Re: [qubes-users] Salting your Qubes

2021-08-17 Thread Trust me I am a Doctor


unman  writes:

>> Because whonix ensure updates comes from the tor network. I didn't
>> figured yet if it is desirable to search to do something here.
>>
>
> I dont use Whonix.
> Since you can configure cacher to fetch across the Tor network, this
> looks brain dead to me. I think you must mean that Whonix ensures that
> updates run through Whonix.

Yes. That's it.

In another thread you spoke about not indexing for each template (so
eventually reducing our fingerprint by reducing the request we made,
right?) ; and potential drawbacks, do you mind to share what you find
about that?  I know there is this this checkbox in acng-report.html but
don't know what option exactly it correspond in acng.conf nor the
drawbacks and eventual mitigations.


--

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87r1ercydi.fsf%40riseup.net.


[qubes-users] dependencies of qubes-gpg-split in debian minimal templates

2021-08-15 Thread Trust me I am a Doctor

Hi,

Processing to set up again qubes-gpg-split in my vms, qubes v4.0, I
assume I have to install the package qubes-gpg-split to have the command
qubes-gpg-client in the client and server VM.

My client template is up to date and upgraded before asking the package.

However looking at the dependencies involved I just don't understand,
starting with a set of dictionary packages, and then a lot of other
stuff. Some make sense, I didn't check all. But dictionnaries ? Intel
drivers ? What's the matter for setting up this split gpg client ?

Please look at this output of apt :

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87sfza5tys.fsf%40riseup.net.


apt_wtf
Description: wtf apt

Is something bad with my template or is this normal behavior ?

--

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/87sfza5tys.fsf%40riseup.net.


Re: [qubes-users] Salting your Qubes

2021-08-05 Thread Trust me I am a Doctor


unman  writes:

> The repository was unavailable for a while. Was that the issue?

Yes. I panicked.

> Yes, apt-cacher-ng  works for Fedora updates.

Thanks for the details. I finally took the time to look at it.

> You have to make some changes -
> First, on the client side, comment out "metalink" lines, and uncomment
> "baseurl" lines.

The cisco repository of the codec openh264 does not have a baseurl, I
found that I could use
http://HTTPS///codecs.fedoraproject.org/openh264/$releasever/$basearch
in place, I assume this can be safely added to
/etc/apt-cacher-ng/fedora_mirrors

Also fedora ships with
#baseurl=https://download.example/[...]
in /etc/yum.repos.d conf files, I assume I had to replace them with
baseurl=http://HTTPS///downloads.fedoraproject.org/[...]


Then don't forget to
$ dnf clean all

> This is because the metalink will keep loading new https://
> repositories, and apt-cacher-ng cant cache those requests, as you
> know.

I think we could also specify &protocol=http on metalinks as explained in
https://unix.stackexchange.com/questions/240010/how-to-create-an-on-demand-rpm-mirror/426331#426331
I have not tested it thought.

> Second, watch the caches in /var/cache/apt-cacher-ng , and add
> any new ones to the fedora_mirrors file - this is because that file
> doesn't contain all Fedora repositories.

It is maybe too soon to see, I don't know yet if having manipulated the
url to use downloads.fedoraproject.org will effectively lead to mirrors
to manage. What I know is, it was creating a directory named
  downloads.fedoraproject.org
before I add
  https://downloads.fedoraproject.org/pub/fedora/linux/
to
  /etc/apt-cacher-ng/fedora_mirrors

And that downloads.fedoraproject.org is supposed to redirect to mirrors...

In the doubt I run a script to duplicate all http url of fedora_mirror
to https.



I put a systemd timer to watch new directories on /var/cache/apt-cacher-ng/

I also put a timer to run /etc/cron.daily/apt-cacher-ng that manage
expired files and make the html report.

Interestingly enough debian ships with scripts in
/usr/share/doc/apt-cacher-ng/examples/dbgenerators.gz
that may take care to update the mirrors files list at the cost of a
lengthy cycle of queries ... That could be triggered weekly.

Do you known about it?



