Re: [qubes-users] Unable to get VPN to ping out. Unable to set up ProxyVM as sys-vpn

2021-03-02 Thread Stumpy

On 3/1/21 7:36 PM, 'awokd' via qubes-users wrote:

roberto re:


I've looked around but I can't seem to find any up-to-date, uncomplicated
step by step guide to get a fail closed, antileak VPN tunnel environment.


https://github.com/QubesOS-contrib/qubes-tunnel



Sorry I dont have any words of wisdom, I have literally posted for weeks 
actually trying to get a functional VPN, I have gotten it to work using 
the iptables cli method, and once using the qubes tunnel method (was 
easy the one time it worked for me).


Honestly while there are those who have gotten it going I am thinking 
there are bugs or something esp for those who want to use minimal 
non-fedora templates... but thats just me.


Best of luck.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/37a4d58e-c0cc-4147-4024-a0243c51dcd0%40posteo.co.


[qubes-users] How screwed am I? (corrupt backup files?)

2021-03-02 Thread Stumpy
I have a bunch of backups... all in one place... and it seems most of 
them have been borked in some way. I have tried to restore 50gb backups 
using qube manager and end up with empty appvms (that show a size of 0mb 
in qubes manger and as far as i can tell are empty when i start them up 
and look in them), though with many of the restores I dont get errors?


I am trying to figure out how to restore them manually per the qubes 
emergency restore doc page and am getting errors like:


[user@disp9624 appvms2salvage]$ sudo tar -i -xvf 
qubes-2019-12-14T162028_shuttle -C ~/Templates/

backup-header
backup-header.hmac
qubes.xml.000.enc
dom0-home/bob.000.enc
tar: Skipping to next header
tar: Archive contains ‘Q\352\334\\\275h\274\202B*\275s’ where numeric 
off_t value expected
tar: Archive contains ‘I\221\272\031\205\325\314۴5\373\377’ where 
numeric off_t value expected
tar: Archive contains ‘\037\2571\344\323\377ȧD\204\t"’ where numeric 
off_t value expected
tar: Archive contains ‘p\177\246\257\371\215\243Bqp[\350’ where numeric 
off_t value expected
tar: Archive contains ‘\210\265\225\265[\313\311i\205!TI’ where numeric 
off_t value expected
tar: Archive contains ‘\255\220.\217\232\254j\247\326\325\355\303’ where 
numeric off_t value expected
tar: Archive contains ‘\032q&\345\377k\005\342.value expected
tar: Archive contains ‘ע8"]T\310pr'\0\353’ where numeric off_t value 
expected
tar: Archive contains ‘Q\241\371x\216\244AȞ\350?\343’ where numeric 
off_t value expected
tar: Archive contains ‘a\023\2478\223\320\363S\231\275\345\320’ where 
numeric off_t value expected
tar: Archive contains ‘\034v\320\313j7\262v\362\033G\002’ where numeric 
off_t value expected
tar: Archive contains ‘\317\r\367Z\241.\256\017\036r[\342’ where numeric 
off_t value expected

vm3/root.img.025.enc
tar: Skipping to next header
tar: Archive contains ‘!\017\257\f\317f\356\r\273\377\271\t’ where 
numeric off_t value expected
tar: Archive contains ‘ؽY--f\212\317\025%\371\177’ where numeric off_t 
value expected
tar: Archive contains ‘\241\227w\376\235f\347\263\366\025\342M’ where 
numeric off_t value expected
tar: Archive contains ‘\331(\330n\372\352\033\343ٷ߉’ where numeric off_t 
value expected
tar: Archive contains ‘\337\323\002h\315\371\002w\242\334\355\031’ where 
numeric off_t value expected
tar: Archive contains ‘\001\327£\375\034[-QV7\036’ where numeric off_t 
value expected
tar: Archive contains ‘k\020\327\023\210Cq\b[5\334 ’ where numeric off_t 
value expected
tar: Archive contains ‘\255\273Y\273\360\004u\276\360\027\270M’ where 
numeric off_t value expected
tar: Archive contains ‘[-\244\206\260(&\220\246)’ where numeric off_t 
value expected
tar: Archive contains ‘\a\002\251\354 ݓ-t\031h\037’ where numeric off_t 
value expected
tar: Archive contains ‘8\362\241\251\360Ah\255-\272\f^’ where numeric 
off_t value expected
tar: Archive contains ‘\353\250\317\342\260\\\356\362\301;\303\311’ 
where numeric off_t value expected
tar: Archive contains ‘\001Z\223\220ɜ\327j\360\235fA’ where numeric 
off_t value expected
tar: Archive contains ‘Ő\267\033z0_\264\326_-\326’ where numeric off_t 
value expected
tar: Archive contains ‘\316\354\330Țv|w\027\311%\370’ where numeric 
off_t value expected
tar: Archive contains ‘\233\215\351K\226\303BH\241\250<\337’ where 
numeric off_t value expected
tar: Archive contains ‘\376:{\204\362\312$\267\223\205\310p’ where 
numeric off_t value expected
tar: Archive contains ‘\236\226\3258+~\245\033\003~\376\022’ where 
numeric off_t value expected
tar: Archive contains ‘\260\341D\266\241[\224~\303\037\220\263’ where 
numeric off_t value expected
tar: Archive contains ‘w\360<\215\023\212\315:p:^\003’ where numeric 
off_t value expected
tar: Archive contains ‘\227\177\212\211FF\375\360Oe\201\232’ where 
numeric off_t value expected
tar: Archive contains ‘\247;\347P\306M\035a\213\350-\221’ where numeric 
off_t value expected
tar: Archive contains ‘\356b\372\212\326S\230H\320s\261w’ where numeric 
off_t value expected
tar: Archive contains ‘J\263\236[\034&"ƭ\344%\336’ where numeric off_t 
value expected
tar: Archive contains ‘\323Uy\260\225X/a\314\020] ’ where numeric off_t 
value expected
tar: Archive contains ‘P;\a\300\214E\304\026\373\314D\353’ where numeric 
off_t value expected
tar: Archive contains ‘nW\273B"\224\366*\334|\241R’ where numeric off_t 
value expected
tar: Archive contains ‘@\214\027D*\342-u\034}\214x’ where numeric off_t 
value expected
tar: Archive contains ‘\016\364\236DV\314\020\302]N\035y’ where numeric 
off_t value expected
tar: Archive contains ‘\362\307"\031\277y\330څ\021\304\320’ where 
numeric off_t value expected
tar: Archive contains ‘\375k\374\206\235j+\016W=w\215’ where numeric 
off_t value expected

tar: Exiting with failure status due to previous errors

Can someone explain how bad things are looking from these errors?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails 

Re: [qubes-users] Cheap laptops that run Qubes

2021-01-07 Thread Stumpy

On 1/5/21 7:59 PM, unman wrote:

On Sun, Jan 03, 2021 at 09:06:09AM -, anonymous9959rhek via qubes-users 
wrote:

I'm looking for a laptop that can run Qubes without stress. I want the
cheapest one possible.
Please let me know which one I should get.



"cheap" and "stress" are relative.
You can pick up a decent corebooted x230 with 16Gb RAM and a good SSD for about 
450
USD. You can go lower than this looking at an x220 i7, or an i5 - pick
up one for less than 200USD, max the RAM and add a good SSD, and you
could touch 300USD.
Take a beater, give it some love and you'll go cheaper for the same
quality.

People have different experiences - I'm currently on an x220 i5, with 13
running qubes - 1 running an analysis, 3 web browsers open, and vlc running
smoothly.

You'll probably get better answers if you say what your budget is, and
what you hope to do with Qubes.
You *can* work with an HDD and 12 GB RAM, but it's somewhat slow. But if
that's your budget, go for that and upgrade when you can. Prioritise the
SSD, and then the RAM.



I'd second what Unman said, to me getting a used (which most x220s would 
be now) is going to be your best bet. I have an HP 8460p and it runs 
qubes like a (slow) champ and installed flawlessly.


It is my hope that the HCL can have more information added to it, 
something like the year of the computer's release, or a link to maybe an 
archive.org copy of the specs, or maybe (somehow) an average price of 
what its going for on ebay or something similar


(Qubes team, I'd be willing to do the grunt work of getting the links 
and perhaps adding them in for each HCL; and adding the option to add, 
or asking submitters to add links might be a good idea as well?)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a47627ef-1973-556c-4ce1-ced7db255cbc%40posteo.co.


Re: [qubes-users] Still not able to install rofi in dom0? (getting "ERROR: could not verify one or more packages" for multiple packages, not only rofi)

2021-01-04 Thread Stumpy

On 1/4/21 2:33 PM, 'trichel' via qubes-users wrote:

Well I got rofi installed, only because I happened upon a dated reddit
post https://www.reddit.com/r/Qubes/comments/aap0zs/my_qubes_os_with_i3/
which referred readers to
https://github.com/mohabaks/dotfiles/tree/master/config/Qubes-os which
had a link to
https://github.com/fepitre/qubes-rofi/issues/1#issuecomment-667303259

This solution was back in August 2020 but it worked for me, no clue why
the method in the documentation did not work, havent been able to get
any feedback but I am hoping this will help any others trying to install
rofi.


Stumpy, dude, thank you for your perseverance! ;-)
Your findings combined with the official Qubes documentation solved it.
Apparently importing the contrib key is necessary for the install to succeed.

So after importing with:

sudo rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-qubes-4-contrib-fedora

I just followed the documentation at 
https://www.qubes-os.org/doc/installing-contributed-packages/ and now the 
install went fine, finally!
After changing the i3 config file it all works flawlessly on 4.0. I preferred 
not to enable the testing repo but just keep the contrib, FWIW.
Also many thanks to fepitre!

Maybe it is wise to update the documentation, if this is indeed all correct? Or 
did we miss this somewhere?




I am (really) glad it helped someone, I posted again and again trying to 
figure what i was doing wrong.


It would indeed be wise to update the documentation as its seriously 
lacking for rofi at least (and I suspect for some other qubes contrib 
packages). I am not familiar with github but will see if I can edit or 
pull or whatever its called to edit the rofi (and maybe polybar) page.


I would not be surprised at all if I missed something else, so if you do 
pick some other nuggets please do reply to the group (i noticed the 
mailing list posts are automatically put in the discourse forum.



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/14338311-216a-a2d6-2b98-55a2475e059f%40posteo.co.


Re: [qubes-users] Still not able to install rofi in dom0? (getting "ERROR: could not verify one or more packages" for multiple packages, not only rofi)

2021-01-04 Thread Stumpy

On 1/1/21 12:06 PM, Stumpy wrote:

On 12/27/20 11:50 AM, Stumpy wrote:
I was trying to install rofi earlier and ended up giving up hoping an 
update might change things? Well I just tried again and got a 
different error (before I was getting an error that was something like 
rofi not found i think). Now I am getting:


sudo qubes-dom0-update rofi
Using sys-whonix as UpdateVM to download updates for Dom0; this may 
take some time...

--> Running transaction check
---> Package rofi.x86_64 0:1.6.0-1.fc25 will be installed
--> Processing Dependency: rofi-themes = 1.6.0-1.fc25 for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxkbcommon-x11.so.0(V_0.5.0)(64bit) for 
package: rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-ewmh.so.2()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-icccm.so.4()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-xrm.so.0()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxkbcommon-x11.so.0()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64

--> Running transaction check
---> Package libxkbcommon-x11.x86_64 0:0.7.1-1.fc25 will be installed
---> Package rofi-themes.noarch 0:1.6.0-1.fc25 will be installed
---> Package xcb-util-wm.x86_64 0:0.4.1-8.fc24 will be installed
---> Package xcb-util-xrm.x86_64 0:1.2-1.fc25 will be installed
--> Finished Dependency Resolution
rofi-1.6.0-1.fc25.x86_64.rpm    | 196 kB 
00:01
xcb-util-xrm-1.2-1.fc25.x86_64.rpm  |  18 kB 
00:00
xcb-util-wm-0.4.1-8.fc24.x86_64.rpm |  29 kB 
00:00
libxkbcommon-x11-0.7.1-1.fc25.x86_64.rpm    |  22 kB 
00:00
rofi-themes-1.6.0-1.fc25.noarch.rpm |  19 kB 
00:00
Successfully verified 
/var/lib/qubes/dom0-updates/packages/libxkbcommon-x11-0.7.1-1.fc25.x86_64.rpm 

Successfully verified 
/var/lib/qubes/dom0-updates/packages/python3-xen-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/qubes-gpg-split-dom0-2.0.50-1.fc25.x86_64.rpm 

ERROR: could not verify 
/var/lib/qubes/dom0-updates/packages/rofi-1.6.0-1.fc25.x86_64.rpm
ERROR: could not verify 
/var/lib/qubes/dom0-updates/packages/rofi-themes-1.6.0-1.fc25.noarch.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xcb-util-wm-0.4.1-8.fc24.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xcb-util-xrm-1.2-1.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-hvm-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-hypervisor-4.8.5-28.fc25.x86_64.rpm 

Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-libs-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-licenses-4.8.5-28.fc25.x86_64.rpm 

Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-runtime-4.8.5-28.fc25.x86_64.rpm

ERROR: could not verify one or more packages


Thoughts?



Alittle additional information, it seems that not only am i getting 
verification errors for rofi related packages but I also tried (just to 
see what would happen) installing other packages like:


sudo qubes-dom0-update --clean qvm-screenshot-tool
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

Cleaning repos: fedora qubes-contrib-dom0-r4.0-current qubes-dom0-current
   : qubes-templates-itl updates
Cleaning up Everything
fedora/metalink | 3.2 kB 00:00
fedora  | 4.3 kB 00:00
fedora-32-minimal: command failed with code: 143 ] 242 kB/s | 4.4 MB 
01:30 ETA

fedora/primary_db   |  26 MB 01:47
qubes-contrib-dom0-r4.0-current | 3.0 kB 00:00
qubes-contrib-dom0-r4.0-current/primary_db  |  16 kB 00:00
qubes-dom0-current/metalink | 2.7 kB 00:00
https://mirror.linux.pizza/qubes-os.org/repo/yum/r4.0/current/dom0/fc25/repodata/repomd.xml: 
[Errno 14] HTTPS Error 404 - Not Found

Trying other mirror.
qubes-dom0-current  | 3.8 kB 00:00
qubes-dom0-current/primary_db   | 483 kB 00:02
qubes-templates-itl/metalink    | 2.7 kB 00:00
qubes-templates-itl | 3.0 kB 00:00
qubes-templates-itl/primary_db  | 6.9 kB 00:00
updates/metalink    | 3.0 kB 00:00
updates | 4.7 kB 00:00
updates/primary_db  |  12 MB 00:51
--> Running transaction check
---> Package qvm-scree

Re: [qubes-users] Installing qubes-tunnel on fedora-32-minimal?

2021-01-02 Thread Stumpy

On 12/19/20 11:54 AM, Chris Laprise wrote:

On 12/16/20 12:16 PM, Stumpy wrote:
Firstly, I was able to get the user contrib qubes tunnel going on a 
fedora-32-minmal template and it was great! (great meaning so much 
easier than the more manual methods; though its still not clear to me 
if it includes a kill switch)


The problem is fed31 has reached EOL so I wanted to install it on a 
fed32 template so I started with (actually I installed it earlier but 
wanted to show that it is indeed installed):


bash-5.0# sudo dnf install qubes-repo-contrib
Last metadata expiration check: 0:45:12 ago on Wed Dec 16 11:23:25 2020.
Package qubes-repo-contrib-4.0.7-1.fc32.noarch is already installed.
Dependencies resolved.
Nothing to do.
Complete!


Then I tried to install the qubes-tunnel:

bash-5.0# sudo dnf install qubes-tunnel
Last metadata expiration check: 0:45:27 ago on Wed Dec 16 11:23:25 2020.
No match for argument: qubes-tunnel
Error: Unable to find a match: qubes-tunnel



I also tried to install qubes-tunnel on the proxyvm for sh*t and 
giggles but that didnt work either (same error). I looked in the 
/user/lib/qubes dir and qubes-tunnel wasnt there which explains why I 
get the error:


bash-5.0# sudo /usr/lib/qubes/qtunnel-setup --config
sudo: /usr/lib/qubes/qtunnel-setup: command not found

when i try to run it.

Thoughts?


You should try doing a 'dnf update' and then trying the install again. I 
just tried it on f32 and it worked.




Thanks, that worked however I run into another problem in that I cant 
seem to get vpns to work on anything except fed31minimal.
I have tried on centos minimal, debian minimal, fed31 minimal so I am 
assuming I am doing something wrong, but I dont know what as I AFAIK am 
doing the same thing i did with fed31.


I start with
sudo dnf install qubes-repo-contrib && sudo dnf update && sudo dnf upgrade

then sudo dnf install qubes-tunnel

Intially I think I was just doing that and not installing anything else 
but in trying to figure things out I started installing packages that 
the minimal docs page says are needed for NetVM and VPN qube (things 
like openvpn and qubes-core-agent-networking 
qubes-core-agent-network-manager NetworkManager-wifi 
network-manager-applet wireless-tools notification-daemon gnome-keyring 
polkit and sakura, a term i can paste into)


The above now seems to work ok, but then I create an appvm - vpnfed32, 
select the template (centos/deb/fed32 minimals) then check the "provides 
network" then go to the Services tab and add qubes-tunnel-openvpn then 
click ok.


Then I make sure the template and new appvm are closed, then start up 
the vpnvm from dom0:


qvm-run -u root vpnfed32 sakura &

and run

/usr/lib/qubes/qtunnel-setup --config

then enter my vpn provider (PIA) username then password

then copy one of the pia .ovpn profiles to

/rw/config/qtunnel/qtunnel.conf

then shutdown the vpn vm, then open the settings for another appvm set 
vpnfed32 as the networking vm to vpnfed32 and then try to start the 
AppVM (that I just set to use vpnfed32) up but nada, no connection to 
the internet at all.


Is there something above that is incorrect? Or maybe a log I could post?

Thank you in advance

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cb8c3a65-b078-6a7d-6a5d-cd9bf67016db%40posteo.co.


Re: [qubes-users] Still not able to install rofi in dom0? (getting "ERROR: could not verify one or more packages" for multiple packages, not only rofi)

2021-01-01 Thread Stumpy

On 12/27/20 11:50 AM, Stumpy wrote:
I was trying to install rofi earlier and ended up giving up hoping an 
update might change things? Well I just tried again and got a different 
error (before I was getting an error that was something like rofi not 
found i think). Now I am getting:


sudo qubes-dom0-update rofi
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

--> Running transaction check
---> Package rofi.x86_64 0:1.6.0-1.fc25 will be installed
--> Processing Dependency: rofi-themes = 1.6.0-1.fc25 for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxkbcommon-x11.so.0(V_0.5.0)(64bit) for 
package: rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-ewmh.so.2()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-icccm.so.4()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-xrm.so.0()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxkbcommon-x11.so.0()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64

--> Running transaction check
---> Package libxkbcommon-x11.x86_64 0:0.7.1-1.fc25 will be installed
---> Package rofi-themes.noarch 0:1.6.0-1.fc25 will be installed
---> Package xcb-util-wm.x86_64 0:0.4.1-8.fc24 will be installed
---> Package xcb-util-xrm.x86_64 0:1.2-1.fc25 will be installed
--> Finished Dependency Resolution
rofi-1.6.0-1.fc25.x86_64.rpm    | 196 kB 00:01
xcb-util-xrm-1.2-1.fc25.x86_64.rpm  |  18 kB 00:00
xcb-util-wm-0.4.1-8.fc24.x86_64.rpm |  29 kB 00:00
libxkbcommon-x11-0.7.1-1.fc25.x86_64.rpm    |  22 kB 00:00
rofi-themes-1.6.0-1.fc25.noarch.rpm |  19 kB 00:00
Successfully verified 
/var/lib/qubes/dom0-updates/packages/libxkbcommon-x11-0.7.1-1.fc25.x86_64.rpm 

Successfully verified 
/var/lib/qubes/dom0-updates/packages/python3-xen-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/qubes-gpg-split-dom0-2.0.50-1.fc25.x86_64.rpm 

ERROR: could not verify 
/var/lib/qubes/dom0-updates/packages/rofi-1.6.0-1.fc25.x86_64.rpm
ERROR: could not verify 
/var/lib/qubes/dom0-updates/packages/rofi-themes-1.6.0-1.fc25.noarch.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xcb-util-wm-0.4.1-8.fc24.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xcb-util-xrm-1.2-1.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-hvm-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-hypervisor-4.8.5-28.fc25.x86_64.rpm 

Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-libs-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-licenses-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-runtime-4.8.5-28.fc25.x86_64.rpm

ERROR: could not verify one or more packages


Thoughts?



