potentially risky.

So why not use a cloud system, such as the Bookmark app for Nextcloud,
which is convenient for that and  seems to be available for Android too.
The only risk I see is that the owner of different VMs may be identified as
the same. But if the problem is anonymity at this level, then, when
required, it is better to use a Wonix qube with a different list of
bookmarks.

>
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/20190118013837.keqgry63jatpvd5s%40thirdeyesecurity.org
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qA9kGgf_nhv9N2P7muK6J%3DxogSwLacA5f-ZktMZeeOJfw%40mail.gmail.com.


Re: [qubes-users] fonts size of Qubes Manager

2021-08-10 Thread Franz
On Tue, Aug 10, 2021 at 5:26 PM Ludovic  wrote:

> On 10/08/2021 01:40, Franz wrote:
> > Hello,
> > got a higher resolution screen, but can no longer read the fonts of
> > Qubes Manager.
> > Any idea to enlarge them?
> >
> Hello Franz,
>
> With the XFCE font settings, on Qubes-OS 4.1b1 the access path is :
>
> *Q menu* > *System Tools* > *Appearance* > on the opened window, choose
> the *Fonts* tab, then change the *Default Font* size (example: from 10
> to 14).
>
> On Qubes-OS 4.0.4, the access path is near of the above path.
>

WOW, I can read again, many thanks, my friend!!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBZe_xhJ5w3mAd5%3D93%2BuLpW%3DAXhkWiv%3DqAhfMCAPXaMjw%40mail.gmail.com.


[qubes-users] fonts size of Qubes Manager

2021-08-09 Thread Franz
Hello,
got a higher resolution screen, but can no longer read the fonts of Qubes
Manager.
Any idea to enlarge them?
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCb5K-4LJYO2Rpc4_v9Si8FDDdyBsz-f1QcK%3D-%2BEebN4Q%40mail.gmail.com.


Re: [qubes-users] langage change after install Qubes os

2021-07-18 Thread Franz
On Sun, Jul 18, 2021 at 5:07 PM Sven Semmler  wrote:

> Qubes OS dom0 is based on Fedora, so I imagine
>
> sudo qubes-dom0-update system-config-language
> sudo system-config-language
>
> and then a reboot. I installed and ran it but haven't actually changed
> the language... might be worth a try.
>
>
For me it worked for the templates, which is the most important

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qC3-tYiHRgvgo%2BxsRST5-X1XhjYvU1e32Epw%2B-K4nnvMQ%40mail.gmail.com.


Re: [qubes-users] USB controllers

2021-07-01 Thread Franz
On Thu, Jul 1, 2021 at 10:33 AM Unman  wrote:

> On Mon, Jun 21, 2021 at 11:22:01PM -0300, Franz wrote:
> > >
> > Other strange things happened:
> > To restore a backup I connected an external USB disk with the backup to
> the
> > second USB qube and under the restore command I clicked on the external
> USB
> > disk to mount it. When I did that, a black background message on the
> upper
> > right part of the screen told me that the disk was removed, while, at the
> > same time it was NOT removed at all because the triangle showed that the
> > disk was mounted and the  content of the external USB disk was shown.
> Using
> > my old and trusted x230 for many years this never happened. So I suppose
> it
> > is strange.
> >
> > Also, the computer seems much slower than my old x230, which is strange
> > being a new computer
> >
> > If you want me to try commands and report results, just ask, I am very
> > willing to do anything that may be helpful to solve these problems.
> > best
>
> Hi Franz
>
> Sorry for the radio silence. I'll dig in to the logs you provided in
> the morning.
>

Many thanks Unman. In the meantime I made other tests for the usb mouse
thing and found a constant behaviour:

When the computer is cold, booting  has about 50% chances of getting the
mouse working when connected to the back USb ports and 25% chances when
 connected to the USB port in the middle of the board.

When the computer is warm there is no chance of getting the mouse working
after booting.

Also I was able to get the files of dmesg and journalctl of the sys-usb VM
when mouse works and when mouse does not work, and the red messages  are
quite different, even if i am unable to understand them.





At this stage I would *seriously* be thinking of looking for a refund or
> replacement - you simply shouldn't be having these issues with a new
> computer, particularly if you had told them you would be running Qubes.
>
> Is it possible for you to boot a live distro from USB and see if the
> same issues exist?
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/20210701133325.GB26428%40thirdeyesecurity.org
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAeAG6WD4D%3DQ4DnoYPnGL49TZiOAfcjZUA8M-%3DjdHwztg%40mail.gmail.com.


Re: [qubes-users] USB controllers

2021-06-21 Thread Franz
On Sun, Jun 20, 2021 at 11:15 PM Franz <169...@gmail.com> wrote:

> Hello all,
>
> I abandoned the computer for a week or so, without doing anything, then,
> for some mysterious reason the mouse worked again. So I  am profiting doing
> the tests Unman asked
>
>
>
>>
>> > > Many thanks it worked perfectly
>>> > >
>>> >
>>> > It worked perfectly for a week or so, then the mouse stopped working.
>>> > Thomas at Vikings, who built the D8 computer with preinstalled
>>> coreboot,
>>> > says it should be a Qubes issue.
>>> >
>>> > How may I tell if it is a Qubes issue or a hardware issue?
>>> > best
>>> >
>>>
>>> You aren't clear on what is happened here, because you haven't provided
>>> sufficient detail..
>>> Do you mean that you allocated a USB controller to a sys-usb, to use
>>> with the mouse. After a week, the mouse stopped working.
>>> When both controllers were attached to a single usb-qube the mouse
>>> worked without interruption.
>>> Is that the position?
>>>
>>
>> Yes, but it worked also when only one USB controller was allocated to the
>> mouse qube.
>>
>>>
>>> Did the other USB qube continue to work?
>>>
>>
>> yes it works, I am able to mount an external USB drive. Also lsusb works
>> and shows the external USB drive
>>
>>
>>> If you type lsusb in the "mouse"-usb do you see the mouse attached?
>>>
>>
>> No,  lsusb hangs, with no output
>>
>
> Now lsusb on mouse-usb gives the following output:
>
> [user@sys-usb ~]$ lsusb
> Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> Bus 008 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
> Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
> Bus 006 Device 002: ID 046d:c408 Logitech, Inc. Marble Mouse (4-button)
> Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
> Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
> Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
> Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> Bus 001 Device 002: ID 0627:0001 Adomax Technology Co., Ltd QEMU USB Tablet
> Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
>
> So yes, I see the mouse attached
>
> .
>>
>>> If you attach another usb device, does lsusb and dmesg show the device
>>> being attached?
>>>
>>
>> dmesg on mouse qube gives a lot of errors, even various red ones. But I
>> am totally unable to understand if they are serious or related to the mouse
>> issue.
>>
>>
> Yes I see a usb key attached
>
> dmesg and journalctl are enclosed as an html files with full colors
>
>
>
Other strange things happened:
To restore a backup I connected an external USB disk with the backup to the
second USB qube and under the restore command I clicked on the external USB
disk to mount it. When I did that, a black background message on the upper
right part of the screen told me that the disk was removed, while, at the
same time it was NOT removed at all because the triangle showed that the
disk was mounted and the  content of the external USB disk was shown. Using
my old and trusted x230 for many years this never happened. So I suppose it
is strange.

Also, the computer seems much slower than my old x230, which is strange
being a new computer

If you want me to try commands and report results, just ask, I am very
willing to do anything that may be helpful to solve these problems.
best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDZ_msXkX1Wn6hfEu_Y-PQE3yahgk4fNRPsF-3nh_mdWQ%40mail.gmail.com.


Re: [qubes-users] USB controllers

2021-06-12 Thread Franz
On Sat, Jun 12, 2021 at 8:51 AM Unman  wrote:

> On Sat, Jun 12, 2021 at 08:23:48AM -0300, Franz wrote:
> > >
> > >> take a look to the `qvm-pci` man page, it explains how to detach.
> > >>
> > >>
> > >>
> > > Many thanks it worked perfectly
> > >
> >
> > It worked perfectly for a week or so, then the mouse stopped working.
> > Thomas at Vikings, who built the D8 computer with preinstalled coreboot,
> > says it should be a Qubes issue.
> >
> > How may I tell if it is a Qubes issue or a hardware issue?
> > best
> >
>
> You aren't clear on what is happened here, because you haven't provided
> sufficient detail..
> Do you mean that you allocated a USB controller to a sys-usb, to use
> with the mouse. After a week, the mouse stopped working.
> When both controllers were attached to a single usb-qube the mouse
> worked without interruption.
> Is that the position?
>

Yes, but it worked also when only one USB controller was allocated to the
mouse qube.

>
> Did the other USB qube continue to work?
>

yes it works, I am able to mount an external USB drive. Also lsusb works
and shows the external USB drive


> If you type lsusb in the "mouse"-usb do you see the mouse attached?
>

No,  lsusb hangs, with no output
.

> If you attach another usb device, does lsusb and dmesg show the device
> being attached?
>

dmesg on mouse qube gives a lot of errors, even various red ones. But I am
totally unable to understand if they are serious or related to the mouse
issue.

If you attach the mouse to the *other* usb qube, does it appear there?
>

yes lsusb shows it there.

If you revert to a single usb qube, does the mouse work for more than a
> week there?
>

I have not tried it yet, but I no longer have the original single USB qube,
so I should reinstall Qubes from zero.

If you move the mouse to the other controller, does the mouse work for
> more than a week?
>

I have not tried it yet, because I wanted to keep it separated. The
controller allocated to the mouse qube is on the motherboard and
administered by coreboot, but the controller allocated on the USB-key qube
is on a PCI card and I know nothing about it. But I am quite sure it would
work because lsusb works, mouse is recognized and disks are mounted.


> Let's think about this.
> Many Qubes users will be using coreboot.
> Many Qubes users will be using more than one usb qube.
> Many Qubes users use a usb mouse for more than one week without
> incident.
> What is different about you? Coreboot, Your hardware.
> I am not saying that your hardware is at fault - it's just that the most
> likely source is *your configuration and hardware in Qubes*.
>
> Of course, if Vikings can point to other users with your hardware and
> coreboot build who use Qubes without a problem, that would help too.
>
>
I asked but Thomas suggested asking the Qubes ML.


> I would prepare another usb mouse, that can work with the other usb
> qube. Use your mouse-usb qube until it "breaks". Plug the mouse in to
> the other usb qube, and start looking at the "broken" usb qube.
> Look in logs, for any events that might be associated with the loss of
> mouse. Remove and reinsert the broken mouse to see how it is handled.
> Remove and reinsert other usb devices to see how they are handled.
> journalctl, dmesg are your friends, as well as basic troubleshooting.
> (Another mouse, use the other controller, etc)
>
>

I understand what you  mean. Your suggestions are all well thought, very
sound and give some hope. The weak point is my capacity to make use of the
error messages of dmesg and journalctl.

Really I am a bit depressed about it. I spent $5000 on that computer ($2500
for the computer and 2500 for importation tax to South America) and also
for some reason it is unable to reboot and also the fans go full speed all
the time because coreboot is unable to administer it. It makes a terrible
noise. Well years ago Taiidan on this ML said there is a way to administer
the fans of D8 by buying some additional equipment, but nobody really knows
what to buy and how to make it work.

So even basic things like mouse, reboot and noise are super complicated and
time consuming. I wonder how it is that on the Qubes HCL this computer is
marked as fully working.

But Unman really many thanks. Your effort to help and your brilliant
expertise are obvious. At least now there is some hope. Before your
intervention I was already contemplating using the computer as a $5000
bedside table, at least it has a nice black mirror door that can accomodate
a book to read before sleeping.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCZYU5aOZMb%2BL0Gn0qnbhspTVx31_F3k4HFTUFEmhN-CA%40mail.gmail.com.


Re: [qubes-users] USB controllers

2021-06-12 Thread Franz
>
>> take a look to the `qvm-pci` man page, it explains how to detach.
>>
>>
>>
> Many thanks it worked perfectly
>

It worked perfectly for a week or so, then the mouse stopped working.
Thomas at Vikings, who built the D8 computer with preinstalled coreboot,
says it should be a Qubes issue.

How may I tell if it is a Qubes issue or a hardware issue?
best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAWnzXXTsOnP09wu9gyiXdWoyRpD-x1DeQ_ht0WgZDzaw%40mail.gmail.com.


Re: [qubes-users] USB controllers

2021-06-02 Thread Franz
On Wed, Jun 2, 2021 at 6:12 PM Ludovic Bellier 
wrote:

> On 02/06/2021 at 21:20, Franz wrote :
>
>
>
> So followed the CLI instructions https://www.qubes-os.org/doc/pci-devices/
> qvm-pci gives the address of the usbcontroller to be detached
> dom0:00_.14.5 and tells the following:
> sys-2usb (no-strict-rest=True),  sys-usb (no-strict-reset=true)
>
> Because the linked Qubes instructions apparently only teach how to attach,
> but not how to detach
>
> Hi Franz,
>
> take a look to the `qvm-pci` man page, it explains how to detach.
>
>
>
Many thanks it worked perfectly

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDM6yiYSjvAAmzGiJWYsjEB%3Dd1FGV-a6UE2H7Tk6i9kTQ%40mail.gmail.com.


Re: [qubes-users] USB controllers

2021-06-02 Thread Franz
On Wed, Jun 2, 2021 at 2:48 PM Franz <169...@gmail.com> wrote:

>
>
> On Wed, Jun 2, 2021 at 10:42 AM unman  wrote:
>
>> On Wed, Jun 02, 2021 at 09:03:46AM -0300, Franz wrote:
>> > Hello all,
>> >
>> > After standard installation using a PS2 keyboard, I should have two
>> > separate usb controllers in the same sys-usb qube. I would prefer to
>> have
>> > two distinct sys-usb so using one more secure for the mouse (PS2 mouse
>> does
>> > not work) that should be somehow connected to dom0 and the other less
>> > secure for external USB disks.
>> > i carefully examined the Qubes papers
>> > https://www.qubes-os.org/doc/usb-qubes/#enable-a-usb-keyboard-for-login
>> > but I am still very confused.
>> > Which is the proper way to do that?
>> > Best Franz
>> >
>>
>> You can simply qvm-clone the existing sys-usb, and then fix up the
>> controller allocation between the two.
>> You can also set autostart with qvm-prefs for the "less secure" so that
>> it is not started by default. This will mean that you have to
>> consciously start that usb qube if you want to use external devices.
>> You might also consider using udev rules, or blacklisting modules in the
>> "mouse" usb, so that it cannot be used with other USB devices.
>>
>>
> The idea to clone sys-usb is brilliant and seems easy, Unman. I will try
> to do that. Many thanks
>
>
 So, I did the cloning, but without a mouse I am unable to detach the
relevant US usb controller from the second sys-usb, using Qubes Manager
because the keyboard seems unable to move it from Selected to Available.

So followed the CLI instructions https://www.qubes-os.org/doc/pci-devices/
qvm-pci gives the address of the usbcontroller to be detached dom0:00_.14.5
and tells the following:
sys-2usb (no-strict-rest=True),  sys-usb (no-strict-reset=true)

Because the linked Qubes instructions apparently only teach how to attach,
but not how to detach, I tried the following:
qvm-pci attach sys-usb dom0:00_14.5
but it replies: device dom0:00_14.5 of class pci already attached to sys-usb
and nothing is done.

So, I do not know how to go on. I would need a command to detach
dom0:00_14.5 from sys-2usb without attaching it elsewhere.
Best.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qC0xUHs7XeCb7-hW_D%3DkXndeE36fz8SKEJOY6_o7v%2B07g%40mail.gmail.com.


Re: [qubes-users] USB controllers

2021-06-02 Thread Franz
On Wed, Jun 2, 2021 at 10:42 AM unman  wrote:

> On Wed, Jun 02, 2021 at 09:03:46AM -0300, Franz wrote:
> > Hello all,
> >
> > After standard installation using a PS2 keyboard, I should have two
> > separate usb controllers in the same sys-usb qube. I would prefer to have
> > two distinct sys-usb so using one more secure for the mouse (PS2 mouse
> does
> > not work) that should be somehow connected to dom0 and the other less
> > secure for external USB disks.
> > i carefully examined the Qubes papers
> > https://www.qubes-os.org/doc/usb-qubes/#enable-a-usb-keyboard-for-login
> > but I am still very confused.
> > Which is the proper way to do that?
> > Best Franz
> >
>
> You can simply qvm-clone the existing sys-usb, and then fix up the
> controller allocation between the two.
> You can also set autostart with qvm-prefs for the "less secure" so that
> it is not started by default. This will mean that you have to
> consciously start that usb qube if you want to use external devices.
> You might also consider using udev rules, or blacklisting modules in the
> "mouse" usb, so that it cannot be used with other USB devices.
>
>
The idea to clone sys-usb is brilliant and seems easy, Unman. I will try to
do that. Many thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qD6b0JVWe-YY4wfc2XSgjMgW7w49CEXOfDWPfHVG71f%2Bw%40mail.gmail.com.


[qubes-users] USB controllers

2021-06-02 Thread Franz
Hello all,

After standard installation using a PS2 keyboard, I should have two
separate usb controllers in the same sys-usb qube. I would prefer to have
two distinct sys-usb so using one more secure for the mouse (PS2 mouse does
not work) that should be somehow connected to dom0 and the other less
secure for external USB disks.
i carefully examined the Qubes papers
https://www.qubes-os.org/doc/usb-qubes/#enable-a-usb-keyboard-for-login
but I am still very confused.
Which is the proper way to do that?
Best Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDT%3DbjHvUO3Wh1R1R2O-haEgzvH2XgfShVoFuh%3DUk4soA%40mail.gmail.com.


Re: [EXT] [qubes-users] Re: cannot verify signatures R4.0.4

2021-03-28 Thread Franz
On Sat, Mar 27, 2021 at 9:15 PM Ulrich Windl <
ulrich.wi...@rz.uni-regensburg.de> wrote:

> On 3/27/21 2:50 AM, Franz wrote:
> >
> >
> > On Fri, Mar 26, 2021 at 9:10 AM Franz <169...@gmail.com
> > <mailto:169...@gmail.com>> wrote:
> >
> > Hello,
> > everything seems to work fine:
> >
> > gpg2 --check-signatures "Qubes OS Release 4 Signing Key"
> > pub   rsa4096 2017-03-06 [SC]
> >5817A43B283DE5A9181A522E1848792F9E2795E9
> > uid   [  full  ] Qubes OS Release 4 Signing Key
> > sig!31848792F9E2795E9 2017-03-06  Qubes OS Release 4 Signing
> Key
> > sig! DDFA1A3E36879494 2017-03-08  Qubes Master Signing Key
> > gpg: 2 good signatures
> >
> > gpg2 -k "Qubes OS Release"
> > pub   rsa4096 2014-11-19 [SC]
> >C52261BE0A823221D94CA1D1CB11CA1D03FA5082
> > uid   [  full  ] Qubes OS Release 3 Signing Key
> > pub   rsa4096 2017-03-06 [SC]
> >5817A43B283DE5A9181A522E1848792F9E2795E9
> > uid   [  full  ] Qubes OS Release 4 Signing Key
> >
> > but when I try to verify get unexpected error, even after
> > downloading two times the files, and even after trying with Fedora
> > and Debian:
> >
> > gpg2 -v --verify qubes-release-4-signing-key.asc
> > Qubes-R4.0.4-x86_64.iso
> > gpg: verify signatures failed: Unexpected error
> >
> >
> > I found the problem: I downloaded
> > Qubes release signing key
> > rather than
> > Detached PGP signature
> >
> > Well frankly, IMO the name of the wrong file seems more appropriate than
> > the right one.
> > How is  "Detached PGP signature" supposed to be easy to understand? :-)
>
> PGP/GPG basics: Normally when signing a file, the file is changed
> (signature appended (basically)). With a detached signature, the signed
> file is unchanged, and the signature is a separate "detached" file.
> That's a detached signature.
>
> Of course to check a signature you need the signing key as well as the
> detached signature.
>
>
I understand your point, you are right, also, really on item 3 of the
verification tutorial there is written "detached PGP signature file" even
if in normal character rather than bold. But, during my efforts I checked
this paragraph many times without noting the critical wording detached PGP
signature file. So it is just my fault, OK.