Your instruction didn't said anything for the AppvM so I figured out
that I could put an instruction in /rw/config/rc.local to switch back
the repositories files to their initial values so I can still test out
packages there before really installing them in a template.



Lastly, whonix-* will fail to update with, in 
dom0:/etc/qubes-rpc/policy/qubes.UpdatesProxy

$type:TemplateVM $default allow,target=cacher

Because whonix ensure updates comes from the tor network. I didn't
figured yet if it is desirable to search to do something here.

--

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/871r7it5uy.fsf%40riseup.net.


Re: [EXT] [qubes-users] Can a virus be transfered from a USB storage device before or after attaching it to a App VM ?

2020-12-23 Thread ME
The window appeared about a little bit lower than the middle of the screen.

onsdag den 23. december 2020 kl. 00.02.55 UTC+1 skrev awokd:

> ME:
> > When I inserted my USB storage device in my Qubes OS pc after login to
> > Qubes OS, their appeared a small transparent window (before I mounted the
> > USB device to a VM) where I only could see its frame.
> > 
> > I then wondered if it could be caused of a virus that was planted on the
> > USB storage device that I only have used to transfer files between two
> > Qubes OS pc's.
> > 
> > And if so, how can I get rid of the virus or rootkit on the Qubes OS pc ?
>
> If it was in the top right corner, it was a message from Qubes telling 
> you a device was connected. Sometimes the text doesn't always show up.
>
> -- 
> - don't top post
> Mailing list etiquette:
> - trim quoted reply to only relevant portions
> - when possible, copy and paste text instead of screenshots
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13d4d889-3260-4cde-9b95-28900ebece8en%40googlegroups.com.


Re: [EXT] [qubes-users] Can a virus be transfered from a USB storage device before or after attaching it to a App VM ?

2020-12-22 Thread ME
When I inserted my USB storage device in my Qubes OS pc after login to 
Qubes OS, their appeared a small transparent window (before I mounted the 
USB device to a VM) where I only could see its frame.

I then wondered if it could be caused of a virus that was planted on the 
USB storage device that I only have used to transfer files between two 
Qubes OS pc's.

And if so, how can I get rid of the virus or rootkit on the Qubes OS pc ?


mandag den 21. december 2020 kl. 01.05.02 UTC+1 skrev Ulrich Windl:

> On 12/20/20 10:27 AM, ME wrote:
> > Lets say I have a USB storage device which has a virus on it that will 
> > infect a Linux pc when it is inserted.
> > 
> > If I insert the USB storage device in my Qubes OS pc after login to 
> > Qubes OS, is it then possible for the virus to infect my pc immediately 
> > after I have plugged it in before or after attaching the device to a VM ?
>
> I think it depends on how the virus works. For example if it could cause 
> code execution by overflowing the SCSI vendor/model buffer (I'm not 
> saying that this is possible, BTW), it could cause execution even before 
> anything is mounted...
>
> > 
> > -- 
> > You received this message because you are subscribed to the Google 
> > Groups "qubes-users" group.
> > To unsubscribe from this group and stop receiving emails from it, send 
> > an email to qubes-users...@googlegroups.com 
> > <mailto:qubes-users...@googlegroups.com>.
> > To view this discussion on the web visit 
> > 
> https://groups.google.com/d/msgid/qubes-users/a3fb1091-e270-49ee-bd8b-b0a239aec5a3n%40googlegroups.com
>  
> > <
> https://groups.google.com/d/msgid/qubes-users/a3fb1091-e270-49ee-bd8b-b0a239aec5a3n%40googlegroups.com?utm_medium=email&utm_source=footer
> >.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2cdd26f8-f1e1-4293-bd59-57abf8faf688n%40googlegroups.com.


Re: [qubes-users] How to control Bluetooth connections in Qubes OS 4.0.3 ?

2020-12-21 Thread ME
What is "native tools" ?

mandag den 21. december 2020 kl. 16.38.02 UTC+1 skrev unman:

> On Mon, Dec 21, 2020 at 06:16:21AM -0800, ME wrote:
> > How to control Bluetooth connections in Qubes OS 4.0.3 ?
> > 
>
> Try to attach bluetooth controller to a qube, and use native tools in that
> qube.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2df5095a-869e-4085-abdd-57b3c4c95eacn%40googlegroups.com.