Alittle additional information, it seems that not only am i getting 
verification errors for rofi related packages but I also tried (just to 
see what would happen) installing other packages like:


sudo qubes-dom0-update --clean qvm-screenshot-tool
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

Cleaning repos: fedora qubes-contrib-dom0-r4.0-current qubes-dom0-current
  : qubes-templates-itl updates
Cleaning up Everything
fedora/metalink | 3.2 kB 
00:00
fedora  | 4.3 kB 
00:00
fedora-32-minimal: command failed with code: 143 ] 242 kB/s | 4.4 MB 
01:30 ETA
fedora/primary_db   |  26 MB 
01:47
qubes-contrib-dom0-r4.0-current | 3.0 kB 
00:00
qubes-contrib-dom0-r4.0-current/primary_db  |  16 kB 
00:00
qubes-dom0-current/metalink | 2.7 kB 
00:00
https://mirror.linux.pizza/qubes-os.org/repo/yum/r4.0/current/dom0/fc25/repodata/repomd.xml: 
[Errno 14] HTTPS Error 404 - Not Found

Trying other mirror.
qubes-dom0-current  | 3.8 kB 
00:00
qubes-dom0-current/primary_db   | 483 kB 
00:02
qubes-templates-itl/metalink| 2.7 kB 
00:00
qubes-templates-itl | 3.0 kB 
00:00
qubes-templates-itl/primary_db  | 6.9 kB 
00:00
updates/metalink| 3.0 kB 
00:00
updates | 4.7 kB 
00:00
updates/primary_db  |  12 MB 
00:51

--> Running transaction check
---> Package qvm-screenshot-tool.x86_64 0:0.7-0.

[qubes-users] Still not able to install rofi in dom0?

2020-12-27 Thread Stumpy
I was trying to install rofi earlier and ended up giving up hoping an 
update might change things? Well I just tried again and got a different 
error (before I was getting an error that was something like rofi not 
found i think). Now I am getting:


sudo qubes-dom0-update rofi
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

--> Running transaction check
---> Package rofi.x86_64 0:1.6.0-1.fc25 will be installed
--> Processing Dependency: rofi-themes = 1.6.0-1.fc25 for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxkbcommon-x11.so.0(V_0.5.0)(64bit) for 
package: rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-ewmh.so.2()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-icccm.so.4()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxcb-xrm.so.0()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64
--> Processing Dependency: libxkbcommon-x11.so.0()(64bit) for package: 
rofi-1.6.0-1.fc25.x86_64

--> Running transaction check
---> Package libxkbcommon-x11.x86_64 0:0.7.1-1.fc25 will be installed
---> Package rofi-themes.noarch 0:1.6.0-1.fc25 will be installed
---> Package xcb-util-wm.x86_64 0:0.4.1-8.fc24 will be installed
---> Package xcb-util-xrm.x86_64 0:1.2-1.fc25 will be installed
--> Finished Dependency Resolution
rofi-1.6.0-1.fc25.x86_64.rpm| 196 kB 
00:01
xcb-util-xrm-1.2-1.fc25.x86_64.rpm  |  18 kB 
00:00
xcb-util-wm-0.4.1-8.fc24.x86_64.rpm |  29 kB 
00:00
libxkbcommon-x11-0.7.1-1.fc25.x86_64.rpm|  22 kB 
00:00
rofi-themes-1.6.0-1.fc25.noarch.rpm |  19 kB 
00:00
Successfully verified 
/var/lib/qubes/dom0-updates/packages/libxkbcommon-x11-0.7.1-1.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/python3-xen-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/qubes-gpg-split-dom0-2.0.50-1.fc25.x86_64.rpm
ERROR: could not verify 
/var/lib/qubes/dom0-updates/packages/rofi-1.6.0-1.fc25.x86_64.rpm
ERROR: could not verify 
/var/lib/qubes/dom0-updates/packages/rofi-themes-1.6.0-1.fc25.noarch.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xcb-util-wm-0.4.1-8.fc24.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xcb-util-xrm-1.2-1.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-hvm-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-hypervisor-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-libs-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-licenses-4.8.5-28.fc25.x86_64.rpm
Successfully verified 
/var/lib/qubes/dom0-updates/packages/xen-runtime-4.8.5-28.fc25.x86_64.rpm

ERROR: could not verify one or more packages


Thoughts?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/958db366-f86f-c699-beb9-961c7e1ee7f1%40posteo.co.


[qubes-users] Possible to run something like recoll in dom0 to index appvms?

2020-12-27 Thread Stumpy
I try to be organized and make sure all files are in the appvms they are 
supposed to be but while it works most of the time it doesnt always.


As a result I was wondering if it was possible (aknowledging one would 
have to trust recoll, its in the fedora repo for what thats worth) if it 
was possible to install recoll in dom0 and have it search/index files in 
the different appVMs?


I am also open to using something a bit safer (starting somewhere along 
the lines of ls -l > bigindexfile.txt maybe?) so any suggestions would 
be really apprecaited.


It would be nice to have a gui I could search but just grepping a big 
(compressed?) index file from a dom0 term i guess would be workable?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/be748dba-ebb8-123c-c24a-f0b280a468ca%40posteo.co.


[qubes-users] Possible to run something like recoll in dom0 to index appvms?

2020-12-23 Thread Stumpy
I try to be organized and make sure all files are in the appvms they are 
supposed to be but while it works most of the time it doesnt always.


As a result I was wondering if it was possible (aknowledging one would 
have to trust recoll, its in the fedora repo for what thats worth) if it 
was possible to install recoll in dom0 and have it search/index files in 
the different appVMs?


I am also open to using something a bit safer (starting somewhere along 
the lines of ls -l > bigindexfile.txt maybe?) so any suggestions would 
be really apprecaited.


It would be nice to have a gui I could search but just grepping a big 
(compressed?) index file from a dom0 term i guess would be workable?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63093dde-7f86-1a46-3db5-3e3ddd339804%40posteo.co.


Re: [EXT] [qubes-users] crontab backups?

2020-12-21 Thread Stumpy

On 12/20/20 6:54 PM, Ulrich Windl wrote:

On 12/17/20 2:32 PM, Stumpy wrote:
I havent played with crontab in forever, and I cant code at all, but I 
really wanted to try to automate my backups a wee bit.


I made a basic script (qubackup) in the ~/ dom0 directory:
/home/bob/qvm-backup --yes --verbose --compress --passphrase-file 
~/PASSPHRASE_FILE.txt /run/media/bob/drobo/backups/ anon-whonix 
centos-7-minimal email chat work personal


and set crontab to run it every:
0 1 * * * /home/bob/qbackup

but it did not seem to work. I am able to run the script and the 
backup will run but when i try to do it via cron then nada?


Checked the syslog? Did you use "crontab -e" to setup the crontab?



The crond seems to be running and crontab -l shows the schedule I 
pasted above, Is there a reason this shouldn't work?






Thank you for the response. It actually ended up that cron did not like 
executing a script, I just put the exact same line from the script 
directly into cron.


Now I just need to understand how to setup things to delete backups 
older than X


Cheers

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0b47be2-6ada-d914-0ee6-da7d9f44c64e%40posteo.co.


Re: [qubes-users] Installing Rofi on dom0 via contributed packages?

2020-12-19 Thread Stumpy

On 12/19/20 8:21 AM, Stumpy wrote:

On 12/17/20 2:38 PM, Rusty Bird wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Rusty Bird:

Stumpy:

On 12/16/20 2:40 PM, Frédéric Pierret wrote:

Fedora 32 version for qubes-tunnel is currently uploading to stable.



Error: Unable to find a match: qubes-tunnel

So perhaps its currently for fedora regular rather than minimal?


Regular and minimal use the same repo. You're still seeing that error
because the upload didn't go through:

https://github.com/QubesOS-contrib/updates-status/issues/21#issuecomment-747355040 



The Fedora 32 stable package is available now.

Rusty
-BEGIN PGP SIGNATURE-
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=A6uh
-END PGP SIGNATURE-


Thanks for the heads up; I was (per your link earlier) following git and 
tried it, as well as tried for centos7 as it seemed that had also been 
uploaded - but it seems something is still amiss, not sure if its my 
side or something else?


In fed32min I am getting this:

bash-5.0# sudo dnf install qubes-repo-contrib && sudo dnf update && sudo 
dnf upgrade && sudo dnf install qubes-tunnel

Last metadata expiration check: 0:00:29 ago on Sat Dec 19 08:15:23 2020.
Package qubes-repo-contrib-4.0.7-1.fc32.noarch is already installed.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:00:37 ago on Sat Dec 19 08:15:23 2020.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:00:45 ago on Sat Dec 19 08:15:23 2020.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:00:52 ago on Sat Dec 19 08:15:23 2020.
No match for argument: qubes-tunnel
Error: Unable to find a match: qubes-tunnel
bash-5.0# sudo dnf install tunnel
Last metadata expiration check: 0:01:28 ago on Sat Dec 19 08:15:23 2020.
No match for argument: tunnel
Error: Unable to find a match: tunnel

Thoughts?


PS I am also getting a different but similar error for installing rofi 
in dom0 (can paste it but it seems to be saying it cant find either rofi 
nor qubes-rofi)


Thanks!




Oi!! Sorry, centos7 installs ok but getting it to work does not seem to 
be working as smoothly as it did on fed31min... a separate question i 
guess wanted to correct myself so no needless looking over centos7 for 
qtunnel install was done


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ac7156b-378a-4b9f-0888-f09c0115cd44%40posteo.co.


Re: [qubes-users] Installing Rofi on dom0 via contributed packages?

2020-12-19 Thread Stumpy

On 12/17/20 2:38 PM, Rusty Bird wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Rusty Bird:

Stumpy:

On 12/16/20 2:40 PM, Frédéric Pierret wrote:

Fedora 32 version for qubes-tunnel is currently uploading to stable.



Error: Unable to find a match: qubes-tunnel

So perhaps its currently for fedora regular rather than minimal?


Regular and minimal use the same repo. You're still seeing that error
because the upload didn't go through:

https://github.com/QubesOS-contrib/updates-status/issues/21#issuecomment-747355040


The Fedora 32 stable package is available now.

Rusty
-BEGIN PGP SIGNATURE-
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=A6uh
-END PGP SIGNATURE-


Thanks for the heads up; I was (per your link earlier) following git and 
tried it, as well as tried for centos7 as it seemed that had also been 
uploaded - but it seems something is still amiss, not sure if its my 
side or something else?


In fed32min I am getting this:

bash-5.0# sudo dnf install qubes-repo-contrib && sudo dnf update && sudo 
dnf upgrade && sudo dnf install qubes-tunnel

Last metadata expiration check: 0:00:29 ago on Sat Dec 19 08:15:23 2020.
Package qubes-repo-contrib-4.0.7-1.fc32.noarch is already installed.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:00:37 ago on Sat Dec 19 08:15:23 2020.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:00:45 ago on Sat Dec 19 08:15:23 2020.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:00:52 ago on Sat Dec 19 08:15:23 2020.
No match for argument: qubes-tunnel
Error: Unable to find a match: qubes-tunnel
bash-5.0# sudo dnf install tunnel
Last metadata expiration check: 0:01:28 ago on Sat Dec 19 08:15:23 2020.
No match for argument: tunnel
Error: Unable to find a match: tunnel

Thoughts?


PS I am also getting a different but similar error for installing rofi 
in dom0 (can paste it but it seems to be saying it cant find either rofi 
nor qubes-rofi)


Thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d0e72f77-0fe2-a3e8-b085-e41596bd93ab%40posteo.co.


Re: [qubes-users] crontab backups?

2020-12-17 Thread Stumpy

On 12/17/20 8:47 AM, haaber wrote:

On 12/17/20 2:32 PM, Stumpy wrote:

I havent played with crontab in forever, and I cant code at all, but I
really wanted to try to automate my backups a wee bit.

I made a basic script (qubackup) in the ~/ dom0 directory:
/home/bob/qvm-backup --yes --verbose --compress --passphrase-file
~/PASSPHRASE_FILE.txt /run/media/bob/drobo/backups/ anon-whonix
centos-7-minimal email chat work personal

and set crontab to run it every:
0 1 * * * /home/bob/qbackup

but it did not seem to work. I am able to run the script and the backup
will run but when i try to do it via cron then nada?

The crond seems to be running and crontab -l shows the schedule I pasted
above, Is there a reason this shouldn't work?


I am no cron-expert, but in my exoerience cron and scripts often mess.
One reason seems " pipes " in scripts that usually fail when cron'ed.
Have a look at these "|" in the script and re-code them pipe-free -- to
my opinion that would be a good starting point. cheers



Thanks!
I didnt realize that cron and scripts didnt mix, I just put one long 
line into cron and it has started up!

Much appreciated!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a2436114-1068-5a0f-8926-375a7ec4279d%40posteo.co.


[qubes-users] crontab backups?

2020-12-17 Thread Stumpy
I havent played with crontab in forever, and I cant code at all, but I 
really wanted to try to automate my backups a wee bit.


I made a basic script (qubackup) in the ~/ dom0 directory:
/home/bob/qvm-backup --yes --verbose --compress --passphrase-file 
~/PASSPHRASE_FILE.txt /run/media/bob/drobo/backups/ anon-whonix 
centos-7-minimal email chat work personal


and set crontab to run it every:
0 1 * * * /home/bob/qbackup

but it did not seem to work. I am able to run the script and the backup 
will run but when i try to do it via cron then nada?


The crond seems to be running and crontab -l shows the schedule I pasted 
above, Is there a reason this shouldn't work?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fd966dd9-a1e9-e60f-4f43-f8d7d59be6c7%40posteo.co.


Re: [qubes-users] Installing Rofi on dom0 via contributed packages?

2020-12-17 Thread Stumpy

On 12/16/20 2:40 PM, Frédéric Pierret wrote:



Le 12/16/20 à 7:42 PM, Stumpy a écrit :

On 12/16/20 1:26 PM, Rusty Bird wrote:

Stumpy:

[bob@dom0 ~]$ sudo qubes-dom0-update qubes-rofi

[...]

No Match for argument qubes-rofi


The package is called just "rofi":
https://contrib.qubes-os.org/yum/r4.0/current/dom0/fc25/rpm/


which seems to be similar to an error i get when i try to
install qubes-tunnel in a fed32 minimal template?


Looks like qubes-tunnel is in Fedora 32 current-testing, but hasn't
been uploaded to current yet:

https://contrib.qubes-os.org/yum/r4.0/current-testing/vm/fc32/rpm/
https://contrib.qubes-os.org/yum/r4.0/current/vm/fc32/rpm/
https://github.com/QubesOS-contrib/updates-status/issues?q=tunnel+r4.0+fc32 



Rusty

 >
 >
Oi. That was too simple, can't belive I didnt try just "rofi" thanks 
for that.


As for fed32/tunnel, thanks I will follow those git status for it.

Much appreciated!!



Fedora 32 version for qubes-tunnel is currently uploading to stable. 
Sorry for the delay :)


Best,
Frédéric



Thanks for much for that!
So does this mean I should be able to install qubes-tunnel now? I just 
ask because when i try i get:


Last metadata expiration check: 0:08:09 ago on Thu Dec 17 06:17:34 2020.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:08:31 ago on Thu Dec 17 06:17:34 2020.
Dependencies resolved.
Nothing to do.
Complete!
Last metadata expiration check: 0:08:49 ago on Thu Dec 17 06:17:34 2020.
No match for argument: qubes-tunnel
Error: Unable to find a match: qubes-tunnel

So perhaps its currently for fedora regular rather than minimal?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/48c99139-fa3c-4aea-cc66-11f2e983d0c9%40posteo.co.


Re: [qubes-users] Installing Rofi on dom0 via contributed packages?

2020-12-16 Thread Stumpy

On 12/16/20 1:26 PM, Rusty Bird wrote:

Stumpy:

[bob@dom0 ~]$ sudo qubes-dom0-update qubes-rofi

[...]

No Match for argument qubes-rofi


The package is called just "rofi":
https://contrib.qubes-os.org/yum/r4.0/current/dom0/fc25/rpm/


which seems to be similar to an error i get when i try to
install qubes-tunnel in a fed32 minimal template?


Looks like qubes-tunnel is in Fedora 32 current-testing, but hasn't
been uploaded to current yet:

https://contrib.qubes-os.org/yum/r4.0/current-testing/vm/fc32/rpm/
https://contrib.qubes-os.org/yum/r4.0/current/vm/fc32/rpm/
https://github.com/QubesOS-contrib/updates-status/issues?q=tunnel+r4.0+fc32

Rusty

>
>
Oi. That was too simple, can't belive I didnt try just "rofi" thanks for 
that.


As for fed32/tunnel, thanks I will follow those git status for it.

Much appreciated!!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d49c381-27d4-8e30-9807-069d2e9516b3%40posteo.co.


[qubes-users] Installing Rofi on dom0 via contributed packages?

2020-12-16 Thread Stumpy

So i tried, and think I suceeded in installing qubes-repo-contrib on dom0:

[bob@dom0 ~]$ sudo qubes-dom0-update qubes-repo-contrib
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...
fedora/metalink | 6.4 kB 
00:00
fedora  | 4.3 kB 
00:00
fedora/primary_db   |  26 MB 
01:41
qubes-contrib-dom0-r4.0-current | 3.0 kB 
00:00
qubes-contrib-dom0-r4.0-current/primary_db  |  16 kB 
00:00
qubes-dom0-current/metalink | 2.7 kB 
00:00
https://mirrors.phx.ms/qubes/repo/yum/r4.0/current/dom0/fc25/repodata/repomd.xml: 
[Errno 14] curl#6 - "Could not resolve host: mirrors.phx.ms"

Trying other mirror.
qubes-dom0-current  | 3.8 kB 
00:00
qubes-dom0-current/primary_db   | 352 kB 
00:01
qubes-templates-itl/metalink| 2.7 kB 
00:00
qubes-templates-itl | 3.0 kB 
00:00 qubes-repo-contrib
https://mirror.hackingand.coffee/qubes/repo/yum/r4.0/templates-itl/repodata/repomd.xml: 
[Errno -1] repomd.xml does not match metalink for qubes-templates-itl

Trying other mirror.
qubes-templates-itl | 3.0 kB 
00:00
qubes-templates-itl/primary_db  | 6.9 kB 
00:00
updates/metalink| 5.5 kB 
00:00
updates | 4.7 kB 
00:00
updates/primary_db  |  12 MB 
00:46

--> Running transaction check
---> Package qubes-repo-contrib.noarch 0:4.0.6-1.fc25 will be reinstalled
--> Finished Dependency Resolution
qubes-repo-contrib-4.0.6-1.fc25.noarch.rpm  |  11 kB 
00:00
Successfully verified 
/var/lib/qubes/dom0-updates/packages/qubes-repo-contrib-4.0.6-1.fc25.noarch.rpm
Qubes OS Repository for Dom0 
  25 
MB/s |  26 kB 00:00
Package qubes-repo-contrib-4.0.6-1.fc25.noarch is already installed, 
skipping.

Dependencies resolved.
Nothing to do.
Complete!

But when I then try to install rofi I get:
[bob@dom0 ~]$ sudo qubes-dom0-update qubes-rofi
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

No Match for argument qubes-rofi
Nothing to download

so, assuming I was typing the correct thing in dom0, I am not sure what 
to make of the error (which seems to be similar to an error i get when i 
try to install qubes-tunnel in a fed32 minimal template?


Thoughts?



btw, I am getting pretty much the same when i try from scratch in a dispVM

[user@disp3219 ~]$ sudo dnf install qubes-repo-contrib
Fedora Modular 32 - x86_64 - Updates 10 kB/s |  14 kB 
00:01
Fedora 32 - x86_64 - Updates 17 kB/s |  13 kB 
00:00
Fedora 32 - x86_64 - Updates1.5 MB/s | 7.4 MB 
00:05

Dependencies resolved.