But it is sad that Qubes remains, after so many years a system organized by
developers for developers. I mean people that think that learning to use
computers is something important. But the majority of potential users do
not have the time for that.  I suggested a friend to use Qubes. He is an
investment manager, so naturally interested in maximum security. He was
even able to install Monero cryptocurrency wallet and node on a linux
computer, so he is not adverse to using computers. But he replied to me: I
tried to use Qubes, but it is too much for me, I cannot use it.

I love Qubes and always found a way to invest the time necessary to get it
working and to ask your kind help when necessary, but it would help to add
a tutorial called:
Qubes the easy way
there explaining all the basics, without options.
I would begin telling that Qubes is much easier with a few computer models
and listing 5 of the best. This alone saves a lot of time.
Then, the verification process is the hardest part to digest. Would it be
possible to avoid it in the following way:
I know your web servers may be compromised and also I am comfortable with
the mantra that we do not trust infrastructure. But you will know if your
servers have been compromised because many people would claim they are
unable to verify the compromised download. So what about if "Qubes the easy
way" just includes subscribing to a mailing list that only alerts if
servers have been compromised. So, if after a couple of weeks or one month
no alert is received, then it is reasonable to think that the download
files and the installation are secure enough.
I suppose this would be better than avoiding any verification, even if I
used Qubes since the first beta release about ten or more years ago and
never got news that Qubes servers had been compromised. So this risk seems
almost nonexistent. But who knows the future...  for the worst case the
email alert would help. What do you think? This is just an idea, there may
be a more proper way to alert  people.

These two, the computer choice and the verification are the most critical
parts, but there may be others to add that I do not remember now.

Finally, many many thanks for your replies and dedication and sorry for not
being a developer at your level.
Bes

[qubes-users] Re: cannot verify signatures R4.0.4

2021-03-26 Thread Franz
On Fri, Mar 26, 2021 at 9:10 AM Franz <169...@gmail.com> wrote:

> Hello,
> everything seems to work fine:
>
> gpg2 --check-signatures "Qubes OS Release 4 Signing Key"
> pub   rsa4096 2017-03-06 [SC]
>   5817A43B283DE5A9181A522E1848792F9E2795E9
> uid   [  full  ] Qubes OS Release 4 Signing Key
> sig!31848792F9E2795E9 2017-03-06  Qubes OS Release 4 Signing Key
> sig! DDFA1A3E36879494 2017-03-08  Qubes Master Signing Key
> gpg: 2 good signatures
>
> gpg2 -k "Qubes OS Release"
> pub   rsa4096 2014-11-19 [SC]
>   C52261BE0A823221D94CA1D1CB11CA1D03FA5082
> uid   [  full  ] Qubes OS Release 3 Signing Key
> pub   rsa4096 2017-03-06 [SC]
>   5817A43B283DE5A9181A522E1848792F9E2795E9
> uid   [  full  ] Qubes OS Release 4 Signing Key
>
> but when I try to verify get unexpected error, even after downloading two
> times the files, and even after trying with Fedora and Debian:
>
> gpg2 -v --verify qubes-release-4-signing-key.asc Qubes-R4.0.4-x86_64.iso
> gpg: verify signatures failed: Unexpected error
>
>
I found the problem: I downloaded
Qubes release signing key
rather than
Detached PGP signature

Well frankly, IMO the name of the wrong file seems more appropriate than
the right one.
How is  "Detached PGP signature" supposed to be easy to understand? :-)
Detached from what? Well, I am sure it is detached from something, but I
lost hours for nothing and other users may simply avoid verifying the iso
if it is too complicated.
Once there was only one file that could be downloaded. Well I understand
the additional files may have some additional use, but there are a lot of
people that are not interested in that and just need an easy and fast way
to get it going.
So perhaps it may be more appropriate to add to the detached file also the
wording "use this file to follow the Qubes verification tutorial"
Best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qA8vf%2BmzbNk7Jtx3geszJ6AGn7FOT8Eyos4qrfgbhgEww%40mail.gmail.com.


[qubes-users] cannot verify signatures R4.0.4

2021-03-26 Thread Franz
Hello,
everything seems to work fine:

gpg2 --check-signatures "Qubes OS Release 4 Signing Key"
pub   rsa4096 2017-03-06 [SC]
  5817A43B283DE5A9181A522E1848792F9E2795E9
uid   [  full  ] Qubes OS Release 4 Signing Key
sig!31848792F9E2795E9 2017-03-06  Qubes OS Release 4 Signing Key
sig! DDFA1A3E36879494 2017-03-08  Qubes Master Signing Key
gpg: 2 good signatures

gpg2 -k "Qubes OS Release"
pub   rsa4096 2014-11-19 [SC]
  C52261BE0A823221D94CA1D1CB11CA1D03FA5082
uid   [  full  ] Qubes OS Release 3 Signing Key
pub   rsa4096 2017-03-06 [SC]
  5817A43B283DE5A9181A522E1848792F9E2795E9
uid   [  full  ] Qubes OS Release 4 Signing Key

but when I try to verify get unexpected error, even after downloading two
times the files, and even after trying with Fedora and Debian:

gpg2 -v --verify qubes-release-4-signing-key.asc Qubes-R4.0.4-x86_64.iso
gpg: verify signatures failed: Unexpected error

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDm7xzBVXsRWmtjuK%2B6sAOkE5agFPpUeqdiy6fikPjeYg%40mail.gmail.com.


Re: [qubes-users] Android on Qubes

2021-01-24 Thread Franz
On Fri, Dec 6, 2019 at 7:31 AM scurge1tl  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> I would like to ask if there is any reliable way to get Android
> template into Qubes, so that I could create AppVMs for different
> android apps (from google play too). I know about the project of
> Daniel Micay who is working on a hardened version of Android
> GrapheneOS, but don't know where the project stands.
>
> Is there actually any reliable way to get the android into Qubes now
> in the form of a template?
>

More than a year passed and nobody replied. May a bounty encourage a brave
developer to prepare and maintain a community template?
Best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBq4VVQgSKhx1GJySn2eR1rN61tPrUQuQKG6%3Dcy1_aLKQ%40mail.gmail.com.


Re: [qubes-users] system-config-printer gives different results in template and VM

2021-01-20 Thread Franz
On Wed, Jan 20, 2021 at 11:43 AM unman  wrote:

> On Wed, Jan 20, 2021 at 11:03:43AM -0300, Franz wrote:
> > On Tue, Jan 19, 2021 at 11:20 PM unman 
> wrote:
> >
> > > On Tue, Jan 19, 2021 at 11:25:47AM -0300, Franz wrote:
> > > > Hello,
> > > >
> > > > if I write system-config-printer in the debian template I get the
> > > expected
> > > > GUI to config the printer and everything works as expected.
> > > >
> > > > If I write the same in the VM depending from the template, I get:
> > > > Printing service not available. Start the service on this computer or
> > > > connect to another server.
> > > > If I click on start the service, nothing happens.
> > > >
> > > > After many years using Qubes, the template and the VM depending from
> the
> > > > template always behaved in the same way. I cannot understand why the
> > > > template works and the VM does not.
> > > >
> > > > To be sure, I tried on two different VMs depending from the same
> template
> > > > an none works
> > > > Best
> > > > Franz
> > > >
> > >
> > > You don't have cups/cupsd enabled in the qube: enable it on Services
> tab
> > > of GUI or using `qvm-service`
> > >
> > >
> > Many thanks Unman, but why does the template not give the same error?
> >
> > I understand this kind of problem should be fixed in the template, not in
> > the VM that depends on the template.
> >
> > But if the template works, how may I fix something that already works?
> > best
> > Franz
>
> By default Debian will enable services (and start them) after
> installation. This is a problem for templates, which is why there is
> specific advice about installing services in to Debian templates.
> By contrast Fedora does not automatically start services.
>
>
Many thanks Unman, I tried to start cups using Qubes manager GUI and now
even the VM works and this survives reboot. No way I could have thought it
alone.

There are many services which can be enabled or disabled in an template
> based qube. cups is just one of them.
> That said, I'm puzzled as to why cups *is* running in your template - it
> doesn't seem to be in my Debian 10.
>

Well I suspect that cups is running in my template Debian 10. In fact if I
digit  system-config-printer it starts the printer GUI without errors.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAfSLvkHFi6nmZ__MRGHFv17tWk8Tso7PSarZ2u%3DBnajQ%40mail.gmail.com.


[qubes-users] Desktop suggestion

2021-01-20 Thread Franz
 Hello,

A Desktop suggestion with various independent USB controllers, an open
source firmware, at least 32gb RAM and possibly a nerfable microprocessor
to disable ME or equivalent.

No gaming, no hyper speed. Just working well with Qubes.

Well it seems basic requirements, but I doubt it is easy.

Three years ago Taiidan suggested an ASUS KCMA-D8, keeping in mind the
above requirements. See this thread:
https://groups.google.com/g/qubes-users/c/MEMdWdsht5k

But three years passed and possibly even the above board or the processor
changed, or something better had been released. Things change, even Taiidan
disappeared from this email list.
Best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCyCPaFAoGyQQPYwzgPfi1n_vmC4TEcKM%3DpCL8W3mbttw%40mail.gmail.com.


Re: [qubes-users] system-config-printer gives different results in template and VM

2021-01-20 Thread Franz
On Tue, Jan 19, 2021 at 11:20 PM unman  wrote:

> On Tue, Jan 19, 2021 at 11:25:47AM -0300, Franz wrote:
> > Hello,
> >
> > if I write system-config-printer in the debian template I get the
> expected
> > GUI to config the printer and everything works as expected.
> >
> > If I write the same in the VM depending from the template, I get:
> > Printing service not available. Start the service on this computer or
> > connect to another server.
> > If I click on start the service, nothing happens.
> >
> > After many years using Qubes, the template and the VM depending from the
> > template always behaved in the same way. I cannot understand why the
> > template works and the VM does not.
> >
> > To be sure, I tried on two different VMs depending from the same template
> > an none works
> > Best
> > Franz
> >
>
> You don't have cups/cupsd enabled in the qube: enable it on Services tab
> of GUI or using `qvm-service`
>
>
Many thanks Unman, but why does the template not give the same error?

I understand this kind of problem should be fixed in the template, not in
the VM that depends on the template.

But if the template works, how may I fix something that already works?
best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCjO6j1U5xUTUk57LxR2Vry7dxzVLMETBH81mLcWTug5Q%40mail.gmail.com.


[qubes-users] system-config-printer gives different results in template and VM

2021-01-19 Thread Franz
Hello,

if I write system-config-printer in the debian template I get the expected
GUI to config the printer and everything works as expected.

If I write the same in the VM depending from the template, I get:
Printing service not available. Start the service on this computer or
connect to another server.
If I click on start the service, nothing happens.

After many years using Qubes, the template and the VM depending from the
template always behaved in the same way. I cannot understand why the
template works and the VM does not.

To be sure, I tried on two different VMs depending from the same template
an none works
Best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qC5kp%3Dz8ze8BsVmqWTvBV-ng3%3DAcfoa0hE%3DdNP_pyS4TA%40mail.gmail.com.


Re: [qubes-users] Re: qvm-run multimedia nautilus nothing happens

2021-01-01 Thread Franz
On Fri, Dec 25, 2020 at 3:44 PM Steve Coleman 
wrote:

>
>
> On Tue, Dec 22, 2020, 5:12 AM Franz <169...@gmail.com> wrote:
>
>>
>> > No, checking again if I put multimedia dependent from another template
>>> > works, so the problem is the template.
>>> >
>>> > Last thing I did with the template was install a custom disposable VM
>>> > connected with the template. I did not know that this may end damaging
>>> the
>>> > template.
>>> >
>>> Disposable VM settings shouldn't affect the template. What happens if
>>> you try to run nautilus from a terminal session to "multimedia"? If it
>>> doesn't start, that's the issue.
>>>
>>>
>> Cannot test it because neither gnome-terminal nor term start, so?  Anyway
>> I prepared a new template, reinstalled everything, even the printer, and it
>> works, but now I am scared by the custom dvm thing.
>>
>
> The way to test things like this is to use "qvm-run -p 
> program-name" and watch what errors bome back through that pipe. Usually
> you will see something like "program not found" or some error finding some
> basic resource that is required.
>
> With dvm's this *is* more of a problem, but doing that same command
> against its base templatevm might also give some insightful clues.
>
>
Thanks Steve,
I already tried qvm-run at the beginning of this thread, but it gives to
reply, no error, nothing. it just froze trying to do that. Only CTRL c
works to go on. Now tried to add -p as you suggested, but the result is the
same.

Tried xterm, term, gnome-terminal, nothing works. Well the problem is
solved because I prepared a new template, but it is good to remember to
make a copy of the template before doing things that can break it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDedCFemHP8etSiC%2BZsOq67JbKwpTH9fLXwOde%3DAxPN%2BQ%40mail.gmail.com.


Re: [qubes-users] Re: qvm-run multimedia nautilus nothing happens

2020-12-22 Thread Franz
> > No, checking again if I put multimedia dependent from another template
> > works, so the problem is the template.
> >
> > Last thing I did with the template was install a custom disposable VM
> > connected with the template. I did not know that this may end damaging
> the
> > template.
> >
> Disposable VM settings shouldn't affect the template. What happens if
> you try to run nautilus from a terminal session to "multimedia"? If it
> doesn't start, that's the issue.
>
>
Cannot test it because neither gnome-terminal nor term start, so?  Anyway I
prepared a new template, reinstalled everything, even the printer, and it
works, but now I am scared by the custom dvm thing.
best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCZMSR8rkbk_Uf6nzgxQ4VfwaQ5ZtDrd6EqUJD3HrwEVg%40mail.gmail.com.


[qubes-users] Re: qvm-run multimedia nautilus nothing happens

2020-12-18 Thread Franz
On Fri, Dec 18, 2020 at 12:24 PM Franz <169...@gmail.com> wrote:

> Hello,
> qvm-run multimedia nautilus  and  nothing happens, no error, nothing.
>
> If I try with firefox it is the same and multimedia  is up and running,
> with a green mark point.
>
> Closing multimedia vm last time had to kill it.
>
> It is a standard VM depending on a template that works with other VMs.
>

No, checking again if I put multimedia dependent from another template
works, so the problem is the template.

Last thing I did with the template was install a custom disposable VM
connected with the template. I did not know that this may end damaging the
template.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBVFPLjZq7w%3DDPYvadWnepzK46LnPppV9_ev57KuFPyng%40mail.gmail.com.


[qubes-users] qvm-run multimedia nautilus nothing happens

2020-12-18 Thread Franz
Hello,
qvm-run multimedia nautilus  and  nothing happens, no error, nothing.

If I try with firefox it is the same and multimedia  is up and running,
with a green mark point.

Closing multimedia vm last time had to kill it.

It is a standard VM depending on a template that works with other VMs.

Any Idea?
Best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qA4aeiU6wp3ogWAk2_9jDUzSuVx_oDoKxXcVigKsnv4xg%40mail.gmail.com.


[qubes-users] unable to start gnome-terminal or terminal on fedora-32 template

2020-11-14 Thread Franz
I downloaded fedora 32 template using
sudo qubes-dom0-update qubes-template-fedora-32

I was also able to update it using google-manager,

but trying to start terminal from the start menu gives no reply and using
dom0 terminal gives:

qvm-run -a fedora-32 gnome-terminal
fedora-32: command failed with code: 1

best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qD-p_ykGyE-3dsYOutsA-%3D6t%2BY%2B%2B0%2Br9k3ZZ3m_Gb1bPQ%40mail.gmail.com.


Re: [qubes-users] Are X230 Tablets Compatible?

2020-07-29 Thread Franz
I installed Qubes in the past on a x230 tablet and it worked.
You should select legacy boot  and virtualization in BIOS.
Best
Franz

On Wed, Jul 29, 2020 at 12:46 PM June Anne-Tifa 
wrote:

> I 'm trying to install Qubes on a x230t via usb but everytime I try and
> start Qubes on the thumbdrive it repeatedly gives me an error saying dracut
> intique-timeout before exiting to the dracut emergency console & outputting
> /dev/root does not exist. Everything I read said x230's are compatible, not
> sure whats up. Had the same issue on my desktop, it just won't even boot. I
> have the i7 version, if anybody can help me troubleshoot I would super
> duper appreciate it! :)
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/ad551dd6-14eb-4748-8e38-16f012329473o%40googlegroups.com
> <https://groups.google.com/d/msgid/qubes-users/ad551dd6-14eb-4748-8e38-16f012329473o%40googlegroups.com?utm_medium=email_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qC5nCAhf7MeAsmg%3DLdZ%3DXh0L2U7VRyknTPgqqY188B6nw%40mail.gmail.com.


Re: [qubes-users] Move To a Larger Disk

2020-06-26 Thread Franz
On Fri, Jun 26, 2020 at 6:43 AM  wrote:

> On Fri, Jun 26, 2020 at 06:38:09AM -0300, Franz wrote:
>
> > Next time I would suggest a very simple and reliable backup of the old
> > disk, install Qubes on the new disk, restore backup on the new disk and
> > you'll have a clean new system with no problems.
>
> uh. even in the best case, this is a _lot_ more effort than just
> copying over the disk and resizing the partition.
>

:-) for you Dhorf, who are a brilliant computer scientist, for you. Or for
others that have the capacity and the biological memory to store this
information. But for more normal users, the backup route is easy enough to
be done safely without headaches and without arriving at a dead end where
the only chance is asking for help. It is just spending some time.   Not
only that, the Qubes backup system is very good and safe,  better than all
other systems I tried, Windows or Linux. Over about 10 years I restored my
systems lots of times and Qubes never failed. But Dhorf you are a good
teacher, the other time you taught me how to repair a filesystem with fsck
and I remembered it enough to use it with a another non-Qubes system and it
solved the problem, Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qC1VW__7YKvFcFcsdxQ3v%2BPV%2BRJc1Ya_%3D0yjwFkaguQdA%40mail.gmail.com.


Re: [qubes-users] Move To a Larger Disk

2020-06-26 Thread Franz
On Thu, Jun 25, 2020 at 7:45 PM  wrote:

> On Thu, Jun 25, 2020 at 10:29:33PM +, 'Matt Drez' via qubes-users
> wrote:
> > How to safely raise it to the maximum size (1TB ) and not just an
> > arbitrary number that's close enough?
>
> which "it"?
> if you bought a "1TB disk", that usualy means 931GiB.
>
> the pvresize dance means the pv is now as big as the partition/luks.
>
> >   VG #PV #LV #SN Attr   VSize   VFree
> >   qubes_dom0   1 141   0 wz--n- 929.32g 556.51g
>
> so 929.32g sounds about right, thats the size of your disk minus
> the boot partition minus some headers.
>
> >   pool00 qubes_dom0 twi-aotz-- 897.98g 33.45  14.82
>
>
> you can probably grow that pool some more.
> check "vgs" again, the VFree is now something like 6.5g?
>
> so run "lvresize -L +6g qubes_dom0/pool00"
>
> i would NOT assign the last few megabytes to a device, but keep
> them "free" in case i need to dig myself out of a "oops, metadata
> is full because i have too many snapshots" situation.
>
>
Next time I would suggest a very simple and reliable backup of the old
disk, install Qubes on the new disk, restore backup on the new disk and
you'll have a clean new system with no problems.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDsB9VJguSFjFaWBr8aySCa%3DoV2uRBAmorPKdj03WO95Q%40mail.gmail.com.