[qubes-users] How to control Bluetooth connections in Qubes OS 4.0.3 ?

2020-12-21 Thread ME
How to control Bluetooth connections in Qubes OS 4.0.3 ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1177db15-e23b-4b3d-a973-4ac59dbbef90n%40googlegroups.com.


[qubes-users] How do you stream and whatch mp4-video's in your Firefox Browser ?

2020-12-20 Thread ME
How do you stream and whatch mp4-video's in your Firefox Browser ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5290bec5-d65e-41d4-953e-9493180d3abfn%40googlegroups.com.


[qubes-users] Why isn't it possible to manually control if the pc should enable networking and wi-fy at login or not ?

2020-12-20 Thread ME
Why isn't it possible to manually control if the pc should enable 
networking and wi-fy at login or not ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7d2f8d5e-c7af-4f4d-b643-051b5a404fbbn%40googlegroups.com.


[qubes-users] Is it possible for an intruder to see the passwords that is being sent through a compromised router/networkconnection ?

2020-12-20 Thread ME
Lets say I have a compromised router/networkconnection.

I use a Qubes OS pc to go on the internet through the compromised 
router/networkconnection.

Is it then possible for the intruder to see the passwords that I enter and 
is being sent through the compromised router/networkconnection ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b2f7b3b-f84d-4f82-9fa7-eabd22952f15n%40googlegroups.com.


[qubes-users] Can a virus be transfered from a USB storage device before or after attaching it to a App VM ?

2020-12-20 Thread ME
Lets say I have a USB storage device which has a virus on it that will 
infect a Linux pc when it is inserted.

If I insert the USB storage device in my Qubes OS pc after login to Qubes 
OS, is it then possible for the virus to infect my pc immediately after I 
have plugged it in before or after attaching the device to a VM ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a3fb1091-e270-49ee-bd8b-b0a239aec5a3n%40googlegroups.com.


Re: [qubes-users] Installing Qubes 4.0 on a Dell XPS 9570 i9

2019-03-12 Thread me
On Sunday, August 19, 2018 at 12:12:25 PM UTC-4, Wael Nasreddine wrote:
> try appending the kernel param nouveau.modeset=0
> 
> I purchased and returned this laptop because it does not fully work with 
> Linux, I have a Precision 7530 now, much better. See my notes at 
> https://github.com/NixOS/nixpkgs/issues/44284
> 
> 
Hi Wael, 
 I am having trouble installing Qubes 4.0.1 on a Dell Precision 7530.
How did you get yours setup? Legacy mode? Any tips or tricks you can pass along 
would be greatly appreciated.
Thanks,
Paul

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/83611ca8-7641-4a6c-b014-3835cb4ec3db%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Teamviewer 13 won't start (QubesOS 3.2)

2018-05-27 Thread Others call me jean
On 05/25/2018 05:52 PM, 799 wrote:
> Hello,
> 
> Others call me jean  <mailto:nom...@trash-mail.com>> schrieb am Fr.,
> 25. Mai 2018, 14:32:
> 
> [...]
> Since Fedora 26 and Teamviewer 13 I can't open teamviewer anymore:
> 
> [user@fedora-28-dvm ~]$ teamviewer
> 
> Init...
> CheckCPU: SSE2 support: yes
> Checking setup...
> Launching TeamViewer ...
> Launching TeamViewer GUI ...
> [user@fedora-28-dvm ~]$
> 
> -> no GUI
> 
> This issue sounds like the same problem, but I don't know how I can get
> the solution:
> https://github.com/QubesOS/qubes-issues/issues/3664
> 
> 
> What display resolution are you running and what about other
> applications in the same AppVM?
> 
> [799]

Display resolution: 1920x1080

I don't run other application in the same VM (only a test vm for teamviewer)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/pedt7p%245vf%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Teamviewer 13 won't start (QubesOS 3.2)

2018-05-25 Thread Others call me jean
Hi

Since Fedora 26 and Teamviewer 13 I can't open teamviewer anymore:

[user@fedora-28-dvm ~]$ teamviewer

Init...
CheckCPU: SSE2 support: yes
Checking setup...
Launching TeamViewer ...
Launching TeamViewer GUI ...
[user@fedora-28-dvm ~]$

-> no GUI

This issue sounds like the same problem, but I don't know how I can get
the solution:
https://github.com/QubesOS/qubes-issues/issues/3664

Thanks for help

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/pe8vl7%24ahv%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Looking for a Qubes enthusiast in the Baar / Zug area of Switzerland

2018-01-11 Thread Others call me jean
Maybe it is because public.gmane.org can't receive mails? I had some
time ago this error message:

"Host or domain name not found. Name service error for
name=public.gmane.org type=: Host found but no data record of
requested type"


On 01/10/2018 02:31 PM,
mbaarc...@gmail.com wrote:
> Hi Qubes Community,
> 
> I have not received even one notice of interest. Can it really be that here 
> in "Crypto Valley", there are no security and privacy concerned enthusiasts 
> who has some spare time and need some cash for spare expenses whilst doing 
> some interesting and independent work ..?
> 
> I obviously don't want to force anyone's hand, but any input towards someone 
> who could fill this role will be highly appreciated.
> 
> Best regards Mogens
> 


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/p37eus%24tfg%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: R3.2 Upgrading Fedora 25 --> 26 templates - PulseAudio issue

2017-11-05 Thread Others call me jean
+1

if possible a rawhide repository too (for latest package updates ->
security reason)

On 11/05/2017 11:00 PM, J. Eppler wrote:
> I would be interested in Fedora 26 or even better 27 in R3.2 as well.
> 
> Best regards
>   J. Eppler
> 


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/oto2gg%24o58%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] DisplayPort problems -> HowTo driver update?

2017-02-26 Thread Others call me jean
Hi

I really need help! I'm despairing )-:

First, with Arch Linux and GNOME my hardware configuration worked well.
Now I can't make runnable the same config with Qubes OS (XFCE and KDE).
It freezes with every change or suspend/resume.

My CPU is a Skylake one and therefore I maybe need newer drivers.

So my question: how can I update the Intel driver? (e.g. to mesa 13)

Thanks!

(See the first mail too:
https://groups.google.com/forum/#!msg/qubes-users/W-KAQN_k0Yw/9sNcgk4DAAAJ;context-place=msg/qubes-users/Sh7ckO2SpBk/A5-gQ3FE6pYJ)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o8vg7m%248k9%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] secure update of mesa driver?

2017-02-20 Thread Others call me jean
Hi

How can I secure update the mesa driver in dom0 to 13.x or 17.x?

Best regards,
jean

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o8eaqr%24bt2%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] HCL - Lenovo T460s [20FAS0AE00]

2017-02-14 Thread Others call me jean
Works very well!

For NVMe installation you need the workaround from:
https://github.com/QubesOS/qubes-issues/issues/2381

With the unstable kernel (current 4.8.12) it works more stable.

The DisplayPort has some problem and the system crash regularly on plug
in. HDMI works.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o7vds8%24brs%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


Qubes-HCL-LENOVO-20FAS0AE00-20170214-180106.yml
Description: application/yaml


[qubes-users] DisplayPort problems

2017-02-13 Thread Others call me jean
Hi community

Yesterday I installed Qubes OS and it works fine. Thank you guys!

But I could not solve one problem yet. Here my configuration:

- Lenovo T460s, NVMe SSD, i7-6600U
- Qubes OS 3.2
- 4.8.12-12.pvops.qubes.x86_64
- ThinkPad Ultra Dock (Docking Station)
- 2x Dell U2415b with DP to Docking Station

Before I installed Qubes, I used Arch Linux with GNOME. The Displays
normally works, even when I dock/undock from my docking station.

Now, the Qubes OS freeze/crash, when I plug in the display direct or
dock/undock from the docking station with DisplayPort. This is really
annoying!

With HDMI this problem does not exist. But unfortunately I have only 1
HDMI connection on my docking station (I don't know why, because with
daisy chaining you could use multiple display with only 1 DP port!).

Do you know a possible solution for DisplayPort support?