 PackageArchitecture 
   Version 
Repository Size


Installing:
 qubes-repo-contrib noarch 
   4.0.7-1.fc32 
qubes-vm-r4.0-current  10 k


Transaction Summary

Install  1 Package

Total download size: 10 k
Installed size: 2.2 k
Is this ok [y/N]: y
Downloading Packages:
qubes-repo-contrib-4.0.7-1.fc32.noarch.rpm 


   9.4 kB/s |  10 kB 00:01

Total 


   9.4 kB/s |  10 kB 00:01
Running transaction check
Transaction check succeeded.
Running transaction test
Transaction test succeeded.
Running transaction
  Preparing: 


1/1
  Installing   : qubes-repo-contrib-4.0.7-1.fc32.noarch 


  

[qubes-users] Installing qubes-tunnel on fedora-32-minimal?

2020-12-16 Thread Stumpy
Firstly, I was able to get the user contrib qubes tunnel going on a 
fedora-32-minmal template and it was great! (great meaning so much 
easier than the more manual methods; though its still not clear to me if 
it includes a kill switch)


The problem is fed31 has reached EOL so I wanted to install it on a 
fed32 template so I started with (actually I installed it earlier but 
wanted to show that it is indeed installed):


bash-5.0# sudo dnf install qubes-repo-contrib
Last metadata expiration check: 0:45:12 ago on Wed Dec 16 11:23:25 2020.
Package qubes-repo-contrib-4.0.7-1.fc32.noarch is already installed.
Dependencies resolved.
Nothing to do.
Complete!


Then I tried to install the qubes-tunnel:

bash-5.0# sudo dnf install qubes-tunnel
Last metadata expiration check: 0:45:27 ago on Wed Dec 16 11:23:25 2020.
No match for argument: qubes-tunnel
Error: Unable to find a match: qubes-tunnel



I also tried to install qubes-tunnel on the proxyvm for sh*t and giggles 
but that didnt work either (same error). I looked in the /user/lib/qubes 
dir and qubes-tunnel wasnt there which explains why I get the error:


bash-5.0# sudo /usr/lib/qubes/qtunnel-setup --config
sudo: /usr/lib/qubes/qtunnel-setup: command not found

when i try to run it.

Thoughts?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c17d34fa-40fb-92ff-2da9-e1f4719ca64c%40posteo.co.


Re: [qubes-users] ftp'ing to a computer on my LAN from an AppVM that is using a VPN proxyVM?

2020-12-16 Thread Stumpy

On 12/12/20 9:17 PM, unman wrote:

On Sat, Dec 12, 2020 at 02:47:49PM -0500, Stumpy wrote:

On 12/11/20 9:22 AM, unman wrote:

On Fri, Dec 11, 2020 at 08:56:20AM -0500, Stumpy wrote:

Is there a way to ftp to another computer on my LAN from a appvm that is
using a proxyvm?

I am able to ftp to other computers when I set this appvm to just use the
default firewall, but sometimes I forget to set it back to use a vpn vm; but
if I have the appvm using the vpn/proxy vm then I am unable to reach any of
the other computers on my LAN?

Please advise



Yes - you need to adjust the firewall rules on the vpn qube to direct
(ftp) traffic from the source ip to the local network - you could make
this *highly* specific by specifying the destination in the new rule.


pardon my ignorance but how would I do that? I know it would be in settings
-> firewall settings but after that it gets a bit fuzzy?


Well, you cant do it there, because you need to adjust the firewall
rules implemented ON the vpn qube.




What method are you using to set up the vpn?



I used the new community vpn setup



Right - but there are 2 methods outlined on that github page (if that's what
you mean by community vpn) - 3 if you include "vpn on sys-net". Did you
follow the "iptables and CLI scripts" section?

There's an added issue that you will have to consider and that is the
nature of FTP connections - when a client connects to a server, the
server may create a link back to a port specified in the original
connection: this is non-passive(active) ftp. If your FTP server does
this then you will have to enable a route through to the client qube.

The client may instead send a PASV command - then the server *may* send
back a listening port number, and the client will create a link to that
port.

So there are 4 possibilities, and the firewall rules you need will
depend on what are the capabilities of the server. Best check on that.




Thanks unman,
I used the Qubes OS contributed package "qubes tunnel".
I am not sure about my server, is there a "standard" way to check that? 
(the server is running unraid, which is/was based on slackware so am 
hoping there might be a way to check that would work on most distros?).


For the iptables and cli scripts part, would that still apply to using 
the "qubes tunnel" setup option?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f227bb4d-f576-8155-2683-90c1e0692b0d%40posteo.co.


Re: [qubes-users] ftp'ing to a computer on my LAN from an AppVM that is using a VPN proxyVM?

2020-12-12 Thread Stumpy

On 12/11/20 9:22 AM, unman wrote:

On Fri, Dec 11, 2020 at 08:56:20AM -0500, Stumpy wrote:

Is there a way to ftp to another computer on my LAN from a appvm that is
using a proxyvm?

I am able to ftp to other computers when I set this appvm to just use the
default firewall, but sometimes I forget to set it back to use a vpn vm; but
if I have the appvm using the vpn/proxy vm then I am unable to reach any of
the other computers on my LAN?

Please advise



Yes - you need to adjust the firewall rules on the vpn qube to direct
(ftp) traffic from the source ip to the local network - you could make
this *highly* specific by specifying the destination in the new rule.


pardon my ignorance but how would I do that? I know it would be in 
settings -> firewall settings but after that it gets a bit fuzzy?



What method are you using to set up the vpn?



I used the new community vpn setup

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7ba79473-0952-6613-261b-3b91422171f5%40posteo.co.


[qubes-users] ftp'ing to a computer on my LAN from an AppVM that is using a VPN proxyVM?

2020-12-11 Thread Stumpy
Is there a way to ftp to another computer on my LAN from a appvm that is 
using a proxyvm?


I am able to ftp to other computers when I set this appvm to just use 
the default firewall, but sometimes I forget to set it back to use a vpn 
vm; but if I have the appvm using the vpn/proxy vm then I am unable to 
reach any of the other computers on my LAN?


Please advise

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5dd706a8-5719-d371-01ca-c6c64ea81b37%40posteo.co.


Re: [qubes-users] Re: Someone should port this RDP Windows windower thing for Qubes

2020-12-01 Thread Stumpy

On 12/1/20 8:47 AM, Alex Smirnoff wrote:
It would be an ideal solution for me. And should not be very hard. What 
rdp client are they based on?


On Tuesday, December 1, 2020 at 1:57:50 AM UTC+2 Guerlan wrote:


This project:
https://github.com/Fmstrat/winapps/

does what Qubes do to Linux and Windows 7, but to Windows 10 on KVM,
by using RDP. Not the best approach but no one is working on the
Windows 10 port of the windowing thing. Maybe some people could work
on porting this to Qubes, and maybe some prople from Qubes could
direct funds to this.
I even opened an issue about this:
https://github.com/Fmstrat/winapps/issues/112

I miss using Windows properly when I work on Qubes.
Would be nice if people from here could make some noise there to
bring attention :)

--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/27ab7304-266c-4b4c-b6e4-d96d55ae1071n%40googlegroups.com 
.


Indeed does look quite intereseting, currently I run a separate machine 
and have an appvm where I rdp to my remote win10 setup... but this would 
be much less wonky than what I have


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f63a3cf2-bb6b-9a6a-e19a-6c7010220bd2%40posteo.net.


Re: [qubes-users] PCIE gen 4 m.2 cards supported?

2020-11-11 Thread Stumpy

On 11/10/20 2:10 PM, 'Totally Zoid' via qubes-users wrote:

I can't answer your question for certain, I changed my disk and CPU at the same 
time. It takes me ~10 sec to start a disposable Firefox, from clicking on the 
start menu entry to the window popping up (with about 20 VMs running in the 
background and no heatsink on the SSD).

I used to have an i5 and a 5400rpm drive and it was slow as hell, I couldn't 
even start two VMs at the same time without one of them crashing. Then a couple 
years ago I upgraded to Ryzen 7 and a gen3x4 SSD and while things aren't quite 
as instant as I'd like, it's good.

I dunno if you're running / can run at full speed a NVMe drive with the chipset 
you're on. If not your CPU might be bottlenecking your disk speed, not just 
your code execution speed. If you're upgrading the CPU you'll have to buy a new 
motherboard, which is roughly $150 for Ryzens.


Sent with ProtonMail Secure Email.

‐‐‐ Original Message ‐‐‐
On Tuesday, November 10, 2020 6:13 PM, Stumpy  wrote:


Thanks for the response!

Regarding not being able to tell the difference, I have an older system
(Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz w 32gb mem) with a fairly
new/fast Samsung ssd I got this year but it still takes over 20 sec to
start up a firefox in a fed32 dvm, is that normal? Is it most likely
that the majority of the slowness is attributable to my ancient proc?

I just want to get a clear idea of where I should focus my spending,
that is on a CPU, faster drives, etc.

Thanks in advance!




Thanks for the response.
I figure my cpu is likely at least alittle bit of a bottle neck, i just 
dont know how much of a bottleneck but the confirmation is helpful.


I havent bothered with m.2 on my current setup as I am sure there is 
something that would slow it down and make the whole thing moot.


I'd be curious to know what mobo you are using with your amd ryzen? In 
general I am seriously considering going the AMD route but thats only if 
I can be reasonably sure it'll "just work"


Cheers

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/04062bdc-f20b-8dd5-8dd8-535af756a0c4%40posteo.net.


Re: [qubes-users] PCIE gen 4 m.2 cards supported?

2020-11-10 Thread Stumpy

On 11/10/20 5:41 AM, Zrubi wrote:

On 11/8/20 4:38 PM, Stumpy wrote:

I was listening to the ubuntu podcast and one of the guys there
mentioned he just setup his new computer with a PCIE gen4 m.2 card which
enabled him to run 4 m.2 drives at the same time, he also squeezed more
performance out of it by doing raid 0 across the 4 drives.


Theoretically, and in some test cases, maybe...


Asides from the risk of loosing data, does/would #1 Qubes support pcie
gen4? #2 Is is possible to (if the hardware doesnt support it for some
strange reason) to do raid0 across 4 drives on a pcie m.2 card?


Not as strange as you thing... as usually those RAID features are
meaning windonws only software raid.
So in practice, there is no (or at least very rare) hardware RAID on a
desktop board.

on Qubes (or in Linux in general) you can safely relay on software raid
not the one your motherboard suggest, but what the Linux kernel (even
the fedora installer) provides you


I am not in a huge hurry to upgrade but when i do i am keen on getting a
storage option that will make my qubes setup fairly fast and i assume
that with a super fast drive setup it would be able to sping up appvms
faster?


In practice (like appvm startup times), you can't even tell if your
system runs from a SATA SSD or from an NVME m.2 SSD. Imagine the much
less theoretical speed difference you may get using a PCI gen 4 device



Thanks for the response!

Regarding not being able to tell the difference, I have an older system 
(Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz w 32gb mem) with a fairly 
new/fast Samsung ssd I got this year but it still takes  over 20 sec to 
start up a firefox in a fed32 dvm, is that normal? Is it most likely 
that the majority of the slowness is attributable to my ancient proc?


I just want to get a clear idea of where I should focus my spending, 
that is on a CPU, faster drives, etc.


Thanks in advance!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3b248bb-dbb7-25d8-cc65-317ae7d2f0fd%40posteo.net.


Re: [qubes-users] PCIE gen 4 m.2 cards supported?

2020-11-09 Thread Stumpy

On 11/8/20 11:38 AM, Stumpy wrote:
I was listening to the ubuntu podcast and one of the guys there 
mentioned he just setup his new computer with a PCIE gen4 m.2 card which 
enabled him to run 4 m.2 drives at the same time, he also squeezed more 
performance out of it by doing raid 0 across the 4 drives.


Asides from the risk of loosing data, does/would #1 Qubes support pcie 
gen4? #2 Is is possible to (if the hardware doesnt support it for some 
strange reason) to do raid0 across 4 drives on a pcie m.2 card?


I am not in a huge hurry to upgrade but when i do i am keen on getting a 
storage option that will make my qubes setup fairly fast and i assume 
that with a super fast drive setup it would be able to sping up appvms 
faster?





Another, perhaps more basic question, is anyone running qubes on a pci-e 
gen 4 enabled motherboard? (and able to take, more or less, full 
advantage of its speed).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ac4646b5-701f-3142-c14b-6b0a6da8a28d%40posteo.net.


[qubes-users] specifying specific dspvm when opening links/files in another appvm?

2020-11-09 Thread Stumpy
I currently have a desktop file in some of my appvms to open links and 
files using the default dspvm. How can I specify an alternate, ie not 
default, dspvm like the whonix dvm, to handle links/files?


This is what I currently have:

[Desktop Entry]
Encoding=UTF-8
Name=BrowserVM
Exec=qvm-open-in-dvm %u
Terminal=false
X-MultipleArgs=false
Type=Application
Categories=Network;WebBrowser;
MimeType=x-scheme-handler/unknown;x-scheme-handler/about;text/html;text/xml;application/xhtml+xml;application/xml;application/vnd.mozilla.xul+xml;application/rss+xml;application/rdf+xml;image/gif;image/jpeg;image/png;x-scheme-handler/http;x-scheme-handler/https;

Thanks in advance!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/748bc6c7-750b-5231-565d-e36bd97a1b87%40posteo.net.


[qubes-users] PCIE gen 4 m.2 cards supported?

2020-11-08 Thread Stumpy
I was listening to the ubuntu podcast and one of the guys there 
mentioned he just setup his new computer with a PCIE gen4 m.2 card which 
enabled him to run 4 m.2 drives at the same time, he also squeezed more 
performance out of it by doing raid 0 across the 4 drives.


Asides from the risk of loosing data, does/would #1 Qubes support pcie 
gen4? #2 Is is possible to (if the hardware doesnt support it for some 
strange reason) to do raid0 across 4 drives on a pcie m.2 card?


I am not in a huge hurry to upgrade but when i do i am keen on getting a 
storage option that will make my qubes setup fairly fast and i assume 
that with a super fast drive setup it would be able to sping up appvms 
faster?



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d64a237-e0bf-a914-4482-47d99183bbce%40posteo.net.


[qubes-users] how much space is what using?

2020-11-05 Thread Stumpy
I am trying to figure out how to claw back some space on my hard drive 
but am having a really hard time understanding what is taking up how 
much space?


For example, I have one appvm that in the qubes manager is showing disk 
usage as 173000MiB

sudo Baoab is showing me that / is using:
10.5gb
and df -f is showing me that / is using
11gb with 500gb free

and when i try to reduce private storage anything less than it is 
already (it is set to 55gb) the settings wont let me, I change it, 
hit apply and it goes back to 55gb, no matter if i try to change it 
by 1 or 100gb, also regardless of if i have the appvm shutdown or not?


Am having a really hard time understanding this so any clarification 
would be appreciated!


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d10c0e8e-9444-14fb-ddb5-611b5b3bbfaa%40posteo.net.


Re: [qubes-users] Announcement: "Qubes OS contributed packages are now available" by Marek Marczykowski-Górecki

2020-11-04 Thread Stumpy

On 11/4/20 6:50 AM, Frédéric Pierret wrote:



Le 11/4/20 à 12:35 PM, Stumpy a écrit :

On 11/4/20 6:18 AM, Frédéric Pierret wrote:



Le 11/4/20 à 11:39 AM, Stumpy a écrit :

On 11/3/20 6:00 PM, Andrew David Wong wrote:

On 11/3/20 7:48 AM, Stumpy wrote:

On 10/5/20 9:00 PM, Andrew David Wong wrote:

Dear Qubes Community,

Marek has just published the following announcement:

https://www.qubes-os.org/news/2020/10/05/qubes-os-contributed-packages/ 



[...]


So do I understand this currently is only available for Fed31? and 
not 32?


I don't recall hearing that anywhere, and I can think of no reason 
why it would be true.


That was mentioned in one of the chat rooms but if true, and Fed31 
is reaching EOL is there and ETA on when the contributed-packages 
will be available for Fed32?


As far as I know, the repos should already work on Fedora 32.

For the compatibility of the packages themselves, you'll have to 
check the package details, but I imagine that most, if not all, 
should be compatible.


P.S. -- Please don't reply to multiple lists.



Thank you, I will give it a try again. I just asked because I was 
able to get it to work with Fed31 but not Fed32 (tried Fed32 when 
the com packages were first made available".


Regarding the replies, my apologies, I just mindlessly clicked 
"reply all".




Packages should be available (or almost) for Fedora 32.

Please note this is a community effort. Authors of contribution 
package are kindly asked to help into maintaining or fixing build 
issues. Any package normally has a Github issue. I'm currently 
referencing all packages with extras info into a JSON here: 
https://github.com/QubesOS-contrib/qubes-contrib-configs/blob/master/packages.json. 



Regards,
Frédéric



Please dont mistake my questions for ingratitude, I very very much 
appreciate the community effort!


Sure no problem, don't worry I did not take it as is. I was answering 
that to make precise the original announcement how we ask for help for 
this part.


A quick general question, you mentioned "almost", so does that mean 
that this community packages is distro ver dependent? Also, is there a 
way for users to be able to tell if a package is available yet for 
whichever template? (I am quite looking forward to trying rofi on my 
qubes4.0 setup!)


In a general manner, when we trigger build for a component, it launches 
build for every dist and versions. "Almost" here means possible build 
failure to be solved.


Regardless, I was in *awe* of how easy it was to setup the vpn proxy 
using the community qubes-tunnel package, albeit on fed31 (which is 
totally fine with me for now). Thank you all for this as I literally 
spent hours on previous installs trying to figure, and re-figure out 
how to do it!


I recently added Fedora 32 to distribution to be built into contrib 
(sorry for the late) and I'm triggering build (and fixing some issues) 
for every components since few days. I've launched the one for 
`qubes-tunnel` and Fedora 32 just now.


Regards,
Frédéric


Sweeet! Thank you just doesnt say it but, thank you!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3e74f8d5-7ce1-06e0-114b-b321c5986607%40posteo.net.


Re: [qubes-users] Announcement: "Qubes OS contributed packages are now available" by Marek Marczykowski-Górecki

2020-11-04 Thread Stumpy

On 11/4/20 6:18 AM, Frédéric Pierret wrote:



Le 11/4/20 à 11:39 AM, Stumpy a écrit :

On 11/3/20 6:00 PM, Andrew David Wong wrote:

On 11/3/20 7:48 AM, Stumpy wrote:

On 10/5/20 9:00 PM, Andrew David Wong wrote:

Dear Qubes Community,

Marek has just published the following announcement:

https://www.qubes-os.org/news/2020/10/05/qubes-os-contributed-packages/ 



[...]


So do I understand this currently is only available for Fed31? and 
not 32?


I don't recall hearing that anywhere, and I can think of no reason 
why it would be true.


That was mentioned in one of the chat rooms but if true, and Fed31 
is reaching EOL is there and ETA on when the contributed-packages 
will be available for Fed32?


As far as I know, the repos should already work on Fedora 32.

For the compatibility of the packages themselves, you'll have to 
check the package details, but I imagine that most, if not all, 
should be compatible.


P.S. -- Please don't reply to multiple lists.



Thank you, I will give it a try again. I just asked because I was able 
to get it to work with Fed31 but not Fed32 (tried Fed32 when the com 
packages were first made available".


Regarding the replies, my apologies, I just mindlessly clicked "reply 
all".




Packages should be available (or almost) for Fedora 32.

Please note this is a community effort. Authors of contribution package 
are kindly asked to help into maintaining or fixing build issues. Any 
package normally has a Github issue. I'm currently referencing all 
packages with extras info into a JSON here: 
https://github.com/QubesOS-contrib/qubes-contrib-configs/blob/master/packages.json. 



Regards,
Frédéric



Please dont mistake my questions for ingratitude, I very very much 
appreciate the community effort!


A quick general question, you mentioned "almost", so does that mean that 
this community packages is distro ver dependent? Also, is there a way 
for users to be able to tell if a package is available yet for whichever 
template? (I am quite looking forward to trying rofi on my qubes4.0 setup!)