[qubes-users] Speed up a VM

2020-06-18 Thread Franz
Hello,
I need to do some video editing and my multimedia VM is too slow,
video-audio is broken.

Is there some easy way to speed this up?
Perhaps does it make sense to assign 4 CPUs rather than default 2?
Or closing other VMs?
Or may it be related to little memory (4GB)
Any experience?
Best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCmshHBtPtbE8SGbzzAE32Qm6b-BV-j%3D6oNFuO_vCSQ%2BA%40mail.gmail.com.


Re: [qubes-users] question about Xen and thinkpad battery

2020-05-23 Thread Franz
On Sat, May 23, 2020 at 5:49 PM Mike Keehan  wrote:

> On 5/23/20 8:20 PM, dark wizard wrote:
> > Hello, Qubes Community
> > How does Xen manage laptop battery. Can in kill it quickly?
> > Is it compatible with laptop power management technologies and
> > drastically affect battery life?
>

Thinkpads have some battery managment utility that work under linux and
avoid charging battery at 100% and keeping it charged when power supply is
normally connected. Charging and descharging decreases battery life, but
also keeping the battery always at 100% decreases battery life.

These utilities work perfectly under arch-linux with a x230, but installing
them in Qubes is very complicated. There are some suggestions on this
mailing list, but it is too much difficult for me.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBZ_znHrV%2B0HFoDJkaSHrzVQRT2OHVmEDLzcX2HRL6XMA%40mail.gmail.com.


Re: [qubes-users] template and dependent qube show different behaviour

2020-05-07 Thread Franz
On Thu, May 7, 2020 at 8:40 AM  wrote:

> On Thu, May 07, 2020 at 08:30:14AM -0300, Franz wrote:
> > I installed into Fedora 31 template a proprietary banking rpm
> > application/plugin/extension which is supposed to work with the browsers
> > during banking tasks. This is called warsaw_setup_fedora_64.rpm
>
> this sounds like a terrible idea unless you make a separate template
> just for that task.
>
>
Thanks Dhorf, yes I made a separate template, do not trust this warsaw
stuff

>
> > So why is it that the template and the dependent qubes do not perform the
> > same behavior?
>
> check if it installed anything to /usr/local or /home.
> rpm -ql warsaw_setup_fedora_64
>

your command clarified the situation, it tells: package warsaw_setup... is
not installed.

In fact, after removing it and installing again found an installation error:
Failed to execute /usr/lib/systemd/systemd-sysv-install: No such file or
directory

But this is not a Qubes specific problem, googling a bit it seems a problem
with fedora 31.


>
> > Also, any idea to fix it, considering that the banking tasks cannot be
> done.
>
> i would probably just install it in a separate appvm from rc.local
>

I am not getting this. If I install it into a separate appvm, it will not
ask me if I want it installed  from rc.local or otherwise.

this means no modification of the template at all, and the pkg gets
> reinstalled everytime the appvm used for banking is started.
>

If it gets reinstalled automatically, it would be interesting not only for
this warsaw thing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDF5FqA6TZ74V7c3SBNNNpwA61d3sR49%2B8onHaFWAtQdA%40mail.gmail.com.


[qubes-users] template and dependent qube show different behaviour

2020-05-07 Thread Franz
Hello friends,
I installed into Fedora 31 template a proprietary banking rpm
application/plugin/extension which is supposed to work with the browsers
during banking tasks. This is called warsaw_setup_fedora_64.rpm

When I start the dependent banking qubes a strange small window appears
telling: "you must be logged in as root to install the proprietary
packages". But the same window does not appear when I start the template
where I installed the software.

So why is it that the template and the dependent qubes do not perform the
same behavior?

Also, any idea to fix it, considering that the banking tasks cannot be done.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAXXP7w6%2BHg5kPVtsxviYEZkj1nnOJHBDF5N4Rvx-0Q%2Bg%40mail.gmail.com.


Re: [qubes-users] Contradictory measures of disk space in a VM

2020-05-01 Thread Franz
On Wed, Apr 29, 2020 at 3:27 PM  wrote:

> On Wed, Apr 29, 2020 at 03:10:48PM -0300, Franz wrote:
>
> > I tried fsck on dom0, but got the enclosed terror screen.
>
> it would have helped if you had tried to fsck the right filesystem:
> fsck /dev/qubes_dom0/vm-per-dec-private
>
> and if it is asking for repair a bazillion times, perhaps with -y -f
> (and i would keep running it with "-y -f" until at least one run
>  is completely clean...)
> "how to repair a filesystem" is basic system management.
>
>
Dhorf, you are right. What happened is exactly what you have foreseen. It
found a lot of errors and corrected them all, and running it again  says
clean.

Well, now I have two similar VMs the original repaired and the new on which
I copied the content of the original. Which one should I choose? Which is
better?

Also thanks, now I understand things, I did not even imagine to exist.
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAfsBefoU6yRL07mO8-%3DkwOv6jBY4GzPG9_fn4nT9qLyg%40mail.gmail.com.


Re: [qubes-users] Contradictory measures of disk space in a VM

2020-04-29 Thread Franz
Dear Dhorf,
I tried fsck on dom0, but got the enclosed terror screen.
For me it is enough, I created a new VM, copied content of the old
corrupted one to the new one. Everything works and do not afford to do more
because it is too complicated for  my little mind.
But i want to thank you, with your help I understood were the problem is
and for the future I'll avoid to chenge size of a running VM. I understand
it can theoretically be done, but it does not work for me. On the other
hand, it works if the VM is not running.
So thanks Dhorf I appreciate the time you devote for me

On Wed, Apr 29, 2020 at 9:42 AM  wrote:

> On Wed, Apr 29, 2020 at 08:11:37AM -0300, Franz wrote:
>
> > Did it with Fedora 30, but with exactly the same result
> > But checking other VMs I am getting the same error on some of them :((
> > So this is a widespread problem.
>
> did you try to google your problem?
> because at this point it is starting to look less of a qubes problem,
> and more like generic filesystem damage.
>
> fsck+repair the volume, then resize it.
> consult the documentation of your favorite distro template on how
> to do this inside the vm.
> you may have to connect to the vm through "xl console" in dom0.
>
> or spawn a fsck-vm, and temporarily attach the volumes to that.
> https://www.qubes-os.org/doc/mount-lvm-image/
>
> or just fsck+resize from dom0 if you consider the risk of something
> exploiting e2fstools through this acceptable.
>
>
>
> > May it be that this is caused by running Qubes manager / vm settings/
> > increase private size  when the VM is running? Sometimes I get an error
> on
> > that. It may be that this creates a problem that cannot be removed.
>
> no, online resize is completely normal and supported.
>
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qB-p_Q3kCn7kGUE8F4%3DBsn4mPPrmU-w76NO0B2L7fYFaQ%40mail.gmail.com.


Re: [qubes-users] Contradictory measures of disk space in a VM

2020-04-29 Thread Franz
On Tue, Apr 28, 2020 at 4:37 PM  wrote:

> On Tue, Apr 28, 2020 at 03:26:44PM -0300, Franz wrote:
> > > a) check what the actual size is:
> > > dom0$ sudo lvs -a | grep yourvmname
> > > => whats the size of the yourvm-private volume?
> > did it, but there is no unit, so number are difficult to interpreter,
> > snapshot enclosed
>
> not sure what that means.
> the "g" in "18.09g" is short for "giga".
> and the unit is most likely "bytes".
>
> so the blockdevice is actualy the right size.
>
>
> > b1) if it is 18GB already, check that it is actualy 18GB inside the vm:
> > > yourvm$ grep xvdb /proc/partitions
> >  same, snapshot enclosed
>
> the size is again 18.x GB.
>
>
> > > c1) if it is 18GB inside the VM too, you are just missing the fs
> resize:
> > > yourvm$ sudo resize2fs /dev/xvdb
> > Permission denied, see snapshot
>
> no idea what that means.
> but you are using an ancient version of resize2fs there.
>
> please try with a template/distro that is not shipping outdated versions.
> a fedora 30 or 31 should work.
>

Did it with Fedora 30, but with exactly the same result

But checking other VMs I am getting the same error on some of them :((
So this is a widespread problem.

May it be that this is caused by running Qubes manager / vm settings/
increase private size  when the VM is running? Sometimes I get an error on
that. It may be that this creates a problem that cannot be removed.

But if this is the case users should be allowed to increase size when the
VM is running.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAizhmEvSW_YT-zxxJkmir9JB-frgMpVEwKmw8mFEPrMQ%40mail.gmail.com.


[qubes-users] Contradictory measures of disk space in a VM

2020-04-27 Thread Franz
Hello all,

Various application lament lack of disk space in a particular qube, but
measuring it gives very different results.

1 Qubes manager tells that Disk Usage is 4973 MB
2 Setting tells that Private Storage Max size is 18524 MB
3 Baobab tells 2.1 GB available and 12.4 GB total
4 Nautilus home properties tells free space 5.3MB contents 4.2GB
5 df tells that /rw is 100% used and total 4.9GB

So, it seems that Qubes Manager, Nautilus and df are consistent, telling
that available space is almost 5GB totally used.

But Qubes VM settings with Private Storage Max Size of 18524 MB is totally
out of sync, as well as Baobab with 2.1 GB available and 12.4 total.

Well it seems a theoretical  speculation, but increasing space using Qubes
VM settings changes only a useless number into the settings, but nothing in
practice.

So how one is supposed to increase space for this VM?
Also, am I right thinking this is not consistent? If yes, is there a way to
fix it?

Well a workaround may be to create a new qubes, copy the content of the old
one to the new and hope that everything works, then delete the old qube.
But I may be wrong, or there may be an easy fix

Best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCw36-g5Wg5EpMwag7YrB7rYwcfDKw6o%3DXHK_0azYueiQ%40mail.gmail.com.


Re: [qubes-users] Newbie question on disposable VMs?

2020-03-23 Thread Franz
On Sun, Mar 22, 2020 at 6:06 AM  wrote:

> Hello Mike,
>
> Am Samstag, 21. März 2020 23:05:03 UTC+1 schrieb Mike Keehan:
>>
>> On 3/21/20 6:25 PM, viktor@gmail.com wrote:
>> > Am Samstag, 21. März 2020 18:14:51 UTC+1 schrieb viktor@gmail.com:
>> >
>> > Am Samstag, 21. März 2020 14:39:18 UTC+1 schrieb Stumpy:
>> >
>> > On 2020-03-21 04:26, Viktor Ransmayr wrote:
>> >  > Am Fr., 20. März 2020 um 21:30 Uhr schrieb <
>> viktor@gmail.com
>> >  > >:
>> >  >
>> > ...
>> >  >
>> >  > Additional info & update on question:
>> >  >
>> >  > I'm running Qubes OS 4.0.3 - and - was starting a disposable
>> >  > 'fedora-29-dvm' yesterday & by default the terminal offered
>> > is an Xterm.
>> >  >
>> >  > This morning it became clear to me, that I should use the
>> > same setup,
>> >  > that I had used previously with the persistant VMs, i.e.
>> > where by
>> >  > default a standard (Gnome?) terminal is offered ...
>> >  >
>> >  > I updated the Qube settings for 'fedora-29-dvm', increased
>> > the memory
>> >  > size & enabled network access.
>> >  >
>> >  > However the terminal only shows up temporarily - and - the
>> > disposable VM
>> >  > is halted again ...
>> >
>> > Sorry, I havent a clue on that one, thought i dont think mem is
>> > an issue
>> > as the default is 4gb which should be plenty AFAIR.
>> >
>> > I have no clue if this would fix things but since you are on 29
>> > and 30
>> > has been out you might upgrade to fed 30 which might resolve
>> the
>> > issue
>> > you are having.
>> >
>> > I'll take your advice, upgrade to F30 - and - will report back
>> here.
>> >
>> > I renamed "fedora-29-dvm", changed template to "fedora-30", kept
>> > networking to "sys-firewall" as well as max memory to 8 GB - plus - I
>> > exchanged "xterm" with "terminal" & tried again.
>> >
>>
>
I imagine that if you write gnome-terminal, rather than terminal it should
work

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDzTZcGJHOJpR7juuz3%2B3CAa6NOH3O2GVBhnMZn%3DxkJQQ%40mail.gmail.com.


Re: [qubes-users] How to setup Win10 HVM ?

2020-03-22 Thread Franz
On Sun, Mar 22, 2020 at 7:32 PM Franz <169...@gmail.com> wrote:

>
>
> On Sun, Mar 15, 2020 at 8:15 AM 'M' via qubes-users <
> qubes-users@googlegroups.com> wrote:
>
>> How to setup a Win 10 HVM according to this page: 
>> https://github.com/elliotkillick/qvm-create-windows-qube
>> ?
>>
>> <https://www.google.com/url?q=https%3A%2F%2Fgithub.com%2Felliotkillick%2Fqvm-create-windows-qube=D=1=AFQjCNHygrrCGNRnSzK0GPvO5Iylynm6eA>
>>
>>
>> See below for my detailed description on how to use this method:
>>
>> 1)  Open your Firefox browser in a VM - for example in the untrusted VM.
>>
>> 2)  To save the install.sh script file:  Open this page:
>> https://raw.githubusercontent.com/elliotkillick/qvm-create-windows-qube/master/install.sh
>> and save it as install.sh
>>
>> 3)  To copy the file to dom0: Open the dom0 terminal and execute this
>> command:  qvm-run -p --filter-escape-chars --no-color-output untrusted
>> "cat '/home/user/Downloads/install.sh'" > install.sh
>>
>> 4)  To check that the file is copied to dom0: Execute this command in the
>> dom0 terminal: ls
>>
>> 5)  To get Qubes OS to execute the script in the "install.sh" file:
>> Execute this command in the dom0 terminal: chmod +x install.sh &&
>> ./install.sh
>>
>> 6)  Download the version of Windows 10 you want to use to the
>> "windows-mgmt" VM.
>>  You can execute the script in the file "download-windows.sh , but it
>> might not work - I couldn't make it work. In that case, do the following:
>>
>>  6a)  Open the “Qube Settings” for the domain “windows-mgmt”. Under
>> “Network”, choose the “default” one and click on “Apply”.
>>
>>  6b)  Open the domains Firefox browser and search the web for “how to
>> download windows 10”.
>> One of the first results is a link to a Microsoft webpage
>> from which it is possible to download the file in the local language.
>> The file gets downloaded to the download folder in the
>> domain.
>>
>>  6c)  Open the “Qube Settings” for the domain “windows-mgmt”. Under
>> “Network”, choose “(none)” and click on “Apply”.
>>
>>  6d)  Move or copy the downloaded Win10 ISO-file to this destination:
>> /Documents/qvm-create-windows-qube/windows-media/isos
>>
>>  6e)  Open the terminal in dom0 and execute the following script
>> (remember to write the name of the ISO-file you downloaded in step 6b
>> instead of “filename”): ./qvm-create-windows-qube.sh -n sys-whonix -oyw
>> -i filename.iso -a win10x64-pro.xml Win10
>> Info: "Win10" will be the name of the domain.
>> Do not close the terminal before it says the installation was
>> complete (successfully) !  Let the terminal do the job, it restarts the
>> qube and so on when it is necessary.
>>
>> 7)  When you get into Windows there might appear three message boxes. One
>> saying that the pc has to be restarted. A second one saying that drive D
>> has to be formatted. And the third one saying something about a private
>> drive. Just click on "OK". Then Windows will close immediately and restart.
>> Afterwards the terminal should write that the installation was completed
>> successfully.
>>  When Windows start up again you probably do not have a functioning
>> internet connection.
>>
>>
> When I start Windows again I get a green point on the state column of
> Qubes Manager, which is encouraging, but no GUI whatsoever appears, even if
> the Windows screen appeared and restarted many times during the
> installation process.
>

qvm-sync-appmenus   fixed it

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAZVJ9u1V6%2B_H0oHfV4grj93QfbRiDqwG3P4KKy3M%2BSiw%40mail.gmail.com.


Re: [qubes-users] How to setup Win10 HVM ?

2020-03-22 Thread Franz
On Sun, Mar 15, 2020 at 8:15 AM 'M' via qubes-users <
qubes-users@googlegroups.com> wrote:

> How to setup a Win 10 HVM according to this page: 
> https://github.com/elliotkillick/qvm-create-windows-qube
> ?
>
> 
>
>
> See below for my detailed description on how to use this method:
>
> 1)  Open your Firefox browser in a VM - for example in the untrusted VM.
>
> 2)  To save the install.sh script file:  Open this page:
> https://raw.githubusercontent.com/elliotkillick/qvm-create-windows-qube/master/install.sh
> and save it as install.sh
>
> 3)  To copy the file to dom0: Open the dom0 terminal and execute this
> command:  qvm-run -p --filter-escape-chars --no-color-output untrusted
> "cat '/home/user/Downloads/install.sh'" > install.sh
>
> 4)  To check that the file is copied to dom0: Execute this command in the
> dom0 terminal: ls
>
> 5)  To get Qubes OS to execute the script in the "install.sh" file:
> Execute this command in the dom0 terminal: chmod +x install.sh &&
> ./install.sh
>
> 6)  Download the version of Windows 10 you want to use to the
> "windows-mgmt" VM.
>  You can execute the script in the file "download-windows.sh , but it
> might not work - I couldn't make it work. In that case, do the following:
>
>  6a)  Open the “Qube Settings” for the domain “windows-mgmt”. Under
> “Network”, choose the “default” one and click on “Apply”.
>
>  6b)  Open the domains Firefox browser and search the web for “how to
> download windows 10”.
> One of the first results is a link to a Microsoft webpage from
> which it is possible to download the file in the local language.
> The file gets downloaded to the download folder in the domain.
>
>  6c)  Open the “Qube Settings” for the domain “windows-mgmt”. Under
> “Network”, choose “(none)” and click on “Apply”.
>
>  6d)  Move or copy the downloaded Win10 ISO-file to this destination:
> /Documents/qvm-create-windows-qube/windows-media/isos
>
>  6e)  Open the terminal in dom0 and execute the following script
> (remember to write the name of the ISO-file you downloaded in step 6b
> instead of “filename”): ./qvm-create-windows-qube.sh -n sys-whonix -oyw
> -i filename.iso -a win10x64-pro.xml Win10
> Info: "Win10" will be the name of the domain.
> Do not close the terminal before it says the installation was
> complete (successfully) !  Let the terminal do the job, it restarts the
> qube and so on when it is necessary.
>
> 7)  When you get into Windows there might appear three message boxes. One
> saying that the pc has to be restarted. A second one saying that drive D
> has to be formatted. And the third one saying something about a private
> drive. Just click on "OK". Then Windows will close immediately and restart.
> Afterwards the terminal should write that the installation was completed
> successfully.
>  When Windows start up again you probably do not have a functioning
> internet connection.
>
>
When I start Windows again I get a green point on the state column of Qubes
Manager, which is encouraging, but no GUI whatsoever appears, even if the
Windows screen appeared and restarted many times during the installation
process.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qD3NmSBH-z1d93ftJPwsf3R_zsCtYetkHADN6ZgSzuYaA%40mail.gmail.com.