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o7s893%24k7h%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Riseup Services Likely Compromised

2016-12-12 Thread Me
Michael Carbone:
> Me:
>> Qubes users beware. Riseup Services (including email)are likely
>> compromised by State actors.
>> For more info and to verify above statement visit
>> https://riseup.net/canary {here you'll see that the canary statement
>> hasn't been updated quarterly as promised} and here
>> https://www.whonix.org/blog/riseup.
>> Google the topic and you'll see lots of other statements that Riseup is
>> no longer trusted.
>> Stay Safe
> 
> https://theintercept.com/2016/11/29/something-happened-to-activist-email-provider-riseup-but-it-hasnt-been-compromised/
> 
> which includes statements from the Riseup team.
> 
> It sounds like they were served with something boring, but because of
> how they defined their warrant canary they had to not update it.
> Removing a warrant canary does not mean compromise, which is one of the
> weaknesses of poorly defined (and followed) warrant canaries.
> 
The Intercept may be correct. However they do not publish this tweet
from Riseup "listen to the hummingbird, whose wings you cannot see,
listen to the hummingbird, don't listen to me." It doesn't take a rocket
scientist to intepret this. In any case, I have my doubts about the
integrity of The Intercept; which is funded by the owner of PAYPAL; that
well known privacy activist! who in the past hast blocked donations to
Wikileaks et al

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d376fbd-4db4-9a7f-80f2-83909f936718%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Riseup Services Likely Compromised

2016-12-11 Thread Me
Qubes users beware. Riseup Services (including email)are likely
compromised by State actors.
For more info and to verify above statement visit
https://riseup.net/canary {here you'll see that the canary statement
hasn't been updated quarterly as promised} and here
https://www.whonix.org/blog/riseup.
Google the topic and you'll see lots of other statements that Riseup is
no longer trusted.
Stay Safe

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o2jmi7%24prs%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: 2/3 of VMs randomly lose network access; sys-net, sys-firewall, and others normal

2016-11-27 Thread Me
Andrew David Wong:
> A strange networking problem just started in the past day or so:
> 
> Every few hours, around 2/3 of my VMs will suddenly lose network
> access. I can still ping websites from sys-net and sys-firewall,
> and some VMs still have normal network access, even though all of
> them are using the same sys-firewall. (Other devices on my LAN are
> also fine.)
> 
> The weird part is, if I create a new, additional "sys-firewall1"
> ProxyVM and switch over one of the non-working VMs to it
> *without restarting* the non-working VM, network access gets
> successfully restored. So, the problem must be in sys-firewall
> or the AppVMs, I think.
> 
> I've tried basing sys-firewall on fedora-24 and fedora-24-minimal
> with the same results. Also double-checked NetVM assignments
> and firewall rules, of course.
> 
> Any ideas for logs or tools I should check to find out what's
> failing, or where it's failing?
> 
> -
> 
> I can't imagine what caused this problem to suddenly start,
> except maybe a dom0 or template update, so here are the packages
> I've updated in dom0 recently as part of normal qubes-dom0-update:
> 
> libsndfile
> sudo
> bind99-libs
> bind99-license
> ghostscript-core
> hswdata
> perf
> ntfs-3g
> ntfsprogs
> perl
> perl-libs
> perl-macros
> 
> And here are the packages I've updated in my fedora-24 template
> (again, as normal updates):
> 
> libicu
> libidn2
> gnome-abrt
> gnome-software
> libdmapsharing
> libmetalink
> lz4
> lz4-r131
> rpm
> rpm-build-libs
> rpm-libs
> rpm-plugin-selinux
> rpm-plugin-systemd-inhibit
> rpm-python
> rpm-python3
> 
> Any ideas?
> 
I had networking issues after downloading Fedora 24. I've ditched that
and gone back to Fedora 23 - all is well again >


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d0eed97d-610b-72ed-81db-6d9ff485fd97%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Installing VPN in Qubes Versus VPN on a Router