Regardless, I was in *awe* of how easy it was to setup the vpn proxy 
using the community qubes-tunnel package, albeit on fed31 (which is 
totally fine with me for now). Thank you all for this as I literally 
spent hours on previous installs trying to figure, and re-figure out how 
to do it!


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a442d4c1-4d02-5978-b568-579509ae262c%40posteo.net.


Re: [qubes-users] Announcement: "Qubes OS contributed packages are now available" by Marek Marczykowski-Górecki

2020-11-04 Thread Stumpy

On 11/3/20 6:00 PM, Andrew David Wong wrote:

On 11/3/20 7:48 AM, Stumpy wrote:

On 10/5/20 9:00 PM, Andrew David Wong wrote:

Dear Qubes Community,

Marek has just published the following announcement:

https://www.qubes-os.org/news/2020/10/05/qubes-os-contributed-packages/

[...]


So do I understand this currently is only available for Fed31? and not 
32?


I don't recall hearing that anywhere, and I can think of no reason why 
it would be true.


That was mentioned in one of the chat rooms but if true, and Fed31 is 
reaching EOL is there and ETA on when the contributed-packages will be 
available for Fed32?


As far as I know, the repos should already work on Fedora 32.

For the compatibility of the packages themselves, you'll have to check 
the package details, but I imagine that most, if not all, should be 
compatible.


P.S. -- Please don't reply to multiple lists.



Thank you, I will give it a try again. I just asked because I was able 
to get it to work with Fed31 but not Fed32 (tried Fed32 when the com 
packages were first made available".


Regarding the replies, my apologies, I just mindlessly clicked "reply all".

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cb6f0513-e3a2-323f-bbbe-814e4d315cec%40posteo.net.


Re: [qubes-users] TachyonVpn instead of OpenVPN

2020-11-03 Thread Stumpy

On 10/3/20 7:48 AM, load...@gmail.com wrote:


Does anybody tried to test on Linux the Tachyon Vpn 
(https://tachyon.eco/) in the chain like AppVM Network for Qubes?


As I understood this is VPN based on Blockchain technology.

--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75d2c659-4d4c-4b9a-9f96-54671c09ef16n%40googlegroups.com 
.


I have no idea, though while "blockchain" is waaay overused the 
decentralization aspect is interesting. There is also 
https://www.orchid.com/ which seems to be similar.


Would be interesting to have one of the qubes sec gurus weigh in on the 
security part of this (I believe Joanna Rutkowska, founder of Qubes, now 
works on a different-yet-blockchain project Golem?).


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/92ab270d-1261-5212-713d-2fbda70d38d3%40posteo.net.


Re: [qubes-users] Announcement: "Qubes OS contributed packages are now available" by Marek Marczykowski-Górecki

2020-11-03 Thread Stumpy

On 10/5/20 9:00 PM, Andrew David Wong wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear Qubes Community,

Marek has just published the following announcement:

https://www.qubes-os.org/news/2020/10/05/qubes-os-contributed-packages/

The plain text of this announcement is reproduced below.

==

"Qubes OS contributed packages are now available"
by Marek Marczykowski-Górecki

We are happy to announce the availability of Qubes OS contributed packages 
under the [QubesOS-contrib] GitHub Project. This is a place where our community 
can [contribute Qubes OS related packages, additions and various 
customizations][package-contrib]. Meanwhile, we provide the infrastructure and 
[review process] necessary to make them available easily and safely to users 
within standard Qubes installations.

[Frédéric Pierret] built the infrastructure based on a similar setup for 
building official packages. This means that it features the same [Qubes build 
security] measures, including keeping the signing keys separate in a dedicated 
VM, downloading packages over Tor, publishing build logs in a non-spoofable way 
and more. Frédéric is also the maintainer of [QubesOS-contrib].
The source code repositories of the packages and infrastructure-related parts 
are also hosted under [QubesOS-contrib].

To contribute a package, follow the process described at [package 
contributions]. You will find a few helpful tips there, including a [skeleton 
repository] with example RPM packaging and [Qubes Builder] integration.
Since the project has been running for some time already, there are already 
some submitted packages available there. To name a few:

  - [qubes-tunnel]
  - [qvm-screenshot-tool]
  - [qmenu]

You can find the full list at [QubesOS-contrib].

If you want to install one of these packages, first you need to enable the 
repository in your system (dom0 and/or templates). This can be done by 
installing the `qubes-repo-contrib` package. This package includes the 
repository definition and keys necessary to download, verify, and install 
[QubesOS-contrib] packages.

In dom0, use `qubes-dom0-update`:

 sudo qubes-dom0-update qubes-repo-contrib

In a Fedora-based template, use `dnf`:

 sudo dnf install qubes-repo-contrib

In a Debian-based template, use `apt`:

 sudo apt update && sudo apt install qubes-repo-contrib


[QubesOS-contrib]: https://github.com/QubesOS-contrib/
[package-contrib]: https://www.qubes-os.org/doc/package-contributions/
[review process]: 
https://www.qubes-os.org/doc/package-contributions/#review-procedure
[Frédéric Pierret]: https://www.qubes-os.org/team/#fr%C3%A9d%C3%A9ric-pierret
[Qubes build security]: https://www.qubes-os.org/news/2016/05/30/build-security/
[package contributions]: https://www.qubes-os.org/doc/package-contributions/
[skeleton repository]: https://github.com/QubesOS-contrib/qubes-skeleton/
[Qubes Builder]: https://www.qubes-os.org/doc/qubes-builder/
[qubes-tunnel]: https://github.com/QubesOS-contrib/qubes-tunnel
[qvm-screenshot-tool]: https://github.com/QubesOS-contrib/qvm-screenshot-tool
[qmenu]: https://github.com/QubesOS-contrib/qmenu

==

-BEGIN PGP SIGNATURE-
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=tYPp
-END PGP SIGNATURE-



So do I understand this currently is only available for Fed31? and not 
32? That was mentioned in one of the chat rooms but if true, and Fed31 
is reaching EOL is there and ETA on when the contributed-packages will 
be available for Fed32?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20c41c41-82cd-6319-f444-d9f5ebf5a217%40posteo.net.


Re: [qubes-users] Installing Qubes OS contributed packages? (rofi and tunnel packages)

2020-10-19 Thread Stumpy

On 10/17/20 6:17 PM, Jarrah wrote:



I just tried to install qubes-tunnel in a fedora template and that
also didnt work,

sudo dnf install qubes-repo-contrib && sudo dnf install qubes-tunnel



Try with `dnf install --refresh --enablerepo=qubes-repo-contrib
qubes-tunnel`. It may be that either the new metadata hasn't come down
(happens a lot on Debian, not so much fedora) or the repo isn't enabled
by default in the package.




Thanks for the suggestion, I get pretty much the same kind of error (in 
the template and in dom0 when trying to install rofi)


bash-5.0# sudo dnf install --refresh --enablerepo=qubes-repo-contrib 
qubes-tunnel

Error: Unknown repo: 'qubes-repo-contrib'

yet when I installed something (Sakura in this case) it clearly showed 
it was checking the contrib repo in addition to the other repos?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/1a4297fd-a795-a59f-d291-40ce6b58e7e5%40posteo.net.


Re: [qubes-users] Installing Qubes OS contributed packages? (rofi and tunnel packages)

2020-10-17 Thread Stumpy

On 10/16/20 8:16 AM, Stumpy wrote:

Hi, a few questions about the contributed packages.
I guess for starters, these shouldnt work in CentOS correct? (I assume 
this since there was only repo install instructions for fed, deb, and 
dom0).


I had wanted to try out rofi so I installed the repo in dom0, seemed to 
work just fine, but then i tried to install rofi, I tried every way i 
could like

sudo qubes-dom0-updates qubes-rofi
sudo qubes-dom0-updates rofi
sudo qubes-dom0-updates --action=install qubes-rofi
sudo qubes-dom0-updates --action=install rofi
sudo dnf install rofi
sudo dnf install qubes-rofi

and probably a few others i am forgetting but they all returned the same 
error, couldnt find the package? How does one correctly install in dom0?


I also wanted to try the to install the tunnel but am using centos 
minimal templates so I assume that was my problem there? (though 
normally I would just add the repo in the template, then install the 
tunnel package in the template correct?


Thank you for this, I am really hoping that some of these packages can 
help make some of the installation and configuration in qubes a bit 
easier!!




I just tried to install qubes-tunnel in a fedora template and that also 
didnt work,


sudo dnf install qubes-repo-contrib && sudo dnf install qubes-tunnel

adding the repo went fine, installing the package returned a package not 
found error


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c56a8040-86c8-8b47-7f7f-210f4d2366b4%40posteo.net.


[qubes-users] Kill switch on the Qubes OS contributed package tunnel package?

2020-10-16 Thread Stumpy

Chris,
Since i think the package was forked from your work I thought I would 
ask if you knew if the package included a kill switch? I noticed on your 
qubes github page it mentioned "fail close" which is the same thing? If 
yes, then i am guessing its safe to assume that the forked qubes package 
also includes a fail close/killswitch?

Thank you very much

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6e8f756e-01ff-338d-73d7-ddf9923048f6%40posteo.net.


[qubes-users] Installing Qubes OS contributed packages? (rofi and tunnel packages)

2020-10-16 Thread Stumpy

Hi, a few questions about the contributed packages.
I guess for starters, these shouldnt work in CentOS correct? (I assume 
this since there was only repo install instructions for fed, deb, and dom0).


I had wanted to try out rofi so I installed the repo in dom0, seemed to 
work just fine, but then i tried to install rofi, I tried every way i 
could like

sudo qubes-dom0-updates qubes-rofi
sudo qubes-dom0-updates rofi
sudo qubes-dom0-updates --action=install qubes-rofi
sudo qubes-dom0-updates --action=install rofi
sudo dnf install rofi
sudo dnf install qubes-rofi

and probably a few others i am forgetting but they all returned the same 
error, couldnt find the package? How does one correctly install in dom0?


I also wanted to try the to install the tunnel but am using centos 
minimal templates so I assume that was my problem there? (though 
normally I would just add the repo in the template, then install the 
tunnel package in the template correct?


Thank you for this, I am really hoping that some of these packages can 
help make some of the installation and configuration in qubes a bit easier!!


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe0f7b11-b0a7-cf12-918a-f97800b3946f%40posteo.net.


Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-15 Thread Stumpy

On 10/11/20 5:06 PM, Jarrah wrote:



First, thanks to Jarrah!
I inadvertantly booted my computer with my defucnt instalation plugged
in and it booted my desktop drive on my laptop... go figure, but
regardless I was now able to use Jarrah's response to mount and copy
over most of the appvms (actually just mounted, tar'd up the entire
thing, and saved to trusted ext drive). Thanks Jarrah!



Nice work. Glad it worked out for you.



Caveat though, two actually, a few of the appvms gave errors, most of
them were not hugely important appvms but the second issue (kinda) is
about the possbility of copying the whole appvm, more specifically I
have some vpn proxy vms which (for me) wasnt easy to setup so I was
hoping to copy the whole appvm over to the new installation... I have
tar'd the entire contents/configs of each of those vpn proxy vms but
wasnt sure if that would be sufficient?



The /rw/config directory (just /config in the private image you copied)
should be enough, depending on how you configured it. You should be able
to make a new VM, overwrite its files with these and reboot. Your VPN
should "just come up".



Thanks, unfortunately though for teh VPNs its not working, in that i go 
to something like ifconfig.co and it tells me i am ... well where I 
actually am. Is there a way to diagnose this? Or maybe its time to use 
the users contribution repo (or whatever it was called) as i noticed it 
had a package to setup a vpn, though it was not clear to me if it was 
taskett's version that had a kill swtich?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4b26b6d0-2b98-95b7-fd1a-a67a32123516%40posteo.net.


[qubes-users] Creating a sys-usb for my desktop?

2020-10-14 Thread Stumpy
I have recently had to reinstall qubes and I am at the point for making 
a sys-usb. I have a desktop and a usb keyboard so I thought I had 
previously just created one via sudo qubesctl state.sls qvm.sys-usb made 
it so it would NOT start on boot up and I would manually start it after 
logging in... well I just tried that and... locked myself out when i 
rebooted. I am 99.999% sure i selected for it to not start up at boot 
via qubes settings but I just want to make sure that the steps I (think) 
I took should leave me with a usable system... if yes i will assume that 
I had a brain fart and actually didnt set the sys-usb to not boot at 
startup.

Thx!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a058d444-491e-a9b8-561e-8817524672d8%40posteo.net.


Re: [qubes-users] Calling all humans! (from Nina)

2020-10-11 Thread Stumpy

On 2020-10-10 07:58, Andrew David Wong wrote:

[The following message is from Nina Eleanor Alter, our UX specialist.]

Greetings, Qubes community! We are running our first ever survey of
current, former, and future Qubes OS users. We invite you all to lend
us 10-15min of your time, to participate.

https://survey.qubes-os.org/index.php?r=survey/index=791682=en

The Qubes OS team loves the conversations we have with our community
across forums, email lists, in support tickets, and at conferences. As
most of us understand, though, structured data is very different --
and clear information to help us make product and development
decisions in the weeks and months to come, we feel is necessary to
best serve our users.

This survey is also just the beginning of several weeks of user
research work that will consist of interviews, user testing,
co-creation workshop(s) with users guided by a ux specialist, and
possibly more surveys. At the end of this survey, we’ll collect
contact information should participating in that work be of interest
to folks. We also look forward to keeping folks updated in our user
communities, with how all of this work is progressing.

-

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2020/10/09/calling-all-humans/


Thanks for this, I have filled it out and volunteered but really really 
really wanted to iterate one big (for me) point, and that is include at 
least some of the things listed in the documentation as an option in the 
setup.


I am no coder and I am 99.999% sure its easier said than done but I see 
quite a few posts (eg setting up VPNs, installing community templates, 
etc) that would be made much easier, and hence less mailing list 
repetition, if they were say included in say a "advance" option during 
the install process, or perhaps an advance settings after setup... like 
adding more "advance" options to the qubes manager? So the user could 
select advance at the beginning and then say be asked "do you want to 
install a sys-usb BUT have it manually enabled" or "do you want to set 
up a VPN proxy" (which will then ask maybe using which templates, and 
then after installation have a command line program that will prompt for 
info to input [eg ovpn info], then generate the vm), or give the option 
of enabling community member packages or templates and installing those 
... like use "centos minimal for proxy VMs"), or selecting i3 or kde for 
a manager, or do you want to enable MAC address randomization, or do you 
want X or Y links/files to be opened up in dvm. The list goes on...


While, again, I am sure this is easier to suggest than to do I also 
think that this would help those like myself who are "techno semi 
competent" (which really means able to get ones self stuck trying to do 
something) while also keeping it relatively simple (by having the above 
be options that would only pop up if say "advanced settings" were 
selected.


I dont mean to diss qubes, i have gotten so much more back than I have 
donated but i really want to see it more broadly adopted and i think 
things like the above could help!


Thanks again to the qubes devs and contributors!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/82a6043a3a5351e041a78f404f655cf9%40posteo.net.


Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-11 Thread Stumpy

On 2020-10-08 10:02, Frank wrote:

On 7. Oct 2020, at 20:52, Stumpy stumpy-at-posteo.co wrote:

On 2020-10-07 21:13, Stumpy wrote:

On 2020-10-06 19:12, Frank wrote:

On 6. Oct 2020, at 13:53, Stumpy stumpy-at-posteo.co wrote:
On 2020-10-06 10:46, Frank wrote:

On 5. Oct 2020, at 16:16, Stumpy stumpy-at-posteo.co wrote:

My computer actiing strange like some appvms not opening so i
decided to restart and restarted normally and booted back up 
fine

except now i can hardly open anything. Appvms will not start, I
tried to do a backup from dom0 term and that gave me an error, 
tried
to run qubes-qube-manager and that gave me a similar error 
[1]...
I'm at a loss. Of course I just finished doing some important 
work

and didnt immediately backp (usually bkup weekly).
I am not thrilled about reinstalling but can do it, but really
really really want to back up my appvms before nuking 
everything. If
i cant use the regular backup is there a way i can just copy 
things?

I think I can still mount an external drive...
This should give you all the information necessary to get your 
data

saved:
https://www.qubes-os.org/doc/mount-from-other-os/
Regards, Frank

Thank you, I didnt notice that.
I dont suppose you have any thoughts on the error that seems to be 
borking my system?

I fear I don’t... but isn’t errno 2 something like „file not found“?
So it smells like dom0 is having problems getting everything mounted
where it belongs - either because the file system is screwed or LVM 
is

having some problems.
In any case, I’d be backing up whatever I could get my hands on and
then reinstall...

Ok so on the mount from other os page its not totally clear for me.
I do have a barebones qubes system on another computer (laptop), so
would/should I take my ssd from my desktop connect it (have an 
adapter

cable) to my laptop then "pass" the whole disk to an isolated appvm?
If yes, then,,, what is meant by passing the disk to an appvm
(copying?) and when it says isolated appvm does that just mean, in my
case, an appvm on my laptop? Lastly, as my laptop drive is smaller
than my desktop drive, would I be able to selectively copy/mount to 
my

laptop appvm or would I need to go another route?


btw, on my desktop, I am still able to access a dom0 terminal and can 
connect to an external drive (I think), so can i just cp the appvms to 
an external drive and then extract the contents of the critical 
appvms?


Well in that case you can do the following in a dom0 terminal
(assuming the name of your AppVM you want to get files from is
my-appvm):

# create a mount point to access the disk:

sudo mkdir /mnt/private

# make the private volume of the appvm accessible !!! notice the
doubling of the dash in the AppVMs name (naturally not applicable if
your AppVMs name does not contain a dash) !!!

sudo losetup -f —show /dev/mapper/qubes_dom0-vm—my—appvm—private

# use the loop device the last command printed to the screen (i.e.
/dev/loop2) to mount the AppVMs private volume

sudo mount /dev/loop2 /mnt/private

# now you should be able to copy whatever data you want to save

cp /mnt/private/home/user/* /some/place/save/

Hope that works out for you!

Regards, Frank



Sorry, the mount from other os page is a bit over my head hence my 
attempting to find options that I can understand :/


First, thanks to Jarrah!
I inadvertantly booted my computer with my defucnt instalation plugged 
in and it booted my desktop drive on my laptop... go figure, but 
regardless I was now able to use Jarrah's response to mount and copy 
over most of the appvms (actually just mounted, tar'd up the entire 
thing, and saved to trusted ext drive). Thanks Jarrah!


Caveat though, two actually, a few of the appvms gave errors, most of 
them were not hugely important appvms but the second issue (kinda) is 
about the possbility of copying the whole appvm, more specifically I 
have some vpn proxy vms which (for me) wasnt easy to setup so I was 
hoping to copy the whole appvm over to the new installation... I have 
tar'd the entire contents/configs of each of those vpn proxy vms but 
wasnt sure if that would be sufficient?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0dc894ca5542f84586e9d8ec23bc48a2%40posteo.net.


Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-08 Thread Stumpy

On 2020-10-08 02:24, Jarrah wrote:

Ok so on the mount from other os page its not totally clear for me.

I do have a barebones qubes system on another computer (laptop), so
would/should I take my ssd from my desktop connect it (have an 
adapter

cable) to my laptop then "pass" the whole disk to an isolated appvm?


Yes, this is the idea. Using `qvm-block a  ` or 
the

equivalent GUI widget.


Ok, so I *think* I have mounted and decrypted my 1tb desktop ssd on my 
laptop... i say "think" because I dont see anything in the Templates dir 
where i thought I mounted it?
This is what lsblk gives me in the appvm where I ran "sudo cryptsetup 
luksOpen /dev/xvdj2 Templates"


xvdj  202:144  1 931.5G  0 disk
├─xvdj1   202:145  1 1G  0 part
└─xvdj2   202:146  1 930.5G  0 part
  └─Templates 253:00 930.5G  0 crypt

When i ls ~/Templates it shows nothing. I guess part of my problem is 
that LVMs make no sense to me, or more accurately confuse me so the 
accessing LVM logical volumes is where my understanding decreases 
precipitously - I thought I was using an AppVM but LVM does not seem to 
be automatically discoering my LVM config?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/318e0243cd356e2bc3dfe5489ee610d7%40posteo.net.


Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-07 Thread Stumpy

On 2020-10-07 21:13, Stumpy wrote:

On 2020-10-06 19:12, Frank wrote:

On 6. Oct 2020, at 13:53, Stumpy stumpy-at-posteo.co wrote:

On 2020-10-06 10:46, Frank wrote:

On 5. Oct 2020, at 16:16, Stumpy stumpy-at-posteo.co wrote:

My computer actiing strange like some appvms not opening so i
decided to restart and restarted normally and booted back up fine
except now i can hardly open anything. Appvms will not start, I
tried to do a backup from dom0 term and that gave me an error, 
tried

to run qubes-qube-manager and that gave me a similar error [1]...
I'm at a loss. Of course I just finished doing some important work
and didnt immediately backp (usually bkup weekly).
I am not thrilled about reinstalling but can do it, but really
really really want to back up my appvms before nuking everything. 
If
i cant use the regular backup is there a way i can just copy 
things?

I think I can still mount an external drive...

This should give you all the information necessary to get your data
saved:
https://www.qubes-os.org/doc/mount-from-other-os/
Regards, Frank



Thank you, I didnt notice that.
I dont suppose you have any thoughts on the error that seems to be 
borking my system?


I fear I don’t... but isn’t errno 2 something like „file not found“?
So it smells like dom0 is having problems getting everything mounted
where it belongs - either because the file system is screwed or LVM is
having some problems.

In any case, I’d be backing up whatever I could get my hands on and
then reinstall...


Ok so on the mount from other os page its not totally clear for me.

I do have a barebones qubes system on another computer (laptop), so
would/should I take my ssd from my desktop connect it (have an adapter
cable) to my laptop then "pass" the whole disk to an isolated appvm?
If yes, then,,, what is meant by passing the disk to an appvm
(copying?) and when it says isolated appvm does that just mean, in my
case, an appvm on my laptop? Lastly, as my laptop drive is smaller
than my desktop drive, would I be able to selectively copy/mount to my
laptop appvm or would I need to go another route?


btw, on my desktop, I am still able to access a dom0 terminal and can 
connect to an external drive (I think), so can i just cp the appvms to 
an external drive and then extract the contents of the critical appvms?


Sorry, the mount from other os page is a bit over my head hence my 
attempting to find options that I can understand :/


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/66fdfd874b1fa13d0f7033a870ef0b39%40posteo.net.


Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-07 Thread Stumpy

On 2020-10-06 19:12, Frank wrote:

On 6. Oct 2020, at 13:53, Stumpy stumpy-at-posteo.co wrote:

On 2020-10-06 10:46, Frank wrote:

On 5. Oct 2020, at 16:16, Stumpy stumpy-at-posteo.co wrote:

My computer actiing strange like some appvms not opening so i
decided to restart and restarted normally and booted back up fine
except now i can hardly open anything. Appvms will not start, I
tried to do a backup from dom0 term and that gave me an error, tried
to run qubes-qube-manager and that gave me a similar error [1]...
I'm at a loss. Of course I just finished doing some important work
and didnt immediately backp (usually bkup weekly).
I am not thrilled about reinstalling but can do it, but really
really really want to back up my appvms before nuking everything. If
i cant use the regular backup is there a way i can just copy things?
I think I can still mount an external drive...

This should give you all the information necessary to get your data
saved:
https://www.qubes-os.org/doc/mount-from-other-os/
Regards, Frank



Thank you, I didnt notice that.
I dont suppose you have any thoughts on the error that seems to be 
borking my system?


I fear I don’t... but isn’t errno 2 something like „file not found“?
So it smells like dom0 is having problems getting everything mounted
where it belongs - either because the file system is screwed or LVM is
having some problems.

In any case, I’d be backing up whatever I could get my hands on and
then reinstall...


Ok so on the mount from other os page its not totally clear for me.

I do have a barebones qubes system on another computer (laptop), so 
would/should I take my ssd from my desktop connect it (have an adapter 
cable) to my laptop then "pass" the whole disk to an isolated appvm? If 
yes, then,,, what is meant by passing the disk to an appvm (copying?) 
and when it says isolated appvm does that just mean, in my case, an 
appvm on my laptop? Lastly, as my laptop drive is smaller than my 
desktop drive, would I be able to selectively copy/mount to my laptop 
appvm or would I need to go another route?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d85f7694f9896dcd7863178b87dc7bf%40posteo.net.


Re: [qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-06 Thread Stumpy

On 2020-10-06 10:46, Frank wrote:

On 5. Oct 2020, at 16:16, Stumpy stumpy-at-posteo.co wrote:
My computer actiing strange like some appvms not opening so i
decided to restart and restarted normally and booted back up fine
except now i can hardly open anything. Appvms will not start, I
tried to do a backup from dom0 term and that gave me an error, tried
to run qubes-qube-manager and that gave me a similar error [1]...
I'm at a loss. Of course I just finished doing some important work
and didnt immediately backp (usually bkup weekly).



I am not thrilled about reinstalling but can do it, but really
really really want to back up my appvms before nuking everything. If
i cant use the regular backup is there a way i can just copy things?
I think I can still mount an external drive...


This should give you all the information necessary to get your data
saved:

https://www.qubes-os.org/doc/mount-from-other-os/ [2]

Regards, Frank




Thank you, I didnt notice that.
I dont suppose you have any thoughts on the error that seems to be 
borking my system?



 --
 You received this message because you are subscribed to the Google
Groups "qubes-users" group.
 To unsubscribe from this group and stop receiving emails from it,
send an email to qubes-users+unsubscr...@googlegroups.com.
 To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/14455-1601963217-340060%40sneakemail.com
[3].


Links:
--
[1] https://pasteboard.co/JufhRoH.jpg
[2] https://www.qubes-os.org/doc/mount-from-other-os/
[3]
https://groups.google.com/d/msgid/qubes-users/14455-1601963217-340060%40sneakemail.com?utm_medium=email_source=footer


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bc9f7d8382f0a65b1bd56b4139a0720e%40posteo.net.


[qubes-users] Can hardly run anything? every dom0 command results in Errrno2?

2020-10-05 Thread Stumpy
 

My computer actiing strange like some appvms not opening so i decided to
restart and restarted normally and booted back up fine except now i can
hardly open anything. Appvms will not start, I tried to do a backup from
dom0 term and that gave me an error, tried to run qubes-qube-manager and
that gave me a similar error [1]... I'm at a loss. Of course I just
finished doing some important work and didnt immediately backp (usually
bkup weekly).

I am not thrilled about reinstalling but can do it, but really really
really want to back up my appvms before nuking everything. If i cant use
the regular backup is there a way i can just copy things? I think I can
still mount an external drive...
 

Links:
--
[1] https://pasteboard.co/JufhRoH.jpg

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9706eff53bd976879c1f41c54335cc5c%40posteo.net.


Re: [qubes-users] Any Advantage to using OpenHAB on qubes?

2020-09-30 Thread Stumpy

On 2020-09-30 09:35, Stumpy wrote:
Sometimes I have trouble "wrapping my head around" compartmentalization 
offline use etc so I was hoping someone is doing, or has considered 
something similar.


I would like to setup home automation and security, and OpenHAB seems 
like the best way to go. The caveat, for me at least, is I really dont 
want the setup to be online, or dont want it to be accessible from the 
internet - which is where qubes comes in i think?


I want OpenHAB to stay up to date but do not want it to be accessible 
via the internet so i was thinking if I have a template with OpenHAB 
installed that would install OpenHAB and hopefully plugins?
The thing is I am hoping to have wifi cameras, or at least PoE cameras 
connected so it was less clear to me if i would be able to have an 
OpenHAB appvm that was not connected to the internet, or blocked from 
the network, but able to communicate with these various wireless devices?


Ideally i would be able to do this on my workstation as i pretty much 
live in front of my monitors :/
But I have 2 older laptops, one runs qubes like a champ, the other i am 
guessing less so (AMD Neo chip w/ 2 or 4gb mem [I forget]), though 
either way if i went the laptop route they woudl be dedicated devices so 
to speak.


Any thoughts, ideas, feedback would really really be appreciated!



or, it just occurred to me that a raspi that i could remotely login to 
... then again that would mean i'd need network access? Ugh, sorry I am 
really bad at visualizing these things.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9124210f-43e4-936f-6389-61bc8cdc9ca3%40posteo.net.


[qubes-users] Any Advantage to using OpenHAB on qubes?

2020-09-30 Thread Stumpy
Sometimes I have trouble "wrapping my head around" compartmentalization 
offline use etc so I was hoping someone is doing, or has considered 
something similar.


I would like to setup home automation and security, and OpenHAB seems 
like the best way to go. The caveat, for me at least, is I really dont 
want the setup to be online, or dont want it to be accessible from the 
internet - which is where qubes comes in i think?


I want OpenHAB to stay up to date but do not want it to be accessible 
via the internet so i was thinking if I have a template with OpenHAB 
installed that would install OpenHAB and hopefully plugins?
The thing is I am hoping to have wifi cameras, or at least PoE cameras 
connected so it was less clear to me if i would be able to have an 
OpenHAB appvm that was not connected to the internet, or blocked from 
the network, but able to communicate with these various wireless devices?


Ideally i would be able to do this on my workstation as i pretty much 
live in front of my monitors :/
But I have 2 older laptops, one runs qubes like a champ, the other i am 
guessing less so (AMD Neo chip w/ 2 or 4gb mem [I forget]), though 
either way if i went the laptop route they woudl be dedicated devices so 
to speak.


Any thoughts, ideas, feedback would really really be appreciated!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/61b26294-457f-a29a-e056-40a94207753a%40posteo.net.


Re: [qubes-users] Can't start apps from menu/app finder but can from dom0?

2020-09-28 Thread Stumpy

On 2020-09-28 09:15, unman wrote:

On Sun, Sep 27, 2020 at 10:54:46PM -0400, Stumpy wrote:

On 2020-09-27 21:42, Stumpy wrote:

On 2020-09-27 19:59, Stumpy wrote:

The subject says most of it. I can start apps from a dom0 terminal
with qvm-run but cant figure why I cant do it via the xfce menu or
app finder. I tried running using qvm-sync-appmenus appvm but that
didnt help. Thoughts?


The last two times (just tried rebooting the system) i tried to start an
app up from the dom0 terminal now i cant even do that... so, is it
possible to do something like mount an appvm so i can copy the important
info off of it?


new observation, it seems to be related to the template, debian 10 in this
case.
I switched the template for the aapvm i wasnt able to start up and viola! it
opened up, then i tried to make a new appvm based on the deb10 template and,
no go, nothing would start?
what about a template would cause an appvm not to start?



What have you done to the template?


AFAIK nothing.


There are many things you might have done , including deleting (by
mistake) Qubes packages etc. 


well anything is possible but i am pretty sure i did not delete any 
packages lately, qubes or otherwise.



This is why it's generally a good idea to
keep a spare vanilla template hanging about, so you can rebuild as
necessary.


noted.

Regardless, i thought in the past i was able to reinstall or install 
another but now that is giving me problems?



[bob@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-debian-10
WARNING: Replacing a template will erase all files in template's /home 
and /rw !
usage: qvm-shutdown [--verbose] [--quiet] [--help] [--all] [--exclude 
EXCLUDE]

[--wait] [--timeout TIMEOUT] [--force]
[VMNAME [VMNAME ...]]
qvm-shutdown: error: no such domain: 'debian-10'
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...
fedora/metalink | 5.8 kB 
00:00
fedora  | 4.3 kB 
00:00
fedora/primary_db   |  26 MB 
04:48
qubes-dom0-current/metalink | 2.7 kB 
00:00
qubes-dom0-current  | 3.8 kB 
00:00
qubes-dom0-current/primary_db   | 3.9 MB 
00:51
qubes-templates-itl/metalink| 2.7 kB 
00:00
qubes-templates-itl | 3.0 kB 
00:00
qubes-templates-itl/primary_db  |  21 kB 
00:00
updates/metalink| 5.5 kB 
00:00
updates | 4.7 kB 
00:00
updates/primary_db  |  12 MB 
02:02

--> Running transaction check
---> Package qubes-template-debian-10.noarch 0:4.0.1-201910230150 will 
be reinstalled

--> Finished Dependency Resolution
https://mirrors.dotsrc.org/qubes/repo/yum/r4.0/templates-itl/rpm/qubes-template-debian-10-4.0.1-201910230150.noarch.rpm: 
[Errno 14] curl#56 - "GnuTLS recv error (-9): Error decoding the 
received TLS packet."

Trying other mirror.
qubes-template-debian-10-4.0.1-201910230150.noarch.rpm | 840 MB 
237:54
Successfully verified 
/var/lib/qubes/dom0-updates/packages/qubes-template-debian-10-4.0.1-201910230150.noarch.rpm

usage: qvm-prefs [--verbose] [--quiet] [--help] [--help-properties]
 [--hide-default] [--get] [--set] [--default]
 VMNAME [PROPERTY] [VALUE]
qvm-prefs: error: no such domain: 'debian-10'
Qubes OS Repository for Dom0 
 25 
MB/s |  26 kB 00:00

No match for argument: qubes-template-debian-10
Error: Nothing to do.

huh?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a9ef1e72-1606-07aa-068e-1cbc947232ac%40posteo.net.


Re: [qubes-users] Can't start apps from menu/app finder but can from dom0?

2020-09-27 Thread Stumpy

On 2020-09-27 21:42, Stumpy wrote:

On 2020-09-27 19:59, Stumpy wrote:
The subject says most of it. I can start apps from a dom0 terminal 
with qvm-run but cant figure why I cant do it via the xfce menu or app 
finder. I tried running using qvm-sync-appmenus appvm but that didnt 
help. Thoughts?


The last two times (just tried rebooting the system) i tried to start an 
app up from the dom0 terminal now i cant even do that... so, is it 
possible to do something like mount an appvm so i can copy the important 
info off of it?


new observation, it seems to be related to the template, debian 10 in 
this case.
I switched the template for the aapvm i wasnt able to start up and 
viola! it opened up, then i tried to make a new appvm based on the deb10 
template and, no go, nothing would start?

what about a template would cause an appvm not to start?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4540387f-af6f-21d1-8c85-0671ecf4e068%40posteo.net.


Re: [qubes-users] Can't start apps from menu/app finder but can from dom0?

2020-09-27 Thread Stumpy

On 2020-09-27 19:59, Stumpy wrote:
The subject says most of it. I can start apps from a dom0 terminal with 
qvm-run but cant figure why I cant do it via the xfce menu or app 
finder. I tried running using qvm-sync-appmenus appvm but that didnt 
help. Thoughts?


The last two times (just tried rebooting the system) i tried to start an 
app up from the dom0 terminal now i cant even do that... so, is it 
possible to do something like mount an appvm so i can copy the important 
info off of it?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/30be124c-321f-ed18-c671-646539b46cc4%40posteo.net.


[qubes-users] Can't start apps from menu/app finder but can from dom0?

2020-09-27 Thread Stumpy
The subject says most of it. I can start apps from a dom0 terminal with 
qvm-run but cant figure why I cant do it via the xfce menu or app 
finder. I tried running using qvm-sync-appmenus appvm but that didnt 
help. Thoughts?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f3b4244a-0de5-00c1-760e-b289ab70c78c%40posteo.net.


Re: [qubes-users] Any reason I shouldn't be able to use an internal sound card?

2020-09-26 Thread Stumpy

On 2020-09-26 01:54, Jarrah wrote:



Is there any reason i shouldn't be able to (fairly easily) use an
internal sound card with Qubes? If not, any recommendations on sounds
cards that work well with Qubes?
Thx!

Or USB as well, actually would one necessarily work/be more compatible
than the other?


I can vouch for PCI based cards working fine. They operate in Dom0, so
the only requirement is Linux drivers. I'm using an older Asus Xonar
card, but You can probably find better than that.

As for USB, I'd expect they would work fine, assuming you can get the
audio stream to sys-usb or your USB controllers are active in Dom0. This
hasn't been implemented as a stardand feature, so it would be far more
restrictive than PCI.



Thank you good points and good to know, will try looking for 
fedora/soundcard reviews then.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0625f612-08b1-fd6b-634c-6fa702be363f%40posteo.net.


Re: [qubes-users] Any reason I shouldn't be able to use an internal sound card?

2020-09-25 Thread Stumpy

On 2020-09-25 16:40, Stumpy wrote:
Is there any reason i shouldn't be able to (fairly easily) use an 
internal sound card with Qubes? If not, any recommendations on sounds 
cards that work well with Qubes?

Thx!



Or USB as well, actually would one necessarily work/be more compatible 
than the other?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6b47f846-0f60-f9e8-d547-4e70de84e826%40posteo.net.


[qubes-users] Any reason I shouldn't be able to use an internal sound card?

2020-09-25 Thread Stumpy
Is there any reason i shouldn't be able to (fairly easily) use an 
internal sound card with Qubes? If not, any recommendations on sounds 
cards that work well with Qubes?

Thx!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13039e74-0289-eb00-bd3c-e20c18b7c254%40posteo.net.


Re: [qubes-users] Witch one is the best?

2020-09-21 Thread Stumpy

On 2020-09-21 08:50, Chris Laprise wrote:

On 9/21/20 8:17 AM, Stumpy wrote:

On 2020-09-20 14:24, Chris Laprise wrote:

On 9/20/20 2:08 PM, Chris Laprise wrote:

On 9/19/20 11:16 PM, Jarrah wrote:




My question is, would some of the newer/faster AMD CPUs and chipsets
work with Qubes?


I can speak for the 2000 series working. I believe some people have
working 3000 series, but 4000 has been a serious issue. Not sure if
that's the CPU or the specific laptop.

https://qubes-os.discourse.group/t/qubes-support-on-amd-4000-series-lenovo-x13-t14/202/1 





Based on the patches that have to be applied to get Qubes 4.1 
working on Ryzen 4000, I'd say its a Qubes-vs-CPU compatibility 
issue and not about the computers' other specifics.




BTW the patches are already applied in the Qubes 4.1 repository; I 
don't want to imply you have to do that manually. And a 4.1 alpha may 
be coming really soon.


But getting Qubes 4.0 working on Ryzen 4000 appears unlikely.



But a Ryzen 3000 is a relatively safe bet?


I would say the evidence is scant, except that someone with a Ryzen 3000 
laptop had problems that sounded a lot like the Ryzen 4000 problems. 
OTOH at least one Ryzen 3000 _desktop_ is known to work:


https://groups.google.com/d/msgid/qubes-users/caa18235-cecd-64c7-f989-5bf4661f59c8%40posteo.de 



For laptops, Ryzen 1xxx and 2xxx appear to be a safer bet. Personally, I 
think Ryzen 4000 is compelling enough to go through the trouble of 
building a Qubes 4.1 installer (and then fixing the installer's mistakes).




Well perhaps I will hurry up and wait :)
I likely wont get around to my new build until after the new year, and 
while I am looking to upgrade (2012 i5 currently) I am not in a super 
hurry and not bent on getting the 4000 necessarily, was ready to settle 
for the 3000 (though sounds like qubes isnt quite ready for either).


Thanks for the info.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ccb90cea-23ad-3751-8bff-7d8b241d1364%40posteo.net.


Re: [qubes-users] Witch one is the best?

2020-09-21 Thread Stumpy

On 2020-09-20 14:24, Chris Laprise wrote:

On 9/20/20 2:08 PM, Chris Laprise wrote:

On 9/19/20 11:16 PM, Jarrah wrote:




My question is, would some of the newer/faster AMD CPUs and chipsets
work with Qubes?


I can speak for the 2000 series working. I believe some people have
working 3000 series, but 4000 has been a serious issue. Not sure if
that's the CPU or the specific laptop.

https://qubes-os.discourse.group/t/qubes-support-on-amd-4000-series-lenovo-x13-t14/202/1 





Based on the patches that have to be applied to get Qubes 4.1 working 
on Ryzen 4000, I'd say its a Qubes-vs-CPU compatibility issue and not 
about the computers' other specifics.




BTW the patches are already applied in the Qubes 4.1 repository; I don't 
want to imply you have to do that manually. And a 4.1 alpha may be 
coming really soon.


But getting Qubes 4.0 working on Ryzen 4000 appears unlikely.