Re: [qubes-users] Set Battery thresholds x230

2020-03-18 Thread Franz
On Wed, Mar 18, 2020 at 1:08 PM  wrote:

> On Wed, Mar 18, 2020 at 11:56:31AM -0300, Franz wrote:
> > When a laptop is always connected to power, e very good behavior to
> > strongly prolong battery life is to avoid charging it to 100% and
> limiting
> > it to lower threshold, perhaps 80%.
>
> i am using a (perl) script for doing this on my qubes chromebooks.
> trivial if you have ways to a) get the current battery level and
> b) control the charger (charge/idle/discharge).
>
>
> > The Fedora command is the following:
> > dnf install kernel-devel akmod-acpi_call
>
> mixing random custom kernel modules with a qubes kernel is unlikely
> to work. at all. even if you figure out how to install the pkgs.
>
> Thanks for replying, now I understand it is too difficult for me. I have
another x230 with arch and it worked immediately, so supposed Qubes only
required some trick, but now understand it is far beyond my capabilities.

Many thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCrVa023TC3W7s5bZckGOQHvm8prs%3DB%3DZ02%3DpfSt5FqHQ%40mail.gmail.com.


[qubes-users] Set Battery thresholds x230

2020-03-18 Thread Franz
When a laptop is always connected to power, e very good behavior to
strongly prolong battery life is to avoid charging it to 100% and limiting
it to lower threshold, perhaps 80%.

Thinkpads have this facility on linux. But the Fedora command for that is:
to first install tlp package which works with
sudo qubes-dom0-update tlp

then, it is required to install packages that are not availble from the
official Fedora repositories, instead you need RPM Fusion and TLP
repositories in a root shell.

The Fedora command is the following:
dnf install kernel-devel akmod-acpi_call

Is there a way to get this working without compromising security?
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAtyr4feyF78S8jKc%3DiQvXELG4MEVZYh98_DCRbrZacfg%40mail.gmail.com.


[qubes-users] Feature request

2020-01-05 Thread Franz
May be it already somehow exists and I am not aware of it, but it would be
very interesting to be able to save backup settings, that is a list of VMs
that contain your current ordinary activity and you want to backup more
often and fast.

I mean not everything which in my case is over 250gb, not only vaultVM,
which is easy to set, but lacking other important VMs.

Rather being able to save a list of perhaps 5-7 more important VMs so that
they are ready for a fast backup.

I know there is a CLI that does just that and once even wrote a script for
that, but I am never sure it still works as intended over so many Qubes
upgrades and after every new Qubes installation all my scripts are moved
from home to elsewhere for some reasons that do not understand yet.

So backup is important and any incentive to win backup lazyness is worth
every effort, particularly because automating Qubes backups is impossible
or extremely difficult.

Is it complicated to add this "save backup setting" to the GUI?
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDNAW9rDge7SsAjBXdPbBfS0mGz03tdmbZ3RJY7XM5btw%40mail.gmail.com.


Re: [qubes-users] Qubes Structure

2019-12-30 Thread Franz
Look at this link
https://www.qubes-os.org/doc/security-guidelines/

On Mon, Dec 30, 2019 at 1:40 AM xao  wrote:

>
> >If you understand very little, then the most paranoid of setups will get
> you very little in terms of security, because you will end up making
> choices that compromise that security -- or you will just end up wasting a
> great deal of time on things that don't matter.
>
> I do have some experience in computers and cybersecurity, and I want to
> know more. I came here to find more information about qubes architeturing;
> get the most out of it.
>
> If you can provide some links or advice that help me to make better qubes
> setup, I would be thankful to you.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/16f551a47ee.d18df96243681.4660457132775699060%40privacy.com.co
> 
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBhszp8PmDOvGxOWfVDT9Q5r%3DUVgtXZ9AFF3Yx6MguMfg%40mail.gmail.com.


Re: [qubes-users] How to use a USB-modem with Qubes OS ?

2019-11-09 Thread Franz
On Sat, Nov 9, 2019 at 4:06 AM M  wrote:

> I want to connect to the internet by using a USB modem.
>
> Can I use Huawei E3372H with Qubes OS, and if so how ?
>
> If not: Can you recommend another USB modem that I can use to get on the
> internet, and please explain how to use it ?
>
>
You want your USB controller assigned to sys-net rather than to sys-usb.
There is an explicit option to that during Qubes installation. Then it
should work, if this modem works with Fedora.

But there is a more elegant option IMO, you buy a Dovado router or
something equivalent and a modem compatible with it (there is a list of
compatible modems). You do not have to touch Qubes and you will have wifi
for your phone too.
Best

to have sys-net a


> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/dc5c4e05-42e3-482c-a319-d360a8118774%40googlegroups.com
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBYtj5kvoyCstcYGUoZ1fqLmNsZH1WiOiFhPtQ-3YDzKA%40mail.gmail.com.


Re: [qubes-users] Bluetooth USB dongle

2019-11-07 Thread Franz
On Thu, Nov 7, 2019 at 8:13 AM Claudio Chinicz  wrote:

> Hi,
>
> I want to buy a Bluetooth USB to connect my PC with Qubes 4 to an ear
> phone. The device I'm considering says its compatible with Fedora and Linux
> Kernel 3.0.34, 3.2.20, 3.4 and later.
>
> Has anyone done it before? Can I use it with an AppVM created from the
> Fedora 30 Template?
>

Yes, but not any appVM, I would use the one to which the USB controller is
assigned, that is sys-usb or sys-net, according to what you selected during
Qubes installation.  Obviously it will work ONLY with what is played in
either sys-net or sys-usb.

Will I need to change the Template and install any driver?
>

probably not, check you BT adapter manual

If you need to route the audio of all appVMs to BT, there is a way even if
the audio quality may decrease a bit. There are external hardware 3.5 audio
jack converters to BT. It works perfectly and they are cheap.
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBXgzW7XjUnH_mTUuvYky46NMFdq6XATnKs8f2XMiOcXg%40mail.gmail.com.


Re: [qubes-users] Any news on 4.0.2-rc2?

2019-11-01 Thread Franz
Where can we find more info on this pending security issue? I don't see
> a QSB around the time that message was posted (Sept 2 2019).
>
>
Well Claudia it seems pretty obvious that we do not want to publish any
information about an unresolved security issue. Also we do not want to
stress our much loved developers who already do miracles.  So dear Claudia,
use the present release, be very happy and do not waste your time worrying
about things like this :-))

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBAXkvHQwvU9Q80q3bvTHKWV0eQjgcgseb6PuuhiR528Q%40mail.gmail.com.


Re: [qubes-users] Qubes compability with HP Elitebook 820 G2 i5

2019-09-16 Thread Franz
On Mon, Sep 16, 2019 at 6:34 PM 'awokd' via qubes-users <
qubes-users@googlegroups.com> wrote:

> 'minttu.hopeasuo' via qubes-users:
> > Hej...
> >
> > Any chance to get Q4 to work with this hardware?
> > (HP Elitebook 820 G2 i5 / 16GB RAM / 512 GB SSD)
> >
> > I understood that it should meet the listed hardware requirements, but
> both 4.0.1 and 4.0.2-rc1 installer complains about missing VT-x / Immuo
> support.
>
> Did you see
>
> https://www.qubes-os.org/faq/#can-i-install-qubes-4x-on-a-system-without-vt-x-or-vt-d
> (especially about checking UEFI config.)?
>
> > Found some info in the forums that some hardware is identified wrong and
> some people have circumvented this via editing some parameters on the
> installer and recompiling it to get the installer working properly?
>
> That's sometimes needed with UEFI boots, but sounds like you're getting
> past that point already.
>
>
The CPU of some machine supports vt-d, but the default BIOS does not. You
may need to check if your BIOS requests to check a flag to allow
vitualization.
best

> --
> - don't top post
> Mailing list etiquette:
> - trim quoted reply to only relevant portions
> - when possible, copy and paste text instead of screenshots
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/df864db5-f23f-813a-232f-561f4e7f1249%40danwin1210.me
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCZmuA_EK12hWnQg%2BT2B3mRbrGW-jD2Ty9uLHOuTRZVVg%40mail.gmail.com.


Re: [qubes-users] Wifi Antenna Boosters

2019-09-15 Thread Franz
On Sat, Sep 14, 2019 at 4:55 PM  wrote:

> Thanks a lot! That seams way better.
> So one just attach it and I works straight away? With no need to alter
> Qubes or install any software?
>
>
correct

And from and security point of view? Will it add any additional risk
> when connection to a public network using Tor?
>
>
no additonal risk

And any ideer how long the is reach? I guess the answer is in this numbers
> 300 Mbps, 125 Nand flash. The antenna I considered earlier could add 200
> meters the the original retch of the wifi. I presume this one a lot
> more powerfull.
>

it depends on the couple of antennas which you choose (a couple of
directional antennas will work better for this use) and on the power that
is sent to the antennas which depends on the router you buy. There is a
router  from a Taiwan company called Alfa which can be coupled with special
antennas and is able to reach  a couple of km without buildings in the
middle, having an output of a couple of watts. But this is a fairly bulky
and more expensive arrangement and if you are moving every day it is too
difficult to transport and setup.
Also some people consider that power waves may be detriment to your health.
So  you have to choose a compromise that is more suitable for the life you
want to live.

Please remember that this mailing lists requires you do not top post

>
>
>
>
>
> Den torsdag 12 september 2019 kl. 22:35:47 UTC+2 skrev Francesco:nnn
>>
>>
>>
>> On Thu, Sep 12, 2019 at 11:53 AM  wrote:
>>
>>> Hi, I need a Wifi Antenna Boosters (attached to the usb). Can a Wifi
>>> Antenna Boosters be used with qubes?
>>>
>>> I guess question is whether or not the software will work.
>>>
>>>
>> Not only that, it should be linux compatible, it is also a matter of
>> sharing the connection with others VMs.
>>
>> There is an option during Qubes installation to have sys-net and sys-usb
>> in the same VM. That may simplify the matter of sharing.
>>
>> But to simplify your life I would buy a small router with antennas, such
>> as this one, which uses open wrt:
>>
>> https://www.amazon.com/GL-iNet-GL-AR300M-Pre-installed-Performance-Compatible/dp/B01K6MHRJI/ref=pd_sbs_147_4/145-4592551-8089030?_encoding=UTF8_rd_i=B01K6MHRJI_rd_r=388bcea2-90ba-4dba-8fbe-ea1e08a2ddb7_rd_w=Ao4jy_rd_wg=3bMus_rd_p=d66372fe-68a6-48a3-90ec-41d7f64212be_rd_r=80SCACTM536CX08Y5K1D=1=80SCACTM536CX08Y5K1D
>>
>> With a router you do not need to touch your Qubes settings and security
>> and the signal will be available for your phone and your close friends as
>> well.
>>
>> Also you have the option to buy a couple of stronger antennas if you want.
>>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/0d292b1a-1721-4d1e-8503-b530392423e3%40googlegroups.com
> 
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBvS8uB7JL_5QdtS1hAd4TStaYUtYADyX%2Bkrw2DTpf%3DHg%40mail.gmail.com.


Re: [qubes-users] Wifi Antenna Boosters

2019-09-12 Thread Franz
On Thu, Sep 12, 2019 at 11:53 AM  wrote:

> Hi, I need a Wifi Antenna Boosters (attached to the usb). Can a Wifi
> Antenna Boosters be used with qubes?
>
> I guess question is whether or not the software will work.
>
>
Not only that, it should be linux compatible, it is also a matter of
sharing the connection with others VMs.

There is an option during Qubes installation to have sys-net and sys-usb in
the same VM. That may simplify the matter of sharing.

But to simplify your life I would buy a small router with antennas, such as
this one, which uses open wrt:
https://www.amazon.com/GL-iNet-GL-AR300M-Pre-installed-Performance-Compatible/dp/B01K6MHRJI/ref=pd_sbs_147_4/145-4592551-8089030?_encoding=UTF8_rd_i=B01K6MHRJI_rd_r=388bcea2-90ba-4dba-8fbe-ea1e08a2ddb7_rd_w=Ao4jy_rd_wg=3bMus_rd_p=d66372fe-68a6-48a3-90ec-41d7f64212be_rd_r=80SCACTM536CX08Y5K1D=1=80SCACTM536CX08Y5K1D

With a router you do not need to touch your Qubes settings and security and
the signal will be available for your phone and your close friends as well.

Also you have the option to buy a couple of stronger antennas if you want.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qA3WGSXi4Wo6nMOaw61RspdPzxtz_xCf61Ls2uLYrx9gQ%40mail.gmail.com.


Re: [qubes-users] Disk usage warning

2019-08-13 Thread Franz
@brendan, @Chris Many thanks


> Also: dom0 VM usage as well as all combined domU VMs usage is allocated
> from the same shared thinpool pool00 in a default setup.
>

Now I understand.  Considering that Qubes-settings on Qubes Manager allows
to set the System storage max size for each VM, I imagined that the alerts
where connected to that, that is to a problem of a single VM. But now I
understand that the alerts are connected to a general pool hosting all VMs.
So it is not a problem of a single VM, rather of the pool.

This way it is much simpler.  Qubes disk space monitor shows that 71% of
the space is already used, and when I do and verify a backup it uses much
more space to extract the backup, so this is the reason of the alerts.

Many thanks brothers

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAS8KXgqau9gjt2Z_jg1WM3xsTqXpiRFFWKbhhuZoh%3D%3DA%40mail.gmail.com.


Re: [qubes-users] Disk usage warning

2019-08-12 Thread Franz
@Chris

On Mon, Aug 12, 2019 at 1:22 PM Chris Laprise  wrote:

> On 8/12/19 12:03 PM, Franz wrote:
> > On the upper right corner of the screen a black message alert:
> >
> > Disk usage warning!
> > You are running out of disk space. 4.8% space left in pool lvm.
> >
> > Sometimes the message is a bit different referring to rw instead
> >
> > If I run df in dom0 all items usage Is below 24%
> >
> > So what should I do with that alert?
> >
> > IMHO these alerts are too cryptic
> > Best.
>
> Df is completely inaccurate when Qubes 4 is using the default (lvm).
>
> The best overall indicator to use is the disk space widget in the systray.
>

Thanks, I understand you are referring to a new plugin to add to the panel.
if you are using default Xfce. There is one called "Free Space Checker" .

Once installed it tells 416GB are free. So no reason for the alert here


> The best way to view individual VM disk usage is from Qube Manager.
>

Yes this shows disk usage for each VM , but no way to understand which VM
may have problems.

In other words, an alert that does not tell which VM is involved have a
sort of terror effect. You understand that something can break every
moment, but no way to understand  where the problem is.


> To graphically examine disk usage within a VM, you can use the gnome
> "Disk usage" app. The shell executable name for this is "baobab".
>
>
This can be done if you already know which VM has problems. But starting
tens of VMs  fishing for the one with problems seems too much. Also I
suspect that those black alert messages in the upper right corner of the
screen are related to dom0, rather than to specific VMs.

So from my viewpoint these alerts have no practical use, other then
remembering that computers are a fragile thing  and that it may be time to
do a backup.
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBL%3DPtQXGkXy59VCZSvJshvv0ER_mEgu4haMNeDooCxrw%40mail.gmail.com.


[qubes-users] Disk usage warning

2019-08-12 Thread Franz
On the upper right corner of the screen a black message alert:

Disk usage warning!
You are running out of disk space. 4.8% space left in pool lvm.

Sometimes the message is a bit different referring to rw instead

If I run df in dom0 all items usage Is below 24%

So what should I do with that alert?

IMHO these alerts are too cryptic
Best.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBOUptmTg4jvKfJr3AkBErKCZT0kerzjm0%3Dpbr6dL3Szw%40mail.gmail.com.


Re: [qubes-users] Print services are broken: Fedora and Debian

2019-08-10 Thread Franz
On Fri, Aug 9, 2019 at 10:48 PM Chris Laprise  wrote:

> On 8/9/19 9:12 PM, 'awokd' via qubes-users wrote:
> > unman:
> >> On Sat, Aug 10, 2019 at 12:45:00AM +, 'awokd' via qubes-users wrote:
> >>> Chris Laprise:
>  I'm currently unable to print from Qubes using either fedora-30,
>  debian-9 or debian-10 templates.
> 
>  In debian-based vms, when I run 'system-config-printer' I get a
> 'failed
>  to connect to server' error.
> 
>  In fedora, there is no longer any 'system-config-printer' command and
>  when I run 'gnome-control-center' it segfaults.
> 
>  In neither environment can I browse to 'localhost:631' cups server. I
>  don't recall having such a problem accessing printers from Qubes in
> the
>  past. To me, this looks like Qubes has done something un-announced to
>  suppress print services.
> 
> >>> Printing works on Debian 9 here as well as system-config-printer. I see
> >>> cupsd listening on 631 (and cups-browsed on UDP 631). I have a locally
> >>> attached USB printer and all updates applied from Qubes current +
> Debian
> >>> oldstable.
> >>>
> >>
> >> Yes, works fine for me in all Debian, including vanilla 10.
> >> Have you made sure that cups is running?
> >>
> > Could it be kernel related since it's across all your templates? I'm
> > running 4.19.47-1 from testing a couple months ago.
> >
>
> That's odd. I don't recall having to enable 'cups' Qubes service, but
> that resolved it.
>

I never had to specifically enable cups Qubes service, but printing works
with Debian 9.
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCDQBuu_puhGaOeAXNpC565yibKYrCsUpgX%3DdT8ZuqiaA%40mail.gmail.com.


Re: [qubes-users] Installing git repositories

2019-05-17 Thread Franz
On Fri, May 17, 2019 at 6:38 AM Axel  wrote:

> Hello !
>
> I installed Kali using this method :
> https://www.qubes-os.org/doc/pentesting/kali/#kali-linux-templatevm-from-a-debian-template--
> Now, I would like to know how to install git repositories to use them on
> an AppVM? Do I have to install the git repositories directly in the AppVM?
>
> everything you install in the AppVM will work, but will be lost after
reboot. For persistent use you'll want to install in the template

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBHKP8CD9P0xLZ%3Dsxh_rkq4JbwWhMyJm_agerviF64sqw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Bluetooth devices

2019-05-16 Thread Franz
On Tue, May 7, 2019 at 12:51 PM  wrote:

> Hello everyone!
>
> I would like to know if it's possible to use Bluetooth devices (mouse,
> keyboard...) on Qubes OS?
>
> I use Qubes 4.0 on a SanDisk Extreme Pro 256gb USB 3.1 key.
>
>
There is no way to get any form of security with bluetooth. So it is at
odds with Qubes. But if you live totally isolated I imagine you should be
able to get it working in dom0.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAucVr%3DmCnf%2B9QwSrW4iPnoFhXKvWrPiWT8RvYh8TEOOA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] File system check

2019-04-05 Thread Franz
Hello,

A friend who is helping me debug some errors downloading a cryptocurrency
blockchain suggested a file system check.

He thinks it is a hard disk/file system problem.  He suggested booting with
a rescue disk and checking the whole disk for errors.

Which is the proper way to do that with Qubes?

Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAOMs7y-OMCfEpZ2JyJd9VcTbP1dNwbbL9xoKP86xYuyg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] no Whonix network

2019-03-31 Thread Franz
0brand
On Sun, Mar 31, 2019 at 6:32 PM 0brand <0br...@mailbox.org> wrote:

>
>
> Franz:
> > Today I tried to updated the Whonix-ws template, but got an error about
> > being  unable to download some asc file. Then trying to update it again,
> it
> > founds nothing to update and there is no network connection even if I
> > connect it to default NON tor firewall.
>
> Could you please post the error that you are referring to.
>
>
No because, as I wrote, when i try to update again I do no more get the
error message. It simple reports there is nothing to update.