2016-11-21 Thread Me
amadaus:
> amad...@riseup.net:
>> We see much correspondence in these forums about installing a VPN within
>> Qubes. Surely, the most secure place for VPN is to install on a Router?
>> I say these things after reading the following paper [
>> https://cryptome.org/2013/12/Full-Disclosure.pdf ] in which a group of
>> hackers demonstrate that the majority of routers (in-particular those
>> provided by ISP's] have backdoors to government agencies. These
>> adversary's are able attack our LAN and its devices; including the
>> ability to intercept VPN and Tor traffic.
>> The solution they say is to isolate these rogue routers in the
>> Militarized Zone by creating a DMZ [demilitarized zone]. Achieved by
>> installing a 2nd router [flashed with open source firmware such as
>> OPenWRT]. It is here, on the router, that we should enable and run OpenVPN.
>> Thoughts on this paper and it's conclusions are welcomed
>>
> Thanks everyone for your contributions.
> Implicit in most of your replies is a distinct distrust of the
> modems/routers provided to us.
> If anyone is interested, the solution we adopted to securing our LAN is
> copied from this blog;
> https://tokyobreeze.wordpress.com/2015/02/01/create-a-nsa-and-hacker-proof-home-network-that-you-control/
> This guy uses a couple of cheap routers loaded with OpenWRT which sit
> behind his infected Modem. His 2nd routed utilises OpenVPN Client and is
> configured to protect "high value" devices.
> We've successfully copied this configuration and it seems!! to work. -
> unless you know better??
> 
The Blogger is correct, the best place to install OpenVPN is to use it
within OpenWRT on a Router.  As well as helping protect incoming and
outgoing traffic to your Qubes device, it can help protect smart phones,
tablets & IoT devices from being attacked and employed for Denial of
Service purposes


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/32bb2ecc-7e3f-3a88-c3da-834a5500b585%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Is Qubes for the Asus X205ta ?

2016-11-21 Thread Me
pierremartinf...@gmail.com:
> Hi, I wonder if the Asus X205ta can handle Qubes ?
> Thank,
> 


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2d69ffcc-94d4-175f-35dc-0fa42bf5c3b3%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Qubes - Revocation of the Qubes Signing Key

2016-11-21 Thread Me
Do Qubes have any intention of following in the footsteps of TAILS as
proposed below:
[ see link
https://tails.boum.org/doc/about/openpgp_keys/signing_key_revocation/index.en.html
]
This document proposes a mechanism for the distribution and activation
of the revocation certificate of the Tails signing key.
Goals

Covered by current proposal:

Prevent any single individual from revoking our signing key.
Allow a coalition of people from ta...@boum.org to revoke our
signing key in case most of the people from ta...@boum.org become
unavailable.
Allow a coalition of people, not necessarily from ta...@boum.org, to
revoke our signing key in case everybody or almost everybody from
ta...@boum.org becomes unavailable.
Make it hard for a coalition of people not from ta...@boum.org to
revoke our signing key unless everybody or almost everybody from
ta...@boum.org becomes unavailable.
People not from ta...@boum.org shouldn't know how the shares are
spread and who has them.
People in possession of a share of the signing key should have
instructions on how to use it if needed.

Groups

We define four complementary groups of trusted people:

Group A: people from ta...@boum.org themselves
Group B
Group C
Group D

All these people should have an OpenPGP key and understand what a
revocation certificate is.
Cryptographic shares

We generate a revocation certificate of the signing key and split it
into a number of cryptographic shares, using for example Shamir's secret
sharing scheme implemented by gfshare.

The following combinations of people could get together and reassemble
their shares to reconstruct a complete revocation certificate:

Three people from ta...@boum.org: A{3}
Two people from ta...@boum.org and one person not from
ta...@boum.org: A{2}+(B|C|D)
One person from ta...@boum.org, and two people not from
ta...@boum.org but from two different groups: A+(B|C|D){2}
Three people not from ta...@boum.org but from three different
groups: (B+C+D){3}

We generate these shares:

N shares, one for each person from ta...@boum.org
1 share for people in group B
1 share for people in group C
1 share for people in group D

Who knows what

People from ta...@boum.org know the composition of each group
People not from ta...@boum.org:
Are explained in which circumstances they should revoke the
signing key
Are told to write to a certain contact email address if they
decide to revoke the signing key
Are told that they need three different shares to reassemble the
revocation certificate

Infrastructure

Everybody who owns a share is subscribed to a mailing list.
This mailing list is hosted on a trusted server different from
boum.org to be more resilient than our usual communication channels.