But a Ryzen 3000 is a relatively safe bet?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3210ab2b-45f4-26e1-1f96-af5e549e4879%40posteo.net.


Re: [qubes-users] Witch one is the best?

2020-09-20 Thread Stumpy

On 2020-09-19 23:16, Jarrah wrote:




My question is, would some of the newer/faster AMD CPUs and chipsets
work with Qubes?


I can speak for the 2000 series working. I believe some people have
working 3000 series, but 4000 has been a serious issue. Not sure if
that's the CPU or the specific laptop.

https://qubes-os.discourse.group/t/qubes-support-on-amd-4000-series-lenovo-x13-t14/202/1



Thanks. Actually I'd be totally happy with the 3000 series. The HCL 
seems to show that indeed up to 2000 seems to work fairly well with a 
few caveats i guess but i was not able to find any 3000 procs on the 
list. Anyone out there have AMD 3000 series, pref desktop that is 
working well?


Also, are there certain chipsets that work better with qubes than 
(hopefully somewhat newer ones)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/102c92d3-3518-6ebc-667a-e7caa72ef7cf%40posteo.net.


Re: [qubes-users] Witch one is the best?

2020-09-19 Thread Stumpy

On 2020-08-23 11:21, 'awokd' via qubes-users wrote:

Mélissa Ch.:


Silitech

Intel(R)  Core(TM)  i5-3450 CPU @ 3.10 GHz   3.10GHz

Mémoire 16.0 Go ram

Système d’exploitation 64 bits

Windows 7 Familiale Premium

Carte graphique  ADM Radeon HD 7470


This one is the better Qubes candidate because of the AMD video card and
16GB RAM. Be aware Qubes can sometimes be more challenging to install
than Windows, so might need troubleshooting.



I am planning to put a new system together at some point and saw this 
post when i was looking for AMD related posts.


I have a Radeon card that has the number of ports i need and works fine 
so i dont think i need to worry about graphics.


My question is, would some of the newer/faster AMD CPUs and chipsets 
work with Qubes?


I am more price/performance sensitive than i am "brand loyal" but it 
seems to me that one gets more speed for less money with AMD nowadays so 
was really hoping to get a faster AMD proc with an m2 drive and speedy mem?


Thoughts would be appreciated.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/02261781-93cb-763f-2812-87af016ad739%40posteo.net.


Re: [qubes-users] Hardening Guide for Paranoid Noobs?

2020-09-07 Thread Stumpy

On 2020-09-05 13:35, 'awokd' via qubes-users wrote:

Stumpy:

I was reminded about qubes hardening that Chris L has been working on
and also noticed that Patrick/Whonix is now basing whonix on thier
kicksecure distro and was trying (not so successfully) to absorb all of
this. I got the impression that Chris's work wouldnt jive so well with
kicksecure (fair enough, can just use it on non-whoinx setups) but wasnt
sure. Also there is the idea of DVM sys-* (net/usb/firewall/etc) vms
sounded like they would add an extra layer of security, maybe based on
centos (I have seen conversations about how fedora doesnt sign or
something apps in their repos? please dont troll me, i am not trying to
pretend like i understand that) and some other things that i am sure i
have missed (maybe a iptable/firewall gui [apart from whats built into
qubes settings... i just dont find that intuitive).


Just running Qubes by itself is already more hardened than 99% of people
out there, so if your main concern is standard/driveby attacks against
mainstream OSes, you shouldn't be very much so. 


My threat model is not super strict at home (when traveling totally 
different scenario [lots of diff scenarios actually, will save for 
another post])



You cover multiple points:

- There is something in the works to allow custom kernels inside AppVMs.
Whonix and others can use them for additional hardening and/or
additional drivers. Don't think it's released yet.

Nice! I wasnt aware of that, will hurry up and wait :)

- Chris's VM hardening works on regular qubes. Not sure if it will on
Whonix ones.
I got the impression it wouldnt but that might be moot as kicksecure 
seems to be quite hardened.

- DVM sys-* is pretty straight-forward, just follow the docs.

True enough i guess
- Centos is unrelated. 
Well I had mentioned CentOS since I thought thier packages, like RH, 
were signed?



If you're concerned about Fedora's lack of
signing, switch to Debian templates, or some other that has signing.

So centOS doesn't sign their packages?


- Mirage can be used as a sys-firewall replacement.
I thought about that, i ended up just going with a minimal centOS 
template for my sys-* appvms.



I know there have been back and forths about Qubes "Ease of use" 
especially for non-techies; I consider myself somewhere in the middle, 
but I was wondering about configs during start up? I totally understand 
the Qubes Team has more important (sec) things to work on but I think a 
UX person was hired to address some of the UX things in Qubes which 
could be polished? (not 100% sure about that, maybe i was reading about 
another distro). It would just be nice if a thorough howto could bring 
much of the hardening documentation together rather than skiping around 
from one doc to another - or better yet make some of these things 
options during the install like which "distro would you like to use for 
your minimal templates",  "Would you like to add X community templates", 
click here to input your VPN provider info if you want a VPN proxy, 
"click here if you want your sys-* to be a DVM", "select your win iso if 
you want a MS win appvm, and click here if you want it to be standalone 
or a template", while I am completely aware that its easier to suggest 
such things than to actually do them it seems like a worthy goal for 
making a more versitle and perhaps noobish friendly Qubes while also 
addressing FAQ (granted not everything i listed is a requalr 
mailing/forum list question) which might make those FAQs a bit less... 
frequent? :)


Anyway, just my ? cents.

Cheers

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2132b9ec-7906-d988-ee4c-76d44a05554d%40posteo.net.


[qubes-users] Hardening Guide for Paranoid Noobs?

2020-09-05 Thread Stumpy
I was reminded about qubes hardening that Chris L has been working on 
and also noticed that Patrick/Whonix is now basing whonix on thier 
kicksecure distro and was trying (not so successfully) to absorb all of 
this. I got the impression that Chris's work wouldnt jive so well with 
kicksecure (fair enough, can just use it on non-whoinx setups) but wasnt 
sure. Also there is the idea of DVM sys-* (net/usb/firewall/etc) vms 
sounded like they would add an extra layer of security, maybe based on 
centos (I have seen conversations about how fedora doesnt sign or 
something apps in their repos? please dont troll me, i am not trying to 
pretend like i understand that) and some other things that i am sure i 
have missed (maybe a iptable/firewall gui [apart from whats built into 
qubes settings... i just dont find that intuitive).


In short, it just seems like there are quite a few additional hardening 
things that can be done but for novices like myself a step by step spoon 
feeding explanation/howto that brings it all together would be awesome. 
If i ever get something working I will try to document it but as its 
taken me like 3 years to just get comfortable with qubes i am not 
holding my breath... anyone interested in crowd funding something like 
this? (*not* for me to write, more like to crowd fund for a qubes guru 
to write) :P


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a6068b8d-d039-522d-6171-cf0ccc9b2bce%40posteo.net.


[qubes-users] PulseEffects?

2020-08-24 Thread Stumpy
I wanted to install PulseEffects on dom0 but it seems its not available? 
(I thought it would be available as it comes with Fed workstation by 
default i think?). How inadvisable is it to install it and how would i 
got about doing that? Would I have to add another repo?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/79b03625-f6ad-f93a-ed87-23b9963bab01%40posteo.net.


Re: [qubes-users] GPT or MBR?

2020-08-06 Thread Stumpy

On 2020-08-05 21:13, unman wrote:

On Wed, Aug 05, 2020 at 09:04:41PM +0200, Qubes wrote:

On 8/5/20 8:31 PM, Stumpy wrote:

On 2020-08-05 12:06, Stumpy wrote:

I have win installed on a drive with mbr, should I be able make a
vhd and convert that to a RAW and run it as a template in Qubes?

If i remember correctly gpt does not play well with qubes?



I guess more to the point, "MBR is better" or "GPT is better" or "either
is fine" is what I am looking for.
Thanks!


Coreboot is better, look into Coreboot, https://www.coreboot.org.

Otherwise I would rank UEFI above BIOS in terms of security.




GPT is part of the UEFI standard, but can be used with legacy BIOS.
Coreboot, UEFI, and legacy BIOS are not clearly related to partition
tables, which is what MBR and GPT are.
Both are fine in the context of Qubes.
Stock templates are built using gpt.



Great, thank you both - I actually wasnt clear on how BIOS, Coreboot, 
and UEFI relate to MBR and GPT.


Cheers

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4aa17e3d-94b4-c233-4e19-32c9fb3d7044%40posteo.net.


Re: [qubes-users] GPT or MBR?

2020-08-05 Thread Stumpy

On 2020-08-05 12:06, Stumpy wrote:
I have win installed on a drive with mbr, should I be able make a vhd 
and convert that to a RAW and run it as a template in Qubes?


If i remember correctly gpt does not play well with qubes?



I guess more to the point, "MBR is better" or "GPT is better" or "either 
is fine" is what I am looking for.

Thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/57f40189-077b-36e9-7056-96200032e83e%40posteo.net.


[qubes-users] GPT or MBR?

2020-08-05 Thread Stumpy
I have win installed on a drive with mbr, should I be able make a vhd 
and convert that to a RAW and run it as a template in Qubes?


If i remember correctly gpt does not play well with qubes?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4204f4ff-63b6-825c-ef9a-59870e433a02%40posteo.net.


[qubes-users] Error for one AppVM showed up in a separate AppVM?

2020-07-23 Thread Stumpy
I wasnt sure if this was a bug or what but it seemed odd to me that the 
error from one appvm showed up in a different appvm?


The in the destination appvm I have ondrive v2.4.2 running.
In the appvm where the error popped up I was trying to move a file, via 
qvm-move to the destination appvm where onedrive was running. The move 
process hung


qvm-move webinar\ video.mp4
sent 0/147315 KB
OneDrive generated an error when creating this path: 
Path/to/a/dir/I/tried/to/create


ERROR: OneDrive returned an error with the following message:
  Error Message: HTTP request returned status code 400 (Bad Request)
  Error Reason:  Resource not found for the segment 'children'.


For what its worth, I in the desination VM i was trying to save as a 
file from firefox and tried to create a directory to save the file in.


Anyway, if this sounds like nothing then feel free to ignore I jsut 
wanted to check.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/35685b62-45cd-e286-d3c0-6e62e38ea248%40posteo.net.


[qubes-users] A way to "write configurations" to SALT?

2020-07-21 Thread Stumpy
I have been trying to figure out SALT in my spare time and every time I 
start I finish with watery eyes and a mushy brain... for me its hard to 
wrap my head around.


While I am not giving up per se it occurred to me, so i just thought id 
ask on the off chance its possible... Can one say setup an AppVM and 
configure it to ones own needs _then_  somehow write that configuration 
to SALT? While this seems unlikely I have to ask.


Thanks!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/89c2d3f0-b2e4-09f3-ead3-79f340767dbc%40posteo.net.


Re: [qubes-users] Re: Fedora 30 approaching EOL, Fedora 31 TemplateVM available, Fedora 32 TemplateVM in testing

2020-06-29 Thread Stumpy

On 2020-06-28 14:40, Lorenzo Lamas wrote:
I noticed that the Fedora 32 template is in the stable repo, but no 
announcement yet.


--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ff4a47e-5fc5-49db-966d-4727fdd46fdco%40googlegroups.com 
.


I'd really be interested in this as this might make my fed31 repo 
updates moot.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23be61e8-f8ea-2da2-b399-240d1ce7c670%40posteo.net.


[qubes-users] repo update error?

2020-06-28 Thread Stumpy
On the fed31 template, when i try to run update i get the following 
error, not sure if i should be changing something?



Errors during downloading metadata for repository 'updates':
  - Curl error (6): Couldn't resolve host name for 
https://mirrors.fedoraproject.org/metalink?repo=updates-released-f31=x86_64 
[Could not resolve host: mirrors.fedoraproject.org]
Error: Failed to download metadata for repo 'updates': Cannot prepare 
internal mirrorlist: Curl error (6): Couldn't resolve host name for 
https://mirrors.fedoraproject.org/metalink?repo=updates-released-f31=x86_64 
[Could not resolve host: mirrors.fedoraproject.org]
Fedora 31 - x86_64 - Updates 


  0.0  B/s |   0  B 02:02
Errors during downloading metadata for repository 'updates':
  - Curl error (56): Failure when receiving data from the peer for 
https://mirrors.fedoraproject.org/metalink?repo=updates-released-f31=x86_64 
[Received HTTP code 500 from proxy after CONNECT]
Error: Failed to download metadata for repo 'updates': Cannot prepare 
internal mirrorlist: Curl error (56): Failure when receiving data from 
the peer for 
https://mirrors.fedoraproject.org/metalink?repo=updates-released-f31=x86_64 
[Received HTTP code 500 from proxy after CONNECT]



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/198c1cb0-6faf-4a95-40c0-c93ff024c700%40posteo.net.


[qubes-users] Adding (unofficial) Qubes Matrix Rooms to the support page?

2020-05-24 Thread Stumpy
I'm not asking for this room to be "official" but perhaps it could be 
listed as a resource on the Qubes site? There are two rooms currently, 
one which is strictly moderated and another one that is a bit more 
flexible but both very much centered around Qubes and Qubes support.


I realize there is an IRC channel and of course this mailing list which 
are great but there are those who might prefer matrix (and matrix can 
and does have the ability to bridge with other things like disqus, irc, 
etc).


Anyway, consideration of the idea would be appreciated. Thanks!

Qubes related: https://matrix.to/#/#cybersec-qubes_os:matrix.org
Strictly Qubes: https://matrix.to/#/#Qubes-OS:matrix.org

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/41706c77-639c-d016-5a2d-8ae800b0979d%40posteo.net.


Re: [qubes-users] running programs as room in sys-usb?

2020-05-18 Thread Stumpy

On 2020-05-18 08:52, Mike Keehan wrote:

On 5/18/20 1:43 PM, Stumpy wrote:
I have sys-usb based on fedora minimal and when i try to run something 
like qvm-run -u root sys-usb xterm from dom0 it just hangs (the 
command, not the whole computer) until i ctrl+c out.


Is there some reason i shouldnt be able to do this?



I imagine qvm-run will require some qubes package to be installed in
the vm, and fedora-minimal doesn't have it.

The Qubes documentation website contains some details on what is
needed in a minimal template for some purposes.

Mike.



Thanks. Does it count that i can run the minimal template that sys-usb 
is based on as root? that is something like:


qvm-run -u root fedora-30-minimal xterm

and it starts right up? or is that different?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2ce00564-6e36-4356-f367-4d8add23a412%40posteo.net.


Re: [qubes-users] Installing ulauncher in dom0?

2020-05-18 Thread Stumpy

On 2020-05-13 09:33, Stumpy wrote:
I keep running up against limitations of xfce's application launcher and 
wanted to ask about the security implications of installing something 
like ulauncher?
My threat model is less about being directly targeted and more about 
general secuirty against malware, privacy, and perhaps soft targeting 
(not sure if thats even a real phrase but scammers no nation state or 
hacker groups).


With that said, there are really very few laucnhers being actively 
maintained nowadays. dmenu is fine for i3 but I am looking for a 
"floating" launcher. ulauncher does everything i need and more but also 
(seems) to have the added risk of plugins but then again, i am not sure 
about all this so wanted to ask.




nada?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4f9fe519-843c-01d1-2030-b0a18a63fdcf%40posteo.net.


[qubes-users] running programs as room in sys-usb?

2020-05-18 Thread Stumpy
I have sys-usb based on fedora minimal and when i try to run something 
like qvm-run -u root sys-usb xterm from dom0 it just hangs (the command, 
not the whole computer) until i ctrl+c out.


Is there some reason i shouldnt be able to do this?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6ca9d261-4284-a971-9fec-3efe46872616%40posteo.net.


Re: [qubes-users] HCL search facility

2020-05-16 Thread Stumpy

On 2020-05-15 09:26, Andrew Sullivan wrote:



On Friday, 15 May 2020 14:13:18 UTC+1, unman wrote:

On Thu, May 14, 2020 at 12:30:11PM -0700, Andrew Sullivan wrote:
 > Good evening
 >
 > Is there a way to search the HCL? If not, could such a function
be provided? The list is long, and presumably will get longer, so it
would save a lot of scrolling.
 >
 > Just a thought.
 >

/
Ctrl+F

;-)


Doh... Simples!

Thanks.

--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d48de0d7-2ed1-4e62-82c8-e34fd23c184a%40googlegroups.com 
.


To search through the list via ctrlF or / works for searching, but a few 
more fields and sorting would be suprememly useful; I am not a hardware 
guru and even understanding what is newer hardware and what is more 
dated is, well daunting. I am of course able to have a relativel 
understanding then search for details but being able to sort by things 
like latest v of qubes that has been tested with that hardware, the date 
the hardware came out would be really helpful as some of the hardware 
listed is (afaik) over 10 years old and some just a year or two or newer.
maybe the option to add some information in manually, like when we run 
qube-hcl-report having the option to add hardware manually or link say 
to Wikipedia entries? I'd be happy to resubmit mine with more info :)


Anyway, thats just my few cents

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0ae8793a-c807-6da6-6659-6ef82eba1c53%40posteo.net.


[qubes-users] Installing ulauncher in dom0?

2020-05-13 Thread Stumpy
I keep running up against limitations of xfce's application launcher and 
wanted to ask about the security implications of installing something 
like ulauncher?
My threat model is less about being directly targeted and more about 
general secuirty against malware, privacy, and perhaps soft targeting 
(not sure if thats even a real phrase but scammers no nation state or 
hacker groups).


With that said, there are really very few laucnhers being actively 
maintained nowadays. dmenu is fine for i3 but I am looking for a 
"floating" launcher. ulauncher does everything i need and more but also 
(seems) to have the added risk of plugins but then again, i am not sure 
about all this so wanted to ask.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/529d1da1-f811-1a69-67a9-d28962f8adc8%40posteo.net.


Re: [qubes-users] What's your flow for new templateVM?

2020-05-11 Thread Stumpy

On 2020-05-11 10:26, 'Ryan Tate' via qubes-users wrote:
Saw the new f31 templateVM (thanks for that) and just curious how folks 
generally migrate to a new templateVM.


I manually maintain this big text list of packages and just use that to 
manually update the fresh templateVM to what I need. There's typically 
also some non package installs, which I include basic pointers for 
(think downloaded rpms and so forth), as well as some outside repos to 
add (e.g. keybase). There's also typically some packages I forgot to put 
on the list, which I can usually suss out by going through the bash 
history for the old template, although often there's one or two that 
slip through the cracks, which I find out about eventually and it's not 
a huge deal.


I'm particularly curious if anyone does anything more sophisticated than 
that, using salt or some other automated deploy system to prep new 
template images.


Thanks for any tips!



Ditto, would really be interested as well, I have a similar system but i 
am sure there are better ways to do it.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d3dff887-25b8-443f-be20-687ebcb63da0%40posteo.net.


Re: [qubes-users] Re: Consider making tax deductable donations possible in the EU

2020-05-11 Thread Stumpy

On 2020-05-10 16:25, Michael Carbone wrote:

On 5/9/20 2:17 PM, Lorenzo Lamas wrote:

Whonix Project has partnered up with the CCT (Center for the Cultivation of
Technology, which is a charitable non-profit host organization in Germany
for international Free Software projects.)
This makes it possible for all EU citizens to deduct donations from 500 EUR
and up from their taxes. If Qubes project does the same, it may result in
more donations for the project.

  
https://forums.whonix.org/t/european-union-eu-wide-tax-deductible-donations-to-whonix-are-now-possible/9389
https://www.whonix.org/wiki/Donate/Tax-Deductible


thanks for letting me/us know Lorenzo! I'd been in talks with CCT when
they first started but they had told me to wait until they were finished
getting set up. sounds like they are taking projects now, I'll email them.



I have no clue if this is possible but doing something similar so people 
in the US are able  to make tax deductible contribs would be good too.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/891f9b4d-5ec7-4b9f-a4c2-4ec301fdac3e%40posteo.net.


Re: [qubes-users] Setup firefox to open certain files in dspvms?