Qubes 4.0 templateVMs are non-network connected by default and instead
> use qubes-updates-proxy to update software.
>
> If you were to connect Whonix-ws-14 to a clearnet connected VM you would
> have no network connection in the template.
>

May be I was not clear. My problem is not the template, rather the
depending applvm. I mentioned the template only because of the updating
error not finding the relevant asc file, because I imagined it may be the
cause of the lacking network in the applVM.

> >
> > If I ping google I get "operation not permitted"
>
> ping does not work over Tor.
>


> >
> > Is that related to this thread?
>
> Not unless you configured your template(s) to use Qubes .onion
> repositories.
>
>
so it is not related since I used the default configuration.

>
>
> > Best
> >
> > On Sun, Mar 31, 2019 at 12:12 PM  wrote:
> >
> >> On Monday, March 25, 2019 at 7:44:31 PM UTC-7, Andrew David Wong wrote:
> > On 24/03/2019 7.30 PM, Andrew David Wong wrote:
> >>>>> Dear Qubes Community,
> >>>>>
> >>>>> We regret to announce that the Qubes Tor onion services will no
> longer
> >>>>> be maintained due to lack of resources. This includes all Qubes onion
> >>>>> services, including the Qubes website onion mirror and the onion
> >>> package
> >>>>> repos.
> >>>>>
> >>>>> We would like to thank the Whonix Project for generously maintaining
> >>>>> these services for over a year. [1] Maintaining the Tor onion
> services
> >>>>> requires labor, servers, and bandwidth. Unfortunately, none of these
> >>>>> resources are available to the Qubes OS or Whonix projects in
> >>> sufficient
> >>>>> quantities to allow us to continue offering these services.
> >>>>>
> >>>>> We recommend that users who currently rely on any Qubes onion
> addresses
> >>>>> transition to the corresponding clearnet addresses immediately.
> >>>>>
> >>>>>
> >>>>> [1]
> >>>
> https://www.qubes-os.org/news/2018/01/23/qubes-whonix-next-gen-tor-onion-services/
> >>>>>
> >>>>> This announcement is also available on the Qubes website:
> >>>>>
> >>>
> https://www.qubes-os.org/news/2019/03/24/tor-onion-services-no-longer-maintained/
> >>>>>
> >
> > Dear Qubes Community,
> >
> > Thank you all for your support. Unman has generously agreed to bring the
> > Qubes Tor onion services back and maintain them. He has considerable
> > experience in hosting and infrastructure management, including running
> > onion services. He is working on it now. We'll have another update for
> > you soon.
> >
> > Thank you, unman!
> >
> >>
> >> Thank you, Unman for taking this on.  I still think the larger issue is
> >> that the qubes and whonix teams are severely resource strapped.  It is
> >> truly a David and Goliath situation between them and the Wintel money
> >> machine.  We need to give these guys all the financial support we can.
> >>
> >> --
> >> You received this message because you are subscribed to the Google
> Groups
> >> "qubes-users" group.
> >> To unsubscribe from this group and stop receiving emails from it, send
> an
> >> email to qubes-users+unsubscr...@googlegroups.com.
> >> To post to this group, send email to qubes-users@googlegroups.com.
> >> To view this discussion on the web visit
> >>
> https://groups.google.com/d/msgid/qubes-users/68e9cb48-8d7a-4bea-abbc-d928d0fff52a%40googlegroups.com
> >> .
> >> For more options, visit https://groups.google.com/d/optout.
> >>
> >
>
> --
> GPG Public Key: 0x09B31BA99EC051FE
> Fingerprint: 4452 4D54 4EB2 53E8 1EE9 223A 09B3 1BA9 9EC0 51FE
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDgKRb0CJD7PZt2TO3_O7hgckHT%3Dv_mq6-9sChA3yWqJg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: [Update] Re: Announcement: Qubes Tor onion services will no longer be maintained

2019-03-31 Thread Franz
Today I tried to updated the Whonix-ws template, but got an error about
being  unable to download some asc file. Then trying to update it again, it
founds nothing to update and there is no network connection even if I
connect it to default NON tor firewall.

If I ping google I get "operation not permitted"

Is that related to this thread?
Best

On Sun, Mar 31, 2019 at 12:12 PM  wrote:

> On Monday, March 25, 2019 at 7:44:31 PM UTC-7, Andrew David Wong wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> >
> > On 24/03/2019 7.30 PM, Andrew David Wong wrote:
> > > Dear Qubes Community,
> > >
> > > We regret to announce that the Qubes Tor onion services will no longer
> > > be maintained due to lack of resources. This includes all Qubes onion
> > > services, including the Qubes website onion mirror and the onion
> package
> > > repos.
> > >
> > > We would like to thank the Whonix Project for generously maintaining
> > > these services for over a year. [1] Maintaining the Tor onion services
> > > requires labor, servers, and bandwidth. Unfortunately, none of these
> > > resources are available to the Qubes OS or Whonix projects in
> sufficient
> > > quantities to allow us to continue offering these services.
> > >
> > > We recommend that users who currently rely on any Qubes onion addresses
> > > transition to the corresponding clearnet addresses immediately.
> > >
> > >
> > > [1]
> https://www.qubes-os.org/news/2018/01/23/qubes-whonix-next-gen-tor-onion-services/
> > >
> > > This announcement is also available on the Qubes website:
> > >
> https://www.qubes-os.org/news/2019/03/24/tor-onion-services-no-longer-maintained/
> > >
> >
> > Dear Qubes Community,
> >
> > Thank you all for your support. Unman has generously agreed to bring the
> > Qubes Tor onion services back and maintain them. He has considerable
> > experience in hosting and infrastructure management, including running
> > onion services. He is working on it now. We'll have another update for
> > you soon.
> >
> > Thank you, unman!
> >
> > - --
> > Andrew David Wong (Axon)
> > Community Manager, Qubes OS
> > https://www.qubes-os.org
> >
> > -BEGIN PGP SIGNATURE-
> >
> > iQIzBAEBCgAdFiEEZQ7rCYX0j3henGH1203TvDlQMDAFAlyZkfsACgkQ203TvDlQ
> > MDCeNA/8Dcb3mOGy0GqtoVN1adyRk0sx8HjC372wsN3WdTKSpMPT3vSnv83x
> > 7F7l+14g5ODfp0g0NN2yNZau24KswW4j96cWMrjAGTgTBtpOp76MmKnDWAATUt13
> > 6gL7QACtG6QOvK0FKKa+6Y3JGXyftG2GxomeS1d6LPiG09FN45IGbjyIvwRhM8iv
> > igfniJr/mhwxfjKjMrPiCBqJdr4PjX07LMSB/qns/qXJBcH8xga2KRM4tqSmCTEr
> > Vin6ecAxKsQOL0RMCoEGRDNt0ieQkrqhQTp4o+B6AbiYyjB7ggQm9Kyt8gGYymM1
> > NibtSIiDooBQzOx+Qp61re2Im40bTrQPJV5KvHJkN3klBDQsfiu8n6LSdeGcdA8V
> > 49TGr1gVIegfpc56wCbj9g4UnKIpoUKpGJEyKMLaqXG0nVkr07gTuePQX4bhswD/
> > sY/V1qwYssD1l79eqVNu9QC8Jnx6DTtKnidDaj6wEJFmZnAy+O35znrbquJpCRi+
> > 2XGXnqF1MP+8xRlOlMnEtFzKVv2LPYKUJTYPVSPUci+D0l8f8649eJcGSECk13BX
> > FakdNrzIseJxOOhYvH8zsl4HGy4TD/Xe4aHeh+fBNCpO/9XEB0WYvWF2rW4RmaRn
> > YCCEOa2HA0E+3czZarhTYvTllQWLQ2N+874g/qkWU82cOzYtgIQ=
> > =hqT/
> > -END PGP SIGNATURE-
>
> Thank you, Unman for taking this on.  I still think the larger issue is
> that the qubes and whonix teams are severely resource strapped.  It is
> truly a David and Goliath situation between them and the Wintel money
> machine.  We need to give these guys all the financial support we can.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/68e9cb48-8d7a-4bea-abbc-d928d0fff52a%40googlegroups.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAhyC9wWC%2BTrgG8FETmiNez_Wtavn4tO5Nr5iL0cAtT2w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Cloning win7 VM disk usage on QM is zero

2019-03-17 Thread Franz
Cloning win7 VM, disk usage on Qubes Manager is zero. How is it possible
that a VM that should use more than 20 GB does not use any disk space when
cloned? I am using default R4 settings.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCtj%3DStvF-rX9dSPFzoJxjS5dq0OEPaCchkBBCKjYqugw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] QWT and win updates

2019-03-13 Thread Franz
On Wed, Mar 13, 2019 at 12:32 PM unman  wrote:

> On Wed, Mar 13, 2019 at 06:56:03AM -0700, Hugo Costa wrote:
> > On Wednesday, 13 March 2019 11:12:46 UTC, unman  wrote:
> > > On Tue, Mar 12, 2019 at 04:53:02PM -0300, Franz wrote:
> > > > I installed again windows following this
> > > >
> https://www.qubes-os.org/doc/windows-vm/#xen-pv-drivers-and-qubes-windows-tools
> > > >
> > > > Windows now is working and fully updated but no additional driver is
> > > > installed.
> > > >
> > > > Reading this tutorial many times, for me, it is not yet clear what
> the
> > > > following means:
> > > >
> > > > "If you plan to update your newly installed Windows VM it is
> recommended
> > > > that you do so *before* installing Qubes Windows Tools (QWT). If QWT
> are
> > > > installed, you should temporarily re-enable the standard VGA adapter
> in
> > > > Windows and disable Qubes’ (see the section above)."
> > > >
> > > > Does it mean that once QWT is installed I can no more regularly
> update my
> > > > system, unless every time remember to do some strange and not well
> > > > understood VGA tweaking?
> > > >
> > > > This seems very strange because on 3.2 I always updated windows even
> if QWT
> > > > was already installed, with no issues.
> > > >
> > > > So did this really change with Qubes 4.0
> > > >
> > > > Best
> > >
> > > That is the implication.
> > > You could test this by updating *without* changing the adapter.
> > > If everything works as expected, head over to
> > > www.qubes-os.org/doc/windows-vm and edit that page.
> > > You can help improve Qubes by doing this.
> >
> > I believe the "don't update" message has always been there, it didn't
> change from Q3.2 to Q4.x. But, obviously, the processes used to provide
> Qubes integration may stop working due to a certain update, so it's a valid
> warning.
> >
>
> I dont think that this is true - there was not a "dont update"
> message and there isnt one now.
> In the past there used to be a recommendation to re-enable the VGA adapter
> when
> updating, so really I dont think that anything has changed.
>
>
I never saw this alert before.
Anyway I recovered the old windows VM installed under 3.2 and it is still
working even if network is not connected anymore.

How do you re-enable the VGA adaptor?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAKxtiUitGih92ME0yRs4SKpSEgcniMy%3DEyZpra_7JC3w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] QWT and win updates

2019-03-12 Thread Franz
I installed again windows following this
https://www.qubes-os.org/doc/windows-vm/#xen-pv-drivers-and-qubes-windows-tools

Windows now is working and fully updated but no additional driver is
installed.

Reading this tutorial many times, for me, it is not yet clear what the
following means:

"If you plan to update your newly installed Windows VM it is recommended
that you do so *before* installing Qubes Windows Tools (QWT). If QWT are
installed, you should temporarily re-enable the standard VGA adapter in
Windows and disable Qubes’ (see the section above)."

Does it mean that once QWT is installed I can no more regularly update my
system, unless every time remember to do some strange and not well
understood VGA tweaking?

This seems very strange because on 3.2 I always updated windows even if QWT
was already installed, with no issues.

So did this really change with Qubes 4.0

Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBZ9gyLnNkVRjgVFwiEcWYD9yNd3-vnXGr53GssSQAhzw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] why mail-list?

2019-01-31 Thread Franz
On Thu, Jan 31, 2019 at 2:11 PM Stuart Perkins 
wrote:

>
>
> On Thu, 31 Jan 2019 18:01:58 +0100 (CET)
> 19hundreds <19hundr...@tutanota.com> wrote:
>
> >
> >I agree at some level with what you are saying however, the current
> mailing list has a lot of valuable information so I believe it's gonna be
> hard to se it replaced with something else.
> >
> >Beside the unofficial resources listed by others, I add
> https://reddit.com/r/qubes  (it's SO
> comfortable!)
> >
>
> Some of us who keep e-mails off line have the additional benefit of having
> an archive of all e-mails since joining the list.  I can search them for
> something BEFORE asking a new question.  I have done so with this group a
> few times already and not had to bother asking something which was already
> asked and answered.
>
> I use claws-mail to retrieve all of my e-mails (about 27 different e-mail
> accounts...one paid for [legal expectation of privacy] and several
> gmail/hotmail/yahoo) and since claws-mail is configured to store e-mails as
> discrete files, I can search them with grep and other *nix utilities.  I
> have an archive going back almost 30 years with over 700,000 discrete
> e-mails from the many groups I used to belong to, as well as private
> stuff.  It is far easier to just store them than to sort through them for
> deletion...but they are organized by folders/directories to make it easy to
> ignore the ones not pertinent for the time.
>
>
Unbelievable!! I always thought that the only practical way to retrieve old
emails was using a google account, but you seem to suggest that you are
able to do the same  with claws-mail. How much space does 700K emails take?
Because you seem to keep them on your computer, correct? And does the
search of old emails work as convenient as google?

-- 
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/2019013054.64e034c6%40gmail.com
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAyMATTi_qXm6ptBu0P0Hr%2B4f%3DeRiw5NzuM%3DJFq2pEmRg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qube Window Manager; unable to list all open windows

2019-01-30 Thread Franz
On Sun, Jan 27, 2019 at 1:16 PM Chris Laprise  wrote:

> On 01/27/2019 09:32 AM, Franz wrote:
> > Command `wmctrl -l` gives the following error
> >
> > |Cannot get client list properties. (_NET_CLIENT_LIST or
> _WIN_CLIENT_LIST)|
>
> This works for me with KDE.
>
>
> >
> > But when I use |wmctrl| to display info about the window manager, Qubes
> > is indeed found:
> > [user@personal ~]$ wmctrl -m
> > Name: Qubes
> > Class: N/A
> > PID: N/A
> > Window manager's "showing the desktop" mode: N/A
> >
> > What I am trying to do is to gracefully close firefox, but I get the
> > same error:
> >
> > [user@personal ~]$ wmctrl -c firefox
> > Cannot get client list properties.
> > (_NET_CLIENT_LIST or _WIN_CLIENT_LIST)
>
> You could try using 'xdotool' instead:
> xdotool search --name Firefox
>
> See my 'halt-vm-by-window' script from 'Qubes-scripts' project for
> examples. You could go through the list of matching windows, find the VM
> name with 'xprop', then issue a command like "qvm-run $vmname 'pkill
> firefox'" which should send a normal TERM signal to Firefox.


I tried most of the 60 signals that can be associated to pkill and none is
able to close firefox gracefully. The closer one is number 3, SIGQUIT that
at least waits a little bit before closing firefox. I suppose the way kill
and pkill work is just to crash the program you want to close.

Well perhaps it may not be as bad as it seems. I wonder why wmctrl does not
work with xfce. Is that a bug?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qB6Hv4WMR5q-32VF-yAA47WY%3D9msb-6xn4dOun1qskR5Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qube Window Manager; unable to list all open windows

2019-01-28 Thread Franz
On Sun, Jan 27, 2019 at 1:16 PM Chris Laprise  wrote:

> On 01/27/2019 09:32 AM, Franz wrote:
> > Command `wmctrl -l` gives the following error
> >
> > |Cannot get client list properties. (_NET_CLIENT_LIST or
> _WIN_CLIENT_LIST)|
>
> This works for me with KDE.
>
>
> >
> > But when I use |wmctrl| to display info about the window manager, Qubes
> > is indeed found:
> > [user@personal ~]$ wmctrl -m
> > Name: Qubes
> > Class: N/A
> > PID: N/A
> > Window manager's "showing the desktop" mode: N/A
> >
> > What I am trying to do is to gracefully close firefox, but I get the
> > same error:
> >
> > [user@personal ~]$ wmctrl -c firefox
> > Cannot get client list properties.
> > (_NET_CLIENT_LIST or _WIN_CLIENT_LIST)
>
> You could try using 'xdotool' instead:
> xdotool search --name Firefox
>
> See my 'halt-vm-by-window' script from 'Qubes-scripts' project for
> examples. You could go through the list of matching windows, find the VM
> name with 'xprop', then issue a command like "qvm-run $vmname 'pkill
> firefox'" which should send a normal TERM signal to Firefox. Its best to
> wait about 5 seconds before trying to shut down the VM so the browser
> state has time to be written to disk.
>
>
thanks Chris
xdotool does not seem to work either

I tried to use the script posted here
https://superuser.com/questions/583246/can-i-close-firefox-browser-tab-or-firefox-browser-from-ubuntu-terminal

but it give this error:
Defaulting to search window name, class, and classname
Your windowmanager claims not to support _NET_ACTIVE_WINDOW, so the attempt
to activate the window was aborted.
xdo_activate_window on window:18874384 reported an error

It may be a xfce problem since you wrote it works with KDE
Best

> --
>
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCkmkxjQJ5Hqkr%2BA%2BgUhNyjVwovybcUOZd8i6OXSBJ51A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qube Window Manager; unable to list all open windows

2019-01-27 Thread Franz
Command `wmctrl -l` gives the following error

Cannot get client list properties.
(_NET_CLIENT_LIST or _WIN_CLIENT_LIST)

But when I use wmctrl to display info about the window manager, Qubes is
indeed found:
[user@personal ~]$ wmctrl -m
Name: Qubes
Class: N/A
PID: N/A
Window manager's "showing the desktop" mode: N/A

What I am trying to do is to gracefully close firefox, but I get the same
error:

[user@personal ~]$ wmctrl -c firefox
Cannot get client list properties.
(_NET_CLIENT_LIST or _WIN_CLIENT_LIST)

Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDeMHmEpneeCQ2bsz3%3D1arL1voXR3_VFyz5CDqKjh5MrA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] V3.2 script does not work on v4.01

2019-01-23 Thread Franz
Hello
I moved to Qubes 4 and my script to start various VMs and programs, which
worked fine with V3.2, now just executes only the first command and stops
there. Why?

Script
qvm-start untrusted
wmctrl -s 1
qvm-run untrusted firefox
qvm-run untrusted nautilus
qvm-start personal
 and many others commands

It stops with:
sh script.sh
Running 'firefox' on untrusted

I get nothing more than that. Why does not it start also nautilus and many
other stuff as it did with Qubes 3.2?

best
Franz

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCDdgMzg79CZfzCa%3DDpHSd2gc10UQ8g1c4ypBZVt89J3w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] cannot connect to 'win7' qrexec agent for 300 seconds, giving up

2018-12-16 Thread Franz
On Sun, Dec 16, 2018 at 5:43 PM awokd  wrote:

> Franz wrote on 12/2/18 8:54 PM:
> >   Suddenly  win7 VM stopped starting on Qubes 3.2.  Nothing changed
> except
> > perhaps the last couple of dom0 updates.
> >
> > The error message is:
> > cannot connect to 'win7' qrexec agent for 300 seconds, giving up
> >
> > I tried debug mode, but it is just the same.
> >
> I had this but it was because Win7 was trying to boot in recovery mode.
> When you enable debug mode, watch the Win7 boot process in the console
> to make sure it's not doing the same. If it is, tell it to start normally.
>
>
thanks awokd, doing what you suggest, it hungs forever on the "Starting
Windows" screen. also the dot on Qubes Manager remains yellow. But trying
again it started showing the following:
"Xen pv network class needs to restart the system to complete installation.
Press yes to restart now..."