Changing the members of the groups B, C, or D

To add someone to a given group:

Request someone from that group to send her share to the new person
in the group.

To remove someone from a given group:

Send new shares to everybody except to the person who is being removed.
Request everybody to delete their previous share and track this.
Once everybody in 2 groups amongst B, C, or D have deleted their share,
it becomes impossible for them to reassemble the revocation certificate
with the previous set of shares.
Let's hope that this doesn't happen very often :)

Expiry

There is no expiry date on revocation certificates. One way of
cancelling the revocation power is to destroy all copies of shares of 2
groups amongst B, C, or D.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/o0v4t9%24rd4%241%40blaine.gmane.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] 3.2 Install: Error unpacking qubes-template-fedora-23

2016-10-26 Thread me
I'm trying to install Qubes 3.2 on a Thinkpad T450s (i7), which is listed on 
the hardware compatibility list as being generally successful with both 
releases 3.1 and 3.2.

I have had to use the UEFI Lenovo workaround documented at 
https://www.qubes-os.org/doc/uefi-troubleshooting/ so my install process has 
been as follows:

- dd write a checksum and signature verified Qubes-R3.2-x86_64.iso to a 32GB 
USB drive
- Enable legacy boot in the Thinkpad BIOS
- Boot from the USB drive
- Select "Troubleshooting" > "Boot from local disk" to enter secondary GRUB menu
- Highlight the "Verify and Install" option and press 'e'
- Add '/mapbs /noexitboot' to the 'chainloader' GRUB line
- Press ctrl-x to boot with modified config
- See successful verification of the USB drive contents and launch of Qubes 3.2 
installer
- Secondarily verify the install media from the "Installation Source" GUI panel
- Configure install destination to "reclaim all space" by deleting the existing 
partitions and use the automatic paritioning
- Begin the install

About halfway through the progress bar, the status reads:
"Installing qubes-template-fedora-23.noarch (800/930)"

Switching to tty-1 with ctrl-alt-f1 shows the error message:
"Error unpacking rpm package qubes-fedora-23-3.0.6-201608081228.noarch"

If left along for long enough, this rpm task seems to error out completely and 
get skipped over to finish the rest of the installation.  I then add the 
documented UEFI workaround to /mnt/sysimage/boot/efi/EFI/qubes/xen.cfg.

After rebooting into the Qubes install, asking the Configuration helper to set 
up the default system qubes (sys-net, sys-firewall) fails with an alert message:

[Dom0] Error 
['/usr/bin/qubes-prefs'. '--set', 'default-template', 'fedora-23'] failed:
stdout: ""
stderr: "A VM with the name 'fedora-23' does not exist in the system."

I'm confused about why such a specific package would consistently fail to 
install from good installation media over multiple install runs on my laptop.  
I've now tried with two different USB drives and ISO files from different 
sources.

When running the installed Qubes, manually adding the package to dom0 with:

sudo yum install 
/run/media//Qubes-R3.2-x86_64/Packages/q/qubes-template-fedora-23-3.0.6-201608081228.noarch.rpm

installs successfully and provides the fedora-23 vm template in the VM Manager, 
from which I'm able to create a new NetVM and connect to a wired network.  So 
that's all working, once it's in place.

I would very much like to have the default sys-net and sys-firewall qubes.  The 
way I see it, there are two semi-automated ways to get them:

1) Re-run the firstboot qubes-anaconda-addon now that the fedora-23 vm template 
is installed.

2) Re-install again, manually adding the qubes-template-fedora-23 package 
before the reboot so that it's available for the normal firstboot process.

[Implicit option 3) Figure out and manually type the sys-net and sys-firewall 
creation commands by picking through the qubes-anaconda-addon source.]

Any helpful hints come to mind?

Thanks,
Evan

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d246f46-132a-4b52-97a3-73fc3fc01e5a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.