2020-05-07 Thread Stumpy

On 2020-05-07 07:56, Stumpy wrote:

On 2020-04-20 20:07, Sven Semmler wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Stumpy,

not quite sure what you are asking. Your subject implies you want to
configure Firefox to open certain links/files in a DVM. To acomplish
that you want to get Rafaelle Florio's Qubes URL Redirector extension:
https://github.com/raffaeleflorio/qubes-url-redirector

You wrote:
I made a desktop file and put it in my .local/share/applications 
directory

but it does not seem to be working?

[Desktop Entry]
Encoding=UTF-8
Name=WriterVM
Exec=qvm-open-in-dvm %u
Terminal=false
X-MultipleArgs=false
Type=Application
Categories=Network;WebBrowser;
MimeType=x-scheme-handler/unknown;x-scheme-handler/about;text/html;text/xml;application/doc;application/dot;application/docx;application/xls;application/xlsx;application/ppt;application/pptx; 



Any thoughts on why this is not working?


That looks fine. If you now register it via xdg-settings set
default-web-browser all other applications will attempt to open URLs
using the qvm-open-in-vm command.

More background and documentation:
https://github.com/Qubes-Community/Contents/blob/master/docs/common-tasks/opening-urls-in-vms.md 



(Well worth reading and understanding in detail!)

/Sven

- --   public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-BEGIN PGP SIGNATURE-
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=kNwU
-END PGP SIGNATURE-



Hi Sven, thanks for responding!!! and apologies for the ambiguity.

I had no idea about that extension, but you nailed it! Very much 
appreciated! I realize its beta (and seemingly no longer being 
maintained?) but geeze that should be included in qubes by default!


will try to install it. Cheers



This is *supremely* useful, i often use dvms but then have pages i want 
to send to another vm and end up having to open Firefox in that appvm 
then c/p the link to the other appvm from the dvm; not a huge deal but 
seemed like it could be stream lined.


After some head scratching i managed to clone and compile the xpi (I 
dont really understand how to use git). It worked fine in the appvm 
where i installed it but I then tried to copy the xpi to an appvm and 
use it in that appvm but while it seemed to install fine it didn't 
actually work:
despite my setting the default action to open in dvm it still blocks 
every page and requires that allow be set for every link.
when i tried to right click on a link and select open in dvm or the 
appvm that i made default nothing would happen.


So. I am usually hesitant to "experiment" on my templates so want to 
first ask, if i install it on my template should it then be available in 
all the appvms that are using that template?


Thanks in advance for the help!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cee00b7c-027d-4802-cf8b-64f8887ffa6b%40posteo.net.


Re: [qubes-users] Setup firefox to open certain files in dspvms?

2020-05-07 Thread Stumpy

On 2020-04-20 20:07, Sven Semmler wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Stumpy,

not quite sure what you are asking. Your subject implies you want to
configure Firefox to open certain links/files in a DVM. To acomplish
that you want to get Rafaelle Florio's Qubes URL Redirector extension:
https://github.com/raffaeleflorio/qubes-url-redirector

You wrote:

I made a desktop file and put it in my .local/share/applications directory
but it does not seem to be working?

[Desktop Entry]
Encoding=UTF-8
Name=WriterVM
Exec=qvm-open-in-dvm %u
Terminal=false
X-MultipleArgs=false
Type=Application
Categories=Network;WebBrowser;
MimeType=x-scheme-handler/unknown;x-scheme-handler/about;text/html;text/xml;application/doc;application/dot;application/docx;application/xls;application/xlsx;application/ppt;application/pptx;

Any thoughts on why this is not working?


That looks fine. If you now register it via xdg-settings set
default-web-browser all other applications will attempt to open URLs
using the qvm-open-in-vm command.

More background and documentation:
https://github.com/Qubes-Community/Contents/blob/master/docs/common-tasks/opening-urls-in-vms.md

(Well worth reading and understanding in detail!)

/Sven

- -- 
  public key: https://www.svensemmler.org/0x8F541FB6.asc

fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-BEGIN PGP SIGNATURE-
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=kNwU
-END PGP SIGNATURE-



Hi Sven, thanks for responding!!! and apologies for the ambiguity.

I had no idea about that extension, but you nailed it! Very much 
appreciated! I realize its beta (and seemingly no longer being 
maintained?) but geeze that should be included in qubes by default!


will try to install it. Cheers

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ab9ec48e-152b-3e77-2ce8-cb24c5659ff4%40posteo.net.


[qubes-users] Setup firefox to open certain files in dspvms?

2020-04-20 Thread Stumpy
I made a desktop file and put it in my .local/share/applications 
directory but it does not seem to be working?


[Desktop Entry]
Encoding=UTF-8
Name=WriterVM
Exec=qvm-open-in-dvm %u
Terminal=false
X-MultipleArgs=false
Type=Application
Categories=Network;WebBrowser;
MimeType=x-scheme-handler/unknown;x-scheme-handler/about;text/html;text/xml;application/doc;application/dot;application/docx;application/xls;application/xlsx;application/ppt;application/pptx;

Any thoughts on why this is not working?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f20d2ba8-fb5c-b625-23dc-b310a73c5d59%40posteo.net.


Re: [qubes-users] can't open anything in standalone vm ?

2020-04-14 Thread Stumpy

On 2020-04-13 19:30, 'awokd' via qubes-users wrote:

Stumpy:


oops. only relied to awokd (sorry).
repost:


Thanks,
gave it a try and either i am misunderstanding the command or something
else?

[sam@dom0 ~]$ sudo xl console miffed
miffed is an invalid domain identifier (rc=-6)


No problem; did you see my reply? Miffed has to be powered on first.



sorry, i guess i missed your email.

I tried with miffed turned on and it certainly gave different output 
(alot of it) though i cant say I am able to make much of it (a few 
"errors" and "failed" in there but not sure if those are the problem. Is 
this something that i shouold send or put on a pastebin?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a0b86dc6-2ce2-7c15-0434-aaf4c34d5457%40posteo.net.


Re: [qubes-users] can't open anything in standalone vm ?

2020-04-12 Thread Stumpy

On 2020-04-10 16:49, 'awokd' via qubes-users wrote:

Stumpy:

I recently made a fedora 30 based standalone VM so i wouldnt have to
goop up my templates with some employer-required programs.

It was working fine for a day or two but earlier today I sat down and
wasnt able to start any programs up in this standalown vm?
I hhave tried from the appfinder menu nada. from the "run command in
qube" option in the qubes manager, nada. and from a dom0 terminal
"qvm-run -u root StandaloneVM xterm", nada.

The vm will start up, and I am able to update it via the update option
but i cant seem to open any application in this VM. As this is for work
I really do need to access it but am not sure what to try next?


sudo xl console StandaloneVM



oops. only relied to awokd (sorry).
repost:


Thanks,
gave it a try and either i am misunderstanding the command or something 
else?


[sam@dom0 ~]$ sudo xl console miffed
miffed is an invalid domain identifier (rc=-6)

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94bd36bc-87cd-f659-2f8d-c4f136fe52fe%40posteo.net.


[qubes-users] can't open anything in standalone vm ?

2020-04-09 Thread Stumpy
I recently made a fedora 30 based standalone VM so i wouldnt have to 
goop up my templates with some employer-required programs.


It was working fine for a day or two but earlier today I sat down and 
wasnt able to start any programs up in this standalown vm?
I hhave tried from the appfinder menu nada. from the "run command in 
qube" option in the qubes manager, nada. and from a dom0 terminal 
"qvm-run -u root StandaloneVM xterm", nada.


The vm will start up, and I am able to update it via the update option 
but i cant seem to open any application in this VM. As this is for work 
I really do need to access it but am not sure what to try next?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b8813698-3c1d-6f01-50c9-06d89c61e922%40posteo.net.


Re: [qubes-users] Building a new pc for running Qubes OS

2020-04-09 Thread Stumpy

On 2020-04-09 05:11, Mark Fernandes wrote:

  ..

I am looking for a bit of a work horse (not nessisarily bleeding
edge) ...

...  getting something that is
highly likely to play nice with Qubes is pretty
much at the top of my priority list.


Not sure what kind of activities you're planning on undertaking with 
your computer, but if you're doing any kind of activity that benefits 
from OpenGL , be aware that Qubes 
doesn't offer any OpenGL virtualisation 
. 



Also, just wondering whether Qubes is a good fit for you, given that its 
above-average security seems as though it definitely has the 
potential of causing a significant performance hit for "work horse" type 
activities.



Thanks,


Mark Fernandes

--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ddc638b5-41bf-4141-a9df-2f735a6e47e8%40googlegroups.com 
.


I've been using it for the past 3 years so am pretty sure its a good fit 
for me.
As for opengl, i didnt mean to insinuate that i was looking for gaming 
(i am not).
And for work horse, i guess i mainly meant i use it for work, and 
personal. I regularly have lot of AppVMs running at the same time with 
lots of browsers and tabs open and occasionally play around with 
digikam, dark table, and gimp so i tend to use quite a bit of memory 
(hence wanting more) and with an old circa pre-2013 i5 spinning up 
AppVMs is a bit slow/could be a bit faster - ergo, looking to upgrade.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/d520b965-a5ca-db8c-c812-91927d0a692d%40posteo.net.


Re: [qubes-users] Building a new pc for running Qubes OS

2020-04-08 Thread Stumpy

On 2020-04-08 13:30, 'awokd' via qubes-users wrote:

Mark Fernandes:


But surely it would be better just to buy it brand new in a shrink-wrapped
condition over the counter at a physical store, where you randomly select
the hardware from many alternatives? In the UK, we have a store called PC
World that seems set-up for such buying strategies in mind.

Any thoughts?


Good point, that could work too. There is yet another perspective where
everything new that contains ME or PSP is already compromised out of the
box, whereas older hardware lets you disable more thoroughly or avoid.
On the other hand, could just be a cost issue with new hardware. No real
"right" answer, all depends on how you weight probabilities and your
monetary units.



My threat model is tempered by my income, and I think its fairly safe to 
say I am not being specifically targeted.


The open source, or semi-open source options like Novena or  Libreum 
would be great but I am not sure the Novena would be much faster than 
what i have now (assuming Qubes works on Arm) and Libreum while really 
cool and an effort i would love to support i am afraid they are likely 
out of my price range.


I am looking for a bit of a work horse (not nessisarily bleeding edge) 
but is not going to bankrupt me which, as i see it, leaves me getting 
used hardware. I can put something together but at the moment have a 
pretty full plate in terms of work so getting something that is 
pre-assmembled (or mostly, I have bunches of drives around so that 
wouldnt be an issue) and highly likely to play nice with Qubes is pretty 
much at the top of my priority list.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/13e8c98c-d93a-177c-88d0-362c0a396ca1%40posteo.net.


Re: [qubes-users] Building a new pc for running Qubes OS

2020-04-08 Thread Stumpy

On 2020-03-31 14:37, Stumpy wrote:

On 2019-11-01 14:57, M wrote:
I’m thinking about building a new pc for running Qubes OS with the 
following specifications:


1)  Motherboard:  ASRock X570 Pro4
2)  CPU:  AMD Ryzen 3 3200G with onboard graphic (until they release 
one for PCIe 4.0 with onboard graphic)

3)  SSD:  AORUS

Does anyone know about if this will result in any problems in relation 
to running Qubes OS besides “the ordinary challenges”, and if so which 
problems ?


Did you happen to get any responses to this? Or if you already built it 
how is it working? (I am starting to think about putting a box together 
so am trying to take notes from others posts)





Thanks for the replies.
Perhaps to change the conversation slightly, I was thinking about 
getting a used system off somewhere like ebay.


I currently have a limited budget so that might be a bit more realistic 
for me at the moment... and a I have a limited computer (bought new in 
2012-2013 a sys with Intel H87 express chipset and socket 1150 i5-4570 
CPU @ 3.20GHz) so have a 32gb mem max which i am feeling occasionally 
and a proc which i really feel when spinning up new VMs (I have a 
relatively speedy samsung 860 SSD).


I started by just looking at searching for "Xenon Desktops" that were 
upgradable to 128gb mem; my only reason for starting there was I assumed 
that Xenon/Server/workstation setups were more likey to be Qubes 
friendly? Any thoughts?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b6a97574-dec4-1c4e-4c68-29e160be5aa0%40posteo.net.


Re: [qubes-users] No Match for argument qubes-template-whonix-ws-15-4.0.1-201910102356.noarch ?

2020-04-01 Thread Stumpy

On 2020-04-01 11:22, Frank wrote:



On Wed, Apr 01, 2020 at 07:38:33AM -0400, Stumpy wrote:

On 2020-03-30 15:26, Chris Laprise wrote:
On 3/27/20 7:38 PM, Stumpy wrote:

Complete!
[nate@dom0 ~]$ sudo qubes-dom0-update
--enablerepo=qubes-templates-community \ qubes-template-whonix-ws
Using sys-whonix as UpdateVM to download updates for Dom0; this may
take some time...
No Match for argument?? qubes-template-whonix-ws
Nothing to download
[nate@dom0 ~]$


You can ignore the warnings when removing.

To fix the above, use 'qubes-template-whonix-ws-15' for the package name.



Thanks. but it seems adding the different name for the template results in
the same error:

[nate@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-community
\ qubes-template-whonix-ws-15


If you really typed it like this, the backslash followed by the space right 
before the template name actually made the template name to be “ 
qubes-template-whonix-ws-14” and that can’t be found in the repository...


Using sys-whonix as UpdateVM to download updates for Dom0; this may take
some time...
qubes-templates-community/metalink  | 2.8 kB 00:00
qubes-templates-community   | 3.0 kB 00:00
qubes-templates-community/primary_db| 7.6 kB 00:00
No Match for argument  qubes-template-whonix-ws-15


And the two spaces in front of the template name in this error message suggest 
as much...


Nothing to download



That worked for me, exactly as you have type it.
Perhaps the repo has been updated?
My only suggestion is that you keep trying: Are you running this over
Tor?





A, that was it, thank you very much Frank!

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/94d6f25e-338b-14da-a7ed-5bb843a77d30%40posteo.net.


Re: [qubes-users] No Match for argument qubes-template-whonix-ws-15-4.0.1-201910102356.noarch ?

2020-04-01 Thread Stumpy

On 2020-03-30 15:26, Chris Laprise wrote:

On 3/27/20 7:38 PM, Stumpy wrote:

Complete!
[nate@dom0 ~]$ sudo qubes-dom0-update 
--enablerepo=qubes-templates-community \ qubes-template-whonix-ws
Using sys-whonix as UpdateVM to download updates for Dom0; this may 
take some time...

No Match for argument  qubes-template-whonix-ws
Nothing to download
[nate@dom0 ~]$


You can ignore the warnings when removing.

To fix the above, use 'qubes-template-whonix-ws-15' for the package name.



Thanks. but it seems adding the different name for the template results 
in the same error:


[nate@dom0 ~]$ sudo qubes-dom0-update 
--enablerepo=qubes-templates-community \ qubes-template-whonix-ws-15
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...
qubes-templates-community/metalink  | 2.8 kB 
00:00
qubes-templates-community   | 3.0 kB 
00:00
qubes-templates-community/primary_db| 7.6 kB 
00:00

No Match for argument  qubes-template-whonix-ws-15
Nothing to download


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/22197854-5408-cc1c-727b-ff3d71666879%40posteo.net.


Re: [qubes-users] Building a new pc for running Qubes OS

2020-03-31 Thread Stumpy

On 2019-11-01 14:57, M wrote:

I’m thinking about building a new pc for running Qubes OS with the following 
specifications:

1)  Motherboard:  ASRock X570 Pro4
2)  CPU:  AMD Ryzen 3 3200G with onboard graphic (until they release one for 
PCIe 4.0 with onboard graphic)
3)  SSD:  AORUS

Does anyone know about if this will result in any problems in relation to 
running Qubes OS besides “the ordinary challenges”, and if so which problems ?

Did you happen to get any responses to this? Or if you already built it 
how is it working? (I am starting to think about putting a box together 
so am trying to take notes from others posts)


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/73b5cecb-3705-e523-495e-0e15865d35d4%40posteo.net.


Re: [qubes-users] How many CPU threads is recommended for Qubes OS ?

2020-03-31 Thread Stumpy

On 2019-11-09 01:46, M wrote:

How many CPU threads is recommended for Qubes OS ?

Is 4 enough, or should I go for 8 or more... ?

I have bought the Ryzen 3 3200G, but I could change it for another one with 
more threads (for example the Ryzen 3400G), if it is recommended as I haven’t 
unpacked it yet.



Hi, did you get any responses to this? I am looking to build a new(ish) 
Qubes computer so clarity on this would be useful.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f38a1201-717d-35d4-d7c9-33e290f2c643%40posteo.net.


Re: [qubes-users] No Match for argument qubes-template-whonix-ws-15-4.0.1-201910102356.noarch ?

2020-03-27 Thread Stumpy

On 2020-03-24 13:34, Chris Laprise wrote:

On 3/23/20 7:23 AM, Stumpy wrote:

On 2020-03-22 13:24, Chris Laprise wrote:

On 3/20/20 10:08 PM, Stumpy wrote:
I'm trying to reinstall the whonix ws template but while seems to 
find it it then says there is no match?



[zack@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-whonix-ws-15
WARNING: Replacing a template will erase all files in template's 
/home and /rw !

Template VM halted
Using sys-whonix as UpdateVM to download updates for Dom0; this may 
take some time...
No Match for argument 
qubes-template-whonix-ws-15-4.0.1-201910102356.noarch

Nothing to download


That means you have an older template package that was removed from 
the Qubes servers, so it can't be reinstalled as the same version.


When that happens, you can use '--action=upgrade' instead and it 
should grab the latest available version.


https://www.qubes-os.org/doc/reinstall-template/



Thank you for the suggestion, i tried upgrade instead of reinstall but 
got the following:


[bob@dom0 ~]$ sudo qubes-dom0-update --action=upgrade 
qubes-template-whonix-ws-15
WARNING: Replacing a template will erase all files in template's /home 
and /rw !

Template VM halted
Using sys-whonix as UpdateVM to download updates for Dom0; this may 
take some time...

No new updates available
Qubes OS Repository for Dom0
12 MB/s |  26 kB 00:00
Dependencies resolved.
Nothing to do.
Complete!

Then tried reinstall again just for the heck of it and still got the 
same response.


?



I think this has something to do with the update VM (sys-whonix) being 
based on Debian. The workaround would be to use the Manual method shown 
at the above link.




I gave the manual way a try and removing the template and then i tried 
to install the whonix-ws-15 template i got:


[nate@dom0 ~]$ sudo dnf remove qubes-template-whonix-ws-15
Dependencies resolved.
=
 Package Arch 
Version  Repository 
Size

=
Removing:
 qubes-template-whonix-ws-15 noarch 
4.0.1-201910102356   @anaconda 
   2.1 G


Transaction Summary
=
Remove  1 Package

Installed size: 2.1 G
Is this ok [y/N]: y
Running transaction check
Transaction check succeeded.
Running transaction test
Transaction test succeeded.
Running transaction
  Erasing : qubes-template-whonix-ws-15-4.0.1-201910102356.noarch 


 1/1
warning: file 
/var/lib/qubes/vm-templates/whonix-ws-15/whitelisted-appmenus.list: 
remove failed: No such file or directory
warning: file 
/var/lib/qubes/vm-templates/whonix-ws-15/vm-whitelisted-appmenus.list: 
remove failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15/root.img.part.02: 
remove failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15/root.img.part.01: 
remove failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15/root.img.part.00: 
remove failed: No such file or directory
warning: file 
/var/lib/qubes/vm-templates/whonix-ws-15/netvm-whitelisted-appmenus.list: 
remove failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15/icon.png: remove 
failed: No such file or directory
warning: file 
/var/lib/qubes/vm-templates/whonix-ws-15/clean-volatile.img.tar: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15/apps.templates: 
remove failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15/apps.tempicons: 
remove failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15/apps: remove 
failed: No such file or directory
warning: file /var/lib/qubes/vm-templates/whonix-ws-15: remove failed: 
No such file or directory
  Verifying   : qubes-template-whonix-ws-15-4.0.1-201910102356.noarch 


 1/1

Removed:
  qubes-template-whonix-ws-15.noarch 4.0.1-201910102356 




Complete!
[nate@dom0 ~]$ sudo qubes-dom0-update 
--enablerepo=qubes-templates-community \ qubes-template-whonix-ws
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

No Match for argument  qubes-template-whonix-ws
Nothing to download
[nate@dom0 ~]$

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubs

Re: [qubes-users] Associate office files to win7 VM and prevent qvm-open-in-vm pop-up

2020-03-23 Thread Stumpy

On 2020-03-23 11:20, dhorf-hfref.4a288...@hashmail.org wrote:

On Mon, Mar 23, 2020 at 05:48:29AM -0700, peebl...@gmail.com wrote:

asking me in which VM i want to open the file.. So it seems the command
line parameter for VM is not taken into account..


it probably is, but you need to authorize it anyways: security.