So the issue seems to be that dom0 update installed some Xen change that
interrupted normal Windows start.

Many thanks awokd

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDM0EC1%2B300VmBDCFYiazy7NGgMJBn8CFqgLoEPXbtoSA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] cannot connect to 'win7' qrexec agent for 300 seconds, giving up

2018-12-02 Thread Franz
 Suddenly  win7 VM stopped starting on Qubes 3.2.  Nothing changed except
perhaps the last couple of dom0 updates.

The error message is:
cannot connect to 'win7' qrexec agent for 300 seconds, giving up

I tried debug mode, but it is just the same.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBQ%3DGm_2c5CKnyZPHcMcsr_okkLJPwXq33L-mk%3DqqMrtw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.2 whonix 14 connects to tor, but there is no connection

2018-11-15 Thread Franz
On Thu, Nov 15, 2018 at 4:47 PM pieter lems  wrote:

> is sys-net connected to the network?
>

yes

And are you using an ethernet cable to connect to internet,
>

no I am connected by wifi

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qB0GvoySxxQ65eEGpxeyqt-oEp7JkQGDkSAeheu4vDSbw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes 3.2 whonix 14 connects to tor, but there is no connection

2018-11-14 Thread Franz
On Wed, Nov 14, 2018 at 7:20 PM pieter lems  wrote:

> Whats the error when you run the whonix check?
>
>

user@host:~$ whonixcheck
[INFO] [whonixcheck] multinodo-nikki | Whonix-Workstation | whonix-ws-14
TemplateBased AppVM | Thu Nov 15 03:17:05 UTC 2018
eth0: error fetching interface information: Device not found
[ERROR] [whonixcheck] check network interfaces Result: network interface
eth0 not up!

If you know what you are doing, feel free to disable this check.
Create a file /etc/whonix.d/50_whonixcheck_user.conf and add:
whonixcheck_skip_functions+=" check_network_interfaces "

Debugging information:
Command sudo --non-interactive /sbin/ifconfig eth0 failed.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBqT1YECL2ja0zjswEgVJyGopfAaNFpKtpFuabN%3Dc3rcg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes 3.2 whonix 14 connects to tor, but there is no connection

2018-11-14 Thread Franz
I succesfully updated to whonix 14, when the VM start a message tells:
"connected to tor" making me happy, But if I ping google I get:

user@host:~$ ping google.com
PING google.com (216.58.207.206) 56(84) bytes of data.
>From 10.137.5.34 (10.137.5.34) icmp_seq=1 Destination Port Unreachable
ping: sendmsg: Operation not permitted


what may be wrong?
Best

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qA0uvEsR3rkcekD1e%3DA5PvCJje8yKmb-xaGNqDw8-meHQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Replacement for Lenovo x230 (coreboot'able + high res)

2018-10-26 Thread Franz
On Fri, Oct 26, 2018 at 8:28 PM 799  wrote:

> Hello,
>
> I have used two x230 (i5 and i7) in the last email years to run Qubes.
> While I love the form factor and battery runtime I would like to move to a
> device which has a better screen resolution.
> I'd like to have something between 12 and 14inch as I have already a
> bigger 15,4" laptop which has a great resolution (3K) but bad battery
> runtime (Workstation Laptop).
>
> Do you have a suggestion which fits into my wishlist:
>
> - Coreboot'able
> - Qubes 4 compatible
> - FullHD Resolution 1.920x1.080 or similar
> - 16 GB RAM
> - optional LTE WAN Card
> - 12 or 14 inch
> - good battery runtime
>
>
An external monitor for x230? I am considering to buy a Onyx Boox Max 2
which is e-ink (black and white) to save my eyes and is portable, so
somebody posted photos of the Onyx attached with velcro to the x230. It
also may save battery time if there is a way to dis-activate  the original
x230 display  because it is not illuminated.

It can also be detached from the x230 and used as android tablet e-reader.

But it is just a plan I have not tested it yet

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAhhG2%3DKCS__YuGbtKhCSaYurgw_m3GK8P7Fmfeyg71Hw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Additional USB controllers for a laptop expresscard to PCI-slots

2018-10-25 Thread Franz
On Wed, Oct 24, 2018 at 2:44 AM 'awokd' via qubes-users <
qubes-users@googlegroups.com> wrote:

>
>
> Unman:
> > On Mon, Oct 22, 2018 at 10:40:23AM -0300, Franz wrote:
> >> On Mon, Oct 22, 2018 at 10:29 AM unman 
> wrote:
> >>
> >>> On Mon, Oct 22, 2018 at 09:13:46AM -0300, Franz wrote:
> >>>> On Mon, Oct 22, 2018 at 12:42 AM taii...@gmx.com 
> >>> wrote:
> >>>>
> >>>>> No it won't.
> >>>>>
> >>>>> Expresscard > PCI-e
> >>>>>
> >>>>> PCI anything WILL NOT WORK - ALL IN SAME IOMMU GROUP.
> >>>>>
> >>>>> Save money buy one marketed for egpu gaming for $100 or so from bplus
> >>>>> tech taiwan - expresscard>pci-e then buy a Sonnet Allegro Pro which
> is
> >>> 4
> >>>>> separate USB controllers which will work fine AS LONG AS YOUR LAPTOPS
> >>>>> ROOT PORTS SUPPORT ACS otherwise it won't work they will all be the
> >>> same
> >>>>> group. I have no idea what laptops do however.
> >>>>>
> >>>>>
> >>>> It seems my processor i7 3520m does not support ACS. So this should
> mean
> >>>> that even if I use 4 different PCI cards, in the best case scenario
> they
> >>>> can only be assigned to the same VM.
> >>>>
> >>>> On the same laptop Lenovo x230 a similar problem was that it has two
> >>> native
> >>>> USB controllers, but there is some connection between them so that
> they
> >>> can
> >>>> only be assigned to the same VM.
> >>>>
> >>>
> >>> Not in my experience with x230. Three controllers, and you can separate
> >>> ports on Left and Right between two usbVM.
> >>>
> >>
> >> with 3.2 or 4?
> >> I tried various times with 3.2 and it replies something like that it
> does
> >> not want to do that because the two controllers are somehow connected
> and
> >> therefore there is a security risk isolating them when they are not
> really
> >> isolated.
> >>
> >> But of course you understand all that much better than me Unman :-)
> >>
> >
> > Blind leading the blind, I'm afraid.
> >
> > This is with 4. I'll try it with 3.2.1 in the morning.
> >
> @taiidan- I based that from some code I saw in Xen that seemed to
> support classic PCI passthrough. See also the last entry on this page
> for example: https://wiki.xen.org/wiki/Xen_PCI_Passthrough. Agree it's
> not the most secure approach with Qubes, if it works at all.
>
> @franz- I think the warning you were getting on 3.2 was caused by strict
> reset mode. 4.0 disables strict reset by default in sys-usb, IIRC. So
> you might want to go ahead and try it by following the 3.2 no
> strict-reset section in
> https://www.qubes-os.org/doc/assigning-devices/#pci-passthrough-issues.
>
>
Interesting thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qBHd%2BZFvctgJwksnAx4ueTVWUoO2nAkgAZJ7WLS6YzYwA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Additional USB controllers for a laptop expresscard to PCI-slots

2018-10-22 Thread Franz
On Mon, Oct 22, 2018 at 10:29 AM unman  wrote:

> On Mon, Oct 22, 2018 at 09:13:46AM -0300, Franz wrote:
> > On Mon, Oct 22, 2018 at 12:42 AM taii...@gmx.com 
> wrote:
> >
> > > No it won't.
> > >
> > > Expresscard > PCI-e
> > >
> > > PCI anything WILL NOT WORK - ALL IN SAME IOMMU GROUP.
> > >
> > > Save money buy one marketed for egpu gaming for $100 or so from bplus
> > > tech taiwan - expresscard>pci-e then buy a Sonnet Allegro Pro which is
> 4
> > > separate USB controllers which will work fine AS LONG AS YOUR LAPTOPS
> > > ROOT PORTS SUPPORT ACS otherwise it won't work they will all be the
> same
> > > group. I have no idea what laptops do however.
> > >
> > >
> > It seems my processor i7 3520m does not support ACS. So this should mean
> > that even if I use 4 different PCI cards, in the best case scenario they
> > can only be assigned to the same VM.
> >
> > On the same laptop Lenovo x230 a similar problem was that it has two
> native
> > USB controllers, but there is some connection between them so that they
> can
> > only be assigned to the same VM.
> >
>
> Not in my experience with x230. Three controllers, and you can separate
> ports on Left and Right between two usbVM.
>

with 3.2 or 4?
I tried various times with 3.2 and it replies something like that it does
not want to do that because the two controllers are somehow connected and
therefore there is a security risk isolating them when they are not really
isolated.

But of course you understand all that much better than me Unman :-)

>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/20181022132922.sgisyhcdcsptxgze%40thirdeyesecurity.org
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAbe2B5_9XdOdKRrer_GFiTEa_2Y5S%3DyZ7vb_n68_j9jw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Additional USB controllers for a laptop expresscard to PCI-slots

2018-10-22 Thread Franz
On Mon, Oct 22, 2018 at 12:42 AM taii...@gmx.com  wrote:

> No it won't.
>
> Expresscard > PCI-e
>
> PCI anything WILL NOT WORK - ALL IN SAME IOMMU GROUP.
>
> Save money buy one marketed for egpu gaming for $100 or so from bplus
> tech taiwan - expresscard>pci-e then buy a Sonnet Allegro Pro which is 4
> separate USB controllers which will work fine AS LONG AS YOUR LAPTOPS
> ROOT PORTS SUPPORT ACS otherwise it won't work they will all be the same
> group. I have no idea what laptops do however.
>
>
It seems my processor i7 3520m does not support ACS. So this should mean
that even if I use 4 different PCI cards, in the best case scenario they
can only be assigned to the same VM.

On the same laptop Lenovo x230 a similar problem was that it has two native
USB controllers, but there is some connection between them so that they can
only be assigned to the same VM.

So thanks for help to avoid spending money and effort for nothing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCGVhjcrdtXvnUco%2B_%3DK1V20a7PHK_rdan7y4YLt8jJ2Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Additional USB controllers for a laptop expresscard to PCI-slots

2018-10-19 Thread Franz
What do you think, will something like this be able to add more usb
controllers to a laptop?

https://www.integrate-computer.de/Exsys-EX-1015-ExpressCard-Bus-to-4-x-PCI-Slot-compact-Expansion-Box
This is reported to be linux compatible.

The idea is to add  a USB keyboard to a laptop using a PCI USB controller,
perhaps using another  slot for an audio card or whatever.

Having a separate keyboard will also allow to add an external monitor,
making home use more comfortable for eye strain now that e-ink monitors are
getting available.

But may Qubes architecture be able to assign these additional cards to
specific VMs even if they are connected by an Expresscard?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCsgn-Kj1aCSx9UX78Bt6o70isG_ht8z_aTv2jKh2%2Bymw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] after suspend sys-firewall looses connection with sys-net Qubes 3.2

2018-10-10 Thread Franz
Randomly, but increasing, after suspend sys-net is shutdown.
If I start it, it automatically connects to wifi, but sys-firewall is
unable to connect to sys-net.
If I try
qvm-prefs -s sys-firewall netvm sys-net
1. immediately after sys-net start, get "libxenlight failed to detach
network device"
2. after sys-net is fully started and already automatically connected to
wifi, get "an error occurred but the cause in unknown". The same happens if
I try to disable networking with the network manager applet.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCqZU-S%2Bj4j%2BSrJ_4_prP3G1Q3EvF_ropFqGkcAZo7T6w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] External monitor resolution

2018-09-25 Thread Franz
On Tue, Sep 25, 2018 at 7:49 AM, Holger Levsen 
wrote:

> On Mon, Sep 24, 2018 at 06:52:30PM -0300, Franz wrote:
> > I understand that the Lenovo x230 does not have the power to properly set
> > the two displays each with the correct resolution, but in mirror mode,
> they
> > are exactly the same and it works.
>
> I use an x230 here with an external 4k display and it works nicely, with
> or without using the internal display as well. (using the mini-displayport
> output, not VGA.)
>
> As a start, I'd recommend to run "xrandr --auto" in dom0.
>
>
>
Thanks Holger,

my external monitor only has a VGA port so I do not know how to connect it
to the mini-display port.

Using the VGA connection it works only as mirror. If I try to keep the
laptop screen at its original resolution 1366x768, and the external screen
at 1024x768, then the external screen shows only  the Qubes logo (you know
the big white Q with the same Q broken into pieces) and if I move the mouse
to the right, over the border of the laptop screen, it goes into the
external screen. So it seems the laptop screen and the external screen show
different things. But the external screen with the Qubes logo is useless.

> --
> cheers,
> Holger
>
> 
> ---
>holger@(debian|reproducible-builds|layer-acht).org
>PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAPNq_7GeKGC6W%3DoHpYHdRVoUcY0fO7C8QgWFARaZyu3w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] External monitor resolution

2018-09-24 Thread Franz
On Mon, Sep 24, 2018 at 5:30 PM, Franz <169...@gmail.com> wrote:

>
>
> On Mon, Sep 24, 2018 at 2:38 PM, Franz <169...@gmail.com> wrote:
>
>>
>>
>> On Mon, Sep 24, 2018 at 1:11 PM, unman 
>> wrote:
>>
>>> On Mon, Sep 24, 2018 at 01:02:50PM -0300, Franz wrote:
>>> > On Qubes 3.2 had to add an External monitor because my Lenovo x230
>>> laptop
>>> > display started flickering and slowing down. But the resolution on the
>>> > external monitor is wrong. What appears on screen is correctly high,
>>> but
>>> > too large to fit into the screen.
>>> >
>>> > Running xrandr gives the output on the enclosed photo. From that I
>>> imagine
>>> > that the resolution of the external monitor should be changed to
>>> 1366x768.
>>> >
>>> > But how do I do that? I spent a couple hours reading many old threads,
>>> but
>>> > they imply a knowledge I do not have, só cannot figure out. Also am
>>> afraid
>>> > of doing something wrong and loosing access to my computer.
>>> >
>>> > Any idea?
>>>
>>> I don't know what was in the photo.
>>> But you should be able to access these settings under the Qubes menu,
>>> System Settings, Display entry.
>>>
>>>
>>

Your System setting works Unman, i had to set all three flags:

1. external display is in Use
2. External display is primary
3. Displays are in mirror mode

So what is shown on the laptop is a bit smaller than the screen, but the
external display is perfect.

I understand that the Lenovo x230 does not have the power to properly set
the two displays each with the correct resolution, but in mirror mode, they
are exactly the same and it works.

Many thanks Unman.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAX00js6Vk4_43qsDWLZCoZQpizNNXzqDnsMNR4eZqoAQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] External monitor resolution

2018-09-24 Thread Franz
On Mon, Sep 24, 2018 at 2:38 PM, Franz <169...@gmail.com> wrote:

>
>
> On Mon, Sep 24, 2018 at 1:11 PM, unman  wrote:
>
>> On Mon, Sep 24, 2018 at 01:02:50PM -0300, Franz wrote:
>> > On Qubes 3.2 had to add an External monitor because my Lenovo x230
>> laptop
>> > display started flickering and slowing down. But the resolution on the
>> > external monitor is wrong. What appears on screen is correctly high, but
>> > too large to fit into the screen.
>> >
>> > Running xrandr gives the output on the enclosed photo. From that I
>> imagine
>> > that the resolution of the external monitor should be changed to
>> 1366x768.
>> >
>> > But how do I do that? I spent a couple hours reading many old threads,
>> but
>> > they imply a knowledge I do not have, só cannot figure out. Also am
>> afraid
>> > of doing something wrong and loosing access to my computer.
>> >
>> > Any idea?
>>
>> I don't know what was in the photo.
>> But you should be able to access these settings under the Qubes menu,
>> System Settings, Display entry.
>>
>>
> Thanks Unman,
> I found it and it is pretty easy, but maximum resolution option for the
> external monitor is 1024x768. Does this mean that for some reason it is
> impossible to set 1366x768?
>

Here are some old comments from Marek that suggest that something can be
done, but they are somehow abstracted for me to be able to follow:

"I'm not sure if the driver loaded at disk password prompt time is able
to set higher resolution. But you can try with "video=" kernel
parameter.

For one-time test, you can edit kernel command line in grub (press "e"
on the entry, go to "module /vmlinuz..." line and add the option at the
end, then boot with ctrl-x). You can start with something like
video=1920x1080 (or whatever resolution you want). Details about option
syntax in kernel documentation[1].

When you find the right value, you need to edit /etc/default/grub
(GRUB_CMDLINE_LINUX line) in dom0 to make the change permanent. After
editing this file, you need to regenerate actual grub configuration:
grub2-mkconfig -o /boot/grub2/grub.cfg

[1] https://www.kernel.org/doc/Documentation/fb/modedb.txt;
<https://www.kernel.org/doc/Documentation/fb/modedb.txt>


> --
>> You received this message because you are subscribed to the Google Groups
>> "qubes-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to qubes-users+unsubscr...@googlegroups.com.
>> To post to this group, send email to qubes-users@googlegroups.com.
>> To view this discussion on the web visit https://groups.google.com/d/ms
>> gid/qubes-users/20180924161109.d27vv63u7y55arvl%40thirdeyesecurity.org.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qABBzsDpmTO40sgdbOtujtmh5aajRw%3DiPVDcvd%3DozQ2JQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] External monitor resolution

2018-09-24 Thread Franz
On Mon, Sep 24, 2018 at 1:11 PM, unman  wrote:

> On Mon, Sep 24, 2018 at 01:02:50PM -0300, Franz wrote:
> > On Qubes 3.2 had to add an External monitor because my Lenovo x230 laptop
> > display started flickering and slowing down. But the resolution on the
> > external monitor is wrong. What appears on screen is correctly high, but
> > too large to fit into the screen.
> >
> > Running xrandr gives the output on the enclosed photo. From that I
> imagine
> > that the resolution of the external monitor should be changed to
> 1366x768.
> >
> > But how do I do that? I spent a couple hours reading many old threads,
> but
> > they imply a knowledge I do not have, só cannot figure out. Also am
> afraid
> > of doing something wrong and loosing access to my computer.
> >
> > Any idea?
>
> I don't know what was in the photo.
> But you should be able to access these settings under the Qubes menu,
> System Settings, Display entry.
>
>
Thanks Unman,
I found it and it is pretty easy, but maximum resolution option for the
external monitor is 1024x768. Does this mean that for some reason it is
impossible to set 1366x768?

> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/20180924161109.d27vv63u7y55arvl%40thirdeyesecurity.org.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qALsB%3DSnfCiEMdQ1TRgAT%3Dorh4eJCD%2BXSyezJyoTYpC9Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] BT adapter with Qubes OS 4.0

2018-09-21 Thread Franz
On Fri, Sep 21, 2018 at 8:23 AM, 'awokd' via qubes-users <
qubes-users@googlegroups.com> wrote:

> GDRUB:
> > My system has only one USB controller. I haven't set up a USB qube.
> >
> > I achieved this objective on my desktop.
> >
> > %<-
> > $ qvm-usb
> > BACKEND:DEVID  DESCRIPTIONUSED BY
> > sys-usb:1-1Broadcom_Corp_BCM20702A0_5CF37060F233  personal
> > sys-usb:1-7Logitech_USB_Receiver
> > sys-usb:1-8Logitech_USB_Receiver
> > sys-usb:2-4Seagate_M3_NM128GCP
> > %<-
>
> > Today, I still have problems with BT and pulseaudio. PulseAudio Volume
> > Control (pavucontrol) shows Bluetooth headset. I connect my bluetooth
> > A2DP headset but the video playback on YouTube stops with message : "if
> > playback doesn't begin shortly try restarting your device". With
> > Spotify, the songs are playing but I can't hear it. :-(
>
> Good you got the sys-usb mostly working! I've seen other posts in this
> mailing list about problems with BT and audio, but don't know if anyone
> was able to get it to work. Maybe try a wired headset instead?
>
>
There are also easy adapters that take sound from the 3.5 mm jack and
deliver it by BT 4.0/4.1, bypassing all huge BT security problems, with the
additional advantage of being able to work with all VMs.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qD%2ByBG8ZkO6WhNUdUESj7MLsDgYV4M9SU0Bg2kYbKvb%3DQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes R4.0 feedback (network problems, display problems)

2018-09-09 Thread Franz
On Sun, Sep 9, 2018 at 7:32 AM, Alex  wrote:

> Hello everybody,
> I finally managed to upgrade my i5 4690 to an i7 4770 (found on ebay),
> and since it supports VT-d I have now been able to upgrade to R4!!!
>
> Just to remember: I have a desktop setup, with an ASUS Z97a motherboard,
> 32GB Ram, 3 hard disks (2 of which are software-raid via Intel stuff)
> and a Matrox C680 connected to six DELL displayport monitors.
>
> I use i3wm with a custom status bar to show cpu/gpu temperature (with
> some bash text-manipulation magic on the output of the "sensors" command).
>
> My main problems with R3.2 were:
>  * displays randomly would not come up after resuming from sleep
>  * network sometimes does not restart after resuming from sleep
>  * outdated software in dom0 (say, dmenu...)
>
> After the upgrade, where I took the opportunity to refresh my custom
> fedora 28 base template by cloning the one in the repository and
> installing software in that, I restored my qubes by copying files from
> the old private.img files. My typical customizations:
>  * urxvt with nice fonts in .Xdefaults
>  * monodevelop (which I later removed, since it uses 100% of one CPU
> core, and switched to VS Code after a brief attempt with Atom)
>  * dotnet core (yes, I do mostly kubernetes software in C# on linux)
>  * keepassxc instead of keepassx2
>
> I'm very happy with R4; like I said in older messages, I use Qubes
> mainly for the clean architectural separation of concerns of my computer
> life, and not much for the increased security,


This is very important for characterizing Qubes and should be reported
somehow on the main page https://www.qubes-os.org/.

Otherwise the transmitted message is: "Qubes is reasonably secure, but you
have to withstand a complex architecture"

A better message is: "Qubes is reasonably secure and allows a clean
architectural separation of concerns to put order in your digital life"

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCO_O8diBiMUVKW6O6UAU5bqaouU2KtgJb%2Bj_rGzLA0sg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Best Laptop for Qubes 4+ and Heads

2018-08-24 Thread Franz
On Thu, Aug 23, 2018 at 5:08 PM, taii...@gmx.com  wrote:

> On 08/20/2018 01:21 PM, stallmanro...@gmail.com wrote:
> >
> > ME disabled (works!)
>
> It is a nice laptop and I recommend it sometimes BUT:
>
> As someone with your screen-name I would hope you know that it is
> impossible to disable ME.
>
> In your case the BUP module still runs along with any mask roms - more
> than enough to add a backdoor to your machine.
>
> Of course in terms of laptops it is still better than newer intel stuff
> like the skylake puri-craptops where the bup AND the kernel run on their
> "disabled" ME - they changed the definition of disabled just like they
> did with the definition of "open firmware" :[
>
> The best and most free laptop is the lenovo G505S of which there is a
> thriving little coreboot-qubes4 community thanks to me telling many
> people to get it :D
>
> G505S:
> * pre-PSP AMD quad core cpu (the A10 model - the others suck)
> * coreboot with open cpu/ram init (unlike the blobbed puri-craptop hw
> init via the intel fsp binary blob)
> * IOMMU that works with qubes 4.0 (Must apply latest microcode updates
> or qubes wont work)
> Blob status: video+EC but people are apparently working on freeing them
> and the IOMMU protects you from any DMA issues.
>
>
Thanks! Is there somewhere a tutorial to do all that?


> In terms of other laptops the X230t (with better *20 series non chiclet
> keyboard) I recommend if someone wants a tablet and the W520 if someone
> wants a mobile workstation with 32GB RAM - both are of course a much
> better choice than a puri-craptop as they have open source hardware init
> via coreboot and the ME can be nerfed.
>
>
> >
> > 2. Tomu support (30$ ) (works fine!)
> > https://www.crowdsupply.com/sutajio-kosagi/tomu
> >
> > porting gnuk to tomu (opensource analog yubikey, needed to use heads)
> >
> > https://github.com/osresearch/heads-wiki/blob/master/GPG.md
> >
> > Dev: https://github.com/aze00/gnuk/tree/efm32
> > PR: https://github.com/im-tomu/tomu-samples/pull/35
> > Issue: https://github.com/im-tomu/tomu-samples/issues/4
> >
> > Alternative - Nitrokey
> > https://shop.nitrokey.com/shop/product/nitrokey-start-6 (based on gnuk)
> >
> > 3. https://inversepath.com/usbarmory nice compatibility (works without
> any issues)
> >
> > 4. for good work you need a bundle i7 2gen, 16 RAM and good SSD disk ( I
> completely lack 256 gigabytes )
> >
> > main templates :
> > archlinux
> > artful
> > bionic
> > centos-7
> > debian-9
> > dev (buster)
> > fedora-28
> > kali-rolling
> > void-template
> > whonix-ws-14
> > whonix-gw-14
> >
> > works fine and easy build from https://github.com/QubesOS/qubes-builder
> >
> > + 8-10 services (vpn,tor,wireguard etc)
> > + 3-4 disp vm's (internet browsing)
> > + 8+10 domains
> >
> > Total disk usage : 20.4%
> > lvm : 36.2%  77.4GB/213.8GB
> >
> > So, 256GB is enough.
> >
> > 5. You can use it like tablet ;)
> >
> > https://github.com/martin-ueding/thinkpad-scripts
> >
> > rotate/touchscreen works great and works on every VM machine.
>
> Nice! glad that still works
>
> Did you install coreboot?
>
> >
> > 6. TPM ownership/reset (work!)
> >
> > 7. 10 open vms
> >
> > temp 52
> > fan 3496 rpm
> >
> > 8. +3G modem or raspberry pi features
>
> The RPI is not an open source firmware device FYI and I recommend
> instead purchasing a beagleboard or novena.
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/b13a5dc1-e446-888c-4d96-1e62abdf7e0b%40gmx.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDk8qxaSSQQT3DW1F-MVaxk-60i9pHCNCMRtiL8fLpMpw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix 14 has been Released

2018-08-20 Thread Franz
On Mon, Aug 20, 2018 at 10:21 AM, awokd  wrote:

> On Mon, August 20, 2018 11:27 am, Franz wrote:
>
>
> > Thanks
> > a /var/log/tor/log file does not exists. There are no files in
> > /var/log/tor/ folder.
> >
> >
> > It did not happened before, but now I'm getting the enclosed alert
> > window, which tells about permission errors.
> >
> > Perhaps it is better to try to delete the Whonix 14 installation and try
> > another time.
>
> Did you rename/delete your old sys-whonix before following the Whonix 14
> installation steps to create a new one? If you tried to re-use it with the
> new template, I'm not sure that would work.
>
>
Thanks
No, from the various instructions I understood had to  rename only the
templates. So did not rename sys-whonix.
I'll try to rename it and do a new update.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCezxnDM1n9odn-%2BHdkZJBVhu8Uq_bY3y0ROK7EGXoiiw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix 14 has been Released

2018-08-18 Thread Franz
On Tue, Aug 7, 2018 at 7:17 AM, Patrick Schleizer <
patrick-mailingli...@whonix.org> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> After more than two years of development, the Whonix Project is proud
> to announce the release of Whonix 14.
>
> Whonix 14 is based on the Debian stretch (Debian 9) distribution which
> was released in June 2017. This means users have access to many new
> software packages in concert with existing packages such as a modern
> branch of GNuPG, and more. [1][2][3]
>
> **Major Changes and New Features**
>
> Whonix 14 contains extensive security and usability improvements, new
> features and bug fixes. For a detailed description of these and other
> changes, please refer to the official release notes. [4]
>
> * Rebased Whonix on **Debian stretch** (Debian 9).
> * Whonix 14 is **64-bit** (amd64) only - 32-bit (i386) images will no
> longer be built and made available for download. [5]
> * The new **Anon Connection Wizard** [6] feature in Whonix simplifies
> connections to the Tor network via a Tor bridge and/or a proxy.
> * The Tor pluggable transport **meek_lite** [7] is now supported,
> making it much easier to connect to the Tor network in heavily
> censored areas, like China. [8]
> * **Onioncircuits** are installed by default in Whonix. [9]
> * Tails' **onion-grater** program has been implemented to enable
> **OnionShare, Ricochet and Zeronet** compatibility with Whonix. [10]
> * **Onion sources** are now preferred for Whonix updates/upgrades for
> greater security.
> * Reduced the size of the default, binary Whonix images by
> approximately **35 per cent** using zerofree. [11] [12]
> * **Updated Tor** to version 3.3.7 (stable) release to enable full v3
> onion functionality for both hosting of onion services and access to
> v3 onion addresses in Tor Browser.
> * Created the **grub-live package** [13] which can run Whonix as a
> **live system** on non-Qubes-Whonix platforms. [14]
> * Corrected and hardened various **AppArmor profiles** to ensure the
> correct functioning of Tor Browser, obfsproxy and other applications.
>
>
> **Known Issues**
>
> * Desktop shortcuts are no longer available in non-Qubes-Whonix.
> * OnionShare is not installed by default in Whonix 14 as it is not in
> the stretch repository. [15] It can still be manually installed by
> following the Whonix wiki instructions [16] or building it from source
> code. [17]
> * Enabling seccomp (Sandbox 1) in /usr/local/etc/torrc.d/50_user.conf
> causes the Tor process to crash if a Tor version lower than 0.3.3 is
> used. [18] [19]
>
>
> While there may be other issues that exist in this declared stable
> release, every effort has been made to address major known problems.
>
> Please report any other issues to us in the forums, after first
> searching for whether it is already known.
>
>   https://www.whonix.org/wiki/Known_Issues
>
> **Download Whonix 14**
>
> Whonix is cross-platform and can be installed on the Windows, macOS,
> Linux or Qubes operating systems. Choose your operating system from
> the link below and follow the instructions to install it.
>
>   https://www.whonix.org/download/
>
> **Upgrade to Whonix 14**
>
> Current Whonix users (or those with 32-bit hardware) who would prefer
> to upgrade their existing Whonix 13 platform should follow the upgrade
> instructions below.
>
>   https://whonix.org/wiki/Upgrading_Whonix_13_to_Whonix_14
>
> **What’s Next?**
>
> Work on Whonix 15 is ongoing and interested users can refer to the
> roadmap to see where Whonix is heading. [20]
>
> Developer priorities are currently focused on easing the transition to
> the next Debian release due in 2019 (“buster”; Debian 10) and
> squashing existing bugs, rather than implementing new features.
>
> We need your help and there are various ways to contribute to Whonix -
> donating or investing your time will help the project immensely. Come
> and talk with us! [21]
>
> **References**
>
> [1] https://www.debian.org/News/2017/20170617
> [2] https://www.debian.org/releases/stable/amd64/release-notes/
> [3] https://www.debian.org/releases/stable/i386/release-notes/
> [4] https://whonix.org/wiki/Whonix_Release_Notes#Whonix_14
> [5] Whonix 13 users with 32-bit systems can however upgrade their
> platform by following the available wiki instructions, rather than
> download new Whonix-WS and Whonix-GW images.
> [6] https://whonix.org/wiki/Anon_Connection_Wizard
> [7] https://www.whonix.org/blog/meek_lite-whonix-14
> [8]
> https://github.com/Yawning/obfs4/commit/611205be681322883a4d73dd00fcb13c
> 4352fe53
> 
> [9] https://packages.debian.org/stretch/onioncircuits
> [10] https://phabricator.whonix.org/T657
> [11] https://phabricator.whonix.org/T790
> [12] VirtualBox .ova and libvirt qcow2 raw images. The Whonix-Gateway
> is reduced from 1.7 GB to 1.1 GB, while the Whonix-Workstation is
> reduced from 2 GB to 1.3 GB.
> [13] 

Re: [qubes-users] Best Laptop for Qubes 4+ and Heads

2018-08-17 Thread Franz
On Sat, Aug 11, 2018 at 1:36 AM, Chris Laprise  wrote:

> On 08/10/2018 08:25 PM, Franz wrote:
>
>>
>>
>> On Fri, Aug 10, 2018 at 5:23 PM, Jonathan Brown <
>> jonbrownmaste...@gmail.com <mailto:jonbrownmaste...@gmail.com>> wrote:
>>
>> How bad does the RAM issue affect your VM number you want to run vs
>> what you can run? Can it handle all the required VMs needed by
>> default along with both Whonix templates and split GPG?
>>
>> yes, a part from the system VMs, I usually run 6 VMs. When the machine is
>> fresh started I can easily reach 9 VMs.  But after a couple of days working
>> it doesn't let me start new VMs.
>>
>> How does it actually run performance wise?
>>
>>
>> Smooth and fast.
>>
>> But I never tried gaming or specially intensive tasks.
>>
>
> The ivy bridge CPUs are pretty fast.. the last generation before Intel cut
> max wattage in half with haswell.
>
> BTW there are little tricks to improving RAM usage, as my regular system
> has 8GB. Net and proxy VMs can usually be set to max 350MB RAM, and I find
> dom0+KDE works smoothly with max RAM at 1500MB. Most personal and work VMs
> do fine with max RAM at 1500 - 2000MB.
>
>
I tried reducing RAm allocated to various VMs and dom0  and it much
improved: I am able to get 27 concurring open VMs

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAUffB4J5O%3DKJFxgA91VQ35kJbGbRJk1CA7ESka02wXcA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix 14 - upgrade or re-install? Whats more smooth, less troublesome?

2018-08-15 Thread Franz
On Tue, Aug 14, 2018 at 1:55 PM, Patrick Schleizer <
patrick-mailingli...@whonix.org> wrote:

> Franz:
> > when I try to uninstall whonix-ws
> >
> > sudo dnf remove qubes-template-whonix-ws*
> >
> > I get
> > No match for argument: qubes-template-whonix-ws*
> > Error: No packages marked for removal
> >
> > I followed this guide: https://www.whonix.org/wiki/Qubes/Uninstall
> >
>
>
> Output of...?
>
> dnf list | grep qubes-template-whonix
>


No output and no error. I forgot to mention I am using 3.2

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDO9ZS8xT4gk1qiOaYPDXT8TLJz9DsZjZ4V90NAwSDaeQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix 14 - upgrade or re-install? Whats more smooth, less troublesome?

2018-08-14 Thread Franz
On Tue, Aug 14, 2018 at 8:15 AM,  wrote:

> Thanks Chris. If you dont mind, could you please elaborate more on your
> procedure which worked for you? These two guides are a bit confusing to
> follow.
>
> What I understand from your text is following:
>
> 1) you followed the guide on whonix page (not the one on qubes page)
> Q: http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.
> onion/wiki/Qubes/Install#  s25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Qubes/Install#>
> 2) you cloned the whonix-ws(13) and assigned all VMs to the
> whonix-ws-clone. Than uninstall the original  whonix-ws(13).
> 3) you didnt touch the whonix-gw(13).
> Q: Did the sys-whonix (whch is based on whonix-gw(13)) work without an
> issue than? Did you install the new whonix-gw(14) as well with the install
> procedure?
> 4) did you use any other commands or procedures in the process?
>
> Did I get it right?
>
> Thank you in advance!
>
>
> Aug 13, 2018, 2:32 PM by tas...@posteo.net:
>
> > On 08/13/2018 07:32 AM, > qubes-...@tutanota.com  qubes-...@tutanota.com>>  wrote:
> >
> >> Chris, which guide did you follow when installing the new whonix 14
> Template as a "recommended whonix install procedure"? I found these two.
> >>
> >> http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.
> onion/wiki/Qubes/Install#  s25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Qubes/Install#>>>  <>> http://
> dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.
> onion/wiki/Qubes/Install#  s25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Qubes/Install#>>> >
> >>
> >> https://www.qubes-os.org/doc/reinstall-template <
> https://www.qubes-os.org/doc/reinstall-template/>>>  <>>
> https://www.qubes-os.org/doc/reinstall-template <
> https://www.qubes-os.org/doc/reinstall-template/>>> >
> >>
> >> Thanks
> >>
> >
> > It was a bit confusing, but from the wiki Install page I picked out
> these relevant steps for dom0 (Qubes 4.0):
> >
> > $ sudo qubes-dom0-update qubes-core-admin-addon-whonix
> > $ sudo qubesctl state.sls qvm.anon-whonix
> >
> > The second command will start the download and install, although it does
> not give much feedback.
> >
> > Also, there is no need to clone old whonix-gw in the steps I mentioned
> earlier; only whonix-ws is needed. Once you have your appVMs switched over
> to whonix-ws-14 you can delete the clone.
> >
>

when I try to uninstall whonix-ws

sudo dnf remove qubes-template-whonix-ws*

I get
No match for argument: qubes-template-whonix-ws*
Error: No packages marked for removal

I followed this guide: https://www.whonix.org/wiki/Qubes/Uninstall

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCsmZq_PPGS4wKNyzs_a5V1Tx%3DqiD5ZqKWtoTQX-wjXPQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix 14 - upgrade or re-install? Whats more smooth, less troublesome?

2018-08-12 Thread Franz
On Sun, Aug 12, 2018 at 9:48 PM, Chris Laprise  wrote:

> On 08/12/2018 05:23 PM, Andrew David Wong wrote:
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> On 2018-08-12 14:26, 'awokd' via qubes-users wrote:
>>
>>> On Sun, August 12, 2018 6:16 pm, qubes-...@tutanota.com wrote:
>>>
 I am planning to move from my Whonix 13 to Whonix 14 on Qubes. My
 question is what way it should be easier, based on the Q user
 experiences. What would you propose - upgrade or re-install? Are
 there any known issues which would call for one or other way?

>>>
>>> Re-install is usually easier.
>>>
>>> I have few VMs based on the Whonix template with data and
 settings on it. Will the contents of these VMs remain, or will
 it be destroyed - re-install vs upgrade?