How can I fix this?


https://www.qubes-os.org/doc/rpc-policy/





To add to this, is it possible to have "disposable win7vms?" and then 
have it not prompt for anything?


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2fbfaa90-c7c6-5673-365e-95038748dc54%40posteo.net.


Re: [qubes-users] No Match for argument qubes-template-whonix-ws-15-4.0.1-201910102356.noarch ?

2020-03-23 Thread Stumpy

On 2020-03-22 13:24, Chris Laprise wrote:

On 3/20/20 10:08 PM, Stumpy wrote:
I'm trying to reinstall the whonix ws template but while seems to find 
it it then says there is no match?



[zack@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-whonix-ws-15
WARNING: Replacing a template will erase all files in template's /home 
and /rw !

Template VM halted
Using sys-whonix as UpdateVM to download updates for Dom0; this may 
take some time...
No Match for argument 
qubes-template-whonix-ws-15-4.0.1-201910102356.noarch

Nothing to download


That means you have an older template package that was removed from the 
Qubes servers, so it can't be reinstalled as the same version.


When that happens, you can use '--action=upgrade' instead and it should 
grab the latest available version.


https://www.qubes-os.org/doc/reinstall-template/



Thank you for the suggestion, i tried upgrade instead of reinstall but 
got the following:


[bob@dom0 ~]$ sudo qubes-dom0-update --action=upgrade 
qubes-template-whonix-ws-15
WARNING: Replacing a template will erase all files in template's /home 
and /rw !

Template VM halted
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

No new updates available
Qubes OS Repository for Dom0 


12 MB/s |  26 kB 00:00
Dependencies resolved.
Nothing to do.
Complete!

Then tried reinstall again just for the heck of it and still got the 
same response.


?

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c77f6e3c-2731-850e-87ef-783604754d7e%40posteo.net.


Re: [qubes-users] Newbie question on disposable VMs?

2020-03-21 Thread Stumpy

On 2020-03-21 04:26, Viktor Ransmayr wrote:
Am Fr., 20. März 2020 um 21:30 Uhr schrieb >:


Hello Qubes community,

I'm only a short-term user of Qubes-OS - and - I'm very satisfied so
far. - Thanks a lot for all your work on this important project!

I'd like to use disposable VMs as a means to efficiently 'simulate'
E2E installation program experience for in-experienced users.

So far my approach has been to create persistent VMs for it - but -
I'd like to optimize/ simplify that now by using disposable VMs ...

Now finally my question:

*I am not able to/ I do not know how to copy content from a shell/
terminal in a disposable VM to a file in a regular VM :-(*


For copying text from terminal in any vm to any other vm (except dom0) 
is pretty much dependant upon the terminal program you are using. if you 
are using xterm then i believe there is a way but its tricky so i cant 
help you there (I am 99% sure i found how somewhere on stackexchange) 
but with others like Terminator, or the termial that comes with xfce you 
should be able to right click for a conext menu, select copy, then 
ctrl+shft+c then switch to the vm you want and ctrl+shift+v then paste.


If you are talking about moving files then in a terminal you just type 
qvm-copy filename
then a window should pop up where you can select what appvm you want it 
to go to and it will then put your file(s) in a folder ~/QubesIncomming





Is this a deliberate design decision - or - what am I missing?


Additional info & update on question:

I'm running Qubes OS 4.0.3 - and - was starting a disposable 
'fedora-29-dvm' yesterday & by default the terminal offered is an Xterm.


This morning it became clear to me, that I should use the same setup, 
that I had used previously with the persistant VMs, i.e. where by 
default a standard (Gnome?) terminal is offered ...


I updated the Qube settings for 'fedora-29-dvm', increased the memory 
size & enabled network access.


However the terminal only shows up temporarily - and - the disposable VM 
is halted again ...


Sorry, I havent a clue on that one, thought i dont think mem is an issue 
as the default is 4gb which should be plenty AFAIR.


I have no clue if this would fix things but since you are on 29 and 30 
has been out you might upgrade to fed 30 which might resolve the issue 
you are having.




Can somebody explain what is going on?

With kind regards,

VR

--
You received this message because you are subscribed to the Google 
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send 
an email to qubes-users+unsubscr...@googlegroups.com 
.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAAeSrGKMtWdpG-mzefh9FL7MJOYvYJhUjL9w_W_pZ%3DCc8tvFAA%40mail.gmail.com 
.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5128b30b-c12c-158e-15f7-66f258c39102%40posteo.net.


[qubes-users] No Match for argument qubes-template-whonix-ws-15-4.0.1-201910102356.noarch ?

2020-03-20 Thread Stumpy
I'm trying to reinstall the whonix ws template but while seems to find 
it it then says there is no match?



[zack@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-whonix-ws-15
WARNING: Replacing a template will erase all files in template's /home 
and /rw !

Template VM halted
Using sys-whonix as UpdateVM to download updates for Dom0; this may take 
some time...

No Match for argument qubes-template-whonix-ws-15-4.0.1-201910102356.noarch
Nothing to download

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3f5534d3-bc14-1627-68fb-9adca1861b05%40posteo.net.


Re: [qubes-users] Errors were encountered while processing:, qubes-core-agent-passwordless-root? (now cant install things?)

2020-03-19 Thread Stumpy

On 2020-03-18 21:54, unman wrote:

On Wed, Mar 18, 2020 at 04:33:09PM -0400, Stumpy wrote:

I do not want to remove qubes-corepasswordless-root, i am guessing that
is the known issue that was reffered to but the solution is less than
clear to me as reinstalling then updateing/upgrading the template did
not work.

apologies



Thought about trying

sudo apt update && sudo apt dist-upgrade

seemed to work without a hitch, but then tried to install an app again and
got the same thing.



I cant explain how you have ended up in this position - did you
mistakenly mark it to be removed?
If you don't want to remove the package, run aptitude,select the
qubes-core-agent-passwordless-root package and mark it with + to show it
should be installed.
Then hit g to process.




Thank you unman!
I really dont think I mistakenly marked it to be removed but hey, at 
this point i dont know how else i ended up here.


Regardless, I almost never use aptitude so didnt even think of it, so i 
tried it and viola! I was able to install (and then use) apps without 
any obvious errors. I will not pretend to understand why that worked but 
I appreciate the ongoing help all the same. now i have a usable template 
again!!!


A few notes. Installing separately via aptitude seems to work, but using 
a file to install a few things seems to throw up the same error again, 
but after that error i can still install/run the app if i just install 
it directly via aptitude, perhaps the output will clarify things:


user@debian-10:~$ source manually_installed-Debian.txt
No candidate version found for wine32
Unable to apply some actions, aborting
Reading package lists... Done
Building dependency tree
Reading state information... Done
Package 'thunderbird' is not installed, so not removed
The following packages will be REMOVED:
  qubes-core-agent-passwordless-root
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
1 not fully installed or removed.
After this operation, 62.5 kB disk space will be freed.
(Reading database ... 132149 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root 
(--remove):
 installed qubes-core-agent-passwordless-root package post-removal 
script subprocess returned error exit status 3

Errors were encountered while processing:
 qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)

user@debian-10:~$ vi manually_installed-Debian.txt
user@debian-10:~$ cat manually_installed-Debian.txt
sudo aptitude install wine wine32 wine64 terminator smplayer mpv vlc 
hugin digikam darktable sshfs lutris mediainfo mediainfo-gui mkvtoolnix 
mkvtoolnix-gui default-jre firejail gimp wget vi-enhanced progress 
firejail-tools filezilla -y

sudo apt remove thunderbird -y

user@debian-10:~$ sudo aptitude install terminator
The following NEW packages will be installed:
  gir1.2-keybinder-3.0{a} gir1.2-vte-2.91{a} libkeybinder-3.0-0{a} 
python3-configobj{a} python3-psutil{a} terminator

0 packages upgraded, 6 newly installed, 0 to remove and 0 not upgraded.
Need to get 1,078 kB/1,108 kB of archives. After unpacking 3,814 kB will 
be used.

Do you want to continue? [Y/n/?] y
Get: 1 https://deb.debian.org/debian buster/main amd64 
libkeybinder-3.0-0 amd64 0.3.2-1 [7,904 B]
Get: 2 https://deb.debian.org/debian buster/main amd64 
gir1.2-keybinder-3.0 amd64 0.3.2-1 [3,536 B]
Get: 3 https://deb.debian.org/debian buster/main amd64 gir1.2-vte-2.91 
amd64 0.54.2-2 [529 kB]
Get: 4 https://deb.debian.org/debian buster/main amd64 python3-configobj 
all 5.0.6-3 [35.7 kB]
Get: 5 https://deb.debian.org/debian buster/main amd64 python3-psutil 
amd64 5.5.1-1 [166 kB]
Get: 6 https://deb.debian.org/debian buster/main amd64 terminator all 
1.91-4 [335 kB]

Fetched 1,078 kB in 6s (191 kB/s)
Selecting previously unselected package libkeybinder-3.0-0:amd64.
(Reading database ... 132149 files and directories currently installed.)
Preparing to unpack .../0-libkeybinder-3.0-0_0.3.2-1_amd64.deb ...
Unpacking libkeybinder-3.0-0:amd64 (0.3.2-1) ...
Selecting previously unselected package gir1.2-keybinder-3.0.
Preparing to unpack .../1-gir1.2-keybinder-3.0_0.3.2-1_amd64.deb ...
Unpacking gir1.2-keybinder-3.0 (0.3.2-1) ...
Selecting previously unselected package gir1.2-vte-2.91:amd64.
Preparing to unpack .../2-gir1.2-vte-2.91_0.54.2-2_amd64.deb ...
Unpacking gir1.2-vte-2.91:amd64 (0.54.2-2) ...
Selecting previously unselected package python3-configobj.
Preparing to unpack .../3-python3-configobj_5.0.6-3_all.deb ...
Unpacking python3-configobj (5.0.6-3) ...
Selecting previously unselected package python3-psutil.
Preparing to unpack .../4-python3-psutil_5.5.1-1_amd64.deb ...
Unpacking python3-psutil (5.5.1-1) ...
Selecting previously unselected package terminator.
Preparing to unpack .../5-terminator_1.91-4_all.deb ...
U

Re: [qubes-users] Errors were encountered while processing:, qubes-core-agent-passwordless-root? (now cant install things?)

2020-03-18 Thread Stumpy

On 2020-03-18 11:30, Stumpy wrote:

On 2020-03-17 11:38, unman wrote:

On Mon, Mar 16, 2020 at 04:16:57PM -0400, Stumpy wrote:
Hi, my previous post was perhaps inappropriate in that i mixed posts 
so i am

repostin gjust about this one issue.

I am now getting the following when i try to update or install 
anything (in

this case lutris)

user@gaming:~$ sudo apt-get install lutris
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 mesa-utils p7zip python3-evdev 
python3-yaml

Suggested packages:
   fluidsynth timidity p7zip-full python-evdev-doc
The following packages will be REMOVED:
   qubes-core-agent-passwordless-root
The following NEW packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 lutris mesa-utils p7zip python3-evdev
python3-yaml
0 upgraded, 15 newly installed, 1 to remove and 1 not upgraded.
1 not fully installed or removed.
Need to get 0 B/128 MB of archives.
After this operation, 174 MB of additional disk space will be used.
Do you want to continue? [Y/n] y
(Reading database ... 149744 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root
(--remove):
  installed qubes-core-agent-passwordless-root package post-removal 
script

subprocess returned error exit status 3
Errors were encountered while processing:
  qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


As a result it seems i cant update and i know i cant install things 
(and the

error itself looks, troubling?)

Thanks in advance


This is a known issue, fixed in updated templates.
The problem (and solution) is clearly stated -


Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'


If you *do* want to remove that package, then (if necessary) create the
group 'sudo' , add 'user' to it, and then remove the package.
sudo su -
(addgroup sudo)
usermod -a -G sudo user
apt remove qubes-core-agent-passwordless-root



The problem/solution is a bit fuzzy to me, sorry.

Though based on your saying it was fixed in the updated templates i 
tried to just start over with:


[frank@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-debian-10


then did a:

  sudo apt update && sudo apt upgrade

which went well but then when i tried to install some packages i am back 
where i started with the error like:


user@debian-10:~$ sudo apt-get install mediainfo
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
   libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5
Suggested packages:
   mediainfo-gui
The following packages will be REMOVED:
   qubes-core-agent-passwordless-root
The following NEW packages will be installed:
   libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5 mediainfo
0 upgraded, 5 newly installed, 1 to remove and 6 not upgraded.
1 not fully installed or removed.
Need to get 2,246 kB of archives.
After this operation, 7,578 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 https://deb.debian.org/debian buster/main amd64 libmms0 amd64 
0.6.4-3 [34.6 kB]
Get:2 https://deb.debian.org/debian buster/main amd64 libtinyxml2-6a 
amd64 7.0.0+dfsg-1 [29.3 kB]
Get:3 https://deb.debian.org/debian buster/main amd64 libzen0v5 amd64 
0.4.37-1 [102 kB]
Get:4 https://deb.debian.org/debian buster/main amd64 libmediainfo0v5 
amd64 18.12-2 [2,003 kB]
Get:5 https://deb.debian.org/debian buster/main amd64 mediainfo amd64 
18.12-2 [77.1 kB]

Fetched 2,246 kB in 12s (194 kB/s)
(Reading database ... 109007 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root 
(--remove):
  installed qubes-core-agent-passwordless-root package post-removal 
script subprocess returned error exit status 3

Errors were encountered while processing:
  qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


I do not want to remove qubes-corepasswordless-root, i am guessing that 
is the known issue that was reffered to but the solution is less than 
clear to me as reinstalling then updateing/upgrading the template did 
not work.


apologies



Thought about trying

sudo apt update && sudo apt dist-upgrade

seemed to work without a hitch, but then tried to install an ap

Re: [qubes-users] Errors were encountered while processing:, qubes-core-agent-passwordless-root? (now cant install things?)

2020-03-18 Thread Stumpy

On 2020-03-17 11:38, unman wrote:

On Mon, Mar 16, 2020 at 04:16:57PM -0400, Stumpy wrote:

Hi, my previous post was perhaps inappropriate in that i mixed posts so i am
repostin gjust about this one issue.

I am now getting the following when i try to update or install anything (in
this case lutris)

user@gaming:~$ sudo apt-get install lutris
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 mesa-utils p7zip python3-evdev python3-yaml
Suggested packages:
   fluidsynth timidity p7zip-full python-evdev-doc
The following packages will be REMOVED:
   qubes-core-agent-passwordless-root
The following NEW packages will be installed:
   cabextract curl fluid-soundfont-gm fluid-soundfont-gs
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
   libc6-i386 libcurl4 libmspack0 lutris mesa-utils p7zip python3-evdev
python3-yaml
0 upgraded, 15 newly installed, 1 to remove and 1 not upgraded.
1 not fully installed or removed.
Need to get 0 B/128 MB of archives.
After this operation, 174 MB of additional disk space will be used.
Do you want to continue? [Y/n] y
(Reading database ... 149744 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root
(--remove):
  installed qubes-core-agent-passwordless-root package post-removal script
subprocess returned error exit status 3
Errors were encountered while processing:
  qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


As a result it seems i cant update and i know i cant install things (and the
error itself looks, troubling?)

Thanks in advance


This is a known issue, fixed in updated templates.
The problem (and solution) is clearly stated -


Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'


If you *do* want to remove that package, then (if necessary) create the
group 'sudo' , add 'user' to it, and then remove the package.
sudo su -
(addgroup sudo)
usermod -a -G sudo user
apt remove qubes-core-agent-passwordless-root



The problem/solution is a bit fuzzy to me, sorry.

Though based on your saying it was fixed in the updated templates i 
tried to just start over with:


[frank@dom0 ~]$ sudo qubes-dom0-update --action=reinstall 
qubes-template-debian-10


then did a:

 sudo apt update && sudo apt upgrade

which went well but then when i tried to install some packages i am back 
where i started with the error like:


user@debian-10:~$ sudo apt-get install mediainfo
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
  libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5
Suggested packages:
  mediainfo-gui
The following packages will be REMOVED:
  qubes-core-agent-passwordless-root
The following NEW packages will be installed:
  libmediainfo0v5 libmms0 libtinyxml2-6a libzen0v5 mediainfo
0 upgraded, 5 newly installed, 1 to remove and 6 not upgraded.
1 not fully installed or removed.
Need to get 2,246 kB of archives.
After this operation, 7,578 kB of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 https://deb.debian.org/debian buster/main amd64 libmms0 amd64 
0.6.4-3 [34.6 kB]
Get:2 https://deb.debian.org/debian buster/main amd64 libtinyxml2-6a 
amd64 7.0.0+dfsg-1 [29.3 kB]
Get:3 https://deb.debian.org/debian buster/main amd64 libzen0v5 amd64 
0.4.37-1 [102 kB]
Get:4 https://deb.debian.org/debian buster/main amd64 libmediainfo0v5 
amd64 18.12-2 [2,003 kB]
Get:5 https://deb.debian.org/debian buster/main amd64 mediainfo amd64 
18.12-2 [77.1 kB]
Fetched 2,246 kB in 12s (194 kB/s) 


(Reading database ... 109007 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root 
(--remove):
 installed qubes-core-agent-passwordless-root package post-removal 
script subprocess returned error exit status 3

Errors were encountered while processing:
 qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


I do not want to remove qubes-corepasswordless-root, i am guessing that 
is the known issue that was reffered to but the solution is less than 
clear to me as reinstalling then updateing/upgrading the template did 
not work.


apologies

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an ema

[qubes-users] Errors were encountered while processing:, qubes-core-agent-passwordless-root? (now cant install things?)

2020-03-16 Thread Stumpy
Hi, my previous post was perhaps inappropriate in that i mixed posts so 
i am repostin gjust about this one issue.


I am now getting the following when i try to update or install anything 
(in this case lutris)


user@gaming:~$ sudo apt-get install lutris
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
  cabextract curl fluid-soundfont-gm fluid-soundfont-gs 
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
  libc6-i386 libcurl4 libmspack0 mesa-utils p7zip python3-evdev 
python3-yaml

Suggested packages:
  fluidsynth timidity p7zip-full python-evdev-doc
The following packages will be REMOVED:
  qubes-core-agent-passwordless-root
The following NEW packages will be installed:
  cabextract curl fluid-soundfont-gm fluid-soundfont-gs 
gir1.2-gdesktopenums-3.0 gir1.2-gnomedesktop-3.0 lib32gcc1
  libc6-i386 libcurl4 libmspack0 lutris mesa-utils p7zip python3-evdev 
python3-yaml

0 upgraded, 15 newly installed, 1 to remove and 1 not upgraded.
1 not fully installed or removed.
Need to get 0 B/128 MB of archives.
After this operation, 174 MB of additional disk space will be used.
Do you want to continue? [Y/n] y
(Reading database ... 149744 files and directories currently installed.)
Removing qubes-core-agent-passwordless-root (4.0.51-1+deb10u1) ...
Removing user user from group sudo
gpasswd: user 'user' is not a member of 'sudo'
dpkg: error processing package qubes-core-agent-passwordless-root 
(--remove):
 installed qubes-core-agent-passwordless-root package post-removal 
script subprocess returned error exit status 3

Errors were encountered while processing:
 qubes-core-agent-passwordless-root
E: Sub-process /usr/bin/dpkg returned an error code (1)


As a result it seems i cant update and i know i cant install things (and 
the error itself looks, troubling?)


Thanks in advance

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d962225-64a9-da81-ff07-2da76373eba0%40posteo.net.


  1   2   3   >