>>>
>>> Contents should remain, just set them to the new Whonix template.
>>> Make sure to back up everything first.
>>>
>>>
>> The installation guide [1] states:
>>
>> "Re-installation will destroy any existing user data stored in Whonix
>> VMs, unless it is backed up first. To avoid this scenario, it is
>> possible to upgrade Whonix 13 to 14 instead of following these
>> instructions."
>>
>> This was puzzling to me, too, since TemplateVM upgrades usually don't
>> affect user data in TemplateBasedVMs. Could you shed some light on
>> this, Patrick?
>>
>
> What I did: Cloned the old whonix-ws template, switched appvms to the
> clone, then did 'dnf remove' on the old templates and finally performed the
> recommended whonix install procedure.
>
> Later, I was able to switch existing whonix appVMs to whonix-ws-14.
>
>
Brilliant, thanks Chris

> --
>
> Chris Laprise, tas...@posteo.net
> https://github.com/tasket
> https://twitter.com/ttaskett
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/ms
> gid/qubes-users/4433888d-cbfe-8ea2-2143-1ba4a0dcae0e%40posteo.net.
>
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAUsLTZSs17VUgkfrzLh1dLMPCLb4Vxk6rY2vELNixQ%2Bw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Best Laptop for Qubes 4+ and Heads

2018-08-10 Thread Franz
On Fri, Aug 10, 2018 at 5:23 PM, Jonathan Brown 
wrote:

> How bad does the RAM issue affect your VM number you want to run vs what
> you can run? Can it handle all the required VMs needed by default along
> with both Whonix templates and split GPG?
>

yes, a part from the system VMs, I usually run 6 VMs. When the machine is
fresh started I can easily reach 9 VMs.  But after a couple of days working
it doesn't let me start new VMs.


> How does it actually run performance wise?
>
>
Smooth and fast.

But I never tried gaming or specially intensive tasks.

Please do not top post and do not drop the qubes-users group

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCd5t%3DF%2Bj35Z82VtPa8CvZWQ9-vo7z1mh0f4af3Vf19fA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Best Laptop for Qubes 4+ and Heads

2018-08-10 Thread Franz
On Fri, Aug 10, 2018 at 11:00 AM,  wrote:

> Heyo,
>
> I am looking for the best laptop for Qubes 4.0+ to take advantage of all
> the features along with Heads. I know Heads only officially supports Lenovo
> Thinkpad 230 but is that the best choice to future proof myself and take
> advantage of all security benefits?
>
> How is the 230 on the binary blob front and other firmware? Is there any
> other technology besides Heads that could enhance Qubes or provide
> better/additional protection?
>
> Here is more info on Heads http://osresearch.net/
>
> Any help is greatly appreciated.
>
>
I own a couple of x230. Yes they support coreboot and Qubes runs pretty
well. Also intel ME can be blocked. The problems may be that max RAM is
16MB and CPU has only two cores. The first one is harder to accept for me
because I want to keep open more VMs than my RAM allows. But if you can
accept these limitations then x230 is pretty good. There are also new
motherboards on sale here:
https://www.ebay.com/itm/LENOVO-THINKPAD-X230-TABLET-SYSTEM-BOARD-04X3744-I7-3520-WITH-CPU-FAN/322898398982?ssPageName=STRK%3AMEBIDX%3AIT&_trksid=p2057872.m2749.l2649

> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/98cebf55-53a2-4e24-9e35-575e9d023106%40googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qA4pqqkkCMSuEsxv4epN87FZWnXfcA1qDnKvm7fLYwRBQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Whonix 14 has been Released

2018-08-07 Thread Franz
On Tue, Aug 7, 2018 at 7:17 AM, Patrick Schleizer <
patrick-mailingli...@whonix.org> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> After more than two years of development, the Whonix Project is proud
> to announce the release of Whonix 14.
>
> Whonix 14 is based on the Debian stretch (Debian 9) distribution which
> was released in June 2017. This means users have access to many new
> software packages in concert with existing packages such as a modern
> branch of GNuPG, and more. [1][2][3]
>
> **Major Changes and New Features**
>
> Whonix 14 contains extensive security and usability improvements, new
> features and bug fixes. For a detailed description of these and other
> changes, please refer to the official release notes. [4]
>
> * Rebased Whonix on **Debian stretch** (Debian 9).
> * Whonix 14 is **64-bit** (amd64) only - 32-bit (i386) images will no
> longer be built and made available for download. [5]
> * The new **Anon Connection Wizard** [6] feature in Whonix simplifies
> connections to the Tor network via a Tor bridge and/or a proxy.
> * The Tor pluggable transport **meek_lite** [7] is now supported,
> making it much easier to connect to the Tor network in heavily
> censored areas, like China. [8]
> * **Onioncircuits** are installed by default in Whonix. [9]
> * Tails' **onion-grater** program has been implemented to enable
> **OnionShare, Ricochet and Zeronet** compatibility with Whonix. [10]
> * **Onion sources** are now preferred for Whonix updates/upgrades for
> greater security.
> * Reduced the size of the default, binary Whonix images by
> approximately **35 per cent** using zerofree. [11] [12]
> * **Updated Tor** to version 3.3.7 (stable) release to enable full v3
> onion functionality for both hosting of onion services and access to
> v3 onion addresses in Tor Browser.
> * Created the **grub-live package** [13] which can run Whonix as a
> **live system** on non-Qubes-Whonix platforms. [14]
> * Corrected and hardened various **AppArmor profiles** to ensure the
> correct functioning of Tor Browser, obfsproxy and other applications.
>
>
> **Known Issues**
>
> * Desktop shortcuts are no longer available in non-Qubes-Whonix.
> * OnionShare is not installed by default in Whonix 14 as it is not in
> the stretch repository. [15] It can still be manually installed by
> following the Whonix wiki instructions [16] or building it from source
> code. [17]
> * Enabling seccomp (Sandbox 1) in /usr/local/etc/torrc.d/50_user.conf
> causes the Tor process to crash if a Tor version lower than 0.3.3 is
> used. [18] [19]
>
>
> While there may be other issues that exist in this declared stable
> release, every effort has been made to address major known problems.
>
> Please report any other issues to us in the forums, after first
> searching for whether it is already known.
>
>   https://www.whonix.org/wiki/Known_Issues
>
> **Download Whonix 14**
>
> Whonix is cross-platform and can be installed on the Windows, macOS,
> Linux or Qubes operating systems. Choose your operating system from
> the link below and follow the instructions to install it.
>
>   https://www.whonix.org/download/
>
>

Many thanks, so, following this link, the command

sudo qubesctl state.sls qvm.anon-whonix

 should download Whonix 14, correct?

But the same link tells that this would download templates whonix-gw and
whonix-ws. But these are the same names of the old templates. So am I
expected to rename the old templates before calling the above command?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAnPW1OJB5eZ9_FoQNhxugToJ9t%3DigBtFzZyBG0pronGw%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Connect sys-usb to network

2018-05-03 Thread Franz
On Wed, May 2, 2018 at 2:25 AM, Ivan Mitev <i...@maa.bz> wrote:

> Hi,
>
> On 05/02/2018 01:10 AM, Franz wrote:
> > Hello,
> >
> > is it possible to connect sys-usb to network? It seems impossible using
> > Qubes manager on 3.2.
>
> IIRC a VM must be stopped before being able to tweak its NetVM ; did you
> do so before trying to add a NetVM to your sys-usb VM in Qubes manager ?
> Did you also try with command line (`qvm-prefs sys-usb -s netvm
> sys-firewall`) ?
>
>
Your command line works, but does not survives reboot. Also even restarting
it every time, firework cannot be configured because the system still
believe that sys-usb is NOT connected to network, even if it is. So it
seems it is too much complicated.


> > Reason to do that is that sys-usb already has USB controller assigned and
> > this is useful to use USB audio cards and play youtube music with decent
> > quality.
>
> I have more or less the same setup, only that I play music from a local
> NAS.
>
>
> > Is this a security problem? I imagine it is not since sys-usb is already
> > untrusted. It may even be possible to add a firewall rule to connect only
> > to youtube.
>
> Having networking in sys-usb will of course increase your attack surface
> (like "plug bad USB, VM is compromised, $HOME is uploaded to some remote
> site") but indeed, proper firewalling would restrict which sites you're
> able to connect to.
>
> The problem with youtube is that the ip addresses may be changing
> frequently, so simply defining "youtube.com" in your firewall rules may
> not work after some time (see issue #3641 [1]). Alternatively, find
> youtube's (or google) BGP AS number and add all the networks to your fw
> rules [2] ; but there will be quite a lot of them...
>
>
> [1] https://github.com/QubesOS/qubes-issues/issues/3641
> [2]
> https://stackoverflow.com/questions/9342782/is-there-a-
> way-to-get-all-ip-addresses-of-youtube-to-block-it-with-
> windows-firew#19385835
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/01ec0d27-8403-cd26-437c-04b17fe1da6e%40maa.bz.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAvCWhFgF_NcRWEh9vESrirDvk0TmY2B_%2BdrPTd4-7Usg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Q 4.0 updates took my sys-net off line

2018-05-02 Thread Franz
On Wed, May 2, 2018 at 4:03 PM, Coleman, Steve L. <steve.cole...@jhuapl.edu>
wrote:

>
> --
> *From:* Franz <169...@gmail.com>
> *Sent:* Wednesday, May 2, 2018 2:58 PM
> *To:* Coleman, Steve L.
> *Cc:* qubes-users@googlegroups.com
> *Subject:* Re: [qubes-users] Q 4.0 updates took my sys-net off line
>
> Have you tried using a different template to generate sys-net?
>
> Yes, I have tried my fedora-26-net, fedora-26-minimal, and generic
> fedora-26 templates with both the old sys-net and the one I re-created.
> None of that helped.
>
>
>
It is always Fedora, perhaps Debian...



> On Wed, May 2, 2018 at 3:46 PM, Coleman, Steve L. <
> steve.cole...@jhuapl.edu> wrote:
>
>> Yesterday I pulled some Dom0 updates and rebooted to complete the
>> install, and since then had no luck at getting it back online. My sys-net
>> is not properly configuring the network card so that eth0 never gets
>> configured properly and assigned an address.
>>
>>
>> I have tried switching between HVM/PV modes with no luck. I created a new
>> sys-net and assigned the controller over with no joy either. Any advice on
>> what to look at next would be very much appreciated.
>>
>>
>> [user@sys-net ~]$ ifconfig -a
>> enp0s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>> ether 18:03:73:be:70:17  txqueuelen 1000  (Ethernet)
>> RX packets 2033  bytes 193536 (189.0 KiB)
>> RX errors 132  dropped 0  overruns 0  frame 132
>> TX packets 7797  bytes 1484630 (1.4 MiB)
>> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>> device interrupt 26  memory 0xe160-e162
>>
>> lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
>> inet 127.0.0.1  netmask 255.0.0.0
>> inet6 ::1  prefixlen 128  scopeid 0x10
>> loop  txqueuelen 1000  (Local Loopback)
>> RX packets 645  bytes 31721 (30.9 KiB)
>> RX errors 0  dropped 0  overruns 0  frame 0
>> TX packets 645  bytes 31721 (30.9 KiB)
>> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>
>> vif6.0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
>> inet 10.137.0.5  netmask 255.255.255.255  broadcast 0.0.0.0
>> inet6 fe80::fcff::feff:  prefixlen 64  scopeid 0x20
>> ether fe:ff:ff:ff:ff:ff  txqueuelen 32  (Ethernet)
>> RX packets 16375  bytes 1014366 (990.5 KiB)
>> RX errors 0  dropped 0  overruns 0  frame 0
>> TX packets 14967  bytes 1473500 (1.4 MiB)
>> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>>
>>
>>
>> [user@sys-net ~]$ sudo dmesg | grep -i e1000e
>> [8.488338] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k
>> [8.488350] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
>> [8.488565] e1000e :00:00.0: Xen PCI mapped GSI20 to IRQ26
>> [8.489625] e1000e :00:00.0: Interrupt Throttling Rate (ints/sec)
>> set to dynamic conservative mode
>> [8.589599] e1000e :00:00.0 :00:00.0 (uninitialized):
>> registered PHC clock
>> [8.684606] e1000e :00:00.0 eth0: (PCI Express:2.5GT/s:Width x1)
>> 18:03:73:be:70:17
>> [8.684638] e1000e :00:00.0 eth0: Intel(R) PRO/1000 Network
>> Connection
>> [8.684690] e1000e :00:00.0 eth0: MAC: 10, PHY: 11, PBA No:
>> E041FF-0FF
>> [8.747515] e1000e :00:00.0 enp0s0: renamed from eth0
>> [   18.923186] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
>> Control: None
>> [44053.103546] e1000e: enp0s0 NIC Link is Down
>> [44062.829234] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
>> Control: None
>> [44103.730522] e1000e: enp0s0 NIC Link is Down
>> [44106.646419] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
>> Control: None
>> [44119.384485] e1000e: enp0s0 NIC Link is Down
>> [44122.317273] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
>> Control: None
>>
>> [@dom0 ~] lspci | grep Ethernet
>> 00:19.0 Ethernet controller: Intel Corporation 82579LM Gigabit Network
>> Connection (Lewisville) (rev 04)
>>
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "qubes-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to qubes-users+unsubscr...@googlegroups.com.
>> To post to this group, send email to qubes-users@googlegroups.com.
>> To view this discussion on the web visit https://group

Re: [qubes-users] Q 4.0 updates took my sys-net off line

2018-05-02 Thread Franz
Have you tried using a different template to generate sys-net?

On Wed, May 2, 2018 at 3:46 PM, Coleman, Steve L. 
wrote:

> Yesterday I pulled some Dom0 updates and rebooted to complete the install,
> and since then had no luck at getting it back online. My sys-net is not
> properly configuring the network card so that eth0 never gets configured
> properly and assigned an address.
>
>
> I have tried switching between HVM/PV modes with no luck. I created a new
> sys-net and assigned the controller over with no joy either. Any advice on
> what to look at next would be very much appreciated.
>
>
> [user@sys-net ~]$ ifconfig -a
> enp0s0: flags=4163  mtu 1500
> ether 18:03:73:be:70:17  txqueuelen 1000  (Ethernet)
> RX packets 2033  bytes 193536 (189.0 KiB)
> RX errors 132  dropped 0  overruns 0  frame 132
> TX packets 7797  bytes 1484630 (1.4 MiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
> device interrupt 26  memory 0xe160-e162
>
> lo: flags=73  mtu 65536
> inet 127.0.0.1  netmask 255.0.0.0
> inet6 ::1  prefixlen 128  scopeid 0x10
> loop  txqueuelen 1000  (Local Loopback)
> RX packets 645  bytes 31721 (30.9 KiB)
> RX errors 0  dropped 0  overruns 0  frame 0
> TX packets 645  bytes 31721 (30.9 KiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
> vif6.0: flags=4163  mtu 1500
> inet 10.137.0.5  netmask 255.255.255.255  broadcast 0.0.0.0
> inet6 fe80::fcff::feff:  prefixlen 64  scopeid 0x20
> ether fe:ff:ff:ff:ff:ff  txqueuelen 32  (Ethernet)
> RX packets 16375  bytes 1014366 (990.5 KiB)
> RX errors 0  dropped 0  overruns 0  frame 0
> TX packets 14967  bytes 1473500 (1.4 MiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
>
>
> [user@sys-net ~]$ sudo dmesg | grep -i e1000e
> [8.488338] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k
> [8.488350] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
> [8.488565] e1000e :00:00.0: Xen PCI mapped GSI20 to IRQ26
> [8.489625] e1000e :00:00.0: Interrupt Throttling Rate (ints/sec)
> set to dynamic conservative mode
> [8.589599] e1000e :00:00.0 :00:00.0 (uninitialized):
> registered PHC clock
> [8.684606] e1000e :00:00.0 eth0: (PCI Express:2.5GT/s:Width x1)
> 18:03:73:be:70:17
> [8.684638] e1000e :00:00.0 eth0: Intel(R) PRO/1000 Network
> Connection
> [8.684690] e1000e :00:00.0 eth0: MAC: 10, PHY: 11, PBA No:
> E041FF-0FF
> [8.747515] e1000e :00:00.0 enp0s0: renamed from eth0
> [   18.923186] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
> Control: None
> [44053.103546] e1000e: enp0s0 NIC Link is Down
> [44062.829234] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
> Control: None
> [44103.730522] e1000e: enp0s0 NIC Link is Down
> [44106.646419] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
> Control: None
> [44119.384485] e1000e: enp0s0 NIC Link is Down
> [44122.317273] e1000e: enp0s0 NIC Link is Up 1000 Mbps Full Duplex, Flow
> Control: None
>
> [@dom0 ~] lspci | grep Ethernet
> 00:19.0 Ethernet controller: Intel Corporation 82579LM Gigabit Network
> Connection (Lewisville) (rev 04)
>
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To post to this group, send email to qubes-users@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/
> msgid/qubes-users/1525286811400.68924%40jhuapl.edu
> 
> .
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qDzj0nM%3DeT66Dnryg%3DDT%2BtefXGxNziOB-YcuQDeWOXg7Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Connect sys-usb to network

2018-05-01 Thread Franz
On Tue, May 1, 2018 at 9:18 PM, Stuart Perkins <perkins.stu...@gmail.com>
wrote:

> Assign the USB device to your untrusted appvm.
>
> Open a qvm terminal...
>
> qvm-usb -l
>
> to list the usb things...
>
> qvm-usb -a untrusted sys-usb:2-1.6  <===identify the one from the -l which
> is your card
>
> when done, use...
>
> qvm-usb -d sys-usb:2-1.6
>
> to disconnect it from the appVM.
>
> This should give you what you want without changing the sys-usb setup.
>
> Stuart
>
> On Tue, 1 May 2018 19:10:35 -0300
> Franz <169...@gmail.com> wrote:
>
> >Hello,
> >
> >is it possible to connect sys-usb to network? It seems impossible using
> >Qubes manager on 3.2.
> >
> >Reason to do that is that sys-usb already has USB controller assigned and
> >this is useful to use USB audio cards and play youtube music with decent
> >quality.
> >
> >Is this a security problem? I imagine it is not since sys-usb is already
> >untrusted. It may even be possible to add a firewall rule to connect only
> >to youtube.
> >
>
>
Thanks Stuart,  but please do not top post to preserve readability for
others

Also, doing what you suggest will render sys-usb useless for protecting
dom0 form usb safety risk.

Will what you call untrusted-sys-usb be able to do the same protection as
was done by sys-usb? I am not sure about that.

In other words: is sys-usb a simple applVM with assigned USB controller and
deprived of network, or is there some other tweaking, such as for example
for starting in time to perform its function?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qAi8_8XwbhwRLCBsA9OYwQTFjUUiLfnA8oz6ESK2NKpcA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Offtopic :: reasonable secure routers?

2018-04-12 Thread Franz
On Thu, Apr 12, 2018 at 6:32 AM, Jo  wrote:

> My suggestion would be the Turris Omnia. Im using it myself in various
> cases and im very happy with it.
>
>
>
Interesting, the automatic update feature is unique. I never have time for
updating the routers and OpenWRT is not so easy to update. Without updates
the security may be compromised.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qCEMeK8gr5Y6zBxsR18rm3vh51PBmZF_1r6HgecsB9kmg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] boot problem on my production qubes (urgent!)

2018-04-11 Thread Franz
On Wed, Apr 11, 2018 at 9:04 AM, '97a6sd67fs9' via qubes-users <
qubes-users@googlegroups.com> wrote:

> Hi guys
>
> In order not to ruin my 3.2 production installation I bought a new NVME
> SSD. After disk replacement I installed Qubes 4.0 and test my needs. Then I
> put the old SSD back in and now my PC doesn't start anymore. It hangs on
> the boot menu screen (Lenovo T460s) and when I enter into "Qubes" or the
> SSD device, it only refresh the screen.
>
> In the BIOS I changed absolutely nothing.
>
> How can I fix that?
>
> It's my production environment without I can't work anymore! )-:
>
> Thanks for your fast hints!
>
> See you...
>
>
Really strange. May be an oxidized contact on the old SSD that stopped
working after moving it. I would try to clean the contacts.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAPzH-qA9%3DbCqXsv0Q4%2BjfJqgDnwd-xV3BcXmMPZRB%2BNZ2Wh85g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


  1   2   3   4   >